首页 > 最新文献

Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications最新文献

英文 中文
Efficient healthcare service based on Stacking Ensemble 基于堆叠集成的高效医疗服务
Yunsang Joo, Seungwon Lee, Hyoungju Kim, Pankoo Kim, Seong Oun Hwang, Chang Choi
Recently, research using medical big data to predict patients with high probability of disease are receiving a lot of attention. Due to the advancement of artificial intelligence, continuous research is essential in that diseases can be predicted only by computational numbers and can be prevented before they occur. Therefore, machine learning and deep learning research using medical big data for disease prediction are actively progressing. Due to the nature of medical data, diseases are rare, so there is a tendency to oversampling or under sampling that can lead to information distortion. Also, given that most machine learning-based research is based on certain predictive models, there is a risk that the predictions themselves will reflect the biases that exist. So, if you generalize the data your model will train on, or adjust the model's bias, you can get better predictions. In this white paper, we use diabetes, heart disease, and breast cancer data through several individual classifiers to get predicted values and use them as training data for one meta-model to get the final predictions. That is, by constructing a stacking ensemble model, the presence or absence of a disease is predicted, and its performance is analysed through experiments. This model trains multiple classifiers on the same data, so there is a possibility that the model will overfit the data. So, when training multiple classifiers, we compare the model with and without cross validation. In the experiment, the model using cross-validation for training showed an average of 1.4% higher performance than that of the individual single model. On the other hand, the meta-model without cross-validation shows lower performance than that of individual single models. In other words, when constructing a stacking ensemble model, high performance could be obtained only by essentially cross-validating individual single classifiers. Performing one final prediction on the predicted values of high-performance individual models will yield more stable and reliable predictions. The cross-learning-based cumulative ensemble model proposed in this paper predicts the presence or absence of a disease and can be used for medical service development and disease prevention.
近年来,利用医疗大数据预测高概率患病患者的研究备受关注。由于人工智能的进步,持续的研究是必不可少的,因为疾病只能通过计算数字来预测,并且可以在疾病发生之前进行预防。因此,利用医疗大数据进行疾病预测的机器学习和深度学习研究正在积极推进。由于医疗数据的性质,疾病是罕见的,因此存在过采样或欠采样的倾向,从而导致信息失真。此外,考虑到大多数基于机器学习的研究都是基于某些预测模型,预测本身就有可能反映出存在的偏见。所以,如果你泛化你的模型将要训练的数据,或者调整模型的偏差,你可以得到更好的预测。在本白皮书中,我们使用糖尿病、心脏病和乳腺癌的数据,通过几个单独的分类器来获得预测值,并将它们作为一个元模型的训练数据来获得最终预测。即通过构建一个叠加系综模型来预测疾病的存在与否,并通过实验分析其性能。该模型在相同的数据上训练多个分类器,因此存在模型过拟合数据的可能性。因此,当训练多个分类器时,我们比较有和没有交叉验证的模型。在实验中,使用交叉验证进行训练的模型表现出比单个模型平均高出1.4%的性能。另一方面,未经交叉验证的元模型表现出比单个模型更低的性能。换句话说,在构建堆叠集成模型时,只有通过交叉验证单个分类器才能获得高性能。对高性能单个模型的预测值执行一个最终预测将产生更稳定和可靠的预测。本文提出的基于交叉学习的累积集成模型可以预测疾病的存在或不存在,可用于医疗服务开发和疾病预防。
{"title":"Efficient healthcare service based on Stacking Ensemble","authors":"Yunsang Joo, Seungwon Lee, Hyoungju Kim, Pankoo Kim, Seong Oun Hwang, Chang Choi","doi":"10.1145/3440943.3444727","DOIUrl":"https://doi.org/10.1145/3440943.3444727","url":null,"abstract":"Recently, research using medical big data to predict patients with high probability of disease are receiving a lot of attention. Due to the advancement of artificial intelligence, continuous research is essential in that diseases can be predicted only by computational numbers and can be prevented before they occur. Therefore, machine learning and deep learning research using medical big data for disease prediction are actively progressing. Due to the nature of medical data, diseases are rare, so there is a tendency to oversampling or under sampling that can lead to information distortion. Also, given that most machine learning-based research is based on certain predictive