首页 > 最新文献

2022 IEEE World AI IoT Congress (AIIoT)最新文献

英文 中文
Simulating the Behaviour and Displacement of Women in Water-Stressed Areas 模拟缺水地区妇女的行为和流离失所
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817353
Aakib Bin Nesar, Tahseena Mahmud, Fahreen Hossain
Access to sufficient water is a human right and part of human survival, health, well being and livelihoods for consumption and domestic use. However, the gendered culture of water access, use and livelihoods have remained silent in the world of water management. With this perspective, the work conducted by the Institute of Disaster Management and Vulnerability Studies (IDMVS), University of Dhaka, in collaboration with REACH project explored how gender dimensions form a nexus between water collection challenges, spatial differences and gender division of labour comparing data from water-secure and water insecure communities (mouzas) in coastal Bangladesh. In this work, our objective was to model and simulate the behaviour of women towards water accumulation for household purposes, who are residing in regions with inadequate water conservation and distribution systems. Our simulation takes into account water risks that may affect the system such as river erosion and salinity intrusion, leading to a higher level of water stress. We have conducted this work as an extension of the project already being carried by REACH, but in terms of modeling and simulation to visualize and discuss empirical results found from our work.
获得充足的水是一项人权,也是供消费和家庭使用的人类生存、健康、福祉和生计的一部分。然而,水的获取、使用和生计的性别文化在水管理领域保持沉默。从这个角度来看,达卡大学灾害管理与脆弱性研究所(IDMVS)与REACH项目合作,探讨了性别维度如何在收集水的挑战、空间差异和性别分工之间形成联系,并比较了孟加拉国沿海地区水安全和水不安全社区(mouzas)的数据。在这项工作中,我们的目标是模拟和模拟居住在水资源保护和分配系统不足的地区的妇女为家庭目的积累水的行为。我们的模拟考虑了可能影响系统的水风险,如河流侵蚀和盐度入侵,导致更高水平的水压力。我们将这项工作作为REACH已经开展的项目的延伸,但在建模和仿真方面,我们将可视化和讨论从我们的工作中发现的经验结果。
{"title":"Simulating the Behaviour and Displacement of Women in Water-Stressed Areas","authors":"Aakib Bin Nesar, Tahseena Mahmud, Fahreen Hossain","doi":"10.1109/aiiot54504.2022.9817353","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817353","url":null,"abstract":"Access to sufficient water is a human right and part of human survival, health, well being and livelihoods for consumption and domestic use. However, the gendered culture of water access, use and livelihoods have remained silent in the world of water management. With this perspective, the work conducted by the Institute of Disaster Management and Vulnerability Studies (IDMVS), University of Dhaka, in collaboration with REACH project explored how gender dimensions form a nexus between water collection challenges, spatial differences and gender division of labour comparing data from water-secure and water insecure communities (mouzas) in coastal Bangladesh. In this work, our objective was to model and simulate the behaviour of women towards water accumulation for household purposes, who are residing in regions with inadequate water conservation and distribution systems. Our simulation takes into account water risks that may affect the system such as river erosion and salinity intrusion, leading to a higher level of water stress. We have conducted this work as an extension of the project already being carried by REACH, but in terms of modeling and simulation to visualize and discuss empirical results found from our work.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115082896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Audio Training Learning Outcomes Using EEG Data and KNN Modeling 利用脑电数据和KNN模型预测音频训练学习结果
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817164
Abel Desoto, Ethan Santos, Francis Liri, K. Faller, Devin Heng, Joshua Dodd, K. George, Julia R. Drouin
People are constantly surrounded by some form of sound, which can occasionally interfere with their daily tasks such as conversation. When sound interferes with daily activities, it becomes noise that is undesired sound. Depending on the surroundings, one may be subjected to varying levels of noise, resulting in hearing challenges especially for those with hearing disabilities. Researchers have tested how the brain interprets information and shown that the brain can be ‘primed’ to quickly tune hearing and effectively learn to understand sounds. This concept is used to propose a software-based training solution that utilizes EEG signals to identify whether or not a person with a hearing disability is learning. This can be applied for the training of those with disabilities and eliminate the need of a doctor to administer and make the process faster and simpler. An overall framework for the proposed system and outline of the essential components are presented. The research is extended by refining the testing and experiment methods, resolving some of the weaknesses of the research and performing similar studies with a larger participant pool. Furthermore, a machine learning algorithm, K-Nearest Neighbor (KNN), is applied to evaluate EEG data and predict a subject's understanding of distorted audio.
