首页 > 最新文献

Proceedings of the 2019 8th International Conference on Software and Computer Applications最新文献

英文 中文
DCA-Based Algorithm for Cross-Functional Team Selection 基于dca的跨职能团队选择算法
Ngo Tung Son, Tran Thi Thuy, Bui Ngoc Anh, Tran Van Dinh
This is a continuing work of Ngo et al, 2018 [1]. They have proposed a mixed binary integer quadratic programming (MIQP) model for cross-functional team selection. The model called Minimum distance to the boundary, MDSB. It is not only specific to team selection but also a generic model for other problems that in form of searching for the best-matched candidate to a predefined target. Ngo et al designed a generic algorithm (GA) for solving MDSB. The GA algorithm is efficient but it also comes with several disadvantages. In this paper, we propose a DCA-based algorithm to solve the MDSB. We compared the proposed algorithm with MIQP-CPLEX and Genetic Algorithm. The numerical results show that our algorithm not only provides the best objective value but also significantly faster than the other compared algorithms.
这是Ngo et al ., 2018[1]的继续工作。他们提出了一个用于跨职能团队选择的混合二进制整数二次规划(MIQP)模型。该模型称为到边界的最小距离MDSB。它不仅是特定于团队选择的,而且也是其他问题的通用模型,其形式是搜索与预定义目标最匹配的候选人。Ngo等设计了一种求解MDSB的通用算法(GA)。遗传算法是有效的,但也有一些缺点。在本文中,我们提出了一种基于dca的MDSB算法。将该算法与MIQP-CPLEX算法和遗传算法进行了比较。数值结果表明,该算法不仅提供了最佳的目标值,而且速度明显快于其他比较算法。
{"title":"DCA-Based Algorithm for Cross-Functional Team Selection","authors":"Ngo Tung Son, Tran Thi Thuy, Bui Ngoc Anh, Tran Van Dinh","doi":"10.1145/3316615.3316645","DOIUrl":"https://doi.org/10.1145/3316615.3316645","url":null,"abstract":"This is a continuing work of Ngo et al, 2018 [1]. They have proposed a mixed binary integer quadratic programming (MIQP) model for cross-functional team selection. The model called Minimum distance to the boundary, MDSB. It is not only specific to team selection but also a generic model for other problems that in form of searching for the best-matched candidate to a predefined target. Ngo et al designed a generic algorithm (GA) for solving MDSB. The GA algorithm is efficient but it also comes with several disadvantages. In this paper, we propose a DCA-based algorithm to solve the MDSB. We compared the proposed algorithm with MIQP-CPLEX and Genetic Algorithm. The numerical results show that our algorithm not only provides the best objective value but also significantly faster than the other compared algorithms.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123428640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SGApps SGApps
Mimi Rosnida Osman, M. M. Yusof, Hanayanti Hafit
The disease often suffered by Sugar Glider shown in terms of physical condition. However, the illness is often undetected by Sugar Glider owner until it reaches a serious stage and only began to be noticed after consulting with veterinary doctors. Therefore, this expert system allows the owner of Sugar Glider makes a preliminary diagnosis by selecting its symptoms. Selected symptoms will produce result contain diseases and treatment methods. Development of a knowledge base about the symptoms, diagnosis and treatment method for Expert System Apps for Diagnosing Sugar Glider Diseases (SGApps) have involvement and cooperation from one of the lecturer in Faculty of Veterinary Medicine, University Putra Malaysia. Knowledge engineering model has been chosen as methodology while forward chaining as the inference method. Atom software, the Apache server and MySQL database are implemented to develop a web-based system for the administrator. Next, Bootstrap software is used as a development platform for android, MySQL as database and Visual Studio as a compiler. Usability test by doctor suggests that this expert system can produce suitable diagnosis results that match the input symptoms. While usability testing with the owner of Sugar Glider show this android based expert system can provide information on proper care of the Sugar Glider. Finally, the system can allow users to ask any questions directly to the veterinarians.
