首页 > 最新文献

2019 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Temperature Prediction Based on Long Short Term Memory Networks 基于长短期记忆网络的温度预测
Fred Y. Wu, Shaofei Lu, Lopez-Aeamburo Armando, Jingke She
Objective: This paper has been prepared as an effort to reassess the research studies on the relevance of Longshort term memory (LSTM) in the correction and prediction of sensor data for temperature. Methods: This methods are a multiple input parameters model of LSTM and an input parameter model of LSTM, the first one corrects one of those parameter and the next one predict the remaining data of one parameter of sensor data after training history data. Findings: The training data reach 87,600 with 8 parameter, the error of first model reduce to 0.13% . The training data reach 11,682, the error between real data and predicted data is from 3.4% to 0.03% Application / Improvement: The methods will be used to correct the history data of sensors and determine which seed to plant and whether to irrigate. In future, we will integrate Markov chain with LSTM to improve the precision of LSTM and reduce the size of training data.
目的:对长短期记忆(LSTM)在温度传感器数据校正与预测中的相关性进行研究。方法:该方法是LSTM的多输入参数模型和LSTM的输入参数模型,第一个模型对其中一个参数进行校正,第二个模型在训练历史数据后预测传感器数据中一个参数的剩余数据。结果:8个参数的训练数据达到87,600个,第一个模型的误差减小到0.13%。训练数据达到11682,实际数据与预测数据的误差在3.4% ~ 0.03%。应用/改进:该方法将用于校正传感器的历史数据,确定种植哪种种子,是否灌溉。未来,我们将把马尔可夫链与LSTM相结合,提高LSTM的精度,减少训练数据的大小。
{"title":"Temperature Prediction Based on Long Short Term Memory Networks","authors":"Fred Y. Wu, Shaofei Lu, Lopez-Aeamburo Armando, Jingke She","doi":"10.1109/CSCI49370.2019.00062","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00062","url":null,"abstract":"Objective: This paper has been prepared as an effort to reassess the research studies on the relevance of Longshort term memory (LSTM) in the correction and prediction of sensor data for temperature. Methods: This methods are a multiple input parameters model of LSTM and an input parameter model of LSTM, the first one corrects one of those parameter and the next one predict the remaining data of one parameter of sensor data after training history data. Findings: The training data reach 87,600 with 8 parameter, the error of first model reduce to 0.13% . The training data reach 11,682, the error between real data and predicted data is from 3.4% to 0.03% Application / Improvement: The methods will be used to correct the history data of sensors and determine which seed to plant and whether to irrigate. In future, we will integrate Markov chain with LSTM to improve the precision of LSTM and reduce the size of training data.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113949257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Low-Overhead Network Coding Communication for Wireless Multihop Networks 无线多跳网络的低开销网络编码通信
Y. Aoi, H. Higaki
For support of interactive multimedia applications in wireless multihop networks, a sequence of data messages are required to be transmitted simultaneously in both directions. Here, intermediate wireless nodes hold temporarily data messages in both directions with high probability. Network coding methods have been proposed for reduction of forwarding and end-to-end transmission delays and for increase of end-to-end data message throughput. However, for collision-free transmissions, all the 2-hop neighbor intermediate nodes are required to be suspended during a data message transmission. Some extended Request To Send/Clear To Send (RTS/CTS) controls have been proposed for network coding support; however, for avoidance of collisions between control messages, longer transmission delay is inevitable. This paper proposes a novel RTS/CTS control method for supporting network coding in bidirectional data message transmission. Here, the CTS and ACK control messages are transmitted with the usual Short Inter Frame Space (SIFS) interval and their correct simultaneous transmissions are detected by their collisions. In simulation experiments, 30.2% higher end-to-end throughput of data messages is achieved by the proposed RTS/CTS control in comparison with conventional methods.
