首页 > 最新文献

Annals of Emerging Technologies in Computing最新文献

英文 中文
Privacy-preserved Secure Medical Data Sharing Using Hierarchical Blockchain in Edge Computing 边缘计算中使用分层区块链的隐私保护安全医疗数据共享
Q2 Computer Science Pub Date : 2022-10-01 DOI: 10.33166/aetic.2022.04.005
Rasel Iqbal Emon, Md. Mehedi Hassan Onik, A. Hussain, Toufiq Ahmed Tanna, Md. Akhtaruzzaman Emon, Muhammad Al Amin Rifat, Mahdi H. Miraz
A distributed ledger technology, embedded with privacy and security by architecture, provides a transparent application developing platform. Additionally, edge technology is trending rapidly which brings the computing and data storing facility closer to the user end (device), in order to overcome network bottlenecks. This study, therefore, utilises the transparency, security, efficiency of blockchain technology along with the computing and storing facility at the edge level to establish privacy preserved storing and tracking schemes for electronic health records (EHRs). Since the EHR stored in a block is accessible by the peer-to-peer (P2P) nodes, privacy has always been a matter of great concern for any blockchain-based activities. Therefore, to address this privacy issue, multilevel blockchain, which can enforce and preserve complete privacy and security of any blockchain-based application or environment, has become one of the recent blockchain research trends. In this article, we propose an EHR sharing architecture consisting of three different interrelated multilevel or hierarchical chains confined within three different network layers using edge computing. Furthermore, since EHRs are sensitive, a specific data de-identification or anonymisation strategy is also applied to further strengthen the privacy and security of the data shared.
分布式账本技术通过架构嵌入隐私和安全性,提供了一个透明的应用程序开发平台。此外,边缘技术正在迅速发展,它使计算和数据存储设施更接近用户端(设备),以克服网络瓶颈。因此,本研究利用区块链技术的透明、安全、高效,以及边缘级的计算和存储设施,建立电子健康记录(EHRs)的隐私保护存储和跟踪方案。由于存储在块中的EHR可以由点对点(P2P)节点访问,因此对于任何基于区块链的活动来说,隐私一直是一个非常关注的问题。因此,为了解决这一隐私问题,能够强制和保护任何基于区块链的应用程序或环境的完整隐私和安全性的多级区块链已成为最近区块链的研究趋势之一。在本文中,我们提出了一个EHR共享架构,该架构由三个不同的相互关联的多层或分层链组成,这些链限制在三个不同的网络层中,使用边缘计算。此外,由于电子病历具有敏感性,因此还采用了特定的数据去识别化或匿名化策略,以进一步加强共享数据的隐私性和安全性。
{"title":"Privacy-preserved Secure Medical Data Sharing Using Hierarchical Blockchain in Edge Computing","authors":"Rasel Iqbal Emon, Md. Mehedi Hassan Onik, A. Hussain, Toufiq Ahmed Tanna, Md. Akhtaruzzaman Emon, Muhammad Al Amin Rifat, Mahdi H. Miraz","doi":"10.33166/aetic.2022.04.005","DOIUrl":"https://doi.org/10.33166/aetic.2022.04.005","url":null,"abstract":"A distributed ledger technology, embedded with privacy and security by architecture, provides a transparent application developing platform. Additionally, edge technology is trending rapidly which brings the computing and data storing facility closer to the user end (device), in order to overcome network bottlenecks. This study, therefore, utilises the transparency, security, efficiency of blockchain technology along with the computing and storing facility at the edge level to establish privacy preserved storing and tracking schemes for electronic health records (EHRs). Since the EHR stored in a block is accessible by the peer-to-peer (P2P) nodes, privacy has always been a matter of great concern for any blockchain-based activities. Therefore, to address this privacy issue, multilevel blockchain, which can enforce and preserve complete privacy and security of any blockchain-based application or environment, has become one of the recent blockchain research trends. In this article, we propose an EHR sharing architecture consisting of three different interrelated multilevel or hierarchical chains confined within three different network layers using edge computing. Furthermore, since EHRs are sensitive, a specific data de-identification or anonymisation strategy is also applied to further strengthen the privacy and security of the data shared.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47143619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computation and Optimization of Traffic Network Topologies Using Eclipse SUMO 基于Eclipse SUMO的交通网络拓扑计算与优化
Q2 Computer Science Pub Date : 2022-10-01 DOI: 10.33166/aetic.2022.04.004
Y. H. Chow, K. Ooi, Mohammad Arif Sobhan Bhuiyan, M. Reaz, C. W. Yuen
The advent of modern computational tools in field of transportation can help to forecast the optimized vehicular routes and traffic network topology, using traffic conditions from real world data as inputs. In this study, the topologies of one-way and two-way street networks are analysed using microscopic traffic simulations implemented on the SUMO (Simulation of Urban MObility) platform were performed to analyse the effect of street conversion in Downtown Brickfields, Kuala Lumpur. It was found that one-way streets perform better at the onset of traffic congestion due to their higher capacity, but on average, the four-fold longer travel times make it harder to clear traffic by getting vehicles to their destinations than two-way streets. As time progresses, one-way streets' congestion may become doubly worse than that of two-way streets. This study may contribute to a more holistic assessment of traffic circulation plans designed for smart and liveable cities.
