首页 > 最新文献

2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)最新文献

英文 中文
Recommendation System with Reasoning Path Based on DQN and Knowledge Graph 基于DQN和知识图的推理路径推荐系统
Wenyi Xu, Xiaofeng Gao, Yin Sheng, Guihai Chen
Recommendation system is a popular research field. In the age of information explosion, a reliable recommendation system is necessary for users. There are a certain number of approaches to do recommendation work. Reinforcement learning is one of the methods used in recommendation system. In this paper, we use reinforcement learning to recommend items to target users, and achieved a rather good result. To give a better user experience, we have added explanations for recommended items. The explanation is realized by Knowledge Graph. We use TransE to embed target users and items, and it helps manage the information of users and items. Our method KGDQN combines Knowledge Graph and reinforcement learning, which can decide the proper recommendation items, and find the reasoning paths from target users to recommended items. Redundant edges are pruned and the DQN model renders a reward function which gives back the result of recommended items, and the explanation paths of the recommendation. Experiments are conducted on Amazon datasets which show the superior performance of KGDQN
推荐系统是一个热门的研究领域。在信息爆炸的时代,用户需要一个可靠的推荐系统。有一定数量的方法来做推荐工作。强化学习是推荐系统中常用的方法之一。在本文中,我们使用强化学习向目标用户推荐物品,并取得了相当好的效果。为了提供更好的用户体验,我们为推荐项目添加了说明。通过知识图谱实现解释。我们使用TransE来嵌入目标用户和项目,并帮助管理用户和项目的信息。我们的方法KGDQN结合了知识图和强化学习,可以确定合适的推荐项目,并找到从目标用户到推荐项目的推理路径。对冗余边进行修剪,DQN模型呈现一个奖励函数,该函数给出了推荐项目的结果和推荐的解释路径。在Amazon数据集上进行的实验表明,KGDQN具有优越的性能
{"title":"Recommendation System with Reasoning Path Based on DQN and Knowledge Graph","authors":"Wenyi Xu, Xiaofeng Gao, Yin Sheng, Guihai Chen","doi":"10.1109/IMCOM51814.2021.9377414","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377414","url":null,"abstract":"Recommendation system is a popular research field. In the age of information explosion, a reliable recommendation system is necessary for users. There are a certain number of approaches to do recommendation work. Reinforcement learning is one of the methods used in recommendation system. In this paper, we use reinforcement learning to recommend items to target users, and achieved a rather good result. To give a better user experience, we have added explanations for recommended items. The explanation is realized by Knowledge Graph. We use TransE to embed target users and items, and it helps manage the information of users and items. Our method KGDQN combines Knowledge Graph and reinforcement learning, which can decide the proper recommendation items, and find the reasoning paths from target users to recommended items. Redundant edges are pruned and the DQN model renders a reward function which gives back the result of recommended items, and the explanation paths of the recommendation. Experiments are conducted on Amazon datasets which show the superior performance of KGDQN","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"239 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131653537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research Issues & State of the Art Challenges in Event Detection 事件检测中的研究问题与挑战
Md. Nazmus Saadat, Hasibul Kabir, Muhammad Shuaib, R. Nassr, Mohd Nizam Husen, Husna Osman
Event detection is a cutting-edge problem in video image processing which is not that straight forward to solve. Hence, we perform a thorough search for state of the art in solving the issues in this area. There are many applications of event detection in this age of cybercrime. We target to propose a best solution to outperform existing research and make a positive development in it. We have discussed quite a long list of existing literature reviews in this hope that it would help us and anyone else working on the same as a guideline and one stop reading.
