首页 > 最新文献

2021 6th International Conference on Computer Science and Engineering (UBMK)最新文献

英文 中文
Convolutional Attention Network for MRI-based Alzheimer’s Disease Classification and its Interpretability Analysis 基于mri的阿尔茨海默病分类卷积注意网络及其可解释性分析
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558882
Yasemin Turkan, F. Tek
Neuroimaging techniques, such as Magnetic Resonance Imaging (MRI) and Positron Emission Tomography (PET), help to identify Alzheimer’s disease (AD). These techniques generate large-scale, high-dimensional, multimodal neuroimaging data, which is time-consuming and difficult to interpret and classify. Therefore, interest in deep learning approaches for the classification of 3D structural MRI brain scans has grown rapidly. In this research study, we improved the 3D VGG model proposed by Korolev et al. [2]. We increased the filters in the 3D convolutional layers and then added an attention mechanism for better classification. We compared the performance of the proposed approaches for the classification of Alzheimer’s disease versus mild cognitive impairments and normal cohorts on the Alzheimer’s Disease Neuroimaging Initiative (ADNI) dataset. We observed that both the accuracy and area under curve results improved with the proposed models. However, deep neural networks are black boxes that produce predictions that require further explanation for medical usage. We compared the 3D-data interpretation capabilities of the proposed models using four different interpretability methods: Occlusion, 3D Ultrametric Contour Map, 3D Gradient-Weighted Class Activation Mapping, and SHapley Additive exPlanations (SHAP). We observed that explanation results differed in different network models and data classes.
神经成像技术,如磁共振成像(MRI)和正电子发射断层扫描(PET),有助于识别阿尔茨海默病(AD)。这些技术产生大规模、高维、多模态的神经成像数据,耗时且难以解释和分类。因此,对3D结构MRI脑扫描分类的深度学习方法的兴趣迅速增长。在本研究中,我们对Korolev等人[2]提出的三维VGG模型进行了改进。我们在3D卷积层中增加了过滤器,然后增加了一个注意机制来更好地分类。我们比较了在阿尔茨海默病神经影像学倡议(ADNI)数据集上对阿尔茨海默病与轻度认知障碍和正常队列进行分类的拟议方法的性能。我们观察到,所提出的模型提高了结果的精度和曲线下面积。然而,深度神经网络是产生预测的黑盒子,需要进一步解释医疗用途。我们使用四种不同的可解释性方法比较了所提出模型的3D数据解释能力:遮挡、3D超高线图、3D梯度加权类激活映射和SHapley加性解释(SHAP)。我们观察到,在不同的网络模型和数据类别中,解释结果有所不同。
{"title":"Convolutional Attention Network for MRI-based Alzheimer’s Disease Classification and its Interpretability Analysis","authors":"Yasemin Turkan, F. Tek","doi":"10.1109/UBMK52708.2021.9558882","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558882","url":null,"abstract":"Neuroimaging techniques, such as Magnetic Resonance Imaging (MRI) and Positron Emission Tomography (PET), help to identify Alzheimer’s disease (AD). These techniques generate large-scale, high-dimensional, multimodal neuroimaging data, which is time-consuming and difficult to interpret and classify. Therefore, interest in deep learning approaches for the classification of 3D structural MRI brain scans has grown rapidly. In this research study, we improved the 3D VGG model proposed by Korolev et al. [2]. We increased the filters in the 3D convolutional layers and then added an attention mechanism for better classification. We compared the performance of the proposed approaches for the classification of Alzheimer’s disease versus mild cognitive impairments and normal cohorts on the Alzheimer’s Disease Neuroimaging Initiative (ADNI) dataset. We observed that both the accuracy and area under curve results improved with the proposed models. However, deep neural networks are black boxes that produce predictions that require further explanation for medical usage. We compared the 3D-data interpretation capabilities of the proposed models using four different interpretability methods: Occlusion, 3D Ultrametric Contour Map, 3D Gradient-Weighted Class Activation Mapping, and SHapley Additive exPlanations (SHAP). We observed that explanation results differed in different network models and data classes.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116078874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
XML Document Transformation for Data Manipulation Operations 用于数据操作操作的XML文档转换
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559019
A. Mukhitova, A. Yerimbetova, Nenad Mladenović
Integration of information resources to provide users with access to miscellaneous information and the ability of information management is carried out through specialized adaptive administration and user graphic web interfaces. In this paper we study the technology of creating an adaptive graphical editor of XML records to provide access to distributed heterogeneous information resources through graphical user WEB-interfaces. The methodology for creating user interfaces suitable for the structure and functionality of information sources is also described herein. The proposed XML record editor is able to visualize the full structure of an XML document as a screen form of an HTML page. The program is a server-side WEB application that provides on-screen forms for creating and editing XML documents in accordance with the selected XSD schema.
