首页 > 最新文献

2022 5th International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
Identifying Concerns On Automatic Tools For Accessibility Assessment: A Comparative Case Study On Two Portuguese Universities' Websites 可访问性评估中对自动工具的关注:两所葡萄牙大学网站的比较案例研究
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00008
João Dias, Diana Carvalho, Arsénio Reis, J. Barroso, Tânia Rocha
The main purpose for conducting this research is to analyze the core advantages and disadvantages of automatic assessment tools. With this in mind, we considered two different web sites of two distinct Portuguese Universities and compare the accessibility and usability issues found, aiming at identifying core problems through errors / warnings. This outcome will help us understand the weaknesses of such automatic tools and, thus, suggest features that could be added to improve their analysis. These findings will serve as a basis for a proposal of a new type of platform capable of making any web or mobile application accessible to all types of users, regardless of their impairments (e.g., blindness, deafness, motor or intellectual disabilities).
进行本研究的主要目的是分析自动评估工具的核心优缺点。考虑到这一点,我们考虑了两所不同的葡萄牙大学的两个不同的网站,并比较了发现的可访问性和可用性问题,旨在通过错误/警告识别核心问题。这个结果将帮助我们理解这些自动工具的弱点,从而建议可以添加哪些特性来改进它们的分析。这些发现将作为一种新型平台的基础,这种平台能够使任何网络或移动应用程序对所有类型的用户都可访问,而不管他们的缺陷(例如,失明、耳聋、运动或智力残疾)。
{"title":"Identifying Concerns On Automatic Tools For Accessibility Assessment: A Comparative Case Study On Two Portuguese Universities' Websites","authors":"João Dias, Diana Carvalho, Arsénio Reis, J. Barroso, Tânia Rocha","doi":"10.1109/ICICT55905.2022.00008","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00008","url":null,"abstract":"The main purpose for conducting this research is to analyze the core advantages and disadvantages of automatic assessment tools. With this in mind, we considered two different web sites of two distinct Portuguese Universities and compare the accessibility and usability issues found, aiming at identifying core problems through errors / warnings. This outcome will help us understand the weaknesses of such automatic tools and, thus, suggest features that could be added to improve their analysis. These findings will serve as a basis for a proposal of a new type of platform capable of making any web or mobile application accessible to all types of users, regardless of their impairments (e.g., blindness, deafness, motor or intellectual disabilities).","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121519091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability Assessment and Attack Simulation on a Rooted Android Device 基于Android设备的漏洞评估与攻击模拟
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00024
Bryan Juville C. Ecarma, Justine Paul S. Luyon, Ma. Michelle A. Pantoja, Kent Dominic A. Quiros, Joacquin Carlo R. Sobrepeña, E. Blancaflor
A rooted android device is a means of unlocking the operating system, which allows any user to install unapproved programs, remove unwanted bloatware, upgrade the operating system, replace the firmware, overclock the processor, modify anything, and more. In this study, the researchers used Android 7 Nougat as an operating system seeking the security of a rooted android device. To test out the overall security of rootkits and advantages they claim to the phone itself, the group conducted penetration of a rooted android phone using the infected application, msfvenom, meterpreter, and metasploit, which resulted in successfully compromising or attacking the android phone. Despite the device being rooted, the Android 7.0 Nougat could not recognize the malicious files and did not protect the device. Though the rooting process was expected to boost the device's security due to superusers and administrative permissions, it could not prevent malicious files into the device.
