首页 > 最新文献

Proceedings of the 2019 8th International Conference on Software and Computer Applications最新文献

英文 中文
Automating Business Process Model Generation from Ontology-based Requirements 从基于本体的需求中自动生成业务流程模型
Amarilis Putri Yanuarifiani, Fang-Fang Chua, Gaik-Yee Chan
Requirements elicitation process faces major challenges about how stakeholders can easily verify requirements. Requirements document allows developers to visualize requirements using modeling language to ensure stakeholders have the same perspective as them. It is also effective to give presentations to stakeholders about how business processes will be carried out after the requirements are implemented. Issues are raised in building requirements modeling as business users generally do not have enough knowledge to build requirements models in specific notations. Transforming requirements (natural language) into semi-formal notation (BPMN) manually lead to inconsistency of elements structure. The need to automatically generate requirements model become crucial because it will be the basis for the programming process. Existing studies are mostly concerned on auto-completion of modeling language using domain ontology as basic knowledge, and let the stakeholders building initial requirements model with limited knowledge. The idea of this paper is to propose a methodology for building business process model in semi-formal language (BPMN) to represent future business processes using ontology approach. This research continues from previous study which transform requirements list into requirements ontology to formalize the elements such as problem, actor and process. By using requirements ontology as input, rule-based mapping method is proposed to map ontology instances to BPMN elements.
需求引出过程面临的主要挑战是涉众如何容易地验证需求。需求文档允许开发人员使用建模语言可视化需求,以确保涉众拥有与他们相同的视角。向涉众介绍在需求实现后如何执行业务流程也是有效的。由于业务用户通常没有足够的知识来用特定的符号构建需求模型,因此在构建需求建模时就会出现问题。将需求(自然语言)手工转换为半形式化符号(BPMN)会导致元素结构的不一致。自动生成需求模型的需求变得至关重要,因为它将是编程过程的基础。现有的研究多关注以领域本体为基础知识的建模语言自动完成,让利益相关者利用有限的知识构建初始需求模型。本文的思想是提出一种用半形式语言(BPMN)构建业务流程模型的方法,以使用本体方法表示未来的业务流程。本研究延续了前人的研究,将需求列表转化为需求本体,将问题、参与者、过程等要素形式化。以需求本体为输入,提出了将本体实例映射到BPMN元素的基于规则的映射方法。
{"title":"Automating Business Process Model Generation from Ontology-based Requirements","authors":"Amarilis Putri Yanuarifiani, Fang-Fang Chua, Gaik-Yee Chan","doi":"10.1145/3316615.3316683","DOIUrl":"https://doi.org/10.1145/3316615.3316683","url":null,"abstract":"Requirements elicitation process faces major challenges about how stakeholders can easily verify requirements. Requirements document allows developers to visualize requirements using modeling language to ensure stakeholders have the same perspective as them. It is also effective to give presentations to stakeholders about how business processes will be carried out after the requirements are implemented. Issues are raised in building requirements modeling as business users generally do not have enough knowledge to build requirements models in specific notations. Transforming requirements (natural language) into semi-formal notation (BPMN) manually lead to inconsistency of elements structure. The need to automatically generate requirements model become crucial because it will be the basis for the programming process. Existing studies are mostly concerned on auto-completion of modeling language using domain ontology as basic knowledge, and let the stakeholders building initial requirements model with limited knowledge. The idea of this paper is to propose a methodology for building business process model in semi-formal language (BPMN) to represent future business processes using ontology approach. This research continues from previous study which transform requirements list into requirements ontology to formalize the elements such as problem, actor and process. By using requirements ontology as input, rule-based mapping method is proposed to map ontology instances to BPMN elements.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122992731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Meta-Analysis of Acoustic Feature Extraction for Machine Listening Systems 机器听力系统声学特征提取的元分析
Ricardo A. Catanghal, T. Palaoag, C. Dayagdag
Generally, the concentration of the study and research in the understanding of sounds revolves around the speech and music area, on the contrary, there are few in environmental and non-speech recognition. This paper carries out a meta-analysis of the acoustic transformation and feature set extraction of the environmental sound raw signal form into a parametric type representation in handling analysis, perception, and labeling for audio analysis of sound identification systems. We evaluated and analyzed the various contemporary methods and feature algorithms surveyed for the acoustic identification and perception of surrounding sounds, the Gammatone spectral coefficients (GSTC) and Mel Filterbank (FBEs) then the acoustic signal classification the Convolutional Neural Network (ConvNet) was applied. The outcome demonstrates that GSTC accomplished better as a feature in contrast to FBEs, but FBEs tend to improve performance when merge or incorporated with other feature. The analysis demonstrates that merging or incorporating with other features set is encouraging in achieving a much better accuracy in contrast to a single feature in classifying environmental sounds that is useful in the advancement of the intelligent machine listening frameworks.
