首页 > 最新文献

Proceedings of the 2023 12th International Conference on Software and Computer Applications最新文献

英文 中文
A Comparison of Four Metaheuristic Algorithms for the Problem of Test Redundancy Reduction 测试冗余约简问题的四种元启发式算法比较
Mizanur Rahman, K. Z. Zamli, M. A. Mohamad
Abstract. Finding the optimal solution out of all reasonable solutions is the goal of an optimization problem. Numerous metaheuristic algorithms have been created in the literature during the past 30 years. It is essential to assess each algorithm's performance using broad case studies in order to assist engineers in selecting the optimal metaheuristic algorithm for the given problem. In this research, we give a comparative analysis of four metaheuristic algorithms used to solve the test redundancy reduction problem: the teaching-learning-based optimization (TLBO), the jaya algorithm (JA), the sine-cosine algorithm (SCA), and the sparrow-search algorithm (SSA). To achieve statistical significance, the evaluation of these algorithms' performance is carried out by running every algorithm thirty times. Finding a minimal subset of the test suite that satisfies the specified test criteria is the aim of test redundancy reduction. It was discovered that, in terms of average reduction rate and runtime effectiveness, the SSA is the more efficient metaheuristic algorithm for the test redundancy reduction problem among all the competing metaheuristic algorithms.
摘要从所有合理的解中找到最优解是优化问题的目标。在过去的30年中,文献中已经创建了许多元启发式算法。为了帮助工程师为给定问题选择最佳的元启发式算法,使用广泛的案例研究来评估每种算法的性能是至关重要的。在本研究中,我们比较分析了用于解决测试冗余削减问题的四种元启发式算法:基于教学的优化算法(TLBO)、jaya算法(JA)、正弦余弦算法(SCA)和麻雀搜索算法(SSA)。为了达到统计显著性,对这些算法的性能进行评估,每个算法运行30次。找到满足指定测试标准的测试套件的最小子集是测试冗余减少的目标。研究发现,从平均约简率和运行时效率两方面来看,在所有竞争的元启发式算法中,SSA是更有效的测试冗余约简算法。
{"title":"A Comparison of Four Metaheuristic Algorithms for the Problem of Test Redundancy Reduction","authors":"Mizanur Rahman, K. Z. Zamli, M. A. Mohamad","doi":"10.1145/3587828.3587879","DOIUrl":"https://doi.org/10.1145/3587828.3587879","url":null,"abstract":"Abstract. Finding the optimal solution out of all reasonable solutions is the goal of an optimization problem. Numerous metaheuristic algorithms have been created in the literature during the past 30 years. It is essential to assess each algorithm's performance using broad case studies in order to assist engineers in selecting the optimal metaheuristic algorithm for the given problem. In this research, we give a comparative analysis of four metaheuristic algorithms used to solve the test redundancy reduction problem: the teaching-learning-based optimization (TLBO), the jaya algorithm (JA), the sine-cosine algorithm (SCA), and the sparrow-search algorithm (SSA). To achieve statistical significance, the evaluation of these algorithms' performance is carried out by running every algorithm thirty times. Finding a minimal subset of the test suite that satisfies the specified test criteria is the aim of test redundancy reduction. It was discovered that, in terms of average reduction rate and runtime effectiveness, the SSA is the more efficient metaheuristic algorithm for the test redundancy reduction problem among all the competing metaheuristic algorithms.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121593734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ontology-based Modeling for Classifying Risk of Suicidal Behavior 基于本体的自杀行为风险分类模型
Noratikah Nordin, Z. Zainol, Mohd Halim Mohd Noor, L. Chan
Classifying an individual with suicidal behavior is a complex problem. A clinical decision support system (CDSS) helps medical experts in their daily work and supports them in effective decision-making. The huge amount of medical information and the complex correlation between the risk factors and the level of risk for suicidal behavior makes the representation of data is challenging. Therefore, this paper proposes an ontology-based modeling to classify an individual with at-risk of suicidal behavior for effective clinical decision support system. The case study is conducted to evaluate the ontology model and provides a general approach to knowledge sharing and reusing knowledge for suicide risk prevention and management. The finding shows that the ontology model can be used as a knowledge base for classification, and it is suitable to capture medical knowledge, detailed concepts, and relationships in a formal way using Web Ontology Language (OWL). The results of the proposed ontology model in terms of accuracy, specificity, and sensitivity are 83%, 84%, and 82% respectively.
