{"title":"Preliminary Analysis of Dietary Management Support Method for Improving the Symptoms in Irritable Bowel Syndrome","authors":"Takuya Yamanaka, Da Li, Shinichi Nakajima","doi":"10.1109/ICNC57223.2023.10073984","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10073984","url":null,"abstract":"Irritable bowel syndrome (IBS) is a syndrome of chronic abdominal discomfort and abnormal bowel movements such as diarrhea and constipation, despite the absence of inflammation or ulcers in the intestines on normal examination. Dietary therapy is one of the treatment options for IBS, and is recommended to reduce symptoms by avoiding stimulants, high-fat foods, high-fiber foods, and fermented foods. However, because the intestinal environment varies from person to person, some foods are suitable for some people and others are not. We thought that if patients could find foods that suit their bodies, their symptoms could be improved. In this study, we propose machine learning based methods to predict whether IBS symptoms appear or not based on the data of patients daily meals and their stomach condition. In addition, we describe our experimental results and evaluation of the proposed method.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129434179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CMRCV: Causal Modeling to Localize Failed Equipment by Representative Nodes and Contribution Values","authors":"Yoichi Matsuo, Yuusuke Nakano, Keishiro Watanabe","doi":"10.1109/ICNC57223.2023.10074021","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074021","url":null,"abstract":"Researchers have proposed causal model-based methods to localize failed equipment in an information and communication technology (ICT) system using various kinds of data. However, expert knowledge is needed to use these methods for constructing the causal model and determining the threshold for inputting data into the existing methods. In this paper, we propose CMRCV, an Causal Modeling method, which constructs the causal model only from the ICT system topology without expert knowledge. We introduce Representative nodes, which aggregate the status of all data collected from the corresponding causal model and use Contribution Values of an anomaly as input, which indicates the degree of the contributions of each data to the failed equipment. The experimental results show that CMRCV improves the F1 score by approximately 25.8% at most and 13.1% on average compared with the existing method.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130366463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Augmenting Campus Wireless Architectures with SDN","authors":"William Brockelsby, R. Dutta","doi":"10.1109/ICNC57223.2023.10074202","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074202","url":null,"abstract":"Campus wireless networks have become mission-critical as mobility and digital paradigms, such as the Internet of Things (IoT), have become more pervasive. In this work, we review the characteristics of typical campus 802.11 wireless architectures and develop an approach for collecting traffic within this context in support of analyzing contemporary traffic patterns within wireless networks. We then determine if characteristic traffic patterns within the wireless domain support the development of a hybrid Software-Defined Networking (SDN) architecture to augment traditional wireless infrastructure in support of policy-driven networking.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guiding Interactive Film With Emotion-Profiling Chatbots","authors":"Celina Ma, Haohong Wang, Mea Wang","doi":"10.1109/ICNC57223.2023.10074513","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074513","url":null,"abstract":"In interactive films, users have chances to influence the storyline at fixed points in time. To grant more user autonomy, this work offers a new model for interaction, driven by chatbots representing story characters. Whenever they desire, users may interact with the film characters in open-ended conversation. Through generative language models, the chatbots can respond according to the story context for dynamic entertainment. This unique interface is augmented by emotion recognition to profile the users’ character preferences, and guide them to suitable storylines. A user study on a prototype film confirmed the subjective value of this system, and its potential to drive story progression with minimal authorial scripting. An objective analysis of path selection algorithms further showed the benefits of assessing long-term storyline quality.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125447033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hensel’s Compression-Based Dimensionality Reduction Approach for Privacy Protection in Federated Learning","authors":"Ahmed El Ouadrhiri, A. Abdelhadi, Phu H. Phung","doi":"10.1109/ICNC57223.2023.10074197","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074197","url":null,"abstract":"Differential privacy (DP) is considered a de-facto standard for protecting users’ privacy in data analysis, machine, and deep learning. Existing DP-based privacy-preserving approaches, in federated learning, consist of adding noise to the clients’ gradients before sharing them with the server. However, implementing DP on the gradient is inefficient as the privacy leakage increases by increasing the synchronization training epochs due to the composition theorem. Recently, researchers were able to recover images of the training dataset using a Generative Regression Neural Network (GRNN). In this work, we propose a novel approach using two layers of privacy protection to overcome the limitations of the existing DP-based methods. The first layer leverages Hensel’s Lemma to reduce the training dataset’ s dimension. The new dimensionality reduction method reduces the dimension of a dataset without losing information since Hensel’s Lemma guarantees uniqueness. The second layer applies DP to the compressed dataset generated by the first layer. The proposed approach overcomes the problem of privacy leakage due to composition by applying DP only once before the training. Therefore, clients train their local model on the privacy-preserving dataset generated by the second layer. Experimental results show that the proposed approach ensures strong privacy protection while achieving high accuracy. In particular, the new dimensionality reduction method achieves an accuracy of 97%, with only 25% of the original dataset size.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122979619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consensus algorithms for Opt-in/Opt-out and proximity marketing context","authors":"Fatima Chahal, H. Fouchal, D. Gaïti","doi":"10.1109/ICNC57223.2023.10074503","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074503","url":null,"abstract":"Data security is today regarded as one of the most difficult duties that IT professionals must fight for. And today, consumers are more concerned about their data, and they begin to wonder why the rules that attempted to protect their data, particularly in the proximity marketing arena, have failed. Users’ information is shared without their awareness among market participants. Many systems have emerged through regulation to safeguard users and the market, the most well-known of which is Opt-in/Opt-out, which asks users for permission to use and share personal information with a third party. In addition, they have the opportunity to revoke their permission at any moment. In practice, however, this approach is ineffectual because opting out does not prohibit corporations from exploiting the data. In this work, we propose a novel invention that combines Opt-in/Opt-out with consensus algorithms in a decentralized way to provide a more secure environment for the user, giving the user the primary control to grant the company access to his data or a real withdrawal consent at any time.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Mao, Shu-ping Yeh, Jing Zhu, Hosein Nikopour, S. Talwar
