首页 > 最新文献

2021 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Undergraduate In-class Research Experience for Computer Architecture Students 计算机体系结构专业本科生课堂研究经验
Muhittin Yilmaz
This study presents a hands-on research experience for undergraduate senior-level computer architecture course students. The students have investigated scientific research process, literature review approaches, technical writing as well as blind-review principles, and conducted hands-on research on three different computer systems, namely, a supercomputer, an office desktop, and an autonomous vehicle artificial intelligence computer systems, for a budget-constrained final computer configuration of an office desktop computer.The final student team outcomes, relevant feedback, and the corresponding surveys, evaluated by the project administrators, strongly imply the success of the project for an effective research component inclusion in an undergraduate course.
本研究为计算机体系结构本科高级课程的学生提供了一个动手研究的经验。学生们调查了科学研究过程、文献综述方法、技术写作和盲评原则,并在三种不同的计算机系统上进行了实践研究,即超级计算机、办公桌面计算机和自动驾驶汽车人工智能计算机系统,以实现预算有限的办公桌面计算机的最终计算机配置。最终的学生团队成果、相关反馈和相应的调查,由项目管理者评估,强烈暗示了项目的成功,有效地将研究组成部分纳入本科课程。
{"title":"Undergraduate In-class Research Experience for Computer Architecture Students","authors":"Muhittin Yilmaz","doi":"10.1109/CSCI54926.2021.00218","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00218","url":null,"abstract":"This study presents a hands-on research experience for undergraduate senior-level computer architecture course students. The students have investigated scientific research process, literature review approaches, technical writing as well as blind-review principles, and conducted hands-on research on three different computer systems, namely, a supercomputer, an office desktop, and an autonomous vehicle artificial intelligence computer systems, for a budget-constrained final computer configuration of an office desktop computer.The final student team outcomes, relevant feedback, and the corresponding surveys, evaluated by the project administrators, strongly imply the success of the project for an effective research component inclusion in an undergraduate course.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116509889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOBDroid2: An Improved Feature Selection Method for Detecting Malicious Applications in a Mobile Cloud Computing Environment MOBDroid2:一种改进的移动云计算环境下恶意应用检测特征选择方法
Noah Oghenefego Ogwara, K. Petrova, M. Yang
This paper presents an ensemble machine learning (ML) based system for the detection of malicious applications in the Mobile Cloud Computing (MCC) Environment. The proposed system named MOBDroid2 applies a static feature analysis approach using the permissions and intents demanded by Android apps. The experiments conducted showed that the proposed system was able to effectively detect malicious and benign apps, achieving a classification accuracy rate of 98.16%, a precision rate of 98.95%, a recall rate of 98.20%, and a false alarm rate of 1.85%. The results obtained in our experiment compared well with other results reported in extant literature.