{"title":"SGApps","authors":"Mimi Rosnida Osman, M. M. Yusof, Hanayanti Hafit","doi":"10.1145/3316615.3316649","DOIUrl":"https://doi.org/10.1145/3316615.3316649","url":null,"abstract":"The disease often suffered by Sugar Glider shown in terms of physical condition. However, the illness is often undetected by Sugar Glider owner until it reaches a serious stage and only began to be noticed after consulting with veterinary doctors. Therefore, this expert system allows the owner of Sugar Glider makes a preliminary diagnosis by selecting its symptoms. Selected symptoms will produce result contain diseases and treatment methods. Development of a knowledge base about the symptoms, diagnosis and treatment method for Expert System Apps for Diagnosing Sugar Glider Diseases (SGApps) have involvement and cooperation from one of the lecturer in Faculty of Veterinary Medicine, University Putra Malaysia. Knowledge engineering model has been chosen as methodology while forward chaining as the inference method. Atom software, the Apache server and MySQL database are implemented to develop a web-based system for the administrator. Next, Bootstrap software is used as a development platform for android, MySQL as database and Visual Studio as a compiler. Usability test by doctor suggests that this expert system can produce suitable diagnosis results that match the input symptoms. While usability testing with the owner of Sugar Glider show this android based expert system can provide information on proper care of the Sugar Glider. Finally, the system can allow users to ask any questions directly to the veterinarians.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115026645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-Level Human Action Change Detection Using the Motion History Image 基于运动历史图像的低层次人类动作变化检测
Yohwan Noh, Dohoon Lee
Human action recognition is an active topic in computer vision. In recent years, tangible results have been shown through deep learning methods; however, at a very high computational cost. They may be suitable for video retrieval or video summarization of a movie or drama, but they are not suitable for the visual surveillance of human action, which should be analyzed in real time. In this study, we propose an action change detection method to reduce the computational cost. On the surveillance camera screen, anomalous actions such as movies and sports are frequently not observed, and simple actions are often repeated. Thus, it is very inefficient to continue to apply high cost action recognition methods on repeated actions. The proposed action change detection method decides whether the previous action of the person is the same as the current action. The action recognition method is applied only when it has determined that the action has changed. The action change detection process is as follows. First, extract the motion history image from the input video and create one-dimensional time-series data. Second, determine the action change using the change of time-series data trend by the threshold. Experiments on the proposed method were performed on the KTH dataset.
人体动作识别是计算机视觉领域的一个研究热点。近年来,通过深度学习方法已经显示出切实的结果;然而,这需要很高的计算成本。它们可能适合于电影或戏剧的视频检索或视频摘要,但不适合于对人的行为进行视觉监控,这需要实时分析。在本研究中,我们提出了一种动作变化检测方法来降低计算成本。在监控摄像头屏幕上,电影、体育等异常动作往往没有被观察到,简单的动作往往被重复。因此,继续使用高成本的动作识别方法来识别重复的动作是非常低效的。所提出的动作变化检测方法判断人之前的动作是否与当前的动作相同。动作识别方法仅在确定动作发生变化时才应用。动作变更检测流程如下。首先,从输入视频中提取运动历史图像,生成一维时间序列数据。其次,利用阈值对时间序列数据趋势的变化来确定动作变化。在KTH数据集上对该方法进行了实验。
{"title":"Low-Level Human Action Change Detection Using the Motion History Image","authors":"Yohwan Noh, Dohoon Lee","doi":"10.1145/3316615.3316725","DOIUrl":"https://doi.org/10.1145/3316615.3316725","url":null,"abstract":"Human action recognition is an active topic in computer vision. In recent years, tangible results have been shown through deep learning methods; however, at a very high computational cost. They may be suitable for video retrieval or video summarization of a movie or drama, but they are not suitable for the visual surveillance of human action, which should be analyzed in real time. In this study, we propose an action change detection method to reduce the computational cost. On the surveillance camera screen, anomalous actions such as movies and sports are frequently not observed, and simple actions are often repeated. Thus, it is very inefficient to continue to apply high cost action recognition methods on repeated actions. The proposed action change detection method decides whether the previous action of the person is the same as the current action. The action recognition method is applied only when it has determined that the action has changed. The action change detection process is as follows. First, extract the motion history image from the input video and create one-dimensional time-series data. Second, determine the action change using the change of time-series data trend by the threshold. Experiments on the proposed method were performed on the KTH dataset.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Transportation System Using RFID 使用RFID的智能交通系统
Sim Liew Fong, Amir Ariff Azham bin Abu Bakar, F. Y. Ahmed, A. Jamal
The toll collection system in Malaysia has been one of the causes of traffic jams throughout major highways. One of the reasons for this is due to the fact that users need to either stop their car or slow down to pay for their toll fees. With the advancement of technology over the years, in particular, Radio-Frequency Identification (RFID), we can expect a faster reading time / response time by the device. By adapting RFID into toll collection system, there will be no need for boom barriers. While it is true that boom barriers avoid defaulters from using the toll, boom barriers also slow down the flow of traffic during peak hours. This project will provide a proof of concept by using a much weaker form of RFID to show that it is viable. The methodology that will be used for this particular project is Agile Unified Process (AUP).
