首页 > 最新文献

2022 International Conference on Connected Systems & Intelligence (CSI)最新文献

英文 中文
Proposed SCC Metric: Criticality Measure in modeling scheduled outage 建议的SCC度量:计划停机建模中的临界度量
Pub Date : 2022-08-31 DOI: 10.1109/csi54720.2022.9924137
Swati Goel
A novel procedure to compute service criticality level in a safety and business critical systems is presented. The presented “Service Composability Count (SCC)” procedure can be used to schedule the outage of services, according to their criticality level. This SCC plays an important role in modelling planned outage, as continuous availability of some critical services is highly desirable in service-based systems (SBS). This paper focuses on accurately scheduling the outage on the basis of service criticality. Results indicate that highly composable services are critical, whereas atomic services are very less critical. That means, while scheduling the outage of services for maintenance purposes -Atomic services should be scheduled first while composable services should be scheduled at last.
提出了一种计算安全和业务关键系统服务临界水平的新方法。所提出的“服务可组合性计数(Service Composability Count, SCC)”过程可用于根据服务的临界级别安排服务的中断。由于在基于服务的系统(SBS)中非常需要某些关键服务的持续可用性,因此该SCC在建模计划中断中起着重要作用。本文主要研究基于服务临界性的准确停机调度问题。结果表明,高度可组合的服务至关重要,而原子服务则不那么重要。这意味着,在为维护目的安排服务中断时,应该首先安排原子服务,而最后安排可组合服务。
{"title":"Proposed SCC Metric: Criticality Measure in modeling scheduled outage","authors":"Swati Goel","doi":"10.1109/csi54720.2022.9924137","DOIUrl":"https://doi.org/10.1109/csi54720.2022.9924137","url":null,"abstract":"A novel procedure to compute service criticality level in a safety and business critical systems is presented. The presented “Service Composability Count (SCC)” procedure can be used to schedule the outage of services, according to their criticality level. This SCC plays an important role in modelling planned outage, as continuous availability of some critical services is highly desirable in service-based systems (SBS). This paper focuses on accurately scheduling the outage on the basis of service criticality. Results indicate that highly composable services are critical, whereas atomic services are very less critical. That means, while scheduling the outage of services for maintenance purposes -Atomic services should be scheduled first while composable services should be scheduled at last.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115867294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Knowledge Graph Approach towards Re-structuring of Scientific Articles 面向科技文章重构的知识图谱方法
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923954
Nikhitha Mani, Sandhya Harikumar
With expedition of huge number of research articles published in each domain, retrieval of relevant articles based on researcher's interest and requirement have become challenging. Further, there are circumstances where a researcher may not get the specific information sought after, regardless of whether it is there in the document collection. This is since the article in database is structured only based on title and citation data while the conceptual information and algorithms described inside an article are disregarded. In this work, we propose a useful methodology for re-structuring documents in the database by considering the document as a whole and representing the keywords and key-phrases extracted from the article data using Knowledge Graphs. Clustering of nodes of graph segregate articles into different domains and sub-domains. Knowledge graph is further explored to identify most important documents using modularity and then the documents are sorted based on relevance. Thus, proper structuring of the documents helps the researchers to recognize applicable content from a large database in short span of time since database associated with the query system is improvised. This technique is beneficial to all the researchers who are trying to resolve a problem by identifying apt documents for information need.