一般来说,对声音理解的研究集中在语音和音乐领域,而对环境和非语音识别的研究却很少。本文对环境声音原始信号形式的声学变换和特征集提取进行了元分析,将其转化为参数型表示,用于处理声音识别系统的音频分析、感知和标记。本文对现有的各种声学识别和感知方法和特征算法进行了评价和分析,并结合伽玛酮谱系数(GSTC)和梅尔滤波组(FBEs)对声学信号进行了分类,采用卷积神经网络(ConvNet)对声学信号进行分类。结果表明,与fbe相比,GSTC作为一个特性完成得更好,但是当与其他特性合并或合并时,fbe倾向于提高性能。分析表明,在对环境声音进行分类时,与单一特征相比,合并或合并其他特征集在实现更高的准确性方面是令人鼓舞的,这对智能机器听力框架的进步很有用。
{"title":"Meta-Analysis of Acoustic Feature Extraction for Machine Listening Systems","authors":"Ricardo A. Catanghal, T. Palaoag, C. Dayagdag","doi":"10.1145/3316615.3316664","DOIUrl":"https://doi.org/10.1145/3316615.3316664","url":null,"abstract":"Generally, the concentration of the study and research in the understanding of sounds revolves around the speech and music area, on the contrary, there are few in environmental and non-speech recognition. This paper carries out a meta-analysis of the acoustic transformation and feature set extraction of the environmental sound raw signal form into a parametric type representation in handling analysis, perception, and labeling for audio analysis of sound identification systems. We evaluated and analyzed the various contemporary methods and feature algorithms surveyed for the acoustic identification and perception of surrounding sounds, the Gammatone spectral coefficients (GSTC) and Mel Filterbank (FBEs) then the acoustic signal classification the Convolutional Neural Network (ConvNet) was applied. The outcome demonstrates that GSTC accomplished better as a feature in contrast to FBEs, but FBEs tend to improve performance when merge or incorporated with other feature. The analysis demonstrates that merging or incorporating with other features set is encouraging in achieving a much better accuracy in contrast to a single feature in classifying environmental sounds that is useful in the advancement of the intelligent machine listening frameworks.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"24 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132835638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(In)Security of the AAβ Cryptosystem for Transmitting Large Data (二)大数据传输中aaaa密码系统的安全性
Muhammad Asyraf Asbullah, M. Ariffin, Z. Mahad, Muhamad Azlan Daud
The AAβ cryptosystem is a well-designed encryption scheme for securing a message (or plaintext) which could transmit large dataset than its key size. Nevertheless, the idea to transmit data larger than the specified condition is not a good idea. This work will explain why it is the case. As a result, we show that some most significant bit of the data can be recovered. In spite the very fact that the complete parameter cannot be recovered fully, anyway by leaks of its most significant bits, even of a very little amount could lead any cryptosystem insecure.
