首页 > 最新文献

Proceedings of the 2019 8th International Conference on Software and Computer Applications最新文献

英文 中文
Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model 基于比特流分割模型的一维混沌映射增强
Moatsum Alawida, A. Samsudin, Wafa’ Hamdan Alshoura
The chaotic map has attracted more researchers in chaotic cryptography domain. That is because to large similarity among their characteristics such as unpredictability and sensitivity to an initial condition. Moreover, chaotic maps are a source of entropy that provide diffusion and confusion strength in cryptographic applications. Although existing one dimensional chaotic maps are widely used, many security issues are found in their behaviors. This paper tackles those issues through the new proposed solution model that uses bitstream dividing model. The proposed model uses the fixed-point format to extract bitstream and dividing a chaotic state into N equal parts, each part is a new chaotic state. In order to show the effectiveness of the proposed model, the unimodal maps are used in the simulation, it is shown that the proposed model has better chaotic complexity and performance than the corresponding maps. Moreover, it is a simple structure but effective and can be used as a chaotification model to generate digital chaos. In chaos-based cryptography, the enhanced maps have a better security strength which is highly needed for the development of chaos-based ciphers.
混沌映射在混沌密码领域引起了越来越多的研究。这是因为它们的特征非常相似,比如不可预测性和对初始条件的敏感性。此外,混沌映射是在密码学应用中提供扩散和混淆强度的熵源。现有的一维混沌映射虽然应用广泛,但其行为存在许多安全问题。本文通过比特流分割模型解决了这些问题。该模型采用定点格式提取比特流,将混沌状态分成N等份,每等份为一个新的混沌状态。为了证明所提模型的有效性,将单峰映射应用于仿真中,结果表明所提模型比相应的映射具有更好的混沌复杂度和性能。它结构简单,但效果良好,可以作为一种混沌化模型来产生数字混沌。在基于混沌的密码学中,增强映射具有更好的安全强度,这是基于混沌的密码学发展所需要的。
{"title":"Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model","authors":"Moatsum Alawida, A. Samsudin, Wafa’ Hamdan Alshoura","doi":"10.1145/3316615.3316657","DOIUrl":"https://doi.org/10.1145/3316615.3316657","url":null,"abstract":"The chaotic map has attracted more researchers in chaotic cryptography domain. That is because to large similarity among their characteristics such as unpredictability and sensitivity to an initial condition. Moreover, chaotic maps are a source of entropy that provide diffusion and confusion strength in cryptographic applications. Although existing one dimensional chaotic maps are widely used, many security issues are found in their behaviors. This paper tackles those issues through the new proposed solution model that uses bitstream dividing model. The proposed model uses the fixed-point format to extract bitstream and dividing a chaotic state into N equal parts, each part is a new chaotic state. In order to show the effectiveness of the proposed model, the unimodal maps are used in the simulation, it is shown that the proposed model has better chaotic complexity and performance than the corresponding maps. Moreover, it is a simple structure but effective and can be used as a chaotification model to generate digital chaos. In chaos-based cryptography, the enhanced maps have a better security strength which is highly needed for the development of chaos-based ciphers.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129227682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Role-Based ABAC Model for Implementing Least Privileges 实现最小权限的基于角色的ABAC模型
Muhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, A. Javed, Xuyun Nie
RBAC and ABAC are well-known access control models due to their least privileges and dynamic behavior respectively. They also have some drawbacks like RBAC is unable to provide dynamic behavior and flexibility as well as ABAC is unable to provide tight security and ease of management of permissions as the RBAC can do. In this paper, a hybrid access control model is proposed and developed that combines the strengths of both models. The proposed model implements the concept of roles between a user and the user's attributes as well as between the object and object attributes, in the ABAC system. The proposed model decreases the load of the administrator, provides least of privileges concept in ABAC due to the addition of roles. Authors also implemented the proposed model and discussed with respect to a case study.
