The use of groundwater for drinking water supply to the population is increasingly practiced in the rice cultivation area of Maga. However, there is a lack of knowledge about the hydrochemical characteristics of this ...The use of groundwater for drinking water supply to the population is increasingly practiced in the rice cultivation area of Maga. However, there is a lack of knowledge about the hydrochemical characteristics of this water due to a lack of quality control. This study aims to contribute to the understanding of mineralization processes in order to establish the hydrochemical profile of the water in the area. The methodological approach consisted of collecting fifteen water samples from wells and boreholes during six campaigns for physicochemical analysis, and studying them through methods of interpreting hydrochemical data. The analysis results show that these waters are moderately mineralized. The water facies are mainly of the bicarbonate sodium and potassium type, as well as the bicarbonate calcium and magnesium type. Calculation of saturation indices demonstrates that evaporite minerals show lower degrees of saturation than carbonate minerals, with gypsum, anhydrite, and halite being in a highly undersaturated state. The mineralization of groundwater originates from the dissolution of surrounding rocks on the one hand, and anthropogenic activities involving exchanges between alkalis (Na+ and K+) in the aquifer and alkaline earth (Ca2+ and Mg2+), resulting in the fixation of alkaline earth and the dissolution of alkalis.展开更多
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc...The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.展开更多
Organic wastes are one of the greatest challenges that cities face worldwide. In numerous underdeveloped nations, like Cameroon, waste is often disposed of through landfills, composting, or open-air combustion. Unfort...Organic wastes are one of the greatest challenges that cities face worldwide. In numerous underdeveloped nations, like Cameroon, waste is often disposed of through landfills, composting, or open-air combustion. Unfortunately, the concept of waste sorting and organic waste processing is new to many individuals. This has led to an increase in the amount of organic waste and the costs connected with its management. Consequently, the majority of developing nations have sought out waste management solutions that are more cost-effective. Therefore, it has been determined that the bioconversion of organic wastes by black soldier fly larvae (BSFLs) (Hermetia illucens) into multifunctional prepupae is a viable alternative. Appreciation is given to the employment of the organic waste management approach in developing nations since it is not only environmentally friendly and economically viable, but also provides a means for waste valorisation through the production of diverse resources and potential economic benefits. Studies have proved the usefulness of the insect in controlling organic wastes, but countries such as Cameroon are still unfamiliar with the nuances of this method. Consequently, this timely review examined the performance of the BSFL, specifically in organic waste treatment, as well as the best practices for multiplying them to determine its viability for use in a waste treatment plant, the production of high-quality larvae as a source of protein for livestock, and the production of diesel fuel.展开更多
Intrusion detection involves identifying unauthorized network activity and recognizing whether the data constitute an abnormal network transmission.Recent research has focused on using semi-supervised learning mechani...Intrusion detection involves identifying unauthorized network activity and recognizing whether the data constitute an abnormal network transmission.Recent research has focused on using semi-supervised learning mechanisms to identify abnormal network traffic to deal with labeled and unlabeled data in the industry.However,real-time training and classifying network traffic pose challenges,as they can lead to the degradation of the overall dataset and difficulties preventing attacks.Additionally,existing semi-supervised learning research might need to analyze the experimental results comprehensively.This paper proposes XA-GANomaly,a novel technique for explainable adaptive semi-supervised learning using GANomaly,an image anomalous detection model that dynamically trains small subsets to these issues.First,this research introduces a deep neural network(DNN)-based GANomaly for semi-supervised learning.Second,this paper presents the proposed adaptive algorithm for the DNN-based GANomaly,which is validated with four subsets of the adaptive dataset.Finally,this study demonstrates a monitoring system that incorporates three explainable techniques—Shapley additive explanations,reconstruction error visualization,and t-distributed stochastic neighbor embedding—to respond effectively to attacks on traffic data at each feature engineering stage,semi-supervised learning,and adaptive learning.Compared to other single-class classification techniques,the proposed DNN-based GANomaly achieves higher scores for Network Security Laboratory-Knowledge Discovery in Databases and UNSW-NB15 datasets at 13%and 8%of F1 scores and 4.17%and 11.51%for accuracy,respectively.Furthermore,experiments of the proposed adaptive learning reveal mostly improved results over the initial values.An analysis and monitoring system based on the combination of the three explainable methodologies is also described.Thus,the proposed method has the potential advantages to be applied in practical industry,and future research will explore handling unbalanced real-time datasets in various scenarios.展开更多
