首页 > 最新文献

2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)最新文献

英文 中文
Resolving IGMP Difference Among Routers and Devices for Improving Interconnectivity in Home Networks 解决路由器和设备间的IGMP差异,提高家庭网络的互联性
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00037
Moe Hamamoto, Takashi Murakami, Hiroshi Sugimura, M. Isshiki
There are many standards for interconnectivity technology in home networks, and many of them use multicast communications. In these standards, the method to implement IGMP, a protocol for group management of multicast in IPv4, is outside the scope for the standard. Therefore, the operation of IGMP at each terminal may be different depending on the interpretation by the developer of the standard regarding IGMP. Some home routers do not implement IGMP according to any standard, so depending on the combination of the terminal and home router, interconnection using multicast communication may not be possible in some cases. In this paper, we investigate the implementation related to IGMP of home routers that prevent interconnectivity of home network technologies. In addition, we clarify the issue and propose a method to improve interconnectivity in the implementation on the terminal side against the home router issue. Furthermore, evaluation and consideration of the proposed method are described.
家庭网络互连技术有许多标准,其中许多标准都使用组播通信。在这些标准中,实现IPv4组播组管理协议IGMP的方法不在标准的范围之内。因此,IGMP在每个终端的操作可能会因标准制定者对IGMP的解释而有所不同。一些家用路由器没有按照任何标准实现IGMP,因此根据终端和家用路由器的组合,在某些情况下可能无法使用组播通信进行互连。在本文中,我们研究了家庭路由器的IGMP相关实现,它阻止了家庭网络技术的互连。此外,针对家庭路由器的问题,我们对问题进行了澄清,并提出了在终端端实现中提高互连性的方法。此外,还描述了所提出方法的评价和考虑。
{"title":"Resolving IGMP Difference Among Routers and Devices for Improving Interconnectivity in Home Networks","authors":"Moe Hamamoto, Takashi Murakami, Hiroshi Sugimura, M. Isshiki","doi":"10.1109/Ubi-Media.2019.00037","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00037","url":null,"abstract":"There are many standards for interconnectivity technology in home networks, and many of them use multicast communications. In these standards, the method to implement IGMP, a protocol for group management of multicast in IPv4, is outside the scope for the standard. Therefore, the operation of IGMP at each terminal may be different depending on the interpretation by the developer of the standard regarding IGMP. Some home routers do not implement IGMP according to any standard, so depending on the combination of the terminal and home router, interconnection using multicast communication may not be possible in some cases. In this paper, we investigate the implementation related to IGMP of home routers that prevent interconnectivity of home network technologies. In addition, we clarify the issue and propose a method to improve interconnectivity in the implementation on the terminal side against the home router issue. Furthermore, evaluation and consideration of the proposed method are described.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opinion Mining on E-Commerce Data Using Sentiment Analysis and K-Medoid Clustering 基于情感分析和k - media聚类的电子商务数据意见挖掘
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00040
U. Rahardja, T. Hariguna, Wiga Maaulana Baihaqi
This study aimed to analyze sentiment opinions to find out the opinions of users on an e-commerce Web. The method used was through analyzing text reviews obtained from customers on an e-commerce website. The algorithm used was k-medoid clustering.
