Yunsang Joo, Seungwon Lee, Hyoungju Kim, Pankoo Kim, Seong Oun Hwang, Chang Choi
{"title":"Efficient healthcare service based on Stacking Ensemble","authors":"Yunsang Joo, Seungwon Lee, Hyoungju Kim, Pankoo Kim, Seong Oun Hwang, Chang Choi","doi":"10.1145/3440943.3444727","DOIUrl":"https://doi.org/10.1145/3440943.3444727","url":null,"abstract":"Recently, research using medical big data to predict patients with high probability of disease are receiving a lot of attention. Due to the advancement of artificial intelligence, continuous research is essential in that diseases can be predicted only by computational numbers and can be prevented before they occur. Therefore, machine learning and deep learning research using medical big data for disease prediction are actively progressing. Due to the nature of medical data, diseases are rare, so there is a tendency to oversampling or under sampling that can lead to information distortion. Also, given that most machine learning-based research is based on certain predictive models, there is a risk that the predictions themselves will reflect the biases that exist. So, if you generalize the data your model will train on, or adjust the model's bias, you can get better predictions. In this white paper, we use diabetes, heart disease, and breast cancer data through several individual classifiers to get predicted values and use them as training data for one meta-model to get the final predictions. That is, by constructing a stacking ensemble model, the presence or absence of a disease is predicted, and its performance is analysed through experiments. This model trains multiple classifiers on the same data, so there is a possibility that the model will overfit the data. So, when training multiple classifiers, we compare the model with and without cross validation. In the experiment, the model using cross-validation for training showed an average of 1.4% higher performance than that of the individual single model. On the other hand, the meta-model without cross-validation shows lower performance than that of individual single models. In other words, when constructing a stacking ensemble model, high performance could be obtained only by essentially cross-validating individual single classifiers. Performing one final prediction on the predicted values of high-performance individual models will yield more stable and reliable predictions. The cross-learning-based cumulative ensemble model proposed in this paper predicts the presence or absence of a disease and can be used for medical service development and disease prevention.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent patrol system for Industry 4.0 Smart Factory","authors":"Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu","doi":"10.1145/3440943.3444339","DOIUrl":"https://doi.org/10.1145/3440943.3444339","url":null,"abstract":"The application of the sensor node of the Internet of Things can help managers to grasp the abnormal information of the production equipment and achieve the goal of effective factory management. The integration of a safe control mechanism into the inspection system can reduce the cost of company. Therefore, this paper proposed an intelligent secure and reliable patrol system. It supports the efficiency patrol system and privacy of the information. It also ensures only legally authorized users have right to access the information. We built the intelligent secure and reliable patrol system by using IoT technology and designed a trusted authentication mechanism within a smart, safe and reliable patrol system. The benefits of the system are: Ensuring the security of the transmission. The system user cannot modify the inspection information arbitrarily. It can make the production maintenance mechanism sounder. It will also help companies gradually move towards the goal of Industry 4.0 smart factory to improve the production efficiency of enterprises and increase production capacity.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132249819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed","authors":"Chou-Cheng Chen, Y. Kuo, Chi-Hui Chiang","doi":"10.1145/3440943.3444718","DOIUrl":"https://doi.org/10.1145/3440943.3444718","url":null,"abstract":"In 2016, 12,676 new cases of breast cancer were diagnosed among Taiwan women. In 2018 the standardized death rate of breast cancer was 12.5 per 100,000 persons. Previous studies have integrated data and text mining to yield fusion genes, identify genetic factors for breast cancer and select single-gene feature sets for colon cancer discrimination. However, our study is the first to select significantly different expression between breast normal tissue and cancer using TCGA data and biostatistics, excluding know genes using abstracts from PubMed and natural language processing. The top twenty genes for research potential from the selection of Mining-BreastCancer are EML3, ABCB9, GRASP, KANK3, GPR146, ZNF623, CCDC9, ADCY4, DLL1, ADAM33, GRRP1, LRRN4CL, C14orf180, ABCD4, ABCC6P1, PEAR1, FAM43A, C20orf160, KIF21A and PP-FIA3. Few studies for these genes exist, but they hold significantly different expressions between breast cancer and normal tissue, each pathologic tumor and lymph node, or between each pathologic metastasis. These results show that MiningBreastCancer can help scientists select genes for research potential. MiningBreastCancer is available through http://bio.yungyun.com.tw/MiningBreastCancer.aspx.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128026358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment","authors":"Seong-Jin Kim, K. Park","doi":"10.1145/3440943.3444355","DOIUrl":"https://doi.org/10.1145/3440943.3444355","url":null,"abstract":"Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Training Analysis of Double Canoe Based on IOT","authors":"Jo-Hung Yu, Meng-Tsung Lee, Jao-Chuan Lin, Chien-Hung Wu","doi":"10.1145/3440943.3444344","DOIUrl":"https://doi.org/10.1145/3440943.3444344","url":null,"abstract":"Taiwan is a maritime country. In recent years, due to the open pole of the ocean, outdoor marine leisure sports have been promoted, especially canoeing activities are currently the most popular marine sport in Taiwan. The canoe sport also has competition games: Especially the two-person competition canoe requires two people to coordinate with each other at the same time. Therefore, this article proposes to build a two-person canoe training analysis based on IoT. In this article, an IoT device is installed on the two-person arm. When two people are sliding a canoe, the speed of the G-sensor can be used to judge the problem of coordination between the two parties, and the information proposed in this article will be sent to the platform. The platform will record the rate of each canoe user's sliding. Therefore, the system proposed in this article can be analyzed through platform information. Whether the coordination between the users of both sides is gradually growing, or it needs to be further revised. The method proposed in this article helps to scientifically train players.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125148217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma, Bonam Kim, I. You
