首页 > 最新文献

2019 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Real World Road Platoons and Negative Obstacles 真实世界的道路排和负面障碍
H. Hexmoor, K. Ahmed
The real world road segments contain negative obstacles and hazards as well as congestions that impede free flowing traffic. In addition, real world vehicles are differently equipped and at various roadworthy states. Vehicle platoons are more efficient when the leader selection accounts for actual road conditions and specific attributes of vehicle involved. We propose real world consideration and attributes that represent vehicles and roads in the real world and how to select the most fit platoon leaders. Communication and leader selection methodology is discussed and preliminary results for negative obstacle detection are offered.
现实世界的路段包含负面障碍和危险,以及阻塞阻碍自由流动的交通。此外,现实世界的车辆装备不同,处于各种适合道路行驶的状态。当领导者的选择考虑到实际道路条件和所涉及车辆的特定属性时,车辆排的效率更高。我们提出了现实世界的考虑因素和代表现实世界中车辆和道路的属性,以及如何选择最合适的排长。讨论了沟通和领导者选择方法,并给出了负障碍检测的初步结果。
{"title":"Real World Road Platoons and Negative Obstacles","authors":"H. Hexmoor, K. Ahmed","doi":"10.1109/CSCI49370.2019.00123","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00123","url":null,"abstract":"The real world road segments contain negative obstacles and hazards as well as congestions that impede free flowing traffic. In addition, real world vehicles are differently equipped and at various roadworthy states. Vehicle platoons are more efficient when the leader selection accounts for actual road conditions and specific attributes of vehicle involved. We propose real world consideration and attributes that represent vehicles and roads in the real world and how to select the most fit platoon leaders. Communication and leader selection methodology is discussed and preliminary results for negative obstacle detection are offered.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECG Signal Analysis Using 2-D Image Classification with Convolutional Neural Network 基于卷积神经网络的二维图像分类心电信号分析
Muhammad Wasimuddin, K. Elleithy, Abdel-shakour Abuzneid, M. Faezipour, O. Abuzaghleh
Cardiovascular diseases, listed as the underlying cause of death, accounted for approximately 836,546 deaths in the United States in 2018. Statistics show that almost one of every three deaths in the US is a result of heart disease. Nearly 2,300 Americans die of cardiovascular disease each day, an average of one death every 38 seconds. This is while quick and immediate action at the onset of such heart conditions can save many lives. To this end, ample research has been reported in the literature on Electrocardiogram (ECG) signal analysis to determine arrhythmia and other cardiac conditions. However, more accurate and near real-time techniques are still under investigation. This work introduces a classifier that will detect abnormalities of the ECG signal with its analysis as a 2-D image fed to a Convolutional Neural Network (CNN) classifier. The proposed method classifies the ECG signal as normal or abnormal by transforming the single-lead ECG signal into images and then applying CNN classification. Images are taken from the European ST-T dataset on PhysioNet databank. Our method yields an accuracy of 97.47%.
心血管疾病被列为潜在死亡原因,2018年美国约有836546人死于心血管疾病。统计数据显示,在美国,几乎每三个死亡中就有一个死于心脏病。每天有近2300名美国人死于心血管疾病,平均每38秒就有一人死亡。然而,在这种心脏病发作时迅速采取行动可以挽救许多生命。为此,文献报道了大量关于心电图(ECG)信号分析以确定心律失常和其他心脏疾病的研究。然而,更精确和接近实时的技术仍在研究中。这项工作介绍了一种分类器,该分类器将检测ECG信号的异常,并将其分析为二维图像馈送到卷积神经网络(CNN)分类器。该方法通过将单导联心电信号转换成图像,然后应用CNN分类,对心电信号进行正常或异常分类。图片取自PhysioNet数据库上的欧洲ST-T数据集。该方法的准确率为97.47%。
