3rd International Conference on Cloud Computing, Security and Blockchain (CLSB 2022)
September 24 ~ 25, 2022, Toronto, Canada
3rd International Conference on Cloud Computing, Security and Blockchain (CLSB 2022)
September 24 ~ 25, 2022, Toronto, Canada
Accepted Papers
Social Media Mining for Hate Speech Detection: Opinion and Emotion Conflict in Adversative Constructions
Isabel Ermidal1, Idalete Dias2 and Filipa Pereira2, 1Department of English, Minho University, Braga, Portugal, 2Department of German, Minho University, Braga, Portugal, 3Department of Informatics, Minho University, Braga, Portugal
ABSTRACT
The complexities of Natural Language Processing have become more challenging in recent years, given the rapid spread of online comment forums where abusive, violent and hate-laden behaviour often smears otherwise democratic and free conversations. This paper aims to make a contribution to the detection of hate speech in social media. Given the polarity-centeredness of sentiment classification methods and the difficulties facing automatic emotion detection due to the linguistic and paralinguistic properties of usergenerated content, not to mention the hardships of context-dependency, we propose a mixed-method approach that combines opinion mining and emotion detection with linguistic input. We applied our model on a subset of the NetLang Corpus, namely texts classified under the prejudice type “Racism” and sociolinguistic variable “Ethnicity”. We departed from the hypothesis that adversative conjunctions are markers indicative of opinion conflict and emotional discord, two phenomena characteristic of hate speech. Firstly, we narrowed down the search results containing the conjunction “but” using regular expressions and further restricted the search to instances of “but” co-occurring with “not”. Secondly, sentiment polarity followed by emotion classification were carried out using SentiWordNet and NRC Lexicon respectively. Finally, the resulting comments underwent a qualitative categorization according to their illocutionary force.
KEYWORDS
Opinion Mining, Sentiment Analysis, NLP, Hate Speech Detection, Social Media, Online Discourse, Corpus, Adversative Constructions, Illocutionary Acts.
A Blockchain based Security Model for IoT Ecosystem
Sarthak Agrawal, Saksham Sharma and Surjeet Balhara, Department of Electronics and Communication Engineering, Bharti Vidyapeeth College of Engineering, New Delhi, India
ABSTRACT
With time demand of IoT devices is increasing day by day. Usage and production of the IoT devices has increased in recent years. With increase in the number of user base, security related issues are also increased. While there are many proposed approaches to deal with different security related aspects in IoT, one of the potential solutions to such issues is Blockchain. Blockchain is a rapidly emerging technology and is used in various fields. Blockchain technology has features like decentralisation and immutability which guarantees security. A blockchain based security model has been proposed in this paper for securing IoT devices from various security threats. Finally, proposed approach and its implementation using blockchain to secure IoT Ecosystem is discussed to make IoT ecosystem more secure.
KEYWORDS
Authentication, Blockchain, Data Protection, IoT, Security.
A Nove Framework for Secure Cloud Computing based Ids Using Machine Technique
Geetika Tiwari1, Ruchi Jain2 and Dr Tryambak Hiwarkar3, 1Department of Computer Science, Sardar Patel University, Madhya Pradesh, India, 2Department of Computer Science, LNCT, Madhya Pradesh, India, 3Department of Computer Science, Sardar Patel University, Madhya Pradesh, India
ABSTRACT
Cloud computing has been promoted as one of the most effective methods of hosting and delivering services via the internet. Despite its broad range of applications, cloud security remains a serious worry for cloud computing. Many secure solutions have been developed to safeguard communication in such environments, the majority of which are based on attack signatures. These systems are often ineffective in detecting all forms of threats. A machine learning approach was recently presented. This implies that if the training set lacks sufficient instances in a specific class, the judgment may be incorrect. In this research, we present a novel firewall mechanism for safe cloud computing environments called machine learning system. Proposed Methods identifies and classifies incoming traffic packets using a novel combination methodology named most frequent decision, in which the nodes one previous decisions are coupled with the machine learning algorithms current decision to estimate the final attack category classification. This method improves learning performance as well as system correctness. UNSW-NB-15, a publicly accessible dataset, is utilised to derive our findings. Our data demonstrate that it enhances anomaly detection by 97.68 percent.
KEYWORDS
Cloud computing, Intrusion Detection System, Machine Learning, UNSW-NB-15.