整合信息资源,通过专门的自适应管理和用户图形化的web界面,为用户提供对杂项信息的访问和信息管理能力。本文研究了创建XML记录自适应图形化编辑器的技术,通过图形化用户web界面提供对分布式异构信息资源的访问。本文还描述了用于创建适合信息源的结构和功能的用户界面的方法。所建议的XML记录编辑器能够将XML文档的完整结构可视化为HTML页面的屏幕形式。该程序是一个服务器端WEB应用程序,提供用于根据所选XSD模式创建和编辑XML文档的屏幕表单。
{"title":"XML Document Transformation for Data Manipulation Operations","authors":"A. Mukhitova, A. Yerimbetova, Nenad Mladenović","doi":"10.1109/UBMK52708.2021.9559019","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559019","url":null,"abstract":"Integration of information resources to provide users with access to miscellaneous information and the ability of information management is carried out through specialized adaptive administration and user graphic web interfaces. In this paper we study the technology of creating an adaptive graphical editor of XML records to provide access to distributed heterogeneous information resources through graphical user WEB-interfaces. The methodology for creating user interfaces suitable for the structure and functionality of information sources is also described herein. The proposed XML record editor is able to visualize the full structure of an XML document as a screen form of an HTML page. The program is a server-side WEB application that provides on-screen forms for creating and editing XML documents in accordance with the selected XSD schema.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offensive Language Detection in Turkish Tweets with Bert Models 基于Bert模型的土耳其语推文攻击性语言检测
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559000
Anil Özberk, I. Çiçekli
As the insulting statements increase on the online platform, these negative statements create a reaction and disturb the peace of society. Offensive language detection research has been increased in recent years. This paper explores the effects of the usage of BERT models and fine-tuning techniques on offensive language detection on Turkish tweets. We emphasize the pre-trained model importance on the performance of a downstream task and the importance of the used BERT model.
随着网络平台上侮辱性言论的增加,这些负面言论产生了一种反应,扰乱了社会的安宁。近年来,攻击性语言检测的研究有所增加。本文探讨了使用BERT模型和微调技术对土耳其推文攻击性语言检测的影响。我们强调预训练模型对下游任务性能的重要性以及所使用的BERT模型的重要性。
{"title":"Offensive Language Detection in Turkish Tweets with Bert Models","authors":"Anil Özberk, I. Çiçekli","doi":"10.1109/UBMK52708.2021.9559000","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559000","url":null,"abstract":"As the insulting statements increase on the online platform, these negative statements create a reaction and disturb the peace of society. Offensive language detection research has been increased in recent years. This paper explores the effects of the usage of BERT models and fine-tuning techniques on offensive language detection on Turkish tweets. We emphasize the pre-trained model importance on the performance of a downstream task and the importance of the used BERT model.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123025590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Review of Blockchain Based Solutions for Fight Against Pandemics 基于区块链的流行病防治解决方案综述
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558911
Seval Capraz, Adnan Özsoy
Starting in late 2019, a highly infectious coronavirus disease spread rapidly to all over the world and caused many deaths worldwide. This disease known as COVID-19 caused more than 180 million cases including more than 4 million deaths. Numerous false reports, misinformation, and unsolicited fears in regards to coronavirus, are being circulated regularly since the outbreak of the COVID-19. We can solve some of the problems of the pandemic with new technologies like blockchain, therefore we can control its spread until an effective and affordable vaccine is found. Blockchain can combat pandemics by enabling early detection of outbreaks, protecting user privacy, and ensuring reliable medical supply chain during the outbreak tracking. When ill people are detected, it is possible to quickly and accurately share their diagnostic information and clinical presentation with blockchain. We can also hide patients’ identity while sharing that information. Anonymization is supported in blockchain and it’s stronger than other techniques. Moreover, blockchain is transparent so that every disease event can be kept tabs on transparently. There are a lot of blockchain solutions in literature which is proposed recently to combat COVID-19-like pandemics. In this study, we aim to give the details of blockchain and why we can use it for light against pandemics and review proposed solutions. We summarized the problems of pandemic and the benefits of blockchain technology. We highlighted the defects of solutions in literature and propose alternatives.
