首页 > 最新文献

2020 31st Irish Signals and Systems Conference (ISSC)最新文献

英文 中文
Polar code performance with Doppler shifts and reflections in Rayleigh fading for Industrial channels 工业信道中具有多普勒频移和瑞利衰落反射的极码性能
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180204
Y. Samarawickrama, V. Cionca
Industry 4.0 has created a strong pull for wireless communications. Industrial applications have tight communication constraints putting them in the class of Ultra Reliable, Low Latency Communication (URLLC). Polar codes have recently become a primary contender for satisfying URLLC requirements. Their performance is heavily dependent on the channel state and with industrial environments presenting extreme conditions with highly dynamic radio channels, obtaining high reliability from polar codes is challenging. Pilot Assisted Transmission allows channel estimation and can improve the reliability of polar codes in fading channels. However a detailed analysis of the impact of the channel dynamics and PAT scheme on the polar code performance is not available. This paper models the industrial radio channel as a Rayleigh channel affected by Doppler shift and delay spread. We evaluate the channel estimation and Bit Error Rate improvements that can be achieved using PAT with variable pilot interval. We detail the behaviour of polar codes subjected to Doppler shift and delay spread. Finally, we investigate the trade-off between reliability and maximum achievable data rate based on PAT interval and code rate. The existence of a trade-off indicates scope for optimization of PAT parameters depending on channel conditions.
工业4.0为无线通信创造了强大的吸引力。工业应用具有严格的通信限制,将它们置于超可靠、低延迟通信(URLLC)的类别中。Polar码最近已经成为满足URLLC需求的主要竞争者。它们的性能在很大程度上取决于信道状态,并且在具有高动态无线电信道的极端条件的工业环境中,从极性编码中获得高可靠性是具有挑战性的。导频辅助传输允许信道估计,可以提高衰落信道中极化码的可靠性。然而,信道动态和PAT方案对极化码性能影响的详细分析尚未得到。本文将工业无线电信道建模为受多普勒频移和时延扩展影响的瑞利信道。我们评估了使用可变导频间隔的PAT可以实现的信道估计和误码率改进。我们详细介绍了极化码在多普勒频移和延迟扩散下的行为。最后,我们研究了基于PAT间隔和码率的可靠性和最大可实现数据率之间的权衡。权衡的存在表明了根据信道条件优化PAT参数的范围。
{"title":"Polar code performance with Doppler shifts and reflections in Rayleigh fading for Industrial channels","authors":"Y. Samarawickrama, V. Cionca","doi":"10.1109/ISSC49989.2020.9180204","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180204","url":null,"abstract":"Industry 4.0 has created a strong pull for wireless communications. Industrial applications have tight communication constraints putting them in the class of Ultra Reliable, Low Latency Communication (URLLC). Polar codes have recently become a primary contender for satisfying URLLC requirements. Their performance is heavily dependent on the channel state and with industrial environments presenting extreme conditions with highly dynamic radio channels, obtaining high reliability from polar codes is challenging. Pilot Assisted Transmission allows channel estimation and can improve the reliability of polar codes in fading channels. However a detailed analysis of the impact of the channel dynamics and PAT scheme on the polar code performance is not available. This paper models the industrial radio channel as a Rayleigh channel affected by Doppler shift and delay spread. We evaluate the channel estimation and Bit Error Rate improvements that can be achieved using PAT with variable pilot interval. We detail the behaviour of polar codes subjected to Doppler shift and delay spread. Finally, we investigate the trade-off between reliability and maximum achievable data rate based on PAT interval and code rate. The existence of a trade-off indicates scope for optimization of PAT parameters depending on channel conditions.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Augmented Dataset and Annotation Frameworks for Artificial Intelligence (GADAFAI) 面向人工智能的生成增强数据集和注释框架(GADAFAI)
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180200
P. Corcoran, Hossein Javidnia, Joseph Lemley, Viktor Varkarakis
Recent Advances in Artificial Intelligence (AI), particularly in the field of compute vision, have been driven by the availability of large public datasets. However, as AI begins to move into embedded devices there will be a growing need for tools to acquire and re-acquire datasets from specific sensing systems to train new device models. In this paper, a roadmap in introduced for a data-acquisition framework that can build the large synthetic datasets required to train AI systems from small seed datasets. A key element to justify such a framework is the validation of the generated dataset and example results are shown from preliminary work on biometric (facial) datasets.