RBAC和ABAC分别因其最小权限和动态行为而成为知名的访问控制模型。它们也有一些缺点,比如RBAC不能提供动态行为和灵活性,ABAC不能像RBAC那样提供严格的安全性和易于管理的权限。本文提出并开发了一种结合两种模型优点的混合访问控制模型。该模型实现了ABAC系统中用户与用户属性之间、对象与对象属性之间的角色概念。该模型减少了管理员的负担,由于增加了角色,在ABAC中提供了权限最小的概念。作者还对所提出的模型进行了实现,并就一个案例进行了讨论。
{"title":"Role-Based ABAC Model for Implementing Least Privileges","authors":"Muhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, A. Javed, Xuyun Nie","doi":"10.1145/3316615.3316667","DOIUrl":"https://doi.org/10.1145/3316615.3316667","url":null,"abstract":"RBAC and ABAC are well-known access control models due to their least privileges and dynamic behavior respectively. They also have some drawbacks like RBAC is unable to provide dynamic behavior and flexibility as well as ABAC is unable to provide tight security and ease of management of permissions as the RBAC can do. In this paper, a hybrid access control model is proposed and developed that combines the strengths of both models. The proposed model implements the concept of roles between a user and the user's attributes as well as between the object and object attributes, in the ABAC system. The proposed model decreases the load of the administrator, provides least of privileges concept in ABAC due to the addition of roles. Authors also implemented the proposed model and discussed with respect to a case study.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Data Mining the Smartphone Manipulation Skills in a Coffee Farming Community: A Step for Risk Analysis 咖啡种植社区智能手机操作技能的数据挖掘:风险分析的一个步骤
M. V. Pagudpud, T. Palaoag
The Philippines is largely an agricultural country, and the importance of coffee in the Philippines cannot be undervalued. However, the coffee plantations are generally confronted with various insect pests and diseases. This is the reason why authorities continue to look for solutions through technological applications for coffee farming. Smartphones are becoming a functional tool in agriculture because its mobility served as an advantage to agriculture. However, challenges regarding the level of ICT, particularly of smartphones technology usage among the rural community is low due to limited knowledge and skills. Thus, this study has the primary objective to apply data mining to the smartphone manipulation skills of possible users' dataset in the province of Quirino, Philippines. Specifically, it sought to determine the optimal number of the types of potential users and to identify the different types of possible users and their skills that emerged from the clustering. The result shows that k=4 is the best choice for the dataset. The four clusters formed to represent the four groups of possible users are the good users with 25 instances, skilled users with 35 instances, the users with limited skills with 83 instances and finally, the expert users with 32 instances. Each of the groups possesses their distinct skills which emerged from the clustering technique implemented.
菲律宾主要是一个农业国家,咖啡在菲律宾的重要性不容低估。然而,咖啡种植园普遍面临着各种病虫害。这就是当局继续通过技术应用寻找咖啡种植解决方案的原因。智能手机之所以成为农业的实用工具,是因为它的移动性曾是农业的优势。然而,由于知识和技能有限,农村社区在信息通信技术水平,特别是智能手机技术使用方面的挑战很低。因此,本研究的主要目的是将数据挖掘应用于菲律宾奎里诺省潜在用户数据集的智能手机操作技能。具体来说,它试图确定潜在用户类型的最佳数量,并确定从聚类中出现的不同类型的潜在用户及其技能。结果表明,k=4是该数据集的最佳选择。代表四组可能用户的四个集群分别是:良好用户(25个实例)、熟练用户(35个实例)、有限技能用户(83个实例)和专家用户(32个实例)。每个小组都有自己独特的技能,这些技能来自于所实现的聚类技术。
{"title":"Data Mining the Smartphone Manipulation Skills in a Coffee Farming Community: A Step for Risk Analysis","authors":"M. V. Pagudpud, T. Palaoag","doi":"10.1145/3316615.3316693","DOIUrl":"https://doi.org/10.1145/3316615.3316693","url":null,"abstract":"The Philippines is largely an agricultural country, and the importance of coffee in the Philippines cannot be undervalued. However, the coffee plantations are generally confronted with various insect pests and diseases. This is the reason why authorities continue to look for solutions through technological applications for coffee farming. Smartphones are becoming a functional tool in agriculture because its mobility served as an advantage to agriculture. However, challenges regarding the level of ICT, particularly of smartphones technology usage among the rural community is low due to limited knowledge and skills. Thus, this study has the primary objective to apply data mining to the smartphone manipulation skills of possible users' dataset in the province of Quirino, Philippines. Specifically, it sought to determine the optimal number of the types of potential users and to identify the different types of possible users and their skills that emerged from the clustering. The result shows that k=4 is the best choice for the dataset. The four clusters formed to represent the four groups of possible users are the good users with 25 instances, skilled users with 35 instances, the users with limited skills with 83 instances and finally, the expert users with 32 instances. Each of the groups possesses their distinct skills which emerged from the clustering technique implemented.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123187801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining the Neural Network Topology: A Review 神经网络拓扑的确定:综述
Muhammad Ibnu Choldun Rachmatullah, J. Santoso, K. Surendro
One of the challenges in the successful implementation of deep neural network (DNN) is setting the value for various hyper-parameters, one of which is the network topology, which is closely related to the number of hidden layers and the number of hidden neurons. Determining the number of hidden layers and the number of neurons is very important and has a large influence on DNN performance. Determining these two numbers manually (usually through trial and error methods) to find fairly optimal arrangement is a time-consuming process, while the automatic approach is divided into two, they are a model-based approach and a non-model based approach. The non-model-based approach, for example, is grid search and random search, whereas model-based approaches, for example, are using particle swarm optimization (PSO) algorithms. In some researches, how to determine the number of hidden layers or number of neurons, often the guidelines are unclear, even the roles and functions of both are explained minimally. Although it is still a difficult area of research, research to determine the number of hidden layers and the number of neurons must continue to be carried out, because these two numbers will greatly determine the performance of DNN.
