首页 > 最新文献

2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)最新文献

英文 中文
ECICE 2022 Cover Page ECICE 2022封面
Pub Date : 2022-10-28 DOI: 10.1109/ecice55674.2022.10042833
{"title":"ECICE 2022 Cover Page","authors":"","doi":"10.1109/ecice55674.2022.10042833","DOIUrl":"https://doi.org/10.1109/ecice55674.2022.10042833","url":null,"abstract":"","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123096328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Research of Network Information Security Evaluation Model Based on Machine Learning Algorithm 基于机器学习算法的网络信息安全评估模型分析与研究
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042828
Yuxiao Luo
Due to the rapid development of network technology and the rapid spread of information through the network, the security of information systems is also threatened in many aspects. The purpose of this study is to build a security evaluation model of network information based on machine learning algorithms and to improve the model and the accuracy of model evaluation. Firstly, a hierarchical network information security assessment index system is constructed. Secondly, to improve the accuracy of security assessment, an improved AFSA algorithm and TWSVM model are introduced for enhancing classification accuracy. A security assessment based on improved AFSA-TWSVM is proposed to evaluate the model. Finally, the experiments are carried out to compare with the AFSA-SVM-based security assessment model and the PSO-LLSVM security assessment model. The experimental results show that the average classification accuracy of the AFSA-SVM-based security assessment model and the PSO-LLSVM-based security assessment model is S7.5 and 83.33%, respectively. The average classification accuracy of the improved AFSA-TWSVM reaches 90%, which is better than the other two evaluation models in classification accuracy. Therefore, the model proposed in this study is more suitable for network information security evaluation.
由于网络技术的飞速发展和信息通过网络的快速传播,信息系统的安全也在许多方面受到威胁。本研究的目的是建立基于机器学习算法的网络信息安全评估模型,提高模型和模型评估的准确性。首先,构建了分层次的网络信息安全评估指标体系。其次,为了提高安全评估的准确性,引入了改进的AFSA算法和TWSVM模型来提高分类精度。提出了一种基于改进AFSA-TWSVM的安全评估方法对模型进行评估。最后,对基于afsa - svm的安全评估模型和基于PSO-LLSVM的安全评估模型进行了实验比较。实验结果表明,基于afsa - svm的安全评估模型和基于pso - llsvm的安全评估模型的平均分类准确率分别为S7.5和83.33%。改进后的AFSA-TWSVM的平均分类准确率达到90%,在分类准确率上优于其他两种评价模型。因此,本研究提出的模型更适合于网络信息安全评估。
{"title":"Analysis and Research of Network Information Security Evaluation Model Based on Machine Learning Algorithm","authors":"Yuxiao Luo","doi":"10.1109/ECICE55674.2022.10042828","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042828","url":null,"abstract":"Due to the rapid development of network technology and the rapid spread of information through the network, the security of information systems is also threatened in many aspects. The purpose of this study is to build a security evaluation model of network information based on machine learning algorithms and to improve the model and the accuracy of model evaluation. Firstly, a hierarchical network information security assessment index system is constructed. Secondly, to improve the accuracy of security assessment, an improved AFSA algorithm and TWSVM model are introduced for enhancing classification accuracy. A security assessment based on improved AFSA-TWSVM is proposed to evaluate the model. Finally, the experiments are carried out to compare with the AFSA-SVM-based security assessment model and the PSO-LLSVM security assessment model. The experimental results show that the average classification accuracy of the AFSA-SVM-based security assessment model and the PSO-LLSVM-based security assessment model is S7.5 and 83.33%, respectively. The average classification accuracy of the improved AFSA-TWSVM reaches 90%, which is better than the other two evaluation models in classification accuracy. Therefore, the model proposed in this study is more suitable for network information security evaluation.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Postprocessing System for Word-Filling and Quantifiers Based on Chinese Story Generation 基于中文故事生成的补词量词后处理系统
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042910
Rong-Guey Chang, Cheng-Yan Siao, Chia-ying Lee
In recent years, many fields have been related to introducing artificial intelligence to natural language generation. Although these natural language models have excellent results and generate smooth sentences, they are still not effective learning features such as character relationships, especially in the Chinese language. When a sentence is generated, it is necessary to pay attention to the following words to correctly predict and generate, such as quantifiers, which causes the generated words to be inappropriate and then affects the generation of subsequent words. Therefore, we developed a set of attention mechanism enhancement models, aiming at the generative language model that controls the ordering of generated speech parts, revising the different mechanisms of character fighting relationship and quantifier design, and adopting the traditional classification model one-against-all support vector machine training. The results show that the generated sentences are arranged in the same order as the original ones so the generation can be reliably controlled.