事件检测是视频图像处理中的一个前沿问题,并不是那么容易解决。因此,我们对解决这一领域问题的最新技术进行了彻底的研究。在这个网络犯罪猖獗的时代,事件检测有很多应用。我们的目标是提出一个最佳的解决方案,以超越现有的研究,并在其上取得积极的发展。我们已经讨论了相当长的现有文献评论列表,希望它能帮助我们和其他从事相同工作的人作为一个指南和一站式阅读。
{"title":"Research Issues & State of the Art Challenges in Event Detection","authors":"Md. Nazmus Saadat, Hasibul Kabir, Muhammad Shuaib, R. Nassr, Mohd Nizam Husen, Husna Osman","doi":"10.1109/IMCOM51814.2021.9377431","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377431","url":null,"abstract":"Event detection is a cutting-edge problem in video image processing which is not that straight forward to solve. Hence, we perform a thorough search for state of the art in solving the issues in this area. There are many applications of event detection in this age of cybercrime. We target to propose a best solution to outperform existing research and make a positive development in it. We have discussed quite a long list of existing literature reviews in this hope that it would help us and anyone else working on the same as a guideline and one stop reading.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stabilization of Floor Projection Image with Soft Unmanned Aerial Vehicle Projector 软无人机投影仪地板投影图像的稳定
Joonhyung Lee, B. Jeon, Seung Hwan Song, Hyoukryeol Choi
By mounting a projector on a soft unmanned aerial vehicle (UAV) called “S-CLOVD”, one can freely move and show visual information on the floor. One practical problem with the UAV-projector is the distortion of the projected image caused by UAV disturbance. In this paper, we propose a geometry-based method of stabilizing the floor projected image using the flight information of the UAV (e.g altitude, roll, pitch, yaw). By visual comparison of the stabilized images, its stabilization performance is shown much improved. In this paper, The UAV-projector system and stabilization algorithm are proposed. And, the performance of proposed idea is validated with experimental data.
通过在名为“S-CLOVD”的软无人机(UAV)上安装投影仪,可以自由移动并在地板上显示视觉信息。无人机投影仪的一个实际问题是无人机干扰引起的投影图像失真。在本文中,我们提出了一种基于几何的方法,利用无人机的飞行信息(如高度、滚转、俯仰、偏航)来稳定地板投影图像。通过对稳定后的图像进行视觉比较,表明其稳定性能有很大提高。本文提出了无人机投影系统及其稳定算法。并用实验数据验证了该方法的有效性。
{"title":"Stabilization of Floor Projection Image with Soft Unmanned Aerial Vehicle Projector","authors":"Joonhyung Lee, B. Jeon, Seung Hwan Song, Hyoukryeol Choi","doi":"10.1109/IMCOM51814.2021.9377365","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377365","url":null,"abstract":"By mounting a projector on a soft unmanned aerial vehicle (UAV) called “S-CLOVD”, one can freely move and show visual information on the floor. One practical problem with the UAV-projector is the distortion of the projected image caused by UAV disturbance. In this paper, we propose a geometry-based method of stabilizing the floor projected image using the flight information of the UAV (e.g altitude, roll, pitch, yaw). By visual comparison of the stabilized images, its stabilization performance is shown much improved. In this paper, The UAV-projector system and stabilization algorithm are proposed. And, the performance of proposed idea is validated with experimental data.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123143206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online State of Health Estimation of Batteries under Varying Discharging Current Based on a Long Short Term Memory 基于长短期记忆的变放电电流下电池健康状态在线评估
Areum Kim, Sukhan Lee
Accurate estimation of the State-of-Health (SOH) of a battery in a real-world operation is important for predicting its aging or anomaly status for the condition based maintenance as well as for the safety. Conventional approaches to the SOH estimation based on battery discharging characteristics, such as voltage and charge variations, deal mainly with the constant discharging current at individual cycles. However, it is clear that, in order to have the SOH estimation of a battery viable in real-world applications, the intra- and inter-cycle variation of discharging current should be taken into consideration. This paper shows that the battery SOH can be estimated accurately, with a sufficient generalization power, even under the varying intra- and inter-cycle discharging currents incurred by realtime payload variations. Specifically, first, we propose to represent the discharging characteristics of a battery by the four features: the entropies of the voltage and current distributions as well as the rated amounts of the total charge and the average current within a cycle. A sequence of these four feature values obtained along the progress of cycles are then input to a stacked LSTM for SOH estimation. Experiments are conducted based on CALCE datasets and the datasets collected under the intra-cycle time-varying discharging currents. The results indicate that the proposed method is able to obtain the accuracy of SOH estimation as high as, or even better than, that of the constant discharging current under varying discharging currents.