深度神经网络(deep neural network, DNN)成功实现的挑战之一是设置各种超参数的值,其中一个超参数就是网络拓扑,它与隐藏层的数量和隐藏神经元的数量密切相关。确定隐藏层的数量和神经元的数量是非常重要的,对深度神经网络的性能有很大的影响。手动确定这两个数字(通常通过试错法)以找到相当最佳的排列是一个耗时的过程,而自动方法分为两种,它们是基于模型的方法和非基于模型的方法。非基于模型的方法,如网格搜索和随机搜索,而基于模型的方法,如使用粒子群优化(PSO)算法。在一些研究中,如何确定隐藏层的数量或神经元的数量,往往没有明确的指导方针,甚至对两者的作用和功能的解释也很少。虽然这仍然是一个困难的研究领域,但确定隐藏层数和神经元数的研究必须继续进行,因为这两个数字将极大地决定DNN的性能。
{"title":"Determining the Neural Network Topology: A Review","authors":"Muhammad Ibnu Choldun Rachmatullah, J. Santoso, K. Surendro","doi":"10.1145/3316615.3316697","DOIUrl":"https://doi.org/10.1145/3316615.3316697","url":null,"abstract":"One of the challenges in the successful implementation of deep neural network (DNN) is setting the value for various hyper-parameters, one of which is the network topology, which is closely related to the number of hidden layers and the number of hidden neurons. Determining the number of hidden layers and the number of neurons is very important and has a large influence on DNN performance. Determining these two numbers manually (usually through trial and error methods) to find fairly optimal arrangement is a time-consuming process, while the automatic approach is divided into two, they are a model-based approach and a non-model based approach. The non-model-based approach, for example, is grid search and random search, whereas model-based approaches, for example, are using particle swarm optimization (PSO) algorithms. In some researches, how to determine the number of hidden layers or number of neurons, often the guidelines are unclear, even the roles and functions of both are explained minimally. Although it is still a difficult area of research, research to determine the number of hidden layers and the number of neurons must continue to be carried out, because these two numbers will greatly determine the performance of DNN.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124402252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Hybrid Approach for Forecasting Tourist Arrivals 预测旅游人数的混合方法
Mei-Li Shen, Hsiou-Hsiang Liu, Yi-Hsiang Lien, Cheng-Feng Lee, Cheng-Hong Yang
For the tourism industry, accurate forecasts of travel needs are essential to meeting relevant needs, providing pertinent information to the government, and enabling stakeholders to adjust plans and policies. This study devised an approach that combines feature selection and support vector regression with particle swarm optimization (FS-PSOSVR) to forecast tourists to Singapore. The monthly tourist arrivals to Singapore from January 1978 to December 2017 were utilized as a test dataset. The results showed that the error obtained through FS-PSOSVR was smaller than that through other methods, revealing that FS-PSOSVR is an effective method for predicting tourism demand.