Effective smart healthcare frameworks contain novel and emerging solutions for remote disease diagnostics,which aid in the prevention of several diseases including heart-related abnormalities.In this context,regular m...Effective smart healthcare frameworks contain novel and emerging solutions for remote disease diagnostics,which aid in the prevention of several diseases including heart-related abnormalities.In this context,regular monitoring of cardiac patients through smart healthcare systems based on Electrocardiogram(ECG)signals has the potential to save many lives.In existing studies,several heart disease diagnostic systems are proposed by employing different state-of-the-art methods,however,improving such methods is always an intriguing area of research.Hence,in this research,a smart healthcare system is proposed for the diagnosis of heart disease using ECG signals.The proposed framework extracts both linear and time-series information on the ECG signals and fuses them into a single framework concurrently.The linear characteristics of ECG signals are extracted by convolution layers followed by Gaussian Error Linear Units(GeLu)and time series characteristics of ECG beats are extracted by Vanilla Long Short-Term Memory Networks(LSTM).Following on,the feature reduction of linear information is done with the help of ID Generalized Gated Pooling(GGP).In addition,data misbalancing issues are also addressed with the help of the Synthetic Minority Oversampling Technique(SMOTE).The performance assessment of the proposed model is done over the two publicly available datasets named MIT-BIH arrhythmia database(MITDB)and PTB Diagnostic ECG database(PTBDB).The proposed framework achieves an average accuracy performance of 99.14%along with a 95%recall value.展开更多
Intelligent vision-based surveillance systems are designed to deal with the gigantic volume of videos captured in a particular environment to perform the interpretation of scenes in form of detection,tracking,monitori...Intelligent vision-based surveillance systems are designed to deal with the gigantic volume of videos captured in a particular environment to perform the interpretation of scenes in form of detection,tracking,monitoring,behavioral analysis,and retrievals.In addition to that,another evolving way of surveillance systems in a particular environment is human gait-based surveillance.In the existing research,several methodological frameworks are designed to use deep learning and traditional methods,nevertheless,the accuracies of these methods drop substantially when they are subjected to covariate conditions.These covariate variables disrupt the gait features and hence the recognition of subjects becomes difficult.To handle these issues,a region-based triplet-branch Convolutional Neural Network(CNN)is proposed in this research that is focused on different parts of the human Gait Energy Image(GEI)including the head,legs,and body separately to classify the subjects,and later on,the final identification of subjects is decided by probability-based majority voting criteria.Moreover,to enhance the feature extraction and draw the discriminative features,we have added soft attention layers on each branch to generate the soft attention maps.The proposed model is validated on the CASIA-B database and findings indicate that part-based learning through triplet-branch CNN shows good performance of 72.98%under covariate conditions as well as also outperforms single-branch CNN models.展开更多
In the context of rapid digitization in industrial environments,how effective are advanced unsupervised learning models,particularly hybrid autoencoder models,at detecting anomalies in industrial control system(ICS)da...In the context of rapid digitization in industrial environments,how effective are advanced unsupervised learning models,particularly hybrid autoencoder models,at detecting anomalies in industrial control system(ICS)datasets?This study is crucial because it addresses the challenge of identifying rare and complex anomalous patterns in the vast amounts of time series data generated by Internet of Things(IoT)devices,which can significantly improve the reliability and safety of these systems.In this paper,we propose a hybrid autoencoder model,called ConvBiLSTMAE,which combines convolutional neural network(CNN)and bidirectional long short-term memory(BiLSTM)to more effectively train complex temporal data patterns in anomaly detection.On the hardware-in-the-loopbased extended industrial control system dataset,the ConvBiLSTM-AE model demonstrated remarkable anomaly detection performance,achieving F1 scores of 0.78 and 0.41 for the first and second datasets,respectively.The results suggest that hybrid autoencoder models are not only viable,but potentially superior alternatives for unsupervised anomaly detection in complex industrial systems,offering a promising approach to improving their reliability and safety.展开更多
Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information,but also the expansion of areas and assets to be protected.In terms of information security,it has led to an en...Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information,but also the expansion of areas and assets to be protected.In terms of information security,it has led to an enormous economic cost due to the various and numerous security solutions used in protecting the increased assets.Also,it has caused difficulties in managing those issues due to reasons such as mutual interference,countless security events and logs’data,etc.Within this security environment,an organization should identify and classify assets based on the value of data and their security perspective,and then apply appropriate protection measures according to the assets’security classification for effective security management.But there are still difficulties stemming from the need to manage numerous security solutions in order to protect the classified assets.In this paper,we propose an information classification management service based on blockchain,which presents and uses a model of the value of data and the security perspective.It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain.The proposed service reduces assets to be protected and security solutions to be applied,and provides security measures at the platform level rather than individual security solutions,by using blockchain.In the rapidly changing security environment of Industry 4.0,this proposed service enables economic security,provides a new integrated security platform,and demonstrates service value.展开更多
Innovations on the Internet of Everything(IoE)enabled systems are driving a change in the settings where we interact in smart units,recognized globally as smart city environments.However,intelligent video-surveillance...Innovations on the Internet of Everything(IoE)enabled systems are driving a change in the settings where we interact in smart units,recognized globally as smart city environments.However,intelligent video-surveillance systems are critical to increasing the security of these smart cities.More precisely,in today’s world of smart video surveillance,person re-identification(Re-ID)has gained increased consideration by researchers.Various researchers have designed deep learningbased algorithms for person Re-ID because they have achieved substantial breakthroughs in computer vision problems.In this line of research,we designed an adaptive feature refinementbased deep learning architecture to conduct person Re-ID.In the proposed architecture,the inter-channel and inter-spatial relationship of features between the images of the same individual taken from nonidentical camera viewpoints are focused on learning spatial and channel attention.In addition,the spatial pyramid pooling layer is inserted to extract the multiscale and fixed-dimension feature vectors irrespective of the size of the feature maps.Furthermore,the model’s effectiveness is validated on the CUHK01 and CUHK02 datasets.When compared with existing approaches,the approach presented in this paper achieves encouraging Rank 1 and 5 scores of 24.6% and 54.8%,respectively.展开更多
文摘The use of groundwater for drinking water supply to the population is increasingly practiced in the rice cultivation area of Maga. However, there is a lack of knowledge about the hydrochemical characteristics of this water due to a lack of quality control. This study aims to contribute to the understanding of mineralization processes in order to establish the hydrochemical profile of the water in the area. The methodological approach consisted of collecting fifteen water samples from wells and boreholes during six campaigns for physicochemical analysis, and studying them through methods of interpreting hydrochemical data. The analysis results show that these waters are moderately mineralized. The water facies are mainly of the bicarbonate sodium and potassium type, as well as the bicarbonate calcium and magnesium type. Calculation of saturation indices demonstrates that evaporite minerals show lower degrees of saturation than carbonate minerals, with gypsum, anhydrite, and halite being in a highly undersaturated state. The mineralization of groundwater originates from the dissolution of surrounding rocks on the one hand, and anthropogenic activities involving exchanges between alkalis (Na+ and K+) in the aquifer and alkaline earth (Ca2+ and Mg2+), resulting in the fixation of alkaline earth and the dissolution of alkalis.
基金This paper was supported by a Korea Institute for the Advancement of Technology(KIAT)grant funded by the Korean government(MOTIE,No.P0008703)by a National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT,No.2018R1C1B5046760).
文摘The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.
文摘Organic wastes are one of the greatest challenges that cities face worldwide. In numerous underdeveloped nations, like Cameroon, waste is often disposed of through landfills, composting, or open-air combustion. Unfortunately, the concept of waste sorting and organic waste processing is new to many individuals. This has led to an increase in the amount of organic waste and the costs connected with its management. Consequently, the majority of developing nations have sought out waste management solutions that are more cost-effective. Therefore, it has been determined that the bioconversion of organic wastes by black soldier fly larvae (BSFLs) (Hermetia illucens) into multifunctional prepupae is a viable alternative. Appreciation is given to the employment of the organic waste management approach in developing nations since it is not only environmentally friendly and economically viable, but also provides a means for waste valorisation through the production of diverse resources and potential economic benefits. Studies have proved the usefulness of the insect in controlling organic wastes, but countries such as Cameroon are still unfamiliar with the nuances of this method. Consequently, this timely review examined the performance of the BSFL, specifically in organic waste treatment, as well as the best practices for multiplying them to determine its viability for use in a waste treatment plant, the production of high-quality larvae as a source of protein for livestock, and the production of diesel fuel.
