首页 > 最新文献

Advances in computational intelligence最新文献

英文 中文
Self-supervised learning advanced plant disease image classification with SimCLR 基于SimCLR的自监督学习高级植物病害图像分类
Pub Date : 2023-10-31 DOI: 10.1007/s43674-023-00065-z
Songpol Bunyang, Natdanai Thedwichienchai, Krisna Pintong, Nuj Lael, Wuthipoom Kunaborimas, Phawit Boonrat, Thitirat Siriborvornratanakul

Supervised learning will be a bottleneck for developing plant disease identification since it relies on learning from massive amounts of carefully labeled images, which is costly and time-consuming. On the contrary, self-supervised learning has succeeded in various image classification tasks; however, it has not been applied broadly in the plant disease analysis process. This work, therefore, studies the effectiveness of self-supervised learning using contrastive pre-training with SimCLR for plant disease image classification. We investigated unsupervised pre-training scenarios on unlabeled plant images across multiple architectures, including supervised fine-tuning on labeled samples. In addition, we explored the label efficiency of the self-supervised approach, acquired by fine-tuning the models on various fractions of labeled images. Our results demonstrated that the performance of self-supervised learning on plant disease became comparable to that of the supervised training approach.

监督学习将是开发植物疾病识别的瓶颈,因为它依赖于从大量仔细标记的图像中学习,这既昂贵又耗时。相反,自监督学习在各种图像分类任务中都取得了成功;然而,它在植物病害分析过程中并没有得到广泛的应用。因此,本工作研究了使用对比预训练和SimCLR进行植物病害图像分类的自监督学习的有效性。我们研究了多个架构中未标记植物图像的无监督预训练场景,包括标记样本的监督微调。此外,我们还探索了自监督方法的标记效率,该方法是通过对标记图像的各个部分的模型进行微调而获得的。我们的研究结果表明,自我监督学习在植物疾病方面的表现与监督训练方法相当。
{"title":"Self-supervised learning advanced plant disease image classification with SimCLR","authors":"Songpol Bunyang,&nbsp;Natdanai Thedwichienchai,&nbsp;Krisna Pintong,&nbsp;Nuj Lael,&nbsp;Wuthipoom Kunaborimas,&nbsp;Phawit Boonrat,&nbsp;Thitirat Siriborvornratanakul","doi":"10.1007/s43674-023-00065-z","DOIUrl":"10.1007/s43674-023-00065-z","url":null,"abstract":"<div><p>Supervised learning will be a bottleneck for developing plant disease identification since it relies on learning from massive amounts of carefully labeled images, which is costly and time-consuming. On the contrary, self-supervised learning has succeeded in various image classification tasks; however, it has not been applied broadly in the plant disease analysis process. This work, therefore, studies the effectiveness of self-supervised learning using contrastive pre-training with SimCLR for plant disease image classification. We investigated unsupervised pre-training scenarios on unlabeled plant images across multiple architectures, including supervised fine-tuning on labeled samples. In addition, we explored the label efficiency of the self-supervised approach, acquired by fine-tuning the models on various fractions of labeled images. Our results demonstrated that the performance of self-supervised learning on plant disease became comparable to that of the supervised training approach.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71910741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of the chaotic situation in the recruitment processes 招聘过程中混乱局面的建模
Pub Date : 2023-08-04 DOI: 10.1007/s43674-023-00064-0
Harendra Verma, Vishnu Narayan Mishra, Pankaj Mathur

In this paper, we have considered a non-linear mathematical model to study the chaotic situation, arising due to slow process of recruitment, leading to an increase in unemployment. We observed the effects on recruitment process due to delay and without delay. We have also studied the stability of equilibrium points with numerical examples to compare with analytical and theoretical results.

