99 research outputs found

    Recommendations in Social Media Applications to Ensure Personification and Safety using Machine Learning

    Get PDF
    Myriads of social media utilization lead to various issues like personalization hacks, data security problems, and safety. A recommendation is of paramount importance to alleviate this problem when there is a huge amount of data and the number of participants on the platform is increasing exponentially. Unfortunately, modern social media research has enhanced the performance and personalization of recommendations in many fields, yet largely underutilizes the power of artificial intelligence to enable personalized recommendations system for social media platforms like WhatsApp, Facebook, Twitter, etc. With advancement inside the global of technology every hour and every day new features are delivered to the list.  In a manner, social platforms are merging into our actual existence, and to achieve personification and related safety, users can get any one safety factor from all 6 classes with this approach. This factor provides the basis for personification and the implementation of safety precautions. This research proposes recommendations for personification in social media applications. The proposed Modified Inception Resnet V4 Convolutional Neural Network (MInReCNN) outperforms embedded media persona analysis and classification through text, image, and video data. Using these prediction classes better decisions can be made in given social media domain

    Deep dive on politician impersonating accounts in social media

    Get PDF
    International audienceThere is an ever-growing number of users who duplicate the social media accounts of celebrities or generally impersonate their presence on online social media as well as Instagram. Of course, this has led to an increasing interest in detecting fake profiles and investigating their behaviour. We begin this research by targeting a few famous politicians, including Donald J. Trump, Barack Obama, and Emmanuel Macron and collecting their activity for the period of 3 months using a specifically-designed crawler across Instagram. We then experimented with several profile characteristics such as user-name, display name, biography, and profile picture to identify impersonator among 1,5M unique users. Using publicly crawled data, our model was able to distinguish crowds of impersonators and political bots. We continued by providing an analysis of the characteristics and behaviour of these impersonators. Finally, we conclude the analysis by classifying impersonators into four different categories

    がん分子標的医療開発プログラム

    Get PDF

    The Extent and Coverage of Current Knowledge of Connected Health: Systematic Mapping Study

    Get PDF
    Background: This paper examines the development of the Connected Health research landscape with a view on providing a historical perspective on existing Connected Health research. Connected Health has become a rapidly growing research field as our healthcare system is facing pressured to become more proactive and patient centred. Objective: We aimed to identify the extent and coverage of the current body of knowledge in Connected Health. With this, we want to identify which topics have drawn the attention of Connected health researchers, and if there are gaps or interdisciplinary opportunities for further research. Methods: We used a systematic mapping study that combines scientific contributions from research on medicine, business, computer science and engineering. We analyse the papers with seven classification criteria, publication source, publication year, research types, empirical types, contribution types research topic and the condition studied in the paper. Results: Altogether, our search resulted in 208 papers which were analysed by a multidisciplinary group of researchers. Our results indicate a slow start for Connected Health research but a more recent steady upswing since 2013. The majority of papers proposed healthcare solutions (37%) or evaluated Connected Health approaches (23%). Case studies (28%) and experiments (26%) were the most popular forms of scientific validation employed. Diabetes, cancer, multiple sclerosis, and heart conditions are among the most prevalent conditions studied. Conclusions: We conclude that Connected Health research seems to be an established field of research, which has been growing strongly during the last five years. There seems to be more focus on technology driven research with a strong contribution from medicine, but business aspects of Connected health are not as much studied

    Sharing is caring: a cooperation scheme for RPL network resilience and efficiency

    Get PDF
    International audienceThe IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) builds a Direction Oriented Directed Acyclic Graph (DODAG) rooted at one node.This node may act as a border router to provide Internet connectivity to the members of the DODAG but such a situation creates a single point of failure.Upon border router failure, all nodes connected to the DODAG are affected as all ongoing communications are instantly broken and no new communications can be initiated.Moreover, nodes close to the border router should forward traffic from farther nodes in addition to their own, which may cause congestion and energy depletion inequality.In this article we specify a full solution to enable border router redundancy in RPL networks.To achieve this, we propose a mechanism leveraging cooperation between colocated RPL networks.It enables failover to maintain Internet connectivity and load balancing to improve the overall energy consumption and bandwidth.Our contribution has been implemented in Contiki OS and was evaluated through experiments performed on the FIT IoT-LAB testbed

