首页 > 最新文献

World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering最新文献

英文 中文
An Evaluation of Clinical Decision Support and Use of Machine Learning to Reduce Alert Fatigue 评估临床决策支持和使用机器学习来减少警觉性疲劳
Noura A Khreis, A. Lau, A. Al-jedai, Salma Al-khani, Ezdehar H. Alruwaili
Therapeutic duplication alert is one of the Clinical Decision Support Systems (CDSS) that was implemented to help physicians and other healthcare providers in making clinical judgements about the patients’ management of therapy and decreasing medication errors. However, there were high override rates of these alerts by physicians as they were deemed to be of non-clinical significance. The quantity of the alerts fired by the system was high leading to “alert fatigue”. Thus, the hospital administrators reached an agreement to deactivate it. To assess the validity of this decision, the aim of the study was to analyze the impact of therapeutic duplication alert deactivation on medication errors’ rate. This study retrospectively screened a total of 593 electronic Medication Administration Records (eMAR) of hospitalized patients with 297 e-MARs in the pre-therapeutic duplication alert deactivation period and 296 e-MARs in the post-therapeutic duplication alert deactivation period in a tertiary care hospital in Saudi Arabia. The number and type of duplicate medication errors in each period was documented to determine whether there was a significant difference between the two periods. The results detected 51 out of 297 e-MARs with medication errors in the pre-therapeutic duplication alert deactivation period versus 47 out of 296 in the post alert deactivation therapeutic duplication. Chi square test showed that there was no significant difference in the incidence of medication errors detected among the two periods with a p-value of 0.672. Therefore, we concluded that there was no significant difference on the medication error after the therapeutic duplication alert deactivation. An integration of machine learning into the clinical decision support design was recommended to filter the duplicated and unimportant alerts and reduce the alert fatigue of physicians.
治疗重复警报是临床决策支持系统(CDSS)之一,旨在帮助医生和其他医疗保健提供者对患者的治疗管理做出临床判断,减少用药错误。然而,医生对这些警报的无视率很高,因为它们被认为是非临床意义的。系统发出的警报数量过多,导致“警报疲劳”。因此,医院管理人员达成协议,将其停用。为了评估这一决策的有效性,本研究的目的是分析治疗重复警报停用对用药错误率的影响。本研究回顾性筛选了沙特阿拉伯一家三级医院住院患者的593份电子药物管理记录(eMAR),其中297例e-MARs在治疗前重复警报失活期,296例e-MARs在治疗后重复警报失活期。记录每个时期重复用药错误的数量和类型,以确定两个时期之间是否存在显著差异。结果发现297个e-MARs中有51个在治疗前重复警报失活期间有药物错误,而296个在警报失活后治疗重复期间有47个。卡方检验显示,两期用药差错发生率差异无统计学意义,p值为0.672。因此,我们得出结论,在治疗重复警报失活后,用药错误没有显着差异。建议将机器学习集成到临床决策支持设计中,以过滤重复和不重要的警报,并减少医生的警报疲劳。
{"title":"An Evaluation of Clinical Decision Support and Use of Machine Learning to Reduce Alert Fatigue","authors":"Noura A Khreis, A. Lau, A. Al-jedai, Salma Al-khani, Ezdehar H. Alruwaili","doi":"10.17706/IJCCE.2019.8.1.32-39","DOIUrl":"https://doi.org/10.17706/IJCCE.2019.8.1.32-39","url":null,"abstract":"Therapeutic duplication alert is one of the Clinical Decision Support Systems (CDSS) that was implemented to help physicians and other healthcare providers in making clinical judgements about the patients’ management of therapy and decreasing medication errors. However, there were high override rates of these alerts by physicians as they were deemed to be of non-clinical significance. The quantity of the alerts fired by the system was high leading to “alert fatigue”. Thus, the hospital administrators reached an agreement to deactivate it. To assess the validity of this decision, the aim of the study was to analyze the impact of therapeutic duplication alert deactivation on medication errors’ rate. This study retrospectively screened a total of 593 electronic Medication Administration Records (eMAR) of hospitalized patients with 297 e-MARs in the pre-therapeutic duplication alert deactivation period and 296 e-MARs in the post-therapeutic duplication alert deactivation period in a tertiary care hospital in Saudi Arabia. The number and type of duplicate medication errors in each period was documented to determine whether there was a significant difference between the two periods. The results detected 51 out of 297 e-MARs with medication errors in the pre-therapeutic duplication alert deactivation period versus 47 out of 296 in the post alert deactivation therapeutic duplication. Chi square test showed that there was no significant difference in the incidence of medication errors detected among the two periods with a p-value of 0.672. Therefore, we concluded that there was no significant difference on the medication error after the therapeutic duplication alert deactivation. An integration of machine learning into the clinical decision support design was recommended to filter the duplicated and unimportant alerts and reduce the alert fatigue of physicians.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78500666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on an Adaptive Maneuvering Target Tracking Algorithm 一种自适应机动目标跟踪算法研究
