{"title":"An Empirical Comparison of BERT, RoBERTa, and Electra for Fact Verification","authors":"Muchammad Naseer, M. Asvial, R. F. Sari","doi":"10.1109/ICAIIC51459.2021.9415192","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415192","url":null,"abstract":"We reviewed some features of a number of fact verification techniques by comparing 3 (three) algorithms, namely BERT, RoBERTa, and Electra. These 3 (three) algorithms have different advantages, i.e., BERT and RoBERTa predict hidden words using a huge dataset, and Electra verifies facts by detecting tokens that are replaced in a text or sentence. It is necessary to find the model with a good performance evaluation value to produce the best fact verification results. The evaluation of the performance model in this study uses the F1-Score. Our experimental results show that RoBERTa achieves the best accuracy and F1-Score with a value of 95.4% and 95.3% with the parameter value of epoch of 5 (five) and a batch size of 32. The second position is occupied by BERT, with the best result of accuracy and F1-Score at the same value of 94.3% with the epoch of10 (ten) and a batch size of32. Although it provides a shorter elapsed time, unfortunately, Electra does not outperform other models in fact verification.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125933991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelization of Levelset-based Text Baseline Detection in Document Images","authors":"Hyeonwoo Jeong, Ye-Chan Choi, Kang-Sun Choi","doi":"10.1109/ICAIIC51459.2021.9415268","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415268","url":null,"abstract":"In this paper, we propose a text baseline detection method. The proposed method is based on a strategy of object separation in a binary image that consists of three steps. The first step is making a binary image with sobel edge detection and mathematical morphology operation to take a approximated text area from the ordinary document image. In the second step, line segments which are candidates for text baselines, are extracted by parallel levelset method. The last step fits a line from each segment with parallel random sample consensus and selects appropriate lines automatically. For parallel computation, OpenMP that is standard API for shared memory parallel programming in C/C++ is used.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129665394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Q-learning for 5G network slicing with diverse resource stipulations and dynamic data traffic","authors":"Debaditya Shome, Ankit Kudeshia","doi":"10.1109/ICAIIC51459.2021.9415190","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415190","url":null,"abstract":"5G wireless networks use the network slicing technique that provides a suitable network to a service requirement raised by a network user. Further, the network performs effective slice management to improve the throughput and massive connectivity along with the required latency towards an appropriate resource allocation to these slices for service requirements. This paper presents an online Deep Q-learning based network slicing technique that considers a sigmoid transformed Quality of Experience, price satisfaction, and spectral efficiency as the reward function for bandwidth allocation and slice selection to serve the network users. The Next Generation Mobile Network (NGMN) vertical use cases have been considered for the simulations which also deals with the problem of international roaming and diverse intra-use case requirement variations by using only three standard network service slices termed as enhanced Mobile Broadband (eMBB), Ultra Reliable Low Latency Communication (uRLLC), and massive Machine Type Communication (mMTC). Our Deep Q-Learning model also converges significantly faster than the conventional Deep Q-Learning based approaches used in this field. The environment has been prepared based on ITU specifications for eMBB, uRLLC, mMTC. Our proposed method demonstrates a superior Quality-of-experience for the different users and the higher network bandwidth efficiency compared to the conventional slicing technique.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131298754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. I. Nwakanma, F. Islam, Mareska Pratiwi Maharani, Dong-Seong Kim, Jae-Min Lee
{"title":"IoT-Based Vibration Sensor Data Collection and Emergency Detection Classification using Long Short Term Memory (LSTM)","authors":"C. I. Nwakanma, F. Islam, Mareska Pratiwi Maharani, Dong-Seong Kim, Jae-Min Lee","doi":"10.1109/ICAIIC51459.2021.9415228","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415228","url":null,"abstract":"In this paper, we used a vibration sensor known as G-Link 200 to collect real time vibration data. The sensor is connected through the internet gateway and Long Short Term Memory (LSTM) used for the classification of sensor data. The classification allows for detecting normal and anomaly activity situation which allows for triggering emergency situation. This is implemented in smart homes where privacy is an issue of concern. Example of such places are toilets, bedrooms and dressing rooms. It can also be applied to smart factory where detecting excessive or abnormal vibration is of critical importance to factory operation. The system eliminates the discomfort for video surveillance to the user. The data collected is also useful for the research community in similar research areas of sensor data enhancement. MATLAB R2019b was used to develop the LSTM. The result showed that the accuracy of the LSTM is 97.39% which outperformed other machine learning algorithm and is reliable for emergency classification.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zengchao Duan, Norihiro Okada, Aohan Li, M. Naruse, N. Chauvet, M. Hasegawa
{"title":"High-speed Optimization of User Pairing in NOMA System Using Laser Chaos Based MAB Algorithm","authors":"Zengchao Duan, Norihiro Okada, Aohan Li, M. Naruse, N. Chauvet, M. Hasegawa","doi":"10.1109/ICAIIC51459.2021.9415234","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415234","url":null,"abstract":"NOMA has become one of the most concerned technologies in 5G technology due to its efficiency in improving spectrum utilization by exploiting power domain technology. Efficient pairing techniques are needed to avoid system performance decrease affected by Successive Interference Cancellation (SIC) execution errors in NOMA. Generally, user pairing in NOMA is based on the distance between the Base Station (BS) and the users, which may lead extra time consumption in measuring distance. To reduce the communication latency caused by user pairing, we propose an ultra-fast user pairing algorithm using laser chaos based Multi-Armed-Bandit (MAB) algorithm. It has been shown that ultra-fast and high-performance decision making on the order of GHz can be achieved by applying laser chaos based MAB algorithm. In our proposed algorithm, user pairing is based on all possible pairing combination instead of distance. Simulation results show that our proposed algorithm can achieve higher throughput than the state-of-the-arts NOMA pairing algorithms, i.e., C-NOMA and UCGD-NOMA, with high speed under different radii of communication area.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114936465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taisho Sasada, Masataka Kawai, Yuzo Taenaka, Doudou Fall, Y. Kadobayashi