android设备是解锁操作系统的一种手段,它允许任何用户安装未经批准的程序,删除不需要的臃肿软件,升级操作系统,更换固件,超频处理器,修改任何东西,等等。在这项研究中,研究人员使用Android 7牛轧糖作为操作系统,以寻求Android设备的安全性。为了测试rootkit的整体安全性和他们声称的手机本身的优势,该组织使用受感染的应用程序msfvenom, meterpreter和metasploit渗透了一个根深蒂固的android手机,最终成功地破坏或攻击了android手机。尽管设备已经扎根,安卓7.0牛轧糖无法识别恶意文件,也无法保护设备。虽然由于超级用户和管理权限,root过程有望提高设备的安全性,但它无法阻止恶意文件进入设备。
{"title":"Vulnerability Assessment and Attack Simulation on a Rooted Android Device","authors":"Bryan Juville C. Ecarma, Justine Paul S. Luyon, Ma. Michelle A. Pantoja, Kent Dominic A. Quiros, Joacquin Carlo R. Sobrepeña, E. Blancaflor","doi":"10.1109/ICICT55905.2022.00024","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00024","url":null,"abstract":"A rooted android device is a means of unlocking the operating system, which allows any user to install unapproved programs, remove unwanted bloatware, upgrade the operating system, replace the firmware, overclock the processor, modify anything, and more. In this study, the researchers used Android 7 Nougat as an operating system seeking the security of a rooted android device. To test out the overall security of rootkits and advantages they claim to the phone itself, the group conducted penetration of a rooted android phone using the infected application, msfvenom, meterpreter, and metasploit, which resulted in successfully compromising or attacking the android phone. Despite the device being rooted, the Android 7.0 Nougat could not recognize the malicious files and did not protect the device. Though the rooting process was expected to boost the device's security due to superusers and administrative permissions, it could not prevent malicious files into the device.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134139680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Control Method for Robot Constant Force Polishing Device 机器人恒力抛光装置的自适应控制方法
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00035
Jian Yin, Jiachen Ma, Wei Xie, Yifeng Sun, Maoyi Liu, Yonglei Li
Grinding and polishing of product parts are difficult points for industrial robots to be used in actual manufacturing. In constant force grinding process, the quality of the grinding process depends largely on whether the normal contact force can be kept constant during the grinding process. For this reason, an adaptive control method combined with fuzzy logic for the robot grinding and polishing device is proposed in this paper. In this method, an improvement of the single neuron proportional integral derivative (PID) control method is adopted and applied to the grinding and polishing device of industrial robots. Through simulation, it is found that this method can effectively reduce the adjustment time in contact force control. Aiming at the situation that the device is interfered many times, a non-linear function of the variable learning rate benchmark is proposed to improve the robustness of the system.
产品零件的磨削和抛光是工业机器人在实际制造中应用的难点。恒力磨削过程中,磨削过程的质量在很大程度上取决于磨削过程中法向接触力能否保持恒定。为此,本文提出了一种结合模糊逻辑的机器人磨削抛光装置自适应控制方法。该方法对单神经元比例积分导数(PID)控制方法进行了改进,并应用于工业机器人的磨削抛光装置。仿真结果表明,该方法可以有效地缩短接触力控制的调整时间。针对设备多次受到干扰的情况,提出了一种变学习率基准的非线性函数,以提高系统的鲁棒性。
{"title":"An Adaptive Control Method for Robot Constant Force Polishing Device","authors":"Jian Yin, Jiachen Ma, Wei Xie, Yifeng Sun, Maoyi Liu, Yonglei Li","doi":"10.1109/ICICT55905.2022.00035","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00035","url":null,"abstract":"Grinding and polishing of product parts are difficult points for industrial robots to be used in actual manufacturing. In constant force grinding process, the quality of the grinding process depends largely on whether the normal contact force can be kept constant during the grinding process. For this reason, an adaptive control method combined with fuzzy logic for the robot grinding and polishing device is proposed in this paper. In this method, an improvement of the single neuron proportional integral derivative (PID) control method is adopted and applied to the grinding and polishing device of industrial robots. Through simulation, it is found that this method can effectively reduce the adjustment time in contact force control. Aiming at the situation that the device is interfered many times, a non-linear function of the variable learning rate benchmark is proposed to improve the robustness of the system.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133516183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mixed reality (MR) Enabled Proprio and Teleoperation of a Humanoid Robot for Paraplegic Patients 基于混合现实(MR)的人形截瘫机器人的本体和远程操作
