2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)最新文献
{"title":"A Deep Learning Model for Predicting Damaged Points via Random Vibration Signal Analysis","authors":"M. Sands, Jongyeop Kim, Jinki Kim, Seongsoo Kim","doi":"10.1109/SNPD54884.2022.10051778","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051778","url":null,"abstract":"Structural health monitoring is an area of growing interest and is worthy of new and innovative approaches. Since the automatic diagnosis of structures is very complex and challenging, recent research to apply deep learning techniques has been actively conducted. In this study, we assumed that a PLA beam copied by 3D printing is the smallest unit constituting a complex structure and applied GRU to detect defects. To set the defect point of the beam, a total of four holes were drilled at regular intervals, and then a mass was attached. Signals at different locations were collected through a vibrator and trained through GRU, and the results were compared in terms of RMSE value. As a result of this experiment, we checked the defect by inputting test data into the trained model and were able to measure the defect degree of the PLA beam with a weighted average F1 score of 84%.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133318989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Undeniable Vaccine Production Protocol with Blockchain and IPFS","authors":"Ming-Te Chen, Jih-Ting Wang","doi":"10.1109/SNPD54884.2022.10051792","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051792","url":null,"abstract":"Vaccination is the most effective way to prevent related diseases, and the age distribution ranges from infants to the elderly, so people are hesitant to get vaccinated when they are not sure whether the vaccine is safe, and due to the expiration of vaccines and vaccine fraud, people are concerned about the process of vaccine production. Concerned and distrustful of vaccine production companies, in order to prevent companies from modifying or falsifying the data in the vaccine production process without permission and making the data related to the production process correspond to the product. There is a secure and public data storage space as a traceable basis for problems can be used in the product in the future. This paper designs a vaccine product safety production process supervision system based on blockchain and IPFS, so that the current data of the vaccine production process is stored in a decentralized space, and the data of each machine in the production process of the vaccine enterprise is hashed and calculated. A digital signature together with the timestamp is used as the undeniable data of the machine to ensure the security and non-repudiation of the data generated by each machine during the vaccine production process, and the hash operation prevents the production data of the manufacturer from leaking. At the same time, it allows government examiners to track the production process of each batch of vaccine through encrypted data stored in the blockchain and IPFS to prevent companies from privately modifying or falsifying data, and allows examiners to pass certain data with a highly trusted Decentralized storage space to assist it in judging whether the enterprise has committed illegal activities, and use the above methods to implement a decentralized supervision system for the safety production process of vaccine products.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125029116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Factors for the Adoption of Blockchain Technology: A Case of the Australian Retail Sector","authors":"Ashim Nikunj Chapagain, S. Grandhi, J. Hassan","doi":"10.1109/SNPD54884.2022.10051769","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051769","url":null,"abstract":"Australian retail sector has fallen victim to the recent lockdowns due to COVID-19 pandemic, which forced retailers to adopt new technologies to conduct business online. As a result, several businesses are attempting to use Blockchain technology to enhance security and promote transparency. Prior studies indicated the importance of human factors in technology adoption decisions. However, there is limited research on how human factors play out in blockchain technology adoption decisions in the Australian retail sector. Therefore, this study identifies the human factors and presents a research model to investigate their influence on technology adoption decisions in the Australian retail sector. The proposed study will use a quantitative approach and collects data using online survey questionnaires. This study will test the derived hypotheses using the structural equation modelling technique. This study is expected to help develop appropriate policies to enhance blockchain technology adoption in the Australian retail sector.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129677912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dashuai Guo, Po-Hsun Chueh, Deyan Liu, Joseph. K.H. Wang
{"title":"On-Site Monitoring of Forging Press: An Application of Volapu IIoT Suite","authors":"Dashuai Guo, Po-Hsun Chueh, Deyan Liu, Joseph. K.H. Wang","doi":"10.1109/SNPD54884.2022.10051772","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051772","url":null,"abstract":"In the process of implementing the transformation and upgrading of Industry 4.0, in order to protect the existing investment of manufacturing customers, we often need to do digitized transformation and upgrade of the existing equipment on the production site. In order to achieve this task quickly, we have designed and developed an out-of-the-box industrial Internet of Things system for industrial sites, Volapu IIoT Suite, which can be flexibly configured according to the needs of different production equipment. In this paper, we take the transformation of the Internet of Things of the forging press as an example, and give an on-site data collection plan for the forging press and an example of analysis of production data.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meng-Wei Chang, I. Liu, Chuan-Kang Liu, Wei-Min Lin, Zhi-Yuan Su, Jung-Shian Li
{"title":"A Non-normal Warning System for Dam Operation Using Machine Learning","authors":"Meng-Wei Chang, I. Liu, Chuan-Kang Liu, Wei-Min Lin, Zhi-Yuan Su, Jung-Shian Li","doi":"10.1109/SNPD54884.2022.10051787","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051787","url":null,"abstract":"A country's critical infrastructures are heavily related to the quality of life and safety of the people. As a result, the security protection aspect of critical infrastructure has gained more and more attention nowadays, especially the security of its industrial control system (ICS). To avoid the abnormal condition happening in the critical infrastructure which could put people in great danger, a system that is capable of detecting any abnormal state of the ICS promptly is needed. Fortunately, due to the dramatic growth of the applications of machine learning in recent years, some researchers have already proposed anomaly detection methods with machine learning to provide instant warning and protection for ICS. However, most of the existing anomaly detection research tends to only target one cause that harms the system, such as attacks on the network or physical equipment failures. The ICS will be more comprehensively secured if the anomaly detection system can cover multiple aspects of the ICS. Therefore, we have established a non-normal warning system with the Generative Adversarial Network (GAN) for dam operations in this study, which can detect various types of non-normal operations and notify relevant personnel right away. Note that we use real historical data to make predictions and verify our warning system, and we improve it even more by implementing the visual analysis method, which makes up the indecipherable results often found in unsupervised learning.