首页 > 最新文献

2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
A Real-Time Text Analysis System 实时文本分析系统
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00053
Chi Mai Nguyen, Phat Thai, Duy Khang Lam, Van Tuan Nguyen
We live in an age of information overload. Manual information processing is increasingly overwhelmed with the enormous amount of information created by the explosive growth of news portals and online social networks. Such a situation calls for an automatic system that can support the process of handling, analyzing, and filtering information, especially information from online sources. In this work, we proposed a text analysis system that automatically collects, extracts, and analyses information from public-source-text documents such as news portals and social media networks. The proposed system can handle both long and short-text documents. It also has real-time features and is not restricted by any input data domain. The system can be used in different domains, such as scientific research, marketing, and security-related domains. Moreover, the system is engineered in modules and is flexible. Each module is an independent micro-service that can be used as a separate standalone application. The system is also extensible since new modules can be added easily. Index Terms—text analysis system, data mining, natural language processing
我们生活在一个信息过载的时代。由于新闻门户网站和在线社交网络的爆炸式增长所产生的海量信息,人工信息处理越来越不堪重负。这种情况需要能够支持处理、分析和过滤信息过程的自动系统,特别是来自在线资源的信息。在这项工作中,我们提出了一个文本分析系统,该系统可以自动收集、提取和分析来自新闻门户和社交媒体网络等公共源文本文档的信息。所提出的系统可以处理长文本和短文本文档。它还具有实时性,不受任何输入数据域的限制。该系统可用于不同的领域,如科研、营销、安全等领域。此外,该系统采用模块化设计,具有一定的灵活性。每个模块都是一个独立的微服务,可以作为一个独立的应用程序使用。该系统还具有可扩展性,因为可以轻松添加新模块。索引术语-文本分析系统,数据挖掘,自然语言处理
{"title":"A Real-Time Text Analysis System","authors":"Chi Mai Nguyen, Phat Thai, Duy Khang Lam, Van Tuan Nguyen","doi":"10.1109/COMPSAC57700.2023.00053","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00053","url":null,"abstract":"We live in an age of information overload. Manual information processing is increasingly overwhelmed with the enormous amount of information created by the explosive growth of news portals and online social networks. Such a situation calls for an automatic system that can support the process of handling, analyzing, and filtering information, especially information from online sources. In this work, we proposed a text analysis system that automatically collects, extracts, and analyses information from public-source-text documents such as news portals and social media networks. The proposed system can handle both long and short-text documents. It also has real-time features and is not restricted by any input data domain. The system can be used in different domains, such as scientific research, marketing, and security-related domains. Moreover, the system is engineered in modules and is flexible. Each module is an independent micro-service that can be used as a separate standalone application. The system is also extensible since new modules can be added easily. Index Terms—text analysis system, data mining, natural language processing","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130055860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Blockchain-Based Federated Learning and Data Privacy 基于区块链的联邦学习与数据隐私调查
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00199
Bipin Chhetri, Saroj Gopali, Rukayat Olapojoye, Samin Dehbashi, A. Namin
Federated learning is a decentralized machine learning paradigm that allows multiple clients to collaborate by leveraging local computational power and the model’s transmission. This method reduces the costs and privacy concerns associated with centralized machine learning methods while ensuring data privacy by distributing training data across heterogeneous devices. On the other hand, federated learning has the drawback of data leakage due to the lack of privacy-preserving mechanisms employed during storage, transfer, and sharing, thus posing significant risks to data owners and suppliers. Blockchain technology has emerged as a promising technology for offering secure data-sharing platforms in federated learning, especially in Industrial Internet of Things (IIoT) settings. This survey aims to compare the performance and security of various data privacy mechanisms adopted in blockchain-based federated learning architectures. We conduct a systematic review of existing literature on secure data-sharing platforms for federated learning provided by blockchain technology, providing an in-depth overview of blockchain-based federated learning, its essential components, and discussing its principles, and potential applications. The primary contribution of this survey paper is to identify critical research questions and propose potential directions for future research in blockchain-based federated learning.
