首页 > 最新文献

Journal of Advances in Information Technology最新文献

英文 中文
CRL+: A Novel Semi-Supervised Deep Active Contrastive Representation Learning-Based Text Classification Model for Insurance Data CRL+:一种基于半监督深度主动对比表示学习的保险数据文本分类模型
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1056-1062
Amir Namavar Jahromi, Ebrahim Pourjafari, Hadis Karimipour, Amit Satpathy, Lovell Hodge
{"title":"CRL+: A Novel Semi-Supervised Deep Active Contrastive Representation Learning-Based Text Classification Model for Insurance Data","authors":"Amir Namavar Jahromi, Ebrahim Pourjafari, Hadis Karimipour, Amit Satpathy, Lovell Hodge","doi":"10.12720/jait.14.5.1056-1062","DOIUrl":"https://doi.org/10.12720/jait.14.5.1056-1062","url":null,"abstract":"","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135052609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model for Deployment of Dedicated Connected Autonomous Vehicle Lanes Considering User Fairness 一种考虑用户公平性的互联自动驾驶专用车道部署模型
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1012-1018
Hongfei Jia, Yunpeng Qi, Chao Liu, Ruiyi Wu
—The dedicated Connected Autonomous Vehicle (CAV) lanes can avoid the interference of human-driven vehicles and create relatively safe operating conditions for CAVs. Besides, the dedicated CAV lanes can give full advantages of the connectivity and controllability to further improve the capacity of links. However, the consequent problem is unfairness among the traffic network users due to the higher priority right of CAVs in some links. This paper develops a bi-level programming model to design the CAV dedicated lanes deployment scheme considering the user fairness issue. In the lower-level model, we define the road resistance functions under various scenarios by investigating the effect of the dedicated lane on link capacity and construct the traffic assignment model which is solved by the diagonalized Frank-Wolfe method. The upper-level model aims to solve the multi-objective optimization problem that integrates user fairness and total system travel cost. The user fairness problem determines the fairness index using the Wilson entropy model, and the travel cost problem considers different users’ travel time value coefficients.
{"title":"A Model for Deployment of Dedicated Connected Autonomous Vehicle Lanes Considering User Fairness","authors":"Hongfei Jia, Yunpeng Qi, Chao Liu, Ruiyi Wu","doi":"10.12720/jait.14.5.1012-1018","DOIUrl":"https://doi.org/10.12720/jait.14.5.1012-1018","url":null,"abstract":"—The dedicated Connected Autonomous Vehicle (CAV) lanes can avoid the interference of human-driven vehicles and create relatively safe operating conditions for CAVs. Besides, the dedicated CAV lanes can give full advantages of the connectivity and controllability to further improve the capacity of links. However, the consequent problem is unfairness among the traffic network users due to the higher priority right of CAVs in some links. This paper develops a bi-level programming model to design the CAV dedicated lanes deployment scheme considering the user fairness issue. In the lower-level model, we define the road resistance functions under various scenarios by investigating the effect of the dedicated lane on link capacity and construct the traffic assignment model which is solved by the diagonalized Frank-Wolfe method. The upper-level model aims to solve the multi-objective optimization problem that integrates user fairness and total system travel cost. The user fairness problem determines the fairness index using the Wilson entropy model, and the travel cost problem considers different users’ travel time value coefficients.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136305462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Simple and Effective Evaluation Method for Fault-Tolerant Routing Methods in Network-on-Chips 片上网络容错路由方法的一种简单有效的评估方法
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.876-882
Yota Kurokawa, Masaru Fukushi
—This paper proposes a simple and effective evaluation method for fault-tolerant routing methods developed for Network-on-Chip (NoC)-based many-core processors. To cope with faults which significantly degrade the reliability of communication among cores, a variety of fault-tolerant routing methods have been studied. Those methods have been mainly evaluated in terms of communication performance such as latency and throughput by computer simulations of packet routing. However, such evaluations are not practical in that they cannot reveal the performance difference in executing parallel applications with the fault-tolerant routing methods. The proposed method obtains the information of the target parallel application such as task execution time, communication pattern, and communication amount and incorporates it in the conventional packet routing simulations. With the proposed evaluation method, computer simulations have been conducted to evaluate the performance of four famous fault-tolerant routing methods, i.e., Fcube4, Position Route, Passage-Y, and Passage-XY, using NAS Parallel Benchmarks and the performance difference is revealed in executing parallel programs named Integer Sort (IS) and Fast Fourier Transform (FFT). The results show that, Passage-XY outperforms other methods in both IS and FT, and for the case of IS, Passage-XY can reduce the program execution time by up to about 39%, 56%, and 26% compared with Fcube4, Position Route, and Passage-Y, respectively.
