首页 > 最新文献

2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)最新文献

英文 中文
Fuzzy Logic Control Strategy for Axial Flux Permanent Magnet Synchronous Generator in WHM 1.5KW WHM 1.5KW轴向磁通永磁同步发电机模糊控制策略
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865461
Demas Yangindrajat, H. Guntur
This study presents the uses of Fuzzy control for AFPMSG (Axial Flux Permanent Magnet Synchronous Generator), which it is implemented on a Wheel Hub Motor (WHM) 1.5KW. The use of Fuzzy aims to stabilize the voltage used for charging batteries in electric vehicles. Electric vehicles today have a shortage in mileage. This research optimizes the WHM function for driving and also to charging with AFPMSG Fuzzy control. AFPMSG was made on the WHM stator and magnets on the WHM cover. The type of generator is used without a core on the coil. The generator has been simulated using MATLAB and FEM. The simulation results show a maximum voltage of 24 Volts at a speed of 1000 RPM. The system used for Fuzzy input is the speed and distance of the motor. The resulting output is a voltage. Fuzzy control is used for the stability of the charging system in electric vehicles. The research is presented in the form of simulations and field tests.
本文介绍了模糊控制在轴向磁链永磁同步发电机(AFPMSG)中的应用,并将其应用于1.5KW轮毂电机(WHM)上。使用Fuzzy的目的是稳定用于电动汽车充电电池的电压。如今电动汽车的行驶里程不足。本研究利用AFPMSG模糊控制对车辆行驶和充电的WHM功能进行优化。在WHM定子上制作AFPMSG,在WHM罩上制作磁体。这种类型的发电机在线圈上没有铁芯。利用MATLAB和有限元软件对发电机进行了仿真。仿真结果表明,在转速为1000 RPM时,最大电压为24伏。系统用于模糊输入的是电机的速度和距离。得到的输出是电压。模糊控制用于电动汽车充电系统的稳定性控制。研究以模拟和现场试验的形式进行。
{"title":"Fuzzy Logic Control Strategy for Axial Flux Permanent Magnet Synchronous Generator in WHM 1.5KW","authors":"Demas Yangindrajat, H. Guntur","doi":"10.1109/CyberneticsCom55287.2022.9865461","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865461","url":null,"abstract":"This study presents the uses of Fuzzy control for AFPMSG (Axial Flux Permanent Magnet Synchronous Generator), which it is implemented on a Wheel Hub Motor (WHM) 1.5KW. The use of Fuzzy aims to stabilize the voltage used for charging batteries in electric vehicles. Electric vehicles today have a shortage in mileage. This research optimizes the WHM function for driving and also to charging with AFPMSG Fuzzy control. AFPMSG was made on the WHM stator and magnets on the WHM cover. The type of generator is used without a core on the coil. The generator has been simulated using MATLAB and FEM. The simulation results show a maximum voltage of 24 Volts at a speed of 1000 RPM. The system used for Fuzzy input is the speed and distance of the motor. The resulting output is a voltage. Fuzzy control is used for the stability of the charging system in electric vehicles. The research is presented in the form of simulations and field tests.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114166106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of Support Vector Machine and Neural Network Algorithm in Drone Detection System 支持向量机与神经网络算法在无人机检测系统中的比较
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865628
Risa Farrid Christianti, Hanin Latif Fuadi, M. Afandi, Azhari S.N., Andi Dharmawan
With the increase in the number of drones, it is possible to have the danger of using drones illegally. It is crucial to detect adverse events or conditions so that security operators can obtain that information and situational identification of drones. This paper proposes two methods of classifying acoustic sensor data in a UAV detection system, using Support Vector Machine and Neural Network, that will be compared. This research shows that the accuracy achieved in predicting acoustic sensor data is 82.27% in the SVM method. The accuracy achieved is 90.58% for the NN method under the same input conditions and amount of training data. This comparation needs to do to choose the best accuracy in a public safety environment.