models, there is a risk that the predictions themselves will reflect the biases that exist. So, if you generalize the data your model will train on, or adjust the model's bias, you can get better predictions. In this white paper, we use diabetes, heart disease, and breast cancer data through several individual classifiers to get predicted values and use them as training data for one meta-model to get the final predictions. That is, by constructing a stacking ensemble model, the presence or absence of a disease is predicted, and its performance is analysed through experiments. This model trains multiple classifiers on the same data, so there is a possibility that the model will overfit the data. So, when training multiple classifiers, we compare the model with and without cross validation. In the experiment, the model using cross-validation for training showed an average of 1.4% higher performance than that of the individual single model. On the other hand, the meta-model without cross-validation shows lower performance than that of individual single models. In other words, when constructing a stacking ensemble model, high performance could be obtained only by essentially cross-validating individual single classifiers. Performing one final prediction on the predicted values of high-performance individual models will yield more stable and reliable predictions. The cross-learning-based cumulative ensemble model proposed in this paper predicts the presence or absence of a disease and can be used for medical service development and disease prevention.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An intelligent patrol system for Industry 4.0 Smart Factory 面向工业4.0智能工厂的智能巡检系统
Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu
The application of the sensor node of the Internet of Things can help managers to grasp the abnormal information of the production equipment and achieve the goal of effective factory management. The integration of a safe control mechanism into the inspection system can reduce the cost of company. Therefore, this paper proposed an intelligent secure and reliable patrol system. It supports the efficiency patrol system and privacy of the information. It also ensures only legally authorized users have right to access the information. We built the intelligent secure and reliable patrol system by using IoT technology and designed a trusted authentication mechanism within a smart, safe and reliable patrol system. The benefits of the system are: Ensuring the security of the transmission. The system user cannot modify the inspection information arbitrarily. It can make the production maintenance mechanism sounder. It will also help companies gradually move towards the goal of Industry 4.0 smart factory to improve the production efficiency of enterprises and increase production capacity.
物联网传感器节点的应用可以帮助管理者掌握生产设备的异常信息,达到有效管理工厂的目的。将安全控制机制集成到检查系统中可以降低公司的成本。为此,本文提出了一种安全可靠的智能巡逻系统。它支持高效巡查系统和信息的保密性。它还确保只有合法授权的用户才有权访问信息。我们利用物联网技术构建智能安全可靠的巡逻系统,并在智能安全可靠的巡逻系统中设计可信认证机制。该系统的好处是:保证了传输的安全性。系统用户不能随意修改巡检信息。使生产维护机制更加健全。它也将帮助企业逐步走向工业4.0智能工厂的目标,提高企业的生产效率,增加产能。
{"title":"An intelligent patrol system for Industry 4.0 Smart Factory","authors":"Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu","doi":"10.1145/3440943.3444339","DOIUrl":"https://doi.org/10.1145/3440943.3444339","url":null,"abstract":"The application of the sensor node of the Internet of Things can help managers to grasp the abnormal information of the production equipment and achieve the goal of effective factory management. The integration of a safe control mechanism into the inspection system can reduce the cost of company. Therefore, this paper proposed an intelligent secure and reliable patrol system. It supports the efficiency patrol system and privacy of the information. It also ensures only legally authorized users have right to access the information. We built the intelligent secure and reliable patrol system by using IoT technology and designed a trusted authentication mechanism within a smart, safe and reliable patrol system. The benefits of the system are: Ensuring the security of the transmission. The system user cannot modify the inspection information arbitrarily. It can make the production maintenance mechanism sounder. It will also help companies gradually move towards the goal of Industry 4.0 smart factory to improve the production efficiency of enterprises and increase production capacity.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132249819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed 挖掘乳腺癌:通过TCGA数据挖掘和PubMed文本挖掘的比较选择乳腺癌相关候选基因
