首页 > 最新文献

2021 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Kabuki Explanation System Based on User’s Knowledge and Interests 基于用户知识和兴趣的歌舞伎解释系统
Miku Kawai, Jumpei Ono, Takashi Ogata
This paper introduces the generation of explanations for a stage-performing structural simulation system using the animation of kabuki dance that we have developed. After considering the explanation function in the context of narratives and kabuki knowledge, we present a mechanism in the aforementioned system that automatically determines the content and method of an explanation according to the degree of the user’s interest and knowledge. Through this trial, we consider effective explanation methods for narrative generation and, in this study, the use of kabuki-related knowledge.
本文介绍了我们开发的利用歌舞伎动画的舞台表演结构模拟系统的生成解释。在考虑叙述和歌舞伎知识背景下的解释功能后,我们在上述系统中提出了一种机制,根据用户的兴趣和知识程度自动确定解释的内容和方法。通过这一尝试,我们考虑了叙事生成的有效解释方法,并在本研究中使用了与歌舞伎相关的知识。
{"title":"Kabuki Explanation System Based on User’s Knowledge and Interests","authors":"Miku Kawai, Jumpei Ono, Takashi Ogata","doi":"10.1109/CSCI54926.2021.00147","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00147","url":null,"abstract":"This paper introduces the generation of explanations for a stage-performing structural simulation system using the animation of kabuki dance that we have developed. After considering the explanation function in the context of narratives and kabuki knowledge, we present a mechanism in the aforementioned system that automatically determines the content and method of an explanation according to the degree of the user’s interest and knowledge. Through this trial, we consider effective explanation methods for narrative generation and, in this study, the use of kabuki-related knowledge.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134561180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of software applications using access and actions control policies based on trust 使用基于信任的访问和操作控制策略设计软件应用程序
Marcel Danilescu, Laura Danilescu
Granting access to an organization's information resources is an issue that is the subject of numerous research works, with different approaches. This paper addresses access and action control policies based on the levels of trust given to them.The internal organization of an enterprise implies the existence of a hierarchy of departments, structured in a tree, in which data and information are circulated both ascending and descending. The staff of the organization is the one who carries out various processes, which consist of actions, workflows and/or information flows and events. In order to participate in these processes, a certain level of trust is assigned to the person. The association between the level of trust given to a person and the value of trust attributed to an object leads to the generation of policies implemented by computer applications that use access and actions control based on trust. The creation of these policies and their updating is done from a Policy Creation Point. A Policy Storage point is used to store all policies. The Document Status Point is the location where the document status matrix is located. Thus, The Document Storage Point is the space where documents are stored in electronic format. By creating them, a single point of access to policies is established for their creation and updating, a point where policies are stored, a point of storage of the workflow applied to documents and the active process, and a point of documents storage.Our paper presents, in addition to an original formal model, the use of trust gained by a member of an organization (trust calculated or attributed directly), and an example of its practical applicability in the information processes in the organization.This paper complements our previous work, which focuses on the aspects of using trust in controlling access and user interaction with information processes in the organization. This paper complements our previous work, which focuses on the aspects of using trust in controlling user access and interaction with information processes in the organization.
