2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)最新文献
{"title":"Arabic Sentiment Analysis based on Deep Reinforcement Learning","authors":"Mohamed Zouidine, Mohammed Khalil","doi":"10.1109/NISS55057.2022.10085147","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085147","url":null,"abstract":"In this work, we handle the problem of Arabic sentiment analysis by combining the Arabic language understanding transformer-based model AraBERT and an LSTM-CNN deep learning model. We propose a new training objective function based on deep reinforcement learning that combines cross-entropy loss from maximum likelihood estimation and rewards from policy gradient algorithm. We evaluate our proposed system on the LABR book reviews dataset. Experimental results show that the proposed model outperforms the state-of-the-art models and provides an accuracy of 87.58%.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121370475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdurrakhman Prasetyadi, Budi Nugroho, Merios Gusan Putra
{"title":"Determining Natural Disaster Mitigation Level using Unsupervised k-means Clustering","authors":"Abdurrakhman Prasetyadi, Budi Nugroho, Merios Gusan Putra","doi":"10.1109/NISS55057.2022.10085620","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085620","url":null,"abstract":"This work intends to categorize the number of districts/cities based on their mitigation efforts using unsupervised clustering approaches to generate decision support systems. Using data mining techniques and k-means clustering algorithms, it is possible to address problems involving data on the number of districts/cities based on natural disaster mitigation measures. Ms. Excel is used to estimate the value of the centroid for three clusters: the high expectation level cluster (C1), the medium anticipation level cluster (C2), and the low anticipation level cluster (C3) (C3). Our trials highlighted the outcomes of categorizing districts/cities based on their natural disaster preparedness efforts with two high-level districts/cities, namely Mentawai Islands Regency and South Lampung Regency, 47 regencies/cities at medium level 32 other districts/cities including low-level clusters. The results can be adopted as a recommendation for the district/city government to improve facilities and infrastructure in the district/city conforming to the efforts of natural disaster mitigation based on the clusters.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A note on attractor selection","authors":"Samuilik Inna, Sadyrbaev Felix","doi":"10.1109/NISS55057.2022.10085669","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085669","url":null,"abstract":"The attractor selection method of accommodating traffic on a wavelength-routed optical network is considered. It is shown that attractors can be of periodic nature. Examples of systems, which model this process and have periodic attractors, which persist under the appropriately small perturbations, are given.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130558842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Astri Widi Astuti, M. Rezaldi, S. Riyanto, R. Richardo
{"title":"A Review: Augmented Reality Technology-Based Interactive Learning Media","authors":"Astri Widi Astuti, M. Rezaldi, S. Riyanto, R. Richardo","doi":"10.1109/NISS55057.2022.10085418","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085418","url":null,"abstract":"Some research improves that students find it difficult to learn mathematics and are considered scary. This is influenced by conventional and less interactive learning methods so that students cannot understand mathematics. To overcome this, interactive learning based on Augmented Reality (AR) technology is needed. The technology has been widely used to overcome various problems in the world of education. This research purpose to review the results of research related to AR in mathematics learning published in the last 5 years. Based on the results analysis, it can be seen that AR is very effective in learning mathematics so that students can digest and understand mathematics optimally. The research results can be used as recommendations in the learning system through the use of AR technology.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134098750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Pardede, Vicky Zilvan, A. Ramdan, A. R. Yuliani, Endang Suryawati, Renni Kusumowardani
{"title":"Adversarial Networks-Based Speech Enhancement with Deep Regret Loss","authors":"H. Pardede, Vicky Zilvan, A. Ramdan, A. R. Yuliani, Endang Suryawati, Renni Kusumowardani","doi":"10.1109/NISS55057.2022.10085296","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085296","url":null,"abstract":"Speech enhancement is often applied for speech-based systems due to the proneness of speech signals to additive background noise. While speech processing-based methods are traditionally used for speech enhancement, with advancements in deep learning technologies, many efforts have been made to implement them for speech enhancement. Using deep learning, the networks learn mapping functions from noisy data to clean ones and then learn to reconstruct the clean speech signals. As a consequence, deep learning methods can reduce what is so-called musical noise that is often found in traditional speech enhancement methods. Currently, one popular deep learning architecture for speech enhancement is generative adversarial networks (GAN). However, the cross-entropy loss that is employed in GAN often causes the training to be unstable. So, in many implementations of GAN, the cross-entropy loss is replaced with the least-square loss. In this paper, to improve the training stability of GAN using cross-entropy loss, we propose to use deep regret analytic generative adversarial networks (Dragan) for speech enhancements. It is based on applying a gradient penalty on cross-entropy loss. We also employ relativistic rules to stabilize the training of GAN. Then, we applied it to the least square and Dragan losses. Our experiments suggest that the proposed method improve the quality of speech better than the least-square loss on several objective quality metrics.