首页 > 最新文献

2022 IEEE World AI IoT Congress (AIIoT)最新文献

英文 中文
Lung cancer prediction model using ensemble learning techniques and a systematic review analysis 肺癌预测模型使用集成学习技术和系统回顾分析
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817326
M. Mamun, Afia Farjana, Miraz Al Mamun, Md Salim Ahammed
Lung cancers are malignant lung tumors resulting from uncontrolled growth of lung cells that metastasizes to other parts of the body and can cause death. Although lung cancer cannot be prevented, the risk of cancer development can be lowered. Early detection of lung cancer is essential for patient survival, and machine learning-based prediction models have potential use in predicting lung cancer. Ensemble techniques are compelling and powerful techniques in Machine Learning to improve the prediction accuracy as classifiers. This paper reviewed some research articles on lung cancer prediction models that used machine learning and ensemble learning techniques. Furthermore, we added our newly developed ensemble learning techniques to this paper which was developed based on a survey dataset of 309 people with or without lung cancer by oversampling SMOTE method. The ensemble techniques we used are XGBoost, LightGBM, Bagging, and AdaBoost by k-fold 10 cross-validation method and the attributes our lung cancer prediction models used are age, smoking, yellow fingers, anxiety, peer pressure, chronic disease, fatigue, allergy, wheezing, alcohol, coughing, shortness of breath, swallowing difficulty, and chest pain. Results: According to our analysis, the XGBoost technique performed better than other ensemble techniques and achieved an accuracy of 94.42 %, precision of 95.66%, recall of 94.46%, and AUC of 98.14%, respectively.
肺癌是由肺细胞不受控制的生长转移到身体其他部位而导致的恶性肺肿瘤,可导致死亡。虽然肺癌无法预防,但可以降低癌症发展的风险。肺癌的早期检测对患者的生存至关重要,基于机器学习的预测模型在预测肺癌方面具有潜在的用途。集成技术是机器学习中引人注目的强大技术,可以提高分类器的预测精度。本文综述了一些利用机器学习和集成学习技术建立肺癌预测模型的研究文章。此外,我们将新开发的集成学习技术添加到本文中,该技术是基于309例肺癌患者或非肺癌患者的调查数据集,通过过采样SMOTE方法开发的。我们使用的集合技术是XGBoost、LightGBM、Bagging和AdaBoost,通过k-fold 10交叉验证方法,我们的肺癌预测模型使用的属性是年龄、吸烟、黄手指、焦虑、同伴压力、慢性疾病、疲劳、过敏、喘息、酒精、咳嗽、呼吸短促、吞咽困难和胸痛。结果:根据我们的分析,XGBoost技术优于其他集成技术,准确率为94.42%,精密度为95.66%,召回率为94.46%,AUC为98.14%。
{"title":"Lung cancer prediction model using ensemble learning techniques and a systematic review analysis","authors":"M. Mamun, Afia Farjana, Miraz Al Mamun, Md Salim Ahammed","doi":"10.1109/aiiot54504.2022.9817326","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817326","url":null,"abstract":"Lung cancers are malignant lung tumors resulting from uncontrolled growth of lung cells that metastasizes to other parts of the body and can cause death. Although lung cancer cannot be prevented, the risk of cancer development can be lowered. Early detection of lung cancer is essential for patient survival, and machine learning-based prediction models have potential use in predicting lung cancer. Ensemble techniques are compelling and powerful techniques in Machine Learning to improve the prediction accuracy as classifiers. This paper reviewed some research articles on lung cancer prediction models that used machine learning and ensemble learning techniques. Furthermore, we added our newly developed ensemble learning techniques to this paper which was developed based on a survey dataset of 309 people with or without lung cancer by oversampling SMOTE method. The ensemble techniques we used are XGBoost, LightGBM, Bagging, and AdaBoost by k-fold 10 cross-validation method and the attributes our lung cancer prediction models used are age, smoking, yellow fingers, anxiety, peer pressure, chronic disease, fatigue, allergy, wheezing, alcohol, coughing, shortness of breath, swallowing difficulty, and chest pain. Results: According to our analysis, the XGBoost technique performed better than other ensemble techniques and achieved an accuracy of 94.42 %, precision of 95.66%, recall of 94.46%, and AUC of 98.14%, respectively.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123127870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Detecting Amazon Bot Reviewers Using Unsupervised and Supervised Learning 使用无监督和监督学习检测亚马逊机器人评论者
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817207
Brandon Wood, Khaled Slhoub
Customers of e-commerce platforms often rely on other customers' reviews to make purchasing decisions. On these e-commerce platforms, such as Amazon, sellers will sometimes use fake reviews, often created by bots, to boost ratings on their products. This can negatively affect customer purchase satisfaction. This research employs unsupervised learning algorithms K-Means, DBSCAN, and OPTICS to discover clusters of potential bot reviewer feature values. These clusters will then be analyzed and used for training multiple classifier networks to attempt to be able to detect bot reviewers using machine learning. The results of this research article point towards a direction that this is a possible future path given additional research and domain expertise.
