首页 > 最新文献

Proceedings of the 2019 3rd International Conference on Information System and Data Mining最新文献

英文 中文
Using Robust Data Governance to Mitigate the Impact of Cybercrime 利用稳健的数据治理减轻网络犯罪的影响
Gerald Onwujekwe, Manoj A. Thomas, Kweku-Muata A. Osei-Bryson
The Deloitte's report (2015) on cybersecurity trends states that emerging technologies, coupled with a shifting threat profile, are challenging organizations to deal more and more with sophisticated "bad actors" that are motivated, skilled, and adaptable [1]. There is little doubt that cybercrime is growing more rapidly than cybersecurity measures are able to deal with and businesses and governments have never been more at risk from cyberattacks. In this paper, we ask the question, 'what are some of the robust data governance practices that can be put in place to forestall cybercrime?' We also asked the question, 'are there some research papers that have been published to address this concern? We then took a deep into extant literature to find out. Furthermore, we proposed a cybercrime mitigation framework using robust data governance. Our literature synthesis revealed that there is little research that investigated the concept of data governance and cybercrime together, which leads us to propose research hypotheses for a future quantitative research.
德勤(Deloitte)关于网络安全趋势的报告(2015年)指出,新兴技术加上不断变化的威胁状况,正在挑战组织应对越来越多的复杂的“不良行为者”,这些“不良行为者”有动机、熟练且适应性强[1]。毫无疑问,网络犯罪的增长速度超过了网络安全措施能够应对的速度,企业和政府从未像现在这样面临网络攻击的风险。在本文中,我们提出了这样一个问题:“有哪些稳健的数据治理实践可以用来预防网络犯罪?”我们还问了一个问题,“有没有发表过一些研究论文来解决这个问题?”然后我们深入研究了现存的文献来寻找答案。此外,我们提出了一个使用稳健数据治理的网络犯罪缓解框架。我们的文献综合发现,将数据治理概念与网络犯罪结合起来研究的研究很少,这使得我们为未来的定量研究提出了研究假设。
{"title":"Using Robust Data Governance to Mitigate the Impact of Cybercrime","authors":"Gerald Onwujekwe, Manoj A. Thomas, Kweku-Muata A. Osei-Bryson","doi":"10.1145/3325917.3325923","DOIUrl":"https://doi.org/10.1145/3325917.3325923","url":null,"abstract":"The Deloitte's report (2015) on cybersecurity trends states that emerging technologies, coupled with a shifting threat profile, are challenging organizations to deal more and more with sophisticated \"bad actors\" that are motivated, skilled, and adaptable [1]. There is little doubt that cybercrime is growing more rapidly than cybersecurity measures are able to deal with and businesses and governments have never been more at risk from cyberattacks. In this paper, we ask the question, 'what are some of the robust data governance practices that can be put in place to forestall cybercrime?' We also asked the question, 'are there some research papers that have been published to address this concern? We then took a deep into extant literature to find out. Furthermore, we proposed a cybercrime mitigation framework using robust data governance. Our literature synthesis revealed that there is little research that investigated the concept of data governance and cybercrime together, which leads us to propose research hypotheses for a future quantitative research.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Instant Adaptation Enrichment Technique to Improve Web Accessibility for Blind Users 提高盲人网页可访问性的即时适应增强技术
Suliman K. Almasoud, H. Mathkour
The Internet in general and the web are considered the main medium of remote communication. They are important sources of information and services to all the users. Assistive technologies and tools facilitate web accessibility to help users with special needs by delivering the content of the webpages in a form that is understandable by these users. However, these assistive technologies and tools often face certain obstacles in delivering the information because of the confusion of web design elements caused by poor webpage design or carelessness in following the web accessibility guidelines. In this paper, we list the minimum required web accessibility guidelines formulated on the basis of a comprehensive review of WCAG 2.1 guidelines to be followed while developing webpages for visually impaired users. We then introduce a tool intended to enhance web accessibility for such users. We tested the tool on a few websites and observed that it significantly improved the webpage accessibility of these websites.