从2019年底开始,一种高度传染性的冠状病毒疾病迅速蔓延到世界各地,并在全球造成许多人死亡。这种被称为COVID-19的疾病造成1.8亿多例病例,其中400多万人死亡。自2019冠状病毒病爆发以来,关于冠状病毒的许多虚假报道、错误信息和未经请求的恐惧正在定期传播。我们可以用区块链等新技术解决大流行的一些问题,因此我们可以控制其传播,直到找到有效且负担得起的疫苗。区块链可以通过早期发现疫情、保护用户隐私以及在疫情跟踪期间确保可靠的医疗供应链来对抗流行病。当发现病人时,可以通过区块链快速准确地分享他们的诊断信息和临床表现。我们还可以在分享信息的同时隐藏病人的身份。区块链支持匿名化,它比其他技术更强大。此外,区块链是透明的,因此每个疾病事件都可以透明地进行监视。最近,文献中提出了许多区块链解决方案,以应对类似covid -19的大流行。在这项研究中,我们的目标是提供区块链的细节,以及为什么我们可以用它来对抗流行病,并审查提出的解决方案。我们总结了流行病的问题和区块链技术的好处。我们强调了文献中解决方案的缺陷,并提出了替代方案。
{"title":"A Review of Blockchain Based Solutions for Fight Against Pandemics","authors":"Seval Capraz, Adnan Özsoy","doi":"10.1109/UBMK52708.2021.9558911","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558911","url":null,"abstract":"Starting in late 2019, a highly infectious coronavirus disease spread rapidly to all over the world and caused many deaths worldwide. This disease known as COVID-19 caused more than 180 million cases including more than 4 million deaths. Numerous false reports, misinformation, and unsolicited fears in regards to coronavirus, are being circulated regularly since the outbreak of the COVID-19. We can solve some of the problems of the pandemic with new technologies like blockchain, therefore we can control its spread until an effective and affordable vaccine is found. Blockchain can combat pandemics by enabling early detection of outbreaks, protecting user privacy, and ensuring reliable medical supply chain during the outbreak tracking. When ill people are detected, it is possible to quickly and accurately share their diagnostic information and clinical presentation with blockchain. We can also hide patients’ identity while sharing that information. Anonymization is supported in blockchain and it’s stronger than other techniques. Moreover, blockchain is transparent so that every disease event can be kept tabs on transparently. There are a lot of blockchain solutions in literature which is proposed recently to combat COVID-19-like pandemics. In this study, we aim to give the details of blockchain and why we can use it for light against pandemics and review proposed solutions. We summarized the problems of pandemic and the benefits of blockchain technology. We highlighted the defects of solutions in literature and propose alternatives.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124565747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Text Classification with Transformer 用Transformer改进文本分类
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558906
Gokhan Soyalp, Artun Alar, Kaan Ozkanli, Beytullah Yildiz
Huge amounts of text data are produced every day. Processing text data that accumulates and grows exponentially every day requires the use of appropriate automation tools. Text classification, a Natural Language Processing task, has the potential to provide automatic text data processing. Many new models have been proposed to achieve much better results in text classification. The transformer model has been introduced recently to provide superior performance in terms of accuracy and processing speed in deep learning. In this article, we propose an improved Transformer model for text classification. The dataset containing information about the books was collected from an online resource and used to train the models. We witnessed superior performance in our proposed Transformer model compared to previous state-of-art models such as LSTM and CNN.
