首页 > 最新文献

2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)最新文献

英文 中文
Robotic arm using voice and Gesture recognition 使用语音和手势识别的机械臂
Nabeeh Kandalaft, Padma Sandeep Kalidindi, S. Narra, Himadri Nath Saha
There is an increasing need to create robots for different situations and applications involving the medical field as well as other fields where human interaction is challenging and unsafe. Ease of control operation greatly impact their effective application. In this paper, a robotic arm controlled by gesture movements and voice commands is proposed and constructed using 3D printing. The gesture data is developed using an accelerometer with a pre-selected voice commands using voice recognition module based on a Bluetooth communication protocol for the microcontroller. The prototype has 3 degrees of freedom (DOF) and can perform predefined controlled robotic program operations. Performance evaluation was carried out through various experiments, with promising results for numerous medical applications.
越来越需要为涉及医疗领域以及人类互动具有挑战性和不安全的其他领域的不同情况和应用创造机器人。控制操作的难易程度是影响其有效应用的重要因素。本文提出并利用3D打印技术构建了一种由手势运动和语音指令控制的机械臂。手势数据是使用带有预先选择语音命令的加速度计开发的,使用基于微控制器蓝牙通信协议的语音识别模块。原型有3个自由度(DOF),可以执行预定义的控制机器人程序操作。通过各种实验进行了性能评估,并在许多医学应用中取得了有希望的结果。
{"title":"Robotic arm using voice and Gesture recognition","authors":"Nabeeh Kandalaft, Padma Sandeep Kalidindi, S. Narra, Himadri Nath Saha","doi":"10.1109/IEMCON.2018.8615055","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615055","url":null,"abstract":"There is an increasing need to create robots for different situations and applications involving the medical field as well as other fields where human interaction is challenging and unsafe. Ease of control operation greatly impact their effective application. In this paper, a robotic arm controlled by gesture movements and voice commands is proposed and constructed using 3D printing. The gesture data is developed using an accelerometer with a pre-selected voice commands using voice recognition module based on a Bluetooth communication protocol for the microcontroller. The prototype has 3 degrees of freedom (DOF) and can perform predefined controlled robotic program operations. Performance evaluation was carried out through various experiments, with promising results for numerous medical applications.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of an AdHoc Network in an Intelligent Transportation System 智能交通系统中的AdHoc网络分析
J. Leite, Paulo S. Martins, E. Ursini
This work presents six simulation case studies of AdHoc and IoT Networks, considering congested and uncongested nodes, messages with and without priorities, including routing optimization and message losses using the Two-ray as a propagation model and the RWP as the mobility model. The goal is to analyze the traffic of the mediator to estimate its capacity considering an ITS application. Specifically, we aim at determining the processor utilization and message delays. The proposed model and simulation tool may be used to plan and dimension the network. The results showed that routing optimization and prioritization of messages are relevant to the effective resource usage of the network.
这项工作提出了AdHoc和物联网网络的六个模拟案例研究,考虑了拥塞和非拥塞节点,具有和不具有优先级的消息,包括使用Two-ray作为传播模型和RWP作为移动模型的路由优化和消息丢失。目标是分析中介的流量,以估计其考虑its应用程序的容量。具体来说,我们的目标是确定处理器利用率和消息延迟。所提出的模型和仿真工具可用于规划和量纲化网络。结果表明,路由优化和消息优先级优化关系到网络资源的有效利用。
{"title":"Analysis of an AdHoc Network in an Intelligent Transportation System","authors":"J. Leite, Paulo S. Martins, E. Ursini","doi":"10.1109/IEMCON.2018.8615061","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615061","url":null,"abstract":"This work presents six simulation case studies of AdHoc and IoT Networks, considering congested and uncongested nodes, messages with and without priorities, including routing optimization and message losses using the Two-ray as a propagation model and the RWP as the mobility model. The goal is to analyze the traffic of the mediator to estimate its capacity considering an ITS application. Specifically, we aim at determining the processor utilization and message delays. The proposed model and simulation tool may be used to plan and dimension the network. The results showed that routing optimization and prioritization of messages are relevant to the effective resource usage of the network.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-Heuristic State Space Search 多启发式状态空间搜索
Anirudha Bhaskar
State space seek is a procedure utilized as a part of the field of software engineering, including counterfeit consciousness (AI), in which progressive designs or conditions of an occasion are considered, with the objective of finding an objective state with a coveted property. In spite of the very fact that this enterprise has varied applications as well as those for movement arranging, trying with design information heuristics, AND/OR charts then on. This main objective of this paper is to run Multi-Heuristic Planner on a 3D Environment. This framework is build on this believe that multiple searches along with different in-admissible heuristics will guild the path of an object to its desired goal in a way that will preserve completeness and guarantees on suboptimality bounds.
