2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)最新文献

筛选
英文 中文
Studying Offloading Optimization for Energy-Latency Tradeoff with Collaborative Edge Computing 基于协同边缘计算的能量-延迟权衡卸载优化研究
Pranathi Padidem, Ahyoung Lee
{"title":"Studying Offloading Optimization for Energy-Latency Tradeoff with Collaborative Edge Computing","authors":"Pranathi Padidem, Ahyoung Lee","doi":"10.1109/imcom53663.2022.9721745","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721745","url":null,"abstract":"Since the past few years, mobile communication technology is developing very rapidly, Internet of Things (IoT) are getting very popular. Simultaneously, the idea of being smart city and smart home is growing which implies the popularization of smart cars with the ability to drive autonomously. To meet the needs of these rapidly developing industries, huge amount of computing resources are needed to be consumed. Mobile edge computing is one of the most effective solution to the problem of consuming huge amount of power for the complex computations. Elements of mobile edge cloud computing are small to large mobile user devices including IoT-enabled devices. These devices mostly rely on the battery for computational tasks and if the tasks are complex, battery is drained quickly. So to tackle the complex application tasks, a much more advanced computation is required. Additionally, storage, data communication and efficient energy consuming techniques must be used. One of the major challenges while developing energy efficient network is computation offloading and latency minimization. Previous work shows that any one of the challenges can only be achieved if there is good energy efficiency then the latency is more and if there is minimum latency, but the energy consumed is more. In this paper, we are going to suggest specific areas in the collaborative cloud architecture that needs to be improved for achieving both energy efficiency as well as latency minimization. For that, we have implemented various scenarios and observe the areas of improvement.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116937646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Timber Harvesting Residual Trees Damage Decision-Making for Sustainable Forest Management 木材采伐残树损害的可持续森林管理决策
Hana Munira Muhd Mukhtar, Yasmin Yahya, Azizah Rahmat, R. Ismail
{"title":"Timber Harvesting Residual Trees Damage Decision-Making for Sustainable Forest Management","authors":"Hana Munira Muhd Mukhtar, Yasmin Yahya, Azizah Rahmat, R. Ismail","doi":"10.1109/IMCOM53663.2022.9721806","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721806","url":null,"abstract":"Tropical timber forest has played an important role in the Malaysian economy for the last few decades. To manage and determine the acceptable cutting regime that suits the forest stand, environment, cutting cycle, site, and expected timber output is crucial in maintaining forest sustainability. At present, the majority of Malaysian forest concessions are practicing the Selective Management System (SMS) since 1978 which complies with Sustainable Forest Management (SFM) policies. Various studies discovered that in terms of economically, the timber market in Peninsular Malaysia was reduced due to incremental cost in operating SFM. Therefore, revision and adoption of a suitable harvesting method to increase the timber production conform to SFM are required. This study proposed a new method that consists of two calculation layers to determine the potential harvested trees. The first layer calculates the tree felling direction which yields minimum damage to residual trees. The second layer verifies whether each pre-determined tree to be harvested is feasible to be logged by comparing the minimal damage value and volume of residual trees to the volume and value of potential harvestable trees. The methodology chosen is the waterfall model. Meanwhile, the finding of this research; the analysis of the comparison provides a significant impact on the economical point of view.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126858376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Development of the Massive Open Online Course on Distance Forms of Research and Training 远程研究与训练形式的大规模开放式网络课程开发
S. Kratov, A. Podsadnikov
{"title":"The Development of the Massive Open Online Course on Distance Forms of Research and Training","authors":"S. Kratov, A. Podsadnikov","doi":"10.1109/IMCOM53663.2022.9721752","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721752","url":null,"abstract":"The article is devoted to the description of the problem of organizing effective research work and educational process in a distance format. As the solution to support transition from face-to-face to distance work, the authors of the article propose using the massive open online course (MOOC) they have developed. The content of the course covers the main stages of such transition process - the preparation and configuration of the appropriate network infrastructure (addressing and routing in networks, mesh Wi-Fi) and software supporting distance formats of work (cloud data access and office applications suites services).","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114563540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercriminals Strike Where It Hurts Most: SARS-Cov-2 Pandemic and its Influence on Critical Infrastructure Ransomware Attacks 网络罪犯攻击最伤人的地方:SARS-Cov-2大流行及其对关键基础设施勒索软件攻击的影响