电子商务平台的客户往往依靠其他客户的评论来做出购买决定。在亚马逊(Amazon)等这些电子商务平台上,卖家有时会使用通常由机器人创建的虚假评论来提高产品的评分。这会对顾客的购买满意度产生负面影响。本研究采用无监督学习算法K-Means、DBSCAN和OPTICS来发现潜在的机器人审查员特征值集群。然后,这些集群将被分析并用于训练多个分类器网络,以尝试能够使用机器学习检测机器人评论者。这篇研究文章的结果指出了一个方向,这是一个可能的未来路径,给予额外的研究和领域的专业知识。
{"title":"Detecting Amazon Bot Reviewers Using Unsupervised and Supervised Learning","authors":"Brandon Wood, Khaled Slhoub","doi":"10.1109/aiiot54504.2022.9817207","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817207","url":null,"abstract":"Customers of e-commerce platforms often rely on other customers' reviews to make purchasing decisions. On these e-commerce platforms, such as Amazon, sellers will sometimes use fake reviews, often created by bots, to boost ratings on their products. This can negatively affect customer purchase satisfaction. This research employs unsupervised learning algorithms K-Means, DBSCAN, and OPTICS to discover clusters of potential bot reviewer feature values. These clusters will then be analyzed and used for training multiple classifier networks to attempt to be able to detect bot reviewers using machine learning. The results of this research article point towards a direction that this is a possible future path given additional research and domain expertise.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123632320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Various Vulnerabilities in the Raspbian Operating System and Solutions Raspbian操作系统各种漏洞分析及解决方案
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817202
Christopher Le, Alvaro Martin Grande, AJ Carmine, J. Thompson, Tauheed Khan Mohd
When designing Operating Systems, security is one of the most critical factors to consider. Given the popularity and high usage of Raspberry Pi, Raspbian OS vulnerabilities may cause users serious security issues. Frequently, software developers spend long periods of time testing and analyzing their systems. Throughout this paper, certain vulnerabilities of the Raspbian OS will be addressed and reviewed. The most prominent security issue is the default username and password combination set upon installation. Others include various software and hardware bugs, and shortcomings present in multiple different releases of the Raspbian OS such as Stretch or Wheezy. Additionally, secure shell keys are another prominent area of attacks against Raspbian OS, with connections becoming insecure and vulnerable to attackers and malware. Throughout this paper, potential fixes to these problems will be explored in greater depth.
