首页 > 最新文献

2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)最新文献

英文 中文
Web Application Security Threats and Mitigation Strategies when Using Cloud Computing as Backend 使用云计算作为后端时的Web应用程序安全威胁和缓解策略
Asma Z. Yamani, Khawlah Bajbaa, Reem Aljunaid
Cloud computing plays an important role in businesses' digital transformation as they offer easy-to-use services that save time and effort. Despite incredible features that are provided by cloud computing platforms, these platforms become the desirable target of attackers. This study aims to survey the literature for security threats related to web applications that have been developed using cloud computing services and then provide a set of recommendations to mitigate these threats. In this study, we first surveyed the literature for documented cases of threats faced while relying on cloud computing, then an online survey was sent to Computer Science students and web developers. The survey's questions were related to web threats whether they are aware of these threats or not and whether they have already applied any prevention measures for these threats. Then, a set of recommendations were provided that can help them to mitigate these threats. Finally, a tool was designed for generating security policies for the Broken Access Control threat for Firebase. Eighty-five responses were considered for this study. The average participants' awareness of all threats is 61 % despite 92% of participants having taken at least one security course. The main causes for neglecting to implement mitigation techniques was the lack of training and that developers are relying on the web services to provide security measures, then comes the process being time-consuming. The designed tool for mitigating Broken Access control showed promising results to ease the implementation of mitigation techniques. We conclude that due to the lack of awareness and negligence in implementing mitigation techniques, many present web apps may be compromised. Developing security tools for novice users, whenever possible, provides a solution for the main causes of the neglect to implement such measures and should be investigated further.
云计算在企业的数字化转型中扮演着重要的角色,因为它们提供了易于使用的服务,节省了时间和精力。尽管云计算平台提供了令人难以置信的功能,但这些平台成为攻击者的理想目标。本研究旨在调查与使用云计算服务开发的web应用程序相关的安全威胁的文献,然后提供一组减轻这些威胁的建议。在这项研究中,我们首先调查了依赖云计算所面临威胁的文献记录案例,然后向计算机科学专业的学生和web开发人员发送了一份在线调查。调查的问题与网络威胁有关,他们是否意识到这些威胁,是否已经针对这些威胁采取了任何预防措施。然后,提供了一组建议,可以帮助他们减轻这些威胁。最后,设计了一个工具,用于为Firebase生成访问控制中断威胁的安全策略。本研究考虑了85个回答。尽管92%的参与者至少参加过一门安全课程,但平均61%的参与者对所有威胁都有意识。忽略实现缓解技术的主要原因是缺乏培训,开发人员依赖web服务来提供安全措施,然后是耗时的过程。所设计的用于缓解中断访问控制的工具在简化缓解技术的实现方面显示了有希望的结果。我们的结论是,由于在实施缓解技术方面缺乏意识和疏忽,许多当前的web应用程序可能会受到损害。只要有可能,为新手用户开发安全工具可以为忽视实现这些措施的主要原因提供解决方案,并且应该进一步调查。
{"title":"Web Application Security Threats and Mitigation Strategies when Using Cloud Computing as Backend","authors":"Asma Z. Yamani, Khawlah Bajbaa, Reem Aljunaid","doi":"10.1109/CICN56167.2022.10008368","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008368","url":null,"abstract":"Cloud computing plays an important role in businesses' digital transformation as they offer easy-to-use services that save time and effort. Despite incredible features that are provided by cloud computing platforms, these platforms become the desirable target of attackers. This study aims to survey the literature for security threats related to web applications that have been developed using cloud computing services and then provide a set of recommendations to mitigate these threats. In this study, we first surveyed the literature for documented cases of threats faced while relying on cloud computing, then an online survey was sent to Computer Science students and web developers. The survey's questions were related to web threats whether they are aware of these threats or not and whether they have already applied any prevention measures for these threats. Then, a set of recommendations were provided that can help them to mitigate these threats. Finally, a tool was designed for generating security policies for the Broken Access Control threat for Firebase. Eighty-five responses were considered for this study. The average participants' awareness of all threats is 61 % despite 92% of participants having taken at least one security course. The main causes for neglecting to implement mitigation techniques was the lack of training and that developers are relying on the web services to provide security measures, then comes the process being time-consuming. The designed tool for mitigating Broken Access control showed promising results to ease the implementation of mitigation techniques. We conclude that due to the lack of awareness and negligence in implementing mitigation techniques, many present web apps may be compromised. Developing security tools for novice users, whenever possible, provides a solution for the main causes of the neglect to implement such measures and should be investigated further.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132968707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JUX - A Cloud Hosted Learning Management System Based on OpenedX JUX——基于OpenedX的云托管学习管理系统
