首页 > 最新文献

2019 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
A Decade Bibliometric Review of Road Traffic Accidents and Incidents: A Computational Perspective 道路交通事故和事件的十年文献计量回顾:一个计算的视角
Tebogo Makaba, B. Gatsheni
Road traffic accidents and incidents are responsible for death, injuries and physical disabilities in many developed countries. This burden mainly affects road users, short-term insurance companies, road accident funds, and the public health care infrastructure. This study reviewed the literature on research in road traffic accidents/incidents(RTA/RTI) from a global and African perspective. The bibliometric review included publications from journals, conference proceedings, books and book chapters. The main focus of the study was a comparison of the global and African perspectives using data extracted from Scopus decade between 2010 to August 2019. The data generated from Scopus was used to map out links, gaps, and contributions that had been published in this research space. Further analysis was conducted using MS Excel and the VOSviewer science mapping visualizer graphical tool. The review found that globally and in Africa there was a gradual increase in research being done in the field of road traffic accidents/incidents.
在许多发达国家,道路交通事故和事件造成死亡、受伤和身体残疾。这一负担主要影响道路使用者、短期保险公司、道路事故基金和公共卫生保健基础设施。本研究从全球和非洲的角度回顾了道路交通事故/事件(RTA/RTI)的研究文献。文献计量学审查包括来自期刊、会议记录、书籍和书籍章节的出版物。该研究的主要重点是使用从2010年至2019年8月的Scopus十年中提取的数据对全球和非洲的观点进行比较。从Scopus中生成的数据用于绘制链接、差距和已在该研究领域发表的贡献。使用MS Excel和VOSviewer科学制图可视化工具进行进一步分析。审查发现,在全球和非洲,道路交通事故/事件领域的研究正在逐步增加。
{"title":"A Decade Bibliometric Review of Road Traffic Accidents and Incidents: A Computational Perspective","authors":"Tebogo Makaba, B. Gatsheni","doi":"10.1109/CSCI49370.2019.00098","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00098","url":null,"abstract":"Road traffic accidents and incidents are responsible for death, injuries and physical disabilities in many developed countries. This burden mainly affects road users, short-term insurance companies, road accident funds, and the public health care infrastructure. This study reviewed the literature on research in road traffic accidents/incidents(RTA/RTI) from a global and African perspective. The bibliometric review included publications from journals, conference proceedings, books and book chapters. The main focus of the study was a comparison of the global and African perspectives using data extracted from Scopus decade between 2010 to August 2019. The data generated from Scopus was used to map out links, gaps, and contributions that had been published in this research space. Further analysis was conducted using MS Excel and the VOSviewer science mapping visualizer graphical tool. The review found that globally and in Africa there was a gradual increase in research being done in the field of road traffic accidents/incidents.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115756500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topic Extraction and Classification for Questions Posted in Community-Based Question Answering Services 社区问答服务中问题的主题提取与分类
Q. Ma, M. Murata
This paper presents methods of simultaneously performing topic/keyword extraction and unsupervised classification for questions posted in community-based question answering services (CQA) or Q&A websites, using topic models and hybrid models. Large-scale experiments on two kinds of data, one called category data and the other called subtyping data, show the effectiveness of our methods. The purity and correct rate show that the topic models outperform clustering methods, hybrid models outperform topic models in question classification, and the adoption of term frequency-inverse document frequency is effective for the subtyping data. Manual evaluations with the extracted keywords show the effectiveness of the topic models in topic extraction.