为了在无线多跳网络中支持交互式多媒体应用,需要在两个方向上同时传输一系列数据消息。在这里,中间无线节点以高概率在两个方向上临时保存数据消息。为了减少转发和端到端传输延迟以及提高端到端数据报文吞吐量,提出了网络编码方法。然而,对于无碰撞传输,在数据消息传输期间需要暂停所有2跳邻居中间节点。一些扩展的请求发送/清除发送(RTS/CTS)控制被提议用于网络编码支持;然而,为了避免控制消息之间的冲突,更长的传输延迟是不可避免的。为了支持双向数据报文传输中的网络编码,提出了一种新的RTS/CTS控制方法。在这里,CTS和ACK控制消息以通常的短帧间空间(SIFS)间隔传输,并通过它们的碰撞来检测它们的正确同时传输。在仿真实验中,与传统方法相比,提出的RTS/CTS控制方法的端到端数据报文吞吐量提高了30.2%。
{"title":"Low-Overhead Network Coding Communication for Wireless Multihop Networks","authors":"Y. Aoi, H. Higaki","doi":"10.1109/CSCI49370.2019.00202","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00202","url":null,"abstract":"For support of interactive multimedia applications in wireless multihop networks, a sequence of data messages are required to be transmitted simultaneously in both directions. Here, intermediate wireless nodes hold temporarily data messages in both directions with high probability. Network coding methods have been proposed for reduction of forwarding and end-to-end transmission delays and for increase of end-to-end data message throughput. However, for collision-free transmissions, all the 2-hop neighbor intermediate nodes are required to be suspended during a data message transmission. Some extended Request To Send/Clear To Send (RTS/CTS) controls have been proposed for network coding support; however, for avoidance of collisions between control messages, longer transmission delay is inevitable. This paper proposes a novel RTS/CTS control method for supporting network coding in bidirectional data message transmission. Here, the CTS and ACK control messages are transmitted with the usual Short Inter Frame Space (SIFS) interval and their correct simultaneous transmissions are detected by their collisions. In simulation experiments, 30.2% higher end-to-end throughput of data messages is achieved by the proposed RTS/CTS control in comparison with conventional methods.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124391344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Case Study: Undergraduate Self-Learning in HPC Including OpenMP, MPI, OpenCL, and FPGAs 一个案例研究:HPC的本科生自学,包括OpenMP, MPI, OpenCL和fpga
P. Jamieson, M. Herbordt, M. Kinsy
High Performance Computing (HPC) continues to develop and encroach on higher-education in the computing fields. With the ubiquitous availability and growth in commercial cloud computing and the diminishing performance returns on sequential programs, many developers must be able to understand and exploit parallel computing paradigms for certain applications. Focusing on Computer Engineering undergraduates, who arguably, will be future leaders in these parallel domains, the CE2016 recommended curriculum has a number of hours dedicated for parallel and distributed computing where approximately 10 core hours are to be taught in parallel programming, other ideas are taught in and among networking and embedded systems, and an entire section on digital design (50 hours). In reality, this is not enough time to become competent in the broader HPC field, nor do we expect standard undergraduate curriculum to develop competent undergraduate into parallel programmers. However, as demand increases for HPC developers, one wonders how students will attain this knowledge. Many people learn HPC competencies in graduate work and industrial work, but what might be done early. In this paper, we look at what a developer can possibly learn in the HPC world, and what tools and understanding is needed to build and experiment with parallel implementations. Our goal is to look at aspects of HPC given the constraints of a typical laptop, and we ask what can a developer test and learn about on their system in the HPC domain. The benefits of this work is a better understanding of what tool sets students will need to understand to develop simple parallel implementations, what HPC platforms can be used for courses or personalized learning, and we provide a basic framework and code samples for people to start from.
