首页 > 最新文献

2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)最新文献

英文 中文
Research on L-MVC Framework L-MVC框架的研究
Xiaohong Li, Na Liu
Model–View–Controller pattern has been adopted as an architecture for World Wide Web applications in major programming languages. Though, many commercial and noncommercial web frameworks are very popular and applied widely, they are not particularly suitable for small applications. In this paper, the principle and basic components of MVC pattern are analyzed. Another new very Lightweight MVC framework was created, written by PHP and deployed on Linux, and then was applied to an online paper submission system as a demonstration which aims to improve the code re-usability and maintainability of small applications.
模型-视图-控制器模式已被主要编程语言采用为万维网应用程序的体系结构。尽管许多商业和非商业的web框架非常流行并得到广泛应用,但它们并不特别适合小型应用程序。本文分析了MVC模式的原理和基本组成。我们还创建了另一个非常轻量级的MVC框架,由PHP编写并部署在Linux上,然后将其应用到一个在线论文提交系统中作为演示,旨在提高小型应用程序的代码可重用性和可维护性。
{"title":"Research on L-MVC Framework","authors":"Xiaohong Li, Na Liu","doi":"10.1109/PDCAT.2016.043","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.043","url":null,"abstract":"Model–View–Controller pattern has been adopted as an architecture for World Wide Web applications in major programming languages. Though, many commercial and noncommercial web frameworks are very popular and applied widely, they are not particularly suitable for small applications. In this paper, the principle and basic components of MVC pattern are analyzed. Another new very Lightweight MVC framework was created, written by PHP and deployed on Linux, and then was applied to an online paper submission system as a demonstration which aims to improve the code re-usability and maintainability of small applications.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Accumulative Energy-Based Seam Carving for Image Resizing 基于累积能量的缝雕刻图像调整
Yuqing Lin, Yuzhen Niu, Jiawen Lin, Haifeng Zhang
With the diversified development of the digital devices, such as computer, mobile phone, pad and television, how to resize an image or video to adapt to different display screens has been attracting more and more peoples' attention. Seam carving has been an important method for image resizing. If multiple removed or inserted seams are located within a certain region, it can lead to discontinuity image content. Besides, the salient objects tend to be destroyed if the energy function only contains the gradient information. Therefore, we propose an accumulative energy-based seam carving method for image resizing. When removing a certain seam, we distribute the energy of each pixel on the seam to its adjacent 8-connected pixels in order to avoid the extreme concentration of seams, especially within a texture region. In addition, we add the image saliency and the edge information into the energy function to reduce the distortion. Since the computational complexity of seam carving method is very high, we use parallel computing environment to achieve efficient computation. Experimental results show that compared with the existing methods, our method can both avoid the discontinuity of image content and distortions as well as better maintain the shape of the salient objects.
随着电脑、手机、pad、电视等数字设备的多样化发展,如何调整图像或视频的大小以适应不同的显示屏幕已经引起了越来越多的人的关注。接缝雕刻一直是图像调整尺寸的重要方法。如果多个移除或插入的接缝位于某一区域内,则可能导致图像内容不连续。此外,如果能量函数只包含梯度信息,则显著目标容易被破坏。因此,我们提出了一种基于累积能量的缝雕刻图像调整方法。当移除某个接缝时,我们将接缝上的每个像素的能量分配到相邻的8连接像素上,以避免接缝的极端集中,特别是在纹理区域内。此外,我们在能量函数中加入图像显著性和边缘信息,以减少失真。由于切缝法的计算复杂度较高,采用并行计算环境实现高效计算。实验结果表明,与现有方法相比,我们的方法既能避免图像内容的不连续和失真,又能更好地保持显著目标的形状。
{"title":"Accumulative Energy-Based Seam Carving for Image Resizing","authors":"Yuqing Lin, Yuzhen Niu, Jiawen Lin, Haifeng Zhang","doi":"10.1109/PDCAT.2016.084","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.084","url":null,"abstract":"With the diversified development of the digital devices, such as computer, mobile phone, pad and television, how to resize an image or video to adapt to different display screens has been attracting more and more peoples' attention. Seam carving has been an important method for image resizing. If multiple removed or inserted seams are located within a certain region, it can lead to discontinuity image content. Besides, the salient objects tend to be destroyed if the energy function only contains the gradient information. Therefore, we propose an accumulative energy-based seam carving method for image