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00034
Filippo Sanfilippo, Jesper Smith, S. Bertrand, Tor Halvard Skarberg Svendsen
Paraplegia is a disability caused by impairment in motor or sensory functions of the lower limbs. Most paraplegic subjects use mechanical or motorised wheelchairs for their movement, however, this may limit the capability of patients to independently perform common activities of daily living (ADL). In this paper, a novel mixed reality (MR) enabled proprio and teleoperation framework for a humanoid robot is presented. The framework can be operated by a paraplegic person by using inputs from an MR headset. The framework enables varied and unscripted manipulation tasks in a realistic environment, combining navigation, perception, manipulation, and grasping. The impaired operator can make use of a wide range of interaction methods and tools, from direct teleoperation of the robot's full-body kinematics to performing grasping tasks or controlling the robot's mobile base. The adopted humanoid robot is the EVEr3 Humanoid Research Robot from Halodi Robotics, while the Oculus Rift S is chosen as MR headset. To demonstrate the potential of the proposed framework, a human subject study is presented. In this study, a home/workplace environment is rendered with MR by combining physical shelves and everyday objects, such as goods to be grasped, with simulated elements, such as the robot avatar and the control interface. A paraplegic subject is involved in the study. Results suggest that the proposed MR-enabled system improves the patient engagement and illusion of presence.
截瘫是由下肢运动或感觉功能受损引起的残疾。大多数截瘫患者使用机械或电动轮椅进行活动,然而,这可能限制患者独立进行日常生活活动(ADL)的能力。提出了一种基于混合现实的仿人机器人本体遥操作框架。该框架可以由截瘫患者通过使用MR头戴式耳机的输入来操作。该框架支持在现实环境中执行各种无脚本的操作任务,结合了导航、感知、操作和抓取。从直接远程操作机器人的全身运动学到执行抓取任务或控制机器人的移动基座,受损操作员可以利用广泛的交互方法和工具。采用的人形机器人是Halodi Robotics公司的EVEr3人形研究机器人,而选择Oculus Rift S作为MR头显。为了证明所提出的框架的潜力,提出了一项人体受试者研究。在本研究中,通过将物理货架和日常物品(如要抓取的商品)与模拟元素(如机器人化身和控制界面)相结合,用MR来渲染一个家庭/工作环境。一名截瘫患者参与了这项研究。结果表明,所提出的核磁共振系统改善了患者的参与和存在的错觉。
{"title":"Mixed reality (MR) Enabled Proprio and Teleoperation of a Humanoid Robot for Paraplegic Patients","authors":"Filippo Sanfilippo, Jesper Smith, S. Bertrand, Tor Halvard Skarberg Svendsen","doi":"10.1109/ICICT55905.2022.00034","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00034","url":null,"abstract":"Paraplegia is a disability caused by impairment in motor or sensory functions of the lower limbs. Most paraplegic subjects use mechanical or motorised wheelchairs for their movement, however, this may limit the capability of patients to independently perform common activities of daily living (ADL). In this paper, a novel mixed reality (MR) enabled proprio and teleoperation framework for a humanoid robot is presented. The framework can be operated by a paraplegic person by using inputs from an MR headset. The framework enables varied and unscripted manipulation tasks in a realistic environment, combining navigation, perception, manipulation, and grasping. The impaired operator can make use of a wide range of interaction methods and tools, from direct teleoperation of the robot's full-body kinematics to performing grasping tasks or controlling the robot's mobile base. The adopted humanoid robot is the EVEr3 Humanoid Research Robot from Halodi Robotics, while the Oculus Rift S is chosen as MR headset. To demonstrate the potential of the proposed framework, a human subject study is presented. In this study, a home/workplace environment is rendered with MR by combining physical shelves and everyday objects, such as goods to be grasped, with simulated elements, such as the robot avatar and the control interface. A paraplegic subject is involved in the study. Results suggest that the proposed MR-enabled system improves the patient engagement and illusion of presence.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of IoT Communication Technologies for Monitoring Agricultural Areas in the Provinces of Cotopaxi and Tungurahua - Ecuador 物联网通信技术在厄瓜多尔科托帕希省和通古拉瓦省监测农业区的比较分析
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00047
Alexis Ramírez-Mosquera, Christian Ruales-Galarza, Freddy Acosta Buenaño, D. Rivas-Lalaleo