授予对组织信息资源的访问权是一个问题,是许多研究工作的主题,采用不同的方法。本文根据给予它们的信任级别讨论访问和操作控制策略。企业的内部组织意味着部门的层次结构的存在,以树的形式构成,其中数据和信息以上升和下降的方式传播。组织的员工是执行各种过程的人,这些过程由动作、工作流和/或信息流和事件组成。为了参与这些过程,一定程度的信任被分配给这个人。赋予一个人的信任级别和赋予一个对象的信任值之间的关联导致计算机应用程序实现的策略的生成,这些策略使用基于信任的访问和操作控制。这些策略的创建和更新是从策略创建点完成的。策略存储点用于存储所有策略。文档状态点是文档状态矩阵所在的位置。因此,文档存储点是以电子格式存储文档的空间。通过创建它们,为策略的创建和更新建立了一个访问策略的单一点、一个存储策略的点、一个应用于文档和活动流程的工作流的存储点,以及一个文档存储点。本文除了提出了一个原始的形式模型外,还介绍了组织成员获得的信任(直接计算或归属的信任)的使用,并举例说明了其在组织信息处理中的实际适用性。本文补充了我们以前的工作,其重点是在组织中使用信任来控制访问和用户与信息过程的交互。本文补充了我们以前的工作,其重点是在组织中使用信任来控制用户访问和与信息过程的交互方面。
{"title":"Design of software applications using access and actions control policies based on trust","authors":"Marcel Danilescu, Laura Danilescu","doi":"10.1109/CSCI54926.2021.00363","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00363","url":null,"abstract":"Granting access to an organization's information resources is an issue that is the subject of numerous research works, with different approaches. This paper addresses access and action control policies based on the levels of trust given to them.The internal organization of an enterprise implies the existence of a hierarchy of departments, structured in a tree, in which data and information are circulated both ascending and descending. The staff of the organization is the one who carries out various processes, which consist of actions, workflows and/or information flows and events. In order to participate in these processes, a certain level of trust is assigned to the person. The association between the level of trust given to a person and the value of trust attributed to an object leads to the generation of policies implemented by computer applications that use access and actions control based on trust. The creation of these policies and their updating is done from a Policy Creation Point. A Policy Storage point is used to store all policies. The Document Status Point is the location where the document status matrix is located. Thus, The Document Storage Point is the space where documents are stored in electronic format. By creating them, a single point of access to policies is established for their creation and updating, a point where policies are stored, a point of storage of the workflow applied to documents and the active process, and a point of documents storage.Our paper presents, in addition to an original formal model, the use of trust gained by a member of an organization (trust calculated or attributed directly), and an example of its practical applicability in the information processes in the organization.This paper complements our previous work, which focuses on the aspects of using trust in controlling access and user interaction with information processes in the organization. This paper complements our previous work, which focuses on the aspects of using trust in controlling user access and interaction with information processes in the organization.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130314875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Training Negatively Affects Fairness 对抗性训练对公平产生负面影响
Korn Sooksatra, P. Rivas
With the increasing presence of deep learning models, many applications have had significant improvements; however, they face a new vulnerability known as adversarial examples. Adversarial examples can mislead deep learning models to predict the wrong classes without human actors noticing. Recently, many works have tried to improve adversarial examples to make them stronger and more effective. However, although some researchers have invented mechanisms to defend deep learning models against adversarial examples, those mechanisms may negatively affect different measures of fairness, which are critical in practice. This work mathematically defines four fairness scores to show that training adversarially robust models can harm fairness scores. Furthermore, we empirically show that adversarial training, one of the most potent defensive mechanisms against adversarial examples, can harm them.
随着深度学习模型的出现,许多应用程序都有了显著的改进;然而,它们面临着一种新的脆弱性,即对抗性例子。对抗性示例可能会误导深度学习模型在人类演员没有注意到的情况下预测错误的类别。最近,许多工作都试图改进对抗性示例,使其更强大、更有效。然而,尽管一些研究人员已经发明了一些机制来保护深度学习模型免受对抗性示例的影响,但这些机制可能会对不同的公平指标产生负面影响,这在实践中是至关重要的。这项工作在数学上定义了四个公平分数,以表明训练对抗鲁棒模型会损害公平分数。此外,我们的经验表明,对抗性训练是对抗对抗性示例最有效的防御机制之一,可能会伤害它们。
