首页 > 最新文献

2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)最新文献

英文 中文
Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack 集成云原生和代理机制的软件定义网络:TCP SYN泛洪攻击检测与缓解系统
Chun-I Fan, Jun-Huei Wang, Cheng-Han Shie, Yu-Lung Tsai
SDN is a new network architecture that still faces traditional network attacks. Among the attacks, Distributed-Denial-of-Service is one of the most severe attacks, especially the TCP SYN Flooding attack, which has a more significant impact. This paper is mainly to mitigate the impact of the SYN Flood attack and will combine Kubernetes and design a unique component: SDN Controller Manager, which exists in K8s as a microservices. The proxy mechanism is used to resist the SYN Flooding attack, and the K8s feature is further utilized. If the SDN Controller Manager is attacked and the service is terminated abnormally, K8s will automatically create a new SDN Controller Manager component to continue to provide services.
SDN是一种新的网络架构,仍然面临着传统网络的攻击。在各种攻击中,分布式拒绝服务攻击是最严重的攻击之一,尤其是TCP SYN flood攻击,其影响更为显著。本文主要是为了减轻SYN Flood攻击的影响,将结合Kubernetes并设计一个独特的组件:SDN控制器管理器,它作为微服务存在于k8中。利用代理机制抵御SYN flood攻击,并进一步利用K8s特性。如果SDN Controller Manager受到攻击,导致服务异常终止,k8会自动创建新的SDN Controller Manager组件继续提供服务。
{"title":"Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack","authors":"Chun-I Fan, Jun-Huei Wang, Cheng-Han Shie, Yu-Lung Tsai","doi":"10.1109/IMCOM56909.2023.10035614","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035614","url":null,"abstract":"SDN is a new network architecture that still faces traditional network attacks. Among the attacks, Distributed-Denial-of-Service is one of the most severe attacks, especially the TCP SYN Flooding attack, which has a more significant impact. This paper is mainly to mitigate the impact of the SYN Flood attack and will combine Kubernetes and design a unique component: SDN Controller Manager, which exists in K8s as a microservices. The proxy mechanism is used to resist the SYN Flooding attack, and the K8s feature is further utilized. If the SDN Controller Manager is attacked and the service is terminated abnormally, K8s will automatically create a new SDN Controller Manager component to continue to provide services.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-Branch Neural Networks for Predicting Shared Bikes 双分支神经网络预测共享单车
Hui-Lin Yang, S. M. Raza, D. Le, Dongsoo S. Kim, Hyunseung Choo
Bike sharing is efficient urban mobility method as a user determines the rental period upon his/her demand. A dock-based sharing system designates places (i.e., bike docks or stations) where a user rents or returns a bike. Due to regionally and temporally erratic nature of urban mobility demand, bike imbalance among stations inevitably occurs and a service operator rebalances bikes to prevent service impairment. The precise prediction of imbalance for each station is essential to optimize the rebalancing schedule. This paper presents Dual-Branch Neural Networks (DBNNs) employing Long Short-Term Memory (LSTM) to classify the imbalance level of each station along with the prediction of bike counts. To address the dual objectives, the model trains by backpropagating both classification and prediction losses to the dual output branches individually, and jointly updates the trainable parameters of LSTM layers. The results showcase that the proposed model predicts bike counts within 8% average error for next 24 hours, and achieves 94% accuracy of classification for the same time period.