一般来说,Internet和web被认为是远程通信的主要媒介。它们是所有用户重要的信息和服务来源。辅助技术和工具以用户可理解的形式提供网页内容,以方便有特殊需要的用户浏览网页。然而,这些辅助技术和工具在传递信息时往往面临一定的障碍,因为网页设计不佳或粗心大意导致网页设计元素的混乱。在本文中,我们在全面检讨WCAG 2.1指引的基础上,列出了为视障用户开发网页时应遵循的最低要求的网页易读性指引。然后,我们介绍了一个工具,旨在提高这些用户的网页可访问性。我们在一些网站上测试了该工具,并观察到它显着改善了这些网站的网页可访问性。
{"title":"Instant Adaptation Enrichment Technique to Improve Web Accessibility for Blind Users","authors":"Suliman K. Almasoud, H. Mathkour","doi":"10.1145/3325917.3325931","DOIUrl":"https://doi.org/10.1145/3325917.3325931","url":null,"abstract":"The Internet in general and the web are considered the main medium of remote communication. They are important sources of information and services to all the users. Assistive technologies and tools facilitate web accessibility to help users with special needs by delivering the content of the webpages in a form that is understandable by these users. However, these assistive technologies and tools often face certain obstacles in delivering the information because of the confusion of web design elements caused by poor webpage design or carelessness in following the web accessibility guidelines. In this paper, we list the minimum required web accessibility guidelines formulated on the basis of a comprehensive review of WCAG 2.1 guidelines to be followed while developing webpages for visually impaired users. We then introduce a tool intended to enhance web accessibility for such users. We tested the tool on a few websites and observed that it significantly improved the webpage accessibility of these websites.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Traffic Anomaly Detection Based on Information Gain and Deep Learning 基于信息增益和深度学习的网络流量异常检测
Xianglin Lu, Pengju Liu, Jiayi Lin
With the rapid development of the Internet, the network traffic shows an explosive growth trend. Although the Internet facilitates people's lives, it also brings a lot of security threats. Thus, the analysis of abnormal behavior of network traffic becomes a crucial factor for ensuring the quality of Internet services and preventing network intrusion. This paper proposes a deep learning method that combines CNN and LSTM to detect abnormal network traffic, especially unknown intrusions. In the field of machine learning, the choice of features is the key ingredient to the effect and accuracy of the model. Therefore, this paper also proposes a feature selection method based on Information Gain (IG), extracting more valuable features, which are fed into the model. We use CNN to extract the higher dimensional features of the input data, and then use LSTM to learn the timing characteristics of the network traffic. We applied our model on the KDD99 dataset and assessed its accuracy. When the epoch greater than 4, the training accuracy reaches 0.99 and testing accuracy reaches 0.925, which showed a certain improvement compared with the traditional model. In the era when information volume is becoming more and more dense, the analysis of network traffic will become more and more necessary, which also proves broader application prospects.