{"title":"Adversarial Training Negatively Affects Fairness","authors":"Korn Sooksatra, P. Rivas","doi":"10.1109/CSCI54926.2021.00096","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00096","url":null,"abstract":"With the increasing presence of deep learning models, many applications have had significant improvements; however, they face a new vulnerability known as adversarial examples. Adversarial examples can mislead deep learning models to predict the wrong classes without human actors noticing. Recently, many works have tried to improve adversarial examples to make them stronger and more effective. However, although some researchers have invented mechanisms to defend deep learning models against adversarial examples, those mechanisms may negatively affect different measures of fairness, which are critical in practice. This work mathematically defines four fairness scores to show that training adversarially robust models can harm fairness scores. Furthermore, we empirically show that adversarial training, one of the most potent defensive mechanisms against adversarial examples, can harm them.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130389019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence in Support of Welfare Monitoring of Dairy Cattle: A Systematic Literature Review 人工智能支持奶牛福利监测:系统文献综述
Lucas Mendes Lima, Victor Calebe Cavalcante, Mariana Guimarães de Sousa, Cláudio Afonso Fleury, D. Oliveira, Eduardo Noronha de Andrade Freitas
Context: Although agribusiness corresponded to more than 20% of Brazil’s Gross Domestic Product (GDP), most livestock is under manual control and manual monitoring. Additionally, alternative technologies are either uncomfortable and stressful, or expensive. Now, despite the great scientific advances in the area, there is still a pressing need for an automated robust, inexpensive and (sub)optimal technology to monitor animal behavior in a cost-effective, contact-less and stress-free fashion. Overall, this niche can leverage the benefits of Deep Learning schemes.Objective: This review aims to provide a systematic overview of most current projects in the area of comfort monitoring dairy cattle, as well as their corresponding image recognition-based techniques and technologies.Methods: First, a systematic review planning was carried out, and objectives, research questions, search strings, among others, were defined. Subsequently,a broad survey was conducted to extract, analyze and compile the data, to generate a easy-to-read visual source of information (tables and graphics).Results: Information was extracted from the reviewed papers. Among this data collected from the papers are techniques utilized, target behaviors, cow bodyparts identified in visual computational, besides their paper source font, the publication date, and localization. For example, the papers present are mostly recent. China has had a larger number of relevant papers in the area. The back was the body region most analyzed by the papers and the behaviors most analyzed were body condition score, lameness, cow’s body position and feeding/drinking behavior. Among the methods used is RCNN Inception V3 with the best accuracy for cow’s back region.Conclusion: The aim of this work is to present some of the papers that are being carried out in the area of dairy cow behavior monitoring, using techniques of Artifical Intelligence. It is expected that the information collected and presented in the present systematic review paper contribute to the future researches and projects of the area and the application of new techniques.
背景:尽管农业综合企业占巴西国内生产总值(GDP)的20%以上,但大多数牲畜仍处于人工控制和人工监测之下。此外,替代技术要么不舒服、压力大,要么价格昂贵。现在,尽管该领域取得了巨大的科学进步,但仍然迫切需要一种自动化的、强大的、廉价的、(次)最佳的技术来监测动物的行为,这种技术具有成本效益,无接触和无压力的方式。总的来说,这个利基可以利用深度学习方案的好处。目的:系统综述了奶牛舒适度监测领域的最新研究项目及其相应的基于图像识别的技术和技术。方法:首先,进行系统的综述计划,确定研究目标、研究问题、检索字符串等。随后,进行了广泛的调查,以提取、分析和汇编数据,生成易于阅读的视觉信息源(表格和图形)。结果:从综述论文中提取信息。从论文中收集的数据除了论文的来源字体、出版日期和定位外,还包括所使用的技术、目标行为、在视觉计算中识别的牛身体部位。例如,现在的论文大多是最近的。中国在这一领域的相关论文比较多。分析最多的身体部位是背部,分析最多的行为是身体状况评分、跛行、奶牛体位和喂养/饮水行为。使用的方法中,RCNN Inception V3对奶牛背部区域的准确度最好。结论:本工作的目的是介绍一些在奶牛行为监测领域正在进行的论文,使用人工智能技术。期望本系统综述所收集和提供的信息有助于该领域未来的研究和项目以及新技术的应用。
{"title":"Artificial Intelligence in Support of Welfare Monitoring of Dairy Cattle: A Systematic Literature Review","authors":"Lucas Mendes Lima, Victor Calebe Cavalcante, Mariana Guimarães de Sousa, Cláudio Afonso Fleury, D. Oliveira, Eduardo Noronha de Andrade Freitas","doi":"10.1109/CSCI54926.2021.00324","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00324","url":null,"abstract":"Context: Although agribusiness corresponded to more than 20% of Brazil’s Gross Domestic Product (GDP), most livestock is under manual control and manual monitoring. Additionally, alternative technologies are either uncomfortable and stressful, or expensive. Now, despite the great scientific advances in the area, there is still a pressing need for an automated robust, inexpensive and (sub)optimal technology to monitor animal behavior in a cost-effective, contact-less and stress-free fashion. Overall, this niche can leverage the benefits of Deep Learning schemes.Objective: This review aims to provide a systematic overview of most current projects in the area of comfort monitoring dairy cattle, as well as their corresponding image recognition-based techniques and technologies.Methods: First, a systematic review planning was carried out, and objectives, research questions, search strings, among others, were defined. Subsequently,a