首页 > 最新文献

2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Central versus Distributed Statistical Computing Algorithms-A Comparison 中央与分布式统计计算算法的比较
N. Madathil, S. Harous
Distributed statistical learning algorithms are performing many machine learning tasks in a distributed environment. Some scenarios where data sharing is desired among many parties and it may need to increase the efficiency and statistical accuracy of the underlying algorithms. Due to the increase in the size and complexity of today’s big data, it is very important to solve problems with a very large number of features, records, and training samples. As a result, it is necessary to deal with the distributed transfer of these datasets as well as their underlying distributed solution methods efficiently and effectively. This paper compares the efficiency and accuracy of a distributed statistical method with a central method with simple regression and classification algorithms.
分布式统计学习算法在分布式环境中执行许多机器学习任务。在某些场景中,需要在多方之间进行数据共享,并且可能需要提高底层算法的效率和统计准确性。由于当今大数据的规模和复杂性的增加,解决具有非常大量的特征、记录和训练样本的问题非常重要。因此,有必要高效地处理这些数据集的分布式传输及其底层的分布式求解方法。本文比较了分布式统计方法与具有简单回归和分类算法的中心方法的效率和准确性。
{"title":"Central versus Distributed Statistical Computing Algorithms-A Comparison","authors":"N. Madathil, S. Harous","doi":"10.1109/UEMCON51285.2020.9298174","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298174","url":null,"abstract":"Distributed statistical learning algorithms are performing many machine learning tasks in a distributed environment. Some scenarios where data sharing is desired among many parties and it may need to increase the efficiency and statistical accuracy of the underlying algorithms. Due to the increase in the size and complexity of today’s big data, it is very important to solve problems with a very large number of features, records, and training samples. As a result, it is necessary to deal with the distributed transfer of these datasets as well as their underlying distributed solution methods efficiently and effectively. This paper compares the efficiency and accuracy of a distributed statistical method with a central method with simple regression and classification algorithms.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ADCR: An Adaptive TOOL to select ”Appropriate Developer for Code Review” based on Code Context ADCR:基于代码上下文选择“合适的代码审查开发人员”的自适应工具
Nafiz Sadman, M. Ahsan, M. Mahmud
Code review is one of the crucial steps in the software development process. Despite having many experts, assigning the appropriate one is often challenging, time-consuming, and inefficient for industrial developers and researchers who demand instant solutions. An automated code review system can serve as a proficient and alternative opportunity for those necessities. This paper aims to identify appropriate reviewers for a selected task based on data analysis using Natural Language Processing (NLP) techniques. Appropriate Developer for Code Review (ADCR) is proposed taking into account a set of data that comprises reviewers’ information—responsiveness, experience, and acquaintanceship—benefits of the proposed methods including unbiased review accountability and the early feed-back opportunity for the developers. Additionally, a tool is developed to process the automated review and speed up the development cycles.
