首页 > 最新文献

2021 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Kabuki Explanation System Based on User’s Knowledge and Interests 基于用户知识和兴趣的歌舞伎解释系统
Miku Kawai, Jumpei Ono, Takashi Ogata
This paper introduces the generation of explanations for a stage-performing structural simulation system using the animation of kabuki dance that we have developed. After considering the explanation function in the context of narratives and kabuki knowledge, we present a mechanism in the aforementioned system that automatically determines the content and method of an explanation according to the degree of the user’s interest and knowledge. Through this trial, we consider effective explanation methods for narrative generation and, in this study, the use of kabuki-related knowledge.
本文介绍了我们开发的利用歌舞伎动画的舞台表演结构模拟系统的生成解释。在考虑叙述和歌舞伎知识背景下的解释功能后,我们在上述系统中提出了一种机制,根据用户的兴趣和知识程度自动确定解释的内容和方法。通过这一尝试,我们考虑了叙事生成的有效解释方法,并在本研究中使用了与歌舞伎相关的知识。
{"title":"Kabuki Explanation System Based on User’s Knowledge and Interests","authors":"Miku Kawai, Jumpei Ono, Takashi Ogata","doi":"10.1109/CSCI54926.2021.00147","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00147","url":null,"abstract":"This paper introduces the generation of explanations for a stage-performing structural simulation system using the animation of kabuki dance that we have developed. After considering the explanation function in the context of narratives and kabuki knowledge, we present a mechanism in the aforementioned system that automatically determines the content and method of an explanation according to the degree of the user’s interest and knowledge. Through this trial, we consider effective explanation methods for narrative generation and, in this study, the use of kabuki-related knowledge.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134561180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of software applications using access and actions control policies based on trust 使用基于信任的访问和操作控制策略设计软件应用程序
Marcel Danilescu, Laura Danilescu
Granting access to an organization's information resources is an issue that is the subject of numerous research works, with different approaches. This paper addresses access and action control policies based on the levels of trust given to them.The internal organization of an enterprise implies the existence of a hierarchy of departments, structured in a tree, in which data and information are circulated both ascending and descending. The staff of the organization is the one who carries out various processes, which consist of actions, workflows and/or information flows and events. In order to participate in these processes, a certain level of trust is assigned to the person. The association between the level of trust given to a person and the value of trust attributed to an object leads to the generation of policies implemented by computer applications that use access and actions control based on trust. The creation of these policies and their updating is done from a Policy Creation Point. A Policy Storage point is used to store all policies. The Document Status Point is the location where the document status matrix is located. Thus, The Document Storage Point is the space where documents are stored in electronic format. By creating them, a single point of access to policies is established for their creation and updating, a point where policies are stored, a point of storage of the workflow applied to documents and the active process, and a point of documents storage.Our paper presents, in addition to an original formal model, the use of trust gained by a member of an organization (trust calculated or attributed directly), and an example of its practical applicability in the information processes in the organization.This paper complements our previous work, which focuses on the aspects of using trust in controlling access and user interaction with information processes in the organization. This paper complements our previous work, which focuses on the aspects of using trust in controlling user access and interaction with information processes in the organization.
