首页 > 最新文献

2021 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Partial Attention CenterNet for Bottom-Up Human Pose Estimation 基于自底向上人体姿态估计的部分注意力中心网络
Jiahua Wu, Hyo Jong Lee
The typical bottom-up human pose estimation methods can be divided into two steps, keypoint detection and grouping. The traditional keypoint regression-based methods exploit an effective backbone (like HRNet) and different prediction heads to acquire the body center and body joint. Then they utilize the offset between the body center and body joint to figure out the grouping task. In this paper, we first propose a body branch module and keypoint attention module to improve keypoint detection and keypoint regression. In body branch module, we exploit a multi-branch structure for keypoint detection and keypoint regression. Each branch represents a part of human body. In keypoint attention module, two simple yet reliable pooling layers are adopted to extract the attention areas of different kinds of keypoints. Combining these two modules, we propose a Partial Attention CenterNet for multi-person human pose estimation. The proposed method outperforms the traditional keypoint regression-based methods. Experiments have demonstrated the obvious performance improvements on COCO dataset brought by the introduced components.
典型的自下而上的人体姿态估计方法分为关键点检测和分组两个步骤。传统的基于关键点回归的方法利用一个有效的主干(如HRNet)和不同的预测头来获取身体中心和身体关节。然后利用身体中心和身体关节之间的偏移量来计算分组任务。在本文中,我们首先提出了身体分支模块和关键点关注模块来改进关键点检测和关键点回归。在主体分支模块中,我们采用多分支结构进行关键点检测和关键点回归。每个分支代表人体的一部分。关键点关注模块采用两个简单可靠的池化层提取不同类型关键点的关注区域。结合这两个模块,我们提出了一个用于多人姿态估计的局部注意力中心网络。该方法优于传统的基于关键点回归的方法。实验表明,引入的成分对COCO数据集的性能有明显的改善。
{"title":"Partial Attention CenterNet for Bottom-Up Human Pose Estimation","authors":"Jiahua Wu, Hyo Jong Lee","doi":"10.1109/CSCI54926.2021.00042","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00042","url":null,"abstract":"The typical bottom-up human pose estimation methods can be divided into two steps, keypoint detection and grouping. The traditional keypoint regression-based methods exploit an effective backbone (like HRNet) and different prediction heads to acquire the body center and body joint. Then they utilize the offset between the body center and body joint to figure out the grouping task. In this paper, we first propose a body branch module and keypoint attention module to improve keypoint detection and keypoint regression. In body branch module, we exploit a multi-branch structure for keypoint detection and keypoint regression. Each branch represents a part of human body. In keypoint attention module, two simple yet reliable pooling layers are adopted to extract the attention areas of different kinds of keypoints. Combining these two modules, we propose a Partial Attention CenterNet for multi-person human pose estimation. The proposed method outperforms the traditional keypoint regression-based methods. Experiments have demonstrated the obvious performance improvements on COCO dataset brought by the introduced components.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalability Evaluation of a Per-User Access Control Framework 每个用户访问控制框架的可伸缩性评估
Arata Endo, Chun-Jae Lee, S. Date
Today’s Internet of Things (IoT) devices have a variety of security requirements and policies. While an access control is applied to such devices to meet the varieties of requirements and policies, the access control has rarely been used for network resources. Due to this situation, we have proposed a per-user access control framework, which realizes the access control for network links and bandwidth as network resources by using Software-Defined Networking, in our previous work. The proposed framework enables a network administrator to apply access control to network resources simply by giving the administrator’s policy as input to the proposed framework. However, there remains the concern that the proposed framework may cause a significant overhead for the data transfers when the number of IoT devices is increased. In this paper, we investigate how scalable the proposed framework is as infrastructure, by considering the actual and practical situation where lots of IoT devices are used. Our evaluation results imply that the overhead incurred by the proposed method is negligible, especially in the case where IoT devices transfer large-sized data. Also, the evaluation results show that the proposed framework reduces the exposure time of the IoT devices to a third party.