代码审查是软件开发过程中的关键步骤之一。尽管有许多专家,但对于需要即时解决方案的工业开发人员和研究人员来说,分配合适的专家通常具有挑战性,耗时且效率低下。一个自动化的代码审查系统可以作为一个熟练的替代机会来满足这些需求。本文旨在通过使用自然语言处理(NLP)技术进行数据分析,为选定的任务确定合适的审稿人。适当的代码审查开发人员(ADCR)被提议考虑一组数据,这些数据包括审查人员的信息——响应性、经验和熟悉程度——被提议的方法的好处,包括对开发人员的无偏见的审查责任和早期反馈机会。此外,还开发了一个工具来处理自动审查并加快开发周期。
{"title":"ADCR: An Adaptive TOOL to select ”Appropriate Developer for Code Review” based on Code Context","authors":"Nafiz Sadman, M. Ahsan, M. Mahmud","doi":"10.1109/UEMCON51285.2020.9298102","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298102","url":null,"abstract":"Code review is one of the crucial steps in the software development process. Despite having many experts, assigning the appropriate one is often challenging, time-consuming, and inefficient for industrial developers and researchers who demand instant solutions. An automated code review system can serve as a proficient and alternative opportunity for those necessities. This paper aims to identify appropriate reviewers for a selected task based on data analysis using Natural Language Processing (NLP) techniques. Appropriate Developer for Code Review (ADCR) is proposed taking into account a set of data that comprises reviewers’ information—responsiveness, experience, and acquaintanceship—benefits of the proposed methods including unbiased review accountability and the early feed-back opportunity for the developers. Additionally, a tool is developed to process the automated review and speed up the development cycles.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123107528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Latent Walking Techniques for Conditioning GAN-Generated Music 调节gan生成音乐的潜在行走技术
Logan Eisenbeiser
Artificial music generation is a rapidly developing field focused on the complex task of creating neural networks that can produce realistic-sounding music. As computer-generated music improves in quality, it has potential to revolutionize the multi-billion dollar music industry by providing additional tools to musicians as well as creating new music for consumers. Beyond simply generating music lies the challenge of controlling or conditioning that generation. Conditional generation can be used to specify a tempo for the generated song, increase the density of notes, or even change the genre. Latent walking is one of the most popular techniques for conditional image generation, but its effectiveness on music-domain generation is largely unexplored, especially for generative adversarial networks (GANs). In this paper, latent walking is implemented with the MuseGAN generator to successfully control two semantic values: note count and polyphonicity (when more than one note is played at a time). This shows that latent walking is a viable technique for GANs in the music domain and can be used to improve the quality, among other features, of the generated music.
人工音乐生成是一个快速发展的领域,专注于创建能够产生逼真音乐的神经网络的复杂任务。随着电脑生成音乐质量的提高,它有可能为音乐家提供额外的工具,并为消费者创造新的音乐,从而彻底改变价值数十亿美元的音乐产业。除了简单地生成音乐之外,还存在着控制或调节生成的挑战。条件生成可以用来为生成的歌曲指定节奏,增加音符的密度,甚至改变类型。隐行走是条件图像生成中最流行的技术之一,但其在音乐域生成中的有效性在很大程度上尚未得到探索,特别是在生成对抗网络(gan)中。在本文中,使用MuseGAN生成器实现了潜在行走,以成功地控制两个语义值:音符计数和多音性(当一次播放多个音符时)。这表明潜伏行走是gan在音乐领域的一种可行技术,可以用来提高生成音乐的质量和其他特征。
{"title":"Latent Walking Techniques for Conditioning GAN-Generated Music","authors":"Logan Eisenbeiser","doi":"10.1109/UEMCON51285.2020.9298149","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298149","url":null,"abstract":"Artificial music generation is a rapidly developing field focused on the complex task of creating neural networks that can produce realistic-sounding music. As computer-generated music improves in quality, it has potential to revolutionize the multi-billion dollar music industry by providing additional tools to musicians as well as creating new music for consumers. Beyond simply generating music lies the challenge of controlling or conditioning that generation. Conditional generation can be used to specify a tempo for the generated song, increase the density of notes, or even change the genre. Latent walking is one of the most popular techniques for conditional image generation, but its effectiveness on music-domain generation is largely unexplored, especially for generative adversarial networks (GANs). In this paper, latent walking is implemented with the MuseGAN generator to successfully control two semantic values: note count and polyphonicity (when more than one note is played at a time). This shows that latent walking is a viable technique for GANs in the music domain and can be used to improve the quality, among other features, of the generated music.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127050238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Numerical Question Answering on Table using BERT-GNN 基于BERT-GNN的表格自动数值答题
Ruchi Bagwe, K. George
The table base numerical question-answering task requires a mechanism to understand the relation between table content and numbers (present in table and question). It also needs an efficient method to address complex reasoning on table context. Most of the existing approaches in the natural language processing technology address the context-based questions on the table but fail to address the numerical reasoning part. They are also built on a large search database, which makes it challenging to use them in multiple domains. These approaches use pre-trained models like BERT to perform context encoding of a complete table. Hence these models fail when a large table is provided as input, as full table encoding is a very resource and time-consuming task. In this paper, a framework is proposed to answer questions on the table with numerical reasoning. This framework uses a context-snapshot mechanism to filter irrelevant table rows before tokenizing the table content. The filtered context and tokenized question are converted into vector representation using a pre-trained BERT model. This proposed model finds the correlation between the tokenized context-snapshot and numbers in question using graph neural networks. Further, it uses a feed-forward neural network to perform the numerical operation to compute the answer. The model is trained and evaluated on WikiTableQuestions datasets, shows a promising result.