对有自杀行为的个体进行分类是一个复杂的问题。临床决策支持系统(CDSS)可以帮助医学专家在日常工作中进行有效的决策。海量的医疗信息以及风险因素与自杀行为风险水平之间复杂的相关性使得数据的表示具有挑战性。因此,本文提出了一种基于本体的模型来对有自杀行为风险的个体进行分类,为有效的临床决策支持系统提供支持。通过案例研究对本体模型进行了评价,为自杀风险预防和管理提供了知识共享和知识重用的通用方法。研究结果表明,该本体模型可以作为分类的知识库,并且适合使用Web ontology Language (OWL)以形式化的方式捕获医学知识、详细概念和关系。所提出的本体模型的准确率、特异性和灵敏度分别为83%、84%和82%。
{"title":"An Ontology-based Modeling for Classifying Risk of Suicidal Behavior","authors":"Noratikah Nordin, Z. Zainol, Mohd Halim Mohd Noor, L. Chan","doi":"10.1145/3587828.3587840","DOIUrl":"https://doi.org/10.1145/3587828.3587840","url":null,"abstract":"Classifying an individual with suicidal behavior is a complex problem. A clinical decision support system (CDSS) helps medical experts in their daily work and supports them in effective decision-making. The huge amount of medical information and the complex correlation between the risk factors and the level of risk for suicidal behavior makes the representation of data is challenging. Therefore, this paper proposes an ontology-based modeling to classify an individual with at-risk of suicidal behavior for effective clinical decision support system. The case study is conducted to evaluate the ontology model and provides a general approach to knowledge sharing and reusing knowledge for suicide risk prevention and management. The finding shows that the ontology model can be used as a knowledge base for classification, and it is suitable to capture medical knowledge, detailed concepts, and relationships in a formal way using Web Ontology Language (OWL). The results of the proposed ontology model in terms of accuracy, specificity, and sensitivity are 83%, 84%, and 82% respectively.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116146390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Evaluation of Anomaly-Based Controller Area Network IDS 基于异常的控制器局域网IDS的比较评价
Shaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah A. Aziz
The vulnerability of in-vehicle networks, particularly those based on the Controller Area Network (CAN) protocol, has prompted the development of numerous techniques for intrusion detection on the CAN bus. However, these CAN IDS are often evaluated in disparate experimental settings, with different datasets and evaluation metrics, which hinder direct comparison. This has given rise to efforts at benchmarking and comparative evaluation of CAN IDS under similar experimental conditions to provide an understanding of the relative performance of these CAN IDS. This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. The ROAD dataset differs from datasets used in previous work in that it includes the stealthiest possible version of targeted ID fabrication attacks which are more difficult to detect. It also consists of masquerade attacks, which have not been commonly used in comparative evaluation studies. Furthermore, in addition to metrics such as accuracy, precision, recall, and F1-score, we report balanced accuracy, informedness, markedness, and Matthews correlation coefficient, which place equal important on positive and negative classes and are better measures of detection capability, especially for imbalanced datasets. We also report training and testing times for each CAN IDS as an indicator of real-time intrusion detection performance. Results of experiments were found to be generally concordant with previous work, in terms of accuracy, precision, recall, and F1-score. Entropy- and frequency-based CAN IDS were found to be relatively better at detecting attacks, particularly fabrication attacks; while other algorithms did not perform well, as indicated by low MCC scores.