    A DECam Search for Explosive Optical Transients Associated with IceCube Neutrino Alerts

    Get PDF
    In this work, we investigate the likelihood of association between real-time, neutrino alerts with teraelectronvolt to petaelectronvolt energy from IceCube and optical counterparts in the form of core-collapse supernovae (CC SNe). The optical follow-up of IceCube alerts requires two main instrumental capabilities: (1) deep imaging, since 73% of neutrinos would come from CC SNe at redshifts z > 0.3, and (2) a large field of view (FoV), since typical IceCube muon neutrino pointing accuracy is on the order of ~1 deg. With Blanco/DECam (gri to 24th magnitude and 2.2 deg diameter FoV), we performed a triggered optical follow-up observation of two IceCube alerts, IC170922A and IC171106A, on six nights during the three weeks following each alert. For the IC170922A (IC171106A) follow-up observations, we expect that 12.1% (9.5%) of coincident CC SNe at z lesssim 0.3 are detectable, and that, on average, 0.23 (0.07) unassociated SNe in the neutrino 90% containment regions also pass our selection criteria. We find two candidate CC SNe that are temporally coincident with the neutrino alerts in the FoV, but none in the 90% containment regions, a result that is statistically consistent with expected rates of background CC SNe for these observations. If CC SNe are the dominant source of teraelectronvolt to petaelectronvolt neutrinos, we would expect an excess of coincident CC SNe to be detectable at the 3σ confidence level using DECam observations similar to those of this work for ~60 (~200) neutrino alerts with (without) redshift information for all candidates

    FSF: Applying machine learning techniques to data forwarding in socially selfish Opportunistic Networks