对于旅游业来说,准确预测旅游需求对于满足相关需求、向政府提供相关信息以及使利益相关者能够调整计划和政策至关重要。本研究设计了一种结合特征选择、支持向量回归和粒子群优化(FS-PSOSVR)的方法来预测新加坡游客。使用1978年1月至2017年12月的新加坡每月游客人数作为测试数据集。结果表明,通过FS-PSOSVR得到的误差小于其他方法,表明FS-PSOSVR是一种有效的旅游需求预测方法。
{"title":"Hybrid Approach for Forecasting Tourist Arrivals","authors":"Mei-Li Shen, Hsiou-Hsiang Liu, Yi-Hsiang Lien, Cheng-Feng Lee, Cheng-Hong Yang","doi":"10.1145/3316615.3316628","DOIUrl":"https://doi.org/10.1145/3316615.3316628","url":null,"abstract":"For the tourism industry, accurate forecasts of travel needs are essential to meeting relevant needs, providing pertinent information to the government, and enabling stakeholders to adjust plans and policies. This study devised an approach that combines feature selection and support vector regression with particle swarm optimization (FS-PSOSVR) to forecast tourists to Singapore. The monthly tourist arrivals to Singapore from January 1978 to December 2017 were utilized as a test dataset. The results showed that the error obtained through FS-PSOSVR was smaller than that through other methods, revealing that FS-PSOSVR is an effective method for predicting tourism demand.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":" 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120830617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-Time Carbon Dioxide Monitoring Based on IoT & Cloud Technologies 基于物联网和云技术的实时二氧化碳监测
Fanf Ming, Riyaz Ahamed Ariyaluran Habeeb, F. Nasaruddin, A. Gani
In recent years, environment monitoring are of greater importance towards the area of climate monitoring, analysis, agricultural productivity management, quality assurance of water, air, alongside with other potential factors that are closely connected to industrial development and convenience of living. This research is motivated by creating awareness of smart home residents on indoor air quality, as well as providing insight of carbon dioxide emissions for industries and environmental organizations. This paper proposes an efficient solution towards environment monitoring of carbon dioxide integrated with Internet of Things capability and cloud computing technology. Aforementioned techniques will deliver highly accessible and real-time data visualization which would be greatly beneficial for Smart Homes efficiency of analysis actualization and counter-measures deployment. A monitoring architecture was developed to generate, accumulate, store and visualize carbon dioxide concentration using MQ135 carbon dioxide sensor, ESP8266 Wi-Fi module, Firebase Cloud Storage Service and Android mobile application Carbon Insight for data visualization. 2880 data points in the time frame of 10 days with a 30-second interval was collected, stored and visualized with the application of this system.
近年来,环境监测在气候监测、分析、农业生产力管理、水、空气质量保证以及其他与工业发展和生活便利密切相关的潜在因素等方面显得越来越重要。这项研究的动机是提高智能家居居民对室内空气质量的认识,并为工业和环境组织提供二氧化碳排放的洞察力。本文提出了一种结合物联网能力和云计算技术的二氧化碳环境监测的高效解决方案。上述技术将提供高度可访问和实时的数据可视化,这将极大地有利于智能家居分析实现和对策部署的效率。利用MQ135二氧化碳传感器、ESP8266 Wi-Fi模块、Firebase云存储服务和Android移动应用carbon Insight进行数据可视化,开发了二氧化碳浓度生成、积累、存储和可视化的监测架构。应用该系统采集了2880个数据点,时间间隔为30秒,时间间隔为10天。
{"title":"Real-Time Carbon Dioxide Monitoring Based on IoT & Cloud Technologies","authors":"Fanf Ming, Riyaz Ahamed Ariyaluran Habeeb, F. Nasaruddin, A. Gani","doi":"10.1145/3316615.3316622","DOIUrl":"https://doi.org/10.1145/3316615.3316622","url":null,"abstract":"In recent years, environment monitoring are of greater importance towards the area of climate monitoring, analysis, agricultural productivity management, quality assurance of water, air, alongside with other potential factors that are closely connected to industrial development and convenience of living. This research is motivated by creating awareness of smart home residents on indoor air quality, as well as providing insight of carbon dioxide emissions for industries and environmental organizations. This paper proposes an efficient solution towards environment monitoring of carbon dioxide integrated with Internet of Things capability and cloud computing technology. Aforementioned techniques will deliver highly accessible and real-time data visualization which would be greatly beneficial for Smart Homes efficiency of analysis actualization and counter-measures deployment. A monitoring architecture was developed to generate, accumulate, store and visualize carbon dioxide concentration using MQ135 carbon dioxide sensor, ESP8266 Wi-Fi module, Firebase Cloud Storage Service and Android mobile application Carbon Insight for data visualization. 2880 data points in the time frame of 10 days with a 30-second interval was collected, stored and visualized with the application of this system.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Defects Detection Technique of Use Case Views during Requirements Engineering 需求工程中用例视图的缺陷检测技术
Poranat Tianual, A. Pohthong
