首页 > 最新文献

2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
An FPGA-based Implementation Method for Quadratic Spiking Neuron Model 基于fpga的二次脉冲神经元模型实现方法
Xianghong Lin, Hang Lu, Xiaomei Pi, Xiangwen Wang
In the innovative neural prostheses, the biological cell assemblies of the biological nervous system can be replaced by artificial organs, which makes the idea of dynamically interface biological neurons even more urgent. To mimic and investigate the activity of biological neural networks, many different architectures and technologies in the field of neuromorphic have been developed at present. When structuring simple neuron models, researchers use Field programmable gate arrays (FPGAs) to obtain better accuracy and real-time performance. This paper uses FPGAs to achieve the circuit design of the neuron model, such that based on the biologically plausible the quadratic spiking neuron model, can simulate the neuron spiking behaviors of thalamus neurons and hippocampal CA1 pyramidal neurons. After the FPGA hardware architecture of the neuron model is designed and implemented, this model can better simulate the spiking behaviors observed in biological neurons.
在创新的神经假体中,生物神经系统的生物细胞组件可以被人工器官取代,这使得动态界面生物神经元的想法变得更加迫切。为了模拟和研究生物神经网络的活动,目前在神经形态领域发展了许多不同的体系结构和技术。在构建简单的神经元模型时,研究人员使用现场可编程门阵列(fpga)来获得更好的准确性和实时性。本文利用fpga实现神经元模型的电路设计,使基于生物学上合理的二次尖峰神经元模型,可以模拟丘脑神经元和海马CA1锥体神经元的神经元尖峰行为。在设计并实现神经元模型的FPGA硬件架构后,该模型可以更好地模拟生物神经元中观察到的尖峰行为。
{"title":"An FPGA-based Implementation Method for Quadratic Spiking Neuron Model","authors":"Xianghong Lin, Hang Lu, Xiaomei Pi, Xiangwen Wang","doi":"10.1109/UEMCON51285.2020.9298029","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298029","url":null,"abstract":"In the innovative neural prostheses, the biological cell assemblies of the biological nervous system can be replaced by artificial organs, which makes the idea of dynamically interface biological neurons even more urgent. To mimic and investigate the activity of biological neural networks, many different architectures and technologies in the field of neuromorphic have been developed at present. When structuring simple neuron models, researchers use Field programmable gate arrays (FPGAs) to obtain better accuracy and real-time performance. This paper uses FPGAs to achieve the circuit design of the neuron model, such that based on the biologically plausible the quadratic spiking neuron model, can simulate the neuron spiking behaviors of thalamus neurons and hippocampal CA1 pyramidal neurons. After the FPGA hardware architecture of the neuron model is designed and implemented, this model can better simulate the spiking behaviors observed in biological neurons.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122646649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knee Injury Diagnostic Device 膝关节损伤诊断装置
Juliet E. McKenna, Tyler R. Hopkins, Lucas T. Lavallee, D. Dow
Knee injuries are difficult to accurately diagnose. The manual evaluation relies on many subjective factors such as physician experience, swelling, patient guarding, and the severity of the injury. These factors can lead to an inaccurate or incomplete diagnosis, resulting in less than optimal treatment and recovery. Knee injuries are very common among athletes and can occur during the day to day activities, with many resulting in tears to one or more of the four ligaments. For evaluation, a physician manually manipulates the knee with a series of standard tests. Even though these standard manual tests are considered best practice, they are known to lead to some inaccuracies with upwards of 1 in 8 patients being misdiagnosed due to testing deficiencies. Imaging by MRI is used to support the diagnosis if available, though not available to all patients due to cost and time requirements. This purpose of this project was to develop and test a wearable diagnostic system contained within a sleeve over the knee. Incorporated sensors were used to monitor movement and electromyographic activity to determine quantitative measurements toward a diagnosis. The movement and displacement monitoring subsystems were tested on a constructed model of the lower leg and knee. Preliminary results have shown accurate readings with an average percent error of 1% for range of motion testing and 3% (0.1 to 0.2 mm) for laxity testing. This measurement determined by this system could be reported to a physician who could use when making a diagnosis. Improved diagnosis would guide appropriate treatment and contribute to improved recovery.