X. Zhu, J. Yang, Y. Li
The maneuverability of modern targets becomes more and more complex and variable, which raises higher requirements on the tracking performance of detection systems. Especially the stable and accurate tracking of maneuvering targets is more critical. For the problem that statistical properties of detection system noise are unknown and the state of motion of targets is complex and variable, a new adaptive maneuvering target tracking algorithm is proposed. The algorithm adopts the combination of adaptive Kalman filtering under the spherical coordinate system and its counterpart under the Cartesian coordinate system. The adaptive Kalman filtering algorithm under the spherical coordinate system is based on Sage-Husa noise statistics estimator to estimate the statistical property of measurement noise. In the Cartesian coordinate system, the Singer model is used to describe the target motion. Relevant results of the adaptive Kalman filtering algorithm under the spherical coordinate system are used to achieve high-precision estimation of target motion information. Simulation results show that the proposed algorithm has satisfactory tracking accuracy.
现代目标的机动性越来越复杂多变,对探测系统的跟踪性能提出了更高的要求。特别是机动目标的稳定、准确跟踪尤为重要。针对检测系统噪声统计特性未知和目标运动状态复杂多变的问题,提出了一种新的自适应机动目标跟踪算法。该算法采用球坐标系下的自适应卡尔曼滤波与笛卡尔坐标系下的自适应卡尔曼滤波相结合的方法。球坐标系下的自适应卡尔曼滤波算法基于Sage-Husa噪声统计估计量来估计测量噪声的统计特性。在笛卡尔坐标系中,用Singer模型来描述目标运动。利用球坐标系下自适应卡尔曼滤波算法的相关结果,实现了目标运动信息的高精度估计。仿真结果表明,该算法具有良好的跟踪精度。
{"title":"Research on an Adaptive Maneuvering Target Tracking Algorithm","authors":"X. Zhu, J. Yang, Y. Li","doi":"10.17706/ijcce.2019.8.2.50-59","DOIUrl":"https://doi.org/10.17706/ijcce.2019.8.2.50-59","url":null,"abstract":"The maneuverability of modern targets becomes more and more complex and variable, which raises higher requirements on the tracking performance of detection systems. Especially the stable and accurate tracking of maneuvering targets is more critical. For the problem that statistical properties of detection system noise are unknown and the state of motion of targets is complex and variable, a new adaptive maneuvering target tracking algorithm is proposed. The algorithm adopts the combination of adaptive Kalman filtering under the spherical coordinate system and its counterpart under the Cartesian coordinate system. The adaptive Kalman filtering algorithm under the spherical coordinate system is based on Sage-Husa noise statistics estimator to estimate the statistical property of measurement noise. In the Cartesian coordinate system, the Singer model is used to describe the target motion. Relevant results of the adaptive Kalman filtering algorithm under the spherical coordinate system are used to achieve high-precision estimation of target motion information. Simulation results show that the proposed algorithm has satisfactory tracking accuracy.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87431919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review and Prospect of the Development of Multi-beam Reflector Antennas 多波束反射天线的发展回顾与展望
Hongge Wei, Zhengjun Li
{"title":"Review and Prospect of the Development of Multi-beam Reflector Antennas","authors":"Hongge Wei, Zhengjun Li","doi":"10.17706/ijcce.2019.8.4.184-194","DOIUrl":"https://doi.org/10.17706/ijcce.2019.8.4.184-194","url":null,"abstract":"","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84345143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sliding Mode Control of an Internet Teleoperated PUMA 600 Robot 互联网遥控PUMA 600机器人的滑模控制
A. Ghoul, B. Ouamri, I. K. Bousserhane
—In this paper, we have developed a sliding mode controller for PUMA 600 manipulator robot, to control the remote robot a teleoperation system was developed. This system includes two sites, local and remote. The sliding mode controller is installed at the remote site. The client asks for a position through an interface and receives the real positions after running of the task by the remote robot. Both sites are interconnected via the Internet. In order to verify the effectiveness of the sliding mode controller, that is compared with a classic PID controller. The developed approach is tested on a virtual robot. The results confirmed the high performance of this approach. techniques and their application in electric drives control.
