首页 > 最新文献

Proceedings of the 2019 8th International Conference on Software and Computer Applications最新文献

英文 中文
Cooperative Hierarchical Framework for Group Activity Recognition: From Group Detection to Multi-activity Recognition 群体活动识别的合作层次框架:从群体检测到多活动识别
Mohammed Al-habib, Dong-jun Huang, Majjed Al-Qatf, Kamal Al-Sabahi
Deep neural network algorithms have shown promising performance for many tasks in computer vision field. Several neural network-based methods have been proposed to recognize group activities from video sequences. However, there are still several challenges that are related to multiple groups with different activities within a scene. The strong correlation that exists among individual motion, groups and activities can be utilized to detect groups and recognize their concurrent activities. Motivated by these observations, we propose a unified deep learning framework for detecting multiple groups and recognizing their corresponding collective activity based on Long Short-Term Memory (LSTM) network. In this framework, we use a pre-trained convolutional neural network (CNN) to extract features from the frames and appearances of persons. An objective function has been proposed to learn the amount of pairwise interaction between persons. The obtained individual features are passed to a clustering algorithm to detect groups in the scene. Then, an LSTM based model is used to recognize group activities. Together with this, a scene level CNN followed by LSTM is used to extract and learn scene level feature. Finally, the activities from the group level and the scene context level are integrated to infer the collective activity. The proposed method is evaluated on the benchmark collective activity dataset and compared with several baselines. The experimental results show its competitive performance for the collective activity recognition task.
深度神经网络算法在计算机视觉领域的许多任务中显示出良好的性能。人们提出了几种基于神经网络的方法来从视频序列中识别群体活动。然而,仍然存在一些与场景中具有不同活动的多个组相关的挑战。个体运动、群体和活动之间存在的强相关性可以用来检测群体并识别它们的并发活动。基于这些观察结果,我们提出了一个统一的深度学习框架,用于检测多个群体并基于长短期记忆(LSTM)网络识别其相应的集体活动。在这个框架中,我们使用预训练的卷积神经网络(CNN)从人物的框架和外表中提取特征。已经提出了一个目标函数来学习人与人之间成对交互的数量。将获得的单个特征传递给聚类算法以检测场景中的组。然后,采用基于LSTM的模型对群体活动进行识别。与此同时,使用场景级CNN和LSTM来提取和学习场景级特征。最后,将群体层面的活动和场景情境层面的活动结合起来,推断出集体活动。在基准集体活动数据集上对该方法进行了评估,并与多个基线进行了比较。实验结果表明,该方法在集体活动识别任务中具有较强的竞争力。
{"title":"Cooperative Hierarchical Framework for Group Activity Recognition: From Group Detection to Multi-activity Recognition","authors":"Mohammed Al-habib, Dong-jun Huang, Majjed Al-Qatf, Kamal Al-Sabahi","doi":"10.1145/3316615.3316722","DOIUrl":"https://doi.org/10.1145/3316615.3316722","url":null,"abstract":"Deep neural network algorithms have shown promising performance for many tasks in computer vision field. Several neural network-based methods have been proposed to recognize group activities from video sequences. However, there are still several challenges that are related to multiple groups with different activities within a scene. The strong correlation that exists among individual motion, groups and activities can be utilized to detect groups and recognize their concurrent activities. Motivated by these observations, we propose a unified deep learning framework for detecting multiple groups and recognizing their corresponding collective activity based on Long Short-Term Memory (LSTM) network. In this framework, we use a pre-trained convolutional neural network (CNN) to extract features from the frames and appearances of persons. An objective function has been proposed to learn the amount of pairwise interaction between persons. The obtained individual features are passed to a clustering algorithm to detect groups in the scene. Then, an LSTM based model is used to recognize group activities. Together with this, a scene level CNN followed by LSTM is used to extract and learn scene level feature. Finally, the activities from the group level and the scene context level are integrated to infer the collective activity. The proposed method is evaluated on the benchmark collective activity dataset and compared with several baselines. The experimental results show its competitive performance for the collective activity recognition task.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133905923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personalized Ranking Point of Interest Recommendation Based on Spatial-Temporal Distance Metric in LBSNs 基于时空距离度量的LBSNs个性化兴趣点排序推荐