授予对组织信息资源的访问权是一个问题,是许多研究工作的主题,采用不同的方法。本文根据给予它们的信任级别讨论访问和操作控制策略。企业的内部组织意味着部门的层次结构的存在,以树的形式构成,其中数据和信息以上升和下降的方式传播。组织的员工是执行各种过程的人,这些过程由动作、工作流和/或信息流和事件组成。为了参与这些过程,一定程度的信任被分配给这个人。赋予一个人的信任级别和赋予一个对象的信任值之间的关联导致计算机应用程序实现的策略的生成,这些策略使用基于信任的访问和操作控制。这些策略的创建和更新是从策略创建点完成的。策略存储点用于存储所有策略。文档状态点是文档状态矩阵所在的位置。因此,文档存储点是以电子格式存储文档的空间。通过创建它们,为策略的创建和更新建立了一个访问策略的单一点、一个存储策略的点、一个应用于文档和活动流程的工作流的存储点,以及一个文档存储点。本文除了提出了一个原始的形式模型外,还介绍了组织成员获得的信任(直接计算或归属的信任)的使用,并举例说明了其在组织信息处理中的实际适用性。本文补充了我们以前的工作,其重点是在组织中使用信任来控制访问和用户与信息过程的交互。本文补充了我们以前的工作,其重点是在组织中使用信任来控制用户访问和与信息过程的交互方面。
{"title":"Design of software applications using access and actions control policies based on trust","authors":"Marcel Danilescu, Laura Danilescu","doi":"10.1109/CSCI54926.2021.00363","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00363","url":null,"abstract":"Granting access to an organization's information resources is an issue that is the subject of numerous research works, with different approaches. This paper addresses access and action control policies based on the levels of trust given to them.The internal organization of an enterprise implies the existence of a hierarchy of departments, structured in a tree, in which data and information are circulated both ascending and descending. The staff of the organization is the one who carries out various processes, which consist of actions, workflows and/or information flows and events. In order to participate in these processes, a certain level of trust is assigned to the person. The association between the level of trust given to a person and the value of trust attributed to an object leads to the generation of policies implemented by computer applications that use access and actions control based on trust. The creation of these policies and their updating is done from a Policy Creation Point. A Policy Storage point is used to store all policies. The Document Status Point is the location where the document status matrix is located. Thus, The Document Storage Point is the space where documents are stored in electronic format. By creating them, a single point of access to policies is established for their creation and updating, a point where policies are stored, a point of storage of the workflow applied to documents and the active process, and a point of documents storage.Our paper presents, in addition to an original formal model, the use of trust gained by a member of an organization (trust calculated or attributed directly), and an example of its practical applicability in the information processes in the organization.This paper complements our previous work, which focuses on the aspects of using trust in controlling access and user interaction with information processes in the organization. This paper complements our previous work, which focuses on the aspects of using trust in controlling user access and interaction with information processes in the organization.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130314875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Training Negatively Affects Fairness 对抗性训练对公平产生负面影响
Korn Sooksatra, P. Rivas
With the increasing presence of deep learning models, many applications have had significant improvements; however, they face a new vulnerability known as adversarial examples. Adversarial examples can mislead deep learning models to predict the wrong classes without human actors noticing. Recently, many works have tried to improve adversarial examples to make them stronger and more effective. However, although some researchers have invented mechanisms to defend deep learning models against adversarial examples, those mechanisms may negatively affect different measures of fairness, which are critical in practice. This work mathematically defines four fairness scores to show that training adversarially robust models can harm fairness scores. Furthermore, we empirically show that adversarial training, one of the most potent defensive mechanisms against adversarial examples, can harm them.
随着深度学习模型的出现,许多应用程序都有了显著的改进;然而,它们面临着一种新的脆弱性,即对抗性例子。对抗性示例可能会误导深度学习模型在人类演员没有注意到的情况下预测错误的类别。最近,许多工作都试图改进对抗性示例,使其更强大、更有效。然而,尽管一些研究人员已经发明了一些机制来保护深度学习模型免受对抗性示例的影响,但这些机制可能会对不同的公平指标产生负面影响,这在实践中是至关重要的。这项工作在数学上定义了四个公平分数,以表明训练对抗鲁棒模型会损害公平分数。此外,我们的经验表明,对抗性训练是对抗对抗性示例最有效的防御机制之一,可能会伤害它们。
{"title":"Adversarial Training Negatively Affects Fairness","authors":"Korn Sooksatra, P. Rivas","doi":"10.1109/CSCI54926.2021.00096","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00096","url":null,"abstract":"With the increasing presence of deep learning models, many applications have had significant improvements; however, they face a new vulnerability known as adversarial examples. Adversarial examples can mislead deep learning models to predict the wrong classes without human actors noticing. Recently, many works have tried to improve adversarial examples to make them stronger and more effective. However, although some researchers have invented mechanisms to defend deep learning models against adversarial examples, those mechanisms may negatively affect different measures of fairness, which are critical in practice. This work mathematically defines four fairness scores to show that training adversarially robust models can harm fairness scores. Furthermore, we empirically show that adversarial training, one of the most potent defensive mechanisms against adversarial examples, can harm them.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130389019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Balance of Privacy and Utility with Differential Privacy Deep Learning Frameworks 差分隐私深度学习框架下隐私与效用的最优平衡
O. Kotevska, Folami T. Alamudun, Christopher Stanley
As the number of online services has increased, the amount of sensitive data being recorded is rising. Simultaneously, the decision-making process has improved by using the vast amounts of data, where machine learning has transformed entire industries. This paper addresses the development of optimal private deep neural networks and discusses the challenges associated with this task. We focus on differential privacy implementations and finding the optimal balance between accuracy and privacy, benefits and limitations of existing libraries, and challenges of applying private machine learning models in practical applications. Our analysis shows that learning rate, and privacy budget are the key factors that impact the results, and we discuss options for these settings.