状态空间搜索是软件工程领域的一部分,包括伪造意识(AI),其中考虑渐进设计或场合条件,目的是找到具有令人垂涎的属性的客观状态。尽管这个企业有各种各样的应用,比如运动安排,设计信息启发式,AND/OR图等等。本文的主要目标是在三维环境中运行多启发式规划器。这个框架是建立在这样一种信念之上的:使用不同的不可接受的启发式方法进行多次搜索,将以一种保持完整性和保证次优性边界的方式指导对象到达其期望目标的路径。
{"title":"Multi-Heuristic State Space Search","authors":"Anirudha Bhaskar","doi":"10.1109/IEMCON.2018.8614941","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614941","url":null,"abstract":"State space seek is a procedure utilized as a part of the field of software engineering, including counterfeit consciousness (AI), in which progressive designs or conditions of an occasion are considered, with the objective of finding an objective state with a coveted property. In spite of the very fact that this enterprise has varied applications as well as those for movement arranging, trying with design information heuristics, AND/OR charts then on. This main objective of this paper is to run Multi-Heuristic Planner on a 3D Environment. This framework is build on this believe that multiple searches along with different in-admissible heuristics will guild the path of an object to its desired goal in a way that will preserve completeness and guarantees on suboptimality bounds.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122398874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method for Mining Abnormal Behaviors in Social Medical Insurance 社会医疗保险异常行为挖掘的新方法
Shengyao Zhou, Runtong Zhang, Jiayi Feng, Donghua Chen, Lei Chen
It is very important to strengthen the management of medical insurance and guarantee the steady operation of medical insurance fund. Data mining technology can provide an effective solution for medical aggregation behavior mining. It is helpful to find out the people who have the gathering behavior of medical treatment. In view of the aggregation behavior of medical insurance funds during operation, this study proposes the consistent behavior mining algorithm based on frequent pattern mining. Experiments show that this algorithm has better performance than Apriori and Eclat, can effectively detect the aggregation behavior of medical insurance, and has achieved remarkable results in the management and supervision of medical insurance.
加强对医疗保险的管理,保证医疗保险基金的稳定运行具有十分重要的意义。数据挖掘技术可以为医疗聚合行为挖掘提供有效的解决方案。这有助于发现有就医聚集行为的人群。针对医疗保险资金运行过程中的聚集行为,提出了基于频繁模式挖掘的一致性行为挖掘算法。实验表明,该算法比Apriori和Eclat具有更好的性能,可以有效地检测医疗保险的聚合行为,在医疗保险的管理和监督方面取得了显著的效果。
{"title":"A Novel Method for Mining Abnormal Behaviors in Social Medical Insurance","authors":"Shengyao Zhou, Runtong Zhang, Jiayi Feng, Donghua Chen, Lei Chen","doi":"10.1109/IEMCON.2018.8614806","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614806","url":null,"abstract":"It is very important to strengthen the management of medical insurance and guarantee the steady operation of medical insurance fund. Data mining technology can provide an effective solution for medical aggregation behavior mining. It is helpful to find out the people who have the gathering behavior of medical treatment. In view of the aggregation behavior of medical insurance funds during operation, this study proposes the consistent behavior mining algorithm based on frequent pattern mining. Experiments show that this algorithm has better performance than Apriori and Eclat, can effectively detect the aggregation behavior of medical insurance, and has achieved remarkable results in the management and supervision of medical insurance.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keyframe extraction for human motion capture data based on affinity propagation 基于亲和传播的人体动作捕捉数据关键帧提取
Bin Sun, Dehui Kong, Shaofan Wang, Jinghua Li
Keyframe extraction is important for video retrieval. In order to realize frequency adaptive human motion sequence resampling and achieve high quality keyframe, we propose a new keyframe extraction method for human motion sequence. First, we define the inter-frame similarity metric based on the features of human body parts. Then, the keyframe extraction is realized by the affine propagation clustering algorithm. The proposed method starts from the information distribution of the video itself, adaptively searches for the optimal keyframe of the video, and the operation speed is fast. Finally, the evaluation of the sequence reconstruction based on keyframe is verified. A comparative experiment conducted on the CMU database verified the efficiency of our method.