共享单车是一种高效的城市出行方式,用户可以根据自己的需求来决定租赁周期。基于码头的共享系统指定用户租用或归还自行车的地点(即自行车码头或车站)。由于城市交通需求的区域性和临时性不稳定,不可避免地会出现车站之间的自行车不平衡,服务运营商需要重新平衡自行车以防止服务受损。准确预测各站的不平衡是优化再平衡计划的关键。本文提出了利用长短期记忆(LSTM)的双分支神经网络(DBNNs)对各站点的不平衡程度进行分类,并对自行车数量进行预测。为了实现双重目标,该模型通过将分类和预测损失分别反向传播到双输出分支进行训练,并联合更新LSTM层的可训练参数。结果表明,该模型预测未来24小时的自行车数量平均误差在8%以内,同一时间段的分类准确率达到94%。
{"title":"Dual-Branch Neural Networks for Predicting Shared Bikes","authors":"Hui-Lin Yang, S. M. Raza, D. Le, Dongsoo S. Kim, Hyunseung Choo","doi":"10.1109/IMCOM56909.2023.10035665","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035665","url":null,"abstract":"Bike sharing is efficient urban mobility method as a user determines the rental period upon his/her demand. A dock-based sharing system designates places (i.e., bike docks or stations) where a user rents or returns a bike. Due to regionally and temporally erratic nature of urban mobility demand, bike imbalance among stations inevitably occurs and a service operator rebalances bikes to prevent service impairment. The precise prediction of imbalance for each station is essential to optimize the rebalancing schedule. This paper presents Dual-Branch Neural Networks (DBNNs) employing Long Short-Term Memory (LSTM) to classify the imbalance level of each station along with the prediction of bike counts. To address the dual objectives, the model trains by backpropagating both classification and prediction losses to the dual output branches individually, and jointly updates the trainable parameters of LSTM layers. The results showcase that the proposed model predicts bike counts within 8% average error for next 24 hours, and achieves 94% accuracy of classification for the same time period.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124875370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disease Identification in Potato Leaves using Swin Transformer 用Swin变压器鉴定马铃薯叶片病害
Li-Hua Li, Radius Tanone
One of Indonesia's mainstay agricultural products is the potato. Disease prevention is essential for maintaining stable potato production. One technique for detecting disease in potatoes is to determine whether potato leaves are diseased (early blight or late blight) or healthy. Deep Learning models have been widely developed and used to classify disease recognition in potato leaves in the industrial era 4.0. Swin Transformer is a deep learning model based on transformers that is more efficient and accurate at solving classification problems. The Swin Transformer, a transformer based deep learning approach, is used in this study to identify diseases of the potato leaf. Moreover, several metrics including Precision, Recall, Accuracy, and F1 score, are used to assess the experimental results of the model we use. In terms of accuracy, the value obtained when training with this model is 97.70%. These findings indicate that using the Swin Transformer model to identify potato leaf diseases could be a new trend in agricultural research.
土豆是印尼的主要农产品之一。预防病害是保持马铃薯稳定生产的关键。检测马铃薯疾病的一种技术是确定马铃薯叶片是否患病(早疫病或晚疫病)或健康。深度学习模型在工业4.0时代得到了广泛的发展,并被用于马铃薯叶片的疾病识别分类。Swin Transformer是一种基于变压器的深度学习模型,在解决分类问题时更加高效和准确。Swin Transformer是一种基于变压器的深度学习方法,在本研究中用于识别马铃薯叶片的疾病。此外,还使用了几个指标,包括Precision, Recall, Accuracy和F1分数,来评估我们使用的模型的实验结果。在准确率方面,使用该模型进行训练时得到的值为97.70%。这些结果表明,利用Swin Transformer模型识别马铃薯叶片病害可能是农业研究的一个新趋势。
{"title":"Disease Identification in Potato Leaves using Swin Transformer","authors":"Li-Hua Li, Radius Tanone","doi":"10.1109/IMCOM56909.2023.10035609","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035609","url":null,"abstract":"One of Indonesia's mainstay agricultural products is the potato. Disease prevention is essential for maintaining stable potato production. One technique for detecting disease in potatoes is to determine whether potato leaves are diseased (early blight or late blight) or healthy. Deep Learning models have been widely developed and used to classify disease recognition in potato leaves in the industrial era 4.0. Swin Transformer is a deep learning model based on transformers that is more efficient and accurate at solving classification problems. The Swin Transformer, a transformer based deep learning approach, is used in this study to identify diseases of the potato leaf. Moreover, several metrics including Precision, Recall, Accuracy, and F1 score, are used to assess the experimental results of the model we use. In terms of accuracy, the value obtained when training with this model is 97.70%. These findings indicate that using the Swin Transformer model to identify potato leaf diseases could be a new trend in agricultural research.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133370737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Synthesized Satellite Images Using Deep Neural Networks 基于深度神经网络的合成卫星图像检测
W. Liao, Yi-Shan Chang, Yi-Chieh Wu
The technology of generative adversarial networks (GAN) is constantly evolving, and synthesized images can no longer be accurately distinguished by the human eyes alone. GAN has been applied to the analysis of satellite images, mostly for the purpose of data augmentation. Recently, however, we have seen a twist in its usage. In information warfare, GAN has been used to create fake satellite images or modify the image content by putting fake bridges, buildings and clouds to mislead or conceal important intelligence. To address the increasing counterfeit cases in satellite images, the goal of this research is to develop algorithms that can classify fake remote sensing images robustly and efficiently. There exist many techniques to synthesize or manipulate the content of satellite images. In this paper, we focus on the case when the entire image is forged. Three satellite image synthesis methods, including ProGAN, cGAN and CycleGAN will be investigated. The effect of image pre-processing such as histogram equalization and bilateral filter will also be evaluated. Experiments show that satellite images generated by different GANs can be easily identified by individually trained models. The performance degraded when model trained with one type of GAN samples is employed to determine the originality of images synthesized with other types of GANs. Additionally, when histogram equalization is applied to the images, the detection model fails to distinguish its authenticity. A four-class universal classification model is proposed to address this issue. An overall accuracy of over 99% has been achieved even when pre-processing has been applied.