本文提出了利用主题模型和混合模型对基于社区的问答服务(CQA)或问答网站上发布的问题同时进行主题/关键词提取和无监督分类的方法。在两种数据上的大规模实验,一种是类别数据,另一种是亚型数据,表明了我们的方法的有效性。纯度和正确率表明,主题模型在问题分类方面优于聚类方法,混合模型在问题分类方面优于主题模型,采用词频-逆文档频率对子类型数据是有效的。用提取的关键词进行人工评价,表明了主题模型在主题提取中的有效性。
{"title":"Topic Extraction and Classification for Questions Posted in Community-Based Question Answering Services","authors":"Q. Ma, M. Murata","doi":"10.1109/CSCI49370.2019.00253","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00253","url":null,"abstract":"This paper presents methods of simultaneously performing topic/keyword extraction and unsupervised classification for questions posted in community-based question answering services (CQA) or Q&A websites, using topic models and hybrid models. Large-scale experiments on two kinds of data, one called category data and the other called subtyping data, show the effectiveness of our methods. The purity and correct rate show that the topic models outperform clustering methods, hybrid models outperform topic models in question classification, and the adoption of term frequency-inverse document frequency is effective for the subtyping data. Manual evaluations with the extracted keywords show the effectiveness of the topic models in topic extraction.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gamified Coding: Toy Robots and Playful Learning in Early Education 游戏化编码:玩具机器人和早期教育中的有趣学习
K. Heljakka, P. Ihamäki, Pauliina Tuomi, Petri Saarikoski
This paper explores the activity of coding with smart toy robots Dash and Botley as a part of playful learning in the Finnish early education context. The findings of our study demonstrate how coding with the two toy robots was approached, conducted and played by Finnish preschoolers aged 5-6 years. The main conclusion of the study is that preschoolers used the toy robots with affordances related to coding mainly in developing gamified play around them by designing tracks for the toys, programming the toys to solve obstacle paths, and competing in player-generated contests of dexterity, speed and physically mobile play.
本文探讨了智能玩具机器人Dash和Botley的编码活动,作为芬兰早期教育背景下好玩学习的一部分。我们的研究结果展示了芬兰5-6岁的学龄前儿童是如何使用两个玩具机器人进行编码的。该研究的主要结论是,学龄前儿童使用具有编码功能的玩具机器人主要是为了围绕他们开发游戏化游戏,为玩具设计轨道,为玩具编程以解决障碍路径,并在玩家生成的灵巧性,速度和身体移动游戏竞赛中竞争。
{"title":"Gamified Coding: Toy Robots and Playful Learning in Early Education","authors":"K. Heljakka, P. Ihamäki, Pauliina Tuomi, Petri Saarikoski","doi":"10.1109/CSCI49370.2019.00152","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00152","url":null,"abstract":"This paper explores the activity of coding with smart toy robots Dash and Botley as a part of playful learning in the Finnish early education context. The findings of our study demonstrate how coding with the two toy robots was approached, conducted and played by Finnish preschoolers aged 5-6 years. The main conclusion of the study is that preschoolers used the toy robots with affordances related to coding mainly in developing gamified play around them by designing tracks for the toys, programming the toys to solve obstacle paths, and competing in player-generated contests of dexterity, speed and physically mobile play.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Segmentation and Volumetric Analysis of Colon Wall for Detection of Flat Polyp Candidates via CT Colonography CT结肠镜下结肠壁分割及体积分析对扁平息肉候选物的检测
Lihong C. Li, Xinzhou Wei, Kenneth Ng, Anushka Banerjee, Huafeng Wang, Wenfeng Song, Zhengrong Liang
Accurate segmentation and volumetric analysis of colon wall is essential to advance computer-aided detection (CAD) of colonic polyps in computed tomography colonography (CTC). Due to their limited geometric information, detection of flat polyps is very difficult in both optical colonoscopy and CTC. In this paper, we present a new framework of segmentation and volumetric analysis of colon wall for improving detection of flat polyps. First, partial volume (PV) effects around the inner mucous membrane of the colon were reserved through our PV based electronic colon cleansing. PV information was further used to guide colon wall segmentation as well as to establish the starting point of iso-potential surfaces for colon wall thickness measures. Then, we employed a dual level set competition model to simultaneously segment both inner and outer colon wall by taking into account the mutual interference between two borders. We further conducted volumetric analysis of the dynamic colon wall information and built four layer of iso-potential surfaces which represent the intrinsic anatomical information of colon wall. We built a unique point-to-point path starting from the very beginning of the mucous membrane of the colon. As flat polyps are plaque-like lesions raised less than 3mm from the colonic mucosa layer, inclusion of PV effects shall bring us the fine information about flat polyps, thus improving the detection performance. The proposed framework was validated on patient CTC scans with flat polyps. Experimental results demonstrated that the framework is very promising towards detection of colonic flat polyps via CTC.