车载网络,特别是基于控制器局域网(CAN)协议的车载网络的脆弱性,促使了各种基于CAN总线的入侵检测技术的发展。然而,这些CAN IDS通常在不同的实验环境中进行评估,使用不同的数据集和评估指标,这阻碍了直接比较。这引起了在类似实验条件下对CAN IDS进行基准测试和比较评估的努力,以提供对这些CAN IDS相对性能的理解。这项工作通过报告四种统计和两种基于机器学习的CAN入侵检测算法的比较评估结果,对Real ORNL汽车测功机(ROAD) CAN入侵数据集做出了贡献。ROAD数据集与以前工作中使用的数据集不同,因为它包含了更难以检测到的目标ID伪造攻击的最隐蔽版本。它还包括伪装攻击,这在比较评估研究中并不常用。此外,除了准确性、精密度、召回率和f1分数等指标外,我们还报告了平衡准确性、信息性、标记性和马修斯相关系数,它们对正类和负类同等重要,是更好的检测能力指标,特别是对于不平衡数据集。我们还报告了每个CAN IDS的训练和测试时间,作为实时入侵检测性能的指标。实验结果在正确率、精密度、查全率和f1得分方面与前人的研究结果基本一致。基于熵和频率的CAN id被发现在检测攻击方面相对更好,特别是伪造攻击;而其他算法表现不佳,MCC得分较低。
{"title":"Comparative Evaluation of Anomaly-Based Controller Area Network IDS","authors":"Shaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah A. Aziz","doi":"10.1145/3587828.3587861","DOIUrl":"https://doi.org/10.1145/3587828.3587861","url":null,"abstract":"The vulnerability of in-vehicle networks, particularly those based on the Controller Area Network (CAN) protocol, has prompted the development of numerous techniques for intrusion detection on the CAN bus. However, these CAN IDS are often evaluated in disparate experimental settings, with different datasets and evaluation metrics, which hinder direct comparison. This has given rise to efforts at benchmarking and comparative evaluation of CAN IDS under similar experimental conditions to provide an understanding of the relative performance of these CAN IDS. This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. The ROAD dataset differs from datasets used in previous work in that it includes the stealthiest possible version of targeted ID fabrication attacks which are more difficult to detect. It also consists of masquerade attacks, which have not been commonly used in comparative evaluation studies. Furthermore, in addition to metrics such as accuracy, precision, recall, and F1-score, we report balanced accuracy, informedness, markedness, and Matthews correlation coefficient, which place equal important on positive and negative classes and are better measures of detection capability, especially for imbalanced datasets. We also report training and testing times for each CAN IDS as an indicator of real-time intrusion detection performance. Results of experiments were found to be generally concordant with previous work, in terms of accuracy, precision, recall, and F1-score. Entropy- and frequency-based CAN IDS were found to be relatively better at detecting attacks, particularly fabrication attacks; while other algorithms did not perform well, as indicated by low MCC scores.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT monitoring and control system of Distribution Transformers in Rwanda 卢旺达配电变压器物联网监控系统
E. Bimenyimana, P. Nsengiyumva, Said Rutabayiro Ngoga
In developing countries, many customers do not get good quality of electricity power supply due to frequent and prolonged power fluctuations/cuts. Distribution transformer (DT) is a service transformer that provides the final voltage transformation in the electric power distribution system, stepping down the voltage to the level used by the customers. Monitoring and control of DT (as a crucial and expensive asset in the network) is a key enabler of power stability to consumers. A power utility is said to be a business oriented with good image representation if it delivers a reliable and affordable electricity. Modern technologies such as the Internet of Things (IoT) offer a wide range of applications in the energy sector to smoothly monitor, control and optimize processes. Currently, many energy companies in developing countries are not yet implementing the remote system to control and monitor the secondary side of DTs and timely get the notifications of fluctuations/abnormalities occurred on those DTs. That is why it is still challenging and time consuming to intervene urgently and do the necessary actions to prevent severe and prolonged power cuts/fluctuations and safeguard the damage of DTs themselves with customer's appliances connected on those DTs. The secondary side of DT is the one connected directly and supply power to the customers. For this reason, we developed an affordable IoT system that automatically detects the abnormalities/fluctuations of three core technical parameters of DT (which are voltage, current and temperature) using current sensors, voltage sensors, and temperature sensor with ATmega 328P Microcontroller to collect and process data from sensors connected to DT system. Once one or all of those technical parameters become abnormal, the system cut off automatically the secondary side of DT in 2 seconds to isolate and protect the customers’ load with safeguarding DT itself using a power relay. At the same time, GSM/GPRS module uploads the sensed abnormal data to the cloud storage, displays them on web-based application for visualization, and sends the corresponding short message service (sms) to notify the issue to the authorized person in 5 seconds for speeding up the interventions and power restoration. In case there is a movement related to the vandalism in the compound of DT, a PIR sensor detects the human motion then a camera takes the related picture and send it to the utility with the corresponding sms. A buzzer generates an audio signaling to warn the culprit/criminal until he left the site. If there is no abnormality detected, the system keeps sensing without sending the data to the cloud. We can open and close remotely the secondary side of DT and buzzer. This system is powered using a rechargeable battery.