交通领域现代计算工具的出现可以帮助预测优化的车辆路线和交通网络拓扑,使用来自真实世界数据的交通条件作为输入。在本研究中,使用在SUMO(城市机动性模拟)平台上实现的微观交通模拟来分析单向和双向街道网络的拓扑结构,并分析吉隆坡Brickfields市中心街道改造的影响。研究发现,单向街道在交通拥堵开始时表现更好,因为它们的通行能力更高,但平均而言,四倍长的行驶时间使车辆到达目的地比双向街道更难清理交通。随着时间的推移,单向街道的拥堵可能会比双向街道的拥堵严重一倍。这项研究可能有助于对为智能宜居城市设计的交通流通计划进行更全面的评估。
{"title":"Computation and Optimization of Traffic Network Topologies Using Eclipse SUMO","authors":"Y. H. Chow, K. Ooi, Mohammad Arif Sobhan Bhuiyan, M. Reaz, C. W. Yuen","doi":"10.33166/aetic.2022.04.004","DOIUrl":"https://doi.org/10.33166/aetic.2022.04.004","url":null,"abstract":"The advent of modern computational tools in field of transportation can help to forecast the optimized vehicular routes and traffic network topology, using traffic conditions from real world data as inputs. In this study, the topologies of one-way and two-way street networks are analysed using microscopic traffic simulations implemented on the SUMO (Simulation of Urban MObility) platform were performed to analyse the effect of street conversion in Downtown Brickfields, Kuala Lumpur. It was found that one-way streets perform better at the onset of traffic congestion due to their higher capacity, but on average, the four-fold longer travel times make it harder to clear traffic by getting vehicles to their destinations than two-way streets. As time progresses, one-way streets' congestion may become doubly worse than that of two-way streets. This study may contribute to a more holistic assessment of traffic circulation plans designed for smart and liveable cities.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42479761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Music Signal Processing Based on a Blind Source Separation Algorithm 基于盲源分离算法的音乐信号处理研究
Q2 Computer Science Pub Date : 2022-10-01 DOI: 10.33166/aetic.2022.04.003
Xiaomin Zhao, Qiang Tuo, Ruosi Guo, Tengteng Kong
The isolation of mixed music signals is beneficial to the extraction and identification of music signal features and to enhance music signal quality. This paper briefly introduced the mathematical model for separating blind source from mixed music signals and the traditional Independent Component Analysis (ICA) algorithm. The separation algorithm was optimized by the complex neural network. The traditional and optimized ICA algorithms were simulated in MATLAB software. It was found that the time-domain waveform of the signal isolated by the improved ICA-based separation algorithm was closer to the source signal. The similarity coefficient matrix, signal-to-interference ratio, performance index, and iteration time of the improved ICA-based algorithm was 62.3, 0.0011, and 0.87 s, respectively, which were all superior to the traditional ICA algorithm. The novelty of this paper is setting the initial iterative matrix of the ICA algorithm with the complex neural network.
混合音乐信号的分离有利于音乐信号特征的提取和识别,有利于提高音乐信号的质量。本文简要介绍了从混合音乐信号中分离盲源的数学模型和传统的独立分量分析(ICA)算法。利用复杂神经网络对分离算法进行了优化。在MATLAB软件中对传统和优化的ICA算法进行了仿真。研究发现,改进的基于ICA的分离算法分离出的信号时域波形更接近源信号。改进的ICA算法的相似系数矩阵、信干比、性能指标和迭代时间分别为62.3、0.0011和0.87s,均优于传统的ICA算法。本文的新颖之处在于用复杂神经网络设置ICA算法的初始迭代矩阵。
{"title":"Research on Music Signal Processing Based on a Blind Source Separation Algorithm","authors":"Xiaomin Zhao, Qiang Tuo, Ruosi Guo, Tengteng Kong","doi":"10.33166/aetic.2022.04.003","DOIUrl":"https://doi.org/10.33166/aetic.2022.04.003","url":null,"abstract":"The isolation of mixed music signals is beneficial to the extraction and identification of music signal features and to enhance music signal quality. This paper briefly introduced the mathematical model for separating blind source from mixed music signals and the traditional Independent Component Analysis (ICA) algorithm. The separation algorithm was optimized by the complex neural network. The traditional and optimized ICA algorithms were simulated in MATLAB software. It was found that the time-domain waveform of the signal isolated by the improved ICA-based separation algorithm was closer to the source signal. The similarity coefficient matrix, signal-to-interference ratio, performance index, and iteration time of the improved ICA-based algorithm was 62.3, 0.0011, and 0.87 s, respectively, which were all superior to the traditional ICA algorithm. The novelty of this paper is setting the initial iterative matrix of the ICA algorithm with the complex neural network.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42105176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Intelligent English Chunk Recognition based on Knowledge Corpus 基于知识语料库的智能英语块识别分析
Q2 Computer Science Pub Date : 2022-07-01 DOI: 10.33166/aetic.2022.03.002
Mei Zhang
Chunks play an important role in applied linguistics, such as Teaching English as a Second Language (TESL) and Computer-Aided Translation (CAT). Although corpora have already been widely used in the areas mentioned above, annotation and recognition of chunks are mainly done manually. Computer- and linguistic-based chunk recognition is significant in natural language processing (NLP). This paper briefly introduced the intelligent recognition of English chunks and applied the Recurrent Neural Network (RNN) to recognise chunks. To strengthen the RNN, it was improved by Long Short Term Memory (LSTM) for recognising English chunk. The LSTM-RNN was compared with support vector machine (SVM) and RNN in simulation experiments. The results suggested that the performance of the LSTM-RNN was always the highest when dealing with English texts, no matter whether it was trained using a general corpus or a corpus of specialised domain knowledge.
