首页 > 最新文献

2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)最新文献

英文 中文
Adaptive Time-Frequency Synthesis for Waveform Discernment in Wireless Communications 无线通信中波形识别的自适应时频合成
Steve Chan, M. Krunz, Bob Griffin
The discernment of waveforms for the purpose of identifying the underlying wireless technologies and validating if observed transmissions are legitimate or not remains a challenge within the communications sector and beyond. Conventional techniques struggle to robustly process Signals under Test (SuTs) in real-time. A particular difficulty relates to the selection of an appropriate window size for the processed data when pertinent contextual information on SuTs is not known a priori. The disadvantage of applying a predetermined fixed window size is that of length and shape (i.e., coarse resolution). In contrast, an adaptive window size offers more optimally tuned resolution. Towards this end, we propose a novel approach that uses an Adaptive Resolution Transform (ART) to either maintain a constant (prespecified) resolution, via a Variable Window Size and Shape (VWSS), or adjust the resolution (again using the VWSS technique) to match latency requirements. Central to this approach is the utilization of Continuous Wavelet Transforms (CWTs), which do not substantively suffer from those energy leakage issues found in more commonly used transforms such as Discrete Wavelet Transforms (DWT). A robust numerical implementation of CWTs is presented via a particular class of Convolutional Neural Networks (CNNs) called Robust Convex Relaxation (RCR)-based Convolutional Long Short-Term Memory Deep Neural Networks (a.k.a., CLSTMDNNs or CLNNs). By employing small convolutional filters, this class leverages deeper cascade learning, which nicely emulates CWTs. In addition to its use for convex relaxation adversarial training, the RCR framework also improves the bound tightening for the successive convolutional layers (which contain the cascading of ever smaller “CWT-like” convolutional filters). In this paper, we explore this particular architecture for its discernment capability among the SuT time series being compared. To operationalize this architectural paradigm, non-conventional Nonnegative Matrix Factorization (NMF) and Multiresolution Matrix Factorization (MMF) is used in conjunction to facilitate the capture of the structure and content of the involved matrices so as to achieve higher resolution and enhanced discernment accuracy. The desired WT (a.k.a., Corresponding WT or CORWT) resulting from the MMF is implemented as a translation-invariant CWT PyWavelet to better illuminate the intricate structural characteristics of the SuT and facilitate the analysis/discernment of their constituent Waveforms of Interest (WoIs). A precomputed hash and lookup table is utilized to facilitate WoI classification and discernment in quasi-real-time.
为了识别底层无线技术和验证观察到的传输是否合法,波形的识别仍然是通信领域内外的一个挑战。传统技术难以实时鲁棒地处理被测信号(SuTs)。一个特别的困难是,当关于sut的相关上下文信息先验未知时,为处理的数据选择适当的窗口大小。应用预定的固定窗口大小的缺点是长度和形状(即粗分辨率)。相比之下,自适应窗口大小提供了更优化的分辨率。为此,我们提出了一种使用自适应分辨率变换(ART)的新方法,通过可变窗口大小和形状(VWSS)来保持恒定(预先指定的)分辨率,或者调整分辨率(再次使用VWSS技术)以匹配延迟要求。这种方法的核心是使用连续小波变换(CWTs),它不会遭受更常用的变换(如离散小波变换(DWT))中发现的能量泄漏问题。CWTs的鲁棒数值实现是通过一类特殊的卷积神经网络(cnn)提出的,称为基于鲁棒凸松弛(RCR)的卷积长短期记忆深度神经网络(又称clstmdnn或clnn)。通过使用小的卷积过滤器,这个类利用了更深层次的级联学习,很好地模拟了cwt。除了用于凸松弛对抗训练之外,RCR框架还改进了连续卷积层(包含越来越小的“cwt样”卷积过滤器的级联)的边界收紧。在本文中,我们探讨了这种特殊的体系结构在被比较的SuT时间序列之间的识别能力。为了实现这一架构范例,将非传统的非负矩阵分解(NMF)和多分辨率矩阵分解(MMF)结合使用,以方便捕获所涉及矩阵的结构和内容,从而实现更高的分辨率和增强的识别精度。由MMF产生的所需WT(也称为对应的WT或CORWT)被实现为一个翻译不变的CWT py小波,以更好地阐明SuT的复杂结构特征,并促进对其组成波形的分析/识别感兴趣(WoIs)。利用预先计算的哈希和查找表来准实时地促进WoI分类和识别。