摘要生成对抗网络(GAN)技术在不断发展,人工合成的图像已不能单靠人眼准确识别。GAN已经应用于卫星图像的分析,主要是为了增强数据。然而,最近我们看到它的用法发生了变化。在信息战中,GAN被用于制造假卫星图像或通过放置假的桥梁、建筑物和云来修改图像内容,以误导或隐瞒重要情报。为了解决卫星图像中越来越多的伪造案例,本研究的目标是开发能够鲁棒有效地对伪造遥感图像进行分类的算法。目前存在许多合成或操纵卫星图像内容的技术。本文主要研究了整幅图像被伪造的情况。研究了ProGAN、cGAN和CycleGAN三种卫星图像合成方法。对直方图均衡化和双边滤波等图像预处理的效果也进行了评价。实验表明,不同gan生成的卫星图像可以通过单独训练的模型轻松识别。当使用一种GAN样本训练的模型来确定由其他类型GAN合成的图像的原创性时,性能会下降。此外,当对图像进行直方图均衡化时,检测模型无法区分其真实性。为了解决这一问题,提出了一个四类通用分类模型。即使进行了预处理,总体精度也达到了99%以上。
{"title":"Detection of Synthesized Satellite Images Using Deep Neural Networks","authors":"W. Liao, Yi-Shan Chang, Yi-Chieh Wu","doi":"10.1109/IMCOM56909.2023.10035570","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035570","url":null,"abstract":"The technology of generative adversarial networks (GAN) is constantly evolving, and synthesized images can no longer be accurately distinguished by the human eyes alone. GAN has been applied to the analysis of satellite images, mostly for the purpose of data augmentation. Recently, however, we have seen a twist in its usage. In information warfare, GAN has been used to create fake satellite images or modify the image content by putting fake bridges, buildings and clouds to mislead or conceal important intelligence. To address the increasing counterfeit cases in satellite images, the goal of this research is to develop algorithms that can classify fake remote sensing images robustly and efficiently. There exist many techniques to synthesize or manipulate the content of satellite images. In this paper, we focus on the case when the entire image is forged. Three satellite image synthesis methods, including ProGAN, cGAN and CycleGAN will be investigated. The effect of image pre-processing such as histogram equalization and bilateral filter will also be evaluated. Experiments show that satellite images generated by different GANs can be easily identified by individually trained models. The performance degraded when model trained with one type of GAN samples is employed to determine the originality of images synthesized with other types of GANs. Additionally, when histogram equalization is applied to the images, the detection model fails to distinguish its authenticity. A four-class universal classification model is proposed to address this issue. An overall accuracy of over 99% has been achieved even when pre-processing has been applied.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Exchange Protocol for Weak Links with Hybrid-RIS in Wireless Networks 基于混合ris的无线网络弱链路数据交换协议
J. Yoon, K. Kim, Tae-Jin Lee
In an indoor wireless network environment com-posed of Internet of Things (loT) devices, there can be devices that transmit data in a weak link due to obstacles and low transmission power. To solve the problem without additional energy consumption of devices, a new Medium Access Control (MAC) protocol is required for receiving data from the devices in the weak link. In this paper, we propose an energy-efficient MAC protocol that the AP can collect data by using a Hybrid- Reconfigurable Intelligent Surface (H - RIS). In the proposed network, the Access Point (AP) can distinguish the packet-level failure of the weak link and control the H - RIS to receive data from the device. Using simulations, we have shown that our proposed method can enhance the performance of the network throughput and energy efficiency of devices.