当今的物联网(IoT)设备具有各种各样的安全需求和策略。为了满足各种需求和策略,对这些设备进行了访问控制,但对网络资源进行访问控制的情况很少。针对这种情况,我们在之前的工作中提出了一个每用户访问控制框架,利用软件定义网络实现对网络链路和带宽作为网络资源的访问控制。所建议的框架使网络管理员能够简单地通过将管理员的策略作为所建议框架的输入来对网络资源应用访问控制。然而,人们仍然担心,当物联网设备数量增加时,拟议的框架可能会导致数据传输的重大开销。在本文中,我们通过考虑使用大量物联网设备的实际和实际情况,研究了所提出的框架作为基础设施的可扩展性。我们的评估结果表明,所提出的方法所产生的开销可以忽略不计,特别是在物联网设备传输大容量数据的情况下。此外,评估结果表明,所提出的框架减少了物联网设备对第三方的暴露时间。
{"title":"Scalability Evaluation of a Per-User Access Control Framework","authors":"Arata Endo, Chun-Jae Lee, S. Date","doi":"10.1109/CSCI54926.2021.00291","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00291","url":null,"abstract":"Today’s Internet of Things (IoT) devices have a variety of security requirements and policies. While an access control is applied to such devices to meet the varieties of requirements and policies, the access control has rarely been used for network resources. Due to this situation, we have proposed a per-user access control framework, which realizes the access control for network links and bandwidth as network resources by using Software-Defined Networking, in our previous work. The proposed framework enables a network administrator to apply access control to network resources simply by giving the administrator’s policy as input to the proposed framework. However, there remains the concern that the proposed framework may cause a significant overhead for the data transfers when the number of IoT devices is increased. In this paper, we investigate how scalable the proposed framework is as infrastructure, by considering the actual and practical situation where lots of IoT devices are used. Our evaluation results imply that the overhead incurred by the proposed method is negligible, especially in the case where IoT devices transfer large-sized data. Also, the evaluation results show that the proposed framework reduces the exposure time of the IoT devices to a third party.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Edge, Fog and Cloud Computing Method for Mobile Ad-hoc Networks 移动自组织网络的优化边缘、雾和云计算方法
J. Balen, Davor Damjanović, P. Maric, Krešimir Vdovjak
The future of mobile systems relies on big data and fast information processing to improve efficiency, user experience, and system autonomy. With the massive growth of intelligent and mobile devices, along with the development of computational and communication technologies, a vast amount of data is being generated which needs to be processed and distributed as fast as possible, while reducing costs. Therefore, gathering and data processing, as well as efficient distribution of messages across the network, is the key problem of future mobile systems. In this paper, we are proposing a cost-effective method that relies on fog and edge computing principles called FOGO (FOG Optimization). The method proposes a three layer architecture that utilizes an upgraded existing infrastructure where the mobile nodes will create a fog service layer that could provide processing of medium-sized messages and the distribution of the results across the network. Furthermore, cloud computing is also considered but only in a case of necessity for a large-sized data processing. The proposed system architecture is described along with the method flowcharts, operating algorithms, and proposed message structure. Furthermore, the metrics for the system performance evaluation are proposed, as well as possible application domains.