Gatha Varma, Ritu Chauhan
{"title":"Cybercriminals Strike Where It Hurts Most: SARS-Cov-2 Pandemic and its Influence on Critical Infrastructure Ransomware Attacks","authors":"Gatha Varma, Ritu Chauhan","doi":"10.1109/imcom53663.2022.9721721","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721721","url":null,"abstract":"The critical infrastructure (CI) of a society are the sixteen entities that facilitate the smooth daily living of its residents. Due to the crucial functionalities, CI elements are the most favored targets of cybercriminals. The situation was further aggravated when the world battled the SARS-Cov-2 pandemic. Due to socio-economic distress and reduced resources, a much higher number of ransomware attacks on CI were reported in the year 2020. To further illuminate the influence of the pandemic on the ransomware trends, the authors divided the data of the reported incidents into two time-frames. The first time-frame spanned the years 2013 till 2019, and the second time-frame covered the pandemic duration of the years 2020 and 2021. The two time frames were analyzed through rich visualizations and it was found that the healthcare sector was targeted much more while it was already struggling. Moreover, new strains like Netwalker and existing strains that preyed on corporate networks were preferred in recent years. The economic distress and call for stricter laws against ransom payments resulted in lesser percentages of ransom payments, but system downtimes stretched to more than a month’s time. Lastly, while cryptocurrency had gained popularity among criminals due to its anonymity potential, continuous research against its misuse has caused a decline in crypto ransom payments.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126880710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Split Learning Model 分裂学习模型的研究
Jihyeon Ryu, Dongho Won, Youngsook Lee
{"title":"A Study of Split Learning Model","authors":"Jihyeon Ryu, Dongho Won, Youngsook Lee","doi":"10.1109/imcom53663.2022.9721798","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721798","url":null,"abstract":"Split learning is considered a state-of-the-art solution for machine learning privacy that takes place between clients and servers. In this way, the model is split and trained, so that the original data does not move to the client from the server, and the model is properly split between the client and the server, reducing the burden of training. This paper introduces the concept of split learning, reviews traditional, novel, and state-of-the-art split learning methods, and discusses current challenges and trends.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RIS-based Energy and Data Transfer Protocol in IoT Networks 物联网网络中基于ris的能量和数据传输协议
Ji-Ho Park, Yijun Piao, Tae-Jin Lee
{"title":"RIS-based Energy and Data Transfer Protocol in IoT Networks","authors":"Ji-Ho Park, Yijun Piao, Tae-Jin Lee","doi":"10.1109/imcom53663.2022.9721795","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721795","url":null,"abstract":"Internet of Things (IoT) devices with Wi-Fi communication can perform efficient battery management through energy harvesting technology. If batteries work efficiently through energy harvesting technology, the number of devices participating in data transmission can be increased, thereby improving the overall data throughput of a network. In an environment with Hybrid-Access Point (H-AP) for energy harvesting, efficient energy supply is difficult because H-AP itself competes with IoT devices. In this paper, we propose a protocol that can provide additional energy to IoT devices that need energy most through Reconfigurable Intelligent Surface (RIS) in a Wireless LAN (WLAN) environment. Through simulations, it is shown that the network throughput and the energy efficiency of IoT devices are improved.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CyberSaver – A Machine Learning Approach to Detection of Cyber Bullying CyberSaver -一种检测网络欺凌的机器学习方法
Hii Lee Jia, Vazeerudeen Abdul Hameed, Muhammad Ehsan Rana
