首页 > 最新文献

2020 22nd International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Connectivity of Wireless Multi-hop Stochastic Networks under the Security Constraints in Rayleigh Fading Environment 瑞利衰落环境下安全约束下无线多跳随机网络的连通性
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061415
L. Dung, Hoa T. K. Tran, S. Choi
In this paper, we investigate the probability of existing a secure wireless multi-hop connection between two legitimate users in stochastic wireless networks under the existence of colluding eavesdroppers. Specifically, we introduce a simulation-based analysis that returns the path connectivity by averaging the connection status of a vast number of topology trails with a security-aware routing algorithm is taken into account. The behaviors of the multi-hop connectivity are examined for different network sizes and the numbers of legitimate users and eavesdroppers. The obtained results in this paper show that increasing the number of legitimate users leads to maximum path connectivity of less than one; meanwhile, path connectivity is continuously reduced as the number of eavesdroppers gets higher. Moreover, scaling down the network size does not always help to increase path connectivity.
本文研究了随机无线网络中存在串通窃听者的情况下,两个合法用户之间存在安全无线多跳连接的概率。具体来说,我们引入了一种基于模拟的分析,该分析通过平均大量拓扑路径的连接状态来返回路径连通性,并考虑了安全感知路由算法。研究了不同网络规模、合法用户和窃听者数量下的多跳连接行为。所得结果表明:增加合法用户数量导致最大路径连通性小于1;同时,随着窃听者数量的增加,路径连通性不断降低。此外,缩小网络大小并不总是有助于增加路径连接。
{"title":"Connectivity of Wireless Multi-hop Stochastic Networks under the Security Constraints in Rayleigh Fading Environment","authors":"L. Dung, Hoa T. K. Tran, S. Choi","doi":"10.23919/ICACT48636.2020.9061415","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061415","url":null,"abstract":"In this paper, we investigate the probability of existing a secure wireless multi-hop connection between two legitimate users in stochastic wireless networks under the existence of colluding eavesdroppers. Specifically, we introduce a simulation-based analysis that returns the path connectivity by averaging the connection status of a vast number of topology trails with a security-aware routing algorithm is taken into account. The behaviors of the multi-hop connectivity are examined for different network sizes and the numbers of legitimate users and eavesdroppers. The obtained results in this paper show that increasing the number of legitimate users leads to maximum path connectivity of less than one; meanwhile, path connectivity is continuously reduced as the number of eavesdroppers gets higher. Moreover, scaling down the network size does not always help to increase path connectivity.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Family Classification using Active Learning by Learning 基于主动学习的恶意软件分类
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061419
Chin-Wei Chen, Ching-Hung Su, Kun-Wei Lee, Ping-Hao Bair
In the past few years, the malware industry has been thriving. Malware variants among the same malware family shared similar behavioural patterns or signatures reflecting their purpose. We propose an approach that combines support vector machine (SVM) classifiers and active learning by learning (ALBL) techniques to deal with insufficient labeled data in terms of the malware classification tasks. The proposed approach is evaluated with the malware family dataset from Microsoft Malware Classification Challenge (BIG 2015) on Kaggle. The results show that ALBL techniques can effectively boost the performance of our machine learning models and improve the quality of labeled samples.
在过去的几年里,恶意软件行业一直在蓬勃发展。同一恶意软件家族中的恶意软件变体具有相似的行为模式或特征,反映了其目的。我们提出了一种结合支持向量机(SVM)分类器和主动学习(ALBL)技术的方法来处理恶意软件分类任务中标记数据不足的问题。利用Kaggle上的Microsoft恶意软件分类挑战(BIG 2015)的恶意软件家族数据集对所提出的方法进行了评估。结果表明,ALBL技术可以有效地提高机器学习模型的性能,提高标记样本的质量。
{"title":"Malware Family Classification using Active Learning by Learning","authors":"Chin-Wei Chen, Ching-Hung Su, Kun-Wei Lee, Ping-Hao Bair","doi":"10.23919/ICACT48636.2020.9061419","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061419","url":null,"abstract":"In the past few years, the malware industry has been thriving. Malware variants among the same malware family shared similar behavioural patterns or signatures reflecting their purpose. We propose an approach that combines support vector machine (SVM) classifiers and active learning by learning (ALBL) techniques to deal with insufficient labeled data in terms of the malware classification tasks. The proposed approach is evaluated with the malware family dataset from Microsoft Malware Classification Challenge (BIG 2015) on Kaggle. The results show that ALBL techniques can effectively boost the performance of our machine learning models and improve the quality of labeled samples.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115998967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes 了解台湾ATM劫案:从网路攻击阶段到调查过程
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061354
Da-Yu Kao
Cybercriminals increasingly use sophisticated tools and advanced methods to attack bank systems. Cyber black markets for hacking tools or services are gaining widespread attention as more advanced persistent threat attacks are relevant to such markets. The recent cyber-attacks on banks or financial institutions have increased the technical expertise of cybercriminals. This study reviews ATM threats and highlights the cybercrime investigation of ATM heist. An incident investigation strategy from ISO/IEC 27043:2015 is proposed to embed cyber-attack phases and detect ATM heist. It demonstrates how this strategy can provide investigators with exceptional abilities to interpret evidence. By integrating an effective cybercrime investigation strategy, investigators can minimize the cost of collecting evidence in a forensically sound manner.