在设计操作系统时,安全性是需要考虑的最关键因素之一。鉴于树莓派的普及和高使用率,树莓派操作系统的漏洞可能会给用户带来严重的安全问题。软件开发人员经常花费很长时间测试和分析他们的系统。在本文中,我们将讨论和回顾Raspbian操作系统的某些漏洞。最突出的安全问题是安装时设置的默认用户名和密码组合。其他包括各种软件和硬件错误,以及存在于多个不同版本的Raspbian操作系统(如Stretch或Wheezy)中的缺点。此外,安全shell密钥是针对Raspbian OS的另一个主要攻击领域,连接变得不安全,容易受到攻击者和恶意软件的攻击。在本文中,将更深入地探讨这些问题的潜在修复方法。
{"title":"Analysis of Various Vulnerabilities in the Raspbian Operating System and Solutions","authors":"Christopher Le, Alvaro Martin Grande, AJ Carmine, J. Thompson, Tauheed Khan Mohd","doi":"10.1109/aiiot54504.2022.9817202","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817202","url":null,"abstract":"When designing Operating Systems, security is one of the most critical factors to consider. Given the popularity and high usage of Raspberry Pi, Raspbian OS vulnerabilities may cause users serious security issues. Frequently, software developers spend long periods of time testing and analyzing their systems. Throughout this paper, certain vulnerabilities of the Raspbian OS will be addressed and reviewed. The most prominent security issue is the default username and password combination set upon installation. Others include various software and hardware bugs, and shortcomings present in multiple different releases of the Raspbian OS such as Stretch or Wheezy. Additionally, secure shell keys are another prominent area of attacks against Raspbian OS, with connections becoming insecure and vulnerable to attackers and malware. Throughout this paper, potential fixes to these problems will be explored in greater depth.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129568905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review of Human Immune Inspired Algorithms for Intrusion Detection Systems 基于人体免疫的入侵检测算法综述
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817213
Chukwuemeka Duru, J. Ladeji-Osias, K. Wandji, Otily Toutsop, Rachida Kone
Security and trust of Information Systems are critical in its design as they directly influence users' view and acceptance of such systems. Security can be said to be a contextual and dynamic term as there has not been a holistic, universal, and eternal security measure to date. Recent years have seen a lot of confidential and sensitive information being sent, received, and analyzed on the Internet, and a plethora of investigations on ways of developing comprehensive security solutions like encryptions, pattern recognition, and anomaly detection. This work reviews the human inspired algorithms that are particularly employed in pattern recognition and anomaly detection problems. The work discusses the components of the immune system that inspired the artificial Immune System (AIS) based algorithms for pattern and intrusion detection (IDS) problems. A detailed comparison is made between negative selection, clonal selection, and dendritic cell algorithms (danger theory) which are the three major AIS algorithms. AIS is ubiquitous in computer and information security because it is based on the theories developed through years of study and understanding of the human immune system by immunologist. The strengths and weaknesses of these algorithms are also discussed, and possible improvement suggested.
信息系统的安全性和可信度在其设计中至关重要,因为它们直接影响用户对此类系统的看法和接受程度。安全可以说是一个语境和动态的术语,因为迄今为止还没有一个整体的、普遍的和永恒的安全措施。近年来,在Internet上发送、接收和分析了大量机密和敏感信息,并且对开发综合安全解决方案(如加密、模式识别和异常检测)的方法进行了大量的研究。这项工作回顾了人类启发的算法,特别是在模式识别和异常检测问题中使用。该工作讨论了免疫系统的组成部分,这些组成部分启发了基于人工免疫系统(AIS)的模式和入侵检测(IDS)问题算法。对AIS的三种主要算法负选择、克隆选择和树突状细胞算法(危险理论)进行了详细的比较。AIS在计算机和信息安全中无处不在,因为它是基于免疫学家通过多年研究和理解人体免疫系统而发展起来的理论。讨论了这些算法的优缺点,并提出了改进的建议。
{"title":"A Review of Human Immune Inspired Algorithms for Intrusion Detection Systems","authors":"Chukwuemeka Duru, J. Ladeji-Osias, K. Wandji, Otily Toutsop, Rachida Kone","doi":"10.1109/aiiot54504.2022.9817213","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817213","url":null,"abstract":"Security and trust of Information Systems are critical in its design as they directly influence users' view and acceptance of such systems. Security can be said to be a contextual and dynamic term as there has not been a holistic, universal, and eternal security measure to date. Recent years have seen a lot of confidential and sensitive information being sent, received, and analyzed on the Internet, and a plethora of investigations on ways of developing comprehensive security solutions like encryptions, pattern recognition, and anomaly detection. This work reviews the human inspired algorithms that are particularly employed in pattern recognition and anomaly detection problems. The work discusses the components of the immune system that inspired the artificial Immune System (AIS) based algorithms for pattern and intrusion detection (IDS) problems. A detailed comparison is made between negative selection, clonal selection, and dendritic cell algorithms (danger theory) which are the three major AIS algorithms. AIS is ubiquitous in computer and information security because it is based on the theories developed through years of study and understanding of the human immune system by immunologist. The strengths and weaknesses of these algorithms are also discussed, and possible improvement suggested.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130141739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud Computing Security and Future 云计算安全与未来
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817186
Patrick Kopacz, M. Chowdhury
Cloud computing has grown tremendously over the past few years. It creates new ways for information to be stored and processed which bring the growing problem of security. The question at hand is what makes the cloud safe and secure as well as the challenges involved in the process. As modern technology emerges so do the new challenges and issues that come along with this progression. For now, the cloud is highly reliable, provides incredible scalability, and an easy-to-use system. This paper will discuss what cloud computing is, how information is stored, the security behind the scenes, any improvements that can be made, and what the cloud's future looks like.
