首页 > 最新文献

Computer Networks & Communications最新文献

英文 中文
Development of a Monitoring System for the Management of Medical Devices 医疗器械管理监控系统的开发
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130407
Kazuto Kakutani, Nobuhiro Ito, Kosuke Shima, Shintaro Oyama, T. Otsuka
In recent years, according to the sophistication of Medical Devices (MD), many portable MDs have been used and maintained with central management. However, the central management lends hospital staff the MDs only with managing by a ledger, therefore, missing or subletting may be caused. Furthermore, while the demand for the MDs is increasing due to the COVID-19, there is an issue that it is difficult to operate due to the shortage of clinical engineers against management duties of the MDs. In this study, we develop a power strip device which can measure electricity usage of plugged MD and its position and propose a visualization system for position and operation ratio of the MDs. We implemented 75 developed devices in three hospitals and confirmed that the system was effective to evaluate whether the number of the MDs owned by the hospital is appropriate.
近年来,随着医疗器械(MD)的日益复杂化,许多便携式医疗器械都采用集中管理的方式进行使用和维护。然而,中央管理部门只向医院员工出借MDs,并进行分类管理,因此可能会造成丢失或转租。此外,由于新冠疫情,对医学博士的需求正在增加,但与医学博士的管理职责相比,由于缺乏临床工学技士,存在运营困难的问题。在本研究中,我们开发了一种可以测量插入的MD及其位置的电量的电源排装置,并提出了一个MD位置和操作比的可视化系统。我们在三家医院实施了75台已开发的设备,并确认该系统能够有效评估医院拥有的md数量是否合适。
{"title":"Development of a Monitoring System for the Management of Medical Devices","authors":"Kazuto Kakutani, Nobuhiro Ito, Kosuke Shima, Shintaro Oyama, T. Otsuka","doi":"10.5121/csit.2023.130407","DOIUrl":"https://doi.org/10.5121/csit.2023.130407","url":null,"abstract":"In recent years, according to the sophistication of Medical Devices (MD), many portable MDs have been used and maintained with central management. However, the central management lends hospital staff the MDs only with managing by a ledger, therefore, missing or subletting may be caused. Furthermore, while the demand for the MDs is increasing due to the COVID-19, there is an issue that it is difficult to operate due to the shortage of clinical engineers against management duties of the MDs. In this study, we develop a power strip device which can measure electricity usage of plugged MD and its position and propose a visualization system for position and operation ratio of the MDs. We implemented 75 developed devices in three hospitals and confirmed that the system was effective to evaluate whether the number of the MDs owned by the hospital is appropriate.","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115237345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LEON: Light Weight Edge Detection Network 轻量级边缘检测网络
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130402
N. Akbari, A. Baniasadi
Deep Convolutional Neural Networks (CNNs) have achieved human-level performance in edge detection. However, there have not been enough studies on how to efficiently utilize the parameters of the neural network in edge detection applications. Therefore, the associated memory and energy costs remain high. In this paper, inspired by Depthwise Separable Convolutions and deformable convolutional networks (Deformable-ConvNet), we aim to address current inefficiencies in edge detection applications. To this end, we propose a new architecture, which we refer to as Lightweight Edge Detection Network (LEON ). The proposed approach is designed to integrate the advantages of the deformable unit and DepthWise Separable convolutions architecture to create a lightweight backbone employed for efficient feature extraction. As we show, we achieve state-of-the-art accuracy while significantly reducing the complexity by carefully choosing proper components for edge detection purposes. Our results on BSDS500 and NYUDv2 demonstrate that LEON outperforms the current lightweight edge detectors while requiring only 500k parameters. It is worth mentioning that we train the network from scratch without using pre- trained weights.