块在应用语言学中发挥着重要作用,如英语作为第二语言教学(TESL)和计算机辅助翻译(CAT)。尽管语料库已经在上述领域得到了广泛的应用,但块的注释和识别主要是手动完成的。基于计算机和语言的组块识别在自然语言处理中具有重要意义。本文简要介绍了英语语块的智能识别,并将递归神经网络(RNN)应用于语块识别。为了增强RNN,长短期记忆(LSTM)对其进行了改进,用于识别英语块。在仿真实验中,将LSTM-RNN与支持向量机(SVM)和RNN进行了比较。结果表明,无论是使用通用语料库还是专业领域知识语料库进行训练,LSTM-RNN在处理英语文本时的性能总是最高的。
{"title":"Analysis of Intelligent English Chunk Recognition based on Knowledge Corpus","authors":"Mei Zhang","doi":"10.33166/aetic.2022.03.002","DOIUrl":"https://doi.org/10.33166/aetic.2022.03.002","url":null,"abstract":"Chunks play an important role in applied linguistics, such as Teaching English as a Second Language (TESL) and Computer-Aided Translation (CAT). Although corpora have already been widely used in the areas mentioned above, annotation and recognition of chunks are mainly done manually. Computer- and linguistic-based chunk recognition is significant in natural language processing (NLP). This paper briefly introduced the intelligent recognition of English chunks and applied the Recurrent Neural Network (RNN) to recognise chunks. To strengthen the RNN, it was improved by Long Short Term Memory (LSTM) for recognising English chunk. The LSTM-RNN was compared with support vector machine (SVM) and RNN in simulation experiments. The results suggested that the performance of the LSTM-RNN was always the highest when dealing with English texts, no matter whether it was trained using a general corpus or a corpus of specialised domain knowledge.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45891338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Edge Computing Environment for Early Wildfire Detection 面向野火早期检测的边缘计算环境
Q2 Computer Science Pub Date : 2022-07-01 DOI: 10.33166/aetic.2022.03.005
Ahmed Saleem Mahdi, S. A. Mahmood
Recently, an increasing demand is growing for installing a rapid response system in forest regions to enable an immediate and appropriate response to wildfires before they spread across vast areas. This paper introduces a multilevel system for early wildfire detection to support public authorities to immediately specify and attend to emergency demands. The presented work is designed and implemented within Edge Computing Infrastructure. At the first level; the dataset samples of wildfire represented by a set of video sequences are collected and labelled for training mode purposes. Then, YOLOv5 deep learning model is adopted in our framework to build a trained model for distinguishing the fire event against non-fire events in binary classification. The proposed system structure comprises IoT entities provided with camera sensor capabilities and NVIDIA Jetson Nano Developer kit as an edge computing environment. At the first level, a video camera is employed to assemble environment information received by the micro-controller middle level to handle and detect the possible fire event presenting in the interested area. The last level is characterized as making a decision by sending a text message and snapshot images to the cloud server. Meanwhile, a set of commands are sent to IoT nodes to operate the speakers and sprinklers, which are strategically assumed to place on the ground to give an alarm and prevent wildlife loss. The proposed system was tested and evaluated using a wildfire dataset constructed by our efforts. The experimental results exhibited 98% accurate detection of fire events in the video sequence. Further, a comparison study is performed in this research to confirm the results obtained from recent methods.
