首页 > 最新文献

2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)最新文献

英文 中文
Performance Analysis of Machine Learning Classifiers for Intrusion Detection 机器学习分类器在入侵检测中的性能分析
Skhumbuzo Zwane, Paul Tarwireyi, M. Adigun
Modern tactical wireless network (TWN) communication technologies are not only capable of transmitting voice but also capable of transmitting data. Due to such capabilities, TWN have high security requirements as any security breach can lead to detrimental effects. Hence, securing such an environment is not only a requirement but also a virtual prerequisite to the network centric warfare operational (NCW) theory. One key to securing this environment is to promptly and accurately recognize information warfare attacks directed to the network and respond to them. This is achieved using intrusion detection systems (IDS). However, false detection of nodes in hostile environment remains a major problem that need to be addressed. Recently, machine learning methods and algorithms have shown applicability and are growing research area for cyber security and intrusion detection. Conversely, several decades of research in the field of machine learning have resulted in a multitude of different algorithms for solving a broad range of problems. The question then becomes, which one amongst these machine learning algorithms have the potential to enhance or address IDS issues in TWN. In this paper, seven machine learning classifiers are analyzed; Multi-Layer Perceptron, Bayesian Network, Support Vector Machine (SMO), Adaboost, Random Forest, Bootstrap Aggregation, and Decision Tree (J48). WEKA tool was used to implement and evaluate the classifiers. The results obtained indicate that ensemble-based learning methods outperformed single learning methods when we consider the detection accuracy metrics; AUC, TPR, and FPR. However, ensemble classifiers tend to be slower in in terms of build time and model test time.
现代战术无线网络通信技术不仅具有传输语音的能力,而且具有传输数据的能力。由于这些能力,由于任何安全漏洞都可能导致不利影响,因此对网络的安全性要求很高。因此,确保这样的环境不仅是网络中心战操作(NCW)理论的要求,而且是虚拟先决条件。保护这种环境的一个关键是迅速准确地识别针对网络的信息战攻击并对其作出反应。这是通过入侵检测系统(IDS)实现的。然而,在恶劣环境下节点的误检测仍然是一个需要解决的主要问题。近年来,机器学习方法和算法在网络安全和入侵检测领域的应用日益广泛。相反,机器学习领域几十年的研究已经产生了许多不同的算法来解决各种各样的问题。那么问题就变成了,在这些机器学习算法中,哪一个有潜力增强或解决《TWN》中的IDS问题。本文分析了7种机器学习分类器;多层感知机、贝叶斯网络、支持向量机(SMO)、Adaboost、随机森林、Bootstrap聚合和决策树(J48)。使用WEKA工具实现和评估分类器。结果表明,当考虑检测精度指标时,基于集成的学习方法优于单一学习方法;AUC, TPR和FPR。然而,集成分类器在构建时间和模型测试时间方面往往较慢。
{"title":"Performance Analysis of Machine Learning Classifiers for Intrusion Detection","authors":"Skhumbuzo Zwane, Paul Tarwireyi, M. Adigun","doi":"10.1109/ICONIC.2018.8601203","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601203","url":null,"abstract":"Modern tactical wireless network (TWN) communication technologies are not only capable of transmitting voice but also capable of transmitting data. Due to such capabilities, TWN have high security requirements as any security breach can lead to detrimental effects. Hence, securing such an environment is not only a requirement but also a virtual prerequisite to the network centric warfare operational (NCW) theory. One key to securing this environment is to promptly and accurately recognize information warfare attacks directed to the network and respond to them. This is achieved using intrusion detection systems (IDS). However, false detection of nodes in hostile environment remains a major problem that need to be addressed. Recently, machine learning methods and algorithms have shown applicability and are growing research area for cyber security and intrusion detection. Conversely, several decades of research in the field of machine learning have resulted in a multitude of different algorithms for solving a broad range of problems. The question then becomes, which one amongst these machine learning algorithms have the potential to enhance or address IDS issues in TWN. In this paper, seven machine learning classifiers are analyzed; Multi-Layer Perceptron, Bayesian Network, Support Vector Machine (SMO), Adaboost, Random Forest, Bootstrap Aggregation, and Decision Tree (J48). WEKA tool was used to implement and evaluate the classifiers. The results obtained indicate that ensemble-based learning methods outperformed single learning methods when we consider the detection accuracy metrics; AUC, TPR, and FPR. However, ensemble classifiers tend to be slower in in terms of build time and model test time.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"51 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126001809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Wireless Communication Technologies in Internet of Things: A Critical Evaluation 物联网中的无线通信技术:关键评估
G. G. K. W. M. S. I. R. Karunarathne, K. Kulawansa, M. Firdhous
Internet of Things has gained the attention of almost everybody due to its capability of monitoring and controlling the environment. IoT helps making decisions supported by real data collected using large number of ordinary day-to-day devices that have been augmented with intelligence through the installation of sensing, processing and communication capabilities. One of the main and important aspects of any IoT device is its communication capability for transferring and sharing data between other devices. IoT devices mainly use wireless communication for communicating with other devices. The industry and the research community have proposed many communication technologies for IoT systems. In this paper, the authors present the results of an in-depth study carried out on the benefits and limitations of these communication technologies.