随着在线服务的增加,被记录的敏感数据的数量也在增加。与此同时,通过使用大量数据,决策过程得到了改善,机器学习已经改变了整个行业。本文讨论了最优私有深度神经网络的发展,并讨论了与此任务相关的挑战。我们专注于不同的隐私实现,并在准确性和隐私之间找到最佳平衡,现有库的优点和局限性,以及在实际应用中应用私有机器学习模型的挑战。我们的分析表明,学习率和隐私预算是影响结果的关键因素,我们讨论了这些设置的选项。
{"title":"Optimal Balance of Privacy and Utility with Differential Privacy Deep Learning Frameworks","authors":"O. Kotevska, Folami T. Alamudun, Christopher Stanley","doi":"10.1109/CSCI54926.2021.00141","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00141","url":null,"abstract":"As the number of online services has increased, the amount of sensitive data being recorded is rising. Simultaneously, the decision-making process has improved by using the vast amounts of data, where machine learning has transformed entire industries. This paper addresses the development of optimal private deep neural networks and discusses the challenges associated with this task. We focus on differential privacy implementations and finding the optimal balance between accuracy and privacy, benefits and limitations of existing libraries, and challenges of applying private machine learning models in practical applications. Our analysis shows that learning rate, and privacy budget are the key factors that impact the results, and we discuss options for these settings.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114418535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Meta-heuristics Approach for Solving Supply Chain Network Model under Disruption Risk 破坏风险下供应链网络模型的混合元启发式求解方法
Chuluunsukh Anudari, YoungSu Yun, M. Gen
A supply chain network (SCN) model which considers facility and route disruptions simultaneously is proposed in this paper. Since most of conventional literature have focused either on facility disruption solely or on route disruption solely, the simultaneous consideration of facility and route disruptions can improve the flexibility of the implementation in the SCN model. The SCN model under the disruptions is represented as a mathematical formulation and a hybrid meta-heuristics (GA-VNS) approach which combines genetic algorithm (GA) with variable neighborhood search (VNS) is used for the mathematical formulation. In numerical experiment, two scaled SCN models are used for comparing the performance of the GA-VNS approach with those of some conventional meta-heuristics approaches. Experimental results prove that the GA-VNS approach is more robust than conventional meta-heuristics approaches, and the flexibility of the SCN model under the disruptions are also improved.
提出了一种同时考虑设备和路线中断的供应链网络模型。由于大多数传统文献要么只关注设施中断,要么只关注路线中断,因此同时考虑设施和路线中断可以提高SCN模型实施的灵活性。将干扰下的SCN模型表示为数学表达式,并采用遗传算法和可变邻域搜索相结合的混合元启发式(GA-VNS)方法进行数学表达式。在数值实验中,利用两个尺度SCN模型比较了GA-VNS方法与一些传统的元启发式方法的性能。实验结果表明,GA-VNS方法比传统的元启发式方法具有更强的鲁棒性,同时也提高了SCN模型在干扰下的灵活性。
{"title":"Hybrid Meta-heuristics Approach for Solving Supply Chain Network Model under Disruption Risk","authors":"Chuluunsukh Anudari, YoungSu Yun, M. Gen","doi":"10.1109/CSCI54926.2021.00149","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00149","url":null,"abstract":"A supply chain network (SCN) model which considers facility and route disruptions simultaneously is proposed in this paper. Since most of conventional literature have focused either on facility disruption solely or on route disruption solely, the simultaneous consideration of facility and route disruptions can improve the flexibility of the implementation in the SCN model. The SCN model under the disruptions is represented as a mathematical formulation and a hybrid meta-heuristics (GA-VNS) approach which combines genetic algorithm (GA) with variable neighborhood search (VNS) is used for the mathematical formulation. In numerical experiment, two scaled SCN models are used for comparing the performance of the GA-VNS approach with those of some conventional meta-heuristics approaches. Experimental results prove that the GA-VNS approach is more robust than conventional meta-heuristics approaches, and the flexibility of the SCN model under the disruptions are also improved.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Online Reinforcement Learning Approach for Solving the Dynamic Flexible Job-Shop Scheduling Problem for Multiple Products and Constraints 多产品柔性作业车间调度问题的在线强化学习方法