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era
Fredrik Kamphuis1, Bernardo Magri2, Ricky Lamberty1 and Sebastian Faust3, 1Corporate Research, Robert Bosch GmbH, 2The University of Manchester, 3Technical University of Darmstadt
ABSTRACT
In public transaction ledgers such as Bitcoin and Ethereum, it is generally assumed that miners do not have any preference on the contents of the transactions they include, such that miners eventually include all transactions they receive. However, Daian et al. S&P20 showed that in practice this is not the case, and the so called miner extractable value can dramatically increase miners prot by re-ordering, delaying or even suppressing transactions. Consequently an \unpopular" transaction might never be included in the ledger if miners decide to suppress it, making, e.g., the standard liveness property of transaction ledgers (Garay et al. Eurocrypt15) impossible to be guaranteed in this setting. In this work, we formally de ne the setting where miners of a transaction ledger are dictatorial, i.e., their transaction selection and ordering process is driven by their individual preferences on the transactions contents. To this end, we integrate dictatorial miners into the transaction ledger model of Garay et al. by replacing honest miners with dictatorial ones. Next, we introduce a new property for a transaction ledger protocol that we call content preference robustness (CPR). This property ensures rational liveness, which guarantees inclusion of transactions even when miners are dictatorial, and it provides rational transaction order preservation which ensures that no dictatorial miner can improve its utility by altering the order of received candidate transactions. We show that a transaction ledger protocol can achieve CPR if miners cannot obtain a-priori knowledge of the content of the transactions. Finally, we provide a generic compiler based on time-lock puzzles that transforms any robust transaction ledger protocol into a CPR ledger.
KEYWORDS
blockchain, liveness, censorship, rational adversary, miner extractable value.
Reinforcement Learning based Approach for Electromagnetic Signature Reduction
Ashitosh Joshi1 and Surendra Bhosale2, 1M.Tech student of Department of Electrical Engineering, Veermata Jijabai Technological Institute, Mumbai, India, 2Faculty and Head of Department of Electrical Engineering, Veermata Jijabai Technological Institute, Mumbai, India
ABSTRACT
This paper proposes a very efficient method for magnetic signature reduction of underwater vessels commonly known as degaussing. Degaussing helps to protect the ferromagnetic vessels from magnetic anomaly detectors and mines and hence ensures stealth mode of operation. We propose a reinforcement learning (RL) based approach for degaussing of the vessel. The proposed algorithm is efficient in terms of computational efforts, speed, and accuracy. The proposed method is validated for a simulated model of prototype submarine as a ferromagnetic vessel. The main advantage of the proposed method is its ability to automatically find the optimal values of currents to be applied for signature reduction.
KEYWORDS
Degaussing, Magnetic Signatures, Reinforcement Learning, Q Learning.
Multivariate Recurrent Neural Network based Simulation to Estimate the Generation of Biomedical Waste During the Sanitary Emergencies Due to Epidemics in Urban Regions of Developing Countries
Nicolas Galván-Alvarez1, David Rojas-Casadiego1, David Romo-Bucheli1 and Viatcheslav Kafarov2, 1School of Systems and Computer Engineering, Universidad Industrial de Santander, Bucaramanga, Santander, Colombia, 2School of Chemical Engineering, Universidad Industrial de Santander, Bucaramanga, Santander, Colombia
ABSTRACT
Biomedical waste generation is severely affected by generalised sanitary emergencies such as epidemics, as shown recently during the COVID-19 pandemic. These sanitary emergencies often induce a plastic use increase in personal protection items, single-use plastics, and other healthcare elements. This increase might surpass the capacity of the waste management mechanism of a specific region, leading to a potential increase in its population health risks. Predicting the trends of biomedical waste generation is not straightforward because it depends on several variables associated with the local health system and the health emergency status. However, a substantial amount of work has been done in epidemics modelling. Our main hypothesis is that biomedical waste generation is strongly associated with sanitary emergencies dynamics. We propose a simulation framework that uses historical data from an ongoing sanitary emergency to build a model that can predict biomedical waste generation trends in urban regions of developing countries.
KEYWORDS
Biomedical waste, Simulation model, Epidemics, Neural networks, Developing countries, COVID-19.
