首页 > 最新文献

2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)最新文献

英文 中文
Exploring Deep Learning for Detection of Poultry Activities — Towards an Autonomous Health and Welfare Monitoring in Poultry Farms 探索家禽活动检测的深度学习-迈向家禽农场的自主健康和福利监测
Ivan Roy S. Evangelista, Lenmar T. Catajay, A. Bandala, Ronnie S. Concepcion, E. Sybingco, E. Dadios
The health condition of poultry significantly affects egg production, meat quality, and reproduction. Behavioral activities such as feeding patterns can be indicators of their current welfare. However, assessing through on-site observation is tedious, time-consuming, possibly biased, and can induce stress to the birds. Hence, employment of an autonomous surveillance system that can continuously and noninvasively monitor the poultry behaviors is the most viable approach. In this study, detection of quail activities: eating, drinking, and roaming, is administered using computer vision (CV) and deep learning (DL). Four DL models, YOLOv5, YOLOX, Faster R-CNN, and EfficientDet, were explored to detect quail activities in cages. The three models YOLOv5, YOLOX, and Faster R-CNN, achieved an average precision (AP) of 85.52, 79.31, and 74.28, respectively. For the EfficientDet model, the training was evaluated using total loss. A total loss of 0.1616 was achieved at 10,000 iterations. All the DL models performed impressively in detecting quail activities in cages. This study contributes to the development of an intelligent health assessment system for poultry.
家禽的健康状况对产蛋量、肉质和繁殖有显著影响。进食模式等行为活动可以作为它们当前福利状况的指标。然而,通过现场观察进行评估是繁琐、耗时、可能有偏见的,并且会给鸟类带来压力。因此,采用能够持续无创监测家禽行为的自主监测系统是最可行的方法。在这项研究中,使用计算机视觉(CV)和深度学习(DL)来检测鹌鹑的活动:进食、饮水和漫游。利用四种DL模型YOLOv5、YOLOX、Faster R-CNN和EfficientDet进行笼中鹌鹑活动检测。YOLOv5、YOLOX和Faster R-CNN三种模型的平均精度(AP)分别为85.52、79.31和74.28。对于effentdet模型,使用总损失来评估训练。在10,000次迭代中实现了0.1616的总损失。所有DL模型在检测笼中鹌鹑活动方面表现令人印象深刻。本研究有助于家禽健康智能评估系统的开发。
{"title":"Exploring Deep Learning for Detection of Poultry Activities — Towards an Autonomous Health and Welfare Monitoring in Poultry Farms","authors":"Ivan Roy S. Evangelista, Lenmar T. Catajay, A. Bandala, Ronnie S. Concepcion, E. Sybingco, E. Dadios","doi":"10.1109/IMCOM56909.2023.10035656","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035656","url":null,"abstract":"The health condition of poultry significantly affects egg production, meat quality, and reproduction. Behavioral activities such as feeding patterns can be indicators of their current welfare. However, assessing through on-site observation is tedious, time-consuming, possibly biased, and can induce stress to the birds. Hence, employment of an autonomous surveillance system that can continuously and noninvasively monitor the poultry behaviors is the most viable approach. In this study, detection of quail activities: eating, drinking, and roaming, is administered using computer vision (CV) and deep learning (DL). Four DL models, YOLOv5, YOLOX, Faster R-CNN, and EfficientDet, were explored to detect quail activities in cages. The three models YOLOv5, YOLOX, and Faster R-CNN, achieved an average precision (AP) of 85.52, 79.31, and 74.28, respectively. For the EfficientDet model, the training was evaluated using total loss. A total loss of 0.1616 was achieved at 10,000 iterations. All the DL models performed impressively in detecting quail activities in cages. This study contributes to the development of an intelligent health assessment system for poultry.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127911593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Synthesized Satellite Images Using Deep Neural Networks 基于深度神经网络的合成卫星图像检测
W. Liao, Yi-Shan Chang, Yi-Chieh Wu
The technology of generative adversarial networks (GAN) is constantly evolving, and synthesized images can no longer be accurately distinguished by the human eyes alone. GAN has been applied to the analysis of satellite images, mostly for the purpose of data augmentation. Recently, however, we have seen a twist in its usage. In information warfare, GAN has been used to create fake satellite images or modify the image content by putting fake bridges, buildings and clouds to mislead or conceal important intelligence. To address the increasing counterfeit cases in satellite images, the goal of this research is to develop algorithms that can classify fake remote sensing images robustly and efficiently. There exist many techniques to synthesize or manipulate the content of satellite images. In this paper, we focus on the case when the entire image is forged. Three satellite image synthesis methods, including ProGAN, cGAN and CycleGAN will be investigated. The effect of image pre-processing such as histogram equalization and bilateral filter will also be evaluated. Experiments show that satellite images generated by different GANs can be easily identified by individually trained models. The performance degraded when model trained with one type of GAN samples is employed to determine the originality of images synthesized with other types of GANs. Additionally, when histogram equalization is applied to the images, the detection model fails to distinguish its authenticity. A four-class universal classification model is proposed to address this issue. An overall accuracy of over 99% has been achieved even when pre-processing has been applied.