Chou-Cheng Chen, Y. Kuo, Chi-Hui Chiang
In 2016, 12,676 new cases of breast cancer were diagnosed among Taiwan women. In 2018 the standardized death rate of breast cancer was 12.5 per 100,000 persons. Previous studies have integrated data and text mining to yield fusion genes, identify genetic factors for breast cancer and select single-gene feature sets for colon cancer discrimination. However, our study is the first to select significantly different expression between breast normal tissue and cancer using TCGA data and biostatistics, excluding know genes using abstracts from PubMed and natural language processing. The top twenty genes for research potential from the selection of Mining-BreastCancer are EML3, ABCB9, GRASP, KANK3, GPR146, ZNF623, CCDC9, ADCY4, DLL1, ADAM33, GRRP1, LRRN4CL, C14orf180, ABCD4, ABCC6P1, PEAR1, FAM43A, C20orf160, KIF21A and PP-FIA3. Few studies for these genes exist, but they hold significantly different expressions between breast cancer and normal tissue, each pathologic tumor and lymph node, or between each pathologic metastasis. These results show that MiningBreastCancer can help scientists select genes for research potential. MiningBreastCancer is available through http://bio.yungyun.com.tw/MiningBreastCancer.aspx.
2016年,台湾女性确诊乳腺癌新病例12676例。2018年,乳腺癌标准化死亡率为12.5 / 10万人。先前的研究将数据和文本挖掘结合起来,以产生融合基因,确定乳腺癌的遗传因素,并选择单基因特征集用于结肠癌的区分。然而,我们的研究是第一个使用TCGA数据和生物统计学来选择乳腺正常组织和癌症之间显著不同的表达,排除了使用PubMed摘要和自然语言处理的已知基因。在采矿型乳腺癌的筛选中,具有研究潜力的前20个基因分别是EML3、ABCB9、GRASP、KANK3、GPR146、ZNF623、CCDC9、ADCY4、DLL1、ADAM33、GRRP1、LRRN4CL、C14orf180、ABCD4、ABCC6P1、PEAR1、FAM43A、C20orf160、KIF21A和PP-FIA3。对这些基因的研究很少,但它们在乳腺癌与正常组织、各病理性肿瘤与淋巴结、各病理性转移之间的表达存在显著差异。这些结果表明,挖掘乳腺癌可以帮助科学家选择具有研究潜力的基因。MiningBreastCancer可通过http://bio.yungyun.com.tw/MiningBreastCancer.aspx获得。
{"title":"MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed","authors":"Chou-Cheng Chen, Y. Kuo, Chi-Hui Chiang","doi":"10.1145/3440943.3444718","DOIUrl":"https://doi.org/10.1145/3440943.3444718","url":null,"abstract":"In 2016, 12,676 new cases of breast cancer were diagnosed among Taiwan women. In 2018 the standardized death rate of breast cancer was 12.5 per 100,000 persons. Previous studies have integrated data and text mining to yield fusion genes, identify genetic factors for breast cancer and select single-gene feature sets for colon cancer discrimination. However, our study is the first to select significantly different expression between breast normal tissue and cancer using TCGA data and biostatistics, excluding know genes using abstracts from PubMed and natural language processing. The top twenty genes for research potential from the selection of Mining-BreastCancer are EML3, ABCB9, GRASP, KANK3, GPR146, ZNF623, CCDC9, ADCY4, DLL1, ADAM33, GRRP1, LRRN4CL, C14orf180, ABCD4, ABCC6P1, PEAR1, FAM43A, C20orf160, KIF21A and PP-FIA3. Few studies for these genes exist, but they hold significantly different expressions between breast cancer and normal tissue, each pathologic tumor and lymph node, or between each pathologic metastasis. These results show that MiningBreastCancer can help scientists select genes for research potential. MiningBreastCancer is available through http://bio.yungyun.com.tw/MiningBreastCancer.aspx.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128026358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment 边缘云计算环境下安全容器数据保护蓝图
Seong-Jin Kim, K. Park
Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.