{"title":"Transmission-Cost Minimization for Packet-level Coding on Multi-path Wireless Networks","authors":"Wei Mao, Shu-ping Yeh, Jing Zhu, Hosein Nikopour, S. Talwar","doi":"10.1109/ICNC57223.2023.10074036","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074036","url":null,"abstract":"Topological redundancies in modern wireless infrastructures provide opportunities to enhance reliability and latency performances through multiple data paths, however, existing standards for wireless access networks cannot fully utilize such an added degree of freedom. Packet-level coding, which proactively adds redundancy to the transmitted data at the packet level, can efficiently utilize the added bandwidth from all data paths and enhance reliability with low latency. Thus it is a good candidate to supplement single-link/physical layer techniques (e.g., channel coding) and provide a better chance of realizing new reliability- and delay-critical services, such as URLLC. In this paper we study the problem of how to optimally design the coding rate and packet distribution rule over multiple data paths to transmit a set of data packets under stringent reliability and delay constraints, so that radio resource cost is minimized. Since such problems are often NP-hard and obtaining optimal solutions usually requires very high-complexity exhaustive search, we propose novel heuristic algorithms that use the path resources in the order of their cost-effectiveness scores to approximately solve this problem. Numerical simulations show that our proposed algorithms can drastically reduce the computational complexity while still able to achieve near-optimal performance.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132351142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chenhao He, Qing Li, Rui Cheng, Jun Wang, Jinghua Tan
{"title":"The Hysteresis Effect of Momentum Spillover in Asset Pricing via Spatial-Temporal Graph Learning","authors":"Chenhao He, Qing Li, Rui Cheng, Jun Wang, Jinghua Tan","doi":"10.1109/ICNC57223.2023.10074006","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074006","url":null,"abstract":"Asset pricing is a long-standing topic in finance. To capture the momentum spillovers of listed firms, recent pilot studies have been studying graph neural networks to lead the influence propagation among listed firms and predict stock movement. However, all these works ignored the hysteresis effect of momentum spillover where the future return of a target firm lags behind the historical momentum spillovers which would cause hysteresis influence. In this study, we argue that the hysteresis effect of momentum spillover is critical in asset pricing and propose a novel hysteresis spatial-temporal graph learning (HysGL) for it. For spatial learning, we dynamically estimate the momentum spillover generated at each moment to represent the influence propagated from changing relevant firms. For temporal learning, we progressively propose the time-sensitive and state-sensitive mechanisms to explicitly model the influence pattern of hysteresis effect by calculating the response strength of a target firm to all historical momentum spillovers over the time dimension, based on which the cumulative hysteresis influence received by the target firm is obtained and then sequentially embedded to extract the hidden state preserving the temporal dependency of momentum spillovers. Extensive experiments performed on two real-world financial datasets demonstrate the superiority of the HysGL over the state-of-the-art algorithms, including TGC, FinGAT and AD-GAT.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131194455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Zero-Trust Framework for Industrial Internet of Things","authors":"Adel Atieh, P. Nanda, M. Mohanty","doi":"10.1109/ICNC57223.2023.10074295","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074295","url":null,"abstract":"Interactions between different types of systems from various environments are increasing continuously due to the nature of business and commercial requirements. All of these interactions require a level of trust given for each system in order to enable essential operations and functions. Traditional trust models and frameworks implemented in different environments define static levels of trust given to users and systems. This includes the Defence-in-depth security model that is typically implemented in industrial control systems (ICS) environments. While this model and other security models provide an outstanding level of restriction and security if implemented correctly, they can still allow unauthorised access to sensitive data through compromised trust devices. Industrial Internet of Things (IIoT) solutions are actively being deployed in different sectors. Despite the criticality of the environments IIoT solutions serve, these solutions require more integrated connectivity that ICS environment due to cloud connectivity. This research paper proposes a zero-trust framework for IIoT and explores how this framework could mitigate the existing risks within IIoT solutions. Moreover, this research paper proposes a zero-trust anatomy for IIoT and explores the potential performance and/or complexity overhead resulted from the use of this model.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Allocation Algorithm Of Wi-Fi","authors":"Jin Wang, Xiaofeng Zhong, Shidong Zhou","doi":"10.1109/ICNC57223.2023.10074461","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074461","url":null,"abstract":"In recent years, Wi-Fi communication has developed rapidly, and the 802.11 protocol formulated by IEEE has been universally observed, which defines different channels. For China, we use 13 overlapping channels with 20MHz bandwidth in the 2.4 GHz band and 13 non-overlapping channels with 20MHz bandwidth in the 5 GHz band. After applying channel bonding in the 802.11n standard, the relationships of Wi-Fi nodes also need to consider the impact of the primary channel and bandwidth. After considering multiple factors that affect communication quality, a channel allocation algorithm is presented in this paper. The algorithm’s accuracy is further demonstrated by comparing the results of measurement with the algorithm’s results.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}