网络犯罪分子越来越多地使用复杂的工具和先进的方法来攻击银行系统。黑客工具或服务的网络黑市正受到广泛关注,因为更先进的持续威胁攻击与这些市场有关。最近对银行或金融机构的网络攻击增加了网络罪犯的技术专长。本文回顾了自动取款机的威胁,重点介绍了自动取款机抢劫的网络犯罪调查。提出了ISO/IEC 27043:2015中的事件调查策略,以嵌入网络攻击阶段并检测ATM抢劫。它展示了这种策略如何为调查人员提供解释证据的特殊能力。通过整合有效的网络犯罪调查策略,调查人员可以以法医可靠的方式将收集证据的成本降至最低。
{"title":"Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes","authors":"Da-Yu Kao","doi":"10.23919/ICACT48636.2020.9061354","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061354","url":null,"abstract":"Cybercriminals increasingly use sophisticated tools and advanced methods to attack bank systems. Cyber black markets for hacking tools or services are gaining widespread attention as more advanced persistent threat attacks are relevant to such markets. The recent cyber-attacks on banks or financial institutions have increased the technical expertise of cybercriminals. This study reviews ATM threats and highlights the cybercrime investigation of ATM heist. An incident investigation strategy from ISO/IEC 27043:2015 is proposed to embed cyber-attack phases and detect ATM heist. It demonstrates how this strategy can provide investigators with exceptional abilities to interpret evidence. By integrating an effective cybercrime investigation strategy, investigators can minimize the cost of collecting evidence in a forensically sound manner.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"36 45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Effectiveness of Notations for Designing Security Aspects 评估符号在设计安全方面的有效性
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061305
S. Muneer, Muhammad Nadeem, B. Kasi, Mir Hamayoun Yousaf
Existing software design approaches used to design security aspects lack notations that can be used to design the security requirements of a system which may result in more complex and dense designs. However, literature review has shown that there are some proposed notations to represent security aspects within a system. Other researchers have proposed evidence-based principles that provide basis for constructing Visual Notations in Software Engineering. The principles include: Graphic Economy, Perceptual Discriminability, Semiotic Clarity, Cognitive Integration, Visual Expressiveness etc. In this research, we have evaluated a set of proposed notations in accordance with principles for designing cognitively accepted graphics by conducting a human subject study. A questionnaire was distributed among a group of graduate and post-graduate students. The goal was to validate the notations based on theory of “How Visual Notations Communicate?”. This study will help researchers in developing cognitively accepted notations and set a course for designing new notations for UMLsec that are perceptually, semantically and visually expressive.