resizing. When removing a certain seam, we distribute the energy of each pixel on the seam to its adjacent 8-connected pixels in order to avoid the extreme concentration of seams, especially within a texture region. In addition, we add the image saliency and the edge information into the energy function to reduce the distortion. Since the computational complexity of seam carving method is very high, we use parallel computing environment to achieve efficient computation. Experimental results show that compared with the existing methods, our method can both avoid the discontinuity of image content and distortions as well as better maintain the shape of the salient objects.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122516210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identify the Semantic Meaning of Service Rules with Natural Language Processing 用自然语言处理识别服务规则的语义
Xinfeng Ye
In cloud manufacturing, manufacturing resources are services that can be looked up and accessed over the Internet. Manufacturing ontologies are used to store the service information. Manufacturers use service rules to control the access to their resources. The rules are normally written in natural language. Thus, they need to be converted to semantic rules that can be understood by the search engine of the manufacturing ontologies. Our previous work investigated converting service rules to semantic rules automatically. However, the scheme is not flexible enough. This paper proposed an improvement to the scheme in our previous work. The proposed scheme allows a wider range of service rules to be converted to semantic rules accurately.
在云制造中,制造资源是可以通过互联网查找和访问的服务。制造本体用于存储服务信息。制造商使用服务规则来控制对其资源的访问。这些规则通常是用自然语言编写的。因此,需要将它们转换为制造本体的搜索引擎可以理解的语义规则。我们之前的工作研究了将服务规则自动转换为语义规则。然而,该方案不够灵活。本文对以往工作中的方案进行了改进。该方案允许将更大范围的服务规则准确地转换为语义规则。
{"title":"Identify the Semantic Meaning of Service Rules with Natural Language Processing","authors":"Xinfeng Ye","doi":"10.1109/PDCAT.2016.028","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.028","url":null,"abstract":"In cloud manufacturing, manufacturing resources are services that can be looked up and accessed over the Internet. Manufacturing ontologies are used to store the service information. Manufacturers use service rules to control the access to their resources. The rules are normally written in natural language. Thus, they need to be converted to semantic rules that can be understood by the search engine of the manufacturing ontologies. Our previous work investigated converting service rules to semantic rules automatically. However, the scheme is not flexible enough. This paper proposed an improvement to the scheme in our previous work. The proposed scheme allows a wider range of service rules to be converted to semantic rules accurately.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133624291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance and Portability Studies with OpenACC Accelerated Version of GTC-P 使用OpenACC加速版GTC-P进行性能和可移植性研究
Yueming Wei, Yichao Wang, Linjin Cai, W. Tang, Bei Wang, S. Ethier, S. See, James Lin
Accelerator-based heterogeneous computing is of paramount importance to High Performance Computing. The increasing complexity of the cluster architectures requires more generic, high-level programming models. OpenACC is a directive-based parallel programming model, which provides performance on and portability across a wide variety of platforms, including GPU, multicore CPU, and many-core processors. GTC-P is a discovery-science-capable real-world application code based on the Particle-In-Cell (PIC) algorithm that is well-established in the HPC area. Several native versions of GTC-P have been developed for supercomputers on TOP500 with different architectures, including Titan, Mira, etc. Motivated by the state-of-art portability, we implemented the first OpenACC version of GTC-P and evaluated its performance portability across NVIDIA GPUs, Intel x86 and OpenPOWER CPUs. In this paper, we also proposed two key optimization methods for OpenACC implementation of PIC algorithm on multicore CPU and GPU including removing atomic operation and taking advantage of shared memory. OpenACC shows both impressive productivity and performance in a perspective of portability and scalability. The OpenACC version achieves more than 90% performance compared with the native versions with only about 300 LOC.