每天都会产生大量的文本数据。处理每天呈指数级增长的文本数据需要使用适当的自动化工具。文本分类是一项自然语言处理任务,具有提供自动文本数据处理的潜力。为了在文本分类中取得更好的结果,人们提出了许多新的模型。最近引入的变压器模型在深度学习的准确性和处理速度方面提供了卓越的性能。在本文中,我们提出了一个改进的Transformer文本分类模型。包含图书信息的数据集是从在线资源中收集的,并用于训练模型。我们发现,与LSTM和CNN等先前最先进的模型相比,我们提出的Transformer模型具有优越的性能。
{"title":"Improving Text Classification with Transformer","authors":"Gokhan Soyalp, Artun Alar, Kaan Ozkanli, Beytullah Yildiz","doi":"10.1109/UBMK52708.2021.9558906","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558906","url":null,"abstract":"Huge amounts of text data are produced every day. Processing text data that accumulates and grows exponentially every day requires the use of appropriate automation tools. Text classification, a Natural Language Processing task, has the potential to provide automatic text data processing. Many new models have been proposed to achieve much better results in text classification. The transformer model has been introduced recently to provide superior performance in terms of accuracy and processing speed in deep learning. In this article, we propose an improved Transformer model for text classification. The dataset containing information about the books was collected from an online resource and used to train the models. We witnessed superior performance in our proposed Transformer model compared to previous state-of-art models such as LSTM and CNN.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116734819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security and Privacy Challenges, Solutions, and Open Issues in Smart Metering: A Review 智能电表中的安全和隐私挑战、解决方案和开放问题:综述
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558912
Lae Lae Win, Samet Tonyali
The traditional power grid becomes ‘smart’ when it is combined with the communication and information technology. Along with smart grid, the traditional meter is replaced with smart meter. Smart meters play an important role in energy consumption reporting and, thereby, billing. Besides smart meters, the smart grid communication network is composed of heterogeneous devices that are communicating through public networks. Therefore, smart metering communications are susceptible to cyber-attacks and privacy breaches which are still under debating. This paper gives a brief overview of smart grid, smart metering, and the communication networks. Then, the privacy and security requirements of the smart grid network are derived. The various kind of cyber-attacks are discussed, after that, the different schemes and approaches that have been proposed in previous papers are reviewed. Lastly, the open issues on security and privacy of smart grid metering communications are highlighted.
传统电网与通信、信息技术相结合,实现“智能化”。随着智能电网的发展,传统电表逐渐被智能电表所取代。智能电表在能源消耗报告中扮演着重要的角色,因此,计费。除智能电表外,智能电网通信网络由异构设备组成,这些设备通过公网通信。因此,智能计量通信很容易受到网络攻击和隐私泄露的影响,这些问题仍在讨论中。本文简要介绍了智能电网、智能电表和通信网络。然后,推导出智能电网的隐私和安全要求。讨论了各种类型的网络攻击,然后回顾了以前论文中提出的不同方案和方法。最后,对智能电网计量通信中存在的安全和隐私问题进行了分析。
{"title":"Security and Privacy Challenges, Solutions, and Open Issues in Smart Metering: A Review","authors":"Lae Lae Win, Samet Tonyali","doi":"10.1109/UBMK52708.2021.9558912","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558912","url":null,"abstract":"The traditional power grid becomes ‘smart’ when it is combined with the communication and information technology. Along with smart grid, the traditional meter is replaced with smart meter. Smart meters play an important role in energy consumption reporting and, thereby, billing. Besides smart meters, the smart grid communication network is composed of heterogeneous devices that are communicating through public networks. Therefore, smart metering communications are susceptible to cyber-attacks and privacy breaches which are still under debating. This paper gives a brief overview of smart grid, smart metering, and the communication networks. Then, the privacy and security requirements of the smart grid network are derived. The various kind of cyber-attacks are discussed, after that, the different schemes and approaches that have been proposed in previous papers are reviewed. Lastly, the open issues on security and privacy of smart grid metering communications are highlighted.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126632085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Learning Methods with Pre-Trained Word Embeddings and Pre-Trained Transformers for Extreme Multi-Label Text Classification 基于预训练词嵌入和预训练变形的深度学习方法用于极端多标签文本分类