Chang Su, Hao Li, Xianzhong Xie
Nowadays, with the improvement of social network check-in and positioning technology, the positioning information is more accurate, and a large amount of network check-in data is generated. The recommendation research of interest points based on social networks is also increasing. Most of the points of interest refer to rely on geography, time, space, and textual information. In spatial-temporal, most studies consider the check-in rules from the geographical distance and time series. This paper introduces a geographic spatial-temporal distance measurement model to map temporal space information into a three-dimensional elliptical spherical coordinate system. The spatial-temporal distance is measured under the same reference standard. Helps alleviate the problems caused by cold start and data sparseness for location recommendation accuracy. Based on the Bayesian personalized ranking, this paper measures the temporal and spatial distance by using a Gaussian kernel function to weight the spatial-temporal distance, and proposes a personalized ranking recommendation algorithm based on the spatial-temporal distance metric. And it performs well on both datasets and is superior to the benchmark method.
如今,随着社交网络签到和定位技术的提高,定位信息更加准确,产生了大量的网络签到数据。基于社交网络的兴趣点推荐研究也在不断增加。兴趣点的引用大多依赖于地理、时间、空间和文本信息。在时空上,大多数研究从地理距离和时间序列上考虑签入规则。介绍了一种将时空信息映射到三维椭圆球坐标系的地理时空距离测量模型。在相同的参考标准下测量时空距离。有助于缓解冷启动和数据稀疏导致的位置推荐准确性问题。本文在贝叶斯个性化排序的基础上,利用高斯核函数对时空距离进行加权来度量时空距离,提出了一种基于时空距离度量的个性化排序推荐算法。该方法在两个数据集上都表现良好,优于基准方法。
{"title":"Personalized Ranking Point of Interest Recommendation Based on Spatial-Temporal Distance Metric in LBSNs","authors":"Chang Su, Hao Li, Xianzhong Xie","doi":"10.1145/3316615.3316715","DOIUrl":"https://doi.org/10.1145/3316615.3316715","url":null,"abstract":"Nowadays, with the improvement of social network check-in and positioning technology, the positioning information is more accurate, and a large amount of network check-in data is generated. The recommendation research of interest points based on social networks is also increasing. Most of the points of interest refer to rely on geography, time, space, and textual information. In spatial-temporal, most studies consider the check-in rules from the geographical distance and time series. This paper introduces a geographic spatial-temporal distance measurement model to map temporal space information into a three-dimensional elliptical spherical coordinate system. The spatial-temporal distance is measured under the same reference standard. Helps alleviate the problems caused by cold start and data sparseness for location recommendation accuracy. Based on the Bayesian personalized ranking, this paper measures the temporal and spatial distance by using a Gaussian kernel function to weight the spatial-temporal distance, and proposes a personalized ranking recommendation algorithm based on the spatial-temporal distance metric. And it performs well on both datasets and is superior to the benchmark method.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"933 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133418435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reconstruct the Back of 3D Face Model Using 2D Gradient Based Interpolation 基于二维梯度插值的三维人脸模型背部重建
W. Luo
The recent development of 3D sensing technology enables a number of consumer facing 3D cameras, such as Kinect, TrueDepth camera on IPhoneX etc., emerge. These cameras are much cheaper than conventional and professional 3D scanning devices, and thus they can be acquired by consumers easily. However, consumer 3D scanning applications bring a new set of challenges. One of the challenges is that it is difficult for consumers to obtain the full head model by self-scanning. The proposed algorithm in this paper aims at reconstructing 3D human back head model based on gradient filling method. Due to the lack of related researches, to be more specific, repairing large holes without extra information in the 3D scale, the problem is migrated to 2D scale by projecting 3D model to a spherical space. Then the depth value at each position in back head is calculated via gradient interpolation. The algorithm is simple and effective and it can reconstruct a model within seconds.