基于加速器的异构计算对高性能计算至关重要。集群体系结构日益复杂,需要更通用的高级编程模型。OpenACC是一种基于指令的并行编程模型,它提供了各种平台上的性能和可移植性,包括GPU、多核CPU和多核处理器。GTC-P是一个基于粒子-细胞(PIC)算法的具有发现科学能力的现实世界应用程序代码,该算法在高性能计算领域得到了广泛应用。针对TOP500中不同架构的超级计算机,包括Titan、Mira等,已经开发了几个本地版本的GTC-P。在先进的可移植性的激励下,我们实现了GTC-P的第一个OpenACC版本,并评估了它在NVIDIA gpu、Intel x86和OpenPOWER cpu上的性能可移植性。本文还提出了OpenACC在多核CPU和GPU上实现PIC算法的两种关键优化方法,即去除原子操作和利用共享内存。从可移植性和可伸缩性的角度来看,OpenACC显示了令人印象深刻的生产力和性能。与本地版本相比,OpenACC版本实现了90%以上的性能,只有大约300 LOC。
{"title":"Performance and Portability Studies with OpenACC Accelerated Version of GTC-P","authors":"Yueming Wei, Yichao Wang, Linjin Cai, W. Tang, Bei Wang, S. Ethier, S. See, James Lin","doi":"10.1109/PDCAT.2016.019","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.019","url":null,"abstract":"Accelerator-based heterogeneous computing is of paramount importance to High Performance Computing. The increasing complexity of the cluster architectures requires more generic, high-level programming models. OpenACC is a directive-based parallel programming model, which provides performance on and portability across a wide variety of platforms, including GPU, multicore CPU, and many-core processors. GTC-P is a discovery-science-capable real-world application code based on the Particle-In-Cell (PIC) algorithm that is well-established in the HPC area. Several native versions of GTC-P have been developed for supercomputers on TOP500 with different architectures, including Titan, Mira, etc. Motivated by the state-of-art portability, we implemented the first OpenACC version of GTC-P and evaluated its performance portability across NVIDIA GPUs, Intel x86 and OpenPOWER CPUs. In this paper, we also proposed two key optimization methods for OpenACC implementation of PIC algorithm on multicore CPU and GPU including removing atomic operation and taking advantage of shared memory. OpenACC shows both impressive productivity and performance in a perspective of portability and scalability. The OpenACC version achieves more than 90% performance compared with the native versions with only about 300 LOC.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130327960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A User Behavior Anomaly Detection Approach Based on Sequence Mining over Data Streams 基于数据流序列挖掘的用户行为异常检测方法
Yong Zhou, Yijie Wang, Xingkong Ma
How to design a low-latency and accurate approach for user behavior anomaly detection over data streams has become a great challenge. However, existing studies cannot meet low-latency and accurate requirements, due to a large number of subsequences and sequential relationship in behaviors. This paper presents BADSM, a user behavior anomaly detection approach based on sequence mining over data streams that seeks to address such challenge. BADSM uses self-adaptive behavior pruning algorithm to adaptively divide data stream into behaviors and decrease the number of subsequences to improve the efficiency of sequence mining. Meanwhile, the top-k abnormal scoring algorithm is used to reduce the complexity of traversal and obtain quantitative detection result to improve accuracy. We design and implement a streaming anomaly detection system based on BADSM to perform online detection. Extensive experiments confirm that BADSM significantly reduces processing delay by at least 36.8% and false positive rate by 6.4% compared with the classic sequence mining approach PrefixSpan.