用于设计安全方面的现有软件设计方法缺乏可用于设计系统安全需求的符号,这可能导致更复杂和密集的设计。然而,文献综述表明,有一些建议的符号来表示系统中的安全方面。其他研究人员提出了基于证据的原则,为构建软件工程中的可视化符号提供了基础。这些原则包括:图形经济、感知可分辨性、符号清晰性、认知整合性、视觉表现力等。在这项研究中,我们根据设计认知上可接受的图形的原则,通过进行人类受试者研究,评估了一组拟议的符号。在一组研究生和研究生中分发了一份调查问卷。我们的目标是验证基于“视觉符号如何交流?”理论的符号。本研究将有助于研究人员开发认知上可接受的符号,并为设计具有感知、语义和视觉表现力的UMLsec新符号奠定基础。
{"title":"Evaluating the Effectiveness of Notations for Designing Security Aspects","authors":"S. Muneer, Muhammad Nadeem, B. Kasi, Mir Hamayoun Yousaf","doi":"10.23919/ICACT48636.2020.9061305","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061305","url":null,"abstract":"Existing software design approaches used to design security aspects lack notations that can be used to design the security requirements of a system which may result in more complex and dense designs. However, literature review has shown that there are some proposed notations to represent security aspects within a system. Other researchers have proposed evidence-based principles that provide basis for constructing Visual Notations in Software Engineering. The principles include: Graphic Economy, Perceptual Discriminability, Semiotic Clarity, Cognitive Integration, Visual Expressiveness etc. In this research, we have evaluated a set of proposed notations in accordance with principles for designing cognitively accepted graphics by conducting a human subject study. A questionnaire was distributed among a group of graduate and post-graduate students. The goal was to validate the notations based on theory of “How Visual Notations Communicate?”. This study will help researchers in developing cognitively accepted notations and set a course for designing new notations for UMLsec that are perceptually, semantically and visually expressive.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Process-aware Event Log Datacubes for Workflow Process and Knowledge Mining, Predicting and Analyzing Frameworks 面向工作流过程和知识挖掘、预测和分析框架的过程感知事件日志数据库
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061449
Seong-Hun Ham, Dihn-Lam Pham, Kyoungsook Kim, Kwanghoon Pio Kim
The issue of workflow process mining and analytics is beginning to make its appearance in the workflow-supported enterprise intelligence and systems literature. In order to improve the quality of workflow process intelligence, it is essential for an efficient and effective data center storing workflow enactment event logs to be provisioned in carrying out the workflow process mining and analytics. In this paper, we propose a three-dimensional datacube, which is named as a process-aware dat-acube, for organizing workflow-supported enterprise data centers to efficiently as well as effectively store the workflow process enactment event logs in the IEEE XES format, and also we carry out an experimental process mining and analytics to show how much perfectly the process-aware datacubes are suitable for discovering workflow process patterns and its analytical knowledge, like enacted proportions and enacted work transferences, from the workflow process enactment event histories. From the process-aware datacubes, the workflow process mining must be able to properly discover all the workflow process patterns based upon the four types of control-flow primitives such as linear (sequential) routing, disjunctive (selective) routing, conjunctive (parallel) routing, and iterative (loop) routing patterns, whereas the workflow process analytics is to discover the enacted pro-protions of each of the process pattherns and the enacted work transferences of each of the workflow performers.
工作流过程挖掘和分析的问题开始在工作流支持的企业智能和系统文献中出现。为了提高工作流过程智能的质量,在进行工作流过程挖掘和分析时,必须提供一个高效、有效的数据中心来存储工作流制定事件日志。本文提出了一个三维数据立方体,称为过程感知数据立方体,用于组织支持工作流的企业数据中心,并以IEEE XES格式有效地存储工作流过程制定事件日志,并进行了过程挖掘和分析实验,以证明过程感知数据立方体非常适合发现工作流过程模式及其分析知识。像制定比例和制定工作转移一样,从工作流过程中制定事件历史。工作流过程挖掘必须能够从过程感知的数据库中,基于四种控制流原语,即线性(顺序)路由、析取(选择)路由、合取(并行)路由和迭代(循环)路由模式,正确地发现所有的工作流过程模式。而工作流过程分析则是发现每个过程模式的既定比例和每个工作流执行者的既定工作转移。
{"title":"Process-aware Event Log Datacubes for Workflow Process and Knowledge Mining, Predicting and Analyzing Frameworks","authors":"Seong-Hun Ham, Dihn-Lam Pham, Kyoungsook Kim, Kwanghoon Pio Kim","doi":"10.23919/ICACT48636.2020.9061449","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061449","url":null,"abstract":"The issue of workflow process mining and analytics is beginning to make its appearance in the workflow-supported enterprise intelligence and systems literature. In order to improve the quality of workflow process intelligence, it is essential for an efficient and effective data center storing workflow enactment event logs to be provisioned in carrying out the workflow process mining and analytics. In this paper, we propose a three-dimensional datacube, which is named as a process-aware dat-acube, for organizing workflow-supported enterprise data centers to efficiently as well as effectively store the workflow process enactment event logs in the IEEE XES format, and also we carry out an experimental process mining and analytics to show how much perfectly the process-aware datacubes are suitable for discovering workflow process patterns and its analytical knowledge, like enacted proportions and enacted work transferences, from the workflow process enactment event histories. From the process-aware datacubes, the workflow process mining must be able to properly discover all the workflow process patterns based upon the four types of control-flow primitives such as linear (sequential) routing, disjunctive (selective) routing, conjunctive (parallel) routing, and iterative (loop) routing patterns, whereas the workflow process analytics is to discover the enacted pro-protions of each of the process pattherns and the enacted work transferences of each of the workflow performers.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study for Image Expression of Emergency Alert 紧急警报图像表达的研究
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061478
Yoonkwan Byun, Hyunji Lee, Sek-Jin Jang, S. Choi, Seung-hee Oh, Yong-Tae Lee
Emergency alert message is effective way to send text information for public alert service in disaster situation. But the textual information has limitations to make people understand. In this paper, we suggest a method to expression image on cell phone device.