{"title":"CyberSaver – A Machine Learning Approach to Detection of Cyber Bullying","authors":"Hii Lee Jia, Vazeerudeen Abdul Hameed, Muhammad Ehsan Rana","doi":"10.1109/IMCOM53663.2022.9721630","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721630","url":null,"abstract":"In this modern era of extensive use of online resources there has been reports of numerous cases of cyberbullying. Although awareness through medical health support systems such as counselling and psychological assistance is available, a system to combat threats is needed to handle the increasing rate of cyber bullying. This paper presents a model that can be used to detect and report cyberbullying with the use of machine learning techniques. A careful selection of the machine learning algorithms has been identified that could enable better accurate detection. The model was transformed into a prototype in python to evaluate the effectiveness of the model in detecting cyber bullying. The proposed model primarily focusses on test based and image-based threats as they are more common than other forms of cyber bullying.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"360 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120882241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Utilization of Big Data with Cloud Computing in Modern Business Environment: A Review 大数据与云计算在现代商业环境中的应用综述
Mohammed Adnan Islam, Muhammad Ehsan Rana
{"title":"Utilization of Big Data with Cloud Computing in Modern Business Environment: A Review","authors":"Mohammed Adnan Islam, Muhammad Ehsan Rana","doi":"10.1109/IMCOM53663.2022.9721778","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721778","url":null,"abstract":"With the rapid development in Information Technology, the boom of the internet and the explosive growth of social media and other industries, the volume of structured, unstructured, and semi-structured data has seen growth at an unprecedented rate. This has necessitated an entirely new way of transmitting, processing and analysing such volume of data. This paper explores upon the properties that constitute data as being Big, and how Cloud computing is utilized in order to harness the value that is hidden within the Big Data being generated by organizations every day. In addition, this paper delves into how an organisation might make use of various types of cloud computing technologies and their security issues.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121267639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Abstractive Summarization of Korean Legal Cases using Pre-trained Language Models 基于预训练语言模型的韩国法律案例摘要
Jiyoung Yoon, Muhammad Junaid, Sajid Ali, Jongwuk Lee
{"title":"Abstractive Summarization of Korean Legal Cases using Pre-trained Language Models","authors":"Jiyoung Yoon, Muhammad Junaid, Sajid Ali, Jongwuk Lee","doi":"10.1109/IMCOM53663.2022.9721808","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721808","url":null,"abstract":"AI technology in the legal domain has developed at a rapid pace around the world, but not much research is being conducted in the Korean legal field due to barriers of language and the high level of expertise required. We first attempt abstractive summarization of Korean legal decision text and publicly release our collected dataset. We utilize two pretrained language models, i.e., BERT2BERT and BART, for our task. They are based on the encoder-decoder approach under transformer architecture. While BERT2BERT is pre-trained with BERT on both the encoder and decoder, BART combines BERT and GPT as the encoder and the decoder. We then evaluate the baseline models and show that, despite the difference in language style, the high-quality summary was generated using applied models. We also show that pre-training using both autoencoder and autoregressive method makes better performance than using solely denoising autoencoder.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114637567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence an Influential Review: Pandemic Scenario 人工智能:一个有影响力的评论:大流行情景
Ritu Chauhan, A. Sengupta, Eiad Yafi
{"title":"Artificial Intelligence an Influential Review: Pandemic Scenario","authors":"Ritu Chauhan, A. Sengupta, Eiad Yafi","doi":"10.1109/imcom53663.2022.9721753","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721753","url":null,"abstract":"Since the beginning of the 21st century the world had to face several outbreaks ofviral diseases like Chikungunya, Ebola, Nipah, H7H9 Bird flu, H1N1, SARS, MERS and above all the Coronavirus or SARS-CoV-2 which has brought the whole world to a standstill, as of now it as infected around 200 million people and has caused over 4 million deaths. The countries of USA, India, Brazil and Russia have been the most seriously affected countries of all. outbreak of Covid-19 a ‘Public Health Emergency of International Concern’ on 30th January 2020 and a ‘pandemic’ on 11th march 2020. Although the SARS- CoV-2 (Severe acute respiratory syndrome Coronavirus 2) or the Coronavirus has a very low fatality rate i.e. 2.9%, but the most problematic aspect of the Coronavirus is its unusually high infectivity rate. Such unique attributes of the virus called for more stringent and advanced methods of investigation, research and analysis and this is where Artificial Intelligence (AI) comes in; the scientific community strongly believe that AI and data science can be used to fight against the Coronavirus and can fill in the blanks still left by science. In current study of approach, we have emphasis the role of AI during the pandemic and implemented the study. Further, a trend analysis is conducted from year 2020 till 2021 to analyze the pattern for future forecasting.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信