联邦学习是一种分散的机器学习范式,它允许多个客户端通过利用本地计算能力和模型的传输进行协作。这种方法降低了与集中式机器学习方法相关的成本和隐私问题,同时通过跨异构设备分发训练数据来确保数据隐私。另一方面,由于在存储、传输和共享过程中缺乏隐私保护机制,联邦学习具有数据泄露的缺点,从而给数据所有者和供应商带来重大风险。区块链技术已经成为在联邦学习中提供安全数据共享平台的一种有前途的技术,特别是在工业物联网(IIoT)环境中。本调查旨在比较基于区块链的联邦学习架构中采用的各种数据隐私机制的性能和安全性。我们对区块链技术提供的联邦学习安全数据共享平台的现有文献进行了系统回顾,深入概述了基于区块链的联邦学习及其基本组成部分,并讨论了其原理和潜在应用。本调查论文的主要贡献是确定关键的研究问题,并为基于区块链的联邦学习的未来研究提出潜在的方向。
{"title":"A Survey on Blockchain-Based Federated Learning and Data Privacy","authors":"Bipin Chhetri, Saroj Gopali, Rukayat Olapojoye, Samin Dehbashi, A. Namin","doi":"10.1109/COMPSAC57700.2023.00199","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00199","url":null,"abstract":"Federated learning is a decentralized machine learning paradigm that allows multiple clients to collaborate by leveraging local computational power and the model’s transmission. This method reduces the costs and privacy concerns associated with centralized machine learning methods while ensuring data privacy by distributing training data across heterogeneous devices. On the other hand, federated learning has the drawback of data leakage due to the lack of privacy-preserving mechanisms employed during storage, transfer, and sharing, thus posing significant risks to data owners and suppliers. Blockchain technology has emerged as a promising technology for offering secure data-sharing platforms in federated learning, especially in Industrial Internet of Things (IIoT) settings. This survey aims to compare the performance and security of various data privacy mechanisms adopted in blockchain-based federated learning architectures. We conduct a systematic review of existing literature on secure data-sharing platforms for federated learning provided by blockchain technology, providing an in-depth overview of blockchain-based federated learning, its essential components, and discussing its principles, and potential applications. The primary contribution of this survey paper is to identify critical research questions and propose potential directions for future research in blockchain-based federated learning.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Program Balancing in Compilation for Buffered Hybrid Dataflow Processors 缓冲混合数据流处理器编译中的程序平衡
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00018
Anoop Bhagyanath, K. Schneider
In traditional von Neumann processors, the central register file is an inherent limiting factor in exploiting the instruction-level parallelism (ILP) of programs. To alleviate this problem, many processors follow a hybrid von Neumann/dataflow computing model in which specific instruction sequences are executed in dataflow order by communicating intermediate values directly from producer processing units (PUs) to consumer PUs without using a central register file. However, the intermediate values often reside in local registers of the PUs, which requires a synchronization of the data transports that still limits the exploitation of the ILP.To avoid the use of a central register file and the need for any synchronization between PUs, some newer architectures suggest first-in-first-out (FIFO) buffers instead of local registers at the input and output ports of the PUs. Since values are produced and consumed, and are thus never overwritten (as in registers), the compiler must determine the required number of copies of each value. Furthermore, it is necessary to control the number of copies of values to develop buffer size aware compilation methods. However, the number of variable uses in a sequential program may depend on the future execution. This paper presents transformations for ‘balancing’ a given program, i.e., transforming the program so that for all points in the program, the number of future uses of all variables can be accurately determined in order to allocate the required buffer sizes in the later compilation phases. The classical space-time trade-off is demonstrated by the experimental results which show an improvement of the processor performance with increasing buffer sizes and vice versa. More importantly, the experimental results demonstrate the potential of buffered hybrid dataflow architectures for a scalable use of ILP.