人工智能(AI)的最新进展,特别是在计算视觉领域,是由大型公共数据集的可用性推动的。然而,随着人工智能开始进入嵌入式设备,将越来越需要工具来获取和重新获取来自特定传感系统的数据集,以训练新的设备模型。在本文中,介绍了数据采集框架的路线图,该框架可以构建从小种子数据集训练人工智能系统所需的大型合成数据集。证明这种框架的一个关键因素是对生成的数据集进行验证,并从生物特征(面部)数据集的初步工作中显示示例结果。
{"title":"Generative Augmented Dataset and Annotation Frameworks for Artificial Intelligence (GADAFAI)","authors":"P. Corcoran, Hossein Javidnia, Joseph Lemley, Viktor Varkarakis","doi":"10.1109/ISSC49989.2020.9180200","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180200","url":null,"abstract":"Recent Advances in Artificial Intelligence (AI), particularly in the field of compute vision, have been driven by the availability of large public datasets. However, as AI begins to move into embedded devices there will be a growing need for tools to acquire and re-acquire datasets from specific sensing systems to train new device models. In this paper, a roadmap in introduced for a data-acquisition framework that can build the large synthetic datasets required to train AI systems from small seed datasets. A key element to justify such a framework is the validation of the generated dataset and example results are shown from preliminary work on biometric (facial) datasets.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121566841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Countermeasure Knowledge for Intrusion Response Systems 入侵响应系统的动态对策知识
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180198
Kieran Hughes, K. Mclaughlin, S. Sezer
Significant advancements in Intrusion Detection Systems has led to improved alerts. However, Intrusion Response Systems which aim to automatically respond to these alerts, is a research area which is not yet advanced enough to benefit from full automation. In Security Operations Centres, analysts can implement countermeasures using knowledge and past experience to adapt to new attacks. Attempts at automated Intrusion Response Systems fall short when a new attack occurs to which the system has no specific knowledge or effective countermeasure to apply, even leading to overkill countermeasures such as restarting services and blocking ports or IPs. In this paper, a countermeasure standard is proposed which enables countermeasure intelligence sharing, automated countermeasure adoption and execution by an Intrusion Response System. An attack scenario is created on an emulated network using the Common Open Research Emulator, where an insider attack attempts to exploit a buffer overflow on an Exim mail server. Experiments demonstrate that an Intrusion Response System with dynamic countermeasure knowledge can stop attacks that would otherwise succeed with a static predefined countermeasure approach.
入侵检测系统的重大进步导致了警报的改进。然而,旨在自动响应这些警报的入侵响应系统是一个尚不够先进的研究领域,无法从完全自动化中受益。在安全运营中心,分析人员可以利用知识和过去的经验实施对策,以适应新的攻击。当新的攻击发生时,系统没有特定的知识或有效的应对措施,甚至导致重新启动服务和阻止端口或ip等过度的应对措施,自动入侵响应系统的尝试就会失败。本文提出了一种对抗标准,实现了入侵响应系统对对抗情报的共享、对对抗的自动采用和执行。使用Common Open Research Emulator在模拟网络上创建攻击场景,其中内部攻击试图利用Exim邮件服务器上的缓冲区溢出。实验表明,具有动态对抗知识的入侵响应系统能够有效阻止静态预定义对抗方法无法成功实施的攻击。
{"title":"Dynamic Countermeasure Knowledge for Intrusion Response Systems","authors":"Kieran Hughes, K. Mclaughlin, S. Sezer","doi":"10.1109/ISSC49989.2020.9180198","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180198","url":null,"abstract":"Significant advancements in Intrusion Detection Systems has led to improved alerts. However, Intrusion Response Systems which aim to automatically respond to these alerts, is a research area which is not yet advanced enough to benefit from full automation. In Security Operations Centres, analysts can implement countermeasures using knowledge and past experience to adapt to new attacks. Attempts at automated Intrusion Response Systems fall short when a new attack occurs to which the system has no specific knowledge or effective countermeasure to apply, even leading to overkill countermeasures such as restarting services and blocking ports or IPs. In this paper, a countermeasure standard is proposed which enables countermeasure intelligence sharing, automated countermeasure adoption and execution by an Intrusion Response System. An attack scenario is created on an emulated network using the Common Open Research Emulator, where an insider attack attempts to exploit a buffer overflow on an Exim mail server. Experiments demonstrate that an Intrusion Response System with dynamic countermeasure knowledge can stop attacks that would otherwise succeed with a static predefined countermeasure approach.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132424713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating Supervised Machine Learning Techniques for Channel Identification in Wireless Sensor Networks 无线传感器网络中信道识别的监督机器学习技术研究
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180209
George D. O’Mahony, Philip J. Harris, Colin C. Murphy