在实际操作中,准确估计电池的健康状态(SOH)对于预测电池的老化或异常状态,进行基于状态的维护以及安全性非常重要。传统的基于电池放电特性(如电压和电荷变化)估计SOH的方法主要处理单个循环的恒定放电电流。然而,很明显,为了使电池的SOH估计在实际应用中可行,应该考虑放电电流的周期内和周期间变化。本文表明,即使在实时载荷变化引起的周期内和周期间放电电流变化的情况下,也可以准确地估计出电池的SOH,并具有足够的泛化功率。具体来说,首先,我们提出用四个特征来表示电池的放电特性:电压和电流分布的熵,以及一个周期内总充电量和平均电流的额定量。然后将这四个特征值的序列输入到堆叠LSTM中进行SOH估计。实验基于CALCE数据集和循环内时变放电电流下采集的数据集。结果表明,在变放电电流条件下,该方法的SOH估计精度可达到或优于恒放电电流估计精度。
{"title":"Online State of Health Estimation of Batteries under Varying Discharging Current Based on a Long Short Term Memory","authors":"Areum Kim, Sukhan Lee","doi":"10.1109/IMCOM51814.2021.9377368","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377368","url":null,"abstract":"Accurate estimation of the State-of-Health (SOH) of a battery in a real-world operation is important for predicting its aging or anomaly status for the condition based maintenance as well as for the safety. Conventional approaches to the SOH estimation based on battery discharging characteristics, such as voltage and charge variations, deal mainly with the constant discharging current at individual cycles. However, it is clear that, in order to have the SOH estimation of a battery viable in real-world applications, the intra- and inter-cycle variation of discharging current should be taken into consideration. This paper shows that the battery SOH can be estimated accurately, with a sufficient generalization power, even under the varying intra- and inter-cycle discharging currents incurred by realtime payload variations. Specifically, first, we propose to represent the discharging characteristics of a battery by the four features: the entropies of the voltage and current distributions as well as the rated amounts of the total charge and the average current within a cycle. A sequence of these four feature values obtained along the progress of cycles are then input to a stacked LSTM for SOH estimation. Experiments are conducted based on CALCE datasets and the datasets collected under the intra-cycle time-varying discharging currents. The results indicate that the proposed method is able to obtain the accuracy of SOH estimation as high as, or even better than, that of the constant discharging current under varying discharging currents.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123589295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic Approach mec支持网络中基于边缘编排的计算对等卸载:一种模糊逻辑方法
M. Hossain, Tangina Sultana, Md. Alamgir Hossain, E. Huh
Multi-Access Edge Computing (MEC) is a promising candidate to handle the enormous computation demands of many emerging applications and the ever-growing user's quality-of-service (QoS) requirements. However, due to the limitation of computing resource capacity of a distinct edge server, most of the previous studies have proposed a collaboration approach. For collaboration, they considered vertical offloading between mobile with edge computing or edge with cloud computing for taking the advantages of both these technologies. Therefore, these approaches ignored the neighboring edge server having spare computing resources in the same tier. This paper thus proposes edge orchestration based computation peer offloading (EOPO) scheme among the edge servers in the same tier. The main objective is to share the computation resources among the edge servers. Our proposed approach selects the optimal computational node for task offloading based on fuzzy rules. Simulation results corroborate that fuzzy decision based computation peer offloading scheme significantly improves the performance of edge computing. Our proposed EOPO scheme outperformed the two reference schemes which can reduce the average task completion time and task failure rate at approximately 36% and 80.5% respectively when compared with the local edge offloading (LEO) scheme; and at approximately 25.4% and 67.2% respectively when compared with two-tier based offloading between edge with cloud (TTO) scheme.
