2017 IEEE International Conference on Computer and Information Technology (CIT)最新文献

筛选
英文 中文
Learning From Big Data: A Survey and Evaluation of Approximation Technologies for Large-Scale Reinforcement Learning 从大数据中学习:大规模强化学习的近似技术综述与评价
Cheng Wu, Yiming Wang
{"title":"Learning From Big Data: A Survey and Evaluation of Approximation Technologies for Large-Scale Reinforcement Learning","authors":"Cheng Wu, Yiming Wang","doi":"10.1109/CIT.2017.11","DOIUrl":"https://doi.org/10.1109/CIT.2017.11","url":null,"abstract":"A key problem in large-scale reinforcement learning is to deal with big data, in terms of a very large number of environment states and many possible actions. Function approximation can improve the ability of a reinforcement learner to solve large-scale problems. Tile coding and Kanerva coding are two classical methods for implementing function approximation, but these methods may give poor performance when applied to large-scale, high-dimensional instances. In the paper, we evaluate a collection of hard instances of the predator-prey pursuit problem, a classic reinforcement learning platform with scalable state-action space, to compare these two methods and their optimization techniques. We first show that Kanerva coding gives better results than Tile coding when the dimension of the instances increases. We then describe a feature optimization mechanism and show that it can increase the fraction of instances that are solved by both Tile coding and Kanerva coding. Finally, we demonstrate that a fuzzy approach to function approximation can further increase the fraction of instances. We show that our fuzzy approach to Kanerva coding outperforms fuzzy Tile coding when feature optimization is applied. We conclude that discrete and fuzzy Kanerva coding represent powerful function approximation techniques that can outperform discrete and fuzzy Tile coding on large-scale, high-dimensional learning problems.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130618618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Method of Error Reduction for Affine Projection Algorithm 一种新的仿射投影算法误差减小方法
S. Koike
{"title":"A New Method of Error Reduction for Affine Projection Algorithm","authors":"S. Koike","doi":"10.1109/CIT.2017.18","DOIUrl":"https://doi.org/10.1109/CIT.2017.18","url":null,"abstract":"This paper proposes a new method of reducing the steady-state error for the Affine Projection Algorithm (APA) using Error Reduction Factor (ERF) to yield Error Reduction Affine Projection Algorithm (ER-APA). The proposed method is very simple but highly effective. In the paper, we analyze the ER-APA for calculating theoretical filter convergence. Through experiments, it is shown that the ER-APA sufficiently reduces the steady-state error for any value of the dimension of projection, while preserving the fast convergence property of the APA.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132429666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software-Defined Edge Defense Against IoT-Based DDoS 针对物联网DDoS的软件定义边缘防御
Ihsan Mert Ozcelik, Niaz Chalabianloo, Gürkan Gür
{"title":"Software-Defined Edge Defense Against IoT-Based DDoS","authors":"Ihsan Mert Ozcelik, Niaz Chalabianloo, Gürkan Gür","doi":"10.1109/CIT.2017.61","DOIUrl":"https://doi.org/10.1109/CIT.2017.61","url":null,"abstract":"Industries, people's activities and urban infrastructure rely more and more on \"Internet of Things\" (IoT) devices for all kinds of activities and operations. Although securing a computer network has always been a difficult task, it transmutes into a massive challenge with the exponentially-growing network size and heterogenity in these systems. A recent example in that vein is a major security violation in the form of DDoS attacks which were performed by a huge number of IoT devices infected with a botnet called \"Mirai\". Moreover, the role of these devices as control, sensing and communication substrate in critical infrastructures aggravate such problems. Nevertheless, there are some new networking concepts and technologies which promise to offer remedies for the aforementioned challenges; one is software-defined networking (SDN) and another one is fog computing, which primarily provide global network control and local services, respectively. In this paper, we introduce a edge-oriented detection/mitigation scheme against DDoS in IoT using SDN and Fog approaches while utilizing Mirai as the case study.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
3D Matrix-Based Visualization System of Association Rules 基于三维矩阵的关联规则可视化系统
Tingting Zhang, Zheng Chang, T. Ristaniemi, Guohua Liu