高性能计算(High - Performance Computing, HPC)在计算领域不断发展并蚕食着高等教育。随着商业云计算无处不在的可用性和增长,以及顺序程序的性能回报的减少,许多开发人员必须能够理解和利用某些应用程序的并行计算范式。CE2016推荐的课程主要针对计算机工程专业的本科生,他们可能是这些并行领域的未来领导者,CE2016推荐的课程有很多小时专门用于并行和分布式计算,其中大约有10个核心小时是关于并行编程的,其他思想是关于网络和嵌入式系统的,还有一个完整的数字设计部分(50个小时)。实际上,这段时间不足以让你胜任更广泛的高性能计算领域,我们也不指望标准的本科课程能把有能力的本科生培养成并行程序员。然而,随着对高性能计算开发人员需求的增加,人们想知道学生如何获得这些知识。许多人在毕业工作和工业工作中学习了HPC能力,但什么可能早做。在本文中,我们将探讨开发人员在HPC世界中可能学到的东西,以及构建和实验并行实现需要哪些工具和理解。我们的目标是在典型笔记本电脑的限制下研究HPC的各个方面,并询问开发人员可以在HPC领域的系统上测试和学习什么。这项工作的好处是更好地了解学生需要了解哪些工具集来开发简单的并行实现,哪些HPC平台可以用于课程或个性化学习,我们提供了一个基本的框架和代码示例供人们开始。
{"title":"A Case Study: Undergraduate Self-Learning in HPC Including OpenMP, MPI, OpenCL, and FPGAs","authors":"P. Jamieson, M. Herbordt, M. Kinsy","doi":"10.1109/CSCI49370.2019.00149","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00149","url":null,"abstract":"High Performance Computing (HPC) continues to develop and encroach on higher-education in the computing fields. With the ubiquitous availability and growth in commercial cloud computing and the diminishing performance returns on sequential programs, many developers must be able to understand and exploit parallel computing paradigms for certain applications. Focusing on Computer Engineering undergraduates, who arguably, will be future leaders in these parallel domains, the CE2016 recommended curriculum has a number of hours dedicated for parallel and distributed computing where approximately 10 core hours are to be taught in parallel programming, other ideas are taught in and among networking and embedded systems, and an entire section on digital design (50 hours). In reality, this is not enough time to become competent in the broader HPC field, nor do we expect standard undergraduate curriculum to develop competent undergraduate into parallel programmers. However, as demand increases for HPC developers, one wonders how students will attain this knowledge. Many people learn HPC competencies in graduate work and industrial work, but what might be done early. In this paper, we look at what a developer can possibly learn in the HPC world, and what tools and understanding is needed to build and experiment with parallel implementations. Our goal is to look at aspects of HPC given the constraints of a typical laptop, and we ask what can a developer test and learn about on their system in the HPC domain. The benefits of this work is a better understanding of what tool sets students will need to understand to develop simple parallel implementations, what HPC platforms can be used for courses or personalized learning, and we provide a basic framework and code samples for people to start from.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124536552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Pose Estimation via Inverse Graphics 基于逆图形的无监督姿态估计
J. Jennings, F. Kamangar
We introduce a method for pose estimation from sensor array data utilizing an inverse graphics approach. We propose a general unsupervised method based on manipulating a 3D model to discover the joint-space parameters that produce an observed image or sensor reading. Using our novel architecture, we discuss the design of a model for performing human pose estimation on data obtained from a mattress pressure sensor.
