Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061292
Hao Yang, Ying Qin, Yao Deng, Minghan Wang
Pre-trained language models like Bert, RoBERTa, GPT, etc. have achieved SOTA effects on multiple NLP tasks (e.g. sentiment classification, information extraction, event extraction, etc.). We propose a simple method based on knowledge graph to improve the quality of machine translation. First, we propose a multi-task learning model that learns subjects, objects, and predicates at the same time. Second, we treat different predicates as different fields, and improve the recognition ability of NMT models in different fields through classification labels. Finally, beam search combined with L2R, R2L rearranges results through entities. Based on the CWMT2018 experimental data, using the predicate's domain classification identifier, the BLUE score increased from 33.58% to 37.63%, and through L2R, R2L rearrangement, the BLEU score increased to 39.25%, overall improvement is more than 5 percentage
{"title":"NMT Enhancement based on Knowledge Graph Mining with Pre-trained Language Model","authors":"Hao Yang, Ying Qin, Yao Deng, Minghan Wang","doi":"10.23919/ICACT48636.2020.9061292","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061292","url":null,"abstract":"Pre-trained language models like Bert, RoBERTa, GPT, etc. have achieved SOTA effects on multiple NLP tasks (e.g. sentiment classification, information extraction, event extraction, etc.). We propose a simple method based on knowledge graph to improve the quality of machine translation. First, we propose a multi-task learning model that learns subjects, objects, and predicates at the same time. Second, we treat different predicates as different fields, and improve the recognition ability of NMT models in different fields through classification labels. Finally, beam search combined with L2R, R2L rearranges results through entities. Based on the CWMT2018 experimental data, using the predicate's domain classification identifier, the BLUE score increased from 33.58% to 37.63%, and through L2R, R2L rearrangement, the BLEU score increased to 39.25%, overall improvement is more than 5 percentage","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061522
Andleeb Aslam, Usman Qamar, Reda Ayesha Khan, Pakizah Saqib
The paper is concerned with Improving k-Mean Algorithm in terms of accuracy by selecting the best initial seed points based on the provided k value. This paper presents two modified k-mean method for the selection of initial centroid points. In the first method based on the calculated k value with the help of elbow method, the original sorted data based on distances calculated using Euclidean distance method is divided into k equal partitions. And the mean of each partition is considered as initial centroid points. And in the second method the number of k is chosen randomly and the mean of each partition is considered as initial centroid points. We compared within cluster distance and number of iterations. Modified k-mean methods are better than original k-mean method as the distance within the clusters are less in modified k-mean than the original k-mean and the accuracy is also better.
{"title":"Improving K-Mean Method by Finding Initial Centroid Points","authors":"Andleeb Aslam, Usman Qamar, Reda Ayesha Khan, Pakizah Saqib","doi":"10.23919/ICACT48636.2020.9061522","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061522","url":null,"abstract":"The paper is concerned with Improving k-Mean Algorithm in terms of accuracy by selecting the best initial seed points based on the provided k value. This paper presents two modified k-mean method for the selection of initial centroid points. In the first method based on the calculated k value with the help of elbow method, the original sorted data based on distances calculated using Euclidean distance method is divided into k equal partitions. And the mean of each partition is considered as initial centroid points. And in the second method the number of k is chosen randomly and the mean of each partition is considered as initial centroid points. We compared within cluster distance and number of iterations. Modified k-mean methods are better than original k-mean method as the distance within the clusters are less in modified k-mean than the original k-mean and the accuracy is also better.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123896876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061480
M. R. Uddin, Law Foo Kui, R. Petra, Zainidi Hamid, Nazri Ahmad, N. Lingas
The need for the research breakthrough in terms of the underlying electronic components have been rising due to the limitations of the current technology. Several alternative methods for digital circuits are needed, thus silicon photonics could be the answer. This paper presents the design of a digital 2 to 4 electro-optic line decoder based on the photonic micro-ring resonator as its core component. This work provides the design principle of the proposed digital decoder, together with the demonstration and simulation of the time varying operation with the speed of 5Gbps. The performance of the proposed line decoder is shown by clear output timing diagrams.