最近,人们对在林区安装快速反应系统的需求越来越大,以便在野火蔓延到大片地区之前对其做出即时和适当的反应。本文介绍了一个多层次的早期野火检测系统,以支持公共当局立即指定和处理紧急需求。所提出的工作是在边缘计算基础设施中设计和实现的。在第一层次;为了训练模式的目的,收集并标记由一组视频序列表示的野火的数据集样本。然后,在我们的框架中采用YOLOv5深度学习模型来构建一个经过训练的模型,用于在二元分类中区分火灾事件和非火灾事件。所提出的系统结构包括具有相机传感器功能的物联网实体和作为边缘计算环境的NVIDIA Jetson Nano Developer套件。在第一级,采用摄像机来收集微控制器中间级接收到的环境信息,以处理和检测感兴趣区域中可能出现的火灾事件。最后一个级别的特征是通过向云服务器发送文本消息和快照图像来做出决定。与此同时,一组命令被发送到物联网节点,以操作扬声器和洒水器,从战略上讲,这些扬声器和洒水装置被假设放置在地面上,以发出警报并防止野生动物损失。使用我们努力构建的野火数据集对所提出的系统进行了测试和评估。实验结果显示,在视频序列中对火灾事件的检测准确率为98%。此外,在本研究中进行了比较研究,以证实从最近的方法中获得的结果。
{"title":"An Edge Computing Environment for Early Wildfire Detection","authors":"Ahmed Saleem Mahdi, S. A. Mahmood","doi":"10.33166/aetic.2022.03.005","DOIUrl":"https://doi.org/10.33166/aetic.2022.03.005","url":null,"abstract":"Recently, an increasing demand is growing for installing a rapid response system in forest regions to enable an immediate and appropriate response to wildfires before they spread across vast areas. This paper introduces a multilevel system for early wildfire detection to support public authorities to immediately specify and attend to emergency demands. The presented work is designed and implemented within Edge Computing Infrastructure. At the first level; the dataset samples of wildfire represented by a set of video sequences are collected and labelled for training mode purposes. Then, YOLOv5 deep learning model is adopted in our framework to build a trained model for distinguishing the fire event against non-fire events in binary classification. The proposed system structure comprises IoT entities provided with camera sensor capabilities and NVIDIA Jetson Nano Developer kit as an edge computing environment. At the first level, a video camera is employed to assemble environment information received by the micro-controller middle level to handle and detect the possible fire event presenting in the interested area. The last level is characterized as making a decision by sending a text message and snapshot images to the cloud server. Meanwhile, a set of commands are sent to IoT nodes to operate the speakers and sprinklers, which are strategically assumed to place on the ground to give an alarm and prevent wildlife loss. The proposed system was tested and evaluated using a wildfire dataset constructed by our efforts. The experimental results exhibited 98% accurate detection of fire events in the video sequence. Further, a comparison study is performed in this research to confirm the results obtained from recent methods.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46093068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Limits of 433 MHz Quarter-wave Monopole Antennas due to Grounding Dimension and Conductivity 基于接地尺寸和电导率的433mhz四分之一波单极天线性能限制
Q2 Computer Science Pub Date : 2022-07-01 DOI: 10.33166/aetic.2022.03.001
Jinfeng Li
Among antennas for Industrial, Scientific and Medical (ISM band) applications at 433 MHz, quarter-wave monopole is a reasonably good trade-off between size, gain, and cost. The electrical performance of the monopole is largely dependent on the quality of the ground plane (size and conductivity), which exhibits a practical limit on the achievable gain as most industrial user environments can provide only a finite ground plane of finite electrical conductivity. Establishing traceability in understanding the performance degradation due to such limits due to the grounding dimension and conductivity is becoming mandatory. To this end, this work leverages universal MATLAB in place of off-the-shelf software (HFSS or CST) for the quarter-wave monopole antenna simulation at 433 MHz parametrised with the ground plane’s dimension with respect to the wavelength (λ). Results indicate that by enlarging the ground plane’s size from 0.14 λ to 14 λ, the gain (directivity for PEC) from the 3D radiation pattern rises from 1.79 dBi, then starts levelling off at 6.7 dBi (5.78 λ), until saturating at 7.49 dBi (13 λ). The radiation efficiency and gain of various grounding conductivity scenarios (e.g., gold, aluminium, steel) are also quantified to inform antenna designers and engineers for commercial, industrial, defence and space applications.