本文提出了一种基于集成机器学习(ML)的移动云计算(MCC)环境中恶意应用检测系统。提出的MOBDroid2系统采用了一种静态特征分析方法,使用Android应用程序所需的权限和意图。实验表明,该系统能够有效地检测出恶意和良性应用,分类准确率为98.16%,准确率为98.95%,召回率为98.20%,误报率为1.85%。我们的实验结果与现有文献报道的其他结果比较好。
{"title":"MOBDroid2: An Improved Feature Selection Method for Detecting Malicious Applications in a Mobile Cloud Computing Environment","authors":"Noah Oghenefego Ogwara, K. Petrova, M. Yang","doi":"10.1109/CSCI54926.2021.00137","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00137","url":null,"abstract":"This paper presents an ensemble machine learning (ML) based system for the detection of malicious applications in the Mobile Cloud Computing (MCC) Environment. The proposed system named MOBDroid2 applies a static feature analysis approach using the permissions and intents demanded by Android apps. The experiments conducted showed that the proposed system was able to effectively detect malicious and benign apps, achieving a classification accuracy rate of 98.16%, a precision rate of 98.95%, a recall rate of 98.20%, and a false alarm rate of 1.85%. The results obtained in our experiment compared well with other results reported in extant literature.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115396675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partial Attention CenterNet for Bottom-Up Human Pose Estimation 基于自底向上人体姿态估计的部分注意力中心网络
Jiahua Wu, Hyo Jong Lee
The typical bottom-up human pose estimation methods can be divided into two steps, keypoint detection and grouping. The traditional keypoint regression-based methods exploit an effective backbone (like HRNet) and different prediction heads to acquire the body center and body joint. Then they utilize the offset between the body center and body joint to figure out the grouping task. In this paper, we first propose a body branch module and keypoint attention module to improve keypoint detection and keypoint regression. In body branch module, we exploit a multi-branch structure for keypoint detection and keypoint regression. Each branch represents a part of human body. In keypoint attention module, two simple yet reliable pooling layers are adopted to extract the attention areas of different kinds of keypoints. Combining these two modules, we propose a Partial Attention CenterNet for multi-person human pose estimation. The proposed method outperforms the traditional keypoint regression-based methods. Experiments have demonstrated the obvious performance improvements on COCO dataset brought by the introduced components.
典型的自下而上的人体姿态估计方法分为关键点检测和分组两个步骤。传统的基于关键点回归的方法利用一个有效的主干(如HRNet)和不同的预测头来获取身体中心和身体关节。然后利用身体中心和身体关节之间的偏移量来计算分组任务。在本文中,我们首先提出了身体分支模块和关键点关注模块来改进关键点检测和关键点回归。在主体分支模块中,我们采用多分支结构进行关键点检测和关键点回归。每个分支代表人体的一部分。关键点关注模块采用两个简单可靠的池化层提取不同类型关键点的关注区域。结合这两个模块,我们提出了一个用于多人姿态估计的局部注意力中心网络。该方法优于传统的基于关键点回归的方法。实验表明,引入的成分对COCO数据集的性能有明显的改善。
{"title":"Partial Attention CenterNet for Bottom-Up Human Pose Estimation","authors":"Jiahua Wu, Hyo Jong Lee","doi":"10.1109/CSCI54926.2021.00042","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00042","url":null,"abstract":"The typical bottom-up human pose estimation methods can be divided into two steps, keypoint detection and grouping. The traditional keypoint regression-based methods exploit an effective backbone (like HRNet) and different prediction heads to acquire the body center and body joint. Then they utilize the offset between the body center and body joint to figure out the grouping task. In this paper, we first propose a body branch module and keypoint attention module to improve keypoint detection and keypoint regression. In body branch module, we exploit a multi-branch structure for keypoint detection and keypoint regression. Each branch represents a part of human body. In keypoint attention module, two simple yet reliable pooling layers are adopted to extract the attention areas of different kinds of keypoints. Combining these two modules, we propose a Partial Attention CenterNet for multi-person human pose estimation. The proposed method outperforms the traditional keypoint regression-based methods. Experiments have demonstrated the obvious performance improvements on COCO dataset brought by the introduced components.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalability Evaluation of a Per-User Access Control Framework 每个用户访问控制框架的可伸缩性评估
Arata Endo, Chun-Jae Lee, S. Date
Today’s Internet of Things (IoT) devices have a variety of security requirements and policies. While an access control is applied to such devices to meet the varieties of requirements and policies, the access control has rarely been used for network resources. Due to this situation, we have proposed a per-user access control framework, which realizes the access control for network links and bandwidth as network resources by using Software-Defined Networking, in our previous work. The proposed framework enables a network administrator to apply access control to network resources simply by giving the administrator’s policy as input to the proposed framework. However, there remains the concern that the proposed framework may cause a significant overhead for the data transfers when the number of IoT devices is increased. In this paper, we investigate how scalable the proposed framework is as infrastructure, by considering the actual and practical situation where lots of IoT devices are used. Our evaluation results imply that the overhead incurred by the proposed method is negligible, especially in the case where IoT devices transfer large-sized data. Also, the evaluation results show that the proposed framework reduces the exposure time of the IoT devices to a third party.