在本文中,我们开发了PUMA 600机械手的滑模控制器,开发了遥控机器人的遥操作系统。本系统包括本地和远程两个站点。滑模控制器安装在远程站点。客户端通过接口请求位置,远程机器人运行任务后接收真实位置。这两个站点通过互联网相互连接。为了验证滑模控制器的有效性,将其与经典的PID控制器进行了比较。在一个虚拟机器人上对所开发的方法进行了测试。结果证实了该方法的高性能。电力传动控制技术及其应用。
{"title":"Sliding Mode Control of an Internet Teleoperated PUMA 600 Robot","authors":"A. Ghoul, B. Ouamri, I. K. Bousserhane","doi":"10.5281/zenodo.1316313","DOIUrl":"https://doi.org/10.5281/zenodo.1316313","url":null,"abstract":"—In this paper, we have developed a sliding mode controller for PUMA 600 manipulator robot, to control the remote robot a teleoperation system was developed. This system includes two sites, local and remote. The sliding mode controller is installed at the remote site. The client asks for a position through an interface and receives the real positions after running of the task by the remote robot. Both sites are interconnected via the Internet. In order to verify the effectiveness of the sliding mode controller, that is compared with a classic PID controller. The developed approach is tested on a virtual robot. The results confirmed the high performance of this approach. techniques and their application in electric drives control.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73373610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Anomaly Detection Techniques for Denial of Service Attacks 拒绝服务攻击的智能异常检测技术
V. C. Gungor, Z. Aydın, Ramazan Karademir
To construct and evaluate intrusion detection, system researchers are limited to only a few available public datasets unless they prepare their own. Although the most prevalent KDDCUP’99 dataset provides a comparative analysis among researchers, the community needs a new dataset which reflects new attack types in current high-speed networks. The aim of this study is to prepare a new alternative dataset for the community for detection of denial of service attacks and to conduct performance analysis of different data mining methods on this dataset. To develop the dataset, distributed DoS attacks have been generated that target a commercial website in a real network environment, which has a million of users from all over the world. In addition to this, a richer attack dataset has been produced in a laboratory environment with the help of Labris Networks. After capturing data, significant network features have been identified and processed and labeled with related attack types. Furthermore, the performances of different data mining techniques have been evaluated, including binary classification, multi-class classification, outlier detection, feature selection methods and hybrid approaches with our dataset by using the following algorithms: K-Means clustering, Naïve Bayes, Decision Tree, Multilayer Perceptron, LibSVM, Random Forest and Random Tree.
