首页 > 最新文献

2022 IEEE World AI IoT Congress (AIIoT)最新文献

英文 中文
Computer Vision Method in Means of Egress Obstruction Detection 出口障碍物检测中的计算机视觉方法
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817354
Ismail A Idowu, K. Nyarko, Otily Toutsop
A safety inspection is an on-site walk-through to identify potential hazards to occupants and personnel and options for remedial action. Although the Common approach for the safety inspection (Means of Egress MOE) is manual, this approach is ineffective and inexhaustive due to some inherent challenges: (1) infrequent inspection, and (2) inefficient use of trained human resources. To address these challenges, we introduced a Dual Temporal Buffer Differencing method. This computer vision-based approach automates the inspection of an interior building hallway (exit access) for an obstruction that may be a potential fire hazard. Our approach is important because it will mitigate the risk of a fire hazard to the building occupants by sensing and alerting the safety officer before a situation turns into an emergency. The performance of our proposed approach, the benefits, and the implementation challenges, were evaluated through a case study. The result demonstrates that our proposed Dual Temporal Buffer Differencing (DTBD) method can detect a potential fire hazard in the building exit access effectively and continuously. As a result, the approach can facilitate safety in the building and allow safety inspectors to plan more trained human resources.
安全检查是一种现场巡视,以确定对居住者和工作人员的潜在危险以及补救措施的选择。虽然安全检查(出口工具MOE)的常见方法是手动的,但由于一些固有的挑战,这种方法是无效的和不彻底的:(1)不频繁的检查;(2)培训人力资源的低效使用。为了解决这些挑战,我们引入了双时间缓冲差分方法。这种基于计算机视觉的方法可以自动检查建筑物内部走廊(出口通道)中可能存在潜在火灾危险的障碍物。我们的方法很重要,因为它可以在情况变成紧急情况之前感知并提醒安全人员,从而降低建筑物居住者发生火灾的风险。我们提出的方法的性能、好处和实现挑战通过案例研究进行了评估。结果表明,本文提出的双时间缓冲差分(DTBD)方法能够有效、连续地检测出建筑物出口通道的潜在火灾隐患。因此,这种方法可以促进建筑物的安全,并使安全检查员能够规划更多训练有素的人力资源。
{"title":"Computer Vision Method in Means of Egress Obstruction Detection","authors":"Ismail A Idowu, K. Nyarko, Otily Toutsop","doi":"10.1109/aiiot54504.2022.9817354","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817354","url":null,"abstract":"A safety inspection is an on-site walk-through to identify potential hazards to occupants and personnel and options for remedial action. Although the Common approach for the safety inspection (Means of Egress MOE) is manual, this approach is ineffective and inexhaustive due to some inherent challenges: (1) infrequent inspection, and (2) inefficient use of trained human resources. To address these challenges, we introduced a Dual Temporal Buffer Differencing method. This computer vision-based approach automates the inspection of an interior building hallway (exit access) for an obstruction that may be a potential fire hazard. Our approach is important because it will mitigate the risk of a fire hazard to the building occupants by sensing and alerting the safety officer before a situation turns into an emergency. The performance of our proposed approach, the benefits, and the implementation challenges, were evaluated through a case study. The result demonstrates that our proposed Dual Temporal Buffer Differencing (DTBD) method can detect a potential fire hazard in the building exit access effectively and continuously. As a result, the approach can facilitate safety in the building and allow safety inspectors to plan more trained human resources.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124362931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Firefly-DE algorithm for Ridesharing Systems with Cost Savings Allocation Schemes 具有成本节约分配方案的拼车系统的混合萤火虫- de算法
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817152
Fu-Shiung Hsieh
Ridesharing or shared mobility have been attracting significant attention in relevant research community. Most studies focus on how to match drivers and riders to minimize the overall travel distance based on their requirements. As cost savings is an essential function in ridesharing systems, allocation of cost savings has attracted researchers' attention recently. Several simple schemes have been proposed in the literature. For example, a simple scheme is to divide cost savings equally between driver and passengers in a ride. Another scheme is to allocate cost savings to participants proportional to their original travel distance. Although these simple schemes are easy to implement, there still lack a study that compare their effectiveness in ridesharing systems by applying different metaheuristic algorithms. In this paper, a hybrid meta-heuristic algorithm called hybrid Firefly-DE algorithm based on Differential Evolution and Firefly Algorithm will be adopted to match drivers and riders. We will compare three cost savings allocation schemes based on the numerical results. In our experiments, meta-heuristic algorithms are applied to find the matches to minimize the overall travel distance. The above schemes are then used to allocate cost savings among participants. The results indicate that the proportional cos savings allocation scheme is more effective than the other schemes to allocate cost savings equally between the drivers and the passengers.