关键帧提取是视频检索的重要内容。为了实现频率自适应人体运动序列重采样,获得高质量的关键帧,提出了一种新的人体运动序列关键帧提取方法。首先,基于人体部位特征定义帧间相似度度量;然后,利用仿射传播聚类算法实现关键帧的提取。该方法从视频本身的信息分布出发,自适应搜索视频的最优关键帧,运算速度快。最后,验证了基于关键帧的序列重建评价。在CMU数据库上进行的对比实验验证了该方法的有效性。
{"title":"Keyframe extraction for human motion capture data based on affinity propagation","authors":"Bin Sun, Dehui Kong, Shaofan Wang, Jinghua Li","doi":"10.1109/IEMCON.2018.8614862","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614862","url":null,"abstract":"Keyframe extraction is important for video retrieval. In order to realize frequency adaptive human motion sequence resampling and achieve high quality keyframe, we propose a new keyframe extraction method for human motion sequence. First, we define the inter-frame similarity metric based on the features of human body parts. Then, the keyframe extraction is realized by the affine propagation clustering algorithm. The proposed method starts from the information distribution of the video itself, adaptively searches for the optimal keyframe of the video, and the operation speed is fast. Finally, the evaluation of the sequence reconstruction based on keyframe is verified. A comparative experiment conducted on the CMU database verified the efficiency of our method.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129769875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Practical Assessment of Mathematical Methods for Treatment of Tooth Cavities Using Laser Based Approach 激光治疗牙腔的数学方法的实用评估
Vala Mehryar Alviri, Morteza Modarresi Asem, Alireza Nikbin
In dental treatment, we need modern diagnostic methods to accurately detect the cavities in the teeth. The optical-based methods like laser therapy appear nowadays as conventional approaches with a widespread use. Lasers have negligible danger of harming the pulp and soft textures comparing to rotative tools. The mechanism of removal is electrostatic so the laser is only absorbed in a small mass of tissue; therefore, first electrons and after that, ions are removed quickly. This, reduces the heat directed to the surrounding materials. However, by development of laser methods, a new hope is rising to manufacture efficient and useful equipment in the near future. In this paper, an overview of different traits of four laser methods is presented and compared. Finally, Hermit-Gaussian laser mode, Fraunhofer equation, absorbed dose of laser radiation on the occlusal surface and heat conduction toward the crown are simulated. Foresaid statements are significant, due to their impact on more precise, less destructive outcomes and progress in dentistry laser methods, are the absolute aim of the paper.
