首页 > 最新文献

J. Chem. Inf. Comput. Sci.最新文献

英文 中文
Improving an AI-Based Algorithm to Automatically Generate Concept Maps 一种基于人工智能的概念图自动生成算法的改进
Pub Date : 2019-10-30 DOI: 10.5539/cis.v12n4p72
Sara Alomari, S. Abdullah
Concept maps have been used to assist learners as an effective learning method in identifying relationships between information, especially when teaching materials have many topics or concepts. However, making a manual concept map is a long and tedious task. It is time-consuming and demands an intensive effort in reading the full content and reasoning the relationships among concepts. Due to this inefficiency, many studies are carried out to develop intelligent algorithms using several data mining techniques. In this research, the authors aim at improving Text Analysis-Association Rules Mining (TA-ARM) algorithm using the weighted K-nearest neighbors (KNN) algorithm instead of the traditional KNN. The weighted KNN is expected to optimize the classification accuracy, which will, eventually, enhance the quality of the generated concept map.
概念图作为一种有效的学习方法被用来帮助学习者识别信息之间的关系,特别是当教材有许多主题或概念时。然而,制作手工概念图是一项漫长而乏味的任务。阅读全部内容和推理概念之间的关系需要耗费大量时间和精力。由于这种低效率,许多研究使用几种数据挖掘技术来开发智能算法。在本研究中,作者旨在使用加权k近邻(KNN)算法代替传统的KNN算法来改进文本分析-关联规则挖掘(TA-ARM)算法。加权KNN有望优化分类精度,最终提高生成的概念图的质量。
{"title":"Improving an AI-Based Algorithm to Automatically Generate Concept Maps","authors":"Sara Alomari, S. Abdullah","doi":"10.5539/cis.v12n4p72","DOIUrl":"https://doi.org/10.5539/cis.v12n4p72","url":null,"abstract":"Concept maps have been used to assist learners as an effective learning method in identifying relationships between information, especially when teaching materials have many topics or concepts. However, making a manual concept map is a long and tedious task. It is time-consuming and demands an intensive effort in reading the full content and reasoning the relationships among concepts. Due to this inefficiency, many studies are carried out to develop intelligent algorithms using several data mining techniques. In this research, the authors aim at improving Text Analysis-Association Rules Mining (TA-ARM) algorithm using the weighted K-nearest neighbors (KNN) algorithm instead of the traditional KNN. The weighted KNN is expected to optimize the classification accuracy, which will, eventually, enhance the quality of the generated concept map.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"81 8","pages":"72-83"},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91498153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Model Checking of WebRTC Peer to Peer System WebRTC点对点系统的模型检验
Pub Date : 2019-10-22 DOI: 10.5539/cis.v12n4p56
A. Hamzaoui, Hicham Bensaid, A. En-Nouaary
The establishment of the multimedia session is crucial in the WebRTC architecture before media and data transmission. The preliminary bi-directional flow provides the network with all the information needed in order to control and manage the communication between end-users. This control includes the setup, management, and teardown of a session and the definition, and the modification of multiple features that will be enabled in the ongoing session. This is performed by a mechanism named Signaling. In this work, we will use the formal verification to increase confidence in our SDL model by checking the consistency and reliability of the WebRTC Peer to Peer system. The verification and validation are proved the most efficient tools to avoid errors and defects in the concurrent system designs. Indeed, by using model-checking techniques we will verify if the WebRTC system adheres to standards if it performs the selected functions in the correct manner. To achieve that, we will first translate the SDL model to an intermediate format IF that will be retranslated to a Promela Model. Second, using the SPIN model checker, we will verify the general correctness of the model before checking if the desired properties are satisfied using the Linear Temporal Logic (LTL).