Wireless Secret Sharing Game between Two Legitimate Users and an Eavesdropper
Lei Miao1, Hongbo Zhang2, and Dingde Jiang3, 1Dept. of Engineering Technology, Middle Tennessee State University, Murfreesboro, TN 37132, USA, 2Dept. of Engineering Technology, Middle Tennessee State University, Murfreesboro, TN 37132, USA, 3School of Astronautics & Aeronautic, University of Electronic Science and Technology of China, Sichuan, China
ABSTRACT
Wireless secret sharing is crucial to information security in the era of Internet of Things. One method is to utilize the effect of the randomness of the wireless channel in the data link layer to generate the common secret between two legitimate users Alice and Bob. This paper studies this secret sharing mechanism from the perspective of game theory. In particular, we formulate a non-cooperative zero-sum game between the legitimate users and an eavesdropper Eve. In a symmetrical game where Eve has the same probability of successfully receiving a packet from Alice and Bob when the transmission distance is the same, we show that both pure and mixed strategy Nash equilibria exist. In an asymmetric game where Eve has different probabilities of successfully receiving a packet from Alice and Bob, a pure strategy may not exist; in this case, we show how a mixed strategy Nash equilibrium can be found.
KEYWORDS
secret sharing, wireless communications, game theory, Nash equilibrium.
Designing a Reinforcement Machine Learning Model for Car Racing: An Explanation of Reward Function Algorithm Design for Amazon’s Deepracer Competition
Aleksander Berezowski, Department of Software Engineering, University of Calgary, Calgary, Canada
ABSTRACT
This paper will cover how I designed a reward function algorithm for a miniature race car’s reinforcement machine learning model. The research presented focuses on how to develop a reward function for AWS’s DeepRacer competition. Highlights include how different mathematical methods can be used to weigh different reward parameters, how reward function parameters are chosen, a complete breakdown of the code my research led me to make, the performance of my research, and how I would improve results going forward. This paper is titled as a research paper as it is the culmination of research, testing, and analysis done on one approach to this problem. The reason for this research is when I started to compete in DeepRacer there were no papers that broke down the rationale behind top performing code. This paper presents the process of building an experimental program, testing it, and figuring out how to improve it.
KEYWORDS
AWS DeepRacer, Reinforcement Learning, Competitive Programming.
Design Smell Analysis for Open Source Java Software
Asif Imran, Department of CSIS California State University San Marcos CA 92096, USA
ABSTRACT
Software design debt aims to elucidate the rectification attempts of the present design flaws and studies the influence of those to the cost and time of the software. Design smells are a key cause of incurring design debt. Although the activities of design smell identification and measurement are predominantly considered in current literature, those which identify and communicate which design smells occur more frequently in newly developing software and which ones are more dominant in established software, lack appropriate approaches. This research describes a mechanism of identifying the design smells which are more prevalent in software. It narrows down the focus of design debt to smells and depends on the appraisal of basic design best practices. A tool is provided here which is used for design smell detection by analyzing large volume of source codes. More specifically, 164,609 Lines of Code (LoC) and 5,712 class files of six developing and 244,930 LoC and 12,048 class files of five established open source Java software are analyzed here. Obtained results show that out of the 4,020 detection of smells which were made for nine pre-selected types of design smells, 1,643 design smells were detected for developing software, which mainly consisted of four specific types of smells. For established software, 2,397 design smells were observed which predominantly consisted of four other types of smells. The remaining design smell was equally prevalent in both developing and established software. Desirable precision values ranging from 72.9% to 84.1% were obtained for the tool. Software engineers can use this approach to form a subset of the most critical design smells which occur in their specific software, and focus on solving only those rather than considering all smells. As a result, the gained information will help the software engineers to take necessary steps of design remediation actions.
KEYWORDS
design smell detection, software maintenance, design debt, software engineering.
A Tracing-based Tennis Coaching and Smart Training Platform Using Artificial Intelligence and Computer Vision
Feihong Liu1 and Yu Sun2, 1Crean Lutheran High School, 12500 Sand Canyon Ave, Irvine, CA 92618, 2California State Polytechnic University, Pomona, CA, 91768, Irvine, CA 92620
ABSTRACT
Athletes in technical sports often find it difficult to analyze their own technique while they’re playing [6]. Often, athletes look at the technique of professional players to identify problems they may have. Unfortunately, many types of techniques, such as forehand and backhand swings in tennis, are relatively similar between a beginner and a professional, making it more difficult for comparison. On the other hand, techniques that appear different between professionals and casual can also present different challenges. This is especially true for serves in tennis, where the speed of the swing, the motion of the player, and the angle of the camera recording the player all pose a challenge in analyzing differences between professional and learning tennis players [7]. In this paper, we used two machine learning approaches to compare the serves of two players. In addition, we also developed a website that utilizes these approaches to allow for convenient access and a better experience. We found that our results adjusted for different speeds between the two players and made comparison much simpler.