{"title":"2 to 4 Digital Optical Line Decoder based on Photonic Micro-Ring Resonators","authors":"M. R. Uddin, Law Foo Kui, R. Petra, Zainidi Hamid, Nazri Ahmad, N. Lingas","doi":"10.23919/ICACT48636.2020.9061480","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061480","url":null,"abstract":"The need for the research breakthrough in terms of the underlying electronic components have been rising due to the limitations of the current technology. Several alternative methods for digital circuits are needed, thus silicon photonics could be the answer. This paper presents the design of a digital 2 to 4 electro-optic line decoder based on the photonic micro-ring resonator as its core component. This work provides the design principle of the proposed digital decoder, together with the demonstration and simulation of the time varying operation with the speed of 5Gbps. The performance of the proposed line decoder is shown by clear output timing diagrams.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"6 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061358
Aseer Ahmad Ansari, Sabyasachi Chakraborty, S. Aich, B. Kim, Hee-Cheol Kim
The aim of this work is to optimize the healthcare network for improving service delivery by allocation and deallocation of healthcare resources as per need. The extrapolation of the need for facility and resources is the most challenging part of this work which requires knowledge of the population of various geographic regions/areas. The population is also looked at from the perspective of age-group, economy, the average fraction of population requiring healthcare and also keeping in mind any history of diseases or such prone areas. Speculating the thumb rule of the healthcare worker to patient ratio i.e. 1:2808 in order to make work smooth and patient care more robust for the staff members. The proposed efforts are to help the Washington State health ministry to amend, develop and improve the staff and resources in existing facilities
{"title":"Optimization of Healthcare Network for improved service delivery","authors":"Aseer Ahmad Ansari, Sabyasachi Chakraborty, S. Aich, B. Kim, Hee-Cheol Kim","doi":"10.23919/ICACT48636.2020.9061358","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061358","url":null,"abstract":"The aim of this work is to optimize the healthcare network for improving service delivery by allocation and deallocation of healthcare resources as per need. The extrapolation of the need for facility and resources is the most challenging part of this work which requires knowledge of the population of various geographic regions/areas. The population is also looked at from the perspective of age-group, economy, the average fraction of population requiring healthcare and also keeping in mind any history of diseases or such prone areas. Speculating the thumb rule of the healthcare worker to patient ratio i.e. 1:2808 in order to make work smooth and patient care more robust for the staff members. The proposed efforts are to help the Washington State health ministry to amend, develop and improve the staff and resources in existing facilities","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121460836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061476
Arif Dataesatu, Pornpawit Boonsrimuang, K. Mori, P. Boonsrimuang
Currently, Cellular architectures are designed with an efficient providing infrastructure is one of the critical challenges in 5G dense heterogeneous cellular networks (HetNets). By adding many small base stations (SBSs) in a macro base station (MBS) is one way to support the rapid growth of mobile data communication, high data rate services and to provide continuous coverage. The high number of network elements leads to a significant increase in power consumption. To solve the problem, the SBS on/off algorithm has been introduced to reduce power consumption but also reduced energy efficiency as we called the conventional schemes. This paper we proposed as the SBS switching to sleep state algorithm based on the system throughput (MBS cell throughput and SBS cell throughput) is used the decision criteria for SBS to be in the sleep state. The simulation results, The proposed scheme can reduce the total power consumption of the network and enhance energy efficiency more than the conventional schemes.
{"title":"Energy Efficiency Enhancement in 5G Heterogeneous Cellular Networks Using System Throughput Based Sleep Control Scheme","authors":"Arif Dataesatu, Pornpawit Boonsrimuang, K. Mori, P. Boonsrimuang","doi":"10.23919/ICACT48636.2020.9061476","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061476","url":null,"abstract":"Currently, Cellular architectures are designed with an efficient providing infrastructure is one of the critical challenges in 5G dense heterogeneous cellular networks (HetNets). By adding many small base stations (SBSs) in a macro base station (MBS) is one way to support the rapid growth of mobile data communication, high data rate services and to provide continuous coverage. The high number of network elements leads to a significant increase in power consumption. To solve the problem, the SBS on/off algorithm has been introduced to reduce power consumption but also reduced energy efficiency as we called the conventional schemes. This paper we proposed as the SBS switching to sleep state algorithm based on the system throughput (MBS cell throughput and SBS cell throughput) is used the decision criteria for SBS to be in the sleep state. The simulation results, The proposed scheme can reduce the total power consumption of the network and enhance energy efficiency more than the conventional schemes.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061289
Sabyasachi Chakraborty, S. Aich, Avinash Kumar, Sobhangi Sarkar, J. Sim, Hee-Cheol Kim
Computer-aided detection techniques to improve precision diagnostic capability and efficiency in the diagnosis process has been regarded as one of the most important topics in the field of computer vision. The medical imaging data with respect to a patient is primarily considered as one of the most important sources to derive the information regarding the biomarkers of a particular disease. But the successful detection of biomarkers requires the radiologist and the pathologist to have long term experience in this field. Therefore, the development of computer-aided detection is one of the primary concerns that need to be discussed. Moreover with the advent of Deep Learning and Artificial Intelligence, now the detection of anomalies and aneurysms in the medical imagery can become much more precise and efficient. Therefore this particular paper presents a dual-channel residual convolution neural network (CNN) model for the automated classification and detection of cancerous tissues in histopathological images. The proposed CNN model has been trained with 220,025 histopathological images and has achieved an overall accuracy of 96.475%, average recall of 95.72% and an average precision of 95.92% respectively.