{"title":"Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss","authors":"Taisho Sasada, Masataka Kawai, Yuzo Taenaka, Doudou Fall, Y. Kadobayashi","doi":"10.1109/ICAIIC51459.2021.9415242","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415242","url":null,"abstract":"To provide user-generated texts to third parties, various anonymization used to process the texts. Since this anonymization assume the knowledge possessed by the adversary, sensitive information may be leaked depending on the adversary’s knowledge even after this anonymization. Moreover, setting the strongest assumptions about the adversary’s knowledge leads to the degradation of the utility as the data by removing any quasi-identifiers. Therefore, instead of providing original data, a method to generate differentially-private synthetic data has been proposed. Differential privacy is more flexible than anonymization technologies because it does not require the assumption of the adversary’s knowledge. However, if a large noise is added to the gradient in text generative model to satisfy differential privacy, the utility of the synthetic text is degraded. Since differential privacy can be satisfied with a small noise in data containing duplicates, it is possible to reduce utility loss as text by creating duplicates before adding noise. In this study, we reduce the amount of noise added by creating duplicates through generalization, thereby minimizing text utility loss. By constructing a differentially-private text generation model, we can provide synthetic text and promote text utilization while protecting privacy information in the text.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128283201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature-Based Deep LSTM Network for Indoor Localization Using UWB Measurements","authors":"Alwin Poulose, D. Han","doi":"10.1109/ICAIIC51459.2021.9415277","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415277","url":null,"abstract":"Indoor localization using ultra-wideband (UWB) measurements is an effective localization approach when the localization system exists in non-line of sight (NLOS) conditions from the indoor experiment area. In UWB-based indoor localization, the system estimates the user’s distance information using anchor-tag communication. The user’s distance information in the UWB system is an influencing factor to determine localization performance. A deep learning-based localization system uses the raw distance information for model training and testing and the model predicts the user’s current positions. Recently developed deep learning-based UWB localization approaches achieve the best localization results when compared to conventional approaches. However, when the deep learning models use raw distance information, the system lacks sufficient features for training and this is reflected in the model’s performance. To solve this problem, we propose a feature-based localization approach for UWB localization. The proposed approach uses deep long short-term memory (DLSTM) network for training and testing. Using extracted features from the user’s distance information gives a better model performance than raw distance data and the DLSTM network is capable of encoding temporal dependencies and learn high-level representation from the extracted feature data. The simulation results show that the proposed feature-based DLSTM localization system achieved a 5cm mean localization error as compared to conventional UWB localization approaches.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distortion based Watermark Extraction Technique Using 1D CNN","authors":"Yuto Matsunaga, N. Aoki, Y. Dobashi, T. Kojima","doi":"10.1109/ICAIIC51459.2021.9415200","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415200","url":null,"abstract":"We have proposed a novel concept of a digital watermarking technique for music data that focuses on the use (a) of sound synthesis and sound effect techniques. The previous proposed technique was confirmed a vulnerability to high-pass filtering. This paper describes the details of the conventional embedding technique and the improved traction technique that employs the Deep Neural Networks. This paper describes the experimental results of evaluating the resistance of the proposed technique against high-pass filtering. It is demonstrated that the proposed technique in this paper has appropriate resistance (b) against high-pass filtering attack, which was not good at conventional technique.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116958557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Amaizu, Danielle Jaye S. Agron, Jae-Min Lee, Dong-Seong Kim
{"title":"Two-Stage Classification Technique for Malicious DNS Identification","authors":"G. Amaizu, Danielle Jaye S. Agron, Jae-Min Lee, Dong-Seong Kim","doi":"10.1109/ICAIIC51459.2021.9415225","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415225","url":null,"abstract":"Cyber-security for years has been a challenging topic for the research community and most of these attacks have been directed at one of the most critical Internet infrastructure, the domain name system (DNS). DNS attacks are usually catastrophic and often results in loss of sensitive information, hence this paper aims at proffering a solution to these type of attacks. In this paper, a two-stage classification process is proposed for mitigating DNS attacks. The proposed scheme employs long short-term memory in the first stage a convolutional neural network at the second stage. Simulation results show a good classification accuracy for both stages of the proposed scheme.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-View 3D Human Pose Estimation with Self-Supervised Learning","authors":"Inho Chang, Min-Gyu Park, Jaewoo Kim, J. Yoon","doi":"10.1109/ICAIIC51459.2021.9415244","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415244","url":null,"abstract":"Modern 3D human pose estimation builds on a deep learning network, requiring expensive amounts of training data that contain pairs of 2D and 3D pose annotations. In this paper, we propose a self-supervised 3D human pose estimation without 3D annotations. Instead, we exploit multi-view images and camera parameters to make the network learn 3D human pose based on geometric consistency. The merit of the proposed method is validated via experiments.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115683051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}