{"title":"Adaptive Time-Frequency Synthesis for Waveform Discernment in Wireless Communications","authors":"Steve Chan, M. Krunz, Bob Griffin","doi":"10.1109/iemcon53756.2021.9623140","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623140","url":null,"abstract":"The discernment of waveforms for the purpose of identifying the underlying wireless technologies and validating if observed transmissions are legitimate or not remains a challenge within the communications sector and beyond. Conventional techniques struggle to robustly process Signals under Test (SuTs) in real-time. A particular difficulty relates to the selection of an appropriate window size for the processed data when pertinent contextual information on SuTs is not known a priori. The disadvantage of applying a predetermined fixed window size is that of length and shape (i.e., coarse resolution). In contrast, an adaptive window size offers more optimally tuned resolution. Towards this end, we propose a novel approach that uses an Adaptive Resolution Transform (ART) to either maintain a constant (prespecified) resolution, via a Variable Window Size and Shape (VWSS), or adjust the resolution (again using the VWSS technique) to match latency requirements. Central to this approach is the utilization of Continuous Wavelet Transforms (CWTs), which do not substantively suffer from those energy leakage issues found in more commonly used transforms such as Discrete Wavelet Transforms (DWT). A robust numerical implementation of CWTs is presented via a particular class of Convolutional Neural Networks (CNNs) called Robust Convex Relaxation (RCR)-based Convolutional Long Short-Term Memory Deep Neural Networks (a.k.a., CLSTMDNNs or CLNNs). By employing small convolutional filters, this class leverages deeper cascade learning, which nicely emulates CWTs. In addition to its use for convex relaxation adversarial training, the RCR framework also improves the bound tightening for the successive convolutional layers (which contain the cascading of ever smaller “CWT-like” convolutional filters). In this paper, we explore this particular architecture for its discernment capability among the SuT time series being compared. To operationalize this architectural paradigm, non-conventional Nonnegative Matrix Factorization (NMF) and Multiresolution Matrix Factorization (MMF) is used in conjunction to facilitate the capture of the structure and content of the involved matrices so as to achieve higher resolution and enhanced discernment accuracy. The desired WT (a.k.a., Corresponding WT or CORWT) resulting from the MMF is implemented as a translation-invariant CWT PyWavelet to better illuminate the intricate structural characteristics of the SuT and facilitate the analysis/discernment of their constituent Waveforms of Interest (WoIs). A precomputed hash and lookup table is utilized to facilitate WoI classification and discernment in quasi-real-time.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115182148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smartphone Mode Detection for Positioning using Inertial Sensor 基于惯性传感器的智能手机模式定位
Zohreh Karimi, M. Soheili, Navid Heydarishahreza, S. Ebadollahi, Bob Gill
Indoor Positioning has been in the center of attention in trending research. To this end, various means have been applied, including WiFi, Radio Frequency Identification (RFID), Fingerprinting, and Pedestrian Dead Reckoning (PDR). Smartphones, as an efficacious remedy for PDR technique parameters, are a serviceable choice due to their vast use. This article is dedicated to identifying and classifying different smartphone carrying patterns in different motion positions. Hence, we go through two steps; First using Machine Learning (ML) and Artificial Neural Networks(ANN), we identify smartphone carrying modes during user motions with four users and one smartphone to detect the suitable algorithm with the highest accuracy. Novelty of this paper is using Weighted K-Nearest Neighbor (WKNN) and ensemble by Genetic Algorithm (GA) with optimal weight, having offered notable results in categorizing. Furthermore, we review the smartphone sensor calibration effects on accuracy obtained by categorizing using four users and two smartphones in two states, before and after calibration using ML and ANN. The outcome was, calibration with smartphone sensors helps to categorize accuracy.