{"title":"Detection of cancerous tissue in histopathological images using Dual-Channel Residual Convolutional Neural Networks (DCRCNN)","authors":"Sabyasachi Chakraborty, S. Aich, Avinash Kumar, Sobhangi Sarkar, J. Sim, Hee-Cheol Kim","doi":"10.23919/ICACT48636.2020.9061289","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061289","url":null,"abstract":"Computer-aided detection techniques to improve precision diagnostic capability and efficiency in the diagnosis process has been regarded as one of the most important topics in the field of computer vision. The medical imaging data with respect to a patient is primarily considered as one of the most important sources to derive the information regarding the biomarkers of a particular disease. But the successful detection of biomarkers requires the radiologist and the pathologist to have long term experience in this field. Therefore, the development of computer-aided detection is one of the primary concerns that need to be discussed. Moreover with the advent of Deep Learning and Artificial Intelligence, now the detection of anomalies and aneurysms in the medical imagery can become much more precise and efficient. Therefore this particular paper presents a dual-channel residual convolution neural network (CNN) model for the automated classification and detection of cancerous tissues in histopathological images. The proposed CNN model has been trained with 220,025 histopathological images and has achieved an overall accuracy of 96.475%, average recall of 95.72% and an average precision of 95.92% respectively.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"XL 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131200450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061378
Wenwei Liao, E. Hackathorn, Suefen Wang
The increasing popularization of information technology has gradually overcome the difficulties of educating earth science gradually. In the times of having only textbooks, we merely had 2D maps for references to educate earth science. However, it was known that the earth was round, but it was hard for students to understand flows of ocean currents, atmospheric flows, ship movements, or directions of typhoons from those 2D maps. Nevertheless, the development of information technology and computers had solved these problems. For instance, we could use software to simulate flight of airplanes, navigation direction of ships, and moving route of cars. Based on the evolvements of these computer technologies, our lab considered using 3D visual effects to display the earth and educate earth science; consequently, we designed the software “Science On a Sphere Explorer.” In it, we have integrated several hundreds of environmental science data from National Oceanic and Atmospheric Administration and utilized 3D visual effects to educate earth science. In this study, the authors introduce the software and describe the instructional outcomes.
{"title":"A Study of Applying a 3D Instructional Software of Popular Science (Science On a Sphere Explorer) in Earth Science Education of an Elementary School","authors":"Wenwei Liao, E. Hackathorn, Suefen Wang","doi":"10.23919/ICACT48636.2020.9061378","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061378","url":null,"abstract":"The increasing popularization of information technology has gradually overcome the difficulties of educating earth science gradually. In the times of having only textbooks, we merely had 2D maps for references to educate earth science. However, it was known that the earth was round, but it was hard for students to understand flows of ocean currents, atmospheric flows, ship movements, or directions of typhoons from those 2D maps. Nevertheless, the development of information technology and computers had solved these problems. For instance, we could use software to simulate flight of airplanes, navigation direction of ships, and moving route of cars. Based on the evolvements of these computer technologies, our lab considered using 3D visual effects to display the earth and educate earth science; consequently, we designed the software “Science On a Sphere Explorer.” In it, we have integrated several hundreds of environmental science data from National Oceanic and Atmospheric Administration and utilized 3D visual effects to educate earth science. In this study, the authors introduce the software and describe the instructional outcomes.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133302874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061435
Wang-You Tsai, T. Chou, Jiann-Liang Chen, Yi-Wei Ma, Chen-Jui Huang
Problems related to privacy and cyber-attacks have increased in recent years as a result of the rapid development of cloud computing. This work concerns secure cloud computing services on a blockchain platform, called cloud@blockchain, which benefit from the anonymity and immutability of blockchain. Two functions- anonymous file sharing and inspections to find illegally uploaded files- on cloud@blockchain are designed. On cloud@blockchain, cloud users can access data through smart contracts, and recognize all users within the application layer. The performance of three architectures- a pure blockchain, a hybrid blockchain with cache and a traditional database in accessing data is analyzed. The results reveal the superiority of the hybrid blockchain with the cache over the pure blockchain and the traditional database, which it outperforms by 500% and 53.19%, respectively.