摘要生成对抗网络(GAN)技术在不断发展,人工合成的图像已不能单靠人眼准确识别。GAN已经应用于卫星图像的分析,主要是为了增强数据。然而,最近我们看到它的用法发生了变化。在信息战中,GAN被用于制造假卫星图像或通过放置假的桥梁、建筑物和云来修改图像内容,以误导或隐瞒重要情报。为了解决卫星图像中越来越多的伪造案例,本研究的目标是开发能够鲁棒有效地对伪造遥感图像进行分类的算法。目前存在许多合成或操纵卫星图像内容的技术。本文主要研究了整幅图像被伪造的情况。研究了ProGAN、cGAN和CycleGAN三种卫星图像合成方法。对直方图均衡化和双边滤波等图像预处理的效果也进行了评价。实验表明,不同gan生成的卫星图像可以通过单独训练的模型轻松识别。当使用一种GAN样本训练的模型来确定由其他类型GAN合成的图像的原创性时,性能会下降。此外,当对图像进行直方图均衡化时,检测模型无法区分其真实性。为了解决这一问题,提出了一个四类通用分类模型。即使进行了预处理,总体精度也达到了99%以上。
{"title":"Detection of Synthesized Satellite Images Using Deep Neural Networks","authors":"W. Liao, Yi-Shan Chang, Yi-Chieh Wu","doi":"10.1109/IMCOM56909.2023.10035570","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035570","url":null,"abstract":"The technology of generative adversarial networks (GAN) is constantly evolving, and synthesized images can no longer be accurately distinguished by the human eyes alone. GAN has been applied to the analysis of satellite images, mostly for the purpose of data augmentation. Recently, however, we have seen a twist in its usage. In information warfare, GAN has been used to create fake satellite images or modify the image content by putting fake bridges, buildings and clouds to mislead or conceal important intelligence. To address the increasing counterfeit cases in satellite images, the goal of this research is to develop algorithms that can classify fake remote sensing images robustly and efficiently. There exist many techniques to synthesize or manipulate the content of satellite images. In this paper, we focus on the case when the entire image is forged. Three satellite image synthesis methods, including ProGAN, cGAN and CycleGAN will be investigated. The effect of image pre-processing such as histogram equalization and bilateral filter will also be evaluated. Experiments show that satellite images generated by different GANs can be easily identified by individually trained models. The performance degraded when model trained with one type of GAN samples is employed to determine the originality of images synthesized with other types of GANs. Additionally, when histogram equalization is applied to the images, the detection model fails to distinguish its authenticity. A four-class universal classification model is proposed to address this issue. An overall accuracy of over 99% has been achieved even when pre-processing has been applied.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When social networks meet payment: a security perspective 当社交网络遇到支付时:一个安全的视角
Nivedita Singh, M. A. Alawami, Hyoungshick Kim
In the big data arena, opportunities and challenges are mixed. The volume of data in the financial institution is proliferating, which imposes a challenge to big data analytics to ensure safety during each transaction. Moreover, as more and more social networking sites (SNS) are integrating an inbuilt online payment system into their domain, an exponential surge in financial scams is expected in the upcoming days. These scenarios are alarming, and with the rapid growth in the daily addition of new end users and their increasing time spent on SNS, the situations become more vulnerable. With the existing trend of data mobilizations and rapid increase in volume, variety, and velocity of data being produced, big data has a significant role in detecting fraud incidents in financial transactions. However, in the framework of present followed international standards, there is a voluntary compliance obligation on domestic governing bodies, which is a significant source for such voluminous financial frauds on SNS. In order to strengthen the enforcement of international standards to combat financial transactions on SNS, the paper proposes that domestic legislation should comply with international standards with the further addition of machine learning encircled by domestic banking legislation. Eventually, this could solve the security and privacy governance difficulties arising from these financial frauds over SNS. We believe that with our approach of three-layer security i.e. by international standards, domestic legislation, and machine learning, the finan-cial fraud arising due to the SNS payment system will be reduced to a larger extent.