最近3D传感技术的发展使得许多面向消费者的3D相机,如Kinect, IPhoneX上的TrueDepth相机等出现。这些相机比传统的和专业的3D扫描设备便宜得多,因此消费者可以很容易地获得它们。然而,消费级3D扫描应用带来了一系列新的挑战。其中一个挑战是消费者很难通过自我扫描获得全头部模型。本文提出的算法是基于梯度填充法重建三维人体后头模型。由于缺乏相关研究,具体来说,在三维尺度下修复大的孔洞没有额外的信息,通过将三维模型投影到球面空间,将问题迁移到二维尺度。然后通过梯度插值计算后头部各位置的深度值。该算法简单有效,可在数秒内重建模型。
{"title":"Reconstruct the Back of 3D Face Model Using 2D Gradient Based Interpolation","authors":"W. Luo","doi":"10.1145/3316615.3316660","DOIUrl":"https://doi.org/10.1145/3316615.3316660","url":null,"abstract":"The recent development of 3D sensing technology enables a number of consumer facing 3D cameras, such as Kinect, TrueDepth camera on IPhoneX etc., emerge. These cameras are much cheaper than conventional and professional 3D scanning devices, and thus they can be acquired by consumers easily. However, consumer 3D scanning applications bring a new set of challenges. One of the challenges is that it is difficult for consumers to obtain the full head model by self-scanning. The proposed algorithm in this paper aims at reconstructing 3D human back head model based on gradient filling method. Due to the lack of related researches, to be more specific, repairing large holes without extra information in the 3D scale, the problem is migrated to 2D scale by projecting 3D model to a spherical space. Then the depth value at each position in back head is calculated via gradient interpolation. The algorithm is simple and effective and it can reconstruct a model within seconds.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134515223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CDAS CDAS
Qi Li, Hao Chen
The rapid development of smartphones has greatly facilitated our lives. At the same time, securing the data stored and accessed from smartphones makes it important to authenticate the user. However, current smartphones perform one-time authentication at the entrance while they don't authenticate users continuously when in use, which brings serious privacy and security issues, such as collisions and social engineering to bypass the authentication. This paper introduces CDAS (Continuous Dynamic Authentication System), which uses the Support Vector Machine (SVM) to construct user's behavior model by collecting his touch data to judge him authorized whether or not. CDAS works independently in the background without interacting with users most time. Therefore, CDAS is featured with security, efficiency and continuity. We conducted a two-week experiment involving more than 20 users which shows that the system we design achieves a high accuracy, a low False Accept Rate (FAR) and a low False Reject Rate (FRR), which indicates that CDAS ensures the security and enjoys a promising prospect.
{"title":"CDAS","authors":"Qi Li, Hao Chen","doi":"10.1145/3316615.3316691","DOIUrl":"https://doi.org/10.1145/3316615.3316691","url":null,"abstract":"The rapid development of smartphones has greatly facilitated our lives. At the same time, securing the data stored and accessed from smartphones makes it important to authenticate the user. However, current smartphones perform one-time authentication at the entrance while they don't authenticate users continuously when in use, which brings serious privacy and security issues, such as collisions and social engineering to bypass the authentication. This paper introduces CDAS (Continuous Dynamic Authentication System), which uses the Support Vector Machine (SVM) to construct user's behavior model by collecting his touch data to judge him authorized whether or not. CDAS works independently in the background without interacting with users most time. Therefore, CDAS is featured with security, efficiency and continuity. We conducted a two-week experiment involving more than 20 users which shows that the system we design achieves a high accuracy, a low False Accept Rate (FAR) and a low False Reject Rate (FRR), which indicates that CDAS ensures the security and enjoys a promising prospect.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115610683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Visualizing Test-Defect Coverage Information to Support Analytical Reasoning and Testing 可视化测试缺陷覆盖信息以支持分析推理和测试
Sharifah Mashita Syed-Mohamad, M. Husin, W. Zainon
Software testing is an essential activity in all software projects. The key issue in testing is determining the sufficiency of tests and, traditionally this has been done by using the Software Reliability Growth Models (SRGMs). However, SRGMs are not applicable when there are no stabilization phases as required by most software reliability models. Test-Defect Coverage Analytics Model (TDCAM) has been proposed to address this problem. This paper proposes the application of visual analytic techniques as an approach for supporting informed decision making in deciding the sufficiency of tests. Visual analytics research considers interactive visualization as the common platform for combining various computational data analysis techniques to support the analytical reasoning process. We presented four visual representations of TDCAM to demonstrate how analytical models have been applied to indicate the adequacy of tests in relation to sufficient and efficient test coverage. The techniques provide an effective and generally applicable test estimation on the basis of a general trend that higher test coverage correlates with higher probability of detecting more defects.