随着无人机数量的增加,可能会出现非法使用无人机的危险。检测不利事件或条件至关重要,这样安全操作员才能获得无人机的信息和态势识别。本文提出了两种基于支持向量机和神经网络的无人机探测系统声传感器数据分类方法,并进行了比较。研究表明,SVM方法对声传感器数据的预测准确率为82.27%。在相同的输入条件和训练数据量下,NN方法的准确率达到90.58%。这种比较需要在一个公共安全的环境中做选择最准确的。
{"title":"Comparison of Support Vector Machine and Neural Network Algorithm in Drone Detection System","authors":"Risa Farrid Christianti, Hanin Latif Fuadi, M. Afandi, Azhari S.N., Andi Dharmawan","doi":"10.1109/CyberneticsCom55287.2022.9865628","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865628","url":null,"abstract":"With the increase in the number of drones, it is possible to have the danger of using drones illegally. It is crucial to detect adverse events or conditions so that security operators can obtain that information and situational identification of drones. This paper proposes two methods of classifying acoustic sensor data in a UAV detection system, using Support Vector Machine and Neural Network, that will be compared. This research shows that the accuracy achieved in predicting acoustic sensor data is 82.27% in the SVM method. The accuracy achieved is 90.58% for the NN method under the same input conditions and amount of training data. This comparation needs to do to choose the best accuracy in a public safety environment.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of machine translation for Vietnamese and Korean on the TED Talks 2020 corpus 2020年TED演讲语料库上越南语和韩语的机器翻译研究
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865594
Binh Van Duong, Kim Chi T. Phan, Chien Nhu Ha, Phat Cao Tran, Trong-Hop Do
Vietnam has achieved impressive economic growth in the last two decades. It becomes a worth investing country in the area. Consequently, the need of understanding foreign investors from different countries (S. Korea in specific) is an essential issue. Therefore, building an automatic machine translation system with high precision is a necessary solution, especially during the COVID-19 pandemic, where keeping distance is the best way to avoid spreading the virus. As a result, this research presents some experimental results on the TED Talks 2020 dataset for the task Korean - Vietnamese and Vietnamese - Korean machine translation with the purpose of providing an overview of the dataset and a deep learning machine translation model for the problem.
越南在过去的二十年里取得了令人印象深刻的经济增长。它成为该地区值得投资的国家。因此,了解不同国家(特别是韩国)的外国投资者是非常重要的问题。因此,建立高精度的自动机器翻译系统是必要的解决方案,特别是在新冠肺炎大流行期间,保持距离是避免病毒传播的最佳方式。因此,本研究在TED Talks 2020数据集上展示了韩语-越南语和越南语-韩语机器翻译任务的一些实验结果,目的是提供数据集的概述和该问题的深度学习机器翻译模型。
{"title":"A study of machine translation for Vietnamese and Korean on the TED Talks 2020 corpus","authors":"Binh Van Duong, Kim Chi T. Phan, Chien Nhu Ha, Phat Cao Tran, Trong-Hop Do","doi":"10.1109/CyberneticsCom55287.2022.9865594","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865594","url":null,"abstract":"Vietnam has achieved impressive economic growth in the last two decades. It becomes a worth investing country in the area. Consequently, the need of understanding foreign investors from different countries (S. Korea in specific) is an essential issue. Therefore, building an automatic machine translation system with high precision is a necessary solution, especially during the COVID-19 pandemic, where keeping distance is the best way to avoid spreading the virus. As a result, this research presents some experimental results on the TED Talks 2020 dataset for the task Korean - Vietnamese and Vietnamese - Korean machine translation with the purpose of providing an overview of the dataset and a deep learning machine translation model for the problem.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card fraud detection system using machine learning technique 信用卡诈骗检测系统采用机器学习技术
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865466
Ayushi Maurya, Arun C. S. Kumar
Over the years, with the development of e-commerce, people are mostly making online transactions, and the risk of getting scammed has also increased. This in turn forces the financial institutions to improve continuously and upgrade their model. Machine Learning techniques were used to detect fraud in credit card transactions, but working with real-time data can be tough for machine learning to handle. Thus, implementation of blockchain techniques with machine learning to improve the efficiency and accuracy of the model. In the proposed model, Ethereum dataset has been used to check the fraudulent transaction and secure it with the help of machine learning algorithms. Out of all the classifiers XGBoost has attained the highest accuracy of 99.21% for the stated dataset.