为了构建和评估入侵检测,系统研究人员只能使用少数可用的公共数据集,除非他们自己准备好。虽然最流行的KDDCUP ' 99数据集提供了研究人员之间的比较分析,但社区需要一个新的数据集来反映当前高速网络中的新攻击类型。本研究的目的是为社区准备一个新的替代数据集,用于检测拒绝服务攻击,并在该数据集上对不同的数据挖掘方法进行性能分析。为了开发数据集,生成了分布式DoS攻击,目标是真实网络环境中的一个商业网站,该网站拥有来自世界各地的一百万用户。除此之外,在Labris Networks的帮助下,在实验室环境中生成了更丰富的攻击数据集。捕获数据后,识别和处理重要的网络特征,并标记相关的攻击类型。此外,我们还利用K-Means聚类、Naïve贝叶斯、决策树、多层感知器、LibSVM、随机森林和随机树等算法,评估了不同数据挖掘技术的性能,包括二值分类、多类分类、离群点检测、特征选择方法和混合方法。
{"title":"Intelligent Anomaly Detection Techniques for Denial of Service Attacks","authors":"V. C. Gungor, Z. Aydın, Ramazan Karademir","doi":"10.17706/IJCCE.2018.7.2.20-31","DOIUrl":"https://doi.org/10.17706/IJCCE.2018.7.2.20-31","url":null,"abstract":"To construct and evaluate intrusion detection, system researchers are limited to only a few available public datasets unless they prepare their own. Although the most prevalent KDDCUP’99 dataset provides a comparative analysis among researchers, the community needs a new dataset which reflects new attack types in current high-speed networks. The aim of this study is to prepare a new alternative dataset for the community for detection of denial of service attacks and to conduct performance analysis of different data mining methods on this dataset. To develop the dataset, distributed DoS attacks have been generated that target a commercial website in a real network environment, which has a million of users from all over the world. In addition to this, a richer attack dataset has been produced in a laboratory environment with the help of Labris Networks. After capturing data, significant network features have been identified and processed and labeled with related attack types. Furthermore, the performances of different data mining techniques have been evaluated, including binary classification, multi-class classification, outlier detection, feature selection methods and hybrid approaches with our dataset by using the following algorithms: K-Means clustering, Naïve Bayes, Decision Tree, Multilayer Perceptron, LibSVM, Random Forest and Random Tree.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87001243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Fuzzy Connectedness Segmentation Method for Medical Images with Multiple Seeds in MRI 磁共振多种子医学图像的改进模糊连通性分割方法
Yunping Zheng, Tong Chang, M. Sarem
Image segmentation is a key step in medical image processing, since it affects the quality of the medical image in the follow-up steps. However, in the practice of processing MRI images, we find out that the segmentation process involves much difficulty due to the poorly defined boundaries of medical images, meanwhile, there are usually more than one target area. In this study, an improved algorithm based on the fuzzy connectedness framework for medical image is developed. The improved algorithm has involved an adaptive fuzzy connectedness segmentation combined with multiple seeds selection. Also, the algorithm can effectively overcome many problems when manual selection is used, such as the un-precise result of each target region segmented of the medical image and the difficulty of completion the segmentation when the areas are not connected. For testing the proposed method, some original real images, taken from a large hospital, were analyzed. The results have been evaluated with some rules, such as Dice’s coefficient, over segmentation rate, and under segmentation rate. The results show that the proposed method has an ideal segmentation boundary on medical images, meanwhile, it has a low time cost. In conclusion, the proposed method is superior to the traditional fuzzy connectedness segmentation methods for medical images.