多接入边缘计算(Multi-Access Edge Computing, MEC)是处理许多新兴应用的巨大计算需求和不断增长的用户服务质量(QoS)需求的一个很有前途的候选者。然而,由于不同边缘服务器计算资源容量的限制,以往的研究大多提出了协作的方法。对于协作,他们考虑在移动与边缘计算或边缘与云计算之间进行垂直卸载,以利用这两种技术的优势。因此,这些方法忽略了在同一层中具有空闲计算资源的相邻边缘服务器。为此,本文提出了一种在同一层边缘服务器之间基于边缘编排的计算对等卸载(EOPO)方案。主要目标是在边缘服务器之间共享计算资源。该方法基于模糊规则选择任务卸载的最优计算节点。仿真结果表明,基于模糊决策的计算对等卸载方案显著提高了边缘计算的性能。我们提出的EOPO方案优于两种参考方案,与局部边缘卸载(LEO)方案相比,平均任务完成时间和任务失败率分别减少了约36%和80.5%;与基于两层的边缘与云(TTO)方案相比,分别约为25.4%和67.2%。
{"title":"Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic Approach","authors":"M. Hossain, Tangina Sultana, Md. Alamgir Hossain, E. Huh","doi":"10.1109/IMCOM51814.2021.9377327","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377327","url":null,"abstract":"Multi-Access Edge Computing (MEC) is a promising candidate to handle the enormous computation demands of many emerging applications and the ever-growing user's quality-of-service (QoS) requirements. However, due to the limitation of computing resource capacity of a distinct edge server, most of the previous studies have proposed a collaboration approach. For collaboration, they considered vertical offloading between mobile with edge computing or edge with cloud computing for taking the advantages of both these technologies. Therefore, these approaches ignored the neighboring edge server having spare computing resources in the same tier. This paper thus proposes edge orchestration based computation peer offloading (EOPO) scheme among the edge servers in the same tier. The main objective is to share the computation resources among the edge servers. Our proposed approach selects the optimal computational node for task offloading based on fuzzy rules. Simulation results corroborate that fuzzy decision based computation peer offloading scheme significantly improves the performance of edge computing. Our proposed EOPO scheme outperformed the two reference schemes which can reduce the average task completion time and task failure rate at approximately 36% and 80.5% respectively when compared with the local edge offloading (LEO) scheme; and at approximately 25.4% and 67.2% respectively when compared with two-tier based offloading between edge with cloud (TTO) scheme.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Eff-YNet: A Dual Task Network for DeepFake Detection and Segmentation efff - ynet:一种用于深度伪造检测和分割的双任务网络
Eric Tjon, M. Moh, Teng-Sheng Moh
Advances in generative models and manipulation techniques have given rise to digitally altered videos known as deepfakes. These videos are difficult to identify for both humans and machines. Modern detection methods exploit various weaknesses in deepfake videos, such as visual artifacts and inconsistent posing. In this paper, we describe a novel architecture called Eff-YNet designed to detect visual differences between altered and unaltered areas. The architecture combines an EfficientNet encoder and a U-Net with a classification branch into a model capable of both classifying and segmenting deepfake videos. The task of segmentation helps train the classifier and also produces useful segmentation masks. We also implement ResNet 3D to detect spatiotemporal inconsistencies. To test these models, we run experiments against the Deepfake Detection Challenge dataset and show improvements over baseline classification models. Furthermore, we find that an ensemble of these two approaches improves performance over a single approach alone.