膝关节损伤很难准确诊断。人工评估依赖于许多主观因素,如医生经验、肿胀、患者保护和损伤的严重程度。这些因素可能导致不准确或不完整的诊断,导致不理想的治疗和恢复。膝关节损伤在运动员中很常见,可能发生在日常活动中,许多人会导致四根韧带中的一条或多条撕裂。为了评估,医生通过一系列标准测试手动操作膝关节。尽管这些标准的手工测试被认为是最佳实践,但众所周知,它们会导致一些不准确的情况,由于测试缺陷,超过八分之一的患者被误诊。核磁共振成像(MRI)可用来辅助诊断,但由于成本和时间要求,并非所有患者都可用。该项目的目的是开发和测试一种可穿戴诊断系统,该系统包含在膝盖上方的袖子中。合并传感器用于监测运动和肌电图活动,以确定诊断的定量测量。在构建的小腿和膝关节模型上对运动和位移监测子系统进行了测试。初步结果显示准确的读数,运动范围测试的平均误差为1%,松弛测试的平均误差为3%(0.1至0.2 mm)。该系统确定的测量值可以报告给医生,医生可以在诊断时使用。改进诊断将指导适当的治疗,并有助于改善康复。
{"title":"Knee Injury Diagnostic Device","authors":"Juliet E. McKenna, Tyler R. Hopkins, Lucas T. Lavallee, D. Dow","doi":"10.1109/UEMCON51285.2020.9298081","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298081","url":null,"abstract":"Knee injuries are difficult to accurately diagnose. The manual evaluation relies on many subjective factors such as physician experience, swelling, patient guarding, and the severity of the injury. These factors can lead to an inaccurate or incomplete diagnosis, resulting in less than optimal treatment and recovery. Knee injuries are very common among athletes and can occur during the day to day activities, with many resulting in tears to one or more of the four ligaments. For evaluation, a physician manually manipulates the knee with a series of standard tests. Even though these standard manual tests are considered best practice, they are known to lead to some inaccuracies with upwards of 1 in 8 patients being misdiagnosed due to testing deficiencies. Imaging by MRI is used to support the diagnosis if available, though not available to all patients due to cost and time requirements. This purpose of this project was to develop and test a wearable diagnostic system contained within a sleeve over the knee. Incorporated sensors were used to monitor movement and electromyographic activity to determine quantitative measurements toward a diagnosis. The movement and displacement monitoring subsystems were tested on a constructed model of the lower leg and knee. Preliminary results have shown accurate readings with an average percent error of 1% for range of motion testing and 3% (0.1 to 0.2 mm) for laxity testing. This measurement determined by this system could be reported to a physician who could use when making a diagnosis. Improved diagnosis would guide appropriate treatment and contribute to improved recovery.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131120339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware 网络诈骗:加密勒索软件的检测与分析
Ilker Kara, M. Aydos
Currently as the widespread use of virtual monetary units (like Bitcoin, Ethereum, Ripple, Litecoin) has begun, people with bad intentions have been attracted to this area and have produced and marketed ransomware in order to obtain virtual currency easily. This ransomware infiltrates the victim’s system with smartly-designed methods and encrypts the files found in the system. After the encryption process, the attacker leaves a message demanding a ransom in virtual currency to open access to the encrypted files and warns that otherwise the files will not be accessible. This type of ransomware is becoming more popular over time, so currently it is the largest information technology security threat. In the literature, there are many studies about detection and analysis of this cyber-bullying. In this study, we focused on crypto-ransomware and investigated a forensic analysis of a current attack example in detail. In this example, the attack method and behavior of the crypto-ransomware were analyzed and it was identified that information belonging to the attacker was accessible. With this dimension, we think our study will significantly contribute to the struggle against this threat.
