首页 > 最新文献

2024 26th International Conference on Advanced Communications Technology (ICACT)最新文献

英文 中文
Time-frequency Analysis for Validating Prognostics Algorithms of Rolling Element Bearings 用于验证滚动体轴承诊断算法的时频分析
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10471976
Guanhua Zhu, Xiaoling Xu, Qing Zhong, Bing-Yuh Lu, Yushen Lu, Guangming Xu, Yumeng Zhou, Ziyi Jiang, Kai Sun, Minhao Wang
This study employed the time-frequency analysis to compute some of the XJTU-SY bearing datasets and aimed at the investigation of spectrogram of the raw data of the datasets. The methods of this study are divided into 4 parts: (1) spectrogram, (2) XJTU-SY bearing datasets, (3) equipment and, (4) 2D correlation. The results show the dominant reasons of malfunction of the machine occur in the duration of the 75th to 100th minutes. Both 2D correlation coefficients of the spectrograms of horizontal and vertical vibrations in the 100th and 123th minutes are larger than 0.8 because rotation of the roller entered a distinguished state of malfunction in the 100th minute. The inner damage is enhanced step by step. The interpretation of VEs and HEs is helpful to detect the fault diagnosis of the roller. The further studies will test more data, and add more algorithms for the accurate diagnosis.
本研究采用时频分析法计算了部分 XJTU-SY 轴承数据集,旨在研究数据集原始数据的频谱图。本研究的方法分为四个部分:(1)频谱图;(2)XJTU-SY 轴承数据集;(3)设备;(4)二维相关性。结果表明,机器故障的主要原因发生在第 75 分钟至第 100 分钟。第 100 分钟和第 123 分钟的水平振动和垂直振动频谱图的二维相关系数均大于 0.8,这是因为辊筒旋转在第 100 分钟进入了明显的故障状态。内部损坏逐步加剧。对 VE 和 HE 的解释有助于检测滚筒的故障诊断。进一步的研究将测试更多的数据,并增加更多的算法来进行精确诊断。
{"title":"Time-frequency Analysis for Validating Prognostics Algorithms of Rolling Element Bearings","authors":"Guanhua Zhu, Xiaoling Xu, Qing Zhong, Bing-Yuh Lu, Yushen Lu, Guangming Xu, Yumeng Zhou, Ziyi Jiang, Kai Sun, Minhao Wang","doi":"10.23919/ICACT60172.2024.10471976","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10471976","url":null,"abstract":"This study employed the time-frequency analysis to compute some of the XJTU-SY bearing datasets and aimed at the investigation of spectrogram of the raw data of the datasets. The methods of this study are divided into 4 parts: (1) spectrogram, (2) XJTU-SY bearing datasets, (3) equipment and, (4) 2D correlation. The results show the dominant reasons of malfunction of the machine occur in the duration of the 75th to 100th minutes. Both 2D correlation coefficients of the spectrograms of horizontal and vertical vibrations in the 100th and 123th minutes are larger than 0.8 because rotation of the roller entered a distinguished state of malfunction in the 100th minute. The inner damage is enhanced step by step. The interpretation of VEs and HEs is helpful to detect the fault diagnosis of the roller. The further studies will test more data, and add more algorithms for the accurate diagnosis.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"17 1","pages":"327-331"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Deep Learning for Automated Analysis of Colorectal Cancer Histology Images to Elevate Diagnosis Precision 利用深度学习自动分析结直肠癌组织学图像,提高诊断精准度
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10471943
Shah Muhammad Imtiyaj Uddin, Md Ariful Isalm Mojumder, Rashedul Islam Sumon, Joo Mon–il, Hee-Cheol Kim
Histopathology plays a vital role in the microscopic examination of colorectal cancer tissues, with a historical focus on the tumor-stroma ratio using texture analysis. However, due to the time-consuming and labor-intensive nature of this approach, there's a need for innovative solutions. This study introduces a groundbreaking shift by employing deep transfer learning to automate tissue classification within colorectal cancer histology samples. Through a comprehensive evaluation of various pre-trained models, including ResNet50V2, VGG19, Xception, InceptionV3, and MobileNet, we have achieved remarkable results. Notably, the ResNet50V2 model stands out with an impressive accuracy of 95%. Beyond its potential to significantly enhance operational responses, this research underscores the effectiveness and consistency of transfer learning as a rapid and efficient tool for colorectal cancer detection and classification.
