首页 > 最新文献

2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)最新文献

英文 中文
Orchestrating Apache NiFi/MiNiFi within a Spatial Data Pipeline 在空间数据管道中编排Apache NiFi/MiNiFi
Chase D. Carthen, Araam Zaremehrjardi, Vinh D. Le, Carlos Cardillo, S. Strachan, A. Tavakkoli, F. Harris, S. Dascalu
In many smart city projects, a common choice to capture spatial information is the inclusion of LiDAR data, but this decision will often invoke severe growing pains within the existing infrastructure. In this paper, we introduce a data pipeline that orchestrates Apache NiFi (NiFi), Apache MiNiFi (MiNiFi), and several other tools as an automated solution in order to relay and archive LiDAR data captured by deployed edge devices. The LiDAR sensors utilized within this workflow are Velodyne Ultra Pucks sensors that capture at a rate of 10 frames per second and produces 6-7 GB packet capture (PCAP) files per hour. By both compressing the file after capturing it and compressing the file in real-time, we discovered that gzip produced a file of 5 GB and saved about 5 minutes in transmission time to NiFi, as well as saving considerable CPU time when compressing the file in real-time. Alternatively, we chose XZ as the compression algorithm for the ingestion of LiDAR data onto an institution compute cluster due to its high compression ratio. In order to evaluate the capabilities of our system design, the features of this data pipeline were compared against existing third-party services, namely Globus and RSync.
在许多智慧城市项目中,捕获空间信息的常见选择是包含激光雷达数据,但这一决定通常会在现有基础设施中引发严重的成长烦恼。在本文中,我们介绍了一个数据管道,该管道协调Apache NiFi (NiFi), Apache MiNiFi (MiNiFi)和其他几个工具作为自动化解决方案,以便中继和存档部署的边缘设备捕获的激光雷达数据。该工作流程中使用的激光雷达传感器是Velodyne Ultra Pucks传感器,其捕获速率为每秒10帧,每小时生成6-7 GB的数据包捕获(PCAP)文件。通过捕获后压缩文件和实时压缩文件,我们发现gzip产生了一个5gb的文件,并且节省了大约5分钟的传输到NiFi的时间,并且在实时压缩文件时节省了相当多的CPU时间。另外,由于XZ的高压缩比,我们选择XZ作为将激光雷达数据摄取到机构计算集群的压缩算法。为了评估我们系统设计的能力,我们将这个数据管道的特性与现有的第三方服务,即Globus和RSync进行了比较。
{"title":"Orchestrating Apache NiFi/MiNiFi within a Spatial Data Pipeline","authors":"Chase D. Carthen, Araam Zaremehrjardi, Vinh D. Le, Carlos Cardillo, S. Strachan, A. Tavakkoli, F. Harris, S. Dascalu","doi":"10.1109/SERA57763.2023.10197731","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197731","url":null,"abstract":"In many smart city projects, a common choice to capture spatial information is the inclusion of LiDAR data, but this decision will often invoke severe growing pains within the existing infrastructure. In this paper, we introduce a data pipeline that orchestrates Apache NiFi (NiFi), Apache MiNiFi (MiNiFi), and several other tools as an automated solution in order to relay and archive LiDAR data captured by deployed edge devices. The LiDAR sensors utilized within this workflow are Velodyne Ultra Pucks sensors that capture at a rate of 10 frames per second and produces 6-7 GB packet capture (PCAP) files per hour. By both compressing the file after capturing it and compressing the file in real-time, we discovered that gzip produced a file of 5 GB and saved about 5 minutes in transmission time to NiFi, as well as saving considerable CPU time when compressing the file in real-time. Alternatively, we chose XZ as the compression algorithm for the ingestion of LiDAR data onto an institution compute cluster due to its high compression ratio. In order to evaluate the capabilities of our system design, the features of this data pipeline were compared against existing third-party services, namely Globus and RSync.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Music Genre Classification System Using Transfer Learning on a Small Dataset 基于小数据集迁移学习的新型音乐类型分类系统
Yang Wang, T. Goto, Tadaaki Kirisima, K. Tsuchida
Music is an essential "element" in our lives. With the rapid development of technology, the use of compact disks and tapes for listening various forms of music of different cultures has become obsolete. Because of the generation of considerable music data, the accurate classification of music data has become a critical topic of research, and the development of deep learning technology provides a solution for music classification. Transfer learning techniques are widely used in image recognition but are rarely used for music classification. In this study, a small music dataset is used for music classification using transfer learning.