在发展中国家,由于频繁和长时间的电力波动/停电,许多客户无法获得高质量的电力供应。配电变压器(DT)是在配电系统中提供最终电压转换的服务变压器,将电压降压到用户使用的水平。监测和控制DT(作为网络中重要且昂贵的资产)是消费者电力稳定的关键因素。如果电力公司提供可靠且价格合理的电力,就被认为是具有良好形象的企业。物联网(IoT)等现代技术在能源领域提供了广泛的应用,可以顺利监控、控制和优化流程。目前,发展中国家的许多能源公司尚未实施远程系统,以控制和监测dt的二次侧,并及时获得dt上发生的波动/异常的通知。这就是为什么紧急干预并采取必要行动以防止严重和长时间的停电/波动并保护dt本身的损坏(客户的设备连接在这些dt上)仍然具有挑战性和耗时。DT的二次侧是直接连接给用户供电的侧。为此,我们开发了一个经济实惠的物联网系统,该系统使用电流传感器,电压传感器和温度传感器,结合ATmega 328P微控制器,自动检测DT三个核心技术参数(电压,电流和温度)的异常/波动,收集和处理连接到DT系统的传感器的数据。一旦这些技术参数中的一个或全部出现异常,系统在2秒内自动切断DT的二次侧,通过功率继电器保护DT本身,隔离和保护客户负载。同时,GSM/GPRS模块将检测到的异常数据上传到云存储,并在web应用程序上进行可视化显示,并发送相应的短消息服务,在5秒内将问题通知给授权人员,加快干预和电力恢复。如果在DT化合物中有与破坏有关的运动,PIR传感器检测到人体运动,然后相机拍摄相关照片并将其与相应的短信一起发送给公用事业。蜂鸣器会发出音频信号,警告罪犯,直到他离开现场。如果没有检测到异常,系统将继续感知,而不会将数据发送到云端。我们可以远程打开和关闭DT和蜂鸣器的二次侧。该系统使用可充电电池供电。
{"title":"IoT monitoring and control system of Distribution Transformers in Rwanda","authors":"E. Bimenyimana, P. Nsengiyumva, Said Rutabayiro Ngoga","doi":"10.1145/3587828.3587866","DOIUrl":"https://doi.org/10.1145/3587828.3587866","url":null,"abstract":"In developing countries, many customers do not get good quality of electricity power supply due to frequent and prolonged power fluctuations/cuts. Distribution transformer (DT) is a service transformer that provides the final voltage transformation in the electric power distribution system, stepping down the voltage to the level used by the customers. Monitoring and control of DT (as a crucial and expensive asset in the network) is a key enabler of power stability to consumers. A power utility is said to be a business oriented with good image representation if it delivers a reliable and affordable electricity. Modern technologies such as the Internet of Things (IoT) offer a wide range of applications in the energy sector to smoothly monitor, control and optimize processes. Currently, many energy companies in developing countries are not yet implementing the remote system to control and monitor the secondary side of DTs and timely get the notifications of fluctuations/abnormalities occurred on those DTs. That is why it is still challenging and time consuming to intervene urgently and do the necessary actions to prevent severe and prolonged power cuts/fluctuations and safeguard the damage of DTs themselves with customer's appliances connected on those DTs. The secondary side of DT is the one connected directly and supply power to the customers. For this reason, we developed an affordable IoT system that automatically detects the abnormalities/fluctuations of three core technical parameters of DT (which are voltage, current and temperature) using current sensors, voltage sensors, and temperature sensor with ATmega 328P Microcontroller to collect and process data from sensors connected to DT system. Once one or all of those technical parameters become abnormal, the system cut off automatically the secondary side of DT in 2 seconds to isolate and protect the customers’ load with safeguarding DT itself using a power relay. At the same time, GSM/GPRS module uploads the sensed abnormal data to the cloud storage, displays them on web-based application for visualization, and sends the corresponding short message service (sms) to notify the issue to the authorized person in 5 seconds for speeding up the interventions and power restoration. In case there is a movement related to the vandalism in the compound of DT, a PIR sensor detects the human motion then a camera takes the related picture and send it to the utility with the corresponding sms. A buzzer generates an audio signaling to warn the culprit/criminal until he left the site. If there is no abnormality detected, the system keeps sensing without sending the data to the cloud. We can open and close remotely the secondary side of DT and buzzer. This system is powered using a rechargeable battery.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transplanting of Environments between Closures in the lambda calculus 在lambda演算中的闭包之间移植环境
S. Nishizaki
In programming languages, a function closure is a function whose body includes possibly free variables and that is accompanied by association with their values. The association of variables with their values is called an environment. If a programming language uses lexical scope and treats functions as first-class objects, then function closures are mandatory. Function closures are provided in Common Lisp, Emacs Lisp, Scheme and other dialects of LISP, as well as in modern scripting languages such as Python, JavaScript and Ruby, and procedural languages such as C++. In our previous paper, we proposed a mechanism that enables us to extract an environment part from a function closure. However, it brings a situation that environments must be handled as a first-class object, which is a huge extension of the traditional theory to be avoid if possible, since several desirable properties will be lost. This paper presents a method for replacing the environment of a function closure in the lambda calculus with the environment of another function closure. By taking this approach rather than extracting the environment from the function closure and using it, it ise to avoid treating the environment directly as a first-class object. We introduce a new computational system called lambda calculus with environment transplantation to explore the theoretical aspects of this process. Our system is defined by its syntax and reduction rules, and we provide a semantics for it through a transformation to the lambda calculus with records. The soundness of the reduction is demonstrated within this transformation semantics. Additionally, we give a simple type system to our calculus and show its subject reduction system.
