首页 > 最新文献

2020 22nd International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC ASIC中SHA-256哈希的高性能并行硬件架构
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061457
Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang
The SHA-256 algorithm is used to ensure the integrity and authenticity of data in order to achieve a good security thus is playing an important role in various applications, such as e-transactions and bitcoins. The SHA-256 computation capacity is a main research direction of Hashing Algorithm. In order to improve the computation capacity of hardware, the proposed design first uses pipeline principle and circuitry of timing prediction to find a most efficient architecture for implementation. Then it is optimized with hash function and hardware characteristics to give a high-performance hardware architecture of SHA-256 hash. Three pipelines are used to replace the critical path in the round functions which can shorten the timing path, and divide the computation chain into independent steps. Multi-computation of SHA-256 is working in parallel pipelines, indicating that the computation capacity can be 3 times of that with standard SHA-256 implementation. The proposed SHA-256 hardware architecture has been implemented and synthesized with Intel 14nm technology. Simulation and synthesis results show the proposed SHA-256 hashing throughput can be improved by 3 times with 50.7% power reduction, at an area cost of 2.9 times compared to that of the standard implementation.
SHA-256算法用于保证数据的完整性和真实性,以达到良好的安全性,因此在电子交易和比特币等各种应用中发挥着重要作用。SHA-256的计算能力是哈希算法的一个主要研究方向。为了提高硬件的计算能力,本设计首先利用流水线原理和时序预测电路来寻找最有效的实现架构。然后结合哈希函数和硬件特性对其进行优化,给出了一个高性能的SHA-256哈希硬件架构。采用三条管道代替圆函数中的关键路径,缩短了计时路径,并将计算链划分为独立的步长。SHA-256的多重计算是在并行管道中进行的,这表明计算能力可以达到标准SHA-256实现的3倍。提出的SHA-256硬件架构已经实现,并与英特尔14nm技术合成。仿真和综合结果表明,与标准实现相比,提出的SHA-256哈希吞吐量可提高3倍,功耗降低50.7%,面积成本为2.9倍。
{"title":"A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC","authors":"Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang","doi":"10.23919/ICACT48636.2020.9061457","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061457","url":null,"abstract":"The SHA-256 algorithm is used to ensure the integrity and authenticity of data in order to achieve a good security thus is playing an important role in various applications, such as e-transactions and bitcoins. The SHA-256 computation capacity is a main research direction of Hashing Algorithm. In order to improve the computation capacity of hardware, the proposed design first uses pipeline principle and circuitry of timing prediction to find a most efficient architecture for implementation. Then it is optimized with hash function and hardware characteristics to give a high-performance hardware architecture of SHA-256 hash. Three pipelines are used to replace the critical path in the round functions which can shorten the timing path, and divide the computation chain into independent steps. Multi-computation of SHA-256 is working in parallel pipelines, indicating that the computation capacity can be 3 times of that with standard SHA-256 implementation. The proposed SHA-256 hardware architecture has been implemented and synthesized with Intel 14nm technology. Simulation and synthesis results show the proposed SHA-256 hashing throughput can be improved by 3 times with 50.7% power reduction, at an area cost of 2.9 times compared to that of the standard implementation.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spatial Modulation Based Color-Intensity Shift Keying in VLC System 基于空间调制的VLC系统色强移位键控
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061540
Xiang Gao, Xiao-peng Yan, Zhiquan Bai
In this paper, a modulation scheme referred as spatial modulation based color-intensity shift keying (SM CISK) is proposed for visible light communication (VLC) systems. The proposed scheme amalgamates conventional color shift keying (CSK), pulse amplitude modulation (PAM), and SM together to efficiently exploit the degrees of freedom in the color, the intensity, and the spatial domains. It maintains a constant average transmit power to fulfill the non-flickering requirement for the normal illumination. The bit error rate (BER) of the proposed scheme is studied based on the maximal likelihood (ML) detection. Simulation results verify that the proposed scheme outperforms the joint color-and-spatial modulation (SM CSK) and CISK modulation scheme.