人们经常被某种形式的声音包围,这些声音偶尔会干扰他们的日常工作,比如谈话。当声音干扰到日常活动时,它就变成了不受欢迎的噪音。根据周围环境的不同,人们可能会受到不同程度的噪音,从而导致听力障碍,尤其是听力残疾人士。研究人员已经测试了大脑如何解释信息,并表明大脑可以“准备好”快速调整听力并有效地学习理解声音。这一概念被用于提出一种基于软件的训练解决方案,该解决方案利用脑电图信号来识别听障人士是否在学习。这可以应用于残疾人的培训,并消除了医生管理的需要,使过程更快、更简单。提出了该系统的总体框架和主要组成部分的概要。通过改进测试和实验方法,解决研究的一些弱点,并在更大的参与者池中进行类似的研究,扩展了研究。此外,还应用了一种机器学习算法k -最近邻(KNN)来评估EEG数据并预测受试者对失真音频的理解。
{"title":"Predicting Audio Training Learning Outcomes Using EEG Data and KNN Modeling","authors":"Abel Desoto, Ethan Santos, Francis Liri, K. Faller, Devin Heng, Joshua Dodd, K. George, Julia R. Drouin","doi":"10.1109/aiiot54504.2022.9817164","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817164","url":null,"abstract":"People are constantly surrounded by some form of sound, which can occasionally interfere with their daily tasks such as conversation. When sound interferes with daily activities, it becomes noise that is undesired sound. Depending on the surroundings, one may be subjected to varying levels of noise, resulting in hearing challenges especially for those with hearing disabilities. Researchers have tested how the brain interprets information and shown that the brain can be ‘primed’ to quickly tune hearing and effectively learn to understand sounds. This concept is used to propose a software-based training solution that utilizes EEG signals to identify whether or not a person with a hearing disability is learning. This can be applied for the training of those with disabilities and eliminate the need of a doctor to administer and make the process faster and simpler. An overall framework for the proposed system and outline of the essential components are presented. The research is extended by refining the testing and experiment methods, resolving some of the weaknesses of the research and performing similar studies with a larger participant pool. Furthermore, a machine learning algorithm, K-Nearest Neighbor (KNN), is applied to evaluate EEG data and predict a subject's understanding of distorted audio.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121241636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains NFDLM:用于物联网领域DDoS攻击检测的基于轻量级网络流的深度学习模型
Pub Date : 2022-06-06 DOI: 10.1109/AIIoT54504.2022.9817297
K. Saurabh, T. kumar, Uphar Singh, O. P. Vyas, R. Khondoker
In the recent years, Distributed Denial of Service (DDoS) attacks on Internet of Things (IoT) devices have become one of the prime concerns to Internet users around the world. One of the sources of the attacks on IoT ecosystems are botnets. Intruders force IoT devices to become unavailable for its legitimate users by sending large number of messages within a short interval. This study proposes NFDLM, a lightweight and optimised Artificial Neural Network (ANN) based Distributed Denial of Services (DDoS) attack detection framework with mutual correlation as feature selection method which produces a superior result when compared with Long Short Term Memory (LSTM) and simple ANN. Overall, the detection performance achieves approximately 99% accuracy for the detection of attacks from botnets. In this work, we have designed and compared four different models where two are based on ANN and the other two are based on LSTM to detect the attack types of DDoS.