随着各个领域发表的研究论文数量的激增,根据研究者的兴趣和需求来检索相关的文章已经成为一个挑战。此外,在某些情况下,研究人员可能无法获得所寻求的特定信息,无论它是否存在于文件集合中。这是因为数据库中的文章仅基于标题和引文数据进行结构化,而忽略了文章中描述的概念信息和算法。在这项工作中,我们提出了一种有用的方法来重构数据库中的文档,将文档视为一个整体,并使用知识图表示从文章数据中提取的关键字和关键短语。图的节点聚类将文章分离到不同的域和子域。进一步探索知识图谱,利用模块化的方法识别出最重要的文档,然后根据相关性对文档进行排序。因此,适当的文档结构有助于研究人员在短时间内从大型数据库中识别出适用的内容,因为与查询系统相关联的数据库是临时创建的。该技术对所有试图通过识别适合信息需求的文档来解决问题的研究人员都是有益的。
{"title":"A Knowledge Graph Approach towards Re-structuring of Scientific Articles","authors":"Nikhitha Mani, Sandhya Harikumar","doi":"10.1109/CSI54720.2022.9923954","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923954","url":null,"abstract":"With expedition of huge number of research articles published in each domain, retrieval of relevant articles based on researcher's interest and requirement have become challenging. Further, there are circumstances where a researcher may not get the specific information sought after, regardless of whether it is there in the document collection. This is since the article in database is structured only based on title and citation data while the conceptual information and algorithms described inside an article are disregarded. In this work, we propose a useful methodology for re-structuring documents in the database by considering the document as a whole and representing the keywords and key-phrases extracted from the article data using Knowledge Graphs. Clustering of nodes of graph segregate articles into different domains and sub-domains. Knowledge graph is further explored to identify most important documents using modularity and then the documents are sorted based on relevance. Thus, proper structuring of the documents helps the researchers to recognize applicable content from a large database in short span of time since database associated with the query system is improvised. This technique is beneficial to all the researchers who are trying to resolve a problem by identifying apt documents for information need.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123108244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Challenges Prospective Measures In The Current Status of Internet of Things (IoT) 物联网(IoT)现状下的安全挑战与前瞻性措施
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923984
Ranjith J., V. M
This paper provides a high-level review and evaluation of the present situation regarding IoT Securities. An Internet of Things design seeks to connect everyone with anything they want, whenever they want it. The perception layer, network layer, the application layer is the most important three layers which mainly make the Internet of Things. To achieve a stable IoT reality, a range of safety precautions must be imposed at each tier. The only way to assure the future of the IoT infrastructure is to address and resolve the security issues that it has. Many researchers have attempted to address the security concerns specific to IoT layers and devices by applying suitable measures. This paper provides a top level view of safety ideas, technology and security problems, possible remedies, and the IoT's future directions for securing and also in this paper, a depth evaluation of the safety associated demanding situations and raw sources of danger with inside the IoT programs have been showcased. Latter discussion on the safety issue, diverse rising and present technology centered for attaining an excessive diploma of agree with inside the IoT programs are discussed.
本文对物联网证券的现状进行了高层次的回顾和评估。物联网设计旨在将每个人与他们想要的任何东西联系起来,无论他们何时想要。感知层、网络层、应用层是构成物联网最重要的三层。为了实现稳定的物联网现实,必须在每一层实施一系列安全预防措施。确保物联网基础设施未来的唯一方法是解决和解决其存在的安全问题。许多研究人员试图通过应用适当的措施来解决物联网层和设备特有的安全问题。本文提供了安全思想、技术和安全问题、可能的补救措施以及物联网未来的安全方向的顶层视图,并且在本文中,还展示了物联网程序内部与安全相关的要求情况和原始危险源的深度评估。随后讨论了安全问题,各种新兴技术和现有技术,这些技术以在物联网项目中获得更多的认可为中心。
{"title":"Security Challenges Prospective Measures In The Current Status of Internet of Things (IoT)","authors":"Ranjith J., V. M","doi":"10.1109/CSI54720.2022.9923984","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923984","url":null,"abstract":"This paper provides a high-level review and evaluation of the present situation regarding IoT Securities. An Internet of Things design seeks to connect everyone with anything they want, whenever they want it. The perception layer, network layer, the application layer is the most important three layers which mainly make the Internet of Things. To achieve a stable IoT reality, a range of safety precautions must be imposed at each tier. The only way to assure the future of the IoT infrastructure is to