在大数据领域,机遇与挑战并存。金融机构的数据量正在激增,这对大数据分析提出了挑战,以确保每笔交易的安全。此外,随着越来越多的社交网站(SNS)将内置在线支付系统整合到自己的域名中,预计在未来的日子里,金融诈骗将呈指数级增长。这些情况令人担忧,随着每天新增终端用户的快速增长以及他们在SNS上花费的时间的增加,这种情况变得更加脆弱。随着数据动员的趋势和数据量、种类和速度的快速增长,大数据在检测金融交易中的欺诈事件方面发挥了重要作用。然而,在目前遵循的国际标准框架下,国内管理机构有自愿遵守的义务,这是社交媒体上大量金融欺诈的重要来源。为了加强执行国际标准以打击SNS上的金融交易,本文建议国内立法应符合国际标准,并在国内银行立法中进一步增加机器学习。最终,这可以解决这些社交网络金融欺诈所带来的安全和隐私治理难题。我们相信,通过我们的国际标准、国内立法和机器学习三层安全的方法,将在更大程度上减少由于SNS支付系统而产生的金融欺诈。
{"title":"When social networks meet payment: a security perspective","authors":"Nivedita Singh, M. A. Alawami, Hyoungshick Kim","doi":"10.1109/IMCOM56909.2023.10035613","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035613","url":null,"abstract":"In the big data arena, opportunities and challenges are mixed. The volume of data in the financial institution is proliferating, which imposes a challenge to big data analytics to ensure safety during each transaction. Moreover, as more and more social networking sites (SNS) are integrating an inbuilt online payment system into their domain, an exponential surge in financial scams is expected in the upcoming days. These scenarios are alarming, and with the rapid growth in the daily addition of new end users and their increasing time spent on SNS, the situations become more vulnerable. With the existing trend of data mobilizations and rapid increase in volume, variety, and velocity of data being produced, big data has a significant role in detecting fraud incidents in financial transactions. However, in the framework of present followed international standards, there is a voluntary compliance obligation on domestic governing bodies, which is a significant source for such voluminous financial frauds on SNS. In order to strengthen the enforcement of international standards to combat financial transactions on SNS, the paper proposes that domestic legislation should comply with international standards with the further addition of machine learning encircled by domestic banking legislation. Eventually, this could solve the security and privacy governance difficulties arising from these financial frauds over SNS. We believe that with our approach of three-layer security i.e. by international standards, domestic legislation, and machine learning, the finan-cial fraud arising due to the SNS payment system will be reduced to a larger extent.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117086410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dual ResNet-based Environmental Sound Classification using GAN 基于双resnet的GAN环境声音分类
Se-Young Jang, Yanggon Kim
Various deep learning studies have been gaining interest in environmental sound classification. In recent years, as the performance of image classification in deep learning increases, the field of converting and classifying audio data into images to classify has been steadily drawing attention. However, publicly accessible sound datasets are limited, so it is difficult to develop environmental sound classification compared to other classification. Among many augmentation methods, approaches are being made to generate synthetic data through a generative adversarial network for augmentation. In this paper, we suggest a deep learning framework that allows simultaneous learning of synthetic data and original data. Our network uses dual ResNet18, and it allows GAN-generated synthetic data and original data to be learned simultaneously within the network. The proposed method is evaluated through UrbanSound8K dataset. As a result, it showed a performance improvement compared to the method used as synthetic data augmentation in terms of learning efficiency and accuracy.