Knowledge of the wireless channel is pivotal for wireless communication links but varies for multiple reasons. The radio spectrum changes due to the number of connected devices, demand, packet size or services in operation, while fading levels, obstacles, path losses, and spurious (non-)malicious interference fluctuate in the physical environment. Typically, these channels are applicable to the time series class of data science problems, as the primary data points are measured over a period. In the case of wireless sensor networks, which regularly provide the device to access point communication links in Internet of Things applications, determining the wireless channel in operation permits channel access. Generally, a clear channel assessment is performed to determine whether a wireless transmission can be executed, which is an approach containing limitations. In this study, received in-phase (I) and quadrature-phase (Q) samples are collected from the wireless channel using a software-defined radio (SDR) based procedure and directly analyzed using python and Matlab. Features are extracted from the probability density function and statistical analysis of the received I/Q samples and used as the training data for the two chosen machine learning methods. Data is collected and produced over wires, to avoid interfering with other networks, using SDRs and Raspberry Pi embedded devices, which utilize available open-source libraries. Data is examined for the signal-free (noise), legitimate signal (ZigBee) and jamming signal (continuous wave) cases in a live laboratory environment. Support vector machine and Random Forest models are each designed and compared as channel identifiers for these signal types.
无线信道的知识对于无线通信链路是至关重要的,但由于多种原因而有所不同。无线电频谱由于连接设备的数量、需求、分组大小或运行中的业务而变化,而衰落水平、障碍物、路径损失和虚假(非)恶意干扰在物理环境中波动。通常,这些通道适用于数据科学问题的时间序列类,因为主要数据点是在一段时间内测量的。在物联网应用中,无线传感器网络定期为设备提供接入点通信链路,确定运行中的无线通道允许通道访问。通常,通过清晰信道评估来确定是否可以执行无线传输,这是一种有局限性的方法。在本研究中,使用基于软件定义无线电(SDR)的程序从无线信道中收集接收到的同相(I)和正交相(Q)样本,并使用python和Matlab直接进行分析。从接收到的I/Q样本的概率密度函数和统计分析中提取特征,作为所选择的两种机器学习方法的训练数据。数据是通过电线收集和产生的,以避免干扰其他网络,使用sdr和树莓派嵌入式设备,利用可用的开源库。在现场实验室环境中对无信号(噪声)、合法信号(ZigBee)和干扰信号(连续波)进行了数据检查。分别设计并比较了支持向量机和随机森林模型作为这些信号类型的通道标识符。
{"title":"Investigating Supervised Machine Learning Techniques for Channel Identification in Wireless Sensor Networks","authors":"George D. O’Mahony, Philip J. Harris, Colin C. Murphy","doi":"10.1109/ISSC49989.2020.9180209","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180209","url":null,"abstract":"Knowledge of the wireless channel is pivotal for wireless communication links but varies for multiple reasons. The radio spectrum changes due to the number of connected devices, demand, packet size or services in operation, while fading levels, obstacles, path losses, and spurious (non-)malicious interference fluctuate in the physical environment. Typically, these channels are applicable to the time series class of data science problems, as the primary data points are measured over a period. In the case of wireless sensor networks, which regularly provide the device to access point communication links in Internet of Things applications, determining the wireless channel in operation permits channel access. Generally, a clear channel assessment is performed to determine whether a wireless transmission can be executed, which is an approach containing limitations. In this study, received in-phase (I) and quadrature-phase (Q) samples are collected from the wireless channel using a software-defined radio (SDR) based procedure and directly analyzed using python and Matlab. Features are extracted from the probability density function and statistical analysis of the received I/Q samples and used as the training data for the two chosen machine learning methods. Data is collected and produced over wires, to avoid interfering with other networks, using SDRs and Raspberry Pi embedded devices, which utilize available open-source libraries. Data is examined for the signal-free (noise), legitimate signal (ZigBee) and jamming signal (continuous wave) cases in a live laboratory environment. Support vector machine and Random Forest models are each designed and compared as channel identifiers for these signal types.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber-security considerations for domestic-level automated demand-response systems utilizing public-key infrastructure and ISO/IEC 20922 使用公钥基础设施和ISO/IEC 20922的国内级自动化需求响应系统的网络安全考虑
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180208
John Hastings, D. Laverty, A. Jahic, D. Morrow, P. Brogan
In this paper, the Authors present MQTT (ISO/IEC 20922), coupled with Public-key Infrastructure (PKI) as being highly suited to the secure and timely delivery of the command and control messages required in a low-latency Automated Demand Response (ADR) system which makes use of domestic-level electrical loads connected to the Internet. Several use cases for ADR are introduced, and relevant security considerations are discussed; further emphasizing the suitability of the proposed infrastructure. The authors then describe their testbed platform for testing ADR functionality, and finally discuss the next steps towards getting these kinds of technologies to the next stage.