近年来,许多领域都与将人工智能引入自然语言生成有关。尽管这些自然语言模型取得了很好的效果,生成了流畅的句子,但它们仍然不能有效地学习字符关系等特征,特别是在汉语中。在生成一个句子的时候,要注意正确预测和生成下面的单词,比如量词,这会导致生成的单词不合适,进而影响后续单词的生成。因此,我们针对控制生成语音部分排序的生成语言模型,修正字符对抗关系和量词设计的不同机制,采用传统分类模型一对一的支持向量机训练,开发了一套注意机制增强模型。结果表明,生成的句子与原始句子排列顺序一致,可以可靠地控制生成。
{"title":"Postprocessing System for Word-Filling and Quantifiers Based on Chinese Story Generation","authors":"Rong-Guey Chang, Cheng-Yan Siao, Chia-ying Lee","doi":"10.1109/ECICE55674.2022.10042910","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042910","url":null,"abstract":"In recent years, many fields have been related to introducing artificial intelligence to natural language generation. Although these natural language models have excellent results and generate smooth sentences, they are still not effective learning features such as character relationships, especially in the Chinese language. When a sentence is generated, it is necessary to pay attention to the following words to correctly predict and generate, such as quantifiers, which causes the generated words to be inappropriate and then affects the generation of subsequent words. Therefore, we developed a set of attention mechanism enhancement models, aiming at the generative language model that controls the ordering of generated speech parts, revising the different mechanisms of character fighting relationship and quantifier design, and adopting the traditional classification model one-against-all support vector machine training. The results show that the generated sentences are arranged in the same order as the original ones so the generation can be reliably controlled.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Driving Energy Consumption for Wearable Industrial Lower Limb Exoskeleton Based on Improved Chameleon Algorithm and Human-machine Dynamics 基于改进变色龙算法和人机动力学的可穿戴工业下肢外骨骼驱动能耗优化
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042852
Songhua Hu, J. Bao, Chunhao Yang, Zuwei Hu, Xinbo Zhou, Nan Pan
In order to optimize the range of the wearable industrial lower limb exoskeleton during operation, firstly, the kinematic analysis of the lower limb exoskeleton is carried out, and the driving force model of each joint is derived through Lagrange ’s equation. Secondly, the motion stability constraint is derived by combining ZMP theory and D’Alembert’s principle. Finally, an optimization model with the optimal joint driving energy consumption as the objective function is constructed based on the continuous periodic motion of the lower limb exoskeleton. An improved Chameleon Swarm Algorithm (TNECSA) based on Tent chaos mapping, Niching behavior, and elite perturbation mechanism is designed to solve the model. Firstly, the Tent chaos mapping is used to generate high-quality initial feasible solutions. The small habitat technique is introduced to maintain the diversity of the population and expand the search range. Based on the elite perturbation mechanism, the elite individuals are perturbed by the sine cosine search operator to avoid the algorithm from falling into the local optimum. The designed algorithm is compared with other cutting-edge population intelligence algorithms in cross-sectional simulations respectively. The results validate the feasibility of the developed model and the improved algorithm in the human-machine dynamics optimization problem of exoskeleton robots.