在传统的冯·诺依曼处理器中,中央寄存器文件是限制程序实现指令级并行性(ILP)的固有因素。为了缓解这个问题,许多处理器遵循冯·诺伊曼/数据流混合计算模型,在该模型中,特定指令序列按照数据流顺序执行,通过直接从生产者处理单元(pu)传递中间值到消费者处理器,而不使用中央寄存器文件。然而,中间值通常驻留在pu的本地寄存器中,这需要数据传输的同步,这仍然限制了ILP的利用。为了避免使用中央寄存器文件和需要在pu之间进行任何同步,一些较新的体系结构建议在pu的输入和输出端口使用先进先出(FIFO)缓冲区而不是本地寄存器。由于值是产生和消耗的,因此永远不会被覆盖(如在寄存器中),编译器必须确定每个值所需的副本数量。此外,有必要控制值的副本数量,以开发缓冲区大小感知的编译方法。然而,顺序程序中变量的使用数量可能取决于以后的执行。本文介绍了“平衡”给定程序的转换,即转换程序,以便对于程序中的所有点,所有变量的未来使用次数可以准确地确定,以便在稍后的编译阶段分配所需的缓冲区大小。实验结果证明了经典的时空权衡,表明处理器性能随着缓冲区大小的增加而提高,反之亦然。更重要的是,实验结果证明了缓冲混合数据流架构在可扩展使用ILP方面的潜力。
{"title":"Program Balancing in Compilation for Buffered Hybrid Dataflow Processors","authors":"Anoop Bhagyanath, K. Schneider","doi":"10.1109/COMPSAC57700.2023.00018","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00018","url":null,"abstract":"In traditional von Neumann processors, the central register file is an inherent limiting factor in exploiting the instruction-level parallelism (ILP) of programs. To alleviate this problem, many processors follow a hybrid von Neumann/dataflow computing model in which specific instruction sequences are executed in dataflow order by communicating intermediate values directly from producer processing units (PUs) to consumer PUs without using a central register file. However, the intermediate values often reside in local registers of the PUs, which requires a synchronization of the data transports that still limits the exploitation of the ILP.To avoid the use of a central register file and the need for any synchronization between PUs, some newer architectures suggest first-in-first-out (FIFO) buffers instead of local registers at the input and output ports of the PUs. Since values are produced and consumed, and are thus never overwritten (as in registers), the compiler must determine the required number of copies of each value. Furthermore, it is necessary to control the number of copies of values to develop buffer size aware compilation methods. However, the number of variable uses in a sequential program may depend on the future execution. This paper presents transformations for ‘balancing’ a given program, i.e., transforming the program so that for all points in the program, the number of future uses of all variables can be accurately determined in order to allocate the required buffer sizes in the later compilation phases. The classical space-time trade-off is demonstrated by the experimental results which show an improvement of the processor performance with increasing buffer sizes and vice versa. More importantly, the experimental results demonstrate the potential of buffered hybrid dataflow architectures for a scalable use of ILP.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126970702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Behavioral Health Cases from Sensitive Police Officer Narratives 从敏感警官叙述中发现行为健康案例
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00213
Martin Brown, Md Abdullah Khan, Dominic Thomas, Yong Pei, M. Nandan
Early detection of and intervention in behavioral health cases, including mental health, is crucial to prevent harm to one’s self and others. Police reports generated by officers on duty or in response to 911 calls remain an untapped resource for identifying such incidents. To expedite the detection process, we propose a workflow that involves collaboration between experts to manually annotate cases and correct model predictions. This approach can improve both initial annotation and model performance. Therefore, we advocate for the incorporation of manual annotations from experts, natural language processing (NLP), active learning, and advanced machine learning techniques to detect behavioral health cases within police reports. The experimentation suggests that a CNN-LSTM model achieves the best performance with an accuracy of 86.67% and an F1-score of 0.82 in detecting behavioral health issues.