组织病理学在结直肠癌组织的显微镜检查中起着至关重要的作用,其历史重点是利用纹理分析来确定肿瘤与基质的比例。然而,由于这种方法耗时耗力,因此需要创新的解决方案。本研究通过采用深度迁移学习来自动进行结直肠癌组织学样本中的组织分类,带来了突破性的转变。通过对各种预训练模型(包括 ResNet50V2、VGG19、Xception、InceptionV3 和 MobileNet)进行综合评估,我们取得了显著的成果。值得注意的是,ResNet50V2 模型的准确率高达 95%,令人印象深刻。除了能显著提高业务响应能力外,这项研究还强调了迁移学习作为结直肠癌检测和分类的快速高效工具的有效性和一致性。
{"title":"Leveraging Deep Learning for Automated Analysis of Colorectal Cancer Histology Images to Elevate Diagnosis Precision","authors":"Shah Muhammad Imtiyaj Uddin, Md Ariful Isalm Mojumder, Rashedul Islam Sumon, Joo Mon–il, Hee-Cheol Kim","doi":"10.23919/ICACT60172.2024.10471943","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10471943","url":null,"abstract":"Histopathology plays a vital role in the microscopic examination of colorectal cancer tissues, with a historical focus on the tumor-stroma ratio using texture analysis. However, due to the time-consuming and labor-intensive nature of this approach, there's a need for innovative solutions. This study introduces a groundbreaking shift by employing deep transfer learning to automate tissue classification within colorectal cancer histology samples. Through a comprehensive evaluation of various pre-trained models, including ResNet50V2, VGG19, Xception, InceptionV3, and MobileNet, we have achieved remarkable results. Notably, the ResNet50V2 model stands out with an impressive accuracy of 95%. Beyond its potential to significantly enhance operational responses, this research underscores the effectiveness and consistency of transfer learning as a rapid and efficient tool for colorectal cancer detection and classification.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"44 ","pages":"01-06"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Private Blockchain System based on Zero Trust Architecture 基于零信任架构的私有区块链系统
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10471993
Yao-Chung Chang, Yu-Shan Lin, Arun Kumar Sangaiahc, Hsin-Te Wu
During the outbreak of COVID-19, many enterprises massively created Virtual Private Networks (VPNs) for companies to cooperate; however, these accounts lacked efficient management after the epidemic, leading to data leakage or the suffering of malicious attacks. Consequently, several firms have started to build private blockchains for data preservation and verification. Private blockchains are usually built internally in companies; once a firm's internal network opens for massive external logins, many servers and private blockchains cannot work properly to protect data. In general, private blockchains store critical personal information or relevant confidential data; once a private blockchain opens to external access, all the information in the network nodes will be exposed, making private them lose their protection functions. This paper proposes a security mechanism using a private blockchain system based on zero trust architecture. The zero trust architecture tracks every user's network conditions and analyses whether their behaviors are authorized. Additionally, the system utilizes micro-segmentation to divide the private blockchain, preventing the system from malicious attacks. The proposed system employs user multi-factor authentication to identify users, and the zero trust architecture tracks and analyzes if users' behaviors are reasonable. This method effectively ensures corporate networks' security and enables private blockchain to filter legal and authorized users to access and verify.