马来西亚的收费系统是导致主要高速公路交通堵塞的原因之一。其中一个原因是,用户需要停车或放慢速度来支付过路费。随着多年来技术的进步,特别是射频识别(RFID),我们可以期待设备的读取时间/响应时间更快。通过将RFID应用到收费系统中,将不再需要护栏。虽然栅栏确实避免了违规者使用通行费,但栅栏也减缓了高峰时段的交通流量。这个项目将提供一个概念的证明,通过使用一个弱得多的RFID形式来表明它是可行的。将用于这个特定项目的方法是敏捷统一过程(AUP)。
{"title":"Smart Transportation System Using RFID","authors":"Sim Liew Fong, Amir Ariff Azham bin Abu Bakar, F. Y. Ahmed, A. Jamal","doi":"10.1145/3316615.3316719","DOIUrl":"https://doi.org/10.1145/3316615.3316719","url":null,"abstract":"The toll collection system in Malaysia has been one of the causes of traffic jams throughout major highways. One of the reasons for this is due to the fact that users need to either stop their car or slow down to pay for their toll fees. With the advancement of technology over the years, in particular, Radio-Frequency Identification (RFID), we can expect a faster reading time / response time by the device. By adapting RFID into toll collection system, there will be no need for boom barriers. While it is true that boom barriers avoid defaulters from using the toll, boom barriers also slow down the flow of traffic during peak hours. This project will provide a proof of concept by using a much weaker form of RFID to show that it is viable. The methodology that will be used for this particular project is Agile Unified Process (AUP).","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Segmentation of Microscopic Breast Cancer Images for Cancer Detection 用于肿瘤检测的显微乳腺癌图像分割
Hamit Altıparmak, Fatih Veysel Nurçin
Breast cancer is one of serious diseases that affect mainly woman and late diagnosis can lead to death. However early diagnosis increases survivability significantly, therefore making it very important. There are different diagnosis techniques for early detection of breast cancer. Breast tissue samples analyzed under microscope is considered reliable way to diagnose breast cancer. Automated classification techniques are so popular in many areas in order to reduce human dependency considering third world countries. Our purpose is to determine if sample is malignant or benign in automated manner. Many algorithms are studied so far in medical area along with other areas. However, algorithms are generally too complex even for simple tasks. We propose a simple algorithm that can differentiate cancerous and non-cancerous samples from breast tissue in automated manner. The images were taken from Near East University Hospital which is consisted of 50 cancerous and 100 healthy images. Total of 150 images were correctly differentiated through our algorithm.