随着互联网的快速发展,网络流量呈现爆发式增长趋势。虽然互联网方便了人们的生活,但它也带来了很多安全威胁。因此,分析网络流量的异常行为成为保证互联网服务质量和防止网络入侵的关键因素。本文提出了一种结合CNN和LSTM的深度学习方法来检测异常网络流量,特别是未知入侵。在机器学习领域,特征的选择是影响模型效果和准确性的关键因素。因此,本文还提出了一种基于信息增益(Information Gain, IG)的特征选择方法,提取更多有价值的特征,并将其输入到模型中。我们使用CNN提取输入数据的高维特征,然后使用LSTM学习网络流量的时序特征。我们将我们的模型应用于KDD99数据集并评估了它的准确性。当epoch大于4时,训练精度达到0.99,测试精度达到0.925,与传统模型相比有一定的提高。在信息量越来越密集的时代,对网络流量的分析将越来越有必要,这也证明了更广阔的应用前景。
{"title":"Network Traffic Anomaly Detection Based on Information Gain and Deep Learning","authors":"Xianglin Lu, Pengju Liu, Jiayi Lin","doi":"10.1145/3325917.3325946","DOIUrl":"https://doi.org/10.1145/3325917.3325946","url":null,"abstract":"With the rapid development of the Internet, the network traffic shows an explosive growth trend. Although the Internet facilitates people's lives, it also brings a lot of security threats. Thus, the analysis of abnormal behavior of network traffic becomes a crucial factor for ensuring the quality of Internet services and preventing network intrusion. This paper proposes a deep learning method that combines CNN and LSTM to detect abnormal network traffic, especially unknown intrusions. In the field of machine learning, the choice of features is the key ingredient to the effect and accuracy of the model. Therefore, this paper also proposes a feature selection method based on Information Gain (IG), extracting more valuable features, which are fed into the model. We use CNN to extract the higher dimensional features of the input data, and then use LSTM to learn the timing characteristics of the network traffic. We applied our model on the KDD99 dataset and assessed its accuracy. When the epoch greater than 4, the training accuracy reaches 0.99 and testing accuracy reaches 0.925, which showed a certain improvement compared with the traditional model. In the era when information volume is becoming more and more dense, the analysis of network traffic will become more and more necessary, which also proves broader application prospects.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130019594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Practical Evaluation of a Secure and Energy-Efficient Smart Parking System Using the MQTT Protocol 基于MQTT协议的安全节能智能停车系统的实际评估
Ali Alqazzaz, Raed Alharthi, Ibrahim Alrashdi, E. Aloufi, M. Zohdy, Ming Hua
The smart parking system is a major component of the smart city concept, especially in the age of the Internet of Things (IoT). It attempts to take the stress out of finding a free parking space in crowded places, mostly during peak times. This paper focuses on implementing a secure smart parking solution based on the publish-subscribe communication model for exchanging a huge volume of data with a large number of clients while minimizing the power consumption. The Elliptic Curve Cryptography (ECC) was adopted in this paper as a promising substitution to traditional public key cryptography such as Rivest-Shamir-Adleman (RSA). The implemented system provides several functional services including parking vacancy detection, real-time information for drivers about parking availability, driver guidance, and parking reservation. Moreover, it provides security mechanisms for both network and application layers. Performance and power consumption experiments using a testbed show the efficiency and practicality of the implemented system, essentially with the IoT resource-constrained devices. Our findings demonstrate achieving energy consumption reductions of up to 54% and a CPU usage decrease of up to 55% compared to the existing solutions.
智能停车系统是智慧城市概念的重要组成部分,特别是在物联网(IoT)时代。它试图减轻人们在拥挤的地方(主要是高峰时段)寻找免费停车位的压力。本文重点研究了一种基于发布-订阅通信模型的安全智能停车解决方案,以实现与大量客户端交换大量数据的同时最小化功耗。本文采用椭圆曲线密码术(ECC)作为传统公钥密码术如RSA (Rivest-Shamir-Adleman)的替代方案。所实现的系统提供了车位空置检测、车位可用性实时信息、驾驶员引导、车位预定等功能服务。此外,它还为网络层和应用层提供了安全机制。使用测试平台的性能和功耗实验显示了所实施系统的效率和实用性,主要是与物联网资源受限的设备。我们的研究结果表明,与现有的解决方案相比,实现了高达54%的能耗降低和高达55%的CPU使用率降低。