云计算在过去几年中发展迅猛。它为信息的存储和处理创造了新的方式,这带来了日益严重的安全问题。目前的问题是,是什么让云变得安全可靠,以及这个过程中涉及的挑战。随着现代技术的出现,新的挑战和问题也随之而来。目前,云是高度可靠的,提供了令人难以置信的可伸缩性和易于使用的系统。本文将讨论什么是云计算,信息是如何存储的,后台的安全性,可以做的任何改进,以及云的未来是什么样子。
{"title":"Cloud Computing Security and Future","authors":"Patrick Kopacz, M. Chowdhury","doi":"10.1109/aiiot54504.2022.9817186","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817186","url":null,"abstract":"Cloud computing has grown tremendously over the past few years. It creates new ways for information to be stored and processed which bring the growing problem of security. The question at hand is what makes the cloud safe and secure as well as the challenges involved in the process. As modern technology emerges so do the new challenges and issues that come along with this progression. For now, the cloud is highly reliable, provides incredible scalability, and an easy-to-use system. This paper will discuss what cloud computing is, how information is stored, the security behind the scenes, any improvements that can be made, and what the cloud's future looks like.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125498406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Quality Management Improvement: Case Studi PT BPI 数据质量管理改进:案例研究PT BPI
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817195
Nandang Sunandar, A. Hidayanto
Data quality is closely related to the quality of information. Low data quality leads to inaccurate information and leads to a decrease in business performance. PT BPI as a company that serves the management of local government financial data needs to control and maintain data quality to remain good. The quality of the data produced is very important to note. This needs to be done to maintain the credibility and capability of PT BPI. This scientific writing aims to provide recommendations for improving data quality management. This scientific writing uses qualitative methods with document studies and several interview sessions. The models used in this scientific writing are Data Quality Management Maturity from Loshin and Data Management Body of Knowledge (DMBOK). The results of measuring the maturity level of data quality management at PT BPI using the D'Lhosin model shows that the organization is still at level one. This indicates that PT BPI does not yet have adequate and thorough basic knowledge about data quality management. PT BPI cannot meet the eight measurement characteristics at level two. Based on the resulting maturity measurement to reach level two, the writer made recommendations from eight unmet characteristics based on DMBOK.