在计算机断层结肠镜检查(CTC)中,精确的结肠壁分割和体积分析是提高结肠息肉的计算机辅助检测(CAD)的必要条件。由于扁平息肉的几何信息有限,无论是光学结肠镜检查还是CTC检查,扁平息肉的检测都非常困难。本文提出了一种新的结肠壁分割和体积分析框架,以提高对扁平息肉的检测。首先,通过我们基于PV的电子结肠清洁,保留了结肠内粘膜周围的部分体积(PV)效应。进一步利用PV信息指导肠壁分割,建立肠壁厚度测量等电位面起始点。然后,我们采用双水平集竞争模型,考虑到两个边界之间的相互干扰,同时分割内外结肠壁。我们进一步对动态结肠壁信息进行了体积分析,并构建了四层等电位面,代表了结肠壁的内在解剖信息。我们建立了一个独特的点对点路径从结肠粘膜的最开始。由于扁平息肉是斑块状病变,凸起距离结肠粘膜层小于3mm,因此纳入PV效应可为我们提供扁平息肉的精细信息,从而提高检测性能。提出的框架在患有扁平息肉的患者CTC扫描上得到验证。实验结果表明,该框架在结肠扁平息肉的CTC检测中具有很好的应用前景。
{"title":"Segmentation and Volumetric Analysis of Colon Wall for Detection of Flat Polyp Candidates via CT Colonography","authors":"Lihong C. Li, Xinzhou Wei, Kenneth Ng, Anushka Banerjee, Huafeng Wang, Wenfeng Song, Zhengrong Liang","doi":"10.1109/CSCI49370.2019.00193","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00193","url":null,"abstract":"Accurate segmentation and volumetric analysis of colon wall is essential to advance computer-aided detection (CAD) of colonic polyps in computed tomography colonography (CTC). Due to their limited geometric information, detection of flat polyps is very difficult in both optical colonoscopy and CTC. In this paper, we present a new framework of segmentation and volumetric analysis of colon wall for improving detection of flat polyps. First, partial volume (PV) effects around the inner mucous membrane of the colon were reserved through our PV based electronic colon cleansing. PV information was further used to guide colon wall segmentation as well as to establish the starting point of iso-potential surfaces for colon wall thickness measures. Then, we employed a dual level set competition model to simultaneously segment both inner and outer colon wall by taking into account the mutual interference between two borders. We further conducted volumetric analysis of the dynamic colon wall information and built four layer of iso-potential surfaces which represent the intrinsic anatomical information of colon wall. We built a unique point-to-point path starting from the very beginning of the mucous membrane of the colon. As flat polyps are plaque-like lesions raised less than 3mm from the colonic mucosa layer, inclusion of PV effects shall bring us the fine information about flat polyps, thus improving the detection performance. The proposed framework was validated on patient CTC scans with flat polyps. Experimental results demonstrated that the framework is very promising towards detection of colonic flat polyps via CTC.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Teaching Undergraduate Software Engineering: Xcode Mobile App Development during Dedicated Lab Periods 软件工程本科教学:Xcode移动应用开发
M. Javed, M. Estep
The focus of this study is to explore the CS 4204 Software Engineering dedicated lab period accompanying traditional lectures. iPhone mobile app development took place using the industry standard Apple Xcode IDE and the Swift programming language in a Mac lab. Tutorials that built upon each other were assigned to students, leading to a culminating project. The labs were designed with the intent of helping students put software engineering theory into practice during mobile app development. Student perceptions and lab maintenance issues were discussed. Overall, faculty concluded that the added lab periods were beneficial for students.
本研究的重点是探讨CS 4204软件工程专用实验期间伴随传统的讲座。iPhone移动应用程序的开发是在Mac实验室中使用行业标准的Apple Xcode IDE和Swift编程语言进行的。互相建立的教程被分配给学生,导致一个最终的项目。这些实验室的设计目的是帮助学生在移动应用程序开发过程中将软件工程理论付诸实践。讨论了学生的看法和实验室维护问题。总的来说,教师们得出的结论是,增加的实验时间对学生有益。
{"title":"Teaching Undergraduate Software Engineering: Xcode Mobile App Development during Dedicated Lab Periods","authors":"M. Javed, M. Estep","doi":"10.1109/CSCI49370.2019.00160","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00160","url":null,"abstract":"The focus of this study is to explore the CS 4204 Software Engineering dedicated lab period accompanying traditional lectures. iPhone mobile app development took place using the industry standard Apple Xcode IDE and the Swift programming language in a Mac lab. Tutorials that built upon each other were assigned to students, leading to a culminating project. The labs were designed with the intent of helping students put software engineering theory into practice during mobile app development. Student perceptions and lab maintenance issues were discussed. Overall, faculty concluded that the added lab periods were beneficial for students.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127131910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CloudMonitor: Data Flow Filtering as a Service CloudMonitor:数据流过滤即服务
F. Alqahtani, Frederick T. Sheldon
The primary concern of cloud service consuming organizations is the kind of control that they may have over their data. Companies are legally required to monitor a subset of the data that is crucial both to their business and customers. Conversely, the cloud service providers are not showing commitment towards securely handling enterprise data, and this may put sensitive data at risk. Hence, consumers are expected to maintain control over their sensitive data both at their local infrastructure and in the cloud. To achieve this, companies are practicing methods that would typically block access to cloud service that stores sensitive data at the network level. However, such restrictions may limit employee performance, and at the same time may not combat the malicious activities of bad employees. In this paper, we propose a model that allows consumers and providers the ability to transparently track the data in the cloud environment. The model allows consumers to have control over their data and conduct an audit to the treatment of their data by third-party services, while employees are allowed to use the cloud service.