多年来,随着电子商务的发展,人们大多在网上进行交易,被骗的风险也增加了。这反过来又迫使金融机构不断改进和升级他们的模式。机器学习技术被用于检测信用卡交易中的欺诈行为,但处理实时数据对机器学习来说可能很难处理。因此,通过机器学习实现区块链技术,以提高模型的效率和准确性。在提出的模型中,以太坊数据集被用来检查欺诈性交易,并在机器学习算法的帮助下对其进行保护。在所有分类器中,对于所述数据集,XGBoost达到了99.21%的最高准确率。
{"title":"Credit card fraud detection system using machine learning technique","authors":"Ayushi Maurya, Arun C. S. Kumar","doi":"10.1109/CyberneticsCom55287.2022.9865466","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865466","url":null,"abstract":"Over the years, with the development of e-commerce, people are mostly making online transactions, and the risk of getting scammed has also increased. This in turn forces the financial institutions to improve continuously and upgrade their model. Machine Learning techniques were used to detect fraud in credit card transactions, but working with real-time data can be tough for machine learning to handle. Thus, implementation of blockchain techniques with machine learning to improve the efficiency and accuracy of the model. In the proposed model, Ethereum dataset has been used to check the fraudulent transaction and secure it with the help of machine learning algorithms. Out of all the classifiers XGBoost has attained the highest accuracy of 99.21% for the stated dataset.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of AODV, AODV-ETX and Modified AODV-ETX in VANET using NS3 基于NS3的AODV、AODV- etx和改进型AODV- etx在VANET中的性能比较
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865467
Bayu Ardianto, Hery Sapto Dwi Nurcahyo, Hasan Muftic, R. Harwahyu, R. F. Sari
Vehicular Ad-hoc Networks (VANET) is used by autonomous vehicles as an efficient and reliable external vehicle communication. The routing protocol that has a stable and efficient performance is one that affects the quality of vehicle communication. This research simulates and analyzes the performance of VANET routing protocols, namely Ad-hoc On-demand Distance Vector (AODV), Ad-hoc On-demand Distance Vector-Expected Transmission (AODV-ETX), and Modified AODV-ETX using Network Simulator 3 (NS3). Our experiment shows that AODV has the best throughput performance, AODV-ETX performs the best Overhead and Packet Delivery Ratio, in terms of Modified AODV-ETX shows the best goodput performance compared to the others. Overall, the Modified AODV-ETX with My Route Timeout (MRT) and Active Route Timeout (ART) values 80 seconds provides better performance compared to AODV-ETX.