基于表的数字问答任务需要一种机制来理解表内容和数字(出现在表和问题中)之间的关系。它还需要一种有效的方法来处理表上下文的复杂推理。在自然语言处理技术中,现有的大多数方法都解决了基于上下文的表格问题,但未能解决数字推理部分。它们还建立在一个大型搜索数据库上,这使得在多个领域使用它们具有挑战性。这些方法使用BERT等预训练模型来执行完整表的上下文编码。因此,当提供一个大表作为输入时,这些模型会失败,因为全表编码是一项非常耗费资源和时间的任务。本文提出了一个用数值推理来回答表格上的问题的框架。该框架使用上下文快照机制在对表内容进行标记之前过滤不相关的表行。过滤后的上下文和标记化的问题使用预训练的BERT模型转换为向量表示。该模型使用图神经网络发现标记化的上下文快照与有问题的数字之间的相关性。此外,它使用前馈神经网络执行数值运算来计算答案。该模型在WikiTableQuestions数据集上进行了训练和评估,显示出良好的结果。
{"title":"Automatic Numerical Question Answering on Table using BERT-GNN","authors":"Ruchi Bagwe, K. George","doi":"10.1109/UEMCON51285.2020.9298028","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298028","url":null,"abstract":"The table base numerical question-answering task requires a mechanism to understand the relation between table content and numbers (present in table and question). It also needs an efficient method to address complex reasoning on table context. Most of the existing approaches in the natural language processing technology address the context-based questions on the table but fail to address the numerical reasoning part. They are also built on a large search database, which makes it challenging to use them in multiple domains. These approaches use pre-trained models like BERT to perform context encoding of a complete table. Hence these models fail when a large table is provided as input, as full table encoding is a very resource and time-consuming task. In this paper, a framework is proposed to answer questions on the table with numerical reasoning. This framework uses a context-snapshot mechanism to filter irrelevant table rows before tokenizing the table content. The filtered context and tokenized question are converted into vector representation using a pre-trained BERT model. This proposed model finds the correlation between the tokenized context-snapshot and numbers in question using graph neural networks. Further, it uses a feed-forward neural network to perform the numerical operation to compute the answer. The model is trained and evaluated on WikiTableQuestions datasets, shows a promising result.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132803272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EMG-based Hand Gesture Recognition by Deep Time-frequency Learning for Assisted Living & Rehabilitation 基于肌电图的深度时频学习手势识别在辅助生活与康复中的应用
Qi Wang, Xianping Wang
As a user-friendly human-computer interaction approach, EMG is regarded as one of the most promising modalities for hand gesture recognition. Though EMG-based hand gesture recognition has been advanced in recent years, to effective detect the patterns from the noisy EMG signal, more advanced algorithms are still highly necessary. Convolutional neural network (CNN) is a popular deep learning algorithm and its unique architecture has gained a great success in the image processing area. In this study, we propose a new deep learning framework for hand gesture recognition from the multi-session EMG signal. In the data representation stage, we also transform the time domain EMG signal to the time-frequency domain by short-term Fourier transform (STFT) to get more time-varying frequency characteristics. Our experiment shows that the proposed framework can effectively detect hand gestures from the multi-session EMG data. This work will greatly advance the hand gesture recognition.