当今的物联网(IoT)设备具有各种各样的安全需求和策略。为了满足各种需求和策略,对这些设备进行了访问控制,但对网络资源进行访问控制的情况很少。针对这种情况,我们在之前的工作中提出了一个每用户访问控制框架,利用软件定义网络实现对网络链路和带宽作为网络资源的访问控制。所建议的框架使网络管理员能够简单地通过将管理员的策略作为所建议框架的输入来对网络资源应用访问控制。然而,人们仍然担心,当物联网设备数量增加时,拟议的框架可能会导致数据传输的重大开销。在本文中,我们通过考虑使用大量物联网设备的实际和实际情况,研究了所提出的框架作为基础设施的可扩展性。我们的评估结果表明,所提出的方法所产生的开销可以忽略不计,特别是在物联网设备传输大容量数据的情况下。此外,评估结果表明,所提出的框架减少了物联网设备对第三方的暴露时间。
{"title":"Scalability Evaluation of a Per-User Access Control Framework","authors":"Arata Endo, Chun-Jae Lee, S. Date","doi":"10.1109/CSCI54926.2021.00291","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00291","url":null,"abstract":"Today’s Internet of Things (IoT) devices have a variety of security requirements and policies. While an access control is applied to such devices to meet the varieties of requirements and policies, the access control has rarely been used for network resources. Due to this situation, we have proposed a per-user access control framework, which realizes the access control for network links and bandwidth as network resources by using Software-Defined Networking, in our previous work. The proposed framework enables a network administrator to apply access control to network resources simply by giving the administrator’s policy as input to the proposed framework. However, there remains the concern that the proposed framework may cause a significant overhead for the data transfers when the number of IoT devices is increased. In this paper, we investigate how scalable the proposed framework is as infrastructure, by considering the actual and practical situation where lots of IoT devices are used. Our evaluation results imply that the overhead incurred by the proposed method is negligible, especially in the case where IoT devices transfer large-sized data. Also, the evaluation results show that the proposed framework reduces the exposure time of the IoT devices to a third party.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanical Anomaly Detection on an Embedded Microcontroller 基于嵌入式单片机的机械异常检测
Mansoureh Lord, Adam Kaplan
This paper explores machine learning on an embedded device to detect anomalies with sophisticated low-power neural networks. We leverage this deep learning approach to detect mechanical anomalies as they occur on a top-load washing machine. We collect normal data from balanced laundry loads and abnormal data from unbalanced laundry loads, as they are being washed by the machine. The normal data is then used to train two different neural network models: autoencoder and variational autoencoder. This model is ported to an Arduino Nano microcontroller mounted to the washing machine. Using the autoencoder model, the microcontroller detects unbalanced washing machine loads with 92% accuracy, 90% precision and 99% recall. The battery life for this autoencoder model is 20 hours on 5 V lithium batteries, which is only 14.9% less than the life of a basic LED-blink application on the same platform.