在433MHz的工业、科学和医疗(ISM波段)应用天线中,四分之一波单极子在尺寸、增益和成本之间是一个相当好的折衷方案。单极子的电气性能在很大程度上取决于接地平面的质量(尺寸和电导率),这对可实现的增益表现出实际的限制,因为大多数工业用户环境只能提供有限电导率的有限接地平面。建立可追溯性,以了解由于接地尺寸和导电性的限制而导致的性能退化,这已成为强制性的。为此,这项工作利用通用MATLAB代替现成的软件(HFSS或CST),在433MHz下模拟四分之一波单极子天线,并以地平面相对于波长(λ)的尺寸为参数。结果表明,通过将地平面的尺寸从0.14λ扩大到14λ,来自3D辐射图的增益(PEC的方向性)从1.79 dBi上升,然后在6.7 dBi(5.78λ)处开始趋于平稳,直到在7.49 dBi(13λ)处饱和。还量化了各种接地导电性场景(如金、铝、钢)的辐射效率和增益,为商业、工业、国防和太空应用的天线设计师和工程师提供信息。
{"title":"Performance Limits of 433 MHz Quarter-wave Monopole Antennas due to Grounding Dimension and Conductivity","authors":"Jinfeng Li","doi":"10.33166/aetic.2022.03.001","DOIUrl":"https://doi.org/10.33166/aetic.2022.03.001","url":null,"abstract":"Among antennas for Industrial, Scientific and Medical (ISM band) applications at 433 MHz, quarter-wave monopole is a reasonably good trade-off between size, gain, and cost. The electrical performance of the monopole is largely dependent on the quality of the ground plane (size and conductivity), which exhibits a practical limit on the achievable gain as most industrial user environments can provide only a finite ground plane of finite electrical conductivity. Establishing traceability in understanding the performance degradation due to such limits due to the grounding dimension and conductivity is becoming mandatory. To this end, this work leverages universal MATLAB in place of off-the-shelf software (HFSS or CST) for the quarter-wave monopole antenna simulation at 433 MHz parametrised with the ground plane’s dimension with respect to the wavelength (λ). Results indicate that by enlarging the ground plane’s size from 0.14 λ to 14 λ, the gain (directivity for PEC) from the 3D radiation pattern rises from 1.79 dBi, then starts levelling off at 6.7 dBi (5.78 λ), until saturating at 7.49 dBi (13 λ). The radiation efficiency and gain of various grounding conductivity scenarios (e.g., gold, aluminium, steel) are also quantified to inform antenna designers and engineers for commercial, industrial, defence and space applications.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45481436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Data Aggregation Mechanism using Reinforcement Learning for Cluster Heads in Wireless Multimedia Sensor Networks 无线多媒体传感器网络中基于簇头强化学习的数据聚合机制
Q2 Computer Science Pub Date : 2022-07-01 DOI: 10.33166/aetic.2022.03.006
J. Uddin
Wireless multimedia sensor networks (WMSNs) are getting used in numerous applications nowadays. Many robust energy-efficient routing protocols have been proposed to handle multimedia traffic-intensive data like images and videos in WMSNs. It is a common trend in the literature to facilitate a WMSN with numerous sinks allowing cluster heads (CHs) to distribute the collected data to the adjacent sink node for delivery overhead mitigation. Using multiple sink nodes can be expensive and may incur high complexity in routing. There are many single-sink cluster-based routing protocols for WMSNs that lack in introducing optimal path selection among CHs. As a result, they suffer from transmission and queueing delay due to high data volume. To address these two conflicting issues, we propose a data aggregation mechanism based on reinforcement learning (RL) for CHs (RL-CH) in WMSN. The proposed method can be integrated to any of the cluster-based routing protocol for intelligent data transmission to sink node via cooperative CHs. Proposed RL-CH protocol performs better in terms of energy-efficiency, end-to-end delay, packet delivery ratio, and network lifetime. It gains 17.6% decrease in average end-to-end delay and 7.7% increase in PDR along with a network lifetime increased to 3.2% compared to the evolutionary game-based routing protocol which has been used as baseline.
无线多媒体传感器网络(WMSN)在当今的许多应用中得到了广泛的应用。已经提出了许多鲁棒的节能路由协议来处理多媒体业务密集型数据,如WMSN中的图像和视频。在文献中,促进具有多个汇点的WMSN是一种常见的趋势,允许簇头(CH)将收集的数据分发到相邻的汇点节点,以减轻传输开销。使用多个汇聚节点可能是昂贵的,并且可能导致路由的高复杂性。有许多用于WMSN的基于单宿集群的路由协议缺乏在CH之间引入最优路径选择。结果,由于高数据量,它们遭受传输和排队延迟。为了解决这两个相互冲突的问题,我们提出了一种基于强化学习(RL)的WMSN中CH(RL-CH)的数据聚合机制。所提出的方法可以集成到任何基于集群的路由协议中,用于通过协作CH向汇聚节点进行智能数据传输。所提出的RL-CH协议在能量效率、端到端延迟、分组传递率和网络寿命方面表现更好。与用作基线的基于进化游戏的路由协议相比,它的平均端到端延迟减少了17.6%,PDR增加了7.7%,网络寿命增加到3.2%。
{"title":"A Novel Data Aggregation Mechanism using Reinforcement Learning for Cluster Heads in Wireless Multimedia Sensor Networks","authors":"J. Uddin","doi":"10.33166/aetic.2022.03.006","DOIUrl":"https://doi.org/10.33166/aetic.2022.03.006","url":null,"abstract":"Wireless multimedia sensor networks (WMSNs) are getting used in numerous applications nowadays. Many robust energy-efficient routing protocols have been proposed to handle multimedia traffic-intensive data like images and videos in WMSNs. It is a common trend in the literature to facilitate a WMSN with numerous sinks allowing cluster heads (CHs) to distribute the collected data to the adjacent sink node for delivery overhead mitigation. Using multiple sink nodes can be expensive and may incur high complexity in routing. There