本文提出了一种用于可见光通信(VLC)系统的基于空间调制的色强移位键控(SM CISK)调制方案。该方案将传统的色移键控(CSK)、脉冲幅度调制(PAM)和SM结合在一起,有效地利用了颜色、强度和空间域的自由度。它保持恒定的平均发射功率,以满足正常照明的无闪烁要求。基于最大似然(ML)检测,研究了该方案的误码率。仿真结果验证了该方案优于联合色空间调制(SM - CSK)和CISK调制方案。
{"title":"Spatial Modulation Based Color-Intensity Shift Keying in VLC System","authors":"Xiang Gao, Xiao-peng Yan, Zhiquan Bai","doi":"10.23919/ICACT48636.2020.9061540","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061540","url":null,"abstract":"In this paper, a modulation scheme referred as spatial modulation based color-intensity shift keying (SM CISK) is proposed for visible light communication (VLC) systems. The proposed scheme amalgamates conventional color shift keying (CSK), pulse amplitude modulation (PAM), and SM together to efficiently exploit the degrees of freedom in the color, the intensity, and the spatial domains. It maintains a constant average transmit power to fulfill the non-flickering requirement for the normal illumination. The bit error rate (BER) of the proposed scheme is studied based on the maximal likelihood (ML) detection. Simulation results verify that the proposed scheme outperforms the joint color-and-spatial modulation (SM CSK) and CISK modulation scheme.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Analytical Visualization of Deep Web 深网分析可视化研究
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061283
WooHyun Park
Nowadays, there is a flood of data such as naked body photos and child pornography, which is making people bloodless. In addition, people also distribute drugs through unknown dark channels. In particular, most transactions are being made through the Deep Web, the dark path. “Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web” [4]. In other words, the Dark Web uses Tor's encryption client. Therefore, users can visit multiple sites on the dark Web, but not know the initiator of the site. In this paper, we propose the key idea based on the current status of such crimes and a crime information visual system for Deep Web has been developed. The status of deep web is analyzed and data is visualized using Java. It is expected that the program will help more efficient management and monitoring of crime in unkown web such as deep web, torrent etc.
现在,有大量的数据,如裸体照片和儿童色情,这让人无地自容。此外,人们还通过未知的黑暗渠道分销毒品。特别是,大多数交易都是通过暗网进行的。“深度网络是指谷歌等搜索引擎无法检测到的加密网络。用户必须使用Tor才能访问暗网上的网站”[4]。换句话说,暗网使用Tor的加密客户端。因此,用户可以访问暗网上的多个站点,但不知道该站点的发起者是谁。本文针对此类犯罪的现状,提出了一种基于深度网络的犯罪信息视觉系统的开发思路。分析了深网的现状,并利用Java实现了数据的可视化。预计该计划将有助于更有效地管理和监测犯罪在未知的网络,如深网,洪流等。
{"title":"A Study on Analytical Visualization of Deep Web","authors":"WooHyun Park","doi":"10.23919/ICACT48636.2020.9061283","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061283","url":null,"abstract":"Nowadays, there is a flood of data such as naked body photos and child pornography, which is making people bloodless. In addition, people also distribute drugs through unknown dark channels. In particular, most transactions are being made through the Deep Web, the dark path. “Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web” [4]. In other words, the Dark Web uses Tor's encryption client. Therefore, users can visit multiple sites on the dark Web, but not know the initiator of the site. In this paper, we propose the key idea based on the current status of such crimes and a crime information visual system for Deep Web has been developed. The status of deep web is analyzed and data is visualized using Java. It is expected that the program will help more efficient management and monitoring of crime in unkown web such as deep web, torrent etc.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133388874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Forensic Artifacts of Network Traffic on WeChat Calls 微信电话网络流量的取证文物
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061437
Da-Yu Kao, Ting-Chi Wang, Fuching Tsai
Voice over Internet Protocol (VoIP) applications, such as WeChat, Whatsapp, or LINE, have gained increasing popularity during the last few years. Packets analysis of VoIP is one of the critical criminal investigation strategies for law enforcement agencies (LEAs). Due to its convenience and multi-functionality, the WeChat application is accessible by a massive amount of people in Asia, especially in Taiwan and China. Therefore, this study uses Wireshark to reveal the tool marks behind the WeChat messages and voice calls. It will be an excellent help for LEAs to identify cybercriminals and bring them to justice.