在编程语言中,函数闭包是这样一种函数,它的函数体可能包含自由变量,并伴随着与这些变量的值的关联。变量与其值的关联称为环境。如果一种编程语言使用词法作用域并将函数视为一级对象,那么函数闭包是强制性的。Common Lisp、Emacs Lisp、Scheme和其他Lisp方言以及现代脚本语言(如Python、JavaScript和Ruby)和过程语言(如c++)都提供了函数闭包。在我们之前的论文中,我们提出了一种机制,使我们能够从函数闭包中提取环境部分。然而,它带来了必须将环境作为一级对象来处理的情况,这是传统理论的一个巨大延伸,如果可能的话要避免,因为一些理想的属性将会丢失。本文提出了一种将lambda演算中的函数闭包环境替换为另一个函数闭包环境的方法。通过采用这种方法而不是从函数闭包中提取环境并使用它,可以避免将环境直接视为第一类对象。我们引入了一个新的计算系统,称为λ演算与环境移植来探索这一过程的理论方面。我们的系统是由它的语法和约简规则定义的,我们通过对带有记录的lambda演算的转换为它提供语义。约简的合理性在这个转换语义中得到了证明。此外,我们给出了一个简单的类型系统,并展示了它的主题约简系统。
{"title":"Transplanting of Environments between Closures in the lambda calculus","authors":"S. Nishizaki","doi":"10.1145/3587828.3587847","DOIUrl":"https://doi.org/10.1145/3587828.3587847","url":null,"abstract":"In programming languages, a function closure is a function whose body includes possibly free variables and that is accompanied by association with their values. The association of variables with their values is called an environment. If a programming language uses lexical scope and treats functions as first-class objects, then function closures are mandatory. Function closures are provided in Common Lisp, Emacs Lisp, Scheme and other dialects of LISP, as well as in modern scripting languages such as Python, JavaScript and Ruby, and procedural languages such as C++. In our previous paper, we proposed a mechanism that enables us to extract an environment part from a function closure. However, it brings a situation that environments must be handled as a first-class object, which is a huge extension of the traditional theory to be avoid if possible, since several desirable properties will be lost. This paper presents a method for replacing the environment of a function closure in the lambda calculus with the environment of another function closure. By taking this approach rather than extracting the environment from the function closure and using it, it ise to avoid treating the environment directly as a first-class object. We introduce a new computational system called lambda calculus with environment transplantation to explore the theoretical aspects of this process. Our system is defined by its syntax and reduction rules, and we provide a semantics for it through a transformation to the lambda calculus with records. The soundness of the reduction is demonstrated within this transformation semantics. Additionally, we give a simple type system to our calculus and show its subject reduction system.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unique PUF Authentication Protocol Based Fuzzy Logic Categorization for Internet of Things (IOT) Devices 基于模糊逻辑分类的物联网设备PUF认证协议
J. S. Yalli, M. H. Hasan
IoT will be the main component of the next era of computing. IoT devices are increasing in number and will continue to increase due to automation. According to cisco, up to 50 billion devices and objects get connected with each other and to the internet in 2020 [1, 6]. IoT application domains includes smart environments, smart grid, smart cities, smart healthcare, smart industries, smart agriculture, smart home, smart transportation etc [2]. However, the IoT devices are characterized as resource constrained with low computational ability, lower power consumption and small memory. PUF is embedded on IoT device to uniquely identify the device. This characteristic feature of PUF is unique and unclonable, while fuzzy logic's ability to deal with uncertainty and hazy or vague information is used to categorize nodes by computing its record, status and reputation, so that nodes are authenticated according to the trust values it attained. The authentication is in three phases; first, second and third. With PUF's unique physical characteristics; authentication, reliability and lightweight are achieved.