图像分割是医学图像处理的关键步骤,它直接影响到后续处理的医学图像质量。然而,在对MRI图像进行处理的实践中,我们发现由于医学图像的边界不明确,分割过程非常困难,同时通常存在多个目标区域。本文提出了一种基于模糊连通性框架的医学图像改进算法。改进算法将自适应模糊连通性分割与多种子选择相结合。此外,该算法还能有效克服人工选择医学图像时存在的对每个目标区域分割结果不精确、区域间不连通时难以完成分割等问题。为了验证该方法,对某大型医院的一些原始真实图像进行了分析。用Dice系数、过分割率和欠分割率等规则对结果进行了评价。结果表明,该方法对医学图像具有理想的分割边界,同时具有较低的时间成本。综上所述,该方法优于传统的医学图像模糊连通分割方法。
{"title":"Improved Fuzzy Connectedness Segmentation Method for Medical Images with Multiple Seeds in MRI","authors":"Yunping Zheng, Tong Chang, M. Sarem","doi":"10.17706/ijcce.2018.7.3.32-44","DOIUrl":"https://doi.org/10.17706/ijcce.2018.7.3.32-44","url":null,"abstract":"Image segmentation is a key step in medical image processing, since it affects the quality of the medical image in the follow-up steps. However, in the practice of processing MRI images, we find out that the segmentation process involves much difficulty due to the poorly defined boundaries of medical images, meanwhile, there are usually more than one target area. In this study, an improved algorithm based on the fuzzy connectedness framework for medical image is developed. The improved algorithm has involved an adaptive fuzzy connectedness segmentation combined with multiple seeds selection. Also, the algorithm can effectively overcome many problems when manual selection is used, such as the un-precise result of each target region segmented of the medical image and the difficulty of completion the segmentation when the areas are not connected. For testing the proposed method, some original real images, taken from a large hospital, were analyzed. The results have been evaluated with some rules, such as Dice’s coefficient, over segmentation rate, and under segmentation rate. The results show that the proposed method has an ideal segmentation boundary on medical images, meanwhile, it has a low time cost. In conclusion, the proposed method is superior to the traditional fuzzy connectedness segmentation methods for medical images.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85508261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time of Arrival (TOA) Based Radiolocation Architecture in CDMA Systems and Its Performance Analysis 基于到达时间(TOA)的CDMA系统无线定位体系结构及其性能分析
Abir Ahmed, Tamim Hossain, Kefayet Ullah, M. Kabir
A popular approach, called as Radiolocation, measures parameters of radio signals that travel between a Mobile Station (MS) and a set of fixed transceivers, which are subsequently used to derive the location estimation of MS. The purpose of this research was to investigate the performance of Time of Arrival (TOA) based Radiolocation approach for finding the location of MS in the CDMA cellular networks. Another aim was to find out suitable location estimation algorithm using measured parameters by Radiolocation approach. Finally, the accuracy of the Radiolocation was examined by comparing two different location estimation algorithms. Two different algorithms for position estimation methods, named as Neural Networks and Least Square algorithms, were used to determine the location of MS. The simulation results suggested that the Neural Network algorithm provides better accuracy in position estimation which were depicted by supportive simulation results in the article.
一种流行的方法,称为无线电定位,测量在移动站(MS)和一组固定收发器之间传播的无线电信号的参数,随后用于得出MS的位置估计。本研究的目的是研究基于到达时间(TOA)的无线电定位方法在CDMA蜂窝网络中寻找MS位置的性能。另一个目的是利用无线电定位方法的测量参数找到合适的位置估计算法。最后,通过比较两种不同的位置估计算法,检验了无线定位的精度。利用神经网络算法和最小二乘算法两种不同的位置估计方法来确定ms的位置。仿真结果表明,神经网络算法在位置估计中具有更好的精度,这一点在文中的支持性仿真结果中得到了描述。
{"title":"Time of Arrival (TOA) Based Radiolocation Architecture in CDMA Systems and Its Performance Analysis","authors":"Abir Ahmed, Tamim Hossain, Kefayet Ullah, M. Kabir","doi":"10.17706/IJCCE.2018.7.3.85-97","DOIUrl":"https://doi.org/10.17706/IJCCE.2018.7.3.85-97","url":null,"abstract":"A popular approach, called as Radiolocation, measures parameters of radio signals that travel between a Mobile Station (MS) and a set of fixed transceivers, which are subsequently used to derive the location estimation of MS. The purpose of this research was to investigate the performance of Time of Arrival (TOA) based Radiolocation approach for finding the location of MS in the CDMA cellular networks. Another aim was to find out suitable location estimation algorithm using measured parameters by Radiolocation approach. Finally, the accuracy of the Radiolocation was examined by comparing two different location estimation algorithms. Two different algorithms for position estimation methods, named as Neural Networks and Least Square algorithms, were used to determine the location of MS. The simulation results suggested that the Neural Network algorithm provides better accuracy in position estimation which were depicted by supportive simulation results in the article.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85879084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Collaborative Platform Featuring Visibility, Tracking, Monitoring and Awareness for Building Security In. 一个具有可见性、跟踪、监控和意识的建筑安全协作平台。
H. Herath, G. Wimalaratne
Software developed referring to a poor design often causes the introduction of security issues which could spread into other phases of the Software Development Life Cycle if not address in the initial stages. This could lead to major security breaches and loss of valuable assets to the consumers. Identifying and fixing security issues as early as possible in a software product is the most cost-effective way of implementing software security. This research proposes a proactive approach to build security into the product itself with the aid of a new tool developed as a proof of concept. The proposed semi-automatic tool will address limitations in current approaches to secure software engineering when developing a software product by providing visibility, tracking, awareness, and progress monitoring. Additionally Developers, Architects, QA, BA, and Management, as well as the Users, can participate in the Threat Modeling and architectural security analysis contributing their input for Security Engineering with the support provided by the tool as an interactive platform, a knowledge base and as an integration platform. The Microsoft Threat Modeling Tool is being used to generate the threat models. The tool extracts threat model information and produces detailed mitigations using known vulnerability databases and classification techniques. Developers can better understand the potential threats, vulnerabilities when coding and integration functionality with a Project Management Tool can provide visibility and tracking of Building Security In throughout SDLC.