物联网以其监测和控制环境的能力得到了几乎所有人的关注。物联网有助于通过使用大量普通日常设备收集的真实数据来支持决策,这些设备通过安装传感、处理和通信功能而增强了智能。任何物联网设备的主要和重要方面之一是其在其他设备之间传输和共享数据的通信能力。物联网设备主要使用无线通信与其他设备进行通信。业界和研究界已经为物联网系统提出了许多通信技术。在本文中,作者介绍了对这些通信技术的优点和局限性进行深入研究的结果。
{"title":"Wireless Communication Technologies in Internet of Things: A Critical Evaluation","authors":"G. G. K. W. M. S. I. R. Karunarathne, K. Kulawansa, M. Firdhous","doi":"10.1109/ICONIC.2018.8601226","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601226","url":null,"abstract":"Internet of Things has gained the attention of almost everybody due to its capability of monitoring and controlling the environment. IoT helps making decisions supported by real data collected using large number of ordinary day-to-day devices that have been augmented with intelligence through the installation of sensing, processing and communication capabilities. One of the main and important aspects of any IoT device is its communication capability for transferring and sharing data between other devices. IoT devices mainly use wireless communication for communicating with other devices. The industry and the research community have proposed many communication technologies for IoT systems. In this paper, the authors present the results of an in-depth study carried out on the benefits and limitations of these communication technologies.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multi-path Load Balancing for SDN Data Plane SDN数据平面多路径负载均衡
M. Nkosi, A. Lysko, S. Dlamini
Networks have become an important feature of our day-to-day to life and therefore, user experience is an imperative goal to be achieved by network operators. Load balancing is a method of improving network performance, availability, minimizing delays and avoiding network congestion. In this paper, we study dynamic load balancing to improve network performance and reduce network response time. The load balancer is applied to OpenFlow SDN network’s data plane with Opendaylight as the controller. The flexibility of the load balancer is tested by using it on two different network topologies. Results show that the load balancer can improve the overall performance of the network and reduce delay. The main contribution of this work is a load balancing mechanism for SDN centralized controller environments which can be employed at any point in time in a network, for example, before network failure or after link failure, to avoid data plane congestion and link overloading.