In the past decade, object-oriented software engineering (OOSE) has gained popularity from many software developers, especially OOSE with a unified modeling language (UML). Use case views are often used in most systems during an analysis phase. These views show the system functionality related to the system stakeholders. Hence, use case views seem to be a corner stone for a software system. The defects occurring in use case views will affect the later designs. If these defects can be found early, it would save time and cost in software development. Therefore, this research proposes a technique for detecting defects in use case views during an analysis phase or requirements engineering process. Correct users' requirements were created as requirements specifications in a traditional form-based style for testing comparison. The algorithms for generating decision table from form-based requirements and UML use case specification as well as the algorithm for use case view validation were invented. Two simple case studies were investigated and used as the preliminary evaluation. The nineteen fourth-year students were selected as the subjects for the preliminary investigation in order to compare between manual fault detection and our automated proposed system. They were asked to perform four tasks for each case study. The results show that the efficiency of manual fault detection is less than the proposed technique at 47% and 44% or overall average as 45.5% for the two case studies. Currently, we apply this proposed technique to more complex industrial setting and familiar software systems to software engineers.
在过去的十年中,面向对象的软件工程(OOSE)受到了许多软件开发人员的欢迎,特别是使用统一建模语言(UML)的OOSE。在分析阶段,用例视图经常在大多数系统中使用。这些视图显示了与系统涉众相关的系统功能。因此,用例视图似乎是软件系统的基石。用例视图中出现的缺陷将影响以后的设计。如果能及早发现这些缺陷,将节省软件开发的时间和成本。因此,本研究提出了一种在分析阶段或需求工程过程中检测用例视图缺陷的技术。正确的用户需求以传统的基于表单的方式创建为需求规范,用于测试比较。提出了基于表单的需求和UML用例规范生成决策表的算法以及用例视图验证的算法。调查了两个简单的案例,并将其作为初步评价。为了比较人工故障检测和我们提出的自动故障检测系统,我们选择了十九名四年级学生作为初步调查的对象。他们被要求为每个案例研究执行四项任务。结果表明,在两个案例中,人工故障检测的效率分别为47%和44%,总体平均为45.5%。目前,我们将该技术应用于更复杂的工业环境和软件工程师熟悉的软件系统。
{"title":"Defects Detection Technique of Use Case Views during Requirements Engineering","authors":"Poranat Tianual, A. Pohthong","doi":"10.1145/3316615.3316631","DOIUrl":"https://doi.org/10.1145/3316615.3316631","url":null,"abstract":"In the past decade, object-oriented software engineering (OOSE) has gained popularity from many software developers, especially OOSE with a unified modeling language (UML). Use case views are often used in most systems during an analysis phase. These views show the system functionality related to the system stakeholders. Hence, use case views seem to be a corner stone for a software system. The defects occurring in use case views will affect the later designs. If these defects can be found early, it would save time and cost in software development. Therefore, this research proposes a technique for detecting defects in use case views during an analysis phase or requirements engineering process. Correct users' requirements were created as requirements specifications in a traditional form-based style for testing comparison. The algorithms for generating decision table from form-based requirements and UML use case specification as well as the algorithm for use case view validation were invented. Two simple case studies were investigated and used as the preliminary evaluation. The nineteen fourth-year students were selected as the subjects for the preliminary investigation in order to compare between manual fault detection and our automated proposed system. They were asked to perform four tasks for each case study. The results show that the efficiency of manual fault detection is less than the proposed technique at 47% and 44% or overall average as 45.5% for the two case studies. Currently, we apply this proposed technique to more complex industrial setting and familiar software systems to software engineers.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Over-sampling Algorithm based on iForest and SMOTE 基于ifforest和SMOTE的改进过采样算法
Yifeng Zheng, Guohe Li, Teng Zhang
Imbalance learning is one of the most challenging problems in supervised learning, so many different strategies are designed to tackle balanced sample distribution. The over-sampling techniques which achieve a relatively balanced class distribution through synthesizing samples receive more and more attention. In this paper, we present an over-sampling approach based on isolation Forest (iForest) and SMOTE, called iForest-SMOTE. Firstly, for minority class samples, iForest-score is employed to assess the importance of each sample based on iForest model. Then, in each SMOTE process, roulette wheel selection based on iForest-score is utilized to select the neighbor sample. Finally, M-dimensional-sphere interpolation approach is employed to generate a new sample. The experiments illustrate that our approach takes into account the spatial distribution of minority class samples and sample synthetic simultaneously. Therefore, iForest-SMOTE can effectively improve the performance of the classification model.