深度卷积神经网络(cnn)在边缘检测方面已经达到了人类的水平。然而,如何在边缘检测应用中有效地利用神经网络的参数,目前还没有足够的研究。因此,相关的内存和能源成本仍然很高。在本文中,受深度可分离卷积和可变形卷积网络(deformable - convnet)的启发,我们的目标是解决当前边缘检测应用中的低效率问题。为此,我们提出了一种新的架构,我们称之为轻量级边缘检测网络(LEON)。该方法结合了可变形单元和深度可分离卷积结构的优点,创建了一个轻量级的骨干结构,用于高效的特征提取。正如我们所展示的,我们实现了最先进的精度,同时通过仔细选择适合边缘检测目的的组件显著降低了复杂性。我们在BSDS500和NYUDv2上的结果表明,LEON在只需要500k个参数的情况下优于当前的轻量级边缘检测器。值得一提的是,我们在没有使用预训练权值的情况下从头开始训练网络。
{"title":"LEON: Light Weight Edge Detection Network","authors":"N. Akbari, A. Baniasadi","doi":"10.5121/csit.2023.130402","DOIUrl":"https://doi.org/10.5121/csit.2023.130402","url":null,"abstract":"Deep Convolutional Neural Networks (CNNs) have achieved human-level performance in edge detection. However, there have not been enough studies on how to efficiently utilize the parameters of the neural network in edge detection applications. Therefore, the associated memory and energy costs remain high. In this paper, inspired by Depthwise Separable Convolutions and deformable convolutional networks (Deformable-ConvNet), we aim to address current inefficiencies in edge detection applications. To this end, we propose a new architecture, which we refer to as Lightweight Edge Detection Network (LEON ). The proposed approach is designed to integrate the advantages of the deformable unit and DepthWise Separable convolutions architecture to create a lightweight backbone employed for efficient feature extraction. As we show, we achieve state-of-the-art accuracy while significantly reducing the complexity by carefully choosing proper components for edge detection purposes. Our results on BSDS500 and NYUDv2 demonstrate that LEON outperforms the current lightweight edge detectors while requiring only 500k parameters. It is worth mentioning that we train the network from scratch without using pre- trained weights.","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125993426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Desktop Application to Help Speakers Switch Slides by using AI and Voice Recognition 通过使用人工智能和语音识别来帮助演讲者切换幻灯片的桌面应用程序
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130412
Yixin Liang, Marisabel Chang
Presentation is a skill that everyone has, and it is very commonly seen in companies, schools, conferences, etc [1]. And the purpose of a slide is to give the audience a better understanding of the topic and to add ideas that they forgot to mention [2]. It also adds visual support to the speaker's discussion. Usually the presenter held a slide remote or just used their computer to control the slide pace while presenting. However, the slide remote can often be unstable due to battery switching. Even those who do not have a slide remote are unable to ensure a smooth presentation because they need to constantly switch back and forth on the computer screen with the mouse, which not only makes the speaker more nervous but also likely to skip the slide. Slidecontroller uses existing AI technology, voice recognition, as a medium to allow users to enter the transition word used to switch slides [3]. For example, when the user enters "Now I am going to talk about'' when this word is spoken the Slidecontroller will receive the voice and match the speaker's turn to the next slide. The user can be creative with the keyword selection that best fits their presentation vibe. Or the user could use the Slidecontroller default option which controls the slide by simply saying “Next” to go to the next slide, “Previous” to go to the previous slide, and “Thank you” to stop the App to prevent from catching a similar keyword that accidentally switches the slide [4].