各种深度学习研究已经引起了人们对环境声音分类的兴趣。近年来,随着深度学习中图像分类性能的提高,将音频数据转换为图像并进行分类的领域也不断受到关注。然而,可公开访问的声音数据集有限,因此与其他分类相比,很难建立环境声音分类。在许多增强方法中,正在研究通过生成对抗网络生成合成数据的方法。在本文中,我们提出了一个允许同时学习合成数据和原始数据的深度学习框架。我们的网络使用双ResNet18,它允许gan生成的合成数据和原始数据在网络中同时学习。通过UrbanSound8K数据集对该方法进行了评估。结果表明,在学习效率和准确性方面,与使用合成数据增强的方法相比,该方法的性能有所提高。
{"title":"Dual ResNet-based Environmental Sound Classification using GAN","authors":"Se-Young Jang, Yanggon Kim","doi":"10.1109/IMCOM56909.2023.10035597","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035597","url":null,"abstract":"Various deep learning studies have been gaining interest in environmental sound classification. In recent years, as the performance of image classification in deep learning increases, the field of converting and classifying audio data into images to classify has been steadily drawing attention. However, publicly accessible sound datasets are limited, so it is difficult to develop environmental sound classification compared to other classification. Among many augmentation methods, approaches are being made to generate synthetic data through a generative adversarial network for augmentation. In this paper, we suggest a deep learning framework that allows simultaneous learning of synthetic data and original data. Our network uses dual ResNet18, and it allows GAN-generated synthetic data and original data to be learned simultaneously within the network. The proposed method is evaluated through UrbanSound8K dataset. As a result, it showed a performance improvement compared to the method used as synthetic data augmentation in terms of learning efficiency and accuracy.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Exchange Protocol for Weak Links with Hybrid-RIS in Wireless Networks 基于混合ris的无线网络弱链路数据交换协议
J. Yoon, K. Kim, Tae-Jin Lee
In an indoor wireless network environment com-posed of Internet of Things (loT) devices, there can be devices that transmit data in a weak link due to obstacles and low transmission power. To solve the problem without additional energy consumption of devices, a new Medium Access Control (MAC) protocol is required for receiving data from the devices in the weak link. In this paper, we propose an energy-efficient MAC protocol that the AP can collect data by using a Hybrid- Reconfigurable Intelligent Surface (H - RIS). In the proposed network, the Access Point (AP) can distinguish the packet-level failure of the weak link and control the H - RIS to receive data from the device. Using simulations, we have shown that our proposed method can enhance the performance of the network throughput and energy efficiency of devices.
在由物联网(loT)设备组成的室内无线网络环境中,由于障碍物和传输功率低,可能会有设备在弱链路上传输数据。为了在不增加设备能耗的前提下解决这个问题,需要一种新的MAC (Medium Access Control)协议来接收弱链路设备的数据。在本文中,我们提出了一种节能的MAC协议,AP可以使用混合可重构智能表面(H - RIS)来收集数据。在该网络中,接入点(AP)可以识别弱链路的包级故障,并控制H - RIS接收设备的数据。通过仿真,我们证明了我们提出的方法可以提高网络吞吐量和设备的能源效率。
{"title":"Data Exchange Protocol for Weak Links with Hybrid-RIS in Wireless Networks","authors":"J. Yoon, K. Kim, Tae-Jin Lee","doi":"10.1109/IMCOM56909.2023.10035568","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035568","url":null,"abstract":"In an indoor wireless network environment com-posed of Internet of Things (loT) devices, there can be devices that transmit data in a weak link due to obstacles and low transmission power. To solve the problem without additional energy consumption of devices, a new Medium Access Control (MAC) protocol is required for receiving data from the devices in the weak link. In this paper, we propose an energy-efficient MAC protocol that the AP can collect data by using a Hybrid- Reconfigurable Intelligent Surface (H - RIS). In the proposed network, the Access Point (AP) can distinguish the packet-level failure of the weak link and control the H - RIS to receive data from the device. Using simulations, we have shown that our proposed method can enhance the performance of the network throughput and energy efficiency of devices.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disease Identification in Potato Leaves using Swin Transformer 用Swin变压器鉴定马铃薯叶片病害
Li-Hua Li, Radius Tanone
One of Indonesia's mainstay agricultural products is the potato. Disease prevention is essential for maintaining stable potato production. One technique for detecting disease in potatoes is to determine whether potato leaves are diseased (early blight or late blight) or healthy. Deep Learning models have been widely developed and used to classify disease recognition in potato leaves in the industrial era 4.0. Swin Transformer is a deep learning model based on transformers that is more efficient and accurate at solving classification problems. The Swin Transformer, a transformer based deep learning approach, is used in this study to identify diseases of the potato leaf. Moreover, several metrics including Precision, Recall, Accuracy, and F1 score, are used to assess the experimental results of the model we use. In terms of accuracy, the value obtained when training with this model is 97.70%. These findings indicate that using the Swin Transformer model to identify potato leaf diseases could be a new trend in agricultural research.