肌电图作为一种用户友好的人机交互方法,被认为是最有前途的手势识别方法之一。虽然近年来基于肌电图的手势识别已经取得了一定的进展,但要想从含噪的肌电图信号中有效地检测出手势的模式,还需要更先进的算法。卷积神经网络(CNN)是一种流行的深度学习算法,其独特的架构在图像处理领域取得了巨大的成功。在这项研究中,我们提出了一个新的深度学习框架,用于从多会话肌电信号中识别手势。在数据表示阶段,我们还通过短时傅里叶变换(STFT)将肌电信号的时域转换为时频域,以获得更多的时变频率特征。实验表明,该框架可以有效地从多会话肌电信号中检测手势。这项工作将极大地推动手势识别的发展。
{"title":"EMG-based Hand Gesture Recognition by Deep Time-frequency Learning for Assisted Living & Rehabilitation","authors":"Qi Wang, Xianping Wang","doi":"10.1109/UEMCON51285.2020.9298181","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298181","url":null,"abstract":"As a user-friendly human-computer interaction approach, EMG is regarded as one of the most promising modalities for hand gesture recognition. Though EMG-based hand gesture recognition has been advanced in recent years, to effective detect the patterns from the noisy EMG signal, more advanced algorithms are still highly necessary. Convolutional neural network (CNN) is a popular deep learning algorithm and its unique architecture has gained a great success in the image processing area. In this study, we propose a new deep learning framework for hand gesture recognition from the multi-session EMG signal. In the data representation stage, we also transform the time domain EMG signal to the time-frequency domain by short-term Fourier transform (STFT) to get more time-varying frequency characteristics. Our experiment shows that the proposed framework can effectively detect hand gestures from the multi-session EMG data. This work will greatly advance the hand gesture recognition.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"74 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114013174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Facial Expression Recognition and Recommendations Using Deep Neural Network with Transfer Learning 基于迁移学习的深度神经网络面部表情识别与推荐
Narayana Darapaneni, Rahul Choubey, Pratik Salvi, Ankur Pathak, Sajal Suryavanshi, A. Paduri
This study is an attempt to understand and address the mental health issue, of working professionals through facial expression recognition. As a society, we are all currently talking about ways as to how a person who is suffering from any emotional issue can adopt certain ways to come out of a specific circumstance and how we as a society can support such people in these situations.Our endeavor is to work on a way where the identification of such persons who are going through a difficult phase in their life can be performed. It is not always evident that a person going through a tough phase may open up about their feelings to people around them and hence making use of AI/ML to identify a person’s emotion through their facial expressions captured over a span of time thereby recommending them some activities, thoughts which can help them in getting over their emotions when they are sad, fearful or else will address the problem to some extent.
本研究试图通过面部表情识别来了解和解决职业人士的心理健康问题。作为一个社会,我们现在都在谈论一个遭受任何情感问题的人如何采取某种方式走出特定的环境,以及我们作为一个社会如何在这些情况下支持这些人。我们的努力是找到一种方法,可以识别出这些正在经历生命中困难阶段的人。并不总是很明显,一个经历艰难阶段的人可能会向周围的人敞开心扉,因此利用AI/ML通过一段时间内捕捉到的面部表情来识别一个人的情绪,从而向他们推荐一些活动和想法,这些活动和想法可以帮助他们在悲伤、恐惧或其他程度上解决问题时克服情绪。
{"title":"Facial Expression Recognition and Recommendations Using Deep Neural Network with Transfer Learning","authors":"Narayana Darapaneni, Rahul Choubey, Pratik Salvi, Ankur Pathak, Sajal Suryavanshi, A. Paduri","doi":"10.1109/UEMCON51285.2020.9298082","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298082","url":null,"abstract":"This study is an attempt to understand and address the mental health issue, of working professionals through facial expression recognition. As a society, we are all currently talking about ways as to how a person who is suffering from any emotional issue can adopt certain ways to come out of a specific circumstance and how we as a society can support such people in these situations.Our endeavor is to work on a way where the identification of such persons who are going through a difficult phase in their life can be performed. It is not always evident that a person going through a tough phase may open up about their feelings to people around them and hence making use of AI/ML to identify a person’s emotion through their facial expressions captured over a span of time thereby recommending them some activities, thoughts which can help them in getting over their emotions when they are sad, fearful or else will address the problem to some extent.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131863336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Attractor with Convolutional Network for Monaural Speech Separation 基于卷积网络的单耳语音分离深度吸引子