我们介绍了一种利用逆图形方法从传感器阵列数据中估计姿态的方法。我们提出了一种基于操纵3D模型的通用无监督方法,以发现产生观察图像或传感器读数的关节空间参数。利用我们的新架构,我们讨论了一个模型的设计,用于对床垫压力传感器获得的数据进行人体姿势估计。
{"title":"Unsupervised Pose Estimation via Inverse Graphics","authors":"J. Jennings, F. Kamangar","doi":"10.1109/CSCI49370.2019.00136","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00136","url":null,"abstract":"We introduce a method for pose estimation from sensor array data utilizing an inverse graphics approach. We propose a general unsupervised method based on manipulating a 3D model to discover the joint-space parameters that produce an observed image or sensor reading. Using our novel architecture, we discuss the design of a model for performing human pose estimation on data obtained from a mattress pressure sensor.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing CVE Database Using Unsupervised Topic Modelling 使用无监督主题建模分析CVE数据库
V. Mounika, Xiaohong Yuan, Kanishka Bandaru
This paper describes our study of the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic modeling on the description texts of the vulnerabilities. Prevalent vulnerability types were found, and new trends of vulnerabilities were discovered by studying the 121,716 unique CVE entries that are reported from January 1999 to July 2019. The topics found through topic modeling were mapped to OWASP Top 10 vulnerabilities. It was found that the OWASP vulnerabilities A2: 2017-Broken Authentication, A4:2017-XML External Entities (XXE), and A5:2017-Broken Access Control increased, yet the vulnerability A7:2017-Cross-Site Scripting (XSS) had a steep decrease over the period of 20 years.
本文采用对漏洞描述文本进行主题建模的方法,对CVE数据库中的漏洞报告进行了研究。通过对1999年1月至2019年7月报告的121,716个独特CVE条目进行研究,发现了常见的漏洞类型,并发现了漏洞的新趋势。通过主题建模发现的主题映射到OWASP Top 10漏洞。结果发现,OWASP漏洞A2: 2017-Broken Authentication、A4:2017-XML External Entities (XXE)和A5:2017-Broken Access Control增加了,而漏洞A7:2017-Cross-Site Scripting (XSS)在过去20年里急剧减少。
{"title":"Analyzing CVE Database Using Unsupervised Topic Modelling","authors":"V. Mounika, Xiaohong Yuan, Kanishka Bandaru","doi":"10.1109/CSCI49370.2019.00019","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00019","url":null,"abstract":"This paper describes our study of the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic modeling on the description texts of the vulnerabilities. Prevalent vulnerability types were found, and new trends of vulnerabilities were discovered by studying the 121,716 unique CVE entries that are reported from January 1999 to July 2019. The topics found through topic modeling were mapped to OWASP Top 10 vulnerabilities. It was found that the OWASP vulnerabilities A2: 2017-Broken Authentication, A4:2017-XML External Entities (XXE), and A5:2017-Broken Access Control increased, yet the vulnerability A7:2017-Cross-Site Scripting (XSS) had a steep decrease over the period of 20 years.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126218486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Demystifying the Technical and Managerial Challenges of Authentication 揭秘认证的技术和管理挑战
B. Goodwin, Patryk Szewczyk
Authentication mechanisms are a core component in cyber-security and are becoming increasingly exposed as traditional networks extend into the cloud. The resulting systems become harder to define, harder to protect, and authentication mechanisms are left vulnerable to attacks. Compounding this is the human factor, where a poor understanding of responsibilities, reluctance to deal with conflict, and the inability to effect change, undermine what is often considered to be a technical problem. Whilst technical measures to effectively mitigate these risks are known, frequency of attacks continue to demonstrate success. Using six popular cyber-breach examples these non-technical challenges are identified and their effect is examined. This paper demonstrates that technical measures are key to authentication and overall cyber-security posture. These technical measures may be better understood than their non-technical counterparts that frequently lead to authentication failure and public downfall.
