2022 32nd Conference of Open Innovations Association (FRUCT)最新文献

筛选
英文 中文
Discourse on Vaccination on Russian Social Media: Topics and Controversy 俄罗斯社交媒体上关于疫苗接种的论述:话题和争议
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953888
K. Platonov, K. Svetlov, Viktoriia Saifulina
{"title":"Discourse on Vaccination on Russian Social Media: Topics and Controversy","authors":"K. Platonov, K. Svetlov, Viktoriia Saifulina","doi":"10.23919/FRUCT56874.2022.9953888","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953888","url":null,"abstract":"Public discussion on vaccination in Russia is vigorous and controversial, especially in the case of COVID-19. In conditions of extensively spreading myths, false information and rhetoric contradicting argumentation of scientific community social media became a place where opinions on vaccination collide. Participatory culture of commenting still remains to be a peculiar form of public health activism accessible to almost everyone. In this study, the data retrieved from the most popular Russian social networking platform Vkontakte was used. The raw dataset included 467888 news posts (published during 2021) from salient online communities and 538202 comments. Topic mining and modeling methods including PLSA and LDA were used to classify vaccination-related news posts in 6 groups, which differed in terms of language style, main focuses and discussed issues. The most engaging topic was “Vaccination on the ground” mainly because in contained an abundance of “obtrusive” issues. It was shown that the degree of user engagement did not significantly depend on salience of topic. In sum, it was revealed that 6.2% of comments was against vaccination, while, one and a half times less, 4.3% was in favor. Positive comments outweighed the negative ones only for topic “Russian vaccines in the World”.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133182258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System 利用控制设备漏洞:攻击网络物理水系统
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953826
P. Sindhwad, Faruk Kazi
{"title":"Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System","authors":"P. Sindhwad, Faruk Kazi","doi":"10.23919/FRUCT56874.2022.9953826","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953826","url":null,"abstract":"Industrial Control Systems (ICS) are transitioning from isolated, custom-built systems to those combining general-purpose computer hosts, wireless networks, and artificial intelligence. An increasing number of vulnerabilities in ICS devices are a major concern since it provides potential adversaries with a simple approach to exploit and attack unpatched ICS systems. This paper investigates attack paths that target unpatched system vulnerabilities and their impact on the ICS, as demonstrated using the Waste Water Treatment Plant (WWTP) testbed. Denial of Service (DoS), Buffer overflow, privilege escalation, and illegal command injection attacks are executed, and their impacts are investigated using CIA and STRIDE threat modeling. The main outcomes of the study are, 1) An update on public advisory CVE-2021-33834 by Moxa. 2) Demonstration of attack on a device with publicly accessible Proof of Concept (POC) of another device using Modbus buffer overflow vulnerability. Finally, various recommendations are provided that can be used for security penetration testing to identify security flaws, as well as directions for product developers to implement security by design.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Application: For Anxiety and Cardiovascular Depression Monitoring Using a Smartwatch Based on Cognitive Behavioral Therapy 移动应用:基于认知行为疗法的智能手表焦虑和心血管抑郁监测
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953848
Lucero Huaroto, Lenis Wong, Vanessa Alvarado
{"title":"Mobile Application: For Anxiety and Cardiovascular Depression Monitoring Using a Smartwatch Based on Cognitive Behavioral Therapy","authors":"Lucero Huaroto, Lenis Wong, Vanessa Alvarado","doi":"10.23919/FRUCT56874.2022.9953848","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953848","url":null,"abstract":"In recent years, medical care for mental health has been affected by the confinement situation due to COVID-19. Access to these services has been strongly affected, becoming virtual to avoid close contact. However, this change brought other problems to starting conversations with the patient and monitoring their mental health since the description of events reported by the patient is not entirely accurate and can be biased. For this reason, an approach is proposed for monitoring anxiety and cardiovascular depression by applying the cognitive behavioral therapy (CBT) technique, also considering levels of the patient's physiological variables using a smartwatch. This approach consists of choosing the type of CBT technique as the basis of the mobile application, the selection of physiological variables, choosing the smartwatch model applying benchmarking, and the design of the mobile application. Two scenarios were used for the experimentation: (a) without the proposal and (b) with the proposal. Results of real-life environment validation experimentation showed an increase of more than 80% of the events discussed in therapy using the proposed solution, in addition to an average rating of 4.75 by the psychologist. Lastly, the results of the surveys show specialists and patients consider the proposal useful.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132659973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-voltage Ride-through Response of Renewable-Penetrated Distribution Networks 可再生能源渗透配电网的低压穿越响应