网络已经成为我们日常生活的一个重要特征,因此,用户体验是网络运营商必须实现的一个目标。负载均衡是一种提高网络性能、可用性、最小化延迟和避免网络拥塞的方法。本文研究动态负载均衡,以提高网络性能,减少网络响应时间。负载均衡器应用于OpenFlow SDN网络的数据平面,Opendaylight作为控制器。通过在两个不同的网络拓扑上使用负载平衡器来测试它的灵活性。结果表明,负载均衡器可以提高网络的整体性能,降低时延。这项工作的主要贡献是为SDN集中控制器环境提供了一种负载均衡机制,可以在网络中的任何时间点,例如网络故障之前或链路故障之后使用,以避免数据平面拥塞和链路过载。
{"title":"Multi-path Load Balancing for SDN Data Plane","authors":"M. Nkosi, A. Lysko, S. Dlamini","doi":"10.1109/ICONIC.2018.8601241","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601241","url":null,"abstract":"Networks have become an important feature of our day-to-day to life and therefore, user experience is an imperative goal to be achieved by network operators. Load balancing is a method of improving network performance, availability, minimizing delays and avoiding network congestion. In this paper, we study dynamic load balancing to improve network performance and reduce network response time. The load balancer is applied to OpenFlow SDN network’s data plane with Opendaylight as the controller. The flexibility of the load balancer is tested by using it on two different network topologies. Results show that the load balancer can improve the overall performance of the network and reduce delay. The main contribution of this work is a load balancing mechanism for SDN centralized controller environments which can be employed at any point in time in a network, for example, before network failure or after link failure, to avoid data plane congestion and link overloading.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Effects of a Software Artefact Designed to Stimulate Abstract Thinking Ability on the Academic Performance in Object Oriented Programming of First Year Information Technology Students 为激发抽象思维能力而设计的软件构件对信息技术一年级学生面向对象编程学习成绩的影响
L. Grobbelaar
A below average throughput of Information Technology students specializing in software development is a challenge that many Universities and Universities of Technology in South Africa face. Contributing factors to this phenomenon are varied at best, but one of the identified factors are that students in this field, especially first year students, find it difficult to conceptualize the associated information and manner of thinking required to become successful in their studies. This is especially true when considering object orientated programming concepts and paradigms that students are required to master as part of their studies. Literary evidence suggests that a high level of working memory, which is associated with abstract thinking ability, is required when learning and applying object orientated programming concepts. The problem becomes more evident and serious if we consider that the Information and Communication Technology sector of a country is largely dependent on the graduating student populous in terms of growing the sector sustainably. A specialized software instrument was developed and tested in an attempt to affect a change in the abstract thinking ability of students from a student sample at a University of Technology. The results of this study focusses on the effect that the instrument realized on the academic performance of first year students related to particularly to object orientated programming and their abstract thinking ability in general as gauged by, amongst other instruments, the General Scholastic Ability Test, or GSAT, rather than focusing on the instrument itself.
专门从事软件开发的信息技术学生的平均吞吐量低于平均水平,这是南非许多大学和技术大学面临的挑战。造成这一现象的因素最多是多种多样的,但其中一个确定的因素是,这一领域的学生,尤其是一年级学生,发现很难概念化在学习中取得成功所需的相关信息和思维方式。当考虑到面向对象的编程概念和范式时,这一点尤其正确,因为学生需要将其作为学习的一部分来掌握。文献证据表明,在学习和应用面向对象的编程概念时,需要高水平的工作记忆,这与抽象思维能力有关。如果我们考虑到一个国家的信息和通信技术部门在可持续发展方面很大程度上依赖于毕业生人口,那么这个问题就会变得更加明显和严重。本文开发并测试了一种专门的软件工具,试图影响一所科技大学学生样本中学生抽象思维能力的变化。本研究的结果侧重于该工具对一年级学生的学习成绩的影响,特别是对面向对象编程和抽象思维能力的影响,这些能力一般是由通用学术能力测试(GSAT)等工具衡量的,而不是侧重于工具本身。
{"title":"The Effects of a Software Artefact Designed to Stimulate Abstract Thinking Ability on the Academic Performance in Object Oriented Programming of First Year Information Technology Students","authors":"L. Grobbelaar","doi":"10.1109/ICONIC.2018.8601262","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601262","url":null,"abstract":"A below average throughput of Information Technology students specializing in software development is a challenge that many Universities and Universities of Technology in South Africa face. Contributing factors to this phenomenon are varied at best, but one of the identified factors are that students in this field, especially first year students, find it difficult to conceptualize the associated information and manner of thinking required to become successful in their studies. This is especially true when considering object orientated programming concepts and paradigms that students are required to master as part of their studies. Literary evidence suggests that a high level of working memory, which is associated with abstract