{"title":"3D Matrix-Based Visualization System of Association Rules","authors":"Tingting Zhang, Zheng Chang, T. Ristaniemi, Guohua Liu","doi":"10.1109/CIT.2017.39","DOIUrl":"https://doi.org/10.1109/CIT.2017.39","url":null,"abstract":"With the growing number of mining datasets, it becomes increasingly difficult to explore interesting rules because of the large number of resultant and its nature complexity. Studies on human perception and intuition show that graphical representation could be a better illustration of how to seek information from the data using the capabilities of human visual system. In this work, we present and implement a 3D matrix-based approach visualization system of association rules. The main visual representation applies the extended matrix-based approach with rule-to-items mapping to general transaction data set. A novel method merging rules and assigning weight is proposed in order to reduce the dimension of the association rules, which will help users to find more important items in the new rule. Furthermore, several interactions such as sorting, filtering, zoom and rotation, facilitate decision-makers to explore the rules which are of interest in various aspects. Finally, extensive evaluations have been conducted to assess the system from a logical reasoning point of view.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122086220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDS 云IEC 61850:使用OpenDDS的虚拟化环境中的DDS性能
R. Ferreira, R. S. Oliveira
{"title":"Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDS","authors":"R. Ferreira, R. S. Oliveira","doi":"10.1109/CIT.2017.17","DOIUrl":"https://doi.org/10.1109/CIT.2017.17","url":null,"abstract":"The idea of using Virtualization and Cloud as the underlying infrastructure for future automation systems in the context of the Internet of Things has been presented in the literature. This paper presents the assessment of the end-to-end performance of a distributed and virtualized architecture from the DDS communication middleware layer, running the performance test benchmark applications of the OpenDDS implementation. The experimental distributed and virtualized environment used considers two ordinary physical hosts connected by a single network. The virtualization layer is realized with KVM as hosted hypervisor with Ubuntu Linux and TinyCore as Guest-OS. A set of test scenarios combining host-host, host-VM and VM-VM communications is defined. Each test consist of publishing circa 11 thousand messages of 250 bytes for each one of the different transport protocol supported by OpenDDS. The round-trip time is measured for each message or sample, from which the respective latency and jitter are calculated. The results obtained are presented in tabular and graphical formats. The results show that soft real-time applications with deadlines up to 1 ms could be run in such virtualized environment. We show that is reasonable to consider the potential of running automation applications on a distributed and virtualized environment. The contribution of this study is to provide information, based on the proposed reference architecture and its time characterization, to engineers responsible for the design of automation solutions to start considering and assessing the use of modern computing architectures and technologies, specially virtualization and communication middlewares, in new engineering projects.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic Reconfiguration of Architecture in the Communication Network of Air Traffic Management System 空中交通管理系统通信网络体系结构的动态重构
I. Kabashkin
{"title":"Dynamic Reconfiguration of Architecture in the Communication Network of Air Traffic Management System","authors":"I. Kabashkin","doi":"10.1109/CIT.2017.13","DOIUrl":"https://doi.org/10.1109/CIT.2017.13","url":null,"abstract":"Communication between air traffic controllers and pilots remains a vital part of air traffic control operations, and communication problems can result in hazardous situations. The modern Air Traffic Management (ATM) system has independent direct communication channels (CC) for each controllers operating at different radio frequencies. Currently, the main method of improving the reliability of controller's CC is redundancy of equipment to provide communications on each frequency of interaction ground-to-air channel. The fault tolerance of such method is limited by number of redundancy elements. ATM communication network has periodical sessions of communications with relatively short active periods of communication interactions alternate with relatively long pauses in the translation of signals. The resilience of such network can be improved by dynamic architecture reconfiguration of communication equipment for operation in different channels during communication sessions. In paper the reliability of Air Traffic Management voice communication network with periodical sessions of communications for real conditions of ATM and with different strategies of reconfiguration for set of radio stations is investigated. Mathematical model of the channel reliability is developed. Comparative analysis of reliability for proposed strategies of ATM communication network reconfiguration is performed.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126875008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigating the Agility Bias in DNS Graph Mining DNS图挖掘中的敏捷性偏差研究
Jukka Ruohonen, V. Leppänen