本研究旨在分析情感意见,以了解电子商务网站上用户的意见。使用的方法是通过分析从电子商务网站上的客户那里获得的文本评论。使用的算法是k- medium聚类。
{"title":"Opinion Mining on E-Commerce Data Using Sentiment Analysis and K-Medoid Clustering","authors":"U. Rahardja, T. Hariguna, Wiga Maaulana Baihaqi","doi":"10.1109/Ubi-Media.2019.00040","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00040","url":null,"abstract":"This study aimed to analyze sentiment opinions to find out the opinions of users on an e-commerce Web. The method used was through analyzing text reviews obtained from customers on an e-commerce website. The algorithm used was k-medoid clustering.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130184777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
A Novel Preprocessing Method for Solving Long Sequence Problem in Android Malware Detection Android恶意软件检测中一种解决长序列问题的预处理方法
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00012
Yi Ming Chen, C. H. Hsu, Kuo Chung Kuo Chung
Traditional machine learning mostly uses N-gram methods for serialization data prediction, which is not only time-consuming in the pre-processing but also computationally expensive for the model. For the current common malware detection methods, a variety of features such as API, system call, control flow, and permissions are used for machine learning analysis. However, these features depend on expert analysis and to extract multiple features is also time-consuming. This study uses Dalvik opcode as a feature, which is information rich and easy to extract. However, for the time series features of the opcode, the LSTM model and other sequence models will need effective dimension reduction approach because of the long sequence problem and variable feature length, resulting in poor training performance and long training time. Some study uses the training Embedding layer and Autoencoder to reduce the feature dimension. This method requires a layer of network training time. Another method is through feature selection. This method will result in different results as long as the data set changes or the sequence semantic is lost after feature selection. Therefore, in order to solve the above problems, this paper proposes a new preprocessing method to solve the long sequence problem that the LSTM model will encounter, so as to achieve fast training and high accuracy. This study uses a new pre-processing approach combined with an LSTM model to detect malware and achieve 95.58% accuracy on Drebin 10 family and only take 45 seconds to train a model. In addition, in the face of the small training sample problems common to deep learning, this research experiment also proved effective.
传统的机器学习多采用N-gram方法进行序列化数据预测,不仅预处理时间长,而且模型计算量大。对于目前常见的恶意软件检测方法,使用API、系统调用、控制流、权限等多种特性进行机器学习分析。然而,这些特征依赖于专家的分析,并且提取多个特征也很耗时。本研究采用Dalvik操作码作为特征,信息丰富,易于提取。然而,对于操作码的时间序列特征,LSTM模型和其他序列模型由于序列问题长,特征长度多变,需要有效的降维方法,导致训练性能差,训练时间长。一些研究使用训练嵌入层和自编码器来降低特征维数。这种方法需要一层网络的训练时间。另一种方法是通过特征选择。只要数据集发生变化或特征选择后序列语义丢失,这种方法就会导致不同的结果。因此,为了解决上述问题,本文提出了一种新的预处理方法来解决LSTM模型会遇到的长序列问题,从而实现快速训练和高精度。本研究采用一种新的预处理方法结合LSTM模型来检测恶意软件,在Drebin 10家族上准确率达到95.58%,训练模型仅需45秒。此外,面对深度学习常见的小训练样本问题,本研究实验也被证明是有效的。
{"title":"A Novel Preprocessing Method for Solving Long Sequence Problem in Android Malware Detection","authors":"Yi Ming Chen, C. H. Hsu, Kuo Chung Kuo Chung","doi":"10.1109/Ubi-Media.2019.00012","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00012","url":null,"abstract":"Traditional machine learning mostly uses N-gram methods for serialization data prediction, which is not only time-consuming in the pre-processing but also computationally expensive for the model. For the current common malware detection methods, a variety of features such as API, system call, control flow, and permissions are used for machine learning analysis. However, these features depend on expert analysis and to extract multiple features is also time-consuming. This study uses Dalvik opcode as a feature, which is information rich and easy to extract. However, for the time series features of the opcode, the LSTM model and other sequence models will need effective dimension reduction approach because of the long sequence problem and variable feature length, resulting in poor training performance and long training time. Some study uses the training Embedding layer and Autoencoder to reduce the feature dimension. This method requires a layer of network training time. Another method is through feature selection. This method will result in different results as long as the data set changes or the sequence semantic is lost after feature selection. Therefore, in order to solve the above problems, this paper proposes a new preprocessing method to solve the long sequence problem that the LSTM model will encounter, so as to achieve fast training and high accuracy. This study uses a new pre-processing approach combined with an LSTM model to detect malware and achieve 95.58% accuracy on Drebin 10 family and only take 45 seconds to train a model. In addition, in the face of the small training sample problems common to deep learning, this research experiment also proved effective.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generating a 3D Hand Model from Position of Fingertip Using Image Processing Technique 利用图像处理技术从指尖位置生成三维手部模型
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00020
Natthapach Anuwattananon, S. Ruengittinun
A gesture from hands and fingers have rich meanings in communication even without a word of sound. It would be very useful if a computer can understand a hand gesture. Hence, we can use a hand gesture to communicate with a robot and perform certain activities. This study focuses on tracking the position of each fingertip and palm to make a computer knows the gesture of a hand. The proposed solution was initially implemented using a MS Kinect camera while capturing a depth image of a human hand. Then, we applied some image processing algorithms to track the positions of fingertips. Finally, the result was visualized in a real-time 3D hand model based on the movements/signs given by a human hand. The experiment results indicate that the proposed approach can literally track the positions of a fingertip.