软件测试是所有软件项目中必不可少的活动。测试中的关键问题是确定测试的充分性,传统上,这是通过使用软件可靠性增长模型(srgm)来完成的。然而,当大多数软件可靠性模型要求没有稳定阶段时,srgm就不适用了。测试缺陷覆盖分析模型(TDCAM)被提出来解决这个问题。本文提出了可视化分析技术的应用,作为一种方法,以支持知情决策,决定测试的充分性。可视化分析研究将交互式可视化视为结合各种计算数据分析技术以支持分析推理过程的公共平台。我们提出了四种TDCAM的可视化表示,以演示如何应用分析模型来表明与充分和有效的测试覆盖有关的测试的充分性。这些技术提供了一个有效的和普遍适用的测试评估,基于一个普遍的趋势,即更高的测试覆盖率与检测更多缺陷的更高概率相关。
{"title":"Visualizing Test-Defect Coverage Information to Support Analytical Reasoning and Testing","authors":"Sharifah Mashita Syed-Mohamad, M. Husin, W. Zainon","doi":"10.1145/3316615.3316666","DOIUrl":"https://doi.org/10.1145/3316615.3316666","url":null,"abstract":"Software testing is an essential activity in all software projects. The key issue in testing is determining the sufficiency of tests and, traditionally this has been done by using the Software Reliability Growth Models (SRGMs). However, SRGMs are not applicable when there are no stabilization phases as required by most software reliability models. Test-Defect Coverage Analytics Model (TDCAM) has been proposed to address this problem. This paper proposes the application of visual analytic techniques as an approach for supporting informed decision making in deciding the sufficiency of tests. Visual analytics research considers interactive visualization as the common platform for combining various computational data analysis techniques to support the analytical reasoning process. We presented four visual representations of TDCAM to demonstrate how analytical models have been applied to indicate the adequacy of tests in relation to sufficient and efficient test coverage. The techniques provide an effective and generally applicable test estimation on the basis of a general trend that higher test coverage correlates with higher probability of detecting more defects.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model 基于分层隐马尔可夫模型的物联网攻击检测与分类
Ahmad Alshammari, M. Zohdy
Internet of Things (IoT) attacks have rapidly risen in frequency in recent years as IoT devices become more commonplace in industry, businesses, and homes. Since these devices have very basic functionality and are not designed with security in mind, they are easy targets for attacks that can steal data or gain access to the network the devices are connected to. Here we propose a tiered system of Hidden Markov Models (HMMs) for identifying these attacks and classifying them by type of attack. This system has a tree-based structure, with the main HMM being applied to the raw network data to identify attacks. This main HMM branches off into separate HMMs for each type of attack to classify the attacks according to how important the consequences of the attack are and how likely each attack is to happen.
