首页 > 最新文献

2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)最新文献

英文 中文
Information Fusion VIA Optimized KECA with Application to Audio Emotion Recognition 信息融合通过优化的KECA及其应用于音频情感识别
Lei Gao, L. Guan
As a recent proposed information fusion tool, Kernel Entropy Component Analysis (KECA) has attracted more attentions from the research communities of multimedia. It utilizes descriptor of entropy estimation and achieves improved performance for information fusion. However, KECA roughly reduces to sorting the importance of kernel eigenvectors by entropy instead of by variance as in Kernel Principal Components Analysis (KPCA), without extracting the optimal features retaining more entropy of the input data. In this paper, a novel approach Optimized Kernel Entropy Components Analysis (OKECA) is introduced to information fusion, which can be considered as an alternative method to KECA for information fusion. Since OKECA explicitly extracts the optimal features that retain most informative content, it leads to improving the final performance or classification accuracy. To demonstrate the effectiveness of the proposed solution, experiments are conducted on Ryerson Multimedia Lab (RML) and eNTERFACE emotion datasets. Experimental results show that the proposed solution outperforms the existing methods based on the similar principles, and the Deep Learning (DL) based method.
核熵分量分析(kera)作为一种新提出的信息融合工具,越来越受到多媒体研究界的关注。该方法利用熵估计描述符,提高了信息融合的性能。然而,核主成分分析(KPCA)将核特征向量的重要性大致简化为按熵排序,而不是像核主成分分析(KPCA)那样按方差排序,没有提取最优特征,保留了输入数据的更多熵。本文将优化核熵分量分析(OKECA)方法引入到信息融合中,作为信息融合的一种替代方法。由于OKECA明确地提取了保留最多信息内容的最佳特征,因此它可以提高最终性能或分类准确性。为了证明所提出的解决方案的有效性,在Ryerson多媒体实验室(RML)和eNTERFACE情感数据集上进行了实验。实验结果表明,该方法优于基于相似原理的现有方法和基于深度学习(DL)的方法。
{"title":"Information Fusion VIA Optimized KECA with Application to Audio Emotion Recognition","authors":"Lei Gao, L. Guan","doi":"10.1109/CYBERC.2018.00054","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00054","url":null,"abstract":"As a recent proposed information fusion tool, Kernel Entropy Component Analysis (KECA) has attracted more attentions from the research communities of multimedia. It utilizes descriptor of entropy estimation and achieves improved performance for information fusion. However, KECA roughly reduces to sorting the importance of kernel eigenvectors by entropy instead of by variance as in Kernel Principal Components Analysis (KPCA), without extracting the optimal features retaining more entropy of the input data. In this paper, a novel approach Optimized Kernel Entropy Components Analysis (OKECA) is introduced to information fusion, which can be considered as an alternative method to KECA for information fusion. Since OKECA explicitly extracts the optimal features that retain most informative content, it leads to improving the final performance or classification accuracy. To demonstrate the effectiveness of the proposed solution, experiments are conducted on Ryerson Multimedia Lab (RML) and eNTERFACE emotion datasets. Experimental results show that the proposed solution outperforms the existing methods based on the similar principles, and the Deep Learning (DL) based method.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114724242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cloud Data Center Virtual Machine Placement Scheme Based on Energy Optimization 一种基于能量优化的云数据中心虚拟机布局方案
Shuo Zhang, F. Meng, Zhongyi Zhang
In an Infrastructure as a Service (IaaS) environment, a key requirement is the rational placement of virtual machines that consumers apply for. In order to reduce the energy consumption of servers and switches in the data center, reduce the operating cost of data center, this paper proposes a virtual machine placement scheme based on energy optimization. Aiming at the shortcomings of genetic algorithm in intelligent algorithm which is easy to fall into local optimum, the immune algorithm is combined to generate an optimized immune genetic algorithm and a placement scheme is generated. In this paper, the data center structure is constructed, the energy consumption model of data center is constructed, and the simulation experiment is carried out. Through the experiment comparison, the proposed virtual machine placement scheme can effectively reduce data center energy consumption, and achieve effective results.