不平衡学习是监督学习中最具挑战性的问题之一,因此设计了许多不同的策略来解决平衡样本分布。通过合成样本实现相对均衡的类分布的过采样技术越来越受到人们的关注。在本文中,我们提出了一种基于隔离森林(ifforest)和SMOTE的过采样方法,称为ifforest -SMOTE。首先,对于少数类样本,采用ifforest -score基于ifforest模型对每个样本的重要性进行评估。然后,在每个SMOTE过程中,利用基于ifforest -score的轮盘赌选择来选择相邻样本。最后,采用m维球面插值方法生成新样本。实验表明,我们的方法同时考虑了少数类样本的空间分布和样本合成。因此,ifforest - smote可以有效地提高分类模型的性能。
{"title":"An Improved Over-sampling Algorithm based on iForest and SMOTE","authors":"Yifeng Zheng, Guohe Li, Teng Zhang","doi":"10.1145/3316615.3316641","DOIUrl":"https://doi.org/10.1145/3316615.3316641","url":null,"abstract":"Imbalance learning is one of the most challenging problems in supervised learning, so many different strategies are designed to tackle balanced sample distribution. The over-sampling techniques which achieve a relatively balanced class distribution through synthesizing samples receive more and more attention. In this paper, we present an over-sampling approach based on isolation Forest (iForest) and SMOTE, called iForest-SMOTE. Firstly, for minority class samples, iForest-score is employed to assess the importance of each sample based on iForest model. Then, in each SMOTE process, roulette wheel selection based on iForest-score is utilized to select the neighbor sample. Finally, M-dimensional-sphere interpolation approach is employed to generate a new sample. The experiments illustrate that our approach takes into account the spatial distribution of minority class samples and sample synthetic simultaneously. Therefore, iForest-SMOTE can effectively improve the performance of the classification model.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123426396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Removing Unclassified Elements in Investigating of Financial Wellbeing Attributes Using Rough-Regression Model 利用粗糙回归模型去除财务健康属性调查中的未分类因素
R. Efendi, Susnaningsih Mu’at, Nelsy Arisandi, N. Samsudin
In economics research survey, the causal relationship between independent and dependent attributes has been frequently investigated by using regression linear models. However, not easy to achieve the high R-square value between both attributes if there are too many unclassified elements in data sets. This paper presents removing unclassified elements in conventional regression model using rough sets approximation. The proposed model is address to handle the unclassified academic staffs in data set which less contribution for supporting financial wellbeing decision. The result showed that number of unclassified staff has a positive effect to increase coefficient determination (R-square) value in the regression model. In this case study, the financial wellbeing of academic staff is significantly influenced by two different attributes, namely, financial behavior and financial stress. It also may help decision makers or universities management in improving their staff in financial wellness and wellbeing.