{"title":"A Practical Evaluation of a Secure and Energy-Efficient Smart Parking System Using the MQTT Protocol","authors":"Ali Alqazzaz, Raed Alharthi, Ibrahim Alrashdi, E. Aloufi, M. Zohdy, Ming Hua","doi":"10.1145/3325917.3325937","DOIUrl":"https://doi.org/10.1145/3325917.3325937","url":null,"abstract":"The smart parking system is a major component of the smart city concept, especially in the age of the Internet of Things (IoT). It attempts to take the stress out of finding a free parking space in crowded places, mostly during peak times. This paper focuses on implementing a secure smart parking solution based on the publish-subscribe communication model for exchanging a huge volume of data with a large number of clients while minimizing the power consumption. The Elliptic Curve Cryptography (ECC) was adopted in this paper as a promising substitution to traditional public key cryptography such as Rivest-Shamir-Adleman (RSA). The implemented system provides several functional services including parking vacancy detection, real-time information for drivers about parking availability, driver guidance, and parking reservation. Moreover, it provides security mechanisms for both network and application layers. Performance and power consumption experiments using a testbed show the efficiency and practicality of the implemented system, essentially with the IoT resource-constrained devices. Our findings demonstrate achieving energy consumption reductions of up to 54% and a CPU usage decrease of up to 55% compared to the existing solutions.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CUDA Optimized Neural Network Predicts Blood Glucose Control from Quantified Joint Mobility and Anthropometrics CUDA优化神经网络预测血糖控制量化关节活动和人体测量
Sterling Ramroach, A. Dhanoo, B. Cockburn, A. Joshi
Neural network training entails heavy computation with obvious bottlenecks. The Compute Unified Device Architecture (CUDA) programming model allows us to accelerate computation by passing the processing workload from the CPU to the graphics processing unit (GPU). In this paper, we leveraged the power of Nvidia GPUs to parallelize all of the computation involved in training, to accelerate a backpropagation feed-forward neural network with one hidden layer using CUDA and C++. This optimized neural network was tasked with predicting the level of glycated hemoglobin (HbA1c) from non-invasive markers. The rate of increase in the prevalence of Diabetes Mellitus has resulted in an urgent need for early detection and accurate diagnosis. However, due to the invasiveness and limitations of conventional tests, alternate means are being considered. Limited Joint Mobility (LJM) has been reported as an indicator for poor glycemic control. LJM of the fingers is quantified and its link to HbA1c is investigated along with other potential non-invasive markers of HbA1c. We collected readings of 33 potential markers from 120 participants at a clinic in south Trinidad. Our neural network achieved 95.65% accuracy on the training and 86.67% accuracy on the testing set for male participants and 97.73% and 66.67% accuracy on the training and testing sets for female participants. Using 960 CUDA cores from a Nvidia GeForce GTX 660, our parallelized neural network was trained 50 times faster on both subsets, than its corresponding CPU implementation on an Intel® Core™ i7-3630QM 2.40 GHz CPU.
神经网络训练计算量大,瓶颈明显。计算统一设备架构(CUDA)编程模型允许我们通过将处理工作负载从CPU传递到图形处理单元(GPU)来加速计算。在本文中,我们利用Nvidia gpu的强大功能来并行化训练中涉及的所有计算,使用CUDA和c++加速具有一个隐藏层的反向传播前馈神经网络。该优化的神经网络的任务是通过无创标记物预测糖化血红蛋白(HbA1c)水平。随着糖尿病患病率的上升,人们迫切需要对其进行早期发现和准确诊断。然而,由于常规检查的侵入性和局限性,正在考虑其他方法。据报道,关节活动受限(LJM)是血糖控制不良的一个指标。手指LJM被量化,并与其他潜在的非侵入性HbA1c标志物一起研究其与HbA1c的联系。我们从特立尼达南部一家诊所的120名参与者中收集了33种潜在标记物的读数。我们的神经网络在男性参与者的训练集和测试集上的准确率分别为95.65%和86.67%,在女性参与者的训练集和测试集上的准确率分别为97.73%和66.67%。使用Nvidia GeForce GTX 660的960个CUDA内核,我们的并行神经网络在两个子集上的训练速度比在Intel®Core™i7-3630QM 2.40 GHz CPU上的相应CPU实现快50倍。