broad survey was conducted to extract, analyze and compile the data, to generate a easy-to-read visual source of information (tables and graphics).Results: Information was extracted from the reviewed papers. Among this data collected from the papers are techniques utilized, target behaviors, cow bodyparts identified in visual computational, besides their paper source font, the publication date, and localization. For example, the papers present are mostly recent. China has had a larger number of relevant papers in the area. The back was the body region most analyzed by the papers and the behaviors most analyzed were body condition score, lameness, cow’s body position and feeding/drinking behavior. Among the methods used is RCNN Inception V3 with the best accuracy for cow’s back region.Conclusion: The aim of this work is to present some of the papers that are being carried out in the area of dairy cow behavior monitoring, using techniques of Artifical Intelligence. It is expected that the information collected and presented in the present systematic review paper contribute to the future researches and projects of the area and the application of new techniques.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115660002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Balance of Privacy and Utility with Differential Privacy Deep Learning Frameworks 差分隐私深度学习框架下隐私与效用的最优平衡
O. Kotevska, Folami T. Alamudun, Christopher Stanley
As the number of online services has increased, the amount of sensitive data being recorded is rising. Simultaneously, the decision-making process has improved by using the vast amounts of data, where machine learning has transformed entire industries. This paper addresses the development of optimal private deep neural networks and discusses the challenges associated with this task. We focus on differential privacy implementations and finding the optimal balance between accuracy and privacy, benefits and limitations of existing libraries, and challenges of applying private machine learning models in practical applications. Our analysis shows that learning rate, and privacy budget are the key factors that impact the results, and we discuss options for these settings.
随着在线服务的增加,被记录的敏感数据的数量也在增加。与此同时,通过使用大量数据,决策过程得到了改善,机器学习已经改变了整个行业。本文讨论了最优私有深度神经网络的发展,并讨论了与此任务相关的挑战。我们专注于不同的隐私实现,并在准确性和隐私之间找到最佳平衡,现有库的优点和局限性,以及在实际应用中应用私有机器学习模型的挑战。我们的分析表明,学习率和隐私预算是影响结果的关键因素,我们讨论了这些设置的选项。
{"title":"Optimal Balance of Privacy and Utility with Differential Privacy Deep Learning Frameworks","authors":"O. Kotevska, Folami T. Alamudun, Christopher Stanley","doi":"10.1109/CSCI54926.2021.00141","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00141","url":null,"abstract":"As the number of online services has increased, the amount of sensitive data being recorded is rising. Simultaneously, the decision-making process has improved by using the vast amounts of data, where machine learning has transformed entire industries. This paper addresses the development of optimal private deep neural networks and discusses the challenges associated with this task. We focus on differential privacy implementations and finding the optimal balance between accuracy and privacy, benefits and limitations of existing libraries, and challenges of applying private machine learning models in practical applications. Our analysis shows that learning rate, and privacy budget are the key factors that impact the results, and we discuss options for these settings.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114418535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of a Causal Model to Study the Disparate Effects of COVID-19 on Minorities 建立因果模型,研究COVID-19对少数民族的不同影响
Misagh Faezipour, M. Faezipour, Brianna Bauman
This paper proposes a systems engineering perspective to analyze the causes of COVID-19 health disparities impact and interventions to minimize the impact on minorities. The impact of the novel coronavirus has shown to be more intense on minorities. The percentage of COVID-19 case count and fatality rate for minorities is much higher than that of the general population, showing that they are more significantly affected than others. Many different factors influence this impact, ranging from economic to cultural. In this paper, these factors are shown to be connected through a causal model analyzing the effects of each factor, after which, potential interventions are suggested. Many factors are identified, such as high employment in the service industry or lower likelihood to have insurance. From this, a causal model is created showing the impact of each factor. Using this causal model, one can identify the high-impact factors causing a disparate impact as well as suggest possible interventions including making testing and treatment more accessible, reducing healthcare bias, and improving healthcare for immigrants.