数据质量与信息质量密切相关。数据质量低会导致信息不准确,导致业务绩效下降。PT BPI作为一家服务于地方政府财务数据管理的公司,需要对数据质量进行控制和维护,以保持良好的数据质量。所产生的数据的质量非常重要。这样做是为了保持PT BPI的可信度和能力。这篇科学写作旨在为改进数据质量管理提供建议。这篇科学写作使用了定性的方法,包括文献研究和几次访谈。本文中使用的模型是来自Loshin的数据质量管理成熟度和数据管理知识体系(DMBOK)。使用D'Lhosin模型测量PT BPI数据质量管理成熟度水平的结果表明,该组织仍处于第一级。这说明PT BPI对数据质量管理的基础知识还不够充分和全面。PT BPI不能满足2级的8个测量特性。基于达到第二级的成熟度度量结果,作者基于DMBOK从八个未满足的特征中提出了建议。
{"title":"Data Quality Management Improvement: Case Studi PT BPI","authors":"Nandang Sunandar, A. Hidayanto","doi":"10.1109/aiiot54504.2022.9817195","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817195","url":null,"abstract":"Data quality is closely related to the quality of information. Low data quality leads to inaccurate information and leads to a decrease in business performance. PT BPI as a company that serves the management of local government financial data needs to control and maintain data quality to remain good. The quality of the data produced is very important to note. This needs to be done to maintain the credibility and capability of PT BPI. This scientific writing aims to provide recommendations for improving data quality management. This scientific writing uses qualitative methods with document studies and several interview sessions. The models used in this scientific writing are Data Quality Management Maturity from Loshin and Data Management Body of Knowledge (DMBOK). The results of measuring the maturity level of data quality management at PT BPI using the D'Lhosin model shows that the organization is still at level one. This indicates that PT BPI does not yet have adequate and thorough basic knowledge about data quality management. PT BPI cannot meet the eight measurement characteristics at level two. Based on the resulting maturity measurement to reach level two, the writer made recommendations from eight unmet characteristics based on DMBOK.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125501732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proof-of-Concept for a Granular Incident Management Information Sharing Scheme 一种粒度事件管理信息共享方案的概念验证
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817254
Outi-Marja Latvala, Ivo Emanuilov, Tatu Niskanen, Pia Raitio, J. Salonen, Diogo Santos, K. Yordanova
Trust is a key ingredient in collaboration between security operations centers (SOCs). The collaboration can enhance defense and preparedness against cyberattacks, but it is also important to limit the attacker's ability to infer their potential for success from the communication between SOCs. This paper presents a proof-of-concept for a granular information sharing scheme. The information about a security incident is encrypted and the SOCs can decide with great precision which users or user groups can access it. The information is presented in a web-based dasboard visualization, and a user can communicate with other SOCs in order to access relevant incident information.
信任是安全运营中心(soc)之间协作的关键因素。协作可以增强对网络攻击的防御和准备,但限制攻击者从soc之间的通信推断其成功潜力的能力也很重要。本文提出了一种粒度信息共享方案的概念验证。关于安全事件的信息是加密的,soc可以非常精确地决定哪些用户或用户组可以访问它。信息呈现在基于web的仪表板可视化中,用户可以与其他soc通信以访问相关事件信息。
{"title":"Proof-of-Concept for a Granular Incident Management Information Sharing Scheme","authors":"Outi-Marja Latvala, Ivo Emanuilov, Tatu Niskanen, Pia Raitio, J. Salonen, Diogo Santos, K. Yordanova","doi":"10.1109/aiiot54504.2022.9817254","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817254","url":null,"abstract":"Trust is a key ingredient in collaboration between security operations centers (SOCs). The collaboration can enhance defense and preparedness against cyberattacks, but it is also important to limit the attacker's ability to infer their potential for success from the communication between SOCs. This paper presents a proof-of-concept for a granular information sharing scheme. The information about a security incident is encrypted and the SOCs can decide with great precision which users or user groups can access it. The information is presented in a web-based dasboard visualization, and a user can communicate with other SOCs in order to access relevant incident information.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Day ahead Power Demand Forecasting for Hybrid Power at the Edge 边缘混合动力的日前电力需求预测
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817155
Calum McCormack, Christopher Wallace, P. Barrie, G. Morison
We describe the investigation and testing of univariate forecasting techniques on IoT hardware for application at “the Edge” using power demand forecasting. An evaluation of common forecasting techniques is presented, tested using the Morocco Buildings Electricity Consumption Datasets. An architecture is described for the Edge system that would enable 1-day forward forecasts of power demand for use in provisioning power in a hybrid power system. Several of the configurations examined in this study performed comparably with current trends in forecasting methods and are suitable for this application at the Edge, providing a balance of performance and accuracy. A Long Short-Term Memory (LSTM) Neural Network configuration provided the most effective balance of performance, accuracy and simplicity of deployment that is desirable for an application at the Edge.