室内定位一直是趋势研究的热点。为此,应用了各种手段,包括WiFi、射频识别(RFID)、指纹识别和行人航位推算(PDR)。智能手机作为PDR技术参数的有效补救措施,由于其广泛的使用,是一个有用的选择。本文致力于识别和分类不同移动姿势下不同的智能手机携带模式。因此,我们经历了两个步骤;首先,我们使用机器学习(ML)和人工神经网络(ANN),在四个用户和一个智能手机的用户运动中识别智能手机携带模式,以最高的精度检测合适的算法。本文的新颖之处在于采用加权k近邻(Weighted K-Nearest Neighbor, WKNN)和最优权值遗传算法集成(Genetic Algorithm, GA),在分类上取得了显著的效果。此外,我们回顾了智能手机传感器校准对精度的影响,通过使用ML和ANN在两种状态下使用四个用户和两部智能手机进行分类,在校准前后使用ML和ANN进行分类。结果是,用智能手机传感器进行校准有助于分类的准确性。
{"title":"Smartphone Mode Detection for Positioning using Inertial Sensor","authors":"Zohreh Karimi, M. Soheili, Navid Heydarishahreza, S. Ebadollahi, Bob Gill","doi":"10.1109/iemcon53756.2021.9623130","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623130","url":null,"abstract":"Indoor Positioning has been in the center of attention in trending research. To this end, various means have been applied, including WiFi, Radio Frequency Identification (RFID), Fingerprinting, and Pedestrian Dead Reckoning (PDR). Smartphones, as an efficacious remedy for PDR technique parameters, are a serviceable choice due to their vast use. This article is dedicated to identifying and classifying different smartphone carrying patterns in different motion positions. Hence, we go through two steps; First using Machine Learning (ML) and Artificial Neural Networks(ANN), we identify smartphone carrying modes during user motions with four users and one smartphone to detect the suitable algorithm with the highest accuracy. Novelty of this paper is using Weighted K-Nearest Neighbor (WKNN) and ensemble by Genetic Algorithm (GA) with optimal weight, having offered notable results in categorizing. Furthermore, we review the smartphone sensor calibration effects on accuracy obtained by categorizing using four users and two smartphones in two states, before and after calibration using ML and ANN. The outcome was, calibration with smartphone sensors helps to categorize accuracy.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114447447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using CNN to Optimize Traffic Classification for Smart Homes in 5G Era 基于CNN的5G时代智能家居流量分类优化
Hung-Chin Jang, Tsung-Yen Tsai
With the rapid development and progress of the Internet of Things and artificial intelligence, more and more businesses have combined housing with emerging technologies to create smart homes to improve residents' quality of life. Many services similar to the three major application scenarios of 5G will be applied to different smart devices in future smart homes. Therefore, the overall network traffic of smart homes will inevitably increase substantially, making network traffic management in smart homes an issue worthy of in-depth discussion. However, due to the widespread use of network encryption, it is not easy to obtain information from most network application services by decrypting the traffic. It is also difficult to classify various service flows through traditional network traffic classification methods into distinct application categories for management. This research assumes that Internet Service Providers (ISPs) have to manage tens of thousands of smart homes equipped with various kinds of IoT devices. We used software-defined networking (SDN) technology to simulate a multi-tenant smart home environment, simulate different types of smart home service traffic, and use convolutional neural networks (CNN) to classify network traffic. ISP operators can thus set the bandwidth ratio according to the classified service category to effectively improve QoS and user QoE. The experimental results show that the traffic classification accuracy of the CNN model for smart homes can reach 86.5%, which is higher than the general neural network model by 6.5%.
随着物联网、人工智能的快速发展和进步,越来越多的商家将住宅与新兴技术相结合,打造智能家居,提升居民的生活品质。在未来的智能家居中,许多类似于5G三大应用场景的服务将应用到不同的智能设备上。因此,智能家居的整体网络流量必然会大幅增加,这使得智能家居中的网络流量管理成为一个值得深入探讨的问题。然而,由于网络加密的广泛使用,通过对流量进行解密来获取大多数网络应用服务的信息并不容易。传统的网络流分类方法也难以将各种业务流划分为不同的应用类别进行管理。这项研究假设互联网服务提供商(isp)必须管理数以万计配备各种物联网设备的智能家居。我们使用软件定义网络(SDN)技术模拟了一个多租户智能家居环境,模拟了不同类型的智能家居服务流量,并使用卷积神经网络(CNN)对网络流量进行分类。因此,ISP运营商可以根据分类的业务类别设置带宽比,从而有效地提高QoS和用户QoE。实验结果表明,CNN模型用于智能家居的流量分类准确率可以达到86.5%,比一般神经网络模型高出6.5%。
{"title":"Using CNN to Optimize Traffic Classification for Smart Homes in 5G Era","authors":"Hung-Chin Jang, Tsung-Yen Tsai","doi":"10.1109/iemcon53756.2021.9623079","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623079","url":null,"abstract":"With the rapid development and progress of the Internet of Things and artificial intelligence, more and more businesses have combined housing with emerging technologies to create smart homes to improve residents' quality of life. Many services similar to the three major application scenarios of 5G will be applied to different smart devices in future smart homes. Therefore, the overall network traffic of smart homes will inevitably increase substantially, making network traffic management in smart homes an issue worthy of in-depth discussion. However, due to the widespread use of network encryption, it is not easy to obtain information from most network application services by decrypting the traffic. It is also difficult to classify various service flows through traditional network traffic classification methods into distinct application categories for management. This research assumes that Internet Service Providers (ISPs) have to manage tens of thousands of smart homes equipped with various kinds of IoT devices. We used software-defined networking (SDN) technology to simulate a multi-tenant smart home environment, simulate different types of smart home service traffic, and use convolutional neural networks (CNN) to classify network traffic. ISP operators can thus set the bandwidth ratio according to the classified service category to effectively improve QoS and user QoE. The experimental results show that the traffic classification accuracy of the CNN model for smart homes can reach 86.5%, which is higher than the general neural network model by 6.5%.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128387972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS Explainer using Interpretable Machine Learning DDoS解释器使用可解释的机器学习