乳腺癌是主要影响妇女的严重疾病之一,诊断晚可导致死亡。然而,早期诊断可显著提高生存率,因此非常重要。早期发现乳腺癌有不同的诊断技术。在显微镜下分析乳腺组织样本被认为是诊断乳腺癌的可靠方法。考虑到第三世界国家,为了减少人类的依赖,自动分类技术在许多领域都很流行。我们的目的是用自动化的方式确定样品是恶性的还是良性的。迄今为止,在医学领域和其他领域研究了许多算法。然而,即使对于简单的任务,算法通常也过于复杂。我们提出了一种简单的算法,可以自动区分乳腺组织中的癌变和非癌变样本。这些图像来自近东大学医院,其中包括50张癌症图像和100张健康图像。通过我们的算法,总共正确区分了150幅图像。
{"title":"Segmentation of Microscopic Breast Cancer Images for Cancer Detection","authors":"Hamit Altıparmak, Fatih Veysel Nurçin","doi":"10.1145/3316615.3316695","DOIUrl":"https://doi.org/10.1145/3316615.3316695","url":null,"abstract":"Breast cancer is one of serious diseases that affect mainly woman and late diagnosis can lead to death. However early diagnosis increases survivability significantly, therefore making it very important. There are different diagnosis techniques for early detection of breast cancer. Breast tissue samples analyzed under microscope is considered reliable way to diagnose breast cancer. Automated classification techniques are so popular in many areas in order to reduce human dependency considering third world countries. Our purpose is to determine if sample is malignant or benign in automated manner. Many algorithms are studied so far in medical area along with other areas. However, algorithms are generally too complex even for simple tasks. We propose a simple algorithm that can differentiate cancerous and non-cancerous samples from breast tissue in automated manner. The images were taken from Near East University Hospital which is consisted of 50 cancerous and 100 healthy images. Total of 150 images were correctly differentiated through our algorithm.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116826424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Privacy Preserving Data Mining Approaches and Techniques 隐私保护数据挖掘方法与技术综述
M. M. Siraj, Nurul Adibah Rahmat, M. Din
In recent years, the importance of the Internet in our personal as well as our professional lives cannot be overstated as can be observed from the immense increase of its users. It therefore comes as no surprise that a lot of businesses are being carried out over the internet. It brings along privacy threats to the data and information of an organization. Data mining is the processing of analyze larger data in order to discover patterns and analyze hidden data concurring to distinctive sights for categorize into convenient information which is collected and assembled in common areas and other information necessities to eventually cut costs and increase revenue. In fact, the data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, there was been growing concern that use of this technology is violating individual privacy. This tool aims to find useful patterns from large amount of data using by mining algorithms and approaches. The analysis of privacy preserving data mining (PPDM) algorithms should consider the effects of these algorithms in mining the results as well as in preserving privacy. Therefore, the success of privacy preserving data mining algorithms is measured in term of its performances, data utility, level of uncertainty, data anonymization, data randomization and so on based on data mining techniques and approaches are presented in this paper to analyze.
近年来,互联网在我们的个人生活以及我们的职业生活中的重要性怎么强调都不为过,这可以从其用户的巨大增长中观察到。因此,许多业务都是在互联网上进行的,这并不奇怪。它给组织的数据和信息带来了隐私威胁。数据挖掘是对较大的数据进行分析,从中发现规律,对具有鲜明特征的隐藏数据进行分析,将其归类为方便的信息,并在公共区域收集和组装,从而达到降低成本和增加收入的目的。事实上,数据挖掘已经成为一项从大量数据中获取知识的重要技术。然而,越来越多的人担心使用这项技术会侵犯个人隐私。该工具旨在通过挖掘算法和方法从大量数据中找到有用的模式。对保护隐私数据挖掘(PPDM)算法的分析应考虑这些算法在挖掘结果和保护隐私方面的影响。因此,基于数据挖掘技术和方法,本文从性能、数据效用、不确定性水平、数据匿名化、数据随机化等方面来衡量隐私保护数据挖掘算法的成功与否。
{"title":"A Survey on Privacy Preserving Data Mining Approaches and Techniques","authors":"M. M. Siraj, Nurul Adibah Rahmat, M. Din","doi":"10.1145/3316615.3316632","DOIUrl":"https://doi.org/10.1145/3316615.3316632","url":null,"abstract":"In recent years, the importance of the Internet in our personal as well as our professional lives cannot be overstated as can be observed from the immense increase of its users. It therefore comes as no surprise that a lot of businesses are being carried out over the internet. It brings along privacy threats to the data and information of an organization. Data mining is the processing of analyze larger data in order to discover patterns and analyze hidden data concurring to distinctive sights for categorize into convenient information which is collected and assembled in common areas and other information necessities to eventually cut costs and increase revenue. In fact, the data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, there was been growing concern that use of this technology is violating individual privacy. This tool aims to find useful patterns from large amount of data using by mining algorithms and approaches. The analysis of privacy preserving data mining (PPDM) algorithms should consider the effects of these algorithms in mining the results as well as in preserving privacy. Therefore, the success of privacy preserving data mining algorithms is measured in term of its performances, data utility, level of uncertainty, data anonymization, data randomization and so on based on data mining techniques and approaches are presented in this paper to analyze.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116874056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Smart City Bus Application with Quick Response (QR) Code Payment 具有快速响应(QR)码支付功能的智能城市公交应用程序