演讲是每个人都具备的技能,在公司、学校、会议等场合都很常见[1]。幻灯片的目的是让观众更好地理解主题,并添加他们忘记提及的想法[2]。它还为演讲者的讨论增加了视觉支持。通常,演示者在演示时手持幻灯片遥控器或仅使用计算机来控制幻灯片的速度。然而,由于电池切换,滑动遥控器经常会不稳定。即使没有幻灯片遥控器的人也无法保证演讲的顺利进行,因为他们需要不断地用鼠标在电脑屏幕上来回切换,这不仅使演讲者更加紧张,而且有可能跳过幻灯片。Slidecontroller采用现有的AI技术——语音识别作为媒介,允许用户输入用于切换幻灯片的过渡词[3]。例如,当用户输入“现在我要谈论”当这个词被说出时,Slidecontroller将接收声音并将演讲者的回合与下一张幻灯片相匹配。用户可以创造性地选择最适合他们演示氛围的关键字。或者用户可以使用Slidecontroller的默认选项,通过简单地说“Next”到下一张幻灯片,“Previous”到上一张幻灯片,“Thank you”来停止应用程序,以防止捕捉到类似的关键字意外切换幻灯片[4]。
{"title":"A Desktop Application to Help Speakers Switch Slides by using AI and Voice Recognition","authors":"Yixin Liang, Marisabel Chang","doi":"10.5121/csit.2023.130412","DOIUrl":"https://doi.org/10.5121/csit.2023.130412","url":null,"abstract":"Presentation is a skill that everyone has, and it is very commonly seen in companies, schools, conferences, etc [1]. And the purpose of a slide is to give the audience a better understanding of the topic and to add ideas that they forgot to mention [2]. It also adds visual support to the speaker's discussion. Usually the presenter held a slide remote or just used their computer to control the slide pace while presenting. However, the slide remote can often be unstable due to battery switching. Even those who do not have a slide remote are unable to ensure a smooth presentation because they need to constantly switch back and forth on the computer screen with the mouse, which not only makes the speaker more nervous but also likely to skip the slide. Slidecontroller uses existing AI technology, voice recognition, as a medium to allow users to enter the transition word used to switch slides [3]. For example, when the user enters \"Now I am going to talk about'' when this word is spoken the Slidecontroller will receive the voice and match the speaker's turn to the next slide. The user can be creative with the keyword selection that best fits their presentation vibe. Or the user could use the Slidecontroller default option which controls the slide by simply saying “Next” to go to the next slide, “Previous” to go to the previous slide, and “Thank you” to stop the App to prevent from catching a similar keyword that accidentally switches the slide [4].","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning/Deep Learning Hybrid for Augmenting Teacher-LED Online Dance Education 机器学习/深度学习的混合,以增强教师主导的在线舞蹈教育
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130403
Catherine Hung
For online dancers, learning a dance move properly without the feedback of a live instructor can be challenging because it is difficult to determine whether a move is done correctly. The lack of proper guidance can result in doing a move incorrectly, causing injury. In this work – we explore the use of a hybrid Deep Learning/Machine Learning approach to classify dance moves as structurally correct or incorrect. Given a video clip of the dancer doing a move, such as the grand plie, the algorithm should detect the correctness of the movement. To capture the overall movement, we proposed various methods to process data, starting with deep learning techniques to convert video frames into landmarks. Next, we investigate several approaches to combining landmarks from multiple frames and training machine learning algorithms on the dataset. The distinction between correct and incorrect grand plies achieved accuracies of over 98%.
对于在线舞者来说,如果没有现场教练的反馈,正确地学习一个舞蹈动作可能是具有挑战性的,因为很难确定一个动作是否正确完成。缺乏适当的指导会导致动作不正确,造成伤害。在这项工作中,我们探索了使用混合深度学习/机器学习方法来将舞蹈动作分类为结构正确或不正确。给定舞者做动作的视频片段,比如大俯卧撑,算法应该检测动作的正确性。为了捕捉整体运动,我们提出了各种处理数据的方法,从深度学习技术开始,将视频帧转换为地标。接下来,我们研究了几种结合多帧标记和在数据集上训练机器学习算法的方法。正确和不正确的大策略之间的区别达到了98%以上的准确率。
{"title":"A Machine Learning/Deep Learning Hybrid for Augmenting Teacher-LED Online Dance Education","authors":"Catherine Hung","doi":"10.5121/csit.2023.130403","DOIUrl":"https://doi.org/10.5121/csit.2023.130403","url":null,"abstract":"For online dancers, learning a dance move properly without the feedback of a live instructor can be challenging because it is difficult to determine whether a move is done correctly. The lack of proper guidance can result in doing a move incorrectly, causing injury. In this work – we explore the use of a hybrid Deep Learning/Machine Learning approach to classify dance moves as structurally correct or incorrect. Given a video clip of the dancer doing a move, such as the grand plie, the algorithm should detect the correctness of the movement. To capture the overall movement, we proposed various methods to process data, starting with deep learning techniques to convert video frames into landmarks. Next, we investigate several approaches to combining landmarks from multiple frames and training machine learning algorithms on the dataset. The distinction between correct and incorrect grand plies achieved accuracies of over 98%.","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lexical Features of Medicine Product Warnings in the Philippines 菲律宾药品警示的词汇特征
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130411
Shielanie Soriano Dacumos
Over the stretch of years, the Philippines has been facing numerous medical problems since the public outcry against a ‘dengue’ vaccine. As a result, parents refused their children from having an anti-measles vaccine which created a medical outbreak in the country. Product warnings are found to be in their optimal position in safeguarding the life of consumerpatients. This paper anatomizes the lexical features of medicine product warnings in the Philippines which are crucial in the response discourses. A range of linguistic frameworks were applied and significant findings were drawn. Lapses on the use of noun abstractness, synthetic personalization, field continuum, adjectives, and adverbs were identified. Such an investigation brought up the transparency of communicative features of medicine safety texts. In the end, linguistic components create a vital impact on the legal content adequacy of medicine product warnings, unfolding the vitalities of these messages in facilitating informed decisionmaking among consumer-patients.