早期发现和干预行为健康案例,包括心理健康,对于防止伤害自己和他人至关重要。执勤人员或911报警电话生成的警察报告仍然是识别此类事件的未开发资源。为了加快检测过程,我们提出了一个工作流程,该工作流程涉及专家之间的协作,以手动注释案例并纠正模型预测。这种方法可以提高初始注释和模型性能。因此,我们提倡结合专家的手动注释、自然语言处理(NLP)、主动学习和先进的机器学习技术来检测警察报告中的行为健康案例。实验表明,CNN-LSTM模型对行为健康问题的检测准确率为86.67%,f1得分为0.82。
{"title":"Detection of Behavioral Health Cases from Sensitive Police Officer Narratives","authors":"Martin Brown, Md Abdullah Khan, Dominic Thomas, Yong Pei, M. Nandan","doi":"10.1109/COMPSAC57700.2023.00213","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00213","url":null,"abstract":"Early detection of and intervention in behavioral health cases, including mental health, is crucial to prevent harm to one’s self and others. Police reports generated by officers on duty or in response to 911 calls remain an untapped resource for identifying such incidents. To expedite the detection process, we propose a workflow that involves collaboration between experts to manually annotate cases and correct model predictions. This approach can improve both initial annotation and model performance. Therefore, we advocate for the incorporation of manual annotations from experts, natural language processing (NLP), active learning, and advanced machine learning techniques to detect behavioral health cases within police reports. The experimentation suggests that a CNN-LSTM model achieves the best performance with an accuracy of 86.67% and an F1-score of 0.82 in detecting behavioral health issues.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122376623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Agent Reinforcement Learning in Dynamic Industrial Context 动态工业环境下的多智能体强化学习
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00066
Hongyi Zhang, Jingya Li, Z. Qi, Anders Aronsson, Jan Bosch, H. H. Olsson
Deep reinforcement learning has advanced signifi-cantly in recent years, and it is now used in embedded systems in addition to simulators and games. Reinforcement Learning (RL) algorithms are currently being used to enhance device operation so that they can learn on their own and offer clients better services. It has recently been studied in a variety of industrial applications. However, reinforcement learning, especially when controlling a large number of agents in an industrial environment, has been demonstrated to be unstable and unable to adapt to realistic situations when used in a real-world setting. To address this problem, the goal of this study is to enable multiple reinforcement learning agents to independently learn control policies on their own in dynamic industrial contexts. In order to solve the problem, we propose a dynamic multi-agent reinforcement learning (dynamic multi-RL) method along with adaptive exploration (AE) and vector-based action selection (VAS) techniques for accelerating model convergence and adapting to a complex industrial environment. The proposed algorithm is tested for validation in emergency situations within the telecommunications industry. In such circumstances, three unmanned aerial vehicles (UAV-BSs) are used to provide temporary coverage to mission-critical (MC) customers in disaster zones when the original serving base station (BS) is destroyed by natural disasters. The algorithm directs the participating agents automatically to enhance service quality. Our findings demonstrate that the proposed dynamic multi-RL algorithm can proficiently manage the learning of multiple agents and adjust to dynamic industrial environments. Additionally, it enhances learning speed and improves the quality of service.
近年来,深度强化学习取得了显著进展,除了模拟器和游戏之外,它现在还用于嵌入式系统。强化学习(RL)算法目前被用于增强设备操作,使其能够自主学习并为客户提供更好的服务。它最近在各种工业应用中得到了研究。然而,强化学习,特别是在工业环境中控制大量智能体时,已被证明是不稳定的,并且在现实环境中使用时无法适应现实情况。为了解决这个问题,本研究的目标是使多个强化学习代理能够在动态工业环境中独立学习自己的控制策略。为了解决这个问题,我们提出了一种动态多智能体强化学习(dynamic multi-RL)方法,以及自适应探索(AE)和基于向量的动作选择(VAS)技术,以加速模型收敛并适应复杂的工业环境。该算法在电信行业的紧急情况下进行了验证测试。在这种情况下,当原始服务基站(BS)被自然灾害摧毁时,使用三架无人机(UAV-BSs)为灾区的关键任务(MC)客户提供临时覆盖。该算法自动引导参与的座席提高服务质量。我们的研究结果表明,所提出的动态多强化学习算法可以熟练地管理多个智能体的学习,并适应动态的工业环境。此外,它提高了学习速度,提高了服务质量。
