-
Employing Drones in Agriculture: An Exploration of Various Drone Types and Key Advantages
Authors:
E. C. Nunes
Abstract:
This article explores the use of drones in agriculture and discusses the various types of drones employed for different agricultural applications. Drones, also known as unmanned aerial vehicles (UAVs), offer numerous advantages in farming practices. They provide real-time and high-resolution data collection, enabling farmers to make informed irrigation, fertilization, and pest management decisions…
▽ More
This article explores the use of drones in agriculture and discusses the various types of drones employed for different agricultural applications. Drones, also known as unmanned aerial vehicles (UAVs), offer numerous advantages in farming practices. They provide real-time and high-resolution data collection, enabling farmers to make informed irrigation, fertilization, and pest management decisions. Drones assist in precision spraying and application of agricultural inputs, minimizing chemical wastage and optimizing resource utilization. They offer accessibility to inaccessible areas, reduce manual labor, and provide cost savings and increased operational efficiency. Drones also play a crucial role in map** and surveying agricultural fields, aiding crop planning and resource allocation. However, challenges such as regulations and limited flight time need to be addressed. The advantages of using drones in agriculture include precision agriculture, cost and time savings, improved data collection and analysis, enhanced crop management, accessibility and flexibility, environmental sustainability, and increased safety for farmers. Overall, drones have the potential to revolutionize farming practices, leading to increased efficiency, productivity, and sustainability in agriculture.
△ Less
Submitted 11 July, 2023; v1 submitted 8 July, 2023;
originally announced July 2023.
-
Machine Learning based Anomaly Detection for Smart Shirt: A Systematic Review
Authors:
E. C. Nunes
Abstract:
In recent years, the popularity and use of Artificial Intelligence (AI) and large investments on theInternet of Medical Things (IoMT) will be common to use products such as smart socks, smartpants, and smart shirts. These products are known as Smart Textile or E-textile, which has theability to monitor and collect signals that our body emits. These signals make it possible to extractanomalous comp…
▽ More
In recent years, the popularity and use of Artificial Intelligence (AI) and large investments on theInternet of Medical Things (IoMT) will be common to use products such as smart socks, smartpants, and smart shirts. These products are known as Smart Textile or E-textile, which has theability to monitor and collect signals that our body emits. These signals make it possible to extractanomalous components using Machine Learning (ML) techniques that play an essential role in thisarea. This study presents a Systematic Review of the Literature (SLR) on Anomaly Detection usingML techniques in Smart Shirt. The objectives of the SLR are: (i) to identify what type of anomalythe smart shirt; (ii) what ML techniques are being used; (iii) which datasets are being used; (iv)identify smart shirt or signal acquisition devices; (v) list the performance metrics used to evaluatethe ML model; (vi) the results of the techniques in general; (vii) types of ML algorithms are beingapplied.The SLR selected 11 primary studies published between 2017-2021. The results showed that6 types of anomalies were identified, with the Fall anomaly being the most cited. The Support VectorMachines (SVM) algorithm is most used. Most of the primary studies used public or private datasets.The Hexoskin smart shirt was most cited. The most used metric performance was Accuracy. Onaverage, almost all primary studies presented a result above 90%, and all primary studies used theSupervisioned type of ML.
△ Less
Submitted 7 March, 2022;
originally announced March 2022.
-
Coexistence of spontaneous dimerization and magnetic order in a transverse-field Ising ladder with four-spin interactions
Authors:
J. C. Xavier,
R. G. Pereira,
M. E. S. Nunes,
J. A. Plascak
Abstract:
The spin-1/2 transverse field two-leg Ising ladder with nearest-neighbor exchange and plaquette four-spin interaction $J_{4}$ is studied analytically and numerically with the density matrix renormalization group approach. The quantum phase diagram in the transverse field $B$ versus $J_{4}$ plane has been obtained. There are three different phases: a paramagnetic (PM) phase for high values of the t…
▽ More
