Pub Date : 2023-02-18DOI: 10.5121/csit.2023.130304
Boping Ding, Xiang Yu
With the development of UAV technology, using UAV as a base station in the air can quickly restore vehicle communications after disasters. In order to reduce the delay and maximize the rational use of bandwidth and power, this paper applies TDMA technology to UAV communication network, and proposes a joint optimization allocation strategy of bandwidth and power. First of all, a deep learning network needs to be trained. The use of deep learning can improve the accuracy of prediction. The reward mechanism is set through the change of delay. The purpose of training is to enable the UAV to choose the optimal bandwidth allocation coefficient under the dynamic change of the environment. Then, a joint optimization strategy is proposed to set the SNR threshold to ensure the communication quality. The user's transmission rate is calculated according to the Shannon formula, Finally, the scheme with minimum delay is selected as the final bandwidth and power allocation value. In the simulation experiment, compared with the previous traditional algorithm, the network performance has been further improved in terms of reducing delay and energy consumption, and what needs to be improved may be the problem of computation.
{"title":"UAV as Auxiliary Base Station uses Deep Learning to Conduct Research on Network Resource Allocation","authors":"Boping Ding, Xiang Yu","doi":"10.5121/csit.2023.130304","DOIUrl":"https://doi.org/10.5121/csit.2023.130304","url":null,"abstract":"With the development of UAV technology, using UAV as a base station in the air can quickly restore vehicle communications after disasters. In order to reduce the delay and maximize the rational use of bandwidth and power, this paper applies TDMA technology to UAV communication network, and proposes a joint optimization allocation strategy of bandwidth and power. First of all, a deep learning network needs to be trained. The use of deep learning can improve the accuracy of prediction. The reward mechanism is set through the change of delay. The purpose of training is to enable the UAV to choose the optimal bandwidth allocation coefficient under the dynamic change of the environment. Then, a joint optimization strategy is proposed to set the SNR threshold to ensure the communication quality. The user's transmission rate is calculated according to the Shannon formula, Finally, the scheme with minimum delay is selected as the final bandwidth and power allocation value. In the simulation experiment, compared with the previous traditional algorithm, the network performance has been further improved in terms of reducing delay and energy consumption, and what needs to be improved may be the problem of computation.","PeriodicalId":299543,"journal":{"name":"Natural Language Processing, Information Retrieval and AI","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.5121/csit.2023.130308
Luiza Nacshon, Anna Sandler
The goal of this research is to explore the security aspects of the hybrid Cloud Channel API world in greater depth and develop a rapid penetration testing tool that will help security researchers test Cloud Channel API security more effectively. The research proposes an innovative proxy-based solution for a rapid reactive test implementing a dynamic defence for channel API in the hybrid cloud. The proxy-based solution executes security testing rules against the channel API requests and validates weaknesses or vulnerabilities as a dynamic defence. Malicious or vulnerable requests may be denied/dropped/alerted, the results and decisions will be reflected in the APImanagement dashboard. In the scope of the paper we focus on known API attacks and in the future work we are going to have a machine learning algorithm for unknown and new channel API attacks.
{"title":"Rapid Penetration Test for Securing Channel APIs in Hybrid Cloud (Dynamic Defense of Channel API)","authors":"Luiza Nacshon, Anna Sandler","doi":"10.5121/csit.2023.130308","DOIUrl":"https://doi.org/10.5121/csit.2023.130308","url":null,"abstract":"The goal of this research is to explore the security aspects of the hybrid Cloud Channel API world in greater depth and develop a rapid penetration testing tool that will help security researchers test Cloud Channel API security more effectively. The research proposes an innovative proxy-based solution for a rapid reactive test implementing a dynamic defence for channel API in the hybrid cloud. The proxy-based solution executes security testing rules against the channel API requests and validates weaknesses or vulnerabilities as a dynamic defence. Malicious or vulnerable requests may be denied/dropped/alerted, the results and decisions will be reflected in the APImanagement dashboard. In the scope of the paper we focus on known API attacks and in the future work we are going to have a machine learning algorithm for unknown and new channel API attacks.","PeriodicalId":299543,"journal":{"name":"Natural Language Processing, Information Retrieval and AI","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128033304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.5121/csit.2023.130301
V. Bellandi, S. Siccardi
This paper proposes a conceptual structure for a repository of entities that can be found by usual procedures of Natural Language Processing, that is the search for entities mentioned in text, their identification, possibly through the link to entries in Background Knowledge Basis (BKG) and theconstruction of a Knowledge Basis or Graph to host the information found in this process. We address applications where a BKG is of little help, because the involved entities are not so relevant to be included in any, being for instance ordinary people or small companies. Therefore, we rely on the entities’ attributes and relationships for unique identification, disambiguation, knowledge checking and any other relevant operation. One of the final goals achieved by the proposed method is the ability to merge knowledge collected in separate bases, once they are referred to the same Entity Registry.