边缘计算是一种在生成数据的设备附近收集、分析和处理数据的计算技术。这使服务提供商能够减少不必要的数据传输并提供低延迟服务。由于在云计算环境中需要处理急剧增加的数据量,云计算技术已经从集中式环境发展到边缘计算环境。随着云计算环境的变化,容器的高移动性带来了新的安全问题。容器在边缘计算环境中增加流动性的增加数据泄漏的可能性,因为容器边缘节点之间的迁移和我们不能保证完全删除从边缘节点的数据容器之前居住。加强安全云计算环境中数据的优势,我们建议的蓝图从潜在威胁安全的容器来保护数据。
{"title":"Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment","authors":"Seong-Jin Kim, K. Park","doi":"10.1145/3440943.3444355","DOIUrl":"https://doi.org/10.1145/3440943.3444355","url":null,"abstract":"Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training Analysis of Double Canoe Based on IOT 基于物联网的双人独木舟训练分析
Jo-Hung Yu, Meng-Tsung Lee, Jao-Chuan Lin, Chien-Hung Wu
Taiwan is a maritime country. In recent years, due to the open pole of the ocean, outdoor marine leisure sports have been promoted, especially canoeing activities are currently the most popular marine sport in Taiwan. The canoe sport also has competition games: Especially the two-person competition canoe requires two people to coordinate with each other at the same time. Therefore, this article proposes to build a two-person canoe training analysis based on IoT. In this article, an IoT device is installed on the two-person arm. When two people are sliding a canoe, the speed of the G-sensor can be used to judge the problem of coordination between the two parties, and the information proposed in this article will be sent to the platform. The platform will record the rate of each canoe user's sliding. Therefore, the system proposed in this article can be analyzed through platform information. Whether the coordination between the users of both sides is gradually growing, or it needs to be further revised. The method proposed in this article helps to scientifically train players.
台湾是一个海洋国家。近年来,由于海洋的开放极,户外海洋休闲运动得到推广,特别是皮划艇活动是目前台湾最受欢迎的海洋运动。皮划艇运动也有比赛项目,特别是双人比赛皮划艇需要两人同时配合。因此,本文提出构建一个基于IoT的双人独木舟训练分析。在本文中,将物联网设备安装在双人手臂上。当两个人划独木舟时,g传感器的速度可以用来判断双方的协调问题,并将本文提出的信息发送到平台。该平台将记录每个独木舟用户滑动的速度。因此,本文提出的系统可以通过平台信息进行分析。双方用户之间的协调性是否在逐渐增强,还是需要进一步修改。本文提出的方法有助于科学地训练运动员。
{"title":"Training Analysis of Double Canoe Based on IOT","authors":"Jo-Hung Yu, Meng-Tsung Lee, Jao-Chuan Lin, Chien-Hung Wu","doi":"10.1145/3440943.3444344","DOIUrl":"https://doi.org/10.1145/3440943.3444344","url":null,"abstract":"Taiwan is a maritime country. In recent years, due to the open pole of the ocean, outdoor marine leisure sports have been promoted, especially canoeing activities are currently the most popular marine sport in Taiwan. The canoe sport also has competition games: Especially the two-person competition canoe requires two people to coordinate with each other at the same time. Therefore, this article proposes to build a two-person canoe training analysis based on IoT. In this article, an IoT device is installed on the two-person arm. When two people are sliding a canoe, the speed of the G-sensor can be used to judge the problem of coordination between the two parties, and the information proposed in this article will be sent to the platform. The platform will record the rate of each canoe user's sliding. Therefore, the system proposed in this article can be analyzed through platform information. Whether the coordination between the users of both sides is gradually growing, or it needs to be further revised. The method proposed in this article helps to scientifically train players.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125148217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comments on "Securing implantable cardiac medical devices": Use of radio frequency energy harvesting 关于“保护植入式心脏医疗装置”的评论:使用射频能量收集
Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma, Bonam Kim, I. You
Implantable Medical Devices (IMDs) have evolved over the years to stretch their application areas to provide a range of services from health-care to public safety. In order to handle such information, the high strength security and the proper authentication are required. For this, Ellouze et al. have proposed an authentication protocol for IMDs in 2013. The security in IMD that they propose and mention is reasonable, but some aspects are expected to be vulnerable to attack. In addition, not only are such schemes need to be secured, but their security should also be formally verified against their security requirements. Thus, we confirm the security of the authentication protocol for IMDs that have not been objectively verified through formal verification tool such as BAN-logic. Consequently, in this paper, Ellouze et al. are turned out to be insecure.