即使没有声音,手和手指的手势在交流中也有丰富的含义。如果计算机能理解一个手势,那将是非常有用的。因此,我们可以使用手势与机器人进行交流并执行某些活动。这项研究的重点是跟踪每个指尖和手掌的位置,让电脑知道手的手势。提出的解决方案最初是通过MS Kinect摄像头来实现的,同时捕捉人手的深度图像。然后,我们应用了一些图像处理算法来跟踪指尖的位置。最后,根据人手的动作/手势,将结果显示在实时3D手部模型中。实验结果表明,该方法可以准确地跟踪指尖的位置。
{"title":"Generating a 3D Hand Model from Position of Fingertip Using Image Processing Technique","authors":"Natthapach Anuwattananon, S. Ruengittinun","doi":"10.1109/Ubi-Media.2019.00020","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00020","url":null,"abstract":"A gesture from hands and fingers have rich meanings in communication even without a word of sound. It would be very useful if a computer can understand a hand gesture. Hence, we can use a hand gesture to communicate with a robot and perform certain activities. This study focuses on tracking the position of each fingertip and palm to make a computer knows the gesture of a hand. The proposed solution was initially implemented using a MS Kinect camera while capturing a depth image of a human hand. Then, we applied some image processing algorithms to track the positions of fingertips. Finally, the result was visualized in a real-time 3D hand model based on the movements/signs given by a human hand. The experiment results indicate that the proposed approach can literally track the positions of a fingertip.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124529810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Master-Slave Isomorphic Module for IoT Service System 面向物联网服务系统的可扩展主从同构模块
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00051
Wen-Yo Lee, C. Shih, Ti-Hung Chen, Yung-Hui Chen
This paper shows a master-slave module, which is based on a PCB board. The isomorphic circuit board can be the master or the slave through setup the configuration bits. The design can be introduced to several industrial fields, for example, the remote-based control system and the procedure control system, etc. According to the previous work of the researches, the IoT have been introduced to design the industrial equipment; nevertheless, there still have a lot of applications do not have been served. The IoT offers the information all about a system, so the equipment can be taken care anywhere anytime. In this paper, a dental system for the teeth root examining system is developed by the isomorphic master-slave module. It reduces not only the hardware complexity, but also the system development cost.
