Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things最新文献

筛选
英文 中文
Base Station Traffic Prediction based on Feature Selection and Stacking Ensemble Learning 基于特征选择和叠加集成学习的基站流量预测
Long Zhao, Youzhi Huang, Yanyan Wang, Yin Xu, Qiangzhong Feng, Enhong Chen
{"title":"Base Station Traffic Prediction based on Feature Selection and Stacking Ensemble Learning","authors":"Long Zhao, Youzhi Huang, Yanyan Wang, Yin Xu, Qiangzhong Feng, Enhong Chen","doi":"10.1145/3603781.3603800","DOIUrl":"https://doi.org/10.1145/3603781.3603800","url":null,"abstract":"Accurately predicting base station network traffic is of great significance to improve network service quality and reduce base station operating costs. Aiming at the problem of low prediction accuracy of single model in the existing base station traffic prediction methods, a multi-model fusion prediction method based on feature selection and stacking ensemble learning is proposed. Firstly, a large number of features are constructed on the historical data, and then feature selection and correlation verification are carried out based on the tree model, and the features with high correlation are retained as the input of the predictive model to improve the performance and interpretability of the model. On this basis, a stacking ensemble learning prediction model with GDBT, XGBoost, LightGBM as the base learner and MLP as the meta-learner is established, and finally experimental verification is carried out on the real 1731 base stations. The results show that the mean squared error (MSE) and mean absolute error (MAE) of this method are reduced by 9.8% and 4.3%, respectively, compared with the single machine learning prediction model, and have better prediction accuracy and generalization ability.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPU Cluster RDMA communication technology and congestion control GPU集群RDMA通信技术及拥塞控制
Gui Liang, Siti Norbaya Daud, N. Ismail
{"title":"GPU Cluster RDMA communication technology and congestion control","authors":"Gui Liang, Siti Norbaya Daud, N. Ismail","doi":"10.1145/3603781.3603876","DOIUrl":"https://doi.org/10.1145/3603781.3603876","url":null,"abstract":"Abstract. This paper discusses Remote Direct Memory Access(RDMA) communication technology and the congestion control methods for Graphics Processing Unit(GPU) clusters. The implementation methods of RDMA networks widely used in GPU clusters are studied. Three implementation modes including InfiniBand, iWARP, and RoCE are analysed with comparison of their performance and applicable environments. Then, based on the analysis of a new congestion controls algorithm, DBCC & CBFC algorithm, is proposed. This algorithm based on delay feedback control and credit flow control prevents network congestion or increased latency in GPU cluster RDMA networks. The working principles of the algorithm are introduced including calculating the adjustment amount of the sending rate, initializing the sender and receiver and mechanisms to handle packet loss and timeout. Experimental results show that the algorithm optimizes network performance with RDMA communication in GPU clusters, while avoiding congestion and minimizing packet loss. However, due to the limitation of experimental conditions, it is not possible to conduct more environmental tests. In practical application, the applicability of the algorithm needs to be carefully evaluated and adjusted according to the specific situations.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127522657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CryptMTD: Cryptography Based Moving Target Defense System for Mobile Application 基于密码学的移动目标防御系统
Yuehua Lv, Ting Tian, Huanyao Hu, Wei Kui, Dongchuan Lu, Zhengda Zhou
{"title":"CryptMTD: Cryptography Based Moving Target Defense System for Mobile Application","authors":"Yuehua Lv, Ting Tian, Huanyao Hu, Wei Kui, Dongchuan Lu, Zhengda Zhou","doi":"10.1145/3603781.3603875","DOIUrl":"https://doi.org/10.1145/3603781.3603875","url":null,"abstract":"Mobile applications are vulnerable to attacks and information leakage due to various unknown vulnerabilities in mobile channels, terminals, and programs. Moving target defense (MTD) has emerged as a proactive defense technology against unknown attacks. Previous work mainly focused on server-side protection, while ignoring information leakage due to mobile terminal vulnerabilities. In this paper, we construct an MTD system that applies to both servers and terminals. The proposed system uses cryptography to dynamically mask various resources of the system. Interactive supports are provided between those masked resources and the server or the users, thus allowing resources to remain masked during the whole trip. The status and information of the system can be effectively shielded, preventing the mobile application from being sniffed and information leakage. Evaluation is conducted on a DingTalk-based mobile office automation (OA) application. Application results show that the proposed system can thwarts attacks from both the server and the terminal. The response time of the protected system increases by less than 5.8%, compared with the original system, which is applicable for mobile applications.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123029021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long Text Relationship Extraction Method for Complex Productse 复杂产品的长文本关系提取方法