在基础设施即服务(IaaS)环境中,一个关键需求是用户申请的虚拟机的合理放置。为了降低数据中心服务器和交换机的能耗,降低数据中心的运行成本,本文提出了一种基于能量优化的虚拟机布局方案。针对遗传算法在智能算法中容易陷入局部最优的缺点,将免疫算法与遗传算法相结合,生成了一种优化的免疫遗传算法,并生成了一种布局方案。本文构建了数据中心结构,构建了数据中心能耗模型,并进行了仿真实验。通过实验对比,所提出的虚拟机放置方案能够有效降低数据中心能耗,取得有效效果。
{"title":"A Cloud Data Center Virtual Machine Placement Scheme Based on Energy Optimization","authors":"Shuo Zhang, F. Meng, Zhongyi Zhang","doi":"10.1109/CYBERC.2018.00049","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00049","url":null,"abstract":"In an Infrastructure as a Service (IaaS) environment, a key requirement is the rational placement of virtual machines that consumers apply for. In order to reduce the energy consumption of servers and switches in the data center, reduce the operating cost of data center, this paper proposes a virtual machine placement scheme based on energy optimization. Aiming at the shortcomings of genetic algorithm in intelligent algorithm which is easy to fall into local optimum, the immune algorithm is combined to generate an optimized immune genetic algorithm and a placement scheme is generated. In this paper, the data center structure is constructed, the energy consumption model of data center is constructed, and the simulation experiment is carried out. Through the experiment comparison, the proposed virtual machine placement scheme can effectively reduce data center energy consumption, and achieve effective results.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Technical Program Committee 技术计划委员会
M. Abolhasan, S. Adibi, Deyun Gao
Mohd Riduan Ahmad Universiti Teknikal Malaysia Melaka Malaysia Naoyuki Aikawa Tokyo University of Science Japan Annamalai Annamalai Prairie View A&M University USA Kaoru Arakawa Meiji University Japan Kunihiko Asakura Yonago National College of Technology Japan Akira Asano Kansai University Japan Rafael Asorey-Cacheda Technical University of Cartagena Spain Edward Au Huawei Technologies Co., Ltd. Canada Surapong Auwatanamongkol NIDA Thailand Vo Nguyen Quoc Bao Posts and Telecommunications Institute of Technology Vietnam Thibault Bernard University of Reims Champagne Ardenne France Huynh Thi Thanh Binh HUST Vietnam Huynh Thi Thanh Binh HUST Vietnam Smich Butcharoen King Mongkut's University of Technology North Bangkok Thailand Rhandley Cajote University of the Philippines Philippines Thuong Canh 2-8, Yamadaoka, Suita Japan KyungHi Chang Inha University Korea Shi-Chung Chang National Taiwan University Taiwan Su Fong Chien MIMOS Berhad Malaysia Jae-Kark Choi Hanwha Systems Korea Qimei Cui Beijing University of Posts and Telecommunications P.R. China Nguyen Cuong 102 Hung Vuong Tam Ky Quang Nam Vietnam Haibo Dai Nanjing University of Posts and Telecommunications P.R. China Nhu-Ngoc Dao University of Bern Switzerland Son Hoang Dau RMIT University Australia Mérouane Debbah Huawei France Hoang Dinh University of Technology Sydney (UTS) Australia Quang-Thang Duong Nara Institute of Science and Technology Japan Alban Duverdier Centre National D'Etudes Spatiales (CNES) France Tobias Eggendorfer Hochschule Ravensburg-Weingarten Germany Ulrich Engelke Commonwealth Scientific and Industrial Research Organisation (CSIRO) Australia