在本文中,作者提出MQTT (ISO/IEC 20922)与公钥基础设施(PKI)相结合,非常适合于安全及时地交付低延迟自动需求响应(ADR)系统所需的命令和控制消息,该系统利用连接到互联网的家庭级电力负载。介绍了ADR的几个用例,并讨论了相关的安全考虑;进一步强调拟议基础设施的适宜性。作者随后描述了他们用于测试ADR功能的测试平台,最后讨论了使这些技术进入下一阶段的下一步步骤。
{"title":"Cyber-security considerations for domestic-level automated demand-response systems utilizing public-key infrastructure and ISO/IEC 20922","authors":"John Hastings, D. Laverty, A. Jahic, D. Morrow, P. Brogan","doi":"10.1109/ISSC49989.2020.9180208","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180208","url":null,"abstract":"In this paper, the Authors present MQTT (ISO/IEC 20922), coupled with Public-key Infrastructure (PKI) as being highly suited to the secure and timely delivery of the command and control messages required in a low-latency Automated Demand Response (ADR) system which makes use of domestic-level electrical loads connected to the Internet. Several use cases for ADR are introduced, and relevant security considerations are discussed; further emphasizing the suitability of the proposed infrastructure. The authors then describe their testbed platform for testing ADR functionality, and finally discuss the next steps towards getting these kinds of technologies to the next stage.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127953016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-step ahead wind power forecasting for Ireland using an ensemble of VMD-ELM models 利用VMD-ELM模型集合对爱尔兰的风力发电进行超前多步预测
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180155
J. M. González-Sopeña, V. Pakrashi, Bidisha Ghosh
Accurate wind power forecasts are a key tool for the correct operation of the grid and the energy trading market, particularly in regions with a large wind resource as Ireland, where wind energy comprises a large share of the electricity generated. A multi-step ahead wind power forecasting ensemble of models based on variational mode decomposition and extreme learning machines is employed in this paper to be applied for Irish wind farms. Data from two wind farms placed in different locations are used to show the suitability of the model for Ireland. The results show that the use of this full ensemble of models provides more reliable and robust forecasts for several prediction horizons and an improvement between 7% and 22% with respect to a single model. Additionally, the ensemble shows a low systematic error regardless of the prediction horizon.