身份验证机制是网络安全的核心组成部分,随着传统网络向云的扩展,身份验证机制正变得越来越暴露。结果,系统变得更难定义、更难保护,身份验证机制容易受到攻击。与此相结合的是人为因素,其中对责任的理解不佳,不愿处理冲突,以及无法影响变化,破坏了通常被认为是技术问题的问题。虽然已知可以有效降低这些风险的技术措施,但攻击的频率仍然证明是成功的。使用六个流行的网络漏洞的例子,这些非技术挑战被确定,并检查其影响。本文论证了技术措施是认证和整体网络安全态势的关键。这些技术措施可能比经常导致身份验证失败和公众垮台的非技术措施更容易理解。
{"title":"Demystifying the Technical and Managerial Challenges of Authentication","authors":"B. Goodwin, Patryk Szewczyk","doi":"10.1109/CSCI49370.2019.00012","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00012","url":null,"abstract":"Authentication mechanisms are a core component in cyber-security and are becoming increasingly exposed as traditional networks extend into the cloud. The resulting systems become harder to define, harder to protect, and authentication mechanisms are left vulnerable to attacks. Compounding this is the human factor, where a poor understanding of responsibilities, reluctance to deal with conflict, and the inability to effect change, undermine what is often considered to be a technical problem. Whilst technical measures to effectively mitigate these risks are known, frequency of attacks continue to demonstrate success. Using six popular cyber-breach examples these non-technical challenges are identified and their effect is examined. This paper demonstrates that technical measures are key to authentication and overall cyber-security posture. These technical measures may be better understood than their non-technical counterparts that frequently lead to authentication failure and public downfall.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126524013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CrossConnect: A Cross Registration Tool 交叉连接:一个交叉注册工具
Andrew Corsi, E. Romero, Mira Yun, L. Deligiannidis
Colleges of the Fenway (CoF) is a joint effort of five neighboring Boston-based colleges in the Fenway area. Cross registration enables students of the CoF to register for courses offered in the other institutions. However, current search functions of the crossregistration system lack key features, such as searching by number of credits, categories of classes, or searching by a specific school. In order to offer these features, we propose a new user-friendly website named CrossConnect. CrossConnect uses the Bootstrap framework and responsive Ajax library to connect and query the course databases across all CoF institutions. CrossConnect allows students to perform enhanced queries and provides a user-friendly search interface.
芬威学院(CoF)是芬威地区五所邻近的波士顿大学的共同努力。交叉注册允许本学院的学生选修其他院校的课程。然而,交叉注册系统目前的搜索功能缺乏关键功能,如按学分数搜索、按课程类别搜索、按特定学校搜索等。为了提供这些功能,我们提出了一个新的用户友好的网站,名为CrossConnect。CrossConnect使用Bootstrap框架和响应式Ajax库来连接和查询所有CoF机构的课程数据库。CrossConnect允许学生执行增强查询,并提供用户友好的搜索界面。
{"title":"CrossConnect: A Cross Registration Tool","authors":"Andrew Corsi, E. Romero, Mira Yun, L. Deligiannidis","doi":"10.1109/CSCI49370.2019.00146","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00146","url":null,"abstract":"Colleges of the Fenway (CoF) is a joint effort of five neighboring Boston-based colleges in the Fenway area. Cross registration enables students of the CoF to register for courses offered in the other institutions. However, current search functions of the crossregistration system lack key features, such as searching by number of credits, categories of classes, or searching by a specific school. In order to offer these features, we propose a new user-friendly website named CrossConnect. CrossConnect uses the Bootstrap framework and responsive Ajax library to connect and query the course databases across all CoF institutions. CrossConnect allows students to perform enhanced queries and provides a user-friendly search interface.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges for a Flexible eHealth Future: Framework and Platform for Continuous Development 灵活电子医疗未来的挑战:持续发展的框架和平台
Linda Askenäs, Jaime Campos, Jan Aidemark
This paper presents a framework for the development of flexible eHealth solutions based on a platform logic and a set of processes for cooperative development. The framework consists of both a specification detailing the activities of the development process and a technical platform integrating sensors, IoT integration data management and end-user interfaces as well as business and user processes.