目前,随着虚拟货币单位(如比特币,以太坊,瑞波币,莱特币)的广泛使用,一些不怀好意的人被吸引到这个领域,并制作和销售勒索软件,以便轻松获得虚拟货币。这种勒索软件通过巧妙设计的方法渗透到受害者的系统中,并加密系统中找到的文件。加密过程结束后,攻击者会留下一条信息,要求支付虚拟货币赎金才能打开对加密文件的访问,并警告说,否则将无法访问这些文件。随着时间的推移,这种类型的勒索软件变得越来越流行,因此目前它是最大的信息技术安全威胁。在文献中,有很多关于这种网络欺凌的检测和分析的研究。在本研究中,我们专注于加密勒索软件,并详细调查了当前攻击示例的取证分析。在这个例子中,分析了加密勒索软件的攻击方法和行为,并确定了属于攻击者的信息是可访问的。在这方面,我们认为我们的研究将大大有助于与这一威胁作斗争。
{"title":"Cyber Fraud: Detection and Analysis of the Crypto-Ransomware","authors":"Ilker Kara, M. Aydos","doi":"10.1109/UEMCON51285.2020.9298128","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298128","url":null,"abstract":"Currently as the widespread use of virtual monetary units (like Bitcoin, Ethereum, Ripple, Litecoin) has begun, people with bad intentions have been attracted to this area and have produced and marketed ransomware in order to obtain virtual currency easily. This ransomware infiltrates the victim’s system with smartly-designed methods and encrypts the files found in the system. After the encryption process, the attacker leaves a message demanding a ransom in virtual currency to open access to the encrypted files and warns that otherwise the files will not be accessible. This type of ransomware is becoming more popular over time, so currently it is the largest information technology security threat. In the literature, there are many studies about detection and analysis of this cyber-bullying. In this study, we focused on crypto-ransomware and investigated a forensic analysis of a current attack example in detail. In this example, the attack method and behavior of the crypto-ransomware were analyzed and it was identified that information belonging to the attacker was accessible. With this dimension, we think our study will significantly contribute to the struggle against this threat.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128056307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Noncoherent Incremental Learning Demodulator 一种非相干增量学习解调器
P. Gorday, N. Erdöl, H. Zhuang
Incremental learning after deployment is one of several attractive capabilities that motivate the use of neural network demodulators. This paper presents a complex noncoherent neural network suitable for on-off key (OOK) demodulation. When trained in an AWGN channel, the demodulator learns a solution that outperforms the traditional noncoherent matched filter demodulator. The paper also explores incremental learning techniques that enable continued learning in the field. Training in the field with known labels provides maximum adaptability to new conditions, but the availability of known symbols maybe limited. As an alternative, we considered the effectiveness of entropy regularization and pseudo-labels to adapt a lab-trained reference network to new field conditions. Simulation of these techniques in an example multipath channel demonstrates successful unsupervised adaptation with initial symbol error rates up to 20% and successful semi-supervised adaptation with a small fraction of known symbols per packet and initial symbol error rates as high as 40%. In both cases, symbol error rates after adaptation are below 0.3%.