The spin-1/2 transverse field two-leg Ising ladder with nearest-neighbor exchange and plaquette four-spin interaction $J_{4}$ is studied analytically and numerically with the density matrix renormalization group approach. The quantum phase diagram in the transverse field $B$ versus $J_{4}$ plane has been obtained. There are three different phases: a paramagnetic (PM) phase for high values of the transverse field and, for low values of $B$, a ferromagnetic (FM) ordered phase for small $J_{4}$ and a dimerized-rung (DR) phase for large negative values of $J_{4}$. All phases are separated by quantum phase transition lines meeting at a multicritical point. The critical lines have been obtained by exploring the entanglement entropy. The results show that along the critical lines the central charge is $c=1/2$, while at the multicritical point one has $c=1$. The scaling dimension of the energy operator is $X_ε=1$, in agreement with the universality class of the critical behavior of the quantum Ising chain. An effective field theory for the multicritical point is also discussed. The FM and the DR order parameters have also been computed and we found a region where the FM and the DR phases coexist.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Markov-Restricted Analysis of Randomized Trials with Non-Monotone Missing Binary Outcomes: Sensitivity Analysis and Identification Results
Authors:
Daniel O. Scharfstein,
Jaron J. R. Lee,
Aidan McDermott,
Aimee Campbell,
Edward Nunes,
Abigail G. Matthews,
Ilya Shpitser
Abstract:
Scharfstein et al. (2021) developed a sensitivity analysis model for analyzing randomized trials with repeatedly measured binary outcomes that are subject to nonmonotone missingness. Their approach becomes computationally intractable when the number of repeated measured is large (e.g., greater than 15). In this paper, we repair this problem by introducing an $m$th-order Markovian restriction. We e…
▽ More
Scharfstein et al. (2021) developed a sensitivity analysis model for analyzing randomized trials with repeatedly measured binary outcomes that are subject to nonmonotone missingness. Their approach becomes computationally intractable when the number of repeated measured is large (e.g., greater than 15). In this paper, we repair this problem by introducing an $m$th-order Markovian restriction. We establish an identification by representing the model as a directed acyclic graph (DAG). We illustrate our methodology in the context of a randomized trial designed to evaluate a web-delivered psychosocial intervention to reduce substance use, assessed by testing urine samples twice weekly for 12 weeks, among patients entering outpatient addiction treatment. We evaluate the finite sample properties of our method in a realistic simulation study. Our methods have been integrated into the R package entitled slabm.
△ Less
Submitted 18 May, 2021;
originally announced May 2021.
-
Anomalous Sound Detection with Machine Learning: A Systematic Review
Authors:
Eduardo C. Nunes
Abstract:
Anomalous sound detection (ASD) is the task of identifying whether the sound emitted from an object is normal or anomalous. In some cases, early detection of this anomaly can prevent several problems. This article presents a Systematic Review (SR) about studies related to Anamolous Sound Detection using Machine Learning (ML) techniques. This SR was conducted through a selection of 31 (accepted stu…
▽ More
Anomalous sound detection (ASD) is the task of identifying whether the sound emitted from an object is normal or anomalous. In some cases, early detection of this anomaly can prevent several problems. This article presents a Systematic Review (SR) about studies related to Anamolous Sound Detection using Machine Learning (ML) techniques. This SR was conducted through a selection of 31 (accepted studies) studies published in journals and conferences between 2010 and 2020. The state of the art was addressed, collecting data sets, methods for extracting features in audio, ML models, and evaluation methods used for ASD. The results showed that the ToyADMOS, MIMII, and Mivia datasets, the Mel-frequency cepstral coefficients (MFCC) method for extracting features, the Autoencoder (AE) and Convolutional Neural Network (CNN) models of ML, the AUC and F1-score evaluation methods were most cited.
△ Less
Submitted 15 February, 2021;
originally announced February 2021.
-
Deep Dense and Convolutional Autoencoders for Unsupervised Anomaly Detection in Machine Condition Sounds
Authors:
Alexandrine Ribeiro,
Luis Miguel Matos,
Pedro Jose Pereira,
Eduardo C. Nunes,
Andre L. Ferreira,
Paulo Cortez,
Andre Pilastri
Abstract:
This technical report describes two methods that were developed for Task 2 of the DCASE 2020 challenge. The challenge involves an unsupervised learning to detect anomalous sounds, thus only normal machine working condition samples are available during the training process. The two methods involve deep autoencoders, based on dense and convolutional architectures that use melspectogram processed sou…
▽ More
This technical report describes two methods that were developed for Task 2 of the DCASE 2020 challenge. The challenge involves an unsupervised learning to detect anomalous sounds, thus only normal machine working condition samples are available during the training process. The two methods involve deep autoencoders, based on dense and convolutional architectures that use melspectogram processed sound features. Experiments were held, using the six machine type datasets of the challenge. Overall, competitive results were achieved by the proposed dense and convolutional AE, outperforming the baseline challenge method.
△ Less
Submitted 19 June, 2020; v1 submitted 18 June, 2020;
originally announced June 2020.