{"title":"ECG Signal Analysis Using 2-D Image Classification with Convolutional Neural Network","authors":"Muhammad Wasimuddin, K. Elleithy, Abdel-shakour Abuzneid, M. Faezipour, O. Abuzaghleh","doi":"10.1109/CSCI49370.2019.00180","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00180","url":null,"abstract":"Cardiovascular diseases, listed as the underlying cause of death, accounted for approximately 836,546 deaths in the United States in 2018. Statistics show that almost one of every three deaths in the US is a result of heart disease. Nearly 2,300 Americans die of cardiovascular disease each day, an average of one death every 38 seconds. This is while quick and immediate action at the onset of such heart conditions can save many lives. To this end, ample research has been reported in the literature on Electrocardiogram (ECG) signal analysis to determine arrhythmia and other cardiac conditions. However, more accurate and near real-time techniques are still under investigation. This work introduces a classifier that will detect abnormalities of the ECG signal with its analysis as a 2-D image fed to a Convolutional Neural Network (CNN) classifier. The proposed method classifies the ECG signal as normal or abnormal by transforming the single-lead ECG signal into images and then applying CNN classification. Images are taken from the European ST-T dataset on PhysioNet databank. Our method yields an accuracy of 97.47%.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Classifying DNS Servers Based on Response Message Matrix Using Machine Learning 基于响应消息矩阵的机器学习分类DNS服务器
K. Shima, Ryo Nakamura, Kazuya Okada, Tomohiro Ishihara, Daisuke Miyamoto, Y. Sekiya
Improperly configured Domain Name System (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however, is a non-trivial operation. In this paper, we propose a detection mechanism for DNS servers used as reflectors by using a DNS server feature matrix built from a small number of packets and a machine learning algorithm. The F1 score of bad DNS server detection was over 0.9 when the test and training data are generated within the same day.
配置不当的DNS服务器有时会被用作数据包反射器,作为DoS或DDoS攻击的一部分。通过监视DNS请求和响应流量,可以在逻辑上检测由该活动创建的数据包。任何没有相应请求的响应都可以视为反射消息;然而,检查和跟踪每个DNS数据包是一项非常重要的操作。在本文中,我们提出了一种用于作为反射器的DNS服务器的检测机制,该机制使用由少量数据包构建的DNS服务器特征矩阵和机器学习算法。当测试和训练数据在同一天生成时,坏DNS服务器检测F1得分在0.9以上。
{"title":"Classifying DNS Servers Based on Response Message Matrix Using Machine Learning","authors":"K. Shima, Ryo Nakamura, Kazuya Okada, Tomohiro Ishihara, Daisuke Miyamoto, Y. Sekiya","doi":"10.1109/CSCI49370.2019.00291","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00291","url":null,"abstract":"Improperly configured Domain Name System (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however, is a non-trivial operation. In this paper, we propose a detection mechanism for DNS servers used as reflectors by using a DNS server feature matrix built from a small number of packets and a machine learning algorithm. The F1 score of bad DNS server detection was over 0.9 when the test and training data are generated within the same day.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129052242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Risk Prediction of Critical Vital Signs for ICU Patients Using Recurrent Neural Network 应用循环神经网络预测ICU患者危重生命体征风险
Daniel Chang, David Chang, M. Pourhomayoun
Monitoring vital signs for Intensive Care Unit (ICU) patients is an absolute necessity to help assess the general physical health. In this research, we use machine learning to make a classification forecast that uses continuous ICU vital signs measurements to predict whether the vital signs of the next hour would reach the critical value or not. With the early warning, nurses and doctors can prevent emergency situations that may cause organ dysfunction or even death before it is too late. In this study, the data includes vital sign measurements, laboratory test results, procedures, medications collected from over 40,000 patients. After data preprocessing, bias data balancing, feature extraction, and feature selection, we have a clean dataset with informative and discriminating features. Then, various machine learning algorithms including Random Forest, XGBoost, Artificial Neural Networks (ANN), and LSTM were developed to predict critical vital signs of ICU patients 1-hour beforehand. We particularly developed predictive models to predict Heart Rate, Blood Oxygen Level (SpO2), Mean Arterial Pressure (MAP), Respiratory Rate (RR), Systolic Blood Pressure (SBP). The results demonstrated the accuracy of the developed methods.