thinking ability, is required when learning and applying object orientated programming concepts. The problem becomes more evident and serious if we consider that the Information and Communication Technology sector of a country is largely dependent on the graduating student populous in terms of growing the sector sustainably. A specialized software instrument was developed and tested in an attempt to affect a change in the abstract thinking ability of students from a student sample at a University of Technology. The results of this study focusses on the effect that the instrument realized on the academic performance of first year students related to particularly to object orientated programming and their abstract thinking ability in general as gauged by, amongst other instruments, the General Scholastic Ability Test, or GSAT, rather than focusing on the instrument itself.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting and Removing the Impulsive Noise in OFDM Channels Using Different ANN Techniques 利用不同的人工神经网络技术检测和去除OFDM信道中的脉冲噪声
Olamide M. Shekoni, Ali N. Hasan, T. Shongwe
Orthogonal frequency division multiplexer (OFDM) is a recent modulation scheme used to transmit signals across power line communication (PLC) channel due to its robustness against some known PLC problems. However, this scheme is greatly affected by the impulsive noise (IN) and often causes corruption with the transmitted bits. Different impulsive noise error correcting methods have been introduced and used to remove impulsive noise in OFDM systems. However, these techniques suffer some limitations and require much signal to noise ratio (SNR) power to operate. In this paper, an approach of designing an effective impulsive-noise error-correcting technique was introduced using three-known artificial neural network techniques (Levenberg-Marquardt, Scaled conjugate gradient, and Bayesian regularization). Findings suggest that both Bayesian regularization and Levenberg-Marquardt ANN techniques can be used to effectively remove the impulsive noise present in an OFDM channel and using the least SNR power.
正交频分复用器(OFDM)是一种最新的用于跨电力线通信(PLC)信道传输信号的调制方案,因为它对一些已知的PLC问题具有鲁棒性。但是,该方案受脉冲噪声的影响较大,容易造成传输位的损坏。介绍了不同的脉冲噪声纠错方法,并将其用于消除OFDM系统中的脉冲噪声。然而,这些技术有一定的局限性,需要很高的信噪比(SNR)功率才能运行。本文介绍了一种利用三种已知的人工神经网络技术(Levenberg-Marquardt、缩放共轭梯度和贝叶斯正则化)设计有效的脉冲噪声纠错技术的方法。研究结果表明,贝叶斯正则化和Levenberg-Marquardt人工神经网络技术可以有效地去除OFDM信道中存在的脉冲噪声,并且使用最小的信噪比功率。
{"title":"Detecting and Removing the Impulsive Noise in OFDM Channels Using Different ANN Techniques","authors":"Olamide M. Shekoni, Ali N. Hasan, T. Shongwe","doi":"10.1109/ICONIC.2018.8601218","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601218","url":null,"abstract":"Orthogonal frequency division multiplexer (OFDM) is a recent modulation scheme used to transmit signals across power line communication (PLC) channel due to its robustness against some known PLC problems. However, this scheme is greatly affected by the impulsive noise (IN) and often causes corruption with the transmitted bits. Different impulsive noise error correcting methods have been introduced and used to remove impulsive noise in OFDM systems. However, these techniques suffer some limitations and require much signal to noise ratio (SNR) power to operate. In this paper, an approach of designing an effective impulsive-noise error-correcting technique was introduced using three-known artificial neural network techniques (Levenberg-Marquardt, Scaled conjugate gradient, and Bayesian regularization). Findings suggest that both Bayesian regularization and Levenberg-Marquardt ANN techniques can be used to effectively remove the impulsive noise present in an OFDM channel and using the least SNR power.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132373875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-hoc Networks 认知无线电Ad-hoc网络中拜占庭攻击缓解方案的设计
S. Mapunya, M. Velempini
The ever-increasing number of wireless network systems brought a problem of spectrum congestion leading to slow data communications. All of the radio spectrums are allocated to different users, services and applications. Hence studies have shown that some of those spectrum bands are underutilized while others are congested. Cognitive radio concept has evolved to solve the problem of spectrum congestion by allowing cognitive users to opportunistically utilize the underutilized spectrum while minimizing interference with other users. Byzantine attack is one of the security issues which threaten the successful deployment of this technology. Byzantine attack is compromised cognitive radios which relay falsified data about the availability of the spectrum to other legitimate cognitive radios in the network leading interference. In this paper we are proposing a security measure to thwart the effect caused by these attacks and compared it to Attack-Proof Cooperative Spectrum Sensing.
