<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Projects | Academic</title><link>https://harrychien1311.netlify.app/project/</link><atom:link href="https://harrychien1311.netlify.app/project/index.xml" rel="self" type="application/rss+xml"/><description>Projects</description><generator>Wowchemy (https://wowchemy.com)</generator><language>en-us</language><lastBuildDate>Mon, 01 Aug 2022 10:20:13 +0000</lastBuildDate><image><url>https://harrychien1311.netlify.app/media/icon_hu0b7a4cb9992c9ac0e91bd28ffd38dd00_9727_512x512_fill_lanczos_center_3.png</url><title>Projects</title><link>https://harrychien1311.netlify.app/project/</link></image><item><title>AI-based Cyberthreat Detection System for the Republic of Korea Army</title><link>https://harrychien1311.netlify.app/project/rok/</link><pubDate>Mon, 01 Aug 2022 10:20:13 +0000</pubDate><guid>https://harrychien1311.netlify.app/project/rok/</guid><description>&lt;ol>
&lt;li>
&lt;p>Summarize of the project: The intranet of Republic of Korea&amp;rsquo;s Army suffers millions of sessions per day. This could lead to the hight potential of cyber attacks eventhough there is no outside traffics in this intranet. However, just a spam email or unintentionally plugig an external device such as USB could bring a malware to a signle computer in the intranet and then it could become a bot in a botnet attack or DDoS attack,&amp;hellip; attack the entire network. With high volume of traffics in the intranet, there is a need for an AI-based cyberattack detections to automatically detect network attacks and support network operators in network analysis.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Solutions: We developed a system utilizing 3 AI algorithms to detect multiple types of attacks including XGBoostClassifier, Tabformer-a variant of tranformer based architecture that uitlize narutal language processing technique to process tabbular data. Especially we converted network session data to hiveplot images for visualization and then used a CNN model to classified attacks&lt;/p>
&lt;/li>
&lt;li>
&lt;p>My position: Team leader&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Main responsibilities:&lt;/p>
&lt;ul>
&lt;li>Conducted big data analysis using Pyspark and built automated pipelines to process data with the Prefect framework.&lt;/li>
&lt;li>Conducted hypothesis testing to find the feature importance among variables&lt;/li>
&lt;li>Developed the Tabformer architecture in Pytorch.&lt;/li>
&lt;li>Implemented the inference pipeline&lt;/li>
&lt;li>Designed CI/CD pipeline to boost the productivity when deploying the inference pipeline with different models&lt;/li>
&lt;li>Conducted coding review&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Technologies and Tools used: Python, Pytorch, Apache Spark, Pandas, Scikit-learn, Docker&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;em>Note: This is a goverment project. Thus we cannot share the actual architecture image and the source code&lt;/em>&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Overview architecture" srcset="
/project/rok/overview_architecture_hu79cdfa057779f12e35c75acc9bb4ab14_44583_0c10630f0f93df0b0334f8c3ee38e50e.webp 400w,
/project/rok/overview_architecture_hu79cdfa057779f12e35c75acc9bb4ab14_44583_b6fc08da139cab23fac5bd9cbf23cd68.webp 760w,
/project/rok/overview_architecture_hu79cdfa057779f12e35c75acc9bb4ab14_44583_1200x1200_fit_q75_h2_lanczos_3.webp 1200w"
src="https://harrychien1311.netlify.app/project/rok/overview_architecture_hu79cdfa057779f12e35c75acc9bb4ab14_44583_0c10630f0f93df0b0334f8c3ee38e50e.webp"
width="760"
height="303"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;em>Note: This overview architecture is not the actual implemented architecture&lt;/em>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Feature Importance" srcset="
/project/rok/feature_importance_hu471859d5a4bac3d1b27af4e98d1f1a31_37404_12840c1aa2b94871a9f3af70d2137f0c.webp 400w,
/project/rok/feature_importance_hu471859d5a4bac3d1b27af4e98d1f1a31_37404_7745da485234f88fdef5abd9748b7741.webp 760w,
/project/rok/feature_importance_hu471859d5a4bac3d1b27af4e98d1f1a31_37404_1200x1200_fit_q75_h2_lanczos_3.webp 1200w"
src="https://harrychien1311.netlify.app/project/rok/feature_importance_hu471859d5a4bac3d1b27af4e98d1f1a31_37404_12840c1aa2b94871a9f3af70d2137f0c.webp"
width="550"