本文探讨了在嵌入式设备上使用复杂的低功耗神经网络来检测异常的机器学习。我们利用这种深度学习方法来检测高负荷洗衣机上发生的机械异常。我们从平衡的洗衣负荷中收集正常数据,从不平衡的洗衣负荷中收集异常数据,因为它们正在被机器洗涤。然后使用正常数据来训练两种不同的神经网络模型:自编码器和变分自编码器。这个模型被移植到安装在洗衣机上的Arduino Nano微控制器上。采用自编码器模型,单片机检测洗衣机负载不平衡,准确率92%,精度90%,召回率99%。这种自动编码器型号的电池寿命为5 V锂电池20小时,仅比相同平台上基本led闪烁应用的寿命少14.9%。
{"title":"Mechanical Anomaly Detection on an Embedded Microcontroller","authors":"Mansoureh Lord, Adam Kaplan","doi":"10.1109/CSCI54926.2021.00159","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00159","url":null,"abstract":"This paper explores machine learning on an embedded device to detect anomalies with sophisticated low-power neural networks. We leverage this deep learning approach to detect mechanical anomalies as they occur on a top-load washing machine. We collect normal data from balanced laundry loads and abnormal data from unbalanced laundry loads, as they are being washed by the machine. The normal data is then used to train two different neural network models: autoencoder and variational autoencoder. This model is ported to an Arduino Nano microcontroller mounted to the washing machine. Using the autoencoder model, the microcontroller detects unbalanced washing machine loads with 92% accuracy, 90% precision and 99% recall. The battery life for this autoencoder model is 20 hours on 5 V lithium batteries, which is only 14.9% less than the life of a basic LED-blink application on the same platform.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating Accuracy and Adversarial Robustness of Quanvolutional Neural Networks 评估定量神经网络的准确性和对抗鲁棒性
Korn Sooksatra, P. Rivas, J. Orduz
Machine learning can thrust technological advances and benefit different application areas. Further, with the rise of quantum computing, machine learning algorithms have begun to be implemented in a quantum environment; this is now referred to as quantum machine learning. There are several attempts to implement deep learning in quantum computers. Nevertheless, they were not entirely successful. Then, a convolutional neural network (CNN) combined with an additional quanvolutional layer was discovered and called a quanvolutional neural network (QNN). A QNN has shown a higher performance over a classical CNN. As a result, QNNs could achieve better accuracy and loss values than the classical ones and show their robustness against adversarial examples generated from their classical versions. This work aims to evaluate the accuracy, loss values, and adversarial robustness of QNNs compared to CNNs.
机器学习可以推动技术进步,并使不同的应用领域受益。此外,随着量子计算的兴起,机器学习算法已经开始在量子环境中实现;这就是现在所说的量子机器学习。有几个尝试在量子计算机中实现深度学习。然而,他们并没有完全成功。然后,发现了一个卷积神经网络(CNN)与一个额外的量子层结合,并称为量子神经网络(QNN)。QNN比经典CNN表现出了更高的性能。因此,qnn可以获得比经典版本更好的精度和损失值,并且对由经典版本生成的对抗性示例显示出鲁棒性。这项工作旨在评估与cnn相比,qnn的准确性、损失值和对抗鲁棒性。
{"title":"Evaluating Accuracy and Adversarial Robustness of Quanvolutional Neural Networks","authors":"Korn Sooksatra, P. Rivas, J. Orduz","doi":"10.1109/CSCI54926.2021.00097","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00097","url":null,"abstract":"Machine learning can thrust technological advances and benefit different application areas. Further, with the rise of quantum computing, machine learning algorithms have begun to be implemented in a quantum environment; this is now referred to as quantum machine learning. There are several attempts to implement deep learning in quantum computers. Nevertheless, they were not entirely successful. Then, a convolutional neural network (CNN) combined with an additional quanvolutional layer was discovered and called a quanvolutional neural network (QNN). A QNN has shown a higher performance over a classical CNN. As a result, QNNs could achieve better accuracy and loss values than the classical ones and show their robustness against adversarial examples generated from their classical versions. This work aims to evaluate the accuracy, loss values, and adversarial robustness of QNNs compared to CNNs.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence in Support of Welfare Monitoring of Dairy Cattle: A Systematic Literature Review 人工智能支持奶牛福利监测:系统文献综述
Lucas Mendes Lima, Victor Calebe Cavalcante, Mariana Guimarães de Sousa, Cláudio Afonso Fleury, D. Oliveira, Eduardo Noronha de Andrade Freitas