{"title":"A Simple and Effective Evaluation Method for Fault-Tolerant Routing Methods in Network-on-Chips","authors":"Yota Kurokawa, Masaru Fukushi","doi":"10.12720/jait.14.5.876-882","DOIUrl":"https://doi.org/10.12720/jait.14.5.876-882","url":null,"abstract":"—This paper proposes a simple and effective evaluation method for fault-tolerant routing methods developed for Network-on-Chip (NoC)-based many-core processors. To cope with faults which significantly degrade the reliability of communication among cores, a variety of fault-tolerant routing methods have been studied. Those methods have been mainly evaluated in terms of communication performance such as latency and throughput by computer simulations of packet routing. However, such evaluations are not practical in that they cannot reveal the performance difference in executing parallel applications with the fault-tolerant routing methods. The proposed method obtains the information of the target parallel application such as task execution time, communication pattern, and communication amount and incorporates it in the conventional packet routing simulations. With the proposed evaluation method, computer simulations have been conducted to evaluate the performance of four famous fault-tolerant routing methods, i.e., Fcube4, Position Route, Passage-Y, and Passage-XY, using NAS Parallel Benchmarks and the performance difference is revealed in executing parallel programs named Integer Sort (IS) and Fast Fourier Transform (FFT). The results show that, Passage-XY outperforms other methods in both IS and FT, and for the case of IS, Passage-XY can reduce the program execution time by up to about 39%, 56%, and 26% compared with Fcube4, Position Route, and Passage-Y, respectively.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135649055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gamelan Melody Generation Using LSTM Networks Controlled by Composition Meter Rules and Special Notes 使用LSTM网络的加美兰旋律生成,由作曲节拍规则和特殊音符控制
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.26-38
A. M. Syarif, A. Azhari, S. Suprapto, K. Hastuti
This study proposes a Gamelan melody generation system based on three characteristics, which are the melodic patterns recognition, composition meter rules that control the duration of notes, and the special notes (pitches) selection which represent ambiguous rules in determining the Gamelan musical mode system. Long-Short Term Memory (LSTM) networks were trained using the sequence prediction technique to generate symbolic based Gamelan melodies. The dataset collected from sheet music was converted into ABC notation format, added with codes representing the composition meter and special notes, and restructured into a character-based representation format. The LSTM network training showed good results in the melodic patterns recognition but the networks take less than 10 attempts for the LSTM network to successfully generate one melody. The evaluation was conducted using experts’ judgment. Three generated melodies were sent to experts to be read, hummed and judged. Overall, the evaluation results showed that the generated melodies can comply with the characteristics of the Gamelan melodic patterns, the composition meter and the special notes.
本研究提出了一种基于三个特征的甘美兰旋律生成系统,这三个特征是旋律模式识别、控制音符持续时间的作曲节拍规则和代表确定甘美兰音乐模式系统的模糊规则的特殊音符(音高)选择。利用序列预测技术训练长短期记忆(LSTM)网络生成基于符号的甘美兰旋律。将乐谱数据集转换为ABC表示法格式,加入代表作曲节拍和特殊音符的代码,并重组为基于字符的表示法格式。LSTM网络训练在旋律模式识别方面表现出较好的效果,但LSTM网络只需要不到10次尝试就能成功生成一个旋律。采用专家判断法进行评价。生成的三段旋律被送到专家那里进行阅读、哼唱和评判。总体而言,评价结果表明,生成的旋律符合佳美兰旋律模式、作曲节拍和特殊音符的特点。
{"title":"Gamelan Melody Generation Using LSTM Networks Controlled by Composition Meter Rules and Special Notes","authors":"A. M. Syarif, A. Azhari, S. Suprapto, K. Hastuti","doi":"10.12720/jait.14.1.26-38","DOIUrl":"https://doi.org/10.12720/jait.14.1.26-38","url":null,"abstract":"This study proposes a Gamelan melody generation system based on three characteristics, which are the melodic patterns recognition, composition meter rules that control the duration of notes, and the special notes (pitches) selection which represent ambiguous rules in determining the Gamelan musical mode system. Long-Short Term Memory (LSTM) networks were trained using the sequence prediction technique to generate symbolic based Gamelan melodies. The dataset collected from sheet music was converted into ABC notation format, added with codes representing the composition meter and special notes, and restructured into a character-based representation format. The LSTM network training showed good results in the melodic patterns recognition but the networks take less than 10 attempts for the LSTM network to successfully generate one melody. The evaluation was conducted using experts’ judgment. Three generated melodies were sent to experts to be read, hummed and judged. Overall, the evaluation results showed that the generated melodies can comply with the characteristics of the Gamelan melodic patterns, the composition meter and the special notes.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Automated Deep Learning Framework for Human Identity and Gender Detection 一个用于人类身份和性别检测的自动深度学习框架