Sim Liew Fong, D. Yung, F. Y. Ahmed, A. Jamal
Mobile application that is available in Android operating system can do many functions such as access to the internet wirelessly, take digital photos, or even locate itself using Global Positioning System. Smart City Bus Application is an application that assist users in providing public buses' information such as bus route view on map, quick response (QR) code payment, etc. This paper however will discuss about the results from system testing and passengers' satisfaction view of each of the system's functions. System testing was performed using black-box method by sorting to project's objectives. The result from system testing is all positive meaning it is performed as expected from given input. In the other hand, acceptance testing was conducted by giving out the application to get evaluated by selected people that uses bus frequently. After testing, questionnaire where given to score each system's feature scaling from 1 to 5 as "Not Satisfy" and "Very Satisfy" respectively. In the end of the questionnaire, system's overall score was asked and the result is mostly positive.
Android操作系统上的移动应用程序可以做很多功能,比如无线上网,拍摄数码照片,甚至使用全球定位系统来定位自己。智能城市公交应用程序是一款帮助用户提供公交信息的应用程序,如地图上的公交路线视图,快速响应(QR码)支付等。然而,本文将讨论系统测试的结果和乘客对系统各项功能的满意度。系统测试通过对项目目标进行排序,使用黑盒方法进行。系统测试的结果都是肯定的,这意味着它按照给定输入的预期执行。另一方面,验收测试是通过将应用程序分发给经常使用总线的人进行评估来进行的。在测试之后,问卷给出了每个系统的功能评分从1到5分别为“不满意”和“非常满意”。在问卷的最后,询问了系统的总体得分,结果大多是积极的。
{"title":"Smart City Bus Application with Quick Response (QR) Code Payment","authors":"Sim Liew Fong, D. Yung, F. Y. Ahmed, A. Jamal","doi":"10.1145/3316615.3316718","DOIUrl":"https://doi.org/10.1145/3316615.3316718","url":null,"abstract":"Mobile application that is available in Android operating system can do many functions such as access to the internet wirelessly, take digital photos, or even locate itself using Global Positioning System. Smart City Bus Application is an application that assist users in providing public buses' information such as bus route view on map, quick response (QR) code payment, etc. This paper however will discuss about the results from system testing and passengers' satisfaction view of each of the system's functions. System testing was performed using black-box method by sorting to project's objectives. The result from system testing is all positive meaning it is performed as expected from given input. In the other hand, acceptance testing was conducted by giving out the application to get evaluated by selected people that uses bus frequently. After testing, questionnaire where given to score each system's feature scaling from 1 to 5 as \"Not Satisfy\" and \"Very Satisfy\" respectively. In the end of the questionnaire, system's overall score was asked and the result is mostly positive.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121903824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Managing Quality Assurance Challenges of DevOps through Analytics 通过分析管理DevOps的质量保证挑战
Mahmoud Mohammad Ahmad Ibrahim, Sharifah Mashita Syed-Mohamad, M. Husin
DevOps is an intermarriage between developmental practices and operational modalities. The methodology employs the practices of continuous integration and delivery and places the deployment pipeline as the main requirement to automate, deliver and operate software in a robust way, without compromising on the quality in the software development process. Over time, many systems and tools have been developed to implement the deployment pipeline and support the continuous delivery process. A pipeline splits the process of software delivery into various stages. Each stage is designed to verify the quality of new features from a new perspective to attest to the functionality and prevent either small or big errors from impacting the end users. The pipeline must provide a response and feedback loop to the concerned team and provide a window into the flow of changes that takes place. However, there is no clear rule to define what goes into a pipeline. This paper reviews the challenges of quality assurance of DevOps and provides tentative recommendations to deal with quality issues. Our proposed pipeline with analytic features is expected to provide accurate metrics on a real-time basis.