在由物联网(loT)设备组成的室内无线网络环境中,由于障碍物和传输功率低,可能会有设备在弱链路上传输数据。为了在不增加设备能耗的前提下解决这个问题,需要一种新的MAC (Medium Access Control)协议来接收弱链路设备的数据。在本文中,我们提出了一种节能的MAC协议,AP可以使用混合可重构智能表面(H - RIS)来收集数据。在该网络中,接入点(AP)可以识别弱链路的包级故障,并控制H - RIS接收设备的数据。通过仿真,我们证明了我们提出的方法可以提高网络吞吐量和设备的能源效率。
{"title":"Data Exchange Protocol for Weak Links with Hybrid-RIS in Wireless Networks","authors":"J. Yoon, K. Kim, Tae-Jin Lee","doi":"10.1109/IMCOM56909.2023.10035568","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035568","url":null,"abstract":"In an indoor wireless network environment com-posed of Internet of Things (loT) devices, there can be devices that transmit data in a weak link due to obstacles and low transmission power. To solve the problem without additional energy consumption of devices, a new Medium Access Control (MAC) protocol is required for receiving data from the devices in the weak link. In this paper, we propose an energy-efficient MAC protocol that the AP can collect data by using a Hybrid- Reconfigurable Intelligent Surface (H - RIS). In the proposed network, the Access Point (AP) can distinguish the packet-level failure of the weak link and control the H - RIS to receive data from the device. Using simulations, we have shown that our proposed method can enhance the performance of the network throughput and energy efficiency of devices.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Decentralized Social Media on Near Protocol Blockchain 近协议区块链下去中心化社交媒体的性能评价
Dwynn Tama, Arya Wicaksana
Social media's decentralization gives users control of their data, contributing to privacy, ownership, and dissemination. The challenge is to develop a decentralized social media platform with the same features and performances as its centralized counterpart. This study aims to demonstrate and evaluate the performance of decentralized social media in terms of throughput and scalability. The prototype application is developed on NEAR (Near Protocol Blockchain), a non-EVM (Ethereum Virtual Machine) chain with sharding. The results show that the use of NEAR to store post content is not a scalable solution, and the workaround of using IndexedDB as a local database to store information reduces response time and increases throughput and scalability. Collaboration of on-chain and off-chain storage strategies performs better for decentralized social media applications.
社交媒体的去中心化让用户能够控制自己的数据,有助于隐私、所有权和传播。挑战在于开发一个去中心化的社交媒体平台,使其具有与中心化平台相同的功能和性能。本研究旨在证明和评估分散式社交媒体在吞吐量和可扩展性方面的表现。原型应用程序是在NEAR(近协议区块链)上开发的,NEAR(近协议区块链)是一个带有分片的非evm(以太坊虚拟机)链。结果表明,使用NEAR来存储帖子内容不是一个可扩展的解决方案,使用IndexedDB作为本地数据库来存储信息的解决方案减少了响应时间,提高了吞吐量和可伸缩性。链上和链下存储策略的协作在去中心化的社交媒体应用中表现更好。
{"title":"Performance Evaluation of Decentralized Social Media on Near Protocol Blockchain","authors":"Dwynn Tama, Arya Wicaksana","doi":"10.1109/IMCOM56909.2023.10035654","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035654","url":null,"abstract":"Social media's decentralization gives users control of their data, contributing to privacy, ownership, and dissemination. The challenge is to develop a decentralized social media platform with the same features and performances as its centralized counterpart. This study aims to demonstrate and evaluate the performance of decentralized social media in terms of throughput and scalability. The prototype application is developed on NEAR (Near Protocol Blockchain), a non-EVM (Ethereum Virtual Machine) chain with sharding. The results show that the use of NEAR to store post content is not a scalable solution, and the workaround of using IndexedDB as a local database to store information reduces response time and increases throughput and scalability. Collaboration of on-chain and off-chain storage strategies performs better for decentralized social media applications.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125077107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert Communication over Federated Learning Channel 联邦学习信道上的秘密通信
S. Kim
We propose a novel covert communication technique between the federated learning (FL) server and participants without affecting the FL performance. The FL server superimposes the covert message onto the aggregated gradient and broadcasts the superimposed signal to all FL participants. FL participants decode the covert message treating the aggregated gradient as interference, and restore the original global model after removing the covert message from the superimposed signal. Therefore, the FL performance is not affected by sending the covert message. We analyze the covertness of communication against the adversary that monitors the statistical distribution of model updates. We derive the maximum achievable transmission rate of the covert message without being detected by the adversary and without affecting the federated learning performance.