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.94-101
Afaf Tareef, Hayat Al-Dmour, Afnan Al-Sarayreh
Automated detection of human identity and gender offers several industrial applications in near future, such as monitoring, surveillance, commercial profiling and human computer interaction. In this paper, deep learning techniques have been used to investigate the problem of human identity and gender classification using hand images. First, pre-processing techniques have been applied to enhance the appearance of the hand images. The pre-processed image is passed through the convolution neural network to determine the gander. For identity detection, the network has been trained on the images for the determined gender for better recognition. To further enhance the result, the framework has been implemented using different optimizers and k fold cross-validation. Experimental results have shown that highly effective performance is achieved in both the human identification and gender classification objectives. High average accuracy of 97.75% using the dorsal hand side for human identification and 96.79% has been obtained for gender classification using the palm hand side. Conclusively, the proposed method has achieved more accuracy than the previous methods both for identification and gender classification.
在不久的将来,人类身份和性别的自动检测提供了几个工业应用,如监控,监视,商业分析和人机交互。在本文中,深度学习技术被用于研究人类身份和性别分类的问题。首先,采用预处理技术增强了手图像的外观。预处理后的图像通过卷积神经网络来确定性别。在身份检测方面,网络对已确定性别的图像进行训练,以获得更好的识别效果。为了进一步增强结果,该框架使用了不同的优化器和k倍交叉验证来实现。实验结果表明,该方法在人的识别和性别分类目标上都取得了很好的效果。使用手背侧进行人体识别的平均准确率为97.75%,使用手掌侧进行性别分类的平均准确率为96.79%。总之,该方法在识别和性别分类方面都比以往的方法取得了更高的准确性。
{"title":"An Automated Deep Learning Framework for Human Identity and Gender Detection","authors":"Afaf Tareef, Hayat Al-Dmour, Afnan Al-Sarayreh","doi":"10.12720/jait.14.1.94-101","DOIUrl":"https://doi.org/10.12720/jait.14.1.94-101","url":null,"abstract":"Automated detection of human identity and gender offers several industrial applications in near future, such as monitoring, surveillance, commercial profiling and human computer interaction. In this paper, deep learning techniques have been used to investigate the problem of human identity and gender classification using hand images. First, pre-processing techniques have been applied to enhance the appearance of the hand images. The pre-processed image is passed through the convolution neural network to determine the gander. For identity detection, the network has been trained on the images for the determined gender for better recognition. To further enhance the result, the framework has been implemented using different optimizers and k fold cross-validation. Experimental results have shown that highly effective performance is achieved in both the human identification and gender classification objectives. High average accuracy of 97.75% using the dorsal hand side for human identification and 96.79% has been obtained for gender classification using the palm hand side. Conclusively, the proposed method has achieved more accuracy than the previous methods both for identification and gender classification.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The New Collective Signature Schemes Based on Two Hard Problems Using Schnorr's Signature Standard 基于Schnorr签名标准的两个难题的新集体签名方案
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.77-84
Tuan Nguyen Kim, Duy Ho Ngoc, Nin Ho Le Viet, N. Moldovyan
Many types of digital signature schemes have been researched and published in recent years. In this paper, we propose two new types of collective signature schemes, namely i) the collective signature for several signing groups and ii) the collective signature for several individual signings and several signing groups. And then we used two difficult problems factoring and discrete logarithm to construct these schemes. To create a combination of these two difficult problems we use the prime module p with a special structure: p = Nn + 1 with n = rq, N is an even number, r and q are prime numbers of at least 512 bit. Schnorr’s digital signature scheme and the RSA key generation algorithm are used to construct related basic schemes such as the single signature scheme, the collective signature scheme, and the group signature scheme. The proposed collective signature schemes are built from these basic schemes. The correctness, security level and performance of the proposed schemes have also been presented in this paper.