多年来,植入式医疗器械(imd)已经发展到扩展其应用领域,以提供从医疗保健到公共安全的一系列服务。为了处理这些信息,需要高强度的安全性和适当的身份验证。为此,Ellouze等人在2013年提出了imd的认证协议。他们提出和提到的IMD的安全性是合理的,但是有些方面预计会容易受到攻击。此外,不仅需要对这些方案进行安全保护,而且还应该根据其安全需求对其安全性进行正式验证。因此,我们通过正式的验证工具(如ban逻辑)来确认尚未客观验证的imd的认证协议的安全性。因此,本文证明了Ellouze等人是不安全的。
{"title":"Comments on \"Securing implantable cardiac medical devices\": Use of radio frequency energy harvesting","authors":"Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma, Bonam Kim, I. You","doi":"10.1145/3440943.3444733","DOIUrl":"https://doi.org/10.1145/3440943.3444733","url":null,"abstract":"Implantable Medical Devices (IMDs) have evolved over the years to stretch their application areas to provide a range of services from health-care to public safety. In order to handle such information, the high strength security and the proper authentication are required. For this, Ellouze et al. have proposed an authentication protocol for IMDs in 2013. The security in IMD that they propose and mention is reasonable, but some aspects are expected to be vulnerable to attack. In addition, not only are such schemes need to be secured, but their security should also be formally verified against their security requirements. Thus, we confirm the security of the authentication protocol for IMDs that have not been objectively verified through formal verification tool such as BAN-logic. Consequently, in this paper, Ellouze et al. are turned out to be insecure.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Algorithm based on Search Economics for Multi-Objective Optimization 一种基于搜索经济的多目标优化算法
Tzu-Tsai Kao, Chun-Wei Tsai, Ming-Chao Chiang
An effective multi-objective search algorithm based on a new meta-heuristic algorithm, named search economic (SE), is presented in this study. The basic idea of SE is to first partition the solution space into a certain number of regions to keep the diversity. Then, it will determine the later search directions by the so-called expected value that is composed of the objective values of the best-so-far solution of each region, the searched solutions, and the number of searches invested on a region. More important, the proposed algorithm will invest limited computing resources on promising regions to find a better Pareto optimal set (POS). Different from other search economics-based algorithms, the proposed method uses two transition operators of differential evolution and adds a self adaptive mechanism to tune its parameters. Experimental results show that the proposed algorithm outperforms all the other metaheuristic algorithms compared in this study in most cases in the sense that it can get a more uniformly distributed POS and a smaller distance to the Pareto optimal front.