提出了一种在不影响联邦学习性能的情况下,在联邦学习服务器和参与者之间进行隐蔽通信的新方法。FL服务器将隐蔽消息叠加到聚合梯度上,并将叠加的信号广播给所有FL参与者。FL参与者将聚集的梯度作为干扰对隐蔽信息进行解码,并从叠加信号中去除隐蔽信息后恢复原始全局模型。因此,发送隐蔽消息不会影响FL的性能。我们针对监视模型更新的统计分布的对手分析通信的隐蔽性。我们在不被对手检测和不影响联邦学习性能的情况下推导出隐蔽消息的最大可实现传输速率。
{"title":"Covert Communication over Federated Learning Channel","authors":"S. Kim","doi":"10.1109/IMCOM56909.2023.10035576","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035576","url":null,"abstract":"We propose a novel covert communication technique between the federated learning (FL) server and participants without affecting the FL performance. The FL server superimposes the covert message onto the aggregated gradient and broadcasts the superimposed signal to all FL participants. FL participants decode the covert message treating the aggregated gradient as interference, and restore the original global model after removing the covert message from the superimposed signal. Therefore, the FL performance is not affected by sending the covert message. We analyze the covertness of communication against the adversary that monitors the statistical distribution of model updates. We derive the maximum achievable transmission rate of the covert message without being detected by the adversary and without affecting the federated learning performance.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assistive Technology for Children with Learning Disabilities: A Systematic Literature Review 学习障碍儿童的辅助技术:系统文献综述
Ahmad Haiqal Abd Khalid, Nur Nazihah Mohkhlas, N. A. Zakaria, Mazidah Mat Rejab, Ruwinah Abdul Karim, Suharsiwi Suharsiwi
The enhancement of technology is well-developed and assistive technology is one of the foremost that has been used significantly. Individuals with disabilities use assistive technology to perform the desired activity that would otherwise be difficult or impossible. Mobility devices such as walkers and wheelchairs, as well as hardware, software, and peripherals that assist people with disabilities in accessing computers or other information technologies, are examples of assistive technology. Learning disabilities are caused by genetic and neurobiological factors that affect brain functioning, influencing one or more cognitive processes related to learning. This paper discusses a comprehensive systematic literature review (SLR) of the assistive technology (AT) for children with learning disabilities with combination of Kitchenham and PRISMA approach. This paper discusses on the assistive technologies developed for children with learning disabilities according to its type, purposes, techniques used, and platform or delivery system used to host the developed assistive technologies for children with learning disabilities.
技术的增强是发达的,辅助技术是最重要的技术之一,已被大量使用。残障人士使用辅助技术来完成原本很难或不可能完成的预期活动。助行器和轮椅等行动设备,以及帮助残疾人使用计算机或其他信息技术的硬件、软件和外围设备,都是辅助技术的例子。学习障碍是由影响大脑功能的遗传和神经生物学因素引起的,影响与学习有关的一个或多个认知过程。本文对Kitchenham方法与PRISMA方法相结合的学习障碍儿童辅助技术(AT)进行了全面系统的文献综述。本文从学习障碍儿童辅助技术的类型、用途、使用的技术以及用于承载这些已开发的学习障碍儿童辅助技术的平台或交付系统等方面进行了讨论。
{"title":"Assistive Technology for Children with Learning Disabilities: A Systematic Literature Review","authors":"Ahmad Haiqal Abd Khalid, Nur Nazihah Mohkhlas, N. A. Zakaria, Mazidah Mat Rejab, Ruwinah Abdul Karim, Suharsiwi Suharsiwi","doi":"10.1109/IMCOM56909.2023.10035638","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035638","url":null,"abstract":"The enhancement of technology is well-developed and assistive technology is one of the foremost that has been used significantly. Individuals with disabilities use assistive technology to perform the desired activity that would otherwise be difficult or impossible. Mobility devices such as walkers and wheelchairs, as well as hardware, software, and peripherals that assist people with disabilities in accessing computers or other information technologies, are examples of assistive technology. Learning disabilities are caused by genetic and neurobiological factors that affect brain functioning, influencing one or more cognitive processes related to learning. This paper discusses a comprehensive systematic literature review (SLR) of the assistive technology (AT) for children with learning disabilities with combination of Kitchenham and PRISMA approach. This paper discusses on the assistive technologies developed for children with learning disabilities according to its type, purposes, techniques used, and platform or delivery system used to host the developed assistive technologies for children with learning disabilities.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124775371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction of small water body information based on Res2Net-Unet 基于Res2Net-Unet的小水体信息提取
Yong Wang, Yaqi Li, Dingsheng Wang
As the extraction of small water bodies in remote sensing images has problems such as water line interruption and pretzel phenomenon, in order to be able to improve the extraction accuracy of small water bodies, this paper proposes a small water body extraction method based on Res2Net- Unet. The method uses the encoder and decoder structure of the UNet model. Firstly, the ResNet-50 network of the Res2Net module is used as an encoder, thus exploiting the feature information at multiple scales in the image. Secondly, a hybrid domain attention mechanism is incorporated into the decoder structure to fully mine the spatial and channel features in the image. Finally, a jump connection is added between the encoder and decoder to better fuse the features extracted by the encoder and decoder. Experiments on the Chinese Gaofen-1(GF-1) image datasets from two study areas show that the method in this paper is feasible for more complete and more accurate extraction of small water bodies compared with common deep learning models.