在牙科治疗中,我们需要现代的诊断方法来准确地检测牙齿中的蛀牙。以光学为基础的方法,如激光治疗,如今作为常规方法被广泛使用。与旋转工具相比,激光对牙髓和柔软纹理的伤害可以忽略不计。去除的机制是静电的,所以激光只被一小块组织吸收;因此,首先是电子,然后是离子被迅速移除。这就减少了流向周围材料的热量。然而,随着激光技术的发展,在不久的将来制造高效实用的设备的新希望正在升起。本文概述并比较了四种激光方法的不同特性。最后,模拟了赫尔密-高斯激光模式、弗劳恩霍夫方程、激光辐射在咬合表面的吸收剂量和牙冠的热传导。上述陈述是重要的,因为它们对更精确,破坏性更小的结果和牙科激光方法的进步的影响,是本文的绝对目的。
{"title":"Practical Assessment of Mathematical Methods for Treatment of Tooth Cavities Using Laser Based Approach","authors":"Vala Mehryar Alviri, Morteza Modarresi Asem, Alireza Nikbin","doi":"10.1109/IEMCON.2018.8614872","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614872","url":null,"abstract":"In dental treatment, we need modern diagnostic methods to accurately detect the cavities in the teeth. The optical-based methods like laser therapy appear nowadays as conventional approaches with a widespread use. Lasers have negligible danger of harming the pulp and soft textures comparing to rotative tools. The mechanism of removal is electrostatic so the laser is only absorbed in a small mass of tissue; therefore, first electrons and after that, ions are removed quickly. This, reduces the heat directed to the surrounding materials. However, by development of laser methods, a new hope is rising to manufacture efficient and useful equipment in the near future. In this paper, an overview of different traits of four laser methods is presented and compared. Finally, Hermit-Gaussian laser mode, Fraunhofer equation, absorbed dose of laser radiation on the occlusal surface and heat conduction toward the crown are simulated. Foresaid statements are significant, due to their impact on more precise, less destructive outcomes and progress in dentistry laser methods, are the absolute aim of the paper.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128490901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Awareness as an enabler of Cognitive Security 自我意识是认知安全的推动者
R. Andrade, Jenny Torres
Security specialists face complex situations where they need to make immediate decisions based on the analysis of large volumes of information, exceeding it their human capacity. Cognitive systems are proposed as an alternative to reduce this limitation, motivating us to investigate its use in the field of cybersecurity, known as cognitive security. Based on the review of the literature, we found different concepts of cognitive security with diverse approaches. Thus, our first contribution is to present a definition of cognitive security emphasizing the use of cognition for making decisions in real time and including the term self-awareness. Additionally, we investigated how to generate cognition in digital environments, including self-awareness adapted to computer systems. We propose self-awareness as an enabler to implement cognitive security, for which a second contribution in this paper is to generate the state of self-awareness from the cybersecurity approach using the contributions of autonomous computing, and establishing the technical and non-technical solutions for its implementation.
安全专家面临着复杂的情况,他们需要根据对大量信息的分析立即做出决定,这超出了他们的人力能力。认知系统被提出作为减少这种限制的替代方案,激励我们研究其在网络安全领域的应用,即认知安全。在回顾文献的基础上,我们发现认知安全的不同概念和不同的研究方法。因此,我们的第一个贡献是提出认知安全的定义,强调在实时决策中使用认知,并包括术语自我意识。此外,我们还研究了如何在数字环境中产生认知,包括适应计算机系统的自我意识。我们提出自我意识作为实现认知安全的推动者,本文的第二个贡献是利用自主计算的贡献从网络安全方法中生成自我意识状态,并为其实现建立技术和非技术解决方案。
{"title":"Self-Awareness as an enabler of Cognitive Security","authors":"R. Andrade, Jenny Torres","doi":"10.1109/IEMCON.2018.8614798","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614798","url":null,"abstract":"Security specialists face complex situations where they need to make immediate decisions based on the analysis of large volumes of information, exceeding it their human capacity. Cognitive systems are proposed as an alternative to reduce this limitation, motivating us to investigate its use in the field of cybersecurity, known as cognitive security. Based on the review of the literature, we found different concepts of cognitive security with diverse approaches. Thus, our first contribution is to present a definition of cognitive security emphasizing the use of cognition for making decisions in real time and including the term self-awareness. Additionally, we investigated how to generate cognition in digital environments, including self-awareness adapted to computer systems. We propose self-awareness as an enabler to implement cognitive security, for which a second contribution in this paper is to generate the state of self-awareness from the cybersecurity approach using the contributions of autonomous computing, and establishing the technical and non-technical solutions for its implementation.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124552322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed Chunk-Based Framework for Parallelization of Sequential Computer Vision Algorithms on Video Big-Data 基于分布式块的视频大数据并行化顺序计算机视觉算法框架
