首页 > 最新文献

2021 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Network Intrusion Detection System Using Principal Component Analysis Algorithm and Decision Tree Classifier 基于主成分分析算法和决策树分类器的网络入侵检测系统
Oyeyemi Osho, Sungbum Hong, T. Kwembe
Network Intrusion Detection Systems (IDS) have become expedient for network security and ensures the safety of all connected devices. Network Intrusion Detection System (IDS) alludes to observing network data information swiftly, detecting any intrusion pattern and preventing any harmful effect of anomaly intrusion that will cost the network. To combat this issue, we present in this concept paper an IDS based on the Principal Component Analysis (PCA) and Decision Tree Classifier algorithm, a supervised machine learning model to detect intrusion in the Network.
网络入侵检测系统(IDS, Network Intrusion Detection system)已成为保障网络安全的一种手段,可以确保所有连接设备的安全。网络入侵检测系统(IDS)是指快速观察网络数据信息,发现任何入侵模式,防止异常入侵对网络造成危害的系统。为了解决这个问题,我们在这篇概念论文中提出了一种基于主成分分析(PCA)和决策树分类器算法的IDS,这是一种监督机器学习模型,用于检测网络中的入侵。
{"title":"Network Intrusion Detection System Using Principal Component Analysis Algorithm and Decision Tree Classifier","authors":"Oyeyemi Osho, Sungbum Hong, T. Kwembe","doi":"10.1109/CSCI54926.2021.00117","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00117","url":null,"abstract":"Network Intrusion Detection Systems (IDS) have become expedient for network security and ensures the safety of all connected devices. Network Intrusion Detection System (IDS) alludes to observing network data information swiftly, detecting any intrusion pattern and preventing any harmful effect of anomaly intrusion that will cost the network. To combat this issue, we present in this concept paper an IDS based on the Principal Component Analysis (PCA) and Decision Tree Classifier algorithm, a supervised machine learning model to detect intrusion in the Network.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Deep Learning Approach to Optimize Solving Construction Problems 建筑问题优化求解的深度学习方法研究
Phillip Roshon, Feng-Jen Yang
In this study, we focus on a problem domain, construction problems, for reinforcement learning systems to optimize. We relate our approach to existing research in the field of automated theorem proving and other related techniques to optimize the solutions in this domain. We expect this study can inspire more interest in the adoption of and improve the efficiency of existing production systems.
在本研究中,我们专注于一个问题域,即构造问题,用于强化学习系统的优化。我们将我们的方法与自动化定理证明领域的现有研究和其他相关技术联系起来,以优化该领域的解决方案。我们希望这项研究能够激发人们对采用和提高现有生产系统效率的更多兴趣。
{"title":"A Study on Deep Learning Approach to Optimize Solving Construction Problems","authors":"Phillip Roshon, Feng-Jen Yang","doi":"10.1109/CSCI54926.2021.00100","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00100","url":null,"abstract":"In this study, we focus on a problem domain, construction problems, for reinforcement learning systems to optimize. We relate our approach to existing research in the field of automated theorem proving and other related techniques to optimize the solutions in this domain. We expect this study can inspire more interest in the adoption of and improve the efficiency of existing production systems.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133803161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An ML Based Anomaly Detection System in real-time data streams 基于机器学习的实时数据流异常检测系统
Javier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song
Due to the advancements in machine learning and artificial intelligence applied fields, network anomaly detection systems have experienced an evolution from traditional signature-based methods for intrusion detection. Nonetheless, as security measures evolve, more sophisticated attacks are also constantly being developed by hackers. Not only a robust anomaly detection algorithm is needed, but also a real-time data feeding mechanism for minimizing the reaction-time impact is required. Moreover, DDoS attacks can flood the network data channels with more than thousands of packets per second with the latent effect of overloading most traditional monitoring systems that rely on data storage. Due to this, the research presented in this paper focuses its efforts on implementing a real-time data streaming system for network anomaly detection that can operate during a high volume of traffic data. The solution includes the deployment of a flow collector platform connected to Apache Kafka for receiving NetFlow data from network switches. Also, real-time big data processing techniques are applied through Apache Spark, where the ML anomaly detection is triggered. The detection of anomalies is performed by a combination of the unsupervised learning clustering algorithm k-means and the supervised learning classifier KNN (k- nearest neighbors). Finally, a monitoring system consisting of an ELK stack collects historical data for further evolution of the ML algorithms.