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558977
Necdet Eren Erciyes, A. K. Görür
In recent years, there has been a considerable increase in textual documents online. This increase requires the creation of highly improved machine learning methods to classify text in many different domains. The effectiveness of these machine learning methods depends on the model capacity to understand the complex nature of the unstructured data and the relations of features that exist. Many different machine learning methods were proposed for a long time to solve text classification problems, such as SVM, kNN, and Rocchio classification. These shallow learning methods have achieved doubtless success in many different domains. For big and unstructured data like text, deep learning methods which can learn representations and features from the input data wtihout using any feature extraction methods have shown to be one of the major solutions. In this study, we explore the accuracy of recent recommended deep learning methods for multi-label text classification starting with simple RNN, CNN models to pretrained transformer models. We evaluated these methods’ performances by computing multi-label evaluation metrics and compared the results with the previous studies.
近年来,在线文本文档有了相当大的增长。这种增长需要创建高度改进的机器学习方法来对许多不同领域的文本进行分类。这些机器学习方法的有效性取决于模型理解非结构化数据的复杂性和存在的特征关系的能力。长期以来,人们提出了许多不同的机器学习方法来解决文本分类问题,例如SVM、kNN和Rocchio分类。这些肤浅的学习方法无疑在许多不同的领域取得了成功。对于像文本这样的大数据和非结构化数据,无需使用任何特征提取方法就可以从输入数据中学习表征和特征的深度学习方法已被证明是主要的解决方案之一。在这项研究中,我们探索了最近推荐的深度学习方法在多标签文本分类中的准确性,从简单的RNN、CNN模型到预训练的变压器模型。我们通过计算多标签评价指标来评价这些方法的性能,并将结果与以往的研究结果进行比较。
{"title":"Deep Learning Methods with Pre-Trained Word Embeddings and Pre-Trained Transformers for Extreme Multi-Label Text Classification","authors":"Necdet Eren Erciyes, A. K. Görür","doi":"10.1109/UBMK52708.2021.9558977","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558977","url":null,"abstract":"In recent years, there has been a considerable increase in textual documents online. This increase requires the creation of highly improved machine learning methods to classify text in many different domains. The effectiveness of these machine learning methods depends on the model capacity to understand the complex nature of the unstructured data and the relations of features that exist. Many different machine learning methods were proposed for a long time to solve text classification problems, such as SVM, kNN, and Rocchio classification. These shallow learning methods have achieved doubtless success in many different domains. For big and unstructured data like text, deep learning methods which can learn representations and features from the input data wtihout using any feature extraction methods have shown to be one of the major solutions. In this study, we explore the accuracy of recent recommended deep learning methods for multi-label text classification starting with simple RNN, CNN models to pretrained transformer models. We evaluated these methods’ performances by computing multi-label evaluation metrics and compared the results with the previous studies.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126971288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Log Classification in Telecommunication Industry 电信行业软件日志分类
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558985
Onur Ülkü, Necip Gözüaçik, Senem Tanberk, M. Aydin, A. Zaim
Software system admins depend on log data for understanding system behavior, monitoring anomalies, tracking software bugs, and malfunctioning detection. Log analysis based on machine learning techniques enables to transform of raw logs into meaningful information that helps the DevOps team and administrators to solve problems. Al ensures to group similar logs together and keeps periodic logs more organized and sorted, allowing us to get to where we need to look faster. In this paper, we present a log classification system on log data generated by VoIP (Voice over Internet Protocol) soft-switch product. In this way, we targeted to detect the problem, direct it to the relevant department, allocate resources, and solve software bugs faster and more efficiently. Machine learning algorithms such as Linear Classifiers, Support Vector Machines, Decision Tree, Random Forest, Boosting, K-Nearest Neighbors, and Multilayer Perceptron are used for log classification.