在 COVID-19 爆发期间,许多企业大规模创建了虚拟专用网络(VPN)供企业合作使用,但这些账户在疫情过后缺乏有效管理,导致数据泄露或遭受恶意攻击。因此,一些企业开始建立私有区块链,用于数据保存和验证。私有区块链通常在公司内部建立;一旦公司内部网络开放供大量外部登录,许多服务器和私有区块链就无法正常工作,无法保护数据。一般来说,私有区块链存储的都是重要的个人信息或相关机密数据,一旦私有区块链对外开放,网络节点中的所有信息都将暴露,使私有区块链失去保护功能。本文提出了一种基于零信任架构的私有区块链系统安全机制。零信任架构跟踪每个用户的网络状况,分析其行为是否经过授权。此外,该系统还利用微分割技术划分私有区块链,防止系统受到恶意攻击。所提出的系统采用用户多因素身份验证来识别用户,零信任架构跟踪并分析用户行为是否合理。这种方法有效确保了企业网络的安全性,并使私有区块链能够过滤合法和授权用户进行访问和验证。
{"title":"A Private Blockchain System based on Zero Trust Architecture","authors":"Yao-Chung Chang, Yu-Shan Lin, Arun Kumar Sangaiahc, Hsin-Te Wu","doi":"10.23919/ICACT60172.2024.10471993","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10471993","url":null,"abstract":"During the outbreak of COVID-19, many enterprises massively created Virtual Private Networks (VPNs) for companies to cooperate; however, these accounts lacked efficient management after the epidemic, leading to data leakage or the suffering of malicious attacks. Consequently, several firms have started to build private blockchains for data preservation and verification. Private blockchains are usually built internally in companies; once a firm's internal network opens for massive external logins, many servers and private blockchains cannot work properly to protect data. In general, private blockchains store critical personal information or relevant confidential data; once a private blockchain opens to external access, all the information in the network nodes will be exposed, making private them lose their protection functions. This paper proposes a security mechanism using a private blockchain system based on zero trust architecture. The zero trust architecture tracks every user's network conditions and analyses whether their behaviors are authorized. Additionally, the system utilizes micro-segmentation to divide the private blockchain, preventing the system from malicious attacks. The proposed system employs user multi-factor authentication to identify users, and the zero trust architecture tracks and analyzes if users' behaviors are reasonable. This method effectively ensures corporate networks' security and enables private blockchain to filter legal and authorized users to access and verify.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"33 1","pages":"143-146"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Test Method for the Convergence of the Metaverse and Blockchain 元宇宙与区块链融合的测试方法
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10472002
Tae-Gyu Lee
This paper proposes an effective testing method combining blockchain and metaverse technologies. This research analyses the interaction between blockchain networks and virtual reality worlds, developing a secure and efficient testing process. The paper evaluates the interaction between metaverse and blockchain in various scenarios, offering insights to enhance reliability and security. This study makes a significant contribution to strengthening safety in the digital environment through the fusion of metaverse and blockchain technologies. This study proposes key evaluation factors and formulas to objectively assess the integration of blockchain and the metaverse services. These evaluation metrics can be valuable in the development of assessment tools and simulation instruments.