The development of agriculture is based on the improvement of living standards, at the national level in the provinces of Cotopaxi and Tungurahua represents a topic of special interest, currently the agricultural sector is impacted by climate change, temperature and humidity variation, and soil alteration. This is why the Internet of Things with the integration of wireless communication technologies and sensors offer the possibility of generating technological systems that collect data from crop fields. The present study was based on the comparative analysis of wireless communication technologies for IoT in the monitoring of agricultural areas, compiling studies of scientific databases identifying global, American continent and local trends. The communication technologies were evaluated with their characteristics based on the Hierarchical Analysis Process method, obtaining Sigfox, LoRa and Zigbee as the main alternatives for radio coverage simulations. Subsequently, the radiation pattern of the technologies was obtained, selecting Sigfox for its characteristics and performance as the technology to be implemented for the network and sensor node operation. It was concluded that Sigfox is suitable for monitoring agricultural crops due to its wide coverage range, economic cost and low data sending rate, being a communication alternative for early warning of frost detection.
农业的发展是以提高生活水平为基础的,在科托帕希省和通古拉瓦省的国家层面上是一个特别感兴趣的话题,目前农业部门受到气候变化、温度和湿度变化以及土壤变化的影响。这就是为什么将无线通信技术和传感器集成在一起的物联网提供了产生从农田收集数据的技术系统的可能性。本研究基于物联网无线通信技术在农业监测领域的比较分析,以及对全球、美洲大陆和当地趋势的科学数据库的研究汇编。基于层次分析法对各通信技术的特性进行了评价,得出Sigfox、LoRa和Zigbee作为无线电覆盖仿真的主要备选方案。随后,获得了各技术的辐射图,并根据其特点和性能选择Sigfox作为网络和传感器节点运行的技术。综上所述,Sigfox具有覆盖范围广、成本经济、数据发送速率低等优点,适合用于农作物监测,是霜冻预警的通信替代方案。
{"title":"Comparative Analysis of IoT Communication Technologies for Monitoring Agricultural Areas in the Provinces of Cotopaxi and Tungurahua - Ecuador","authors":"Alexis Ramírez-Mosquera, Christian Ruales-Galarza, Freddy Acosta Buenaño, D. Rivas-Lalaleo","doi":"10.1109/ICICT55905.2022.00047","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00047","url":null,"abstract":"The development of agriculture is based on the improvement of living standards, at the national level in the provinces of Cotopaxi and Tungurahua represents a topic of special interest, currently the agricultural sector is impacted by climate change, temperature and humidity variation, and soil alteration. This is why the Internet of Things with the integration of wireless communication technologies and sensors offer the possibility of generating technological systems that collect data from crop fields. The present study was based on the comparative analysis of wireless communication technologies for IoT in the monitoring of agricultural areas, compiling studies of scientific databases identifying global, American continent and local trends. The communication technologies were evaluated with their characteristics based on the Hierarchical Analysis Process method, obtaining Sigfox, LoRa and Zigbee as the main alternatives for radio coverage simulations. Subsequently, the radiation pattern of the technologies was obtained, selecting Sigfox for its characteristics and performance as the technology to be implemented for the network and sensor node operation. It was concluded that Sigfox is suitable for monitoring agricultural crops due to its wide coverage range, economic cost and low data sending rate, being a communication alternative for early warning of frost detection.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Committees: ICICT 2022 委员会:ICICT 2022
Pub Date : 2022-03-01 DOI: 10.1109/icict55905.2022.00006
{"title":"Committees: ICICT 2022","authors":"","doi":"10.1109/icict55905.2022.00006","DOIUrl":"https://doi.org/10.1109/icict55905.2022.00006","url":null,"abstract":"","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124788252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on Deep Reinforcement Learning with Flappy Brid Gameplay 基于Flappy bridge玩法的深度强化学习分析
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00025
Zhixuan He