本文提出了一种有效的多目标搜索算法,该算法基于一种新的元启发式算法——搜索经济算法。SE的基本思想是首先将解空间划分为一定数量的区域,以保持解空间的多样性。然后,它将通过所谓的期望值来确定后续的搜索方向,该期望值由每个区域的迄今最佳解的客观值、搜索的解和在一个区域上投入的搜索次数组成。更重要的是,该算法将有限的计算资源投入到有希望的区域,以寻找更好的帕累托最优集(POS)。与其他基于搜索经济的算法不同,该方法采用差分进化的两个转移算子,并增加了自适应机制来调整其参数。实验结果表明,在大多数情况下,本文提出的算法优于本文比较的所有其他元启发式算法,因为它可以获得更均匀分布的POS,并且距离Pareto最优前沿的距离更小。
{"title":"An Effective Algorithm based on Search Economics for Multi-Objective Optimization","authors":"Tzu-Tsai Kao, Chun-Wei Tsai, Ming-Chao Chiang","doi":"10.1145/3440943.3444726","DOIUrl":"https://doi.org/10.1145/3440943.3444726","url":null,"abstract":"An effective multi-objective search algorithm based on a new meta-heuristic algorithm, named search economic (SE), is presented in this study. The basic idea of SE is to first partition the solution space into a certain number of regions to keep the diversity. Then, it will determine the later search directions by the so-called expected value that is composed of the objective values of the best-so-far solution of each region, the searched solutions, and the number of searches invested on a region. More important, the proposed algorithm will invest limited computing resources on promising regions to find a better Pareto optimal set (POS). Different from other search economics-based algorithms, the proposed method uses two transition operators of differential evolution and adds a self adaptive mechanism to tune its parameters. Experimental results show that the proposed algorithm outperforms all the other metaheuristic algorithms compared in this study in most cases in the sense that it can get a more uniformly distributed POS and a smaller distance to the Pareto optimal front.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks 单亲家长和孩子对数字绘本故事书共同学习计划的态度
Y. Ou, Yueming Yu, Yu-Xi Chen, Zhen-Yu Wu
With the advancement of technology, modern people increasingly tend to communicate with other people through electronic products, and various relationships gradually become alienated, including the Parent-Child Relationship. Parent-child relationship can cultivate children's interaction and trust with other people in social relations, so education systems all over the world encourage the establishment of parent-child relationships to learn together. This research attempted to use children's picture storybooks as study tools to examine parents' and children's attitudes toward an English as a Foreign Language (EFL) parent-child co-learning program. Several parents, and G1 and G2 children, were invited as experimental subjects to participate in a ten-week co-learning program. Experimental results show that parents and children generally have a positive attitude towards the process of joint learning plans.
随着科技的进步,现代人越来越倾向于通过电子产品与他人交流,各种关系逐渐异化,包括亲子关系。亲子关系可以培养孩子在社会关系中与其他人的互动和信任,因此世界各国的教育制度都鼓励建立亲子关系,共同学习。本研究试图以儿童绘本故事书为研究工具,探讨家长与儿童对英语亲子共同学习计划的态度。几位家长和G1和G2的孩子被邀请作为实验对象参加为期十周的共同学习计划。实验结果表明,家长和孩子对共同学习计划的过程普遍持积极态度。
{"title":"Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks","authors":"Y. Ou, Yueming Yu, Yu-Xi Chen, Zhen-Yu Wu","doi":"10.1145/3440943.3444338","DOIUrl":"https://doi.org/10.1145/3440943.3444338","url":null,"abstract":"With the advancement of technology, modern people increasingly tend to communicate with other people through electronic products, and various relationships gradually become alienated, including the Parent-Child Relationship. Parent-child relationship can cultivate children's interaction and trust with other people in social relations, so education systems all over the world encourage the establishment of parent-child relationships to learn together. This research attempted to use children's picture storybooks as study tools to examine parents' and children's attitudes toward an English as a Foreign Language (EFL) parent-child co-learning program. Several parents, and G1 and G2 children, were invited as experimental subjects to participate in a ten-week co-learning program. Experimental results show that parents and children generally have a positive attitude towards the process of joint learning plans.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic PLC控制逻辑操纵攻击的检测与分析技术
Joochan Lee, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo
In recent years, 1 a large number of studies have been conducted on cybersecurity for Programmable Logic Controllers (PLCs) to cope with cyberattacks on Industrial Control Systems(ICS). However, few studies have been conducted on ensuring cybersafety for control logics running inside PLCs. In this study, a technique for detecting an attack on PLC control logic change was proposed by analyzing the network protocol data and project file structure. Based on the analysis results for the proposed technique, a tool was implemented to detect an manipulation attack on control logic, and whether such attack was detected or not was verified through experiments.
