With the increase in the number of drones, it is possible to have the danger of using drones illegally. It is crucial to detect adverse events or conditions so that security operators can obtain that information and situational identification of drones. This paper proposes two methods of classifying acoustic sensor data in a UAV detection system, using Support Vector Machine and Neural Network, that will be compared. This research shows that the accuracy achieved in predicting acoustic sensor data is 82.27% in the SVM method. The accuracy achieved is 90.58% for the NN method under the same input conditions and amount of training data. This comparation needs to do to choose the best accuracy in a public safety environment.
{"title":"Comparison of Support Vector Machine and Neural Network Algorithm in Drone Detection System","authors":"Risa Farrid Christianti, Hanin Latif Fuadi, M. Afandi, Azhari S.N., Andi Dharmawan","doi":"10.1109/CyberneticsCom55287.2022.9865628","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865628","url":null,"abstract":"With the increase in the number of drones, it is possible to have the danger of using drones illegally. It is crucial to detect adverse events or conditions so that security operators can obtain that information and situational identification of drones. This paper proposes two methods of classifying acoustic sensor data in a UAV detection system, using Support Vector Machine and Neural Network, that will be compared. This research shows that the accuracy achieved in predicting acoustic sensor data is 82.27% in the SVM method. The accuracy achieved is 90.58% for the NN method under the same input conditions and amount of training data. This comparation needs to do to choose the best accuracy in a public safety environment.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Indonesia is a country where most of the population work in the agricultural and plantation sectors. Both sectors are significant for the economy of Indonesia because it contributes to the increase in Gross Domestic Product (GDP). Such as the tea plantation sub-sector, which is one of the export commodities in Indonesia. However, several problems occur to the tea farmers in Indonesia. These problems influence decreasing in tea quality and farmers' welfare in Indonesia. For that reason, TehNusa is created to help solve the issues. TehNusa can be utilized to buy and sell harvested or processed tea. Another hand, TehNusa also has other functions to develop the quality and ability of the community in caring for and managing processed tea. Another side, BUMDes will play a role by managing and developing village prospects and tea farmers to minimize gaps. The design of the TehNusa application is created using the design sprint methodology and for the design validation, we're using the system usability scale methodology. The design of the TehNusa application can be made within 40 working hours, and the test result of design validation gets a conclusion of 81 points or equivalent to grade B. The TehNusa application is rated by users as being able to help make it easier to solve problems. In addition, further research needs to be carried out to determine the implementation of making applications and building business cooperation with BUMDes in Indonesian villages that have skilled farmers and have the potential to become processed tea producers.
{"title":"Designing TehNusa Mobile Based Application Using Design Sprint Method","authors":"Dinda Maylan Setianti, Daffa Raihan Zaki, Gita Fadila Fitriana, Aditya Ammar Pradana","doi":"10.1109/CyberneticsCom55287.2022.9865534","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865534","url":null,"abstract":"Indonesia is a country where most of the population work in the agricultural and plantation sectors. Both sectors are significant for the economy of Indonesia because it contributes to the increase in Gross Domestic Product (GDP). Such as the tea plantation sub-sector, which is one of the export commodities in Indonesia. However, several problems occur to the tea farmers in Indonesia. These problems influence decreasing in tea quality and farmers' welfare in Indonesia. For that reason, TehNusa is created to help solve the issues. TehNusa can be utilized to buy and sell harvested or processed tea. Another hand, TehNusa also has other functions to develop the quality and ability of the community in caring for and managing processed tea. Another side, BUMDes will play a role by managing and developing village prospects and tea farmers to minimize gaps. The design of the TehNusa application is created using the design sprint methodology and for the design validation, we're using the system usability scale methodology. The design of the TehNusa application can be made within 40 working hours, and the test result of design validation gets a conclusion of 81 points or equivalent to grade B. The TehNusa application is rated by users as being able to help make it easier to solve problems. In addition, further research needs to be carried out to determine the implementation of making applications and building business cooperation with BUMDes in Indonesian villages that have skilled farmers and have the potential to become processed tea producers.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/CyberneticsCom55287.2022.9865610
Kien Trang, Hoang An Nguyen, Long TonThat, Hung Ngoc Do, B. Vuong
The rapid spreading rate of the Coronavirus disease 2019 (COVID-19) has resulted in more than 6.2 million deceased cases. Furthermore, the patients of the latest Omicron variation carry light to almost no symptoms of the disease themselves. Thus, the requirement for a new diagnosis method besides Reverse Transcription-Polymerase Chain Reaction (RT-PCR) becomes the most important step to successfully detect infected cases. In this research, the application of the KNN, Ensemble and SincNet models are implemented as the main models for classification diagnosis based on cough sound records of infected patients. After pre-processing steps for removing silence ranges in the audio scripts, the cough sounds are augmented, subsequently separated into single cough samples, then generated 3 testing scenarios for dealing with the imbalanced problem between the sample classes. Afterward, MelFrequency information and MelSprectrogram are extracted as main features for analysis in order to distinguish patients with COVID-19 disease and healthy cases. The AICV115M dataset consisting of two classes COVID-19 and NonCOVID-19 is implemented for performance evaluation. The recorded highest accuracy on the models KNN, Ensemble and SincNet are 92.49%, 90.1% and 85.15%, respectively.