土豆是印尼的主要农产品之一。预防病害是保持马铃薯稳定生产的关键。检测马铃薯疾病的一种技术是确定马铃薯叶片是否患病(早疫病或晚疫病)或健康。深度学习模型在工业4.0时代得到了广泛的发展,并被用于马铃薯叶片的疾病识别分类。Swin Transformer是一种基于变压器的深度学习模型,在解决分类问题时更加高效和准确。Swin Transformer是一种基于变压器的深度学习方法,在本研究中用于识别马铃薯叶片的疾病。此外,还使用了几个指标,包括Precision, Recall, Accuracy和F1分数,来评估我们使用的模型的实验结果。在准确率方面,使用该模型进行训练时得到的值为97.70%。这些结果表明,利用Swin Transformer模型识别马铃薯叶片病害可能是农业研究的一个新趋势。
{"title":"Disease Identification in Potato Leaves using Swin Transformer","authors":"Li-Hua Li, Radius Tanone","doi":"10.1109/IMCOM56909.2023.10035609","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035609","url":null,"abstract":"One of Indonesia's mainstay agricultural products is the potato. Disease prevention is essential for maintaining stable potato production. One technique for detecting disease in potatoes is to determine whether potato leaves are diseased (early blight or late blight) or healthy. Deep Learning models have been widely developed and used to classify disease recognition in potato leaves in the industrial era 4.0. Swin Transformer is a deep learning model based on transformers that is more efficient and accurate at solving classification problems. The Swin Transformer, a transformer based deep learning approach, is used in this study to identify diseases of the potato leaf. Moreover, several metrics including Precision, Recall, Accuracy, and F1 score, are used to assess the experimental results of the model we use. In terms of accuracy, the value obtained when training with this model is 97.70%. These findings indicate that using the Swin Transformer model to identify potato leaf diseases could be a new trend in agricultural research.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133370737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Topical Analysis of Depressive Mood Changes in Youth during the COVID-19 Pandemic COVID-19大流行期间青少年抑郁情绪变化的局部分析
Ziyue Zhu, Yuanyuan Wang
This paper investigates the mood changes of youth groups during the social closure control of the COVID-19 pan-demic and the primary causes of those changes, taking Chinese online video platforms as an example. We also compare the main concerns of various periods to provide feasible references and suggestions on psychological interventions for young people during the social closure control period. In this study, we identified mood changes during the COVID-19 pandemic with 31,213 comments on the news videos of the Bilibili video platform through four stages: data collection, data processing, LDA topic modeling, and mood identification. Through a comparative analysis, we investigated the topical features of young people's mood changes in three COVID-19 periods: pre-, mid-, and late-epidemic. As a result, we found that social isolation measures such as closure and homeschooling with long-term Internet use during the epidemic were more likely to cause depression in young people.