为了优化可穿戴工业下肢外骨骼在工作时的活动范围,首先对下肢外骨骼进行运动学分析,并通过拉格朗日方程推导出各关节的驱动力模型。其次,结合ZMP理论和达朗贝尔原理推导出运动稳定性约束;最后,基于下肢外骨骼的连续周期运动,构建了以最优关节驱动能耗为目标函数的优化模型。设计了一种基于Tent混沌映射、壁龛行为和精英微扰机制的改进变色龙群算法(TNECSA)来求解该模型。首先,利用Tent混沌映射生成高质量的初始可行解;为了保持种群的多样性,扩大搜索范围,引入了小生境技术。基于精英扰动机制,利用正弦余弦搜索算子对精英个体进行扰动,避免算法陷入局部最优。在横断面仿真中,将所设计的算法与其他前沿群体智能算法进行了比较。仿真结果验证了所建模型和改进算法在外骨骼机器人人机动力学优化问题中的可行性。
{"title":"Optimization of Driving Energy Consumption for Wearable Industrial Lower Limb Exoskeleton Based on Improved Chameleon Algorithm and Human-machine Dynamics","authors":"Songhua Hu, J. Bao, Chunhao Yang, Zuwei Hu, Xinbo Zhou, Nan Pan","doi":"10.1109/ECICE55674.2022.10042852","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042852","url":null,"abstract":"In order to optimize the range of the wearable industrial lower limb exoskeleton during operation, firstly, the kinematic analysis of the lower limb exoskeleton is carried out, and the driving force model of each joint is derived through Lagrange ’s equation. Secondly, the motion stability constraint is derived by combining ZMP theory and D’Alembert’s principle. Finally, an optimization model with the optimal joint driving energy consumption as the objective function is constructed based on the continuous periodic motion of the lower limb exoskeleton. An improved Chameleon Swarm Algorithm (TNECSA) based on Tent chaos mapping, Niching behavior, and elite perturbation mechanism is designed to solve the model. Firstly, the Tent chaos mapping is used to generate high-quality initial feasible solutions. The small habitat technique is introduced to maintain the diversity of the population and expand the search range. Based on the elite perturbation mechanism, the elite individuals are perturbed by the sine cosine search operator to avoid the algorithm from falling into the local optimum. The designed algorithm is compared with other cutting-edge population intelligence algorithms in cross-sectional simulations respectively. The results validate the feasibility of the developed model and the improved algorithm in the human-machine dynamics optimization problem of exoskeleton robots.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121905503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Micro-hole Array Device for Picking the Micro Lenses 一种微孔阵列采集微透镜装置的设计
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042934
Kuan-Yu Lu, Gadi Ashok Kumar Reddy, Nguyen Ngoc Thai, K. Lee
Lenses are widely used in many areas mostly in mobile cameras and security cameras. Before installation, inspection is very important to check the lenses condition like dust particles and any other damages. lenses are very sensitive and easy to scratch when using clamping device to pick up lenses. So, we use vacuum to provide suction to pick up the lenses to avoid wear and scratches. In this study, combined servo motor with EDM to create micro-hole array, to place the lenses. User interface helps the user to control the XY-Table for exact coordinate location to make fine hole array. In the experiment, it shows that by adjusting the gap voltage, pulse on-time, pulse off-time and outlet water pressure, the machining speed can be controlled without reaming and scorching. The average error during machining operation to make a micro-hole array is 0.00405 mm. User interface application save a lot of time and helps to improve accuracy to make fine hole.