软件系统管理员依靠日志数据来理解系统行为、监视异常、跟踪软件错误和检测故障。基于机器学习技术的日志分析可以将原始日志转换为有意义的信息,帮助DevOps团队和管理员解决问题。ai确保将相似的日志分组在一起,并使周期性日志更有组织和排序,使我们能够更快地找到需要查看的地方。本文针对VoIP软交换产品产生的日志数据,提出了一种日志分类系统。通过这种方式,我们有针对性地发现问题,并将其引导到相关部门,分配资源,更快更有效地解决软件漏洞。机器学习算法,如线性分类器、支持向量机、决策树、随机森林、boost、k近邻和多层感知器用于日志分类。
{"title":"Software Log Classification in Telecommunication Industry","authors":"Onur Ülkü, Necip Gözüaçik, Senem Tanberk, M. Aydin, A. Zaim","doi":"10.1109/UBMK52708.2021.9558985","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558985","url":null,"abstract":"Software system admins depend on log data for understanding system behavior, monitoring anomalies, tracking software bugs, and malfunctioning detection. Log analysis based on machine learning techniques enables to transform of raw logs into meaningful information that helps the DevOps team and administrators to solve problems. Al ensures to group similar logs together and keeps periodic logs more organized and sorted, allowing us to get to where we need to look faster. In this paper, we present a log classification system on log data generated by VoIP (Voice over Internet Protocol) soft-switch product. In this way, we targeted to detect the problem, direct it to the relevant department, allocate resources, and solve software bugs faster and more efficiently. Machine learning algorithms such as Linear Classifiers, Support Vector Machines, Decision Tree, Random Forest, Boosting, K-Nearest Neighbors, and Multilayer Perceptron are used for log classification.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127300689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controlling Shadow IT: Case Study from a Turkish Bank 控制影子IT:以一家土耳其银行为例
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558944
N. Ozkan, Kübra Bulut, M. Gök, G. Özer
it is common to encounter formations of IT processes that locate in and are operated by business units, outside of IT units’ control, so called shadow IT. Although it has several advantages, it also brings us a grey area that needs to be controlled properly. Otherwise, it can lead to high risks, financial and reputational losses. In this paper, we present the development of an IT governance and management system including an accompanying control approach for shadow IT in Kuveyt Turk Participation Bank based on the two main projects experienced by the bank. After defining shadow IT for the bank, we deliver the problem with a risk aspect, then, elaborate on selected control approach with its reasoning, convey establishment of related governance model and processes and finally discuss on the topic with general terms, to further give insights to organizations in the similar context. Controlling shadow IT has largely been under-emphasized so far in the literature, especially for the finance sector. Hopefully, this study sheds light on both practitioners and researchers by filling this gap, a bit.