近年来,人们研究和发表了许多类型的数字签名方案。本文提出了两种新的集体签名方案,即i)多个签名组的集体签名方案和ii)多个个人签名和多个签名组的集体签名方案。然后我们用两个难题分解和离散对数来构造这些格式。为了创建这两个难题的组合,我们使用具有特殊结构的素数模块p: p = Nn + 1, n = rq, n是偶数,r和q是至少512位的素数。使用Schnorr的数字签名方案和RSA密钥生成算法构建了相关的基本方案,如单个签名方案、集体签名方案和组签名方案。提出的集体签名方案是在这些基本方案的基础上构建的。本文还介绍了所提方案的正确性、安全性和性能。
{"title":"The New Collective Signature Schemes Based on Two Hard Problems Using Schnorr's Signature Standard","authors":"Tuan Nguyen Kim, Duy Ho Ngoc, Nin Ho Le Viet, N. Moldovyan","doi":"10.12720/jait.14.1.77-84","DOIUrl":"https://doi.org/10.12720/jait.14.1.77-84","url":null,"abstract":"Many types of digital signature schemes have been researched and published in recent years. In this paper, we propose two new types of collective signature schemes, namely i) the collective signature for several signing groups and ii) the collective signature for several individual signings and several signing groups. And then we used two difficult problems factoring and discrete logarithm to construct these schemes. To create a combination of these two difficult problems we use the prime module p with a special structure: p = Nn + 1 with n = rq, N is an even number, r and q are prime numbers of at least 512 bit. Schnorr’s digital signature scheme and the RSA key generation algorithm are used to construct related basic schemes such as the single signature scheme, the collective signature scheme, and the group signature scheme. The proposed collective signature schemes are built from these basic schemes. The correctness, security level and performance of the proposed schemes have also been presented in this paper.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Machine Learning Algorithms for Spam Detection 垃圾邮件检测的机器学习算法比较
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.178-184
Azeema Sadia, Fatima Bashir, Reema Qaiser Khan, Ammarah Khalid
—The Internet is used as a tool to offer people with endless knowledge. It is a global platform which is used for connectivity, communication, and sharing. At almost no cost, an individual can use the Internet to send email messages, update tweets, and Facebook messages to a vast number of people. These messages can also contain unsolicited advertisement which is identified as a spam. The company Twitter too is massively affected by spamming and it is an alarming issue for them. Twitter considers spam as actions that are unsolicited and repeated. These include tweet repetition, and the URLs that lead users to completely unrelated websites. The authors’ have worked with twitter’s dataset focusing on tweets about “iPhone”. It was collected by using an API which was further pre-processed. In this paper, content-based features have been selected that recognize the spamming tweet by using R. Multiple machine learning algorithms were applied to detect spamming tweets: Naive Bayes, Logistic Regression, KNN, Decision Tree, and Support Vector Machine. It was observed that the best performance was achieved by Naive Bayes Algorithm giving an accuracy of 89%.