address and resolve the security issues that it has. Many researchers have attempted to address the security concerns specific to IoT layers and devices by applying suitable measures. This paper provides a top level view of safety ideas, technology and security problems, possible remedies, and the IoT's future directions for securing and also in this paper, a depth evaluation of the safety associated demanding situations and raw sources of danger with inside the IoT programs have been showcased. Latter discussion on the safety issue, diverse rising and present technology centered for attaining an excessive diploma of agree with inside the IoT programs are discussed.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126796388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indian Text to Speech Systems: A Short Survey 印度文本到语音系统:一个简短的调查
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9924085
Jayashree Nair, Akhila Krishnan, Vrinda S
Speech and spoken words have always played a key role in everyday life. Speech synthesis is a means of artificially synthesizing speech, whereas text-to-speech (TTS) is a technology that converts written text in a human language into an analogous spoken waveform [speech form].The written form is represented by the text, a sequence of characters, whereas the verbal form is represented by the speech. TTS synthesizers are computer-based systems that read text out loud. The TTS system is divided into two phases: text processing and speech creation. Despite the availability of several TTS systems in various languages, Indian languages continue to lag behind in terms of producing high-quality speech. Acceptability and intelligibility are used to rate the quality of speech. The main objective of this paper is to perform a study on available text-to-speech technologies in Indian languages.
演讲和口语在日常生活中一直扮演着关键的角色。语音合成是一种人工合成语音的手段,而文本到语音(TTS)是一种将人类语言中的书面文本转换为类似的口头波形[语音形式]的技术。书面形式由文本(一串字符)表示,而口头形式由言语表示。TTS合成器是基于计算机的系统,可以大声朗读文本。TTS系统分为两个阶段:文本处理和语音生成。尽管有几种不同语言的TTS系统,但印度语言在产生高质量语音方面仍然落后。可接受性和可理解性是用来评价语音质量的。本文的主要目的是对印度语言中可用的文本到语音技术进行研究。
{"title":"Indian Text to Speech Systems: A Short Survey","authors":"Jayashree Nair, Akhila Krishnan, Vrinda S","doi":"10.1109/CSI54720.2022.9924085","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9924085","url":null,"abstract":"Speech and spoken words have always played a key role in everyday life. Speech synthesis is a means of artificially synthesizing speech, whereas text-to-speech (TTS) is a technology that converts written text in a human language into an analogous spoken waveform [speech form].The written form is represented by the text, a sequence of characters, whereas the verbal form is represented by the speech. TTS synthesizers are computer-based systems that read text out loud. The TTS system is divided into two phases: text processing and speech creation. Despite the availability of several TTS systems in various languages, Indian languages continue to lag behind in terms of producing high-quality speech. Acceptability and intelligibility are used to rate the quality of speech. The main objective of this paper is to perform a study on available text-to-speech technologies in Indian languages.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127323823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Islamophobic Tweet Detection using Transfer Learning 使用迁移学习的伊斯兰恐惧症推文检测
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923957
Mohd. Belal, Ghufran Ullah, Abdullah Ahmad Khan
Segregating Islamophobic hate speech from other instances of offensive language is a serious hurdle for automatic hate-speech detection on social media platforms such as Twitter. Because lexical detection methods classify all messages containing particular terms like hate speech, previous work using supervised learning has failed to differentiate between these categories. This task is complex due to the level of difficulty in natural language constructs. We have worked on a transfer learning approach using Universal Language Model Fine-tuning (ULMFIT), an efficient method that can be applied to classification tasks. Our method gave more than 80 percent accuracy and the confusion matrix thus formed was successfully able to classify those datasets proportionally into each block. The use of Deep learning in text classification has been underutilized. This method will contribute to solving the spread of Islamophobia which hasn't been taken into consideration when taking action against online hate