Nour El-Din Ali Said, Yassin Samaha, Eman Azab, L. Shihata, M. Mashaly
In the manufacturing industries, the most challenging problems are mostly related to time efficiency and customer satisfaction. This is mainly translated to how efficient is the frequent task of scheduling jobs to alternative routes on a number of machines. Although scheduling has been studied for decades, there is a shortage to a generalized approach for the production scheduling that can adapt to changes occurring continuously at any production environment. This research work addresses the dynamic production scheduling problem and the optimization techniques that could be applied to the production schedule to increase its efficiency. An algorithm is proposed to apply the Q-learning optimization technique on a dynamic flexible job-shop scheduling problem of a real case study of a pharmaceutical factory with 18 machines and 22 products. Proposed algorithm is shown to be able to achieve an efficient schedule with short make-span in minimal time duration and without requiring any learning process from previous schedules, thus increasing the factory's overall efficiency. In addition, the proposed algorithm operates online as any change occurring in the production environment is signaled automatically to it where it responds be regenerating the most optimal updated production schedule.
在制造业中,最具挑战性的问题大多与时间效率和客户满意度有关。这主要是指在多台机器上将作业调度到可选路线上的频繁任务的效率。尽管对生产调度的研究已经有几十年的历史,但目前还缺乏一种能够适应任何生产环境下不断变化的生产调度的通用方法。本文研究的是动态生产调度问题,以及可应用于生产调度的优化技术,以提高生产调度的效率。提出了一种将q -学习优化技术应用于具有18台机器和22种产品的制药厂动态柔性作业车间调度问题的算法。该算法能够在最短的时间内以较短的制作周期实现高效的调度,并且不需要从以前的调度中学习任何过程,从而提高工厂的整体效率。此外,所提出的算法在线运行,因为生产环境中发生的任何变化都会自动向其发出信号,从而生成更新后的最优生产计划。
{"title":"An Online Reinforcement Learning Approach for Solving the Dynamic Flexible Job-Shop Scheduling Problem for Multiple Products and Constraints","authors":"Nour El-Din Ali Said, Yassin Samaha, Eman Azab, L. Shihata, M. Mashaly","doi":"10.1109/CSCI54926.2021.00095","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00095","url":null,"abstract":"In the manufacturing industries, the most challenging problems are mostly related to time efficiency and customer satisfaction. This is mainly translated to how efficient is the frequent task of scheduling jobs to alternative routes on a number of machines. Although scheduling has been studied for decades, there is a shortage to a generalized approach for the production scheduling that can adapt to changes occurring continuously at any production environment. This research work addresses the dynamic production scheduling problem and the optimization techniques that could be applied to the production schedule to increase its efficiency. An algorithm is proposed to apply the Q-learning optimization technique on a dynamic flexible job-shop scheduling problem of a real case study of a pharmaceutical factory with 18 machines and 22 products. Proposed algorithm is shown to be able to achieve an efficient schedule with short make-span in minimal time duration and without requiring any learning process from previous schedules, thus increasing the factory's overall efficiency. In addition, the proposed algorithm operates online as any change occurring in the production environment is signaled automatically to it where it responds be regenerating the most optimal updated production schedule.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131759580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Early Warning System for Patients in Emergency Department based on Machine Learning 基于机器学习的急诊科患者预警系统
Ying-Feng Hsu, Morito Matsuoka
In this paper, we present an early warning system for patients in the emergency department. Our proposed system includes data processing steps that transform raw clinical data streams into useful information that facilitates clinical decision making for the early warning. We tested the proposed approach in a medical monitoring system, which takes physiologic data and predicts in which clinical setting the data is most likely to be seen. To demonstrate the high utility of our approach, we conducted a set of experiments on the clinical data of 1,176 patients.