近年来,随着物联网设备在工业、企业和家庭中变得越来越普遍,物联网(IoT)攻击的频率迅速上升。由于这些设备具有非常基本的功能,并且在设计时没有考虑到安全性,因此它们很容易成为攻击的目标,可以窃取数据或访问设备所连接的网络。在这里,我们提出了一个隐马尔可夫模型(hmm)的分层系统来识别这些攻击并根据攻击类型对它们进行分类。该系统采用树型结构,将主HMM应用于原始网络数据识别攻击。对于每种类型的攻击,这个主要HMM分支为单独的HMM,根据攻击后果的重要性和每次攻击发生的可能性对攻击进行分类。
{"title":"Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model","authors":"Ahmad Alshammari, M. Zohdy","doi":"10.1145/3316615.3316729","DOIUrl":"https://doi.org/10.1145/3316615.3316729","url":null,"abstract":"Internet of Things (IoT) attacks have rapidly risen in frequency in recent years as IoT devices become more commonplace in industry, businesses, and homes. Since these devices have very basic functionality and are not designed with security in mind, they are easy targets for attacks that can steal data or gain access to the network the devices are connected to. Here we propose a tiered system of Hidden Markov Models (HMMs) for identifying these attacks and classifying them by type of attack. This system has a tree-based structure, with the main HMM being applied to the raw network data to identify attacks. This main HMM branches off into separate HMMs for each type of attack to classify the attacks according to how important the consequences of the attack are and how likely each attack is to happen.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115992152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A UML Profile for Multi-Cloud Service Configuration (UMLPMSC) in Event-driven Serverless Applications 事件驱动的无服务器应用程序中用于多云服务配置(UMLPMSC)的UML概要文件
Fatima Samea, F. Azam, Muhammad Waseem Anwar, Mehreen Khan, M. Rashid
The rapid evolution in cloud computing leads to a rising elegance of serverless cloud-based software architectures which primarily focuses on providing the software developers a great potential for executing different arbitrary functions having minor overhead in server management as FaaS (Function-as-a-service). These FaaS applications are a set of stateless functions that are triggered by events defined by the cloud provider. However, the service configuration of such event-driven serverless applications is a complex process. Particularly, the changing configuration requirements on multiple clouds create low-level implementation challenges. Therefore, this article introduces UMLPMSC (UML Profile for Multi-Cloud Service Configuration) for event driven serverless applications to model the service configuration design requirements at high abstraction level. This leads to transform the high-level source UMLPMSC models into low level serverless framework implementations for the service configuration. The applicability of the profile has been validated through two case studies for AWS and Azure serverless function providers. It has been concluded that UMLPMSC significantly simplifies the multi-cloud service configuration process for event-driven serverless applications.
云计算的快速发展导致了基于云的无服务器软件体系结构的日益优雅,其主要侧重于为软件开发人员提供执行不同任意功能的巨大潜力,而在服务器管理方面的开销较小,如FaaS(功能即服务)。这些FaaS应用程序是由云提供商定义的事件触发的一组无状态函数。然而,这种事件驱动的无服务器应用程序的服务配置是一个复杂的过程。特别是,多云上不断变化的配置需求会带来低级的实现挑战。因此,本文将为事件驱动的无服务器应用程序引入UMLPMSC(用于多云服务配置的UML概要文件),以便在高抽象级别对服务配置设计需求进行建模。这导致将高级源UMLPMSC模型转换为用于服务配置的低级无服务器框架实现。通过针对AWS和Azure无服务器功能提供商的两个案例研究,验证了该配置文件的适用性。已经得出结论,UMLPMSC显著简化了事件驱动的无服务器应用程序的多云服务配置过程。
{"title":"A UML Profile for Multi-Cloud Service Configuration (UMLPMSC) in Event-driven Serverless Applications","authors":"Fatima Samea, F. Azam, Muhammad Waseem Anwar, Mehreen Khan, M. Rashid","doi":"10.1145/3316615.3316636","DOIUrl":"https://doi.org/10.1145/3316615.3316636","url":null,"abstract":"The rapid evolution in cloud computing leads to a rising elegance of serverless cloud-based software architectures which primarily focuses on providing the software developers a great potential for executing different arbitrary functions having minor overhead in server management as FaaS (Function-as-a-service). These FaaS applications are a set of stateless functions that are triggered by events defined by the cloud provider. However, the service configuration of such event-driven serverless applications is a complex process. Particularly, the changing configuration requirements on multiple clouds create low-level implementation challenges. Therefore, this article introduces UMLPMSC (UML Profile for Multi-Cloud Service Configuration) for event driven serverless applications to model the service configuration design requirements at high abstraction level. This leads to transform the high-level source UMLPMSC models into low level serverless framework implementations for the service configuration. The applicability of the profile has been validated through two case studies for AWS and Azure serverless function providers. It has been concluded that UMLPMSC significantly simplifies the multi-cloud service configuration process for event-driven serverless applications.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cloud-Based IoT Solution for Predictive Modeling of Ship Fuel Consumption 基于云的物联网解决方案,用于船舶燃油消耗预测建模