车辆自组织网络(Vehicular Ad-hoc Networks, VANET)被自动驾驶汽车用作高效可靠的车辆外部通信。性能稳定高效的路由协议是影响车辆通信质量的协议之一。本研究利用网络模拟器3 (NS3)对VANET路由协议,即Ad-hoc按需距离矢量(AODV)、Ad-hoc按需距离矢量期望传输(AODV- etx)和改进的AODV- etx的性能进行了仿真和分析。我们的实验表明,AODV具有最佳的吞吐量性能,AODV- etx具有最佳的开销和包投递率,在改进的AODV- etx方面表现出最好的良好性能。总的来说,与AODV-ETX相比,修改后的AODV-ETX具有80秒的我的路由超时(MRT)和活动路由超时(ART)值,提供了更好的性能。
{"title":"Performance Comparison of AODV, AODV-ETX and Modified AODV-ETX in VANET using NS3","authors":"Bayu Ardianto, Hery Sapto Dwi Nurcahyo, Hasan Muftic, R. Harwahyu, R. F. Sari","doi":"10.1109/CyberneticsCom55287.2022.9865467","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865467","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET) is used by autonomous vehicles as an efficient and reliable external vehicle communication. The routing protocol that has a stable and efficient performance is one that affects the quality of vehicle communication. This research simulates and analyzes the performance of VANET routing protocols, namely Ad-hoc On-demand Distance Vector (AODV), Ad-hoc On-demand Distance Vector-Expected Transmission (AODV-ETX), and Modified AODV-ETX using Network Simulator 3 (NS3). Our experiment shows that AODV has the best throughput performance, AODV-ETX performs the best Overhead and Packet Delivery Ratio, in terms of Modified AODV-ETX shows the best goodput performance compared to the others. Overall, the Modified AODV-ETX with My Route Timeout (MRT) and Active Route Timeout (ART) values 80 seconds provides better performance compared to AODV-ETX.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114579852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gas Turbine Anomaly Prediction using Hybrid Convolutional Neural Network with LSTM in Power Plant 基于混合卷积神经网络和LSTM的电厂燃气轮机异常预测
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865487
F. Zhultriza, Aries Subiantoro
The fault and anomaly of real-time performance gas turbine data are difficult to predict because of the complexity of feature data and dynamically time series. In the case of real performance gas turbine, the complexity of the physical model is hard to interpret. In deep learning, the Convolutional Neural Network (CNN) is used to perform the identification of data with great feature extraction. But, since CNN is poorly accurate for time-series data, the prediction for gas turbine anomaly could be hardly optimized. Another neural network method that can interact with time-series data is Recurrent Neural Network (RNN), especially, the Long Short-Term Memory (LSTM) that can deal with the vanishing gradient problem in traditional RNN. This paper aims to develop hybrid CNN-LSTM as a proposed method to predict gas turbine anomaly more accurately than single CNN. The accuracy of the single CNN method is 81.33%. With the addition of LSTM in the same CNN architecture, the accuracy of hybrid CNN-LSTM is 91.79%. The accuracy of model data is significantly increased by adding LSTM layer after the convolutional and pooling layer.
由于特征数据和动态时间序列的复杂性,燃气轮机实时性能数据的故障和异常难以预测。在真实性能燃气轮机的情况下,物理模型的复杂性很难解释。在深度学习中,使用卷积神经网络(CNN)对具有大量特征提取的数据进行识别。但是,由于CNN对时间序列数据的准确性较差,对燃气轮机异常的预测很难优化。另一种可以与时间序列数据交互的神经网络方法是递归神经网络(RNN),特别是传统RNN中可以解决梯度消失问题的长短期记忆(LSTM)。本文旨在发展混合CNN- lstm作为一种比单一CNN更准确预测燃气轮机异常的方法。单一CNN方法的准确率为81.33%。在相同的CNN架构下加入LSTM,混合CNN-LSTM的准确率为91.79%。在卷积层和池化层之后加入LSTM层,可以显著提高模型数据的精度。
{"title":"Gas Turbine Anomaly Prediction using Hybrid Convolutional Neural Network with LSTM in Power Plant","authors":"F. Zhultriza, Aries Subiantoro","doi":"10.1109/CyberneticsCom55287.2022.9865487","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865487","url":null,"abstract":"The fault and anomaly of real-time performance gas turbine data are difficult to predict because of the complexity of feature data and dynamically time series. In the case of real performance gas turbine, the complexity of the physical model is hard to interpret. In deep learning, the Convolutional Neural Network (CNN) is used to