监测重症监护病房(ICU)患者的生命体征是绝对必要的,以帮助评估一般的身体健康。在本研究中,我们使用机器学习进行分类预测,使用连续的ICU生命体征测量来预测下一个小时的生命体征是否会达到临界值。有了早期预警,护士和医生可以预防可能导致器官功能障碍甚至死亡的紧急情况,以免为时已晚。在这项研究中,数据包括生命体征测量,实验室测试结果,程序,从40,000多名患者收集的药物。经过数据预处理、偏置数据平衡、特征提取和特征选择,我们得到了一个具有信息和判别特征的干净数据集。然后,采用随机森林、XGBoost、人工神经网络(ANN)、LSTM等多种机器学习算法提前1小时预测ICU患者的危重生命体征。我们特别开发了预测模型来预测心率、血氧水平(SpO2)、平均动脉压(MAP)、呼吸频率(RR)、收缩压(SBP)。结果证明了所建立方法的准确性。
{"title":"Risk Prediction of Critical Vital Signs for ICU Patients Using Recurrent Neural Network","authors":"Daniel Chang, David Chang, M. Pourhomayoun","doi":"10.1109/CSCI49370.2019.00191","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00191","url":null,"abstract":"Monitoring vital signs for Intensive Care Unit (ICU) patients is an absolute necessity to help assess the general physical health. In this research, we use machine learning to make a classification forecast that uses continuous ICU vital signs measurements to predict whether the vital signs of the next hour would reach the critical value or not. With the early warning, nurses and doctors can prevent emergency situations that may cause organ dysfunction or even death before it is too late. In this study, the data includes vital sign measurements, laboratory test results, procedures, medications collected from over 40,000 patients. After data preprocessing, bias data balancing, feature extraction, and feature selection, we have a clean dataset with informative and discriminating features. Then, various machine learning algorithms including Random Forest, XGBoost, Artificial Neural Networks (ANN), and LSTM were developed to predict critical vital signs of ICU patients 1-hour beforehand. We particularly developed predictive models to predict Heart Rate, Blood Oxygen Level (SpO2), Mean Arterial Pressure (MAP), Respiratory Rate (RR), Systolic Blood Pressure (SBP). The results demonstrated the accuracy of the developed methods.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Multi-Agent Coordination Profiles through State Space Perturbations 状态空间扰动下的多智能体协调曲线
Derrik E. Asher, Michael Garber-Barron, Sebastian S. Rodriguez, Erin G. Zaroukian, Nicholas R. Waytowich
The current work utilized a multi-agent reinforcement learning (MARL) algorithm embedded in a continuous predator-prey pursuit simulation environment to measure and evaluate coordination between cooperating agents. In this simulation environment, it is generally assumed that successful performance for cooperative agents necessarily results in the emergence of coordination, but a clear quantitative demonstration of coordination in this environment still does not exist. The current work focuses on 1) detecting emergent coordination between cooperating agents in a multi-agent predator-prey simulation environment, and 2) showing coordination profiles between cooperating agents extracted from systematic state perturbations. This work introduces a method for detecting and comparing the typically 'black-box' behavioral solutions that result from emergent coordination in multi-agent learning spatial tasks with a shared goal. Comparing coordination profiles can provide insights into overlapping patterns that define how agents learn to interact in cooperative multi-agent environments. Similarly, this approach provides an avenue for measuring and training agents to coordinate with humans. In this way, the present work looks towards understanding and creating artificial team-mates that will strive to coordinate optimally.