height="331"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;em>Feature importance analyzing using SHAP&lt;/em>&lt;/p></description></item><item><title>AI-based Power forecasting for a solar energy system</title><link>https://harrychien1311.netlify.app/project/solar_energy_system/</link><pubDate>Mon, 01 Aug 2022 10:20:13 +0000</pubDate><guid>https://harrychien1311.netlify.app/project/solar_energy_system/</guid><description>&lt;ol>
&lt;li>
&lt;p>Summarize of the project: The solar energy system converts sunlight to electric. The inverter plays the very important role in this system. It converts Direct control (DC) electric to Alternative control (AC) electrics. Thus, a smart monitor system need to be designed to predict faults in the inverter panels and forecast the future AC power genrated based the inverter status.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Solutions:&lt;/p>
&lt;ul>
&lt;li>For the inverter fault detector, we designed the XGBoost regressor algorithm because of the light architecture and the effificiency. The fault detector will be deployed in an edge device and attached in inverter panels to quickly detect faults.&lt;/li>
&lt;li>For the power forecasting model, we leveraged the LSTM algorithm for better accuracy&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>My position: Team leader&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Main responsibilities:&lt;/p>
&lt;ul>
&lt;li>Model (XGBoost regressor) development for the inverter fault detection task by using Scikit-learn framework&lt;/li>
&lt;li>Implement the inference pipeline and deployed in a embedded device for inverter fault detection task&lt;/li>
&lt;li>Designed CI/CD pipeline to boost the productivity when deploying the inference pipeline with different models&lt;/li>
&lt;li>Code review and software design for the entire solution including power forecasting and inverter fault detection task&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Technologies and Tools used: Python, Scikit-learn, Docker, Pandas, Matplotlib&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;em>Note: This is a project ordered from Gaesoft-a big software company in Korea. Thus we cannot share the actual architecture image and the source code&lt;/em>&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Result" srcset="
/project/solar_energy_system/results_hu8070efd4e2b7526c10c638e8b5f652fe_246910_c606b64966e4af50080f52d69e042e9f.webp 400w,
/project/solar_energy_system/results_hu8070efd4e2b7526c10c638e8b5f652fe_246910_3e1459ec8eef1316c1ae90a089310a87.webp 760w,
/project/solar_energy_system/results_hu8070efd4e2b7526c10c638e8b5f652fe_246910_1200x1200_fit_q75_h2_lanczos_3.webp 1200w"
src="https://harrychien1311.netlify.app/project/solar_energy_system/results_hu8070efd4e2b7526c10c638e8b5f652fe_246910_c606b64966e4af50080f52d69e042e9f.webp"
width="760"
height="414"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;em>Power forecasting results&lt;/em>&lt;/p></description></item><item><title>Smart Cabin Monitoring system</title><link>https://harrychien1311.netlify.app/project/scms/</link><pubDate>Mon, 01 Aug 2022 10:20:13 +0000</pubDate><guid>https://harrychien1311.netlify.app/project/scms/</guid><description>&lt;ol>
&lt;li>
&lt;p>Summarize of the project: Design and develop an AI-based Smart cabin monitoring system for cars of Hyundai to monitor drivers and passenger&amp;rsquo;s behavior, emotions, detect seatbelt, child,&amp;hellip;&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Solutions: In this system, we designed many features including seatbelt detection, human detection, hands on-hands off in the steering wheel, driver&amp;rsquo;s hand gestures,&amp;hellip; An object detection model will be used to detect seatbelt, human and hands on/off and other features will be detected by different models. All of those model will be deployed in the Texas Intruments board which will be the embedded computer in Hyundai cars&lt;/p>
&lt;/li>
&lt;li>
&lt;p>My position: Data scientist/ AI engineer&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Main responsibilities:&lt;/p>
&lt;ul>
&lt;li>Processed and managed dataset&lt;/li>
&lt;li>Model (Edge AI YoloX) development especially applying quantize-aware training for human and seatbelt detection&lt;/li>
&lt;li>Developed model evaluation pipeline by leveraging Prefect framework and MongoDB&lt;/li>