在媒体和数据传输之前,多媒体会话的建立是WebRTC体系结构的关键。初步的双向流为网络提供了控制和管理终端用户之间通信所需的全部信息。该控制包括会话的设置、管理和取消以及定义,以及将在正在进行的会话中启用的多个功能的修改。这是由一种名为信令的机制执行的。在这项工作中,我们将通过检查WebRTC点对点系统的一致性和可靠性,使用形式化验证来增加对SDL模型的信心。验证和确认是避免并发系统设计错误和缺陷的最有效工具。实际上,通过使用模型检查技术,我们将验证WebRTC系统是否符合标准,是否以正确的方式执行选定的功能。为了实现这一点,我们将首先将SDL模型转换为中间格式,然后将其重新转换为Promela模型。其次,使用SPIN模型检查器,我们将在使用线性时序逻辑(LTL)检查所需属性是否满足之前验证模型的一般正确性。
{"title":"Model Checking of WebRTC Peer to Peer System","authors":"A. Hamzaoui, Hicham Bensaid, A. En-Nouaary","doi":"10.5539/cis.v12n4p56","DOIUrl":"https://doi.org/10.5539/cis.v12n4p56","url":null,"abstract":"The establishment of the multimedia session is crucial in the WebRTC architecture before media and data transmission. The preliminary bi-directional flow provides the network with all the information needed in order to control and manage the communication between end-users. This control includes the setup, management, and teardown of a session and the definition, and the modification of multiple features that will be enabled in the ongoing session. This is performed by a mechanism named Signaling. In this work, we will use the formal verification to increase confidence in our SDL model by checking the consistency and reliability of the WebRTC Peer to Peer system. The verification and validation are proved the most efficient tools to avoid errors and defects in the concurrent system designs. Indeed, by using model-checking techniques we will verify if the WebRTC system adheres to standards if it performs the selected functions in the correct manner. To achieve that, we will first translate the SDL model to an intermediate format IF that will be retranslated to a Promela Model. Second, using the SPIN model checker, we will verify the general correctness of the model before checking if the desired properties are satisfied using the Linear Temporal Logic (LTL).","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"9 1","pages":"56-71"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74437639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research Intelligence (CRIS) and the Cloud: A Review 研究情报(CRIS)与云:综述
Pub Date : 2019-09-30 DOI: 10.5539/cis.v12n4p40
Otmane Azeroual, Joachim Schöpfel
The purpose of this paper is to explore the impact of the cloud technology on current research information systems (CRIS). Based on an overview of published literature and on empirical evidence from surveys, the paper presents main characteristics, delivery models, service levels and general benefits of cloud computing. The second part assesses how the cloud computing challenges the research information management, from three angles: networking, specific benefits, and the ingestion of data in the cloud. The third part describes three aspects of the implementation of current research systems in the clouds, i.e. service models, requirements and potential risks and barriers. The paper concludes with some perspectives for future work. The paper is written for CRIS administrators and users, in order to improve research information management and to contribute to future development and implementation of these systems, but also for scholars and students who want to have detailed knowledge on this topic.
本文旨在探讨云技术对当前科研信息系统(CRIS)的影响。基于已发表文献的概述和调查的经验证据,本文介绍了云计算的主要特征、交付模式、服务水平和一般好处。第二部分评估了云计算如何挑战研究信息管理,从三个角度:网络、特定利益和云中的数据摄取。第三部分从服务模式、需求、潜在风险和障碍三个方面描述了当前研究系统在云环境下的实施。最后,对今后的工作提出了展望。本文是写给CRIS管理员和用户的,目的是为了改进科研信息管理,为这些系统的未来开发和实施做出贡献,同时也是写给想要详细了解这一主题的学者和学生的。
{"title":"Research Intelligence (CRIS) and the Cloud: A Review","authors":"Otmane Azeroual, Joachim Schöpfel","doi":"10.5539/cis.v12n4p40","DOIUrl":"https://doi.org/10.5539/cis.v12n4p40","url":null,"abstract":"The purpose of this paper is to explore the impact of the cloud technology on current research information systems (CRIS). Based on an overview of published literature and on empirical evidence from surveys, the paper presents main characteristics, delivery models, service levels and general benefits of cloud computing. The second part assesses how the cloud computing challenges the research information management, from three angles: networking, specific benefits, and the ingestion of data in the cloud. The third part describes three aspects of the implementation of current research systems in the clouds, i.e. service models, requirements and potential risks and barriers. The paper concludes with some perspectives for future work. The paper is written for CRIS administrators and users, in order to improve research information management and to contribute to future development and implementation of these systems, but also for scholars and students who want to have detailed knowledge on this topic.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"1 1","pages":"40-55"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75394857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Theory Graph Modeling and Programming Systems from Module Elements to the Application Areas 从模块元素到应用领域的理论图建模与编程系统
Pub Date : 2019-09-24 DOI: 10.5539/cis.v12n4p20
E. Lavrischeva
The mathematical basics of graph modeling and paradigm programming of applied systems (AS) are presented. The vertices of graph are been the functional elements of the systems and the arcs define the connections between them. The graph is represented by an adjacency and reach ability matrix. A number of graph of program structures and their representation by mathematical operations (unions, connections, differences, etc.) are shown. Given the characteristics of graph structures, complexes, units, and systems created from the modules of the graph. The method of modeling the system on the graph of modules, which describe in the programming languages (LP) and calling them with operations (link, assembling, building, etc.). The standard of configuration (2012) Assembly of heterogeneous software elements in AS of different fields of knowledge is made. Brief descriptions of modern and future programming paradigms for formal theoretical creation of systems from service-components for Internet in the near future are given.