在本文中,我们提出了一个早期预警系统的病人在急诊科。我们提出的系统包括数据处理步骤,将原始临床数据流转换为有用的信息,促进早期预警的临床决策。我们在一个医疗监测系统中测试了提出的方法,该系统获取生理数据并预测在哪个临床环境中最有可能看到这些数据。为了证明我们方法的高实用性,我们对1176名患者的临床数据进行了一组实验。
{"title":"An Early Warning System for Patients in Emergency Department based on Machine Learning","authors":"Ying-Feng Hsu, Morito Matsuoka","doi":"10.1109/CSCI54926.2021.00249","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00249","url":null,"abstract":"In this paper, we present an early warning system for patients in the emergency department. Our proposed system includes data processing steps that transform raw clinical data streams into useful information that facilitates clinical decision making for the early warning. We tested the proposed approach in a medical monitoring system, which takes physiologic data and predicts in which clinical setting the data is most likely to be seen. To demonstrate the high utility of our approach, we conducted a set of experiments on the clinical data of 1,176 patients.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards ‘serendipity engineering for seductive hypermedia’ and ‘user analysis using socialnomics’: The role of ecological cognition 走向“诱惑超媒体的意外发现工程”和“使用社会经济学的用户分析”:生态认知的作用
J. Bishop, M. Goode
This paper investigates the long-established ecological cognition framework and updates it to better account for the advances in computational science computational intelligence. To do this, two concepts are explored. The first, ‘serendipity engineering for seductive hypermedia,’ looks at how to design information systems to account for the pleasant occurrences that happen in offline environments studied by those in sales and marketing where beneficial outcomes often occur by chance encounters. The second, ‘user analysis using socialnomics’ looks at how a parametric user model based on the ecological framework can be used to understand users of information systems from the point of view of supporting a digital economy of users. A number of additional equations are developed using socialnomics that can be applied to digital transformation based on the parametric user model, including to calculate probability of seduction and probability of serendipity in an information system. The parametric model presented has great applicability for information and communications technology solution providers.
本文研究了长期建立的生态认知框架,并对其进行了更新,以更好地解释计算科学和计算智能的进展。为此,我们探讨了两个概念。第一篇,“诱惑超媒体的意外发现工程”,着眼于如何设计信息系统来解释在线下环境中发生的愉快事件,销售和营销人员研究了这种情况,在这种情况下,有益的结果往往是偶然遇到的。第二部分“使用社会经济学的用户分析”着眼于如何使用基于生态框架的参数化用户模型,从支持用户的数字经济的角度来理解信息系统的用户。利用社会经济学开发了一些附加的方程,这些方程可以应用于基于参数化用户模型的数字化转型,包括计算信息系统中的诱惑概率和意外发现概率。所提出的参数化模型对信息通信技术解决方案提供商具有很强的适用性。
{"title":"Towards ‘serendipity engineering for seductive hypermedia’ and ‘user analysis using socialnomics’: The role of ecological cognition","authors":"J. Bishop, M. Goode","doi":"10.1109/CSCI54926.2021.00150","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00150","url":null,"abstract":"This paper investigates the long-established ecological cognition framework and updates it to better account for the advances in computational science computational intelligence. To do this, two concepts are explored. The first, ‘serendipity engineering for seductive hypermedia,’ looks at how to design information systems to account for the pleasant occurrences that happen in offline environments studied by those in sales and marketing where beneficial outcomes often occur by chance encounters. The second, ‘user analysis using socialnomics’ looks at how a parametric user model based on the ecological framework can be used to understand users of information systems from the point of view of supporting a digital economy of users. A number of additional equations are developed using socialnomics that can be applied to digital transformation based on the parametric user model, including to calculate probability of seduction and probability of serendipity in an information system. The parametric model presented has great applicability for information and communications technology solution providers.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"492 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132898806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning for Multiple Stage Phishing URL Prediction 多阶段网络钓鱼URL预测的机器学习
Khalid Amen, Mohamad Zohdy, M. Mahmoud
Phishing is a fraudulent process and a form of cybercrime where an attacker tries to obtain sensitive information for malicious use. A phisher uses social engineering and technical deception to fetch private information from the web user. Previous Machine Learning (ML) approaches have been used to detect whether URLs are valid, or invalid. The purpose of this work is to detect, or predict, the three stages of Phishing URLs starting with valid, not enough info and invalid URLs. We will investigate different potential models that are trained by Machine Learning algorithms and find out which of these models has better accuracy.