&lt;li>Implemented the inference pipeline for human and seatbelt detection features&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Technologies and Tools used: Pytorch, Prefect, MongoDB, OpenCV&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;em>Note: This is an on-going project ordered from Hyundai Mobis. Thus we cannot share the actual architecture image and the source code&lt;/em>&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Result" srcset="
/project/scms/featured_hufbdf6e2bb0775629b7a7cf8bf2e04a3b_7402_b6788a1c577839ed8df5c5e07c701256.webp 400w,
/project/scms/featured_hufbdf6e2bb0775629b7a7cf8bf2e04a3b_7402_c1b998cff3a398f3b37bfbc8dcf9ecf6.webp 760w,
/project/scms/featured_hufbdf6e2bb0775629b7a7cf8bf2e04a3b_7402_1200x1200_fit_q75_h2_lanczos.webp 1200w"
src="https://harrychien1311.netlify.app/project/scms/featured_hufbdf6e2bb0775629b7a7cf8bf2e04a3b_7402_b6788a1c577839ed8df5c5e07c701256.webp"
width="317"
height="159"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>ID management system leveraging Blockchain and IoT technology</title><link>https://harrychien1311.netlify.app/project/id-management-system-leveraging-blockchain-and-iot-technology/</link><pubDate>Mon, 27 Jun 2022 10:20:13 +0000</pubDate><guid>https://harrychien1311.netlify.app/project/id-management-system-leveraging-blockchain-and-iot-technology/</guid><description>&lt;ol>
&lt;li>Summarize of the project: In this project, we want to build an application can manage the identification (ID) of users who check-in at public places such as hotels, airports, buildings,&amp;hellip; Hyperledger Fabric Blockchain framework are two core technologies used in this project. Every time users visit a public place, they do check-in process by the application installed in an embedded device (such as mobile phones). The application scans their face and requires some basic information such as name, purpose of visit, &amp;hellip; and add their check-in information to a blockchain-based database as a new block. If some special organizations such as government or police want to check the history check-in of a user for a special purpose, they can query this information from the application. Because the data written to a blockchain-based database cannot be changed, the information queried from the application can be authenticated.&lt;/li>
&lt;li>Technologies and Tools used: Hyperledger Fabric blochain framework, IoT Watson framework, Java Script&lt;/li>
&lt;li>Main responsibilities: Design and implement the blockchain network, develop Restful API for the blockchain network.&lt;/li>
&lt;li>We can share the design document of the demo version of the application&lt;/li>
&lt;/ol></description></item><item><title>Tracking control for Electro-Optical system in vibration environment</title><link>https://harrychien1311.netlify.app/project/tracking-control-for-electro-optical-system-in-vibration-envrionment/</link><pubDate>Sat, 25 Jun 2022 12:22:24 +0000</pubDate><guid>https://harrychien1311.netlify.app/project/tracking-control-for-electro-optical-system-in-vibration-envrionment/</guid><description>&lt;ol>
&lt;li>
&lt;p>Summary of the project:&lt;/p>
&lt;p>Electro-optical system (EOTs) is the system used in Military to track moving objects. The important requirement of the EOTSs is that the system must be accurately pointed to a fixed or moving target even if operating in vibration environment such as ship, air plane, tank. To achieve this task is not simple because of the disturbances affecting the operating of EOTS. The disturbances affecting the operating of EOTS are the disturbance torque because of angular motion of the base body (when EOTS works in vibration environment), cross-coupling effect between the pitch and yaw channel and so on.&lt;/p>
&lt;p>In this project, I and my partner proposed and implemented some modern and efficient control algorithms such as self-tuning Fuzzy PID, self-tuning fuzzy sliding mode to help the EOTs precisely track the moving targets.&lt;/p>
&lt;p>
&lt;figure id="figure-the-proposed-self-tuning-fuzzy-sliding-mode-control-architecture">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="The proposed self-tuning fuzzy sliding mode control architecture" srcset="
/project/tracking-control-for-electro-optical-system-in-vibration-envrionment/tracking_control_hu785c09dacd25d3829fb2d2372fde748d_3764_a50e1f91019ac588a96e6dcb1aa77e24.webp 400w,
