首页 > 最新文献

2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)最新文献

英文 中文
Ibn Omar Hash Algorithm Ibn Omar哈希算法
Raed Shafei
A hash is a fixed-length output of some data that has been through a one-way function that cannot be reversed, called the hashing algorithm. Hashing algorithms are used to store secure information, such as passwords. They are stored as hashes after they have been through a hashing algorithm. Also, hashing algorithms are used to insure the checksum of certain data over the internet. This paper discusses how Ibn Omar's hashing algorithm will provide higher security for data than other hash functions used nowadays. Ibn Omar's hashing algorithm in produces an output of 1024 bits, four times as SHA256 and twice as SHA512. Ibn Omar's hashing algorithm reduces the vulnerability of a hash collision due to its size. Also, it would require enormous computational power to find a collision. There are eight salts per input. This hashing algorithm aims to provide high privacy and security for users.
哈希是一些数据的固定长度的输出,这些数据已经通过一个不能逆转的单向函数,称为哈希算法。散列算法用于存储安全信息,如密码。在经过散列算法之后,它们被存储为散列。此外,散列算法用于确保互联网上某些数据的校验和。本文讨论了Ibn Omar的哈希算法如何比目前使用的其他哈希函数提供更高的数据安全性。Ibn Omar的哈希算法产生1024位的输出,是SHA256的四倍,SHA512的两倍。Ibn Omar的哈希算法由于其大小减少了哈希冲突的脆弱性。此外,要发现碰撞需要巨大的计算能力。每个输入有8个盐。该哈希算法旨在为用户提供高隐私性和安全性。
{"title":"Ibn Omar Hash Algorithm","authors":"Raed Shafei","doi":"10.1109/CICN56167.2022.10008341","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008341","url":null,"abstract":"A hash is a fixed-length output of some data that has been through a one-way function that cannot be reversed, called the hashing algorithm. Hashing algorithms are used to store secure information, such as passwords. They are stored as hashes after they have been through a hashing algorithm. Also, hashing algorithms are used to insure the checksum of certain data over the internet. This paper discusses how Ibn Omar's hashing algorithm will provide higher security for data than other hash functions used nowadays. Ibn Omar's hashing algorithm in produces an output of 1024 bits, four times as SHA256 and twice as SHA512. Ibn Omar's hashing algorithm reduces the vulnerability of a hash collision due to its size. Also, it would require enormous computational power to find a collision. There are eight salts per input. This hashing algorithm aims to provide high privacy and security for users.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Machine Learning Models on Apache Spark: An Empirical Study 基于Apache Spark的机器学习模型性能评估:实证研究
Asma Z. Yamani, Shikah J. Alsunaidi, Imane Boudellioua
Artificial intelligence (AI) and machine learning significantly improve many sectors, such as education, healthcare, and industry. Machine learning techniques mainly depend on the volume and diversity of training data. With the digital transformation we live in, an abundant amount of data can be collected from different sources. However, the problem that needs to be addressed is how this amount of data can be processed and where it can be stored. Cloud services and distributed file systems (DFSs) help address this issue. Many DFSs such as Hadoop, Quantcast, and Apache Spark differ in many aspects, including scheduling algorithms, data management protocol, throughput, and runtime. Some DFSs may be better for working with specific applications than others. Apache Spark is capable of handling iterative operations like machine learning operations as well as it provides an integrated library of different machine learning algorithms called MLlib. In this paper, we evaluated the use of Spark using two machine learning algorithms, namely Logistic Regression (LR) and Random Forests (RF). We investigated the effect of varying the memory allocation configuration and the use of GPU. We concluded that the use of Spark greatly improves the runtime and memory consumption. However, its use has to be justifiable and needed for the size of the data due to different factors that affect the machine learning model's accuracy. The memory allocation should be kept to the minimum needed, and GPU should only be used when the machine learning algorithm used supports parallelization.