目前的工作利用嵌入在连续捕食者-猎物追逐模拟环境中的多智能体强化学习(MARL)算法来测量和评估合作智能体之间的协调。在这种仿真环境中,一般认为协作agent的成功执行必然会导致协调的出现,但在这种环境下,仍然没有一个明确的定量的协调论证。目前的工作重点是1)在多智能体捕食-猎物模拟环境中检测合作智能体之间的紧急协调;2)从系统状态扰动中提取合作智能体之间的协调特征。这项工作介绍了一种检测和比较典型的“黑箱”行为解决方案的方法,这些解决方案是由具有共同目标的多智能体学习空间任务中的紧急协调产生的。比较协调配置文件可以提供对重叠模式的洞察,这些模式定义了代理如何在合作多代理环境中学习交互。类似地,这种方法为测量和训练代理与人类协调提供了途径。通过这种方式,目前的工作旨在理解和创造人工团队成员,以努力实现最佳协调。
{"title":"Multi-Agent Coordination Profiles through State Space Perturbations","authors":"Derrik E. Asher, Michael Garber-Barron, Sebastian S. Rodriguez, Erin G. Zaroukian, Nicholas R. Waytowich","doi":"10.1109/CSCI49370.2019.00051","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00051","url":null,"abstract":"The current work utilized a multi-agent reinforcement learning (MARL) algorithm embedded in a continuous predator-prey pursuit simulation environment to measure and evaluate coordination between cooperating agents. In this simulation environment, it is generally assumed that successful performance for cooperative agents necessarily results in the emergence of coordination, but a clear quantitative demonstration of coordination in this environment still does not exist. The current work focuses on 1) detecting emergent coordination between cooperating agents in a multi-agent predator-prey simulation environment, and 2) showing coordination profiles between cooperating agents extracted from systematic state perturbations. This work introduces a method for detecting and comparing the typically 'black-box' behavioral solutions that result from emergent coordination in multi-agent learning spatial tasks with a shared goal. Comparing coordination profiles can provide insights into overlapping patterns that define how agents learn to interact in cooperative multi-agent environments. Similarly, this approach provides an avenue for measuring and training agents to coordinate with humans. In this way, the present work looks towards understanding and creating artificial team-mates that will strive to coordinate optimally.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114150350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Smart DC Wall Outlet with Load Voltage Detection 智能直流墙壁插座与负载电压检测
Benjamin Tan, P. Granieri, T. Taufik
A standard home in the United States has access to the 120V AC power for use with home appliances. However, many home electronics are powered by DC electricity. This introduces energy loss in the conversion process. A residential DC electrical system will avoid such conversion loss by storing energy in batteries and supplying it to DC appliances. Unfortunately, there is no existing voltage standards for DC appliances, which makes it challenging to power DC appliances straight from a DC wall outlet. The Smart DC Wall outlet addresses this by automatically adjusting its output voltage to meet any required DC load voltage. A solution involving low-voltage detection algorithm within a DC-DC converter is presented in this paper. The proposed solution monitors trends in the output current and sets the output voltage accordingly. Simulation tests resulted in identification of the required output voltage of five out of seven test devices. Results also indicate the possibility of generalizing the turn on characteristics of DC devices with more refined algorithm to improve successful voltage identification by the Smart Wall outlet.
在美国,一个标准的家庭可以使用120V的交流电源来使用家用电器。然而,许多家用电器是由直流电供电的。这在转换过程中引入了能量损失。住宅直流电力系统将通过将能量储存在电池中并将其供应给直流电器来避免这种转换损失。不幸的是,没有现有的直流电器电压标准,这使得直接从直流墙壁插座供电直流电器具有挑战性。智能直流墙插座通过自动调整输出电压以满足任何所需的直流负载电压来解决这个问题。本文提出了一种涉及DC-DC变换器低压检测算法的解决方案。提出的解决方案监测输出电流的趋势,并相应地设置输出电压。模拟试验确定了七个试验装置中五个所需的输出电压。结果还表明,可以通过更精细的算法来推广直流器件的导通特性,从而提高智能墙插座的电压识别成功率。
{"title":"Smart DC Wall Outlet with Load Voltage Detection","authors":"Benjamin Tan, P. Granieri, T. Taufik","doi":"10.1109/CSCI49370.2019.00140","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00140","url":null,"abstract":"A standard home in the United States has access to the 120V AC power for use with home appliances. However, many home electronics are powered by DC electricity. This introduces energy loss in the conversion process. A residential DC electrical system will avoid such conversion loss by storing energy in batteries and supplying it to DC appliances. Unfortunately, there is no existing voltage standards for DC appliances, which makes it challenging to power DC appliances straight from a DC wall outlet. The Smart DC Wall outlet addresses this by automatically adjusting its output voltage to meet any required DC load voltage. A solution involving low-voltage detection algorithm within a DC-DC converter is presented in this paper. The proposed solution monitors trends in the output current and sets the output voltage accordingly. Simulation tests resulted in identification of the required output voltage of five out of seven test devices. Results also indicate the possibility of generalizing the turn on characteristics of DC devices with more refined algorithm to improve successful voltage identification by the Smart Wall outlet.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114579767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Static Malware Analysis Using Machine Learning Algorithms on APT1 Dataset with String and PE Header Features 基于机器学习算法的APT1数据集字符串和PE头特征静态恶意软件分析
Neil Balram, G. Hsieh, Christian McFall
Static malware analysis is used to analyze executable files without executing the code to determine whether a file is malicious or not. Data analytic and machine learning techniques have been used increasingly to help process the large number of malware files circulating in the wild and detect new attacks. In this paper, we present the design and implementation of six different machine learning classifiers, and two distinct categories of features statically extracted from the executables: strings and Portable Executable header information. A total of twelve malware detectors were implemented for each of the six classifiers to operate with each of the two feature categories separately. These classifiers and feature extraction algorithms were implemented in Python using the scikit-learn machine learning library. The performances in detection accuracy and required processing time of the twelve malware detectors were compared and analyzed.