基金supported by Korea Institute for Advancement of Technology(KIAT)grant funded by theKoreaGovernment(MOTIE)(P0008703,The CompetencyDevelopment Program for Industry Specialist).
文摘Intrusion detection involves identifying unauthorized network activity and recognizing whether the data constitute an abnormal network transmission.Recent research has focused on using semi-supervised learning mechanisms to identify abnormal network traffic to deal with labeled and unlabeled data in the industry.However,real-time training and classifying network traffic pose challenges,as they can lead to the degradation of the overall dataset and difficulties preventing attacks.Additionally,existing semi-supervised learning research might need to analyze the experimental results comprehensively.This paper proposes XA-GANomaly,a novel technique for explainable adaptive semi-supervised learning using GANomaly,an image anomalous detection model that dynamically trains small subsets to these issues.First,this research introduces a deep neural network(DNN)-based GANomaly for semi-supervised learning.Second,this paper presents the proposed adaptive algorithm for the DNN-based GANomaly,which is validated with four subsets of the adaptive dataset.Finally,this study demonstrates a monitoring system that incorporates three explainable techniques—Shapley additive explanations,reconstruction error visualization,and t-distributed stochastic neighbor embedding—to respond effectively to attacks on traffic data at each feature engineering stage,semi-supervised learning,and adaptive learning.Compared to other single-class classification techniques,the proposed DNN-based GANomaly achieves higher scores for Network Security Laboratory-Knowledge Discovery in Databases and UNSW-NB15 datasets at 13%and 8%of F1 scores and 4.17%and 11.51%for accuracy,respectively.Furthermore,experiments of the proposed adaptive learning reveal mostly improved results over the initial values.An analysis and monitoring system based on the combination of the three explainable methodologies is also described.Thus,the proposed method has the potential advantages to be applied in practical industry,and future research will explore handling unbalanced real-time datasets in various scenarios.
基金supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)Support Program(IITP-2023-2018-0-01799)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation)and also the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2022R1F1A1063134).
文摘Effective smart healthcare frameworks contain novel and emerging solutions for remote disease diagnostics,which aid in the prevention of several diseases including heart-related abnormalities.In this context,regular monitoring of cardiac patients through smart healthcare systems based on Electrocardiogram(ECG)signals has the potential to save many lives.In existing studies,several heart disease diagnostic systems are proposed by employing different state-of-the-art methods,however,improving such methods is always an intriguing area of research.Hence,in this research,a smart healthcare system is proposed for the diagnosis of heart disease using ECG signals.The proposed framework extracts both linear and time-series information on the ECG signals and fuses them into a single framework concurrently.The linear characteristics of ECG signals are extracted by convolution layers followed by Gaussian Error Linear Units(GeLu)and time series characteristics of ECG beats are extracted by Vanilla Long Short-Term Memory Networks(LSTM).Following on,the feature reduction of linear information is done with the help of ID Generalized Gated Pooling(GGP).In addition,data misbalancing issues are also addressed with the help of the Synthetic Minority Oversampling Technique(SMOTE).The performance assessment of the proposed model is done over the two publicly available datasets named MIT-BIH arrhythmia database(MITDB)and PTB Diagnostic ECG database(PTBDB).The proposed framework achieves an average accuracy performance of 99.14%along with a 95%recall value.
基金supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No.2022R1F1A1063134)the MSIT (Ministry of Science and ICT),Korea,under the ITRC (Information Technology Research Center)Support Program (IITP-2022-2018-0-01799)supervised by the IITP (Institute for Information&communications Technology Planning&Evaluation).
文摘Intelligent vision-based surveillance systems are designed to deal with the gigantic volume of videos captured in a particular environment to perform the interpretation of scenes in form of detection,tracking,monitoring,behavioral analysis,and retrievals.In addition to that,another evolving way of surveillance systems in a particular environment is human gait-based surveillance.In the existing research,several methodological frameworks are designed to use deep learning and traditional methods,nevertheless,the accuracies of these methods drop substantially when they are subjected to covariate conditions.These covariate variables disrupt the gait features and hence the recognition of subjects becomes difficult.To handle these issues,a region-based triplet-branch Convolutional Neural Network(CNN)is proposed in this research that is focused on different parts of the human Gait Energy Image(GEI)including the head,legs,and body separately to classify the subjects,and later on,the final identification of subjects is decided by probability-based majority voting criteria.Moreover,to enhance the feature extraction and draw the discriminative features,we have added soft attention layers on each branch to generate the soft attention maps.The proposed model is validated on the CASIA-B database and findings indicate that part-based learning through triplet-branch CNN shows good performance of 72.98%under covariate conditions as well as also outperforms single-branch CNN models.