K. Kee, Simon Boung-Yew Lau
The need for savings in ship fuel consumption has led to the proliferation of various cloud-based service-oriented approach towards predicting and optimizing ship operation. However, majority of the cloud-based services are generally designed for general purpose prediction where ship owners do not have the liberty to select and customize machine learning algorithms and parameters that they desire to experiment with for their specific datasets. In this paper, the feasibility of a novel Do-It-Yourself (DIY) approach towards performing predictive modeling and analytics of ship fuel consumption based on out-of-the-box cloud-based Azure Machine Learning (ML) Studio tool sets is demonstrated. The POC system implementing multiple regression model (MLR) model may provide insight into ship operational fuel consumption based on historical operational IoT data collected from ships operated under various operational parameters. The derived predictive model is validated with coefficient of determination, R2 for goodness of fit. The coefficient of determination, R2 result at 0.9707 indicates the good fitness of regression.
节约船舶燃料消耗的需求导致了各种基于云服务的方法的扩散,以预测和优化船舶运行。然而,大多数基于云的服务通常是为通用预测而设计的,船东无法自由选择和定制他们希望为特定数据集进行实验的机器学习算法和参数。本文展示了一种新颖的DIY方法的可行性,该方法基于开箱即用的基于云的Azure机器学习(ML) Studio工具集,对船舶燃料消耗进行预测建模和分析。实现多元回归模型(MLR)模型的POC系统可以根据从各种操作参数下运行的船舶收集的历史操作物联网数据,深入了解船舶操作燃料消耗。用决定系数R2对所得预测模型进行拟合优度验证。决定系数R2为0.9707,表明回归的拟合性较好。
{"title":"Cloud-Based IoT Solution for Predictive Modeling of Ship Fuel Consumption","authors":"K. Kee, Simon Boung-Yew Lau","doi":"10.1145/3316615.3316710","DOIUrl":"https://doi.org/10.1145/3316615.3316710","url":null,"abstract":"The need for savings in ship fuel consumption has led to the proliferation of various cloud-based service-oriented approach towards predicting and optimizing ship operation. However, majority of the cloud-based services are generally designed for general purpose prediction where ship owners do not have the liberty to select and customize machine learning algorithms and parameters that they desire to experiment with for their specific datasets. In this paper, the feasibility of a novel Do-It-Yourself (DIY) approach towards performing predictive modeling and analytics of ship fuel consumption based on out-of-the-box cloud-based Azure Machine Learning (ML) Studio tool sets is demonstrated. The POC system implementing multiple regression model (MLR) model may provide insight into ship operational fuel consumption based on historical operational IoT data collected from ships operated under various operational parameters. The derived predictive model is validated with coefficient of determination, R2 for goodness of fit. The coefficient of determination, R2 result at 0.9707 indicates the good fitness of regression.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Artificial Intelligence Legal Policy: Limits of Use of Some Kinds of AI 人工智能法律政策:某些类型人工智能的使用限制
Roman Dremliuga, N. Prisekina
The paper is devoted to analysis of legal issues concerned to development of AI technologies. The main question here: should governments develop rules regulating use of artificial intelligence and a system of licensing like with automobile transport or ban some types of AI? Comprehension of the current and future legal framework is very important. First of all, law is used to govern a society. It implies that examining AI from legal point of view allows to realize what challenges to social security are caused by expansive introduction of autonomous systems. Secondly, for developer of high technology products it is easier to decide what products should not be invested to since they may lead to negative legal consequences.