Saikat Das, Ph.D., Namita Agarwal, S. Shiva
Machine learning (ML) experts have been using black-box classifiers for modeling purposes. However, the users of these systems are raising questions about the transparency of the predictions of the models. This lack of transparency results in non-acceptance of the predictions, especially in critical applications. In this paper, we propose a DDoS explainer model that provides an appropriate explanation for its detection, based on the effectiveness of the features. We used interpretable machine learning (IML) models to build the explainer model which not only provides the explanation for the DDoS detection but also justifies the explanation by adding confidence scores with it. Confidence scores are referred to as consistency scores which can be computed by the percentage of consistent explanations of similar type of data instances. Our proposed framework incorporates the best-performing explainer model chosen from the comparison of the explainer models developed by two IML models Local Interpretable Model-agnostic Explanations (LIME) and SHapley Additive exPlanations (SHAP). We experimented with the NSL-KDD dataset and ensemble supervised ML framework for DDoS detection and validation.
机器学习(ML)专家一直在使用黑箱分类器进行建模。然而,这些系统的用户对模型预测的透明度提出了质疑。缺乏透明度导致预测不被接受,特别是在关键应用中。在本文中,我们提出了一个DDoS解释器模型,该模型基于特征的有效性为其检测提供了适当的解释。我们使用可解释的机器学习(IML)模型来构建解释器模型,该模型不仅提供了DDoS检测的解释,而且还通过添加置信度分数来证明解释的合理性。置信分数被称为一致性分数,它可以通过相似类型的数据实例的一致解释的百分比来计算。我们提出的框架结合了从两个IML模型(局部可解释模型不可知解释(LIME)和SHapley加性解释(SHAP))开发的解释器模型的比较中选择的性能最好的解释器模型。我们尝试使用NSL-KDD数据集和集成监督ML框架进行DDoS检测和验证。
{"title":"DDoS Explainer using Interpretable Machine Learning","authors":"Saikat Das, Ph.D., Namita Agarwal, S. Shiva","doi":"10.1109/iemcon53756.2021.9623251","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623251","url":null,"abstract":"Machine learning (ML) experts have been using black-box classifiers for modeling purposes. However, the users of these systems are raising questions about the transparency of the predictions of the models. This lack of transparency results in non-acceptance of the predictions, especially in critical applications. In this paper, we propose a DDoS explainer model that provides an appropriate explanation for its detection, based on the effectiveness of the features. We used interpretable machine learning (IML) models to build the explainer model which not only provides the explanation for the DDoS detection but also justifies the explanation by adding confidence scores with it. Confidence scores are referred to as consistency scores which can be computed by the percentage of consistent explanations of similar type of data instances. Our proposed framework incorporates the best-performing explainer model chosen from the comparison of the explainer models developed by two IML models Local Interpretable Model-agnostic Explanations (LIME) and SHapley Additive exPlanations (SHAP). We experimented with the NSL-KDD dataset and ensemble supervised ML framework for DDoS detection and validation.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126949366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Neighborhood Search for Process Resource Configuration in Cyber Physical Systems 网络物理系统中进程资源配置的邻域搜索
Fu-Shiung Hsieh
Cyber-Physical Production Systems (CPPS) consists of intertwined physical components and software components that interact with each other to accommodate changes and demands in the business world. Software components in CPPS must generate the information or instructions to guide the operations of physical components based on the real-time states acquired by sensors from the shop floor. In this paper, we will focus on process optimization issue for the development of software components in CPPS. This paper aims to propose a more efficient solution algorithm to find a solution. In this paper, we will enhance the search capabilities of discrete Differential Evolution approach by a neighborhood search method. Neighborhood search explores the neighborhood of the current solution to find a potential better solution that can improve the current solution. By adopting the concept of neighborhood search, we will propose a more effective discrete Differential Evolution approach through combining the neighborhood search with existing search strategies of Differential Evolution. To verify performance and efficiency of the algorithm, we create several test cases to perform experiments to compare with previous algorithms based on experimental results. We illustrate efficiency of the proposed method by analyzing the results.