Mohd Riduan Ahmad Universiti Teknikal Malaysia Melaka Malaysia 相川直之 东京理科大学 日本 Annamalai Annamalai Prairie View A&M University 美国 Kaoru Arakawa Meiji University 日本 Kunihiko Asakura Yonago National College of Technology 日本 Akira Asano Kansai University 日本 Rafael Asorey-Cacheda Technical University of Cartagena 西班牙 Edward Au 华为技术有限公司 加拿大 Surapong Auwatanamongkol NIDA 泰国 Vo Nguyen Quoc Bao Post and Telecommunications Institute of Technology 越南 Thibault Bernard University Reim Champagne Ardenne 越南加拿大 Surapong Auwatanamongkol NIDA 泰国 Vo Nguyen Quoc Bao 邮电技术学院 越南 Thibault Bernard 兰斯香槟阿登大学 法国 Huynh Thi Thanh Binh HUST 越南 Huynh Thi Thanh Binh HUST 越南 Smich Butcharoen King Mongkut's University of Technology North Bangkok 泰国 Rhandley Cajote University of the Philippines 菲律宾 Thuong Canh 2-8、Yamadaoka, Suita 日本 KyungHi Chang Inha University 韩国 Shi-Chung Chang 国立台湾大学 台湾 Su Fong Chien MIMOS Berhad 马来西亚 Jae-Kark Choi Hanwha Systems 韩国 Qimei Cui 北京邮电大学 P. R. China Nguyen Chengh, H. HUST 越南Nguyen Cuong 102 Hung Vuong Tam Ky Quang Nam Vietnam Haibo Dai Nanjing University of Posts and Telecommunications P.R. China Nhu-Ngoc Dao.中国 Nhu-Ngoc Dao 瑞士伯尔尼大学 Son Hoang Dau 澳大利亚皇家墨尔本理工大学 Mérouane Debbah Huawei 法国 Hoang Dinh 悉尼科技大学 (UTS) 澳大利亚 Quang-Thang Duong 奈良科学技术学院 日本 Alban Duverdier 法国国家空间研究中心 (CNES) Tobias Eggendorfer Hochschule Ravensburg-Weingarten 德国 Ulrich Engelke 澳大利亚联邦科学与工业研究组织 (CSIRO)
{"title":"Technical Program Committee","authors":"M. Abolhasan, S. Adibi, Deyun Gao","doi":"10.1109/cyberc.2018.00010","DOIUrl":"https://doi.org/10.1109/cyberc.2018.00010","url":null,"abstract":"Mohd Riduan Ahmad Universiti Teknikal Malaysia Melaka Malaysia Naoyuki Aikawa Tokyo University of Science Japan Annamalai Annamalai Prairie View A&M University USA Kaoru Arakawa Meiji University Japan Kunihiko Asakura Yonago National College of Technology Japan Akira Asano Kansai University Japan Rafael Asorey-Cacheda Technical University of Cartagena Spain Edward Au Huawei Technologies Co., Ltd. Canada Surapong Auwatanamongkol NIDA Thailand Vo Nguyen Quoc Bao Posts and Telecommunications Institute of Technology Vietnam Thibault Bernard University of Reims Champagne Ardenne France Huynh Thi Thanh Binh HUST Vietnam Huynh Thi Thanh Binh HUST Vietnam Smich Butcharoen King Mongkut's University of Technology North Bangkok Thailand Rhandley Cajote University of the Philippines Philippines Thuong Canh 2-8, Yamadaoka, Suita Japan KyungHi Chang Inha University Korea Shi-Chung Chang National Taiwan University Taiwan Su Fong Chien MIMOS Berhad Malaysia Jae-Kark Choi Hanwha Systems Korea Qimei Cui Beijing University of Posts and Telecommunications P.R. China Nguyen Cuong 102 Hung Vuong Tam Ky Quang Nam Vietnam Haibo Dai Nanjing University of Posts and Telecommunications P.R. China Nhu-Ngoc Dao University of Bern Switzerland Son Hoang Dau RMIT University Australia Mérouane Debbah Huawei France Hoang Dinh University of Technology Sydney (UTS) Australia Quang-Thang Duong Nara Institute of Science and Technology Japan Alban Duverdier Centre National D'Etudes Spatiales (CNES) France Tobias Eggendorfer Hochschule Ravensburg-Weingarten Germany Ulrich Engelke Commonwealth Scientific and Industrial Research Organisation (CSIRO) Australia","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICC World Cup Prediction Based Data Analytics and Business Intelligent (BI) Techniques 基于ICC世界杯预测的数据分析和商业智能(BI)技术
A. Aburas, Muhammed Mehtab, Yusuf Mehtab
The ICC 2019 Cricket World Cup is scheduled to be hosted by England and Wales. This research work aims to predict the winner of the 12th version of ICC world cup using Business Intelligent (BI) and K Nearest Neighbors KNN bigdata approach. The research works will start off with business intelligent (BI) case and the Big Data lifecycle. Machine Learning, KNN and R Language will be defined in depth. Then, it will give a detailed to extract all patterns that suitable for machine learning tool to predict the winner. Thereafter, data reduction algorithm will be presented. Additionally, explain in details all steps are taken to achieve the KNN classifications. The source and selected datasets required are given. Finally, the root of this paper, the prediction of the winner of the 2019 ICC Cricket World Cup is declared.