近年来,针对物联网(IoT)设备的分布式拒绝服务(DDoS)攻击已成为全球互联网用户关注的主要问题之一。对物联网生态系统的攻击来源之一是僵尸网络。入侵者通过在短时间内发送大量消息,迫使物联网设备对其合法用户不可用。本研究提出了一种轻量级的、优化的基于人工神经网络(ANN)的分布式拒绝服务(DDoS)攻击检测框架NFDLM,该框架以相互关联作为特征选择方法,与长短期记忆(LSTM)和简单神经网络相比,NFDLM的检测效果更好。总体而言,检测性能对僵尸网络攻击的检测准确率约为99%。在这项工作中,我们设计并比较了四种不同的模型,其中两种基于人工神经网络,另外两种基于LSTM来检测DDoS的攻击类型。
{"title":"NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains","authors":"K. Saurabh, T. kumar, Uphar Singh, O. P. Vyas, R. Khondoker","doi":"10.1109/AIIoT54504.2022.9817297","DOIUrl":"https://doi.org/10.1109/AIIoT54504.2022.9817297","url":null,"abstract":"In the recent years, Distributed Denial of Service (DDoS) attacks on Internet of Things (IoT) devices have become one of the prime concerns to Internet users around the world. One of the sources of the attacks on IoT ecosystems are botnets. Intruders force IoT devices to become unavailable for its legitimate users by sending large number of messages within a short interval. This study proposes NFDLM, a lightweight and optimised Artificial Neural Network (ANN) based Distributed Denial of Services (DDoS) attack detection framework with mutual correlation as feature selection method which produces a superior result when compared with Long Short Term Memory (LSTM) and simple ANN. Overall, the detection performance achieves approximately 99% accuracy for the detection of attacks from botnets. In this work, we have designed and compared four different models where two are based on ANN and the other two are based on LSTM to detect the attack types of DDoS.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey on Deep Learning Techniques for Joint Named Entities and Relation Extraction 联合命名实体及关系抽取的深度学习技术综述
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817231
Mina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Maryam Heidari
Named Entity Recognition (NER) and Relation Extraction (RE) are two principal subtasks of knowledge-based systems that extract meaningful information from unstructured text. With Recent advances in Deep Learning techniques, new models use Joint Named Entities and Relation Extraction (JNERE) techniques that simultaneously accomplish NER and RE subtasks. These models avoid the drawbacks of using the traditional pipeline method. As contributions of our study to the other related works, we specifically survey JNERE techniques. The reason for not focusing on pipeline methods or other older techniques is the recent advances of JNERE methods in achieving the state-of-art results for most databases. Additionally, we provide a comprehensive report on the embedding techniques and datasets available for this task. Finally, we discuss the approaches and how they imnpoved the results.