Norhan Buckla, M. Rehan, H. Fahmy
In this paper we propose a complete framework that enables big-data tools to execute sequential computer vision algorithms in a scalable and parallel mechanism with limited modifications. Our main objective is to parallelize the processing operation in order to speed up the required processing time. Most of the present big-data processing frameworks distribute the input data randomly across the available processing units to utilize them efficiently and preserve working load fairness. Therefore, the current big-data frameworks are not suitable for processing huge video data content due to the existence of interframe dependency. When processing such sequential computer vision algorithms on big-data tools, splitting the video frames and distributing them on the available cores will not yield the correct output and will lead to inefficient usage of underlying processing resources. Our proposed framework divides the input big-data video files into small chunks that can be processed in parallel without affecting the quality of the resulting output. An intelligent data grouping algorithm was developed to distribute these data chunks among the available processing resources and gather the results out of each chunk using Apache Storm. The proposed framework was evaluated against several computer vision algorithms and achieved a speedup from 2.6x up to 8x based on the algorithm.
在本文中,我们提出了一个完整的框架,使大数据工具能够在有限的修改下以可扩展和并行的机制执行顺序计算机视觉算法。我们的主要目标是并行化处理操作,以加快所需的处理时间。目前大多数大数据处理框架将输入数据随机分布在可用的处理单元上,以有效地利用它们并保持工作负载的公平性。因此,由于帧间依赖的存在,目前的大数据框架并不适合处理庞大的视频数据内容。当在大数据工具上处理这种顺序计算机视觉算法时,拆分视频帧并将其分配到可用的内核上,将无法产生正确的输出,并且会导致底层处理资源的低效使用。我们提出的框架将输入的大数据视频文件分成小块,这些小块可以并行处理,而不会影响最终输出的质量。开发了一种智能数据分组算法,将这些数据块分布在可用的处理资源中,并使用Apache Storm收集每个数据块的结果。将该框架与几种计算机视觉算法进行了对比,结果表明,该框架的加速速度从2.6倍提高到8倍。
{"title":"Distributed Chunk-Based Framework for Parallelization of Sequential Computer Vision Algorithms on Video Big-Data","authors":"Norhan Buckla, M. Rehan, H. Fahmy","doi":"10.1109/IEMCON.2018.8615005","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615005","url":null,"abstract":"In this paper we propose a complete framework that enables big-data tools to execute sequential computer vision algorithms in a scalable and parallel mechanism with limited modifications. Our main objective is to parallelize the processing operation in order to speed up the required processing time. Most of the present big-data processing frameworks distribute the input data randomly across the available processing units to utilize them efficiently and preserve working load fairness. Therefore, the current big-data frameworks are not suitable for processing huge video data content due to the existence of interframe dependency. When processing such sequential computer vision algorithms on big-data tools, splitting the video frames and distributing them on the available cores will not yield the correct output and will lead to inefficient usage of underlying processing resources. Our proposed framework divides the input big-data video files into small chunks that can be processed in parallel without affecting the quality of the resulting output. An intelligent data grouping algorithm was developed to distribute these data chunks among the available processing resources and gather the results out of each chunk using Apache Storm. The proposed framework was evaluated against several computer vision algorithms and achieved a speedup from 2.6x up to 8x based on the algorithm.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit Card Fraud Detection Using Sparse Autoencoder and Generative Adversarial Network 基于稀疏自编码器和生成对抗网络的信用卡欺诈检测
Jian Chen, Yao Shen, Riaz Ali
Current credit card detection methods usually utilize the idea of classification, requiring a balanced training dataset which should contain both positive and negative samples. However, we often get highly skewed datasets with very few frauds. In this paper, we want to apply deep learning techniques to help handle this situation. We firstly use sparse autoencoder (SAE) to obtain representations of normal transactions and then train a generative adversarial network (GAN) with these representations. Finally, we combine the SAE and the discriminator of GAN and apply them to detect whether a transaction is genuine or fraud. The experimental results show that our solution outperforms the other state-of-the-art one-class methods.