介绍了应用系统图建模和范式规划的数学基础。图的顶点是系统的功能元素,弧定义了系统之间的连接。该图由邻接性和可达性矩阵表示。给出了一些程序结构图及其数学运算(联合、连接、差异等)的表示。给定图形结构、复合体、单元和由图形模块创建的系统的特征。用编程语言(LP)对模块进行图形化描述,并对其进行操作调用(链接、装配、构建等)。制定了不同知识领域AS中异构软件要素的装配标准(2012)。简要描述了在不久的将来,用因特网的服务组件进行系统形式化理论创建的现代和未来的编程范式。
{"title":"The Theory Graph Modeling and Programming Systems from Module Elements to the Application Areas","authors":"E. Lavrischeva","doi":"10.5539/cis.v12n4p20","DOIUrl":"https://doi.org/10.5539/cis.v12n4p20","url":null,"abstract":"The mathematical basics of graph modeling and paradigm programming of applied systems (AS) are presented. The vertices of graph are been the functional elements of the systems and the arcs define the connections between them. The graph is represented by an adjacency and reach ability matrix. A number of graph of program structures and their representation by mathematical operations (unions, connections, differences, etc.) are shown. Given the characteristics of graph structures, complexes, units, and systems created from the modules of the graph. The method of modeling the system on the graph of modules, which describe in the programming languages (LP) and calling them with operations (link, assembling, building, etc.). The standard of configuration (2012) Assembly of heterogeneous software elements in AS of different fields of knowledge is made. Brief descriptions of modern and future programming paradigms for formal theoretical creation of systems from service-components for Internet in the near future are given.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"76 1","pages":"20-39"},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86706749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Archiving and Document Management at Taibah University: A Case Study Taibah大学档案与文件管理:个案研究
Pub Date : 2019-09-24 DOI: 10.5539/cis.v12n4p11
J. Alokluk
Archiving and digital document management in educational institutions are not amply studied despite the active use of technologies for these purposes. In this research, a qualitative descriptive case study has been conducted to examine how digital archiving and document management are organised at Taibah University to address the needs of researchers, professors, administrators and students as well as to guarantee secure storage of and access to data. The selection of the case study design has allowed for in-depth analyses of the strategy for managing and archiving data in the selected institution. The interpretation of data with reference to the previously formulated propositions have indicated that Taibah University follows a certain strategy for managing electronic documents, but they do not use a unique data management system. Furthermore, archiving is applied only to a limited number of documents and security of stored data is guaranteed according to the University’s policies.