perform the identification of data with great feature extraction. But, since CNN is poorly accurate for time-series data, the prediction for gas turbine anomaly could be hardly optimized. Another neural network method that can interact with time-series data is Recurrent Neural Network (RNN), especially, the Long Short-Term Memory (LSTM) that can deal with the vanishing gradient problem in traditional RNN. This paper aims to develop hybrid CNN-LSTM as a proposed method to predict gas turbine anomaly more accurately than single CNN. The accuracy of the single CNN method is 81.33%. With the addition of LSTM in the same CNN architecture, the accuracy of hybrid CNN-LSTM is 91.79%. The accuracy of model data is significantly increased by adding LSTM layer after the convolutional and pooling layer.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114867931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing TehNusa Mobile Based Application Using Design Sprint Method 利用设计冲刺方法设计TehNusa移动应用程序
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865534
Dinda Maylan Setianti, Daffa Raihan Zaki, Gita Fadila Fitriana, Aditya Ammar Pradana
Indonesia is a country where most of the population work in the agricultural and plantation sectors. Both sectors are significant for the economy of Indonesia because it contributes to the increase in Gross Domestic Product (GDP). Such as the tea plantation sub-sector, which is one of the export commodities in Indonesia. However, several problems occur to the tea farmers in Indonesia. These problems influence decreasing in tea quality and farmers' welfare in Indonesia. For that reason, TehNusa is created to help solve the issues. TehNusa can be utilized to buy and sell harvested or processed tea. Another hand, TehNusa also has other functions to develop the quality and ability of the community in caring for and managing processed tea. Another side, BUMDes will play a role by managing and developing village prospects and tea farmers to minimize gaps. The design of the TehNusa application is created using the design sprint methodology and for the design validation, we're using the system usability scale methodology. The design of the TehNusa application can be made within 40 working hours, and the test result of design validation gets a conclusion of 81 points or equivalent to grade B. The TehNusa application is rated by users as being able to help make it easier to solve problems. In addition, further research needs to be carried out to determine the implementation of making applications and building business cooperation with BUMDes in Indonesian villages that have skilled farmers and have the potential to become processed tea producers.
印度尼西亚是一个大多数人口在农业和种植园部门工作的国家。这两个部门对印度尼西亚的经济都很重要,因为它们对国内生产总值(GDP)的增长做出了贡献。例如茶叶种植分部门,这是印度尼西亚的出口商品之一。然而,印度尼西亚的茶农遇到了几个问题。这些问题影响了印尼茶叶质量的下降和农民的福利。因此,TehNusa的创建是为了帮助解决这些问题。TehNusa可以用来买卖收获或加工过的茶叶。另一方面,TehNusa也有其他功能,以提高社区照顾和管理加工茶的质量和能力。另一方面,BUMDes将通过管理和发展村庄前景和茶农来发挥作用,以尽量减少差距。TehNusa应用程序的设计是使用设计冲刺方法创建的,对于设计验证,我们使用系统可用性规模方法。TehNusa应用程序的设计可以在40个工作小时内完成,设计验证的测试结果得到81分或相当于b级的结论。TehNusa应用程序被用户评为能够帮助解决问题变得更容易。此外,还需要进行进一步的研究,以确定在拥有熟练农民和有潜力成为加工茶生产者的印度尼西亚村庄中与BUMDes进行申请和建立商业合作的实施情况。
{"title":"Designing TehNusa Mobile Based Application Using Design Sprint Method","authors":"Dinda Maylan Setianti, Daffa Raihan Zaki, Gita Fadila Fitriana, Aditya Ammar Pradana","doi":"10.1109/CyberneticsCom55287.2022.9865534","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865534","url":null,"abstract":"Indonesia is a country where most of the population work in the agricultural and plantation sectors. Both sectors are significant for the economy of Indonesia because it contributes to the increase in Gross Domestic Product (GDP). Such as the tea plantation sub-sector, which is one of the export commodities in Indonesia. However, several problems occur to the tea farmers in Indonesia. These problems influence decreasing in tea quality and farmers' welfare in