本文介绍了一种基于PCB板的主从模块。通过设置配置位,同构电路板可以是主从板。该设计可应用于多个工业领域,如远程控制系统、过程控制系统等。根据前人的研究成果,将物联网引入工业设备设计;尽管如此,仍有很多应用程序没有得到服务。物联网提供有关系统的所有信息,因此可以随时随地照顾设备。本文采用同构主从模块开发了牙根检测系统的牙系统。它不仅降低了硬件复杂度,而且降低了系统开发成本。
{"title":"Scalable Master-Slave Isomorphic Module for IoT Service System","authors":"Wen-Yo Lee, C. Shih, Ti-Hung Chen, Yung-Hui Chen","doi":"10.1109/Ubi-Media.2019.00051","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00051","url":null,"abstract":"This paper shows a master-slave module, which is based on a PCB board. The isomorphic circuit board can be the master or the slave through setup the configuration bits. The design can be introduced to several industrial fields, for example, the remote-based control system and the procedure control system, etc. According to the previous work of the researches, the IoT have been introduced to design the industrial equipment; nevertheless, there still have a lot of applications do not have been served. The IoT offers the information all about a system, so the equipment can be taken care anywhere anytime. In this paper, a dental system for the teeth root examining system is developed by the isomorphic master-slave module. It reduces not only the hardware complexity, but also the system development cost.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124383613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Whole Slide Ki-67 Proliferation Analysis System for Breast Carcinoma 全幻灯片Ki-67乳腺癌增殖分析系统
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00048
C. Ko, Chun-Hung Lin, Chih-Hung Chuang, Chuan-Yu Chang, Shih-Hao Chang, Ji-Han Jiang
The expression of Ki-67 with IHC stain has been utilized to assess the prognosis of breast cancer, and the degree of cellular differentiation and proliferation rate. Recently, some researchers utilize the index to predict metastasis of breast carcinoma. In traditional pathological screening, manual assessment of Ki-67 proliferative index may be limited by manual evaluation from different pathologists. Especially, inconsistent biopsy staining would affect the quantitation of Ki-67 proliferation so that developing an automatic system to assess Ki-67 proliferation index poses a big challenge. The goal of this paper is to propose an automatic analysis system to evaluate the degrees of Ki-67 proliferation on IHC stained cells of breast tissue using image processing and machine intelligence techniques. The proposed system not only can assist physicians diagnose, but also provides important information of treatment and prognosis. In order to validate the evaluation performance, we compared with visual assessments by a pathologist and the ImmnuoRatio (i.e., a web-based evaluation system in Ki-67 expression) developed by Vilppu J Tuominen et al.[1] via a number of Ki-67 stained samples for patients with breast carcinoma. Experimental results also demonstrate that the proposed system can automatically, accurately and reliably assess the Ki-67 proliferation index on the breast tissue images with a precision of around 87.37%. However, the accuracy evaluating with ImmunoRatio only can reach 75.82% with the same samples. Moreover, our proposed system also provides various interaction functions including browsing, navigation, and quantitative analyses for pathologists who evaluate the expression of the Ki-67 proliferation.
通过免疫组化染色检测Ki-67的表达可用于评价乳腺癌的预后、细胞分化程度和增殖率。近年来,一些研究者利用该指数预测乳腺癌的转移。在传统的病理筛查中,Ki-67增殖指数的人工评估可能会受到不同病理医师人工评估的限制。特别是活检染色不一致会影响Ki-67增殖的定量,因此开发一种自动评估Ki-67增殖指数的系统是一个很大的挑战。本文的目的是提出一种基于图像处理和机器智能技术的乳腺组织免疫组化染色细胞Ki-67增殖程度的自动分析系统。该系统不仅能辅助医生诊断,还能提供重要的治疗和预后信息。为了验证评估效果,我们将病理学家的视觉评估与Vilppu J Tuominen等人[1]开发的immunoratio(即Ki-67表达的基于网络的评估系统)进行了比较,通过对乳腺癌患者的一些Ki-67染色样本进行了分析。实验结果还表明,该系统能够自动、准确、可靠地评估乳腺组织图像上的Ki-67增殖指数,准确率约为87.37%。然而,在相同的样品下,用ImmunoRatio评价的准确率只能达到75.82%。此外,我们提出的系统还为病理学家评估Ki-67增殖表达提供了多种交互功能,包括浏览、导航和定量分析。
{"title":"A Whole Slide Ki-67 Proliferation Analysis System for Breast Carcinoma","authors":"C. Ko, Chun-Hung Lin, Chih-Hung Chuang, Chuan-Yu Chang, Shih-Hao Chang, Ji-Han Jiang","doi":"10.1109/Ubi-Media.2019.00048","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00048","url":null,"abstract":"The expression of Ki-67 with IHC stain has been utilized to assess the prognosis of breast cancer, and the degree of cellular differentiation and proliferation rate. Recently, some researchers utilize the index to predict metastasis of breast carcinoma. In traditional pathological screening, manual assessment of Ki-67 proliferative index may be limited by manual evaluation from different pathologists. Especially, inconsistent biopsy staining would affect the quantitation of Ki-67 proliferation so that developing an automatic system to assess Ki-67 proliferation index poses a big challenge. The goal of this paper is to propose an automatic analysis system to evaluate the degrees of Ki-67 proliferation on IHC stained cells of breast tissue using image processing and machine intelligence techniques. The proposed system not only can assist physicians diagnose, but also provides important information of treatment and prognosis. In order to validate the evaluation performance, we compared with visual assessments by a pathologist and the ImmnuoRatio (i.e., a web-based evaluation system in Ki-67 expression) developed by Vilppu J Tuominen et al.