信息物理生产系统(CPPS)由相互交织的物理组件和软件组件组成,它们相互作用以适应商业世界中的变化和需求。CPPS中的软件组件必须根据传感器从车间获取的实时状态生成指导物理组件操作的信息或指令。在本文中,我们将重点讨论CPPS中软件组件开发的过程优化问题。本文旨在提出一种更有效的求解算法来寻找解。在本文中,我们将通过邻域搜索方法来增强离散差分进化方法的搜索能力。邻域搜索探索当前解的邻域,以找到一个可能更好的、可以改进当前解的解。采用邻域搜索的概念,将邻域搜索与现有的差分进化搜索策略相结合,提出一种更有效的离散差分进化方法。为了验证算法的性能和效率,我们创建了几个测试用例进行实验,并根据实验结果与以前的算法进行比较。通过对结果的分析,说明了所提方法的有效性。
{"title":"Neighborhood Search for Process Resource Configuration in Cyber Physical Systems","authors":"Fu-Shiung Hsieh","doi":"10.1109/iemcon53756.2021.9623122","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623122","url":null,"abstract":"Cyber-Physical Production Systems (CPPS) consists of intertwined physical components and software components that interact with each other to accommodate changes and demands in the business world. Software components in CPPS must generate the information or instructions to guide the operations of physical components based on the real-time states acquired by sensors from the shop floor. In this paper, we will focus on process optimization issue for the development of software components in CPPS. This paper aims to propose a more efficient solution algorithm to find a solution. In this paper, we will enhance the search capabilities of discrete Differential Evolution approach by a neighborhood search method. Neighborhood search explores the neighborhood of the current solution to find a potential better solution that can improve the current solution. By adopting the concept of neighborhood search, we will propose a more effective discrete Differential Evolution approach through combining the neighborhood search with existing search strategies of Differential Evolution. To verify performance and efficiency of the algorithm, we create several test cases to perform experiments to compare with previous algorithms based on experimental results. We illustrate efficiency of the proposed method by analyzing the results.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Intelligence Based Collaborative Learning System for IoT Edge 基于边缘智能的IoT边缘协同学习系统
Lahiru Welagedara, Janani Harischandra, Nuwan Jayawardene
Edge Intelligence based collaborative learning systems have been developed to perform collaborative learning among multiple devices in a distributed environment. Majority of the collaborative learning systems have been designed using resources containing high computational power. It was identified that a system could be implemented to facilitate collaborative learning in resource constrained Internet of Things (IoT) devices. The existing collaborative learning systems were critically reviewed and analyzed to identify the ideal collaborative learning approach for resource constrained IoT edge. During the initial stages of the research, partitioned model training was identified as the most ideal approach. The research paved the way to design and implement two training architectures based on partitioned model training approach to facilitate environments with adequate and limited access to edge infrastructure. The proposed system utilized a hybrid deep learning model in partitioned model training approach for the first time. Furthermore, the research utilized a lightweight containerization mechanism to deploy the proposed collaborative learning system. The testing and evaluation phases of the research proved that the system was able to significantly reduce the resource consumption of the devices while achieving high model accuracy. The experimental setup reached up to 97% in model accuracy while consuming a significantly lower CPU consumption of 6.33%. The proposed system also proved to function efficiently by reducing energy consumption and reducing operational temperature by up to 4°C.