多年来,自从公众强烈反对“登革热”疫苗以来,菲律宾一直面临着许多医疗问题。结果,父母拒绝让他们的孩子接种抗麻疹疫苗,这在该国造成了一场医疗爆发。发现产品警告在保护消费者患者生命方面处于最佳位置。本文剖析了菲律宾药品警示语的词汇特征,这些特征在应答语篇中起着至关重要的作用。应用了一系列的语言框架,并得出了重要的发现。在名词抽象性、综合个性化、领域连续体、形容词和副词的使用上存在失误。这一调查提出了药品安全文本传播特征的透明性。最后,语言成分对药品警告的法律内容充分性产生了至关重要的影响,揭示了这些信息在促进消费者-患者知情决策中的活力。
{"title":"Lexical Features of Medicine Product Warnings in the Philippines","authors":"Shielanie Soriano Dacumos","doi":"10.5121/csit.2023.130411","DOIUrl":"https://doi.org/10.5121/csit.2023.130411","url":null,"abstract":"Over the stretch of years, the Philippines has been facing numerous medical problems since the public outcry against a ‘dengue’ vaccine. As a result, parents refused their children from having an anti-measles vaccine which created a medical outbreak in the country. Product warnings are found to be in their optimal position in safeguarding the life of consumerpatients. This paper anatomizes the lexical features of medicine product warnings in the Philippines which are crucial in the response discourses. A range of linguistic frameworks were applied and significant findings were drawn. Lapses on the use of noun abstractness, synthetic personalization, field continuum, adjectives, and adverbs were identified. Such an investigation brought up the transparency of communicative features of medicine safety texts. In the end, linguistic components create a vital impact on the legal content adequacy of medicine product warnings, unfolding the vitalities of these messages in facilitating informed decisionmaking among consumer-patients.","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122509223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eye-tracking in Association with Phishing Cyber Attacks: a Comprehensive Literature Review 眼动追踪与网络钓鱼攻击:综合文献综述
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130406
Noon Hussein
As of 2021, it has been reported that around 90% of data breaches occur on ac- count of phishing, while about 83% of organizations experienced phishing attacks [1]. Phishing can be defined as the cybercrime in which a target is contacted through e-mail, telephone or text message by someone impersonating a legitimate institution [2]. Through psychological manipulation, the threat actor attempts to deceive users into providing sensitive information, thereby causing financial and intellectual property losses, reputational damages, and operational activity disruption. In this light, this paper presents a comprehensive review of eyetracking in association with phishing cyberattacks. To determine their impact on phishing detection accuracy, this work reviews 20 empirical studies which measure eye-tracking metrics with respect to different Areas of Interest (AOIs). The described experiments aim to produce simple cognitive user reactions, examine concentration, perception and trust in the system; all in which determine the level of susceptibility to deception and manipulation. Results suggest that longer gaze durations on AOIs, characterized by higher attention control, are strongly correlated with detection accuracy. Eye-tracking behavior also shows that technical background, domain knowledge, experience, training, and risk perception con- tribute to mitigating these attacks. Meanwhile, Time to First Fixation (TTFF), entry time and entry sequence data yielded inconclusive results regarding the impact on susceptibility to phishing attacks. The results aid in designing user-friendly URLs, visual browsing aids, and embedded and automated authentication systems. Most importantly, these findings can be used to establish user awareness through the development of training programs. be used to establish user awareness through the development of training programs.