[1] via a number of Ki-67 stained samples for patients with breast carcinoma. Experimental results also demonstrate that the proposed system can automatically, accurately and reliably assess the Ki-67 proliferation index on the breast tissue images with a precision of around 87.37%. However, the accuracy evaluating with ImmunoRatio only can reach 75.82% with the same samples. Moreover, our proposed system also provides various interaction functions including browsing, navigation, and quantitative analyses for pathologists who evaluate the expression of the Ki-67 proliferation.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Collaborative DDoS Defense Platform Based on Blockchain Technology 基于区块链技术的协同DDoS防御平台
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00010
L. Yeh, Jiun-Long Huang, Ting-Yin Yen, Jen-Wei Hu
In this paper, we propose a consortium blockchainbased system sharing malicious IP to prevent further attacks happening among other hosts. In our scheme, every security operation center (SOC) serving as a blockchain-node uploads some suspicious IPs to find the potential attackers' IPs. A smart contract is responsible for comparing the loaded IPs and the existing ones without human interference. If IPs in different lists are matched with certain degree, this system will respond by giving the whole list of malicious IP. By means of these steps, shares of IP lists are achieved and attacks are prevented in advance. Besides, when uploading and sharing, we utilize elliptic curve cryptography to ensure data confidentiality and integrity.
在本文中,我们提出了一个基于区块链的联盟系统,共享恶意IP,以防止其他主机之间发生进一步的攻击。在我们的方案中,每个安全运营中心(SOC)作为一个区块链节点,上传一些可疑的ip来寻找潜在攻击者的ip。智能合约负责在没有人为干扰的情况下比较加载的ip和现有的ip。如果不同列表中的IP匹配到一定程度,系统将给出整个恶意IP列表作为响应。通过这些步骤,实现了IP列表的共享,并提前阻止了攻击。此外,在上传和分享时,我们采用椭圆曲线加密,确保数据的保密性和完整性。
{"title":"A Collaborative DDoS Defense Platform Based on Blockchain Technology","authors":"L. Yeh, Jiun-Long Huang, Ting-Yin Yen, Jen-Wei Hu","doi":"10.1109/Ubi-Media.2019.00010","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00010","url":null,"abstract":"In this paper, we propose a consortium blockchainbased system sharing malicious IP to prevent further attacks happening among other hosts. In our scheme, every security operation center (SOC) serving as a blockchain-node uploads some suspicious IPs to find the potential attackers' IPs. A smart contract is responsible for comparing the loaded IPs and the existing ones without human interference. If IPs in different lists are matched with certain degree, this system will respond by giving the whole list of malicious IP. By means of these steps, shares of IP lists are achieved and attacks are prevented in advance. Besides, when uploading and sharing, we utilize elliptic curve cryptography to ensure data confidentiality and integrity.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cloud Technology: Opportunities for Cybercriminals and Security Challenges 云技术:网络罪犯的机会和安全挑战
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00013
Leo Willyanto Santoso
Nowadays, there is a growing of interest about cloud technology to many companies around the world. That's why many companies trying and implementing cloud computing technologies in their business processes. This research will examine the security requirements that will apply for companies and organizations when they choose to move to a cloud service solution. The study is carried out because cloud services are very desirable in many industries today. Migrating to cloud services would often results in great benefits both financially and administratively. The concerns raised by the transition are how security should be handled. Many companies suffer from a lack of knowledge and it is seen as a big risk to make the transition. This leads to the question that the research strive to answer - which security demands will the transition to a cloud service implicate? In this paper we explain which security requirements are available both for local solutions and cloud solutions. We draw conclusions about what differences there are, what requirements are mutual, which ones are new and which ones are absent if a transition is made to cloud services. The result of this research is an evaluation that companies and organizations can use as a basis when they plan to implement this particular transition.