互联网协议语音(VoIP)应用程序,如b微信、Whatsapp或LINE,在过去几年中越来越受欢迎。VoIP报文分析是执法机关侦查犯罪的重要手段之一。由于其便利性和多功能性,微信应用程序在亚洲,特别是在台湾和中国大陆被大量的人访问。因此,本研究使用Wireshark来揭示微信消息和语音呼叫背后的工具标记。对于LEAs识别网络罪犯并将其绳之以法,这将是一个极好的帮助。
{"title":"Forensic Artifacts of Network Traffic on WeChat Calls","authors":"Da-Yu Kao, Ting-Chi Wang, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061437","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061437","url":null,"abstract":"Voice over Internet Protocol (VoIP) applications, such as WeChat, Whatsapp, or LINE, have gained increasing popularity during the last few years. Packets analysis of VoIP is one of the critical criminal investigation strategies for law enforcement agencies (LEAs). Due to its convenience and multi-functionality, the WeChat application is accessible by a massive amount of people in Asia, especially in Taiwan and China. Therefore, this study uses Wireshark to reveal the tool marks behind the WeChat messages and voice calls. It will be an excellent help for LEAs to identify cybercriminals and bring them to justice.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis and Protection of Computer Network Security Issues 计算机网络安全问题分析与防护
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061266
Ju Jinquan, M. Al-Absi, A. Al-Absi, Hoon-Jae Lee
With the rapid development of information technology, the influence of network on human way of life is greatly enhanced, and network technology is rapidly popularized in all fields of society, which makes the security of computer network become an urgent problem to be solved. How to ensure the rapid and healthy development of the network has become the focus of attention of scholars, and has a very prominent realistic background and extremely important theoretical significance. In this paper, the research background of computer network security, the significance of this paper, the related research status at home and abroad and the research methods used in this paper are summarized. Then the theory of network security technology is advanced. This paper summarizes the connotation of network security, the research content of network security, the framework of network security information and the dynamic model of network security. In the third part, the problems of computer network security are analyzed, and the network security problems are studied from four aspects: network hardware, network software, network managers and network users, and the possible network security problems and their causes are analyzed. In the fourth part, the network security protection measures are put forward, and the security measures of hardware system, system security loophole, application software and manager are put forward respectively.
随着信息技术的飞速发展,网络对人类生活方式的影响大大增强,网络技术在社会各个领域迅速普及,这使得计算机网络的安全成为一个亟待解决的问题。如何保证网络的快速健康发展成为学者们关注的焦点,具有十分突出的现实背景和极其重要的理论意义。本文对计算机网络安全的研究背景、本文的研究意义、国内外相关研究现状以及本文所采用的研究方法进行了综述。然后提出了网络安全技术的理论。本文概述了网络安全的内涵、网络安全的研究内容、网络安全信息的框架和网络安全的动态模型。第三部分对计算机网络安全问题进行了分析,从网络硬件、网络软件、网络管理者和网络用户四个方面对网络安全问题进行了研究,分析了可能出现的网络安全问题及其原因。第四部分提出了网络安全防护措施,分别从硬件系统、系统安全漏洞、应用软件和管理员四个方面提出了安全防护措施。
{"title":"Analysis and Protection of Computer Network Security Issues","authors":"Ju Jinquan, M. Al-Absi, A. Al-Absi, Hoon-Jae Lee","doi":"10.23919/ICACT48636.2020.9061266","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061266","url":null,"abstract":"With the rapid development of information technology, the influence of network on human way of life is greatly enhanced, and network technology is rapidly popularized in all fields of society, which makes the security of computer network become an urgent problem to be solved. How to ensure the rapid and healthy development of the network has become the focus of attention of scholars, and has a very prominent realistic background and extremely important theoretical significance. In this paper, the research background of computer network security, the significance of this paper, the related research status at home and abroad and the research methods used in this paper are summarized. Then the theory of network security technology is advanced. This paper summarizes the connotation of network security, the research content of network security, the framework of network security information and the dynamic model of network security. In the third part, the problems of computer network security are analyzed, and the network security problems are studied from four aspects: network hardware, network software, network managers and network users, and the possible network security problems and their causes are analyzed. In the fourth part, the network security protection measures are put forward, and the security measures of hardware system, system security loophole, application software and manager are put forward respectively.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Scheduling for VANET Considering Renewable Energy 考虑可再生能源的VANET高效调度
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061360
A. Bondok, Wonseok Lee, Taejoon Kim
The realization of intelligent transportation systems requires the use of specific networks such as Vehicular Ad Hoc Networks (VANETs). VANETs are used to connect vehicles with each other and with fixed infrastructure Road Side Units (RSUs). In powering the RSUs, renewable energy is a great alternative to conventional electric grid. This paper proposes an efficient scheduling algorithm for serving vehicles in a green vehicular network with the aim to maximize the number of served vehicles while maintaining a sustainable energy level. We define and compute four metrics, for each vehicle, of a substantial impact on both the quality of service (QoS) and the power to be consumed. The proposed scheme outperforms other scheduler in terms of the percentage of served vehicles under different arrival rates, various values of average vehicle velocities, variable data size and varying the amount of harvested energy.