基于糟糕设计开发的软件通常会导致引入安全问题,如果在初始阶段不加以解决,这些问题可能会蔓延到软件开发生命周期的其他阶段。这可能会导致重大的安全漏洞,并给消费者造成宝贵资产的损失。在软件产品中尽早识别和修复安全性问题是实现软件安全性的最经济有效的方法。本研究提出了一种主动的方法,通过开发作为概念验证的新工具的帮助,将安全性构建到产品本身。在开发软件产品时,提出的半自动工具将通过提供可见性、跟踪、感知和进度监控来解决当前安全软件工程方法中的限制。此外,开发人员、架构师、QA、BA和管理人员以及用户都可以参与威胁建模和体系结构安全分析,为安全工程提供他们的输入,并通过该工具作为交互平台、知识库和集成平台提供支持。微软威胁建模工具被用来生成威胁模型。该工具提取威胁模型信息,并使用已知的漏洞数据库和分类技术生成详细的缓解措施。当使用项目管理工具编码和集成功能时,开发人员可以更好地理解潜在的威胁和漏洞,项目管理工具可以在整个SDLC中提供可见性和跟踪构建安全性。
{"title":"A Collaborative Platform Featuring Visibility, Tracking, Monitoring and Awareness for Building Security In.","authors":"H. Herath, G. Wimalaratne","doi":"10.17706/IJCCE.2018.7.4.145-166","DOIUrl":"https://doi.org/10.17706/IJCCE.2018.7.4.145-166","url":null,"abstract":"Software developed referring to a poor design often causes the introduction of security issues which could spread into other phases of the Software Development Life Cycle if not address in the initial stages. This could lead to major security breaches and loss of valuable assets to the consumers. Identifying and fixing security issues as early as possible in a software product is the most cost-effective way of implementing software security. This research proposes a proactive approach to build security into the product itself with the aid of a new tool developed as a proof of concept. The proposed semi-automatic tool will address limitations in current approaches to secure software engineering when developing a software product by providing visibility, tracking, awareness, and progress monitoring. Additionally Developers, Architects, QA, BA, and Management, as well as the Users, can participate in the Threat Modeling and architectural security analysis contributing their input for Security Engineering with the support provided by the tool as an interactive platform, a knowledge base and as an integration platform. The Microsoft Threat Modeling Tool is being used to generate the threat models. The tool extracts threat model information and produces detailed mitigations using known vulnerability databases and classification techniques. Developers can better understand the potential threats, vulnerabilities when coding and integration functionality with a Project Management Tool can provide visibility and tracking of Building Security In throughout SDLC.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82287360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TIP EXPRESS: An Android School Navigation Application 提示EXPRESS: Android学校导航应用程序
Reynaldo E. Castillo, Cubao Quezon City Metro Manila Philippines Aurora Boulevard, Paula Jean M. Castro, M. C. Aragon, Henry C. Macugay
Unfamiliarity about the school campus grounds results common problems for new students or visitors. They tend to get lost inside the campus, arrive late in classes or meetings. They navigate by themselves and ask security personnel, still they tend to take time to reach their destination or most often they get lost. This study is for new students and visitors. It helps them to explore and navigate the campus grounds thru a mobile application. The mobile application provides a user-friendly interface which considers user experience. The mobile application serves as a guiding tool in navigating around the school campus grounds. In the study, the mobile application used Google Map to track the current location of the user and plot the route from the origin to the destination inside the Technological Institute of the Philippines Quezon City campus using fuzzy logic algorithm to get the shortest route and channel selection algorithm to get the nearby user within a perimeter. The study used the Rapid Application Development model in order to deliver expected outputs. Surveys using a questioner drafted from ISO 25010 were conducted to determine the effectiveness of the developed mobile application in terms of its functionality, reliability and efficiency. It was concluded that the mobile application is an effective tool in giving navigation and campus information for its users. For the result, the average mean of all the criteria yields 4.12 interpreted as very effective using the 5 point Likert’s Scale. Thus, the mobile application is useful reliable, functional, and efficient to serve its purpose.