如今,世界各地的许多公司对云技术越来越感兴趣。这就是为什么许多公司尝试在其业务流程中实现云计算技术的原因。本研究将检查公司和组织在选择迁移到云服务解决方案时将适用的安全要求。之所以进行这项研究,是因为当今许多行业都非常需要云服务。迁移到云服务通常会在财务和管理上带来巨大的好处。过渡引起的关注是如何处理安全问题。许多公司都存在知识匮乏的问题,这被视为转型的一大风险。这就引出了该研究试图回答的问题——向云服务的过渡意味着哪些安全需求?在本文中,我们将解释哪些安全需求可用于本地解决方案和云解决方案。我们得出结论:如果向云服务过渡,存在哪些差异,哪些需求是相互的,哪些是新的,哪些是不存在的。这项研究的结果是一个评估,当公司和组织计划实施这一特定的转变时,可以将其作为基础。
{"title":"Cloud Technology: Opportunities for Cybercriminals and Security Challenges","authors":"Leo Willyanto Santoso","doi":"10.1109/Ubi-Media.2019.00013","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00013","url":null,"abstract":"Nowadays, there is a growing of interest about cloud technology to many companies around the world. That's why many companies trying and implementing cloud computing technologies in their business processes. This research will examine the security requirements that will apply for companies and organizations when they choose to move to a cloud service solution. The study is carried out because cloud services are very desirable in many industries today. Migrating to cloud services would often results in great benefits both financially and administratively. The concerns raised by the transition are how security should be handled. Many companies suffer from a lack of knowledge and it is seen as a big risk to make the transition. This leads to the question that the research strive to answer - which security demands will the transition to a cloud service implicate? In this paper we explain which security requirements are available both for local solutions and cloud solutions. We draw conclusions about what differences there are, what requirements are mutual, which ones are new and which ones are absent if a transition is made to cloud services. The result of this research is an evaluation that companies and organizations can use as a basis when they plan to implement this particular transition.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Deep Learning Approach for Dynamic Object Understanding Using SIFT 基于SIFT的动态对象理解深度学习方法
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00033
Yuan-Tsung Chang, T. Shih
Deep learning is a method that is very commonly used in image recognition. We use the SIFT method to extract feature points, so that the machine can detect the objects in the motion images and they can be integrated into the operation of the robot arm to judge and capture specific objects. This method is also used to detect whether the parameters of the object meet the predetermined values. It will provide a warning if the predetermined values are not met. This can be used to identify the good and defective products on the production line. In the CNN database we have trained more than 30,000 images and improved the last step of SIFT algorithm to demonstrate that our new method can achieve better accuracy.
深度学习是一种在图像识别中非常常用的方法。我们使用SIFT方法提取特征点,使机器能够检测运动图像中的物体,并将其整合到机械臂的操作中,对特定物体进行判断和捕获。该方法还用于检测目标参数是否满足预定值。如果不满足预定值,它将提供警告。这可以用来识别生产线上的良品和次品。在CNN数据库中,我们训练了3万多张图像,并对SIFT算法的最后一步进行了改进,证明我们的新方法可以达到更好的准确率。
{"title":"A Deep Learning Approach for Dynamic Object Understanding Using SIFT","authors":"Yuan-Tsung Chang, T. Shih","doi":"10.1109/Ubi-Media.2019.00033","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00033","url":null,"abstract":"Deep learning is a method that is very commonly used in image recognition. We use the SIFT method to extract feature points, so that the machine can detect the objects in the motion images and they can be integrated into the operation of the robot arm to judge and capture specific objects. This method is also used to detect whether the parameters of the object meet the predetermined values. It will provide a warning if the predetermined values are not met. This can be used to identify the good and defective products on the production line. In the CNN database we have trained more than 30,000 images and improved the last step of SIFT algorithm to demonstrate that our new method can achieve better accuracy.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125562793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Traffic Flow Forecast for Traffic with Forecastable Sporadic Events 具有可预测偶发事件的交通流量预测