人工智能(AI)和机器学习显著改善了许多领域,如教育、医疗保健和工业。机器学习技术主要依赖于训练数据的数量和多样性。随着我们所处的数字化转型,我们可以从不同的来源收集到大量的数据。然而,需要解决的问题是如何处理这些数据以及将其存储在何处。云服务和分布式文件系统(dfs)有助于解决这个问题。许多dfs(如Hadoop、Quantcast和Apache Spark)在许多方面存在差异,包括调度算法、数据管理协议、吞吐量和运行时。一些dfs可能比其他dfs更适合处理特定的应用程序。Apache Spark能够处理像机器学习操作这样的迭代操作,并且它提供了一个名为MLlib的不同机器学习算法的集成库。在本文中,我们使用两种机器学习算法,即逻辑回归(LR)和随机森林(RF)来评估Spark的使用。我们研究了不同内存分配配置和GPU使用的影响。我们得出的结论是,使用Spark极大地改善了运行时和内存消耗。然而,由于影响机器学习模型准确性的不同因素,它的使用必须是合理的,并且需要用于数据的大小。内存分配应该保持在所需的最小值,并且GPU应该只在使用的机器学习算法支持并行化时使用。
{"title":"Performance Evaluation of Machine Learning Models on Apache Spark: An Empirical Study","authors":"Asma Z. Yamani, Shikah J. Alsunaidi, Imane Boudellioua","doi":"10.1109/CICN56167.2022.10008282","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008282","url":null,"abstract":"Artificial intelligence (AI) and machine learning significantly improve many sectors, such as education, healthcare, and industry. Machine learning techniques mainly depend on the volume and diversity of training data. With the digital transformation we live in, an abundant amount of data can be collected from different sources. However, the problem that needs to be addressed is how this amount of data can be processed and where it can be stored. Cloud services and distributed file systems (DFSs) help address this issue. Many DFSs such as Hadoop, Quantcast, and Apache Spark differ in many aspects, including scheduling algorithms, data management protocol, throughput, and runtime. Some DFSs may be better for working with specific applications than others. Apache Spark is capable of handling iterative operations like machine learning operations as well as it provides an integrated library of different machine learning algorithms called MLlib. In this paper, we evaluated the use of Spark using two machine learning algorithms, namely Logistic Regression (LR) and Random Forests (RF). We investigated the effect of varying the memory allocation configuration and the use of GPU. We concluded that the use of Spark greatly improves the runtime and memory consumption. However, its use has to be justifiable and needed for the size of the data due to different factors that affect the machine learning model's accuracy. The memory allocation should be kept to the minimum needed, and GPU should only be used when the machine learning algorithm used supports parallelization.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114830981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vertical Wind Speed Estimation Using Generalized Additive Model (GAM) for Regression 用广义加性模型(GAM)进行回归的垂直风速估计
H. Nuha, Rizka Reza Pahlevi, M. Mohandes, S. Rehman, A. Al-Shaikhi, H. Tella
The general plan for the provision of electricity of Indonesia Electricity Company for 2010–2019 states that the annual electricity demand is 55,000 MW. Wind speed (WS) assessment is required for wind farm site candidates. This paper uses the generalized additive model (GAM) for vertical WS estimation. The method is evaluated in terms of symmetric mean absolute percentage error (SMAPE), mean absolute error (MAE), and the adjusted coefficient of determination (R2adj). The highest values of R2adj between the measured and the estimated WS values achieved by GAM method at 60, 100, 140, and 180 m of heights are 96.34%, 81.66%, 64.68 %, and 62.90 % respectively.