在本文中,我们考虑了一个非线性数学模型来研究由于招聘过程缓慢而导致失业率上升的混乱局面。我们观察到由于拖延和毫不拖延对招聘过程的影响。我们还用数值例子研究了平衡点的稳定性,并与分析和理论结果进行了比较。
{"title":"Modeling of the chaotic situation in the recruitment processes","authors":"Harendra Verma,&nbsp;Vishnu Narayan Mishra,&nbsp;Pankaj Mathur","doi":"10.1007/s43674-023-00064-0","DOIUrl":"10.1007/s43674-023-00064-0","url":null,"abstract":"<div><p>In this paper, we have considered a non-linear mathematical model to study the chaotic situation, arising due to slow process of recruitment, leading to an increase in unemployment. We observed the effects on recruitment process due to delay and without delay. We have also studied the stability of equilibrium points with numerical examples to compare with analytical and theoretical results.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-023-00064-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50447880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework to measure and reduce the threat surface area for smart home devices 衡量和减少智能家居设备威胁表面积的框架
Pub Date : 2023-08-02 DOI: 10.1007/s43674-023-00062-2
Akashdeep Bhardwaj, Keshav Kaushik, Vishal Dagar, Manoj Kumar

Threat surface area for the Internet of Things is calculated as the sum of security vulnerabilities or the weakness and gaps in protection efforts for the device, operating systems, associated software applications, and the local infrastructure. This aggregates all the known and unknown threats that can potentially expose the device, logs, data, and hosted applications. By reducing the exposed elements of the device surface, the device vulnerabilities can decrease the exposed threat surface area. This research presents a new framework first to map the devices in the ecosystem, measure the potential threat surface area from the exposure indicators for each layer and then determine the threat vectors for device compromise to calculate the maturity and severity levels. The authors propose new metrics to reassess and re-calculate the maturity and severity levels. Based on the new metrics, newly exposed threat surface elements provide a new security perspective beneficial for stakeholders involved in design, implementation, and security ecosystem of smart devices.

物联网的威胁表面积计算为设备、操作系统、相关软件应用程序和本地基础设施的安全漏洞或保护工作中的弱点和差距的总和。这聚合了所有可能暴露设备、日志、数据和托管应用程序的已知和未知威胁。通过减少设备表面暴露的元素,设备漏洞可以减少暴露的威胁表面积。这项研究提出了一个新的框架,首先绘制生态系统中的设备地图,根据每层的暴露指标测量潜在威胁表面积,然后确定设备危害的威胁向量,以计算成熟度和严重程度。作者提出了新的指标来重新评估和计算成熟度和严重程度。基于新的指标,新暴露的威胁表面元素为参与智能设备设计、实施和安全生态系统的利益相关者提供了一个新的安全视角。
{"title":"Framework to measure and reduce the threat surface area for smart home devices","authors":"Akashdeep Bhardwaj,&nbsp;Keshav Kaushik,&nbsp;Vishal Dagar,&nbsp;Manoj Kumar","doi":"10.1007/s43674-023-00062-2","DOIUrl":"10.1007/s43674-023-00062-2","url":null,"abstract":"<div><p>Threat surface area for the Internet of Things is calculated as the sum of security vulnerabilities or the weakness and gaps in protection efforts for the device, operating systems, associated software applications, and the local infrastructure. This aggregates all the known and unknown threats that can potentially expose the device, logs, data, and hosted applications. By reducing the exposed elements of the device surface, the device vulnerabilities can decrease the exposed threat surface area. This research presents a new framework first to map the devices in the ecosystem, measure the potential threat surface area from the exposure indicators for each layer and then determine the threat vectors for device compromise to calculate the maturity and severity levels. The authors propose new metrics to reassess and re-calculate the maturity and severity levels. Based on the new metrics, newly exposed threat surface elements provide a new security perspective beneficial for stakeholders involved in design, implementation, and security ecosystem of smart devices.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50437072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-information fusion based on dual attention and text embedding network for local citation recommendation 基于双注意力和文本嵌入网络的多信息融合用于地方引文推荐
Pub Date : 2023-07-25 DOI: 10.1007/s43674-023-00063-1
Shanshan Wang, Xiaohong Li, Jin Yao, Ben You

Local citation recommendation is a list of references that researchers need to cite based on a given context, so it could help researchers produce high-quality academic writing quickly and efficiently. However, existing citation recommendation methods only consider contextual content or author information, ignore the critical influence of historical citation information on citations, and learn the paper embedding at a coarse-grained level, resulting in lower-quality recommendations. To solve the above problems, we propose a novel two-stage citation recommendation model with multiple information fusion (MICR). The first stage is to enhance the target paper’s representation learning of the MICR model. To achieve the above goal, three encoders, which contain context information encoder, historical citation encoder, and author information encoder, are designed to learn rich representations of the target paper. The second stage is to select appropriate recommendation strategies for the target paper and candidate papers to achieve the goal of efficient citation recommendation. Experiments on two public citation datasets show that our model outperforms several competitive baseline methods on citation recommendation.