互联网被用作一种工具,为人们提供无尽的知识。它是一个用于连接、通信和共享的全球平台。几乎不需要任何费用,个人可以使用互联网向大量的人发送电子邮件、更新twitter消息和Facebook消息。这些消息还可能包含未经请求的广告,这些广告被识别为垃圾邮件。Twitter公司也受到垃圾邮件的严重影响,这对他们来说是一个令人担忧的问题。Twitter将垃圾邮件视为未经请求且重复的行为。这些包括推文的重复,以及将用户引向完全不相关的网站的url。作者使用了twitter的数据集,专注于关于“iPhone”的推文。使用API收集数据,并对其进行进一步预处理。本文选择了基于内容的特征来识别垃圾推文。采用朴素贝叶斯、逻辑回归、KNN、决策树和支持向量机等多种机器学习算法来检测垃圾推文。观察到,朴素贝叶斯算法获得了最好的性能,准确率为89%。
{"title":"Comparison of Machine Learning Algorithms for Spam Detection","authors":"Azeema Sadia, Fatima Bashir, Reema Qaiser Khan, Ammarah Khalid","doi":"10.12720/jait.14.2.178-184","DOIUrl":"https://doi.org/10.12720/jait.14.2.178-184","url":null,"abstract":"—The Internet is used as a tool to offer people with endless knowledge. It is a global platform which is used for connectivity, communication, and sharing. At almost no cost, an individual can use the Internet to send email messages, update tweets, and Facebook messages to a vast number of people. These messages can also contain unsolicited advertisement which is identified as a spam. The company Twitter too is massively affected by spamming and it is an alarming issue for them. Twitter considers spam as actions that are unsolicited and repeated. These include tweet repetition, and the URLs that lead users to completely unrelated websites. The authors’ have worked with twitter’s dataset focusing on tweets about “iPhone”. It was collected by using an API which was further pre-processed. In this paper, content-based features have been selected that recognize the spamming tweet by using R. Multiple machine learning algorithms were applied to detect spamming tweets: Naive Bayes, Logistic Regression, KNN, Decision Tree, and Support Vector Machine. It was observed that the best performance was achieved by Naive Bayes Algorithm giving an accuracy of 89%.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Fault Detection Based on Reinforcement Learning Technique on Distribution Networks 基于强化学习技术的配电网智能故障检测
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.463-471
T. S. Hlalele, Yanxia Sun, Zenghui Wang
— The incorporation of distributed energy resources in the distribution networks changes the fault current level and makes the fault detection be more complex. There are several challenges brought by these heterogenous energy systems including power quality, voltage stability, reliability and protection. In this paper, a fault detection based on reinforcement learning approach is proposed. The heart of this approach is a Q learning approach which uses a non-adaptive multi-agent reinforcement learning algorithm to detect and identify nonlinear system faults, and the algorithm learns the policy by telling an agent what actions to take under what circumstances. Moreover, the Discrete Wavelet Transform (DWT) is utilized to extract coefficient values from the captured one-fourth cycle of the three-phase current signal during fault which occurs during the transient stage. The simulations and signal analysis for different faults are used to validate the proposed fault detection method in MATLAB environment. The simulation results show that different types of faults such as CA, AB, ABC and ABCG can be detected and the best correlation coefficient achieved is 0.87851.
—配电网中分布式能源的加入改变了故障电流水平,使故障检测更加复杂。这些异构能源系统带来了一些挑战,包括电能质量、电压稳定性、可靠性和保护。本文提出了一种基于强化学习的故障检测方法。该方法的核心是Q学习方法,该方法使用非自适应多智能体强化学习算法来检测和识别非线性系统故障,该算法通过告诉智能体在什么情况下采取什么行动来学习策略。此外,利用离散小波变换(DWT)从暂态故障发生时捕获的四分之一周期三相电流信号中提取系数值。通过对不同故障的仿真和信号分析,在MATLAB环境下验证了所提出的故障检测方法。仿真结果表明,该方法能够检测出CA、AB、ABC、ABCG等不同类型的故障,相关系数为0.87851。
{"title":"Intelligent Fault Detection Based on Reinforcement Learning Technique on Distribution Networks","authors":"T. S. Hlalele, Yanxia Sun, Zenghui Wang","doi":"10.12720/jait.14.3.463-471","DOIUrl":"https://doi.org/10.12720/jait.14.3.463-471","url":null,"abstract":"— The incorporation of distributed energy resources in the distribution networks changes the fault current level and makes the fault detection be more complex. There are several challenges brought by these heterogenous energy systems including power quality, voltage stability, reliability and protection. In this paper, a fault detection based on reinforcement learning approach is proposed. The heart of this approach is a Q learning approach which uses a non-adaptive multi-agent reinforcement learning algorithm to detect and identify nonlinear system faults, and the algorithm learns the policy by telling an agent what actions to take under what circumstances. Moreover, the Discrete Wavelet Transform (DWT) is utilized to extract coefficient values from the captured one-fourth cycle of the three-phase current signal during fault which occurs during the transient stage. The simulations and signal analysis for different faults are used to validate the proposed fault detection method in MATLAB environment. The simulation results show that different types of faults such as CA, AB, ABC and ABCG can be detected and the best correlation coefficient achieved is 0.87851.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on DDoS Detection and Prevention Mechanism DDoS检测与防御机制综述
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.444-453
Foram Suthar, Nimisha Patel
—The internet is an obvious target for a cyberattack nowadays. The population on the internet globally is increasing from 3 billion in 2014 to 4.5 billion in 2020, resulting into nearly 59% of the total world population. The attacker is always looking for loopholes and vulnerabilities of internet-connected devices. It has been noticed from the last decade, there are more Denial-of-Service Attack (DoS) or DoS attacks and their variant Distributed Denial-of-Service (DDoS) or DDoS attacks performed by the attacker. This creates a serious problem for the network administrator to secure the infrastructure. The attacker mainly targets reputed organization/ industries and try to violate the major parameter of cyber security— Availability. The most commonly performed attack by the attacker is a Transmission Control Protocol (TCP) Synonym (SYN) DDoS attack, caused due to the design issue of the TCP algorithm. The attacker floods the packets in the network causing the server to crash. Hence, it is important to understand the source of the DDoS attack. Therefore, a real-life and accurate TCP SYN detection mechanism is required. Numerous techniques have been used for preventing and detecting various DDoS flooding attacks, some of which are covered in the literature review. The paper highlights the strengths and weaknesses of the available defense mechanism. To understand the performance status of the system we have implemented a DoS by the hping3 tool. This gives us better clarity in shortlisting and analyzing the parameters for the detection of DDoS attacks. Also, we try to analyze the impact of TCP SYN attack on the network in DDoS attacks.