Indonesia. For that reason, TehNusa is created to help solve the issues. TehNusa can be utilized to buy and sell harvested or processed tea. Another hand, TehNusa also has other functions to develop the quality and ability of the community in caring for and managing processed tea. Another side, BUMDes will play a role by managing and developing village prospects and tea farmers to minimize gaps. The design of the TehNusa application is created using the design sprint methodology and for the design validation, we're using the system usability scale methodology. The design of the TehNusa application can be made within 40 working hours, and the test result of design validation gets a conclusion of 81 points or equivalent to grade B. The TehNusa application is rated by users as being able to help make it easier to solve problems. In addition, further research needs to be carried out to determine the implementation of making applications and building business cooperation with BUMDes in Indonesian villages that have skilled farmers and have the potential to become processed tea producers.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drone Flight Logs Sequence Mining 无人机飞行日志序列挖掘
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865663
Swardiantara Silalahi, T. Ahmad, H. Studiawan
Data mining techniques in analyzing log data can discover a useful pattern which then is used to infer knowledge. Interesting patterns in log data can help the stakeholder to take action to diagnose a problem or improve the running system. Drone as one loT device, which consists of subsystems working together, also implements a logging mechanism. While a drone is flying, event-related logs are written into specific log files. These files contain precious information in case of incident happens to the drone. Assuming that the integrity of the log files is guaranteed, the investigator can find useful patterns and help conclude the incidents. To this end, this paper studies the sequence mining approach to discover some pre-defined incident-related events. As this is an initial study, the main contribution of this paper is the domain adaptation and modeling of the flight logs into a sequence database. After experimenting, we conclude that the modeling procedure is an essential step in conducting sequence mining. Frequency-oriented techniques are not suitable for small sequence databases, as the found patterns tend to have less critical events. Finally, two potential future directions are elaborated.
数据挖掘技术在分析日志数据时可以发现有用的模式,然后利用该模式进行知识推断。日志数据中有趣的模式可以帮助涉众采取行动来诊断问题或改进正在运行的系统。无人机作为一个loT设备,由协同工作的子系统组成,还实现了日志记录机制。当无人机飞行时,与事件相关的日志被写入特定的日志文件。这些文件包含了宝贵的信息,以防无人机发生意外。假设日志文件的完整性得到了保证,调查人员可以找到有用的模式并帮助总结事件。为此,本文研究了序列挖掘方法来发现一些预定义的事件相关事件。由于这是一项初步研究,本文的主要贡献是将飞行日志的域适应和建模成序列数据库。经过实验,我们得出结论,建模过程是进行序列挖掘的重要步骤。面向频率的技术不适合小型序列数据库,因为发现的模式往往具有较少的关键事件。最后,阐述了两个潜在的未来发展方向。
{"title":"Drone Flight Logs Sequence Mining","authors":"Swardiantara Silalahi, T. Ahmad, H. Studiawan","doi":"10.1109/CyberneticsCom55287.2022.9865663","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865663","url":null,"abstract":"Data mining techniques in analyzing log data can discover a useful pattern which then is used to infer knowledge. Interesting patterns in log data can help the stakeholder to take action to diagnose a problem or improve the running system. Drone as one loT device, which consists of subsystems working together, also implements a logging mechanism. While a drone is flying, event-related logs are written into specific log files. These files contain precious information in case of incident happens to the drone. Assuming that the integrity of the log files is guaranteed, the investigator can find useful patterns and help conclude the incidents. To this end, this paper studies the sequence mining approach to discover some pre-defined incident-related events. As this is an initial study, the main contribution of this paper is the domain adaptation and modeling of the flight logs into a sequence database. After experimenting, we conclude that the modeling procedure is an essential step in conducting sequence mining. Frequency-oriented techniques are not suitable for small sequence databases, as the found patterns tend to have less critical events. Finally, two potential future directions are elaborated.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Algorithms and Datasets for Modern IDS Design 现代IDS设计的机器学习算法和数据集