物联网将成为下一个计算时代的主要组成部分。物联网设备的数量正在增加,并且由于自动化将继续增加。根据思科的数据,到2020年,将有多达500亿个设备和物体相互连接并连接到互联网[1,6]。物联网应用领域包括智能环境、智能电网、智慧城市、智能医疗、智能工业、智能农业、智能家居、智能交通等[2]。然而,物联网设备的特点是资源受限,计算能力低,功耗低,内存小。PUF嵌入物联网设备中,用于唯一标识设备。PUF的这一特征具有唯一性和不可克隆性,而模糊逻辑则利用其处理不确定性和模糊信息的能力,通过计算节点的记录、状态和信誉对节点进行分类,从而根据其获得的信任值对节点进行认证。认证分为三个阶段;第一,第二,第三。具有PUF独特的物理特性;实现了身份验证、可靠性和轻量级。
{"title":"A Unique PUF Authentication Protocol Based Fuzzy Logic Categorization for Internet of Things (IOT) Devices","authors":"J. S. Yalli, M. H. Hasan","doi":"10.1145/3587828.3587865","DOIUrl":"https://doi.org/10.1145/3587828.3587865","url":null,"abstract":"IoT will be the main component of the next era of computing. IoT devices are increasing in number and will continue to increase due to automation. According to cisco, up to 50 billion devices and objects get connected with each other and to the internet in 2020 [1, 6]. IoT application domains includes smart environments, smart grid, smart cities, smart healthcare, smart industries, smart agriculture, smart home, smart transportation etc [2]. However, the IoT devices are characterized as resource constrained with low computational ability, lower power consumption and small memory. PUF is embedded on IoT device to uniquely identify the device. This characteristic feature of PUF is unique and unclonable, while fuzzy logic's ability to deal with uncertainty and hazy or vague information is used to categorize nodes by computing its record, status and reputation, so that nodes are authenticated according to the trust values it attained. The authentication is in three phases; first, second and third. With PUF's unique physical characteristics; authentication, reliability and lightweight are achieved.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120973790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Effect of White Balance for Color Constancy on Visible Light 白平衡对可见光色恒性的影响
Toni Kusnandar, J. Santoso, K. Surendro
Plant health conditions can be done by calculating the vegetation index. The vegetation index produced by the camera in visible light is more economical than multi spectral or hyper spectral cameras. Image information from visible light cameras will provide an RGB (Red-Green-Blue) value for each pixel to be used to calculate the vegetation index. The RGB value will be greatly influenced by the light conditions (scene) at the time of image acquisition by the camera. Image of plants, will be influenced by the variability of high illumination conditions due to changes in various natural lighting conditions; bright, cloudy, or illuminating nearby objects. To get the right RGB value from each pixel of the image, it is necessary to make adjustments with a certain white balance method. The development of white balance research is also carried out by looking for the value of color constancy. Because the color of the light source, the inherent qualities of the object, and the color of the object's surface will determine the object's color, Color Constancy is performed.. The information generated by the reflectance of light from the surface of a shiny object (reflective) is better than that of a non-shiny object. In this study, experiments were conducted on the effect of the white balance method on color constancy in visible light. The experimental results on the data set processed by the white balance gray world and white patch methods show that there are different RGB values.