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Dematerialization Models and Systems in Public Procurement","authors":"BA Papa Diadia, J. K. Tamgno, A. Kora","doi":"10.1109/NISS55057.2022.10085599","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085599","url":null,"abstract":"Dematerialization through digital technologies offers an opportunity to modernize public administration. The manual management, the demand for more transparency of citizens with the use of open data, fighting corruption, the search for better efficiency of the process and the difficulties of archiving can be taken care of through the process of dematerialization of public order. The objective of this paper is to review the literature on recent research on models or systems in public procurement. Recently, with the emergence of Blockchain technology, exciting practical solutions are being explored. Also, with the use of smart contracts, better automation is possible. In this paper we present a comprehensive review of electronic procurement models and systems using web and centralized database technologies as well as Blockchain technology using smart contracts and cryptographic mechanisms.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121328147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Setiadi, Andria Arisal, A. Fakhrurrozi, H. Septanto, F. Kurniawan, S. Aditya
{"title":"Implementing Satellite-borne Synthetic Aperture Radar Imaging Algorithm with Open Source Scientific Software","authors":"B. Setiadi, Andria Arisal, A. Fakhrurrozi, H. Septanto, F. Kurniawan, S. Aditya","doi":"10.1109/NISS55057.2022.10085323","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085323","url":null,"abstract":"Implementing imaging algorithms for satellite-borne Synthetic Aperture Radar (SAR) sensor are challenging because they require complex computations and large storage. SAR imaging algorithms have been implemented in various compiled programming languages, such as Fortran and C/C++. However, in an academic and research environment, we need an interpreted programming language with strong support for mathematical operations, 2D and 3D plotting and visualization tools to support learning and implementing existing algorithms and even designing new ones. We describe our implementation of the Range Doppler algorithm (RDA) for satellite-borne SAR imaging using GNU Octave, an Open Source high-level interpreted programming language for scientific and numerical computation. The software process raw SAR data into a single-look complex image in four steps; range compression, secondary range compression, range cell migration correction, and azimuth compression. The overall implementation strategy for processing the airborne strip map mode raw data is explained, and results are presented.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115155804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Febi Siti Sutria Ningsih, P. Khotimah, Andria Arisal, A. Rozie, D. Munandar, D. Riswantini, Ekasari Nugraheni, W. Suwarningsih, D. Kurniasari
{"title":"Synonym-based Text Generation in Restructuring Imbalanced Dataset for Deep Learning Models","authors":"Febi Siti Sutria Ningsih, P. Khotimah, Andria Arisal, A. Rozie, D. Munandar, D. Riswantini, Ekasari Nugraheni, W. Suwarningsih, D. Kurniasari","doi":"10.1109/NISS55057.2022.10085156","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085156","url":null,"abstract":"One of which machine learning data processing problems is imbalanced classes. Imbalanced classes could potentially cause bias towards the majority classes due to the nature of machine learning algorithms that presume that the object cardinality in classes is around similar number. Oversampling or generating new objects in minority class are common approaches for balancing the dataset. In text oversampling method, semantic meaning loses often occur when deep learning algorithms are used. We propose synonym-based text generation for restructuring the imbalanced COVID-19 online-news dataset. Three deep learning models (MLP, CNN, and LSTM) using TF/IDF and word embedding (WE) feature are tested with the original and balanced dataset. The results indicate that the balance condition of the dataset and the use of text representative features affect the performance of the deep learning model. Using balanced data and deep learning models with WE greatly affect the classification significantly higher performances as high as 4%, 5%, and 6% in accuracy, precision, recall, and f1-score, respectively.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Efficiency on BFV-based Encrypted Watermarking using Hadamard Product Decomposition","authors":"A. Basuki, Iwan Setiawan, D. Rosiyadi","doi":"10.1109/NISS55057.2022.10085020","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085020","url":null,"abstract":"Fully homomorphic encryption (FHE) enables arithmetic computation over encrypted data to preserve data privacy in the untrusted computing domain. Nevertheless, the BFV-based FHE computation is memory expensive that does not scale for high-resolution image computation such as image watermarking. This paper proposed a vector decomposition approach based on the Hadamard product to enable memory-efficient encrypted watermarking on huge-size images. The method uses singular value decomposition (SVD)-based watermarking by splitting the watermark embedding into row-wise of Hadamard products. The evaluation shows that the proposed method reduces the memory requirements to N times, where N refers to the image dimension in pixels. In addition, the proposed method allows parallel computation for faster computation, from 4-times up to 24-times faster, by utilizing the available memory.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Lightweight Cryptography Approach For IoT Devices Security","authors":"Ismail El Gaabouri, M. Senhadji, M. Belkasmi","doi":"10.1109/NISS55057.2022.10085144","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085144","url":null,"abstract":"Lightweight cryptography (LWC) has a paramount role in the context of securing IoT diverse applications, these last originate massive amount of data due to the enormous number of connected devices. The main concern of cryptographic based solutions is to hide the plain value of the exchanged data by providing confidentiality and preserving the integrity of transmissions. IoT devices employed in these environments, make applying traditional cryptography solutions complex to be utilized. An in-depth survey on lightweight cryptography has been carried out in this paper, for this reason, an evaluation of recommended LWC algorithms proposed by a variety of well-known organisations and committees has been realized.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"692 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}