智能交通系统的实现需要使用特定的网络,如车辆自组织网络(VANETs)。vanet用于车辆之间以及与固定基础设施Road Side Units (rsu)之间的连接。在为rsu供电方面,可再生能源是传统电网的绝佳替代品。本文提出了一种高效的绿色车辆网络服务车辆调度算法,其目标是在保持可持续能量水平的同时使服务车辆数量最大化。我们为每辆车定义并计算了四个指标,这些指标对服务质量(QoS)和消耗的功率都有重大影响。该方案在不同到达率、不同平均车速值、不同数据大小和不同能量收集量下的服务车辆百分比方面优于其他调度程序。
{"title":"Efficient Scheduling for VANET Considering Renewable Energy","authors":"A. Bondok, Wonseok Lee, Taejoon Kim","doi":"10.23919/ICACT48636.2020.9061360","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061360","url":null,"abstract":"The realization of intelligent transportation systems requires the use of specific networks such as Vehicular Ad Hoc Networks (VANETs). VANETs are used to connect vehicles with each other and with fixed infrastructure Road Side Units (RSUs). In powering the RSUs, renewable energy is a great alternative to conventional electric grid. This paper proposes an efficient scheduling algorithm for serving vehicles in a green vehicular network with the aim to maximize the number of served vehicles while maintaining a sustainable energy level. We define and compute four metrics, for each vehicle, of a substantial impact on both the quality of service (QoS) and the power to be consumed. The proposed scheme outperforms other scheduler in terms of the percentage of served vehicles under different arrival rates, various values of average vehicle velocities, variable data size and varying the amount of harvested energy.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116586714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimation of Convolutional Interleaver in a Non-cooperative Context 非合作环境下卷积交织器的估计
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061439
Yoon-Ji Kim, Geunbae Kim, D. Yoon
In this paper, we propose the method for blind estimation of convolutional interleaver parameters in a noncooperative context by analysing repetitive patterns in interleaved sequences. Simulation results verify that proposed method could effectively estimate convolutional interleaver parameters in a noisy environment.
本文通过分析交错序列中的重复模式,提出了一种非合作环境下卷积交织器参数的盲估计方法。仿真结果验证了该方法在噪声环境下能够有效地估计卷积交织器参数。
{"title":"Estimation of Convolutional Interleaver in a Non-cooperative Context","authors":"Yoon-Ji Kim, Geunbae Kim, D. Yoon","doi":"10.23919/ICACT48636.2020.9061439","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061439","url":null,"abstract":"In this paper, we propose the method for blind estimation of convolutional interleaver parameters in a noncooperative context by analysing repetitive patterns in interleaved sequences. Simulation results verify that proposed method could effectively estimate convolutional interleaver parameters in a noisy environment.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Federated Learning on Malware Classification 联邦学习在恶意软件分类中的应用
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061261
Kuang-yao Lin, Wei-Ren Huang
In recent years, everything has been more and more systematic, and it would generate many cyber security issues. One of the most important of these is the malware. Modern malware has switched to a high-growth phase. According to the AV-TEST Institute showed that there are over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) be registered every day. This threat was presented and discussed in the present paper. In addition, we also considered data privacy by using federated learning. Feature extraction can be performed based on malware. The proposed method achieves very high accuracy (≈0.9167) on the dataset provided by VirusTotal.