are many single-sink cluster-based routing protocols for WMSNs that lack in introducing optimal path selection among CHs. As a result, they suffer from transmission and queueing delay due to high data volume. To address these two conflicting issues, we propose a data aggregation mechanism based on reinforcement learning (RL) for CHs (RL-CH) in WMSN. The proposed method can be integrated to any of the cluster-based routing protocol for intelligent data transmission to sink node via cooperative CHs. Proposed RL-CH protocol performs better in terms of energy-efficiency, end-to-end delay, packet delivery ratio, and network lifetime. It gains 17.6% decrease in average end-to-end delay and 7.7% increase in PDR along with a network lifetime increased to 3.2% compared to the evolutionary game-based routing protocol which has been used as baseline.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42515815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of Intrusion Detection System Using Machine Learning and Deep Learning Algorithms 基于机器学习和深度学习算法的入侵检测系统的比较分析
Q2 Computer Science Pub Date : 2022-07-01 DOI: 10.33166/aetic.2022.03.003
Johan Note, Maaruf Ali
Attacks against computer networks, “cyber-attacks”, are now common place affecting almost every Internet connected device on a daily basis. Organisations are now using machine learning and deep learning to thwart these types of attacks for their effectiveness without the need for human intervention. Machine learning offers the biggest advantage in their ability to detect, curtail, prevent, recover and even deal with untrained types of attacks without being explicitly programmed. This research will show the many different types of algorithms that are employed to fight against the different types of cyber-attacks, which are also explained. The classification algorithms, their implementation, accuracy and testing time are presented. The algorithms employed for this experiment were the Gaussian Naïve-Bayes algorithm, Logistic Regression Algorithm, SVM (Support Vector Machine) Algorithm, Stochastic Gradient Descent Algorithm, Decision Tree Algorithm, Random Forest Algorithm, Gradient Boosting Algorithm, K-Nearest Neighbour Algorithm, ANN (Artificial Neural Network) (here we also employed the Multilevel Perceptron Algorithm), Convolutional Neural Network (CNN) Algorithm and the Recurrent Neural Network (RNN) Algorithm. The study concluded that amongst the various machine learning algorithms, the Logistic Regression and Decision tree classifiers all took a very short time to be implemented giving an accuracy of over 90% for malware detection inside various test datasets. The Gaussian Naïve-Bayes classifier, though fast to implement, only gave an accuracy between 51-88%. The Multilevel Perceptron, non-linear SVM and Gradient Boosting algorithms all took a very long time to be implemented. The algorithm that performed with the greatest accuracy was the Random Forest Classification algorithm.
针对计算机网络的攻击,即“网络攻击”,现在几乎每天都会影响到每一台联网设备。组织现在正在使用机器学习和深度学习来挫败这些类型的攻击,因为它们的有效性不需要人工干预。机器学习的最大优势在于,它能够在没有明确编程的情况下检测、减少、预防、恢复甚至处理未经训练的攻击类型。这项研究将展示用于对抗不同类型网络攻击的许多不同类型的算法,并对其进行了解释。介绍了分类算法及其实现、准确性和测试时间。本实验采用的算法有高斯朴素贝叶斯算法、逻辑回归算法、SVM(支持向量机)算法、随机梯度下降算法、决策树算法、随机森林算法、梯度提升算法、K-近邻算法、ANN(人工神经网络)(这里我们还采用了多级感知器算法),卷积神经网络(CNN)算法和递归神经网络(RNN)算法。该研究得出的结论是,在各种机器学习算法中,逻辑回归和决策树分类器的实现时间都很短,在各种测试数据集中的恶意软件检测准确率超过90%。高斯朴素贝叶斯分类器虽然实现速度快,但其准确率仅在51-88%之间。多级感知器、非线性SVM和梯度提升算法都需要很长的时间才能实现。执行得最准确的算法是随机森林分类算法。
{"title":"Comparative Analysis of Intrusion Detection System Using Machine Learning and Deep Learning Algorithms","authors":"Johan Note, Maaruf Ali","doi":"10.33166/aetic.2022.03.003","DOIUrl":"https://doi.org/10.33166/aetic.2022.03.003","url":null,"abstract":"Attacks against computer networks, “cyber-attacks”, are now common place affecting almost every Internet connected device on a daily basis. Organisations are now using machine learning and deep learning to thwart these types of attacks for their effectiveness without the need for human intervention. Machine learning offers the biggest advantage in their ability to detect, curtail, prevent, recover and even deal with untrained types of attacks without being explicitly programmed. This research will show the many different types of algorithms that are employed to fight against the different types of cyber-attacks, which are also explained. The classification algorithms, their implementation, accuracy and testing time are presented. The algorithms employed for this experiment were the Gaussian Naïve-Bayes algorithm, Logistic Regression Algorithm, SVM (Support Vector Machine) Algorithm, Stochastic Gradient Descent Algorithm, Decision Tree Algorithm, Random Forest Algorithm, Gradient Boosting Algorithm, K-Nearest Neighbour Algorithm, ANN (Artificial Neural Network) (here we also employed the Multilevel Perceptron Algorithm), Convolutional Neural Network (CNN) Algorithm and the Recurrent Neural Network (RNN) Algorithm. The study concluded that amongst the various machine learning algorithms, the Logistic Regression and Decision tree classifiers all took a very short time to be implemented giving an accuracy of over 90% for malware detection inside various test datasets. The Gaussian Naïve-Bayes classifier, though fast to implement, only gave an accuracy between 51-88%. The Multilevel Perceptron, non-linear SVM and Gradient Boosting algorithms all took a very long time to be implemented. The algorithm that performed with the greatest accuracy was the Random Forest Classification algorithm.