In recent years, machine learning has become a popular area in the IT field. In 2016, a game AI AlphaGo turned out to defeat many Go masters. The technology behind AlphaGo: the popularity of deep reinforcement learning is gradually increasing. This paper aims to use deep reinforcement learning algorithm to train a specific model which can play the Flappy Bird game autonomously. In this paper, two types of optimizers: Adam and RMSProp are used in the deep neural network during the training sessions and the testing results with the models are compared to figure out which model has a better performance when playing Flappy Bird. From the testing results, when the training rounds is insufficient, the model with Adam optimizer performs better than the model with RMSProp optimizer. However, when the training rounds are large enough, the performance of the model with RMSProp optimizer is almost 2 times better than the model with Adam optimizer. After comparison between the two models, this paper finds out that with the increasing of the training rounds, the performance of model with RMSProp optimizer will gradually exceed the model with Adam optimizer.
近年来,机器学习已经成为IT领域的热门领域。2016年,人工智能AlphaGo击败了许多围棋大师。AlphaGo背后的技术:深度强化学习的普及程度正在逐渐提高。本文旨在利用深度强化学习算法训练一个能够自主玩Flappy Bird游戏的特定模型。本文在深度神经网络的训练过程中使用了Adam和RMSProp两种优化器,并将模型的测试结果进行比较,找出哪种模型在玩《Flappy Bird》时表现更好。从测试结果来看,当训练轮数不足时,使用Adam优化器的模型比使用RMSProp优化器的模型性能更好。然而,当训练轮数足够大时,使用RMSProp优化器的模型的性能几乎是使用Adam优化器的模型的2倍。通过对两种模型的比较发现,随着训练次数的增加,使用RMSProp优化器的模型的性能会逐渐超过使用Adam优化器的模型。
{"title":"Analysis on Deep Reinforcement Learning with Flappy Brid Gameplay","authors":"Zhixuan He","doi":"10.1109/ICICT55905.2022.00025","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00025","url":null,"abstract":"In recent years, machine learning has become a popular area in the IT field. In 2016, a game AI AlphaGo turned out to defeat many Go masters. The technology behind AlphaGo: the popularity of deep reinforcement learning is gradually increasing. This paper aims to use deep reinforcement learning algorithm to train a specific model which can play the Flappy Bird game autonomously. In this paper, two types of optimizers: Adam and RMSProp are used in the deep neural network during the training sessions and the testing results with the models are compared to figure out which model has a better performance when playing Flappy Bird. From the testing results, when the training rounds is insufficient, the model with Adam optimizer performs better than the model with RMSProp optimizer. However, when the training rounds are large enough, the performance of the model with RMSProp optimizer is almost 2 times better than the model with Adam optimizer. After comparison between the two models, this paper finds out that with the increasing of the training rounds, the performance of model with RMSProp optimizer will gradually exceed the model with Adam optimizer.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Clickbait Content Spreaders on Online Social Networks 在线社交网络上的标题党内容传播者检测
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00012
Smita Ghosh, Pramita Das, Sneha Ghosh, Diptaraj Sen
Users on Online Social Networks play a pivotal role in the spread of misinformation and malicious content across these platforms. Clickbait headlines are one such malicious content that causes nuisance online. Resonating the idea of ‘Precaution is Better than Cure’, this paper focused on developing methods for the early detection of malicious clickbait content spreaders on Online Social Networks by finding User's Sharing Potential for each such malicious content user. In a billion node network, as the speed of content propagation is high, by the time they are detected to be fake or harmful, it's too late to take any recovery measures. The User's Sharing Potential of a user will help identify the potential sources/spreaders of clickbait content based on their past tendencies of sharing or publishing such information on an Online Social Network. The User's Sharing Potential metric also incorporated the effect of the influence of a user's neighborhood in the network, thus combining both user and neighborhood characteristics in determining the sharing pattern of a user. Different machine learning and deep learning models were trained for detecting clickbait posts of a user with almost ninety percent accuracy for some models. The trained classifiers and graph features were used to find the sharing potential of each user. Experiments were performed on real world datasets and the results show the efficacy of the proposed approach.
