首页 > 最新文献

2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Automated prediction of Heart disease using optimized machine learning techniques 使用优化的机器学习技术自动预测心脏病
Lama A. Alqahtani, Hanadi M. Alotaibi, Irfan Ullah Khan, N. Aslam
Nowadays, heart disease is considered as one of the most significant factors of death. Several attempts have been made over the last few years to automate the diagnosis of cardiac disease. Nevertheless, the significance of machine learning has already been proved from literature studies. In our study, several machine learning algorithms such as Naive Bayes (NB), Multi-Layer Perceptron (MLP), Random Forest (RF) and Decision Tree (DT) will be compared to predict presence of heart disease using UCI data set. Several preprocessing techniques will be applied; brute force technique will be used for feature selection. Grid search mechanism will be used for parameter optimization. Experiments showed that Random Forest achieved the highest performance with the accuracy of 0.93 and AUC of 0.95.
如今,心脏病被认为是最重要的死亡因素之一。在过去的几年中,已经进行了几次尝试,以实现心脏病的自动诊断。尽管如此,机器学习的重要性已经从文献研究中得到了证明。在我们的研究中,将比较几种机器学习算法,如朴素贝叶斯(NB)、多层感知器(MLP)、随机森林(RF)和决策树(DT),以使用UCI数据集预测心脏病的存在。将应用几种预处理技术;将使用蛮力技术进行特征选择。采用网格搜索机制进行参数优化。实验表明Random Forest的准确率为0.93,AUC为0.95,达到了最高的性能。
{"title":"Automated prediction of Heart disease using optimized machine learning techniques","authors":"Lama A. Alqahtani, Hanadi M. Alotaibi, Irfan Ullah Khan, N. Aslam","doi":"10.1109/UEMCON51285.2020.9298051","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298051","url":null,"abstract":"Nowadays, heart disease is considered as one of the most significant factors of death. Several attempts have been made over the last few years to automate the diagnosis of cardiac disease. Nevertheless, the significance of machine learning has already been proved from literature studies. In our study, several machine learning algorithms such as Naive Bayes (NB), Multi-Layer Perceptron (MLP), Random Forest (RF) and Decision Tree (DT) will be compared to predict presence of heart disease using UCI data set. Several preprocessing techniques will be applied; brute force technique will be used for feature selection. Grid search mechanism will be used for parameter optimization. Experiments showed that Random Forest achieved the highest performance with the accuracy of 0.93 and AUC of 0.95.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agile Edge Classification of Ocean Sounds 海洋声音的敏捷边缘分类
Stelios N. Neophytou, Pavlos Tsiantis, Ilias Alexopoulos, I. Kyriakides, Camille de Veyrac, Ehson Abdi, D. Hayes
The maritime environment is characterized by a scarcity of resources of power, sensing, processing, and communications. The resource constraints impose limitations in information acquisition which involves data collection and data processing to yield meaningful statistics. The contribution of this work is on custom software and hardware methods for low power, low data-rate processing for the application of classification of ocean sounds. The combination of light processing software and custom hardware allow the development of efficient cyber-physical maritime IoT systems. A simulation-based study is provided to evaluate the ability of the software method for agile learning of features for ocean sounds classification. In addition, a practical implementation on a custom hardware emulator is provided to demonstrate the potential of the method to classify ocean sounds on low power, inexpensive seaborne IoT nodes.