Huaijun Wang, Hangbo Quan, Junhuai Li, Miaomiao Chen, Jiang Xu
{"title":"Long Text Relationship Extraction Method for Complex Productse","authors":"Huaijun Wang, Hangbo Quan, Junhuai Li, Miaomiao Chen, Jiang Xu","doi":"10.1145/3603781.3603920","DOIUrl":"https://doi.org/10.1145/3603781.3603920","url":null,"abstract":"In the data management of complex products, relationship extraction of related texts can assist in constructing product data chains. This can realize the integration and fusion of data chains through nodes with relationships between different data chains. However, due to the complexity of complex products in terms of customer requirements, product technology, and manufacturing process, many related text data contain a large number of complex sentences, and a large amount of referential information is often lost in the relationship extraction of long text in these complex sentences, resulting in poor relationship extraction results. In this paper, we propose a long-text relationship extraction method for complex products, using a pre-trained language model to encode semantic information and obtain input text word vectors, then using a Gaussian graph generator (GGG) to construct potentially directed multi-views, learning graph features more deeply with the help of densely connected graph convolutional networks, and using dynamic time-regularized pooling operations to extract more relationship-dependent indicative words to assist the relationship. The extraction task is completed by combining the graph feature learning results with semantic information embedding representation for relationship extraction. Experiments are conducted on the DialogRE dataset, and the experimental results show that the F1 values reach 66.1% and 63.3% on the validation and test sets, respectively, and the F1 values still exceed 65% when the number of text words exceeds 400, which verifies the feasibility and effectiveness of the proposed method.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126794220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information extraction method of topic webpage based on multi-angle feature learning 基于多角度特征学习的主题网页信息提取方法
Lijuan Liu
{"title":"Information extraction method of topic webpage based on multi-angle feature learning","authors":"Lijuan Liu","doi":"10.1145/3603781.3603797","DOIUrl":"https://doi.org/10.1145/3603781.3603797","url":null,"abstract":"It's difficult to find topic information in the web page because it is slow to find specific information by labor in the process and the result of commonly used methods is inaccurate. This paper proposes a multi-angle feature analysis method for web information identifying. With this method, it mines the characteristics of web page information content in a comprehensive way. Focusing on the characteristics of the web page, the text is segmented, and features are extracted and quantified from multiple perspectives. The fully connected neural network deep learning model is used for training. Besides, use linear classifiers to classify web page. The final experiment shows that this method improves the F value by more than 4% compared with the keyword method and the SVM (Support Vector Machine) method.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attentive Implicit Relation Embedding for Event Recommendation in Event-based Social Network 基于事件的社交网络中事件推荐的注意隐式关系嵌入
Yuan Liang
{"title":"Attentive Implicit Relation Embedding for Event Recommendation in Event-based Social Network","authors":"Yuan Liang","doi":"10.1145/3603781.3603828","DOIUrl":"https://doi.org/10.1145/3603781.3603828","url":null,"abstract":"The event-based social network (EBSN) is a new type of social network that combines online and offline networks, and its primary goal is to recommend appropriate events to users. Most studies do not model event recommendations on the EBSN platform as graph representation learning, nor do they consider the implicit relationship between events, resulting in recommendations that are not accepted by users. Thus, we study graph representation learning, which integrates implicit relationships between social networks and events. First, we propose an algorithm that integrates implicit relationships between social networks and events based on a multiple attention model. Then, the user modeling and event modeling models are fused using a multiattention joint learning mechanism to capture the different impacts of social and implicit relationships on user preferences, improving the recommendation quality of the recommendation system. Finally, the effectiveness of the proposed algorithm is verified in real datasets.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116675506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Privacy-Preserving Reputation Management for Crowdsensing 基于区块链的众传感隐私保护声誉管理
Lei Xu, Yuewei Zhang, Shaorui Song, Liehuang Zhu