使用云服务的组织主要关心的是他们对数据的控制类型。法律要求公司监控对其业务和客户都至关重要的数据子集。相反,云服务提供商没有表现出对安全处理企业数据的承诺,这可能会使敏感数据处于危险之中。因此,消费者需要在本地基础设施和云中保持对其敏感数据的控制。为了实现这一目标,公司正在实践通常会阻止访问在网络级别存储敏感数据的云服务的方法。然而,这样的限制可能会限制员工的绩效,同时可能无法打击不良员工的恶意活动。在本文中,我们提出了一个模型,该模型允许消费者和提供者透明地跟踪云环境中的数据。该模型允许消费者控制自己的数据,并对第三方服务对其数据的处理进行审计,同时允许员工使用云服务。
{"title":"CloudMonitor: Data Flow Filtering as a Service","authors":"F. Alqahtani, Frederick T. Sheldon","doi":"10.1109/CSCI49370.2019.00271","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00271","url":null,"abstract":"The primary concern of cloud service consuming organizations is the kind of control that they may have over their data. Companies are legally required to monitor a subset of the data that is crucial both to their business and customers. Conversely, the cloud service providers are not showing commitment towards securely handling enterprise data, and this may put sensitive data at risk. Hence, consumers are expected to maintain control over their sensitive data both at their local infrastructure and in the cloud. To achieve this, companies are practicing methods that would typically block access to cloud service that stores sensitive data at the network level. However, such restrictions may limit employee performance, and at the same time may not combat the malicious activities of bad employees. In this paper, we propose a model that allows consumers and providers the ability to transparently track the data in the cloud environment. The model allows consumers to have control over their data and conduct an audit to the treatment of their data by third-party services, while employees are allowed to use the cloud service.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122321443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data and Simulation to Analyze Higher Education Sustainable Development 大数据与仿真分析高等教育可持续发展
A. Kurkovsky
Higher education institutions already accumulated enormous volumes of big data associated with student success, enrolment, professors, educational programs, educational computer systems, economics, etc., that potentially can be used for sustainable development analysis. However, their practical applications in higher education institutions are remained relatively rare because of complexity in the subject domain and lack of a methodological base to reuse some effective previously created models. This paper introduces an approach to incorporate big data into higher education sustainability analysis and reduce the complexity of the subject domain infrastructure by using a set of formalized systems. Within this approach, a simulation umbrella is used as a united methodological base to combine big data and sustainability analysis implementation. To illustrate how the proposed approach works, a simulation case-study associated with a USA young fast-growing higher education institution included in the paper.