/project/tracking-control-for-electro-optical-system-in-vibration-envrionment/tracking_control_hu785c09dacd25d3829fb2d2372fde748d_3764_1a63e3e77e20e25414c02258b48a87dd.webp 760w,
/project/tracking-control-for-electro-optical-system-in-vibration-envrionment/tracking_control_hu785c09dacd25d3829fb2d2372fde748d_3764_1200x1200_fit_q75_h2_lanczos_3.webp 1200w"
src="https://harrychien1311.netlify.app/project/tracking-control-for-electro-optical-system-in-vibration-envrionment/tracking_control_hu785c09dacd25d3829fb2d2372fde748d_3764_a50e1f91019ac588a96e6dcb1aa77e24.webp"
width="275"
height="183"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
The proposed self-tuning fuzzy sliding mode control architecture
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>This project is the project of Vietnam Academic of Science and Technology. Thus, I cannot share the code&lt;/p>
&lt;p>You can read our publication at: &lt;a href="https://vjs.ac.vn/index.php/jcc/article/view/12931/103810383012" target="_blank" rel="noopener">https://vjs.ac.vn/index.php/jcc/article/view/12931/103810383012&lt;/a>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Technologies and Programming languages used: Matlab, C++, Python, OpenCV&lt;/p>
&lt;/li>
&lt;li>
&lt;p>My position: Researcher&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Main responsibilities:&lt;/p>
&lt;ul>
&lt;li>Researched to propose the algorithms&lt;/li>
&lt;li>Desigined the algorithm and conducted the experiments by simulation in matlab to test the results&lt;/li>
&lt;li>Implemented and deployed the algorithms in AVR controller-a micro controller&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ol>
&lt;p>&lt;em>Note: This is the project of Vietnamese Academeic of Science and Technology. Thus I cannot share the detail source code. Please read the paper to understand the solution&lt;/em>&lt;/p></description></item><item><title>Product review classification</title><link>https://harrychien1311.netlify.app/project/product-review-classification/</link><pubDate>Sat, 25 Jun 2022 11:36:31 +0000</pubDate><guid>https://harrychien1311.netlify.app/project/product-review-classification/</guid><description>&lt;ol>
&lt;li>
&lt;p>Summary of the project:&lt;/p>
&lt;p>In this project, I build a LSTM-based sentiment classification model to classify custormer&amp;rsquo;s behaviour buying clothes and jewerly in the Amazon website based on their reviews of ordered products leaving on the website. The model&amp;rsquo;s output is a 3-class output which are postivie, negative and neutral. This project uses a pretrained word2vec model which is Google Word2Vec model to embed sentences into word embedding vectors. Then the LSTM model will use these embedding vectors to train the model.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>The goal of the project:This project will help the producers can control and understand their custormer behavior to improve their products.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Desired outputs:&lt;/p>
&lt;p>The customer&amp;rsquo;s behavior: Positive: Really like the product Negative: Really hate the product Neutral: Feel the product not too good but not bad&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Solution: Please read the source code to understand the solution&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Frameworks used: Keras, NLTK (Natual language processing toolkit)&lt;/p>
&lt;/li>
&lt;/ol></description></item><item><title>Dynamic Network Slice Scaling Assisted by Attention-Based Prediction in 5G Core Network</title><link>https://harrychien1311.netlify.app/project/optimizing-resource-scaling-for-network-slicing-through-deep-learning-based-forecasting/</link><pubDate>Wed, 15 Jun 2022 10:07:43 +0000</pubDate><guid>https://harrychien1311.netlify.app/project/optimizing-resource-scaling-for-network-slicing-through-deep-learning-based-forecasting/</guid><description>&lt;ol>
&lt;li>Summary of the project: Network slicing is a key technology in 5G and beyond networks to meet the diverse requirements of various applications. The resource usage forecasting in network slicing plays an important role in helping network operators scale network slices up and down accurately and timely to avoid Service Level Agreement (SLA) violations signed with network tenants.&lt;/li>