准确的风电预测是电网和能源交易市场正确运行的关键工具,特别是在风力资源丰富的地区,如爱尔兰,风能占发电量的很大一部分。本文提出了一种基于变分模态分解和极限学习机的多步超前风电预测集成模型,并将其应用于爱尔兰风电场。来自位于不同地点的两个风力发电场的数据被用来证明该模型对爱尔兰的适用性。结果表明,使用这种完整的模型集合可以为多个预测层提供更可靠和稳健的预测,并且与单一模型相比提高了7%至22%。此外,无论预测水平如何,该集合都具有较低的系统误差。
{"title":"Multi-step ahead wind power forecasting for Ireland using an ensemble of VMD-ELM models","authors":"J. M. González-Sopeña, V. Pakrashi, Bidisha Ghosh","doi":"10.1109/ISSC49989.2020.9180155","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180155","url":null,"abstract":"Accurate wind power forecasts are a key tool for the correct operation of the grid and the energy trading market, particularly in regions with a large wind resource as Ireland, where wind energy comprises a large share of the electricity generated. A multi-step ahead wind power forecasting ensemble of models based on variational mode decomposition and extreme learning machines is employed in this paper to be applied for Irish wind farms. Data from two wind farms placed in different locations are used to show the suitability of the model for Ireland. The results show that the use of this full ensemble of models provides more reliable and robust forecasts for several prediction horizons and an improvement between 7% and 22% with respect to a single model. Additionally, the ensemble shows a low systematic error regardless of the prediction horizon.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Practical Implementation of APTs on PTP Time Synchronisation Networks 点到点时间同步网络上apt的实际实现
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180157
Waleed Alghamdi, M. Schukat
The Precision Time Protocol is essential for many time-sensitive and time-aware applications. However, it was never designed for security, and despite various approaches to harden this protocol against manipulation, it is still prone to cyber-attacks. Here Advanced Persistent Threats (APT) are of particular concern, as they may stealthily and over extended periods of time manipulate computer clocks that rely on the accurate functioning of this protocol. Simulating such attacks is difficult, as it requires firmware manipulation of network and PTP infrastructure components. Therefore, this paper proposes and demonstrates a programmable Man-in-the-Middle (pMitM) and a programmable injector (pInj) device that allow the implementation of a variety of attacks, enabling security researchers to quantify the impact of APTs on time synchronisation.
精确时间协议对于许多时间敏感和时间敏感的应用程序是必不可少的。然而,它从来都不是为了安全而设计的,尽管有各种方法来强化该协议以防止操纵,但它仍然容易受到网络攻击。在这里,高级持续威胁(APT)是特别值得关注的,因为它们可能会在很长一段时间内偷偷地操纵依赖于该协议准确功能的计算机时钟。模拟这种攻击很困难,因为它需要对网络和PTP基础设施组件进行固件操作。因此,本文提出并演示了可编程中间人(pMitM)和可编程注入器(pInj)设备,它们允许实施各种攻击,使安全研究人员能够量化apt对时间同步的影响。
{"title":"Practical Implementation of APTs on PTP Time Synchronisation Networks","authors":"Waleed Alghamdi, M. Schukat","doi":"10.1109/ISSC49989.2020.9180157","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180157","url":null,"abstract":"The Precision Time Protocol is essential for many time-sensitive and time-aware applications. However, it was never designed for security, and despite various approaches to harden this protocol against manipulation, it is still prone to cyber-attacks. Here Advanced Persistent Threats (APT) are of particular concern, as they may stealthily and over extended periods of time manipulate computer clocks that rely on the accurate functioning of this protocol. Simulating such attacks is difficult, as it requires firmware manipulation of network and PTP infrastructure components. Therefore, this paper proposes and demonstrates a programmable Man-in-the-Middle (pMitM) and a programmable injector (pInj) device that allow the implementation of a variety of attacks, enabling security researchers to quantify the impact of APTs on time synchronisation.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114508401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Methodology for Building Synthetic Datasets with Virtual Humans 用虚拟人构建合成数据集的方法
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180188
Shubhajit Basak, Hossein Javidnia, Faisal Khan, R. Mcdonnell, M. Schukat
Recent advances in deep learning methods have increased the performance of face detection and recognition systems. The accuracy of these models relies on the range of variation provided in the training data. Creating a dataset that represents all variations of real-world faces is not feasible as the control over the quality of the data decreases with the size of the dataset. Repeatability of data is another challenge as it is not possible to exactly recreate ‘real-world’ acquisition conditions outside of the laboratory. In this work, we explore a framework to synthetically generate facial data to be used as part of a toolchain to generate very large facial datasets with a high degree of control over facial and environmental variations. Such large datasets can be used for improved, targeted training of deep neural networks. In particular, we make use of a 3D morphable face model for the rendering of multiple 2D images across a dataset of 100 synthetic identities, providing full control over image variations such as pose, illumination, and background.