生成模型和操作技术的进步导致了被称为深度伪造的数字修改视频的出现。这些视频对人类和机器来说都很难识别。现代检测方法利用了深度假视频的各种弱点,比如视觉伪影和不一致的姿势。在本文中,我们描述了一种名为Eff-YNet的新架构,旨在检测改变和未改变区域之间的视觉差异。该架构将一个高效率编码器和一个U-Net与一个分类分支结合在一起,形成一个能够对深度假视频进行分类和分割的模型。分割任务有助于训练分类器,也产生有用的分割掩码。我们还实现了ResNet 3D来检测时空不一致性。为了测试这些模型,我们对Deepfake Detection Challenge数据集进行了实验,并展示了对基线分类模型的改进。此外,我们发现这两种方法的集成比单独使用一种方法提高了性能。
{"title":"Eff-YNet: A Dual Task Network for DeepFake Detection and Segmentation","authors":"Eric Tjon, M. Moh, Teng-Sheng Moh","doi":"10.1109/IMCOM51814.2021.9377373","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377373","url":null,"abstract":"Advances in generative models and manipulation techniques have given rise to digitally altered videos known as deepfakes. These videos are difficult to identify for both humans and machines. Modern detection methods exploit various weaknesses in deepfake videos, such as visual artifacts and inconsistent posing. In this paper, we describe a novel architecture called Eff-YNet designed to detect visual differences between altered and unaltered areas. The architecture combines an EfficientNet encoder and a U-Net with a classification branch into a model capable of both classifying and segmenting deepfake videos. The task of segmentation helps train the classifier and also produces useful segmentation masks. We also implement ResNet 3D to detect spatiotemporal inconsistencies. To test these models, we run experiments against the Deepfake Detection Challenge dataset and show improvements over baseline classification models. Furthermore, we find that an ensemble of these two approaches improves performance over a single approach alone.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126096736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transparent Data Dealing: Hyperledger Fabric Based Biomedical Engineering Supply Chain 透明数据处理:基于超级账本结构的生物医学工程供应链
Md. Ratul Amin, M. Zuhairi, Md. Nazmus Saadat
Blockchain is a decentralized and immutable technology which offers transparency for the digital world, where habitual technology does not. The novel blockchain technology may be employed by many sectors, i.e., healthcare, bank, government services, and supply chain. In particular, Biomedical Engineering Supply Chain (BESC) is a significant part of the medical sector that supplies equipment for the medical sector i.e., Covid-19 testing kit, PPE (Personal Protection Equipment), and medicine. The biomedical product should be able to be traced and the data secured; otherwise, the initial data may be modified and potentially risking patients and the public. Nevertheless, the conventional centralized technology creates a leakage point and as such, compromises data security. This paper proposes a new data dealing approach with using Hyperledger Fabric Blockchain-based BESC to alleviate the centralized controllable and operational issues. The blockchain-based BESC is a novel approach, which can control the users and subsequently eliminate the possibility of tampering within the blockchain system when stored.
区块链是一种去中心化和不可变的技术,它为数字世界提供了透明度,而传统技术却没有。新的区块链技术可用于许多部门,例如医疗保健、银行、政府服务和供应链。特别是,生物医学工程供应链(BESC)是医疗部门的重要组成部分,为医疗部门提供设备,如Covid-19检测试剂盒、个人防护装备(PPE)和药品。生物医药产品应当能够被追踪,数据应当是安全的;否则,最初的数据可能会被修改,并可能给患者和公众带来风险。然而,传统的集中式技术会产生泄漏点,因此会危及数据安全性。本文提出了一种新的数据处理方法,利用基于区块链的超级账本结构(Hyperledger Fabric)的BESC来缓解集中可控和操作问题。基于区块链的BESC是一种新颖的方法,可以控制用户,随后在存储时消除区块链系统内篡改的可能性。
{"title":"Transparent Data Dealing: Hyperledger Fabric Based Biomedical Engineering Supply Chain","authors":"Md. Ratul Amin, M. Zuhairi, Md. Nazmus Saadat","doi":"10.1109/IMCOM51814.2021.9377418","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377418","url":null,"abstract":"Blockchain is a decentralized and immutable technology which offers transparency for the digital world, where habitual technology does not. The novel blockchain technology may be employed by many sectors, i.e., healthcare, bank, government services, and supply chain. In particular, Biomedical Engineering Supply Chain (BESC) is a significant part of the medical sector that supplies equipment for the medical sector