基于边缘智能的协作学习系统已经被开发出来,用于在分布式环境中的多个设备之间执行协作学习。大多数协作学习系统的设计都使用了包含高计算能力的资源。研究发现,在资源受限的物联网(IoT)设备中,可以实施一个系统来促进协作学习。对现有的协作学习系统进行了严格的审查和分析,以确定资源受限的物联网边缘的理想协作学习方法。在研究的初始阶段,分割模型训练被认为是最理想的方法。该研究为设计和实现基于分割模型训练方法的两种训练体系结构铺平了道路,以促进对边缘基础设施进行充分和有限访问的环境。该系统首次将混合深度学习模型用于分割模型训练方法。此外,该研究利用轻量级容器化机制来部署所提出的协作学习系统。研究的测试和评估阶段证明,该系统能够显著降低设备的资源消耗,同时实现较高的模型精度。实验设置的模型精度达到97%,同时消耗的CPU消耗显著降低,为6.33%。该系统还通过降低能耗和降低高达4°C的工作温度而有效地运行。
{"title":"Edge Intelligence Based Collaborative Learning System for IoT Edge","authors":"Lahiru Welagedara, Janani Harischandra, Nuwan Jayawardene","doi":"10.1109/iemcon53756.2021.9623215","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623215","url":null,"abstract":"Edge Intelligence based collaborative learning systems have been developed to perform collaborative learning among multiple devices in a distributed environment. Majority of the collaborative learning systems have been designed using resources containing high computational power. It was identified that a system could be implemented to facilitate collaborative learning in resource constrained Internet of Things (IoT) devices. The existing collaborative learning systems were critically reviewed and analyzed to identify the ideal collaborative learning approach for resource constrained IoT edge. During the initial stages of the research, partitioned model training was identified as the most ideal approach. The research paved the way to design and implement two training architectures based on partitioned model training approach to facilitate environments with adequate and limited access to edge infrastructure. The proposed system utilized a hybrid deep learning model in partitioned model training approach for the first time. Furthermore, the research utilized a lightweight containerization mechanism to deploy the proposed collaborative learning system. The testing and evaluation phases of the research proved that the system was able to significantly reduce the resource consumption of the devices while achieving high model accuracy. The experimental setup reached up to 97% in model accuracy while consuming a significantly lower CPU consumption of 6.33%. The proposed system also proved to function efficiently by reducing energy consumption and reducing operational temperature by up to 4°C.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of an Optimal Hybrid Energy System for a Captive Power Plant in Pakistan 巴基斯坦自备电厂最优混合能源系统设计
Luqman Ahsan, M. Iqbal
This paper is about the design and feasibility of a grid-connected hybrid power system for an industrial unit. Due to the increase in greenhouse gases by burning fossil fuels, generating electricity from renewable resources is necessary. Solar energy is dependent on solar irradiance, which varies from site to site. A site (Shafi Texcel Limited) is selected, which is situated on Raiwind Manga Road Lahore, Pakistan. The average load demand is 2415 kW, for which a hybrid captive power plant has been designed. The sources of electricity are Grid, CATERPILLER Gas & Diesel GENSET, and the proposed solar system. For this system, optimization analysis has been carried out using HOMER and PVWatt software. Three different grid-connected cases are considered with 0% renewable energy (RE) constraints, 70% RE constraints, and with battery storage. The system parameters are different for each case, and land requisition analysis has been done using PVWatt. The NPC, cost of energy, capital cost, replacement cost for each case has been discussed in detail. The result shows that the proposed system is suitable for a selected site and can provide a significant saving. At the end, final results and possible future work has been discussed.
本文研究了一种工业机组并网混合动力系统的设计与可行性。由于化石燃料燃烧产生的温室气体增加,利用可再生资源发电是必要的。太阳能取决于太阳辐照度,而辐照度因地而异。一个地点(Shafi teexcel Limited)被选中,位于巴基斯坦拉合尔的Raiwind Manga路。平均负荷需求为2415kw,为此设计了混合自备电站。电力的来源是电网,卡特彼勒燃气和柴油发电机组,以及拟议的太阳能系统。利用HOMER和PVWatt软件对该系统进行了优化分析。考虑了三种不同的并网情况,分别是0%可再生能源(RE)限制、70%可再生能源限制和电池存储。每种情况下的系统参数不同,利用PVWatt进行了征地分析。对NPC、能源成本、资本成本、重置成本等每一种情况进行了详细的讨论。结果表明,所提出的系统适用于选定的场地,可以提供显著的节省。最后,对最终结果和可能的后续工作进行了讨论。
{"title":"Design of an Optimal Hybrid Energy System for a Captive Power Plant in Pakistan","authors":"Luqman Ahsan, M. Iqbal","doi":"10.1109/iemcon53756.2021.9623260","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623260","url":null,"abstract":"This paper is about the design and feasibility of a grid-connected hybrid power system for an industrial unit. Due to the increase in greenhouse gases by burning fossil fuels, generating electricity from renewable resources is necessary. Solar energy is dependent on solar irradiance, which varies from site to site. A site (Shafi Texcel Limited) is selected, which is situated on Raiwind Manga Road Lahore, Pakistan. The average load demand is 2415 kW, for which a hybrid captive power plant has been designed. The sources of electricity are Grid, CATERPILLER Gas & Diesel GENSET, and the proposed solar system. For this system, optimization analysis has been carried out using HOMER and PVWatt software. Three different grid-connected cases are considered with 0% renewable energy (RE) constraints, 70% RE constraints, and with battery storage. The system parameters are different for each case, and land requisition analysis has been done using PVWatt. The NPC, cost of energy, capital cost, replacement cost for each case has been discussed in detail. The result shows that the proposed system is suitable for a selected site and can provide a significant saving. At the end, final results and possible future work has been discussed.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing BTC's Trend During COVID-19 Using A Sentiment Consensus Clustering (SCC) 基于情绪共识聚类(SCC)的COVID-19期间BTC走势分析
A. Ibrahim
Tweets from social media can help in providing an early sign of market mood in the business sector. Opinion mining and machine learning can be used to discover the underlying sentiment. There's a link between Twitter sentiment and Bitcoin price changes in the future. Using the concept of Consensus clustering, this paper leverages Tweets collected during the COVID-19 timeframe to forecast early Bitcoin movements following the outbreak. Results from text datasets such as Twitter with various attributes, settings, and degrees show the superiority of the proposed consensus approach in predicting the BTC trend during and after the COVID-19 pandemic.