{"title":"COVID-19 Disease Classification by Cough Records Analysis using Machine Learning","authors":"Kien Trang, Hoang An Nguyen, Long TonThat, Hung Ngoc Do, B. Vuong","doi":"10.1109/CyberneticsCom55287.2022.9865610","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865610","url":null,"abstract":"The rapid spreading rate of the Coronavirus disease 2019 (COVID-19) has resulted in more than 6.2 million deceased cases. Furthermore, the patients of the latest Omicron variation carry light to almost no symptoms of the disease themselves. Thus, the requirement for a new diagnosis method besides Reverse Transcription-Polymerase Chain Reaction (RT-PCR) becomes the most important step to successfully detect infected cases. In this research, the application of the KNN, Ensemble and SincNet models are implemented as the main models for classification diagnosis based on cough sound records of infected patients. After pre-processing steps for removing silence ranges in the audio scripts, the cough sounds are augmented, subsequently separated into single cough samples, then generated 3 testing scenarios for dealing with the imbalanced problem between the sample classes. Afterward, MelFrequency information and MelSprectrogram are extracted as main features for analysis in order to distinguish patients with COVID-19 disease and healthy cases. The AICV115M dataset consisting of two classes COVID-19 and NonCOVID-19 is implemented for performance evaluation. The recorded highest accuracy on the models KNN, Ensemble and SincNet are 92.49%, 90.1% and 85.15%, respectively.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/CyberneticsCom55287.2022.9865255
Inam Abdullah Abdulmajeed, I. Husien
Intrusion Detection System (IDS) is a critical component in cyber security to capture and analyze the traffic and then differentiate between benignant and malicious traffic indicating the attack type. This review is aimed to investigate various Machine Learning (ML) algorithms utilized in IDS design; with particular focus on dataset used. The parameters used to compare the performance of each algorithm have been studied also. Dataset choice is exceptionally critical to guarantee that it is matching the IDS requirements. The dataset structure can influence in a great manner the selection of the of ML algorithm. Hence, metric will provide a numerical relation between ML algorithm against specific dataset. This review concluded that researches are liberating themselves from Supervised Learning and moving toward Clustering and other algorithms, which gives the hope that IDS in the future will be able to detect more unknown and zero-day attacks, also the percentage of utilizing hybrid algorithms has increased dramatically. On the other hand, recent ML researchers are depending more and more on modern datasets which contributes as a significant consideration in IDS design although some research articles are still seeing the KDDCup99 and its reduced variant as principal training dataset of IDSs, despite the fact that it is more than 20 years old, while cyber-threats keep rising together with adapting new technologies in the cyber world like cloud computing, IoT, and IPv6.