Muhammad Noman Saeed, Ahmad Mufarreh Al Mufarreh, K. M. Noaman, Muhammad Arshad, Atiq Rafiq Shaikh
Higher education across the world during the COVID pandemic changes its knowledge delivery mode from on-campus studies to off-campus studies, i.e. E-Learning. The e-education provider must be competent in order to create a robust learning environment that can handle the difficulties facing teachers, students, and system administrators at this rapid pace of change. The system administrator needs to improve the network connectivity, bandwidth etc. for providing seamless connectivity for E-Learning alongside their campus network services. The challenge of providing smooth services for e-learning is sometimes hurdled the other network services for the campus and therefore the management and administrator suggest deploying the e-learning services on the cloud and setting apart the campus network services. This will solve the problem of available network limits can face by the institute due to the limited amount of hardware and bandwidth issues. Furthermore, the cloud deployment reduces the capital as well as the recurring cost of running the services. This paper will focus to address the problem defined above and providing Amazon Web Services (AWS) based cost-effective cloud architecture for OpenedX based learning solutions. This study is expected to demonstrate a technological solution for the process of implementing a cloud-based LMS.
新冠肺炎疫情期间,世界各地的高等教育将知识传递模式从校内学习转变为校外学习,即E-Learning。电子教育提供者必须有能力创建一个健壮的学习环境,能够处理教师、学生和系统管理员在这种快速变化中面临的困难。系统管理员需要改善网络连接性、带宽等,以便与校园网服务一起为E-Learning提供无缝连接。为e-learning提供顺畅的服务有时会受到其他校园网络服务的阻碍,因此管理层和管理员建议将e-learning服务部署在云上,并将校园网服务分开。这将解决可用网络限制的问题,可能面临的研究所由于有限数量的硬件和带宽的问题。此外,云部署减少了资本以及运行服务的重复成本。本文将重点解决上面定义的问题,并为基于OpenedX的学习解决方案提供基于亚马逊网络服务(AWS)的经济高效的云架构。本研究旨在为实现基于云的LMS的过程展示一种技术解决方案。
{"title":"JUX - A Cloud Hosted Learning Management System Based on OpenedX","authors":"Muhammad Noman Saeed, Ahmad Mufarreh Al Mufarreh, K. M. Noaman, Muhammad Arshad, Atiq Rafiq Shaikh","doi":"10.1109/CICN56167.2022.10008279","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008279","url":null,"abstract":"Higher education across the world during the COVID pandemic changes its knowledge delivery mode from on-campus studies to off-campus studies, i.e. E-Learning. The e-education provider must be competent in order to create a robust learning environment that can handle the difficulties facing teachers, students, and system administrators at this rapid pace of change. The system administrator needs to improve the network connectivity, bandwidth etc. for providing seamless connectivity for E-Learning alongside their campus network services. The challenge of providing smooth services for e-learning is sometimes hurdled the other network services for the campus and therefore the management and administrator suggest deploying the e-learning services on the cloud and setting apart the campus network services. This will solve the problem of available network limits can face by the institute due to the limited amount of hardware and bandwidth issues. Furthermore, the cloud deployment reduces the capital as well as the recurring cost of running the services. This paper will focus to address the problem defined above and providing Amazon Web Services (AWS) based cost-effective cloud architecture for OpenedX based learning solutions. This study is expected to demonstrate a technological solution for the process of implementing a cloud-based LMS.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131223004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Classification for Cloud Computing Network: A Step Towards an Intelligent Classification System 云计算网络入侵分类:迈向智能分类系统的一步
Kanda Alamer, Abdulaziz Aldribi
One of the most rapidly spreading areas of infor-mation technology is cloud computing. However, this raises sig-nificant security issues that entice burglars. This paper presents a machine learning-based framework for intrusion classification for cloud computing networks. It offers new capabilities derived from cloud network flow. By dividing the flow into windows of time, a method known as the Riemann Chunking Scheme computes these features. After experimenting with this dataset, we have extracted 40 features that best describe the problem of anomaly classification and improve the accuracy of the study on multilayer perceptron for anomaly classification in cloud network traffic
云计算是信息技术中发展最为迅速的领域之一。然而,这引发了重大的安全问题,吸引了窃贼。提出了一种基于机器学习的云计算网络入侵分类框架。它提供了源自云网络流的新功能。通过将流划分为时间窗口,一种称为Riemann Chunking Scheme的方法可以计算这些特征。通过对该数据集的实验,我们提取了40个最能描述异常分类问题的特征,提高了云网络流量中多层感知器异常分类研究的准确性