由于机器学习和人工智能应用领域的进步,网络异常检测系统经历了从传统的基于签名的入侵检测方法的演变。尽管如此,随着安全措施的发展,黑客也在不断开发更复杂的攻击。不仅需要一个鲁棒的异常检测算法,还需要一个实时的数据馈送机制,以最大限度地减少反应时间的影响。此外,DDoS攻击可以以每秒数千个数据包的速度淹没网络数据通道,从而潜在地使大多数依赖数据存储的传统监控系统过载。因此,本文的研究重点是实现一个可以在大流量数据下运行的网络异常检测实时数据流系统。该解决方案包括部署一个流采集器平台,连接到Apache Kafka,用于接收来自网络交换机的NetFlow数据。同时,通过Apache Spark应用实时大数据处理技术,触发机器学习异常检测。异常检测由无监督学习聚类算法k-means和监督学习分类器KNN (k-最近邻)相结合来完成。最后,由ELK堆栈组成的监控系统收集历史数据,用于ML算法的进一步发展。
{"title":"An ML Based Anomaly Detection System in real-time data streams","authors":"Javier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song","doi":"10.1109/CSCI54926.2021.00270","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00270","url":null,"abstract":"Due to the advancements in machine learning and artificial intelligence applied fields, network anomaly detection systems have experienced an evolution from traditional signature-based methods for intrusion detection. Nonetheless, as security measures evolve, more sophisticated attacks are also constantly being developed by hackers. Not only a robust anomaly detection algorithm is needed, but also a real-time data feeding mechanism for minimizing the reaction-time impact is required. Moreover, DDoS attacks can flood the network data channels with more than thousands of packets per second with the latent effect of overloading most traditional monitoring systems that rely on data storage. Due to this, the research presented in this paper focuses its efforts on implementing a real-time data streaming system for network anomaly detection that can operate during a high volume of traffic data. The solution includes the deployment of a flow collector platform connected to Apache Kafka for receiving NetFlow data from network switches. Also, real-time big data processing techniques are applied through Apache Spark, where the ML anomaly detection is triggered. The detection of anomalies is performed by a combination of the unsupervised learning clustering algorithm k-means and the supervised learning classifier KNN (k- nearest neighbors). Finally, a monitoring system consisting of an ELK stack collects historical data for further evolution of the ML algorithms.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mimic: A Remote Webcam Device Over WebRTC 模仿:远程网络摄像头设备在WebRTC
Logan Crandall, M. Roberts, En Cheng
Whether it be classes, work, or social gatherings, the global pandemic has shown that the world can operate in a virtual space. The growing popularity of working from home saw a steady rise in video conferencing. In a virtual space, it is often necessary that participants have a webcam to have a meaningful connection with others. However, some participants may not own a webcam. Mimic is a software solution to allow the use of a webcam-enabled device, such as a smartphone, as a webcam on a computer that does not have a camera. The goal of Mimic is to provide the capacity to use a secondary device as a webcam input without the need to install any additional software on that mobile device. Mimic can accomplish this by building a web client that leverages the power of modern web browsers and WebRTC to stream the webcam video feed from a mobile device to another computer.