{"title":"Machine Learning Algorithms and Datasets for Modern IDS Design","authors":"Inam Abdullah Abdulmajeed, I. Husien","doi":"10.1109/CyberneticsCom55287.2022.9865255","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865255","url":null,"abstract":"Intrusion Detection System (IDS) is a critical component in cyber security to capture and analyze the traffic and then differentiate between benignant and malicious traffic indicating the attack type. This review is aimed to investigate various Machine Learning (ML) algorithms utilized in IDS design; with particular focus on dataset used. The parameters used to compare the performance of each algorithm have been studied also. Dataset choice is exceptionally critical to guarantee that it is matching the IDS requirements. The dataset structure can influence in a great manner the selection of the of ML algorithm. Hence, metric will provide a numerical relation between ML algorithm against specific dataset. This review concluded that researches are liberating themselves from Supervised Learning and moving toward Clustering and other algorithms, which gives the hope that IDS in the future will be able to detect more unknown and zero-day attacks, also the percentage of utilizing hybrid algorithms has increased dramatically. On the other hand, recent ML researchers are depending more and more on modern datasets which contributes as a significant consideration in IDS design although some research articles are still seeing the KDDCup99 and its reduced variant as principal training dataset of IDSs, despite the fact that it is more than 20 years old, while cyber-threats keep rising together with adapting new technologies in the cyber world like cloud computing, IoT, and IPv6.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/CyberneticsCom55287.2022.9865461
Demas Yangindrajat, H. Guntur
This study presents the uses of Fuzzy control for AFPMSG (Axial Flux Permanent Magnet Synchronous Generator), which it is implemented on a Wheel Hub Motor (WHM) 1.5KW. The use of Fuzzy aims to stabilize the voltage used for charging batteries in electric vehicles. Electric vehicles today have a shortage in mileage. This research optimizes the WHM function for driving and also to charging with AFPMSG Fuzzy control. AFPMSG was made on the WHM stator and magnets on the WHM cover. The type of generator is used without a core on the coil. The generator has been simulated using MATLAB and FEM. The simulation results show a maximum voltage of 24 Volts at a speed of 1000 RPM. The system used for Fuzzy input is the speed and distance of the motor. The resulting output is a voltage. Fuzzy control is used for the stability of the charging system in electric vehicles. The research is presented in the form of simulations and field tests.
{"title":"Fuzzy Logic Control Strategy for Axial Flux Permanent Magnet Synchronous Generator in WHM 1.5KW","authors":"Demas Yangindrajat, H. Guntur","doi":"10.1109/CyberneticsCom55287.2022.9865461","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865461","url":null,"abstract":"This study presents the uses of Fuzzy control for AFPMSG (Axial Flux Permanent Magnet Synchronous Generator), which it is implemented on a Wheel Hub Motor (WHM) 1.5KW. The use of Fuzzy aims to stabilize the voltage used for charging batteries in electric vehicles. Electric vehicles today have a shortage in mileage. This research optimizes the WHM function for driving and also to charging with AFPMSG Fuzzy control. AFPMSG was made on the WHM stator and magnets on the WHM cover. The type of generator is used without a core on the coil. The generator has been simulated using MATLAB and FEM. The simulation results show a maximum voltage of 24 Volts at a speed of 1000 RPM. The system used for Fuzzy input is the speed and distance of the motor. The resulting output is a voltage. Fuzzy control is used for the stability of the charging system in electric vehicles. The research is presented in the form of simulations and field tests.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114166106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/CyberneticsCom55287.2022.9865466
Ayushi Maurya, Arun C. S. Kumar
Over the years, with the development of e-commerce, people are mostly making online transactions, and the risk of getting scammed has also increased. This in turn forces the financial institutions to improve continuously and upgrade their model. Machine Learning techniques were used to detect fraud in credit card transactions, but working with real-time data can be tough for machine learning to handle. Thus, implementation of blockchain techniques with machine learning to improve the efficiency and accuracy of the model. In the proposed model, Ethereum dataset has been used to check the fraudulent transaction and secure it with the help of machine learning algorithms. Out of all the classifiers XGBoost has attained the highest accuracy of 99.21% for the stated dataset.