海洋环境的特点是缺乏电力、传感、处理和通信资源。资源限制限制了信息获取,包括数据收集和数据处理,以产生有意义的统计数据。这项工作的贡献在于为海洋声音分类应用提供低功耗、低数据速率处理的定制软件和硬件方法。光处理软件和定制硬件的结合允许开发高效的网络物理海事物联网系统。通过仿真研究,对软件方法在海洋声音分类特征敏捷学习中的能力进行了评价。此外,还提供了在定制硬件模拟器上的实际实现,以展示该方法在低功耗,廉价的海上物联网节点上对海洋声音进行分类的潜力。
{"title":"Agile Edge Classification of Ocean Sounds","authors":"Stelios N. Neophytou, Pavlos Tsiantis, Ilias Alexopoulos, I. Kyriakides, Camille de Veyrac, Ehson Abdi, D. Hayes","doi":"10.1109/UEMCON51285.2020.9298142","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298142","url":null,"abstract":"The maritime environment is characterized by a scarcity of resources of power, sensing, processing, and communications. The resource constraints impose limitations in information acquisition which involves data collection and data processing to yield meaningful statistics. The contribution of this work is on custom software and hardware methods for low power, low data-rate processing for the application of classification of ocean sounds. The combination of light processing software and custom hardware allow the development of efficient cyber-physical maritime IoT systems. A simulation-based study is provided to evaluate the ability of the software method for agile learning of features for ocean sounds classification. In addition, a practical implementation on a custom hardware emulator is provided to demonstrate the potential of the method to classify ocean sounds on low power, inexpensive seaborne IoT nodes.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"126 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114009279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Creating and Using Secure Software 创建和使用安全软件
A. Asadoorian, Melvin Alberto, M. Ali
In this paper, we outline the Software Development LifeCycle (SDLC: requirements elicitation & definition, design, implementation, testing, and maintenance) and seek to find and convey the best practices for security throughout the it. Security should be made a priority when defining system requirements; system design and architecture should embody those requirements through secure models (supporting integrity, confidentiality, authorization); developers should translate those specifications to the code; proper test cases should be devised in order to assess possible vulnerabilities of completed systems; maintenance and evolution teams should be cognizant of previous security measures to avoid compromising them with functional improvements. Further, there are measures that should be taken outside of and after the completion of this cycle to reduce the risk of successful attacks both in terms of securing data and in terms of compounding the difficulty of reverse engineering. Methods include new approaches to authentication, the old standby of cryptography, and obfuscating source code so that exploiting it will be difficult. Employing all of these strategies in tandem should produce secure yet functional systems with security present in all layers; the more barriers that stand in an attacker’s way, the less often an attack will be attempted and those increases the reactionary time that system administrators have to respond to attacks in progress.
在本文中,我们概述了软件开发生命周期(SDLC:需求引出和定义、设计、实现、测试和维护),并寻求在整个生命周期中找到并传达安全性的最佳实践。在定义系统需求时,应优先考虑安全性;系统设计和体系结构应该通过安全模型(支持完整性、机密性、授权)体现这些需求;开发人员应该将这些规范转换为代码;应设计适当的测试用例,以评估已完成的系统可能存在的漏洞;维护和演进团队应该认识到以前的安全措施,以避免在功能改进中损害它们。此外,在此周期之外和完成之后,应该采取一些措施,以减少成功攻击的风险,无论是在保护数据方面,还是在增加逆向工程难度方面。方法包括新的身份验证方法、旧的加密方法,以及对源代码进行模糊处理以使其难以利用。采用所有这些策略串联应该产生安全的功能系统,安全存在于所有层;在攻击者的道路上设置的障碍越多,尝试攻击的次数就越少,这就增加了系统管理员对正在进行的攻击做出响应的反应时间。
{"title":"Creating and Using Secure Software","authors":"A. Asadoorian, Melvin Alberto, M. Ali","doi":"10.1109/UEMCON51285.2020.9298046","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298046","url":null,"abstract":"In this paper, we outline the Software Development LifeCycle (SDLC: requirements elicitation & definition, design, implementation, testing, and maintenance) and seek to find and convey the best practices for security throughout the it. Security should be made a priority when defining system requirements; system design and architecture should embody those requirements through secure models (supporting integrity, confidentiality, authorization); developers should translate those specifications to the code; proper test cases should be devised in order to assess possible vulnerabilities of completed systems; maintenance and evolution teams should be cognizant of previous security measures to avoid compromising them with functional improvements. Further, there are measures that should be taken outside of and after the completion of this cycle to reduce the risk of successful attacks both in terms of securing data and in terms of compounding the difficulty of reverse engineering. Methods include new approaches to authentication, the old standby of cryptography, and obfuscating source code so that exploiting it will be difficult. Employing all of these strategies in tandem should produce secure yet functional systems with security present in all layers; the more barriers that stand in an attacker’s way, the less often an attack will be attempted and those increases the reactionary time that system administrators have to respond to attacks in progress.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Estimating Predicate Selectivities in a NoSQL Database Service NoSQL数据库服务中谓词选择性的估计
S. Chawathe
An estimate of the number of items in a database that satisfy an equality or range predicate is useful for several tasks, such as cost-based query optimization, provisioning of system resources, and determining the financial costs of using database services. In a traditional database system, such estimates are computed and used internally by the system and have been well studied. In contrast, such estimates have not received much attention in the context of a cloud-based database service, where they must be computed by the application that uses the service using only the limited features of the interface provided by the service. This paper motivates and formulates the selectivity-estimation problem for database services. It describes the characteristics of this problem that distinguish it from the analogous problem in traditional database systems. It outlines some subproblems and methods to address them. It provides a method for estimating selectivities based on random sampling along with some experimental results.