命名实体识别(NER)和关系提取(RE)是从非结构化文本中提取有意义信息的知识系统的两个主要子任务。随着深度学习技术的最新进展,新模型使用联合命名实体和关系提取(JNERE)技术同时完成NER和RE子任务。这些模型避免了使用传统管道方法的缺点。作为对其他相关工作的贡献,我们专门研究了JNERE技术。不关注管道方法或其他旧技术的原因是,JNERE方法最近取得了进展,可以为大多数数据库获得最先进的结果。此外,我们还提供了一份关于此任务可用的嵌入技术和数据集的综合报告。最后,我们讨论了这些方法以及它们如何改进结果。
{"title":"A Survey on Deep Learning Techniques for Joint Named Entities and Relation Extraction","authors":"Mina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Maryam Heidari","doi":"10.1109/aiiot54504.2022.9817231","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817231","url":null,"abstract":"Named Entity Recognition (NER) and Relation Extraction (RE) are two principal subtasks of knowledge-based systems that extract meaningful information from unstructured text. With Recent advances in Deep Learning techniques, new models use Joint Named Entities and Relation Extraction (JNERE) techniques that simultaneously accomplish NER and RE subtasks. These models avoid the drawbacks of using the traditional pipeline method. As contributions of our study to the other related works, we specifically survey JNERE techniques. The reason for not focusing on pipeline methods or other older techniques is the recent advances of JNERE methods in achieving the state-of-art results for most databases. Additionally, we provide a comprehensive report on the embedding techniques and datasets available for this task. Finally, we discuss the approaches and how they imnpoved the results.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet 物联网DDoS加密劫持恶意软件及Mirai僵尸网络评估
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817163
Adam Borys, A. Kamruzzaman, Hasnain Nizam Thakur, Joseph C. Brickley, M. Ali, Kutub Thakur
This paper dives into the growing world of IoT botnets that have taken the world by storm in the past five years. Though alone an IP camera cannot produce enough traffic to be considered a DDoS. But a botnet that has over 150,000 connected IP cameras can generate as much as 1 Tbps in traffic. Botnets catch many by surprise because their attacks and infections may not be as apparent as a DDoS, some other cases include using these cameras and printers for extracting information or quietly mine cryptocurrency at the IoT device owner's expense. Here we analyze damages on IoT hacking and define botnet architecture. An overview of Mirai botnet and cryptojacking provided to better understand the IoT botnets.
本文深入研究了在过去五年中席卷全球的不断增长的物联网僵尸网络。虽然单独一个IP摄像机不能产生足够的流量被认为是DDoS。但是一个拥有超过15万个连接的IP摄像头的僵尸网络可以产生高达1tbps的流量。僵尸网络让许多人措手不及,因为它们的攻击和感染可能不像DDoS那样明显,其他一些案例包括使用这些摄像头和打印机提取信息,或者以物联网设备所有者的费用悄悄地挖掘加密货币。本文分析了物联网黑客攻击的危害,并定义了僵尸网络架构。提供Mirai僵尸网络和加密劫持的概述,以更好地理解物联网僵尸网络。
{"title":"An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet","authors":"Adam Borys, A. Kamruzzaman, Hasnain Nizam Thakur, Joseph C. Brickley, M. Ali, Kutub Thakur","doi":"10.1109/aiiot54504.2022.9817163","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817163","url":null,"abstract":"This paper dives into the growing world of IoT botnets that have taken the world by storm in the past five years. Though alone an IP camera cannot produce enough traffic to be considered a DDoS. But a botnet that has over 150,000 connected IP cameras can generate as much as 1 Tbps in traffic. Botnets catch many by surprise because their attacks and infections may not be as apparent as a DDoS, some other cases include using these cameras and printers for extracting information or quietly mine cryptocurrency at the IoT device owner's expense. Here we analyze damages on IoT hacking and define botnet architecture. An overview of Mirai botnet and cryptojacking provided to better understand the IoT botnets.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130242749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ComparativeAnalysisofARIMAandLSTMM achine Learning Algorithm for Stock PricePrediction arima&lstmm机器学习算法在股票价格预测中的比较分析
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817176
Mohammad Monirujjaman Khan, Md. Farabi Alam, Shoumik Mahabub Ridoy
Stocksofcompaniesheavilyinfluencethefinancial markets around the world. These companies help tocontributeandimprovetheoverallGDPofaneconomy.Hence, the importance of having a grip on the stock market forventurecapitalistsandcompaniesisinevitablefortheirfinancial benefit and growth. It is crucial to predict the stockprice to stay at the forefront of the financial world. None of theexistingmachinelearningtechniquescanprovideaperfectpredi ction of the stock prices due to the unpredictable identityof the stock market. The stock price prediction employing twomachinelearningalgorithms,LongShort-TermMemory(LSTM)andAutoregressivelntegratedMovingAve rage(ARIMA), willbediscussedindepthinthisstudy. Theaccuracy achieved by these two algorithms was compared. Inour comparison, we found out that, generally, LSTM had ahigheraccuracyrateinthestockpriceprediction.ARIMAprovide dbetterperformancewithasmalldatatimeframe, while LSTM had better performance in predicting stock pricewhenthedatatimeframeusedwaslarge.