本地引文推荐是研究人员需要根据给定的上下文引用的参考文献列表,因此它可以帮助研究人员快速高效地撰写高质量的学术文章。然而,现有的引文推荐方法只考虑上下文内容或作者信息,忽略了历史引文信息对引文的关键影响,并在粗粒度水平上学习论文嵌入,导致推荐质量较低。为了解决上述问题,我们提出了一种新的具有多信息融合的两阶段引文推荐模型(MICR)。第一阶段是增强目标论文对MICR模型的表示学习。为了实现上述目标,设计了三个编码器,包括上下文信息编码器、历史引文编码器和作者信息编码器,以学习目标论文的丰富表示。第二阶段是为目标论文和候选论文选择合适的推荐策略,以实现高效引用推荐的目标。在两个公开引文数据集上的实验表明,我们的模型在引文推荐方面优于几种竞争性的基线方法。
{"title":"Multi-information fusion based on dual attention and text embedding network for local citation recommendation","authors":"Shanshan Wang,&nbsp;Xiaohong Li,&nbsp;Jin Yao,&nbsp;Ben You","doi":"10.1007/s43674-023-00063-1","DOIUrl":"10.1007/s43674-023-00063-1","url":null,"abstract":"<div><p>Local citation recommendation is a list of references that researchers need to cite based on a given context, so it could help researchers produce high-quality academic writing quickly and efficiently. However, existing citation recommendation methods only consider contextual content or author information, ignore the critical influence of historical citation information on citations, and learn the paper embedding at a coarse-grained level, resulting in lower-quality recommendations. To solve the above problems, we propose a novel two-stage citation recommendation model with multiple information fusion (MICR). The first stage is to enhance the target paper’s representation learning of the MICR model. To achieve the above goal, three encoders, which contain context information encoder, historical citation encoder, and author information encoder, are designed to learn rich representations of the target paper. The second stage is to select appropriate recommendation strategies for the target paper and candidate papers to achieve the goal of efficient citation recommendation. Experiments on two public citation datasets show that our model outperforms several competitive baseline methods on citation recommendation.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50512939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ranking method of the generalized intuitionistic fuzzy numbers founded on possibility measures and its application to MADM problem 基于可能性测度的广义直觉模糊数排序方法及其在MADM问题中的应用
Pub Date : 2023-07-18 DOI: 10.1007/s43674-023-00061-3
Totan Garai

In the real number set, generalized intuitionistic fuzzy numbers (GIFNs) are an impressive number of fuzzy sets (FSs). GIFNs are very proficient in managing the decision-making problem data. Our aim of this paper is to develop a new ranking method for solving a multi-attribute decision-making (MADM) problem with GIFN data. Here, we have defined the possibility mean and standard deviation of GIFNs. Then, we have formulated the magnitude of membership and non-membership function of GIFNs. In the proposed MADM problem, the attribute values are expressed as GIFNs, which is a very workable environment for decision-making problems. Finally, a numerical example is analyzed to demonstrate the flexibility, applicability and universality of the proposed ranking method and MADM problem.

在实数集中,广义直觉模糊数是一个数量可观的模糊集。GIFN非常擅长管理决策问题数据。本文的目的是开发一种新的排序方法来解决具有GIFN数据的多属性决策(MADM)问题。在这里,我们定义了GIFNs的可能性均值和标准差。然后,我们制定了GIFN的成员和非成员函数的大小。在所提出的MADM问题中,属性值被表示为GIFNs,这是一个非常可行的决策环境。最后,通过算例分析,验证了所提出的排序方法和MADM问题的灵活性、适用性和通用性。
{"title":"Ranking method of the generalized intuitionistic fuzzy numbers founded on possibility measures and its application to MADM problem","authors":"Totan Garai","doi":"10.1007/s43674-023-00061-3","DOIUrl":"10.1007/s43674-023-00061-3","url":null,"abstract":"<div><p>In the real number set, generalized intuitionistic fuzzy numbers (GIFNs) are an impressive number of fuzzy sets (FSs). GIFNs are very proficient in managing the decision-making problem data. Our aim of this paper is to develop a new ranking method for solving a multi-attribute decision-making (MADM) problem with GIFN data. Here, we have defined the possibility mean and standard deviation of GIFNs. Then, we have formulated the magnitude of membership and non-membership function of GIFNs. In the proposed MADM problem, the attribute values are expressed as GIFNs, which is a very workable environment for decision-making problems. Finally, a numerical example is analyzed to demonstrate the flexibility, applicability and universality of the proposed ranking method and MADM problem.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-023-00061-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50492891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a decision support system to use in the strategic purchasing of dental implants 用于种植牙战略采购的决策支持系统的开发
Pub Date : 2023-07-03 DOI: 10.1007/s43674-023-00060-4
Funda Özdiler Çopur, Dilek Çökeliler Serdaroğlu, Yusuf Tansel İç, Fikret Arı