{"title":"An Entity Registry: A Model for a Repository of Entities Found in a Document Set","authors":"V. Bellandi, S. Siccardi","doi":"10.5121/csit.2023.130301","DOIUrl":"https://doi.org/10.5121/csit.2023.130301","url":null,"abstract":"This paper proposes a conceptual structure for a repository of entities that can be found by usual procedures of Natural Language Processing, that is the search for entities mentioned in text, their identification, possibly through the link to entries in Background Knowledge Basis (BKG) and theconstruction of a Knowledge Basis or Graph to host the information found in this process. We address applications where a BKG is of little help, because the involved entities are not so relevant to be included in any, being for instance ordinary people or small companies. Therefore, we rely on the entities’ attributes and relationships for unique identification, disambiguation, knowledge checking and any other relevant operation. One of the final goals achieved by the proposed method is the ability to merge knowledge collected in separate bases, once they are referred to the same Entity Registry.","PeriodicalId":299543,"journal":{"name":"Natural Language Processing, Information Retrieval and AI","volume":"460 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115937339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.5121/csit.2023.130305
Xiaohan Feng, Makoto Murakami
The Witch is a typical stereotype-busting character because its description has changed many times in a long history. This paper is an attempt to understand the visual interpretations and character positioning of the Watch by many creators in different eras, AI is being used to help summarize current stereotypes in witch design, and to propose a way to subvert the Witch stereotype in current popular culture. This study aims to understand the visual interpretations of witches and character positioning by many creators in different eras, and to subvert the stereotype of witches in current popular culture. This study provides material for future research on character design stereotypes, and an attempt is proposed to use artificial intelligence to break the stereotypes in design and is being documented as an experiment in how to subvert current stereotypes from various periods in history. The method begins by using AI to compile stereotypical images of contemporary witches. Then, the two major components of the stereotype, "accessories" and "appearance," are analyzed from historical and social perspectives and attributed to the reasons for the formation and transformation of the Witch image. These past stereotypes are designed using the design approach of "extraction" "retention" and "conversion.", and finally the advantages and disadvantages of this approach are summarized from a practical perspective. Research has shown that it is feasible to use AI to summarize the design elements and use them as clues to trace history. This is especially true for characters such as the Witch, who have undergone many historical transitions. The more changes there are, the more elements can be gathered, and the advantage of this method increases. Stereotypes change over time, and even when the current stereotype has become history, this method is still effective for newly created stereotypes.
{"title":"Design that uses AI to Subvert Stereotypes: Make Witches Wicked Again","authors":"Xiaohan Feng, Makoto Murakami","doi":"10.5121/csit.2023.130305","DOIUrl":"https://doi.org/10.5121/csit.2023.130305","url":null,"abstract":"The Witch is a typical stereotype-busting character because its description has changed many times in a long history. This paper is an attempt to understand the visual interpretations and character positioning of the Watch by many creators in different eras, AI is being used to help summarize current stereotypes in witch design, and to propose a way to subvert the Witch stereotype in current popular culture. This study aims to understand the visual interpretations of witches and character positioning by many creators in different eras, and to subvert the stereotype of witches in current popular culture. This study provides material for future research on character design stereotypes, and an attempt is proposed to use artificial intelligence to break the stereotypes in design and is being documented as an experiment in how to subvert current stereotypes from various periods in history. The method begins by using AI to compile stereotypical images of contemporary witches. Then, the two major components of the stereotype, \"accessories\" and \"appearance,\" are analyzed from historical and social perspectives and attributed to the reasons for the formation and transformation of the Witch image. These past stereotypes are designed using the design approach of \"extraction\" \"retention\" and \"conversion.\", and finally the advantages and disadvantages of this approach are summarized from a practical perspective. Research has shown that it is feasible to use AI to summarize the design elements and use them as clues to trace history. This is especially true for characters such as the Witch, who have undergone many historical transitions. The more changes there are, the more elements can be gathered, and the advantage of this method increases. Stereotypes change over time, and even when the current stereotype has become history, this method is still effective for newly created stereotypes.","PeriodicalId":299543,"journal":{"name":"Natural Language Processing, Information Retrieval and AI","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121172371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.5121/csit.2023.130307
Elmira Vafay Eslahi, A. Baniasadi
Magnetic resonance imaging (MRI) is one of the best imaging techniques that produce highquality images of objects. The long scan time is one of the biggest challenges in MRI acquisitions. To address this challenge, many researchers have aimed at finding methods to speed up the process. Faster MRI can reduce patient discomfort and motion artifacts. Many reconstruction methods are used in this matter, like deep learning-based MRI reconstruction, parallel MRI, and compressive sensing. Among these techniques, the convolutional neural network (CNN) generates high-quality images with faster scan and reconstruction procedures compared to the other techniques. The Inception module proposed by Google inspires the algorithm of this study for MRI reconstruction. In other words, we introduce a new MRI U-Net modification by using the Inception module. Our method is more flexible and robust compared to the standard U-Net.