无论是课堂、工作还是社交聚会,全球大流行都表明,世界可以在虚拟空间中运行。随着在家办公的日益普及,视频会议的数量稳步上升。在虚拟空间中,参与者通常需要有一个网络摄像头来与他人建立有意义的联系。然而,一些参与者可能没有网络摄像头。Mimic是一种软件解决方案,允许使用具有网络摄像头功能的设备,如智能手机,作为没有摄像头的计算机上的网络摄像头。Mimic的目标是提供使用辅助设备作为网络摄像头输入的能力,而无需在移动设备上安装任何额外的软件。Mimic可以通过构建一个web客户端来实现这一点,该客户端利用现代web浏览器和WebRTC的强大功能,将网络摄像头视频从移动设备流式传输到另一台计算机。
{"title":"Mimic: A Remote Webcam Device Over WebRTC","authors":"Logan Crandall, M. Roberts, En Cheng","doi":"10.1109/CSCI54926.2021.00027","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00027","url":null,"abstract":"Whether it be classes, work, or social gatherings, the global pandemic has shown that the world can operate in a virtual space. The growing popularity of working from home saw a steady rise in video conferencing. In a virtual space, it is often necessary that participants have a webcam to have a meaningful connection with others. However, some participants may not own a webcam. Mimic is a software solution to allow the use of a webcam-enabled device, such as a smartphone, as a webcam on a computer that does not have a camera. The goal of Mimic is to provide the capacity to use a secondary device as a webcam input without the need to install any additional software on that mobile device. Mimic can accomplish this by building a web client that leverages the power of modern web browsers and WebRTC to stream the webcam video feed from a mobile device to another computer.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114603775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative Ensemble Transductive Learning for Microscopy Image Analysis 显微镜图像分析的迭代集成转换学习
T. Shi, Longshi Wu, Changhong Zhong, Ruixuan Wang, Hongmei Liu
In automatic histopathology and microscopy image analysis, due to high patient-level variability, the model trained based on the images from a set of patients may not perform well on the images from another set of patients. To overcome this issue, motivated by transductive learning and ensemble learning, we propose an iterative framework to train ensemble transductive models using pseudo-labels of test data. In each iteration, a number of individual models are first trained by combining the training set with part of randomly selected test data which have high prediction confidence, and then ensembled to predict the labels of test set for the next iteration. In this way, the latent information in test set would be exposed to the model such that the model can directly learn from the test data. Experimental evaluation on the white blood cancer microscopic image set and the breast histopathology image set shows that the proposed approach significantly outperforms the traditional ensemble models.
在自动组织病理学和显微图像分析中,由于患者水平的高度可变性,基于一组患者的图像训练的模型可能在另一组患者的图像上表现不佳。为了克服这个问题,在转换学习和集成学习的激励下,我们提出了一个迭代框架,使用测试数据的伪标签来训练集成转换模型。在每次迭代中,首先将训练集与随机选取的部分具有较高预测置信度的测试数据相结合,训练出若干个独立的模型,然后进行集合,预测下一次迭代的测试集标签。这样可以将测试集中的潜在信息暴露给模型,使模型可以直接从测试数据中学习。对白细胞癌显微图像集和乳腺组织病理学图像集的实验评估表明,该方法明显优于传统的集成模型。
{"title":"Iterative Ensemble Transductive Learning for Microscopy Image Analysis","authors":"T. Shi, Longshi Wu, Changhong Zhong, Ruixuan Wang, Hongmei Liu","doi":"10.1109/CSCI54926.2021.00025","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00025","url":null,"abstract":"In automatic histopathology and microscopy image analysis, due to high patient-level variability, the model trained based on the images from a set of patients may not perform well on the images from another set of patients. To overcome this issue, motivated by transductive learning and ensemble learning, we propose an iterative framework to train ensemble transductive models using pseudo-labels of test data. In each iteration, a number of individual models are first trained by combining the training set with part of randomly selected test data which have high prediction confidence, and then ensembled to predict the labels of test set for the next iteration. In this way, the latent information in test set would be exposed to the model such that the model can directly learn from the test data. Experimental evaluation on the white blood cancer microscopic image set and the breast histopathology image set shows that the proposed approach significantly outperforms the traditional ensemble models.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114907040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review Paper on Facial Recognition Techniques in E-business 电子商务中的人脸识别技术综述
Tiyani Christopher Hlongwane, Topside E. Mathonsi, D. D. du Plessis, Tonderai Muchenje
Facial recognition is a biological biometric feature that allows a person to be identified from a digital image. The face is known as the most recognizable aspect of human anatomy and acts like a human being’s first distinguishing feature. There are different techniques that can be used for the classification of data, two widely used techniques for data classification and dimension reduction are Principle Components Analysis (PCA) and Linear Discriminant Analysis (LDA). Facial recognition techniques have been comprehensively studied and applied in e-business. To reduce the False Rejection Rate (FRR) and False Acceptance Rate (FAR) during the recognition process, this review looks at the methods and the parameters that affect the facial recognition. Furthermore, we outline the strengths and challenges of these techniques. This comprehensive study serves as a starting point and a guide for everyone interested in exploring facial recognition techniques research area. The paper presents the conclusion and future work.