本文提出了一种结合区块链和元世界技术的有效测试方法。这项研究分析了区块链网络与虚拟现实世界之间的交互,开发了一种安全高效的测试流程。论文评估了元宇宙和区块链在各种场景中的交互,为提高可靠性和安全性提供了启示。本研究为通过融合元宇宙和区块链技术加强数字环境的安全性做出了重要贡献。本研究提出了关键的评估因素和公式,以客观评估区块链与元数据服务的融合。这些评估指标对开发评估工具和模拟工具很有价值。
{"title":"A Test Method for the Convergence of the Metaverse and Blockchain","authors":"Tae-Gyu Lee","doi":"10.23919/ICACT60172.2024.10472002","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10472002","url":null,"abstract":"This paper proposes an effective testing method combining blockchain and metaverse technologies. This research analyses the interaction between blockchain networks and virtual reality worlds, developing a secure and efficient testing process. The paper evaluates the interaction between metaverse and blockchain in various scenarios, offering insights to enhance reliability and security. This study makes a significant contribution to strengthening safety in the digital environment through the fusion of metaverse and blockchain technologies. This study proposes key evaluation factors and formulas to objectively assess the integration of blockchain and the metaverse services. These evaluation metrics can be valuable in the development of assessment tools and simulation instruments.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"16 9","pages":"321-326"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Machine Learning to Uncover Key Factors Influencing Satisfaction Among Free Tertiary Education Recipients in the Philippines 利用机器学习发现影响菲律宾免费高等教育接受者满意度的关键因素
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10472000
John Raymund B. Baragas, Lea D. Austero, J. Llovido, Lany L. Maceda, Mideth B. Abisado
In spite of the broad implementation of the Universal Access to Quality Tertiary Education Act (UAQTE) - a groundbreaking legislation benefitting over 2 million students since its enactment in 2017 - a comprehensive evaluation of its outcomes has been notably absent. To bridge this gap, an extensive survey was undertaken among graduating tertiary students in selected regions of the Philippines. This strategically designed survey aimed to pinpoint overlooked aspects of UAQTE and capture firsthand insights from its recipients. The methodology employed to create this survey included focus-group discussions with various stakeholders (i.e., students, parents, faculty) and a pilot test reflecting the target demographic. To facilitate analysis of the results of 1462 responses, five regression machine learning algorithms were then employed to analyze questionnaire data. The decision tree regressor with a root-mean-squared-error of 0.6881 was found to be the best performing model describing the collected questionnaire data. Shapley explanations of the best performing model highlighted the desire of the recipient to pursue international employment as the top predictor of satisfaction in UAQTE among its recipients. Furthermore, insights from employed topic modeling among the open-ended questions in the deployed survey suggested potential inadequacy of UAQTE subsidies, specifically to recipients whose pursued degrees are in the science, technology, engineering, and mathematics courses. This substantial finding promises valuable insights into the effectiveness of the legislation and may inform future policy adjustments to better address the diverse needs of tertiary education in the Philippines. Overall, this research provides a robust framework for assessing the impact of UAQTE and showcases a methodologically sound approach in integrating machine learning and qualitative analysis.
尽管《普及优质高等教育法》(UAQTE)得到了广泛实施--这项开创性的立法自 2017 年颁布以来已惠及 200 多万学生--但对其成果的全面评估却明显缺失。为了弥补这一差距,我们在菲律宾选定地区的即将毕业的大学生中开展了一项广泛的调查。这项经过精心设计的调查旨在找出 UAQTE 被忽视的方面,并从受惠者那里获取第一手资料。调查采用的方法包括与各利益相关方(即学生、家长、教师)进行焦点小组讨论,以及反映目标人群的试点测试。为了便于分析 1462 份回复的结果,我们采用了五种回归机器学习算法来分析问卷数据。结果发现,决策树回归模型的均方根误差(root-mean-squared-error)为 0.6881,是描述所收集的问卷数据的最佳模型。对表现最佳模型的 Shapley 解释突出表明,受援者对国际就业的渴望是预测受援者对 UAQTE 满意度的首要因素。此外,通过对已部署调查中的开放式问题进行主题建模,发现 UAQTE 的补贴可能存在不足,特别是对那些攻读科学、技术、工程和数学课程学位的受助者而言。这一实质性发现为了解立法的有效性提供了有价值的见解,并为今后的政策调整提供了参考,从而更好地满足菲律宾高等教育的不同需求。总之,这项研究为评估 UAQTE 的影响提供了一个强有力的框架,并展示了一种将机器学习与定性分析相结合的合理方法。