{"title":"Multi-Agent Reinforcement Learning in Dynamic Industrial Context","authors":"Hongyi Zhang, Jingya Li, Z. Qi, Anders Aronsson, Jan Bosch, H. H. Olsson","doi":"10.1109/COMPSAC57700.2023.00066","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00066","url":null,"abstract":"Deep reinforcement learning has advanced signifi-cantly in recent years, and it is now used in embedded systems in addition to simulators and games. Reinforcement Learning (RL) algorithms are currently being used to enhance device operation so that they can learn on their own and offer clients better services. It has recently been studied in a variety of industrial applications. However, reinforcement learning, especially when controlling a large number of agents in an industrial environment, has been demonstrated to be unstable and unable to adapt to realistic situations when used in a real-world setting. To address this problem, the goal of this study is to enable multiple reinforcement learning agents to independently learn control policies on their own in dynamic industrial contexts. In order to solve the problem, we propose a dynamic multi-agent reinforcement learning (dynamic multi-RL) method along with adaptive exploration (AE) and vector-based action selection (VAS) techniques for accelerating model convergence and adapting to a complex industrial environment. The proposed algorithm is tested for validation in emergency situations within the telecommunications industry. In such circumstances, three unmanned aerial vehicles (UAV-BSs) are used to provide temporary coverage to mission-critical (MC) customers in disaster zones when the original serving base station (BS) is destroyed by natural disasters. The algorithm directs the participating agents automatically to enhance service quality. Our findings demonstrate that the proposed dynamic multi-RL algorithm can proficiently manage the learning of multiple agents and adjust to dynamic industrial environments. Additionally, it enhances learning speed and improves the quality of service.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CMTN: A Convolutional Multi-Level Transformer to Identify Suicidal Behaviors Using Clinical Notes CMTN:一个使用临床记录识别自杀行为的卷积多层次变压器
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00234
Manohar Murikipudi, ABM.Adnan Azmee, Md Abdullah Al Hafiz Khan, Yong Pei
Suicide has become a significant cause of concern worldwide over recent years. The early identification and providing treatment of individuals having suicidal tendencies are necessary for preventing suicides. Past suicidal behavior information of an individual is recorded in the electronic health records (EHR) reports which can help to understand a patient’s current mental health condition. In this paper, to identify the people who are ideating and are anticipating attempting suicide, we propose a novel model named CMTN, which utilizes the textual EHR data for the prediction of suicidal behaviors. The proposed framework employs convolutional and transformer layers to capture local and global relationships in the text and the attention mechanism to assess the significance of various input text components. Overall, the suggested model has achieved the highest precision for the SA class with a score of 0.97 and the highest recall and f1-score of 0.56 and 0.52, respectively, for the SI class, compared with all other state-of-the-art and baseline models. We have also employed different embeddings such as BERT, BioBERT, and PubMedBERT to our state-of-the-art model and illustrated the model’s improved performance. In addition, we have also shared the data alignment and annotation extraction algorithms in this paper, allowing other researchers to generate the dataset, thereby expediting development in the prevention of suicides.
近年来,自杀已成为全世界关注的一个重要问题。对有自杀倾向的个体进行早期识别和治疗是预防自杀的必要措施。个人过去的自杀行为信息记录在电子健康记录(EHR)报告中,有助于了解患者当前的心理健康状况。本文提出了一种基于文本电子病历数据的自杀行为预测模型CMTN,用于识别有自杀倾向和预期自杀倾向的人群。该框架采用卷积层和转换层来捕获文本中的局部和全局关系,并采用注意机制来评估各种输入文本组件的重要性。总的来说,与所有其他最先进的和基线模型相比,建议的模型在SA类中达到了最高的精度,得分为0.97,在SI类中达到了最高的召回率和f1得分,分别为0.56和0.52。我们还将不同的嵌入,如BERT、BioBERT和PubMedBERT应用到我们最先进的模型中,并说明了模型的改进性能。此外,我们还在本文中分享了数据对齐和注释提取算法,允许其他研究人员生成数据集,从而加快预防自杀的发展。
{"title":"CMTN: A Convolutional Multi-Level Transformer to Identify Suicidal Behaviors Using Clinical Notes","authors":"Manohar Murikipudi, ABM.Adnan Azmee, Md Abdullah Al Hafiz Khan, Yong Pei","doi":"10.1109/COMPSAC57700.2023.00234","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00234","url":null,"abstract":"Suicide has become a significant cause of concern worldwide over recent years. The early identification and providing treatment of individuals having suicidal tendencies are necessary for preventing suicides. Past suicidal behavior information of an individual is recorded in the electronic health records (EHR) reports which can help to understand a patient’s current mental health condition. In this paper, to identify the people who are ideating and are anticipating attempting suicide, we propose a novel model named CMTN, which utilizes the textual EHR data for the prediction of suicidal behaviors. The proposed framework