In this study, a decision support system (DSS) based on the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method was developed using MATLAB to select the best dental implant alternative. The first step involved conducting interviews with experts to identify the criteria for TOPSIS. In the second step, a database was structured for each dental implant brand distributed in the market for the last five years. In the third step, MATLAB code and Graphical User Interfaces (GUI) were created to execute TOPSIS. The user can also display the other four options with a graph on the GUI, including the ranking scores (Ci*) for each option. The DSS was applied in two case studies. The MATLAB-based DSS tool has a compact, user-friendly interface, making it easy to adopt in implant selection decisions. The proposed DSS can be widely used in different applications in dental implant selection tasks.

在本研究中,使用MATLAB开发了一个基于TOPSIS方法的顺序偏好技术的决策支持系统,以选择最佳的种植牙替代方案。第一步是与专家进行访谈,以确定TOPSIS的标准。在第二步中,为过去五年在市场上分布的每个种植牙品牌构建了一个数据库。在第三步中,创建了MATLAB代码和图形用户界面(GUI)来执行TOPSIS。用户还可以在GUI上用图形显示其他四个选项,包括每个选项的排名分数(Ci*)。DSS应用于两个案例研究。基于MATLAB的DSS工具具有紧凑、用户友好的界面,便于在植入物选择决策中采用。所提出的DSS可以广泛应用于牙科植入物选择任务的不同应用中。
{"title":"Development of a decision support system to use in the strategic purchasing of dental implants","authors":"Funda Özdiler Çopur,&nbsp;Dilek Çökeliler Serdaroğlu,&nbsp;Yusuf Tansel İç,&nbsp;Fikret Arı","doi":"10.1007/s43674-023-00060-4","DOIUrl":"10.1007/s43674-023-00060-4","url":null,"abstract":"<div><p>In this study, a decision support system (DSS) based on the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method was developed using MATLAB to select the best dental implant alternative. The first step involved conducting interviews with experts to identify the criteria for TOPSIS. In the second step, a database was structured for each dental implant brand distributed in the market for the last five years. In the third step, MATLAB code and Graphical User Interfaces (GUI) were created to execute TOPSIS. The user can also display the other four options with a graph on the GUI, including the ranking scores (C<sub>i</sub><sup>*</sup>) for each option. The DSS was applied in two case studies. The MATLAB-based DSS tool has a compact, user-friendly interface, making it easy to adopt in implant selection decisions. The proposed DSS can be widely used in different applications in dental implant selection tasks.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50445318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech emotion classification using semi-supervised LSTM 基于半监督LSTM的语音情感分类
Pub Date : 2023-06-22 DOI: 10.1007/s43674-023-00059-x
Nattipon Itponjaroen, Kumpee Apsornpasakorn, Eakarat Pimthai, Khwanchai Kaewkaisorn, Shularp Panitchart, Thitirat Siriborvornratanakul

Speech mood analysis is a challenging task with unclear optimal feature selection. The nature of the dataset, whether it is from an infant or adult, is crucial to consider. In this study, the characteristics of speech were investigated using Mel-frequency cepstral coefficients (MFCC) to analyze audio files. The CREMA-D dataset, which includes six different mood states (normal, angry, happy, sad, scared, and irritated), was employed to identify mood states from speech files. A mood classification system was proposed that integrates Support Vector Machines (SVM) and Long Short-Term Memory (LSTM) models to increase the number of labeled data in small datasets and improve classification accuracy.