无线网络系统数量的不断增加带来了频谱拥塞问题,导致数据通信速度缓慢。所有的无线电频谱都分配给不同的用户、业务和应用。因此,研究表明,其中一些频谱带未得到充分利用,而另一些则拥挤不堪。认知无线电概念的发展是为了解决频谱拥塞问题,允许认知用户投机地利用未充分利用的频谱,同时尽量减少对其他用户的干扰。拜占庭攻击是威胁该技术成功部署的安全问题之一。拜占庭攻击是一种受损的认知无线电,它将有关频谱可用性的伪造数据转发给网络中其他合法的认知无线电,从而导致干扰。在本文中,我们提出了一种安全措施来阻止这些攻击所带来的影响,并将其与防攻击协同频谱感知进行了比较。
{"title":"The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-hoc Networks","authors":"S. Mapunya, M. Velempini","doi":"10.1109/ICONIC.2018.8601087","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601087","url":null,"abstract":"The ever-increasing number of wireless network systems brought a problem of spectrum congestion leading to slow data communications. All of the radio spectrums are allocated to different users, services and applications. Hence studies have shown that some of those spectrum bands are underutilized while others are congested. Cognitive radio concept has evolved to solve the problem of spectrum congestion by allowing cognitive users to opportunistically utilize the underutilized spectrum while minimizing interference with other users. Byzantine attack is one of the security issues which threaten the successful deployment of this technology. Byzantine attack is compromised cognitive radios which relay falsified data about the availability of the spectrum to other legitimate cognitive radios in the network leading interference. In this paper we are proposing a security measure to thwart the effect caused by these attacks and compared it to Attack-Proof Cooperative Spectrum Sensing.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of Automated Detection Methods for Cyberbullying 网络欺凌自动检测方法综述
Thabo Mahlangu, Chunling Tu, P. Owolawi
As we see the cyberspace evolve we also see a directly proportional growth of the people using the cyberspace for communication. As a result, the misuse of the cyberspace has given rise to negative issues such as cyberbullying, which is a form of harassing other people using information technology in a deliberate and continual manner. The detection and prevention of cyberbullying becomes critical for safe and health social media platforms. In this paper, a review of the cyberbullying content in Internet, the categories of cyberbullying, data sources containing cyberbullying data for research, and machine learning techniques for cyberbullying detection are overviewed. The main challenges of the cyberbullying detection are demonstrated, including the lack of multimedia content-based detection and availability of public accessible dataset. Suggestions are provided as the conclusion of the overview.
随着网络空间的发展,我们也看到使用网络空间进行交流的人数成正比地增长。因此,对网络空间的滥用产生了网络欺凌等负面问题,网络欺凌是一种故意和持续地使用信息技术骚扰他人的形式。发现和预防网络欺凌对于安全和健康的社交媒体平台至关重要。本文综述了网络欺凌的内容、网络欺凌的分类、包含网络欺凌研究数据的数据源以及用于网络欺凌检测的机器学习技术。指出了网络欺凌检测的主要挑战,包括缺乏基于多媒体内容的检测和公共可访问数据集的可用性。建议作为概述的结论。
{"title":"A Review of Automated Detection Methods for Cyberbullying","authors":"Thabo Mahlangu, Chunling Tu, P. Owolawi","doi":"10.1109/ICONIC.2018.8601278","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601278","url":null,"abstract":"As we see the cyberspace evolve we also see a directly proportional growth of the people using the cyberspace for communication. As a result, the misuse of the cyberspace has given rise to negative issues such as cyberbullying, which is a form of harassing other people using information technology in a deliberate and continual manner. The detection and prevention of cyberbullying becomes critical for safe and health social media platforms. In this paper, a review of the cyberbullying content in Internet, the categories of cyberbullying, data sources containing cyberbullying data for research, and machine learning techniques for cyberbullying detection are overviewed. The main challenges of the cyberbullying detection are demonstrated, including the lack of multimedia content-based detection and availability of public accessible dataset. Suggestions are provided as the conclusion of the overview.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131184427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Prohibition Signage Classification for the Visually Impaired Using AlexNet Transfer Learning Approach 使用AlexNet迁移学习方法的视障人士禁止标志分类