尽管为这些目的积极使用技术,但教育机构的存档和数字文件管理尚未得到充分研究。在本研究中,进行了定性描述性案例研究,以检查Taibah大学如何组织数字存档和文档管理,以满足研究人员,教授,管理人员和学生的需求,并保证数据的安全存储和访问。案例研究设计的选择允许对所选机构管理和存档数据的策略进行深入分析。参照先前提出的主张对数据的解释表明,Taibah大学遵循某种管理电子文件的策略,但他们没有使用独特的数据管理系统。此外,存档只适用于有限数量的文件,根据大学的政策,存储数据的安全性得到保证。
{"title":"Archiving and Document Management at Taibah University: A Case Study","authors":"J. Alokluk","doi":"10.5539/cis.v12n4p11","DOIUrl":"https://doi.org/10.5539/cis.v12n4p11","url":null,"abstract":"Archiving and digital document management in educational institutions are not amply studied despite the active use of technologies for these purposes. In this research, a qualitative descriptive case study has been conducted to examine how digital archiving and document management are organised at Taibah University to address the needs of researchers, professors, administrators and students as well as to guarantee secure storage of and access to data. The selection of the case study design has allowed for in-depth analyses of the strategy for managing and archiving data in the selected institution. The interpretation of data with reference to the previously formulated propositions have indicated that Taibah University follows a certain strategy for managing electronic documents, but they do not use a unique data management system. Furthermore, archiving is applied only to a limited number of documents and security of stored data is guaranteed according to the University’s policies.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"5 1","pages":"11-19"},"PeriodicalIF":0.0,"publicationDate":"2019-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82479801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Predictive Framework of Speed Camera Locations for Road Safety 道路安全测速摄像机位置预测框架
Pub Date : 2019-07-30 DOI: 10.5539/cis.v12n3p92
Asmae Rhanizar, Z. E. Akkaoui
Road traffic crashes are a public health issue due to their terrible impact on individuals, communities, and countries. Studies affirmed that vehicle speed is a major contributor to crash likelihood and severity. At the same time, they identified Automated Speed Enforcement (ASE) systems, namely speed cameras, as a highly effective measure to reduce excessive and inappropriate speed, and thus improving road safety. However, identifying optimum sites for fixed speed camera placement stays an open issue in the literature, although it is a key factor that guarantees the efficiency of such ASE systems. This paper describes a predictive framework of speed camera locations using a classification algorithm that can predict, for each section of a given road network, its pertinence as a speed camera location. First, we identify a set of features as predictors of the classification algorithm, that we have argued their goodness through correlation tests. Second, for training our algorithm, data from road controlled sections, corresponding to existing speed cameras, is exploited. Each section class reflects the contribution level of the ASE system (good, neutral, or bad) to road safety. Third, as a proofof-concept, the framework has been implemented and deployed on the Moroccan road network. The results showed that Random Forest classifier is the best performing model attaining an accuracy of 95% and a precision of 88%. Further, a tool was developed to visualize updated classification results on a Moroccan road network map to support authorities in their decision making process.
道路交通碰撞对个人、社区和国家造成严重影响,是一个公共卫生问题。研究证实,车速是影响撞车可能性和严重程度的主要因素。同时,他们认为自动速度执法系统,即速度摄影机,是一项非常有效的措施,可减少超速和不适当的速度,从而改善道路安全。然而,确定固定速度相机放置的最佳位置在文献中仍然是一个悬而未决的问题,尽管它是保证此类ASE系统效率的关键因素。本文描述了一个使用分类算法的测速摄像机位置预测框架,该算法可以预测给定路网的每一段作为测速摄像机位置的相关性。首先,我们确定了一组特征作为分类算法的预测因子,我们通过相关测试论证了它们的优劣。其次,为了训练我们的算法,我们利用了来自道路控制路段的数据,这些数据对应于现有的测速摄像头。每个路段等级反映了ASE系统对道路安全的贡献水平(好、中、坏)。第三,作为概念验证,该框架已在摩洛哥公路网中实施和部署。结果表明,随机森林分类器是表现最好的模型,准确率为95%,精密度为88%。此外,还开发了一种工具,将更新后的分类结果可视化地显示在摩洛哥路网地图上,以支持当局的决策过程。
{"title":"A Predictive Framework of Speed Camera Locations for Road Safety","authors":"Asmae Rhanizar, Z. E. Akkaoui","doi":"10.5539/cis.v12n3p92","DOIUrl":"https://doi.org/10.5539/cis.v12n3p92","url":null,"abstract":"Road traffic crashes are a public health issue due to their terrible impact on individuals, communities, and countries. Studies affirmed that vehicle speed is a major contributor to crash likelihood and severity. At the same time, they identified Automated Speed Enforcement (ASE) systems, namely speed cameras, as a highly effective measure to reduce excessive and inappropriate speed, and thus improving road safety. However, identifying optimum sites for fixed speed camera placement stays an open issue in the literature, although it is a key factor that guarantees the efficiency of such ASE systems. This paper describes a predictive framework of speed camera locations using a