基金supported by the Culture,Sports,and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports,and Tourism in 2024(Project Name:Development of Distribution and Management Platform Technology and Human Resource Development for Blockchain-Based SW Copyright Protection,Project Number:RS-2023-00228867,Contribution Rate:100%)and also supported by the Soonchunhyang University Research Fund.
文摘In the context of rapid digitization in industrial environments,how effective are advanced unsupervised learning models,particularly hybrid autoencoder models,at detecting anomalies in industrial control system(ICS)datasets?This study is crucial because it addresses the challenge of identifying rare and complex anomalous patterns in the vast amounts of time series data generated by Internet of Things(IoT)devices,which can significantly improve the reliability and safety of these systems.In this paper,we propose a hybrid autoencoder model,called ConvBiLSTMAE,which combines convolutional neural network(CNN)and bidirectional long short-term memory(BiLSTM)to more effectively train complex temporal data patterns in anomaly detection.On the hardware-in-the-loopbased extended industrial control system dataset,the ConvBiLSTM-AE model demonstrated remarkable anomaly detection performance,achieving F1 scores of 0.78 and 0.41 for the first and second datasets,respectively.The results suggest that hybrid autoencoder models are not only viable,but potentially superior alternatives for unsupervised anomaly detection in complex industrial systems,offering a promising approach to improving their reliability and safety.
基金supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2020-2018-0-01799)supervised by the IITP(Institute for Information&communications Technology Planning&Evaluation).
文摘Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information,but also the expansion of areas and assets to be protected.In terms of information security,it has led to an enormous economic cost due to the various and numerous security solutions used in protecting the increased assets.Also,it has caused difficulties in managing those issues due to reasons such as mutual interference,countless security events and logs’data,etc.Within this security environment,an organization should identify and classify assets based on the value of data and their security perspective,and then apply appropriate protection measures according to the assets’security classification for effective security management.But there are still difficulties stemming from the need to manage numerous security solutions in order to protect the classified assets.In this paper,we propose an information classification management service based on blockchain,which presents and uses a model of the value of data and the security perspective.It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain.The proposed service reduces assets to be protected and security solutions to be applied,and provides security measures at the platform level rather than individual security solutions,by using blockchain.In the rapidly changing security environment of Industry 4.0,this proposed service enables economic security,provides a new integrated security platform,and demonstrates service value.
基金supported by Korea Institute for Advancement of Technology(KIAT)grant funded by the Korea Government(MOTIE)(P0008703,The Competency Development Program for Industry Specialist)the MSIT(Ministry of Science and ICT),Republic of Korea,under the ITRC(Information Technology Research Center)support program(IITP-2022-2018-0-01799)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation).
文摘Innovations on the Internet of Everything(IoE)enabled systems are driving a change in the settings where we interact in smart units,recognized globally as smart city environments.However,intelligent video-surveillance systems are critical to increasing the security of these smart cities.More precisely,in today’s world of smart video surveillance,person re-identification(Re-ID)has gained increased consideration by researchers.Various researchers have designed deep learningbased algorithms for person Re-ID because they have achieved substantial breakthroughs in computer vision problems.In this line of research,we designed an adaptive feature refinementbased deep learning architecture to conduct person Re-ID.In the proposed architecture,the inter-channel and inter-spatial relationship of features between the images of the same individual taken from nonidentical camera viewpoints are focused on learning spatial and channel attention.In addition,the spatial pyramid pooling layer is inserted to extract the multiscale and fixed-dimension feature vectors irrespective of the size of the feature maps.Furthermore,the model’s effectiveness is validated on the CUHK01 and CUHK02 datasets.When compared with existing approaches,the approach presented in this paper achieves encouraging Rank 1 and 5 scores of 24.6% and 54.8%,respectively.