股票公司在很大程度上影响着全球的金融市场。这些公司有助于促进和改善整体gdp经济。因此,对风险资本主义者和公司来说,控制股票市场的重要性对于他们的财务利益和增长是不可避免的。要想在金融世界中保持领先地位,预测股价至关重要。由于股票市场的不可预测性,现有的机器学习技术都不能提供完美的股票价格预测。本文将深入讨论长短期记忆(LSTM)和自回归集成移动均值(ARIMA)两种机器学习算法的股票价格预测。比较了两种算法的精度。通过比较,我们发现LSTM在股票价格预测中具有较高的准确率。arima在数据时间帧较小时提供了更好的性能,而LSTM在数据时间帧较大时在预测股票价格方面有更好的性能。
{"title":"ComparativeAnalysisofARIMAandLSTMM achine Learning Algorithm for Stock PricePrediction","authors":"Mohammad Monirujjaman Khan, Md. Farabi Alam, Shoumik Mahabub Ridoy","doi":"10.1109/aiiot54504.2022.9817176","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817176","url":null,"abstract":"Stocksofcompaniesheavilyinfluencethefinancial markets around the world. These companies help tocontributeandimprovetheoverallGDPofaneconomy.Hence, the importance of having a grip on the stock market forventurecapitalistsandcompaniesisinevitablefortheirfinancial benefit and growth. It is crucial to predict the stockprice to stay at the forefront of the financial world. None of theexistingmachinelearningtechniquescanprovideaperfectpredi ction of the stock prices due to the unpredictable identityof the stock market. The stock price prediction employing twomachinelearningalgorithms,LongShort-TermMemory(LSTM)andAutoregressivelntegratedMovingAve rage(ARIMA), willbediscussedindepthinthisstudy. Theaccuracy achieved by these two algorithms was compared. Inour comparison, we found out that, generally, LSTM had ahigheraccuracyrateinthestockpriceprediction.ARIMAprovide dbetterperformancewithasmalldatatimeframe, while LSTM had better performance in predicting stock pricewhenthedatatimeframeusedwaslarge.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"29 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114130061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of COVID-19 in Chest X-ray Images Using Fusion of Deep Features and LightGBM 基于深度特征与光tgbm融合的胸部x线图像COVID-19分类
Pub Date : 2022-06-06 DOI: 10.48550/arXiv.2206.04548
H. Nasiri, Ghazal Kheyroddin, M. Dorrigiv, Mona Esmaeili, A. Nafchi, Mohsen Ghorbani, P. Zarkesh-Ha
The COVID-19 disease was first discovered in Wuhan, China, and spread quickly worldwide. After the COVID-19 pandemic, many researchers have begun to identify a way to diagnose the COVID-19 using chest X-ray images. The early diagnosis of this disease can significantly impact the treatment process. In this article, we propose a new technique that is faster and more accurate than the other methods reported in the literature. The proposed method uses a combination of DenseNet169 and MobileNet Deep Neural Networks to extract the features of the patient's X-ray images. Using the univariate feature selection algorithm, we refined the features for the most important ones. Then we applied the selected features as input to the LightGBM (Light Gradient Boosting Machine) algorithm for classification. To assess the effectiveness of the proposed method, the ChestX-ray8 dataset, which includes 1125 X-ray images of the patient's chest, was used. The proposed method achieved 98.54% and 91.11% accuracies in the two-class (COVID-19, Healthy) and multi-class (COVID-19, Healthy, Pneumonia) classification problems, respectively. It is worth mentioning that we have used Gradient-weighted Class Activation Mapping (Grad-CAM) for future analysis.