classification algorithm that can predict, for each section of a given road network, its pertinence as a speed camera location. First, we identify a set of features as predictors of the classification algorithm, that we have argued their goodness through correlation tests. Second, for training our algorithm, data from road controlled sections, corresponding to existing speed cameras, is exploited. Each section class reflects the contribution level of the ASE system (good, neutral, or bad) to road safety. Third, as a proofof-concept, the framework has been implemented and deployed on the Moroccan road network. The results showed that Random Forest classifier is the best performing model attaining an accuracy of 95% and a precision of 88%. Further, a tool was developed to visualize updated classification results on a Moroccan road network map to support authorities in their decision making process.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"6 1","pages":"92-103"},"PeriodicalIF":0.0,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81999397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantum Computing in the Biomedical Sciences; A Brief Introduction into Concepts and Applications 量子计算在生物医学中的应用概念及应用简介
Pub Date : 2019-07-30 DOI: 10.5539/cis.v12n3p104
Casper van der Kerk, Attila Csala, A. Zwinderman
Quantum computing is a field that aims to exploit the principles of superposition and entanglement to perform computations. By using quantum bits (qubits) a quantum computer is able to perform certain tasks more efficiently when compared to classical computers. While applied quantum computing is still in its early stages, quantum algorithms on simulated quantum computers have already been applied to certain problems in epidemics modeling and image processing. Furthermore, companies like Google and IBM continue to develop new quantum computers with an increasing number of qubits. While much progress has been made in the recent years, the so called ”quantum supremacy”has not yet been achieved, and quantum computing appears to be still unsuitable for most applications in biomedical sciences.
量子计算是一个旨在利用叠加和纠缠原理来进行计算的领域。通过使用量子比特(量子位),量子计算机能够比经典计算机更有效地执行某些任务。虽然应用量子计算仍处于早期阶段,但模拟量子计算机上的量子算法已经应用于流行病建模和图像处理中的某些问题。此外,谷歌和IBM等公司继续开发具有越来越多量子比特的新型量子计算机。虽然近年来取得了很大进展,但所谓的“量子霸权”尚未实现,量子计算似乎仍然不适合生物医学科学的大多数应用。
{"title":"Quantum Computing in the Biomedical Sciences; A Brief Introduction into Concepts and Applications","authors":"Casper van der Kerk, Attila Csala, A. Zwinderman","doi":"10.5539/cis.v12n3p104","DOIUrl":"https://doi.org/10.5539/cis.v12n3p104","url":null,"abstract":"Quantum computing is a field that aims to exploit the principles of superposition and entanglement to perform computations. By using quantum bits (qubits) a quantum computer is able to perform certain tasks more efficiently when compared to classical computers. While applied quantum computing is still in its early stages, quantum algorithms on simulated quantum computers have already been applied to certain problems in epidemics modeling and image processing. Furthermore, companies like Google and IBM continue to develop new quantum computers with an increasing number of qubits. While much progress has been made in the recent years, the so called ”quantum supremacy”has not yet been achieved, and quantum computing appears to be still unsuitable for most applications in biomedical sciences.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"26 1","pages":"104-116"},"PeriodicalIF":0.0,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81472165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the Parallelization of the Edmonds-Karp Algorithm and Application Edmonds-Karp算法的并行化建模及其应用
Pub Date : 2019-07-25 DOI: 10.5539/cis.v12n3p81
A. Chaibou, Ousmane Moussa Tessa, Oumarou Sié
Many optimization problems can be reduced to the maximum flow problem in a network. However, the maximum flow problem is equivalent to the problem of the minimum cut, as shown by Fulkerson and Ford (Fulkerson & Ford, 1956). There are several algorithms of the graph’s cut, such as the Ford-Fulkerson algorithm (Ford & Fulkerson, 1962), the Edmonds-Karp algorithm (Edmonds & Karp, 1972) or the Goldberg-Tarjan algorithm (Goldberg & Tarjan, 1988). In this paper, we study the parallel computation of the Edmonds-Karp algorithm which is an optimized version of the Ford-Fulkerson algorithm. Indeed, this algorithm, when executed on large graphs, can be extremely slow, with a complexity of the order of O|V|.|E|2 (where |V| designates the number of vertices and |E| designates the number of the edges of the graph). So why we are studying its implementation on inexpensive parallel platforms such as OpenMp and GP-GPU. Our work also highlights the limits for parallel computing on this algorithm.