深度学习方法的最新进展提高了人脸检测和识别系统的性能。这些模型的准确性依赖于训练数据中提供的变化范围。创建一个代表所有真实世界面孔变化的数据集是不可行的,因为对数据质量的控制随着数据集的大小而降低。数据的可重复性是另一个挑战,因为不可能在实验室之外准确地重现“真实世界”的采集条件。在这项工作中,我们探索了一个框架来综合生成面部数据,作为工具链的一部分,用于生成对面部和环境变化具有高度控制的非常大的面部数据集。这样的大型数据集可以用于改进深度神经网络的针对性训练。特别是,我们利用3D变形面部模型在100个合成身份的数据集上渲染多个2D图像,提供对图像变化的完全控制,如姿势、照明和背景。
{"title":"Methodology for Building Synthetic Datasets with Virtual Humans","authors":"Shubhajit Basak, Hossein Javidnia, Faisal Khan, R. Mcdonnell, M. Schukat","doi":"10.1109/ISSC49989.2020.9180188","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180188","url":null,"abstract":"Recent advances in deep learning methods have increased the performance of face detection and recognition systems. The accuracy of these models relies on the range of variation provided in the training data. Creating a dataset that represents all variations of real-world faces is not feasible as the control over the quality of the data decreases with the size of the dataset. Repeatability of data is another challenge as it is not possible to exactly recreate ‘real-world’ acquisition conditions outside of the laboratory. In this work, we explore a framework to synthetically generate facial data to be used as part of a toolchain to generate very large facial datasets with a high degree of control over facial and environmental variations. Such large datasets can be used for improved, targeted training of deep neural networks. In particular, we make use of a 3D morphable face model for the rendering of multiple 2D images across a dataset of 100 synthetic identities, providing full control over image variations such as pose, illumination, and background.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reduced Complexity Approach for Uplink Rate Trajectory Prediction in Mobile Networks 移动网络上行速率轨迹预测的降低复杂度方法
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180156
G. Nikolov, M. Kuhn, A. Mcgibney, Bernd-Ludwig Wenning
This paper presents a novel data rate prediction scheme. By combining online data rate estimation techniques with Long Short-Term Memory (LSTM) Neural Networks (NN), we are able to forecast the near future behaviour of the mobile channel. The prediction scheme is evaluated on data sets obtained from private and commercial mobile networks. By utilizing a Dense-Sparse-Dense (DSD) training in conjunction with weight rounding we reduce the size by a factor of 7.36 and complexity by 57% without any loss in accuracy of the model. Such an approach is especially attractive for low-end embedded-based hardware solutions where memory and processing power are limited.
提出了一种新的数据速率预测方案。通过将在线数据速率估计技术与长短期记忆(LSTM)神经网络(NN)相结合,我们能够预测移动信道的近期行为。在私有和商用移动网络的数据集上对该预测方案进行了评估。通过使用密集-稀疏-密集(DSD)训练与权值舍入相结合,我们将模型的大小减少了7.36,复杂性减少了57%,而模型的准确性没有任何损失。这种方法对于内存和处理能力有限的低端嵌入式硬件解决方案特别有吸引力。
{"title":"Reduced Complexity Approach for Uplink Rate Trajectory Prediction in Mobile Networks","authors":"G. Nikolov, M. Kuhn, A. Mcgibney, Bernd-Ludwig Wenning","doi":"10.1109/ISSC49989.2020.9180156","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180156","url":null,"abstract":"This paper presents a novel data rate prediction scheme. By combining online data rate estimation techniques with Long Short-Term Memory (LSTM) Neural Networks (NN), we are able to forecast the near future behaviour of the mobile channel. The prediction scheme is evaluated on data sets obtained from private and commercial mobile networks. By utilizing a Dense-Sparse-Dense (DSD) training in conjunction with weight rounding we reduce the size by a factor of 7.36 and complexity by 57% without any loss in accuracy of the model. Such an approach is especially attractive for low-end embedded-based hardware solutions where memory and processing power are limited.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115052691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing Pattern Recognition and Matching techniques to automatically detect standardized functional tests from wearable technology 实现模式识别和匹配技术,自动检测可穿戴技术的标准化功能测试
Pub Date : 2020-06-01 DOI: 10.1109/ISSC49989.2020.9180174
Vini Vijayan, Nigel McKelvey, J. Condell, P. Gardiner, J. Connolly
Wearable sensor technology is often used in healthcare environments for monitoring, diagnosis and recovery of patients. Wearable sensors can be used to detect movement throughout measurement of standardized functional tests, which are considered part of the assessment criteria for Activities of Daily Living (ADL). The volume of data collected by sensors for long term assessment of ambulatory movement can be very large in tuple size since they may contain detailed 3-D sensor information. Extracting recorded movement data corresponding to standardized functional tests from an entire data set is complex and time consuming. This paper examines whether standardized functional tests can be automatically detected from long term data collected by wearable technology devices using Artificial Intelligence (AI) techniques. The current research work is aligned with clinical trial data generated by patients who are suffering from Axial Spondylo Arthritis (axSpA). These datasets contain Inertial Measurement Unit (IMU) values corresponding to individual patient functional tests for axSpA. Rotation angles with respect to each functional test are plotted against time. Individual movements that form part of a functional test are constructed for training and testing the AI system. Individual movement patterns are split into training and testing data inputs and are used to train the Neural Network (NN) system and to estimate overall prediction accuracy of the NN system. NN model is trained in such a way that the learned system can predict new functional test patterns with respect to the trained data and it is compared with expected data set and returned the accuracy of prediction. Once the semi supervised learning phase of AI system has successfully finished with adequate amount of data, it is capable for automatically detect gait and posture changes of patients at home.