本文致力于分析与人工智能技术发展有关的法律问题。这里的主要问题是:政府是应该制定规则来规范人工智能的使用,以及像汽车运输那样的许可制度,还是应该禁止某些类型的人工智能?理解当前和未来的法律框架是非常重要的。首先,法律是用来治理社会的。这意味着,从法律的角度审视人工智能,可以认识到广泛引入自主系统会给社会保障带来什么样的挑战。其次,对于高科技产品的开发者来说,更容易决定哪些产品不应该投资,因为它们可能导致负面的法律后果。
{"title":"Artificial Intelligence Legal Policy: Limits of Use of Some Kinds of AI","authors":"Roman Dremliuga, N. Prisekina","doi":"10.1145/3316615.3316627","DOIUrl":"https://doi.org/10.1145/3316615.3316627","url":null,"abstract":"The paper is devoted to analysis of legal issues concerned to development of AI technologies. The main question here: should governments develop rules regulating use of artificial intelligence and a system of licensing like with automobile transport or ban some types of AI? Comprehension of the current and future legal framework is very important. First of all, law is used to govern a society. It implies that examining AI from legal point of view allows to realize what challenges to social security are caused by expansive introduction of autonomous systems. Secondly, for developer of high technology products it is easier to decide what products should not be invested to since they may lead to negative legal consequences.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"10 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132576058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical Investigation of UML Models Matching through Different Weight Calibration 通过不同权重校准UML模型匹配的实证研究
Alhassan Adamu, W. Zainon, S. Abdulrahman
UML model matching and retrieval is widely known as optimization problem. This is because of the inconsistencies between software properties. Matching is a fundamental operation for UML model reuse, as such accurate matching between models' elements results in better reuse of such models. UML models consist of number of properties such as functional properties, structural properties, and behavioral properties. Such properties are source of numerous errors during software matching, because each property represents software system from different views. In this paper we empirically investigate the use of different weight values when computing the similarity of software system from multiple views. The paper investigates the improvement of similarity values through the calibration of aggregated metrics. The result reported shows the superiority of structural properties if assign higher metric value compared to other properties.
UML模型的匹配和检索被广泛地称为优化问题。这是因为软件属性之间的不一致。匹配是UML模型重用的基本操作,因为模型元素之间的这种精确匹配可以更好地重用这些模型。UML模型由许多属性组成,例如功能属性、结构属性和行为属性。这些属性是软件匹配过程中大量错误的根源,因为每个属性从不同的角度代表了软件系统。本文从多个角度对软件系统相似度计算中不同权重值的使用进行了实证研究。本文研究了通过聚合度量的校准来提高相似值的方法。所报告的结果表明,如果赋予较高的度量值,结构性能相对于其他性能具有优越性。
{"title":"Empirical Investigation of UML Models Matching through Different Weight Calibration","authors":"Alhassan Adamu, W. Zainon, S. Abdulrahman","doi":"10.1145/3316615.3316618","DOIUrl":"https://doi.org/10.1145/3316615.3316618","url":null,"abstract":"UML model matching and retrieval is widely known as optimization problem. This is because of the inconsistencies between software properties. Matching is a fundamental operation for UML model reuse, as such accurate matching between models' elements results in better reuse of such models. UML models consist of number of properties such as functional properties, structural properties, and behavioral properties. Such properties are source of numerous errors during software matching, because each property represents software system from different views. In this paper we empirically investigate the use of different weight values when computing the similarity of software system from multiple views. The paper investigates the improvement of similarity values through the calibration of aggregated metrics. The result reported shows the superiority of structural properties if assign higher metric value compared to other properties.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127728676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 2019 8th International Conference on Software and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1