如何设计一种低延迟、准确的数据流用户行为异常检测方法已成为一个巨大的挑战。然而,由于行为中存在大量的子序列和顺序关系,现有的研究无法满足低延迟和准确的要求。本文提出了BADSM,一种基于数据流序列挖掘的用户行为异常检测方法,旨在解决这一挑战。BADSM采用自适应行为修剪算法,自适应地将数据流划分为行为,减少子序列的数量,提高序列挖掘的效率。同时,采用top-k异常评分算法,降低遍历复杂度,获得定量检测结果,提高准确率。我们设计并实现了一个基于BADSM的流异常检测系统,实现在线检测。大量的实验证实,与经典的序列挖掘方法PrefixSpan相比,BADSM显著降低了处理延迟至少36.8%,假阳性率降低了6.4%。
{"title":"A User Behavior Anomaly Detection Approach Based on Sequence Mining over Data Streams","authors":"Yong Zhou, Yijie Wang, Xingkong Ma","doi":"10.1109/PDCAT.2016.086","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.086","url":null,"abstract":"How to design a low-latency and accurate approach for user behavior anomaly detection over data streams has become a great challenge. However, existing studies cannot meet low-latency and accurate requirements, due to a large number of subsequences and sequential relationship in behaviors. This paper presents BADSM, a user behavior anomaly detection approach based on sequence mining over data streams that seeks to address such challenge. BADSM uses self-adaptive behavior pruning algorithm to adaptively divide data stream into behaviors and decrease the number of subsequences to improve the efficiency of sequence mining. Meanwhile, the top-k abnormal scoring algorithm is used to reduce the complexity of traversal and obtain quantitative detection result to improve accuracy. We design and implement a streaming anomaly detection system based on BADSM to perform online detection. Extensive experiments confirm that BADSM significantly reduces processing delay by at least 36.8% and false positive rate by 6.4% compared with the classic sequence mining approach PrefixSpan.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127839841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Pre-Impact Fall Detection Based on Wearable Device Using Dynamic Threshold Model 基于动态阈值模型的可穿戴设备预碰撞跌倒检测
Nuth Otanasap
Falling accidents, including slipping, tripping and falling, are the primary reason of injury related to death not only for elderly, but for young people or worker happening at workplace also. If falling accident can be early detected in pre-fall or critical fall phase, called pre-impact fall detection, it will be very useful such as conducting airbag inflation. Furthermore, various detection methods, with an uncomplicated threshold detection method, do maximizing the true positive prediction values but the lead-time, time before subject impacts to the floor, will likely increases the chance of false alarms. Consequently the researcher found that the using of adaptive threshold may reduce false alarms. In this paper, the dynamic threshold method, automatically adjustable threshold for pre-impact fall detection in wearable device, has been proposed and experimented. For our evaluation, 192 instances of several kinds of activity of daily living and falling, were captured. All activities were performed by 6 different young healthy volunteers, 4 males and 2 females, aged between 19 and 21. The several experiments were conducted for performance evaluation including sensitivity, specificity and accuracy measurements. The results of proposed method can detect the pre-impact fall from normal activities of daily living with 99.48% sensitivity, 95.31% specificity and 97.40% accuracy with 365.12 msec of lead time. The results confirm that our proposed method with automatically adjustable threshold based on motion history, is suitable for using in pre-impact fall detection system than fixed threshold based method.