据报道,截至2021年,约90%的数据泄露发生在网络钓鱼中,而约83%的组织遭受过网络钓鱼攻击[1]。网络钓鱼可以定义为由冒充合法机构的人通过电子邮件、电话或短信联系目标的网络犯罪[2]。通过心理操纵,威胁参与者试图欺骗用户提供敏感信息,从而造成财务和知识产权损失、声誉损害和操作活动中断。鉴于此,本文对与网络钓鱼攻击相关的眼球追踪进行了全面的回顾。为了确定它们对网络钓鱼检测准确性的影响,本工作回顾了20项针对不同兴趣领域(aoi)测量眼球追踪指标的实证研究。所描述的实验旨在产生简单的认知用户反应,检查系统中的注意力,感知和信任;所有这些都决定了对欺骗和操纵的敏感程度。结果表明,注视aoi的时间越长,注意控制能力越强,与检测精度密切相关。眼动追踪行为还表明,技术背景、领域知识、经验、培训和风险感知有助于减轻这些攻击。与此同时,首次固定时间(Time to First Fixation, TTFF)、进入时间和进入顺序数据对网络钓鱼攻击易感性的影响尚无定论。其结果有助于设计用户友好的url、可视化浏览辅助工具以及嵌入式和自动化身份验证系统。最重要的是,这些发现可以用来通过开发培训计划来建立用户意识。通过开发培训计划来建立用户意识。
{"title":"Eye-tracking in Association with Phishing Cyber Attacks: a Comprehensive Literature Review","authors":"Noon Hussein","doi":"10.5121/csit.2023.130406","DOIUrl":"https://doi.org/10.5121/csit.2023.130406","url":null,"abstract":"As of 2021, it has been reported that around 90% of data breaches occur on ac- count of phishing, while about 83% of organizations experienced phishing attacks [1]. Phishing can be defined as the cybercrime in which a target is contacted through e-mail, telephone or text message by someone impersonating a legitimate institution [2]. Through psychological manipulation, the threat actor attempts to deceive users into providing sensitive information, thereby causing financial and intellectual property losses, reputational damages, and operational activity disruption. In this light, this paper presents a comprehensive review of eyetracking in association with phishing cyberattacks. To determine their impact on phishing detection accuracy, this work reviews 20 empirical studies which measure eye-tracking metrics with respect to different Areas of Interest (AOIs). The described experiments aim to produce simple cognitive user reactions, examine concentration, perception and trust in the system; all in which determine the level of susceptibility to deception and manipulation. Results suggest that longer gaze durations on AOIs, characterized by higher attention control, are strongly correlated with detection accuracy. Eye-tracking behavior also shows that technical background, domain knowledge, experience, training, and risk perception con- tribute to mitigating these attacks. Meanwhile, Time to First Fixation (TTFF), entry time and entry sequence data yielded inconclusive results regarding the impact on susceptibility to phishing attacks. The results aid in designing user-friendly URLs, visual browsing aids, and embedded and automated authentication systems. Most importantly, these findings can be used to establish user awareness through the development of training programs. be used to establish user awareness through the development of training programs.","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121643709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Smart Plantmoisture Level Determination System to Determine if the Plant Needs to be Watered or not by using Machine Learning 智能植物水分水平测定系统,通过机器学习来确定植物是否需要浇水
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130410
Ruohan Zhang, Yaotian Zhang, Yu Sun
{"title":"A Smart Plantmoisture Level Determination System to Determine if the Plant Needs to be Watered or not by using Machine Learning","authors":"Ruohan Zhang, Yaotian Zhang, Yu Sun","doi":"10.5121/csit.2023.130410","DOIUrl":"https://doi.org/10.5121/csit.2023.130410","url":null,"abstract":"","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring Performance of Web Protocol with Updated Transport Layer Techniques for Faster Web Browsing 使用更新的传输层技术测量Web协议的性能以实现更快的Web浏览
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130401
Ziaul Hossain, G. Fairhurst
Popular Internet applications such as web browsing, web video download or variable-rate voice suffer from standard Transport Control Protocol (TCP) behaviour because their transmission rate and pattern are different from conventional bulk transfer applications. Previous works have analysed the interaction of these applications with the congestion control algorithms in TCP and proposed Congestion Window Validation (CWV) as a solution. However, this method was incomplete and has been shown to present drawbacks. This paper focuses on the ‘newCWV’ which was proposed to address these drawbacks. newCWV depicts a practical mechanism to estimate the available path capacity and suggests a more appropriate congestion control behaviour. These new modifications benefit variable-rate applications that are bursty in nature, with shorter transfer durations. In this paper, this algorithm was implemented in the Linux TCP/IP stack and tested by experiments, where results indicate that, with newCWV, the browsing can get 50% faster in an uncongested network.