本文提出从系统工程的角度分析COVID-19健康差异影响的原因和干预措施,以尽量减少对少数群体的影响。新型冠状病毒对少数民族的影响更为严重。少数民族COVID-19病例数和死亡率的百分比远高于一般人群,表明他们比其他人受到更大的影响。许多不同的因素影响这种影响,从经济到文化。本文通过建立因果模型,分析各因素的影响,表明这些因素之间存在联系,并提出潜在的干预措施。许多因素被确定,例如服务业的高就业率或较低的保险可能性。由此,创建了一个因果模型,显示每个因素的影响。使用这个因果模型,人们可以确定导致不同影响的高影响因素,并提出可能的干预措施,包括使检测和治疗更容易获得,减少医疗保健偏见,改善移民的医疗保健。
{"title":"Development of a Causal Model to Study the Disparate Effects of COVID-19 on Minorities","authors":"Misagh Faezipour, M. Faezipour, Brianna Bauman","doi":"10.1109/CSCI54926.2021.00259","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00259","url":null,"abstract":"This paper proposes a systems engineering perspective to analyze the causes of COVID-19 health disparities impact and interventions to minimize the impact on minorities. The impact of the novel coronavirus has shown to be more intense on minorities. The percentage of COVID-19 case count and fatality rate for minorities is much higher than that of the general population, showing that they are more significantly affected than others. Many different factors influence this impact, ranging from economic to cultural. In this paper, these factors are shown to be connected through a causal model analyzing the effects of each factor, after which, potential interventions are suggested. Many factors are identified, such as high employment in the service industry or lower likelihood to have insurance. From this, a causal model is created showing the impact of each factor. Using this causal model, one can identify the high-impact factors causing a disparate impact as well as suggest possible interventions including making testing and treatment more accessible, reducing healthcare bias, and improving healthcare for immigrants.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116745047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MOBDroid2: An Improved Feature Selection Method for Detecting Malicious Applications in a Mobile Cloud Computing Environment MOBDroid2:一种改进的移动云计算环境下恶意应用检测特征选择方法
Noah Oghenefego Ogwara, K. Petrova, M. Yang
This paper presents an ensemble machine learning (ML) based system for the detection of malicious applications in the Mobile Cloud Computing (MCC) Environment. The proposed system named MOBDroid2 applies a static feature analysis approach using the permissions and intents demanded by Android apps. The experiments conducted showed that the proposed system was able to effectively detect malicious and benign apps, achieving a classification accuracy rate of 98.16%, a precision rate of 98.95%, a recall rate of 98.20%, and a false alarm rate of 1.85%. The results obtained in our experiment compared well with other results reported in extant literature.
本文提出了一种基于集成机器学习(ML)的移动云计算(MCC)环境中恶意应用检测系统。提出的MOBDroid2系统采用了一种静态特征分析方法,使用Android应用程序所需的权限和意图。实验表明,该系统能够有效地检测出恶意和良性应用,分类准确率为98.16%,准确率为98.95%,召回率为98.20%,误报率为1.85%。我们的实验结果与现有文献报道的其他结果比较好。
{"title":"MOBDroid2: An Improved Feature Selection Method for Detecting Malicious Applications in a Mobile Cloud Computing Environment","authors":"Noah Oghenefego Ogwara, K. Petrova, M. Yang","doi":"10.1109/CSCI54926.2021.00137","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00137","url":null,"abstract":"This paper presents an ensemble machine learning (ML) based system for the detection of malicious applications in the Mobile Cloud Computing (MCC) Environment. The proposed system named MOBDroid2 applies a static feature analysis approach using the permissions and intents demanded by Android apps. The experiments conducted showed that the proposed system was able to effectively detect malicious and benign apps, achieving a classification accuracy rate of 98.16%, a precision rate of 98.95%, a recall rate of 98.20%, and a false alarm rate of 1.85%. The results obtained in our experiment compared well with other results reported in extant literature.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115396675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Meta-heuristics Approach for Solving Supply Chain Network Model under Disruption Risk 破坏风险下供应链网络模型的混合元启发式求解方法
Chuluunsukh Anudari, YoungSu Yun, M. Gen
A supply chain network (SCN) model which considers facility and route disruptions simultaneously is proposed in this paper. Since most of conventional literature have focused either on facility disruption solely or on route disruption solely, the simultaneous consideration of facility and route disruptions can improve the flexibility of the implementation in the SCN model. The SCN model under the disruptions is represented as a mathematical formulation and a hybrid meta-heuristics (GA-VNS) approach which combines genetic algorithm (GA) with variable neighborhood search (VNS) is used for the mathematical formulation. In numerical experiment, two scaled SCN models are used for comparing the performance of the GA-VNS approach with those of some conventional meta-heuristics approaches. Experimental results prove that the GA-VNS approach is more robust than conventional meta-heuristics approaches, and the flexibility of the SCN model under the disruptions are also improved.