面部识别是一种生物特征,可以从数字图像中识别出一个人。脸被认为是人体解剖结构中最容易识别的部分,也是人类的第一个特征。有不同的技术可用于数据分类,两种广泛使用的数据分类和降维技术是主成分分析(PCA)和线性判别分析(LDA)。人脸识别技术在电子商务领域得到了广泛的研究和应用。为了降低人脸识别过程中的误拒率(FRR)和误接受率(FAR),本文综述了影响人脸识别的方法和参数。此外,我们概述了这些技术的优势和挑战。这一综合性的研究可以作为每个有兴趣探索面部识别技术研究领域的人的起点和指南。本文给出了结论和今后的工作。
{"title":"A Review Paper on Facial Recognition Techniques in E-business","authors":"Tiyani Christopher Hlongwane, Topside E. Mathonsi, D. D. du Plessis, Tonderai Muchenje","doi":"10.1109/CSCI54926.2021.00323","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00323","url":null,"abstract":"Facial recognition is a biological biometric feature that allows a person to be identified from a digital image. The face is known as the most recognizable aspect of human anatomy and acts like a human being’s first distinguishing feature. There are different techniques that can be used for the classification of data, two widely used techniques for data classification and dimension reduction are Principle Components Analysis (PCA) and Linear Discriminant Analysis (LDA). Facial recognition techniques have been comprehensively studied and applied in e-business. To reduce the False Rejection Rate (FRR) and False Acceptance Rate (FAR) during the recognition process, this review looks at the methods and the parameters that affect the facial recognition. Furthermore, we outline the strengths and challenges of these techniques. This comprehensive study serves as a starting point and a guide for everyone interested in exploring facial recognition techniques research area. The paper presents the conclusion and future work.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117303417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
aMDH and TWIN: Two original honeypot-based approaches to protect swarms of drones aMDH和TWIN:两种原始的基于蜜罐的方法来保护无人机群
S. Chaumette, Titien Cubilier
Drones and swarms of drones are now considered an additional tool for both civilian and military applications. As any computer-based system they can thus be (and are) the target of attacks and the consequences of such attacks can be dramatic for assets and people. We believe an approach based on honeypots that would attract the attention of attackers and would behave so that these attackers could not even understand they are in a honeypot and not in a real drone, would be a significant step towards the protection of these systems. Even though some prototypes exist, they do not fully address the fact of luring the attacker to believe he/she controls a real drone. In this paper we present our work to address this issue.
无人机和无人机群现在被认为是民用和军事应用的额外工具。作为任何基于计算机的系统,它们因此可能成为(并且是)攻击的目标,这种攻击的后果可能对资产和人员造成巨大影响。我们认为,基于蜜罐的方法将吸引攻击者的注意,并使这些攻击者甚至无法理解他们在蜜罐中而不是在真正的无人机中,这将是迈向保护这些系统的重要一步。尽管存在一些原型机,但它们并不能完全解决引诱攻击者相信他/她控制着一架真正的无人机的事实。在本文中,我们介绍了解决这一问题的工作。
{"title":"aMDH and TWIN: Two original honeypot-based approaches to protect swarms of drones","authors":"S. Chaumette, Titien Cubilier","doi":"10.1109/CSCI54926.2021.00192","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00192","url":null,"abstract":"Drones and swarms of drones are now considered an additional tool for both civilian and military applications. As any computer-based system they can thus be (and are) the target of attacks and the consequences of such attacks can be dramatic for assets and people. We believe an approach based on honeypots that would attract the attention of attackers and would behave so that these attackers could not even understand they are in a honeypot and not in a real drone, would be a significant step towards the protection of these systems. Even though some prototypes exist, they do not fully address the fact of luring the attacker to believe he/she controls a real drone. In this paper we present our work to address this issue.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116167632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PCA Approaches for Optimal Convolution Kernels in Convolutional Neural Networks 卷积神经网络中最优卷积核的PCA方法
Philku Lee, Deyeon Kim, Seung Heon Lee, Seon-Hong Kim
Convolutional neural networks (CNNs) have become one of most powerful machine learning models; with enough data, their accuracy in tasks such as image-related classifications and natural language processing is unmatched. The drawback that many scientists have commented on is the fact that these networks, usually trained from randomly-initialized parameters, are black-boxes. This article introduces an innovative variant for CNNs, which incorporates principal components (PCs) derived from well-trained convolution kernels. The variant is called the principal component-incorporating CNN (PC-CNN), in which the PCs are employed either as a complete replacement for randomly-initialized convolution kernels or as an initialization for the convolution kernels to be re-trained. The objective is to help training processes converge to the global minimizer. The PC-CNN is applied for the MNIST handwritten digit dataset to prove its effectiveness.