拼车或共享出行已经引起了相关研究界的极大关注。大多数研究都集中在如何根据司机和乘客的需求进行匹配,以最小化总行程。由于成本节约是拼车系统的一个重要功能,成本节约的分配问题近年来引起了研究者的关注。文献中提出了几种简单的方案。例如,一个简单的方案是将节省的成本在司机和乘客之间平均分配。另一种方案是将节省的费用按参与者的原始旅行距离成比例分配给他们。虽然这些简单的方案很容易实现,但目前还没有研究通过应用不同的元启发式算法来比较它们在拼车系统中的有效性。本文将采用一种混合元启发式算法,即基于差分进化和萤火虫算法的混合萤火虫- de算法,对司机和乘客进行匹配。我们将根据数值结果比较三种成本节约分配方案。在我们的实验中,采用元启发式算法来寻找匹配,以最小化总旅行距离。然后使用上述方案在参与者之间分配节省的成本。结果表明,成本节约比例分配方案比其他方案更能有效地在司机和乘客之间平均分配成本节约。
{"title":"A Hybrid Firefly-DE algorithm for Ridesharing Systems with Cost Savings Allocation Schemes","authors":"Fu-Shiung Hsieh","doi":"10.1109/aiiot54504.2022.9817152","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817152","url":null,"abstract":"Ridesharing or shared mobility have been attracting significant attention in relevant research community. Most studies focus on how to match drivers and riders to minimize the overall travel distance based on their requirements. As cost savings is an essential function in ridesharing systems, allocation of cost savings has attracted researchers' attention recently. Several simple schemes have been proposed in the literature. For example, a simple scheme is to divide cost savings equally between driver and passengers in a ride. Another scheme is to allocate cost savings to participants proportional to their original travel distance. Although these simple schemes are easy to implement, there still lack a study that compare their effectiveness in ridesharing systems by applying different metaheuristic algorithms. In this paper, a hybrid meta-heuristic algorithm called hybrid Firefly-DE algorithm based on Differential Evolution and Firefly Algorithm will be adopted to match drivers and riders. We will compare three cost savings allocation schemes based on the numerical results. In our experiments, meta-heuristic algorithms are applied to find the matches to minimize the overall travel distance. The above schemes are then used to allocate cost savings among participants. The results indicate that the proportional cos savings allocation scheme is more effective than the other schemes to allocate cost savings equally between the drivers and the passengers.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114153979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Automatic Speech Segmentation Algorithm of Portuguese based on Spectrogram Windowing 基于谱图窗的葡萄牙语自动语音分割算法
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817299
Lap-Man Hoi, Yuqi Sun, S. Im
Sentence segmentation is important for improving the human readability of Automatic Speech Recognition (ASR) systems. Although it has been explored through numerous interdisciplinary studies, segmentation of Portuguese is still time-consuming due to the lack of efficient automatic segmentation methods and the reliance on qualified phonetic experts. This paper presents a novel algorithm that efficiently segments speech into sentences by learning the spectrogram of sentences through windows using a classification model developed with an Artificial Neural Network (ANN). Based on our experiments, the beginning part of a European Portuguese (EP) sentence enables better identification of the sentence's boundaries. In addition, a window frame of spectrogram constructed by the previous ending of 100 milliseconds (ms) and the subsequent beginning of 300 ms presents the best performance in the automatic sentence segmentation. As a result, the proposed algorithm can automatically segment Portuguese speech into sentences by analyzing its spectrogram without knowing the speech semantics.