植物健康状况可以通过计算植被指数来实现。相机在可见光下产生的植被指数比多光谱或高光谱相机更经济。来自可见光相机的图像信息将为每个像素提供RGB(红-绿-蓝)值,用于计算植被指数。相机采集图像时的光照条件(场景)对RGB值的影响很大。植物的影像,会因各种自然光照条件的变化而受到高照度条件的变异性影响;明亮的,多云的或照亮附近物体的为了从图像的每个像素中获得正确的RGB值,需要用一定的白平衡方法进行调整。白平衡研究的发展也是通过寻找色彩常数的值来进行的。因为光源的颜色、物体的固有品质以及物体表面的颜色都会决定物体的颜色,所以执行color Constancy。有光泽物体表面的光反射(反光)产生的信息比无光泽物体表面的信息要好。本研究对白平衡法对可见光颜色恒常性的影响进行了实验研究。实验结果表明,采用白平衡灰世界法和白patch法处理的数据集存在不同的RGB值。
{"title":"The Effect of White Balance for Color Constancy on Visible Light","authors":"Toni Kusnandar, J. Santoso, K. Surendro","doi":"10.1145/3587828.3587850","DOIUrl":"https://doi.org/10.1145/3587828.3587850","url":null,"abstract":"Plant health conditions can be done by calculating the vegetation index. The vegetation index produced by the camera in visible light is more economical than multi spectral or hyper spectral cameras. Image information from visible light cameras will provide an RGB (Red-Green-Blue) value for each pixel to be used to calculate the vegetation index. The RGB value will be greatly influenced by the light conditions (scene) at the time of image acquisition by the camera. Image of plants, will be influenced by the variability of high illumination conditions due to changes in various natural lighting conditions; bright, cloudy, or illuminating nearby objects. To get the right RGB value from each pixel of the image, it is necessary to make adjustments with a certain white balance method. The development of white balance research is also carried out by looking for the value of color constancy. Because the color of the light source, the inherent qualities of the object, and the color of the object's surface will determine the object's color, Color Constancy is performed.. The information generated by the reflectance of light from the surface of a shiny object (reflective) is better than that of a non-shiny object. In this study, experiments were conducted on the effect of the white balance method on color constancy in visible light. The experimental results on the data set processed by the white balance gray world and white patch methods show that there are different RGB values.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Analytics Model for Optimizing Carbon Emission from Student Activity and Behavior with A Design Thinking Approach: Case Study: Bandung Institute of Technology 用设计思维方法优化学生活动和行为的碳排放预测分析模型:案例研究:万隆理工学院
Michael Hans, Erna Hikmawati, K. Surendro
Global warming is starting to become a major issue to maintain the sustainability of the environment and the earth. This phenomenon is caused by high greenhouse gas emissions, most of which come from human activities. At the university level, there have been many studies related to carbon footprint in universities, but only a few have studied the behavior and activities of the people in it, especially students. Predictive Analytics can be applied as the model to predict the future trends of emission carbon in the university based on the emission carbon data. Design Thinking can be used as an approach to solve such an abstract and complex problem to use the emission data to optimize carbon emissions at the student level. This research is expected to provide insights for universities regarding their level of carbon footprint and provide awareness of this so that several decision-making steps can be taken regarding optimizing carbon emissions at the student level. Bandung Institute of Technology will be the subject of this research. This study is preliminary research which will be implemented in the future work.
全球变暖正开始成为维持环境和地球可持续性的主要问题。这种现象是由大量温室气体排放造成的,其中大部分来自人类活动。在大学层面,有关大学碳足迹的研究很多,但对大学中人,尤其是学生的行为和活动进行研究的却很少。基于碳排放数据,预测分析可以作为预测未来大学碳排放趋势的模型。设计思维可以作为一种方法来解决这样一个抽象而复杂的问题,利用排放数据来优化学生层面的碳排放。这项研究有望为大学提供有关其碳足迹水平的见解,并提供这方面的认识,以便采取一些决策步骤来优化学生层面的碳排放。万隆理工学院将是本次研究的对象。本研究为初步研究,将在今后的工作中实施。
{"title":"Predictive Analytics Model for Optimizing Carbon Emission from Student Activity and Behavior with A Design Thinking Approach: Case Study: Bandung Institute of Technology","authors":"Michael Hans, Erna Hikmawati, K. Surendro","doi":"10.1145/3587828.3587841","DOIUrl":"https://doi.org/10.1145/3587828.3587841","url":null,"abstract":"Global warming is starting to become a major issue to maintain the sustainability of the environment and the earth. This phenomenon is caused by high greenhouse gas emissions, most of which come from human activities. At the university level, there have been many studies related to carbon footprint in universities, but only a few have studied the behavior and activities of the people in it, especially students. Predictive Analytics can be applied as the model to predict the future trends of emission carbon in the university based on the emission carbon data. Design Thinking can be used as an approach to solve such an abstract and complex problem to use the emission data to optimize carbon emissions at the student level. This research is expected to provide insights for universities regarding their level of carbon footprint and provide awareness of this so that several decision-making steps can be taken regarding optimizing carbon emissions at the student level. Bandung Institute of Technology will be the subject of this research. This study is preliminary research which will be implemented in the future work.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Campus Bus Tracking System using LoRa Technology: IoT System Testing 使用LoRa技术的校园巴士跟踪系统:物联网系统测试
Ahmad Hanis Mohd Shabli, Mawarny Md. Rejab, Nur Hani Zulkifli Abai, S. C. Chit
The adoption of the Internet of Things (IoT) enables Universiti Utara Malaysia (UUM) to create a smart campus by creating and implementing a number of intelligent applications, programmes, and services to address challenges and issues experienced by students. UUM was compelled to find a solution because of the inadequacy of the bus services offered to meet the student needs. In order to enable students to observe the available bases, routes, and locations of buses, this study developed a campus bus tracking system employing IoT technology using LoRa technology. In this study, LoRa technology was highlighted to manage patchy internet connection within campus. This paper focuses on the hardware testing and user viewpoint testing of the proposed system. Based on the survey, respondents were happy with the system's performance, usability, and effectiveness. The use of the suggested approach can resolve the mentioned issue of inadequate bus services offered to meet the needs of students.