许多优化问题可以简化为网络中的最大流问题。然而,最大流量问题相当于最小切割问题,Fulkerson和Ford (Fulkerson & Ford, 1956)指出。图的切割有几种算法,如Ford-Fulkerson算法(Ford & Fulkerson, 1962), Edmonds-Karp算法(Edmonds & Karp, 1972)或Goldberg-Tarjan算法(Goldberg & Tarjan, 1988)。本文研究了Ford-Fulkerson算法的优化版Edmonds-Karp算法的并行计算。实际上,当在大型图上执行时,该算法可能非常慢,复杂度为O|V|。|E|2(其中|V|表示顶点数,|E|表示图边数)。因此,我们为什么要研究它在OpenMp和GP-GPU等廉价并行平台上的实现。我们的工作也强调了该算法并行计算的局限性。
{"title":"Modeling the Parallelization of the Edmonds-Karp Algorithm and Application","authors":"A. Chaibou, Ousmane Moussa Tessa, Oumarou Sié","doi":"10.5539/cis.v12n3p81","DOIUrl":"https://doi.org/10.5539/cis.v12n3p81","url":null,"abstract":"Many optimization problems can be reduced to the maximum flow problem in a network. However, the maximum flow problem is equivalent to the problem of the minimum cut, as shown by Fulkerson and Ford (Fulkerson & Ford, 1956). There are several algorithms of the graph’s cut, such as the Ford-Fulkerson algorithm (Ford & Fulkerson, 1962), the Edmonds-Karp algorithm (Edmonds & Karp, 1972) or the Goldberg-Tarjan algorithm (Goldberg & Tarjan, 1988). In this paper, we study the parallel computation of the Edmonds-Karp algorithm which is an optimized version of the Ford-Fulkerson algorithm. Indeed, this algorithm, when executed on large graphs, can be extremely slow, with a complexity of the order of O|V|.|E|2 (where |V| designates the number of vertices and |E| designates the number of the edges of the graph). So why we are studying its implementation on inexpensive parallel platforms such as OpenMp and GP-GPU. Our work also highlights the limits for parallel computing on this algorithm.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"34 1","pages":"81-91"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77028209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Nozzle Temperature Control Method for Robot FDM Printing System 机器人FDM打印系统喷嘴温度的实用控制方法
Pub Date : 2019-07-25 DOI: 10.5539/cis.v12n3p21
Yijian Liu, Ming Chen, Jihong Chen
Fused Deposition Modeling (FDM) technology in 3D printing has beendeveloped for many years. In this paper, a robot FDM 3D printingsystem is proposed and the nozzle temperature control issue isfocused primarily. The temperature measurement adopts a data driven modeling method andthe parameters of the measurement model are trained by the particle swarm optimization algorithm. A practical temperature control method is presented in which thetemperature control of nozzle is divided into two periods. Duringthe temperature flying period, the heating voltage is givenaccording to the current temperature value and its varying trend. In thefalling time of nozzle temperature, the corresponding controlvoltage value is provided correspondingly. Based on this practical control strategy, a partdesigned with Solidworks software is printed using the robot FDM printing system which validates theeffectiveness of the practical temperature control method.