{"title":"Intrusion Classification for Cloud Computing Network: A Step Towards an Intelligent Classification System","authors":"Kanda Alamer, Abdulaziz Aldribi","doi":"10.1109/CICN56167.2022.10008346","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008346","url":null,"abstract":"One of the most rapidly spreading areas of infor-mation technology is cloud computing. However, this raises sig-nificant security issues that entice burglars. This paper presents a machine learning-based framework for intrusion classification for cloud computing networks. It offers new capabilities derived from cloud network flow. By dividing the flow into windows of time, a method known as the Riemann Chunking Scheme computes these features. After experimenting with this dataset, we have extracted 40 features that best describe the problem of anomaly classification and improve the accuracy of the study on multilayer perceptron for anomaly classification in cloud network traffic","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Processing of Images Based on Machine Learning to Avoid Unauthorized Entry 基于机器学习的图像处理避免未经授权的进入
C. Peña, Ciro Rodríguez, Israel Arellano Romero
The proposal of a facial recognition system to increase security, through facial recognition with multiple utilities such as facilitating the access of people with adequate protection measures in times of Covid-19, as well as security when seeking to hide their identity. The methodology considers the use of tools such as Python and OpenCV, as well as models such as Eigen Faces, Fisher Faces, and LBPH Faces, as units of analysis are considered photographs and portions of the video that capture facial expressions that then their patterns are trained with facial recognition algorithms. The results obtained show that the LBPH Faces obtained confidence values lower than 70, with a 95% certainty of recognition and a shorter recognition time, improving the accuracy of facial recognition, also with the increase of the data was achieved to improve the accuracy of recognition as well as improve confidence regarding the safety of people.
面部识别系统的建议,通过面部识别的多种功能来提高安全性,例如在2019冠状病毒病期间为采取适当保护措施的人提供便利,以及在寻求隐藏身份时提供安全保障。该方法考虑使用Python和OpenCV等工具,以及Eigen Faces, Fisher Faces和LBPH Faces等模型,作为分析单元,被认为是照片和视频的一部分,捕捉面部表情,然后用面部识别算法训练它们的模式。结果表明,LBPH人脸获得的置信度值小于70,识别确定性为95%,识别时间较短,提高了人脸识别的准确性,并且随着数据量的增加,人脸识别的准确性也有所提高,对人身安全的信心也有所提高。
{"title":"Processing of Images Based on Machine Learning to Avoid Unauthorized Entry","authors":"C. Peña, Ciro Rodríguez, Israel Arellano Romero","doi":"10.1109/CICN56167.2022.10008350","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008350","url":null,"abstract":"The proposal of a facial recognition system to increase security, through facial recognition with multiple utilities such as facilitating the access of people with adequate protection measures in times of Covid-19, as well as security when seeking to hide their identity. The methodology considers the use of tools such as Python and OpenCV, as well as models such as Eigen Faces, Fisher Faces, and LBPH Faces, as units of analysis are considered photographs and portions of the video that capture facial expressions that then their patterns are trained with facial recognition algorithms. The results obtained show that the LBPH Faces obtained confidence values lower than 70, with a 95% certainty of recognition and a shorter recognition time, improving the accuracy of facial recognition, also with the increase of the data was achieved to improve the accuracy of recognition as well as improve confidence regarding the safety of people.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133329232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Synchronization Techniques for Multi-threaded Web Server: A Comparative Study 多线程Web服务器同步技术的比较研究
Hussah Albinali, Maha Alharbi, Randah Alharbi, M. Aljabri
With the exponential growth and advancement of the internet and network technologies, the number of active internet users is expected to exceed 5 billion worldwide by 2025. As a result, designing high performance multi-threaded web server capable of concurrently handling thousands of incoming requests per second is in high demand. To achieve this goal, it is essential for the multi-threaded web server to utilize synchronization algorithm to coordinate the simultaneous use of resources by clients; avoid data inconsistency and still provide timely responses. The aim of this study is to compare and evaluate the performance of different traditional and modern synchronization algorithms adopted by multi-threaded web servers. An empirical experiment is conducted that simulates a file synchronization problem in distributed systems to evaluate how the performance of a multi-threaded web server is affected by those synchronization algorithms. Mutex locks, Spinlocks, Semaphore, and WebR2sync are evaluated, and the performance of each synchronization algorithm is measured using three performance metrics: Synchronization Time, Failure Rate, and Scalability. Results show that Semaphore has the fastest synchronization time, WebR2sync has the lowest failure rate, and Mutex excels at scalability. Such findings help with the decision of which synchronization algorithms to utilize for multi-threaded web servers based on the requirements.