A semi-supervised model was proposed in this study to improve the accuracy of speech mood classification systems. The approach was tested on a classification model that used SVM and LSTM, and it was found that the semi-supervised model outperforms both SVM and LSTM models, achieving a validation accuracy of 89.72%. This result surpasses the accuracy achieved by SVM and LSTM models alone. Moreover, the semi-supervised method was observed to accelerate the training process of the model. These outcomes illustrate the efficacy of the proposed model and its potential to enhance speech mood analysis techniques.

语音情绪分析是一项具有挑战性的任务,最优特征选择不明确。数据集的性质,无论是来自婴儿还是成人,都是至关重要的。在本研究中,使用梅尔频率倒谱系数(MFCC)来分析音频文件,以研究语音的特征。CREMA-D数据集包括六种不同的情绪状态(正常、愤怒、快乐、悲伤、害怕和愤怒),用于从语音文件中识别情绪状态。提出了一种结合支持向量机(SVM)和长短期记忆(LSTM)模型的情绪分类系统,以增加小数据集中的标记数据数量,提高分类精度。为了提高语音情绪分类系统的准确性,本文提出了一种半监督模型。该方法在一个使用SVM和LSTM的分类模型上进行了测试,发现半监督模型优于SVM和LSTM模型,验证准确率达到89.72%。这一结果超过了单独使用SVM和LSTM模型的准确率。此外,观察到半监督方法加速了模型的训练过程。这些结果说明了所提出的模型的有效性及其增强语音情绪分析技术的潜力。
{"title":"Speech emotion classification using semi-supervised LSTM","authors":"Nattipon Itponjaroen,&nbsp;Kumpee Apsornpasakorn,&nbsp;Eakarat Pimthai,&nbsp;Khwanchai Kaewkaisorn,&nbsp;Shularp Panitchart,&nbsp;Thitirat Siriborvornratanakul","doi":"10.1007/s43674-023-00059-x","DOIUrl":"10.1007/s43674-023-00059-x","url":null,"abstract":"<div><p>Speech mood analysis is a challenging task with unclear optimal feature selection. The nature of the dataset, whether it is from an infant or adult, is crucial to consider. In this study, the characteristics of speech were investigated using Mel-frequency cepstral coefficients (MFCC) to analyze audio files. The CREMA-D dataset, which includes six different mood states (normal, angry, happy, sad, scared, and irritated), was employed to identify mood states from speech files. A mood classification system was proposed that integrates Support Vector Machines (SVM) and Long Short-Term Memory (LSTM) models to increase the number of labeled data in small datasets and improve classification accuracy.</p><p>A semi-supervised model was proposed in this study to improve the accuracy of speech mood classification systems. The approach was tested on a classification model that used SVM and LSTM, and it was found that the semi-supervised model outperforms both SVM and LSTM models, achieving a validation accuracy of 89.72%. This result surpasses the accuracy achieved by SVM and LSTM models alone. Moreover, the semi-supervised method was observed to accelerate the training process of the model. These outcomes illustrate the efficacy of the proposed model and its potential to enhance speech mood analysis techniques.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50504732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of digital twins on the evolution of intelligent manufacturing and Industry 4.0 数字孪生对智能制造和工业4.0演进的影响。
Pub Date : 2023-06-07 DOI: 10.1007/s43674-023-00058-y
Mohsen Attaran, Sharmin Attaran, Bilge Gokhan Celik

As the adoption of Industry 4.0 advances and the manufacturing process becomes increasingly digital, the Digital Twin (DT) will prove invaluable for testing and simulating new parameters and design variants. DT solutions build a 3D digital replica of the physical object allowing the managers to develop better products, detect physical issues sooner, and predict outcomes more accurately. In the past few years, Digital Twins (DTs) dramatically reduced the cost of developing new manufacturing approaches, improved efficiency, reduced waste, and minimized batch-to-batch variability. This paper aims to highlight the evolution of DTs, review its enabling technologies, identify challenges and opportunities for implementing DT in Industry 4.0, and examine its range of applications in manufacturing, including smart logistics and supply chain management. The paper also highlights some real examples of the application of DT in manufacturing.