-
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks
Authors:
Mohammed Almukaynizi,
Ericsson Marin,
Eric Nunes,
Paulo Shakarian,
Gerardo I. Simari,
Dipsy Kapoor,
Timothy Siedlecki
Abstract:
Recent incidents of data breaches call for organizations to proactively identify cyber attacks on their systems. Darkweb/Deepweb (D2web) forums and marketplaces provide environments where hackers anonymously discuss existing vulnerabilities and commercialize malicious software to exploit those vulnerabilities. These platforms offer security practitioners a threat intelligence environment that allo…
▽ More
Recent incidents of data breaches call for organizations to proactively identify cyber attacks on their systems. Darkweb/Deepweb (D2web) forums and marketplaces provide environments where hackers anonymously discuss existing vulnerabilities and commercialize malicious software to exploit those vulnerabilities. These platforms offer security practitioners a threat intelligence environment that allows to mine for patterns related to organization-targeted cyber attacks. In this paper, we describe a system (called DARKMENTION) that learns association rules correlating indicators of attacks from D2web to real-world cyber incidents. Using the learned rules, DARKMENTION generates and submits warnings to a Security Operations Center (SOC) prior to attacks. Our goal was to design a system that automatically generates enterprise-targeted warnings that are timely, actionable, accurate, and transparent. We show that DARKMENTION meets our goal. In particular, we show that it outperforms baseline systems that attempt to generate warnings of cyber attacks related to two enterprises with an average increase in F1 score of about 45% and 57%. Additionally, DARKMENTION was deployed as part of a larger system that is built under a contract with the IARPA Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program. It is actively producing warnings that precede attacks by an average of 3 days.
△ Less
Submitted 29 October, 2018;
originally announced October 2018.
-
Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
Authors:
Eric Nunes,
Ahmad Diab,
Andrew Gunn,
Ericsson Marin,
Vineet Mishra,
Vivin Paliath,
John Robertson,
Jana Shakarian,
Amanda Thart,
Paulo Shakarian
Abstract:
In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining informa…
▽ More
In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats. Currently, this system collects on average 305 high-quality cyber threat warnings each week. These threat warnings include information on newly developed malware and exploits that have not yet been deployed in a cyber-attack. This provides a significant service to cyber-defenders. The system is significantly augmented through the use of various data mining and machine learning techniques. With the use of machine learning models, we are able to recall 92% of products in marketplaces and 80% of discussions on forums relating to malicious hacking with high precision. We perform preliminary analysis on the data collected, demonstrating its application to aid a security expert for better threat analysis.
△ Less
Submitted 28 July, 2016;
originally announced July 2016.
-
Argumentation Models for Cyber Attribution
Authors:
Eric Nunes,
Paulo Shakarian,
Gerardo I. Simari,
Andrew Ruef
Abstract:
A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. It is one of the most important technical and policy challenges in cyber-security. The lack of ground truth for an individual responsible for an attack has limited previous studies. In this paper, we take a first step towards overcoming this l…
▽ More
A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. It is one of the most important technical and policy challenges in cyber-security. The lack of ground truth for an individual responsible for an attack has limited previous studies. In this paper, we take a first step towards overcoming this limitation by building a dataset from the capture-the-flag event held at DEFCON, and propose an argumentation model based on a formal reasoning framework called DeLP (Defeasible Logic Programming) designed to aid an analyst in attributing a cyber-attack. We build models from latent variables to reduce the search space of culprits (attackers), and show that this reduction significantly improves the performance of classification-based approaches from 37% to 62% in identifying the attacker.
△ Less
Submitted 7 July, 2016;
originally announced July 2016.
-
Malware Task Identification: A Data Driven Approach
Authors:
Eric Nunes,
Casey Buto,
Paulo Shakarian,
Christian Lebiere,
Stefano Bennati,
Robert Thomson,
Holger Jaenisch
Abstract:
Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - includin…
▽ More
Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - including cases where the training data differs significantly from test; where the malware being evaluated employs packing to thwart analytical techniques; and conditions with sparse training data. We find that this approach consistently out-performs the current state-of-the art software for malware task identification as well as standard machine learning approaches - often achieving an unbiased F1 score of over 0.9. In the near future, we look to deploy our approach for use by analysts in an operational cyber-security environment.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Authors:
Eric Nunes,
Nimish Kulkarni,
Paulo Shakarian,
Andrew Ruef,
Jay Little
Abstract:
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is known. In this work, we use various clas…
▽ More
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is known. In this work, we use various classification techniques to identify the culprit in a cyberattack and find that deceptive activities account for the majority of misclassified samples. We also explore several heuristics to alleviate some of the misclassification caused by deception.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
Static and spherically symmetric black holes in $f(R)$ theories
Authors:
Santiago Esteban Perez Bergliaffa,
Yves Eduardo Chifarelli de Oliveira Nunes
Abstract:
We study some features of static and spherically symmetric solutions (SSS) with a horizon in $f(R)$ theories of gravitation by means of a near-horizon analysis. A necessary condition for an $f(R)$ theory to have this type of solution is obtained. General features of the effective potential are deduced, and it is shown that there exists a limit on the curvature at the horizon, in both cases for any…
▽ More
We study some features of static and spherically symmetric solutions (SSS) with a horizon in $f(R)$ theories of gravitation by means of a near-horizon analysis. A necessary condition for an $f(R)$ theory to have this type of solution is obtained. General features of the effective potential are deduced, and it is shown that there exists a limit on the curvature at the horizon, in both cases for any $f(R$). Finally, we calculate the expression for the energy of the collision of two masive particles in the center of mass frame.
△ Less
Submitted 28 July, 2011;
originally announced July 2011.