首页 > 最新文献

2019 21st International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study 基于物联网集成区块链的跨行业供应链管理实施的效益综述(附案例研究
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701910
S. Aich, Sabyasachi Chakraborty, M. Sain, Hye-in Lee, Hee-Cheol Kim
In the current era, blockchain based system getting a lot of attention across different industries especially in the domain of supply chain because of its streamlined nature at the same time keep the privacy intact as well as more efficient than the conventional system. However the traditional supply chain faced lot of challenges these days because of the complex networks. Blockchain integrated with IoT framework has the potential to overcome the challenges faced by the conventional systems across industries. Basically the IoT integrated blockchain system provides enough benefits such as connecting the link between the flows in the supply chain to improve the efficiency of the supply chain network, makes the system transparent that can reduce the code of conduct violation throughout the supply chain networks, the immutable properties helps the stakeholders to trace the products throughout the networks. Even though blockchain based system provides enough benefits across industries, so far the implementation rate is very low because of the lack of knowledge about the benefits of blockchain system as well as lack of understanding about how and why it is needed in their fields. In this paper we will highlight the difference between the conventional supply chain as well as blockchain based supply chain and the benefits of implementing blockchain in different sectors such as automotive, pharmaceutical, food industry, retail. This article will highlights the problems currently facing by the above mentioned industries by using the conventional supply chain as well as the solutions to the problems provide the blockchain based systems in those industries. This articles helps the people across sectors to understand the benefits of the blockchain based system in their respect fields as well as implement it to improve the efficiency of the overall system.
在当今时代,基于区块链的系统由于其流线型的特性,在保持隐私完整的同时,比传统系统更高效,在不同行业尤其是供应链领域受到了广泛的关注。然而,由于网络的复杂性,传统的供应链面临着许多挑战。与物联网框架集成的区块链具有克服跨行业传统系统面临的挑战的潜力。基本上,物联网集成的区块链系统提供了足够的好处,例如连接供应链中流动之间的链接,以提高供应链网络的效率,使系统透明,可以减少整个供应链网络中违反行为准则的行为,不可变的属性有助于利益相关者在整个网络中追踪产品。尽管基于区块链的系统为各行各业提供了足够的好处,但到目前为止,由于缺乏对区块链系统好处的了解,以及缺乏对区块链系统在各自领域如何以及为什么需要它的理解,执行率非常低。在本文中,我们将重点介绍传统供应链与基于区块链的供应链之间的差异,以及在汽车、制药、食品工业、零售等不同行业实施区块链的好处。本文将通过使用传统供应链来强调上述行业目前面临的问题,以及为这些行业提供基于区块链的系统的问题解决方案。本文帮助各行各业的人们了解基于区块链的系统在各自领域的好处,并实施它以提高整个系统的效率。
{"title":"A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study","authors":"S. Aich, Sabyasachi Chakraborty, M. Sain, Hye-in Lee, Hee-Cheol Kim","doi":"10.23919/ICACT.2019.8701910","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701910","url":null,"abstract":"In the current era, blockchain based system getting a lot of attention across different industries especially in the domain of supply chain because of its streamlined nature at the same time keep the privacy intact as well as more efficient than the conventional system. However the traditional supply chain faced lot of challenges these days because of the complex networks. Blockchain integrated with IoT framework has the potential to overcome the challenges faced by the conventional systems across industries. Basically the IoT integrated blockchain system provides enough benefits such as connecting the link between the flows in the supply chain to improve the efficiency of the supply chain network, makes the system transparent that can reduce the code of conduct violation throughout the supply chain networks, the immutable properties helps the stakeholders to trace the products throughout the networks. Even though blockchain based system provides enough benefits across industries, so far the implementation rate is very low because of the lack of knowledge about the benefits of blockchain system as well as lack of understanding about how and why it is needed in their fields. In this paper we will highlight the difference between the conventional supply chain as well as blockchain based supply chain and the benefits of implementing blockchain in different sectors such as automotive, pharmaceutical, food industry, retail. This article will highlights the problems currently facing by the above mentioned industries by using the conventional supply chain as well as the solutions to the problems provide the blockchain based systems in those industries. This articles helps the people across sectors to understand the benefits of the blockchain based system in their respect fields as well as implement it to improve the efficiency of the overall system.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127865606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Discovery of Suitable Node Number for Wireless Sensor Networks Based on Energy Consumption using Cooja 基于能耗的Cooja无线传感器网络合适节点数的发现
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8702021
M. Tutunović, Pongpisit Wuttidittachotti
In Wireless Sensor Networks (WSN) power consumption has a crucial influence on the network performance. It affects the network’s availability, reliability and lifespan and therefore must be kept at minimum. Conducting experiments involving real devices and networks can be too expensive and complex, so a simulator can be used as an alternative in order to simplify the research environment. The simulator used in this paper is Cooja simulator that runs ContikiOS which is commonly used by the WSN hardware platform. The consumed energy was measured using four parameters and in five different tests, varying the number of the sensor nodes, not changing the position of the sink node. The results show that the average power consumption per node is not necessarily connected to the lowest number of nodes, as well as how energy consumption is increased if the node is acting not only as a collector node, but also as a transit node for its neighbouring nodes.