随着工业4.0的普及和制造过程的数字化,数字孪生(DT)将被证明在测试和模拟新参数和设计变体方面是非常宝贵的。DT解决方案构建了物理对象的3D数字复制品,使管理人员能够开发更好的产品,更快地发现物理问题,并更准确地预测结果。在过去的几年里,数字双胞胎(DT)大大降低了开发新制造方法的成本,提高了效率,减少了浪费,并最大限度地减少了批次间的差异。本文旨在强调DT的发展,回顾其使能技术,确定在工业4.0中实施DT的挑战和机遇,并研究其在制造业的应用范围,包括智能物流和供应链管理。文中还重点介绍了DT在制造业中的应用实例。
{"title":"The impact of digital twins on the evolution of intelligent manufacturing and Industry 4.0","authors":"Mohsen Attaran,&nbsp;Sharmin Attaran,&nbsp;Bilge Gokhan Celik","doi":"10.1007/s43674-023-00058-y","DOIUrl":"10.1007/s43674-023-00058-y","url":null,"abstract":"<div><p>As the adoption of Industry 4.0 advances and the manufacturing process becomes increasingly digital, the Digital Twin (DT) will prove invaluable for testing and simulating new parameters and design variants. DT solutions build a 3D digital replica of the physical object allowing the managers to develop better products, detect physical issues sooner, and predict outcomes more accurately. In the past few years, Digital Twins (DTs) dramatically reduced the cost of developing new manufacturing approaches, improved efficiency, reduced waste, and minimized batch-to-batch variability. This paper aims to highlight the evolution of DTs, review its enabling technologies, identify challenges and opportunities for implementing DT in Industry 4.0, and examine its range of applications in manufacturing, including smart logistics and supply chain management. The paper also highlights some real examples of the application of DT in manufacturing.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-023-00058-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9623751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey on cyber threat intelligence sharing based on Blockchain 基于区块链的网络威胁情报共享研究
Pub Date : 2023-05-23 DOI: 10.1007/s43674-023-00057-z
Ahmed El-Kosairy, Nashwa Abdelbaki, Heba Aslan

In recent years, cyber security attacks have increased massively. This introduces the need to defend against such attacks. Cyber security threat intelligence has recently been introduced to secure systems against security attacks. Cyber security threat intelligence (CTI) should be fast, trustful, and protect the sender's identity to stop these attacks at the right time. Threat intelligence sharing is vitally important since it is considered an effective way to improve threat understanding. This leads to protecting the assets and preventing the attack vectors. However, there is a paradox between the privacy safeguard needs of threat intelligence sharing; the need to produce complete proper threat intelligence feeds to be shared with the community, and other challenges and needs that are not covered in the traditional CTI. This paper aims to study how Blockchain technology can be incorporated with the CTI to solve the current issues and challenges in the traditional CTI. We collected the latest contributions that use Blockchain to overcome the conventional CTI problems and compared them to raise the reader’s awareness about the different methods used. Also, we mentioned the uncovered areas for each paper to offer a wide range of details and information about different areas that need to be investigated. Furthermore, the prospect challenges of integrating the Blockchain and CTI are discussed.

近年来,网络安全攻击大幅增加。这就提出了防范此类攻击的必要性。网络安全威胁情报最近被引入安全系统以抵御安全攻击。网络安全威胁情报(CTI)应该快速、可靠,并保护发送者的身份,以在正确的时间阻止这些攻击。威胁情报共享至关重要,因为它被认为是提高对威胁认识的有效途径。这导致保护资产和防止攻击媒介。然而,威胁情报共享的隐私保护需求之间存在着矛盾;生成完整的适当威胁情报源以与社区共享的必要性,以及传统CTI中未涵盖的其他挑战和需求。本文旨在研究如何将区块链技术与CTI相结合,以解决传统CTI中存在的问题和挑战。我们收集了使用区块链克服传统CTI问题的最新贡献,并对其进行了比较,以提高读者对所使用的不同方法的认识。此外,我们在每篇论文中都提到了未覆盖的领域,以提供关于需要调查的不同领域的广泛细节和信息。此外,还讨论了区块链与CTI融合的前景挑战。
{"title":"A survey on cyber threat intelligence sharing based on Blockchain","authors":"Ahmed El-Kosairy,&nbsp;Nashwa Abdelbaki,&nbsp;Heba Aslan","doi":"10.1007/s43674-023-00057-z","DOIUrl":"10.1007/s43674-023-00057-z","url":null,"abstract":"<div><p>In recent years, cyber security attacks have increased massively. This introduces the need to defend against such attacks. Cyber security threat intelligence has recently been introduced to secure systems against security attacks. Cyber security threat intelligence (CTI) should be fast, trustful, and protect the sender's identity to stop these attacks at the right time. Threat intelligence sharing is vitally important since it is considered an effective way to improve threat understanding. This leads to protecting the assets and preventing the attack vectors. However, there is a paradox between the privacy safeguard needs of threat intelligence sharing; the need to produce complete proper threat intelligence feeds to be shared with the community, and other challenges and needs that are not covered in the traditional CTI. This paper aims to study how Blockchain technology can be incorporated with the CTI to solve the current issues and challenges in the traditional CTI. We collected the latest contributions that use Blockchain to overcome the conventional CTI problems and compared them to raise the reader’s awareness about the different methods used. Also, we mentioned the uncovered areas for each paper to offer a wide range of details and information about different areas that need to be investigated. Furthermore, the prospect challenges of integrating the Blockchain and CTI are discussed.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50507816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deception as a service: Intrusion and Ransomware Detection System for Cloud Computing (IRDS4C) 欺骗即服务:用于云计算的入侵和勒索软件检测系统(IRDS4C)
Pub Date : 2023-05-20 DOI: 10.1007/s43674-023-00056-0
Ahmed El-Kosairy, Nashwa Abdelbaki