{"title":"CUDA Optimized Neural Network Predicts Blood Glucose Control from Quantified Joint Mobility and Anthropometrics","authors":"Sterling Ramroach, A. Dhanoo, B. Cockburn, A. Joshi","doi":"10.1145/3325917.3325940","DOIUrl":"https://doi.org/10.1145/3325917.3325940","url":null,"abstract":"Neural network training entails heavy computation with obvious bottlenecks. The Compute Unified Device Architecture (CUDA) programming model allows us to accelerate computation by passing the processing workload from the CPU to the graphics processing unit (GPU). In this paper, we leveraged the power of Nvidia GPUs to parallelize all of the computation involved in training, to accelerate a backpropagation feed-forward neural network with one hidden layer using CUDA and C++. This optimized neural network was tasked with predicting the level of glycated hemoglobin (HbA1c) from non-invasive markers. The rate of increase in the prevalence of Diabetes Mellitus has resulted in an urgent need for early detection and accurate diagnosis. However, due to the invasiveness and limitations of conventional tests, alternate means are being considered. Limited Joint Mobility (LJM) has been reported as an indicator for poor glycemic control. LJM of the fingers is quantified and its link to HbA1c is investigated along with other potential non-invasive markers of HbA1c. We collected readings of 33 potential markers from 120 participants at a clinic in south Trinidad. Our neural network achieved 95.65% accuracy on the training and 86.67% accuracy on the testing set for male participants and 97.73% and 66.67% accuracy on the training and testing sets for female participants. Using 960 CUDA cores from a Nvidia GeForce GTX 660, our parallelized neural network was trained 50 times faster on both subsets, than its corresponding CPU implementation on an Intel® Core™ i7-3630QM 2.40 GHz CPU.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Polymorphic Equilibrium of Internet Economy 互联网经济的多态均衡研究
Chenggang Li, Lu Ge
Economics of partial equilibrium and general equilibrium cannot analyse the balanced problem of Internet economy, a single price lever is not fit for a full analysis of the Internet economy equilibrium problem, which the Internet economy equilibrium with polymorphism.this paper from the perspective of balanced general understanding and criticism, analyzes the equilibrium problems in western economics, and studied the foundation and the condition of the Internet economy polymorphic equilibrium analysis.
部分均衡和一般均衡经济学无法分析互联网经济的均衡问题,单一的价格杠杆不适合全面分析互联网经济的均衡问题,互联网经济均衡具有多态性。本文从均衡的一般认识和批判的角度,分析了西方经济学中的均衡问题,并研究了互联网经济多态均衡分析的基础和条件。
{"title":"Study on Polymorphic Equilibrium of Internet Economy","authors":"Chenggang Li, Lu Ge","doi":"10.1145/3325917.3325950","DOIUrl":"https://doi.org/10.1145/3325917.3325950","url":null,"abstract":"Economics of partial equilibrium and general equilibrium cannot analyse the balanced problem of Internet economy, a single price lever is not fit for a full analysis of the Internet economy equilibrium problem, which the Internet economy equilibrium with polymorphism.this paper from the perspective of balanced general understanding and criticism, analyzes the equilibrium problems in western economics, and studied the foundation and the condition of the Internet economy polymorphic equilibrium analysis.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127713852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Intelligent Algorithms to Construct a Wafer Foundry System in Manufacturing Industry 利用智能算法构建制造业晶圆代工系统
Ruey-Shun Chen, Yeh-Cheng Chen, Jyh-haw Yeh, Yu-Xi Hu, N. Xiong, C-P Lee
The research combines two heuristic algorithms, COMSOAL and Priority rule-based algorithm, to design a production scheduling algorithm. Meanwhile it refers to dispatching rule and wafer start rule. Also base on the requirements and characters of wafer foundry companies, it designs proper capacity constraint model and wafer start rule to construct production planning system. Using simple, fast and flexible methods to generate reasonable and feasible production plans. The results of the research can give the wafer foundry companies several contributions. First, it shortens the execution time of generating a production plan. It improves the flexibility and efficiency of production planning. Second, the resolution of production plan is raised from the summary of manufacturing process and product type to full product name of order and demand allocation. It improves the resolution and accuracy of information analysis. Third, the planning period of wafer start plan is improved as well. Last, the frequency of production planning operation is improved from once a fortnight to once a week.