高等教育机构已经积累了大量与学生成功、招生、教授、教育计划、教育计算机系统、经济学等相关的大数据,这些数据有可能用于可持续发展分析。然而,由于学科领域的复杂性和缺乏方法基础来重用一些有效的先前创建的模型,它们在高等教育机构中的实际应用仍然相对较少。本文介绍了一种将大数据纳入高等教育可持续性分析的方法,并通过使用一套形式化系统来降低学科领域基础设施的复杂性。在这种方法中,模拟伞被用作统一的方法基础,以结合大数据和可持续性分析实施。为了说明所提出的方法是如何工作的,本文中包括了一个与美国快速发展的年轻高等教育机构相关的模拟案例研究。
{"title":"Big Data and Simulation to Analyze Higher Education Sustainable Development","authors":"A. Kurkovsky","doi":"10.1109/CSCI49370.2019.00242","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00242","url":null,"abstract":"Higher education institutions already accumulated enormous volumes of big data associated with student success, enrolment, professors, educational programs, educational computer systems, economics, etc., that potentially can be used for sustainable development analysis. However, their practical applications in higher education institutions are remained relatively rare because of complexity in the subject domain and lack of a methodological base to reuse some effective previously created models. This paper introduces an approach to incorporate big data into higher education sustainability analysis and reduce the complexity of the subject domain infrastructure by using a set of formalized systems. Within this approach, a simulation umbrella is used as a united methodological base to combine big data and sustainability analysis implementation. To illustrate how the proposed approach works, a simulation case-study associated with a USA young fast-growing higher education institution included in the paper.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"os9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128324269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correcting Timing Mismatch of Interleaved ADCs Using DCT 用DCT校正交错adc的时序失配
Sung-won Park, Taesic Kim
Interleaved ADCs are used to increase sampling rate of available existing ADCs. By utilizing M ADCs, sampling rate can be increased by a factor of M. Interleaving of ADCs results in timing mismatch that causes nonuniform sampling. Timing mismatch correction in the frequency domain is considered in this paper. For a stationary signal the entire length of the nonuniformly sampled signal is transformed and timing mismatch is corrected in the frequency domain. Using the inverse Fourier transform, the uniformly sampled signal is reconstructed. The longer the signal, the better the performance in terms of correction. However, for a long signal long delay is required for correction. In image compression DCT is used for small blocks of an image. In this paper DCT is used to correct timing mismatch. Only M-point DCT is used for correction to minimize the delay. The experimental results show that the timing mismatch correction using DCT performs better than the DFT method.
交错adc用于提高现有可用adc的采样率。通过使用M个adc,采样率可以提高M倍。adc的交错会导致时序失配,从而导致采样不均匀。本文考虑了频域内的时序失配校正。对于平稳信号,对非均匀采样信号的整个长度进行变换,并在频域对时序失配进行校正。利用傅里叶反变换对均匀采样信号进行重构。信号越长,在校正方面的表现越好。然而,对于长信号,需要长时间的延迟进行校正。在图像压缩中,DCT用于图像的小块。本文采用离散余弦变换校正时序失配。仅使用m点DCT进行校正,以减小延迟。实验结果表明,DCT的时序失配校正效果优于DFT方法。
{"title":"Correcting Timing Mismatch of Interleaved ADCs Using DCT","authors":"Sung-won Park, Taesic Kim","doi":"10.1109/CSCI49370.2019.00111","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00111","url":null,"abstract":"Interleaved ADCs are used to increase sampling rate of available existing ADCs. By utilizing M ADCs, sampling rate can be increased by a factor of M. Interleaving of ADCs results in timing mismatch that causes nonuniform sampling. Timing mismatch correction in the frequency domain is considered in this paper. For a stationary signal the entire length of the nonuniformly sampled signal is transformed and timing mismatch is corrected in the frequency domain. Using the inverse Fourier transform, the uniformly sampled signal is reconstructed. The longer the signal, the better the performance in terms of correction. However, for a long signal long delay is required for correction. In image compression DCT is used for small blocks of an image. In this paper DCT is used to correct timing mismatch. Only M-point DCT is used for correction to minimize the delay. The experimental results show that the timing mismatch correction using DCT performs better than the DFT method.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach 在执行检测时限制社会僵尸网络的有效性:一种概率方法
Matthew Spradling, Mark Allison, Tsenguun Tsogbadrakh, Jay Strong
The prevalence of social botnets has increased public distrust of social media networks. Current methods exist for detecting bot activity on Twitter, Reddit, Facebook, and other social media platforms. Most of these detection methods rely upon observing user behavior for a period of time. Unfortunately, the behavior observation period allows time for a botnet to successfully propagate one or many posts before removal. In this paper, we model the post propagation patterns of normal users and social botnets. We prove that a botnet may exploit deterministic propagation actions to elevate a post even with a small botnet population. We propose a probabilistic model which can limit the impact of social media botnets until they can be detected and removed. While our approach maintains expected results for non-coordinated activity, coordinated botnets will be detected before propagation with high probability.