{"title":"Blockchain-based Privacy-Preserving Reputation Management for Crowdsensing","authors":"Lei Xu, Yuewei Zhang, Shaorui Song, Liehuang Zhu","doi":"10.1145/3603781.3603929","DOIUrl":"https://doi.org/10.1145/3603781.3603929","url":null,"abstract":"The performance of mobile crowdsensing systems heavily depends on individuals’ participation and the quality of sensing data, because of which the reputation mechanism is of great necessity. However, the mechanism cannot function well if the workers in a crowdsensing system do not behave properly. In this paper, we propose a blockchain-based crowdsensing framework that can resist against the threats to data quality without compromising workers’ privacy. In the proposed framework, a worker is allowed to use different pseudonyms to protect privacy. While the use of pseudonyms will obstruct service providers from evaluating the worker’s reputation. To deal with this issue, we treat reputation as a special type of token, and design a ring signature-based method to anonymously transfer a worker’s reputation score from one pseudonym to another. Moreover, to prevent a malicious worker from taking the advantage of pseudonyms to alter his reputation score, we propose two authentication methods that can verify the legitimacy of a worker’s pseudonym in a privacy-preserving way. The effectiveness of the proposed methods is analyzed theoretically and experimentally.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126983185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CADCN: A click-through rate prediction model based on feature importance CADCN:一种基于特征重要性的点击率预测模型
Qi Wang, Yicheng Di, Yuan Liu
{"title":"CADCN: A click-through rate prediction model based on feature importance","authors":"Qi Wang, Yicheng Di, Yuan Liu","doi":"10.1145/3603781.3603822","DOIUrl":"https://doi.org/10.1145/3603781.3603822","url":null,"abstract":"Recommendation systems are widely used in real-world advertising recommendations. In traditional recommendation system prediction models, click-through rate plays a crucial role. However, traditional recommendation systems cross-combine original features to make the linear model memorable and generalizable while taking into account the importance of features requires a lot of computational cost, and it uses manual cross-combination of features on data, which requires a lot of time and effort. Traditional recommendation systems simply learn the relationship between features without considering the importance of features. We combine deep crossover network and AFM network, dynamically assign weights to different features prior to feature crossover using a synthetic incentive network, and introduce attention mechanism based on feature crossover explicitly. We then propose an advertisement click-through rate prediction based on feature importance model, and the experimental results demonstrate that the algorithm is superior to the deep crossover network in predicting the click-through rate of advertisements.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121236861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Glucose Sensing Utilizing Complex-Valued Neural Networks 利用复值神经网络的葡萄糖传感
Yiqi Lv, X. Meng, Yong Luo, Yan Pei
{"title":"Glucose Sensing Utilizing Complex-Valued Neural Networks","authors":"Yiqi Lv, X. Meng, Yong Luo, Yan Pei","doi":"10.1145/3603781.3603845","DOIUrl":"https://doi.org/10.1145/3603781.3603845","url":null,"abstract":"This paper proposes a Complex-Valued Neural Network (CVNN) for glucose sensing in milli-meter wave (mmWave). Based on the propagation characteristics of millimeter wave in glucose medium, we obtain the S21 parameter of glucose with the concentration range of 0-300mg/dL in the 60–80 GHz frequency band by High Frequency Structure Simulator (HFSS) simulations. Then we combine the sensing model with a neural network to detect and predict the glucose concentration relying on the learning ability of the neural network. In the prediction of the concentration of unknown samples, the absolute error between the predicted value and the true value is within 5mg/dL, which confirms the ability of the proposed CVNN model.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"400 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127680405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on lightweight core network solutions for 5G private networks 5G专网轻量化核心网解决方案研究
Zhichao Zeng, Hong Zhang
{"title":"Research on lightweight core network solutions for 5G private networks","authors":"Zhichao Zeng, Hong Zhang","doi":"10.1145/3603781.3603843","DOIUrl":"https://doi.org/10.1145/3603781.3603843","url":null,"abstract":"Unlike traditional 5G public network services, 5G vertical industry applications have highly customized requirements in terms of coverage, latency, reliability and transmission bandwidth, which differ greatly from traditional public 5G networks, making it difficult to adopt a unified 5G public network architecture and performance requirements. Light-weight 5G Core network can provide a good solution. This paper proposes a lightweight 5G private network architecture design scheme, incorporating Mobile Edge Computing(MEC) architecture on a user side to achieve flexible and mobile rapid deployment of 5G private networks, and proposes a lightweight access authentication process applicable to 5G private networks, reducing redundant processes and improving the overall performance of the system. Through experimental verification, it can effectively reduce the access delay and end-to-end transmission delay of terminals. CCS CONCEPTS•Networks∼Network performance evaluation∼Network experimentation•Networks∼Network architectures∼Network design principles•Networks∼Network protocols∼Cross-layer protocols","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131858493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信