aaaa密码系统是一种设计良好的加密方案,用于保护可能传输比其密钥大小大的数据集的消息(或明文)。然而,传输大于指定条件的数据并不是一个好主意。这项工作将解释为什么会这样。因此,我们证明了一些最重要的数据位是可以恢复的。尽管完整的参数不可能完全恢复,无论如何,通过泄漏其最重要的位,即使是非常少的量也可能导致任何密码系统不安全。
{"title":"(In)Security of the AAβ Cryptosystem for Transmitting Large Data","authors":"Muhammad Asyraf Asbullah, M. Ariffin, Z. Mahad, Muhamad Azlan Daud","doi":"10.1145/3316615.3316661","DOIUrl":"https://doi.org/10.1145/3316615.3316661","url":null,"abstract":"The AAβ cryptosystem is a well-designed encryption scheme for securing a message (or plaintext) which could transmit large dataset than its key size. Nevertheless, the idea to transmit data larger than the specified condition is not a good idea. This work will explain why it is the case. As a result, we show that some most significant bit of the data can be recovered. In spite the very fact that the complete parameter cannot be recovered fully, anyway by leaks of its most significant bits, even of a very little amount could lead any cryptosystem insecure.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133434282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Model-Based Book Recommender Systems using Naïve Bayes enhanced with Optimal Feature Selection 基于模型的图书推荐系统,使用Naïve贝叶斯增强最优特征选择
Thi Thanh Sang Nguyen
Book recommender systems play an important role in book search engines, digital library or book shopping sites. In the field of recommender systems, processing data, selecting suitable data features, and classification methods are always challenging to decide the performance of a recommender system. This paper presents some solutions of data process, feature and classifier selection in order to build an efficient book recommender system. The Book-Crossing dataset, which has been studied in many book recommender systems, is taken into account as a case study. The attributes of books are analyzed and processed to increase the classification accuracy. Some well-known classification algorithms, such as, Naïve Bayes, decision tree, etc., are utilized to predict user interests in books and evaluated in several experiments. It has been found that Naïve Bayes is the best selection for book recommendation with acceptable run-time and accuracy.
图书推荐系统在图书搜索引擎、数字图书馆或图书购物网站中发挥着重要作用。在推荐系统中,数据的处理、数据特征的选择、分类方法的选择一直是决定推荐系统性能的难题。为了构建一个高效的图书推荐系统,本文从数据处理、特征和分类器选择三个方面提出了解决方案。在许多图书推荐系统中已经研究过的book - crossing数据集被作为案例研究。对图书属性进行分析和处理,提高分类精度。一些著名的分类算法,如Naïve贝叶斯,决策树等,被用来预测用户对书籍的兴趣,并在几个实验中进行了评估。研究发现,Naïve贝叶斯算法是图书推荐的最佳选择,运行时间和准确率都可以接受。
{"title":"Model-Based Book Recommender Systems using Naïve Bayes enhanced with Optimal Feature Selection","authors":"Thi Thanh Sang Nguyen","doi":"10.1145/3316615.3316727","DOIUrl":"https://doi.org/10.1145/3316615.3316727","url":null,"abstract":"Book recommender systems play an important role in book search engines, digital library or book shopping sites. In the field of recommender systems, processing data, selecting suitable data features, and classification methods are always challenging to decide the performance of a recommender system. This paper presents some solutions of data process, feature and classifier selection in order to build an efficient book recommender system. The Book-Crossing dataset, which has been studied in many book recommender systems, is taken into account as a case study. The attributes of books are analyzed and processed to increase the classification accuracy. Some well-known classification algorithms, such as, Naïve Bayes, decision tree, etc., are utilized to predict user interests in books and evaluated in several experiments. It has been found that Naïve Bayes is the best selection for book recommendation with acceptable run-time and accuracy.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Implicit Recommendation with Interest Change and User Influence 兴趣变化和用户影响下的隐性推荐
Qiaoqiao Tan, Fang’ai Liu, Shuning Xing
Aiming at the problem of rich websites in campus without targeted recommendation, which makes it difficult for users to find the information resources of high interest and high quality, this paper proposes an implicit feedback recommendation algorithm in campus network based on user's changing interest and user influence. Based on the traditional collaborative filtering algorithm, introduces time function that adapting to user's changing interest and user's influence factors. The score matrix based on time weight is integrated with the influence matrix to solve the problem that user similarity calculation is too single, and improves the accuracy and explanatory of the recommendation results. Experimental results show that the algorithm can effectively reduce the sparsity and cold start problem of the dataset, and has better recommendation quality than traditional collaborative filtering algorithm.