静态恶意软件分析是在不执行代码的情况下对可执行文件进行分析,以确定文件是否为恶意文件。数据分析和机器学习技术已被越来越多地用于帮助处理大量恶意软件文件,并检测新的攻击。在本文中,我们介绍了六种不同的机器学习分类器的设计和实现,以及从可执行文件中静态提取的两种不同类别的特征:字符串和可移植可执行头信息。总共为六个分类器中的每一个实现了十二个恶意软件检测器,分别与两个特征类别中的每一个运行。这些分类器和特征提取算法使用scikit-learn机器学习库在Python中实现。比较分析了12种恶意软件检测器在检测精度和所需处理时间方面的性能。
{"title":"Static Malware Analysis Using Machine Learning Algorithms on APT1 Dataset with String and PE Header Features","authors":"Neil Balram, G. Hsieh, Christian McFall","doi":"10.1109/CSCI49370.2019.00022","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00022","url":null,"abstract":"Static malware analysis is used to analyze executable files without executing the code to determine whether a file is malicious or not. Data analytic and machine learning techniques have been used increasingly to help process the large number of malware files circulating in the wild and detect new attacks. In this paper, we present the design and implementation of six different machine learning classifiers, and two distinct categories of features statically extracted from the executables: strings and Portable Executable header information. A total of twelve malware detectors were implemented for each of the six classifiers to operate with each of the two feature categories separately. These classifiers and feature extraction algorithms were implemented in Python using the scikit-learn machine learning library. The performances in detection accuracy and required processing time of the twelve malware detectors were compared and analyzed.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116178537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sensitivity Analysis of Internal Erosion Models for Dam Safety 大坝安全内冲模型敏感性分析
M. Neilsen, Chendi Cao
WindowsTM Dam Analysis Modules (WinDAM) is a set of modular software components used to analyze the erosion and peak discharges that results from the overtopping or internal erosion in earthen embankment dams. The initial computational modules address routing of floods through the reservoir with dam overtopping and evaluation of the potential for vegetation or riprap to delay or prevent failure of the embankment. Subsequent modules perform dam breach analysis. Current work is underway to include analysis of internal erosion, non-homogeneous, zoned embankments, and the analysis of various other forms of embankment protection. The focus of this paper is on sensitivity analysis of internal erosion models using Sandia National Laboratories' Dakota software suite 6.10 to perform the analysis.
WindowsTM大坝分析模块(WinDAM)是一套模块化的软件组件,用于分析土堤防大坝溢顶或内部侵蚀造成的侵蚀和峰值排放。最初的计算模块解决了洪水通过水库的路线和大坝漫顶的问题,并评估了植被或碎石延缓或防止堤防破坏的潜力。后续模块执行溃坝分析。目前正在进行的工作包括分析内部侵蚀,非均匀,分区堤防,以及分析各种其他形式的堤防保护。本文的重点是利用桑迪亚国家实验室的Dakota软件套件6.10进行内部侵蚀模型的敏感性分析。
{"title":"Sensitivity Analysis of Internal Erosion Models for Dam Safety","authors":"M. Neilsen, Chendi Cao","doi":"10.1109/CSCI49370.2019.00089","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00089","url":null,"abstract":"WindowsTM Dam Analysis Modules (WinDAM) is a set of modular software components used to analyze the erosion and peak discharges that results from the overtopping or internal erosion in earthen embankment dams. The initial computational modules address routing of floods through the reservoir with dam overtopping and evaluation of the potential for vegetation or riprap to delay or prevent failure of the embankment. Subsequent modules perform dam breach analysis. Current work is underway to include analysis of internal erosion, non-homogeneous, zoned embankments, and the analysis of various other forms of embankment protection. The focus of this paper is on sensitivity analysis of internal erosion models using Sandia National Laboratories' Dakota software suite 6.10 to perform the analysis.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Integrity in Policy-Based Attribute Access Control in Social Network Cloud 社交网络云中基于策略属性访问控制中的数据完整性
Katanosh Morovat, B. Panda
The integrity of files stored on cloud is crucial for many applications, specifically applications that manage online social networks. Now-a-days social networking sites have become primary locations for sharing documents. Due to security lapses at these sites, shared documents could be stolen or changed by cyber attackers. We have developed a model to protect shared data and resources from unauthorized accesses. This method, which is called policy-based attribute access control (PBAAC) [20], enables resource owners to define policies to manage their resources from unmanaged accesses. However, policies are saved as plain text in a file and could be compromised by unauthorized users, violating the integrity of those policies. In this paper, we proposed a method to protect policies saved in text files. We developed an algorithm to extract critical information from each policy and create a hash value, by executing a hash cryptography algorithm.