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865255
Inam Abdullah Abdulmajeed, I. Husien
Intrusion Detection System (IDS) is a critical component in cyber security to capture and analyze the traffic and then differentiate between benignant and malicious traffic indicating the attack type. This review is aimed to investigate various Machine Learning (ML) algorithms utilized in IDS design; with particular focus on dataset used. The parameters used to compare the performance of each algorithm have been studied also. Dataset choice is exceptionally critical to guarantee that it is matching the IDS requirements. The dataset structure can influence in a great manner the selection of the of ML algorithm. Hence, metric will provide a numerical relation between ML algorithm against specific dataset. This review concluded that researches are liberating themselves from Supervised Learning and moving toward Clustering and other algorithms, which gives the hope that IDS in the future will be able to detect more unknown and zero-day attacks, also the percentage of utilizing hybrid algorithms has increased dramatically. On the other hand, recent ML researchers are depending more and more on modern datasets which contributes as a significant consideration in IDS design although some research articles are still seeing the KDDCup99 and its reduced variant as principal training dataset of IDSs, despite the fact that it is more than 20 years old, while cyber-threats keep rising together with adapting new technologies in the cyber world like cloud computing, IoT, and IPv6.
入侵检测系统(IDS)是网络安全的重要组成部分,它可以捕获和分析流量,从而区分良性和恶意的流量,指示攻击类型。本综述旨在研究IDS设计中使用的各种机器学习(ML)算法;特别关注使用的数据集。本文还研究了用于比较各算法性能的参数。数据集的选择是非常关键的,以确保它符合IDS需求。数据集结构对机器学习算法的选择有很大的影响。因此,度量将提供ML算法与特定数据集之间的数值关系。这篇综述的结论是,研究正在从监督学习中解放出来,转向聚类和其他算法,这给了IDS在未来能够检测到更多未知和零日攻击的希望,同时利用混合算法的比例也大大增加。另一方面,最近的机器学习研究人员越来越依赖于现代数据集,这在IDS设计中是一个重要的考虑因素,尽管一些研究文章仍然将KDDCup99及其简化版本视为IDS的主要训练数据集,尽管它已经有20多年的历史了,而网络威胁随着云计算、物联网和IPv6等网络世界中的新技术的适应而不断上升。
{"title":"Machine Learning Algorithms and Datasets for Modern IDS Design","authors":"Inam Abdullah Abdulmajeed, I. Husien","doi":"10.1109/CyberneticsCom55287.2022.9865255","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865255","url":null,"abstract":"Intrusion Detection System (IDS) is a critical component in cyber security to capture and analyze the traffic and then differentiate between benignant and malicious traffic indicating the attack type. This review is aimed to investigate various Machine Learning (ML) algorithms utilized in IDS design; with particular focus on dataset used. The parameters used to compare the performance of each algorithm have been studied also. Dataset choice is exceptionally critical to guarantee that it is matching the IDS requirements. The dataset structure can influence in a great manner the selection of the of ML algorithm. Hence, metric will provide a numerical relation between ML algorithm against specific dataset. This review concluded that researches are liberating themselves from Supervised Learning and moving toward Clustering and other algorithms, which gives the hope that IDS in the future will be able to detect more unknown and zero-day attacks, also the percentage of utilizing hybrid algorithms has increased dramatically. On the other hand, recent ML researchers are depending more and more on modern datasets which contributes as a significant consideration in IDS design although some research articles are still seeing the KDDCup99 and its reduced variant as principal training dataset of IDSs, despite the fact that it is more than 20 years old, while cyber-threats keep rising together with adapting new technologies in the cyber world like cloud computing, IoT, and IPv6.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COVID-19 Disease Classification by Cough Records Analysis using Machine Learning 基于机器学习的咳嗽记录分析的COVID-19疾病分类