音乐是我们生活中必不可少的“元素”。随着科技的迅速发展,用光盘和磁带来听不同文化的各种形式的音乐已经过时了。由于产生了大量的音乐数据,对音乐数据进行准确的分类已经成为一个重要的研究课题,而深度学习技术的发展为音乐分类提供了解决方案。迁移学习技术广泛应用于图像识别,但很少用于音乐分类。在这项研究中,一个小的音乐数据集被用于使用迁移学习的音乐分类。
{"title":"Novel Music Genre Classification System Using Transfer Learning on a Small Dataset","authors":"Yang Wang, T. Goto, Tadaaki Kirisima, K. Tsuchida","doi":"10.1109/SERA57763.2023.10197805","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197805","url":null,"abstract":"Music is an essential \"element\" in our lives. With the rapid development of technology, the use of compact disks and tapes for listening various forms of music of different cultures has become obsolete. Because of the generation of considerable music data, the accurate classification of music data has become a critical topic of research, and the development of deep learning technology provides a solution for music classification. Transfer learning techniques are widely used in image recognition but are rarely used for music classification. In this study, a small music dataset is used for music classification using transfer learning.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116089268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Code Tampering Using A Bytecode Comparison Analysis Tool 使用字节码比较分析工具识别代码篡改
Young Lee, Arlen P. McDonald, Jeong Yang
The issues related to SolarWinds attacks point out a large concern with modern software development projects in that there are fundamental flaws with existing security infrastructure. The purpose of this research is to investigate to what extent can the SootDiff analysis tool, a bytecode comparison tool, be used to determine if an application has been tampered with by comparing a known good version with a version that is unknown. The compiled and decompiled bytecodes as Jimple representations were compared to analyze the unique differences in identifying code tempering. The results showed that the scope of the variable is important in whether the change was detected. Variables with a scope that was entirely contained within one method could have their names changed without triggering a warning, but global variables to objects could not. The parameter variable and the local variable behave differently. Since the parameter is in the publicly available part of the method Java treats it the same way as it does the global variable. The local variable is strictly private to the method and not made available to the outside. Such findings can support the analysis tool which is useful for identifying potential breaches to detect meaningful changes in code even if it is decompiled.
与SolarWinds攻击有关的问题指出了现代软件开发项目的一个大问题,即现有安全基础设施存在根本缺陷。本研究的目的是调查在多大程度上可以使用sotdiff分析工具(一种字节码比较工具)通过比较已知的良好版本和未知的版本来确定应用程序是否已被篡改。将编译后的字节码和反编译后的字节码作为简单的表示形式进行比较,分析它们在识别代码调质方面的独特差异。结果表明,变量的范围对是否检测到变化很重要。范围完全包含在一个方法中的变量可以更改其名称而不会触发警告,但对象的全局变量不能。参数变量和局部变量的行为不同。由于该参数位于方法的公共可用部分,因此Java将其视为与全局变量相同的方式。局部变量对方法来说是严格私有的,外部不能使用。这样的发现可以支持分析工具,这对于识别潜在的漏洞以检测代码中有意义的更改非常有用,即使它是反编译的。
{"title":"Identifying Code Tampering Using A Bytecode Comparison Analysis Tool","authors":"Young Lee, Arlen P. McDonald, Jeong Yang","doi":"10.1109/SERA57763.2023.10197775","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197775","url":null,"abstract":"The issues related to SolarWinds attacks point out a large concern with modern software development projects in that there are fundamental flaws with existing security infrastructure. The purpose of this research is to investigate to what extent can the SootDiff analysis tool, a bytecode comparison tool, be used to determine if an application has been tampered with by comparing a known good version with a version that is unknown. The compiled and decompiled bytecodes as Jimple representations were compared to analyze the unique differences in identifying code tempering. The results showed that the scope of the variable is important in whether the change was detected. Variables with a scope that was entirely contained within one method could have their names changed without triggering a warning, but global variables to objects could not. The parameter variable and the local variable behave differently. Since the parameter is in the publicly available part of the method Java treats it the same way as it does the global variable. The local variable is strictly private to the method and not made available to the outside. Such findings can support the analysis tool which is useful for identifying potential breaches to detect meaningful changes in code even if it is decompiled.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset ProvSec:网络安全系统来源分析基准数据集