KEYWORDS
Pose-estimation, Machine Learning, Scikit-learn.
User repairable and Customizable Buzzer system using Machine Learning and IoT system
Leheng Huang1 and Yu Sun2, 1Arcadia High School, 180 Campus Dr, Arcadia, CA 91006, 2California State Polytechnic University, Pomona, CA, 91768, Irvine, CA 92620
ABSTRACT
The creation and sustainability of academic teams have long been unnecessarily difficult due to the exorbitant costs of purchasing and maintaining equipment [1][2]. These costs serve as a major barrier, especially in poorer areas where securing the funds for this equipment is difficult [3]. In addition, when the equipment eventually breaks, it is often difficult to repair, forcing academic teams to purchase a new set of equipment. This project attempts to provide a product that can drastically lower the equipments costs and allow the user to modify and repair it as necessary. This project resulted in the development of the Argo Buzzer System which was created with input from experienced academic team members and it has proven that it is comparable to modern buzzer systems for a fraction of the cost [4].
KEYWORDS
Electronics, Machine learning, IoT system.
Finding Correlation between Chronical Diseases and Food Consumption from 30 Years of Swiss Health Data Linked with Swiss Consumption Data using FP-Growth for Association Analysis
Jonas Baschung and Farshideh Einsele, Section of Business Information, Bern University of Applied Sciences, Switzerland
ABSTRACT
Objective: The objective of the study was to link Swiss food consumption data with demographic data and 30 years of Swiss health data and apply data mining to discover critical food consumption patterns linked with 4 selected chronical diseases like alcohol abuse, blood pressure, cholesterol, and diabetes.
Design: Food consumption databases from a Swiss national survey menuCH were gathered along with data of large surveys of demographics and health data collected over 30 years from Swiss population conducted by Swiss Federal Office of Public Health (FOPH). These databases were integrated and Frequent Pattern Growth (FP-Growth) for the association rule mining was applied to the integrated database.
Results: This study applied data mining algorithm FP-Growth for association rule analysis. 36 association rules for the 4 investigated chronic diseases were found.
Conclusions: FP-Growth was successfully applied to gain promising rules showing food consumption patterns lined with lifestyle diseases and people’s demographics such as gender, age group and Body Mass Index (BMI). The rules show that men over 50 years consume more alcohol than women and are more at risk of high blood pressure consequently. Cholesterol and type 2 diabetes is found frequently in people older than 50 years with an unhealthy lifestyle like no exercise, no consumption of vegetables and hot meals and eating irregularly daily. The intake of supplementary food seems not to affect these 4 investigated chronic diseases
KEYWORDS
Data Mining, Association Analysis, Apriori Algorithm, Diet & Chronical Diseases, Health Informatics.
An Context-Aware Intelligent Systemto AutomatetheConversion of 2D Audio to 3D Audio using Signal Processing and Machine Learning
Bolin Gao1, Yu Sun2, 1Fairmont Preparatory Academy, 2200 W Sequoia Ave, Anaheim, CA92801, 2California State Polytechnic University, Pomona, CA, 91768, Irvine, CA92620
ABSTRACT
As virtual reality technologies emerge, the ability to create immersive experiences visually drastically improved[1]. However, in order to accompany the visual immersion, audio must also become more immersive [2]. This is where3D audio comes in. 3D audio allows for the simulation of sounds from specific directions, allowing a more realisticfeeling [3]. At the present moment, there lacks suf icient tools for users to design immersive audio experiences that fully exploit the abilities of 3D audio.
This paper proposes and implements the following systems [4]:
1. Automatic separation of stems from the incoming audio file, or letting the user upload the stems themselves
2. A simulated environment in which the separated stems will be automatically placed in
3. A user interface in order to manipulate the simulated positions of the separated stems.
We applied our application to a few selected audio files in order to conduct a qualitative evaluation of our approach. The results show that our approach was able to successfully separate the stems and simulate a dimensional sound effect.
KEYWORDS
3D Audio, signal processing, Head Related Transfer Functions.
Contact