新冠肺炎疫情最早在中国武汉发现,并迅速在全球传播。在新冠肺炎大流行之后,许多研究人员开始寻找一种利用胸部x射线图像诊断新冠肺炎的方法。这种疾病的早期诊断可以显著影响治疗过程。在本文中,我们提出了一种比文献中报道的其他方法更快、更准确的新技术。该方法结合了DenseNet169和MobileNet深度神经网络来提取患者x射线图像的特征。采用单变量特征选择算法,对最重要的特征进行细化。然后,我们将选择的特征作为输入输入到LightGBM (Light Gradient Boosting Machine)算法中进行分类。为了评估所提出方法的有效性,使用了ChestX-ray8数据集,其中包括1125张患者胸部的x射线图像。该方法在两类(COVID-19,健康)和多类(COVID-19,健康,肺炎)分类问题上的准确率分别为98.54%和91.11%。值得一提的是,我们已经使用梯度加权类激活映射(gradcam)来进行未来的分析。
{"title":"Classification of COVID-19 in Chest X-ray Images Using Fusion of Deep Features and LightGBM","authors":"H. Nasiri, Ghazal Kheyroddin, M. Dorrigiv, Mona Esmaeili, A. Nafchi, Mohsen Ghorbani, P. Zarkesh-Ha","doi":"10.48550/arXiv.2206.04548","DOIUrl":"https://doi.org/10.48550/arXiv.2206.04548","url":null,"abstract":"The COVID-19 disease was first discovered in Wuhan, China, and spread quickly worldwide. After the COVID-19 pandemic, many researchers have begun to identify a way to diagnose the COVID-19 using chest X-ray images. The early diagnosis of this disease can significantly impact the treatment process. In this article, we propose a new technique that is faster and more accurate than the other methods reported in the literature. The proposed method uses a combination of DenseNet169 and MobileNet Deep Neural Networks to extract the features of the patient's X-ray images. Using the univariate feature selection algorithm, we refined the features for the most important ones. Then we applied the selected features as input to the LightGBM (Light Gradient Boosting Machine) algorithm for classification. To assess the effectiveness of the proposed method, the ChestX-ray8 dataset, which includes 1125 X-ray images of the patient's chest, was used. The proposed method achieved 98.54% and 91.11% accuracies in the two-class (COVID-19, Healthy) and multi-class (COVID-19, Healthy, Pneumonia) classification problems, respectively. It is worth mentioning that we have used Gradient-weighted Class Activation Mapping (Grad-CAM) for future analysis.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"257O 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Graph Attention Neural Network Distributed Model Training 图注意力神经网络分布式模型训练
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817156
Armin Esmaeilzadeh, Mina Esmail Zadeh Nojoo Kambar, Maryam Heidari
The scale of neural language models has been increasing significantly over recent years. As a result, the time complexity of training larger language models and resource utilization has been increasing at a higher rate as well. In this research, we propose a distributed implementation of a Graph Attention Neural Network model with 120 million parameters and train it on a cluster of eight GPUs. We demonstrate three times speedup in model training while keeping the stability of accuracy and loss rates during training and testing compared to single GPU instance training.