印度尼西亚电力公司2010-2019年电力供应总体规划指出,年电力需求为55,000兆瓦。风速(WS)评估是风电场选址候选人的必要条件。本文采用广义加性模型(GAM)进行垂直WS估计。用对称平均绝对百分比误差(SMAPE)、平均绝对误差(MAE)和调整后的决定系数(R2adj)对该方法进行了评价。在60、100、140和180 m高度,GAM法测得的WS值与估测值之间的R2adj最大值分别为96.34%、81.66%、64.68%和62.90%。
{"title":"Vertical Wind Speed Estimation Using Generalized Additive Model (GAM) for Regression","authors":"H. Nuha, Rizka Reza Pahlevi, M. Mohandes, S. Rehman, A. Al-Shaikhi, H. Tella","doi":"10.1109/CICN56167.2022.10008372","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008372","url":null,"abstract":"The general plan for the provision of electricity of Indonesia Electricity Company for 2010–2019 states that the annual electricity demand is 55,000 MW. Wind speed (WS) assessment is required for wind farm site candidates. This paper uses the generalized additive model (GAM) for vertical WS estimation. The method is evaluated in terms of symmetric mean absolute percentage error (SMAPE), mean absolute error (MAE), and the adjusted coefficient of determination (R2adj). The highest values of R2adj between the measured and the estimated WS values achieved by GAM method at 60, 100, 140, and 180 m of heights are 96.34%, 81.66%, 64.68 %, and 62.90 % respectively.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126314849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifiability of Causal-based ML Fairness Notions 基于因果关系的机器学习公平性概念的可识别性
K. Makhlouf, Sami Zhioua, C. Palamidessi
Machine learning algorithms can produce biased outcome/prediction, typically, against minorities and under-represented sub-populations. Therefore, fairness is emerging as an important requirement for the safe application of machine learning based technologies. The most commonly used fairness notions (e.g. statistical parity, equalized odds, predictive parity, etc.) are observational and rely on mere correlation between variables. These notions fail to identify bias in case of statistical anomalies such as Simpson's or Berkson's paradoxes. Causality-based fairness notions (e.g. counterfactual fairness, no-proxy discrimination, etc.) are immune to such anomalies and hence more reliable to assess fairness. The problem of causality-based fairness notions, however, is that they are defined in terms of quantities (e.g. causal, counterfactual, and path-specific effects) that are not always measurable. This is known as the identifiability problem and is the topic of a large body of work in the causal inference literature. The first contribution of this paper is a compilation of the major identifiability results which are of particular relevance for machine learning fairness. To the best of our knowledge, no previous work in the field of ML fairness or causal inference provides such systemization of knowledge. The second contribution is more general and addresses the main problem of using causality in machine learning, that is, how to extract causal knowledge from observational data in real scenarios. This paper shows how this can be achieved using identifiability.
机器学习算法可能会产生有偏见的结果/预测,通常是针对少数群体和代表性不足的亚群体。因此,公平正成为安全应用基于机器学习的技术的重要要求。最常用的公平概念(如统计奇偶性、均等几率、预测奇偶性等)是观察性的,依赖于变量之间的相关性。在统计异常的情况下,如辛普森悖论或伯克森悖论,这些概念无法识别偏见。基于因果关系的公平概念(例如反事实公平,无代理歧视等)不受这种异常现象的影响,因此更可靠地评估公平。然而,基于因果关系的公平概念的问题在于,它们是根据数量(例如因果效应、反事实效应和路径特定效应)来定义的,这些数量并不总是可测量的。这被称为可识别性问题,是因果推理文献中大量工作的主题。本文的第一个贡献是汇编了与机器学习公平性特别相关的主要可识别性结果。据我们所知,以前在机器学习公平性或因果推理领域的工作没有提供这样的知识系统化。第二个贡献更一般,解决了在机器学习中使用因果关系的主要问题,即如何从真实场景中的观测数据中提取因果知识。本文展示了如何使用可识别性来实现这一点。
{"title":"Identifiability of Causal-based ML Fairness Notions","authors":"K. Makhlouf, Sami Zhioua, C. Palamidessi","doi":"10.1109/CICN56167.2022.10008263","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008263","url":null,"abstract":"Machine learning algorithms can produce biased outcome/prediction, typically, against minorities and under-represented sub-populations. Therefore, fairness is emerging as an important requirement for the safe application of machine learning based technologies. The most commonly used fairness notions (e.g. statistical parity, equalized odds, predictive parity, etc.) are observational and rely on mere correlation between variables. These notions fail to identify bias in case of statistical anomalies such as Simpson's or Berkson's paradoxes. Causality-based fairness notions (e.g. counterfactual fairness, no-proxy discrimination, etc.) are immune to such anomalies and hence more reliable to assess fairness. The problem of causality-based fairness notions, however, is that they are defined in terms of quantities (e.g. causal, counterfactual, and path-specific effects) that are not always measurable. This is known as the identifiability problem and is the topic of a large body of work in the causal inference literature. The first contribution of this paper is a compilation of the major identifiability results which are of particular relevance for machine learning fairness. To the best of our knowledge, no previous work in the field of ML fairness or causal inference provides such systemization of knowledge. The second contribution is more general and addresses the main problem of using causality in machine learning, that is, how to extract causal knowledge from observational data in real scenarios. This paper shows how this can be achieved using identifiability.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning with noisy labels: Learning True Labels as Discrete Latent Variable 带噪声标签的深度学习:作为离散潜在变量的真标签学习
Azeddine Elhassouny, Soufiane Idbrahim
In recent years, learning from data with noisy labels (Label Noise) has emerged as a critical issue for supervised learning. This issue has become even more concerning as a result of recent concerns about Deep Learning's generalization capabilities. Indeed, deep learning necessitates a large amount of data, which is typically gathered by search engines. However, these engines frequently return data with Noisy labels. In this study, the variational inference is used to investigate Label Noise in Deep Learning. (1) Using the Label Noise concept, observable labels are learned discriminatively while true labels are learned using reparameterization variational inference. (2) The noise transition matrix is learned during training without the use of any special methods, heuristics, or initial stages. The effectiveness of our approach is shown on several test datasets, including MNIST and CIFAR32, and theoretical results show how variational inference in any discriminating neural network can be used to learn the correct label distribution.