在经济学研究调查中,经常使用回归线性模型来研究独立属性和依赖属性之间的因果关系。然而,如果数据集中未分类元素过多,则不容易实现两个属性之间的高r平方值。本文提出了用粗糙集逼近法去除传统回归模型中未分类元素的方法。该模型旨在处理数据集中未分类的学术人员,这些人员对支持财务福利决策的贡献较小。结果表明,在回归模型中,未分类人员数量对系数决定(r方)值的增加有正作用。在本案例中,学术人员的财务幸福感受到财务行为和财务压力两个不同属性的显著影响。它还可以帮助决策者或大学管理层提高员工的财务健康和福祉。
{"title":"Removing Unclassified Elements in Investigating of Financial Wellbeing Attributes Using Rough-Regression Model","authors":"R. Efendi, Susnaningsih Mu’at, Nelsy Arisandi, N. Samsudin","doi":"10.1145/3316615.3316651","DOIUrl":"https://doi.org/10.1145/3316615.3316651","url":null,"abstract":"In economics research survey, the causal relationship between independent and dependent attributes has been frequently investigated by using regression linear models. However, not easy to achieve the high R-square value between both attributes if there are too many unclassified elements in data sets. This paper presents removing unclassified elements in conventional regression model using rough sets approximation. The proposed model is address to handle the unclassified academic staffs in data set which less contribution for supporting financial wellbeing decision. The result showed that number of unclassified staff has a positive effect to increase coefficient determination (R-square) value in the regression model. In this case study, the financial wellbeing of academic staff is significantly influenced by two different attributes, namely, financial behavior and financial stress. It also may help decision makers or universities management in improving their staff in financial wellness and wellbeing.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Portable TOR Router with Raspberry Pi 便携式TOR路由器与树莓派
A. Jamal, Deperkdharrshan Kumar, Rabab Alayham Abbas Helmi, Sim Liew Fong
Nowadays, internet has become an important part of everyone's lives. The internet has turned out to be a reliable tool for communication, data transfer and many more applications for people from all over the world. An individual's internet activities are being tracked and traced without their knowledge by various means. Thus, online security is a genuine worry for web clients who intend to visit interpersonal interaction locales, make an online transaction, or take an interest in internet diversions, as they need their protection to be ensured. Internet browsing is not anonymized as many Internet Service Providers (ISP's) could legally sell users information without informing users. People's internet activities are being tracked and traced by ISPs. Moreover, network spies and snooping attempts are very hard to be defeated as an ample network snooping tools are available in the market. These issues can be curbed by using a router that has anonymous browsing infrastructure. However, most of the routers that gives anonymous browsing are not portable. From this project, people will be able to browse anonymously without being traced. Besides that, network snooping and spying attempts can be defeated. Finally, a portable The Onion Routing (TOR) router can be created with a Raspberry Pi..
如今,互联网已经成为每个人生活的重要组成部分。互联网已经成为世界各地人们交流、数据传输和更多应用的可靠工具。在个人不知情的情况下,通过各种手段对其互联网活动进行跟踪和追踪。因此,对于那些打算访问人际互动场所、进行在线交易或对互联网娱乐感兴趣的网络客户来说,在线安全是一个真正的担忧,因为他们需要确保自己的保护。互联网浏览并不是匿名的,因为许多互联网服务提供商(ISP)可以在不通知用户的情况下合法地向用户出售信息。互联网服务提供商正在跟踪和追踪人们的互联网活动。此外,网络间谍和窥探企图很难被击败,因为市场上有大量的网络窥探工具可用。这些问题可以通过使用具有匿名浏览基础设施的路由器来遏制。然而,大多数提供匿名浏览功能的路由器都不便于携带。通过这个项目,人们将能够匿名浏览而不会被追踪。除此之外,网络窥探和间谍企图可以被击败。最后,可以使用树莓派创建便携式洋葱路由(TOR)路由器。
{"title":"Portable TOR Router with Raspberry Pi","authors":"A. Jamal, Deperkdharrshan Kumar, Rabab Alayham Abbas Helmi, Sim Liew Fong","doi":"10.1145/3316615.3316694","DOIUrl":"https://doi.org/10.1145/3316615.3316694","url":null,"abstract":"Nowadays, internet has become an important part of everyone's lives. The internet has turned out to be a reliable tool for communication, data transfer and many more applications for people from all over the world. An individual's internet activities are being tracked and traced without their knowledge by various means. Thus, online security is a genuine worry for web clients who intend to visit interpersonal interaction locales, make an online transaction, or take an interest in internet diversions, as they need their protection to be ensured. Internet browsing is not anonymized as many Internet Service Providers (ISP's) could legally sell users information without informing users. People's internet activities are being tracked and traced by ISPs. Moreover, network spies and snooping attempts are very hard to be defeated as an ample network snooping tools are available in the market. These issues can be curbed by using a router that has anonymous browsing infrastructure. However, most of the routers that gives anonymous browsing are not portable. From this project, people will be able to browse anonymously without being traced. Besides that, network snooping and spying attempts can be defeated. Finally, a portable The Onion Routing (TOR) router can be created with a Raspberry Pi..","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125512137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the 2019 8th International Conference on Software and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1