{"title":"Leveraging Machine Learning to Uncover Key Factors Influencing Satisfaction Among Free Tertiary Education Recipients in the Philippines","authors":"John Raymund B. Baragas, Lea D. Austero, J. Llovido, Lany L. Maceda, Mideth B. Abisado","doi":"10.23919/ICACT60172.2024.10472000","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10472000","url":null,"abstract":"In spite of the broad implementation of the Universal Access to Quality Tertiary Education Act (UAQTE) - a groundbreaking legislation benefitting over 2 million students since its enactment in 2017 - a comprehensive evaluation of its outcomes has been notably absent. To bridge this gap, an extensive survey was undertaken among graduating tertiary students in selected regions of the Philippines. This strategically designed survey aimed to pinpoint overlooked aspects of UAQTE and capture firsthand insights from its recipients. The methodology employed to create this survey included focus-group discussions with various stakeholders (i.e., students, parents, faculty) and a pilot test reflecting the target demographic. To facilitate analysis of the results of 1462 responses, five regression machine learning algorithms were then employed to analyze questionnaire data. The decision tree regressor with a root-mean-squared-error of 0.6881 was found to be the best performing model describing the collected questionnaire data. Shapley explanations of the best performing model highlighted the desire of the recipient to pursue international employment as the top predictor of satisfaction in UAQTE among its recipients. Furthermore, insights from employed topic modeling among the open-ended questions in the deployed survey suggested potential inadequacy of UAQTE subsidies, specifically to recipients whose pursued degrees are in the science, technology, engineering, and mathematics courses. This substantial finding promises valuable insights into the effectiveness of the legislation and may inform future policy adjustments to better address the diverse needs of tertiary education in the Philippines. Overall, this research provides a robust framework for assessing the impact of UAQTE and showcases a methodologically sound approach in integrating machine learning and qualitative analysis.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"20 4","pages":"206-210"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session 3B: Artificial Intelligence 3 第 3B 节:人工智能 3
Pub Date : 2024-02-04 DOI: 10.23919/icact60172.2024.10471928
Dan Klein
{"title":"Session 3B: Artificial Intelligence 3","authors":"Dan Klein","doi":"10.23919/icact60172.2024.10471928","DOIUrl":"https://doi.org/10.23919/icact60172.2024.10471928","url":null,"abstract":"","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"17 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Anomaly Detection System Based on Ensemble and Deep Learning 基于集合和深度学习的智能异常检测系统
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10471923
B. K. Baniya, Thomas Rush
The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approximately 5.3 billion people are connected to the internet, underscoring its widespread coverage and indispensability in our daily lives. This expansive coverage enables a myriad of services, including communication, e-banking, e-commerce, online social security access, medical reporting, education, entertainment, weather information, traffic monitoring, online surveys, and more. However, this open platform also exposes vulnerabilities to malicious users who actively seek to exploit weaknesses in the virtual domain, aiming to gain credentials, financial benefits, or reveal critical information through the use of malware. This constant threat poses a serious challenge in safeguarding sensitive information in cyberspace. To address this challenge, we propose the use of ensemble and deep neural network (DNN) based machine learning (ML) techniques to detect malicious intent packets before they can infiltrate or compromise systems and applications. Attackers employ various tactics to evade existing security systems, such as antivirus or intrusion detection systems, necessitating a robust defense mechanism. Our approach involves implementing an ensemble, a collection of diverse classifiers capable of capturing different attack patterns and better generalizing from highly relevant features, thus enhancing protection against a variety of attacks compared to a single classifier. Given the highly unbalanced dataset, the ensemble classifier effectively addresses this condition, and oversampling is also employed to minimize bias toward the majority class. To prevent overfitting, we utilize Random Forest (RF) and the dropout technique in the DNN. Furthermore, we introduce a DNN to assess its ability to recognize complex attack patterns and variations compared to the ensemble approach. Various metrics, such as classification accuracy, precision, recall, Fl-score, confusion matrix are utilized to measure the performance of our proposed system, with the aim of outperforming current state-of-the-art intrusion detection systems.