移动系统的未来依赖于大数据和快速信息处理来提高效率、用户体验和系统自主性。随着智能和移动设备的大量增长,以及计算和通信技术的发展,产生了大量的数据,这些数据需要尽快处理和分发,同时降低成本。因此,数据的收集和处理,以及信息在网络中的有效分发,是未来移动系统的关键问题。在本文中,我们提出了一种经济有效的方法,它依赖于雾和边缘计算原理,称为FOGO (fog Optimization)。该方法提出了一个三层架构,利用升级的现有基础设施,其中移动节点将创建一个雾服务层,可以提供中型消息的处理和结果在整个网络中的分发。此外,还考虑了云计算,但仅在需要进行大规模数据处理的情况下。描述了所提出的系统架构以及方法流程图、操作算法和所提出的消息结构。此外,还提出了系统性能评估的度量标准,以及可能的应用领域。
{"title":"Optimized Edge, Fog and Cloud Computing Method for Mobile Ad-hoc Networks","authors":"J. Balen, Davor Damjanović, P. Maric, Krešimir Vdovjak","doi":"10.1109/CSCI54926.2021.00266","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00266","url":null,"abstract":"The future of mobile systems relies on big data and fast information processing to improve efficiency, user experience, and system autonomy. With the massive growth of intelligent and mobile devices, along with the development of computational and communication technologies, a vast amount of data is being generated which needs to be processed and distributed as fast as possible, while reducing costs. Therefore, gathering and data processing, as well as efficient distribution of messages across the network, is the key problem of future mobile systems. In this paper, we are proposing a cost-effective method that relies on fog and edge computing principles called FOGO (FOG Optimization). The method proposes a three layer architecture that utilizes an upgraded existing infrastructure where the mobile nodes will create a fog service layer that could provide processing of medium-sized messages and the distribution of the results across the network. Furthermore, cloud computing is also considered but only in a case of necessity for a large-sized data processing. The proposed system architecture is described along with the method flowcharts, operating algorithms, and proposed message structure. Furthermore, the metrics for the system performance evaluation are proposed, as well as possible application domains.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126220561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Safe Social Internet of Thing for Urban Mobility Services 面向城市交通服务的安全社交物联网
M. Anedda, M. Fadda, M. Farina, Roberto Girau, M. Sole, D. Giusto
Smart cities are characterized by smart heterogeneous devices that can interact and cooperate with each other by exchanging regularly big amounts of data with the big issue to treat sensitive data in a properly respectful manner, avoiding exposure to the risks that new technologies inevitably bring to the fore. This objective can only be pursued with adequate knowledge of the risks and methods of protection, for this reason in addition to producing materially functional results, it has been studied in depth the techniques of protection of personal data including the anonymization and pseud-anonymization of sensitive data. We provide the analysis of the state of the art that starts from the concepts of security and privacy and comes to an analysis of anonymization algorithms. This analysis tries to give an overview of the two fundamental issues in the field of data security: privacy, according to the European Regulation 2016 (GDPR) and the practical techniques with which it is preserved, with particular attention to anonymization algorithms: we analyze the advantages and disadvantages of the latter. The performance of the proposed solution is compared against that of a TraffictYpe-based DifferEntiated Reputation (TYDER) algorithm. This performance was evaluated in terms of QoS parameters such as delay, latency, packet loss and prediction error. The results show how MISSION outperforms TYDER in urban mobility scenario.
智慧城市的特点是智能异构设备可以通过定期交换大量数据与大问题进行交互和合作,以适当尊重的方式处理敏感数据,避免暴露于新技术不可避免地带来的风险。这一目标只有在充分了解风险和保护方法的情况下才能实现,因此,除了产生实质性的功能结果外,还深入研究了保护个人数据的技术,包括敏感数据的匿名化和伪匿名化。我们从安全和隐私的概念开始,对匿名算法进行了分析,提供了对最新技术的分析。本分析试图概述数据安全领域的两个基本问题:根据2016年欧洲法规(GDPR)的隐私和保护隐私的实用技术,特别关注匿名算法:我们分析了后者的优点和缺点。将该算法的性能与基于流量类型的差分信誉(TYDER)算法进行了比较。该性能根据QoS参数(如延迟、延迟、数据包丢失和预测误差)进行评估。结果表明MISSION在城市交通场景下优于TYDER。
{"title":"Safe Social Internet of Thing for Urban Mobility Services","authors":"M. Anedda, M. Fadda, M. Farina, Roberto Girau, M. Sole, D. Giusto","doi":"10.1109/CSCI54926.2021.00289","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00289","url":null,"abstract":"Smart cities are characterized by smart heterogeneous devices that can interact and cooperate with each other by exchanging regularly big amounts of data with the big issue to treat sensitive data in a properly respectful manner, avoiding exposure to the risks that new technologies inevitably bring to the fore. This objective can only be pursued with adequate knowledge of the risks and methods of protection, for this reason in addition to producing materially functional results, it has been studied in depth the techniques of protection of personal data including the anonymization and pseud-anonymization of sensitive