紧急警报短信是灾害情况下公共警报服务的有效文本信息发送方式。但是文本信息对人们的理解有一定的局限性。本文提出了一种在手机设备上表达图像的方法。
{"title":"A Study for Image Expression of Emergency Alert","authors":"Yoonkwan Byun, Hyunji Lee, Sek-Jin Jang, S. Choi, Seung-hee Oh, Yong-Tae Lee","doi":"10.23919/ICACT48636.2020.9061478","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061478","url":null,"abstract":"Emergency alert message is effective way to send text information for public alert service in disaster situation. But the textual information has limitations to make people understand. In this paper, we suggest a method to expression image on cell phone device.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and Simulation of Multicast IPTV and VoD Streams for a Multiservice IP Network 多业务IP网络中多播IPTV和VoD流的建模与仿真
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061262
M. Barry, J. K. Tamgno, C. Lishou, Ismaël Habou Dere
This thesis work concerns the modelling and simulation of IPTV and VoD streams in an IP/MPLS network. Video traffic and their protocols are studied. We started from the M/G/∞ model which allowed us to have images (I, B and P). These are the images that were used during the modeling process. Indeed, this model allows to characterize a video sequence by the following parameters: Slot or time to generate a packet; image level or GOP. Image size or GOP distribution: Mixing distribution. Type of correlation: Markov, short-term dependence or long-term dependence. The protocols involved are: MPEG-TS; UDP; RTP; RTSP; IP; IGMPv2; MPLS. In order to find a packet output model, we created a “modeler” in a python environment to estimate multicast and VoD traffic. We have created four (4) functions to materialize this modeling: “Packer”, TS, Sequencer and Transport. The results collected allowed us to determine the law and mathematical model of packet output. And it is the M/M/∞ model that models a video source. We used the RStudio software for this purpose. All these theoretical results could be compared during the simulation of the IPTV and VoD servers.
本文主要研究IP/MPLS网络中IPTV和VoD流的建模与仿真。对视频流量及其协议进行了研究。我们从M/G/∞模型开始,它允许我们有图像(I, B和P)。这些是在建模过程中使用的图像。实际上,该模型允许通过以下参数来表征视频序列:生成数据包的槽或时间;图像级别或GOP。图像大小或GOP分布:混合分布。相关类型:马尔可夫、短期依赖或长期依赖。涉及的协议有:MPEG-TS;UDP;RTP;RTSP;知识产权;IGMPv2;MPLS。为了找到一个数据包输出模型,我们在python环境中创建了一个“建模器”来估计多播和点播流量。我们已经创建了四(4)个函数来实现这个建模:“Packer”,TS, Sequencer和Transport。收集的结果使我们能够确定包输出的规律和数学模型。对视频源进行建模的是M/M/∞模型。为此,我们使用了RStudio软件。这些理论结果可以在IPTV和VoD服务器的仿真中进行比较。
{"title":"Modeling and Simulation of Multicast IPTV and VoD Streams for a Multiservice IP Network","authors":"M. Barry, J. K. Tamgno, C. Lishou, Ismaël Habou Dere","doi":"10.23919/ICACT48636.2020.9061262","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061262","url":null,"abstract":"This thesis work concerns the modelling and simulation of IPTV and VoD streams in an IP/MPLS network. Video traffic and their protocols are studied. We started from the M/G/∞ model which allowed us to have images (I, B and P). These are the images that were used during the modeling process. Indeed, this model allows to characterize a video sequence by the following parameters: Slot or time to generate a packet; image level or GOP. Image size or GOP distribution: Mixing distribution. Type of correlation: Markov, short-term dependence or long-term dependence. The protocols involved are: MPEG-TS; UDP; RTP; RTSP; IP; IGMPv2; MPLS. In order to find a packet output model, we created a “modeler” in a python environment to estimate multicast and VoD traffic. We have created four (4) functions to materialize this modeling: “Packer”, TS, Sequencer and Transport. The results collected allowed us to determine the law and mathematical model of packet output. And it is the M/M/∞ model that models a video source. We used the RStudio software for this purpose. All these theoretical results could be compared during the simulation of the IPTV and VoD servers.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Composition of Image-Based Ship-type/class Identification System 基于图像的船型/船级识别系统组成研究