Tian Lan, Yuxin Qian, Wenxin Tai, Boce Chu, Qiao Liu
Deep attractor network (DANet) is a recent deep learning-based method for monaural speech separation. The idea is to map the time-frequency bins from the spectrogram to the embedding space and form attractors for each source to estimate masks. The original deep attractor network uses true assignments of speaker to form attractors during training, but K-means algorithm or fixed attractor method is used during the test phase to estimate attractors. The fixed attractor method does not perform well when training and test condition is different. Using K-means algorithm during test raises a center mismatch problem, which leads to performance degradation. In this letter, we propose to use convolutional networks for estimating attractors in the training and test phases. By using the same method to generate attractors, the center mismatch problem is solved. Results revealed that the proposed method achieves better performance than DANet using K-means method and gets comparable performance with DANet using ideal binary mask during test with limited training data.
深度吸引子网络(DANet)是一种基于深度学习的单耳语音分离方法。其思想是将谱图中的时频箱映射到嵌入空间,并为每个源形成吸引子来估计掩模。原始的深度吸引器网络在训练阶段使用说话人的真实分配来形成吸引器,而在测试阶段使用K-means算法或固定吸引器方法来估计吸引器。在训练和测试条件不同的情况下,固定吸引器法的效果不佳。在测试过程中使用K-means算法会产生中心不匹配问题,从而导致性能下降。在这封信中,我们建议在训练和测试阶段使用卷积网络来估计吸引子。采用相同的方法生成吸引子,解决了中心不匹配问题。结果表明,在训练数据有限的情况下,该方法的性能优于使用K-means方法的DANet,与使用理想二值掩码的DANet性能相当。
{"title":"Deep Attractor with Convolutional Network for Monaural Speech Separation","authors":"Tian Lan, Yuxin Qian, Wenxin Tai, Boce Chu, Qiao Liu","doi":"10.1109/UEMCON51285.2020.9298070","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298070","url":null,"abstract":"Deep attractor network (DANet) is a recent deep learning-based method for monaural speech separation. The idea is to map the time-frequency bins from the spectrogram to the embedding space and form attractors for each source to estimate masks. The original deep attractor network uses true assignments of speaker to form attractors during training, but K-means algorithm or fixed attractor method is used during the test phase to estimate attractors. The fixed attractor method does not perform well when training and test condition is different. Using K-means algorithm during test raises a center mismatch problem, which leads to performance degradation. In this letter, we propose to use convolutional networks for estimating attractors in the training and test phases. By using the same method to generate attractors, the center mismatch problem is solved. Results revealed that the proposed method achieves better performance than DANet using K-means method and gets comparable performance with DANet using ideal binary mask during test with limited training data.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing 基于图像秘密共享的增强视觉密码安全体系结构
Manas Abhilash Gundapuneni, Anzum Bano, Navjot Singh
This paper provides an approach to a new encryption architecture using double layer encryption standards for the existing secret sharing methodology. The image encryption standard in this scheme deals with both gray scale and color images and provides the experimental results. The paper deals with the transmission of multimedia such as images over insecure and secure networks, secret sharing helps to mask the image from the attacker by breaking it down to shares which are not at all related in the sense of content to the original image and provide the security of only reconstructing the original image when the client has all the shares.