本文以中国网络视频平台为例,调查新冠肺炎疫情防控过程中青年群体的情绪变化及其主要原因。比较不同时期青少年的主要关注点,为社会封闭控制期青少年心理干预提供可行的参考和建议。在本研究中,我们通过收集数据、处理数据、LDA主题建模和情绪识别四个阶段,对Bilibili视频平台新闻视频中的31213条评论进行了COVID-19大流行期间的情绪变化识别。通过对比分析,我们调查了新冠肺炎流行前、中期和晚期三个时期年轻人情绪变化的主题特征。因此,我们发现,在疫情期间长期使用互联网的社会隔离措施,如关闭和在家上学,更有可能导致年轻人抑郁。
{"title":"Topical Analysis of Depressive Mood Changes in Youth during the COVID-19 Pandemic","authors":"Ziyue Zhu, Yuanyuan Wang","doi":"10.1109/IMCOM56909.2023.10035626","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035626","url":null,"abstract":"This paper investigates the mood changes of youth groups during the social closure control of the COVID-19 pan-demic and the primary causes of those changes, taking Chinese online video platforms as an example. We also compare the main concerns of various periods to provide feasible references and suggestions on psychological interventions for young people during the social closure control period. In this study, we identified mood changes during the COVID-19 pandemic with 31,213 comments on the news videos of the Bilibili video platform through four stages: data collection, data processing, LDA topic modeling, and mood identification. Through a comparative analysis, we investigated the topical features of young people's mood changes in three COVID-19 periods: pre-, mid-, and late-epidemic. As a result, we found that social isolation measures such as closure and homeschooling with long-term Internet use during the epidemic were more likely to cause depression in young people.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic-Adaptive Scheme for SDN Control Plane with Containerized Architecture 容器化SDN控制平面流量自适应方案
Dang Anh Khoa, Nguyen Trung Kiem, N. Kien, Nguyen Ngoc Tuan, Nguyen Huu Thanh
Software-Defined Networking (SDN) is gaining attention for its flexibility in programmability. It enhances network configuration and provides global visibility for administrators via a single interface. However, the centralized nature of SDN exposes many issues in scalability and resiliency. In this paper, with the advent of cloud computing, we present a containerized architecture capable of fast scaling up and down based on traffic load for SDN control plane. With our novel traffic-adaptive algorithm, the results show that the proposed system is able to fit performance with high incoming new-flow requests and scale down underused controllers for resource efficiency.
软件定义网络(SDN)因其可编程性的灵活性而备受关注。它增强了网络配置,并通过单一接口为管理员提供全局可见性。然而,SDN的集中特性暴露了许多可伸缩性和弹性方面的问题。在本文中,随着云计算的出现,我们提出了一种基于流量负载的SDN控制平面快速伸缩的容器化架构。通过我们的新颖流量自适应算法,结果表明所提出的系统能够适应高传入新流请求的性能,并减少未充分使用的控制器以提高资源效率。
{"title":"Traffic-Adaptive Scheme for SDN Control Plane with Containerized Architecture","authors":"Dang Anh Khoa, Nguyen Trung Kiem, N. Kien, Nguyen Ngoc Tuan, Nguyen Huu Thanh","doi":"10.1109/IMCOM56909.2023.10035625","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035625","url":null,"abstract":"Software-Defined Networking (SDN) is gaining attention for its flexibility in programmability. It enhances network configuration and provides global visibility for administrators via a single interface. However, the centralized nature of SDN exposes many issues in scalability and resiliency. In this paper, with the advent of cloud computing, we present a containerized architecture capable of fast scaling up and down based on traffic load for SDN control plane. With our novel traffic-adaptive algorithm, the results show that the proposed system is able to fit performance with high incoming new-flow requests and scale down underused controllers for resource efficiency.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assistive Technology for Children with Learning Disabilities: A Systematic Literature Review 学习障碍儿童的辅助技术:系统文献综述
Ahmad Haiqal Abd Khalid, Nur Nazihah Mohkhlas, N. A. Zakaria, Mazidah Mat Rejab, Ruwinah Abdul Karim, Suharsiwi Suharsiwi
The enhancement of technology is well-developed and assistive technology is one of the foremost that has been used significantly. Individuals with disabilities use assistive technology to perform the desired activity that would otherwise be difficult or impossible. Mobility devices such as walkers and wheelchairs, as well as hardware, software, and peripherals that assist people with disabilities in accessing computers or other information technologies, are examples of assistive technology. Learning disabilities are caused by genetic and neurobiological factors that affect brain functioning, influencing one or more cognitive processes related to learning. This paper discusses a comprehensive systematic literature review (SLR) of the assistive technology (AT) for children with learning disabilities with combination of Kitchenham and PRISMA approach. This paper discusses on the assistive technologies developed for children with learning disabilities according to its type, purposes, techniques used, and platform or delivery system used to host the developed assistive technologies for children with learning disabilities.