估计数据库中满足等式或范围谓词的项的数量对于许多任务都很有用,例如基于成本的查询优化、系统资源的供应以及确定使用数据库服务的财务成本。在传统的数据库系统中,这种估计是由系统内部计算和使用的,并且已经进行了很好的研究。相比之下,这种估计在基于云的数据库服务的上下文中没有受到太多关注,在这种情况下,它们必须由使用服务的应用程序计算,该应用程序仅使用服务提供的接口的有限特性。本文提出并阐述了数据库服务的选择性估计问题。它描述了该问题与传统数据库系统中类似问题的区别。它概述了一些子问题和解决它们的方法。给出了一种基于随机抽样的估计选择性的方法,并给出了一些实验结果。
{"title":"Estimating Predicate Selectivities in a NoSQL Database Service","authors":"S. Chawathe","doi":"10.1109/UEMCON51285.2020.9298056","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298056","url":null,"abstract":"An estimate of the number of items in a database that satisfy an equality or range predicate is useful for several tasks, such as cost-based query optimization, provisioning of system resources, and determining the financial costs of using database services. In a traditional database system, such estimates are computed and used internally by the system and have been well studied. In contrast, such estimates have not received much attention in the context of a cloud-based database service, where they must be computed by the application that uses the service using only the limited features of the interface provided by the service. This paper motivates and formulates the selectivity-estimation problem for database services. It describes the characteristics of this problem that distinguish it from the analogous problem in traditional database systems. It outlines some subproblems and methods to address them. It provides a method for estimating selectivities based on random sampling along with some experimental results.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127740996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Lockdown and Post Lockdown on Covid19 cases across India using Supervised Learning Techniques 使用监督学习技术的封锁和封锁后对印度covid - 19病例的影响
Narayana Darapaneni, Amol Kobal, Rohit Chaoji, R. Tiwari, S. Saurav, A. Paduri
The Coronavirus (or Covid-19) outbreak is a major global pandemic, which has infected millions of people across the world. India has been one of the worst hit country by this pandemic with over 4.5 million people affected by the virus as of 10th Sept 2020. The governments in India took various methods to contain the outbreak including non-medical interventions like lockdown. This document provides detailed analysis of effect of lockdown in containing the spread of Covid-19 in India. This work comprises of applying different statistical techniques to comprehend the Virus progression during various phases of lockdown implemented across India.