通常会遇到位于业务单元中并由业务单元操作的it过程的形成,这些过程在it单元的控制之外,因此称为影子it。虽然它有一些优点,但它也给我们带来了一个需要适当控制的灰色地带。否则,它可能导致高风险,财务和声誉损失。在本文中,我们提出了一个IT治理和管理系统的发展,包括一个伴随的控制方法的影子IT库维伊特土耳其参与银行的两个主要项目的经验为基础的银行。在为银行定义影子IT之后,我们从风险方面提出问题,然后详细说明选择的控制方法及其推理,传达相关治理模型和流程的建立,最后用一般术语讨论该主题,以进一步为类似背景下的组织提供见解。迄今为止,在文献中,对影子IT的控制在很大程度上没有得到重视,尤其是在金融领域。希望这项研究能在一定程度上填补这一空白,从而对从业者和研究人员都有所启发。
{"title":"Controlling Shadow IT: Case Study from a Turkish Bank","authors":"N. Ozkan, Kübra Bulut, M. Gök, G. Özer","doi":"10.1109/UBMK52708.2021.9558944","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558944","url":null,"abstract":"it is common to encounter formations of IT processes that locate in and are operated by business units, outside of IT units’ control, so called shadow IT. Although it has several advantages, it also brings us a grey area that needs to be controlled properly. Otherwise, it can lead to high risks, financial and reputational losses. In this paper, we present the development of an IT governance and management system including an accompanying control approach for shadow IT in Kuveyt Turk Participation Bank based on the two main projects experienced by the bank. After defining shadow IT for the bank, we deliver the problem with a risk aspect, then, elaborate on selected control approach with its reasoning, convey establishment of related governance model and processes and finally discuss on the topic with general terms, to further give insights to organizations in the similar context. Controlling shadow IT has largely been under-emphasized so far in the literature, especially for the finance sector. Hopefully, this study sheds light on both practitioners and researchers by filling this gap, a bit.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Resource Scheduling for Lightweight SMT-COP 改进轻量级SMT-COP的资源调度
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558934
Ugur Nezir, Burak Lus, Gurhan Kucuk
Simultaneous multithreading (SMT) processors target resource under-utilization related performance problems of superscalar processors by allowing various datapath resources to be simultaneously shared among several threads with ease. This approach exploits thread-level parallelism on top of the well-studied instruction level parallelism. However, when datapath resources are shared among threads, there is always a possibility that corunning ill-intended programs may try to sniff on other programs with sensitive information like passwords or cryptocurrency information. By stress-testing and measuring many of the shared resources, this is quite achievable. These approaches are known as side-channel attacks. SMT-COP, a study published recently, is a secure architectural implementation based on resource scheduling that prevents these kind of attacks based on execution logic with a modest performance loss of nearly 10%. In this study, we aim to improve SMT-COP’s resource distribution scheme with several approaches, providing a quite close sense of security to that of SMT-COP while improving the performance by up to 8.86% on the average, over the original SMT-COP design.
同步多线程(SMT)处理器通过允许在多个线程之间轻松地同时共享各种数据路径资源,来解决与超标量处理器的资源利用率不足相关的性能问题。这种方法在充分研究的指令级并行性之上利用线程级并行性。但是,当数据路径资源在线程之间共享时,总是有可能运行恶意程序,可能会尝试嗅探具有密码或加密货币信息等敏感信息的其他程序。通过压力测试和测量许多共享资源,这是可以实现的。这些方法被称为侧信道攻击。最近发表的一项研究表明,SMT-COP是一种基于资源调度的安全架构实现,它可以防止这种基于执行逻辑的攻击,性能损失接近10%。在本研究中,我们的目标是通过几种方法改进SMT-COP的资源分配方案,提供与SMT-COP相当接近的安全感,同时比原始SMT-COP设计平均提高8.86%的性能。
{"title":"Improved Resource Scheduling for Lightweight SMT-COP","authors":"Ugur Nezir, Burak Lus, Gurhan Kucuk","doi":"10.1109/UBMK52708.2021.9558934","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558934","url":null,"abstract":"Simultaneous multithreading (SMT) processors target resource under-utilization related performance problems of superscalar processors by allowing various datapath resources to be simultaneously shared among several threads with ease. This approach exploits thread-level parallelism on top of the well-studied instruction level parallelism. However, when datapath resources are shared among threads, there is always a possibility that corunning ill-intended programs may try to sniff on other programs with sensitive information like passwords or cryptocurrency information. By stress-testing and measuring many of the shared resources, this is quite achievable. These approaches are known as side-channel attacks. SMT-COP, a study published recently, is a secure architectural implementation based on resource scheduling that prevents these kind of attacks based on execution logic with a modest performance loss of nearly 10%. In this study, we aim to improve SMT-COP’s resource distribution scheme with several approaches, providing a quite close sense of security to that of SMT-COP while improving the performance by up to 8.86% on the average, over the original SMT-COP design.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130825111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 6th International Conference on Computer Science and Engineering (UBMK)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1