流行的Internet应用程序,如web浏览、web视频下载或可变速率语音,由于其传输速率和模式与传统的批量传输应用程序不同,因此受到标准传输控制协议(TCP)行为的影响。以前的工作已经分析了这些应用程序与TCP中的拥塞控制算法的交互,并提出了拥塞窗口验证(CWV)作为解决方案。然而,这种方法是不完整的,并且已经显示出缺点。本文的重点是“新cwv”,它是为了解决这些缺点而提出的。newCWV描述了一种实用的机制来估计可用的路径容量,并提出了更合适的拥塞控制行为。这些新的修改有利于具有较短传输持续时间的突发性质的可变速率应用程序。本文在Linux TCP/IP协议栈上实现了该算法,并通过实验进行了测试,结果表明,在非拥塞网络中,使用newCWV可以使浏览速度提高50%。
{"title":"Measuring Performance of Web Protocol with Updated Transport Layer Techniques for Faster Web Browsing","authors":"Ziaul Hossain, G. Fairhurst","doi":"10.5121/csit.2023.130401","DOIUrl":"https://doi.org/10.5121/csit.2023.130401","url":null,"abstract":"Popular Internet applications such as web browsing, web video download or variable-rate voice suffer from standard Transport Control Protocol (TCP) behaviour because their transmission rate and pattern are different from conventional bulk transfer applications. Previous works have analysed the interaction of these applications with the congestion control algorithms in TCP and proposed Congestion Window Validation (CWV) as a solution. However, this method was incomplete and has been shown to present drawbacks. This paper focuses on the ‘newCWV’ which was proposed to address these drawbacks. newCWV depicts a practical mechanism to estimate the available path capacity and suggests a more appropriate congestion control behaviour. These new modifications benefit variable-rate applications that are bursty in nature, with shorter transfer durations. In this paper, this algorithm was implemented in the Linux TCP/IP stack and tested by experiments, where results indicate that, with newCWV, the browsing can get 50% faster in an uncongested network.","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125979578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Belief Revision Mechanism with Trust Reasoning based on Extended Reciprocal Logic for Multi-Agent Systems 基于扩展互反逻辑的多智能体系统信任推理信念修正机制
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130413
S. Basit, Y. Goto
When an agent receives messages from other agents, it does belief revision. A belief revision includes, i) a trust reasoning process, i.e., it obtains new belief related to the messages, and deduces implicitly unknown beliefs from the obtained belief; ii) in the case of contradiction in the belief set, it resolves the contradiction. So, trust reasoning, and belief revision must be included in the decision-making process of an intelligent agent in multi-agent systems. Although a belief revision mechanism with trust reasoning is demanded to construct multi-agent systems, there is no such belief revision mechanism. We, therefore, present a belief revision mechanism with trust reasoning based on extended reciprocal logic for multi-agent systems.