冠状病毒(或Covid-19)的爆发是一场重大的全球大流行,已经感染了全球数百万人。印度是受此次大流行影响最严重的国家之一,截至2020年9月10日,有450多万人感染了该病毒。印度政府采取了各种方法来控制疫情,包括封锁等非医疗干预措施。本文件详细分析了封锁对遏制Covid-19在印度传播的影响。这项工作包括应用不同的统计技术来了解印度各地实施封锁的各个阶段的病毒进展情况。
{"title":"Effects of Lockdown and Post Lockdown on Covid19 cases across India using Supervised Learning Techniques","authors":"Narayana Darapaneni, Amol Kobal, Rohit Chaoji, R. Tiwari, S. Saurav, A. Paduri","doi":"10.1109/UEMCON51285.2020.9298183","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298183","url":null,"abstract":"The Coronavirus (or Covid-19) outbreak is a major global pandemic, which has infected millions of people across the world. India has been one of the worst hit country by this pandemic with over 4.5 million people affected by the virus as of 10th Sept 2020. The governments in India took various methods to contain the outbreak including non-medical interventions like lockdown. This document provides detailed analysis of effect of lockdown in containing the spread of Covid-19 in India. This work comprises of applying different statistical techniques to comprehend the Virus progression during various phases of lockdown implemented across India.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126409535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VSDM: A Virtual Service Device Management Scheme for UPnP-Based IoT Networks VSDM:基于upnp的物联网虚拟业务设备管理方案
Golam Kayas, J. Payton, M. Hossain, S. Islam
The ubiquitous nature of IoT devices has brought new and exciting applications in computing and communication paradigms. Due to its ability to enable auto-configurable communication between IoT devices, pervasive applications, and remote clients, the use of the Universal Plug and Play (UPnP) protocol is widespread. However, the advertisement and discovery mechanism of UPnP incurs significant overhead on resource-constrained IoT devices. In this paper, we propose a delegation-based approach that extends the UPnP protocol by offloading the service advertisement and discovery-related overhead from resource-limited IoT devices to the resource-rich neighbours of a UPnP-enabled IoT network. Our experimental evaluations demonstrate that the proposed scheme shows significant improvement over the basic UPnP, reducing energy consumption and network overhead.
物联网设备无处不在的特性在计算和通信范式中带来了新的令人兴奋的应用。由于它能够在物联网设备、普及应用程序和远程客户端之间实现自动配置通信,因此通用即插即用(UPnP)协议的使用非常广泛。然而,UPnP的发布和发现机制在资源受限的物联网设备上产生了巨大的开销。在本文中,我们提出了一种基于委托的方法,通过将服务广告和发现相关的开销从资源有限的物联网设备卸载到支持UPnP的物联网网络的资源丰富的邻居,从而扩展UPnP协议。我们的实验评估表明,所提出的方案比基本UPnP有显着改进,降低了能耗和网络开销。
{"title":"VSDM: A Virtual Service Device Management Scheme for UPnP-Based IoT Networks","authors":"Golam Kayas, J. Payton, M. Hossain, S. Islam","doi":"10.1109/UEMCON51285.2020.9298148","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298148","url":null,"abstract":"The ubiquitous nature of IoT devices has brought new and exciting applications in computing and communication paradigms. Due to its ability to enable auto-configurable communication between IoT devices, pervasive applications, and remote clients, the use of the Universal Plug and Play (UPnP) protocol is widespread. However, the advertisement and discovery mechanism of UPnP incurs significant overhead on resource-constrained IoT devices. In this paper, we propose a delegation-based approach that extends the UPnP protocol by offloading the service advertisement and discovery-related overhead from resource-limited IoT devices to the resource-rich neighbours of a UPnP-enabled IoT network. Our experimental evaluations demonstrate that the proposed scheme shows significant improvement over the basic UPnP, reducing energy consumption and network overhead.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Auction Data for Anomalous Bidding 异常竞价拍卖数据分析
S. Chawathe
Online auctions as exemplified by sites such as ebay.com are responsible for very large volumes of transactions and monetary value. Their growth has also led to a growth in fraudulent activities in these markets. This paper studies transaction data from such auctions with the goal of using it to detect anomalous and potentially fraudulent bidding. To that end, it explores several approaches based on classification, clustering, and visualization. The quantitative results signal very high accuracy in classification but their promise is tempered by some limitations of the experimental dataset. Clustering and visualizations using self-organizing maps (SOMs) is found to be more effective for this data than clustering using more conventional methods such as k-means. In particular, the SOMs reveal several interesting relationships among the dataset’s attributes and their correlations to anomalous bidding.