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953844
P. Salyani, Ramin Nourollahi, K. Zare, B. Mohammadi-ivatloo, M. Abapour
{"title":"Low-voltage Ride-through Response of Renewable-Penetrated Distribution Networks","authors":"P. Salyani, Ramin Nourollahi, K. Zare, B. Mohammadi-ivatloo, M. Abapour","doi":"10.23919/FRUCT56874.2022.9953844","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953844","url":null,"abstract":"Low voltage ride-through (LVRT) is a grid code that enables distributed energy resources (DERs) to stay connected under voltage sags. However, a DER is exposed to being tripped if it does not meet the LVRT requirement. For a renewable-penetrated distribution network (RPDN), the lost amount of DER capacity over a voltage sag is the so-called LVRT response of an RPDN. Besides the behavior of DERs during the transient undervoltage condition, their trip may have a negative impact on transmission system security. This paper addresses a general mathematical model for analyzing the DERs' behavior during the transient condition. The proposed model is implemented to obtain the RPDN's LVRT response to different voltage sags. This LVRT response is defined as such that concerns the uncertainty in the output power of renewable resources. Furthermore, the expected ride-through capability index is introduced to capture the generation availability due to meeting the LVRT requirements. The studied RPDN shows the lowest capability is for voltage sags with depth and duration greater than 0.70 pu and 0.4 sec, respectively. Also, with 40% and 20% reductions in solar and wind generation compared to their nominal values, the maximum LVRT response of the RPDN decreases from 2420 kW to 1852 kW. Also, the ERC of 66% is achieved for the RPDN, stating the expected loss of 34% of the total DER generation.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise Modelling Assistance: Edge Prediction Improvement Using Textual Information 企业建模辅助:利用文本信息改进边缘预测
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953859
Walaa Othman, N. Shilov
{"title":"Enterprise Modelling Assistance: Edge Prediction Improvement Using Textual Information","authors":"Walaa Othman, N. Shilov","doi":"10.23919/FRUCT56874.2022.9953859","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953859","url":null,"abstract":"Today, enterprise modelling is still a highly manual task. There are exist some assistance techniques but they are mostly limited to pattern libraries and pre-defined rules, which limits their functionality and makes them non-flexible. Application of machine learning techniques to support enterprise modelers is a promising approach. However, one of the main problems in this area today is the absence of model repositories that could be used for training what causes the necessity to train machine learning models on small data. In this paper we study which textual information from the model and how can be used to increase the efficiency of the edge prediction task, which is one of the key tasks in graph-structured problems like enterprise modelling. The comparative analysis shows that application of FastText method provides a better result for node names embedding, and consideration of node names and descriptions significantly increases the edge prediction quality. The built model has been successfully validated on a test case scenario simulating the enterprise model building process.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126875389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Where to Put A Rower: A Novel and Practical Solution to Dragon Boat Partition Problem 赛艇安置:解决龙舟分区问题的一种新颖实用的方法
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953830
Brett Regnier, Johnson Zhang
{"title":"Where to Put A Rower: A Novel and Practical Solution to Dragon Boat Partition Problem","authors":"Brett Regnier, Johnson Zhang","doi":"10.23919/FRUCT56874.2022.9953830","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953830","url":null,"abstract":"We present a novel and practical approach to the Dragon Boat Partition Problem (DBP), in which we need to assign rowers to the opposite sides of a dragon boat, such that certain requirements are satisfied. An example of the requirements is that weights on the right side and left side are balanced. While DBP is essentially an integer partition problem, it has its own unique characteristics. Our approach is greedy and heuristic and tackles DBP effectively, showing its practicality in real applications. The performance of our proposed approach is demonstrated through a set of simulated experiments and various related issued are discussed.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Anomaly Detection and Network Filtering System for Linux Based on Kohonen Maps and Variable-order Markov Chains 基于Kohonen映射和变阶马尔可夫链的Linux异常检测和网络过滤系统
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953860
S. Staroletov, Roman Chudov