对于新生或访客来说,对校园场地的不熟悉是常见的问题。他们往往在校园里迷路,上课或开会迟到。他们自己导航并询问保安人员,但他们往往需要时间才能到达目的地,或者经常迷路。这项研究是为新生和访客准备的。它可以帮助他们通过移动应用程序探索和导航校园。移动应用程序提供了一个考虑用户体验的用户友好界面。这款手机应用程序可以作为一个导航工具,在学校校园内导航。在研究中,移动应用程序使用谷歌地图跟踪用户的当前位置,并在菲律宾理工学院奎松市校园内绘制从起点到目的地的路线,使用模糊逻辑算法获得最短的路线,并使用通道选择算法在一个周长内获得附近的用户。该研究使用了快速应用程序开发模型,以便交付预期的输出。使用从ISO 25010起草的提问者进行调查,以确定开发的移动应用程序在功能,可靠性和效率方面的有效性。结论是,移动应用程序是为用户提供导航和校园信息的有效工具。对于结果,所有标准的平均值为4.12,使用5点李克特量表解释为非常有效。因此,移动应用程序是有用的、可靠的、功能强大的、高效的。
{"title":"TIP EXPRESS: An Android School Navigation Application","authors":"Reynaldo E. Castillo, Cubao Quezon City Metro Manila Philippines Aurora Boulevard, Paula Jean M. Castro, M. C. Aragon, Henry C. Macugay","doi":"10.17706/IJCCE.2018.7.3.98-106","DOIUrl":"https://doi.org/10.17706/IJCCE.2018.7.3.98-106","url":null,"abstract":"Unfamiliarity about the school campus grounds results common problems for new students or visitors. They tend to get lost inside the campus, arrive late in classes or meetings. They navigate by themselves and ask security personnel, still they tend to take time to reach their destination or most often they get lost. This study is for new students and visitors. It helps them to explore and navigate the campus grounds thru a mobile application. The mobile application provides a user-friendly interface which considers user experience. The mobile application serves as a guiding tool in navigating around the school campus grounds. In the study, the mobile application used Google Map to track the current location of the user and plot the route from the origin to the destination inside the Technological Institute of the Philippines Quezon City campus using fuzzy logic algorithm to get the shortest route and channel selection algorithm to get the nearby user within a perimeter. The study used the Rapid Application Development model in order to deliver expected outputs. Surveys using a questioner drafted from ISO 25010 were conducted to determine the effectiveness of the developed mobile application in terms of its functionality, reliability and efficiency. It was concluded that the mobile application is an effective tool in giving navigation and campus information for its users. For the result, the average mean of all the criteria yields 4.12 interpreted as very effective using the 5 point Likert’s Scale. Thus, the mobile application is useful reliable, functional, and efficient to serve its purpose.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78473555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Contextual Feature Weighting Using Knowledge beyond the Repository Knowledge 使用知识库知识以外的知识进行上下文特征加权
Kazem Qazanfari, Abdou Youssef
Bag of words, bigram, or more complex combinations of words are the most among general and widely used features in text classification. However, in almost all real-world text classification problems, the distribution of the available training dataset for each class often does not match the real distribution of the class concept, which reduces the accuracy of the classifiers. Let W(f) and R(f) be the discriminating power of feature f based on the world knowledge and the repository knowledge, respectively. In an ideal situation, W(f) = R(f) is desirable; however, in most situations, W(f) and R(f) are not equal and sometimes they are quite different, because the repository knowledge and the world knowledge do not have the same statistics about the discriminating power of feature f. In this paper, this phenomenon is called inadequacy of knowledge and we show how this phenomenon could reduce the performance of the text classifiers. To solve this issue, a novel feature weighting method is proposed which combines two bodies of knowledge, world knowledge and repository knowledge, using a particular transformation T. In this method, if both the world knowledge and the repository knowledge indicate a significantly high (resp., low) discriminating power of feature f, the weight of this feature is increased (resp., decreased); otherwise, the weight of the feature will be determined by a linear combination of the two weights. Experimental results show that the performance of classifiers like SVM, KNN and Bayes improves significantly if the proposed feature weighting method is applied on the contextual features such as bigram and unigram. It is shown also that pruning some words from the dataset using the proposed feature weighting method could improve the performance of the text classifier when the feature sets are created using Doc2vec.