提出了一种同时考虑设备和路线中断的供应链网络模型。由于大多数传统文献要么只关注设施中断,要么只关注路线中断,因此同时考虑设施和路线中断可以提高SCN模型实施的灵活性。将干扰下的SCN模型表示为数学表达式,并采用遗传算法和可变邻域搜索相结合的混合元启发式(GA-VNS)方法进行数学表达式。在数值实验中,利用两个尺度SCN模型比较了GA-VNS方法与一些传统的元启发式方法的性能。实验结果表明,GA-VNS方法比传统的元启发式方法具有更强的鲁棒性,同时也提高了SCN模型在干扰下的灵活性。
{"title":"Hybrid Meta-heuristics Approach for Solving Supply Chain Network Model under Disruption Risk","authors":"Chuluunsukh Anudari, YoungSu Yun, M. Gen","doi":"10.1109/CSCI54926.2021.00149","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00149","url":null,"abstract":"A supply chain network (SCN) model which considers facility and route disruptions simultaneously is proposed in this paper. Since most of conventional literature have focused either on facility disruption solely or on route disruption solely, the simultaneous consideration of facility and route disruptions can improve the flexibility of the implementation in the SCN model. The SCN model under the disruptions is represented as a mathematical formulation and a hybrid meta-heuristics (GA-VNS) approach which combines genetic algorithm (GA) with variable neighborhood search (VNS) is used for the mathematical formulation. In numerical experiment, two scaled SCN models are used for comparing the performance of the GA-VNS approach with those of some conventional meta-heuristics approaches. Experimental results prove that the GA-VNS approach is more robust than conventional meta-heuristics approaches, and the flexibility of the SCN model under the disruptions are also improved.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering Effective Learning Methods and Impact of Team-based Programming Projects in Graduate Level Courses 在研究生课程中发现有效的学习方法和基于团队的编程项目的影响
D. Ahmed
Learning can be more efficient, effective and interesting if we can identify more about our students and know how they learn. Due to COVID-19, schools and colleges are offering online classes. It has a significant impact on students’ success. Therefore, course modality and teaching pedagogy need to be taken into consideration for crafting and creating instructional experiences that make leaning appealing and effective. A number of innovative teaching methods such as active learning, hybrid learning, social learning and flipped classrooms have been proposed and tested. Practically, several methods together can be helpful for students. In this study, I conducted an experiment and identified effective learning methods for graduate level courses. According to this study, 94% students responded positively about this course design. The results also show that 83.5% students prefer face-to-face classes and 97% students find in-class problem solving effective to understand a concept better. Many courses incorporate team-based learning which is a proven approach. In this study, the benefits and limitations of team-based programming projects are identified as well as students’ opinion in this regard. The results show that 85% students prefer team-based programming projects. Surprisingly 59.1% students mentioned all members do not contribute fairly evenly. This is a common problem in group works. So, small group size could be effective to overcome this problem.