卷积神经网络(cnn)已经成为最强大的机器学习模型之一;有了足够的数据,它们在图像相关分类和自然语言处理等任务中的准确性是无与伦比的。许多科学家评论的缺点是,这些网络通常是从随机初始化的参数中训练出来的,是黑盒。本文介绍了cnn的一种创新变体,它包含了来自训练良好的卷积核的主成分(pc)。这种变体被称为结合主成分的CNN (PC-CNN),其中pc要么被用作随机初始化卷积核的完全替代,要么被用作重新训练卷积核的初始化。目标是帮助训练过程收敛到全局最小值。将PC-CNN应用于MNIST手写数字数据集,验证了其有效性。
{"title":"PCA Approaches for Optimal Convolution Kernels in Convolutional Neural Networks","authors":"Philku Lee, Deyeon Kim, Seung Heon Lee, Seon-Hong Kim","doi":"10.1109/CSCI54926.2021.00017","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00017","url":null,"abstract":"Convolutional neural networks (CNNs) have become one of most powerful machine learning models; with enough data, their accuracy in tasks such as image-related classifications and natural language processing is unmatched. The drawback that many scientists have commented on is the fact that these networks, usually trained from randomly-initialized parameters, are black-boxes. This article introduces an innovative variant for CNNs, which incorporates principal components (PCs) derived from well-trained convolution kernels. The variant is called the principal component-incorporating CNN (PC-CNN), in which the PCs are employed either as a complete replacement for randomly-initialized convolution kernels or as an initialization for the convolution kernels to be re-trained. The objective is to help training processes converge to the global minimizer. The PC-CNN is applied for the MNIST handwritten digit dataset to prove its effectiveness.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crossed analysis of three-variable for early pre-diagnosis of COVID-19 新冠肺炎早期预诊断的三变量交叉分析
Ana María Campos Mora, Diego Sánchez Buitrago, Leonardo Juan Ramírez López
This study presents a new analysis method of physiological variables considered vital for the early diagnosis of COVID-19: Body Temperature, Heart Rate, and Blood Saturation. The applied method was the cross-analysis of variables to obtain triage-type criteria for classifying the individual in one of the three states: Prevention (yellow), Warning (Orange), and Alarm (Red) for each particular case. As a result, an automatic analysis algorithm was developed to support the physician in preventive treatment. It is possible to generate the warning states and classify the situation when making a report according to its condition by validating the results. The algorithms are published on Github to make them available to the scientific community in general and thus solve the early diagnosis.