互联网是当今网络攻击的明显目标。全球互联网人口将从2014年的30亿增加到2020年的45亿,占世界总人口的近59%。攻击者总是在寻找联网设备的漏洞和漏洞。从过去的十年中已经注意到,有更多的拒绝服务攻击(DoS)或DoS攻击及其变体分布式拒绝服务(DDoS)或DDoS攻击由攻击者执行。这给网络管理员保护基础设施带来了严重的问题。攻击者主要针对知名组织/行业,并试图破坏网络安全的主要参数-可用性。攻击者最常见的攻击是TCP (Transmission Control Protocol) SYN (Transmission Control Protocol Synonym) DDoS攻击,这是由于TCP算法的设计问题造成的。攻击者使报文在网络中泛滥,导致服务器崩溃。因此,了解DDoS攻击的来源非常重要。因此,需要一种真实、准确的TCP SYN检测机制。许多技术已被用于预防和检测各种DDoS洪水攻击,其中一些在文献综述中有介绍。本文重点分析了现有防御机制的优缺点。为了了解系统的性能状况,我们通过hping3工具实现了一个DoS。这使我们更清楚地列出和分析检测DDoS攻击的参数。同时,我们尝试分析TCP SYN攻击在DDoS攻击中对网络的影响。
{"title":"A Survey on DDoS Detection and Prevention Mechanism","authors":"Foram Suthar, Nimisha Patel","doi":"10.12720/jait.14.3.444-453","DOIUrl":"https://doi.org/10.12720/jait.14.3.444-453","url":null,"abstract":"—The internet is an obvious target for a cyberattack nowadays. The population on the internet globally is increasing from 3 billion in 2014 to 4.5 billion in 2020, resulting into nearly 59% of the total world population. The attacker is always looking for loopholes and vulnerabilities of internet-connected devices. It has been noticed from the last decade, there are more Denial-of-Service Attack (DoS) or DoS attacks and their variant Distributed Denial-of-Service (DDoS) or DDoS attacks performed by the attacker. This creates a serious problem for the network administrator to secure the infrastructure. The attacker mainly targets reputed organization/ industries and try to violate the major parameter of cyber security— Availability. The most commonly performed attack by the attacker is a Transmission Control Protocol (TCP) Synonym (SYN) DDoS attack, caused due to the design issue of the TCP algorithm. The attacker floods the packets in the network causing the server to crash. Hence, it is important to understand the source of the DDoS attack. Therefore, a real-life and accurate TCP SYN detection mechanism is required. Numerous techniques have been used for preventing and detecting various DDoS flooding attacks, some of which are covered in the literature review. The paper highlights the strengths and weaknesses of the available defense mechanism. To understand the performance status of the system we have implemented a DoS by the hping3 tool. This gives us better clarity in shortlisting and analyzing the parameters for the detection of DDoS attacks. Also, we try to analyze the impact of TCP SYN attack on the network in DDoS attacks.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crowdsensing: Assessment of Cognitive Fitness Using Machine Learning 群体感知:使用机器学习评估认知适应性
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.559-570
Samin Ahsan Tausif, Aysha Gazi Mouri, Ishfaq Rahman, Nilufar Hossain, H. M. Z. Haque
—The expanded use of smartphones and the Internet of Things have enabled the usage of mobile crowdsensing technologies to improve public health care in clinical sciences. Mobile crowdsensing enlightens a new sensing pattern that can reliably differentiate individuals based on their cognitive fitness. In previous studies on this domain, the visual correlation has not been illustrated between physiological functions and the mental fitness of human beings. Therefore, there exists potential gaps in providing mathematical evidence of correlation between physical activities & cognitive health. Moreover, empirical analysis of autonomous smartphone sensing to assess mental health is yet to be researched on a large scale, showing the correspondence between ubiquitous mobile sensors data and Patient Health Questionnaire-9 (PHQ-9) depression scales. This