在无线传感器网络(WSN)中,功耗对网络性能有着至关重要的影响。它会影响网络的可用性、可靠性和寿命,因此必须保持在最低限度。进行涉及真实设备和网络的实验可能过于昂贵和复杂,因此可以使用模拟器作为替代方案,以简化研究环境。本文使用的模拟器是运行WSN硬件平台常用的ContikiOS的Cooja模拟器。消耗的能量使用四个参数,在五个不同的测试中测量,改变传感器节点的数量,不改变汇聚节点的位置。结果表明,每个节点的平均功耗不一定是连接到最少数量的节点,以及如果节点既充当收集节点,又充当相邻节点的过境节点,则能耗如何增加。
{"title":"Discovery of Suitable Node Number for Wireless Sensor Networks Based on Energy Consumption using Cooja","authors":"M. Tutunović, Pongpisit Wuttidittachotti","doi":"10.23919/ICACT.2019.8702021","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702021","url":null,"abstract":"In Wireless Sensor Networks (WSN) power consumption has a crucial influence on the network performance. It affects the network’s availability, reliability and lifespan and therefore must be kept at minimum. Conducting experiments involving real devices and networks can be too expensive and complex, so a simulator can be used as an alternative in order to simplify the research environment. The simulator used in this paper is Cooja simulator that runs ContikiOS which is commonly used by the WSN hardware platform. The consumed energy was measured using four parameters and in five different tests, varying the number of the sensor nodes, not changing the position of the sink node. The results show that the average power consumption per node is not necessarily connected to the lowest number of nodes, as well as how energy consumption is increased if the node is acting not only as a collector node, but also as a transit node for its neighbouring nodes.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117003141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intrusion Detection by Deep Learning with TensorFlow 基于TensorFlow的深度学习入侵检测
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701969
Navaporn Chockwanich, V. Visoottiviseth
Nowadays intrusion detection systems (IDS) plays an important role in organizations since there are a ton of cyber attacks which affect to security issues: confidential, integrity, availability. Currently, there are many open source tools for intrusion detection but they have different syntax of rules and signatures which cannot be used across different tools. In this paper, we propose an intrusion detection technique by using deep learning model which can classify different types of attacks without human-generated rules or signature mapping. We apply the supervised deep learning technology which are RNN, Stacked RNN, and CNN to classify five popular types of attacks by using Keras on the top of TensorFlow. Our technique requires only the packet header information and does not need any user payload. To verify the performance, we use MAWI dataset which are pcap files and compare our results with Snort IDS. Due to the lack of user payloads, the results show that Snort could not detect the network scan attack via ICMP and UDP. Meanwhile, we prove that RNN, Stacked RNN, and CNN can be used to classify attack for Port scan, Network scan via ICMP, Network scan via UDP, Network scan via TCP, and DoS attack with high accuracy. RNN delivers the highest accuracy.