近年来,神经语言模型的规模有了显著的增长。因此,训练大型语言模型的时间复杂度和资源利用率也在以更高的速度增加。在这项研究中,我们提出了一个具有1.2亿个参数的图注意力神经网络模型的分布式实现,并在8个gpu的集群上对其进行了训练。我们证明了与单GPU实例训练相比,在保持训练和测试期间准确性和损失率的稳定性的同时,模型训练的速度提高了三倍。
{"title":"Graph Attention Neural Network Distributed Model Training","authors":"Armin Esmaeilzadeh, Mina Esmail Zadeh Nojoo Kambar, Maryam Heidari","doi":"10.1109/aiiot54504.2022.9817156","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817156","url":null,"abstract":"The scale of neural language models has been increasing significantly over recent years. As a result, the time complexity of training larger language models and resource utilization has been increasing at a higher rate as well. In this research, we propose a distributed implementation of a Graph Attention Neural Network model with 120 million parameters and train it on a cluster of eight GPUs. We demonstrate three times speedup in model training while keeping the stability of accuracy and loss rates during training and testing compared to single GPU instance training.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122348538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No-Clear for Nuclear 核不清除
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817180
Sanskar Raj Marahata, Eman Abdelfattah, Sandra Ibrahim, Audrina Dobrevic
This study presents a thorough analysis of nuclear energy along with how it is unsuitable as a long-term replacement for the prevailing primary sources of fuel, like oil, coal, and gas. Nuclear energy was assumed to be a utopian power supply source and peaked in usage in the United States by 1990. Despite providing ten percent of the world's electricity and becoming the second largest source for low-carbon power, nuclear energy has been on a rapid decline ever since. Various factors including international diplomacy, adherence to treaty agreements, and negative public perception regarding nuclear energy have made government investment unsustainable, resulting in nuclear energy being irrelevant. It also causes much political rancor due to its high cost and trading issues in addition to concerns with nuclear meltdowns and weapons proliferation. Regardless of the instances against nuclear energy, developing countries, especially in Southeast Asia, still seem to favor a widespread adoption of nuclear energy, even though it is just theorized as of now.
这项研究对核能进行了全面的分析,并指出核能不适合长期替代石油、煤炭和天然气等主要燃料来源。核能被认为是一种乌托邦式的电力供应来源,并于1990年在美国达到使用高峰。尽管核能提供了世界10%的电力,并成为低碳能源的第二大来源,但自那以后,核能一直在迅速衰落。包括国际外交、遵守条约协议以及公众对核能的负面看法在内的各种因素使得政府投资不可持续,导致核能变得无关紧要。除了对核熔毁和武器扩散的担忧外,由于其高成本和贸易问题,它也引起了许多政治怨恨。撇开反对核能的例子不谈,发展中国家,特别是东南亚的发展中国家,似乎仍然赞成广泛采用核能,尽管它目前只是理论上的。
{"title":"No-Clear for Nuclear","authors":"Sanskar Raj Marahata, Eman Abdelfattah, Sandra Ibrahim, Audrina Dobrevic","doi":"10.1109/aiiot54504.2022.9817180","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817180","url":null,"abstract":"This study presents a thorough analysis of nuclear energy along with how it is unsuitable as a long-term replacement for the prevailing primary sources of fuel, like oil, coal, and gas. Nuclear energy was assumed to be a utopian power supply source and peaked in usage in the United States by 1990. Despite providing ten percent of the world's electricity and becoming the second largest source for low-carbon power, nuclear energy has been on a rapid decline ever since. Various factors including international diplomacy, adherence to treaty agreements, and negative public perception regarding nuclear energy have made government investment unsustainable, resulting in nuclear energy being irrelevant. It also causes much political rancor due to its high cost and trading issues in addition to concerns with nuclear meltdowns and weapons proliferation. Regardless of the instances against nuclear energy, developing countries, especially in Southeast Asia, still seem to favor a widespread adoption of nuclear energy, even though it is just theorized as of now.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Violence Detection Using Computer Vision Approaches 使用计算机视觉方法进行暴力检测
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817374
Khalid Raihan Talha, Koushik Bandapadya, Mohammad Monirujjaman Khan
Violent crime has always been a major social problem. The rise of violent behavior in public areas can be attributed to a variety of factors. Greed, frustration, and hostility among individuals, as well as social and economic anxieties, are the primary causes of increased violence. It is critical to protect our possessions, as well as our lives, from threats such as robbery or homicide. It is impossible to prevent crime and violent acts unless brain signals are studied and a certain pattern deduced from criminal ideas is detected in real-time. Due to its technological viability, it has yet to be realized. However, We can identify violent activity in public spaces by using the concepts of computer vision (a subfield of deep learning) technology. The goal of this project is to build a real-time violent activity monitoring system that will be capable of detecting violence very quickly and efficiently. The public of any city can benefit from it, as it will allow the people of the law enforcement department to take necessary actions to prevent violent activities. When the system is implemented, it will be able to detect the speed of the movements of people and their distances from other people walking in public places by using cameras. The system will mainly detect the speed of hand and leg movements of a person who will be very close to another person. If anyone is identified as a violent maker, the server-side of the system will notify the people who will be responsible for preventing violence in a very short time. The system was built using the concepts of computer vision and neural networks. The system has been developed and tested initially on the personal computing devices of the system developers. This system is very easy to design and develop, making it very easy to use for any kind of public area surveillance. At the same time, the system gives its desired output due to its high accuracy.