随着互联网和网络技术的指数级增长和进步,到2025年,全球活跃互联网用户数量预计将超过50亿。因此,设计能够同时处理每秒数千个传入请求的高性能多线程web服务器的需求很高。为了实现这一目标,多线程web服务器必须利用同步算法来协调客户端同时使用资源;避免数据不一致,同时提供及时的响应。本研究的目的是比较和评估多线程web服务器采用的不同传统和现代同步算法的性能。通过模拟分布式系统中的文件同步问题,进行了一个经验实验,以评估这些同步算法如何影响多线程web服务器的性能。对互斥锁、自旋锁、信号量和WebR2sync进行了评估,并使用三个性能指标来衡量每种同步算法的性能:同步时间、故障率和可伸缩性。结果表明,Semaphore具有最快的同步时间,WebR2sync具有最低的故障率,Mutex具有出色的可扩展性。这些发现有助于根据需求决定多线程web服务器使用哪种同步算法。
{"title":"Synchronization Techniques for Multi-threaded Web Server: A Comparative Study","authors":"Hussah Albinali, Maha Alharbi, Randah Alharbi, M. Aljabri","doi":"10.1109/CICN56167.2022.10008307","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008307","url":null,"abstract":"With the exponential growth and advancement of the internet and network technologies, the number of active internet users is expected to exceed 5 billion worldwide by 2025. As a result, designing high performance multi-threaded web server capable of concurrently handling thousands of incoming requests per second is in high demand. To achieve this goal, it is essential for the multi-threaded web server to utilize synchronization algorithm to coordinate the simultaneous use of resources by clients; avoid data inconsistency and still provide timely responses. The aim of this study is to compare and evaluate the performance of different traditional and modern synchronization algorithms adopted by multi-threaded web servers. An empirical experiment is conducted that simulates a file synchronization problem in distributed systems to evaluate how the performance of a multi-threaded web server is affected by those synchronization algorithms. Mutex locks, Spinlocks, Semaphore, and WebR2sync are evaluated, and the performance of each synchronization algorithm is measured using three performance metrics: Synchronization Time, Failure Rate, and Scalability. Results show that Semaphore has the fastest synchronization time, WebR2sync has the lowest failure rate, and Mutex excels at scalability. Such findings help with the decision of which synchronization algorithms to utilize for multi-threaded web servers based on the requirements.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132435452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Validity of Using Technical Indicators When forecasting Stock Prices Using Deep Learning Models: Empirical Evidence Using Saudi Stocks 使用深度学习模型预测股票价格时使用技术指标的有效性:使用沙特股票的经验证据
S. Mohammed
Many researchers use deep learning and technical indicators to forecast future stock prices. There are several hundred technical indicators and each one of them has a number of parameters. Finding the optimal combination of indicators with their optimal parameter values is very challenging. The aim of this work is to study if there is any benefit of feeding deep learning models with technical indicators instead of only feeding them with price and volume. After all, technical indicators are just functions of price and volume. Empirical studies done in this work using Saudi stocks show that deep learning models can benefit from technical indicators only if the right combination of technical indicators together with their right parameter values are used. The experimental results show that the right combination of technical indicators can improve the forecasting accuracy of deep learning modules. They also showed that using the wrong combination of indicators is worse than using no indicator even if they were assigned the best parameter values.