近年来,从带有噪声标签(Label Noise)的数据中学习已成为监督学习的一个关键问题。由于最近对深度学习泛化能力的关注,这个问题变得更加令人担忧。事实上,深度学习需要大量的数据,而这些数据通常是由搜索引擎收集的。然而,这些引擎经常返回带有Noisy标签的数据。在本研究中,变分推理用于研究深度学习中的标签噪声。(1)使用标签噪声概念,判别学习可观察标签,而使用重参数化变分推理学习真标签。(2)在训练过程中学习噪声转移矩阵,而不使用任何特殊方法、启发式或初始阶段。我们的方法的有效性在几个测试数据集上得到了证明,包括MNIST和CIFAR32,理论结果表明,任何判别神经网络中的变分推理都可以用来学习正确的标签分布。
{"title":"Deep learning with noisy labels: Learning True Labels as Discrete Latent Variable","authors":"Azeddine Elhassouny, Soufiane Idbrahim","doi":"10.1109/CICN56167.2022.10008239","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008239","url":null,"abstract":"In recent years, learning from data with noisy labels (Label Noise) has emerged as a critical issue for supervised learning. This issue has become even more concerning as a result of recent concerns about Deep Learning's generalization capabilities. Indeed, deep learning necessitates a large amount of data, which is typically gathered by search engines. However, these engines frequently return data with Noisy labels. In this study, the variational inference is used to investigate Label Noise in Deep Learning. (1) Using the Label Noise concept, observable labels are learned discriminatively while true labels are learned using reparameterization variational inference. (2) The noise transition matrix is learned during training without the use of any special methods, heuristics, or initial stages. The effectiveness of our approach is shown on several test datasets, including MNIST and CIFAR32, and theoretical results show how variational inference in any discriminating neural network can be used to learn the correct label distribution.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Home Appliances using loT and Machine Learning: The Smart Home 使用loT和机器学习的家用电器:智能家居
Kritika Rathi, Vanshika Sharma, Swati Gupta, A. Bagwari, G. Tomar
The term Home Automation describes the technologies used in the home for the essential needs like interconnection, wireless communication and making the quality of the component to use in a smart way just through the internet of things. The term HOME AUTOMATION indicates the quality of the automatic working of the systems and controlling of the different variety of home appliances. In the information communication technology, cloud computing and the IOT are the major types of services used in the model for the advancement of the new generation in which these two are making a great influence for making and deploying new applications. On the other hand, the interfaces between the hardware component, communication, and the programming are a main application for the technology used in the home which works to combine every device through the internet or Wi-Fi. The every device used in the model is connected to the Wi-Fi due to which we can get the output through our mobile phones, it doesn't depends whether we are at home or at the working place or anywhere else in the world, the app in the mobile phone shows the update information of our lights, motor, induction and also face recognize for the safety purpose in the front door.