employs convolutional and transformer layers to capture local and global relationships in the text and the attention mechanism to assess the significance of various input text components. Overall, the suggested model has achieved the highest precision for the SA class with a score of 0.97 and the highest recall and f1-score of 0.56 and 0.52, respectively, for the SI class, compared with all other state-of-the-art and baseline models. We have also employed different embeddings such as BERT, BioBERT, and PubMedBERT to our state-of-the-art model and illustrated the model’s improved performance. In addition, we have also shared the data alignment and annotation extraction algorithms in this paper, allowing other researchers to generate the dataset, thereby expediting development in the prevention of suicides.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121503010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Positive Perception of Self-Medication Practice and Cyberchondria Behavior Among Adults in Bangladesh 孟加拉国成年人对自我药物治疗实践和网络疑病症行为的积极认知
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00214
A. Hossain, Md. Aminul Islam, A. Chowdhury, S. Rahman, Alounoud Salman, J. Dias, M. Subu, Mohammad Yousef Alkhawaldeh, Amina Al-Marzouqi, Heba H Hijazi, Mohamad Qasim Alshabi, Nabeel Al-Yateem
Cyberchondria is a distinct behavioral syndrome that is closely related to health anxiety/hypochondria and excessive online searching for health information and/or digital self-tracking. Despite the reported prevalence of self-medication, cyberchondria research is still in its infancy in Bangladesh. We investigated the relationship between Cyberchondria and self-medication among adults. This was a cross-sectional study conducted with 480 individuals who had internet access and who can read both Bangla and English. The Cyberchondria Severity Scale and the self-medication perception Questionnaire were applied to the participants. Univariate and hierarchical multiple linear regression analyses were used to analyze the data. Of the study group 283 (59%) were male, and 197 (41%), were female. Their ages ranged from 18 to 40 years, with an average of 25.1 (± 5.97) years. The positive perception of self-medication was prevalent in 279 (58.1%) adults. Cyberchondria and perception of self-medication were positively related and in the final model self-medication, age and residence were found to be the significant determinants of cyberchondria. Positive perception of self-medication practice may be a potential risk factor for Cyberchondria. People's health-related actions can be influenced by their cyberchondria behavior, so it's crucial that online health resources are safe. Cyberchondria is a mental health disorder, and this study's findings could inform future research into the causes of this condition.
网络疑病症是一种独特的行为综合征,与健康焦虑/疑病症以及过度在线搜索健康信息和/或数字自我跟踪密切相关。尽管有报道称自我用药很普遍,但在孟加拉国,网络疑病症的研究仍处于起步阶段。我们调查了成人网络疑病症与自我药物治疗之间的关系。这是一项横断面研究,对480名能上网,能读孟加拉语和英语的人进行了调查。采用网络疑病严重程度量表和自我用药感知问卷进行调查。采用单变量和层次多元线性回归分析对数据进行分析。在研究组中,283人(59%)为男性,197人(41%)为女性。年龄18 ~ 40岁,平均25.1(±5.97)岁。279名(58.1%)成年人普遍认为自我药疗是积极的。在最后的模型中,自我药疗、年龄和居住地被发现是影响自我药疗的重要因素。积极的自我药疗实践可能是网络疑病症的潜在危险因素。人们与健康相关的行为可能会受到他们的网络疑病症行为的影响,因此确保在线健康资源的安全至关重要。网络疑病症是一种精神疾病,这项研究的发现可以为未来对这种疾病原因的研究提供信息。
{"title":"Positive Perception of Self-Medication Practice and Cyberchondria Behavior Among Adults in Bangladesh","authors":"A. Hossain, Md. Aminul Islam, A. Chowdhury, S. Rahman, Alounoud Salman, J. Dias, M. Subu, Mohammad Yousef Alkhawaldeh, Amina Al-Marzouqi, Heba H Hijazi, Mohamad Qasim Alshabi, Nabeel Al-Yateem","doi":"10.1109/COMPSAC57700.2023.00214","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00214","url":null,"abstract":"Cyberchondria is a distinct behavioral syndrome that is closely related to health anxiety/hypochondria and excessive online searching for health information and/or digital self-tracking. Despite the reported prevalence of self-medication, cyberchondria research is still in its infancy in Bangladesh. We investigated the relationship between Cyberchondria and self-medication among adults. This was a cross-sectional study conducted with 480 individuals who had internet access and who can read both Bangla and English. The Cyberchondria Severity Scale and the self-medication perception Questionnaire were applied to the participants. Univariate and hierarchical multiple linear regression analyses were used to analyze the data. Of the study group 283 (59%) were male, and 197 (41%), were female. Their ages ranged from 18 to 40 years, with an average of 25.1 (± 5.97) years. The positive perception of self-medication was prevalent in 279 (58.1%) adults. Cyberchondria and perception of self-medication were positively related and in the final model self-medication, age and residence were found to be the significant determinants of cyberchondria. Positive perception of self-medication practice may be a potential risk factor for Cyberchondria. People's health-related actions can be influenced by their cyberchondria behavior, so it's crucial that online health resources are safe. Cyberchondria is a mental health disorder, and this study's findings could inform future research into the causes of this condition.