暴力犯罪一直是一个主要的社会问题。公共场所暴力行为的增加可归因于多种因素。个人之间的贪婪、沮丧和敌意,以及社会和经济焦虑,是暴力增加的主要原因。保护我们的财产和生命免受抢劫或谋杀等威胁是至关重要的。如果不研究大脑信号,并从犯罪思想中推断出某种模式,就不可能预防犯罪和暴力行为。由于其技术可行性,它尚未实现。然而,我们可以通过使用计算机视觉(深度学习的一个子领域)技术的概念来识别公共场所的暴力活动。该项目的目标是建立一个实时暴力活动监测系统,能够非常快速有效地发现暴力行为。任何城市的公众都可以从中受益,因为它将允许执法部门的人员采取必要的行动来防止暴力活动。当该系统投入使用时,它将能够通过摄像头检测人们的移动速度以及他们与在公共场所行走的其他人的距离。该系统将主要检测离另一个人非常近的人的手和腿的运动速度。如果有人被确定为暴力制造者,系统的服务器端将在很短的时间内通知负责防止暴力的人员。该系统是利用计算机视觉和神经网络的概念构建的。该系统已在系统开发人员的个人计算设备上进行了初步开发和测试。该系统易于设计和开发,适用于各种公共区域的监控。同时,由于系统具有较高的精度,因此可以得到预期的输出。
{"title":"Violence Detection Using Computer Vision Approaches","authors":"Khalid Raihan Talha, Koushik Bandapadya, Mohammad Monirujjaman Khan","doi":"10.1109/aiiot54504.2022.9817374","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817374","url":null,"abstract":"Violent crime has always been a major social problem. The rise of violent behavior in public areas can be attributed to a variety of factors. Greed, frustration, and hostility among individuals, as well as social and economic anxieties, are the primary causes of increased violence. It is critical to protect our possessions, as well as our lives, from threats such as robbery or homicide. It is impossible to prevent crime and violent acts unless brain signals are studied and a certain pattern deduced from criminal ideas is detected in real-time. Due to its technological viability, it has yet to be realized. However, We can identify violent activity in public spaces by using the concepts of computer vision (a subfield of deep learning) technology. The goal of this project is to build a real-time violent activity monitoring system that will be capable of detecting violence very quickly and efficiently. The public of any city can benefit from it, as it will allow the people of the law enforcement department to take necessary actions to prevent violent activities. When the system is implemented, it will be able to detect the speed of the movements of people and their distances from other people walking in public places by using cameras. The system will mainly detect the speed of hand and leg movements of a person who will be very close to another person. If anyone is identified as a violent maker, the server-side of the system will notify the people who will be responsible for preventing violence in a very short time. The system was built using the concepts of computer vision and neural networks. The system has been developed and tested initially on the personal computing devices of the system developers. This system is very easy to design and develop, making it very easy to use for any kind of public area surveillance. At the same time, the system gives its desired output due to its high accuracy.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE World AI IoT Congress (AIIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1