data. We provide the analysis of the state of the art that starts from the concepts of security and privacy and comes to an analysis of anonymization algorithms. This analysis tries to give an overview of the two fundamental issues in the field of data security: privacy, according to the European Regulation 2016 (GDPR) and the practical techniques with which it is preserved, with particular attention to anonymization algorithms: we analyze the advantages and disadvantages of the latter. The performance of the proposed solution is compared against that of a TraffictYpe-based DifferEntiated Reputation (TYDER) algorithm. This performance was evaluated in terms of QoS parameters such as delay, latency, packet loss and prediction error. The results show how MISSION outperforms TYDER in urban mobility scenario.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129491018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employing Genetic Algorithm and Discrete Event Simulation for Flexible Job-Shop Scheduling Problem 基于遗传算法和离散事件仿真的柔性作业车间调度问题
Eman Azab, Nour El-Din Ali Said, Mohamed Nafea, Yassin Samaha, L. Shihata, M. Mashaly
In this paper, a comparative study between Genetic Algorithm and Discrete Event Simulation to solve the flexible jobshop scheduling problem is presented. Two different approaches are used to generate a flexible job-shop schedule for a pharmaceutical factory X with minimum make-span which is defined as the duration required to complete all jobs. The first approach uses Genetic Algorithm to find an optimal or near-optimal solution for the flexible job-shop problem. The second approach uses Discrete Event Simulation and predefined dispatching rules to solve the flexible job-shop problem by creating a model for the pharmaceutical factory X production line. The same case study is used to evaluate the two approaches results. The Genetic Algorithm approach showed better performance compared to the Discrete Event Simulation approach for the same case study while using different dispatching rules. Both approaches showed better performance compared to basic sequential schedule.
本文将遗传算法与离散事件仿真算法用于柔性作业车间调度问题的比较研究。使用两种不同的方法为制药厂X生成灵活的作业车间计划,该计划具有最小的生产跨度,其定义为完成所有作业所需的持续时间。第一种方法利用遗传算法寻找柔性作业车间问题的最优或近最优解。第二种方法使用离散事件仿真和预定义的调度规则,通过为制药厂X生产线创建模型来解决灵活的作业车间问题。用同一个案例研究来评价这两种方法的结果。在使用不同调度规则的情况下,遗传算法方法比离散事件模拟方法表现出更好的性能。与基本顺序调度相比,这两种方法都表现出更好的性能。
{"title":"Employing Genetic Algorithm and Discrete Event Simulation for Flexible Job-Shop Scheduling Problem","authors":"Eman Azab, Nour El-Din Ali Said, Mohamed Nafea, Yassin Samaha, L. Shihata, M. Mashaly","doi":"10.1109/CSCI54926.2021.00165","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00165","url":null,"abstract":"In this paper, a comparative study between Genetic Algorithm and Discrete Event Simulation to solve the flexible jobshop scheduling problem is presented. Two different approaches are used to generate a flexible job-shop schedule for a pharmaceutical factory X with minimum make-span which is defined as the duration required to complete all jobs. The first approach uses Genetic Algorithm to find an optimal or near-optimal solution for the flexible job-shop problem. The second approach uses Discrete Event Simulation and predefined dispatching rules to solve the flexible job-shop problem by creating a model for the pharmaceutical factory X production line. The same case study is used to evaluate the two approaches results. The Genetic Algorithm approach showed better performance compared to the Discrete Event Simulation approach for the same case study while using different dispatching rules. Both approaches showed better performance compared to basic sequential schedule.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agile Transformation for Capstone Projects: Preparing Graduates for the Job Market 顶点项目的敏捷转型:让毕业生为就业市场做好准备
M. Al-Yahya, Rana Alkadhi, H. Alrasheed
Preparing graduates for the job market is a key objective of higher education. The Information Technology (IT) department at King Saud University has adopted a strategy of program alignment with industry to ensure that program outcomes are in line with the market needs and requirements. Graduates in the field of Information Technology should be equipped with software development skills needed by industry to drive business value and deliver high quality software products and services. To this end, the IT department undertook the decision to adopt an agile transformation strategy for the final year capstone project course converting it from a waterfall software development process model to an agile approach in response to the job market need. In this paper, we present the transformation strategy, the design of the course, and discuss opportunities and challenges. Reporting our transformation experience will provide insights and guidance to those who want to undergo a similar transformation.