&lt;/ol>
&lt;p>Therefore, we propose some modern forecasting algorithms utilizing multivariate time series data to predict the future resource usage of virtual machines (VMs) in network slices.&lt;/p>
&lt;p>We also designed an automated resource configuration system whose main core is the proposed forecasting algorithms. The proposed automated resource configuration system will monitor the resources of VNF instances in the slices, predict the future resource usage and automatically scale in or out the number of VNF instances. The system is deployed on top of the ETSI NFV architecture&lt;/p>
&lt;p>Through comprehensive experiments, our proposed algorithm outperforms other state-of-the-arts forecasting algorithms only processing univariate time series data in both short-term prediction and long-term prediction to help network operator reduce the costs of SLA violation and resource overprovisioning.&lt;/p>
&lt;ol start="2">
&lt;li>
&lt;p>Solution: Please read the link of PPT file to read the detail of the solution&lt;/p>
&lt;/li>
&lt;li>
&lt;p>My position: Researcher&lt;/p>
&lt;/li>
&lt;li>
&lt;p>My main responsibilies:&lt;/p>
&lt;ul>
&lt;li>Exploratory data analyzing by using Pandas and Matplotlib libraries&lt;/li>
&lt;li>Researching to design the time series forecasting algorithm&lt;/li>
&lt;li>Implementing the algorithm and the inference pipeline by using scikit-learnand pytorch&lt;/li>
&lt;li>Writing the paper to publish the research results&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Technologies and Tools used: Python, Pytorch, Pandas, Scikit-learn, Scipy&lt;/p>
&lt;/li>
&lt;/ol></description></item><item><title>Two-phase Deep Learning-based EDOS Attack Detection System</title><link>https://harrychien1311.netlify.app/project/example/</link><pubDate>Thu, 09 Jun 2022 00:00:00 +0000</pubDate><guid>https://harrychien1311.netlify.app/project/example/</guid><description>&lt;ol>
&lt;li>Summary of the project: Cloud computing is currently considered the most cost-effective platform for offering business and consumer IT services over the Internet. However, it is prone to new vulnerabilities. A new type of attack called an economic denial of sustainability (EDoS) attack exploits the pay-per-use model to scale up the resource usage over time to the extent that the cloud user has to pay for the unexpected usage charge. To prevent EDoS attacks, a few solutions have been proposed, including hard-threshold and machine learning-based solutions. Among them, long short-term memory (LSTM)-based solutions achieve much higher accuracy and false-alarm rates than hard-threshold and other machine learning-based solutions. However, LSTM requires a long sequence length of the input data, leading to a degraded performance owing to increases in the calculations, the detection time, and consuming a large number of computing resources of the defense system.&lt;/li>
&lt;/ol>
&lt;p>We, therefore, propose a two-phase deep learning-based EDoS detection scheme that uses an LSTM model to detect each abnormal flow in network traffic; however, the LSTM model requires only a short sequence length of five of the input data. Thus, the proposed scheme can take advantage of the efficiency of the LSTM algorithm in detecting each abnormal flow in network traffic, while reducing the required sequence length of the input data. A comprehensive performance evaluation shows that our proposed scheme outperforms the existing solutions in terms of accuracy and resource consumption.&lt;/p>
&lt;ol start="2">
&lt;li>
&lt;p>My position: Researcher&lt;/p>
&lt;/li>
&lt;li>
&lt;p>My main responsibilies:&lt;/p>
&lt;ul>
&lt;li>Idea proposing&lt;/li>
&lt;li>Conduct big data analysis by using Pyspark and scipy, Pandas, matplotlib&lt;/li>
&lt;li>Model development and Deploying&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Technologies or Tools used: Python, Keras, Apache Spark, Pandas, Scipy, Matplotlib, Wireshark, Ansible, SplitCap&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>The github link of the project: &lt;a href="https://github.com/harrychien1311/Two-phase-Deep-learning-based-EDoS-Detection-System" target="_blank" rel="noopener">https://github.com/harrychien1311/Two-phase-Deep-learning-based-EDoS-Detection-System&lt;/a>&lt;/p></description></item></channel></rss>