Kefentse Motshoane, Chunling Tu, P. Owolawi
Prohibition signs are commonly used for safety purposes in order to prevent and protect individuals from dangerous situations. These signs are placed in or around areas whereby they are clearly visible to the public. However, the visually impaired cannot visualize such signs. To help them, this paper proposes a system that combines Convolutional Neural Network (CNN) model and Computer Vision (CV) algorithms to detect and recognize prohibition signs in real scenes. The system uses pre-trained AlexNet model, fine-tuned using Prohibition Signage Boards (PSB) dataset and combined with Maximally Stable Extremal Regions (MSER) and Optical Character Recognition (OCR) techniques for text extraction and classification, to enhance the system performance. The experiments indicate that high recognition accuracies are achieved from a variety of prohibition images and prohibition texts.
禁止标志通常用于安全目的,以防止和保护个人免受危险情况。这些标志放置在公众清晰可见的区域内或周围。然而,视障人士无法看到这些标志。为了帮助他们,本文提出了一种结合卷积神经网络(CNN)模型和计算机视觉(CV)算法的系统来检测和识别真实场景中的禁止标志。该系统使用预训练的AlexNet模型,使用禁止标牌(PSB)数据集进行微调,并结合最大稳定极值区域(MSER)和光学字符识别(OCR)技术进行文本提取和分类,以提高系统性能。实验结果表明,该方法对多种禁止图像和禁止文本的识别精度较高。
{"title":"Prohibition Signage Classification for the Visually Impaired Using AlexNet Transfer Learning Approach","authors":"Kefentse Motshoane, Chunling Tu, P. Owolawi","doi":"10.1109/ICONIC.2018.8601274","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601274","url":null,"abstract":"Prohibition signs are commonly used for safety purposes in order to prevent and protect individuals from dangerous situations. These signs are placed in or around areas whereby they are clearly visible to the public. However, the visually impaired cannot visualize such signs. To help them, this paper proposes a system that combines Convolutional Neural Network (CNN) model and Computer Vision (CV) algorithms to detect and recognize prohibition signs in real scenes. The system uses pre-trained AlexNet model, fine-tuned using Prohibition Signage Boards (PSB) dataset and combined with Maximally Stable Extremal Regions (MSER) and Optical Character Recognition (OCR) techniques for text extraction and classification, to enhance the system performance. The experiments indicate that high recognition accuracies are achieved from a variety of prohibition images and prohibition texts.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129287593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sustainability Simulation and Assessment of Bicycle Network Design and Maintenance Environment 自行车网络设计与维护环境的可持续性模拟与评价
E. Ginters, M. Mezitis, D. Aizstrauta
Humans are an integral part of the nature and to avoid imbalance, the impact of technology on the surrounding environment should be limited. Therefore, green technologies are becoming an important part of economy, politics and science. One of the largest sources of pollution are motorized vehicles, that account for around 14 % of the global greenhouse gas emissions [1]. Use of green transportation within the integrated multimodal transport system is important to minimize carbon emissions [2]. One of these means of transportation is cycling. For cycling to become a fully integrated element within a multimodal transport system and not just a type of tourism, an appropriate infrastructure is necessary – cycling routes, lighting, bike rental, parking, repair services, as well as alignment with other types of transport. Cyclists need route planning tools, information about road surface quality, relief, and usage patterns during different weather conditions and over different days of the week. Infrastructure development projects demand significant financial resources and therefore municipalities need sustainable tools for services design and management. In this article the authors discuss acceptance and sustainability assessment methodology IASAM use to validate the VeloRouter - cycling network designing technology.