部署后的增量学习是激励使用神经网络解调器的几个有吸引力的功能之一。提出了一种适用于开关键解调的复杂非相干神经网络。当在AWGN信道中训练时,解调器学习到一种优于传统非相干匹配滤波器解调器的解。本文还探讨了能够在该领域持续学习的增量学习技术。在已知标签领域的训练提供了对新条件的最大适应性,但已知符号的可用性可能有限。作为替代方案,我们考虑了熵正则化和伪标签的有效性,以使实验室训练的参考网络适应新的现场条件。在一个示例多径信道中对这些技术的仿真表明,在初始符号错误率高达20%的情况下,无监督自适应是成功的;在每包已知符号的一小部分情况下,半监督自适应是成功的,初始符号错误率高达40%。在这两种情况下,适应后的符号错误率都低于0.3%。
{"title":"A Noncoherent Incremental Learning Demodulator","authors":"P. Gorday, N. Erdöl, H. Zhuang","doi":"10.1109/UEMCON51285.2020.9298172","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298172","url":null,"abstract":"Incremental learning after deployment is one of several attractive capabilities that motivate the use of neural network demodulators. This paper presents a complex noncoherent neural network suitable for on-off key (OOK) demodulation. When trained in an AWGN channel, the demodulator learns a solution that outperforms the traditional noncoherent matched filter demodulator. The paper also explores incremental learning techniques that enable continued learning in the field. Training in the field with known labels provides maximum adaptability to new conditions, but the availability of known symbols maybe limited. As an alternative, we considered the effectiveness of entropy regularization and pseudo-labels to adapt a lab-trained reference network to new field conditions. Simulation of these techniques in an example multipath channel demonstrates successful unsupervised adaptation with initial symbol error rates up to 20% and successful semi-supervised adaptation with a small fraction of known symbols per packet and initial symbol error rates as high as 40%. In both cases, symbol error rates after adaptation are below 0.3%.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132576807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/uemcon51285.2020.9298121","DOIUrl":"https://doi.org/10.1109/uemcon51285.2020.9298121","url":null,"abstract":"","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133691131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Approach to Temporal Traffic-Aware Energy-Efficient Cellular Networks 基于机器学习的时变交通感知节能蜂窝网络
Aristide T.-J. Akem, Edwin Mugume
With the rapidly increasing demand for cellular network services, operators have responded by deploying more base stations (BSs) which have greatly increased the total energy consumption of cellular network infrastructure. In this paper, machine learning is used to exploit temporal variations in cellular network traffic. Four machine learning algorithms and one conventional time series forecasting method are used for traffic prediction and then compared. Results show that random forest regression performs best with a coefficient of determination of 0.82 on the whole dataset and 0.84 on data of isolated days of the week. Based on the predicted traffic, three sleep mode schemes are applied to a homogeneous network. Simulation results show that the strategic sleep mode scheme performs best with an 87.4% energy saving gain over the conventional scheme and a 32% percent energy saving gain over the random scheme for a given day. In addition, the strategic scheme achieves an hourly average power saving of 3,836 W per kilometer squared, which proves that machine learning traffic prediction-based sleep modes are instrumental in achieving energy-efficient cellular networks.
随着蜂窝网络服务需求的迅速增长,运营商纷纷部署更多的基站,这大大增加了蜂窝网络基础设施的总能耗。在本文中,机器学习被用于利用蜂窝网络流量的时间变化。采用四种机器学习算法和一种传统的时间序列预测方法进行交通预测,并进行比较。结果表明,随机森林回归在整个数据集上的决定系数为0.82,在一周中孤立日的数据上的决定系数为0.84。根据预测的流量,在同构网络中应用了三种休眠模式方案。仿真结果表明,在给定的一天内,策略睡眠模式方案比常规方案节能87.4%,比随机方案节能32%。此外,该战略方案实现了每平方公里3,836瓦的小时平均节电,这证明了基于机器学习流量预测的睡眠模式有助于实现节能的蜂窝网络。
{"title":"A Machine Learning Approach to Temporal Traffic-Aware Energy-Efficient Cellular Networks","authors":"Aristide T.-J. Akem, Edwin Mugume","doi":"10.1109/UEMCON51285.2020.9298085","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298085","url":null,"abstract":"With the rapidly increasing demand for cellular network services, operators have responded by deploying more base stations (BSs) which have greatly increased the total energy consumption of cellular network infrastructure. In this paper, machine learning is used to exploit temporal variations in cellular network traffic. Four machine learning algorithms and one conventional time series forecasting method are used for traffic prediction and then compared. Results show that random forest regression performs best with a coefficient of determination of 0.82 on the whole dataset and 0.84 on data of isolated days of the week. Based on the predicted traffic, three sleep mode schemes are applied to a homogeneous network. Simulation results show that the strategic sleep mode scheme performs best with an 87.4% energy saving gain over the conventional scheme and a 32% percent energy saving gain over the random scheme for a given day. In addition, the strategic scheme achieves an hourly average power saving of 3,836 W per kilometer squared, which proves that machine learning traffic prediction-based sleep modes are instrumental in achieving energy-efficient cellular networks.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133747337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pulse Separation Using Independent Component Analysis 利用独立分量分析进行脉冲分离