{"title":"An Anomaly Detection and Network Filtering System for Linux Based on Kohonen Maps and Variable-order Markov Chains","authors":"S. Staroletov, Roman Chudov","doi":"10.23919/FRUCT56874.2022.9953860","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953860","url":null,"abstract":"Modern cyber-physical systems can be defined as distributed systems for processing data from various sensors, while the distribution is provided by a data transmission network. With the complexity of the hardware base, the components of such a system can be executed on minicomputers running the Linux operating system, and solve problems of routing packets and processing them in order to determine software-defined routes. Accordingly, such systems are subject to attacks from outside, which can lead to anomalies in the operation of network subsystems, Therefore, it is necessary to have systems for detecting anomalies in real time, and such tools must be lightweight since the performance of minicomputers is limited. In this paper, we consider a solution for processing network packets at the second OSI level and building detectors based on Markov chains of variable order as well as traffic classification using self-organized Kohonen maps. These solutions are based on well known fundamental works by Russian and Finnish mathematicians and computer scientists, their modern practical applications, so we describe all the used concepts. We present all necessary architectural solutions and algorithms. As a result, we offer a free software solution for Linux as the basis for implementing effective intelligent firewalls. The solution inside is based on a Netfilter hook and packet_mmap.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129698735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification Accuracy Comparison between Machine Learning Algorithms and a Deep Learning Algorithm in Predicting Hand Gestures 机器学习算法与深度学习算法在手势预测中的分类准确率比较
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953843
Shahed Alam, Md Saif Kabir, Md. Naveed Hossain, Quazi Rian Hasnaine, Md. Golam Rabiul Alam
{"title":"Classification Accuracy Comparison between Machine Learning Algorithms and a Deep Learning Algorithm in Predicting Hand Gestures","authors":"Shahed Alam, Md Saif Kabir, Md. Naveed Hossain, Quazi Rian Hasnaine, Md. Golam Rabiul Alam","doi":"10.23919/FRUCT56874.2022.9953843","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953843","url":null,"abstract":"In this paper four Machine Learning (ML) Algorithms that are known to provide high accuracy in classifying hand gestures have been implemented for the classification of four hand gestures using electromyography (EMG) dataset. The classi-fiers opted are Support Vector Machine (SVM), Random Forest (RF), Bagged tree and Extreme Gadient Boosting (XGBoost). The prediction accuracy of the machine learning algorithms were subsequently compared with Long Short-Term Memory (LSTM) which is a Deep learning based classification technique. Among the machine learning algorithms, XGBoost provided the highest accuracy of approximately 97% while LSTM provided a superior accuracy close to 99% which promises to provide the physiologically natural upper-limb movement control. In addition to the pursuit of improved accuracy in the research, the effect of removing the noisiest channel in the accuracy of the algorithms has been examined in order to decrease the volume of data processing.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116732571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology Concept Extraction Algorithm for Deep Neural Networks 深度神经网络本体概念提取算法
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953838
A. Ponomarev, A. Agafonov
{"title":"Ontology Concept Extraction Algorithm for Deep Neural Networks","authors":"A. Ponomarev, A. Agafonov","doi":"10.23919/FRUCT56874.2022.9953838","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953838","url":null,"abstract":"An important drawback of deep neural networks limiting their application in critical tasks is the lack of explainability. Recently, several methods have been proposed to explain and interpret the results obtained by deep neural networks, however, the majority of these methods are targeted mostly at AI experts. Ontology-based explanation techniques seem promising, as they can be used to form explanations using domain terms (corresponding to ontology concepts) and logical statements, which is more understandable by domain experts. Recently, it has been shown, that inner representations (layer activations) of deep neural network can often be aligned with ontology concepts. However, not every concept can be matched with the output of every layer, and it can be computationally hard to identify the particular layer that can be easily aligned with the given concept, which is aggravated by the number of concepts in a typical ontology. The paper proposes an algorithm to address this problem. For each ontology concept it helps to identify neural network layer, which produces output that can be best aligned with the given concept. These connections can then be used to identify all the ontology concepts relevant to the sample and explain the network output in a user-friendly way.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116329645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Named Entity Recognition for Russian Judicial Rulings Text 俄罗斯司法判决书文本的命名实体识别
2022 32nd Conference of Open Innovations Association (FRUCT) Pub Date : 2022-11-09 DOI: 10.23919/FRUCT56874.2022.9953892
M. Averina, O.V. Levanova, Natalia Kasatkina
{"title":"Named Entity Recognition for Russian Judicial Rulings Text","authors":"M. Averina, O.V. Levanova, Natalia Kasatkina","doi":"10.23919/FRUCT56874.2022.9953892","DOIUrl":"https://doi.org/10.23919/FRUCT56874.2022.9953892","url":null,"abstract":"The article presents the solution of named entity recognition problem for legal Russian-language texts. We studied CRF, LSTM, BERT and BiLSTM and their combinations. The models were tested with various parameters of text preprocessing and words vector representations. The best result was shown by fastext vectorization with BiLSTM and CRF model, the value $F-score$ is 0.86.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122471204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信