网络钓鱼是一种欺诈过程,也是网络犯罪的一种形式,攻击者试图获取敏感信息以进行恶意使用。网络钓鱼者使用社会工程和技术欺骗从网络用户那里获取私人信息。以前的机器学习(ML)方法已用于检测url是否有效或无效。这项工作的目的是检测或预测网络钓鱼url的三个阶段,从有效、信息不足和无效的url开始。我们将研究由机器学习算法训练的不同潜在模型,并找出哪些模型具有更好的准确性。
{"title":"Machine Learning for Multiple Stage Phishing URL Prediction","authors":"Khalid Amen, Mohamad Zohdy, M. Mahmoud","doi":"10.1109/CSCI54926.2021.00049","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00049","url":null,"abstract":"Phishing is a fraudulent process and a form of cybercrime where an attacker tries to obtain sensitive information for malicious use. A phisher uses social engineering and technical deception to fetch private information from the web user. Previous Machine Learning (ML) approaches have been used to detect whether URLs are valid, or invalid. The purpose of this work is to detect, or predict, the three stages of Phishing URLs starting with valid, not enough info and invalid URLs. We will investigate different potential models that are trained by Machine Learning algorithms and find out which of these models has better accuracy.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Causal Model to Study the Disparate Effects of COVID-19 on Minorities 建立因果模型,研究COVID-19对少数民族的不同影响
Misagh Faezipour, M. Faezipour, Brianna Bauman
This paper proposes a systems engineering perspective to analyze the causes of COVID-19 health disparities impact and interventions to minimize the impact on minorities. The impact of the novel coronavirus has shown to be more intense on minorities. The percentage of COVID-19 case count and fatality rate for minorities is much higher than that of the general population, showing that they are more significantly affected than others. Many different factors influence this impact, ranging from economic to cultural. In this paper, these factors are shown to be connected through a causal model analyzing the effects of each factor, after which, potential interventions are suggested. Many factors are identified, such as high employment in the service industry or lower likelihood to have insurance. From this, a causal model is created showing the impact of each factor. Using this causal model, one can identify the high-impact factors causing a disparate impact as well as suggest possible interventions including making testing and treatment more accessible, reducing healthcare bias, and improving healthcare for immigrants.
本文提出从系统工程的角度分析COVID-19健康差异影响的原因和干预措施,以尽量减少对少数群体的影响。新型冠状病毒对少数民族的影响更为严重。少数民族COVID-19病例数和死亡率的百分比远高于一般人群,表明他们比其他人受到更大的影响。许多不同的因素影响这种影响,从经济到文化。本文通过建立因果模型,分析各因素的影响,表明这些因素之间存在联系,并提出潜在的干预措施。许多因素被确定,例如服务业的高就业率或较低的保险可能性。由此,创建了一个因果模型,显示每个因素的影响。使用这个因果模型,人们可以确定导致不同影响的高影响因素,并提出可能的干预措施,包括使检测和治疗更容易获得,减少医疗保健偏见,改善移民的医疗保健。
{"title":"Development of a Causal Model to Study the Disparate Effects of COVID-19 on Minorities","authors":"Misagh Faezipour, M. Faezipour, Brianna Bauman","doi":"10.1109/CSCI54926.2021.00259","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00259","url":null,"abstract":"This paper proposes a systems engineering perspective to analyze the causes of COVID-19 health disparities impact and interventions to minimize the impact on minorities. The impact of the novel coronavirus has shown to be more intense on minorities. The percentage of COVID-19 case count and fatality rate for minorities is much higher than that of the general population, showing that they are more significantly affected than others. Many different factors influence this impact, ranging from economic to cultural. In this paper, these factors are shown to be connected through a causal model analyzing the effects of each factor, after which, potential interventions are suggested. Many factors are identified, such as high employment in the service industry or lower likelihood to have insurance. From this, a causal model is created showing the impact of each factor. Using this causal model, one can identify the high-impact factors causing a disparate impact as well as suggest possible interventions including making testing and treatment more accessible, reducing healthcare bias, and improving healthcare for immigrants.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116745047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1