Madhukar Shrestha, Y. Kim, Jeehyun Oh, J. Rhee, Yung Ryn Choe, Fei Zuo, M. Park, Gang Qian
System provenance forensic analysis has been studied by a large body of research work. This area needs fine granularity data such as system calls along with event fields to track the dependencies of events. While prior work on security datasets has been proposed, we found a useful dataset of realistic attacks and details that can be used for provenance tracking is lacking. We created a new dataset of eleven vulnerable cases for system forensic analysis. It includes the full details of system calls including syscall parameters. Realistic attack scenarios with real software vulnerabilities and exploits are used. Also, we created two sets of benign and adversary scenarios which are manually labeled for supervised machine-learning analysis. We demonstrate the details of the dataset events and dependency analysis.
系统溯源取证分析已被大量的研究工作所研究。这个领域需要细粒度的数据,比如系统调用和事件字段,以跟踪事件的依赖关系。虽然之前已经提出了安全数据集的工作,但我们发现缺乏一个有用的真实攻击数据集和可用于溯源跟踪的细节。我们创建了11个易受攻击案例的新数据集,用于系统取证分析。它包括系统调用的全部细节,包括系统调用参数。使用具有真实软件漏洞和利用的真实攻击场景。此外,我们还创建了两组良性和敌对场景,这些场景被手动标记为监督机器学习分析。我们演示了数据集事件和依赖分析的细节。
{"title":"ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset","authors":"Madhukar Shrestha, Y. Kim, Jeehyun Oh, J. Rhee, Yung Ryn Choe, Fei Zuo, M. Park, Gang Qian","doi":"10.1109/SERA57763.2023.10197743","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197743","url":null,"abstract":"System provenance forensic analysis has been studied by a large body of research work. This area needs fine granularity data such as system calls along with event fields to track the dependencies of events. While prior work on security datasets has been proposed, we found a useful dataset of realistic attacks and details that can be used for provenance tracking is lacking. We created a new dataset of eleven vulnerable cases for system forensic analysis. It includes the full details of system calls including syscall parameters. Realistic attack scenarios with real software vulnerabilities and exploits are used. Also, we created two sets of benign and adversary scenarios which are manually labeled for supervised machine-learning analysis. We demonstrate the details of the dataset events and dependency analysis.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses PowerGrader:基于PowerShell的编程课程自动代码评估
Fei Zuo, J. Rhee, M. Park, Gang Qian
Programming courses in colleges often involve a myriad of coding assignments, which brings heavy grading workloads for instructors. To alleviate this problem, automatic programming evaluation tools are becoming more of a requirement than an option. However, after considering the actual requirements in our teaching practice, we have noticed that the current solutions still suffer from shortcomings and limitations. In the process of addressing the challenges, we propose and implement a brand new code assessment application based on PowerShell, which shows both extendibility and configurability. In particular, we integrate both black-box testing and the lexical analysis into the system, thus achieving a customized solution to meet specific requirements. This paper presents the architecture and design of our automatic code assessment application. Furthermore, we conduct empirical evaluations on the proposed system following the Technology Acceptance Model, and also investigate the drawbacks of manual assessment of coding assignments in terms of reliability and fairness. Finally, the evaluations demonstrate the effectiveness of our proposed auto-grader in facilitating the code assessment targeting college-level programming courses.