句子切分对于提高自动语音识别系统的可读性具有重要意义。尽管已经进行了许多跨学科的研究,但由于缺乏有效的自动分词方法和依赖于合格的语音专家,葡萄牙语的分词仍然是耗时的。本文提出了一种基于人工神经网络(ANN)的分类模型,通过窗口学习句子的谱图,有效地将语音分割成句子的算法。根据我们的实验,欧洲葡萄牙语(EP)句子的开头部分可以更好地识别句子的边界。另外,以前一个100毫秒(ms)结束和后一个300毫秒(ms)开始构建的谱图窗口框架在自动句子分割中表现出最好的性能。结果表明,该算法可以在不知道语音语义的情况下,通过分析葡萄牙语语音的谱图,自动将葡萄牙语语音分割成句子。
{"title":"An Automatic Speech Segmentation Algorithm of Portuguese based on Spectrogram Windowing","authors":"Lap-Man Hoi, Yuqi Sun, S. Im","doi":"10.1109/aiiot54504.2022.9817299","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817299","url":null,"abstract":"Sentence segmentation is important for improving the human readability of Automatic Speech Recognition (ASR) systems. Although it has been explored through numerous interdisciplinary studies, segmentation of Portuguese is still time-consuming due to the lack of efficient automatic segmentation methods and the reliance on qualified phonetic experts. This paper presents a novel algorithm that efficiently segments speech into sentences by learning the spectrogram of sentences through windows using a classification model developed with an Artificial Neural Network (ANN). Based on our experiments, the beginning part of a European Portuguese (EP) sentence enables better identification of the sentence's boundaries. In addition, a window frame of spectrogram constructed by the previous ending of 100 milliseconds (ms) and the subsequent beginning of 300 ms presents the best performance in the automatic sentence segmentation. As a result, the proposed algorithm can automatically segment Portuguese speech into sentences by analyzing its spectrogram without knowing the speech semantics.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122113894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Movie Success: A Comparison of Two Movie Datasets 电影成功的分类:两个电影数据集的比较
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817158
Shreehar Joshi, Eman Abdelfattah, Ryan Osgood
This work presents a classification problem to classify a movie's success based on features of a given movie. Two movies' datasets along with features generated from web scraping are utilized to generate the training and testing datasets. Four Machine Learning classifiers are applied to these datasets: Stochastic Gradient Descent, Random Forests, LinearSVC and Extra Trees. This study compares the performance metrics for these Machine Learning models on these two movies datasets and draws conclusions based on the results.
这项工作提出了一个分类问题,根据给定电影的特征对电影的成功进行分类。两个电影的数据集以及从web抓取生成的特征被用来生成训练和测试数据集。四种机器学习分类器应用于这些数据集:随机梯度下降,随机森林,线性svc和额外树。本研究比较了这些机器学习模型在这两个电影数据集上的性能指标,并根据结果得出结论。
{"title":"Classification of Movie Success: A Comparison of Two Movie Datasets","authors":"Shreehar Joshi, Eman Abdelfattah, Ryan Osgood","doi":"10.1109/aiiot54504.2022.9817158","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817158","url":null,"abstract":"This work presents a classification problem to classify a movie's success based on features of a given movie. Two movies' datasets along with features generated from web scraping are utilized to generate the training and testing datasets. Four Machine Learning classifiers are applied to these datasets: Stochastic Gradient Descent, Random Forests, LinearSVC and Extra Trees. This study compares the performance metrics for these Machine Learning models on these two movies datasets and draws conclusions based on the results.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129588795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of AlexNet, Resnet-50, and Inception-V3 Models on Masked Face Recognition AlexNet、Resnet-50和Inception-V3模型在蒙面人脸识别中的比较分析
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817327
Benedicta Nana Esi Nyarko, Wu Bin, Jinzhi Zhou, George Kofi Agordzo, J. Odoom, Ebenezer Koukoyi
Since the outbreak of the coronavirus pandemic in December 2019, there has been increased interest in developing better facial recognition systems. This stems from the need to protect everyone from the spread of the virus. However, the measures taken to prevent the spread of the virus pose a challenge to security and surveillance systems as existing systems are unable to match faces with masks more efficiently. For this study, a custom dataset was generated due to the unavailability of a large face dataset for masked face recognition, and the existing datasets focused on Caucasians (white race faces) while Aethiopians (black race faces) were neglected. In this study, a comparative analysis was conducted between the AlexNet, ResNet-50, and Inception-V3 models to recognize faces with surgical masks, fabric masks, and N95 masks. The results of the study showed that the CNN models achieve excellent recognition accuracy for masked and unmasked faces. Analysis of the models' performance showed that the AlexNet model achieved 95.7%, ResNet-50 achieved 97.5%, and Inception-V3 also achieved 95.5%. From the study, ResNet-50 performed better than Inception-V3 and AlexNet models in recognizing masked faces.