Context: Although agribusiness corresponded to more than 20% of Brazil’s Gross Domestic Product (GDP), most livestock is under manual control and manual monitoring. Additionally, alternative technologies are either uncomfortable and stressful, or expensive. Now, despite the great scientific advances in the area, there is still a pressing need for an automated robust, inexpensive and (sub)optimal technology to monitor animal behavior in a cost-effective, contact-less and stress-free fashion. Overall, this niche can leverage the benefits of Deep Learning schemes.Objective: This review aims to provide a systematic overview of most current projects in the area of comfort monitoring dairy cattle, as well as their corresponding image recognition-based techniques and technologies.Methods: First, a systematic review planning was carried out, and objectives, research questions, search strings, among others, were defined. Subsequently,a broad survey was conducted to extract, analyze and compile the data, to generate a easy-to-read visual source of information (tables and graphics).Results: Information was extracted from the reviewed papers. Among this data collected from the papers are techniques utilized, target behaviors, cow bodyparts identified in visual computational, besides their paper source font, the publication date, and localization. For example, the papers present are mostly recent. China has had a larger number of relevant papers in the area. The back was the body region most analyzed by the papers and the behaviors most analyzed were body condition score, lameness, cow’s body position and feeding/drinking behavior. Among the methods used is RCNN Inception V3 with the best accuracy for cow’s back region.Conclusion: The aim of this work is to present some of the papers that are being carried out in the area of dairy cow behavior monitoring, using techniques of Artifical Intelligence. It is expected that the information collected and presented in the present systematic review paper contribute to the future researches and projects of the area and the application of new techniques.
背景:尽管农业综合企业占巴西国内生产总值(GDP)的20%以上,但大多数牲畜仍处于人工控制和人工监测之下。此外,替代技术要么不舒服、压力大,要么价格昂贵。现在,尽管该领域取得了巨大的科学进步,但仍然迫切需要一种自动化的、强大的、廉价的、(次)最佳的技术来监测动物的行为,这种技术具有成本效益,无接触和无压力的方式。总的来说,这个利基可以利用深度学习方案的好处。目的:系统综述了奶牛舒适度监测领域的最新研究项目及其相应的基于图像识别的技术和技术。方法:首先,进行系统的综述计划,确定研究目标、研究问题、检索字符串等。随后,进行了广泛的调查,以提取、分析和汇编数据,生成易于阅读的视觉信息源(表格和图形)。结果:从综述论文中提取信息。从论文中收集的数据除了论文的来源字体、出版日期和定位外,还包括所使用的技术、目标行为、在视觉计算中识别的牛身体部位。例如,现在的论文大多是最近的。中国在这一领域的相关论文比较多。分析最多的身体部位是背部,分析最多的行为是身体状况评分、跛行、奶牛体位和喂养/饮水行为。使用的方法中,RCNN Inception V3对奶牛背部区域的准确度最好。结论:本工作的目的是介绍一些在奶牛行为监测领域正在进行的论文,使用人工智能技术。期望本系统综述所收集和提供的信息有助于该领域未来的研究和项目以及新技术的应用。
{"title":"Artificial Intelligence in Support of Welfare Monitoring of Dairy Cattle: A Systematic Literature Review","authors":"Lucas Mendes Lima, Victor Calebe Cavalcante, Mariana Guimarães de Sousa, Cláudio Afonso Fleury, D. Oliveira, Eduardo Noronha de Andrade Freitas","doi":"10.1109/CSCI54926.2021.00324","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00324","url":null,"abstract":"Context: Although agribusiness corresponded to more than 20% of Brazil’s Gross Domestic Product (GDP), most livestock is under manual control and manual monitoring. Additionally, alternative technologies are either uncomfortable and stressful, or expensive. Now, despite the great scientific advances in the area, there is still a pressing need for an automated robust, inexpensive and (sub)optimal technology to monitor animal behavior in a cost-effective, contact-less and stress-free fashion. Overall, this niche can leverage the benefits of Deep Learning schemes.Objective: This review aims to provide a systematic overview of most current projects in the area of comfort monitoring dairy cattle, as well as their corresponding image recognition-based techniques and technologies.Methods: First, a systematic review planning was carried out, and objectives, research questions, search strings, among others, were defined. Subsequently,a broad survey was conducted to extract, analyze and compile the data, to generate a easy-to-read visual source of information (tables and graphics).Results: Information was extracted from the reviewed papers. Among this data collected from the papers are techniques utilized, target behaviors, cow bodyparts identified in visual computational, besides their paper source font, the publication date, and localization. For example, the papers present are mostly recent. China has had a larger number of relevant papers in the area. The back was the body region most analyzed by the papers and the behaviors most analyzed were body condition score, lameness, cow’s body position and feeding/drinking behavior. Among the methods used is RCNN Inception V3 with the best accuracy for cow’s back region.Conclusion: The aim of this work is to present some of the papers that are being carried out in the area of dairy cow behavior monitoring, using techniques of Artifical Intelligence. It is expected that the information collected and presented in the present systematic review paper contribute to the future researches and projects of the area and the application of new techniques.