在线社交网络的用户在这些平台上传播错误信息和恶意内容方面发挥着关键作用。标题党(Clickbait)就是这样一种恶意内容,会在网上引起麻烦。与“预防胜于治疗”的理念相呼应,本文专注于通过寻找每个此类恶意内容用户的用户共享潜力,开发在线社交网络上恶意点击党内容传播者的早期检测方法。在十亿节点的网络中,由于内容的传播速度非常快,当内容被检测到是虚假的或有害的时,采取任何恢复措施都为时已晚。用户的分享潜力将根据用户过去在在线社交网络上分享或发布此类信息的倾向,帮助识别标题党内容的潜在来源/传播者。用户共享潜力指标还纳入了用户在网络中的邻居影响的影响,从而将用户和邻居特征结合起来确定用户的共享模式。对不同的机器学习和深度学习模型进行了训练,以检测用户的标题党帖子,其中一些模型的准确率接近90%。使用训练好的分类器和图特征来寻找每个用户的共享潜力。在实际数据集上进行了实验,结果表明了该方法的有效性。
{"title":"Detection of Clickbait Content Spreaders on Online Social Networks","authors":"Smita Ghosh, Pramita Das, Sneha Ghosh, Diptaraj Sen","doi":"10.1109/ICICT55905.2022.00012","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00012","url":null,"abstract":"Users on Online Social Networks play a pivotal role in the spread of misinformation and malicious content across these platforms. Clickbait headlines are one such malicious content that causes nuisance online. Resonating the idea of ‘Precaution is Better than Cure’, this paper focused on developing methods for the early detection of malicious clickbait content spreaders on Online Social Networks by finding User's Sharing Potential for each such malicious content user. In a billion node network, as the speed of content propagation is high, by the time they are detected to be fake or harmful, it's too late to take any recovery measures. The User's Sharing Potential of a user will help identify the potential sources/spreaders of clickbait content based on their past tendencies of sharing or publishing such information on an Online Social Network. The User's Sharing Potential metric also incorporated the effect of the influence of a user's neighborhood in the network, thus combining both user and neighborhood characteristics in determining the sharing pattern of a user. Different machine learning and deep learning models were trained for detecting clickbait posts of a user with almost ninety percent accuracy for some models. The trained classifiers and graph features were used to find the sharing potential of each user. Experiments were performed on real world datasets and the results show the efficacy of the proposed approach.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICU Patient Status Prediction Using Markov Chain Model 基于马尔可夫链模型的ICU患者状态预测
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00044
Sharmin Nahar Sharwardy, M. Rahman, H. Sarwar
Intensive care medicine usually involves making quick decisions based on large amounts of information. In making medical decisions, ICU physicians generally rely on personal experience to make subjective evaluations. It is necessary to continuously monitor the parameters related to the admission and health of ICU patients, and it seems necessary to equip each intensive care unit with a special estimation system. This paper develops a Markov chain model to predict patient conditions in the ICU. The dataset we used for this model is pediatric congenital heart disease ICU patients. The state is determined by prior age, weight, CVP, blood pressure, and urine output. We propose a state-based transition probability matrix using these parameters. Experimental results show that deteriorated patients rarely go to an improvement state. This analysis will be helpful in significantly improving the quality of care in the ICU.