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44013966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Context Driven Re-configurable Business Process 动态上下文驱动的可重新配置业务流程
Q2 Computer Science Pub Date : 2022-07-01 DOI: 10.33166/aetic.2022.03.004
P. Chakraborty, A. Sarkar
The building of a re-configurable business process (BP) has gained importance in business organizations. It helps the organization to adapt to the agility in business goals. A proper context-driven re-configurable BP should be capable of integrating dynamic context information. However, this is absent in the existing studies. As a result, providing a suitable, expressive and re-configurable BP to the business organization stakeholders has become a challenging issue. The prevailing research works lack the proper consideration and suitable incorporation of the context-driven services to make a BP re-configurable. And then it can quickly respond and change its behavior to adapt to the rapid and unpredictable changing business environment. In addition, those methods hardly come up with any appropriate technique to use the set of specified goals to extract context-driven services. Those business goals are determined by the group of stakeholders of a business organization. This paper proposes a new method of re-configuring context-driven from a defined goal to sort out these vital challenges. Present context data is included in an existing BP to achieve a modified goal which immensely benefits the end-users. Thus, this approach is intrinsically highly user-centric, reusable, fast and inexpensive. To achieve this, an algorithm called Context-driven Re-configurable Business Process Achievement Algorithm (CDRBPA) is introduced and implemented. Based on Primary Context (PC), three software metrics, namely, Degree of re-usability (DRUPC), Degree of re-appropriation (DRAPC) and Degree of re-configurability (DRPC) have been proposed to measure the modifications done to the existing BP. In conclusion, various case studies with different complexities have been performed to show the strength of the proposed algorithm.
可重构业务流程(BP)的构建在企业组织中变得越来越重要。它帮助组织适应业务目标中的敏捷性。一个合适的上下文驱动的可重构BP应该能够集成动态上下文信息。然而,这在现有的研究中是缺失的。因此,向业务组织涉众提供合适的、可表达的和可重新配置的BP已成为一个具有挑战性的问题。主流的研究工作缺乏适当的考虑和适当的结合上下文驱动的服务,使BP可重新配置。然后,它可以快速响应和改变自己的行为,以适应快速和不可预测的变化的商业环境。此外,这些方法几乎没有提出任何适当的技术来使用指定的目标集来提取上下文驱动的服务。这些业务目标是由业务组织的利益相关者决定的。本文提出了一种从定义目标重新配置上下文驱动的新方法来整理这些重要挑战。当前上下文数据包含在现有BP中,以实现对最终用户极大有利的修改目标。因此,这种方法本质上是高度以用户为中心、可重用、快速和廉价的。为了实现这一点,引入并实现了一种称为上下文驱动的可重构业务流程实现算法(CDRBPA)的算法。基于初级上下文(Primary Context, PC),提出了可重用度(Degree of re-usability, DRUPC)、可重用度(Degree of re-appropriation, DRAPC)和可重构度(Degree of re-configurability, DRPC)三个软件度量指标来度量对现有BP的修改。总之,已经进行了不同复杂性的各种案例研究,以显示所提出算法的强度。
{"title":"Dynamic Context Driven Re-configurable Business Process","authors":"P. Chakraborty, A. Sarkar","doi":"10.33166/aetic.2022.03.004","DOIUrl":"https://doi.org/10.33166/aetic.2022.03.004","url":null,"abstract":"The building of a re-configurable business process (BP) has gained importance in business organizations. It helps the organization to adapt to the agility in business goals. A proper context-driven re-configurable BP should be capable of integrating dynamic context information. However, this is absent in the existing studies. As a result, providing a suitable, expressive and re-configurable BP to the business organization stakeholders has become a challenging issue. The prevailing research works lack the proper consideration and suitable incorporation of the context-driven services to make a BP re-configurable. And then it can quickly respond and change its behavior to adapt to the rapid and unpredictable changing business environment. In addition, those methods hardly come up with any appropriate technique to use the set of specified goals to extract context-driven services. Those business goals are determined by the group of stakeholders of a business organization. This paper proposes a new method of re-configuring context-driven from a defined goal to sort out these vital challenges. Present context data is included in an existing BP to achieve a modified goal which immensely benefits the end-users. Thus, this approach is intrinsically highly user-centric, reusable, fast and inexpensive. To achieve this, an algorithm called Context-driven Re-configurable Business Process Achievement Algorithm (CDRBPA) is introduced and implemented. Based on Primary Context (PC), three software metrics, namely, Degree of re-usability (DRUPC), Degree of re-appropriation (DRAPC) and Degree of re-configurability (DRPC) have been proposed to measure the modifications done to the existing BP. In conclusion, various case studies with different complexities have been performed to show the strength of the proposed algorithm.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41673484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining Mental Disorder/Psychological Chaos through Various ML and DL Techniques: A Critical Review 通过各种ML和DL技术检查精神障碍/心理混乱:综述