包括滑倒、绊倒和坠落在内的坠落事故不仅是老年人受伤致死的主要原因,而且也是年轻人或工作场所工人受伤致死的主要原因。如果能在坠落前或临界坠落阶段早期检测到坠落事故,称为预冲击坠落检测,将非常有用,如进行安全气囊充气。此外,各种检测方法,使用简单的阈值检测方法,可以最大限度地提高真阳性预测值,但前置时间,即受试者撞击地板之前的时间,可能会增加误报警的机会。研究结果表明,采用自适应阈值可以有效地减少误报。本文提出了可穿戴设备预冲击跌落检测的动态阈值自动调节方法并进行了实验。为了我们的评估,我们捕获了192个日常生活和跌倒活动的实例。所有活动由6名不同的年轻健康志愿者完成,4男2女,年龄在19至21岁之间。进行了多项实验,包括灵敏度、特异性和准确性测量,以进行性能评估。结果表明,该方法能较好地检测出日常生活中正常活动引起的预冲击跌落,灵敏度为99.48%,特异度为95.31%,准确率为97.40%,预判时间为365.12 msec。结果表明,基于运动历史的自动可调阈值方法比基于固定阈值的方法更适合于预碰撞跌落检测系统。
{"title":"Pre-Impact Fall Detection Based on Wearable Device Using Dynamic Threshold Model","authors":"Nuth Otanasap","doi":"10.1109/PDCAT.2016.083","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.083","url":null,"abstract":"Falling accidents, including slipping, tripping and falling, are the primary reason of injury related to death not only for elderly, but for young people or worker happening at workplace also. If falling accident can be early detected in pre-fall or critical fall phase, called pre-impact fall detection, it will be very useful such as conducting airbag inflation. Furthermore, various detection methods, with an uncomplicated threshold detection method, do maximizing the true positive prediction values but the lead-time, time before subject impacts to the floor, will likely increases the chance of false alarms. Consequently the researcher found that the using of adaptive threshold may reduce false alarms. In this paper, the dynamic threshold method, automatically adjustable threshold for pre-impact fall detection in wearable device, has been proposed and experimented. For our evaluation, 192 instances of several kinds of activity of daily living and falling, were captured. All activities were performed by 6 different young healthy volunteers, 4 males and 2 females, aged between 19 and 21. The several experiments were conducted for performance evaluation including sensitivity, specificity and accuracy measurements. The results of proposed method can detect the pre-impact fall from normal activities of daily living with 99.48% sensitivity, 95.31% specificity and 97.40% accuracy with 365.12 msec of lead time. The results confirm that our proposed method with automatically adjustable threshold based on motion history, is suitable for using in pre-impact fall detection system than fixed threshold based method.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114807512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Improved Semi-Deterministic Scheme to Generate Limited Scale-Free Networks 生成有限无标度网络的改进半确定性格式
Naoki Takeuchi, S. Fujita
In this paper, we consider the problem of constructing scale-free networks in a semi-deterministic manner. Scale-free networks have several favorable properties as the topology of interconnection networks such as the short diameter and the quick message propagation. The proposed algorithm is an extension of the Bulut's algorithm for constructing scale-free networks with designated minimum degree k and maximum degree m, such that: 1) it determines the ideal number of edges derived from the ideal degree distribution, and 2) after connecting each new node to k existing nodes as in the Bulut's algorithm, it adjusts the number of edges to the ideal value by conducting add/removal of edges. We prove that such an adjustment is always possible if the number of nodes in the network exceeds m2/k+m.
在本文中,我们考虑以半确定性的方式构造无标度网络的问题。无标度网络作为互连网络的拓扑结构具有直径短、消息传播快等优点。本文提出的算法是Bulut构建指定最小度k和最大度m的无标度网络算法的扩展,即:1)根据理想度分布确定理想边数,2)像Bulut算法一样,在每个新节点连接到k个现有节点后,通过加/除边,将边数调整到理想值。我们证明,如果网络中的节点数量超过m2/k+m,这种调整总是可能的。
{"title":"Improved Semi-Deterministic Scheme to Generate Limited Scale-Free Networks","authors":"Naoki Takeuchi, S. Fujita","doi":"10.1109/PDCAT.2016.051","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.051","url":null,"abstract":"In this paper, we consider the problem of constructing scale-free networks in a semi-deterministic manner. Scale-free networks have several favorable properties as the topology of interconnection networks such as the short diameter and the quick message propagation. The proposed algorithm is an extension of the Bulut's algorithm for constructing scale-free networks with designated minimum degree k and maximum degree m, such that: 1) it determines the ideal number of edges derived from the ideal degree distribution, and 2) after connecting each new node to k existing nodes as in the Bulut's algorithm, it adjusts the number of edges to the ideal value by conducting add/removal of edges. We prove that such an adjustment is always possible if the number of nodes in the network exceeds m2/k+m.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121709690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey Study of Young Generation's Mobile Phone Usage and Security Concerns 年轻一代手机使用及安全问题调查研究
Sonya Zhang, Saree Costa
Security threats targeting mobile phones have increased significantly in recent years as mobile phone technology continues to advance and mobile phone usage skyrockets. Young generation uses mobile phone frequently, and being exposed to these vulnerability and threats in daily life. This paper discussed current mobile security threat environment, and reports a survey study of 262 college students in the United States, examined their mobile phone usage patterns and security concerns, and compared the results with the ones from previous studies.