{"title":"Credit card fraud detection system using machine learning technique","authors":"Ayushi Maurya, Arun C. S. Kumar","doi":"10.1109/CyberneticsCom55287.2022.9865466","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865466","url":null,"abstract":"Over the years, with the development of e-commerce, people are mostly making online transactions, and the risk of getting scammed has also increased. This in turn forces the financial institutions to improve continuously and upgrade their model. Machine Learning techniques were used to detect fraud in credit card transactions, but working with real-time data can be tough for machine learning to handle. Thus, implementation of blockchain techniques with machine learning to improve the efficiency and accuracy of the model. In the proposed model, Ethereum dataset has been used to check the fraudulent transaction and secure it with the help of machine learning algorithms. Out of all the classifiers XGBoost has attained the highest accuracy of 99.21% for the stated dataset.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/CyberneticsCom55287.2022.9865594
Binh Van Duong, Kim Chi T. Phan, Chien Nhu Ha, Phat Cao Tran, Trong-Hop Do
Vietnam has achieved impressive economic growth in the last two decades. It becomes a worth investing country in the area. Consequently, the need of understanding foreign investors from different countries (S. Korea in specific) is an essential issue. Therefore, building an automatic machine translation system with high precision is a necessary solution, especially during the COVID-19 pandemic, where keeping distance is the best way to avoid spreading the virus. As a result, this research presents some experimental results on the TED Talks 2020 dataset for the task Korean - Vietnamese and Vietnamese - Korean machine translation with the purpose of providing an overview of the dataset and a deep learning machine translation model for the problem.
{"title":"A study of machine translation for Vietnamese and Korean on the TED Talks 2020 corpus","authors":"Binh Van Duong, Kim Chi T. Phan, Chien Nhu Ha, Phat Cao Tran, Trong-Hop Do","doi":"10.1109/CyberneticsCom55287.2022.9865594","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865594","url":null,"abstract":"Vietnam has achieved impressive economic growth in the last two decades. It becomes a worth investing country in the area. Consequently, the need of understanding foreign investors from different countries (S. Korea in specific) is an essential issue. Therefore, building an automatic machine translation system with high precision is a necessary solution, especially during the COVID-19 pandemic, where keeping distance is the best way to avoid spreading the virus. As a result, this research presents some experimental results on the TED Talks 2020 dataset for the task Korean - Vietnamese and Vietnamese - Korean machine translation with the purpose of providing an overview of the dataset and a deep learning machine translation model for the problem.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/CyberneticsCom55287.2022.9865639
Istiadi, Emma Budi Sulistiarini, Rudy Joegijantoro, Affi Nizar Suksmawati, Kuncahyo Setyo Nugroho, Ismail Akbar
Humans with weak immune systems are very susceptible to infectious diseases. Infectious diseases can cause the risk of premature death if not handled properly. This research integrates an expert system with a health care system to diagnose and treat infectious diseases. The integration system aims to optimize the database of medical records of patients. The result of the integration system is that physicians can use the medical record data in the health care system as initial instructions for examinations, and expert systems can use the medical record data to acquire new knowledge. Tests on the expert system were carried out using the Certainty Factor (CF) method on 35 medical record data. The test results obtained an accuracy value of 80%, which indicates that the expert system can diagnose the disease quite well.
{"title":"Expert System Integrated with Medical Record for Infectious Diseases using Certainty Factor","authors":"Istiadi, Emma Budi Sulistiarini, Rudy Joegijantoro, Affi Nizar Suksmawati, Kuncahyo Setyo Nugroho, Ismail Akbar","doi":"10.1109/CyberneticsCom55287.2022.9865639","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865639","url":null,"abstract":"Humans with weak immune systems are very susceptible to infectious diseases. Infectious diseases can cause the risk of premature death if not handled properly. This research integrates an expert system with a health care system to diagnose and treat infectious diseases. The integration system aims to optimize the database of medical records of patients. The result of the integration system is that physicians can use the medical record data in the health care system as initial instructions for examinations, and expert systems can use the medical record data to acquire new knowledge. Tests on the expert system were carried out using the Certainty Factor (CF) method on 35 medical record data. The test results obtained an accuracy value of 80%, which indicates that the expert system can diagnose the disease quite well.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/CyberneticsCom55287.2022.9865663
Swardiantara Silalahi, T. Ahmad, H. Studiawan
Data mining techniques in analyzing log data can discover a useful pattern which then is used to infer knowledge. Interesting patterns in log data can help the stakeholder to take action to diagnose a problem or improve the running system. Drone as one loT device, which consists of subsystems working together, also implements a logging mechanism. While a drone is flying, event-related logs are written into specific log files. These files contain precious information in case of incident happens to the drone. Assuming that the integrity of the log files is guaranteed, the investigator can find useful patterns and help conclude the incidents. To this end, this paper studies the sequence mining approach to discover some pre-defined incident-related events. As this is an initial study, the main contribution of this paper is the domain adaptation and modeling of the flight logs into a sequence database. After experimenting, we conclude that the modeling procedure is an essential step in conducting sequence mining. Frequency-oriented techniques are not suitable for small sequence databases, as the found patterns tend to have less critical events. Finally, two potential future directions are elaborated.