DevOps是开发实践和操作模式之间的联姻。该方法采用持续集成和交付的实践,并将部署管道作为以健壮的方式自动化、交付和操作软件的主要需求,而不影响软件开发过程中的质量。随着时间的推移,已经开发了许多系统和工具来实现部署管道并支持持续交付过程。管道将软件交付过程划分为不同的阶段。每个阶段都旨在从新的角度验证新特性的质量,以验证功能,并防止小错误或大错误影响最终用户。管道必须为相关团队提供响应和反馈循环,并为发生的更改流提供一个窗口。然而,没有明确的规则来定义进入管道的内容。本文回顾了DevOps质量保证的挑战,并提供了处理质量问题的初步建议。我们提出的具有分析功能的管道有望在实时的基础上提供准确的度量。
{"title":"Managing Quality Assurance Challenges of DevOps through Analytics","authors":"Mahmoud Mohammad Ahmad Ibrahim, Sharifah Mashita Syed-Mohamad, M. Husin","doi":"10.1145/3316615.3316670","DOIUrl":"https://doi.org/10.1145/3316615.3316670","url":null,"abstract":"DevOps is an intermarriage between developmental practices and operational modalities. The methodology employs the practices of continuous integration and delivery and places the deployment pipeline as the main requirement to automate, deliver and operate software in a robust way, without compromising on the quality in the software development process. Over time, many systems and tools have been developed to implement the deployment pipeline and support the continuous delivery process. A pipeline splits the process of software delivery into various stages. Each stage is designed to verify the quality of new features from a new perspective to attest to the functionality and prevent either small or big errors from impacting the end users. The pipeline must provide a response and feedback loop to the concerned team and provide a window into the flow of changes that takes place. However, there is no clear rule to define what goes into a pipeline. This paper reviews the challenges of quality assurance of DevOps and provides tentative recommendations to deal with quality issues. Our proposed pipeline with analytic features is expected to provide accurate metrics on a real-time basis.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130346165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A review of Convolutional Neural Networks in Remote Sensing Image 卷积神经网络在遥感图像中的研究进展
Xinni Liu, Fengrong Han, K. Ghazali, I. Mohamed, Yue Zhao
Effectively analysis of remote-sensing images is very important in many practical applications, such as urban planning, geospatial object detection, military monitoring, vegetation mapping and precision agriculture. Recently, convolutional neural network based deep learning algorithm has achieved a series of breakthrough research results in the fields of objective detection, image semantic segmentation and image classification, etc. Their powerful feature learning capabilities have attracted more attention and have important research value. In this article, firstly we have summarized the basic structure and several classical convolutional neural network architectures. Secondly, the recent research problems on convolutional neural network are discussed. Later, we summarized the latest research results in convolutional neural network based remote sensing fields. Finally, the conclusion has made on the basis of current issue on convolutional neural networks and the future development direction.