{"title":"Blockchain as a Platform for Secure Cloud Computing Services","authors":"Wang-You Tsai, T. Chou, Jiann-Liang Chen, Yi-Wei Ma, Chen-Jui Huang","doi":"10.23919/ICACT48636.2020.9061435","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061435","url":null,"abstract":"Problems related to privacy and cyber-attacks have increased in recent years as a result of the rapid development of cloud computing. This work concerns secure cloud computing services on a blockchain platform, called cloud@blockchain, which benefit from the anonymity and immutability of blockchain. Two functions- anonymous file sharing and inspections to find illegally uploaded files- on cloud@blockchain are designed. On cloud@blockchain, cloud users can access data through smart contracts, and recognize all users within the application layer. The performance of three architectures- a pure blockchain, a hybrid blockchain with cache and a traditional database in accessing data is analyzed. The results reveal the superiority of the hybrid blockchain with the cache over the pure blockchain and the traditional database, which it outperforms by 500% and 53.19%, respectively.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061547
Yanan Wang, Geng Zhang, Yang Wang, Huixia Ding, Weidong Wang, Siqi Li
With the rapid development of the smart grid, the power grid simulation integrated with its communication system becomes very important for power grid evaluation and deployment. In this paper, a collaborative simulation architecture for power grid system with the consideration of its communication system, in which the DIgSILENT, the QualNet, and an association controller are connected by two investigated interfaces, i.e., a data interaction interface (DII) and a dynamic control interface (DCI), is proposed for the influence evaluation of communication network faults on the power grid system. DII supports the information exchanging between the DIgSILENT and the QualNet, and the DCI is in charge of dynamical fault configuration of communication network, control message transmission from association controller to both DIgSILENT and QualNet, and state information feedback from DIgSILENT and QualNet to association controller. Experimental results show that the proposed interfaces can effectively implement data exchange between DIgSILENT, QualNet and association controller with an acceptable interface delay. And the influence of communication network faults on power grid system can be obtained obviously.
{"title":"A Collaborative Simulation Architecture for Influence Evaluation of Communication Network Faults on Power Grid System","authors":"Yanan Wang, Geng Zhang, Yang Wang, Huixia Ding, Weidong Wang, Siqi Li","doi":"10.23919/ICACT48636.2020.9061547","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061547","url":null,"abstract":"With the rapid development of the smart grid, the power grid simulation integrated with its communication system becomes very important for power grid evaluation and deployment. In this paper, a collaborative simulation architecture for power grid system with the consideration of its communication system, in which the DIgSILENT, the QualNet, and an association controller are connected by two investigated interfaces, i.e., a data interaction interface (DII) and a dynamic control interface (DCI), is proposed for the influence evaluation of communication network faults on the power grid system. DII supports the information exchanging between the DIgSILENT and the QualNet, and the DCI is in charge of dynamical fault configuration of communication network, control message transmission from association controller to both DIgSILENT and QualNet, and state information feedback from DIgSILENT and QualNet to association controller. Experimental results show that the proposed interfaces can effectively implement data exchange between DIgSILENT, QualNet and association controller with an acceptable interface delay. And the influence of communication network faults on power grid system can be obtained obviously.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061338
Da-Yu Kao
Cybercrime threats are often originating from trusted, malicious, or negligent insiders, who have excessive access privileges to an organization's network, system, or data. The sophistication of insider threats has led to cybercrime issues. Even when an incident is detected, the follow-up countermeasures are required to analyze the results. The analysis of cybercrime insider investigation presents many opportunities for actionable intelligence on improving the quality and value of digital evidence. There are several advantages of applying Deep Packet Inspection (DPI) methods in cybercrime insider investigation. This study discusses the importance of actionable intelligence to conduct investigations and addresses the countermeasure of a cybercrime insider investigation with DPI to detect anomalies in network packets.
{"title":"Using the Actionable Intelligence Approach for the DPI of Cybercrime Insider Investigation","authors":"Da-Yu Kao","doi":"10.23919/ICACT48636.2020.9061338","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061338","url":null,"abstract":"Cybercrime threats are often originating from trusted, malicious, or negligent insiders, who have excessive access privileges to an organization's network, system, or data. The sophistication of insider threats has led to cybercrime issues. Even when an incident is detected, the follow-up countermeasures are required to analyze the results. The analysis of cybercrime insider investigation presents many opportunities for actionable intelligence on improving the quality and value of digital evidence. There are several advantages of applying Deep Packet Inspection (DPI) methods in cybercrime insider investigation. This study discusses the importance of actionable intelligence to conduct investigations and addresses the countermeasure of a cybercrime insider investigation with DPI to detect anomalies in network packets.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116414712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}