来自社交媒体的推文可以帮助提供商业领域市场情绪的早期迹象。意见挖掘和机器学习可以用来发现潜在的情绪。推特人气与未来比特币价格变化之间存在联系。本文利用共识聚类的概念,利用在COVID-19时间框架内收集的推文来预测疫情爆发后比特币的早期走势。来自Twitter等具有不同属性、设置和程度的文本数据集的结果表明,所提出的共识方法在预测COVID-19大流行期间和之后的比特币趋势方面具有优势。
{"title":"Analyzing BTC's Trend During COVID-19 Using A Sentiment Consensus Clustering (SCC)","authors":"A. Ibrahim","doi":"10.1109/iemcon53756.2021.9623182","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623182","url":null,"abstract":"Tweets from social media can help in providing an early sign of market mood in the business sector. Opinion mining and machine learning can be used to discover the underlying sentiment. There's a link between Twitter sentiment and Bitcoin price changes in the future. Using the concept of Consensus clustering, this paper leverages Tweets collected during the COVID-19 timeframe to forecast early Bitcoin movements following the outbreak. Results from text datasets such as Twitter with various attributes, settings, and degrees show the superiority of the proposed consensus approach in predicting the BTC trend during and after the COVID-19 pandemic.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130102610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Event-Driven Authentication Approach for Mediation of User Actions 一种事件驱动的用户行为中介认证方法
K. Marshall, Thomas Cantido, Jonathan Case, L. Nguyen, H. El-Razouk
Traditional authentication schemes challenge the user by something only they know, often a username and password, and become more robust with two-factor authentication. However, a new security problem arises when the system or service cannot ensure accountability for all events that occur within some user application. The vulnerability exists in authentication mechanisms that fail to provide security for events that occur after the login stage. This accountability issue leaves users susceptible to physical and cyber-attacks, such as physical compromises or Man-in-the-Middle (MITM) and replay attacks. In these cases the user is held accountable for these actions and the server is unaware that the legitimate user is no longer near the active session. Therefore, an additional authentication mechanism is needed to provide security up to the application layer when critical events are attempted. In this paper we study a practical, user-friendly approach to mediate critical events by authentication to verify the legitimate user is still near the live session. Critical events are authenticated by pairing the PC with the user's mobile smart device over a connection medium to determine if both devices are within an acceptable range. Afterwards, the PC sends a cryptographic challenge that can only be answered by the user's devices using the public key infrastructure and digital signatures. The smartphone replies back to the PC with a challenge, so that both devices can guarantee mutual authentication.