许多研究人员使用深度学习和技术指标来预测未来的股票价格。有几百项技术指标,每一项指标都有若干参数。找到指标的最佳组合及其最优参数值是非常具有挑战性的。这项工作的目的是研究给深度学习模型提供技术指标,而不是只提供价格和数量,是否有任何好处。毕竟,技术指标只是价格和量的函数。利用沙特股票进行的实证研究表明,深度学习模型只有在正确使用技术指标及其正确参数值的情况下才能从技术指标中受益。实验结果表明,正确的技术指标组合可以提高深度学习模块的预测精度。他们还表明,使用错误的指标组合比不使用指标更糟糕,即使他们被分配了最佳参数值。
{"title":"The Validity of Using Technical Indicators When forecasting Stock Prices Using Deep Learning Models: Empirical Evidence Using Saudi Stocks","authors":"S. Mohammed","doi":"10.1109/CICN56167.2022.10008298","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008298","url":null,"abstract":"Many researchers use deep learning and technical indicators to forecast future stock prices. There are several hundred technical indicators and each one of them has a number of parameters. Finding the optimal combination of indicators with their optimal parameter values is very challenging. The aim of this work is to study if there is any benefit of feeding deep learning models with technical indicators instead of only feeding them with price and volume. After all, technical indicators are just functions of price and volume. Empirical studies done in this work using Saudi stocks show that deep learning models can benefit from technical indicators only if the right combination of technical indicators together with their right parameter values are used. The experimental results show that the right combination of technical indicators can improve the forecasting accuracy of deep learning modules. They also showed that using the wrong combination of indicators is worse than using no indicator even if they were assigned the best parameter values.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Text Classification and Categorization through Deep Learning 通过深度学习的文本分类和分类
Saiman Quazi, Sarhan M. Musa
Text classification is one of the important fields in Natural Language Processing (NLP). It assigns text documents into at least two categories in the domain by submitting and deriving a set of features to describe each document and to select the correct category for each one for a set of pre-defined tags or categories based on content. It is even used in several real-life applications such as engineering, science, and marketing and it can be quite effective in addressing problems with labeled data. There are certain Deep Learning (DL) algorithms that can be handy in categorizing text data such as Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Naïve Bayes. This paper illustrates how the text in each document is reviewed and grouped into different sets through the above-mentioned techniques. That way, it will determine which method is best suited for higher accuracy and what possible problems the deep learning model faces using text classification and categorization so that new solutions can be invented to resolve these issues without interfering with the processes in the future.
文本分类是自然语言处理(NLP)中的一个重要领域。它通过提交和派生一组特征来描述每个文档,并根据内容为一组预定义的标记或类别为每个文档选择正确的类别,从而将文本文档分配到域中至少两个类别中。它甚至被用于工程、科学和市场营销等现实生活中的一些应用中,它可以非常有效地解决带有标记数据的问题。有一些深度学习(DL)算法可以方便地对文本数据进行分类,例如支持向量机(SVM)、k近邻(KNN)和Naïve贝叶斯。本文说明了如何通过上述技术审查每个文档中的文本并将其分组为不同的集合。这样,它将确定哪种方法最适合更高的精度,以及深度学习模型在使用文本分类和分类时可能面临的问题,以便可以发明新的解决方案来解决这些问题,而不会干扰未来的过程。
{"title":"Text Classification and Categorization through Deep Learning","authors":"Saiman Quazi, Sarhan M. Musa","doi":"10.1109/CICN56167.2022.10008380","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008380","url":null,"abstract":"Text classification is one of the important fields in Natural Language Processing (NLP). It assigns text documents into at least two categories in the domain by submitting and deriving a set of features to describe each document and to select the correct category for each one for a set of pre-defined tags or categories based on content. It is even used in several real-life applications such as engineering, science, and marketing and it can be quite effective in addressing problems with labeled data. There are certain Deep Learning (DL) algorithms that can be handy in categorizing text data such as Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Naïve Bayes. This paper illustrates how the text in each document is reviewed and grouped into different sets through the above-mentioned techniques. That way, it will determine which method is best suited for higher accuracy and what possible problems the deep learning model faces using text classification and categorization so that new solutions can be invented to resolve these issues without interfering with the processes in the future.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Intelligent Acquisition Terminal Based on Modbus 基于Modbus的智能采集终端的设计与实现