遥感图像的有效分析在城市规划、地理空间目标检测、军事监测、植被制图和精准农业等许多实际应用中具有重要意义。近年来,基于卷积神经网络的深度学习算法在客观检测、图像语义分割、图像分类等领域取得了一系列突破性的研究成果。它们强大的特征学习能力越来越受到人们的关注,具有重要的研究价值。本文首先总结了卷积神经网络的基本结构和几种经典的卷积神经网络结构。其次,讨论了卷积神经网络的最新研究问题。最后,总结了基于卷积神经网络的遥感领域的最新研究成果。最后,对卷积神经网络的研究现状和未来发展方向进行了总结。
{"title":"A review of Convolutional Neural Networks in Remote Sensing Image","authors":"Xinni Liu, Fengrong Han, K. Ghazali, I. Mohamed, Yue Zhao","doi":"10.1145/3316615.3316712","DOIUrl":"https://doi.org/10.1145/3316615.3316712","url":null,"abstract":"Effectively analysis of remote-sensing images is very important in many practical applications, such as urban planning, geospatial object detection, military monitoring, vegetation mapping and precision agriculture. Recently, convolutional neural network based deep learning algorithm has achieved a series of breakthrough research results in the fields of objective detection, image semantic segmentation and image classification, etc. Their powerful feature learning capabilities have attracted more attention and have important research value. In this article, firstly we have summarized the basic structure and several classical convolutional neural network architectures. Secondly, the recent research problems on convolutional neural network are discussed. Later, we summarized the latest research results in convolutional neural network based remote sensing fields. Finally, the conclusion has made on the basis of current issue on convolutional neural networks and the future development direction.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129635892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System 基于网络的入侵检测系统中IP地址截断法的隐私保护
Yee Jian Chew, S. Ooi, Kok-Seng Wong, Y. Pang
Network-based Intrusion Detection System (IDS) is gaining wide attention from the research community since the past decades. While having a precise classification model in separating the normal and malicious network traffics is still remain as the ultimate goal, the privacy protection for network traffic database cannot be ignore as well. The impetuous ignorance of database privacy will continue to restrain governments, organisations and individuals in releasing the real and ontological network traces. The common solution to tackle this matter is anonymising the database through the statistical approach. Anonymising can be referred to masking, hiding or removing certain sensitive information from the database. Thus, this will be subsequently resulting in information loss. In this paper, a truncation method is explored to preserve the sensitive information of the network traffic database (i.e. IP addresses). The truncated database is then tested with 10 machine learning classifiers from Weka. We tested four different options of IP address truncation against the 6 percent of GureKDDCup dataset.
近几十年来,基于网络的入侵检测系统(IDS)受到了学术界的广泛关注。在拥有一个精确的分类模型来区分正常和恶意网络流量的最终目标的同时,对网络流量数据库的隐私保护也不容忽视。对数据库隐私的浮躁无知将继续制约政府、组织和个人释放真实的、本体论的网络痕迹。解决这个问题的常用解决方案是通过统计方法对数据库进行匿名化。匿名化可以指从数据库中屏蔽、隐藏或删除某些敏感信息。因此,这将随后导致信息丢失。本文探讨了一种截断方法来保留网络流量数据库的敏感信息(即IP地址)。然后用Weka的10个机器学习分类器测试截断的数据库。我们针对6%的GureKDDCup数据集测试了四种不同的IP地址截断选项。
{"title":"Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System","authors":"Yee Jian Chew, S. Ooi, Kok-Seng Wong, Y. Pang","doi":"10.1145/3316615.3316626","DOIUrl":"https://doi.org/10.1145/3316615.3316626","url":null,"abstract":"Network-based Intrusion Detection System (IDS) is gaining wide attention from the research community since the past decades. While having a precise classification model in separating the normal and malicious network traffics is still remain as the ultimate goal, the privacy protection for network traffic database cannot be ignore as well. The impetuous ignorance of database privacy will continue to restrain governments, organisations and individuals in releasing the real and ontological network traces. The common solution to tackle this matter is anonymising the database through the statistical approach. Anonymising can be referred to masking, hiding or removing certain sensitive information from the database. Thus, this will be subsequently resulting in information loss. In this paper, a truncation method is explored to preserve the sensitive information of the network traffic database (i.e. IP addresses). The truncated database is then tested with 10 machine learning classifiers from Weka. We tested four different options of IP address truncation against the 6 percent of GureKDDCup dataset.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the 2019 8th International Conference on Software and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1