如今,入侵检测系统(IDS)在组织中扮演着重要的角色,因为有大量的网络攻击会影响到安全问题:机密性、完整性、可用性。目前,有许多开源的入侵检测工具,但它们的规则和签名语法不同,不能跨工具使用。本文提出了一种基于深度学习模型的入侵检测技术,该技术可以在不需要人工生成规则或签名映射的情况下对不同类型的攻击进行分类。我们应用有监督的深度学习技术,即RNN、堆叠RNN和CNN,通过在TensorFlow之上使用Keras对五种流行的攻击类型进行分类。我们的技术只需要包头信息,不需要任何用户负载。为了验证性能,我们使用MAWI数据集(pcap文件),并将结果与Snort IDS进行比较。由于缺乏用户有效负载,结果表明Snort无法检测到通过ICMP和UDP的网络扫描攻击。同时,我们证明了RNN、堆叠RNN和CNN可以对端口扫描、ICMP网络扫描、UDP网络扫描、TCP网络扫描和DoS攻击进行分类,准确率很高。RNN提供最高的准确性。
{"title":"Intrusion Detection by Deep Learning with TensorFlow","authors":"Navaporn Chockwanich, V. Visoottiviseth","doi":"10.23919/ICACT.2019.8701969","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701969","url":null,"abstract":"Nowadays intrusion detection systems (IDS) plays an important role in organizations since there are a ton of cyber attacks which affect to security issues: confidential, integrity, availability. Currently, there are many open source tools for intrusion detection but they have different syntax of rules and signatures which cannot be used across different tools. In this paper, we propose an intrusion detection technique by using deep learning model which can classify different types of attacks without human-generated rules or signature mapping. We apply the supervised deep learning technology which are RNN, Stacked RNN, and CNN to classify five popular types of attacks by using Keras on the top of TensorFlow. Our technique requires only the packet header information and does not need any user payload. To verify the performance, we use MAWI dataset which are pcap files and compare our results with Snort IDS. Due to the lack of user payloads, the results show that Snort could not detect the network scan attack via ICMP and UDP. Meanwhile, we prove that RNN, Stacked RNN, and CNN can be used to classify attack for Port scan, Network scan via ICMP, Network scan via UDP, Network scan via TCP, and DoS attack with high accuracy. RNN delivers the highest accuracy.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117343739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Complex Control-Flow Constructs Detection from Process Related Data 复杂控制流构造从过程相关数据检测
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701986
Hind R’bigui, Chiwoon Cho
Process mining is new techniques whereby knowledge from event log stored in today’s information systems are extracted to automatically construct business process models to have a full understanding of the real behaviour of processes, identify bottlenecks, and then improve them. Many process discovery algorithms have been proposed today. However, there are complex control-flow constructs that current discovery techniques cannot correctly discover in models based on event logs. These constructs are short loops, invisible tasks, and nonfree choice constructs. There is currently no algorithm that can handle all of these structures in a restricted time. In this paper, we propose a framework that detects from event logs the complex control-flow constructs that exist. By identifying the existing constructs from a given event log, one can identify the process model notation or the process discovery algorithm appropriate for the given event log. The framework has been implemented in ProM and the results show that constructs are identified correctly.
流程挖掘是一种新技术,通过从存储在当今信息系统中的事件日志中提取知识,自动构建业务流程模型,从而全面了解流程的真实行为,识别瓶颈,然后改进它们。目前已经提出了许多过程发现算法。然而,当前的发现技术无法在基于事件日志的模型中正确地发现复杂的控制流构造。这些结构是短循环、不可见任务和非自由选择结构。目前还没有一种算法可以在有限的时间内处理所有这些结构。在本文中,我们提出了一个从事件日志中检测存在的复杂控制流结构的框架。通过标识给定事件日志中的现有构造,可以标识适合于给定事件日志的流程模型符号或流程发现算法。在ProM中实现了该框架,结果表明该框架能够正确识别结构。
{"title":"Complex Control-Flow Constructs Detection from Process Related Data","authors":"Hind R’bigui, Chiwoon Cho","doi":"10.23919/ICACT.2019.8701986","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701986","url":null,"abstract":"Process mining is new techniques whereby knowledge from event log stored in today’s information systems are extracted to automatically construct business process models to have a full understanding of the real behaviour of processes, identify bottlenecks, and then improve them. Many process discovery algorithms have been proposed today. However, there are complex control-flow constructs that current discovery techniques cannot correctly discover in models based on event logs. These constructs are short loops, invisible tasks, and nonfree choice constructs. There is currently no algorithm that can handle all of these structures in a restricted time. In this paper, we propose a framework that detects from event logs the complex control-flow constructs that exist. By identifying the existing constructs from a given event log, one can identify the process model notation or the process discovery algorithm appropriate for the given event log. The framework has been implemented in ProM and the results show that constructs are identified correctly.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128293894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital Transformation of the Public Service Delivery System in Uzbekistan 乌兹别克斯坦公共服务提供系统的数字化转型
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8702014
S. Shin, Zafar Makhamadjanovich Rakhmatullayev
In the meantime, e-government has evolved through the constant interaction between technology development and social change. Social issues that become increasingly complex are solved by the capacity of the department, and it is time to solve creative problems by opening and communicating on the basis of ICT. Digital transformation of public services should precede "administrative reform of government. As a new e-government model, which is an alternative to the paradigm shift of e-government, 100% digitization of government services is proposed as a vision to realize sustainable development of society as a whole. The Uzbekistan government intends to achieve governance and administrative unit optimization to create a digital government, to promote the decentralization of the administration, and to create a "single center" that serves individuals and businesses based on "single window". Specifically, it proposes to improve infrastructure, increase human resources, and improve public services. In particular, by introducing interactive portals for public services, digital government is being planned after e-government.