重症监护医学通常需要在大量信息的基础上做出快速决定。在做出医疗决策时,ICU医生一般依靠个人经验进行主观评价。对ICU患者入院及健康相关参数进行持续监测是必要的,为每个重症监护室配备专门的评估系统似乎是必要的。本文建立了一个马尔可夫链模型来预测ICU患者的病情。我们用于该模型的数据集是儿科先天性心脏病ICU患者。状态由先前的年龄、体重、CVP、血压和尿量决定。我们利用这些参数提出了一个基于状态的转移概率矩阵。实验结果表明,病情恶化的患者很少能进入好转状态。这一分析将有助于显著提高ICU的护理质量。
{"title":"ICU Patient Status Prediction Using Markov Chain Model","authors":"Sharmin Nahar Sharwardy, M. Rahman, H. Sarwar","doi":"10.1109/ICICT55905.2022.00044","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00044","url":null,"abstract":"Intensive care medicine usually involves making quick decisions based on large amounts of information. In making medical decisions, ICU physicians generally rely on personal experience to make subjective evaluations. It is necessary to continuously monitor the parameters related to the admission and health of ICU patients, and it seems necessary to equip each intensive care unit with a special estimation system. This paper develops a Markov chain model to predict patient conditions in the ICU. The dataset we used for this model is pediatric congenital heart disease ICU patients. The state is determined by prior age, weight, CVP, blood pressure, and urine output. We propose a state-based transition probability matrix using these parameters. Experimental results show that deteriorated patients rarely go to an improvement state. This analysis will be helpful in significantly improving the quality of care in the ICU.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115182844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An IoT Adversary Emulation prototype tool 物联网对手仿真原型工具
Pub Date : 2022-03-01 DOI: 10.1109/ICICT55905.2022.00009
Shady Shahin, Hassan Soubra
Today, with the omnipresence of the Internet of Things (IoT) devices around the world, Cybersecurity threats have become a major concern. Security professionals who act as adversaries, or Red teams, play an important role in testing the security of those IoT devices. Adversary Emulation systems are one means towards identifying Cybersecurity vulnerabilities. In this paper, we review IoT malware in the literature and we propose an IoT Adversary Emulation prototype tool that covers different IoT malware techniques such as exploitation, evasion, data exfiltration and persistence. The prototype tool proposed has been tested using an IoT system composed of a router with IP cameras.
如今,随着物联网(IoT)设备在全球无处不在,网络安全威胁已成为一个主要问题。作为对手或红队的安全专业人员在测试这些物联网设备的安全性方面发挥着重要作用。对手仿真系统是识别网络安全漏洞的一种手段。在本文中,我们回顾了文献中的物联网恶意软件,并提出了一个物联网对手仿真原型工具,该工具涵盖了不同的物联网恶意软件技术,如利用、逃避、数据泄露和持久性。提出的原型工具已经使用由路由器和IP摄像机组成的物联网系统进行了测试。
{"title":"An IoT Adversary Emulation prototype tool","authors":"Shady Shahin, Hassan Soubra","doi":"10.1109/ICICT55905.2022.00009","DOIUrl":"https://doi.org/10.1109/ICICT55905.2022.00009","url":null,"abstract":"Today, with the omnipresence of the Internet of Things (IoT) devices around the world, Cybersecurity threats have become a major concern. Security professionals who act as adversaries, or Red teams, play an important role in testing the security of those IoT devices. Adversary Emulation systems are one means towards identifying Cybersecurity vulnerabilities. In this paper, we review IoT malware in the literature and we propose an IoT Adversary Emulation prototype tool that covers different IoT malware techniques such as exploitation, evasion, data exfiltration and persistence. The prototype tool proposed has been tested using an IoT system composed of a router with IP cameras.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122127394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1