镜头被广泛应用于许多领域,主要是移动摄像机和安全摄像机。安装前的检查非常重要,要检查镜片的状况,如灰尘颗粒和任何其他损坏。镜片非常敏感,使用夹紧装置取镜片时容易划伤。因此,我们使用真空来提供吸力来拾取镜片,以避免磨损和划伤。在本研究中,将伺服电机与电火花加工相结合,形成微孔阵列,放置透镜。用户界面帮助用户控制XY-Table精确的坐标位置,以制作精细的孔阵列。实验表明,通过调节间隙电压、脉冲通断时间、脉冲关断时间和出水压力,可以控制加工速度,不产生铰孔和烧焦现象。加工微孔阵列时的平均误差为0.00405 mm。用户界面的应用节省了大量的时间,并有助于提高精孔的精度。
{"title":"Design of a Micro-hole Array Device for Picking the Micro Lenses","authors":"Kuan-Yu Lu, Gadi Ashok Kumar Reddy, Nguyen Ngoc Thai, K. Lee","doi":"10.1109/ECICE55674.2022.10042934","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042934","url":null,"abstract":"Lenses are widely used in many areas mostly in mobile cameras and security cameras. Before installation, inspection is very important to check the lenses condition like dust particles and any other damages. lenses are very sensitive and easy to scratch when using clamping device to pick up lenses. So, we use vacuum to provide suction to pick up the lenses to avoid wear and scratches. In this study, combined servo motor with EDM to create micro-hole array, to place the lenses. User interface helps the user to control the XY-Table for exact coordinate location to make fine hole array. In the experiment, it shows that by adjusting the gap voltage, pulse on-time, pulse off-time and outlet water pressure, the machining speed can be controlled without reaming and scorching. The average error during machining operation to make a micro-hole array is 0.00405 mm. User interface application save a lot of time and helps to improve accuracy to make fine hole.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122164685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Filtering Analysis of a Wet Scrubber with Computational Fluid Dynamics Simulation 基于计算流体动力学仿真的湿式洗涤器过滤分析
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042826
Shih-Chia Wang, Dena Gabriela
Environmental rules that restrict pollution emissions into the atmosphere are getting stricter. Therefore, it is essential to create new air pollution control technologies and enhance those that presently exist. A wet scrubber system is one of the most practical systems to control and remove pollutants that is used fluid mechanics and a little bit of propulsion system on its operation. The operation of a wet scrubber mainly concentrates on the water flow performance and filter design to capture the dust particles. This study focuses on analyzing the appropriate waterflow that will deliver a consistent flow through the filter at a specific velocity and briefly discusses the available filter performance for efficiency. Solid Works ST’s computer-aided drawing (CAD) program is used to design the pieces for 3D printing. In order to achieve the desired design, this study uses Computational Fluid Dynamic (CFD) simulation software (COMSOL Multiphysics 5.5) to evaluate the water tank design and filter performance in order to take the models’ accuracy and efficiency into account before they are combined to create a prototype and carry out the model’s experiment. The efficiency of filter with certain velocity if water flow is expected to be more than 70% on capturing the dust particles.
限制污染物排放到大气中的环境法规越来越严格。因此,必须创造新的空气污染控制技术,并加强现有的技术。湿式洗涤器系统是一种最实用的控制和去除污染物的系统,它使用了流体力学和少量的推进系统。湿式洗涤器的操作主要集中在水流性能和过滤器设计上,以捕获粉尘颗粒。本研究的重点是分析适当的水流,以特定的速度通过过滤器,并简要讨论了有效的过滤器性能。Solid Works ST的计算机辅助绘图(CAD)程序用于设计3D打印的部件。为了实现预期的设计,本研究使用计算流体动力学(CFD)仿真软件(COMSOL Multiphysics 5.5)对水箱设计和过滤器性能进行评估,以考虑模型的准确性和效率,然后将它们组合在一起创建原型并进行模型实验。当水流量达到一定流速时,过滤器对粉尘颗粒的捕集率可达70%以上。
{"title":"Filtering Analysis of a Wet Scrubber with Computational Fluid Dynamics Simulation","authors":"Shih-Chia Wang, Dena Gabriela","doi":"10.1109/ECICE55674.2022.10042826","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042826","url":null,"abstract":"Environmental rules that restrict pollution emissions into the atmosphere are getting stricter. Therefore, it is essential to create new air pollution control technologies and enhance those that presently exist. A wet scrubber system is one of the most practical systems to control and remove pollutants that is used fluid mechanics and a little bit of propulsion system on its operation. The operation of a wet scrubber mainly concentrates on the water flow performance and filter design to capture the dust particles. This study focuses on analyzing the appropriate waterflow that will deliver a consistent flow through the filter at a specific velocity and briefly discusses the available filter performance for efficiency. Solid Works ST’s computer-aided drawing (CAD) program is used to design the pieces for 3D printing. In order to achieve the desired design, this study uses Computational Fluid Dynamic (CFD) simulation software (COMSOL Multiphysics 5.5) to evaluate the water tank design and filter performance in order to take the models’ accuracy and efficiency into account before they are combined to create a prototype and carry out the model’s experiment. The efficiency of filter with certain velocity if water flow is expected to be more than 70% on capturing the dust particles.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128648449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Outpatient Doctor Allocation in Q Hospital Based on Queuing Theory 基于排队理论的Q医院门诊医生配置优化
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042831
Xue Li
Medical and health services are important in people's livelihood. Thus, governments attach great importance to the development of medical and health services. In this study, the gynecological outpatient clinic of Q hospital is taken as the research object as Q hospital outpatient operation efficiency still has a lot of problems. A long queue of patients in the hospital shows a problem in receiving medical treatment and low operational efficiency. For doctors on duty in outpatient departments, there are different periods in the day for outpatient departments, so the feature of the queue is different. Therefore, according to the difference, a reasonable arrangement of the number of on-duty doctors in Q hospital is needed for improving the utilization of resources and reducing the operation cost. It also improves the quality of hospital service and the satisfaction of patients.