同时,电子政务是在技术发展与社会变革的不断互动中发展起来的。越来越复杂的社会问题是通过部门的能力来解决的,现在是通过信息通信技术的开放和交流来解决创造性问题的时候了。公共服务数字化转型应先于“政府行政改革”。政府服务100%数字化作为一种新的电子政务模式,是电子政务范式转变的替代方案,是实现整个社会可持续发展的愿景。乌兹别克斯坦政府拟实现治理和行政单位优化,打造数字政府,推进行政分权,打造基于“单一窗口”服务个人和企业的“单一中心”。具体而言,它提出改善基础设施,增加人力资源,改善公共服务。特别是,继电子政府之后,通过引进互动的公共服务门户,正在规划数字政府。
{"title":"Digital Transformation of the Public Service Delivery System in Uzbekistan","authors":"S. Shin, Zafar Makhamadjanovich Rakhmatullayev","doi":"10.23919/ICACT.2019.8702014","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702014","url":null,"abstract":"In the meantime, e-government has evolved through the constant interaction between technology development and social change. Social issues that become increasingly complex are solved by the capacity of the department, and it is time to solve creative problems by opening and communicating on the basis of ICT. Digital transformation of public services should precede \"administrative reform of government. As a new e-government model, which is an alternative to the paradigm shift of e-government, 100% digitization of government services is proposed as a vision to realize sustainable development of society as a whole. The Uzbekistan government intends to achieve governance and administrative unit optimization to create a digital government, to promote the decentralization of the administration, and to create a \"single center\" that serves individuals and businesses based on \"single window\". Specifically, it proposes to improve infrastructure, increase human resources, and improve public services. In particular, by introducing interactive portals for public services, digital government is being planned after e-government.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Classifying User Reviews at Sentence and Review Levels Utilizing Naïve Bayes 利用Naïve贝叶斯对句子和评论级别的用户评论进行分类
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8702039
Yoichi Saito, V. Klyuev
Many products are sold on electronic commerce websites. Online customer reviews are available to help in selecting products to purchase. The products should be recommended by a special system that is capable to analyse and classify reviews because it is very hard for users to read many reviews and result of the recommendation should be personalized to suit user’s requirements. The aim of this research is to classify the online customer reviews accurately to obtain opinion mining techniques of the recommendation system. The research focuses on classifying the Japanese reviews into positive or non-positive. In this study, we classify the reviews at the sentence and the review level. The data set for the sentence-level classification contains the reviews of Electronic Devices category. The data set for the review-level classification contains the reviews of Mobile Phone Accessories category. This research also compares the results of our experiments and another research to evaluate the experimental results. This research is successful to obtain opinion mining techniques and the better results at the review-level classifications instead of the sentence-level classifications. The experimental results will contribute to the opinion mining phase of the recommendation system.