我们描述了使用电力需求预测在“边缘”应用物联网硬件上的单变量预测技术的调查和测试。提出了常用预测技术的评估,并使用摩洛哥建筑电力消耗数据集进行了测试。描述了Edge系统的体系结构,该体系结构可以实现1天前的电力需求预测,用于混合电力系统中的电力供应。本研究中检查的几种配置与当前预测方法的趋势相比较,适用于Edge的应用,提供了性能和准确性的平衡。长短期记忆(LSTM)神经网络配置提供了性能、准确性和部署简单性的最有效平衡,这是边缘应用程序所需要的。
{"title":"Day ahead Power Demand Forecasting for Hybrid Power at the Edge","authors":"Calum McCormack, Christopher Wallace, P. Barrie, G. Morison","doi":"10.1109/aiiot54504.2022.9817155","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817155","url":null,"abstract":"We describe the investigation and testing of univariate forecasting techniques on IoT hardware for application at “the Edge” using power demand forecasting. An evaluation of common forecasting techniques is presented, tested using the Morocco Buildings Electricity Consumption Datasets. An architecture is described for the Edge system that would enable 1-day forward forecasts of power demand for use in provisioning power in a hybrid power system. Several of the configurations examined in this study performed comparably with current trends in forecasting methods and are suitable for this application at the Edge, providing a balance of performance and accuracy. A Long Short-Term Memory (LSTM) Neural Network configuration provided the most effective balance of performance, accuracy and simplicity of deployment that is desirable for an application at the Edge.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"31 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shift-Invariant Structure-Imposed Convolutional Neural Networks for Direction of Arrival Estimation 基于移位不变结构的卷积神经网络到达方向估计
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817278
K. Adhikari
This paper frames the estimation of directions of arrival of plane waves impinging on an array of sensors as a classification problem using convolutional neural networks (CNNs). We propose a methodology to impose the shift-invariant structure inherent in data to CNNs. We use several methods to pre-process the data collected from sensor arrays and feed the pre-processed data as inputs to CNNs. For all CNNs, data sets corresponding to different signal-to-noise ratio (SNR) levels are generated. The data sets associated with the lowest SNR level are used for training while the other data sets are used for validation. Comparison of the accuracy of the shift-invariant structure-imposed CNNs with those of CNNs that are based on raw data, sample covariance matrices, and principal eigenvectors is provided. The simulations show that shift-invariant structure can be efficiently and most accurately imposed using the optimal signal subspace basis estimates as CNN inputs.
本文利用卷积神经网络(convolutional neural networks, cnn)将平面波的到达方向估计作为一个分类问题。我们提出了一种将数据固有的移位不变结构强加到cnn的方法。我们使用几种方法对从传感器阵列收集的数据进行预处理,并将预处理后的数据作为cnn的输入。对于所有cnn,都会生成不同信噪比(SNR)水平对应的数据集。与最低信噪比水平相关的数据集用于训练,而其他数据集用于验证。将移位不变结构强加cnn与基于原始数据、样本协方差矩阵和主特征向量的cnn的精度进行了比较。仿真结果表明,将最优信号子空间基估计作为CNN输入,可以有效且最准确地施加移不变结构。
{"title":"Shift-Invariant Structure-Imposed Convolutional Neural Networks for Direction of Arrival Estimation","authors":"K. Adhikari","doi":"10.1109/aiiot54504.2022.9817278","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817278","url":null,"abstract":"This paper frames the estimation of directions of arrival of plane waves impinging on an array of sensors as a classification problem using convolutional neural networks (CNNs). We propose a methodology to impose the shift-invariant structure inherent in data to CNNs. We use several methods to pre-process the data collected from sensor arrays and feed the pre-processed data as inputs to CNNs. For all CNNs, data sets corresponding to different signal-to-noise ratio (SNR) levels are generated. The data sets associated with the lowest SNR level are used for training while the other data sets are used for validation. Comparison of the accuracy of the shift-invariant structure-imposed CNNs with those of CNNs that are based on raw data, sample covariance matrices, and principal eigenvectors is provided. The simulations show that shift-invariant structure can be efficiently and most accurately imposed using the optimal signal subspace basis estimates as CNN inputs.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Measurement of Similarity Between Requirement Elicitation and Requirement Specification Using Text Pre-Processing in the Cinemaloka Application 在Cinemaloka应用中使用文本预处理测量需求引出和需求说明之间的相似性