为毕业生就业做好准备是高等教育的一个关键目标。沙特国王大学的信息技术(IT)系采用了与行业相结合的项目战略,以确保项目成果符合市场需求和要求。资讯科技专业的毕业生应具备业界所需的软件开发技能,以推动商业价值,并提供高品质的软件产品和服务。为此,IT部门决定在最后一年的顶点项目课程中采用敏捷转换策略,将其从瀑布式软件开发过程模型转换为响应就业市场需求的敏捷方法。在本文中,我们提出了转型策略,课程设计,并讨论了机遇和挑战。报告我们的转换经验将为那些想要经历类似转换的人提供见解和指导。
{"title":"Agile Transformation for Capstone Projects: Preparing Graduates for the Job Market","authors":"M. Al-Yahya, Rana Alkadhi, H. Alrasheed","doi":"10.1109/CSCI54926.2021.00236","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00236","url":null,"abstract":"Preparing graduates for the job market is a key objective of higher education. The Information Technology (IT) department at King Saud University has adopted a strategy of program alignment with industry to ensure that program outcomes are in line with the market needs and requirements. Graduates in the field of Information Technology should be equipped with software development skills needed by industry to drive business value and deliver high quality software products and services. To this end, the IT department undertook the decision to adopt an agile transformation strategy for the final year capstone project course converting it from a waterfall software development process model to an agile approach in response to the job market need. In this paper, we present the transformation strategy, the design of the course, and discuss opportunities and challenges. Reporting our transformation experience will provide insights and guidance to those who want to undergo a similar transformation.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mechanical Anomaly Detection on an Embedded Microcontroller 基于嵌入式单片机的机械异常检测
Mansoureh Lord, Adam Kaplan
This paper explores machine learning on an embedded device to detect anomalies with sophisticated low-power neural networks. We leverage this deep learning approach to detect mechanical anomalies as they occur on a top-load washing machine. We collect normal data from balanced laundry loads and abnormal data from unbalanced laundry loads, as they are being washed by the machine. The normal data is then used to train two different neural network models: autoencoder and variational autoencoder. This model is ported to an Arduino Nano microcontroller mounted to the washing machine. Using the autoencoder model, the microcontroller detects unbalanced washing machine loads with 92% accuracy, 90% precision and 99% recall. The battery life for this autoencoder model is 20 hours on 5 V lithium batteries, which is only 14.9% less than the life of a basic LED-blink application on the same platform.