在Twitter等社交媒体平台上,将仇视伊斯兰教的仇恨言论与其他攻击性语言区分开来,是自动检测仇恨言论的一个严重障碍。由于词汇检测方法对包含仇恨言论等特定术语的所有信息进行分类,因此之前使用监督学习的工作未能区分这些类别。由于自然语言结构的难度,这项任务很复杂。我们研究了一种使用通用语言模型微调(ULMFIT)的迁移学习方法,这是一种可以应用于分类任务的有效方法。我们的方法给出了超过80%的准确率,并且由此形成的混淆矩阵能够成功地将这些数据集按比例分类到每个块中。深度学习在文本分类中的应用尚未得到充分利用。这种方法将有助于解决伊斯兰恐惧症的蔓延,而在采取行动打击网络仇恨时,这一问题并未被考虑在内
{"title":"Islamophobic Tweet Detection using Transfer Learning","authors":"Mohd. Belal, Ghufran Ullah, Abdullah Ahmad Khan","doi":"10.1109/CSI54720.2022.9923957","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923957","url":null,"abstract":"Segregating Islamophobic hate speech from other instances of offensive language is a serious hurdle for automatic hate-speech detection on social media platforms such as Twitter. Because lexical detection methods classify all messages containing particular terms like hate speech, previous work using supervised learning has failed to differentiate between these categories. This task is complex due to the level of difficulty in natural language constructs. We have worked on a transfer learning approach using Universal Language Model Fine-tuning (ULMFIT), an efficient method that can be applied to classification tasks. Our method gave more than 80 percent accuracy and the confusion matrix thus formed was successfully able to classify those datasets proportionally into each block. The use of Deep learning in text classification has been underutilized. This method will contribute to solving the spread of Islamophobia which hasn't been taken into consideration when taking action against online hate","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced edge offloading using Reinforcement learning 使用强化学习增强边缘卸载
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9924023
Abhishek Jain, Neena Goveas
Internet of Things (IoT) based solutions requiring real time results from intensive computation tasks or having large scale data analysis have traditionally been designed with offloading of the work to cloud infrastructure. This has been found to be not an ideal solution due to several issues related to network uncertainties, cost of cloud usage etc. This is especially true for systems with both hard time constraints and large amount of data. Edge computing, with its hierarchical configuration has been proposed to solve these issues. This has led to researchers proposing several algorithms to optimise offloading of computation to the layers of this hierarchy. In this work we propose the use of an actor-critic based reinforcement learning mechanism to solve the offloading planning for a general hierarchical system with multiple end nodes and multiple edge servers. Our simulation based results shows that the proposed method improves the performance of the system as compared to the existing benchmark offloading policies.
传统上,基于物联网(IoT)的解决方案需要从密集的计算任务或大规模数据分析中获得实时结果,并将工作卸载到云基础设施中。由于与网络不确定性、云使用成本等相关的几个问题,这已被发现不是一个理想的解决方案。这对于既有硬性时间限制又有大量数据的系统尤其如此。为了解决这些问题,人们提出了边缘计算的分层结构。这导致研究人员提出了几种算法来优化将计算卸载到这个层次结构的各个层。在这项工作中,我们提出使用基于actor-critic的强化学习机制来解决具有多个终端节点和多个边缘服务器的通用分层系统的卸载规划。仿真结果表明,与现有的基准卸载策略相比,所提出的方法提高了系统的性能。
{"title":"Enhanced edge offloading using Reinforcement learning","authors":"Abhishek Jain, Neena Goveas","doi":"10.1109/CSI54720.2022.9924023","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9924023","url":null,"abstract":"Internet of Things (IoT) based solutions requiring real time results from intensive computation tasks or having large scale data analysis have traditionally been designed with offloading of the work to cloud infrastructure. This has been found to be not an ideal solution due to several issues related to network uncertainties, cost of cloud usage etc. This is especially true for systems with both hard time constraints and large amount of data. Edge computing, with its hierarchical configuration has been proposed to solve these issues. This has led to researchers proposing several algorithms to optimise offloading of computation to the layers of this hierarchy. In this work we propose the use of an actor-critic based reinforcement learning mechanism to solve the offloading planning for a general hierarchical system with multiple end nodes and multiple edge servers. Our simulation based results shows that the proposed method improves the performance of the system as compared to the existing benchmark offloading policies.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN and Autoencoders based Hybrid Deep Learning Model for Crop Disease Detection 基于CNN和自编码器的作物病害检测混合深度学习模型