Pub Date : 2022-06-16 DOI: 10.1109/CyberneticsCom55287.2022.9865610
Kien Trang, Hoang An Nguyen, Long TonThat, Hung Ngoc Do, B. Vuong
The rapid spreading rate of the Coronavirus disease 2019 (COVID-19) has resulted in more than 6.2 million deceased cases. Furthermore, the patients of the latest Omicron variation carry light to almost no symptoms of the disease themselves. Thus, the requirement for a new diagnosis method besides Reverse Transcription-Polymerase Chain Reaction (RT-PCR) becomes the most important step to successfully detect infected cases. In this research, the application of the KNN, Ensemble and SincNet models are implemented as the main models for classification diagnosis based on cough sound records of infected patients. After pre-processing steps for removing silence ranges in the audio scripts, the cough sounds are augmented, subsequently separated into single cough samples, then generated 3 testing scenarios for dealing with the imbalanced problem between the sample classes. Afterward, MelFrequency information and MelSprectrogram are extracted as main features for analysis in order to distinguish patients with COVID-19 disease and healthy cases. The AICV115M dataset consisting of two classes COVID-19 and NonCOVID-19 is implemented for performance evaluation. The recorded highest accuracy on the models KNN, Ensemble and SincNet are 92.49%, 90.1% and 85.15%, respectively.
2019冠状病毒病(COVID-19)的快速传播速度已导致620多万例死亡病例。此外,最新的基因组变异患者本身几乎没有任何疾病症状。因此,除了逆转录聚合酶链反应(RT-PCR)之外,需要一种新的诊断方法成为成功检测感染病例的最重要步骤。在本研究中,应用KNN、Ensemble和SincNet模型作为基于感染患者咳嗽声记录的分类诊断的主要模型。在去除音频脚本中沉默范围的预处理步骤后,对咳嗽声音进行增强,随后将咳嗽声音分离为单个咳嗽样本,然后生成3个测试场景来处理样本类别之间的不平衡问题。然后,提取MelFrequency信息和MelSprectrogram作为主要特征进行分析,以区分COVID-19疾病患者和健康病例。采用由COVID-19和non - covid两个类组成的AICV115M数据集进行性能评估。在KNN、Ensemble和SincNet模型上记录的最高准确率分别为92.49%、90.1%和85.15%。
{"title":"COVID-19 Disease Classification by Cough Records Analysis using Machine Learning","authors":"Kien Trang, Hoang An Nguyen, Long TonThat, Hung Ngoc Do, B. Vuong","doi":"10.1109/CyberneticsCom55287.2022.9865610","DOIUrl":"https://doi.org/10.1109/CyberneticsCom55287.2022.9865610","url":null,"abstract":"The rapid spreading rate of the Coronavirus disease 2019 (COVID-19) has resulted in more than 6.2 million deceased cases. Furthermore, the patients of the latest Omicron variation carry light to almost no symptoms of the disease themselves. Thus, the requirement for a new diagnosis method besides Reverse Transcription-Polymerase Chain Reaction (RT-PCR) becomes the most important step to successfully detect infected cases. In this research, the application of the KNN, Ensemble and SincNet models are implemented as the main models for classification diagnosis based on cough sound records of infected patients. After pre-processing steps for removing silence ranges in the audio scripts, the cough sounds are augmented, subsequently separated into single cough samples, then generated 3 testing scenarios for dealing with the imbalanced problem between the sample classes. Afterward, MelFrequency information and MelSprectrogram are extracted as main features for analysis in order to distinguish patients with COVID-19 disease and healthy cases. The AICV115M dataset consisting of two classes COVID-19 and NonCOVID-19 is implemented for performance evaluation. The recorded highest accuracy on the models KNN, Ensemble and SincNet are 92.49%, 90.1% and 85.15%, respectively.","PeriodicalId":178279,"journal":{"name":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1