近年来,随着移动电话技术的不断进步和移动电话使用量的激增,针对移动电话的安全威胁显著增加。年轻一代频繁使用手机,在日常生活中暴露在这些脆弱性和威胁中。本文讨论了当前的移动安全威胁环境,并报告了一项针对262名美国大学生的调查研究,调查了他们的手机使用模式和安全担忧,并与以往的研究结果进行了比较。
{"title":"A Survey Study of Young Generation's Mobile Phone Usage and Security Concerns","authors":"Sonya Zhang, Saree Costa","doi":"10.1109/PDCAT.2016.075","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.075","url":null,"abstract":"Security threats targeting mobile phones have increased significantly in recent years as mobile phone technology continues to advance and mobile phone usage skyrockets. Young generation uses mobile phone frequently, and being exposed to these vulnerability and threats in daily life. This paper discussed current mobile security threat environment, and reports a survey study of 262 college students in the United States, examined their mobile phone usage patterns and security concerns, and compared the results with the ones from previous studies.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129910591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Collaborative Filtering Recommendation Algorithm against Shilling Attacks 一种针对Shilling攻击的改进协同过滤推荐算法
Ruoxuan Wei, Hong Shen
Collaborative Filtering (CF) is a successful technology that has been implemented in E-commerce recommender systems. However, the risks of shilling attacks have already aroused increasing concerns of the society. Current solutions mainly focus on attack detection methods and robust CF algorithms that have flaws of unassured prediction accuracy. Furthermore, attack detection methods require a threshold to distinguish normal users from fake users and suffer from the problems of false positive if the threshold is too high and false negative if too low. This paper proposes a soft-decision method, Neighbor Selection with Variable-Length Partitions (VLPNS), to reduce false positive rate through marking suspicious fakers instead of deleting them directly such that misclassified normal users can still contribute to the similarity calculation. The method works as follows: First, it gets user's suspicion probability by applying SVM. It then generates partitions of variable sizes from which different numbers of neighbors can be selected by using the bisecting c-means clustering algorithm. Finally, it chooses neighbors considering the user's suspicion degree and similarity with target user at the same time. Theoretical and experimental analysis show that our approach ensures an excellent prediction accuracy against shilling attacks.
协同过滤(CF)是一项成功的技术,已在电子商务推荐系统中实现。然而,先令攻击的风险已经引起了社会越来越多的关注。目前的解决方案主要集中在攻击检测方法和鲁棒CF算法上,存在预测精度不确定的缺陷。此外,攻击检测方法需要一个阈值来区分正常用户和虚假用户,并且存在阈值过高和过低会导致误报的问题。本文提出了一种软决策方法——可变长分区邻居选择(VLPNS),通过标记可疑的伪造者而不是直接删除它们来降低误报率,使得错误分类的正常用户仍然可以用于相似度计算。该方法的工作原理如下:首先,利用支持向量机得到用户的怀疑概率;然后,它生成可变大小的分区,通过使用等分c均值聚类算法可以从中选择不同数量的邻居。最后,同时考虑用户的怀疑程度和与目标用户的相似度,选择邻居。理论和实验分析表明,我们的方法对先令攻击有很好的预测精度。
{"title":"An Improved Collaborative Filtering Recommendation Algorithm against Shilling Attacks","authors":"Ruoxuan Wei, Hong Shen","doi":"10.1109/PDCAT.2016.077","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.077","url":null,"abstract":"Collaborative Filtering (CF) is a successful technology that has been implemented in E-commerce recommender systems. However, the risks of shilling attacks have already aroused increasing concerns of the society. Current solutions mainly focus on attack detection methods and robust CF algorithms that have flaws of unassured prediction accuracy. Furthermore, attack detection methods require a threshold to distinguish normal users from fake users and suffer from the problems of false positive if the threshold is too high and false negative if too low. This paper proposes a soft-decision method, Neighbor Selection with Variable-Length Partitions (VLPNS), to reduce false positive rate through marking suspicious fakers instead of