本研究结合COMSOAL和基于优先级规则的两种启发式算法,设计了一种生产调度算法。同时还包括调度规则和启动规则。根据晶圆代工企业的需求和特点,设计合适的产能约束模型和晶圆启动规则,构建生产计划体系。用简单、快速、灵活的方法生成合理可行的生产计划。研究结果对晶圆代工企业具有一定的参考价值。首先,它缩短了生成生产计划的执行时间。提高了生产计划的灵活性和效率。其次,将生产计划的决议从制造工艺和产品类型的总结提高到订单和需求分配的完整产品名称。它提高了信息分析的分辨率和准确性。第三,晶圆启动计划的规划周期也有所改善。最后,生产计划操作的频率从两周一次提高到一周一次。
{"title":"Using Intelligent Algorithms to Construct a Wafer Foundry System in Manufacturing Industry","authors":"Ruey-Shun Chen, Yeh-Cheng Chen, Jyh-haw Yeh, Yu-Xi Hu, N. Xiong, C-P Lee","doi":"10.1145/3325917.3325918","DOIUrl":"https://doi.org/10.1145/3325917.3325918","url":null,"abstract":"The research combines two heuristic algorithms, COMSOAL and Priority rule-based algorithm, to design a production scheduling algorithm. Meanwhile it refers to dispatching rule and wafer start rule. Also base on the requirements and characters of wafer foundry companies, it designs proper capacity constraint model and wafer start rule to construct production planning system. Using simple, fast and flexible methods to generate reasonable and feasible production plans. The results of the research can give the wafer foundry companies several contributions. First, it shortens the execution time of generating a production plan. It improves the flexibility and efficiency of production planning. Second, the resolution of production plan is raised from the summary of manufacturing process and product type to full product name of order and demand allocation. It improves the resolution and accuracy of information analysis. Third, the planning period of wafer start plan is improved as well. Last, the frequency of production planning operation is improved from once a fortnight to once a week.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133930760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Application of Image Classification to Saltwater Fish Identification in Louisiana Fisheries 图像分类在路易斯安那州咸水鱼类识别中的应用
Nibha Manandhar, John W. Burris
Fish identification is a challenge to recreational anglers, but critically important to the management of fisheries. The state of Louisiana currently provides printed illustrations of species as the sole aid to anglers for the process of fish identification. This work describes the application of Google's TensorFlow machine learning library to the task of fish identification as a case study on the application of the image classification capabilities. We describe the implementation and results of the project.
鱼类识别对休闲垂钓者来说是一个挑战,但对渔业管理至关重要。路易斯安那州目前提供鱼类种类的印刷插图,作为垂钓者识别鱼类过程的唯一辅助工具。这项工作描述了谷歌的TensorFlow机器学习库在鱼类识别任务中的应用,作为图像分类能力应用的案例研究。我们描述了项目的实施和结果。
{"title":"An Application of Image Classification to Saltwater Fish Identification in Louisiana Fisheries","authors":"Nibha Manandhar, John W. Burris","doi":"10.1145/3325917.3325934","DOIUrl":"https://doi.org/10.1145/3325917.3325934","url":null,"abstract":"Fish identification is a challenge to recreational anglers, but critically important to the management of fisheries. The state of Louisiana currently provides printed illustrations of species as the sole aid to anglers for the process of fish identification. This work describes the application of Google's TensorFlow machine learning library to the task of fish identification as a case study on the application of the image classification capabilities. We describe the implementation and results of the project.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128388744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research Trends in Knowledge Management: Past, Present and Future 知识管理的研究趋势:过去、现在和未来
Shabahat Husain, Rumman Gul
The concept, Knowledge Management (KM) visualizes the accessibility of the knowledge created by an organization by those who need it. It deals with both the Explicit (i.e. Documented) and Implicit (i.e. engrained in human minds as skills, thoughts, ethics etc) types of knowledge. KM though finds its usability and applicability in all types of organizations, but as witnessed from the literature, it is mostly found operational in business organizations. An overview of the literature available on Knowledge Management (KM) and Knowledge Management System (KMS) clearly shows certain research and development trends, the study of which is the primary focus of the present paper, that precisely appertains to the conceptual development of KM, KMS, KM Models, KM Tools, and KMS in Profit making and Non-profit making organizations.