i.e., Covid-19 testing kit, PPE (Personal Protection Equipment), and medicine. The biomedical product should be able to be traced and the data secured; otherwise, the initial data may be modified and potentially risking patients and the public. Nevertheless, the conventional centralized technology creates a leakage point and as such, compromises data security. This paper proposes a new data dealing approach with using Hyperledger Fabric Blockchain-based BESC to alleviate the centralized controllable and operational issues. The blockchain-based BESC is a novel approach, which can control the users and subsequently eliminate the possibility of tampering within the blockchain system when stored.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128138501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dual Approach to Handling Imbalanced Class in Datasets Using Oversampling and Ensemble Learning Techniques 使用过采样和集成学习技术处理数据集中不平衡类的双重方法
Yoga Pristyanto, A. F. Nugraha, Irfan Pratama, Akhmad Dahlan, Lucky Adhikrisna Wirasakti
In the field of machine learning, the existence of class imbalances in the dataset will make the resulting model have less than optimal performance. Theoretically, the single classifier has a weakness for class imbalance conditions in the datasets because of the majority of single classifiers tend to work by recognizing patterns in the majority class the datasets are not balanced. So, the performance cannot be maximized. In this study, two approaches were introduced to deal with class imbalance conditions in the dataset. The first approach uses ADASYN as resampling while the second approach uses the Stacking algorithm as meta-learning. After conducting a test using 5 datasets with different imbalanced ratios, it shows that the proposed method produced the highest g-mean and AUC score compared to the other classification algorithms. The proposed method in this study is the stacking algorithm between the SVM and Random Forest algorithms and the addition of ADASYN in the resampling process. Hence, the proposed method can be a solution for handling class imbalance in datasets. However, this study has limitations such as the dataset used is a dataset with a binary class category. For this reason, for the future work, testing will be suggested using the imbalanced class dataset with the multiclass datasets.
在机器学习领域,数据集中类不平衡的存在会使得到的模型性能低于最优。从理论上讲,单个分类器对于数据集中的类不平衡条件有一个弱点,因为大多数单个分类器倾向于通过识别大多数数据集中不平衡的类中的模式来工作。因此,性能无法最大化。在本研究中,引入了两种方法来处理数据集中的类不平衡情况。第一种方法使用ADASYN作为重新采样,而第二种方法使用堆叠算法作为元学习。在使用5个不同失衡比例的数据集进行测试后发现,与其他分类算法相比,本文方法产生的g-mean和AUC得分最高。本文提出的方法是在SVM和Random Forest算法之间叠加算法,并在重采样过程中加入ADASYN。因此,所提出的方法可以作为处理数据集中类不平衡的一种解决方案。然而,本研究存在局限性,如使用的数据集是具有二进制类类别的数据集。因此,在未来的工作中,建议使用不平衡类数据集和多类数据集进行测试。
{"title":"Dual Approach to Handling Imbalanced Class in Datasets Using Oversampling and Ensemble Learning Techniques","authors":"Yoga Pristyanto, A. F. Nugraha, Irfan Pratama, Akhmad Dahlan, Lucky Adhikrisna Wirasakti","doi":"10.1109/IMCOM51814.2021.9377420","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377420","url":null,"abstract":"In the field of machine learning, the existence of class imbalances in the dataset will make the resulting model have less than optimal performance. Theoretically, the single classifier has a weakness for class imbalance conditions in the datasets because of the majority of single classifiers tend to work by recognizing patterns in the majority class the datasets are not balanced. So, the performance cannot be maximized. In this study, two approaches were introduced to deal with class imbalance conditions in the dataset. The first approach uses ADASYN as resampling while the second approach uses the Stacking algorithm as meta-learning. After conducting a test using 5 datasets with different imbalanced ratios, it shows that the proposed method produced the highest g-mean and AUC score compared to the other classification algorithms. The proposed method in this study is the stacking algorithm between the SVM and Random Forest algorithms and the addition of ADASYN in the resampling process. Hence, the proposed method can be a solution for handling class imbalance in datasets. However, this study has limitations such as the dataset used is a dataset with a binary class category. For this reason, for the future work, testing will be suggested using the imbalanced class dataset with the multiclass datasets.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126718195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM) 面向manet的分层协同入侵检测方法(HCIDM)