本文针对现有的秘密共享方法,提出了一种采用双层加密标准的新加密体系结构。该方案的图像加密标准同时适用于灰度和彩色图像,并给出了实验结果。本文研究了图像等多媒体在不安全和安全网络上的传输,秘密共享通过将图像分解为与原始图像在内容意义上完全不相关的共享来屏蔽攻击者,并提供了当客户端拥有所有共享时仅重建原始图像的安全性。
{"title":"Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing","authors":"Manas Abhilash Gundapuneni, Anzum Bano, Navjot Singh","doi":"10.1109/UEMCON51285.2020.9298166","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298166","url":null,"abstract":"This paper provides an approach to a new encryption architecture using double layer encryption standards for the existing secret sharing methodology. The image encryption standard in this scheme deals with both gray scale and color images and provides the experimental results. The paper deals with the transmission of multimedia such as images over insecure and secure networks, secret sharing helps to mask the image from the attacker by breaking it down to shares which are not at all related in the sense of content to the original image and provide the security of only reconstructing the original image when the client has all the shares.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"211 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133878045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly Detection and Identification Using Visual Techniques in Streaming Video 基于视觉技术的流媒体视频异常检测与识别
T. A. Wanigaaratchi, V. T. N. Vidanagama
there are many intelligent systems and tools which uses highly efficient processing models to identify different anomalies with high accuracy. The anomaly detection is of high importance and mostly will come as an absolute requirement at high risk environments and situations. The amount of processing involved in quick decision taking systems bare high deployment costs which restricts the anomaly detection only to a selected few who are capable of building such resource centered systems. Modern world uses drones and other video feeds in order to find and keep track of any anomalous events around a specific area. But most such detection requires absolute manual attention as well as processing power to keep up with real time detection and recognition. The proposed research solution aims to automate this process and includes a two-step anomaly detection system which gives a quicker anomaly detection in an average processing unit time with an advanced recognition model with up to 90% accuracy. The deep learning model (VGG 16) together with alert system and comparison techniques on videos leads into unsupervised anomaly detection of a landscape. The system generates alerts and recognizes anomalies on the alerted video frames. The proposed solution can also be used by any source and does not require high capacity of capability system to get the optimal output. Moreover, the solution brings a simple yet sophisticated technique to address modern anomaly detection and quick alerting system.
有许多智能系统和工具使用高效的处理模型来高精度地识别不同的异常。异常检测非常重要,在高风险的环境和情况下,异常检测是一项绝对的要求。快速决策系统中涉及的处理量暴露了高昂的部署成本,这限制了异常检测,只有少数有能力构建这种资源中心系统的人才能进行异常检测。现代世界使用无人机和其他视频馈送来发现和跟踪特定区域周围的任何异常事件。但大多数这样的检测需要绝对的人工注意力和处理能力来跟上实时检测和识别。提出的研究解决方案旨在使这一过程自动化,并包括一个两步异常检测系统,该系统在平均处理单位时间内提供更快的异常检测,并具有高达90%准确率的先进识别模型。深度学习模型(VGG 16)与视频警报系统和比较技术一起实现了景观的无监督异常检测。系统产生警报并识别警报视频帧上的异常。该方案可用于任意源,且不需要高容量系统就能获得最优输出。此外,该方案为现代异常检测和快速报警系统提供了一种简单而复杂的技术。
{"title":"Anomaly Detection and Identification Using Visual Techniques in Streaming Video","authors":"T. A. Wanigaaratchi, V. T. N. Vidanagama","doi":"10.1109/UEMCON51285.2020.9298178","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298178","url":null,"abstract":"there are many intelligent systems and tools which uses highly efficient processing models to identify different anomalies with high accuracy. The anomaly detection is of high importance and mostly will come as an absolute requirement at high risk environments and situations. The amount of processing involved in quick decision taking systems bare high deployment costs which restricts the anomaly detection only to a selected few who are capable of building such resource centered systems. Modern world uses drones and other video feeds in order to find and keep track of any anomalous events around a specific area. But most such detection requires absolute manual attention as well as processing power to keep up with real time detection and recognition. The proposed research solution aims to automate this process and