{"title":"Magnetic Resonance Image Reconstruction using Inception-based Convolutional Neural Network","authors":"Elmira Vafay Eslahi, A. Baniasadi","doi":"10.5121/csit.2023.130307","DOIUrl":"https://doi.org/10.5121/csit.2023.130307","url":null,"abstract":"Magnetic resonance imaging (MRI) is one of the best imaging techniques that produce highquality images of objects. The long scan time is one of the biggest challenges in MRI acquisitions. To address this challenge, many researchers have aimed at finding methods to speed up the process. Faster MRI can reduce patient discomfort and motion artifacts. Many reconstruction methods are used in this matter, like deep learning-based MRI reconstruction, parallel MRI, and compressive sensing. Among these techniques, the convolutional neural network (CNN) generates high-quality images with faster scan and reconstruction procedures compared to the other techniques. The Inception module proposed by Google inspires the algorithm of this study for MRI reconstruction. In other words, we introduce a new MRI U-Net modification by using the Inception module. Our method is more flexible and robust compared to the standard U-Net.","PeriodicalId":299543,"journal":{"name":"Natural Language Processing, Information Retrieval and AI","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130955820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We want to solve the problem that the elderly or heart patients will not miss the golden time for rescue in case of sudden death or emergency event at home. Therefore, this work proposes an intelligent vital sign monitoring robot based on Robotic Operating System (ROS). The heart rate is measured and monitored through the millimeter wave module. At the same time, the infrared thermal imager and the cloud database are combined with image recognition to detect the temperature of a person’s head, and the measured head temperature and heart rate data are regularly uploaded in combination with blockchain technology to establish a complete vital signs database. When the robot detects an unexpected situation, it uses IFTTT service to send a Line message notification to notify the family or the rescue unit as soon as possible to avoid more unfortunate accidents.
{"title":"ROS-based Intelligent Vital Sign Monitoring Robot","authors":"Yu-Ping Liao, Hong-Xin Wu, Wen-Hsiang Yeh, Yi-Lin Cheng","doi":"10.5121/csit.2023.130306","DOIUrl":"https://doi.org/10.5121/csit.2023.130306","url":null,"abstract":"We want to solve the problem that the elderly or heart patients will not miss the golden time for rescue in case of sudden death or emergency event at home. Therefore, this work proposes an intelligent vital sign monitoring robot based on Robotic Operating System (ROS). The heart rate is measured and monitored through the millimeter wave module. At the same time, the infrared thermal imager and the cloud database are combined with image recognition to detect the temperature of a person’s head, and the measured head temperature and heart rate data are regularly uploaded in combination with blockchain technology to establish a complete vital signs database. When the robot detects an unexpected situation, it uses IFTTT service to send a Line message notification to notify the family or the rescue unit as soon as possible to avoid more unfortunate accidents.","PeriodicalId":299543,"journal":{"name":"Natural Language Processing, Information Retrieval and AI","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124551030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.5121/csit.2023.130309
Mehrdad Saffarie, Kheirollah Rahseparfard
The Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating ‘things’. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. The change of power sector is also guided by the growing penetration of renewable and Distributed Energy Resources (DER), as well as the increasing involvement of electricity consumers in the production and management of electricity, which in turn are expected to radically change the local electricity industry and markets, especially at distribution level, creating opportunities but also posing challenges to the reliability and efficiency of system operation. The trend is inline to the smart-grid concept, which represents an unprecedented opportunity to move the energy industry into a new era of reliability, availability, and efficiency that will contribute to our economic and environmental health. During the transition period, it is critical to carry out testing, technology improvements, consumer education, development of standards and regulations, and information sharing between projects to ensure that the benefits we envision from the smart grid become a reality.
{"title":"A Survey on IoT-based Smart-Grid Overview","authors":"Mehrdad Saffarie, Kheirollah Rahseparfard","doi":"10.5121/csit.2023.130309","DOIUrl":"https://doi.org/10.5121/csit.2023.130309","url":null,"abstract":"The Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating ‘things’. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. The change of power sector is also guided by the growing penetration of renewable and Distributed Energy Resources (DER), as well as the increasing involvement of electricity consumers in the production and management of electricity, which in turn are expected to radically change the local electricity industry and markets, especially at distribution level, creating opportunities but also posing challenges to the reliability and efficiency of system operation. The trend is inline to the smart-grid concept, which represents an unprecedented opportunity to move the energy industry into a new era of reliability, availability, and efficiency that will contribute to our economic and environmental health. During the transition period, it is critical to carry out testing, technology improvements, consumer education, development of standards and regulations, and information sharing between projects to ensure that the benefits we envision from the smart grid become a reality.","PeriodicalId":299543,"journal":{"name":"Natural Language Processing, Information Retrieval and AI","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114156458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}