大学里的编程课程通常涉及大量的编码作业,这给教师带来了沉重的评分负担。为了缓解这个问题,自动编程评估工具越来越成为一种需求,而不是一种选择。然而,在我们的教学实践中,考虑到实际需求,我们注意到目前的解决方案仍然存在不足和局限性。在解决这些挑战的过程中,我们提出并实现了一个全新的基于PowerShell的代码评估应用程序,该应用程序具有可扩展性和可配置性。特别是,我们将黑盒测试和词法分析集成到系统中,从而实现满足特定需求的定制解决方案。本文介绍了我们的代码自动评估应用程序的体系结构和设计。此外,我们根据技术接受模型对所提出的系统进行了实证评估,并从可靠性和公平性方面调查了手工评估编码分配的缺点。最后,评估证明了我们提出的自动评分器在促进针对大学水平编程课程的代码评估方面的有效性。
{"title":"PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses","authors":"Fei Zuo, J. Rhee, M. Park, Gang Qian","doi":"10.1109/SERA57763.2023.10197671","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197671","url":null,"abstract":"Programming courses in colleges often involve a myriad of coding assignments, which brings heavy grading workloads for instructors. To alleviate this problem, automatic programming evaluation tools are becoming more of a requirement than an option. However, after considering the actual requirements in our teaching practice, we have noticed that the current solutions still suffer from shortcomings and limitations. In the process of addressing the challenges, we propose and implement a brand new code assessment application based on PowerShell, which shows both extendibility and configurability. In particular, we integrate both black-box testing and the lexical analysis into the system, thus achieving a customized solution to meet specific requirements. This paper presents the architecture and design of our automatic code assessment application. Furthermore, we conduct empirical evaluations on the proposed system following the Technology Acceptance Model, and also investigate the drawbacks of manual assessment of coding assignments in terms of reliability and fairness. Finally, the evaluations demonstrate the effectiveness of our proposed auto-grader in facilitating the code assessment targeting college-level programming courses.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130543041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Split and Federated Learning with Mobility in Vehicular Edge Computing 车辆边缘计算中具有移动性的分离和联合学习
Sung-woo Moon, Y. Lim
Vehicular edge computing (VEC) is a promising technology to support vehicular applications that leverage machine learning (ML) technology. Due to limited resources of the vehicle, the vehicle uses Split learning (SL) to split the computation of the ML model and offload it to the VEC server (VECS). Federated learning (FL) is also used for data privacy and parallel training of the vehicles. Therefore, SplitFed learning, which combines SL and FL, enables parallel processing, which is an advantage of FL, and reduces the computational burden on the vehicle through ML model split, which is an advantage of SL. However, the SplitFed learning does not consider the mobility of device/vehicle. Therefore, we propose a SplitFed learning with mobility method to minimize the training time of the model. SplitFed learning with mobility method is a migration method of the ML model when the vehicle moves from the current serving VECS to the target VECS. Through simulations, compared with conventional SplitFed learning where the vehicle travels after 50% and 80% of training is completed, the proposed method can reduce training time by about 19-33% for LeNet and by about 22-44% for VGG16, respectively, and does not degrade accuracy of model.