自2019年12月冠状病毒大流行爆发以来,人们对开发更好的面部识别系统的兴趣越来越大。这源于保护每个人不受病毒传播的需要。然而,为防止病毒传播而采取的措施对安全和监测系统构成了挑战,因为现有系统无法更有效地将人脸与口罩匹配起来。在本研究中,由于无法获得用于蒙面人脸识别的大型人脸数据集,因此生成了一个自定义数据集,并且现有数据集侧重于高加索人(白种人面孔),而埃塞俄比亚人(黑人面孔)被忽略。在本研究中,对AlexNet、ResNet-50和Inception-V3模型进行了外科口罩、织物口罩和N95口罩的人脸识别对比分析。研究结果表明,CNN模型对被遮挡和未被遮挡的人脸都有很好的识别精度。对模型的性能分析表明,AlexNet模型的准确率为95.7%,ResNet-50模型的准确率为97.5%,Inception-V3模型的准确率也为95.5%。从研究中可以看出,ResNet-50在识别蒙面人脸方面的表现优于Inception-V3和AlexNet模型。
{"title":"Comparative Analysis of AlexNet, Resnet-50, and Inception-V3 Models on Masked Face Recognition","authors":"Benedicta Nana Esi Nyarko, Wu Bin, Jinzhi Zhou, George Kofi Agordzo, J. Odoom, Ebenezer Koukoyi","doi":"10.1109/aiiot54504.2022.9817327","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817327","url":null,"abstract":"Since the outbreak of the coronavirus pandemic in December 2019, there has been increased interest in developing better facial recognition systems. This stems from the need to protect everyone from the spread of the virus. However, the measures taken to prevent the spread of the virus pose a challenge to security and surveillance systems as existing systems are unable to match faces with masks more efficiently. For this study, a custom dataset was generated due to the unavailability of a large face dataset for masked face recognition, and the existing datasets focused on Caucasians (white race faces) while Aethiopians (black race faces) were neglected. In this study, a comparative analysis was conducted between the AlexNet, ResNet-50, and Inception-V3 models to recognize faces with surgical masks, fabric masks, and N95 masks. The results of the study showed that the CNN models achieve excellent recognition accuracy for masked and unmasked faces. Analysis of the models' performance showed that the AlexNet model achieved 95.7%, ResNet-50 achieved 97.5%, and Inception-V3 also achieved 95.5%. From the study, ResNet-50 performed better than Inception-V3 and AlexNet models in recognizing masked faces.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128268127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Honeynets and Cloud Security 蜜网和云安全
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817263
Eric M Toth, M. Chowdhury
Cloud computing has become increasingly popular in the modern world. While it has brought many positives to the innovative technological era society lives in today, cloud computing has also shown it has some drawbacks. These drawbacks are present in the security aspect of the cloud and its many services. Security practices differ in the realm of cloud computing as the role of securing information systems is passed onto a third party. While this reduces managerial strain on those who enlist cloud computing it also brings risk to their data and the services they may provide. Cloud services have become a large target for those with malicious intent due to the high density of valuable data stored in one relative location. By soliciting help from the use of honeynets, cloud service providers can effectively improve their intrusion detection systems as well as allow for the opportunity to study attack vectors used by malicious actors to further improve security controls. Implementing honeynets into cloud-based networks is an investment in cloud security that will provide ever-increasing returns in the hardening of information systems against cyber threats.