Q2 Computer Science Pub Date : 2022-04-01 DOI: 10.33166/aetic.2022.02.005
Afra Binth Osman, Faria Tabassum, M. Patwary, Ahmed Imteaj, Touhidul Alam, Mohammad Arif Sobhan Bhuiyan, Mahdi H. Miraz
Mental soundness is a condition of well-being wherein a person understands his/her potential, participates in his or her community and is able to deal effectively with the challenges and obstacles of everyday life. It circumscribes how an individual thinks, feels and responds to any circumstances. Mental strain is generally recognised as a social concern, potentially leading to a functional impairment at work. Chronic stress may also be linked with several physiological illnesses. The purpose of this research stands to examine existing research analysis of mental healthiness outcomes where diverse Deep Learning (DL) and Machine learning (ML) algorithms have been applied. Applying our exclusion and inclusion criteria, 52 articles were finally selected from the search results obtained from various research databases and repositories. This literatures on ML and mental health outcomes show an insight into the avant-garde techniques developed and employed in this domain. The review also compares and contrasts amongst various deep learning techniques for predicting a person's state of mind based on different types of data such as social media data, clinical data, etc. Finally, the open issues and future challenges of utilising Deep learning algorithms to better understand as well as diagnose mental state of any individual were discussed. From the literature survey, this is evident that the use of ML and DL in mental health has yielded significant attainment mostly in the areas of diagnosis, therapy, support, research and clinical governance.
精神健康是一种幸福的状态,在这种状态下,一个人了解他/她的潜力,参与他/她的社区,能够有效地应对日常生活中的挑战和障碍。它限定了一个人对任何情况的思考、感受和反应。精神紧张通常被认为是一种社会问题,可能导致工作中的功能障碍。慢性压力也可能与一些生理疾病有关。本研究的目的是检查现有的心理健康结果研究分析,其中应用了不同的深度学习(DL)和机器学习(ML)算法。根据我们的排除和纳入标准,从各种研究数据库和知识库的检索结果中最终选择了52篇文章。这篇关于ML和心理健康结果的文献显示了对该领域开发和使用的前卫技术的深入了解。该评论还比较和对比了各种深度学习技术,这些技术基于不同类型的数据(如社交媒体数据、临床数据等)来预测一个人的心理状态。最后,讨论了利用深度学习算法更好地理解和诊断任何个体的精神状态的开放问题和未来的挑战。从文献调查来看,很明显,ML和DL在心理健康领域的使用主要在诊断、治疗、支持、研究和临床治理领域取得了重大成就。
{"title":"Examining Mental Disorder/Psychological Chaos through Various ML and DL Techniques: A Critical Review","authors":"Afra Binth Osman, Faria Tabassum, M. Patwary, Ahmed Imteaj, Touhidul Alam, Mohammad Arif Sobhan Bhuiyan, Mahdi H. Miraz","doi":"10.33166/aetic.2022.02.005","DOIUrl":"https://doi.org/10.33166/aetic.2022.02.005","url":null,"abstract":"Mental soundness is a condition of well-being wherein a person understands his/her potential, participates in his or her community and is able to deal effectively with the challenges and obstacles of everyday life. It circumscribes how an individual thinks, feels and responds to any circumstances. Mental strain is generally recognised as a social concern, potentially leading to a functional impairment at work. Chronic stress may also be linked with several physiological illnesses. The purpose of this research stands to examine existing research analysis of mental healthiness outcomes where diverse Deep Learning (DL) and Machine learning (ML) algorithms have been applied. Applying our exclusion and inclusion criteria, 52 articles were finally selected from the search results obtained from various research databases and repositories. This literatures on ML and mental health outcomes show an insight into the avant-garde techniques developed and employed in this domain. The review also compares and contrasts amongst various deep learning techniques for predicting a person's state of mind based on different types of data such as social media data, clinical data, etc. Finally, the open issues and future challenges of utilising Deep learning algorithms to better understand as well as diagnose mental state of any individual were discussed. From the literature survey, this is evident that the use of ML and DL in mental health has yielded significant attainment mostly in the areas of diagnosis, therapy, support, research and clinical governance.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43128741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Annals of Emerging Technologies in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1