本文提出了一个基于平台逻辑和一组协作开发流程的灵活电子医疗解决方案开发框架。该框架包括详细说明开发过程活动的规范和集成传感器、物联网集成数据管理和最终用户界面以及业务和用户流程的技术平台。
{"title":"Challenges for a Flexible eHealth Future: Framework and Platform for Continuous Development","authors":"Linda Askenäs, Jaime Campos, Jan Aidemark","doi":"10.1109/CSCI49370.2019.00187","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00187","url":null,"abstract":"This paper presents a framework for the development of flexible eHealth solutions based on a platform logic and a set of processes for cooperative development. The framework consists of both a specification detailing the activities of the development process and a technical platform integrating sensors, IoT integration data management and end-user interfaces as well as business and user processes.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self Organized Features Maps SOFM and Hybrid Neuro-Genetic SOFMs in Optimal Portfolio Management 最优投资组合管理中的自组织特征映射SOFM和混合神经遗传SOFM
N. Loukeris, George Chalamandaris, I. Eleftheriadis
We investigate the optimal performance of Self Organized Feature Maps in 60 different models of plain and hybrid form to define the optimal classifier. We also apply it on a novel model of optimal portfolio selection in hedging aspects.
我们研究了自组织特征映射在60种不同的普通和混合形式模型中的最优性能,以定义最优分类器。并将其应用于对冲方面的一个新的最优投资组合选择模型。
{"title":"Self Organized Features Maps SOFM and Hybrid Neuro-Genetic SOFMs in Optimal Portfolio Management","authors":"N. Loukeris, George Chalamandaris, I. Eleftheriadis","doi":"10.1109/CSCI49370.2019.00057","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00057","url":null,"abstract":"We investigate the optimal performance of Self Organized Feature Maps in 60 different models of plain and hybrid form to define the optimal classifier. We also apply it on a novel model of optimal portfolio selection in hedging aspects.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131960880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WeDoCare: A System for Vulnerable Social Groups WeDoCare:弱势社会群体的系统
J. S. Silva, R. Saldanha, Vasco Pereira, Duarte M. G. Raposo, F. Boavida, A. Rodrigues, M. Abreu
One of the biggest problems in the current society is people's safety. Safety measures and mechanisms are especially important in the case of vulnerable social groups, such as migrants, homeless, and victims of domestic and/or sexual violence. In order to cope with this problem, we witness an increasing number of personal alarm systems in the market, most of them based on panic buttons. Nevertheless, none of them has got widespread acceptance mainly because of limited Human-Computer Interaction. In the context of this work, we developed an innovative mobile application that recognizes an attack through speech and gesture recognition. This paper describes such a system and presents its features, some of them based on the emerging concept of Human-in-the-Loop Cyber-physical Systems and new concepts of Human-Computer Interaction.
当今社会最大的问题之一是人的安全。对于移徙者、无家可归者以及家庭暴力和/或性暴力受害者等弱势社会群体而言,安全措施和机制尤为重要。为了应对这一问题,我们看到市场上越来越多的个人报警系统,其中大多数是基于紧急按钮的。然而,它们都没有得到广泛的接受,主要是因为人机交互有限。在这项工作的背景下,我们开发了一个创新的移动应用程序,通过语音和手势识别来识别攻击。本文描述了这样一个系统,并介绍了它的一些特点,其中一些特点是基于人在环信息物理系统的新兴概念和人机交互的新概念。
{"title":"WeDoCare: A System for Vulnerable Social Groups","authors":"J. S. Silva, R. Saldanha, Vasco Pereira, Duarte M. G. Raposo, F. Boavida, A. Rodrigues, M. Abreu","doi":"10.1109/CSCI49370.2019.00201","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00201","url":null,"abstract":"One of the biggest problems in the current society is people's safety. Safety measures and mechanisms are especially important in the case of vulnerable social groups, such as migrants, homeless, and victims of domestic and/or sexual violence. In order to cope with this problem, we witness an increasing number of personal alarm systems in the market, most of them based on panic buttons. Nevertheless, none of them has got widespread acceptance mainly because of limited Human-Computer Interaction. In the context of this work, we developed an innovative mobile application that recognizes an attack through speech and gesture recognition. This paper describes such a system and presents its features, some of them based on the emerging concept of Human-in-the-Loop Cyber-physical Systems and new concepts of Human-Computer Interaction.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1