医疗卫生服务是民生之本。因此,各国政府非常重视医疗卫生事业的发展。本研究以Q医院妇科门诊为研究对象,因为Q医院门诊运营效率仍存在诸多问题。医院里病人排着长队,这表明就医存在问题,运营效率低下。对于门诊值班医生来说,门诊一天的时段不同,排队的特点也不同。因此,需要根据差异合理安排Q医院的值班医生数量,提高资源利用率,降低手术成本。提高了医院的服务质量和患者的满意度。
{"title":"Optimization of Outpatient Doctor Allocation in Q Hospital Based on Queuing Theory","authors":"Xue Li","doi":"10.1109/ECICE55674.2022.10042831","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042831","url":null,"abstract":"Medical and health services are important in people's livelihood. Thus, governments attach great importance to the development of medical and health services. In this study, the gynecological outpatient clinic of Q hospital is taken as the research object as Q hospital outpatient operation efficiency still has a lot of problems. A long queue of patients in the hospital shows a problem in receiving medical treatment and low operational efficiency. For doctors on duty in outpatient departments, there are different periods in the day for outpatient departments, so the feature of the queue is different. Therefore, according to the difference, a reasonable arrangement of the number of on-duty doctors in Q hospital is needed for improving the utilization of resources and reducing the operation cost. It also improves the quality of hospital service and the satisfaction of patients.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Analysis of Attentional Biases on Clinical Depression: Eye Tracking Study 临床抑郁症的注意偏倚研究与分析:眼动追踪研究
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042888
Meng Zhang, Yue Chen, Shuo Tang, Ting Zhou, Zheng Huang
We investigated the different effects of mood induction in depressed and healthy people through an eyetracking study. In the early stage of attention, negative mood induction affects the speed and time of the attention focus of depressed people, while the control group is not be affected. However, in the late stage of attention, depressed people are less affected by emotional stimulation, while the healthy control group shows protective and attentional bias.