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923983
Aashish, Aditya Thakkar, Shubham Yadav, Sandeep Saini, K. Lata
Indian agriculture is quite diverse and plays a vital role in the country's economic growth. The tools and techniques used in agriculture are no more primitive. With the gradual evolution of the population, this sector is under severe pressure to produce at high efficiency. One of the significant factors in improving crop harvest is the timely detection of crop diseases. The farmers use scouting to monitor their crops, which requires extensive labor and is time-consuming. Image processing-based disease identification makes the process faster and more accurate. Recently, deep learning techniques have been deployed for automatic plant disease identification. Researchers have used Convolutional Neural Networks (CNN) to predict the type of diseases in different crops accurately. Considering the advantages of autoencoders and CNN, we have proposed and developed a hybrid deep learning model based on CNN and Autoencoders to detect multiple plant diseases. The proposed architecture is fine-tuned to detect diseases of numerous crops. The proposed model provides higher accuracy when compared with similar systems. We have tested our model using the Plant village dataset containing almost 15 different types of crops.
印度的农业相当多样化,在该国的经济增长中起着至关重要的作用。农业中使用的工具和技术也不再原始。随着人口的逐渐演变,该部门面临着高效生产的巨大压力。作物病害的及时发现是提高作物产量的重要因素之一。农民们用侦察来监视他们的庄稼,这需要大量的劳动,而且很耗时。基于图像处理的疾病识别使过程更快、更准确。近年来,深度学习技术已被应用于植物病害的自动识别。研究人员使用卷积神经网络(CNN)来准确预测不同作物的疾病类型。考虑到自编码器和CNN的优势,我们提出并开发了一种基于CNN和自编码器的混合深度学习模型来检测多种植物病害。所提出的结构经过微调,可以检测多种作物的病害。与同类系统相比,该模型具有更高的精度。我们使用包含近15种不同类型作物的Plant village数据集测试了我们的模型。
{"title":"CNN and Autoencoders based Hybrid Deep Learning Model for Crop Disease Detection","authors":"Aashish, Aditya Thakkar, Shubham Yadav, Sandeep Saini, K. Lata","doi":"10.1109/CSI54720.2022.9923983","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923983","url":null,"abstract":"Indian agriculture is quite diverse and plays a vital role in the country's economic growth. The tools and techniques used in agriculture are no more primitive. With the gradual evolution of the population, this sector is under severe pressure to produce at high efficiency. One of the significant factors in improving crop harvest is the timely detection of crop diseases. The farmers use scouting to monitor their crops, which requires extensive labor and is time-consuming. Image processing-based disease identification makes the process faster and more accurate. Recently, deep learning techniques have been deployed for automatic plant disease identification. Researchers have used Convolutional Neural Networks (CNN) to predict the type of diseases in different crops accurately. Considering the advantages of autoencoders and CNN, we have proposed and developed a hybrid deep learning model based on CNN and Autoencoders to detect multiple plant diseases. The proposed architecture is fine-tuned to detect diseases of numerous crops. The proposed model provides higher accuracy when compared with similar systems. We have tested our model using the Plant village dataset containing almost 15 different types of crops.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128652138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truth Inference in Crowdsourcing Under Adversarial Attacks 对抗性攻击下众包的真相推断
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923985
A. Kurup, G. Sajeev, Swaminathan J
Crowdsourcing is an information system that provides a cost-effective way of solving computationally challenging problems. However, it is potentially vulnerable to adversarial attacks as the service provider cannot manage workers' behavior. Malicious workers provide unreliable answers to manipulate the system. These attacks affect the truth inference process and thus leads to wrong answers for a targeted set of tasks. Eventually, this reduces the accuracy of aggregated results. Existing works have proposed various types of attacks in crowdsourcing systems and indicate that truth inference is the most affected one. So, we propose methods for defending these attacks for improving the truth inference process. We empirically evaluate the proposed truth inference method on a real and synthetic dataset. The performance of the proposed method is verified, and the results show that it is robust to adversarial attacks with comparable accuracy.