在文本分类中,词袋、双字或更复杂的词组合是最常用和最广泛使用的特征。然而,在几乎所有现实世界的文本分类问题中,每个类别的可用训练数据集的分布往往与类别概念的真实分布不匹配,这降低了分类器的准确性。设W(f)和R(f)分别为基于世界知识和知识库知识的特征f的识别能力。在理想情况下,W(f) = R(f)是理想的;然而,在大多数情况下,W(f)和R(f)是不相等的,有时它们差别很大,因为存储库知识和世界知识对特征f的判别能力没有相同的统计。在本文中,这种现象被称为知识不足,我们展示了这种现象如何降低文本分类器的性能。为了解决这一问题,提出了一种新的特征加权方法,该方法将世界知识和知识库知识两个知识体结合起来,使用特定的变换t。当特征f的识别能力较低时,该特征的权重增加(见图1)。,减少);否则,特征的权值将由两个权值的线性组合确定。实验结果表明,如果将所提出的特征加权方法应用于双图和单图等上下文特征上,SVM、KNN和Bayes等分类器的性能都有显著提高。当使用Doc2vec创建特征集时,使用所提出的特征加权方法从数据集中修剪一些词可以提高文本分类器的性能。
{"title":"Contextual Feature Weighting Using Knowledge beyond the Repository Knowledge","authors":"Kazem Qazanfari, Abdou Youssef","doi":"10.17706/IJCCE.2018.7.3.45-57","DOIUrl":"https://doi.org/10.17706/IJCCE.2018.7.3.45-57","url":null,"abstract":"Bag of words, bigram, or more complex combinations of words are the most among general and widely used features in text classification. However, in almost all real-world text classification problems, the distribution of the available training dataset for each class often does not match the real distribution of the class concept, which reduces the accuracy of the classifiers. Let W(f) and R(f) be the discriminating power of feature f based on the world knowledge and the repository knowledge, respectively. In an ideal situation, W(f) = R(f) is desirable; however, in most situations, W(f) and R(f) are not equal and sometimes they are quite different, because the repository knowledge and the world knowledge do not have the same statistics about the discriminating power of feature f. In this paper, this phenomenon is called inadequacy of knowledge and we show how this phenomenon could reduce the performance of the text classifiers. To solve this issue, a novel feature weighting method is proposed which combines two bodies of knowledge, world knowledge and repository knowledge, using a particular transformation T. In this method, if both the world knowledge and the repository knowledge indicate a significantly high (resp., low) discriminating power of feature f, the weight of this feature is increased (resp., decreased); otherwise, the weight of the feature will be determined by a linear combination of the two weights. Experimental results show that the performance of classifiers like SVM, KNN and Bayes improves significantly if the proposed feature weighting method is applied on the contextual features such as bigram and unigram. It is shown also that pruning some words from the dataset using the proposed feature weighting method could improve the performance of the text classifier when the feature sets are created using Doc2vec.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90455634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1