Jaron Lin, Jordan Juliano, Alex Erdogan, K. George
This paper intends to demonstrate pulse separation using independent component analysis (ICA). Independent component analysis is related to the blind source separation (BSS) problem when independent components or the original signals are unknown or blind. BSS is explained by the cocktail party problem where groups of people have separate conversations at a cocktail party, and an individual is selectively extracting a conversation from a mix of conversations. The blind source separation problem is like deinterleaving signals. When a radar receiver intercepts multiple signals, the signals go through interleaving, where the waveforms mix with each other. The process of separating the mixed signals is called deinterleaving. In the radar system, finding the pulse descriptor word (PDW) is essential for deinterleaving because the parameters from PDW will help reconstruct the received radar signals. The radar will process the parameters from the PDW to construct pulse trains to help identify all the source signals that were detected by the radar receiver. Independent component analysis is a method to identify all the source signals received by the receiver.
本文试图用独立分量分析(ICA)来演示脉冲分离。独立分量分析涉及到独立分量或原始信号未知或盲的情况下的盲源分离问题。BSS可以用鸡尾酒会问题来解释,在鸡尾酒会上,一群人进行单独的谈话,而个人则有选择地从各种谈话中提取谈话。盲源分离问题类似于交叉信号的分离。当雷达接收器截获多个信号时,信号会经过交错,波形会相互混合。分离混合信号的过程称为去交织。在雷达系统中,寻找脉冲描述词(PDW)是去交错的关键,因为PDW中的参数将有助于重建接收到的雷达信号。雷达将处理来自PDW的参数来构建脉冲序列,以帮助识别雷达接收器检测到的所有源信号。独立分量分析是一种识别接收机接收到的所有源信号的方法。
{"title":"Pulse Separation Using Independent Component Analysis","authors":"Jaron Lin, Jordan Juliano, Alex Erdogan, K. George","doi":"10.1109/UEMCON51285.2020.9298098","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298098","url":null,"abstract":"This paper intends to demonstrate pulse separation using independent component analysis (ICA). Independent component analysis is related to the blind source separation (BSS) problem when independent components or the original signals are unknown or blind. BSS is explained by the cocktail party problem where groups of people have separate conversations at a cocktail party, and an individual is selectively extracting a conversation from a mix of conversations. The blind source separation problem is like deinterleaving signals. When a radar receiver intercepts multiple signals, the signals go through interleaving, where the waveforms mix with each other. The process of separating the mixed signals is called deinterleaving. In the radar system, finding the pulse descriptor word (PDW) is essential for deinterleaving because the parameters from PDW will help reconstruct the received radar signals. The radar will process the parameters from the PDW to construct pulse trains to help identify all the source signals that were detected by the radar receiver. Independent component analysis is a method to identify all the source signals received by the receiver.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123056562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coronavirus Outburst Prediction in India using SEIRD, Logistic Regression and ARIMA Model 基于SEIRD、Logistic回归和ARIMA模型的印度冠状病毒爆发预测
Narayana Darapaneni, D. Nikam, Anagha Lomate, Vaibhav Kherde, Swanand Katdare, A. Paduri, Kameswara Rao, Anima Shukla
The COVID-19 (SARS-CoV-2) pandemic is a major global health threat. According to the World Health Organization (WHO) COVID-19 situation report as on June 13, 2020, a total of 7,553,182 confirmed cases and 423,349 deaths have been reported across the world. Total confirmed cases in India as on 30th March’20 is 1071 of which 942 are active COVID-19 cases. There have been 29 death cases. Methods: We had used the mathematical model which monitors the five compartments namely, Susceptible, Exposed, Infected, Recovered and Deaths, collectively expressed as SEIRD to derive the epidemic curve on India and top two most affected states (Maharashtra and Delhi). We also used ARIMA and Logistic Regression model on India data set and two states to p confirmed cases and calculated R-Squared value. Results: As per the model, the growth rate is 4.25, India is likely to reach a peak by August, showing a gradual decrease by end of October or Mid November. Conclusion: Our SEIRD model was good in foreseeing the number of confirmed cases of COVID-19 for the upcoming days, we additionally reproduced the spread of disease in India for next 100 days by utilizing SEIRD model and anticipating the quantity of affirmed cases for next 14 days through ARIMA and Logistic Regression.