Bin Zhang, Shejiao Hu
With the continuous development of social economy, intelligent acquisition terminal plays an important role in some remote and abusive environments. In this paper, an intelligent integrated acquisition terminal is proposed, which can be effectively applied to irrigation area information collection, earthquake disaster monitoring and other scenarios. The acquisition terminal (RTU) proposed in this paper adopts a design scheme combining GD32F407 embedded system and embedded industrial computer to complete data collection, processing, transmission, display, storage and intelligent control of equipment. The RTU acquisition base plate is designed by GD32F407 chip, including RS485, 4-20MA, SSI Gray code, relay control, Ethernet and other interfaces [1]. The RS485 interface uses Modbus Rtu protocol to request data from sensors connected to the outside. SSI Gray code interface can be connected to absolute value encoder to collect data, gray code interface carries on data transmission through 422 interface on hardware, and carries on data latching at corresponding edge through analog clock signal on software level. Modbus TCP protocol is used to exchange information between the acquisition baseboard and the industrial computer through Ethernet. The industrial computer runs the fast control configuration software, which can receive the transmitted data and realize intelligent control of external devices.
随着社会经济的不断发展,智能采集终端在一些偏远、恶劣的环境中发挥着重要的作用。本文提出了一种智能综合采集终端,可有效应用于灌区信息采集、地震灾害监测等场景。本文提出的采集终端(RTU)采用GD32F407嵌入式系统与嵌入式工控机相结合的设计方案,完成对设备的数据采集、处理、传输、显示、存储和智能控制。RTU采集底板采用GD32F407芯片设计,包括RS485、4-20MA、SSI格雷码、继电器控制、以太网等接口[1]。RS485接口采用Modbus Rtu协议,向外部连接的传感器请求数据。SSI格雷码接口可连接绝对值编码器采集数据,格雷码接口在硬件上通过422接口进行数据传输,在软件上通过模拟时钟信号在对应边缘进行数据锁存。采用Modbus TCP协议,通过以太网在采集基板和工控机之间进行信息交换。工控机运行快速控制组态软件,接收传输的数据,实现对外部设备的智能控制。
{"title":"Design and Implementation of Intelligent Acquisition Terminal Based on Modbus","authors":"Bin Zhang, Shejiao Hu","doi":"10.1109/CICN56167.2022.10008295","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008295","url":null,"abstract":"With the continuous development of social economy, intelligent acquisition terminal plays an important role in some remote and abusive environments. In this paper, an intelligent integrated acquisition terminal is proposed, which can be effectively applied to irrigation area information collection, earthquake disaster monitoring and other scenarios. The acquisition terminal (RTU) proposed in this paper adopts a design scheme combining GD32F407 embedded system and embedded industrial computer to complete data collection, processing, transmission, display, storage and intelligent control of equipment. The RTU acquisition base plate is designed by GD32F407 chip, including RS485, 4-20MA, SSI Gray code, relay control, Ethernet and other interfaces [1]. The RS485 interface uses Modbus Rtu protocol to request data from sensors connected to the outside. SSI Gray code interface can be connected to absolute value encoder to collect data, gray code interface carries on data transmission through 422 interface on hardware, and carries on data latching at corresponding edge through analog clock signal on software level. Modbus TCP protocol is used to exchange information between the acquisition baseboard and the industrial computer through Ethernet. The industrial computer runs the fast control configuration software, which can receive the transmitted data and realize intelligent control of external devices.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"475 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123053614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Bee Colony DLMS Beyond Mean Square Error Boundary in Ad-hoc WSN 自组网无线传感器网络中超越均方误差边界的人工蜂群DLMS
Ali Almohammedi, A. Zerguine, M. Deriche, S. M. Sait
A new Diffusion Artificial Bee Colony (DABC) heuristic algorithm is developed to estimate system parameters in Wireless Sensor Networks (WSNs). The main contribution is the incorporation of ABC algorithm in the traditional Diffusion Least Mean Square (DLMS) algorithm which leads to a better Mean Square Error (MSE) performance. The DABC algorithm shows excellent convergence beyond the noise variance boundary. In the diffusion stage, each node shares the local best cost function and corresponding local best particle position to immediate neighboring nodes. The extensive simulations show that the proposed DABC approach achieves excellent MSE improvement (MSD deterioration) in comparison to existing DLMS algorithms.