Teresia Ankome, G. Lusilao-Zodi
In the recent years, mobile ad hoc wireless networks (MANETs) have experienced a tremendous rise in popularity and usage due to their flexibility and ability to provide connectivity from anywhere at any time. In general, MANETs provide mobile communication to participating nodes in situation where nodes do not need access to an existing network infrastructure. MANETs have a network topology that changes over time due to lack of infrastructure and mobility of nodes. Detection of a malicious node in MANETs is hard to achieve due to the dynamic nature of the relationships between moving node and the nature of the wireless channel. Most traditional Intrusion Detection System (IDS) are designed to operate in a centralized manner; and do not operate properly in MANET because data in MANETs is distributed in different network devices. In this paper, we present an Hierarchical Cooperative Intrusion Detection Method (HCIDM) to secure packets routing in MANETs. HCIDM is a distributed intrusion detection mechanism that uses collaboration between nodes to detect active attacks against the routing table of a mobile ad hoc network. HCIDM reduces the effectiveness of the attack by informing other nodes about the existence of a malicious node to keep the performance of the network within an acceptable level. The novelty of the mechanism lies in the way the responsibility to protect the networks is distributed among nodes, the trust level is computed and the information about the presence of a malicious is communicated to potential victim. HCIDM is coded using the Network Simulator (NS-2) in an ad hoc on demand distance vector enable MANET during a black hole attack. It is found that the HCIDM works efficiently in comparison with an existing Collaborative Clustering Intrusion Detection Mechanism (CCIDM), in terms of delivery ratio, delay and throughput.
近年来,移动自组织无线网络(manet)由于其灵活性和随时随地提供连接的能力,在普及和使用方面经历了巨大的增长。一般来说,在节点不需要访问现有网络基础设施的情况下,manet为参与节点提供移动通信。由于缺乏基础设施和节点的移动性,manet具有随时间变化的网络拓扑结构。由于移动节点与无线信道之间关系的动态性,在manet中很难实现恶意节点的检测。大多数传统的入侵检测系统(IDS)被设计成以集中的方式运行;由于MANET中的数据分布在不同的网络设备中,因此在MANET中无法正常运行。本文提出了一种分层协同入侵检测方法(HCIDM)来保护在manet中的数据包路由。HCIDM是一种分布式入侵检测机制,它利用节点间的协作来检测针对移动自组织网络路由表的活动攻击。HCIDM通过通知其他节点恶意节点的存在来降低攻击的有效性,从而将网络性能保持在可接受的水平内。该机制的新颖之处在于保护网络的责任在节点之间分配,信任级别被计算,恶意存在的信息被传达给潜在的受害者。HCIDM是使用网络模拟器(NS-2)编码的,在黑洞攻击期间,在一个特殊的按需距离矢量中启用MANET。结果表明,与现有的协同集群入侵检测机制(CCIDM)相比,HCIDM在交付率、延迟和吞吐量等方面都具有较好的性能。
{"title":"Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)","authors":"Teresia Ankome, G. Lusilao-Zodi","doi":"10.1109/IMCOM51814.2021.9377357","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377357","url":null,"abstract":"In the recent years, mobile ad hoc wireless networks (MANETs) have experienced a tremendous rise in popularity and usage due to their flexibility and ability to provide connectivity from anywhere at any time. In general, MANETs provide mobile communication to participating nodes in situation where nodes do not need access to an existing network infrastructure. MANETs have a network topology that changes over time due to lack of infrastructure and mobility of nodes. Detection of a malicious node in MANETs is hard to achieve due to the dynamic nature of the relationships between moving node and the nature of the wireless channel. Most traditional Intrusion Detection System (IDS) are designed to operate in a centralized manner; and do not operate properly in MANET because data in MANETs is distributed in different network devices. In this paper, we present an Hierarchical