2019年板球世界杯将由英格兰和威尔士主办。本研究旨在利用商业智能(BI)和K近邻KNN大数据方法预测第12届ICC世界杯的获胜者。研究工作将从商业智能(BI)案例和大数据生命周期开始。机器学习,KNN和R语言将被深入定义。然后,它将给出一个详细的提取所有适合机器学习工具的模式来预测获胜者。接下来,将介绍数据约简算法。此外,详细解释为实现KNN分类所采取的所有步骤。给出了所需的来源和选定的数据集。最后,本文的根,2019年ICC板球世界杯冠军的预测揭晓。
{"title":"ICC World Cup Prediction Based Data Analytics and Business Intelligent (BI) Techniques","authors":"A. Aburas, Muhammed Mehtab, Yusuf Mehtab","doi":"10.1109/CYBERC.2018.00056","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00056","url":null,"abstract":"The ICC 2019 Cricket World Cup is scheduled to be hosted by England and Wales. This research work aims to predict the winner of the 12th version of ICC world cup using Business Intelligent (BI) and K Nearest Neighbors KNN bigdata approach. The research works will start off with business intelligent (BI) case and the Big Data lifecycle. Machine Learning, KNN and R Language will be defined in depth. Then, it will give a detailed to extract all patterns that suitable for machine learning tool to predict the winner. Thereafter, data reduction algorithm will be presented. Additionally, explain in details all steps are taken to achieve the KNN classifications. The source and selected datasets required are given. Finally, the root of this paper, the prediction of the winner of the 2019 ICC Cricket World Cup is declared.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"427 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation for Real-Time Messaging System in Big Data Pipeline Architecture 基于大数据管道架构的实时消息系统性能评估
Thandar Aung, Hla Yin Min, A. Maw
Nowadays, Real time messaging system is the essential thing in enabling time-critical decision making in many applications where it is important to deal with real-time requirements and reliability requirements simultaneously. For dependability reasons, we intend to maximize the reliability requirement of real time messaging system. To develop real time messaging system, we create real time big data pipeline by using Apache Kafka and Apache Storm. This paper focuses on analyzing the performance of producer and consumer in Apache Kafka processing. The performance of Kafka processing modify to be more reliable on the pipeline architecture. Then, the experiment will be conducted the processing time in the performance of the producer and consumer on various partitions. The performance evaluation of Kafka can impact on messaging system in real time big data pipeline architecture.