存储在云上的文件的完整性对许多应用程序至关重要,特别是管理在线社交网络的应用程序。如今,社交网站已经成为分享文档的主要场所。由于这些网站的安全漏洞,共享文件可能被网络攻击者窃取或更改。我们已经开发了一个模型来保护共享数据和资源免受未经授权的访问。这种方法被称为基于策略的属性访问控制(policy-based attribute access control, PBAAC)[20],它使资源所有者能够定义策略,通过非托管访问来管理其资源。但是,策略以纯文本形式保存在文件中,可能会被未经授权的用户破坏,从而破坏这些策略的完整性。本文提出了一种保护保存在文本文件中的策略的方法。我们开发了一种算法,通过执行哈希加密算法,从每个策略中提取关键信息并创建哈希值。
{"title":"Data Integrity in Policy-Based Attribute Access Control in Social Network Cloud","authors":"Katanosh Morovat, B. Panda","doi":"10.1109/CSCI49370.2019.00011","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00011","url":null,"abstract":"The integrity of files stored on cloud is crucial for many applications, specifically applications that manage online social networks. Now-a-days social networking sites have become primary locations for sharing documents. Due to security lapses at these sites, shared documents could be stolen or changed by cyber attackers. We have developed a model to protect shared data and resources from unauthorized accesses. This method, which is called policy-based attribute access control (PBAAC) [20], enables resource owners to define policies to manage their resources from unmanaged accesses. However, policies are saved as plain text in a file and could be compromised by unauthorized users, violating the integrity of those policies. In this paper, we proposed a method to protect policies saved in text files. We developed an algorithm to extract critical information from each policy and create a hash value, by executing a hash cryptography algorithm.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126592216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Radio Mondiale App Development Digital Radio Mondiale应用程序开发
S. Jarng, Y. Kwon, Dongsoo Joseph Jarng
This paper is about the development of Digital Radio Mondiale (DRM) App. It describes overall technology and development motivation that may enable us to overcome the limitation of 1:1 Bluetooth technology. It introduces the DRM compression and modulation, background technology of DRM transmitter and receiver, requirements for DRM signal creation, DRM App configuration, additional tools used for field test, the field test results, and future application of DRM.
本文是关于数字无线电世界(DRM)应用程序的开发,它描述了整体技术和开发动机,可以使我们克服1:1蓝牙技术的局限性。介绍了DRM压缩与调制、DRM收发后台技术、DRM信号创建要求、DRM App配置、现场测试附加工具、现场测试结果以及DRM的未来应用。
{"title":"Digital Radio Mondiale App Development","authors":"S. Jarng, Y. Kwon, Dongsoo Joseph Jarng","doi":"10.1109/CSCI49370.2019.00200","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00200","url":null,"abstract":"This paper is about the development of Digital Radio Mondiale (DRM) App. It describes overall technology and development motivation that may enable us to overcome the limitation of 1:1 Bluetooth technology. It introduces the DRM compression and modulation, background technology of DRM transmitter and receiver, requirements for DRM signal creation, DRM App configuration, additional tools used for field test, the field test results, and future application of DRM.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124829592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1