人类是自然不可分割的一部分,为了避免不平衡,技术对周围环境的影响应该受到限制。因此,绿色技术正在成为经济、政治和科学的重要组成部分。机动车是最大的污染源之一,约占全球温室气体排放量的14%[1]。在综合多式联运系统中使用绿色交通对于减少碳排放非常重要[2]。其中一种交通方式是骑自行车。为了使自行车成为多式联运系统中的一个完整的组成部分,而不仅仅是一种旅游,适当的基础设施是必要的——自行车路线、照明、自行车租赁、停车、维修服务,以及与其他类型的交通工具保持一致。骑自行车的人需要路线规划工具、路面质量、地形信息,以及在不同天气条件下和一周中不同日子的使用模式。基础设施发展项目需要大量财政资源,因此市政当局需要可持续的服务设计和管理工具。在本文中,作者讨论了可接受性和可持续性评估方法,IASAM用来验证velor外循环网络设计技术。
{"title":"Sustainability Simulation and Assessment of Bicycle Network Design and Maintenance Environment","authors":"E. Ginters, M. Mezitis, D. Aizstrauta","doi":"10.1109/ICONIC.2018.8601225","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601225","url":null,"abstract":"Humans are an integral part of the nature and to avoid imbalance, the impact of technology on the surrounding environment should be limited. Therefore, green technologies are becoming an important part of economy, politics and science. One of the largest sources of pollution are motorized vehicles, that account for around 14 % of the global greenhouse gas emissions [1]. Use of green transportation within the integrated multimodal transport system is important to minimize carbon emissions [2]. One of these means of transportation is cycling. For cycling to become a fully integrated element within a multimodal transport system and not just a type of tourism, an appropriate infrastructure is necessary – cycling routes, lighting, bike rental, parking, repair services, as well as alignment with other types of transport. Cyclists need route planning tools, information about road surface quality, relief, and usage patterns during different weather conditions and over different days of the week. Infrastructure development projects demand significant financial resources and therefore municipalities need sustainable tools for services design and management. In this article the authors discuss acceptance and sustainability assessment methodology IASAM use to validate the VeloRouter - cycling network designing technology.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115127209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Artificial Intelligence in Cyber Threats Intelligence 网络威胁情报中的人工智能
R. Trifonov, O. Nakov, V. Mladenov
In the field of Cyber Security there has been a transition from the stage of Cyber Criminality to the stage of Cyber War over the last few years. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. Тhis paper describes some of the results obtained at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. The analysis of the feasibility of various Artificial Intelligence methods has shown that a method that is equally effective for all stages of the Cyber Intelligence cannot be identified. While for Tactical Cyber Threats Intelligence has been selected and experimented a Multi-Agent System, the Recurrent Neural Networks are offered for the needs of Operational Cyber Threats Intelligence.
在过去的几年里,网络安全领域已经从网络犯罪阶段过渡到网络战争阶段。针对新的挑战,专家群体主要有两种途径:一是采用军事情报的理念和方法,二是利用人工智能方法对抗网络攻击。Тhis论文描述了索非亚技术大学在实施与应用智能方法增加计算机网络安全性有关的项目中获得的一些结果。对各种人工智能方法的可行性分析表明,无法找到一种对网络智能的所有阶段都同样有效的方法。针对战术网络威胁情报,选择并试验了多智能体系统,针对作战网络威胁情报的需要,提出了递归神经网络。
{"title":"Artificial Intelligence in Cyber Threats Intelligence","authors":"R. Trifonov, O. Nakov, V. Mladenov","doi":"10.1109/ICONIC.2018.8601235","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601235","url":null,"abstract":"In the field of Cyber Security there has been a transition from the stage of Cyber Criminality to the stage of Cyber War over the last few years. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. Тhis paper describes some of the results obtained at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. The analysis of the feasibility of various Artificial Intelligence methods has shown that a method that is equally effective for all stages of the Cyber Intelligence cannot be identified. While for Tactical Cyber Threats Intelligence has been selected and experimented a Multi-Agent System, the Recurrent Neural Networks are offered for the needs of Operational Cyber Threats Intelligence.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1