Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00154
Sixuan Duan, Yao Xu, Ying Luo, Zhipeng Huang
This research paper introduces a new learning tool to increase student interests in power engineering. Insufficient visualization of the real power system operation and boring theory knowledge cause a general lack of interest in power systems. This paper realized the design of 3D virtual power system using 3ds Max and Unity3D software. Microgrid system, one significant example of a power system, is selected to demonstrate the 3D visualization. The built 3D visualization of microgrid can vividly show the details and function of each component in the Microgrid. Therefore, it can greatly increase students' enthusiasm for learning the power engineering. Moreover, the first time application of Unity3D in the microgrid system laid the foundation for the feasibility of virtual technology in the application of engineering education to further attract more students in all engineering areas.
{"title":"Increasing Student Interests in Power Engineering by 3dsMax and Unity3D","authors":"Sixuan Duan, Yao Xu, Ying Luo, Zhipeng Huang","doi":"10.1109/CSCI49370.2019.00154","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00154","url":null,"abstract":"This research paper introduces a new learning tool to increase student interests in power engineering. Insufficient visualization of the real power system operation and boring theory knowledge cause a general lack of interest in power systems. This paper realized the design of 3D virtual power system using 3ds Max and Unity3D software. Microgrid system, one significant example of a power system, is selected to demonstrate the 3D visualization. The built 3D visualization of microgrid can vividly show the details and function of each component in the Microgrid. Therefore, it can greatly increase students' enthusiasm for learning the power engineering. Moreover, the first time application of Unity3D in the microgrid system laid the foundation for the feasibility of virtual technology in the application of engineering education to further attract more students in all engineering areas.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00047
T. Dhital, Bilal Gonen
There are different types media of communication, Internet is the most used and many believe that it is the most reliable form of communication. The Internet has been polluted with different forms of viruses and malware since it first started. As the Internet does not have a centralized control, it is vulnerable to different types of attacks. Businesses around the globe use Internet to perform their daily tasks and with the use of botnets, botmasters have been able to gain lots of personal information from these businesses, turning their computers into a useful bot. In this article, we will take a look at different types of attacks on businesses over the Internet and different types of botnets and how they are affecting personal data. We will also discuss different types of destructive practices on the Internet performed by individuals using malicious codes and application. It has not been a long time since people started learning about botnets attacks, but their evolution and usage rate has increased very rapidly in this short time. The goal of this study is to make people aware of various kinds of attacks and how one can keep their private information safe on the Internet.
{"title":"A Survey on Web Security Issues","authors":"T. Dhital, Bilal Gonen","doi":"10.1109/CSCI49370.2019.00047","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00047","url":null,"abstract":"There are different types media of communication, Internet is the most used and many believe that it is the most reliable form of communication. The Internet has been polluted with different forms of viruses and malware since it first started. As the Internet does not have a centralized control, it is vulnerable to different types of attacks. Businesses around the globe use Internet to perform their daily tasks and with the use of botnets, botmasters have been able to gain lots of personal information from these businesses, turning their computers into a useful bot. In this article, we will take a look at different types of attacks on businesses over the Internet and different types of botnets and how they are affecting personal data. We will also discuss different types of destructive practices on the Internet performed by individuals using malicious codes and application. It has not been a long time since people started learning about botnets attacks, but their evolution and usage rate has increased very rapidly in this short time. The goal of this study is to make people aware of various kinds of attacks and how one can keep their private information safe on the Internet.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Japanese judicial field, most precedents are not publicly opened on Japanese court web pages to protect personal information. Confidential words such as personal names are replaced by other meaningless words. This operation takes time and effort because it is done manually. Therefore, we would like to predict the confidential words automatically. We propose the method of predicting the confidential words in Japanese judicial precedents using the neural network combined POS (Part of speech) tag. As the result we obtained 88% accuracy improvement for detecting the confidential words compared to the previously model. Then, we confirmed whether our model could be practical use or not.
{"title":"Predicting the Confidential Words in Japanese Judicial Precedents Using the Neural Network Combined POS Tag","authors":"Masakazu Kanazawa, Atsushi Ito, Kazuyuki Yamasawa, Takehiko Kasahara, Yuya Kiryu","doi":"10.1109/CSCI49370.2019.00066","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00066","url":null,"abstract":"In Japanese judicial field, most precedents are not publicly opened on Japanese court web pages to protect personal information. Confidential words such as personal names are replaced by other meaningless words. This operation takes time and effort because it is done manually. Therefore, we would like to predict the confidential words automatically. We propose the method of predicting the confidential words in Japanese judicial precedents using the neural network combined POS (Part of speech) tag. As the result we obtained 88% accuracy improvement for detecting the confidential words compared to the previously model. Then, we confirmed whether our model could be practical use or not.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00116
Huan Yang, Kaijian Xia, Bi Anqi, Pengjiang Qian
Decision fusion consists in the combination of the outputs of multiple classifiers into a common decision that is more precise or stable. In most cases, however, only classical fusion techniques are considered. This work compares the performance of several state-of-the-art fusion methods on new applications of automatic stage classification of several neuropsychological tests. The tests were staged into three classes: stimulus display, retention interval, and subject response. The considered late fusion methods were: alpha integration; copulas; Dempster-Shafer combination; independent component analysis mixture models; and behavior knowledge space. Late fusion was able to improve the performance for the task, with alpha integration yielding the most stable result.