research systematically collects mobile sensors’ data along with standard PHQ-9 questionnaire data and utilizes traditional machine learning techniques (Supervised and Unsupervised) for performing necessary analysis. Moreover, we have conducted statistical t-tests to find similarities or to differentiate between people of distinct cognitive fitness levels. This research has successfully demonstrated the numerical evidence of correlations between physiological activities and the cognitive fitness of human beings. The Fine-tuned regression models built for the purpose of predicting users’ cognitive fitness score, perform accurately to a certain extent. In this analysis, crowdsensing is perceived to differentiate several people’s cognitive fitness levels comprehensively. Furthermore, our study has addressed a significant insights to assessing people’s mental fitness by relying upon their smartphone usage.
——智能手机和物联网的广泛使用使移动人群感知技术能够改善临床科学领域的公共卫生保健。移动众测启发了一种新的感知模式,可以根据个体的认知适应度可靠地区分个体。在这一领域以往的研究中,尚未发现人类生理功能与心理健康之间的视觉相关性。因此,在提供体育活动与认知健康之间相关性的数学证据方面存在潜在的差距。此外,自主智能手机感知评估心理健康的实证分析尚未进行大规模研究,显示无处不在的移动传感器数据与患者健康问卷-9 (PHQ-9)抑郁量表之间存在对应关系。本研究系统地收集移动传感器数据以及标准PHQ-9问卷数据,并利用传统的机器学习技术(有监督和无监督)进行必要的分析。此外,我们还进行了统计t检验,以发现相似之处或区分不同认知健康水平的人。该研究成功地证明了生理活动与人类认知健康之间相关性的数值证据。为预测用户的认知健康得分而建立的微调回归模型有一定的准确性。在本分析中,众测被认为是对几个人认知健康水平的综合区分。此外,我们的研究还提出了一个重要的见解,即通过依赖智能手机的使用来评估人们的心理健康状况。
{"title":"Crowdsensing: Assessment of Cognitive Fitness Using Machine Learning","authors":"Samin Ahsan Tausif, Aysha Gazi Mouri, Ishfaq Rahman, Nilufar Hossain, H. M. Z. Haque","doi":"10.12720/jait.14.3.559-570","DOIUrl":"https://doi.org/10.12720/jait.14.3.559-570","url":null,"abstract":"—The expanded use of smartphones and the Internet of Things have enabled the usage of mobile crowdsensing technologies to improve public health care in clinical sciences. Mobile crowdsensing enlightens a new sensing pattern that can reliably differentiate individuals based on their cognitive fitness. In previous studies on this domain, the visual correlation has not been illustrated between physiological functions and the mental fitness of human beings. Therefore, there exists potential gaps in providing mathematical evidence of correlation between physical activities & cognitive health. Moreover, empirical analysis of autonomous smartphone sensing to assess mental health is yet to be researched on a large scale, showing the correspondence between ubiquitous mobile sensors data and Patient Health Questionnaire-9 (PHQ-9) depression scales. This research systematically collects mobile sensors’ data along with standard PHQ-9 questionnaire data and utilizes traditional machine learning techniques (Supervised and Unsupervised) for performing necessary analysis. Moreover, we have conducted statistical t-tests to find similarities or to differentiate between people of distinct cognitive fitness levels. This research has successfully demonstrated the numerical evidence of correlations between physiological activities and the cognitive fitness of human beings. The Fine-tuned regression models built for the purpose of predicting users’ cognitive fitness score, perform accurately to a certain extent. In this analysis, crowdsensing is perceived to differentiate several people’s cognitive fitness levels comprehensively. Furthermore, our study has addressed a significant insights to assessing people’s mental fitness by relying upon their smartphone usage.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Advances in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1