3D打印中的熔融沉积建模(FDM)技术已经发展了很多年。本文提出了一种机器人FDM 3D打印系统,重点研究了喷嘴温度控制问题。温度测量采用数据驱动建模方法,测量模型参数采用粒子群优化算法进行训练。提出了一种实用的温度控制方法,该方法将喷嘴温度控制分为两个阶段。在温度飞行期间,根据当前温度值及其变化趋势给出加热电压。在喷嘴温度下降的时间内,提供相应的控制电压值。基于该实用控制策略,利用Solidworks软件设计了一个零件,并利用机器人FDM打印系统进行了打印,验证了实用温度控制方法的有效性。
{"title":"Practical Nozzle Temperature Control Method for Robot FDM Printing System","authors":"Yijian Liu, Ming Chen, Jihong Chen","doi":"10.5539/cis.v12n3p21","DOIUrl":"https://doi.org/10.5539/cis.v12n3p21","url":null,"abstract":"Fused Deposition Modeling (FDM) technology in 3D printing has beendeveloped for many years. In this paper, a robot FDM 3D printingsystem is proposed and the nozzle temperature control issue isfocused primarily. The temperature measurement adopts a data driven modeling method andthe parameters of the measurement model are trained by the particle swarm optimization algorithm. A practical temperature control method is presented in which thetemperature control of nozzle is divided into two periods. Duringthe temperature flying period, the heating voltage is givenaccording to the current temperature value and its varying trend. In thefalling time of nozzle temperature, the corresponding controlvoltage value is provided correspondingly. Based on this practical control strategy, a partdesigned with Solidworks software is printed using the robot FDM printing system which validates theeffectiveness of the practical temperature control method.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"101 1","pages":"21-26"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74442080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise Cybersecurity: Investigating and Detecting Ransomware Infections Using Digital Forensic Techniques 企业网络安全:使用数字取证技术调查和检测勒索软件感染
Pub Date : 2019-07-25 DOI: 10.5539/cis.v12n3p72
Jason Earl Thomas, Ryan P. Galligher, M. L. Thomas, Gordon C. Galligher
As the world continues to grow and embrace technology ransomware is growing problem. When ransomware encrypts storage sytems, systems shutdown, productivity grinds to a halt, and serious long-term damage takes place. As this is a known problem many firms have developed functionality to address ransomware issues in key security technologies such as intrusion protection systems. Many firms, especially smaller ones, may not have access to these technologies or perhaps the integration of these technologies might not yet be possible due ot varying circumstances. Regardless, ransomware must still be addressed as cyber miscreants actually target weak and unprotected environment. Even without tools that automate and aggregrate security capability, systems administrators can use systems utilities, applications, and digital forensic techniques to detect ransomware and defend their environemnts. This paper explores the literature regarding ransomware attacks, discusses current issues on how ransomware might be addressed, and presents recommendations to detect and investigate ransomware infection.
随着世界不断发展和拥抱技术,勒索软件的问题日益严重。当勒索软件加密存储系统时,系统会关闭,生产力会停滞不前,并且会发生严重的长期损害。由于这是一个已知的问题,许多公司已经开发了功能来解决勒索软件问题的关键安全技术,如入侵保护系统。许多公司,特别是较小的公司,可能无法获得这些技术,或者由于各种情况,这些技术的整合可能还不可能。无论如何,勒索软件仍然必须解决,因为网络罪犯实际上是针对脆弱和不受保护的环境。即使没有自动化和集成安全功能的工具,系统管理员也可以使用系统实用程序、应用程序和数字取证技术来检测勒索软件并保护他们的环境。本文探讨了有关勒索软件攻击的文献,讨论了如何解决勒索软件的当前问题,并提出了检测和调查勒索软件感染的建议。
{"title":"Enterprise Cybersecurity: Investigating and Detecting Ransomware Infections Using Digital Forensic Techniques","authors":"Jason Earl Thomas, Ryan P. Galligher, M. L. Thomas, Gordon C. Galligher","doi":"10.5539/cis.v12n3p72","DOIUrl":"https://doi.org/10.5539/cis.v12n3p72","url":null,"abstract":"As the world continues to grow and embrace technology ransomware is growing problem. When ransomware encrypts storage sytems, systems shutdown, productivity grinds to a halt, and serious long-term damage takes place. As this is a known problem many firms have developed functionality to address ransomware issues in key security technologies such as intrusion protection systems. Many firms, especially smaller ones, may not have access to these technologies or perhaps the integration of these technologies might not yet be possible due ot varying circumstances. Regardless, ransomware must still be addressed as cyber miscreants actually target weak and unprotected environment. Even without tools that automate and aggregrate security capability, systems administrators can use systems utilities, applications, and digital forensic techniques to detect ransomware and defend their environemnts. This paper explores the literature regarding ransomware attacks, discusses current issues on how ransomware might be addressed, and presents recommendations to detect and investigate ransomware infection.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"66 1","pages":"72-80"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84038168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
J. Chem. Inf. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1