本文探讨了在嵌入式设备上使用复杂的低功耗神经网络来检测异常的机器学习。我们利用这种深度学习方法来检测高负荷洗衣机上发生的机械异常。我们从平衡的洗衣负荷中收集正常数据,从不平衡的洗衣负荷中收集异常数据,因为它们正在被机器洗涤。然后使用正常数据来训练两种不同的神经网络模型:自编码器和变分自编码器。这个模型被移植到安装在洗衣机上的Arduino Nano微控制器上。采用自编码器模型,单片机检测洗衣机负载不平衡,准确率92%,精度90%,召回率99%。这种自动编码器型号的电池寿命为5 V锂电池20小时,仅比相同平台上基本led闪烁应用的寿命少14.9%。
{"title":"Mechanical Anomaly Detection on an Embedded Microcontroller","authors":"Mansoureh Lord, Adam Kaplan","doi":"10.1109/CSCI54926.2021.00159","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00159","url":null,"abstract":"This paper explores machine learning on an embedded device to detect anomalies with sophisticated low-power neural networks. We leverage this deep learning approach to detect mechanical anomalies as they occur on a top-load washing machine. We collect normal data from balanced laundry loads and abnormal data from unbalanced laundry loads, as they are being washed by the machine. The normal data is then used to train two different neural network models: autoencoder and variational autoencoder. This model is ported to an Arduino Nano microcontroller mounted to the washing machine. Using the autoencoder model, the microcontroller detects unbalanced washing machine loads with 92% accuracy, 90% precision and 99% recall. The battery life for this autoencoder model is 20 hours on 5 V lithium batteries, which is only 14.9% less than the life of a basic LED-blink application on the same platform.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating Accuracy and Adversarial Robustness of Quanvolutional Neural Networks 评估定量神经网络的准确性和对抗鲁棒性
Korn Sooksatra, P. Rivas, J. Orduz
Machine learning can thrust technological advances and benefit different application areas. Further, with the rise of quantum computing, machine learning algorithms have begun to be implemented in a quantum environment; this is now referred to as quantum machine learning. There are several attempts to implement deep learning in quantum computers. Nevertheless, they were not entirely successful. Then, a convolutional neural network (CNN) combined with an additional quanvolutional layer was discovered and called a quanvolutional neural network (QNN). A QNN has shown a higher performance over a classical CNN. As a result, QNNs could achieve better accuracy and loss values than the classical ones and show their robustness against adversarial examples generated from their classical versions. This work aims to evaluate the accuracy, loss values, and adversarial robustness of QNNs compared to CNNs.
机器学习可以推动技术进步,并使不同的应用领域受益。此外,随着量子计算的兴起,机器学习算法已经开始在量子环境中实现;这就是现在所说的量子机器学习。有几个尝试在量子计算机中实现深度学习。然而,他们并没有完全成功。然后,发现了一个卷积神经网络(CNN)与一个额外的量子层结合,并称为量子神经网络(QNN)。QNN比经典CNN表现出了更高的性能。因此,qnn可以获得比经典版本更好的精度和损失值,并且对由经典版本生成的对抗性示例显示出鲁棒性。这项工作旨在评估与cnn相比,qnn的准确性、损失值和对抗鲁棒性。
{"title":"Evaluating Accuracy and Adversarial Robustness of Quanvolutional Neural Networks","authors":"Korn Sooksatra, P. Rivas, J. Orduz","doi":"10.1109/CSCI54926.2021.00097","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00097","url":null,"abstract":"Machine learning can thrust technological advances and benefit different application areas. Further, with the rise of quantum computing, machine learning algorithms have begun to be implemented in a quantum environment; this is now referred to as quantum machine learning. There are several attempts to implement deep learning in quantum computers. Nevertheless, they were not entirely successful. Then, a convolutional neural network (CNN) combined with an additional quanvolutional layer was discovered and called a quanvolutional neural network (QNN). A QNN has shown a higher performance over a classical CNN. As a result, QNNs could achieve better accuracy and loss values than the classical ones and show their robustness against adversarial examples generated from their classical versions. This work aims to evaluate the accuracy, loss values, and adversarial robustness of QNNs compared to CNNs.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced cybersecurity for safe smart world 加强网络安全,打造安全智能世界
Choong-soo Han
Unfortunately, convenience is getting more overemphasized, the risk of smart world is getting more neglected. Smart worlds like smart cities, smart homes, smart factories, smart traffics are making web-based IT systems more and more. Many research papers tells us that web-based IT systems are fundamentally vulnerable. Truly, it is very difficult to defend against every cyber attack. Definitely, it is impossible to think about safe smart world without cybersecurity. It is really needed to reduce the risk of smart world. If access from overseas is not necessary, blocking cyber threats from abroad is the best way to reduce the risk of cyber infringements for smart world.