{"title":"Drone Flight Logs Sequence Mining","authors":"Swardiantara Silalahi, T. Ahmad, H. Studiawan","doi":"10.1109/CyberneticsCom55287.2022.9865663","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865663","url":null,"abstract":"Data mining techniques in analyzing log data can discover a useful pattern which then is used to infer knowledge. Interesting patterns in log data can help the stakeholder to take action to diagnose a problem or improve the running system. Drone as one loT device, which consists of subsystems working together, also implements a logging mechanism. While a drone is flying, event-related logs are written into specific log files. These files contain precious information in case of incident happens to the drone. Assuming that the integrity of the log files is guaranteed, the investigator can find useful patterns and help conclude the incidents. To this end, this paper studies the sequence mining approach to discover some pre-defined incident-related events. As this is an initial study, the main contribution of this paper is the domain adaptation and modeling of the flight logs into a sequence database. After experimenting, we conclude that the modeling procedure is an essential step in conducting sequence mining. Frequency-oriented techniques are not suitable for small sequence databases, as the found patterns tend to have less critical events. Finally, two potential future directions are elaborated.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/CyberneticsCom55287.2022.9865472
Agus Winarno, Novi Angraini, Muhammad Salmon Hardani, R. Harwahyu, R. F. Sari
Bitcoin is a famously decentralized cryptocurrency. Bitcoin is excellent because it is a digital currency that provides convenience and security in transactions. Transaction security in Bitcoin uses a consensus involving a distributed system, the security of this system generates a hash sequence with a Proof of Work (PoW) mechanism. However, in its implementation, various attacks appear that are used to generate profits from the existing system. Attackers can use various types of methods to get an unfair portion of the mining income. Such attacks are commonly referred to as Mining attacks. Among which the famous is the Selfish Mining attack. In this study, we simulate the effect of changing decision matrix, attacker region, attacker hash rate on selfish miner attacks by using the opensource NS3 platform. The experiment aims to see the effect of using 1%, 10%, and 20% decision matrices with different attacker regions and different attacker hash rates on Bitcoin selfish mining income. The result of this study shows that regional North America and Europe have the advantage in doing selfish mining attacks. This advantage is also supported by increasing the decision matrix from 1%, 10%, 20%. The highest attacker income, when using decision matrix 20% in North America using 16 nodes on 0.3 hash rate with income 129 BTC. For the hash rate, the best result for a selfish mining attack is between 27% to 30% hash rate.
{"title":"Evaluation of Decision Matrix, Hash Rate and Attacker Regions Effects in Bitcoin Network Securities","authors":"Agus Winarno, Novi Angraini, Muhammad Salmon Hardani, R. Harwahyu, R. F. Sari","doi":"10.1109/CyberneticsCom55287.2022.9865472","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865472","url":null,"abstract":"Bitcoin is a famously decentralized cryptocurrency. Bitcoin is excellent because it is a digital currency that provides convenience and security in transactions. Transaction security in Bitcoin uses a consensus involving a distributed system, the security of this system generates a hash sequence with a Proof of Work (PoW) mechanism. However, in its implementation, various attacks appear that are used to generate profits from the existing system. Attackers can use various types of methods to get an unfair portion of the mining income. Such attacks are commonly referred to as Mining attacks. Among which the famous is the Selfish Mining attack. In this study, we simulate the effect of changing decision matrix, attacker region, attacker hash rate on selfish miner attacks by using the opensource NS3 platform. The experiment aims to see the effect of using 1%, 10%, and 20% decision matrices with different attacker regions and different attacker hash rates on Bitcoin selfish mining income. The result of this study shows that regional North America and Europe have the advantage in doing selfish mining attacks. This advantage is also supported by increasing the decision matrix from 1%, 10%, 20%. The highest attacker income, when using decision matrix 20% in North America using 16 nodes on 0.3 hash rate with income 129 BTC. For the hash rate, the best result for a selfish mining attack is between 27% to 30% hash rate.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133633155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}