目前,实时消息传递系统是许多应用程序中实现时间关键型决策的关键,这些应用程序需要同时处理实时需求和可靠性需求。出于可靠性的考虑,我们打算最大化实时消息传递系统的可靠性需求。为了开发实时消息系统,我们使用Apache Kafka和Apache Storm创建了实时大数据管道。本文重点分析了Apache Kafka处理中生产者和消费者的性能。Kafka处理的性能在流水线架构上更加可靠。然后,对生产者和消费者在不同分区上的性能处理时间进行实验。Kafka的性能评估对实时大数据管道架构中的消息传递系统有很大的影响。
{"title":"Performance Evaluation for Real-Time Messaging System in Big Data Pipeline Architecture","authors":"Thandar Aung, Hla Yin Min, A. Maw","doi":"10.1109/CYBERC.2018.00047","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00047","url":null,"abstract":"Nowadays, Real time messaging system is the essential thing in enabling time-critical decision making in many applications where it is important to deal with real-time requirements and reliability requirements simultaneously. For dependability reasons, we intend to maximize the reliability requirement of real time messaging system. To develop real time messaging system, we create real time big data pipeline by using Apache Kafka and Apache Storm. This paper focuses on analyzing the performance of producer and consumer in Apache Kafka processing. The performance of Kafka processing modify to be more reliable on the pipeline architecture. Then, the experiment will be conducted the processing time in the performance of the producer and consumer on various partitions. The performance evaluation of Kafka can impact on messaging system in real time big data pipeline architecture.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Outage Probability Analysis of Relay Networks Based on Cooperative Jamming 基于协同干扰的中继网络安全中断概率分析
Yan Zheng, Shou-yi Yang, Hao Fu, Tian Chen
In view of the security of the relay system with eavesdropping node, the secure outage probability of relay system under cooperative jamming mechanism is studied based on the theory of physical layer security. The method of transmitting jamming signals by the source node and destination node is proposed to make the receiving of eavesdropping node worse than the legal node, improving the secure performance of the system. Meanwhile, the self-interference caused by the relay node in the full-duplex is avoided. The theoretical derivation of the system's secure outage probability is also made. The simulation results show that compared with the traditional relay network, the proposed system's secure outage probability is significantly reduced by using cooperative jamming technology. In addition, with the cooperative jamming mechanism, the secure outage probability of the proposed half-duplex network is better than that of full-duplex network.
针对具有窃听节点的中继系统的安全性问题,基于物理层安全理论,研究了协同干扰机制下中继系统的安全中断概率。提出了由源节点和目的节点发送干扰信号的方法,使窃听节点的接收比合法节点差,提高了系统的安全性能。同时避免了中继节点在全双工中产生的自干扰。对系统的安全中断概率进行了理论推导。仿真结果表明,与传统中继网络相比,采用协同干扰技术可显著降低系统的安全中断概率。此外,通过协同干扰机制,所提出的半双工网络的安全中断概率优于全双工网络。
{"title":"Secure Outage Probability Analysis of Relay Networks Based on Cooperative Jamming","authors":"Yan Zheng, Shou-yi Yang, Hao Fu, Tian Chen","doi":"10.1109/CYBERC.2018.00021","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00021","url":null,"abstract":"In view of the security of the relay system with eavesdropping node, the secure outage probability of relay system under cooperative jamming mechanism is studied based on the theory of physical layer security. The method of transmitting jamming signals by the source node and destination node is proposed to make the receiving of eavesdropping node worse than the legal node, improving the secure performance of the system. Meanwhile, the self-interference caused by the relay node in the full-duplex is avoided. The theoretical derivation of the system's secure outage probability is also made. The simulation results show that compared with the traditional relay network, the proposed system's secure outage probability is significantly reduced by using cooperative jamming technology. In addition, with the cooperative jamming mechanism, the secure outage probability of the proposed half-duplex network is better than that of full-duplex network.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129155021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Word Representation with Word Pair Distributional Asymmetry 利用词对分布不对称改进词表示
Chuan Tian, Wenge Rong, Y. Ouyang, Zhang Xiong
Distributed word representation has demonstrated impressive improvements on numerous natural language processing applications. However, most existing word representation learning methods rarely consider use of word order information, and lead to confusion of similarity and relevance. Targeting on this problem we propose a general learning approach DAV (Distributional Asymmetry Vector) to build better word representation by utilizing word pair distributional asymmetry, which contains word order information. Experimental study on two large benchmarks with several state-of-art word representation learning models has shown the potential of the proposed method.