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115660002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Agile Transformation for Capstone Projects: Preparing Graduates for the Job Market 顶点项目的敏捷转型:让毕业生为就业市场做好准备
M. Al-Yahya, Rana Alkadhi, H. Alrasheed
Preparing graduates for the job market is a key objective of higher education. The Information Technology (IT) department at King Saud University has adopted a strategy of program alignment with industry to ensure that program outcomes are in line with the market needs and requirements. Graduates in the field of Information Technology should be equipped with software development skills needed by industry to drive business value and deliver high quality software products and services. To this end, the IT department undertook the decision to adopt an agile transformation strategy for the final year capstone project course converting it from a waterfall software development process model to an agile approach in response to the job market need. In this paper, we present the transformation strategy, the design of the course, and discuss opportunities and challenges. Reporting our transformation experience will provide insights and guidance to those who want to undergo a similar transformation.
为毕业生就业做好准备是高等教育的一个关键目标。沙特国王大学的信息技术(IT)系采用了与行业相结合的项目战略,以确保项目成果符合市场需求和要求。资讯科技专业的毕业生应具备业界所需的软件开发技能,以推动商业价值,并提供高品质的软件产品和服务。为此,IT部门决定在最后一年的顶点项目课程中采用敏捷转换策略,将其从瀑布式软件开发过程模型转换为响应就业市场需求的敏捷方法。在本文中,我们提出了转型策略,课程设计,并讨论了机遇和挑战。报告我们的转换经验将为那些想要经历类似转换的人提供见解和指导。
{"title":"Agile Transformation for Capstone Projects: Preparing Graduates for the Job Market","authors":"M. Al-Yahya, Rana Alkadhi, H. Alrasheed","doi":"10.1109/CSCI54926.2021.00236","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00236","url":null,"abstract":"Preparing graduates for the job market is a key objective of higher education. The Information Technology (IT) department at King Saud University has adopted a strategy of program alignment with industry to ensure that program outcomes are in line with the market needs and requirements. Graduates in the field of Information Technology should be equipped with software development skills needed by industry to drive business value and deliver high quality software products and services. To this end, the IT department undertook the decision to adopt an agile transformation strategy for the final year capstone project course converting it from a waterfall software development process model to an agile approach in response to the job market need. In this paper, we present the transformation strategy, the design of the course, and discuss opportunities and challenges. Reporting our transformation experience will provide insights and guidance to those who want to undergo a similar transformation.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Employing Genetic Algorithm and Discrete Event Simulation for Flexible Job-Shop Scheduling Problem 基于遗传算法和离散事件仿真的柔性作业车间调度问题
Eman Azab, Nour El-Din Ali Said, Mohamed Nafea, Yassin Samaha, L. Shihata, M. Mashaly
In this paper, a comparative study between Genetic Algorithm and Discrete Event Simulation to solve the flexible jobshop scheduling problem is presented. Two different approaches are used to generate a flexible job-shop schedule for a pharmaceutical factory X with minimum make-span which is defined as the duration required to complete all jobs. The first approach uses Genetic Algorithm to find an optimal or near-optimal solution for the flexible job-shop problem. The second approach uses Discrete Event Simulation and predefined dispatching rules to solve the flexible job-shop problem by creating a model for the pharmaceutical factory X production line. The same case study is used to evaluate the two approaches results. The Genetic Algorithm approach showed better performance compared to the Discrete Event Simulation approach for the same case study while using different dispatching rules. Both approaches showed better performance compared to basic sequential schedule.