{"title":"New Applications of Late Fusion Methods for EEG Signal Processing","authors":"Huan Yang, Kaijian Xia, Bi Anqi, Pengjiang Qian","doi":"10.1109/CSCI49370.2019.00116","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00116","url":null,"abstract":"Decision fusion consists in the combination of the outputs of multiple classifiers into a common decision that is more precise or stable. In most cases, however, only classical fusion techniques are considered. This work compares the performance of several state-of-the-art fusion methods on new applications of automatic stage classification of several neuropsychological tests. The tests were staged into three classes: stimulus display, retention interval, and subject response. The considered late fusion methods were: alpha integration; copulas; Dempster-Shafer combination; independent component analysis mixture models; and behavior knowledge space. Late fusion was able to improve the performance for the task, with alpha integration yielding the most stable result.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00036
Nawaf Almolhis, Micheal Haney
Internet of Things (IoT) is a new domain which is designed to make human lives more comfortable and convenient. Conversely, it has also raised issues of security and privacy as a data-driven could-based ecosystem. IoT technology raises challenges for digital forensics investigators when working on cybercrime or digital intrusions. Among these challenges, protacting consumer privacy when conducting investigations is important and difficult. Currently, literature has shown that there is not a single agreed upon IoT-forensic standard model that can protect privacy of 3rd party consumers. This research will address this limitation by developing a privacy-aware IoT forensics model. In this paper, by mapping the ISO/IEC 27037 standard to the three layered reference architecture of IoT, the authors discuss the breach of privacy that may happen when investigating an IoT environment.
{"title":"IoT Forensics Pitfalls for Privacy and a Model for Providing Safeguards","authors":"Nawaf Almolhis, Micheal Haney","doi":"10.1109/CSCI49370.2019.00036","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00036","url":null,"abstract":"Internet of Things (IoT) is a new domain which is designed to make human lives more comfortable and convenient. Conversely, it has also raised issues of security and privacy as a data-driven could-based ecosystem. IoT technology raises challenges for digital forensics investigators when working on cybercrime or digital intrusions. Among these challenges, protacting consumer privacy when conducting investigations is important and difficult. Currently, literature has shown that there is not a single agreed upon IoT-forensic standard model that can protect privacy of 3rd party consumers. This research will address this limitation by developing a privacy-aware IoT forensics model. In this paper, by mapping the ISO/IEC 27037 standard to the three layered reference architecture of IoT, the authors discuss the breach of privacy that may happen when investigating an IoT environment.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00093
O. Olagbemi, E. de Doncker
ParAdapt is a numerical integration software based on a classic global adaptive algorithm, which employs GPUs in providing integral evaluations. Based on adaptive region partitioning strategies developed for efficient integration and mapping to GPUs, ParAdapt renders the framework of the global adaptive scheme suitable for general functions in moderate dimensions, say 10 to 25. Speedup values achieved are in the double and triple digits up to very large numbers of subdivisions. While sequential adaptive strategies are generally considered effective for integral dimensions through about 10 or 12, it is our goal to move this threshold up considerably.
{"title":"Scalable Algorithms for Multivariate Integration with ParAdapt and CUDA","authors":"O. Olagbemi, E. de Doncker","doi":"10.1109/CSCI49370.2019.00093","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00093","url":null,"abstract":"ParAdapt is a numerical integration software based on a classic global adaptive algorithm, which employs GPUs in providing integral evaluations. Based on adaptive region partitioning strategies developed for efficient integration and mapping to GPUs, ParAdapt renders the framework of the global adaptive scheme suitable for general functions in moderate dimensions, say 10 to 25. Speedup values achieved are in the double and triple digits up to very large numbers of subdivisions. While sequential adaptive strategies are generally considered effective for integral dimensions through about 10 or 12, it is our goal to move this threshold up considerably.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129733367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00197
S. Shimizu, Kouta Mizuide, Yuki Nakata, Masaya Hori, Kohshi Matsubara, Hiroaki Inoue
This report proposes a new support system that allows elderly people able to live with a sense of security without the help of other people. In this system, by using sensors, it is possible to watch closely the condition of elderly people from a distant public institution. Furthermore, the significant information to maintain their physical condition is presented by this system. Then, according to an experiment using this system, the possibility is made clear that this system would be useful for the support of elderly people.