deleting them directly such that misclassified normal users can still contribute to the similarity calculation. The method works as follows: First, it gets user's suspicion probability by applying SVM. It then generates partitions of variable sizes from which different numbers of neighbors can be selected by using the bisecting c-means clustering algorithm. Finally, it chooses neighbors considering the user's suspicion degree and similarity with target user at the same time. Theoretical and experimental analysis show that our approach ensures an excellent prediction accuracy against shilling attacks.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128538355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Data Retrieval Algorithm for Multi-Request in Multi-Antenna Wireless Networks 多天线无线网络中多请求的高效数据检索算法
Ping He, Zheng Huo
Given a set of multiple requests sent by clients, where each request contains multiple data items, multi-antenna data retrieval problem refers that finds an access pattern (to retrieve multiple requests by using multiple antennae) such that the access latency of each antenna is minimized and the total access latency in all antennae keeps balance. The problem has great value in mobile computing applications. Although almost researches have focused on data retrieval problem when the clients equipped with one antenna send single request and multiple requests, there are few studies on data retrieval problem with multiple requests sent by clients equipped with multiple antennae. Therefore, this paper proposes two algorithms that adopt two different grouping schemes (SG and WG) such that the requests can be reasonably retrieved by each antenna. For retrieving each request, we propose an algorithm that converts wireless data broadcast system to a super tree for finding an access pattern to download all requested data items in minimal access latency. Through experiments, the proposed scheme has currently most efficiency in existing schemes.
对于客户端发送的一组多个请求,其中每个请求包含多个数据项,多天线数据检索问题是指找到一种访问模式(使用多个天线检索多个请求),使每个天线的访问延迟最小,并且所有天线的总访问延迟保持平衡。这个问题在移动计算应用中有很大的价值。虽然研究大多集中在单个天线客户端发送单个请求和多个请求时的数据检索问题上,但对于多个天线客户端发送多个请求时的数据检索问题的研究很少。因此,本文提出了两种算法,采用SG和WG两种不同的分组方案,使请求能够被每个天线合理地检索到。为了检索每个请求,我们提出了一种算法,该算法将无线数据广播系统转换为一个超级树,以便在最小的访问延迟中找到一个访问模式来下载所有请求的数据项。实验结果表明,该方案是目前现有方案中效率最高的。
{"title":"Efficient Data Retrieval Algorithm for Multi-Request in Multi-Antenna Wireless Networks","authors":"Ping He, Zheng Huo","doi":"10.1109/PDCAT.2016.025","DOIUrl":"https://doi.org/10.1109/PDCAT.2016.025","url":null,"abstract":"Given a set of multiple requests sent by clients, where each request contains multiple data items, multi-antenna data retrieval problem refers that finds an access pattern (to retrieve multiple requests by using multiple antennae) such that the access latency of each antenna is minimized and the total access latency in all antennae keeps balance. The problem has great value in mobile computing applications. Although almost researches have focused on data retrieval problem when the clients equipped with one antenna send single request and multiple requests, there are few studies on data retrieval problem with multiple requests sent by clients equipped with multiple antennae. Therefore, this paper proposes two algorithms that adopt two different grouping schemes (SG and WG) such that the requests can be reasonably retrieved by each antenna. For retrieving each request, we propose an algorithm that converts wireless data broadcast system to a super tree for finding an access pattern to download all requested data items in minimal access latency. Through experiments, the proposed scheme has currently most efficiency in existing schemes.","PeriodicalId":203925,"journal":{"name":"2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133739553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1