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061395
Ji Won Lee, Do-Won Nam, Jungsoo Lee, S. Moon, Arum Oh, Wonyoung Yoo
Ships, coastal posts, and control centers need to verify the information, location, and speed of nearby vessels for various purposes, such as traffic control or maritime warfare. In the field of defense where accurate information on nearby ships is important, radar is used to acquire location information on nearby ships. However, the selection of the opponent's position as well as the high-value units must be more important and prioritized, and image-based warship type/class identification techniques are required in naval warfare. This paper presents a detailed method for system construction that supports detailed identification of warship type/class through structural analysis. Through the development of the proposed system, reliable warship identification can be used for tactical applications in the defense field, thereby contributing to the enhancement of defense capabilities.
船舶、海岸哨所和控制中心需要核实附近船只的信息、位置和速度,用于各种目的,如交通管制或海上作战。在对近舰信息要求较高的防御领域,雷达主要用于获取近舰位置信息。然而,对手位置和高价值单位的选择必须更加重要和优先,并且在海战中需要基于图像的军舰类型/级别识别技术。本文提出了一种详细的系统构建方法,支持通过结构分析对舰船类型/级别进行详细识别。通过该系统的发展,可靠的舰船识别可用于防御领域的战术应用,从而有助于增强防御能力。
{"title":"A Study on the Composition of Image-Based Ship-type/class Identification System","authors":"Ji Won Lee, Do-Won Nam, Jungsoo Lee, S. Moon, Arum Oh, Wonyoung Yoo","doi":"10.23919/ICACT48636.2020.9061395","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061395","url":null,"abstract":"Ships, coastal posts, and control centers need to verify the information, location, and speed of nearby vessels for various purposes, such as traffic control or maritime warfare. In the field of defense where accurate information on nearby ships is important, radar is used to acquire location information on nearby ships. However, the selection of the opponent's position as well as the high-value units must be more important and prioritized, and image-based warship type/class identification techniques are required in naval warfare. This paper presents a detailed method for system construction that supports detailed identification of warship type/class through structural analysis. Through the development of the proposed system, reliable warship identification can be used for tactical applications in the defense field, thereby contributing to the enhancement of defense capabilities.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"4 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Service model of the Agriculture Information based Convergence Service 基于农业信息融合服务的服务模式研究
Pub Date : 2020-02-01 DOI: 10.23919/icact48636.2020.9061288
Heechang Chung, Dongil Kim, Kyoung-Sook Jung, Byeong-Beom Kang, SokPal Cho, Soonghee Lee
Agricultural data is the key foundation for Smart Farm models, in which a wide range of Information and Communication Technology (ICT) such as IoT and Big Data are converged, to be operated and managed. Given the fact that every single stage in Smart Farm models from crop growing to selling requires appropriate data, it is crucial to have a well-established service model for data collection and its provision. This service model should gather and process data before providing it for users to enhance their convenience in farm business. By converging various data collected from each stage of production, the model should ensure higher quality of service. This paper describes the reference architecture of the service model.