如果我们能更多地了解学生,了解他们是如何学习的,学习就会更有效率、更有效、更有趣。由于新冠肺炎疫情,学校和大学开始提供在线课程。它对学生的成功有重大影响。因此,需要考虑课程模式和教学方法,以制定和创造教学体验,使学习具有吸引力和有效性。许多创新的教学方法,如主动学习、混合学习、社会学习和翻转课堂已经被提出和测试。实际上,几种方法结合起来对学生是有帮助的。在这项研究中,我进行了一个实验,找出了有效的研究生课程学习方法。根据这项研究,94%的学生对这个课程设计有积极的反应。结果还显示,83.5%的学生更喜欢面对面的课程,97%的学生认为在课堂上解决问题对更好地理解概念有效。许多课程结合了团队学习,这是一种行之有效的方法。在本研究中,确定了基于团队的编程项目的好处和局限性,以及学生在这方面的意见。结果显示,85%的学生更喜欢以团队为基础的编程项目。令人惊讶的是,59.1%的学生认为所有成员的贡献并不公平。这是小组作业中常见的问题。因此,小团体规模可以有效地克服这个问题。
{"title":"Discovering Effective Learning Methods and Impact of Team-based Programming Projects in Graduate Level Courses","authors":"D. Ahmed","doi":"10.1109/CSCI54926.2021.00232","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00232","url":null,"abstract":"Learning can be more efficient, effective and interesting if we can identify more about our students and know how they learn. Due to COVID-19, schools and colleges are offering online classes. It has a significant impact on students’ success. Therefore, course modality and teaching pedagogy need to be taken into consideration for crafting and creating instructional experiences that make leaning appealing and effective. A number of innovative teaching methods such as active learning, hybrid learning, social learning and flipped classrooms have been proposed and tested. Practically, several methods together can be helpful for students. In this study, I conducted an experiment and identified effective learning methods for graduate level courses. According to this study, 94% students responded positively about this course design. The results also show that 83.5% students prefer face-to-face classes and 97% students find in-class problem solving effective to understand a concept better. Many courses incorporate team-based learning which is a proven approach. In this study, the benefits and limitations of team-based programming projects are identified as well as students’ opinion in this regard. The results show that 85% students prefer team-based programming projects. Surprisingly 59.1% students mentioned all members do not contribute fairly evenly. This is a common problem in group works. So, small group size could be effective to overcome this problem.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"13 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Atomic Layer Deposition Optimization Using Convolutional Neural Networks 基于卷积神经网络的原子层沉积优化
Julian Cagnazzo, Osama Sam Abuomar, A. Yanguas-Gil, J. Elam
Atomic layer deposition (ALD) is a chemical engineering process used to coat surfaces with a thin film. It is a versatile process able to deposit a wide range of films using different chemical reagents. When developing novel ALD processes, a technician must determine the dosing time of each reagent. To accelerate this development process, we trained convolutional neural networks to predict the reagent saturation times of novel ALD reactions given the reagent dosing times and film growth rates of example reactions. We generated two kinds of models. Single reaction models made predictions based on a single example ALD reaction. Multiple reaction models made predictions based on ten example reactions using the same reagents with different dosing times.
原子层沉积(ALD)是一种化学工程工艺,用于在表面上涂覆薄膜。它是一种通用的工艺,能够使用不同的化学试剂沉积各种各样的薄膜。当开发新的ALD工艺时,技术人员必须确定每种试剂的加药时间。为了加速这一开发过程,我们训练卷积神经网络来预测新的ALD反应的试剂饱和时间,给定试剂剂量时间和示例反应的膜生长速率。我们生成了两种模型。单一反应模型基于单一的ALD反应进行预测。多个反应模型根据使用相同试剂、不同给药时间的十个反应实例做出预测。
{"title":"Atomic Layer Deposition Optimization Using Convolutional Neural Networks","authors":"Julian Cagnazzo, Osama Sam Abuomar, A. Yanguas-Gil, J. Elam","doi":"10.1109/CSCI54926.2021.00110","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00110","url":null,"abstract":"Atomic layer deposition (ALD) is a chemical engineering process used to coat surfaces with a thin film. It is a versatile process able to deposit a wide range of films using different chemical reagents. When developing novel ALD processes, a technician must determine the dosing time of each reagent. To accelerate this development process, we trained convolutional neural networks to predict the reagent saturation times of novel ALD reactions given the reagent dosing times and film growth rates of example reactions. We generated two kinds of models. Single reaction models made predictions based on a single example ALD reaction. Multiple reaction models made predictions based on ten example reactions using the same reagents with different dosing times.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1