    Full text link
    [EN] Opportunistic networks are becoming a solution to provide communication support in areas with overloaded cellular networks, and in scenarios where a fixed infrastructure is not available, as in remote and developing regions. A critical issue, which still requires a satisfactory solution, is the design of an efficient data delivery solution trading off delivery efficiency, delay, and cost. To tackle this problem, most researchers have used either the network state or node mobility as a forwarding criterion. Solutions based on social behaviour have recently been considered as a promising alternative. Following the philosophy from this new category of protocols, in this work, we present our ¿FriendShip and Acquaintanceship Forwarding¿ (FSF) protocol, a routing protocol that makes its routing decisions considering the social ties between the nodes and both the selfishness and the device resources levels of the candidate node for message relaying. When a contact opportunity arises, FSF first classifies the social ties between the message destination and the candidate to relay. Then, by using logistic functions, FSF assesses the relay node selfishness to consider those cases in which the relay node is socially selfish. To consider those cases in which the relay node does not accept receipt of the message because its device has resource constraints at that moment, FSF looks at the resource levels of the relay node. By using the ONE simulator to carry out trace-driven simulation experiments, we find that, when accounting for selfishness on routing decisions, our FSF algorithm outperforms previously proposed schemes, by increasing the delivery ratio up to 20%, with the additional advantage of introducing a lower number of forwarding events. We also find that the chosen buffer management algorithm can become a critical element to improve network performance in scenarios with selfish nodes.This work was partially supported by the "Camilo Batista de Souza/Programa Doutorado-sanduiche no Exterior (PDSE)/Processo 88881.133931/2016-01" and by the Ministerio de Ciencia, Innovacion y Universidades, Programa Estatal de Investigacion, Desarrollo e Innovacion Orientada a los Retos de la Sociedad, Proyectos I+D+I 2018, Spain, under Grant RTI2018-096384-B-I00".Souza, C.; Mota, E.; Soares, D.; Manzoni, P.; Cano, J.; Tavares De Araujo Cesariny Calafate, CM.; Hernández-Orallo, E. (2019). FSF: Applying machine learning techniques to data forwarding in socially selfish Opportunistic Networks. Sensors. 19(10):1-26. https://doi.org/10.3390/s19102374S1261910Trifunovic, S., Kouyoumdjieva, S. T., Distl, B., Pajevic, L., Karlsson, G., & Plattner, B. (2017). A Decade of Research in Opportunistic Networks: Challenges, Relevance, and Future Directions. IEEE Communications Magazine, 55(1), 168-173. doi:10.1109/mcom.2017.1500527cmLu, X., Lio, P., & Hui, P. (2016). Distance-Based Opportunistic Mobile Data Offloading. Sensors, 16(6), 878. doi:10.3390/s16060878Zeng, F., Zhao, N., & Li, W. (2017). Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks. Sensors, 17(5), 1109. doi:10.3390/s17051109Khabbaz, M. J., Assi, C. M., & Fawaz, W. F. (2012). Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges. IEEE Communications Surveys & Tutorials, 14(2), 607-640. doi:10.1109/surv.2011.041911.00093Miao, J., Hasan, O., Mokhtar, S. B., Brunie, L., & Yim, K. (2013). An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing. International Journal of Information Management, 33(2), 252-262. doi:10.1016/j.ijinfomgt.2012.11.001CRAWDAD Dataset Uoi/Haggle (v. 2016-08-28): Derived from Cambridge/Haggle (v. 2009-05-29)https://crawdad.org/uoi/haggle/20160828Eagle, N., Pentland, A., & Lazer, D. (2009). Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106(36), 15274-15278. doi:10.1073/pnas.0900282106Tsai, T.-C., & Chan, H.-H. (2015). NCCU Trace: social-network-aware mobility trace. IEEE Communications Magazine, 53(10), 144-149. doi:10.1109/mcom.2015.7295476Hui, P., Crowcroft, J., & Yoneki, E. (2011). BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks. IEEE Transactions on Mobile Computing, 10(11), 1576-1589. doi:10.1109/tmc.2010.246Lindgren, A., Doria, A., & Schelén, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 19-20. doi:10.1145/961268.961272Cao, Y., & Sun, Z. (2013). Routing in Delay/Disruption Tolerant Networks: A Taxonomy, Survey and Challenges. IEEE Communications Surveys & Tutorials, 15(2), 654-677. doi:10.1109/surv.2012.042512.00053Zhu, Y., Xu, B., Shi, X., & Wang, Y. (2013). A Survey of Social-Based Routing in Delay Tolerant Networks: Positive and Negative Social Effects. IEEE Communications Surveys & Tutorials, 15(1), 387-401. doi:10.1109/surv.2012.032612.00004Shah, R. C., Roy, S., Jain, S., & Brunette, W. (2003). Data MULEs: modeling and analysis of a three-tier architecture for sparse sensor networks. Ad Hoc Networks, 1(2-3), 215-233. doi:10.1016/s1570-8705(03)00003-9Burns, B., Brock, O., & Levine, B. N. (2008). MORA routing and capacity building in disruption-tolerant networks. Ad Hoc Networks, 6(4), 600-620. doi:10.1016/j.adhoc.2007.05.002Shaghaghian, S., & Coates, M. (2015). Optimal Forwarding in Opportunistic Delay Tolerant Networks With Meeting Rate Estimations. IEEE Transactions on Signal and Information Processing over Networks, 1(2), 104-116. doi:10.1109/tsipn.2015.2452811Li, L., Qin, Y., & Zhong, X. (2016). A Novel Routing Scheme for Resource-Constraint Opportunistic Networks: A Cooperative Multiplayer Bargaining Game Approach. IEEE Transactions on Vehicular Technology, 65(8), 6547-6561. doi:10.1109/tvt.2015.2476703Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S., & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking. ACM SIGPLAN Notices, 37(10), 96-107. doi:10.1145/605432.605408Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2008). Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case. IEEE/ACM Transactions on Networking, 16(1), 63-76. doi:10.1109/tnet.2007.897962Zhang, L., Wang, X., Lu, J., Ren, M., Duan, Z., & Cai, Z. (2014). A novel contact prediction-based routing scheme for DTNs. Transactions on Emerging Telecommunications Technologies, 28(1), e2889. doi:10.1002/ett.2889Okasha, S. (2005). Altruism, Group Selection and Correlated Interaction. The British Journal for the Philosophy of Science, 56(4), 703-725. doi:10.1093/bjps/axi143Hernandez-Orallo, E., Olmos, M. D. S., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2015). CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes. IEEE Transactions on Mobile Computing, 14(6), 1162-1175. doi:10.1109/tmc.2014.234362