农业数据是智能农场模式的关键基础,其中融合了物联网和大数据等广泛的信息和通信技术(ICT),进行运营和管理。鉴于智能农场模式从作物种植到销售的每一个阶段都需要适当的数据,因此建立一个完善的数据收集和提供服务模型至关重要。该服务模式在提供给用户之前,需要对数据进行收集和处理,以提高用户在农场经营中的便利性。通过融合从每个生产阶段收集的各种数据,该模型应该确保更高的服务质量。本文描述了服务模型的参考体系结构。
{"title":"Study on Service model of the Agriculture Information based Convergence Service","authors":"Heechang Chung, Dongil Kim, Kyoung-Sook Jung, Byeong-Beom Kang, SokPal Cho, Soonghee Lee","doi":"10.23919/icact48636.2020.9061288","DOIUrl":"https://doi.org/10.23919/icact48636.2020.9061288","url":null,"abstract":"Agricultural data is the key foundation for Smart Farm models, in which a wide range of Information and Communication Technology (ICT) such as IoT and Big Data are converged, to be operated and managed. Given the fact that every single stage in Smart Farm models from crop growing to selling requires appropriate data, it is crucial to have a well-established service model for data collection and its provision. This service model should gather and process data before providing it for users to enhance their convenience in farm business. By converging various data collected from each stage of production, the model should ensure higher quality of service. This paper describes the reference architecture of the service model.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parkinson's Disease Detection from Spiral and Wave Drawings using Convolutional Neural Networks: A Multistage Classifier Approach 利用卷积神经网络从螺旋图和波浪图中检测帕金森病:一种多阶段分类器方法
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061497
Sabyasachi Chakraborty, S. Aich, J. Sim, Eunyoung Han, Jinse Park, Hee-Cheol Kim
Identification of the correct biomarkers with respect to particular health issues and detection of the same is of paramount importance for the development of clinical decision support systems. For the patients suffering from Parkinson's Disease (PD), it has been duly observed that impairment in the handwriting is directly proportional to the severity of the disease. Also, the speed and pressure applied to the pen while sketching or writing something are also much lower in patients suffering from Parkinson's disease. Therefore, correctly identifying such biomarkers accurately and precisely at the onset of the disease will lead to a better clinical diagnosis. Therefore, in this paper, a system design is proposed for analyzing Spiral drawing patterns and wave drawing patterns in patients suffering from Parkinson's disease and healthy subjects. The system developed in the study leverages two different convolutional neural networks (CNN), for analyzing the drawing patters of both spiral and wave sketches respectively. Further, the prediction probabilities are trained on a metal classifier based on ensemble voting to provide a weighted prediction from both the spiral and wave sketch. The complete model was trained on the data of 55 patients and has achieved an overall accuracy of 93.3%, average recall of 94%, average precision of 93.5% and average f1 score of 93.94%
识别与特定健康问题相关的正确生物标志物,并对其进行检测,对于临床决策支持系统的发展至关重要。对于患有帕金森氏症(PD)的患者来说,人们已经适当地观察到,笔迹的损害与疾病的严重程度成正比。此外,帕金森氏症患者在素描或写字时用笔的速度和压力也要低得多。因此,在疾病开始时准确准确地识别这些生物标志物将有助于更好的临床诊断。因此,本文提出了一种分析帕金森病患者和健康人的螺旋图和波浪图的系统设计。该研究中开发的系统利用了两种不同的卷积神经网络(CNN),分别用于分析螺旋草图和波浪草图的绘制模式。此外,在基于集合投票的金属分类器上训练预测概率,从螺旋草图和波浪草图中提供加权预测。完整的模型在55例患者的数据上进行训练,总体准确率为93.3%,平均查全率为94%,平均查准率为93.5%,平均f1分数为93.94%
{"title":"Parkinson's Disease Detection from Spiral and Wave Drawings using Convolutional Neural Networks: A Multistage Classifier Approach","authors":"Sabyasachi Chakraborty, S. Aich, J. Sim, Eunyoung Han, Jinse Park, Hee-Cheol Kim","doi":"10.23919/ICACT48636.2020.9061497","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061497","url":null,"abstract":"Identification of the correct biomarkers with respect to particular health issues and detection of the same is of paramount importance for the development of clinical decision support systems. For the patients suffering from Parkinson's Disease (PD), it has been duly observed that impairment in the handwriting is directly proportional to the severity of the disease. Also, the speed and pressure applied to the pen while sketching or writing something are also much lower in patients suffering from Parkinson's disease. Therefore, correctly identifying such biomarkers accurately and precisely at the onset of the disease will lead to a better clinical diagnosis. Therefore, in this paper, a system design is proposed for analyzing Spiral drawing patterns and wave drawing patterns in patients suffering from Parkinson's disease and healthy subjects. The system developed in the study leverages two different convolutional neural networks (CNN), for analyzing the drawing patters of both spiral and wave sketches respectively. Further, the prediction probabilities are trained on a metal classifier based on ensemble voting to provide a weighted prediction from both the spiral and wave sketch. The complete model was trained on the data of 55 patients and has achieved an overall accuracy of 93.3%, average recall of 94%, average precision of 93.5% and average f1 score of 93.94%","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
2020 22nd International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1