互联网无处不在,在连接个人和方便获取各种基本服务方面发挥着举足轻重的作用。据国际电信联盟(ITU)报告,截至 2022 年,约有 53 亿人连接到互联网,这表明互联网的覆盖范围十分广泛,在我们的日常生活中不可或缺。如此广泛的覆盖面使通信、电子银行、电子商务、在线社会保障访问、医疗报告、教育、娱乐、天气信息、交通监控、在线调查等众多服务成为可能。然而,这一开放式平台也暴露了一些漏洞,恶意用户会积极利用虚拟领域的弱点,通过使用恶意软件获取凭证、经济利益或泄露重要信息。这种持续的威胁对保护网络空间中的敏感信息构成了严峻的挑战。为了应对这一挑战,我们提出使用基于集合和深度神经网络(DNN)的机器学习(ML)技术,在恶意意图数据包渗透或入侵系统和应用程序之前对其进行检测。攻击者采用各种策略躲避现有的安全系统,如防病毒或入侵检测系统,因此需要一种强大的防御机制。我们的方法包括实施一个集合,即各种分类器的集合,能够捕捉不同的攻击模式,并更好地概括高度相关的特征,从而与单一分类器相比,增强对各种攻击的防护。考虑到数据集的高度不平衡,集合分类器能有效解决这一问题,同时还采用了超采样技术,以尽量减少对多数类别的偏差。为了防止过拟合,我们在 DNN 中使用了随机森林(RF)和剔除技术。此外,与集合方法相比,我们还引入了 DNN 来评估其识别复杂攻击模式和变化的能力。我们利用分类准确率、精确度、召回率、Fl-score、混淆矩阵等各种指标来衡量我们提出的系统的性能,目的是超越当前最先进的入侵检测系统。
{"title":"Intelligent Anomaly Detection System Based on Ensemble and Deep Learning","authors":"B. K. Baniya, Thomas Rush","doi":"10.23919/ICACT60172.2024.10471923","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10471923","url":null,"abstract":"The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approximately 5.3 billion people are connected to the internet, underscoring its widespread coverage and indispensability in our daily lives. This expansive coverage enables a myriad of services, including communication, e-banking, e-commerce, online social security access, medical reporting, education, entertainment, weather information, traffic monitoring, online surveys, and more. However, this open platform also exposes vulnerabilities to malicious users who actively seek to exploit weaknesses in the virtual domain, aiming to gain credentials, financial benefits, or reveal critical information through the use of malware. This constant threat poses a serious challenge in safeguarding sensitive information in cyberspace. To address this challenge, we propose the use of ensemble and deep neural network (DNN) based machine learning (ML) techniques to detect malicious intent packets before they can infiltrate or compromise systems and applications. Attackers employ various tactics to evade existing security systems, such as antivirus or intrusion detection systems, necessitating a robust defense mechanism. Our approach involves implementing an ensemble, a collection of diverse classifiers capable of capturing different attack patterns and better generalizing from highly relevant features, thus enhancing protection against a variety of attacks compared to a single classifier. Given the highly unbalanced dataset, the ensemble classifier effectively addresses this condition, and oversampling is also employed to minimize bias toward the majority class. To prevent overfitting, we utilize Random Forest (RF) and the dropout technique in the DNN. Furthermore, we introduce a DNN to assess its ability to recognize complex attack patterns and variations compared to the ensemble approach. Various metrics, such as classification accuracy, precision, recall, Fl-score, confusion matrix are utilized to measure the performance of our proposed system, with the aim of outperforming current state-of-the-art intrusion detection systems.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"94 ","pages":"137-142"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on LSTM-based Model for Predicting Deformation of Tunnel Section During Construction Period 基于 LSTM 的施工期隧道断面变形预测模型研究
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10471966
Jiwen Zhang, Kai-Qi Yuan, Jianjun Mao, Yincai Cai, Dongfeng Lei, Jinyang Deng, Ting Peng
In order to ensure the smooth construction of highway tunnel construction project, it is necessary to monitor and analyze the tunnel deformation. Most of the existing monitoring systems at home and abroad are for independent projects or independent equipment monitoring, the system application scope is small, and the data processing is not perfect. Based on this, this paper takes the tunnel deformation monitoring during highway tunnel construction as the research object, and adopts LSTM to predict the tunnel section deformation. The short-duration memory neural network model can learn from memory and then predict the subsequent information. After establishing the neural network model, the model parameters such as learning rate, number of hidden nodes, number of iteration steps and unit input are tested and adjusted by comparative experiment, and the best fitting effect is obtained at last. The tunnel prediction model can predict the deformation of tunnel section in real time, and has high precision. At the same time, it can leave enough reaction time for construction personnel. It can be predicted that it has good development potential in the future.