许多产品在电子商务网站上出售。在线客户评论可以帮助选择购买的产品。产品推荐应该通过一个特殊的系统,能够分析和分类的评论,因为用户很难阅读大量的评论,推荐的结果应该个性化,以满足用户的需求。本研究的目的是对在线顾客评论进行准确分类,从而获得推荐系统的意见挖掘技术。研究的重点是将日语评论分为积极和非积极两类。在本研究中,我们将评论分为句子级和评论级。句子级分类的数据集包含电子设备类别的评论。审查级别分类的数据集包含对移动电话配件类别的审查。本研究还将我们的实验结果与另一项研究的结果进行比较,以评估实验结果。本研究成功地获得了意见挖掘技术,并且在评论级分类上取得了比句子级分类更好的结果。实验结果将有助于推荐系统的意见挖掘阶段。
{"title":"Classifying User Reviews at Sentence and Review Levels Utilizing Naïve Bayes","authors":"Yoichi Saito, V. Klyuev","doi":"10.23919/ICACT.2019.8702039","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702039","url":null,"abstract":"Many products are sold on electronic commerce websites. Online customer reviews are available to help in selecting products to purchase. The products should be recommended by a special system that is capable to analyse and classify reviews because it is very hard for users to read many reviews and result of the recommendation should be personalized to suit user’s requirements. The aim of this research is to classify the online customer reviews accurately to obtain opinion mining techniques of the recommendation system. The research focuses on classifying the Japanese reviews into positive or non-positive. In this study, we classify the reviews at the sentence and the review level. The data set for the sentence-level classification contains the reviews of Electronic Devices category. The data set for the review-level classification contains the reviews of Mobile Phone Accessories category. This research also compares the results of our experiments and another research to evaluate the experimental results. This research is successful to obtain opinion mining techniques and the better results at the review-level classifications instead of the sentence-level classifications. The experimental results will contribute to the opinion mining phase of the recommendation system.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127374056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Chinese Spam Data Filter Model in Mobile Internet 移动互联网中文垃圾邮件数据过滤模型
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701896
Yitao Yang, Runqiu Hu, Guozi Sun, Chengyan Qiu
With the rapid development of mobile Internet and the popularization of mobile intellectual terminals, learning, working and living were getting more and more efficient. While people were enjoying the efficiency if these modern products, large amount of spam information like advertising, pornography, gambling, fraud were flocking into people’s daily life. The information mentioned above was mostly transmitted through networking data targeting any application. Different methods of detecting and filtering had been proposed by many researchers and scholars, among which the method of SVM based on content was the most popular. However, research focusing on network data had rarely been conducted. The paper proposed a networking data filter running on mobile terminals based on Bayesian Classification. It focused on the data of Chinese spam data detecting and filtering. In addition to the automatic learning of new rules, the filter also implemented a passive incremental learning. Experiments showed that the filter had a higher detection accuracy and an average level of system resource occupancy.
随着移动互联网的快速发展和移动智能终端的普及,人们的学习、工作和生活变得越来越高效。当人们享受这些现代产品的效率时,大量的垃圾信息,如广告、色情、赌博、欺诈等涌入人们的日常生活。上述信息主要是通过针对任何应用程序的网络数据传输的。许多研究人员和学者提出了不同的检测和过滤方法,其中基于内容的支持向量机方法最为流行。然而,针对网络数据的研究却很少。本文提出了一种基于贝叶斯分类的移动端网络数据过滤器。重点研究了中文垃圾邮件数据的检测与过滤。除了自动学习新规则外,该过滤器还实现了被动增量学习。实验表明,该滤波器具有较高的检测精度和系统资源占用的平均水平。
{"title":"Chinese Spam Data Filter Model in Mobile Internet","authors":"Yitao Yang, Runqiu Hu, Guozi Sun, Chengyan Qiu","doi":"10.23919/ICACT.2019.8701896","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701896","url":null,"abstract":"With the rapid development of mobile Internet and the popularization of mobile intellectual terminals, learning, working and living were getting more and more efficient. While people were enjoying the efficiency if these modern products, large amount of spam information like advertising, pornography, gambling, fraud were flocking into people’s daily life. The information mentioned above was mostly transmitted through networking data targeting any application. Different methods of detecting and filtering had been proposed by many researchers and scholars, among which the method of SVM based on content was the most popular. However, research focusing on network data had rarely been conducted. The paper proposed a networking data filter running on mobile terminals based on Bayesian Classification. It focused on the data of Chinese spam data detecting and filtering. In addition to the automatic learning of new rules, the filter also implemented a passive incremental learning. Experiments showed that the filter had a higher detection accuracy and an average level of system resource occupancy.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICACT 2019 Contributor Page ICACT 2019贡献者页面