云计算在现代世界变得越来越流行。虽然云计算为当今社会所处的创新技术时代带来了许多积极因素,但它也显示出一些缺点。这些缺点存在于云和它的许多服务的安全方面。安全实践在云计算领域有所不同,因为保护信息系统的角色传递给了第三方。虽然这减少了那些使用云计算的人的管理压力,但也给他们的数据和他们可能提供的服务带来了风险。由于有价值的数据高密度地存储在一个相对的位置,云服务已经成为那些怀有恶意的人的一个大目标。通过寻求使用蜜网的帮助,云服务提供商可以有效地改进其入侵检测系统,并有机会研究恶意行为者使用的攻击媒介,以进一步改进安全控制。在基于云的网络中实施蜜网是对云安全的投资,它将在加强信息系统抵御网络威胁方面提供不断增长的回报。
{"title":"Honeynets and Cloud Security","authors":"Eric M Toth, M. Chowdhury","doi":"10.1109/aiiot54504.2022.9817263","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817263","url":null,"abstract":"Cloud computing has become increasingly popular in the modern world. While it has brought many positives to the innovative technological era society lives in today, cloud computing has also shown it has some drawbacks. These drawbacks are present in the security aspect of the cloud and its many services. Security practices differ in the realm of cloud computing as the role of securing information systems is passed onto a third party. While this reduces managerial strain on those who enlist cloud computing it also brings risk to their data and the services they may provide. Cloud services have become a large target for those with malicious intent due to the high density of valuable data stored in one relative location. By soliciting help from the use of honeynets, cloud service providers can effectively improve their intrusion detection systems as well as allow for the opportunity to study attack vectors used by malicious actors to further improve security controls. Implementing honeynets into cloud-based networks is an investment in cloud security that will provide ever-increasing returns in the hardening of information systems against cyber threats.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EEG and fNIRS Analysis Using Machine Learning to Determine Stress Levels 利用机器学习确定压力水平的EEG和fNIRS分析
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817318
J. D. L. Cruz, Douglas Shimizu, K. George
Researchers are constantly striving to determine effective ways to detect and diagnose stress in patients as early as possible to prevent them from experiencing serious health consequences and complications. This study analyzed the subject's stress levels using EEG and fNIRS while they played a computer game that tested their ability to make accurate yet quick decisions. Trails were conducted to create a machine learning model to determine the varying levels of stress experienced by each subject. Blood oxygen levels, heart rate, and body temperature were also monitored and recorded. The EEG and fNIRS data was processed, tested, and verified using MATLAB to create the machine learning model. The data indicate that stress levels increased while the subject's quick decision-making skills were tested, and amplified as the difficulty of the computer game increased. The model accurately predicted and classified the level of stress an individual was under during each trial.
研究人员一直在努力确定有效的方法,尽早发现和诊断患者的压力,以防止他们经历严重的健康后果和并发症。这项研究利用脑电图和近红外光谱分析了受试者在玩电脑游戏时的压力水平,测试了他们做出准确而快速决策的能力。实验是为了创建一个机器学习模型,以确定每个受试者所经历的不同程度的压力。血氧水平、心率和体温也被监测和记录。利用MATLAB对EEG和fNIRS数据进行处理、测试和验证,建立机器学习模型。数据表明,当测试对象的快速决策能力时,压力水平会增加,并随着电脑游戏难度的增加而增加。该模型准确地预测并分类了个体在每次试验中所承受的压力水平。
{"title":"EEG and fNIRS Analysis Using Machine Learning to Determine Stress Levels","authors":"J. D. L. Cruz, Douglas Shimizu, K. George","doi":"10.1109/aiiot54504.2022.9817318","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817318","url":null,"abstract":"Researchers are constantly striving to determine effective ways to detect and diagnose stress in patients as early as possible to prevent them from experiencing serious health consequences and complications. This study analyzed the subject's stress levels using EEG and fNIRS while they played a computer game that tested their ability to make accurate yet quick decisions. Trails were conducted to create a machine learning model to determine the varying levels of stress experienced by each subject. Blood oxygen levels, heart rate, and body temperature were also monitored and recorded. The EEG and fNIRS data was processed, tested, and verified using MATLAB to create the machine learning model. The data indicate that stress levels increased while the subject's quick decision-making skills were tested, and amplified as the difficulty of the computer game increased. The model accurately predicted and classified the level of stress an individual was under during each trial.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127886209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 onwards 2018年以来针对操作系统漏洞的网络攻击类型调查
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817246
Maame Araba Vander-Pallen, P. Addai, Stuart Isteefanos, Tauheed Khan Mohd
Over time, many operating systems (OS) with a wide range of functions and features have emerged. As a consequence, they understand how each operating system has been built, which helps users' decisions while setting the operating system on their devices. As a result, a comparative research of various operating systems is required to offer specifics on the same as well as variation in fresh forms of OS to solve their problems. This paper explains the types of cyber attacks on the different types of operating systems. It analyses how operating systems become vulnerable and also how these vulnerabilities affect these operating systems. Our research highlights the impact that viruses have had on society since 2018, and we focus on the consequences that these viruses have. Our research has found a significant upward trend in the amount of cyber attacks in the last five years. We expect these numbers to continue their ascent in the future, especially in the cryptocurrency world.