目前的信用卡检测方法通常利用分类的思想,需要一个平衡的训练数据集,其中应该包含正样本和负样本。然而,我们经常得到高度扭曲的数据集,其中很少有欺诈行为。在本文中,我们希望应用深度学习技术来帮助处理这种情况。我们首先使用稀疏自编码器(SAE)获得正常事务的表示,然后使用这些表示训练生成式对抗网络(GAN)。最后,我们将SAE和GAN的鉴别器结合起来,并应用它们来检测交易是真实的还是欺诈的。实验结果表明,我们的解决方案优于其他最先进的一类方法。
{"title":"Credit Card Fraud Detection Using Sparse Autoencoder and Generative Adversarial Network","authors":"Jian Chen, Yao Shen, Riaz Ali","doi":"10.1109/IEMCON.2018.8614815","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614815","url":null,"abstract":"Current credit card detection methods usually utilize the idea of classification, requiring a balanced training dataset which should contain both positive and negative samples. However, we often get highly skewed datasets with very few frauds. In this paper, we want to apply deep learning techniques to help handle this situation. We firstly use sparse autoencoder (SAE) to obtain representations of normal transactions and then train a generative adversarial network (GAN) with these representations. Finally, we combine the SAE and the discriminator of GAN and apply them to detect whether a transaction is genuine or fraud. The experimental results show that our solution outperforms the other state-of-the-art one-class methods.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Strategies for Continuous Region Query Processing in Moving Point Sets 移动点集中连续区域查询处理策略
Shauli Sarmin Sumi, W. Osborn
Nowadays, many mobile applications provide location-based services that allow users to access location-related information from anywhere, whenever they desire. A moving user can issue queries to access information about moving or static objects. Continuous spatial query processing systems are used for this type of application. We propose two continuous query processing strategies moving point sets. The objectives of our strategies are to reduce: (1) the server workload, (2) the data transmission cost and (3) the query response time, for location-based services while providing an answer for a continuous region query. We compare our strategies with a brute-force strategy. Results show that our strategies can significantly reduce the server workload, data transmission cost, and response time over the brute-force method in many cases.
如今,许多移动应用程序提供基于位置的服务,允许用户随时随地访问与位置相关的信息。移动用户可以发出查询来访问有关移动或静态对象的信息。连续空间查询处理系统用于这类应用程序。提出了两种连续查询处理策略:移动点集。我们策略的目标是减少:(1)服务器工作负载,(2)数据传输成本和(3)查询响应时间,为基于位置的服务提供连续区域查询的答案。我们将我们的策略与暴力策略进行比较。结果表明,在许多情况下,与暴力破解方法相比,我们的策略可以显著减少服务器工作负载、数据传输成本和响应时间。
{"title":"Strategies for Continuous Region Query Processing in Moving Point Sets","authors":"Shauli Sarmin Sumi, W. Osborn","doi":"10.1109/IEMCON.2018.8614984","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614984","url":null,"abstract":"Nowadays, many mobile applications provide location-based services that allow users to access location-related information from anywhere, whenever they desire. A moving user can issue queries to access information about moving or static objects. Continuous spatial query processing systems are used for this type of application. We propose two continuous query processing strategies moving point sets. The objectives of our strategies are to reduce: (1) the server workload, (2) the data transmission cost and (3) the query response time, for location-based services while providing an answer for a continuous region query. We compare our strategies with a brute-force strategy. Results show that our strategies can significantly reduce the server workload, data transmission cost, and response time over the brute-force method in many cases.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123943091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1