Pub Date : 2019-02-01 DOI: 10.23919/icact.2019.8702003
{"title":"ICACT 2019 Contributor Page","authors":"","doi":"10.23919/icact.2019.8702003","DOIUrl":"https://doi.org/10.23919/icact.2019.8702003","url":null,"abstract":"","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Heterogeneous Networks model for Cluster Formation and Power Allocation in Uplink NOMA 基于异构网络模型的上行NOMA集群形成与功率分配
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701921
Arbab Waheed Ahmad, Nasir Mehmood Bahadar
Non-orthogonal multiple access (NOMA) enables the next generation mobile communication systems to achieve extremely high data rate with better connectivity and higher spectral efficiency. In downlink NOMA, multiple user-equipments (UEs) are grouped in a single cluster so that a single composite power signal can be transmitted from the evolved nodeB (eNB) for all UEs belong to that cluster. Each UE in the cluster then retrieves its own signal from the composite power signal while implementing successive interference cancellation (SIC). However, in NOMA uplink transmission, each UE is unaware about the transmission of other UEs in the cell. Hence each UE is considered as a unique individual entity in uplink and therefore transmits power independently. Therefore in uplink, multiple UEs cannot be grouped into a single cluster so as to transmit a single composite power signal to the eNB. In order to achieve spectral efficiency in uplink NOMA, in this paper we exploit the concept of Heterogeneous network (HetNet) model and propose a two-step power allocation scheme. UEs belong to a specific geographical area are grouped in a small cell alike cluster and a cluster-eNB (ceNB) is defined for each cluster. UEs inside the cluster transmits individually and independently to the ceNB during the first step and afterwards the ceNB multiplex multiple UEs in a single superimposed composite power signal while allocating distinct power levels to different users in the second step. Finally, the ceNB then transmits the superimposed composite power signal to the eNB. The numerical results demonstrate that the proposed technique outperforms the conventional orthogonal multiple access (OMA) technique.
非正交多址(NOMA)使下一代移动通信系统能够以更好的连接性和更高的频谱效率实现极高的数据速率。在下行链路NOMA中,将多个用户设备(ue)分组在一个集群中,以便从演进节点b (eNB)向属于该集群的所有终端传输单个复合功率信号。然后,集群中的每个UE从复合功率信号中检索自己的信号,同时实现连续干扰消除(SIC)。然而,在NOMA上行链路传输中,每个终端都不知道小区中其他终端的传输情况。因此,每个UE被视为上行链路中唯一的个体实体,因此独立地传输功率。因此,在上行链路中,不能将多台终端组成一个集群,向eNB发送单一的复合功率信号。为了实现上行NOMA的频谱效率,本文利用异构网络(HetNet)模型的概念,提出了一种两步功率分配方案。属于特定地理区域的ue被分组到类似于集群的小单元中,并为每个集群定义一个集群- enb (ceNB)。集群内的终端在第一步中单独独立地向ceNB发送,然后在第二步中,ceNB将多个终端以单一叠加的复合功率信号复用,同时为不同的用户分配不同的功率电平。最后,ceNB再将叠加的复合功率信号传输到eNB。数值结果表明,该技术优于传统的正交多址(OMA)技术。
{"title":"Exploiting Heterogeneous Networks model for Cluster Formation and Power Allocation in Uplink NOMA","authors":"Arbab Waheed Ahmad, Nasir Mehmood Bahadar","doi":"10.23919/ICACT.2019.8701921","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701921","url":null,"abstract":"Non-orthogonal multiple access (NOMA) enables the next generation mobile communication systems to achieve extremely high data rate with better connectivity and higher spectral efficiency. In downlink NOMA, multiple user-equipments (UEs) are grouped in a single cluster so that a single composite power signal can be transmitted from the evolved nodeB (eNB) for all UEs belong to that cluster. Each UE in the cluster then retrieves its own signal from the composite power signal while implementing successive interference cancellation (SIC). However, in NOMA uplink transmission, each UE is unaware about the transmission of other UEs in the cell. Hence each UE is considered as a unique individual entity in uplink and therefore transmits power independently. Therefore in uplink, multiple UEs cannot be grouped into a single cluster so as to transmit a single composite power signal to the eNB. In order to achieve spectral efficiency in uplink NOMA, in this paper we exploit the concept of Heterogeneous network (HetNet) model and propose a two-step power allocation scheme. UEs belong to a specific geographical area are grouped in a small cell alike cluster and a cluster-eNB (ceNB) is defined for each cluster. UEs inside the cluster transmits individually and independently to the ceNB during the first step and afterwards the ceNB multiplex multiple UEs in a single superimposed composite power signal while allocating distinct power levels to different users in the second step. Finally, the ceNB then transmits the superimposed composite power signal to the eNB. The numerical results demonstrate that the proposed technique outperforms the conventional orthogonal multiple access (OMA) technique.