为了保证公路隧道建设工程的顺利施工,对隧道变形进行监测和分析是十分必要的。国内外现有的监测系统大多是针对独立工程或独立设备的监测,系统应用范围小,数据处理不完善。基于此,本文以高速公路隧道施工过程中的隧道变形监测为研究对象,采用 LSTM 对隧道断面变形进行预测。短时记忆神经网络模型可以从记忆中学习,然后预测后续信息。建立神经网络模型后,通过对比实验对模型的学习率、隐节点数、迭代步数和单位输入等参数进行测试和调整,最终得到最佳拟合效果。该隧道预测模型可实时预测隧道断面的变形,精度较高。同时,还能为施工人员留出足够的反应时间。可以预见,它在未来具有良好的发展潜力。
{"title":"Research on LSTM-based Model for Predicting Deformation of Tunnel Section During Construction Period","authors":"Jiwen Zhang, Kai-Qi Yuan, Jianjun Mao, Yincai Cai, Dongfeng Lei, Jinyang Deng, Ting Peng","doi":"10.23919/ICACT60172.2024.10471966","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10471966","url":null,"abstract":"In order to ensure the smooth construction of highway tunnel construction project, it is necessary to monitor and analyze the tunnel deformation. Most of the existing monitoring systems at home and abroad are for independent projects or independent equipment monitoring, the system application scope is small, and the data processing is not perfect. Based on this, this paper takes the tunnel deformation monitoring during highway tunnel construction as the research object, and adopts LSTM to predict the tunnel section deformation. The short-duration memory neural network model can learn from memory and then predict the subsequent information. After establishing the neural network model, the model parameters such as learning rate, number of hidden nodes, number of iteration steps and unit input are tested and adjusted by comparative experiment, and the best fitting effect is obtained at last. The tunnel prediction model can predict the deformation of tunnel section in real time, and has high precision. At the same time, it can leave enough reaction time for construction personnel. It can be predicted that it has good development potential in the future.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"62 ","pages":"395-401"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reliable Routing Method for Remote Entanglement Distribution under Limited Resources 有限资源下远程纠缠分发的可靠路由方法
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10471969
Tianzhu Hu, Xiaofeng Jiang, Tianze Zhu, Xin Sun, Haomin Chen, Jian Yang
Generating and distributing entangled pairs between arbitrary nodes is essential to fully realize the network's capabilities, with the challenges of limited qubit resources, severe decoherence and stochastic physical mechanism. In this paper, we model the service process of quantum repeater nodes based on the concept of queuing theory to help characterize their availability. Further, we propose a link-disjoint multi-path routing algorithm, with repeaters' availability, nodes' qubit capacity, entangled links' fidelity and classical delay taken into consideration. The performance of our scheme has been evaluated with simulated environment and compared with other existing routing schemes.