众包是一种信息系统,它提供了一种具有成本效益的方式来解决计算上具有挑战性的问题。然而,由于服务提供者无法管理工作人员的行为,因此它可能容易受到对抗性攻击。恶意工作者提供不可靠的答案来操纵系统。这些攻击会影响真理推理过程,从而导致目标任务组的错误答案。最终,这会降低聚合结果的准确性。已有的研究已经提出了众包系统中各种类型的攻击,并表明真相推断是受影响最大的一种。因此,我们提出了防御这些攻击的方法,以改善真值推理过程。我们在真实数据集和合成数据集上对所提出的真值推理方法进行了实证评估。验证了该方法的性能,结果表明该方法对对抗性攻击具有较强的鲁棒性,且精度相当。
{"title":"Truth Inference in Crowdsourcing Under Adversarial Attacks","authors":"A. Kurup, G. Sajeev, Swaminathan J","doi":"10.1109/CSI54720.2022.9923985","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923985","url":null,"abstract":"Crowdsourcing is an information system that provides a cost-effective way of solving computationally challenging problems. However, it is potentially vulnerable to adversarial attacks as the service provider cannot manage workers' behavior. Malicious workers provide unreliable answers to manipulate the system. These attacks affect the truth inference process and thus leads to wrong answers for a targeted set of tasks. Eventually, this reduces the accuracy of aggregated results. Existing works have proposed various types of attacks in crowdsourcing systems and indicate that truth inference is the most affected one. So, we propose methods for defending these attacks for improving the truth inference process. We empirically evaluate the proposed truth inference method on a real and synthetic dataset. The performance of the proposed method is verified, and the results show that it is robust to adversarial attacks with comparable accuracy.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noisy Sonar Image Segmentation using Reptile Search Algorithm 基于爬虫类搜索算法的噪声声纳图像分割
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923950
Shweta Rajput, Resham Chawra, Palash Shirish Wani, S. Nanda
Due to the low energy attenuation of an acoustic wave in water, the side-scan sonar imaging technique is popularly used for underwater exploration. The images collected in this process contain a high amount of noise, which poses a challenge to accurately detecting underwater objects. In this paper, the de-noising of such images is carried out through a non-local means filtering algorithm. The obtained denoised images are further segmented to effectively determine the object, shadow, and background. The segmentation task is formulated as a clustering problem, and a recently reported nature-inspired algorithm known as Reptile Search Algorithm (RSA) is used. The RSA is based on the hunting behavior of crocodiles in a specific region. The Davies-Bouldin index is used as the fitness function to perform the clustering. The performance of the proposed method is evaluated on four plane and four-ship images collected from the benchmark KLSG-II dataset. The obtained results are compared with the image segmentation performed by particle swarm optimization and genetic algorithm. Comparative results reveal that the proposed RSA-based model obtained better results in de-noising and effectively segmenting the eight images.