针对校园网站内容丰富,缺乏针对性推荐,导致用户难以找到高兴趣、高质量的信息资源的问题,本文提出了一种基于用户兴趣变化和用户影响力的校园网络隐式反馈推荐算法。在传统协同过滤算法的基础上,引入了适应用户兴趣变化和用户影响因素的时间函数。将基于时间权重的评分矩阵与影响矩阵相结合,解决了用户相似度计算过于单一的问题,提高了推荐结果的准确性和解释性。实验结果表明,该算法能有效地降低数据集的稀疏性和冷启动问题,具有比传统协同过滤算法更好的推荐质量。
{"title":"Implicit Recommendation with Interest Change and User Influence","authors":"Qiaoqiao Tan, Fang’ai Liu, Shuning Xing","doi":"10.1145/3316615.3316680","DOIUrl":"https://doi.org/10.1145/3316615.3316680","url":null,"abstract":"Aiming at the problem of rich websites in campus without targeted recommendation, which makes it difficult for users to find the information resources of high interest and high quality, this paper proposes an implicit feedback recommendation algorithm in campus network based on user's changing interest and user influence. Based on the traditional collaborative filtering algorithm, introduces time function that adapting to user's changing interest and user's influence factors. The score matrix based on time weight is integrated with the influence matrix to solve the problem that user similarity calculation is too single, and improves the accuracy and explanatory of the recommendation results. Experimental results show that the algorithm can effectively reduce the sparsity and cold start problem of the dataset, and has better recommendation quality than traditional collaborative filtering algorithm.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of Verifiability of Voting Protocols by Strand Space Analysis 基于链空间分析的投票协议可验证性验证
Shigeki Hagihara, Masaya Shimakawa, N. Yonezaki
With the widespread adoption of electronic voting, various voting protocols have been proposed. Voting protocols need to satisfy security requirements, including privacy protection and the prevention of illegal voting (e.g., double voting). Our research focuses on the most important property of voting protocols, namely whether all votes are reflected in the voting results accurately. We formalized and verified this for one voting protocol using strand space analysis. We can also consider multiple security requirements depending on the extent to which the voting result is reflected accurately. These properties are discussed.
随着电子投票的广泛采用,各种投票协议被提出。投票协议需要满足安全要求,包括隐私保护和防止非法投票(例如,重复投票)。我们的研究重点是投票协议最重要的属性,即是否所有的投票都准确地反映在投票结果中。我们使用链空间分析对一个投票协议形式化并验证了这一点。我们还可以根据投票结果的准确反映程度来考虑多种安全需求。讨论了这些性质。
{"title":"Verification of Verifiability of Voting Protocols by Strand Space Analysis","authors":"Shigeki Hagihara, Masaya Shimakawa, N. Yonezaki","doi":"10.1145/3316615.3316629","DOIUrl":"https://doi.org/10.1145/3316615.3316629","url":null,"abstract":"With the widespread adoption of electronic voting, various voting protocols have been proposed. Voting protocols need to satisfy security requirements, including privacy protection and the prevention of illegal voting (e.g., double voting). Our research focuses on the most important property of voting protocols, namely whether all votes are reflected in the voting results accurately. We formalized and verified this for one voting protocol using strand space analysis. We can also consider multiple security requirements depending on the extent to which the voting result is reflected accurately. These properties are discussed.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"65-66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123129932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Management in Projects Based on Open-Source Software 基于开源软件的项目风险管理
Nguyen Duc Linh, P. D. Hung, V. Diep, Ta Duc Tung
Reusing software components from third-party vendors is one of the key technologies to gain shorter time-to-market and better quality of the software system. These components, also known as OTS (Off-the-Shelf) components, come in two types: COTS (Commercial Off-The-Shelf) and OSS (Open-Source Software). To utilize OSS components effectively, it is necessary to figure out how the development processes and methods to be adapted. Most current studies are either theoretical proposals without empirical assessment or case studies in similar project contexts. It is therefore necessary to conduct more empirical studies on how process improvement and risk management can be performed and what are the results in various project contexts.