知识管理(KM)的概念可视化了组织中需要的人对知识的可访问性。它涉及显性(即记录在案的)和隐性(即作为技能、思想、伦理等在人类头脑中根深蒂固的)知识类型。知识管理虽然在所有类型的组织中都有其可用性和适用性,但从文献中可以看出,它主要是在商业组织中被发现具有操作性。对知识管理(KM)和知识管理系统(KMS)现有文献的概述清楚地显示出某些研究和发展趋势,这是本文的主要重点,这恰恰适用于知识管理、知识管理、知识管理模型、知识管理工具和知识管理在盈利和非营利组织中的概念发展。
{"title":"Research Trends in Knowledge Management: Past, Present and Future","authors":"Shabahat Husain, Rumman Gul","doi":"10.1145/3325917.3325949","DOIUrl":"https://doi.org/10.1145/3325917.3325949","url":null,"abstract":"The concept, Knowledge Management (KM) visualizes the accessibility of the knowledge created by an organization by those who need it. It deals with both the Explicit (i.e. Documented) and Implicit (i.e. engrained in human minds as skills, thoughts, ethics etc) types of knowledge. KM though finds its usability and applicability in all types of organizations, but as witnessed from the literature, it is mostly found operational in business organizations. An overview of the literature available on Knowledge Management (KM) and Knowledge Management System (KMS) clearly shows certain research and development trends, the study of which is the primary focus of the present paper, that precisely appertains to the conceptual development of KM, KMS, KM Models, KM Tools, and KMS in Profit making and Non-profit making organizations.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Citrus Greening Infection Detection (CiGID) by Computer Vision and Deep Learning 通过计算机视觉和深度学习检测柑橘绿化病害(CiGID)
Charles T. Soini, Sofiane Fellah, Muhammad R. Abid
The citrus greening infection detection algorithm is performed via computer vision techniques and deep learning for the purpose of extracting sub-images of fruit from a tree image and using a trained machine learning function to determine if the fruit shows signs of a citrus greening infection disease called Huanglongbing. We trained our deep learning inception model with 4000 iterations and achieved validation accuracy 93.3%. The computer vision fruit sub-image extraction resulted in at worst around 80% accuracy in tree images and was manually calibrated to detect a specific range of orange color values.
柑橘绿化感染检测算法是通过计算机视觉技术和深度学习实现的,目的是从树图像中提取果实的子图像,并使用训练有素的机器学习函数来判断果实是否显示出柑橘绿化感染病(黄龙病)的迹象。我们用 4000 次迭代训练了深度学习初始模型,验证准确率达到 93.3%。计算机视觉水果子图像提取在树图像中的最差准确率约为 80%,并经过人工校准以检测特定范围的橙色值。
{"title":"Citrus Greening Infection Detection (CiGID) by Computer Vision and Deep Learning","authors":"Charles T. Soini, Sofiane Fellah, Muhammad R. Abid","doi":"10.1145/3325917.3325936","DOIUrl":"https://doi.org/10.1145/3325917.3325936","url":null,"abstract":"The citrus greening infection detection algorithm is performed via computer vision techniques and deep learning for the purpose of extracting sub-images of fruit from a tree image and using a trained machine learning function to determine if the fruit shows signs of a citrus greening infection disease called Huanglongbing. We trained our deep learning inception model with 4000 iterations and achieved validation accuracy 93.3%. The computer vision fruit sub-image extraction resulted in at worst around 80% accuracy in tree images and was manually calibrated to detect a specific range of orange color values.","PeriodicalId":249061,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Information System and Data Mining","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130452914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the 2019 3rd International Conference on Information System and Data Mining
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1