近年来,人们对可编程逻辑控制器(plc)的网络安全进行了大量研究,以应对针对工业控制系统(ICS)的网络攻击。然而,关于确保plc内部运行的控制逻辑的网络安全的研究很少。本文通过分析网络协议数据和项目文件结构,提出了一种检测PLC控制逻辑变更攻击的技术。在分析结果的基础上,实现了一种检测控制逻辑操纵攻击的工具,并通过实验验证了这种攻击是否被检测到。
{"title":"Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic","authors":"Joochan Lee, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444742","DOIUrl":"https://doi.org/10.1145/3440943.3444742","url":null,"abstract":"In recent years, 1 a large number of studies have been conducted on cybersecurity for Programmable Logic Controllers (PLCs) to cope with cyberattacks on Industrial Control Systems(ICS). However, few studies have been conducted on ensuring cybersafety for control logics running inside PLCs. In this study, a technique for detecting an attack on PLC control logic change was proposed by analyzing the network protocol data and project file structure. Based on the analysis results for the proposed technique, a tool was implemented to detect an manipulation attack on control logic, and whether such attack was detected or not was verified through experiments.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126870014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant 技术评估方法在核电厂网络安全中的应用研究
D. Jung, Jiho Shin, Chaechang Lee, Kook-huei Kwon, Jung-Taek Seo
Recently 1, cyber attacks targeting Industrial Control Systems (ICS) have been increasing rapidly; accordingly, cyber security applications and security evaluations of ICS are becoming very important. Technical Assessment Methodology (TAM) is a method developed by the Electric Power Research Institute (EPRI) in the United States for assessing and applying security control methods for power plants. By applying TAM, limitations of cyber security application and security evaluation of existing nuclear facilities are able to address. In this study, a virtual test bed was composed for one of the safety systems of APR1400, and the TAM was applied and analyzed to derive two advantages and five features of TAM. Based on this, the rationale for using TAM for the application and assessment of security control methods in nuclear facilities was explained, including five considerations for the better application of TAM. Finally, we propose future work for applying TAM.
近年来,针对工业控制系统(ICS)的网络攻击迅速增加;因此,ICS的网络安全应用和安全评估变得非常重要。技术评估方法(TAM)是由美国电力研究所(EPRI)开发的一种评估和应用电厂安全控制方法的方法。通过应用TAM,可以解决网络安全应用和现有核设施安全评估的局限性。本文以APR1400的某一安全系统为对象,搭建了虚拟试验台,并对TAM进行了应用和分析,得出了TAM的两大优势和五大特点。在此基础上,阐述了将TAM用于核设施安全控制方法的应用和评估的基本原理,包括更好地应用TAM的五个考虑因素。最后,提出了应用TAM的下一步工作。
{"title":"A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant","authors":"D. Jung, Jiho Shin, Chaechang Lee, Kook-huei Kwon, Jung-Taek Seo","doi":"10.1145/3440943.3444741","DOIUrl":"https://doi.org/10.1145/3440943.3444741","url":null,"abstract":"Recently 1, cyber attacks targeting Industrial Control Systems (ICS) have been increasing rapidly; accordingly, cyber security applications and security evaluations of ICS are becoming very important. Technical Assessment Methodology (TAM) is a method developed by the Electric Power Research Institute (EPRI) in the United States for assessing and applying security control methods for power plants. By applying TAM, limitations of cyber security application and security evaluation of existing nuclear facilities are able to address. In this study, a virtual test bed was composed for one of the safety systems of APR1400, and the TAM was applied and analyzed to derive two advantages and five features of TAM. Based on this, the rationale for using TAM for the application and assessment of security control methods in nuclear facilities was explained, including five considerations for the better application of TAM. Finally, we propose future work for applying TAM.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131853995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1