COVID-19 (SARS-CoV-2)大流行是一个重大的全球健康威胁。根据世界卫生组织(世卫组织)截至2020年6月13日的新冠肺炎疫情报告,全球共报告确诊病例7553182例,死亡病例423349例。截至2020年3月30日,印度确诊病例总数为1071例,其中942例为活动性COVID-19病例。已有29人死亡。方法:采用数学模型对易感、暴露、感染、恢复和死亡5个区室进行监测,并将其共同表示为SEIRD,推导出印度和前两个受影响最严重的邦(马哈拉施特拉邦和德里)的流行曲线。我们还使用ARIMA和Logistic回归模型对印度数据集和两个邦的p例确诊病例进行分析,并计算r平方值。结果:根据模型,增长率为4.25,印度可能在8月份达到峰值,在10月底或11月中旬逐渐下降。结论:我们的SEIRD模型可以很好地预测未来几天的COVID-19确诊病例数量,我们还利用SEIRD模型再现了未来100天印度的疾病传播,并通过ARIMA和Logistic回归预测了未来14天的确诊病例数量。
{"title":"Coronavirus Outburst Prediction in India using SEIRD, Logistic Regression and ARIMA Model","authors":"Narayana Darapaneni, D. Nikam, Anagha Lomate, Vaibhav Kherde, Swanand Katdare, A. Paduri, Kameswara Rao, Anima Shukla","doi":"10.1109/UEMCON51285.2020.9298097","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298097","url":null,"abstract":"The COVID-19 (SARS-CoV-2) pandemic is a major global health threat. According to the World Health Organization (WHO) COVID-19 situation report as on June 13, 2020, a total of 7,553,182 confirmed cases and 423,349 deaths have been reported across the world. Total confirmed cases in India as on 30th March’20 is 1071 of which 942 are active COVID-19 cases. There have been 29 death cases. Methods: We had used the mathematical model which monitors the five compartments namely, Susceptible, Exposed, Infected, Recovered and Deaths, collectively expressed as SEIRD to derive the epidemic curve on India and top two most affected states (Maharashtra and Delhi). We also used ARIMA and Logistic Regression model on India data set and two states to p confirmed cases and calculated R-Squared value. Results: As per the model, the growth rate is 4.25, India is likely to reach a peak by August, showing a gradual decrease by end of October or Mid November. Conclusion: Our SEIRD model was good in foreseeing the number of confirmed cases of COVID-19 for the upcoming days, we additionally reproduced the spread of disease in India for next 100 days by utilizing SEIRD model and anticipating the quantity of affirmed cases for next 14 days through ARIMA and Logistic Regression.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125348632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Adversarial Networks in Security: A Survey 安全中的生成对抗网络:综述
I. Dutta, Bhaskar Ghosh, Albert H Carlson, Michael W. Totaro, M. Bayoumi
In the Information Age, the majority of data stored and transferred is digital; however, current security systems are not powerful enough to secure this data because they do not anticipate unknown attacks. With a growing number of attacks on cybersecurity systems defense mechanisms need to stay updated with the evolving threats. Security and their related attacks are an iterative pair of objects that learn to enhance themselves based upon each others’ advances – a cybersecurity "arms race." In this survey, we focus on the various ways in which Generative Adversarial Networks (GANs) have been used to provide both security advances and attack scenarios in order to bypass detection systems. The aim of our survey is to examine works completed in the area of GANs, specifically device and network security. This paper also discusses new challenges for intrusion detection systems that have been generated using GANs. Considering the promising results that have been achieved in different GAN applications, it is very likely that GANs can shape security advances if applied to cybersecurity.