随着时间的推移,出现了许多具有广泛功能和特性的操作系统(OS)。因此,他们了解每个操作系统是如何构建的,这有助于用户在设备上设置操作系统时做出决定。因此,需要对各种操作系统进行比较研究,以提供相同的细节以及新形式的操作系统的变化,以解决它们的问题。本文解释了不同类型的操作系统上的网络攻击类型。它分析了操作系统是如何变得脆弱的,以及这些漏洞是如何影响这些操作系统的。我们的研究强调了自2018年以来病毒对社会的影响,我们关注的是这些病毒造成的后果。我们的研究发现,在过去五年中,网络攻击的数量呈显著上升趋势。我们预计这些数字将在未来继续上升,尤其是在加密货币领域。
{"title":"Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 onwards","authors":"Maame Araba Vander-Pallen, P. Addai, Stuart Isteefanos, Tauheed Khan Mohd","doi":"10.1109/aiiot54504.2022.9817246","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817246","url":null,"abstract":"Over time, many operating systems (OS) with a wide range of functions and features have emerged. As a consequence, they understand how each operating system has been built, which helps users' decisions while setting the operating system on their devices. As a result, a comparative research of various operating systems is required to offer specifics on the same as well as variation in fresh forms of OS to solve their problems. This paper explains the types of cyber attacks on the different types of operating systems. It analyses how operating systems become vulnerable and also how these vulnerabilities affect these operating systems. Our research highlights the impact that viruses have had on society since 2018, and we focus on the consequences that these viruses have. Our research has found a significant upward trend in the amount of cyber attacks in the last five years. We expect these numbers to continue their ascent in the future, especially in the cryptocurrency world.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132779369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of Faults in Electro-Hydrostatic Actuators Using Feature Extraction Methods and an Artificial Neural Network 基于特征提取和人工神经网络的电静液执行器故障检测
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817236
M. Ghanbari, W. Kinsner, N. Sepehri
Electro-hydrostatic actuators (EHAs) are a type of hydraulic actuators which use pumps rather than valves to control the motion. As a result, they are more efficient than the valve-operated actuators. This paper presents an AI-based internal leakage detection algorithm for a single-rod EHA. Actuator internal leakage has been chosen to demonstrate the efficacy of the algorithm. Based on the sensitivity of various measures to varying levels of internal leakage, indicators are derived from the easy to obtain pressure measurements and a fault decision algorithm for quantifying the level of internal leakage in the actuator is established. This paper presents a new architecture of an artificial neural network (ANN) for detecting the existence of an internal leakage fault as labelled data. First, a sensitivity analysis is used to select a measure candidate for further research. Second, the measure chosen is analyzed using feature extraction methods. This step aims to extract hidden features to maximize the internal leakage fault detection. Finally, the fault detection algorithm classification efficiency is assessed by studying the detection rate of the proposed architecture. The experimental results show that the developed algorithm can detect internal leakage faults with 99.46% accuracy.