提出了一种新的扩散人工蜂群(DABC)启发式算法来估计无线传感器网络(WSNs)中的系统参数。主要的贡献是在传统的扩散最小均方(DLMS)算法中引入ABC算法,使其具有更好的均方误差(MSE)性能。DABC算法在噪声方差边界外具有良好的收敛性。在扩散阶段,每个节点与邻近节点共享局部最优代价函数和相应的局部最优粒子位置。大量的仿真结果表明,与现有的DLMS算法相比,DABC方法取得了较好的MSE改善(MSD劣化)效果。
{"title":"Artificial Bee Colony DLMS Beyond Mean Square Error Boundary in Ad-hoc WSN","authors":"Ali Almohammedi, A. Zerguine, M. Deriche, S. M. Sait","doi":"10.1109/CICN56167.2022.10008253","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008253","url":null,"abstract":"A new Diffusion Artificial Bee Colony (DABC) heuristic algorithm is developed to estimate system parameters in Wireless Sensor Networks (WSNs). The main contribution is the incorporation of ABC algorithm in the traditional Diffusion Least Mean Square (DLMS) algorithm which leads to a better Mean Square Error (MSE) performance. The DABC algorithm shows excellent convergence beyond the noise variance boundary. In the diffusion stage, each node shares the local best cost function and corresponding local best particle position to immediate neighboring nodes. The extensive simulations show that the proposed DABC approach achieves excellent MSE improvement (MSD deterioration) in comparison to existing DLMS algorithms.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128604245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the Performance for IM-RED and IGRED Algorithms using Discrete-time Queues 使用离散时间队列的IM-RED和IGRED算法的性能评价
Hussein Abdel-jaber, J. AlKhateeb, Malak EL-Amir
Active Queue Management (AQM) algorithms mainly aim to control congested networks. Managing the congestion situation leads to offer better performance for the networks. Both Improved Gentle Random Early Detection (IGRED) and Improved RED (IM-RED) algorithms are compared in this paper. The comparison is conducted to find out which algorithm presents better performance between IM-RED and IGRED. The results demonstrate that IGRED provides more acceptable results for the following parameters: the mean queue length (mql), the average queueing delay (D) and the overflow packet loss probability (PLoss) during the occurrence of the congestion. According to this congestion, fewer packets where dropped using the IM-RED prior filling the buffer.
主动队列管理(AQM)算法的主要目的是控制拥塞网络。管理拥塞情况可以为网络提供更好的性能。本文比较了改进的温和随机早期检测算法(IGRED)和改进的随机早期检测算法(IM-RED)。比较IM-RED和IGRED哪种算法的性能更好。结果表明,对于拥塞发生时的平均队列长度(mql)、平均队列延迟(D)和溢出丢包概率(PLoss)等参数,IGRED提供了更可接受的结果。根据这种拥塞,在填充缓冲区之前使用IM-RED丢弃的数据包较少。
{"title":"Evaluation of the Performance for IM-RED and IGRED Algorithms using Discrete-time Queues","authors":"Hussein Abdel-jaber, J. AlKhateeb, Malak EL-Amir","doi":"10.1109/CICN56167.2022.10008318","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008318","url":null,"abstract":"Active Queue Management (AQM) algorithms mainly aim to control congested networks. Managing the congestion situation leads to offer better performance for the networks. Both Improved Gentle Random Early Detection (IGRED) and Improved RED (IM-RED) algorithms are compared in this paper. The comparison is conducted to find out which algorithm presents better performance between IM-RED and IGRED. The results demonstrate that IGRED provides more acceptable results for the following parameters: the mean queue length (mql), the average queueing delay (D) and the overflow packet loss probability (PLoss) during the occurrence of the congestion. According to this congestion, fewer packets where dropped using the IM-RED prior filling the buffer.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128788326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1