我们通过一项眼球追踪研究,调查了情绪诱导对抑郁症患者和健康人的不同影响。在注意的早期阶段,负性情绪诱导会影响抑郁症患者注意力集中的速度和时间,而对照组则不受影响。但在注意后期,抑郁症患者受情绪刺激的影响较小,而健康对照组则表现出保护和注意偏倚。
{"title":"Research and Analysis of Attentional Biases on Clinical Depression: Eye Tracking Study","authors":"Meng Zhang, Yue Chen, Shuo Tang, Ting Zhou, Zheng Huang","doi":"10.1109/ECICE55674.2022.10042888","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042888","url":null,"abstract":"We investigated the different effects of mood induction in depressed and healthy people through an eyetracking study. In the early stage of attention, negative mood induction affects the speed and time of the attention focus of depressed people, while the control group is not be affected. However, in the late stage of attention, depressed people are less affected by emotional stimulation, while the healthy control group shows protective and attentional bias.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating Users’ Privacy Concerns of Internet of Things (IoT) Smart Devices 调查用户对物联网(IoT)智能设备的隐私问题
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042926
Daniel Joy, O. Kotevska, Eyhab Al-Masri
Although the number of smart Internet of Things (IoT) devices has grown in recent years, the public's perception of how effectively these devices secure IoT data has been questioned. Many IoT users do not have a good level of confidence in the security or privacy procedures implemented within IoT smart devices for protecting personal IoT data. Moreover, determining the level of confidence end users have in their smart devices is becoming a major challenge. In this paper, we present a study that focuses on identifying privacy concerns IoT end users have when using IoT smart devices. We investigated multiple smart devices and conducted a survey to identify users’ privacy concerns. Furthermore, we identify five IoT privacy-preserving (IoTPP) control policies that we define and employ in comparing the privacy measures implemented by various popular smart devices. Results from our study show that the over 86% of participants are very or extremely concerned about the security and privacy of their personal data when using smart IoT devices such as Google Nest Hub or Amazon Alexa. In addition, our study shows that a significant number of IoT users may not be aware that their personal data is collected, stored or shared by IoT devices.
尽管近年来智能物联网(IoT)设备的数量有所增长,但公众对这些设备如何有效保护物联网数据的看法一直受到质疑。许多物联网用户对物联网智能设备中为保护个人物联网数据而实施的安全或隐私程序缺乏良好的信心。此外,确定终端用户对其智能设备的信心程度正成为一项重大挑战。在本文中,我们提出了一项研究,重点是确定物联网最终用户在使用物联网智能设备时的隐私问题。我们调查了多种智能设备,并进行了一项调查,以确定用户对隐私的担忧。此外,我们确定了五种物联网隐私保护(IoTPP)控制策略,我们定义并采用这些策略来比较各种流行智能设备实施的隐私措施。我们的研究结果显示,超过86%的参与者在使用谷歌Nest Hub或亚马逊Alexa等智能物联网设备时,非常或极度担心个人数据的安全和隐私。此外,我们的研究表明,相当多的物联网用户可能不知道他们的个人数据被物联网设备收集、存储或共享。
{"title":"Investigating Users’ Privacy Concerns of Internet of Things (IoT) Smart Devices","authors":"Daniel Joy, O. Kotevska, Eyhab Al-Masri","doi":"10.1109/ECICE55674.2022.10042926","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042926","url":null,"abstract":"Although the number of smart Internet of Things (IoT) devices has grown in recent years, the public's perception of how effectively these devices secure IoT data has been questioned. Many IoT users do not have a good level of confidence in the security or privacy procedures implemented within IoT smart devices for protecting personal IoT data. Moreover, determining the level of confidence end users have in their smart devices is becoming a major challenge. In this paper, we present a study that focuses on identifying privacy concerns IoT end users have when using IoT smart devices. We investigated multiple smart devices and conducted a survey to identify users’ privacy concerns. Furthermore, we identify five IoT privacy-preserving (IoTPP) control policies that we define and employ in comparing the privacy measures implemented by various popular smart devices. Results from our study show that the over 86% of participants are very or extremely concerned about the security and privacy of their personal data when using smart IoT devices such as Google Nest Hub or Amazon Alexa. In addition, our study shows that a significant number of IoT users may not be aware that their personal data is collected, stored or shared by IoT devices.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction the Thermal of Compression Dead-end and Jumper Terminal for Electrical Equipment Based on High Voltage Transmission Lines, Case Study of Electricity Du Cambodia (EDC) 基于高压输电线路的电气设备压缩端和跳线端热预测,以柬埔寨电力公司为例
Pub Date : 2022-10-28 DOI: 10.1109/ECICE55674.2022.10042821
Singhen Suos, Lixiao Cong
The high voltage overhead transmission line system is one of the methods of delivering electric power at a high voltage of Electricity Du Cambodia (EDC) is the largest company in Cambodia’s location, which transmitted from one source to another distribution, especially over a long distance to the customers. In an electrical power system, compression dead end and jumper terminal is one of the most important pieces of equipment and play important roles in the transmission system high voltage as well. Moreover, a bad or loose connection can be made a hot spot for generating the thermal that affecting for transmitting power, for the survey thermal energy of electrical equipment that they can to observed and quantified as thermography by applying infrared imaging and measuring the camera techniques. This method of detecting heat output is known as infrared thermography (IRT). Infrared thermography is not only a cost-effective technology but also powerful diagnostic equipment for improving system efficiency and dependability, power quality, and worker safety, and preventing outages, expensive equipment failure, and line losses. Using the Neural Network (NN) in the comparison to the Linear Regression (LR) model. This paper regarded schedule working actual base on the history of transmission line reports of using IRT which was noted by EDC, and the input parameters were the weather factors, wind speed, duration of operation, and load on the line. The prediction accuracy of these two methodologies was calculated with the use of the mean absolute percentage error (MAPE), Mean Square Error (MSE), Root Mean Square Error (RMSE), and Mean Absolute Error (MAE). Based on the act result of the two models, the Neural Network (NN) model is better performance accuracy.