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00036
Yu-Hsiang Chang, Hung-Chin Jang
The prosperity of the social economy, tourism, and entertainment industry are important factors to cause traffic congestion. In addition to commuting hours and holidays, if a large-scale event, such as a concert, a sporting event or an exhibition is held, it is easy to make traffic congestion even worse. If we know in advance the time and place of the large-scale event, then we can accurately forecast the future traffic flow and plan the driving route. It helps effectively relieve traffic flow, reduce travel time and carbon emissions. In this study, we used the Vehicle Detector (VD) [12] data from the Taipei City Government Open Data Platform as a source of regular traffic data as well as the data of Forecastable Sporadic Event (FSE), such as a large-scale event, to forecast traffic flow. The information of time and place of the FSE are collected from various information websites (ticketing websites, tourist websites, etc.) by web crawlers. We proposed a Long Short-Term Memory (LSTM) deep learning model for traffic flow forecast, which was trained with both VD and FSE data. We further used Adam Optimizer to adjust the weight and bias of the model to optimize the forecast accuracy. The implementation of the LSTM model was conducted in TensorFlow, a machine learning framework developed by Google. Finally, we evaluated the forecast accuracy of the model by Mean Absolute Percentage Error (MAPE) and analyzed the effectiveness of applying FSE data to traffic forecast.
社会经济、旅游业和娱乐业的繁荣是造成交通拥堵的重要因素。除了上下班时间和节假日,如果举办大型活动,如音乐会、体育赛事或展览,很容易使交通拥堵更加严重。如果我们提前知道大型活动的时间和地点,那么我们就可以准确地预测未来的交通流量,规划行车路线。它有助于有效缓解交通流量,减少旅行时间和碳排放。在本研究中,我们使用台北市政府开放数据平台的车辆检测器(VD)[12]数据作为常规交通数据的来源,以及可预测的零星事件(FSE)数据,例如大型事件,来预测交通流量。FSE的时间和地点信息是通过网络爬虫从各种信息网站(票务网站、旅游网站等)收集的。提出了一种用于交通流预测的长短期记忆(LSTM)深度学习模型,该模型同时使用VD和FSE数据进行训练。我们进一步使用Adam Optimizer来调整模型的权重和偏置,以优化预测精度。LSTM模型的实现是在Google开发的机器学习框架TensorFlow中进行的。最后,利用平均绝对百分比误差(MAPE)对模型的预测精度进行了评价,并分析了FSE数据应用于交通预测的有效性。
{"title":"Traffic Flow Forecast for Traffic with Forecastable Sporadic Events","authors":"Yu-Hsiang Chang, Hung-Chin Jang","doi":"10.1109/Ubi-Media.2019.00036","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00036","url":null,"abstract":"The prosperity of the social economy, tourism, and entertainment industry are important factors to cause traffic congestion. In addition to commuting hours and holidays, if a large-scale event, such as a concert, a sporting event or an exhibition is held, it is easy to make traffic congestion even worse. If we know in advance the time and place of the large-scale event, then we can accurately forecast the future traffic flow and plan the driving route. It helps effectively relieve traffic flow, reduce travel time and carbon emissions. In this study, we used the Vehicle Detector (VD) [12] data from the Taipei City Government Open Data Platform as a source of regular traffic data as well as the data of Forecastable Sporadic Event (FSE), such as a large-scale event, to forecast traffic flow. The information of time and place of the FSE are collected from various information websites (ticketing websites, tourist websites, etc.) by web crawlers. We proposed a Long Short-Term Memory (LSTM) deep learning model for traffic flow forecast, which was trained with both VD and FSE data. We further used Adam Optimizer to adjust the weight and bias of the model to optimize the forecast accuracy. The implementation of the LSTM model was conducted in TensorFlow, a machine learning framework developed by Google. Finally, we evaluated the forecast accuracy of the model by Mean Absolute Percentage Error (MAPE) and analyzed the effectiveness of applying FSE data to traffic forecast.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1