当一个agent接收到来自其他agent的信息时,它会进行信念修正。信念修正包括:1)信任推理过程,即获取与信息相关的新信念,并从获得的信念中隐含地推断出未知的信念;Ii)在信念集存在矛盾的情况下,解决矛盾。因此,在多智能体系统中,智能体的决策过程必须包含信任推理和信念修正。虽然构建多智能体系统需要一种基于信任推理的信念修正机制,但目前还没有这种信念修正机制。因此,我们提出了一种基于扩展互反逻辑的多智能体系统信任推理的信念修正机制。
{"title":"A Belief Revision Mechanism with Trust Reasoning based on Extended Reciprocal Logic for Multi-Agent Systems","authors":"S. Basit, Y. Goto","doi":"10.5121/csit.2023.130413","DOIUrl":"https://doi.org/10.5121/csit.2023.130413","url":null,"abstract":"When an agent receives messages from other agents, it does belief revision. A belief revision includes, i) a trust reasoning process, i.e., it obtains new belief related to the messages, and deduces implicitly unknown beliefs from the obtained belief; ii) in the case of contradiction in the belief set, it resolves the contradiction. So, trust reasoning, and belief revision must be included in the decision-making process of an intelligent agent in multi-agent systems. Although a belief revision mechanism with trust reasoning is demanded to construct multi-agent systems, there is no such belief revision mechanism. We, therefore, present a belief revision mechanism with trust reasoning based on extended reciprocal logic for multi-agent systems.","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130810773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Chatbot for Sentiment Analysis of Covid-19 Tweets 用于Covid-19推文情感分析的机器学习聊天机器人
Pub Date : 2023-02-25 DOI: 10.5121/csit.2023.130404
Suha Khalil Assayed, K. Shaalan, M. Alkhatib, Safwan Maghaydah
The various types of social media were increased rapidly, as people’s need to share knowledge between others. In fact, there are various types of social media apps and platforms such as Facebook, Twitter, Reddit, Instagram, and others. Twitter remains one of the most popular social application that people use for sharing their emotional states. However, this has increased particularly during the COVID-19 pandemic. In this paper, we proposed a chatbot for evaluating the sentiment analysis by using machine learning algorithms. The authors used a dataset of tweets from Kaggle’s website, and that includes 41157 tweets that are related to the COVID-19. These tweets were classified and labelled to four categories: Extremely positive, positive, neutral, negative, and extremely negative. In this study, we applied Machine Learning algorithms, Support Vector Machines (SVM), and the Naïve Bayes (NB) algorithms and accordingly, we compared the accuracy between them. In addition to that, the classifiers were evaluated and compared after changing the test split ratio. The result shows that the accuracy performance of SVM algorithm is better than Naïve Bayes algorithm, even though Naïve Bayes perform poorly with low accuracy, but it trained the data faster comparing to SVM.
由于人们需要与他人分享知识,各种类型的社交媒体迅速增加。事实上,有各种各样的社交媒体应用程序和平台,如Facebook、Twitter、Reddit、Instagram等。Twitter仍然是人们用来分享情绪状态的最受欢迎的社交应用之一。然而,特别是在2019冠状病毒病大流行期间,这种情况有所增加。在本文中,我们提出了一个使用机器学习算法来评估情感分析的聊天机器人。作者使用了Kaggle网站上的推文数据集,其中包括与COVID-19相关的41157条推文。这些推文被分类并标记为四类:极端积极、积极、中性、消极和极端消极。在本研究中,我们应用了机器学习算法、支持向量机(SVM)和Naïve贝叶斯(NB)算法,并比较了它们之间的准确率。除此之外,在改变测试分割比后对分类器进行评价和比较。结果表明,SVM算法的准确率性能优于Naïve贝叶斯算法,尽管Naïve贝叶斯算法的准确率较低,性能较差,但与SVM相比,SVM的训练速度更快。
{"title":"Machine Learning Chatbot for Sentiment Analysis of Covid-19 Tweets","authors":"Suha Khalil Assayed, K. Shaalan, M. Alkhatib, Safwan Maghaydah","doi":"10.5121/csit.2023.130404","DOIUrl":"https://doi.org/10.5121/csit.2023.130404","url":null,"abstract":"The various types of social media were increased rapidly, as people’s need to share knowledge between others. In fact, there are various types of social media apps and platforms such as Facebook, Twitter, Reddit, Instagram, and others. Twitter remains one of the most popular social application that people use for sharing their emotional states. However, this has increased particularly during the COVID-19 pandemic. In this paper, we proposed a chatbot for evaluating the sentiment analysis by using machine learning algorithms. The authors used a dataset of tweets from Kaggle’s website, and that includes 41157 tweets that are related to the COVID-19. These tweets were classified and labelled to four categories: Extremely positive, positive, neutral, negative, and extremely negative. In this study, we applied Machine Learning algorithms, Support Vector Machines (SVM), and the Naïve Bayes (NB) algorithms and accordingly, we compared the accuracy between them. In addition to that, the classifiers were evaluated and compared after changing the test split ratio. The result shows that the accuracy performance of SVM algorithm is better than Naïve Bayes algorithm, even though Naïve Bayes perform poorly with low accuracy, but it trained the data faster comparing to SVM.","PeriodicalId":159989,"journal":{"name":"Computer Networks & Communications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks & Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1