“家庭自动化”一词描述了家庭中用于满足互连、无线通信等基本需求的技术,以及通过物联网以智能方式使用组件的质量。“家庭自动化”一词指的是系统自动工作的质量和对各种家用电器的控制。在信息通信技术中,云计算和物联网是新一代进步模式中使用的主要服务类型,这两者对新应用的制作和部署产生了重大影响。另一方面,硬件组件、通信和编程之间的接口是家庭中使用的技术的主要应用,它通过互联网或Wi-Fi将每个设备组合在一起。模型中使用的每台设备都连接了Wi-Fi,因此我们可以通过手机获得输出,无论我们是在家里还是在工作场所还是在世界上的任何地方,手机中的应用程序都会在前门显示我们的灯,电机,感应的更新信息,以及出于安全目的的人脸识别。
{"title":"Home Appliances using loT and Machine Learning: The Smart Home","authors":"Kritika Rathi, Vanshika Sharma, Swati Gupta, A. Bagwari, G. Tomar","doi":"10.1109/CICN56167.2022.10008294","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008294","url":null,"abstract":"The term Home Automation describes the technologies used in the home for the essential needs like interconnection, wireless communication and making the quality of the component to use in a smart way just through the internet of things. The term HOME AUTOMATION indicates the quality of the automatic working of the systems and controlling of the different variety of home appliances. In the information communication technology, cloud computing and the IOT are the major types of services used in the model for the advancement of the new generation in which these two are making a great influence for making and deploying new applications. On the other hand, the interfaces between the hardware component, communication, and the programming are a main application for the technology used in the home which works to combine every device through the internet or Wi-Fi. The every device used in the model is connected to the Wi-Fi due to which we can get the output through our mobile phones, it doesn't depends whether we are at home or at the working place or anywhere else in the world, the app in the mobile phone shows the update information of our lights, motor, induction and also face recognize for the safety purpose in the front door.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"323 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Implementation of a New Proposed Round-Robin Algorithm with Smart Time Quantum in Cloud Computing Environment 一种新的基于智能时间量子的轮循算法在云计算环境中的实现
Haifa Al-Shammare, Nehal Al-Otaiby
The popularity of cloud computing platforms has risen dramatically in recent years. As cloud computing serves millions of users at the same time, it must be able to handle all those users' demands efficiently. Thus, choosing a suitable scheduling algorithm is crucial in the cloud computing environment in order to ensure efficient performance with a reasonable degree of quality of service (QoS). The primary goal of this research is to empirically implement and evaluate a recently proposed Round-Robin algorithm with smart time quantum (RR-STQ) in a cloud computing environment, as well as, to enhance the RR-STQ with a dynamic smart time quantum. The CloudSim tool was used to simulate the cloud computing platform to implement RR-STQ and evaluate it with several algorithms using different scenarios. In addition, three scheduling performance metrics were used in the evaluation process. In all comparison scenarios, the (RR-STQ) achieved a significant improvement rate in terms of average response time (RT). Moreover, (RR-STQ) has a better performance in the average turnaround time (TAT), waiting time (WT), and response time (RT) than the traditional RR algorithm. Also, the implemented algorithm (RR-STQ) with dynamic time quantum has a better performance than static time quantum. Based on the evaluation results, it is beneficial to integrate the RR algorithm with other scheduling models such as shortest job first (SJF) to enhance the WT and TAT. Furthermore, the investigations revealed that the dynamic time quantum improves the performance of the RR algorithm.