分布式单词表示已经在许多自然语言处理应用程序上展示了令人印象深刻的改进。然而,现有的大多数词语表示学习方法很少考虑词序信息的使用,导致相似度和相关性的混淆。针对这一问题,我们提出了一种通用的学习方法DAV (Distributional asymmetric Vector),利用包含词序信息的词对分布不对称来构建更好的词表示。在两个大型基准测试和几个最先进的词表示学习模型上的实验研究表明了该方法的潜力。
{"title":"Improving Word Representation with Word Pair Distributional Asymmetry","authors":"Chuan Tian, Wenge Rong, Y. Ouyang, Zhang Xiong","doi":"10.1109/CYBERC.2018.00024","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00024","url":null,"abstract":"Distributed word representation has demonstrated impressive improvements on numerous natural language processing applications. However, most existing word representation learning methods rarely consider use of word order information, and lead to confusion of similarity and relevance. Targeting on this problem we propose a general learning approach DAV (Distributional Asymmetry Vector) to build better word representation by utilizing word pair distributional asymmetry, which contains word order information. Experimental study on two large benchmarks with several state-of-art word representation learning models has shown the potential of the proposed method.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms 基于传统FPGA和LabVIEW FPGA平台的高效高速AES实现
M. Rao, Admir Kaknjo, E. Omerdic, D. Toal, T. Newe
The LabVIEW FPGA platform is based on graphical programming approach, which makes easy the FPGA programming and the I/O interfacing. The LabVIEW FPGA significantly improves the design productivity and helps to reduce the time to market. On the other hand, traditional FPGA platform is helpful to get an efficient/optimized design by providing control over each bit using HDL programming languages. This work utilized traditional as well as LabVIEW FPGA platforms to get an optimized high speed design of AES (Advanced Encryption Standard). The AES is considered to be a secure and reliable cryptographic algorithm that is used worldwide to provide encryption services, which hide the information during communication over untrusted networks, like Internet. Here, AES core is proposed to secure the communication between ROV (Remotely Operated Vehicle) and control station in a marine environment; but this core can be fit in any other high speed electronic communications. This work provides encryption of 128-bytes, 256-bytes and 512-bytes set of inputs (individually and simultaneously) using a 128-bit key. In case of simultaneous implementation, all the above mentioned set of inputs is encrypted in parallel. This simultaneous implementation is resulted in throughput of Gbps range.
LabVIEW FPGA平台基于图形化编程方法,使FPGA编程和I/O接口变得简单。LabVIEW FPGA显著提高了设计效率,并有助于缩短产品上市时间。另一方面,传统的FPGA平台通过使用HDL编程语言提供对每个位的控制,有助于实现高效/优化设计。本文利用传统的FPGA平台和LabVIEW平台对AES (Advanced Encryption Standard,高级加密标准)进行了高速优化设计。AES被认为是一种安全可靠的加密算法,在全球范围内用于提供加密服务,在不受信任的网络(如Internet)上通信时隐藏信息。在此,提出了AES核心,以保证ROV(遥控车辆)与控制站在海洋环境下的通信安全;但这个核心可以适用于任何其他高速电子通信。这项工作使用128位密钥提供128字节、256字节和512字节的输入集(单独和同时)加密。在同时实现的情况下,上述所有输入集都是并行加密的。这种同时实现导致了Gbps范围内的吞吐量。
{"title":"An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms","authors":"M. Rao, Admir Kaknjo, E. Omerdic, D. Toal, T. Newe","doi":"10.1109/CYBERC.2018.00028","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00028","url":null,"abstract":"The LabVIEW FPGA platform is based on graphical programming approach, which makes easy the FPGA programming and the I/O interfacing. The LabVIEW FPGA significantly improves the design productivity and helps to reduce the time to market. On the other hand, traditional FPGA platform is helpful to get an efficient/optimized design by providing control over each bit using HDL programming languages. This work utilized traditional as well as LabVIEW FPGA platforms to get an optimized high speed design of AES (Advanced Encryption Standard). The AES is considered to be a secure and reliable cryptographic algorithm that is used worldwide to provide encryption services, which hide the information during communication over untrusted networks, like Internet. Here, AES core is proposed to secure the communication between ROV (Remotely Operated Vehicle) and control station in a marine environment; but this core can be fit in any other high speed electronic communications. This work provides encryption of 128-bytes, 256-bytes and 512-bytes set of inputs (individually and simultaneously) using a 128-bit key. In case of simultaneous implementation, all the above mentioned set of inputs is encrypted in parallel. This simultaneous implementation is resulted in throughput of Gbps range.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information Acquisition and Analysis Technology of Personalized Recommendation System Based on Case-Based Reasoning for Internet of Things 基于案例推理的物联网个性化推荐系统信息获取与分析技术
Jieli Sun, Yao Zhai, Yanxia Zhao, Jianke Li, Naishi Yan
In the paper, we discuss the theories of the information acquisition and analysis and the information quality of the case-based reasoning (CBR) personalized recommendation system. We also take a deep study of the key techniques of acquiring and analyzing information quality. With research results of this paper, combined with the content-based recommendation technology and recommendation results of collaborative filtering, a CBR-based personalized combinatorial recommendation algorithm is designed.