社交僵尸网络的盛行增加了公众对社交媒体网络的不信任。目前存在检测Twitter、Reddit、Facebook和其他社交媒体平台上机器人活动的方法。这些检测方法大多依赖于一段时间内对用户行为的观察。不幸的是,行为观察期允许僵尸网络在删除之前成功传播一个或多个帖子。在本文中,我们对普通用户和社交僵尸网络的后传播模式进行了建模。我们证明了即使僵尸网络人口很少,僵尸网络也可以利用确定性传播行为来提升帖子。我们提出了一个概率模型,可以限制社交媒体僵尸网络的影响,直到它们可以被检测和移除。虽然我们的方法对非协调活动保持预期结果,但协调僵尸网络将以高概率在传播之前被检测到。
{"title":"Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach","authors":"Matthew Spradling, Mark Allison, Tsenguun Tsogbadrakh, Jay Strong","doi":"10.1109/CSCI49370.2019.00259","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00259","url":null,"abstract":"The prevalence of social botnets has increased public distrust of social media networks. Current methods exist for detecting bot activity on Twitter, Reddit, Facebook, and other social media platforms. Most of these detection methods rely upon observing user behavior for a period of time. Unfortunately, the behavior observation period allows time for a botnet to successfully propagate one or many posts before removal. In this paper, we model the post propagation patterns of normal users and social botnets. We prove that a botnet may exploit deterministic propagation actions to elevate a post even with a small botnet population. We propose a probabilistic model which can limit the impact of social media botnets until they can be detected and removed. While our approach maintains expected results for non-coordinated activity, coordinated botnets will be detected before propagation with high probability.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114309911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Blind and Robust Watermarking Technique of Multiple Images 一种新的多图像盲鲁棒水印技术
W. Khedr, Mohamed W. Abo Elsoud
The most traditional watermark techniques are used widely in information hiding technology. However, these techniques require some information of origin images to extract it from the cover image in frequency domain. This paper introduces a new blind watermark technique for embedding three watermark gray images into a color cover image based on Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). The proposed technique is consists of three phases: Firstly, the three gray images are embedded into SVD components of cover color image to produce watermarked image. Secondly, the watermarked image is again embedded into the low frequency (DWTDCT) domains of one component of RGB origin cover image to produce the final resultant watermarked image. Finally, the three watermark images are blind extracted in the reverse operations without require to their SVD components. The implementation of the proposed technique is a perceptible improvement of experimental results compared with the recently watermarked techniques with respected to PSNR and Normalized Correlation (NC). This technique is also a robust to noise and intentional attacks.
传统的水印技术在信息隐藏技术中得到了广泛的应用。然而,这些技术需要在频域从覆盖图像中提取一些原始图像的信息。介绍了一种基于离散小波变换(DWT)、离散余弦变换(DCT)和奇异值分解(SVD)的三幅灰度水印嵌入彩色封面图像的盲水印技术。该技术分为三个阶段:首先,将三幅灰度图像嵌入到覆盖彩色图像的奇异值分解分量中,生成水印图像;其次,将水印图像再次嵌入到RGB原始覆盖图像的一个分量的低频域(DWTDCT)中,生成最终的水印图像。最后,在不需要SVD分量的情况下,对三幅水印图像进行反向盲提取。与目前的水印技术相比,该技术的实现在PSNR和归一化相关(NC)方面有了明显的改进。该技术对噪声和故意攻击也具有鲁棒性。
{"title":"A Novel Blind and Robust Watermarking Technique of Multiple Images","authors":"W. Khedr, Mohamed W. Abo Elsoud","doi":"10.1109/CSCI49370.2019.00112","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00112","url":null,"abstract":"The most traditional watermark techniques are used widely in information hiding technology. However, these techniques require some information of origin images to extract it from the cover image in frequency domain. This paper introduces a new blind watermark technique for embedding three watermark gray images into a color cover image based on Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). The proposed technique is consists of three phases: Firstly, the three gray images are embedded into SVD components of cover color image to produce watermarked image. Secondly, the watermarked image is again embedded into the low frequency (DWTDCT) domains of one component of RGB origin cover image to produce the final resultant watermarked image. Finally, the three watermark images are blind extracted in the reverse operations without require to their SVD components. The implementation of the proposed technique is a perceptible improvement of experimental results compared with the recently watermarked techniques with respected to PSNR and Normalized Correlation (NC). This technique is also a robust to noise and intentional attacks.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116370539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1