电静液执行器(EHAs)是一种使用泵而不是阀门来控制运动的液压执行器。因此,它们比阀门操作的执行器更有效。提出了一种基于人工智能的单杆EHA内漏检测算法。以执行器内漏为例,验证了该算法的有效性。基于各种措施对不同内泄漏程度的敏感性,从容易获得的压力测量中导出指标,建立了量化执行机构内泄漏程度的故障判定算法。本文提出了一种新的人工神经网络(ANN)结构,用于检测标记数据是否存在内漏故障。首先,使用敏感性分析来选择一个候选测量进行进一步的研究。其次,使用特征提取方法对选择的度量进行分析。该步骤旨在提取隐藏特征,以最大限度地检测内漏故障。最后,通过研究所提体系结构的检测率来评估故障检测算法的分类效率。实验结果表明,该算法检测内漏故障的准确率为99.46%。
{"title":"Detection of Faults in Electro-Hydrostatic Actuators Using Feature Extraction Methods and an Artificial Neural Network","authors":"M. Ghanbari, W. Kinsner, N. Sepehri","doi":"10.1109/aiiot54504.2022.9817236","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817236","url":null,"abstract":"Electro-hydrostatic actuators (EHAs) are a type of hydraulic actuators which use pumps rather than valves to control the motion. As a result, they are more efficient than the valve-operated actuators. This paper presents an AI-based internal leakage detection algorithm for a single-rod EHA. Actuator internal leakage has been chosen to demonstrate the efficacy of the algorithm. Based on the sensitivity of various measures to varying levels of internal leakage, indicators are derived from the easy to obtain pressure measurements and a fault decision algorithm for quantifying the level of internal leakage in the actuator is established. This paper presents a new architecture of an artificial neural network (ANN) for detecting the existence of an internal leakage fault as labelled data. First, a sensitivity analysis is used to select a measure candidate for further research. Second, the measure chosen is analyzed using feature extraction methods. This step aims to extract hidden features to maximize the internal leakage fault detection. Finally, the fault detection algorithm classification efficiency is assessed by studying the detection rate of the proposed architecture. The experimental results show that the developed algorithm can detect internal leakage faults with 99.46% accuracy.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pattern Recognition Method for Detecting Engineering Errors on Technical Drawings 技术图纸工程错误检测的模式识别方法
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817294
R. Dzhusupova, Richa Banotra, Jan Bosch, H. H. Olsson
Many organizations are looking for how to automate repetitive tasks to reduce manual work and free up resources for innovation. Machine Learning, especially Deep Learning, increases the chance of achieving this goal while working with technical documentation. Highly costly engineering hours can be saved, for example, by empowering the manual check with AI, which helps to reduce the total time for technical documents review. This paper proposes a way to substantially reduce the hours spent by process engineers reviewing P&IDs (Piping & Instrumentation Diagrams). The developed solution is based on a deep learning model for analyzing complex real-life engineering diagrams to find design errors - patterns that are combinations of high-level objects. Through the research on an extensive collection of P&ID files provided by McDermott, we prove that our model recognizes patterns representing engineering mistakes with high accuracy. We also describe our experience dealing with class-imbalance problems, labelling, and model architecture selection. The developed model is domain agnostic and can be re-trained on various schematic diagrams within engineering fields and, as well, could be used as an idea for other researchers to see whether similar solutions could be built for different industries.
许多组织都在寻找如何自动化重复的任务,以减少手工工作,并为创新腾出资源。机器学习,特别是深度学习,在处理技术文档时增加了实现这一目标的机会。例如,通过使用人工智能进行手动检查,可以节省昂贵的工程时间,这有助于减少技术文档审查的总时间。本文提出了一种方法,可以大大减少过程工程师审查p&id(管道和仪表图)所花费的时间。开发的解决方案基于深度学习模型,用于分析复杂的现实生活工程图,以发现设计错误-高级对象组合的模式。通过对McDermott提供的大量P&ID文件的研究,我们证明了我们的模型能够高精度地识别代表工程错误的模式。我们还描述了我们处理类不平衡问题、标记和模型架构选择的经验。所开发的模型是领域不可知论的,可以在工程领域的各种示意图上重新训练,也可以作为其他研究人员的想法,看看是否可以为不同的行业构建类似的解决方案。
{"title":"Pattern Recognition Method for Detecting Engineering Errors on Technical Drawings","authors":"R. Dzhusupova, Richa Banotra, Jan Bosch, H. H. Olsson","doi":"10.1109/aiiot54504.2022.9817294","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817294","url":null,"abstract":"Many organizations are looking for how to automate repetitive tasks to reduce manual work and free up resources for innovation. Machine Learning, especially Deep Learning, increases the chance of achieving this goal while working with technical documentation. Highly costly engineering hours can be saved, for example, by empowering the manual check with AI, which helps to reduce the total time for technical documents review. This paper proposes a way to substantially reduce the hours spent by process engineers reviewing P&IDs (Piping & Instrumentation Diagrams). The developed solution is based on a deep learning model for analyzing complex real-life engineering diagrams to find design errors - patterns that are combinations of high-level objects. Through the research on an extensive collection of P&ID files provided by McDermott, we prove that our model recognizes patterns representing engineering mistakes with high accuracy. We also describe our experience dealing with class-imbalance problems, labelling, and model architecture selection. The developed model is domain agnostic and can be re-trained on various schematic diagrams within engineering fields and, as well, could be used as an idea for other researchers to see whether similar solutions could be built for different industries.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE World AI IoT Congress (AIIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1