Cloud computing technology is growing fast. It offers end-users flexibility, ease of use, agility, and more at a low cost. This expands the attack surface and factors, resulting in more attacks, vulnerabilities, and corruption. Traditional and old security controls are insufficient against new attacks and cybercrime. Technologies such as intrusion detection system (IDS), intrusion prevention system (IPS), Firewalls, Web Application Firewall (WAF), Next-Generation Firewall (NGFW), and endpoints are not enough, especially against a new generation of ransomware and hacking techniques. In addition to a slew of cloud computing options, such as software as a service (SaaS), it is challenging to manage and secure cloud technology. A new technique is needed to detect zero-day attacks related to ransomware, targeted attacks, or intruders. This paper presents our new technique for detecting zero-day ransomware attacks and intruders inside cloud technology. The proposed technique is based on a deception system based on honey files and tokens.

云计算技术发展迅速。它以低成本为最终用户提供了灵活性、易用性、灵活性等。这扩大了攻击面和因素,导致更多的攻击、漏洞和腐败。传统和旧的安全控制措施不足以应对新的攻击和网络犯罪。入侵检测系统(IDS)、入侵防御系统(IPS)、防火墙、Web应用程序防火墙(WAF)、下一代防火墙(NGFW)和端点等技术还不够,尤其是针对新一代勒索软件和黑客技术。除了软件即服务(SaaS)等一系列云计算选项外,管理和保护云技术也是一项挑战。需要一种新技术来检测与勒索软件、目标攻击或入侵者相关的零日攻击。本文介绍了我们在云技术中检测零日勒索软件攻击和入侵者的新技术。所提出的技术基于基于蜂蜜文件和令牌的欺骗系统。
{"title":"Deception as a service: Intrusion and Ransomware Detection System for Cloud Computing (IRDS4C)","authors":"Ahmed El-Kosairy,&nbsp;Nashwa Abdelbaki","doi":"10.1007/s43674-023-00056-0","DOIUrl":"10.1007/s43674-023-00056-0","url":null,"abstract":"<div><p>Cloud computing technology is growing fast. It offers end-users flexibility, ease of use, agility, and more at a low cost. This expands the attack surface and factors, resulting in more attacks, vulnerabilities, and corruption. Traditional and old security controls are insufficient against new attacks and cybercrime. Technologies such as intrusion detection system (IDS), intrusion prevention system (IPS), Firewalls, Web Application Firewall (WAF), Next-Generation Firewall (NGFW), and endpoints are not enough, especially against a new generation of ransomware and hacking techniques. In addition to a slew of cloud computing options, such as software as a service (SaaS), it is challenging to manage and secure cloud technology. A new technique is needed to detect zero-day attacks related to ransomware, targeted attacks, or intruders. This paper presents our new technique for detecting zero-day ransomware attacks and intruders inside cloud technology. The proposed technique is based on a deception system based on honey files and tokens.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50499988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Advances in computational intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1