车辆边缘计算(VEC)是一项有前途的技术,用于支持利用机器学习(ML)技术的车辆应用程序。由于车辆资源有限,车辆使用Split learning (SL)将ML模型的计算拆分,并将其卸载到VEC服务器(VECS)上。联邦学习(FL)也用于数据隐私和车辆的并行训练。因此,将SL和FL结合起来的SplitFed学习可以实现并行处理,这是FL的优势,并且通过ML模型拆分减少了车辆的计算负担,这是SL的优势。但是SplitFed学习没有考虑设备/车辆的移动性。因此,我们提出了一种带迁移的SplitFed学习方法,以最小化模型的训练时间。带移动性的分裂学习方法是机器学习模型在车辆从当前服务VECS移动到目标VECS时的一种迁移方法。仿真结果表明,与传统的SplitFed学习方法相比,LeNet和VGG16的训练时间分别缩短了19-33%和22-44%,且没有降低模型的准确性。
{"title":"Split and Federated Learning with Mobility in Vehicular Edge Computing","authors":"Sung-woo Moon, Y. Lim","doi":"10.1109/SERA57763.2023.10197801","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197801","url":null,"abstract":"Vehicular edge computing (VEC) is a promising technology to support vehicular applications that leverage machine learning (ML) technology. Due to limited resources of the vehicle, the vehicle uses Split learning (SL) to split the computation of the ML model and offload it to the VEC server (VECS). Federated learning (FL) is also used for data privacy and parallel training of the vehicles. Therefore, SplitFed learning, which combines SL and FL, enables parallel processing, which is an advantage of FL, and reduces the computational burden on the vehicle through ML model split, which is an advantage of SL. However, the SplitFed learning does not consider the mobility of device/vehicle. Therefore, we propose a SplitFed learning with mobility method to minimize the training time of the model. SplitFed learning with mobility method is a migration method of the ML model when the vehicle moves from the current serving VECS to the target VECS. Through simulations, compared with conventional SplitFed learning where the vehicle travels after 50% and 80% of training is completed, the proposed method can reduce training time by about 19-33% for LeNet and by about 22-44% for VGG16, respectively, and does not degrade accuracy of model.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124077570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Emissions of Environmental Impact in Chemical Industry 化工行业环境影响排放研究
Yohei Hara, H. Ono
In recent years, the world has been promoting the control of carbon dioxide emissions, the substance responsible for global warming, in order to prevent global warming as the global environment has become increasingly degraded. In addition, a system has been established to curb not only global warming but also other categories that have an impact on the global environment. In this context, industries are promoting operations and activities that take in account the environment in addition to the pursuit of profit. However, while environmental emissions have been evaluated, the impact on the environment has not yet been assessed in detail. Therefore, this study aims to clarify the emissions of environmental impacts in the chemical industry, which is the large source of emissions.
近年来,随着全球环境日益恶化,为了防止全球变暖,世界各国一直在推动控制二氧化碳的排放,二氧化碳是导致全球变暖的物质。此外,不仅是全球变暖,还包括对全球环境产生影响的其他类别,已经建立了一个体系。在这种情况下,工业除了追求利润外,正在促进考虑到环境的业务和活动。然而,虽然对环境排放进行了评价,但对环境的影响尚未得到详细评价。因此,本研究旨在明确化工行业的环境影响排放,这是一个很大的排放源。
{"title":"Study on Emissions of Environmental Impact in Chemical Industry","authors":"Yohei Hara, H. Ono","doi":"10.1109/SERA57763.2023.10197760","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197760","url":null,"abstract":"In recent years, the world has been promoting the control of carbon dioxide emissions, the substance responsible for global warming, in order to prevent global warming as the global environment has become increasingly degraded. In addition, a system has been established to curb not only global warming but also other categories that have an impact on the global environment. In this context, industries are promoting operations and activities that take in account the environment in addition to the pursuit of profit. However, while environmental emissions have been evaluated, the impact on the environment has not yet been assessed in detail. Therefore, this study aims to clarify the emissions of environmental impacts in the chemical industry, which is the large source of emissions.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129134277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Wireless Sensor Network Deployment Algorithm for Emergency Communications 面向应急通信的动态无线传感器网络部署算法
Kubra Gundogan, Nuri Alperen Kose, Khushi Gupta, Damilola Oladimeji, Fan Liang
The Internet of Things (IoT) connects a huge number of IoT devices, including sensors, actuators, computing nodes, etc. Those IoT devices communicate with each other by using different communication techniques. Generally, LTE, 5G, and WiFi are involved in IoT to support communication. However, it needs considerable communication infrastructures to support wireless communication. An obvious issue is how to create a communication network in some regions that have less communication support. Wireless Sensor Network (WSN) is a kind of wireless ad hoc network, which organizes a huge number of wireless sensors to create a self-organized wireless network. Therefore, the WSN is a potential approach to providing communication in those regions. Since WSN is highly dynamic, how to create the wireless network to provide optimal coverage rate is still open. In this article, we propose a dynamic wireless sensor deployment scenarios that provide optimal coverage rate in a certain region. Our model proposes a coverage rate based on possible disaster scenarios for communication between Base Stations and UAVs. We optimize the Particle Swarm Optimization (PSO) algorithm and find the maximum coverage rate.