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132212405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Online Web-based Adaptive Tutoring System for University Exit Exam on IT Literacy 基于网络的信息技术素质大学毕业考试自适应辅导系统
Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701994
C. Wongwatkit
With the significance of information technology literacy in the 21st century, the university requires all students to have specific knowledge of this topic before graduation by taking the exit exam. The university has encountered the problem with the meager rate of students who passed this exam. Since they learned this topic in the freshmen year, their understanding of this topic may be lost and limited consequently. Therefore, the students need a tutoring system that can help them to review the content effectively before taking the exam. In this study, an online web-based adaptive tutoring system has been developed by adopting the context of exit exam on information technology literacy. The developed system embedded an adaptive structure on questions, assessment and learning profile that can help students to better prepare and refresh their knowledge before taking the exit exam. The system has been tested for the system performance before use. To find the effectiveness of this system, the data analysis has been conducted. The results show that the students who learning and practicing on this system have higher achievements on the exam, while the university has a higher rate of students who passed this exam accordingly. The findings of this study shed light on the significance of preparing students to be ready before graduation by the competent, meaningful support of online learning system.
鉴于信息技术素养在21世纪的重要性,学校要求所有学生在毕业前通过毕业考试对这一主题有具体的了解。这所大学遇到了考试合格率太低的问题。由于他们是在大一才开始学习这个话题,因此他们对这个话题的理解可能会迷失和局限。因此,学生需要一个辅导系统,可以帮助他们在考试前有效地复习内容。本研究以资讯科技素养毕业考试为背景,开发一套网路自适应辅导系统。开发的系统在问题、评估和学习概况上嵌入了自适应结构,可以帮助学生在参加毕业考试之前更好地准备和更新知识。本系统在使用前已经过系统性能测试。为了发现该系统的有效性,进行了数据分析。结果表明,在该系统上学习和练习的学生在考试中取得了较高的成绩,而学校的学生通过率也相应较高。本研究的结果揭示了通过在线学习系统的有效、有意义的支持使学生在毕业前做好准备的重要性。
{"title":"An Online Web-based Adaptive Tutoring System for University Exit Exam on IT Literacy","authors":"C. Wongwatkit","doi":"10.23919/ICACT.2019.8701994","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701994","url":null,"abstract":"With the significance of information technology literacy in the 21st century, the university requires all students to have specific knowledge of this topic before graduation by taking the exit exam. The university has encountered the problem with the meager rate of students who passed this exam. Since they learned this topic in the freshmen year, their understanding of this topic may be lost and limited consequently. Therefore, the students need a tutoring system that can help them to review the content effectively before taking the exam. In this study, an online web-based adaptive tutoring system has been developed by adopting the context of exit exam on information technology literacy. The developed system embedded an adaptive structure on questions, assessment and learning profile that can help students to better prepare and refresh their knowledge before taking the exit exam. The system has been tested for the system performance before use. To find the effectiveness of this system, the data analysis has been conducted. The results show that the students who learning and practicing on this system have higher achievements on the exam, while the university has a higher rate of students who passed this exam accordingly. The findings of this study shed light on the significance of preparing students to be ready before graduation by the competent, meaningful support of online learning system.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130914309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 21st International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1