近年来,云计算平台的普及程度急剧上升。由于云计算同时为数百万用户提供服务,因此它必须能够有效地处理所有这些用户的需求。因此,在云计算环境中,选择合适的调度算法以保证高效的性能和合理的服务质量(QoS)至关重要。本研究的主要目标是在云计算环境下对最近提出的一种基于智能时间量子(RR-STQ)的轮询算法进行实证实现和评估,并利用动态智能时间量子对RR-STQ进行增强。使用CloudSim工具模拟云计算平台实现RR-STQ,并使用不同场景下的几种算法对其进行评估。此外,在评估过程中使用了三个调度性能指标。在所有的比较场景中,(RR-STQ)在平均响应时间(RT)方面取得了显著的改善。此外,(RR- stq)算法在平均周转时间(TAT)、等待时间(WT)和响应时间(RT)方面都比传统的RR算法有更好的性能。同时,所实现的带有动态时间量子的RR-STQ算法具有比静态时间量子更好的性能。基于评价结果,将RR算法与其他调度模型(如最短作业优先(SJF))相结合,有利于提高WT和TAT的效率。此外,研究表明,动态时间量子提高了RR算法的性能。
{"title":"An Implementation of a New Proposed Round-Robin Algorithm with Smart Time Quantum in Cloud Computing Environment","authors":"Haifa Al-Shammare, Nehal Al-Otaiby","doi":"10.1109/CICN56167.2022.10008330","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008330","url":null,"abstract":"The popularity of cloud computing platforms has risen dramatically in recent years. As cloud computing serves millions of users at the same time, it must be able to handle all those users' demands efficiently. Thus, choosing a suitable scheduling algorithm is crucial in the cloud computing environment in order to ensure efficient performance with a reasonable degree of quality of service (QoS). The primary goal of this research is to empirically implement and evaluate a recently proposed Round-Robin algorithm with smart time quantum (RR-STQ) in a cloud computing environment, as well as, to enhance the RR-STQ with a dynamic smart time quantum. The CloudSim tool was used to simulate the cloud computing platform to implement RR-STQ and evaluate it with several algorithms using different scenarios. In addition, three scheduling performance metrics were used in the evaluation process. In all comparison scenarios, the (RR-STQ) achieved a significant improvement rate in terms of average response time (RT). Moreover, (RR-STQ) has a better performance in the average turnaround time (TAT), waiting time (WT), and response time (RT) than the traditional RR algorithm. Also, the implemented algorithm (RR-STQ) with dynamic time quantum has a better performance than static time quantum. Based on the evaluation results, it is beneficial to integrate the RR algorithm with other scheduling models such as shortest job first (SJF) to enhance the WT and TAT. Furthermore, the investigations revealed that the dynamic time quantum improves the performance of the RR algorithm.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134373199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WSN Routing Protocols: Anonymity Prospective Analysis 无线传感器网络路由协议:匿名前瞻性分析
Abdulrahman Abu Elkhail, U. Baroudi, Mohammed S. H. Younis
A Wireless Sensor Network (WSN) is composed of a number of sensor nodes and a single Base-Station (BS), distributed randomly in an area of interest. WSNs have proven very beneficial in various applications in unattended setup in many domains such as scientific, civil, and military. In these applications, sensors send their measurements to the Base Station over multi-hop wireless routes where the Base Station is responsible for collecting and processing the sensed data. Given the importance of the BS, a potential attacker would look to locate the base station by examining network traffic patterns in order to launch specific attacks intended to interfere with network functionality. In this paper, we analyze traffic analysis attack models from the viewpoint of an adversary. Additionally, we examine the benefits and drawbacks of various routing protocols in terms of exposing the network to traffic analysis attacks. Our evaluation is supported by simulation results.
无线传感器网络(WSN)由多个传感器节点和单个基站(BS)组成,随机分布在感兴趣的区域。无线传感器网络在科学、民用和军事等许多领域的无人值守设置中得到了广泛的应用。在这些应用中,传感器通过多跳无线路由将其测量值发送到基站,基站负责收集和处理感测数据。考虑到BS的重要性,潜在的攻击者会通过检查网络流量模式来定位基站,以便发起旨在干扰网络功能的特定攻击。本文从对手的角度对流量分析攻击模型进行了分析。此外,我们还研究了各种路由协议在将网络暴露于流量分析攻击方面的优点和缺点。仿真结果支持了我们的评价。
{"title":"WSN Routing Protocols: Anonymity Prospective Analysis","authors":"Abdulrahman Abu Elkhail, U. Baroudi, Mohammed S. H. Younis","doi":"10.1109/CICN56167.2022.10008348","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008348","url":null,"abstract":"A Wireless Sensor Network (WSN) is composed of a number of sensor nodes and a single Base-Station (BS), distributed randomly in an area of interest. WSNs have proven very beneficial in various applications in unattended setup in many domains such as scientific, civil, and military. In these applications, sensors send their measurements to the Base Station over multi-hop wireless routes where the Base Station is responsible for collecting and processing the sensed data. Given the importance of the BS, a potential attacker would look to locate the base station by examining network traffic patterns in order to launch specific attacks intended to interfere with network functionality. In this paper, we analyze traffic analysis attack models from the viewpoint of an adversary. Additionally, we examine the benefits and drawbacks of various routing protocols in terms of exposing the network to traffic analysis attacks. Our evaluation is supported by simulation results.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realistic Face Masks Generation Using Generative Adversarial Networks 使用生成对抗网络生成逼真的面具
Khaled Al Butainy, Muhamad Felemban, H. Luqman
Understanding facial expressions is important for the interactions among humans as it conveys a lot about the person's identity and emotions. Research in human emotion recognition has become more popular nowadays due to the advances in the machine learning and deep learning techniques. However, the spread of COVID-19, and the need for wearing masks in the public has impacted the current emotion recognition models' performance. Therefore, improving the performance of these models requires datasets with masked faces. In this paper, we propose a model to generate realistic face masks using generative adversarial network models, in particular image inpainting. The MAFA dataset was used to train the generative image inpainting model. In addition, a face detection model was proposed to identify the mask area. The model was evaluated using the MAFA and CelebA datasets, and promising results were obtained.