物联网(IoT)连接了大量的物联网设备,包括传感器、执行器、计算节点等。这些物联网设备通过使用不同的通信技术相互通信。通常,物联网涉及LTE、5G和WiFi来支持通信。然而,它需要大量的通信基础设施来支持无线通信。一个明显的问题是如何在一些通信支持较少的地区建立通信网络。无线传感器网络(WSN)是一种无线自组织网络,它将大量的无线传感器组织成一个自组织的无线网络。因此,无线传感器网络是在这些区域提供通信的潜在方法。由于无线传感器网络是高度动态的,如何创建无线网络以提供最佳的覆盖率仍然是一个开放的问题。在这篇文章中,我们提出了一个动态的无线传感器部署方案,在一定的区域提供最佳的覆盖率。我们的模型提出了一个基于基站和无人机之间通信可能发生的灾难场景的覆盖率。对粒子群算法(PSO)进行优化,求出最大覆盖率。
{"title":"A Dynamic Wireless Sensor Network Deployment Algorithm for Emergency Communications","authors":"Kubra Gundogan, Nuri Alperen Kose, Khushi Gupta, Damilola Oladimeji, Fan Liang","doi":"10.1109/SERA57763.2023.10197686","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197686","url":null,"abstract":"The Internet of Things (IoT) connects a huge number of IoT devices, including sensors, actuators, computing nodes, etc. Those IoT devices communicate with each other by using different communication techniques. Generally, LTE, 5G, and WiFi are involved in IoT to support communication. However, it needs considerable communication infrastructures to support wireless communication. An obvious issue is how to create a communication network in some regions that have less communication support. Wireless Sensor Network (WSN) is a kind of wireless ad hoc network, which organizes a huge number of wireless sensors to create a self-organized wireless network. Therefore, the WSN is a potential approach to providing communication in those regions. Since WSN is highly dynamic, how to create the wireless network to provide optimal coverage rate is still open. In this article, we propose a dynamic wireless sensor deployment scenarios that provide optimal coverage rate in a certain region. Our model proposes a coverage rate based on possible disaster scenarios for communication between Base Stations and UAVs. We optimize the Particle Swarm Optimization (PSO) algorithm and find the maximum coverage rate.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Texture and Orientation-based Feature Extraction for Robust Facial Expression Recognition 基于纹理和方向的鲁棒面部表情识别特征提取
Sajidullah S. Khan, Mohammed Bin Abdulrahman Alawairdhi, M. Al-Akhras
Facial expressions are the most effective way to characterize people’s motives, emotions, and feelings. Several new methods are proposed each year; however, the accuracy of facial expression recognition still needs to be improved especially in uncontrolled conditions. In this paper, we propose a hybrid facial expression model that considers both texture and orientation features to classify expressions. Two types of descriptors namely Local binary pattern and Weber local descriptor are used to preserve the local intensity information and orientation of edges. In the next step, computing the Histograms of oriented gradients (HOG) features from the Local binary pattern and Weber local descriptor images to capture micro-expressions. Then, the AdaBoost feature selection algorithm is utilized to choose the best features from the combined HOG features. The results of the experiments demonstrate that the method proposed in this study performs better than existing methods.