includes a two-step anomaly detection system which gives a quicker anomaly detection in an average processing unit time with an advanced recognition model with up to 90% accuracy. The deep learning model (VGG 16) together with alert system and comparison techniques on videos leads into unsupervised anomaly detection of a landscape. The system generates alerts and recognizes anomalies on the alerted video frames. The proposed solution can also be used by any source and does not require high capacity of capability system to get the optimal output. Moreover, the solution brings a simple yet sophisticated technique to address modern anomaly detection and quick alerting system.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks 不同机器学习算法对物联网僵尸网络攻击多元分类的效率
Shreehar Joshi, Eman Abdelfattah
The Internet of Things, with its enormous growth in the recent decades, has not just brought convenience to the different aspects of our lives. It has also increased the risks of various forms of cybercriminal attacks, ranging from personal information theft to the disruption of the entire network of a service provider. As the demands of such devices increase rapidly on a global scale, it has become increasingly difficult for different corporations to focus on security efficiently. As such, the demand for methodologies that can aptly respond to prevent intrusion within a network has soared disturbingly. Various utilization of anomaly traffic detection techniques has been conducted in the past, all with the similar aim to prevent disruption in networks. This research aims to find an efficient classifier that detects anomaly traffic from N_BaIoT dataset with the highest overall precision and recall by experimenting with four machine learning techniques. Four binary classifiers: Decision Trees, Extra Trees Classifiers, Random Forests, and Support Vector Machines are tested and validated to produce the result. The outcome demonstrates that all the classifiers perform exceptionally well when used to train and test the anomaly within a single device. Moreover, Random Forests classifier outperforms all others when training is done on a particular device to test the anomaly on completely unrelated devices.
近几十年来,物联网的迅猛发展不仅为我们生活的各个方面带来了便利。它还增加了各种形式的网络犯罪攻击的风险,从个人信息盗窃到服务提供商的整个网络中断。随着此类设备在全球范围内的需求迅速增加,不同的企业越来越难以有效地关注安全问题。因此,对能够适当响应以防止网络入侵的方法的需求激增,这令人不安。过去已经进行了各种异常流量检测技术的应用,所有这些技术都具有类似的目的,以防止网络中断。本研究旨在通过实验四种机器学习技术,找到一种能够以最高的整体精度和召回率检测N_BaIoT数据集异常流量的高效分类器。四种二元分类器:决策树、额外树分类器、随机森林和支持向量机进行了测试和验证,以产生结果。结果表明,当用于训练和测试单个设备内的异常时,所有分类器都表现得非常好。此外,当在特定设备上进行训练以测试完全不相关设备上的异常时,随机森林分类器优于所有其他分类器。
{"title":"Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks","authors":"Shreehar Joshi, Eman Abdelfattah","doi":"10.1109/UEMCON51285.2020.9298095","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298095","url":null,"abstract":"The Internet of Things, with its enormous growth in the recent decades, has not just brought convenience to the different aspects of our lives. It has also increased the risks of various forms of cybercriminal attacks, ranging from personal information theft to the disruption of the entire network of a service provider. As the demands of such devices increase rapidly on a global scale, it has become increasingly difficult for different corporations to focus on security efficiently. As such, the demand for methodologies that can aptly respond to prevent intrusion within a network has soared disturbingly. Various utilization of anomaly traffic detection techniques has been conducted in the past, all with the similar aim to prevent disruption in networks. This research aims to find an efficient classifier that detects anomaly traffic from N_BaIoT dataset with the highest overall precision and recall by experimenting with four machine learning techniques. Four binary classifiers: Decision Trees, Extra Trees Classifiers, Random Forests, and Support Vector Machines are tested and validated to produce the result. The outcome demonstrates that all the classifiers perform exceptionally well when used to train and test the anomaly within a single device. Moreover, Random Forests classifier outperforms all others when training is done on a particular device to test the anomaly on completely unrelated devices.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125869362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1