{"title":"Investigating the Agility Bias in DNS Graph Mining","authors":"Jukka Ruohonen, V. Leppänen","doi":"10.1109/CIT.2017.55","DOIUrl":"https://doi.org/10.1109/CIT.2017.55","url":null,"abstract":"The concept of agile domain name system (DNS) refers to dynamic and rapidly changing mappings between domain names and their Internet protocol (IP) addresses. This empirical paper evaluates the bias from this kind of agility for DNS-based graph theoretical data mining applications. By building on two conventional metrics for observing malicious DNS agility, the agility bias is observed by comparing bipartite DNS graphs to different subgraphs from which vertices and edges are removed according to two criteria. According to an empirical experiment with two longitudinal DNS datasets, irrespective of the criterion, the agility bias is observed to be severe particularly regarding the effect of outlying domains hosted and delivered via content delivery networks and cloud computing services. With these observations, the paper contributes to the research domains of cyber security and DNS mining. In a larger context of applied graph mining, the paper further elaborates the practical concerns related to the learning of large and dynamic bipartite graphs.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126252066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Simplified Massive MIMO Approach Using Precoding 一种简化的大规模MIMO预编码方法
M. Silva, R. Dinis
{"title":"A Simplified Massive MIMO Approach Using Precoding","authors":"M. Silva, R. Dinis","doi":"10.1109/CIT.2017.12","DOIUrl":"https://doi.org/10.1109/CIT.2017.12","url":null,"abstract":"This paper considers the use of massive multiple input, multiple output (MIMO) combined with single-carrier with frequency-domain equalization (SC-FDE) modulations using a precoding approach. Although millimeter wave (mm-Wave) communications are expected to be a key part of 5G, these frequencies present considerable challenges due to high propagation free-space path losses and implementation difficulties. For this reason, it is desirable to have broadband mm-Wave communications with good power and spectral efficiencies that are compatible with high efficiency amplification. In this paper we propose a massive MIMO (m-MIMO) architecture for broadband mm-Wave communications using precoding approach. We consider three different types of precoding algorithms: Zero Forcing Transmitter (ZFT), Maximum Ratio Transmitter (MRT), and Equal Gain Combiner (EGT). The advantage of both MRT and EGT relies on avoiding the computation of pseudo-inverse of matrices. Their performance of MRT and EGT can be very close to the matched filter bound just after a few iterations of a new proposed interference cancellation, even when the number of receive antennas is not very high.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132490778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CDController: A Cloud Data Access Control System Based on Reputation CDController:基于信誉的云数据访问控制系统
Huaqing Lin, Zheng Yan, R. Kantola
{"title":"CDController: A Cloud Data Access Control System Based on Reputation","authors":"Huaqing Lin, Zheng Yan, R. Kantola","doi":"10.1109/CIT.2017.20","DOIUrl":"https://doi.org/10.1109/CIT.2017.20","url":null,"abstract":"The rapid development of cloud computing is changing the way of service provision, data usage and sharing over the Internet. Cloud data privacy and security protection is a crucial issue that impacts the success of cloud computing and big data. A number of cloud data access control schemes have been proposed in the literature. However, existing solutions suffer from high computation complexity and cost and therefore few of them have been really deployed in practice. In this paper, we introduce a cloud data access control system based on reputation named CDController. The system can securely control cloud data access and effectively reduce access risk according to the reputations of cloud computing entities by applying proxy re-encryption in the situation that the data owner is not available online or does not know how to control the access. System evaluation based on a prototype implementation shows the effectiveness of the CDController.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"619 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115827486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remarks on Adaptive-Type Hypercomplex-Valued Neural Network-Based Feedforward Feedback Controller 自适应型超复值神经网络前馈反馈控制器评述
Kazuhiko Takahashi
{"title":"Remarks on Adaptive-Type Hypercomplex-Valued Neural Network-Based Feedforward Feedback Controller","authors":"Kazuhiko Takahashi","doi":"10.1109/CIT.2017.16","DOIUrl":"https://doi.org/10.1109/CIT.2017.16","url":null,"abstract":"In this study, we investigate the control performance of an adaptive-type feedforward feedback controller using multilayer hypercomplex-valued neural network. The control system consists of a neural network and a feedback controller, whereby the control input of a plant is synthesised online by using the sum of the multilayer hypercomplex-valued neural network and the feedback controller to track the plant output to the desired output generated by a reference model. Computational experiments to control a multiple-input and multiple-output discrete-time nonlinear plant are conducted to evaluate the capability and characteristics of the hypercomplex-valued neural network-based feedforward feedback controller. Experimental results show the feasibility and effectiveness of the proposed controller.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信