面部表情是刻画人们动机、情绪和感受的最有效方式。每年都会提出几种新方法;然而,面部表情识别的准确性仍有待提高,特别是在不受控制的情况下。本文提出了一种同时考虑纹理和方向特征的混合面部表情模型。利用局部二值模式和韦伯局部描述符来保持边缘的局部强度信息和方向。下一步,从局部二值模式和韦伯局部描述符图像中计算定向梯度直方图(HOG)特征来捕获微表情。然后,利用AdaBoost特征选择算法从组合HOG特征中选择最优特征;实验结果表明,本文提出的方法比现有方法具有更好的性能。
{"title":"Texture and Orientation-based Feature Extraction for Robust Facial Expression Recognition","authors":"Sajidullah S. Khan, Mohammed Bin Abdulrahman Alawairdhi, M. Al-Akhras","doi":"10.1109/SERA57763.2023.10197798","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197798","url":null,"abstract":"Facial expressions are the most effective way to characterize people’s motives, emotions, and feelings. Several new methods are proposed each year; however, the accuracy of facial expression recognition still needs to be improved especially in uncontrolled conditions. In this paper, we propose a hybrid facial expression model that considers both texture and orientation features to classify expressions. Two types of descriptors namely Local binary pattern and Weber local descriptor are used to preserve the local intensity information and orientation of edges. In the next step, computing the Histograms of oriented gradients (HOG) features from the Local binary pattern and Weber local descriptor images to capture micro-expressions. Then, the AdaBoost feature selection algorithm is utilized to choose the best features from the combined HOG features. The results of the experiments demonstrate that the method proposed in this study performs better than existing methods.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133948975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Integrated Framework for Efficient Educational Software Development 面向高效教育软件开发的集成框架
A. Mbiada, Bassey Isong, Francis Lugayizi, A. Abu-Mahfouz
This paper proposes a framework for creating educational software systems that effectively meet student engagement and pedagogical goals. While different design methodologies have been used in developing educational software, most fail to satisfy the demands of users, stakeholders, and students, making it difficult to incorporate them into daily activities and support optimal learning outcomes. The proposed framework combines important techniques in Scrum, dynamic system development methods, and instructional design models. It comprises seven key phases: initial, instructional orientation, analysis, design, production, integration and implementation, and evaluation. The framework aims to guide the creation of educational software that successfully satisfies teachers' and students' demands and can be easily incorporated into teaching and learning procedures. We present the proposed framework components and compare them with other existing related models. Implementing the framework is expected to improve teaching/ learning, reduce development costs and time.
本文提出了一个框架,用于创建有效地满足学生参与和教学目标的教育软件系统。虽然在开发教育软件时使用了不同的设计方法,但大多数都不能满足用户、涉众和学生的需求,因此很难将它们纳入日常活动并支持最佳的学习结果。提出的框架结合了Scrum中的重要技术、动态系统开发方法和指导性设计模型。它包括七个关键阶段:初始阶段、指导阶段、分析阶段、设计阶段、生产阶段、整合实施阶段和评价阶段。该框架旨在指导教育软件的开发,使其能够成功地满足教师和学生的需求,并易于纳入教学过程。我们提出了提出的框架组件,并将它们与其他现有的相关模型进行了比较。实施该框架有望改善教/学,减少开发成本和时间。
{"title":"Towards Integrated Framework for Efficient Educational Software Development","authors":"A. Mbiada, Bassey Isong, Francis Lugayizi, A. Abu-Mahfouz","doi":"10.1109/SERA57763.2023.10197734","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197734","url":null,"abstract":"This paper proposes a framework for creating educational software systems that effectively meet student engagement and pedagogical goals. While different design methodologies have been used in developing educational software, most fail to satisfy the demands of users, stakeholders, and students, making it difficult to incorporate them into daily activities and support optimal learning outcomes. The proposed framework combines important techniques in Scrum, dynamic system development methods, and instructional design models. It comprises seven key phases: initial, instructional orientation, analysis, design, production, integration and implementation, and evaluation. The framework aims to guide the creation of educational software that successfully satisfies teachers' and students' demands and can be easily incorporated into teaching and learning procedures. We present the proposed framework components and compare them with other existing related models. Implementing the framework is expected to improve teaching/ learning, reduce development costs and time.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116289555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1