本文讨论了基于案例推理(case-based reasoning, CBR)的个性化推荐系统的信息获取与分析理论和信息质量问题。对信息质量获取与分析的关键技术进行了深入研究。结合本文的研究成果,结合基于内容的推荐技术和协同过滤的推荐结果,设计了一种基于cbr的个性化组合推荐算法。
{"title":"Information Acquisition and Analysis Technology of Personalized Recommendation System Based on Case-Based Reasoning for Internet of Things","authors":"Jieli Sun, Yao Zhai, Yanxia Zhao, Jianke Li, Naishi Yan","doi":"10.1109/CYBERC.2018.00031","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00031","url":null,"abstract":"In the paper, we discuss the theories of the information acquisition and analysis and the information quality of the case-based reasoning (CBR) personalized recommendation system. We also take a deep study of the key techniques of acquiring and analyzing information quality. With research results of this paper, combined with the content-based recommendation technology and recommendation results of collaborative filtering, a CBR-based personalized combinatorial recommendation algorithm is designed.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying 物理层安全双向中继的协同干扰与中继波束形成设计
Zonghao Ma, Yanhui Lu, Lingfeng Shen, Yili Liu, Ning Wang
In this work, physical layer secure transmission of a cooperative wireless communication system over a three-phase amplify-and-forward (AF) two-way relaying channels is studied. A cooperative jamming and multi-antenna relay beamforming scheme that improves physical layer security of the system is proposed. Specifically, it is suggested that in the first and second timeslots when the legitimate users transmit alternatively, a jamming signal can be transmitted by the legitimate party that is not transmitting information-bearing signals This scheme, compared with the approach using a dedicated jammer, achieves a similar jamming effect with reduced complexity. In the third time slot of the protocol, the relay uses two beamforming matrices to process the bidirectional information signals. The jamming signal components at the relay are projected onto the null space of the legitimate relay-destination channels such that they do not affect legitimate communications. Through joint optimization, the sum throughput of the legitimate communication is maximized. In the numerical examples, the proposed scheme is shown to improve the system's secrecy transmission performance.
在本工作中,研究了在三相放大转发(AF)双向中继信道上协作无线通信系统的物理层安全传输。提出了一种协同干扰和多天线中继波束形成方案,提高了系统物理层的安全性。具体来说,建议在合法用户交替传输的第一和第二时隙中,由不传输含信息信号的合法方传输干扰信号。与使用专用干扰机的方法相比,该方案达到了相似的干扰效果,但降低了复杂性。在协议的第三时隙,中继使用两个波束形成矩阵来处理双向信息信号。中继上的干扰信号分量被投射到合法中继目的地信道的零空间上,这样它们就不会影响合法通信。通过联合优化,使合法通信的总吞吐量达到最大。数值算例表明,该方案可以提高系统的保密传输性能。
{"title":"Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying","authors":"Zonghao Ma, Yanhui Lu, Lingfeng Shen, Yili Liu, Ning Wang","doi":"10.1109/CYBERC.2018.00066","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00066","url":null,"abstract":"In this work, physical layer secure transmission of a cooperative wireless communication system over a three-phase amplify-and-forward (AF) two-way relaying channels is studied. A cooperative jamming and multi-antenna relay beamforming scheme that improves physical layer security of the system is proposed. Specifically, it is suggested that in the first and second timeslots when the legitimate users transmit alternatively, a jamming signal can be transmitted by the legitimate party that is not transmitting information-bearing signals This scheme, compared with the approach using a dedicated jammer, achieves a similar jamming effect with reduced complexity. In the third time slot of the protocol, the relay uses two beamforming matrices to process the bidirectional information signals. The jamming signal components at the relay are projected onto the null space of the legitimate relay-destination channels such that they do not affect legitimate communications. Through joint optimization, the sum throughput of the legitimate communication is maximized. In the numerical examples, the proposed scheme is shown to improve the system's secrecy transmission performance.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1