Cooperative Intrusion Detection Method (HCIDM) to secure packets routing in MANETs. HCIDM is a distributed intrusion detection mechanism that uses collaboration between nodes to detect active attacks against the routing table of a mobile ad hoc network. HCIDM reduces the effectiveness of the attack by informing other nodes about the existence of a malicious node to keep the performance of the network within an acceptable level. The novelty of the mechanism lies in the way the responsibility to protect the networks is distributed among nodes, the trust level is computed and the information about the presence of a malicious is communicated to potential victim. HCIDM is coded using the Network Simulator (NS-2) in an ad hoc on demand distance vector enable MANET during a black hole attack. It is found that the HCIDM works efficiently in comparison with an existing Collaborative Clustering Intrusion Detection Mechanism (CCIDM), in terms of delivery ratio, delay and throughput.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analyzing System Based on Visualization of Packet Transfers and Method Calls on Object Storage System 基于对象存储系统数据包传输和方法调用可视化的性能分析系统
Makoto Nakagami, Shunpei Hayakawa, Saneyasu Yamaguchi
Object storage systems are widely used for unstructured data such as video data and music data. As these data are increasing its amount, the performance improvement of these object storage systems is increasing their importance. However, understanding their behaviors and finding the bottleneck process in them are difficult because these are distributed systems composed of multiple server computers. In this paper, we evaluate the file uploading performance of the Swift, which is a popular object storage implementation, and show that each uploading takes a long time in some cases. We then propose an analyzing system that visualizes packet transmissions and method calls. The analyzing system identifies the reasons why uploading takes a long time. For evaluating the proposed system, we apply this analyzing method to the Swift and reveal that a process in the Identity Server takes a long time and a hashing function $bcrypt$ is the bottleneck process. Finally, we present a discussion on performance importance based on this analyzing result.
对象存储系统广泛用于存储视频、音乐等非结构化数据。随着数据量的不断增加,对象存储系统的性能提升也变得越来越重要。然而,由于它们是由多台服务器计算机组成的分布式系统,因此很难理解它们的行为并找到其中的瓶颈过程。在本文中,我们评估了Swift(一种流行的对象存储实现)的文件上传性能,并表明在某些情况下,每次上传需要很长时间。然后,我们提出了一个可视化数据包传输和方法调用的分析系统。分析系统能够识别上传时间过长的原因。为了评估所提出的系统,我们将这种分析方法应用于Swift,并发现身份服务器中的一个过程需要很长时间,而哈希函数$bcrypt$是瓶颈过程。最后,在此分析结果的基础上对性能重要性进行了讨论。
{"title":"Performance Analyzing System Based on Visualization of Packet Transfers and Method Calls on Object Storage System","authors":"Makoto Nakagami, Shunpei Hayakawa, Saneyasu Yamaguchi","doi":"10.1109/IMCOM51814.2021.9377394","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377394","url":null,"abstract":"Object storage systems are widely used for unstructured data such as video data and music data. As these data are increasing its amount, the performance improvement of these object storage systems is increasing their importance. However, understanding their behaviors and finding the bottleneck process in them are difficult because these are distributed systems composed of multiple server computers. In this paper, we evaluate the file uploading performance of the Swift, which is a popular object storage implementation, and show that each uploading takes a long time in some cases. We then propose an analyzing system that visualizes packet transmissions and method calls. The analyzing system identifies the reasons why uploading takes a long time. For evaluating the proposed system, we apply this analyzing method to the Swift and reveal that a process in the Identity Server takes a long time and a hashing function $bcrypt$ is the bottleneck process. Finally, we present a discussion on performance importance based on this analyzing result.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129330333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1