近年来,一切都变得越来越系统化,这会产生很多网络安全问题。其中最重要的是恶意软件。现代恶意软件已进入高增长阶段。根据AV-TEST研究所显示,每天有超过350,000个新的恶意程序(恶意软件)和潜在不需要的应用程序(PUA)被注册。本文提出并讨论了这一威胁。此外,我们还通过使用联邦学习来考虑数据隐私。特征提取可以基于恶意软件执行。该方法在VirusTotal提供的数据集上达到了非常高的准确率(≈0.9167)。
{"title":"Using Federated Learning on Malware Classification","authors":"Kuang-yao Lin, Wei-Ren Huang","doi":"10.23919/ICACT48636.2020.9061261","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061261","url":null,"abstract":"In recent years, everything has been more and more systematic, and it would generate many cyber security issues. One of the most important of these is the malware. Modern malware has switched to a high-growth phase. According to the AV-TEST Institute showed that there are over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) be registered every day. This threat was presented and discussed in the present paper. In addition, we also considered data privacy by using federated learning. Feature extraction can be performed based on malware. The proposed method achieves very high accuracy (≈0.9167) on the dataset provided by VirusTotal.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
EyeNet: An Improved Eye States Classification System using Convolutional Neural Network 基于卷积神经网络的眼状态分类系统
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061472
Md. Moklesur Rahman, Md. Shafiqul Islam, Mir Kanon Ara Jannat, Md. Hafizur Rahman, Md. Arifuzzaman, R. Sassi, M. Aktaruzzaman
The classification of eye states (open or closed) has numerous potential applications such as fatigue detection, psychological state analysis, smart home devices controlling, etc. Due to its importance, there are a number of works already reported in the literature using traditional shallow neural networks or support vector machines, which have reported good accuracy (about 96%). However, there is still enough space to improve the accuracy of existing systems using proper classification methods. The major problem with traditional classifiers is that they depend on manual selection of features and that is very challenging to select meaningful features for such classifiers. Convolutional neural networks (CNNs) have become popular for computer vision and pattern recognition problems with better performance than traditional methods. In this study, we proposed a model of CNN (EyeNet) for eye states classification and tested it on three datasets (CEW, ZJU, and MRL Eye). The quality (or diversity) of a recently proposed larger dataset (MRL Eye) has been compared with two other existing datasets with respect to the sufficient training of the model. The model shows very high performance (about 99% accuracy for classification of eye states on the test set of data when it is trained by the training samples of the same dataset. The proposed model improves the accuracy of the best existing method by about 3%. The performance of the model for classification of samples coming from different datasets is reduced when it is trained with the MRL Eye dataset. This concludes that even though, the MRL Eye has a large number of samples compared to other datasets, but diversity still lacks in the MRL Eye samples to sufficiently train the model.
眼睛状态的分类(打开或关闭)有许多潜在的应用,如疲劳检测,心理状态分析,智能家居设备控制等。由于其重要性,文献中已经报道了许多使用传统浅层神经网络或支持向量机的工作,这些工作报告了良好的准确性(约96%)。然而,使用适当的分类方法来提高现有系统的准确性仍然有足够的空间。传统分类器的主要问题是它们依赖于人工选择特征,而为这样的分类器选择有意义的特征是非常具有挑战性的。卷积神经网络(cnn)在计算机视觉和模式识别问题中越来越受欢迎,其性能优于传统方法。在这项研究中,我们提出了一个CNN (EyeNet)模型用于眼状态分类,并在三个数据集(CEW, ZJU和MRL eye)上进行了测试。最近提出的一个更大的数据集(MRL Eye)的质量(或多样性)与其他两个现有数据集在模型的充分训练方面进行了比较。当使用同一数据集的训练样本进行训练时,该模型在测试数据集上显示出非常高的性能(约99%的准确率)。该模型将现有最佳方法的精度提高了约3%。当使用MRL Eye数据集进行训练时,模型对来自不同数据集的样本进行分类的性能降低。由此得出结论,尽管与其他数据集相比,MRL Eye拥有大量的样本,但MRL Eye样本的多样性仍然不足,无法充分训练模型。
{"title":"EyeNet: An Improved Eye States Classification System using Convolutional Neural Network","authors":"Md. Moklesur Rahman, Md. Shafiqul Islam, Mir Kanon Ara Jannat, Md. Hafizur Rahman, Md. Arifuzzaman, R. Sassi, M. Aktaruzzaman","doi":"10.23919/ICACT48636.2020.9061472","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061472","url":null,"abstract":"The classification of eye states (open or closed) has numerous potential applications such as fatigue detection, psychological state analysis, smart home devices controlling, etc. Due to its importance, there are a number of works already reported in the literature using traditional shallow neural networks or support vector machines, which