高压架空输电线路系统是柬埔寨电力公司(EDC)输送高压电力的方法之一,EDC是柬埔寨最大的公司,它从一个电源传输到另一个配电,特别是长距离传输到客户。在电力系统中,压缩死端和跳线端子是最重要的设备之一,在高压输电系统中也起着重要的作用。此外,不良或松动的连接可能成为产生影响传输功率的热的热点,对于电气设备的测量热能,他们可以通过红外成像和测量相机技术来观察和量化为热成像。这种检测热输出的方法被称为红外热成像(IRT)。红外热像仪不仅是一种经济高效的技术,而且是一种强大的诊断设备,可以提高系统的效率和可靠性,提高电能质量,提高工人的安全,防止停电,昂贵的设备故障和线路损耗。使用神经网络(NN)与线性回归(LR)模型进行比较。本文根据EDC记录的输电线路使用IRT的历史报告,以天气因素、风速、运行时间和线路负荷为输入参数,考虑调度工作的实际情况。使用平均绝对百分比误差(MAPE)、均方误差(MSE)、均方根误差(RMSE)和平均绝对误差(MAE)来计算这两种方法的预测精度。根据两种模型的作用结果,神经网络(NN)模型具有更好的性能精度。
{"title":"Prediction the Thermal of Compression Dead-end and Jumper Terminal for Electrical Equipment Based on High Voltage Transmission Lines, Case Study of Electricity Du Cambodia (EDC)","authors":"Singhen Suos, Lixiao Cong","doi":"10.1109/ECICE55674.2022.10042821","DOIUrl":"https://doi.org/10.1109/ECICE55674.2022.10042821","url":null,"abstract":"The high voltage overhead transmission line system is one of the methods of delivering electric power at a high voltage of Electricity Du Cambodia (EDC) is the largest company in Cambodia’s location, which transmitted from one source to another distribution, especially over a long distance to the customers. In an electrical power system, compression dead end and jumper terminal is one of the most important pieces of equipment and play important roles in the transmission system high voltage as well. Moreover, a bad or loose connection can be made a hot spot for generating the thermal that affecting for transmitting power, for the survey thermal energy of electrical equipment that they can to observed and quantified as thermography by applying infrared imaging and measuring the camera techniques. This method of detecting heat output is known as infrared thermography (IRT). Infrared thermography is not only a cost-effective technology but also powerful diagnostic equipment for improving system efficiency and dependability, power quality, and worker safety, and preventing outages, expensive equipment failure, and line losses. Using the Neural Network (NN) in the comparison to the Linear Regression (LR) model. This paper regarded schedule working actual base on the history of transmission line reports of using IRT which was noted by EDC, and the input parameters were the weather factors, wind speed, duration of operation, and load on the line. The prediction accuracy of these two methodologies was calculated with the use of the mean absolute percentage error (MAPE), Mean Square Error (MSE), Root Mean Square Error (RMSE), and Mean Absolute Error (MAE). Based on the act result of the two models, the Neural Network (NN) model is better performance accuracy.","PeriodicalId":282635,"journal":{"name":"2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1