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Risk and Attacks in AI: A Survey of Security and Privacy 人工智能中的安全风险和攻击:安全和隐私调查
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00284
Md Mostafizur Rahman, Aiasha Siddika Arshi, Md. Golam Moula Mehedi Hasan, Sumayia Farzana Mishu, H. Shahriar, Fan Wu
This survey paper provides an overview of the current state of AI attacks and risks for AI security and privacy as artificial intelligence becomes more prevalent in various applications and services. The risks associated with AI attacks and security breaches are becoming increasingly apparent and cause many financial and social losses. This paper will categorize the different types of attacks on AI models, including adversarial attacks, model inversion attacks, poisoning attacks, data poisoning attacks, data extraction attacks, and membership inference attacks. The paper also emphasizes the importance of developing secure and robust AI models to ensure the privacy and security of sensitive data. Through a systematic literature review, this survey paper comprehensively analyzes the current state of AI attacks and risks for AI security and privacy and detection techniques.
随着人工智能在各种应用和服务中变得越来越普遍,本调查报告概述了人工智能攻击的现状以及人工智能安全和隐私的风险。与人工智能攻击和安全漏洞相关的风险正变得越来越明显,并造成许多经济和社会损失。本文将对针对AI模型的不同类型的攻击进行分类,包括对抗性攻击、模型反转攻击、中毒攻击、数据中毒攻击、数据提取攻击和成员推理攻击。本文还强调了开发安全可靠的人工智能模型以确保敏感数据的隐私和安全的重要性。本调查论文通过系统的文献综述,全面分析了人工智能攻击的现状以及人工智能安全和隐私以及检测技术的风险。
{"title":"Security Risk and Attacks in AI: A Survey of Security and Privacy","authors":"Md Mostafizur Rahman, Aiasha Siddika Arshi, Md. Golam Moula Mehedi Hasan, Sumayia Farzana Mishu, H. Shahriar, Fan Wu","doi":"10.1109/COMPSAC57700.2023.00284","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00284","url":null,"abstract":"This survey paper provides an overview of the current state of AI attacks and risks for AI security and privacy as artificial intelligence becomes more prevalent in various applications and services. The risks associated with AI attacks and security breaches are becoming increasingly apparent and cause many financial and social losses. This paper will categorize the different types of attacks on AI models, including adversarial attacks, model inversion attacks, poisoning attacks, data poisoning attacks, data extraction attacks, and membership inference attacks. The paper also emphasizes the importance of developing secure and robust AI models to ensure the privacy and security of sensitive data. Through a systematic literature review, this survey paper comprehensively analyzes the current state of AI attacks and risks for AI security and privacy and detection techniques.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resilient Portfolio Optimization using Traditional and Data-Driven Models for Cryptocurrencies and Stocks 使用传统和数据驱动模型对加密货币和股票进行弹性投资组合优化
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00204
Joylal Das, Sulalitha Bowala, R. Thulasiram, A. Thavaneswaran
Constructing resilient portfolios is of crucial and utmost importance to investment management. This study compares traditional and data-driven models for building resilient portfolios and analyzes their performance for stocks (S&P 500) and highly volatile cryptocurrency markets. The study investigates the performance of traditional models, such as mean-variance and constrained optimization, and a recently proposed data-driven resilient portfolio optimization model for stocks. Moreover, the study analyzes these methods with evolving S&P CME bitcoin futures index and the Crypto20 index. These analyses highlight the need for further investigation into traditional and data-driven approaches for resilient portfolio optimization, including higher-order moments, particularly under varying market conditions. This study provides valuable insights for investors and portfolio managers aiming to build resilient portfolios that could be used in different market environments.