传统的身份验证方案向用户提出只有他们自己知道的问题,通常是用户名和密码,而采用双因素身份验证将变得更加健壮。但是,当系统或服务不能确保对某些用户应用程序中发生的所有事件负责时,就会出现新的安全问题。该漏洞存在于无法为登录阶段之后发生的事件提供安全性的身份验证机制中。这种责任问题使用户容易受到物理和网络攻击,例如物理折衷或中间人(MITM)和重放攻击。在这些情况下,用户对这些操作负责,服务器不知道合法用户不再靠近活动会话。因此,需要一个额外的身份验证机制,以便在尝试发生关键事件时向应用层提供安全性。在本文中,我们研究了一种实用的、用户友好的方法,通过身份验证来中介关键事件,以验证合法用户仍然在活动会话附近。关键事件通过将PC与用户的移动智能设备在连接介质上配对来验证,以确定两个设备是否在可接受的范围内。然后,PC发送一个加密挑战,该挑战只能由用户的设备使用公钥基础设施和数字签名来回答。智能手机以挑战的方式回复PC,这样两台设备就可以保证相互认证。
{"title":"An Event-Driven Authentication Approach for Mediation of User Actions","authors":"K. Marshall, Thomas Cantido, Jonathan Case, L. Nguyen, H. El-Razouk","doi":"10.1109/iemcon53756.2021.9623209","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623209","url":null,"abstract":"Traditional authentication schemes challenge the user by something only they know, often a username and password, and become more robust with two-factor authentication. However, a new security problem arises when the system or service cannot ensure accountability for all events that occur within some user application. The vulnerability exists in authentication mechanisms that fail to provide security for events that occur after the login stage. This accountability issue leaves users susceptible to physical and cyber-attacks, such as physical compromises or Man-in-the-Middle (MITM) and replay attacks. In these cases the user is held accountable for these actions and the server is unaware that the legitimate user is no longer near the active session. Therefore, an additional authentication mechanism is needed to provide security up to the application layer when critical events are attempted. In this paper we study a practical, user-friendly approach to mediate critical events by authentication to verify the legitimate user is still near the live session. Critical events are authenticated by pairing the PC with the user's mobile smart device over a connection medium to determine if both devices are within an acceptable range. Afterwards, the PC sends a cryptographic challenge that can only be answered by the user's devices using the public key infrastructure and digital signatures. The smartphone replies back to the PC with a challenge, so that both devices can guarantee mutual authentication.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130397093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks 一种基于隐写术的指纹认证机制,以对抗假物理生物识别和特洛伊木马攻击
K. K. H. Karunathilake, A. Shahan, M. N. M. Shamry, M. W. D. S. De Silva, A. Senarathne, K. Yapa
In the modern world, unique biometrics of every individual play a vital role in authentication processes. However, as convenient as it seems, biometrics come with their own set of drawbacks. For instance, if a passphrase is compromised (which is highly likely), changing it to a new passphrase would solve the issue. However, when someone's biometrics are compromised, there is no turning back. Simultaneously, biometric systems are often compromised due to the use of fake physical biometrics and trojan horse attacks that are capable of modifying the authentication process to fulfill a malicious user's intents. This research focuses on proposing a novel and secure authentication process that uses steganography. This “all-in-one” solution also focuses on mitigating the aforementioned drawbacks with the use of four modules, namely, the feature extraction module, the payload generation and authentication module, the fake physical biometrics countering module and the trojan horse countering module. This solution is implemented such that the idea behind it can be easily adopted to enhance the existing biometric authentication systems as well as improve the overall condition and user experience of the multi-factor authentication processes that are widely in use today.
在现代社会,每个人的独特生物特征在身份验证过程中起着至关重要的作用。然而,尽管看起来很方便,生物识别技术也有自己的缺点。例如,如果一个密码短语被泄露(这是很有可能的),将其更改为一个新的密码短语将解决问题。然而,当某人的生物特征被泄露时,就没有回头路了。与此同时,生物识别系统经常因为使用虚假的物理生物识别和特洛伊木马攻击而受到损害,这些攻击能够修改身份验证过程以实现恶意用户的意图。本研究的重点是提出一种使用隐写术的新型安全认证过程。这种“一体化”解决方案还侧重于通过使用四个模块来减轻上述缺点,即特征提取模块,有效载荷生成和认证模块,虚假物理生物识别对抗模块和特洛伊木马对抗模块。该解决方案的实现使得其背后的思想可以很容易地用于增强现有的生物识别身份验证系统,并改善目前广泛使用的多因素身份验证过程的整体状况和用户体验。
{"title":"A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks","authors":"K. K. H. Karunathilake, A. Shahan, M. N. M. Shamry, M. W. D. S. De Silva, A. Senarathne, K. Yapa","doi":"10.1109/iemcon53756.2021.9623240","DOIUrl":"https://doi.org/10.1109/iemcon53756.2021.9623240","url":null,"abstract":"In the modern world, unique biometrics of every individual play a vital role in authentication processes. However, as convenient as it seems, biometrics come with their own set of drawbacks. For instance, if a passphrase is compromised (which is highly likely), changing it to a new passphrase would solve the issue. However, when someone's biometrics are compromised, there is no turning back. Simultaneously, biometric systems are often compromised due to the use of fake physical biometrics and trojan horse attacks that are capable of modifying the authentication process to fulfill a malicious user's intents. This research focuses on proposing a novel and secure authentication process that uses steganography. This “all-in-one” solution also focuses on mitigating the aforementioned drawbacks with the use of four modules, namely, the feature extraction module, the payload generation and authentication module, the fake physical biometrics countering module and the trojan horse countering module. This solution is implemented such that the idea behind it can be easily adopted to enhance the existing biometric authentication systems as well as improve the overall condition and user experience of the multi-factor authentication processes that are widely in use today.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128808525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1