技术的增强是发达的,辅助技术是最重要的技术之一,已被大量使用。残障人士使用辅助技术来完成原本很难或不可能完成的预期活动。助行器和轮椅等行动设备,以及帮助残疾人使用计算机或其他信息技术的硬件、软件和外围设备,都是辅助技术的例子。学习障碍是由影响大脑功能的遗传和神经生物学因素引起的,影响与学习有关的一个或多个认知过程。本文对Kitchenham方法与PRISMA方法相结合的学习障碍儿童辅助技术(AT)进行了全面系统的文献综述。本文从学习障碍儿童辅助技术的类型、用途、使用的技术以及用于承载这些已开发的学习障碍儿童辅助技术的平台或交付系统等方面进行了讨论。
{"title":"Assistive Technology for Children with Learning Disabilities: A Systematic Literature Review","authors":"Ahmad Haiqal Abd Khalid, Nur Nazihah Mohkhlas, N. A. Zakaria, Mazidah Mat Rejab, Ruwinah Abdul Karim, Suharsiwi Suharsiwi","doi":"10.1109/IMCOM56909.2023.10035638","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035638","url":null,"abstract":"The enhancement of technology is well-developed and assistive technology is one of the foremost that has been used significantly. Individuals with disabilities use assistive technology to perform the desired activity that would otherwise be difficult or impossible. Mobility devices such as walkers and wheelchairs, as well as hardware, software, and peripherals that assist people with disabilities in accessing computers or other information technologies, are examples of assistive technology. Learning disabilities are caused by genetic and neurobiological factors that affect brain functioning, influencing one or more cognitive processes related to learning. This paper discusses a comprehensive systematic literature review (SLR) of the assistive technology (AT) for children with learning disabilities with combination of Kitchenham and PRISMA approach. This paper discusses on the assistive technologies developed for children with learning disabilities according to its type, purposes, techniques used, and platform or delivery system used to host the developed assistive technologies for children with learning disabilities.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124775371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert Communication over Federated Learning Channel 联邦学习信道上的秘密通信
S. Kim
We propose a novel covert communication technique between the federated learning (FL) server and participants without affecting the FL performance. The FL server superimposes the covert message onto the aggregated gradient and broadcasts the superimposed signal to all FL participants. FL participants decode the covert message treating the aggregated gradient as interference, and restore the original global model after removing the covert message from the superimposed signal. Therefore, the FL performance is not affected by sending the covert message. We analyze the covertness of communication against the adversary that monitors the statistical distribution of model updates. We derive the maximum achievable transmission rate of the covert message without being detected by the adversary and without affecting the federated learning performance.
提出了一种在不影响联邦学习性能的情况下,在联邦学习服务器和参与者之间进行隐蔽通信的新方法。FL服务器将隐蔽消息叠加到聚合梯度上,并将叠加的信号广播给所有FL参与者。FL参与者将聚集的梯度作为干扰对隐蔽信息进行解码,并从叠加信号中去除隐蔽信息后恢复原始全局模型。因此,发送隐蔽消息不会影响FL的性能。我们针对监视模型更新的统计分布的对手分析通信的隐蔽性。我们在不被对手检测和不影响联邦学习性能的情况下推导出隐蔽消息的最大可实现传输速率。
{"title":"Covert Communication over Federated Learning Channel","authors":"S. Kim","doi":"10.1109/IMCOM56909.2023.10035576","DOIUrl":"https://doi.org/10.1109/IMCOM56909.2023.10035576","url":null,"abstract":"We propose a novel covert communication technique between the federated learning (FL) server and participants without affecting the FL performance. The FL server superimposes the covert message onto the aggregated gradient and broadcasts the superimposed signal to all FL participants. FL participants decode the covert message treating the aggregated gradient as interference, and restore the original global model after removing the covert message from the superimposed signal. Therefore, the FL performance is not affected by sending the covert message. We analyze the covertness of communication against the adversary that monitors the statistical distribution of model updates. We derive the maximum achievable transmission rate of the covert message without being detected by the adversary and without affecting the federated learning performance.","PeriodicalId":230213,"journal":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1