本研究提出了一种新的对新冠肺炎早期诊断至关重要的生理变量:体温、心率和血饱和度的分析方法。应用的方法是对变量进行交叉分析,以获得将个体分类为三种状态之一的分类类型标准:预防(黄色)、警告(橙色)和报警(红色)。因此,开发了一种自动分析算法来支持医生进行预防性治疗。在根据其条件进行报告时,可以通过验证结果来生成警告状态并对情况进行分类。这些算法被发布在Github上,供科学界普遍使用,从而解决早期诊断问题。
{"title":"Crossed analysis of three-variable for early pre-diagnosis of COVID-19","authors":"Ana María Campos Mora, Diego Sánchez Buitrago, Leonardo Juan Ramírez López","doi":"10.1109/CSCI54926.2021.00357","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00357","url":null,"abstract":"This study presents a new analysis method of physiological variables considered vital for the early diagnosis of COVID-19: Body Temperature, Heart Rate, and Blood Saturation. The applied method was the cross-analysis of variables to obtain triage-type criteria for classifying the individual in one of the three states: Prevention (yellow), Warning (Orange), and Alarm (Red) for each particular case. As a result, an automatic analysis algorithm was developed to support the physician in preventive treatment. It is possible to generate the warning states and classify the situation when making a report according to its condition by validating the results. The algorithms are published on Github to make them available to the scientific community in general and thus solve the early diagnosis.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124519953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Middleware to Integrate Patient Data from Heterogeneous Distributed Databases and Its Efficacy 集成异构分布式数据库患者数据的中间件及其效果
Subrata Kumar Das, Mohammad Zahidur Rahman
The health organizations store the patient data in different repositories and scattered in diverse locations. In the healthcare domain, the problem is that each hospital or even each department under a hospital maintains its own database having various data models (SQL, NoSQL, etc.). In this situation, existing or new applications require to grant healthcare actors to locate and share patient data from those pre-existing distributed databases (DDBs) remotely for the needs of patient quality treatment, daily operations of the health centers. However, data integration from distributed data sources is raising concern for data model variability. Therefore, it is significant to identify that how much an application like middleware is efficient to reconstruct and share patient data remotely from heterogeneous DDBs over the networks. The health organizations could also require to ensure whether their existing database model performs well or should replace by another one. So, this paper aims to design a system using different databases consisting of distinct data structures and an algorithm for middleware to integrate data from them with testing the system performance. The experimental results of this research work show that the patient data could be shared from various distributed data sources efficiently. Therefore the study could direct the healthcare organizations for sharing patient data from heterogeneous distributed databases without replacing the existing data model.
医疗机构将患者数据存储在不同的存储库中,分散在不同的位置。在医疗保健领域,问题是每个医院甚至医院下的每个部门都维护自己的数据库,这些数据库具有各种数据模型(SQL、NoSQL等)。在这种情况下,现有的或新的应用程序需要授权医疗保健参与者远程定位和共享来自这些预先存在的分布式数据库(ddb)的患者数据,以满足患者质量治疗和医疗中心日常操作的需要。然而,来自分布式数据源的数据集成引起了对数据模型可变性的关注。因此,确定像中间件这样的应用程序在通过网络从异构ddb远程重建和共享患者数据方面的效率有多高是很重要的。卫生组织还可以要求确保它们现有的数据库模型是否运行良好,或者是否应该被另一个数据库模型所取代。因此,本文旨在设计一个由不同数据结构组成的不同数据库组成的系统,并设计一种中间件算法来集成来自不同数据库的数据并测试系统性能。实验结果表明,该方法可以有效地实现各种分布式数据源的患者数据共享。因此,该研究可以指导医疗机构在不替换现有数据模型的情况下共享异构分布式数据库中的患者数据。
{"title":"Middleware to Integrate Patient Data from Heterogeneous Distributed Databases and Its Efficacy","authors":"Subrata Kumar Das, Mohammad Zahidur Rahman","doi":"10.1109/CSCI54926.2021.00256","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00256","url":null,"abstract":"The health organizations store the patient data in different repositories and scattered in diverse locations. In the healthcare domain, the problem is that each hospital or even each department under a hospital maintains its own database having various data models (SQL, NoSQL, etc.). In this situation, existing or new applications require to grant healthcare actors to locate and share patient data from those pre-existing distributed databases (DDBs) remotely for the needs of patient quality treatment, daily operations of the health centers. However, data integration from distributed data sources is raising concern for data model variability. Therefore, it is significant to identify that how much an application like middleware is efficient to reconstruct and share patient data remotely from heterogeneous DDBs over the networks. The health organizations could also require to ensure whether their existing database model performs well or should replace by another one. So, this paper aims to design a system using different databases consisting of distinct data structures and an algorithm for middleware to integrate data from them with testing the system performance. The experimental results of this research work show that the patient data could be shared from various distributed data sources efficiently. Therefore the study could direct the healthcare organizations for sharing patient data from heterogeneous distributed databases without replacing the existing data model.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125889016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1