构建弹性投资组合对投资管理至关重要。本研究比较了构建弹性投资组合的传统模型和数据驱动模型,并分析了它们在股票(标准普尔500指数)和高度波动的加密货币市场中的表现。本研究考察了均值方差和约束优化等传统模型的性能,以及最近提出的数据驱动的股票弹性投资组合优化模型。此外,该研究还用标准普尔CME比特币期货指数和Crypto20指数来分析这些方法。这些分析表明,需要进一步研究传统的和数据驱动的弹性投资组合优化方法,包括高阶矩,特别是在不同的市场条件下。本研究为投资者和投资组合经理提供了宝贵的见解,旨在建立可在不同市场环境中使用的弹性投资组合。
{"title":"Resilient Portfolio Optimization using Traditional and Data-Driven Models for Cryptocurrencies and Stocks","authors":"Joylal Das, Sulalitha Bowala, R. Thulasiram, A. Thavaneswaran","doi":"10.1109/COMPSAC57700.2023.00204","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00204","url":null,"abstract":"Constructing resilient portfolios is of crucial and utmost importance to investment management. This study compares traditional and data-driven models for building resilient portfolios and analyzes their performance for stocks (S&P 500) and highly volatile cryptocurrency markets. The study investigates the performance of traditional models, such as mean-variance and constrained optimization, and a recently proposed data-driven resilient portfolio optimization model for stocks. Moreover, the study analyzes these methods with evolving S&P CME bitcoin futures index and the Crypto20 index. These analyses highlight the need for further investigation into traditional and data-driven approaches for resilient portfolio optimization, including higher-order moments, particularly under varying market conditions. This study provides valuable insights for investors and portfolio managers aiming to build resilient portfolios that could be used in different market environments.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantically Enabled Content Convergence System for Large Scale RDF Big Data 面向大规模RDF大数据的语义支持内容融合系统
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00155
Yongju Lee, Hongzhou Duan, Yuxian Sun
The growing number of large scale RDF Big Data raises a challenging data management problem; how should RDF Big Data be stored, queried and integrated. We propose a novel semantic-based content convergence system which consists of acquisition, RDF storage, ontology learning and mashup subsystems. This system serves as a basis for implementing other more sophisticated applications required in the area of Linked Big Data.
随着大规模RDF大数据数量的不断增长,数据管理问题日益严峻。RDF大数据应该如何存储、查询和集成。提出了一种新的基于语义的内容融合系统,该系统由获取子系统、RDF存储子系统、本体学习子系统和mashup子系统组成。该系统可作为实现关联大数据领域所需的其他更复杂应用程序的基础。
{"title":"Semantically Enabled Content Convergence System for Large Scale RDF Big Data","authors":"Yongju Lee, Hongzhou Duan, Yuxian Sun","doi":"10.1109/COMPSAC57700.2023.00155","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00155","url":null,"abstract":"The growing number of large scale RDF Big Data raises a challenging data management problem; how should RDF Big Data be stored, queried and integrated. We propose a novel semantic-based content convergence system which consists of acquisition, RDF storage, ontology learning and mashup subsystems. This system serves as a basis for implementing other more sophisticated applications required in the area of Linked Big Data.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133231441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1