have reported good accuracy (about 96%). However, there is still enough space to improve the accuracy of existing systems using proper classification methods. The major problem with traditional classifiers is that they depend on manual selection of features and that is very challenging to select meaningful features for such classifiers. Convolutional neural networks (CNNs) have become popular for computer vision and pattern recognition problems with better performance than traditional methods. In this study, we proposed a model of CNN (EyeNet) for eye states classification and tested it on three datasets (CEW, ZJU, and MRL Eye). The quality (or diversity) of a recently proposed larger dataset (MRL Eye) has been compared with two other existing datasets with respect to the sufficient training of the model. The model shows very high performance (about 99% accuracy for classification of eye states on the test set of data when it is trained by the training samples of the same dataset. The proposed model improves the accuracy of the best existing method by about 3%. The performance of the model for classification of samples coming from different datasets is reduced when it is trained with the MRL Eye dataset. This concludes that even though, the MRL Eye has a large number of samples compared to other datasets, but diversity still lacks in the MRL Eye samples to sufficiently train the model.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Adapting distributed stream processing technologies for the automation of modern health care systems 采用分布式流处理技术实现现代医疗保健系统的自动化
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061429
R. Khiati, Muhammed Hanif, Choonhwa Lee
With the increase in population, there is an increasing number of patients. Subsequently, we also see an increase in the amount of patient data that needs to be processed, further emphasizing the need for new systems and developments that can handle such large quantities of big data. To this end, this paper proposed a potential solution to this problem in the form of a system that can analyze a patient's data in real-time, providing doctors and other intended healthcare personnel with an immediate report of a patient's situation, allowing for a quicker response time, better treatment, and the first step towards a grand realized smart hospital system in the long-term. This system, aided by the rapid analysis of Apache Flink, produces the requested data to the doctor as intended, enabling for a swift response time to patient issues, thus highlighting a unique approach to the field, a contrast to other previous research in this field where there is a lack of said provisions.
随着人口的增加,病人也越来越多。随后,我们也看到需要处理的患者数据量在增加,这进一步强调了对能够处理如此大量大数据的新系统和开发的需求。为此,本文提出了一个潜在的解决方案,通过一个系统的形式,可以实时分析患者的数据,为医生和其他预期的医疗人员提供患者情况的即时报告,允许更快的响应时间,更好的治疗,从长远来看,这是实现大智能医院系统的第一步。该系统在Apache Flink的快速分析的帮助下,按预期向医生提供所需的数据,从而能够快速响应患者的问题,从而突出了该领域的独特方法,与该领域先前缺乏上述规定的其他研究形成对比。
{"title":"Adapting distributed stream processing technologies for the automation of modern health care systems","authors":"R. Khiati, Muhammed Hanif, Choonhwa Lee","doi":"10.23919/ICACT48636.2020.9061429","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061429","url":null,"abstract":"With the increase in population, there is an increasing number of patients. Subsequently, we also see an increase in the amount of patient data that needs to be processed, further emphasizing the need for new systems and developments that can handle such large quantities of big data. To this end, this paper proposed a potential solution to this problem in the form of a system that can analyze a patient's data in real-time, providing doctors and other intended healthcare personnel with an immediate report of a patient's situation, allowing for a quicker response time, better treatment, and the first step towards a grand realized smart hospital system in the long-term. This system, aided by the rapid analysis of Apache Flink, produces the requested data to the doctor as intended, enabling for a swift response time to patient issues, thus highlighting a unique approach to the field, a contrast to other previous research in this field where there is a lack of said provisions.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126210481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 22nd International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1