理解面部表情对于人与人之间的互动很重要,因为它传达了很多关于一个人的身份和情感的信息。由于机器学习和深度学习技术的进步,人类情感识别的研究越来越受欢迎。然而,新冠肺炎疫情的蔓延和公众戴口罩的需求影响了当前情绪识别模型的表现。因此,提高这些模型的性能需要带有遮罩面的数据集。在本文中,我们提出了一个使用生成对抗网络模型生成逼真面具的模型,特别是图像绘制。利用MAFA数据集训练生成图像的绘画模型。此外,提出了一种人脸检测模型来识别掩模区域。利用MAFA和CelebA数据集对该模型进行了评估,获得了令人满意的结果。
{"title":"Realistic Face Masks Generation Using Generative Adversarial Networks","authors":"Khaled Al Butainy, Muhamad Felemban, H. Luqman","doi":"10.1109/CICN56167.2022.10008304","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008304","url":null,"abstract":"Understanding facial expressions is important for the interactions among humans as it conveys a lot about the person's identity and emotions. Research in human emotion recognition has become more popular nowadays due to the advances in the machine learning and deep learning techniques. However, the spread of COVID-19, and the need for wearing masks in the public has impacted the current emotion recognition models' performance. Therefore, improving the performance of these models requires datasets with masked faces. In this paper, we propose a model to generate realistic face masks using generative adversarial network models, in particular image inpainting. The MAFA dataset was used to train the generative image inpainting model. In addition, a face detection model was proposed to identify the mask area. The model was evaluated using the MAFA and CelebA datasets, and promising results were obtained.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124294619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmit and receive filter design for MIMO-OFDM based WiMAX systems 基于MIMO-OFDM的WiMAX系统收发滤波器设计
Rajesh K, V. G, M. S
RRC (Root Raised Cosine) filters used in wireless communication as transmit and receive filters help in mitigating the lSI (Inter Symbol Interference). In this paper, the effect of root raised cosine pulse shaping filter with different roll off factors in a 2xl MIMO-OFDM system employing 256 sub carriers is analysed. In particular, the work focuses on the selection of quantization bits, truncation length and rolloff factors in a practical WiMAX system. BER analysis at different rolloff factors is presented. To evaluate the performance of the proposed design, simulations were carried out in Matlab-Simulink.
RRC(根提升余弦)滤波器用于无线通信作为发送和接收滤波器有助于减轻lSI(符号间干扰)。本文分析了不同滚降系数的升根余弦脉冲整形滤波器对一个256子载波的2xl MIMO-OFDM系统的影响。重点研究了实际WiMAX系统中量化位、截断长度和滚转系数的选择。给出了不同滚转系数下的误码率分析。为了评估所提出的设计的性能,在Matlab-Simulink中进行了仿真。
{"title":"Transmit and receive filter design for MIMO-OFDM based WiMAX systems","authors":"Rajesh K, V. G, M. S","doi":"10.1109/CICN56167.2022.10008299","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008299","url":null,"abstract":"RRC (Root Raised Cosine) filters used in wireless communication as transmit and receive filters help in mitigating the lSI (Inter Symbol Interference). In this paper, the effect of root raised cosine pulse shaping filter with different roll off factors in a 2xl MIMO-OFDM system employing 256 sub carriers is analysed. In particular, the work focuses on the selection of quantization bits, truncation length and rolloff factors in a practical WiMAX system. BER analysis at different rolloff factors is presented. To evaluate the performance of the proposed design, simulations were carried out in Matlab-Simulink.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124544995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1