在信息时代,存储和传输的大部分数据都是数字化的;然而,目前的安全系统还不足以保护这些数据,因为它们无法预测未知的攻击。随着对网络安全系统的攻击越来越多,防御机制需要跟上不断变化的威胁。安全和相关的攻击是一对迭代的对象,它们在彼此的进步基础上学习增强自己——一场网络安全“军备竞赛”。在本调查中,我们重点关注生成对抗网络(gan)用于提供安全进步和攻击场景以绕过检测系统的各种方式。我们调查的目的是检查在gan领域完成的工作,特别是设备和网络安全。本文还讨论了使用gan生成的入侵检测系统所面临的新挑战。考虑到在不同GAN应用中取得的有希望的结果,如果应用于网络安全,GAN很可能会塑造安全进步。
{"title":"Generative Adversarial Networks in Security: A Survey","authors":"I. Dutta, Bhaskar Ghosh, Albert H Carlson, Michael W. Totaro, M. Bayoumi","doi":"10.1109/UEMCON51285.2020.9298135","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298135","url":null,"abstract":"In the Information Age, the majority of data stored and transferred is digital; however, current security systems are not powerful enough to secure this data because they do not anticipate unknown attacks. With a growing number of attacks on cybersecurity systems defense mechanisms need to stay updated with the evolving threats. Security and their related attacks are an iterative pair of objects that learn to enhance themselves based upon each others’ advances – a cybersecurity \"arms race.\" In this survey, we focus on the various ways in which Generative Adversarial Networks (GANs) have been used to provide both security advances and attack scenarios in order to bypass detection systems. The aim of our survey is to examine works completed in the area of GANs, specifically device and network security. This paper also discusses new challenges for intrusion detection systems that have been generated using GANs. Considering the promising results that have been achieved in different GAN applications, it is very likely that GANs can shape security advances if applied to cybersecurity.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multi-level Random Sample Consensus Method for Improving Structured Light Vision Systems 改进结构光视觉系统的多级随机样本一致性方法
Zhankun Luo, Yaan Zhang, Li Tan
The paper proposes a structured light vision system equipped with multi-cameras and multi-laser emitters for object height measurement or 3D reconstruction. The proposed method offers a better accuracy performance over a single camera system. To tackle the intersections produced by laser emitters in the projected image plane, we propose a multi-level random sample consensus (MLRANSAC) algorithm to separate the intersection points instead of using the traditional methods such as time division and color division techniques. Our experiments demonstrate that the MLRANSAC algorithm can perform effectively.
本文提出了一种由多摄像机和多激光发射器组成的用于物体高度测量或三维重建的结构光视觉系统。该方法比单相机系统具有更好的精度性能。为了解决激光发射器在投影图像平面上产生的相交点问题,我们提出了一种多层随机样本一致性(MLRANSAC)算法来分离相交点,而不是使用传统的时间分割和颜色分割技术。实验结果表明,MLRANSAC算法是有效的。
{"title":"Multi-level Random Sample Consensus Method for Improving Structured Light Vision Systems","authors":"Zhankun Luo, Yaan Zhang, Li Tan","doi":"10.1109/UEMCON51285.2020.9298161","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298161","url":null,"abstract":"The paper proposes a structured light vision system equipped with multi-cameras and multi-laser emitters for object height measurement or 3D reconstruction. The proposed method offers a better accuracy performance over a single camera system. To tackle the intersections produced by laser emitters in the projected image plane, we propose a multi-level random sample consensus (MLRANSAC) algorithm to separate the intersection points instead of using the traditional methods such as time division and color division techniques. Our experiments demonstrate that the MLRANSAC algorithm can perform effectively.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1