    MDFRCNN: Malware Detection using Faster Region Proposals Convolution Neural Network

    Get PDF
    Technological advancement of smart devices has opened up a new trend: Internet of Everything (IoE), where all devices are connected to the web. Large scale networking benefits the community by increasing connectivity and giving control of physical devices. On the other hand, there exists an increased ‘Threat’ of an ‘Attack’. Attackers are targeting these devices, as it may provide an easier ‘backdoor entry to the users’ network’.MALicious softWARE (MalWare) is a major threat to user security. Fast and accurate detection of malware attacks are the sine qua non of IoE, where large scale networking is involved. The paper proposes use of a visualization technique where the disassembled malware code is converted into gray images, as well as use of Image Similarity based Statistical Parameters (ISSP) such as Normalized Cross correlation (NCC), Average difference (AD), Maximum difference (MaxD), Singular Structural Similarity Index Module (SSIM), Laplacian Mean Square Error (LMSE), MSE and PSNR. A vector consisting of gray image with statistical parameters is trained using a Faster Region proposals Convolution Neural Network (F-RCNN) classifier. The experiment results are promising as the proposed method includes ISSP with F-RCNN training. Overall training time of learning the semantics of higher-level malicious behaviors is less. Identification of malware (testing phase) is also performed in less time. The fusion of image and statistical parameter enhances system performance with greater accuracy. The benchmark database from Microsoft Malware Classification challenge has been used to analyze system performance, which is available on the Kaggle website. An overall average classification accuracy of 98.12% is achieved by the proposed method

    Quality measurement in agile and rapid software development: A systematic mapping

    Get PDF
    Context: In despite of agile and rapid software development (ARSD) being researched and applied extensively, managing quality requirements (QRs) are still challenging. As ARSD processes produce a large amount of data, measurement has become a strategy to facilitate QR management. Objective: This study aims to survey the literature related to QR management through metrics in ARSD, focusing on: bibliometrics, QR metrics, and quality-related indicators used in quality management. Method: The study design includes the definition of research questions, selection criteria, and snowballing as search strategy. Results: We selected 61 primary studies (2001-2019). Despite a large body of knowledge and standards, there is no consensus regarding QR measurement. Terminology is varying as are the measuring models. However, seemingly different measurement models do contain similarities. Conclusion: The industrial relevance of the primary studies shows that practitioners have a need to improve quality measurement. Our collection of measures and data sources can serve as a starting point for practitioners to include quality measurement into their decision-making processes. Researchers could benefit from the identified similarities to start building a common framework for quality measurement. In addition, this could help researchers identify what quality aspects need more focus, e.g., security and usability with few metrics reported.This work has been funded by the European Union’s Horizon 2020 research and innovation program through the Q-Rapids project (grant no. 732253). This research was also partially supported by the Spanish Ministerio de Economía, Industria y Competitividad through the DOGO4ML project (grant PID2020-117191RB-I00). Silverio Martínez-Fernández worked in Fraunhofer IESE before January 2020.Peer ReviewedPostprint (published version

    Energy Harvesting Techniques for Internet of Things (IoT)

    Get PDF
    The rapid growth of the Internet of Things (IoT) has accelerated strong interests in the development of low-power wireless sensors. Today, wireless sensors are integrated within IoT systems to gather information in a reliable and practical manner to monitor processes and control activities in areas such as transportation, energy, civil infrastructure, smart buildings, environment monitoring, healthcare, defense, manufacturing, and production. The long-term and self-sustainable operation of these IoT devices must be considered early on when they are designed and implemented. Traditionally, wireless sensors have often been powered by batteries, which, despite allowing low overall system costs, can negatively impact the lifespan and the performance of the entire network they are used in. Energy Harvesting (EH) technology is a promising environment-friendly solution that extends the lifetime of these sensors, and, in some cases completely replaces the use of battery power. In addition, energy harvesting offers economic and practical advantages through the optimal use of energy, and the provisioning of lower network maintenance costs. We review recent advances in energy harvesting techniques for IoT. We demonstrate two energy harvesting techniques using case studies. Finally, we discuss some future research challenges that must be addressed to enable the large-scale deployment of energy harvesting solutions for IoT environments
    corecore