以ebay等网站为代表的在线拍卖产生了大量的交易和货币价值。它们的增长也导致了这些市场中欺诈活动的增长。本文研究了此类拍卖的交易数据,目的是利用它来检测异常和潜在的欺诈性竞标。为此,本文探讨了几种基于分类、聚类和可视化的方法。定量结果表明分类具有很高的准确性,但由于实验数据集的一些限制,其前景受到了影响。对于这些数据,使用自组织图(SOMs)进行聚类和可视化比使用更传统的方法(如k-means)进行聚类更有效。特别是,som揭示了数据集属性之间的几个有趣关系以及它们与异常出价的相关性。
{"title":"Analyzing Auction Data for Anomalous Bidding","authors":"S. Chawathe","doi":"10.1109/UEMCON51285.2020.9298086","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298086","url":null,"abstract":"Online auctions as exemplified by sites such as ebay.com are responsible for very large volumes of transactions and monetary value. Their growth has also led to a growth in fraudulent activities in these markets. This paper studies transaction data from such auctions with the goal of using it to detect anomalous and potentially fraudulent bidding. To that end, it explores several approaches based on classification, clustering, and visualization. The quantitative results signal very high accuracy in classification but their promise is tempered by some limitations of the experimental dataset. Clustering and visualizations using self-organizing maps (SOMs) is found to be more effective for this data than clustering using more conventional methods such as k-means. In particular, the SOMs reveal several interesting relationships among the dataset’s attributes and their correlations to anomalous bidding.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Critical review of Credit Card Fraud Detection Techniques 信用卡欺诈检测技术综述
Baker Al Smadi, Manki Min
Credit card fraud is one of the most important threats that affect people as well as companies across the world, particularly with the growing volume of financial transactions using credit cards every day. This puts the security of financial transactions at serious risk and calls for a fundamental solution. In this paper, we discuss various techniques of credit card fraud detection techniques that provide enhanced protection for credit card systems against a variety of frauds. We also compare these techniques in terms of accuracy, time, and cost, and outlined potential strengths and weaknesses to provide a guideline to choose the right technique.
信用卡诈骗是影响全球个人和公司的最重要威胁之一,特别是随着每天使用信用卡的金融交易量不断增长。这使金融交易的安全面临严重风险,需要从根本上解决问题。在本文中,我们讨论了信用卡欺诈检测技术的各种技术,这些技术为信用卡系统提供了针对各种欺诈的增强保护。我们还在准确性、时间和成本方面比较了这些技术,并概述了潜在的优点和缺点,以提供选择正确技术的指导方针。
{"title":"A Critical review of Credit Card Fraud Detection Techniques","authors":"Baker Al Smadi, Manki Min","doi":"10.1109/UEMCON51285.2020.9298075","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298075","url":null,"abstract":"Credit card fraud is one of the most important threats that affect people as well as companies across the world, particularly with the growing volume of financial transactions using credit cards every day. This puts the security of financial transactions at serious risk and calls for a fundamental solution. In this paper, we discuss various techniques of credit card fraud detection techniques that provide enhanced protection for credit card systems against a variety of frauds. We also compare these techniques in terms of accuracy, time, and cost, and outlined potential strengths and weaknesses to provide a guideline to choose the right technique.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Phychoacoustic Masking of Delta and Time -Difference Cepstrum Features for Deception Detection 用于欺骗检测的δ和时差倒谱特征的声心理掩蔽
Sinead V. Fernandes, M. S. Ullah
This paper presents the test results of analyzing mel frequency cepstrum coefficient (MFCC), delta and difference cepstrum features to detect and distinguish the truthful and deceptive speech. The features are extracted based on the psychoacoustic masking property of human speech and how it is perceived. Truthful and deceptive speeches are preset based off a guilty male speaker in police custody. Delta cepstrum and time-difference cepstrum features at triangular critical bands filter and a neural network show the distinctions that determine whether an utterance is truthful or deceptive. In this paper, we analyze the extracted MFCC, delta cepstrum and time-difference cepstrum features to see how stress in speech accurately conveys human speech emotion and deception. Finally, we feed the data into an artificial neural network model to test out the results.