可穿戴传感器技术通常用于医疗保健环境,用于患者的监测、诊断和康复。可穿戴传感器可用于在标准化功能测试的测量过程中检测运动,这被认为是日常生活活动(ADL)评估标准的一部分。由于传感器可能包含详细的三维传感器信息,因此传感器收集的用于长期评估动态运动的数据量在元组大小中可能非常大。从整个数据集中提取与标准化功能测试相对应的记录运动数据既复杂又耗时。本文探讨了使用人工智能(AI)技术从可穿戴技术设备收集的长期数据中是否可以自动检测标准化功能测试。目前的研究工作与患有轴向脊柱炎(axSpA)的患者产生的临床试验数据一致。这些数据集包含与axSpA的个体患者功能测试相对应的惯性测量单元(IMU)值。每个功能测试的旋转角度随时间绘制。单个动作构成功能测试的一部分,用于训练和测试人工智能系统。个体运动模式被分为训练和测试数据输入,用于训练神经网络(NN)系统和估计神经网络系统的整体预测精度。神经网络模型的训练方式是,学习到的系统可以根据训练数据预测新的功能测试模式,并将其与预期数据集进行比较,并返回预测的准确性。一旦人工智能系统的半监督学习阶段成功完成,并获得足够的数据量,它就能够自动检测家中患者的步态和姿势变化。
{"title":"Implementing Pattern Recognition and Matching techniques to automatically detect standardized functional tests from wearable technology","authors":"Vini Vijayan, Nigel McKelvey, J. Condell, P. Gardiner, J. Connolly","doi":"10.1109/ISSC49989.2020.9180174","DOIUrl":"https://doi.org/10.1109/ISSC49989.2020.9180174","url":null,"abstract":"Wearable sensor technology is often used in healthcare environments for monitoring, diagnosis and recovery of patients. Wearable sensors can be used to detect movement throughout measurement of standardized functional tests, which are considered part of the assessment criteria for Activities of Daily Living (ADL). The volume of data collected by sensors for long term assessment of ambulatory movement can be very large in tuple size since they may contain detailed 3-D sensor information. Extracting recorded movement data corresponding to standardized functional tests from an entire data set is complex and time consuming. This paper examines whether standardized functional tests can be automatically detected from long term data collected by wearable technology devices using Artificial Intelligence (AI) techniques. The current research work is aligned with clinical trial data generated by patients who are suffering from Axial Spondylo Arthritis (axSpA). These datasets contain Inertial Measurement Unit (IMU) values corresponding to individual patient functional tests for axSpA. Rotation angles with respect to each functional test are plotted against time. Individual movements that form part of a functional test are constructed for training and testing the AI system. Individual movement patterns are split into training and testing data inputs and are used to train the Neural Network (NN) system and to estimate overall prediction accuracy of the NN system. NN model is trained in such a way that the learned system can predict new functional test patterns with respect to the trained data and it is compared with expected data set and returned the accuracy of prediction. Once the semi supervised learning phase of AI system has successfully finished with adequate amount of data, it is capable for automatically detect gait and posture changes of patients at home.","PeriodicalId":351013,"journal":{"name":"2020 31st Irish Signals and Systems Conference (ISSC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116513503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 31st Irish Signals and Systems Conference (ISSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1