由于声波在水中具有较低的能量衰减,侧扫声纳成像技术在水下探测中得到了广泛的应用。在此过程中采集的图像含有大量的噪声,这对准确探测水下目标提出了挑战。本文通过非局部均值滤波算法对这类图像进行去噪。对去噪后的图像进行进一步分割,有效确定目标、阴影和背景。分割任务被制定为一个聚类问题,并使用了最近报道的一种受自然启发的算法,即爬行动物搜索算法(RSA)。RSA是基于鳄鱼在特定地区的狩猎行为。采用Davies-Bouldin指数作为适应度函数进行聚类。在KLSG-II基准数据集中收集的四幅飞机和四艘船图像上对该方法的性能进行了评估。将所得结果与粒子群算法和遗传算法进行了比较。对比结果表明,基于rsa的模型在去噪和有效分割8幅图像方面取得了较好的效果。
{"title":"Noisy Sonar Image Segmentation using Reptile Search Algorithm","authors":"Shweta Rajput, Resham Chawra, Palash Shirish Wani, S. Nanda","doi":"10.1109/CSI54720.2022.9923950","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923950","url":null,"abstract":"Due to the low energy attenuation of an acoustic wave in water, the side-scan sonar imaging technique is popularly used for underwater exploration. The images collected in this process contain a high amount of noise, which poses a challenge to accurately detecting underwater objects. In this paper, the de-noising of such images is carried out through a non-local means filtering algorithm. The obtained denoised images are further segmented to effectively determine the object, shadow, and background. The segmentation task is formulated as a clustering problem, and a recently reported nature-inspired algorithm known as Reptile Search Algorithm (RSA) is used. The RSA is based on the hunting behavior of crocodiles in a specific region. The Davies-Bouldin index is used as the fitness function to perform the clustering. The performance of the proposed method is evaluated on four plane and four-ship images collected from the benchmark KLSG-II dataset. The obtained results are compared with the image segmentation performed by particle swarm optimization and genetic algorithm. Comparative results reveal that the proposed RSA-based model obtained better results in de-noising and effectively segmenting the eight images.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An intelligent system for taurine breed recognition: preliminary results 牛磺酸品种识别智能系统的初步研究
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9924139
Bembamba Fulbert, O. T. Frédéric, Malo Sadouanouan, Yougbare Bernadette, O. Dominique
Uncontrolled crossbreeding between zebus and taurine cattle is jeopardizing the genetic heritage of West African taurines and their specific ability to resist trypanosomosis. to achieve any successful conservation policy for this species, it is crucial to accurately identify purebred taurines. Techniques in use today include empirical method and biological analysis. We offer in this paper a supervised Machine Learning approach of pure-bred taurine recognition. Five algorithms were trained using morphological data from hundreds of cows. Each of the models produced promising results. The RBF non linear SVM performs the best with up to 87% accuracy and 0.9308 of AUC. Furthermore, the correlation coefficients allowed to define the most discriminating morphological trait.
斑马与牛磺酸牛之间不受控制的杂交正在危及西非牛磺酸的遗传遗产及其抵抗锥虫病的特殊能力。为了实现对该物种的任何成功的保护政策,准确识别纯种牛磺酸是至关重要的。目前使用的技术包括经验方法和生物分析。本文提出了一种纯种牛磺酸识别的监督式机器学习方法。使用来自数百头奶牛的形态学数据训练了五种算法。每种模型都产生了令人鼓舞的结果。RBF非线性支持向量机的准确率高达87%,AUC为0.9308。此外,相关系数允许定义最有区别的形态性状。
{"title":"An intelligent system for taurine breed recognition: preliminary results","authors":"Bembamba Fulbert, O. T. Frédéric, Malo Sadouanouan, Yougbare Bernadette, O. Dominique","doi":"10.1109/CSI54720.2022.9924139","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9924139","url":null,"abstract":"Uncontrolled crossbreeding between zebus and taurine cattle is jeopardizing the genetic heritage of West African taurines and their specific ability to resist trypanosomosis. to achieve any successful conservation policy for this species, it is crucial to accurately identify purebred taurines. Techniques in use today include empirical method and biological analysis. We offer in this paper a supervised Machine Learning approach of pure-bred taurine recognition. Five algorithms were trained using morphological data from hundreds of cows. Each of the models produced promising results. The RBF non linear SVM performs the best with up to 87% accuracy and 0.9308 of AUC. Furthermore, the correlation coefficients allowed to define the most discriminating morphological trait.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116072259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Connected Systems & Intelligence (CSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1