{"title":"Comments on \"Securing implantable cardiac medical devices\": Use of radio frequency energy harvesting","authors":"Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma, Bonam Kim, I. You","doi":"10.1145/3440943.3444733","DOIUrl":"https://doi.org/10.1145/3440943.3444733","url":null,"abstract":"Implantable Medical Devices (IMDs) have evolved over the years to stretch their application areas to provide a range of services from health-care to public safety. In order to handle such information, the high strength security and the proper authentication are required. For this, Ellouze et al. have proposed an authentication protocol for IMDs in 2013. The security in IMD that they propose and mention is reasonable, but some aspects are expected to be vulnerable to attack. In addition, not only are such schemes need to be secured, but their security should also be formally verified against their security requirements. Thus, we confirm the security of the authentication protocol for IMDs that have not been objectively verified through formal verification tool such as BAN-logic. Consequently, in this paper, Ellouze et al. are turned out to be insecure.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Algorithm based on Search Economics for Multi-Objective Optimization","authors":"Tzu-Tsai Kao, Chun-Wei Tsai, Ming-Chao Chiang","doi":"10.1145/3440943.3444726","DOIUrl":"https://doi.org/10.1145/3440943.3444726","url":null,"abstract":"An effective multi-objective search algorithm based on a new meta-heuristic algorithm, named search economic (SE), is presented in this study. The basic idea of SE is to first partition the solution space into a certain number of regions to keep the diversity. Then, it will determine the later search directions by the so-called expected value that is composed of the objective values of the best-so-far solution of each region, the searched solutions, and the number of searches invested on a region. More important, the proposed algorithm will invest limited computing resources on promising regions to find a better Pareto optimal set (POS). Different from other search economics-based algorithms, the proposed method uses two transition operators of differential evolution and adds a self adaptive mechanism to tune its parameters. Experimental results show that the proposed algorithm outperforms all the other metaheuristic algorithms compared in this study in most cases in the sense that it can get a more uniformly distributed POS and a smaller distance to the Pareto optimal front.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks","authors":"Y. Ou, Yueming Yu, Yu-Xi Chen, Zhen-Yu Wu","doi":"10.1145/3440943.3444338","DOIUrl":"https://doi.org/10.1145/3440943.3444338","url":null,"abstract":"With the advancement of technology, modern people increasingly tend to communicate with other people through electronic products, and various relationships gradually become alienated, including the Parent-Child Relationship. Parent-child relationship can cultivate children's interaction and trust with other people in social relations, so education systems all over the world encourage the establishment of parent-child relationships to learn together. This research attempted to use children's picture storybooks as study tools to examine parents' and children's attitudes toward an English as a Foreign Language (EFL) parent-child co-learning program. Several parents, and G1 and G2 children, were invited as experimental subjects to participate in a ten-week co-learning program. Experimental results show that parents and children generally have a positive attitude towards the process of joint learning plans.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joochan Lee, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo
{"title":"Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic","authors":"Joochan Lee, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444742","DOIUrl":"https://doi.org/10.1145/3440943.3444742","url":null,"abstract":"In recent years, 1 a large number of studies have been conducted on cybersecurity for Programmable Logic Controllers (PLCs) to cope with cyberattacks on Industrial Control Systems(ICS). However, few studies have been conducted on ensuring cybersafety for control logics running inside PLCs. In this study, a technique for detecting an attack on PLC control logic change was proposed by analyzing the network protocol data and project file structure. Based on the analysis results for the proposed technique, a tool was implemented to detect an manipulation attack on control logic, and whether such attack was detected or not was verified through experiments.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126870014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Jung, Jiho Shin, Chaechang Lee, Kook-huei Kwon, Jung-Taek Seo
{"title":"A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant","authors":"D. Jung, Jiho Shin, Chaechang Lee, Kook-huei Kwon, Jung-Taek Seo","doi":"10.1145/3440943.3444741","DOIUrl":"https://doi.org/10.1145/3440943.3444741","url":null,"abstract":"Recently 1, cyber attacks targeting Industrial Control Systems (ICS) have been increasing rapidly; accordingly, cyber security applications and security evaluations of ICS are becoming very important. Technical Assessment Methodology (TAM) is a method developed by the Electric Power Research Institute (EPRI) in the United States for assessing and applying security control methods for power plants. By applying TAM, limitations of cyber security application and security evaluation of existing nuclear facilities are able to address. In this study, a virtual test bed was composed for one of the safety systems of APR1400, and the TAM was applied and analyzed to derive two advantages and five features of TAM. Based on this, the rationale for using TAM for the application and assessment of security control methods in nuclear facilities was explained, including five considerations for the better application of TAM. Finally, we propose future work for applying TAM.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131853995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}