{"title":"Improvement of New Support System for Elderly People's Daily Life","authors":"S. Shimizu, Kouta Mizuide, Yuki Nakata, Masaya Hori, Kohshi Matsubara, Hiroaki Inoue","doi":"10.1109/CSCI49370.2019.00197","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00197","url":null,"abstract":"This report proposes a new support system that allows elderly people able to live with a sense of security without the help of other people. In this system, by using sensors, it is possible to watch closely the condition of elderly people from a distant public institution. Furthermore, the significant information to maintain their physical condition is presented by this system. Then, according to an experiment using this system, the possibility is made clear that this system would be useful for the support of elderly people.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127403993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00155
Soma Datta, M. Mirza
Active learning helps students to retain the course material and apply it to the real world when needed. Involving games in teaching has gained much attention over the past few years. Educational games have always helped students by promoting participation and active learning. It has helped them by motivating and bringing out the best ideas in them in order to understand a skill or a concept. It is an emerging pedagogy. This study discusses how games can help classroom teaching. Also, how the concepts that are taught through games can be used to solve real world problems. Agile software development has been taught to graduate students in the Software Engineering program using games. The games used in this study are the ones which are also used in the software industry to teach employees about Agile framework. The results of the study and student feedbacks are presented in this paper.
{"title":"Software Engineers at Play","authors":"Soma Datta, M. Mirza","doi":"10.1109/CSCI49370.2019.00155","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00155","url":null,"abstract":"Active learning helps students to retain the course material and apply it to the real world when needed. Involving games in teaching has gained much attention over the past few years. Educational games have always helped students by promoting participation and active learning. It has helped them by motivating and bringing out the best ideas in them in order to understand a skill or a concept. It is an emerging pedagogy. This study discusses how games can help classroom teaching. Also, how the concepts that are taught through games can be used to solve real world problems. Agile software development has been taught to graduate students in the Software Engineering program using games. The games used in this study are the ones which are also used in the software industry to teach employees about Agile framework. The results of the study and student feedbacks are presented in this paper.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127514278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00037
M. Fauzi, Bian Yang, Edlira Martiri
In this work, we simulate a game between the attacker and the defender to evaluate their possible strategies in a honeyword system. For the attacker's guessing strategy, the Top-PW attack is used and a novel PassGAN-based attack is proposed. Meanwhile, for the defender's honeywords generation strategy, a PassGAN-based method is implemented and a novel two-stages PassGAN-based generation strategy is proposed. The experiment results show that the Top-PW attack is generally more successful than the PassGAN-based attack for the attacker while the proposed two-stages PassGAN-based approach is proven to be the most suitable honeyword generation strategy for the defender. The proposed two-stages PassGAN-based method for the defender's generation strategy can decrease the attacker's success rate to 9% and surpass some previous honeywords generation methods.
{"title":"PassGAN-Based Honeywords System","authors":"M. Fauzi, Bian Yang, Edlira Martiri","doi":"10.1109/CSCI49370.2019.00037","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00037","url":null,"abstract":"In this work, we simulate a game between the attacker and the defender to evaluate their possible strategies in a honeyword system. For the attacker's guessing strategy, the Top-PW attack is used and a novel PassGAN-based attack is proposed. Meanwhile, for the defender's honeywords generation strategy, a PassGAN-based method is implemented and a novel two-stages PassGAN-based generation strategy is proposed. The experiment results show that the Top-PW attack is generally more successful than the PassGAN-based attack for the attacker while the proposed two-stages PassGAN-based approach is proven to be the most suitable honeyword generation strategy for the defender. The proposed two-stages PassGAN-based method for the defender's generation strategy can decrease the attacker's success rate to 9% and surpass some previous honeywords generation methods.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129014866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/CSCI49370.2019.00279
M. Malita, G. Popescu, G. Stefan
Many Big Data problems, Markov Model related included, are solved using heterogenous systems: host + parallel programmable accelerator. The current solutions for the accelerator part - for example, GPU used as GPGPU - provide limited accelerations due to some architectural constraints. The paper introduces the use of a programmable parallel accelerator able to perform efficient vector and matrix operations avoiding the limitations of the current systems designed using "of-theshelf" solutions. Our main result is an architecture whose actual performance is a much higher percentage from its peak performance than those of the consecrated accelerators. The performance improvements we offer come from the following two features: the addition of a reduction network at the output of a linear array of cells and an appropriate use of a serial register distributed along the same linear array of cells. Thus, for a n-state Markov Model, instead of a solution with the size in O(n2) and an acceleration in O(n2=logn), we offer an accelerator with the size in O(n) and the acceleration in O(n).
{"title":"Heterogeneous Computing for Markov Models in Big Data","authors":"M. Malita, G. Popescu, G. Stefan","doi":"10.1109/CSCI49370.2019.00279","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00279","url":null,"abstract":"Many Big Data problems, Markov Model related included, are solved using heterogenous systems: host + parallel programmable accelerator. The current solutions for the accelerator part - for example, GPU used as GPGPU - provide limited accelerations due to some architectural constraints. The paper introduces the use of a programmable parallel accelerator able to perform efficient vector and matrix operations avoiding the limitations of the current systems designed using \"of-theshelf\" solutions. Our main result is an architecture whose actual performance is a much higher percentage from its peak performance than those of the consecrated accelerators. The performance improvements we offer come from the following two features: the addition of a reduction network at the output of a linear array of cells and an appropriate use of a serial register distributed along the same linear array of cells. Thus, for a n-state Markov Model, instead of a solution with the size in O(n2) and an acceleration in O(n2=logn), we offer an accelerator with the size in O(n) and the acceleration in O(n).","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}