针对遥感图像中小水体提取存在水线中断、椒盐卷饼现象等问题,为了能够提高小水体的提取精度,本文提出了一种基于Res2Net- Unet的小水体提取方法。该方法采用UNet模型的编码器和解码器结构。首先,利用Res2Net模块的ResNet-50网络作为编码器,利用图像中多尺度的特征信息。其次,在解码器结构中引入混合域注意机制,充分挖掘图像的空间和通道特征;最后,在编码器和解码器之间添加跳跃连接,以更好地融合编码器和解码器提取的特征。在两个研究区域的中国高分一号(GF-1)图像数据集上进行的实验表明,与普通深度学习模型相比,本文方法能够更完整、更准确地提取小水体。
{"title":"Extraction of small water body information based on Res2Net-Unet","authors":"Yong Wang, Yaqi Li, Dingsheng Wang","doi":"10.1109/IMCOM56909.2023.10035605","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035605","url":null,"abstract":"As the extraction of small water bodies in remote sensing images has problems such as water line interruption and pretzel phenomenon, in order to be able to improve the extraction accuracy of small water bodies, this paper proposes a small water body extraction method based on Res2Net- Unet. The method uses the encoder and decoder structure of the UNet model. Firstly, the ResNet-50 network of the Res2Net module is used as an encoder, thus exploiting the feature information at multiple scales in the image. Secondly, a hybrid domain attention mechanism is incorporated into the decoder structure to fully mine the spatial and channel features in the image. Finally, a jump connection is added between the encoder and decoder to better fuse the features extracted by the encoder and decoder. Experiments on the Chinese Gaofen-1(GF-1) image datasets from two study areas show that the method in this paper is feasible for more complete and more accurate extraction of small water bodies compared with common deep learning models.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129554764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic-Adaptive Scheme for SDN Control Plane with Containerized Architecture 容器化SDN控制平面流量自适应方案
Dang Anh Khoa, Nguyen Trung Kiem, N. Kien, Nguyen Ngoc Tuan, Nguyen Huu Thanh
Software-Defined Networking (SDN) is gaining attention for its flexibility in programmability. It enhances network configuration and provides global visibility for administrators via a single interface. However, the centralized nature of SDN exposes many issues in scalability and resiliency. In this paper, with the advent of cloud computing, we present a containerized architecture capable of fast scaling up and down based on traffic load for SDN control plane. With our novel traffic-adaptive algorithm, the results show that the proposed system is able to fit performance with high incoming new-flow requests and scale down underused controllers for resource efficiency.
软件定义网络(SDN)因其可编程性的灵活性而备受关注。它增强了网络配置,并通过单一接口为管理员提供全局可见性。然而,SDN的集中特性暴露了许多可伸缩性和弹性方面的问题。在本文中,随着云计算的出现,我们提出了一种基于流量负载的SDN控制平面快速伸缩的容器化架构。通过我们的新颖流量自适应算法,结果表明所提出的系统能够适应高传入新流请求的性能,并减少未充分使用的控制器以提高资源效率。
{"title":"Traffic-Adaptive Scheme for SDN Control Plane with Containerized Architecture","authors":"Dang Anh Khoa, Nguyen Trung Kiem, N. Kien, Nguyen Ngoc Tuan, Nguyen Huu Thanh","doi":"10.1109/IMCOM56909.2023.10035625","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035625","url":null,"abstract":"Software-Defined Networking (SDN) is gaining attention for its flexibility in programmability. It enhances network configuration and provides global visibility for administrators via a single interface. However, the centralized nature of SDN exposes many issues in scalability and resiliency. In this paper, with the advent of cloud computing, we present a containerized architecture capable of fast scaling up and down based on traffic load for SDN control plane. With our novel traffic-adaptive algorithm, the results show that the proposed system is able to fit performance with high incoming new-flow requests and scale down underused controllers for resource efficiency.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1