物联网(IoT)的采用使马来西亚北方大学(UUM)能够通过创建和实施一系列智能应用程序、计划和服务来创建一个智能校园,以解决学生遇到的挑战和问题。由于提供的巴士服务不足以满足学生的需求,UUM被迫寻找解决方案。为了使学生能够观察到公交车的可用基地、路线和位置,本研究利用LoRa技术开发了一种采用物联网技术的校园公交车跟踪系统。在这项研究中,LoRa技术被重点用于管理校园内不完整的互联网连接。本文重点对所提出的系统进行了硬件测试和用户视角测试。根据调查,受访者对系统的性能、可用性和有效性感到满意。使用建议的方法可以解决上述巴士服务不足的问题,以满足学生的需要。
{"title":"Campus Bus Tracking System using LoRa Technology: IoT System Testing","authors":"Ahmad Hanis Mohd Shabli, Mawarny Md. Rejab, Nur Hani Zulkifli Abai, S. C. Chit","doi":"10.1145/3587828.3587863","DOIUrl":"https://doi.org/10.1145/3587828.3587863","url":null,"abstract":"The adoption of the Internet of Things (IoT) enables Universiti Utara Malaysia (UUM) to create a smart campus by creating and implementing a number of intelligent applications, programmes, and services to address challenges and issues experienced by students. UUM was compelled to find a solution because of the inadequacy of the bus services offered to meet the student needs. In order to enable students to observe the available bases, routes, and locations of buses, this study developed a campus bus tracking system employing IoT technology using LoRa technology. In this study, LoRa technology was highlighted to manage patchy internet connection within campus. This paper focuses on the hardware testing and user viewpoint testing of the proposed system. Based on the survey, respondents were happy with the system's performance, usability, and effectiveness. The use of the suggested approach can resolve the mentioned issue of inadequate bus services offered to meet the needs of students.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Morfawk.ja: A Japanese Token Level Pattern Matching and Processing Language with Dependency Analysis Morfawk。具有依赖性分析的日文令牌级模式匹配和处理语言
Tsuneo Nakanishi, Hokuto Ototake, Toshifumi Tanabe, Kenji Yoshimura
The quality of development documents written in natural language is basically ensured by developer's review with quite a few man-hours. Natural language processing (NLP) tools can partially automate the time-consuming review. The authors have developed morpheme level pattern matching and processing tools morfgrep and morfawk for Japanese texts for this purpose; moreover, in this paper, extends them to perform pattern matching on dependency among phrases. Example applications of the tools, proofreading of development documents and domain-specific term extraction, are also presented.
用自然语言编写的开发文档的质量基本上是通过开发人员的审核来保证的。自然语言处理(NLP)工具可以部分地自动化耗时的审查。为此,作者开发了日语文本的语素级模式匹配和处理工具morfgrep和morfawk;在此基础上,本文将其扩展为基于短语间依赖关系的模式匹配。还介绍了这些工具的示例应用,包括开发文档的校对和特定领域的术语提取。
{"title":"Morfawk.ja: A Japanese Token Level Pattern Matching and Processing Language with Dependency Analysis","authors":"Tsuneo Nakanishi, Hokuto Ototake, Toshifumi Tanabe, Kenji Yoshimura","doi":"10.1145/3587828.3587878","DOIUrl":"https://doi.org/10.1145/3587828.3587878","url":null,"abstract":"The quality of development documents written in natural language is basically ensured by developer's review with quite a few man-hours. Natural language processing (NLP) tools can partially automate the time-consuming review. The authors have developed morpheme level pattern matching and processing tools morfgrep and morfawk for Japanese texts for this purpose; moreover, in this paper, extends them to perform pattern matching on dependency among phrases. Example applications of the tools, proofreading of development documents and domain-specific term extraction, are also presented.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131678491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2023 12th International Conference on Software and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1