本文将遗传算法与离散事件仿真算法用于柔性作业车间调度问题的比较研究。使用两种不同的方法为制药厂X生成灵活的作业车间计划,该计划具有最小的生产跨度,其定义为完成所有作业所需的持续时间。第一种方法利用遗传算法寻找柔性作业车间问题的最优或近最优解。第二种方法使用离散事件仿真和预定义的调度规则,通过为制药厂X生产线创建模型来解决灵活的作业车间问题。用同一个案例研究来评价这两种方法的结果。在使用不同调度规则的情况下,遗传算法方法比离散事件模拟方法表现出更好的性能。与基本顺序调度相比,这两种方法都表现出更好的性能。
{"title":"Employing Genetic Algorithm and Discrete Event Simulation for Flexible Job-Shop Scheduling Problem","authors":"Eman Azab, Nour El-Din Ali Said, Mohamed Nafea, Yassin Samaha, L. Shihata, M. Mashaly","doi":"10.1109/CSCI54926.2021.00165","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00165","url":null,"abstract":"In this paper, a comparative study between Genetic Algorithm and Discrete Event Simulation to solve the flexible jobshop scheduling problem is presented. Two different approaches are used to generate a flexible job-shop schedule for a pharmaceutical factory X with minimum make-span which is defined as the duration required to complete all jobs. The first approach uses Genetic Algorithm to find an optimal or near-optimal solution for the flexible job-shop problem. The second approach uses Discrete Event Simulation and predefined dispatching rules to solve the flexible job-shop problem by creating a model for the pharmaceutical factory X production line. The same case study is used to evaluate the two approaches results. The Genetic Algorithm approach showed better performance compared to the Discrete Event Simulation approach for the same case study while using different dispatching rules. Both approaches showed better performance compared to basic sequential schedule.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Platform Neutrality and the Global Balance of Powers 平台中立与全球力量平衡
Marcel S. Stolz
This paper defines platform neutrality as a concept for large technology companies, most notably, social media platform providers. It is deduced from the concept of state neutrality, and acknowledges societal and political functions as well as state-like structures these companies have put into place. The paper argues that recent developments demonstrate a convergence of social media towards platform neutrality. It explains the benefit of platform neutrality both for businesses as well as societies.
本文将平台中立性定义为大型科技公司,尤其是社交媒体平台提供商的概念。它是从国家中立的概念推导出来的,并承认这些公司已经实施的社会和政治功能以及类似国家的结构。本文认为,最近的发展表明,社交媒体正在向平台中立性靠拢。它解释了平台中立性对企业和社会的好处。
{"title":"Platform Neutrality and the Global Balance of Powers","authors":"Marcel S. Stolz","doi":"10.1109/CSCI54926.2021.00278","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00278","url":null,"abstract":"This paper defines platform neutrality as a concept for large technology companies, most notably, social media platform providers. It is deduced from the concept of state neutrality, and acknowledges societal and political functions as well as state-like structures these companies have put into place. The paper argues that recent developments demonstrate a convergence of social media towards platform neutrality. It explains the benefit of platform neutrality both for businesses as well as societies.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1