重用来自第三方供应商的软件组件是缩短上市时间和提高软件系统质量的关键技术之一。这些组件,也被称为OTS(现成的)组件,有两种类型:COTS(商业现成的)和OSS(开源软件)。为了有效地利用OSS组件,有必要弄清楚如何适应开发过程和方法。目前大多数研究要么是没有经验评估的理论建议,要么是类似项目背景下的案例研究。因此,有必要对如何执行过程改进和风险管理以及在各种项目背景下的结果进行更多的实证研究。
{"title":"Risk Management in Projects Based on Open-Source Software","authors":"Nguyen Duc Linh, P. D. Hung, V. Diep, Ta Duc Tung","doi":"10.1145/3316615.3316648","DOIUrl":"https://doi.org/10.1145/3316615.3316648","url":null,"abstract":"Reusing software components from third-party vendors is one of the key technologies to gain shorter time-to-market and better quality of the software system. These components, also known as OTS (Off-the-Shelf) components, come in two types: COTS (Commercial Off-The-Shelf) and OSS (Open-Source Software). To utilize OSS components effectively, it is necessary to figure out how the development processes and methods to be adapted. Most current studies are either theoretical proposals without empirical assessment or case studies in similar project contexts. It is therefore necessary to conduct more empirical studies on how process improvement and risk management can be performed and what are the results in various project contexts.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Development of Assessment System for Spine Curvature Angle Measurement 脊柱曲率角测量评估系统的开发
Chua Shanyu, L. C. Chin, S. Basah, A. F. Azizan
People of the modern times are becoming more prone to have spinal curvature disorder due to the improper habits especially those that stays at desk more often. To diagnose this disorder, method such as radiography and other conventional method are used. Conventional method such as goniometry require human skills can be time consuming which eventually lead to exhaustion of logistic. These problems can be solved by using 3D photogrammetry method. This research uses Kinect obtain the 3D human body model and find the optimum parameters to capture the 3D model for body posture screening. The most optimum parameters that set to capture the 3D model of the subject is at 1.3 m distance between subject and camera, 80 lux and at chest level. The 3D model reconstructed from these parameters shows 100% accuracy of the point needed to be assessed. This papers highlight the validation of optimum parameters that will affect the performance of capturing 3D human reconstructed model for measuring the spinal curvature.
现代人越来越容易因为不正确的生活习惯而患上脊柱弯曲症,尤其是那些经常坐在办公桌前的人。诊断这种疾病,常用影像学检查和其他常规方法。传统的方法,如测角法,需要人的技能,可以是费时的,最终导致物流的枯竭。利用三维摄影测量方法可以解决这些问题。本研究利用Kinect获取三维人体模型,并寻找最佳参数捕获三维模型进行身体姿势筛选。拍摄对象与相机之间的距离为1.3米,亮度为80勒克斯,且与胸部水平,这是拍摄对象3D模型的最佳参数。根据这些参数重建的三维模型显示需要评估的点的准确度为100%。本文重点研究了影响三维人体重构模型采集性能的最佳参数的验证。
{"title":"Development of Assessment System for Spine Curvature Angle Measurement","authors":"Chua Shanyu, L. C. Chin, S. Basah, A. F. Azizan","doi":"10.1145/3316615.3316647","DOIUrl":"https://doi.org/10.1145/3316615.3316647","url":null,"abstract":"People of the modern times are becoming more prone to have spinal curvature disorder due to the improper habits especially those that stays at desk more often. To diagnose this disorder, method such as radiography and other conventional method are used. Conventional method such as goniometry require human skills can be time consuming which eventually lead to exhaustion of logistic. These problems can be solved by using 3D photogrammetry method. This research uses Kinect obtain the 3D human body model and find the optimum parameters to capture the 3D model for body posture screening. The most optimum parameters that set to capture the 3D model of the subject is at 1.3 m distance between subject and camera, 80 lux and at chest level. The 3D model reconstructed from these parameters shows 100% accuracy of the point needed to be assessed. This papers highlight the validation of optimum parameters that will affect the performance of capturing 3D human reconstructed model for measuring the spinal curvature.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126453593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A 3-Tier Architecture for Network Latency Reduction in Healthcare Internet-of-Things Using Fog Computing and Machine Learning 使用雾计算和机器学习减少医疗保健物联网网络延迟的三层体系结构
Saurabh Shukla, M. Hassan, L. T. Jung, A. Awang, Muhammad Khalid Khan
Healthcare Internet-of-things comprises a huge number of wearable sensors and interconnected computers. The high volume of IoT data is transacted over servers leading to servers overloading with high traffic causing network congestion. These cloud servers are typically for analyzing, retrieving and storing the large data generated from IoT devices. There exist challenges regarding sending real-time healthcare data from cloud servers to end-users. These challenges include the high computational latency, high communication latency, and high network latency. Due to these challenges, IoTs may not be able to send data in real-time to end-users. Fog nodes can be used to play a major role in reducing the high delay and high traffic. It can be a solution to increase system performance. In this paper, we proposed a 3-tier architecture, an analytical model for healthcare IoT using a hybrid approach consisting of fuzzy logic and reinforcement learning in a fog computing environment. The aim is to minimize network latency. The proposed model and 3-tier architecture are simulated using iFogSim simulator.