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128124961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Full-reference Video Quality Assessment Method for 4K UHD Video based on Multi-Feature Fusion","authors":"Yi Geng, Ping Shi, Da Pan","doi":"10.1109/SNPD54884.2022.10051773","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051773","url":null,"abstract":"Video quality assessment plays an important role in the quality control of video transmission and the development of video processing equipment and algorithms. With the popularity of UHD TV, the demand for UHD video quality assessment is becoming more and more urgent. In this paper, we propose a method for 4K UHD video quality assessment based on multi-feature fusion (MFF- VQA). First, we select eight frame-level features which could better reflect the perceived video quality through a series of ablation experiments. Then, we present a scheme which can fuse the eight features into a quality score. Experimental results show that, compared with other similar methods, the proposed method can achieve better performance even with lower algorithm complexity and fewer video frames.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"StyleFormerGAN-VC:Improving Effect of few shot Cross-Lingual Voice Conversion Using VAE-StarGAN and Attention-AdaIN","authors":"Dengfeng Ke, Wenhan Yao, Ruixin Hu, Liangjie Huang, Qi Luo, Wentao Shu","doi":"10.1109/SNPD54884.2022.10051811","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051811","url":null,"abstract":"Voice Conversion (VC) aims to transfer the speaker timbre while retaining the lexical content of the source speech and has attracted much attention lately. Although previous VC models have achieved good performance, unstability can not be avoided when it comes cross-lingual scenario. In this paper, we propose the StyleFormerGAN-VC to achieve better cross language speech conversion, where variational auto-encoder is introduced to model the feature distribution of the cross-lingual utterances and adversarial training is applied to elevate the speech quality. In addition, we combine the Attention mechanism and AdaIN to make our model more generalized to unseen speaker with long utterance. Experiments show that our model performs stably in the cross-lingual scenario and gains well MOS evaluation scores.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Specification and Verification of Drone System using TLA+: A Case Study","authors":"Madhusmita Das, Biju R. Mohan, R. R. Guddeti","doi":"10.1109/SNPD54884.2022.10051801","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051801","url":null,"abstract":"A Safety-Critical System is a System whose break-down may cause disastrous effects to the environment, damage the system, or cause loss of life. Sometimes loss or misuse of information can indirectly cause harmful impacts due to system failure. In this paper, we study the various components of a drone system and analyze the safety of this Safety-Critical System (SCS) by looking into the potential failure using Fault Tree Analysis (FTA). Drone system failure or crash has been specified and verified using the Temporal Logic of Actions (TLA+) tool. The TLA+ tool consists of mathematical notations to describe the system specification using discrete mathematical concepts or formal methods. We tried to build a TLA+ Specification and Verification for this drone system, parse it using the TLC model checker successfully, and observed the final number of states to justify the correctness of the specification.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128724351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Approach of Machine Learning to Optimize the Bank-Customer Interaction at Pandemic Epochs","authors":"H. Nieto-Chaupis","doi":"10.1109/SNPD54884.2022.10051784","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051784","url":null,"abstract":"Along the pandemic created by the Corona virus 2019 (Covid-19 in shorthand), the global economy was observed to experience various turbulent months that were reflected by the increasing of unemployment and the apparition of a procrastinator behavior in all those customers that received a loan at the months before the beginning of pandemic. Because the apparition of pandemic was totally random, it had effects on the micro-economy that in most cases have turned out on the cuts of salaries. From a basic modeling of loan and Gaussian approach, the criteria of Mitchell are employed. The resulting simulations have yielded that up to a 50% of loaned volume of cash would be recovery. It was found that entropic situations would be in part a cause for the deficient management of loans in epochs of pandemic and crisis.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128522930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marielet Guillermo, Maverick Rivera, Ronnie S. Concepcion, R. Billones, A. Bandala, E. Sybingco, A. Fillone, E. Dadios
{"title":"Graph Database-modelled Public Transportation Data for Geographic Insight Web Application","authors":"Marielet Guillermo, Maverick Rivera, Ronnie S. Concepcion, R. Billones, A. Bandala, E. Sybingco, A. Fillone, E. Dadios","doi":"10.1109/SNPD54884.2022.10051802","DOIUrl":"https://doi.org/10.1109/SNPD54884.2022.10051802","url":null,"abstract":"Public transportation is the key economic driver of a country. The true measure of a country's progress level is scaled on the number of people using the public transportation rather than of people riding private cars. In the Philippines, Western Visayas region (Region VI) is one of the regions which needs extensive support in public transport data organization. Due to the complexity of a public transport network, handling of big data becomes a bottleneck for transport planners. Addressing this problem will help them move forward to more important tasks such as improving transport service for passengers. In this study, a framework was designed in modeling public transportation data. TigerGraph database was utilized to preconnect data and to allow acquisition of geospatial intelligence on route while Django-python was used as the web framework for the geographic insight web application. With the framework and software solution developed, the study intended to make data organization scalable, visualize data relationships, and preconnect data. Preconnecting data in public transport such as terminals, PUV stops, and facilities in conjunction with massive parallel processing (MPP) function, speeds up data analysis. This also enables expanded capability of a system to return answers to queries which need deeper analysis.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126254096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}