本文给出了通过分析频率倒频谱系数(MFCC)、δ和差倒频谱特征来检测和区分真假语音的测试结果。这些特征是基于人类语音的心理声掩蔽特性及其感知方式提取的。真实和欺骗性的演讲都是基于一个被警察拘留的有罪的男性演讲者而预设的。三角临界带上的δ倒谱和时差倒谱特征通过滤波和神经网络显示了判断话语是真实还是欺骗性的区别。在本文中,我们分析提取的MFCC、delta倒谱和时差倒谱特征,以了解语音中的压力如何准确地传达人类的语音情感和欺骗。最后,我们将数据输入人工神经网络模型来检验结果。
{"title":"Phychoacoustic Masking of Delta and Time -Difference Cepstrum Features for Deception Detection","authors":"Sinead V. Fernandes, M. S. Ullah","doi":"10.1109/UEMCON51285.2020.9298117","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298117","url":null,"abstract":"This paper presents the test results of analyzing mel frequency cepstrum coefficient (MFCC), delta and difference cepstrum features to detect and distinguish the truthful and deceptive speech. The features are extracted based on the psychoacoustic masking property of human speech and how it is perceived. Truthful and deceptive speeches are preset based off a guilty male speaker in police custody. Delta cepstrum and time-difference cepstrum features at triangular critical bands filter and a neural network show the distinctions that determine whether an utterance is truthful or deceptive. In this paper, we analyze the extracted MFCC, delta cepstrum and time-difference cepstrum features to see how stress in speech accurately conveys human speech emotion and deception. Finally, we feed the data into an artificial neural network model to test out the results.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134520551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Remote monitoring of evapotranspiration from green roof systems 绿色屋顶系统蒸散量的远程监测
Jeremy Lytle, D. Santillo, K. Mai, Jeremy Wright
Green roofs are rapidly becoming ubiquitous tools for stormwater management in the urban setting for their ability to divert water from centralized treatment plants and support natural water cycles. In doing so, the performance of a green roof system is dependent on the process of evapotranspiration, which is a function of microclimatic conditions. The work herein presents a remote monitoring architecture for measurement of evapotranspiration performance from a variety of different green roof topologies in an urban setting. The data acquisition system employs an i2c bus to coordinate an array of loads cells, controlled by a central microcomputer which is WIFI connected and cloud interactive. Resulting datasets will contribute to the refinement of agricultural evapotranspiration models towards green roof applications, as well as the characterization of design and microclimate related performance impacts. Preliminary results indicate reliable functionality and data quality from the remote monitoring system. This outcome supports the value of active instrumentation and performance monitoring to the advancement of green roof technology. Going forward, post-processing methods will be expanded, and the system will be applied to additional green roof topologies for the 2021 growing season.
绿色屋顶正迅速成为城市环境中无处不在的雨水管理工具,因为它们能够从集中处理厂转移水并支持自然水循环。这样,绿色屋顶系统的性能取决于蒸散过程,这是小气候条件的一个函数。本文提出了一种远程监测架构,用于测量城市环境中各种不同绿色屋顶拓扑结构的蒸散发性能。数据采集系统采用i2c总线来协调一系列称重传感器,由WIFI连接和云交互的中央微机控制。由此产生的数据集将有助于改进面向绿色屋顶应用的农业蒸散模型,以及设计和小气候相关性能影响的表征。初步结果表明,远程监控系统的功能和数据质量可靠。这一结果支持了主动仪表和性能监测对绿色屋顶技术进步的价值。未来,将扩大后处理方法,并将该系统应用于2021年生长季节的其他绿色屋顶拓扑结构。
{"title":"Remote monitoring of evapotranspiration from green roof systems","authors":"Jeremy Lytle, D. Santillo, K. Mai, Jeremy Wright","doi":"10.1109/UEMCON51285.2020.9298164","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298164","url":null,"abstract":"Green roofs are rapidly becoming ubiquitous tools for stormwater management in the urban setting for their ability to divert water from centralized treatment plants and support natural water cycles. In doing so, the performance of a green roof system is dependent on the process of evapotranspiration, which is a function of microclimatic conditions. The work herein presents a remote monitoring architecture for measurement of evapotranspiration performance from a variety of different green roof topologies in an urban setting. The data acquisition system employs an i2c bus to coordinate an array of loads cells, controlled by a central microcomputer which is WIFI connected and cloud interactive. Resulting datasets will contribute to the refinement of agricultural evapotranspiration models towards green roof applications, as well as the characterization of design and microclimate related performance impacts. Preliminary results indicate reliable functionality and data quality from the remote monitoring system. This outcome supports the value of active instrumentation and performance monitoring to the advancement of green roof technology. Going forward, post-processing methods will be expanded, and the system will be applied to additional green roof topologies for the 2021 growing season.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134575492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1