不幸的是,人们越来越过分强调便利性,而忽视了智能世界的风险。智能城市、智能家居、智能工厂、智能交通等智能世界正在使基于网络的IT系统越来越多。许多研究报告告诉我们,基于web的IT系统从根本上是脆弱的。的确,要抵御每一次网络攻击是非常困难的。当然,没有网络安全,就不可能想象一个安全的智能世界。降低智能世界的风险是非常必要的。如果不需要从海外访问,阻止来自国外的网络威胁是减少智能世界网络侵权风险的最佳途径。
{"title":"Enhanced cybersecurity for safe smart world","authors":"Choong-soo Han","doi":"10.1109/CSCI54926.2021.00078","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00078","url":null,"abstract":"Unfortunately, convenience is getting more overemphasized, the risk of smart world is getting more neglected. Smart worlds like smart cities, smart homes, smart factories, smart traffics are making web-based IT systems more and more. Many research papers tells us that web-based IT systems are fundamentally vulnerable. Truly, it is very difficult to defend against every cyber attack. Definitely, it is impossible to think about safe smart world without cybersecurity. It is really needed to reduce the risk of smart world. If access from overseas is not necessary, blocking cyber threats from abroad is the best way to reduce the risk of cyber infringements for smart world.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130085403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Mental Challenges of Emergency Remote Learning: UAE Engineering Students Case Study 紧急远程学习的心理挑战:阿联酋工程学生案例研究
Sara Suleymanova, A. Gawanmeh, W. Mansoor
Student mental health in higher education has been an increasing concern. The COVID-19 pandemic situation has brought this vulnerable population into renewed focus. Governments had to close several sections, including educational institutes and universities, around the world suddenly in March 2020. Hence, emergency remote learning was adopted as alternative and as an immediate response to the ongoing situation using whatever available online tools. As a result, both students and instructors were forced to adapt to this new situation. While there were several studies that addressed several issues related to preparation, contents, course delivery, readiness, etc., there are few ones that were intended to address the mental challenges resulted from the shift to emergency remote learning. The main motivation behind this study is to understand the mental challenges and effects of the sudden transformation into emergency remote learning considering engineering students as case study and improve the delivery and experience of learning for both the instructors and the students.
高校学生心理健康问题日益受到关注。2019冠状病毒病大流行使这一弱势群体再次受到关注。2020年3月,世界各国政府不得不突然关闭包括教育机构和大学在内的多个部门。因此,采用紧急远程学习作为替代办法,并利用任何可用的在线工具作为对当前局势的即时反应。因此,学生和教师都被迫适应这种新形势。虽然有几项研究解决了与准备、内容、课程交付、准备等有关的若干问题,但很少有研究旨在解决转向紧急远程学习所带来的心理挑战。本研究的主要动机是了解突然转变为紧急远程学习的心理挑战和影响,并以工程学生为案例研究,改善教师和学生的学习交付和体验。
{"title":"The Mental Challenges of Emergency Remote Learning: UAE Engineering Students Case Study","authors":"Sara Suleymanova, A. Gawanmeh, W. Mansoor","doi":"10.1109/CSCI54926.2021.00211","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00211","url":null,"abstract":"Student mental health in higher education has been an increasing concern. The COVID-19 pandemic situation has brought this vulnerable population into renewed focus. Governments had to close several sections, including educational institutes and universities, around the world suddenly in March 2020. Hence, emergency remote learning was adopted as alternative and as an immediate response to the ongoing situation using whatever available online tools. As a result, both students and instructors were forced to adapt to this new situation. While there were several studies that addressed several issues related to preparation, contents, course delivery, readiness, etc., there are few ones that were intended to address the mental challenges resulted from the shift to emergency remote learning. The main motivation behind this study is to understand the mental challenges and effects of the sudden transformation into emergency remote learning considering engineering students as case study and improve the delivery and experience of learning for both the instructors and the students.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1