医疗物联网由大量可穿戴传感器和互联计算机组成。大量的物联网数据通过服务器进行处理,导致服务器过载,高流量导致网络拥塞。这些云服务器通常用于分析、检索和存储物联网设备生成的大数据。在从云服务器向最终用户发送实时医疗保健数据方面存在挑战。这些挑战包括高计算延迟、高通信延迟和高网络延迟。由于这些挑战,物联网可能无法实时向最终用户发送数据。雾节点可以在降低高时延和高流量方面发挥重要作用。它可以作为提高系统性能的解决方案。在本文中,我们提出了一个三层架构,这是一个在雾计算环境中使用模糊逻辑和强化学习混合方法的医疗物联网分析模型。其目的是最小化网络延迟。利用iFogSim模拟器对该模型和三层结构进行了仿真。
{"title":"A 3-Tier Architecture for Network Latency Reduction in Healthcare Internet-of-Things Using Fog Computing and Machine Learning","authors":"Saurabh Shukla, M. Hassan, L. T. Jung, A. Awang, Muhammad Khalid Khan","doi":"10.1145/3316615.3318222","DOIUrl":"https://doi.org/10.1145/3316615.3318222","url":null,"abstract":"Healthcare Internet-of-things comprises a huge number of wearable sensors and interconnected computers. The high volume of IoT data is transacted over servers leading to servers overloading with high traffic causing network congestion. These cloud servers are typically for analyzing, retrieving and storing the large data generated from IoT devices. There exist challenges regarding sending real-time healthcare data from cloud servers to end-users. These challenges include the high computational latency, high communication latency, and high network latency. Due to these challenges, IoTs may not be able to send data in real-time to end-users. Fog nodes can be used to play a major role in reducing the high delay and high traffic. It can be a solution to increase system performance. In this paper, we proposed a 3-tier architecture, an analytical model for healthcare IoT using a hybrid approach consisting of fuzzy logic and reinforcement learning in a fog computing environment. The aim is to minimize network latency. The proposed model and 3-tier architecture are simulated using iFogSim simulator.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An Information Source Identification Algorithm Based on Shortest Arborescence of Network 一种基于网络最短树围的信息源识别算法
Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu
It is of significance to identify the source of malicious information in social networks, since this information diffusion is already a problem, which can seriously affect social stability. In this paper, we develop a propagation path based approach where the estimator of information source is chosen to be the root node associated with the propagation path that most likely leads to the monitored state of network. When the information diffusion process follows the Susceptible-Infected (SI) model and satisfying the instant forwarding hypothesis, we proved that the source estimator we proposed is the root node of the network shortest arborescence. Finally, multiple simulations on networks with different structure show that our method outperforms existing algorithms.
识别社交网络中恶意信息的来源具有重要意义,因为这些信息的扩散已经成为一个问题,会严重影响社会稳定。本文提出了一种基于传播路径的方法,选择信息源的估计量作为与最可能导致网络被监控状态的传播路径相关联的根节点。当信息扩散过程遵循易感感染(SI)模型并满足即时转发假设时,我们证明了我们提出的源估计量是网络最短树形的根节点。最后,对不同结构的网络进行了多次仿真,结果表明该方法优于现有算法。
{"title":"An Information Source Identification Algorithm Based on Shortest Arborescence of Network","authors":"Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu","doi":"10.1145/3316615.3316686","DOIUrl":"https://doi.org/10.1145/3316615.3316686","url":null,"abstract":"It is of significance to identify the source of malicious information in social networks, since this information diffusion is already a problem, which can seriously affect social stability. In this paper, we develop a propagation path based approach where the estimator of information source is chosen to be the root node associated with the propagation path that most likely leads to the monitored state of network. When the information diffusion process follows the Susceptible-Infected (SI) model and satisfying the instant forwarding hypothesis, we proved that the source estimator we proposed is the root node of the network shortest arborescence. Finally, multiple simulations on networks with different structure show that our method outperforms existing algorithms.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132413806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2019 8th International Conference on Software and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1