在任意节点之间生成和分发纠缠对是充分实现网络功能的关键,但同时也面临着量子比特资源有限、严重退相干和随机物理机制等挑战。在本文中,我们基于排队理论的概念对量子中继器节点的服务过程进行建模,以帮助描述其可用性。此外,我们还提出了一种链路分叉多路径路由算法,其中考虑了中继器的可用性、节点的量子比特容量、纠缠链路的保真度和经典延迟。我们在模拟环境中评估了我们方案的性能,并与其他现有路由方案进行了比较。
{"title":"A Reliable Routing Method for Remote Entanglement Distribution under Limited Resources","authors":"Tianzhu Hu, Xiaofeng Jiang, Tianze Zhu, Xin Sun, Haomin Chen, Jian Yang","doi":"10.23919/ICACT60172.2024.10471969","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10471969","url":null,"abstract":"Generating and distributing entangled pairs between arbitrary nodes is essential to fully realize the network's capabilities, with the challenges of limited qubit resources, severe decoherence and stochastic physical mechanism. In this paper, we model the service process of quantum repeater nodes based on the concept of queuing theory to help characterize their availability. Further, we propose a link-disjoint multi-path routing algorithm, with repeaters' availability, nodes' qubit capacity, entangled links' fidelity and classical delay taken into consideration. The performance of our scheme has been evaluated with simulated environment and compared with other existing routing schemes.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"98 ","pages":"360-364"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Evaluation of the ICT Development Indexes and Some Results 信息和通信技术发展指数评估研究及部分成果
Pub Date : 2024-02-04 DOI: 10.23919/ICACT60172.2024.10471911
Narantuya Erkhembaatar, O. Bataa
The ICT Development Index (IDI) functions as an established tool for assessing the digital divide and facilitating comparisons of lCT performance within and between countries. Information entropy, representing the level of uncertainty in a random variable, can be applied across various fields, including information and communication technology (LCT), When designing data analysis using information entropy, it is essential to observe, evaluate, and utilize metrics derived from this method. The proposed methodology aims to allocate weights to the indicators within the ICT Development Index for country ranking. To assess the efficacy of this methodology, we explored its potential applications in evaluating indexes. Our model incorporates an innovative approach that combines the entropy weight coefficient method with the correlation coefficient weighting method. We present the evaluation results of the integrated calculation method in Mongolia.
信息和通信技术发展指数(IDI)是评估数字鸿沟和促进国家内部及国家之间比较信息和通信技术绩效的既定工具。信息熵代表随机变量的不确定性水平,可应用于包括信息和通信技术(LCT)在内的各个领域。建议的方法旨在为信息和通信技术发展指数中的指标分配权重,以便进行国家排名。为评估该方法的有效性,我们探讨了其在评估指数中的潜在应用。我们的模型采用了一种创新方法,将熵权系数法与相关系数加权法相结合。我们介绍了综合计算方法在蒙古的评估结果。
{"title":"A Study on the Evaluation of the ICT Development Indexes and Some Results","authors":"Narantuya Erkhembaatar, O. Bataa","doi":"10.23919/ICACT60172.2024.10471911","DOIUrl":"https://doi.org/10.23919/ICACT60172.2024.10471911","url":null,"abstract":"The ICT Development Index (IDI) functions as an established tool for assessing the digital divide and facilitating comparisons of lCT performance within and between countries. Information entropy, representing the level of uncertainty in a random variable, can be applied across various fields, including information and communication technology (LCT), When designing data analysis using information entropy, it is essential to observe, evaluate, and utilize metrics derived from this method. The proposed methodology aims to allocate weights to the indicators within the ICT Development Index for country ranking. To assess the efficacy of this methodology, we explored its potential applications in evaluating indexes. Our model incorporates an innovative approach that combines the entropy weight coefficient method with the correlation coefficient weighting method. We present the evaluation results of the integrated calculation method in Mongolia.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"14 2","pages":"84-88"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140528283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2024 26th International Conference on Advanced Communications Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1