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817193
Junifar Adam Pamungkas, Y. Priyadi, M. J. Alibasa
There are differences in perceptions between Clients and Developers regarding software requirements specifications therefore, research is needed to determine the perceived similarity between software requirements specifications and requirements elicitation results. The SRS document used in this study is called the Cinemaloka application. This document contains business processes and Requirements Specifications related to website-based cinema ticket reservations. This study aims to measure the suitability of perceptions between developers and clients regarding the specification of software requirements that will be or are being built. There are methods that are combined in this research, namely: determining the similarity of the requirement specification with the elicitation of requirements, analyzing the text contained in the elicitation results, Text Pre-processing, and validation through Gwet's AC1. The results of the measurement of the similarity between the elicitation of requirements and the requirement specification carried out in this study resulted in a match between the applications made and the wishes of potential users/clients. Through stages such as CountVectorizer, PorterStemmer, and Cosine Similarity, resulting in a match of 0.717144. Kappa Score from Gwet's AC1 formula using Python is -0.2222, which means “Less than Chance-agreement,” while the Kappa Score value using a questionnaire filled out by the Expert is 0.5378, which means “Moderate Aggregation.”.
客户和开发人员对软件需求规范的理解存在差异,因此,需要进行研究以确定软件需求规范和需求引出结果之间的感知相似性。本研究中使用的SRS文档称为Cinemaloka应用程序。本文档包含与基于网站的电影票预订相关的业务流程和需求规范。这项研究的目的是衡量开发人员和客户之间关于将要或正在构建的软件需求规范的感知的适宜性。本研究结合了以下几种方法:确定需求规范与需求引出的相似度,分析引出结果中包含的文本,文本预处理,通过Gwet的AC1进行验证。在本研究中进行的需求激发和需求规范之间的相似性度量的结果导致应用程序与潜在用户/客户的愿望之间的匹配。通过CountVectorizer、PorterStemmer和Cosine Similarity等阶段,得到匹配值为0.717144。使用Python的Gwet的AC1公式的Kappa评分为-0.2222,这意味着“少于机会一致性”,而使用专家填写的问卷的Kappa评分值为0.5378,这意味着“适度聚集”。
{"title":"Measurement of Similarity Between Requirement Elicitation and Requirement Specification Using Text Pre-Processing in the Cinemaloka Application","authors":"Junifar Adam Pamungkas, Y. Priyadi, M. J. Alibasa","doi":"10.1109/aiiot54504.2022.9817193","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817193","url":null,"abstract":"There are differences in perceptions between Clients and Developers regarding software requirements specifications therefore, research is needed to determine the perceived similarity between software requirements specifications and requirements elicitation results. The SRS document used in this study is called the Cinemaloka application. This document contains business processes and Requirements Specifications related to website-based cinema ticket reservations. This study aims to measure the suitability of perceptions between developers and clients regarding the specification of software requirements that will be or are being built. There are methods that are combined in this research, namely: determining the similarity of the requirement specification with the elicitation of requirements, analyzing the text contained in the elicitation results, Text Pre-processing, and validation through Gwet's AC1. The results of the measurement of the similarity between the elicitation of requirements and the requirement specification carried out in this study resulted in a match between the applications made and the wishes of potential users/clients. Through stages such as CountVectorizer, PorterStemmer, and Cosine Similarity, resulting in a match of 0.717144. Kappa Score from Gwet's AC1 formula using Python is -0.2222, which means “Less than Chance-agreement,” while the Kappa Score value using a questionnaire filled out by the Expert is 0.5378, which means “Moderate Aggregation.”.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120956812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2022 IEEE World AI IoT Congress (AIIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1