首页 > 最新文献

Proceedings of the 2023 ACM Southeast Conference最新文献

英文 中文
Visual Analytics in Software Maintenance: A Systematic Literature Review 软件维护中的可视化分析:系统的文献综述
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587022
Kaihua Liu, S. Reddivari
The research on visual analytics for software maintenance has noticeabily advanced in the past few years. For many software projects, software maintenance needs an effective and efficient path from data to decision. Visual analytics (VA) creates such a path that enables the user to extract insights by interacting with the relevant information. This paper focuses on VA in software maintenance and has the following goals: investigate the VA adoption and suggest important implications for practice, and identify current research trends, open problems, and areas for improvement. To achieve these goals we conducted a systematic literature review with three research questions and assessed 51 studies published in the past two decades. The results indicate that there is a lack of collaboration between academic researchers and industry practitioners. This impedes the credibility of the proposed tools and methods due to lack of confidence in industry adoption. Furthermore, in this study we identified the need to expand VA support to other programming languages and software maintenance tasks.
在过去的几年中,可视化分析在软件维护方面的研究取得了显著的进展。对于许多软件项目来说,软件维护需要一条从数据到决策的有效路径。可视化分析(VA)创建了这样一条路径,使用户能够通过与相关信息交互来提取见解。本文关注软件维护中的价值评估,并有以下目标:调查价值评估的采用,并为实践提出重要的建议,并确定当前的研究趋势、开放的问题和需要改进的领域。为了达到这些目标,我们通过三个研究问题进行了系统的文献综述,并评估了过去二十年发表的51项研究。结果表明,学术界研究人员与行业从业者之间缺乏合作。由于缺乏对行业采用的信心,这阻碍了所提议的工具和方法的可信度。此外,在本研究中,我们确定了将VA支持扩展到其他编程语言和软件维护任务的需要。
{"title":"Visual Analytics in Software Maintenance: A Systematic Literature Review","authors":"Kaihua Liu, S. Reddivari","doi":"10.1145/3564746.3587022","DOIUrl":"https://doi.org/10.1145/3564746.3587022","url":null,"abstract":"The research on visual analytics for software maintenance has noticeabily advanced in the past few years. For many software projects, software maintenance needs an effective and efficient path from data to decision. Visual analytics (VA) creates such a path that enables the user to extract insights by interacting with the relevant information. This paper focuses on VA in software maintenance and has the following goals: investigate the VA adoption and suggest important implications for practice, and identify current research trends, open problems, and areas for improvement. To achieve these goals we conducted a systematic literature review with three research questions and assessed 51 studies published in the past two decades. The results indicate that there is a lack of collaboration between academic researchers and industry practitioners. This impedes the credibility of the proposed tools and methods due to lack of confidence in industry adoption. Furthermore, in this study we identified the need to expand VA support to other programming languages and software maintenance tasks.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122186694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberattack Repository: A Web Application for the Selection and Composition of Cyberattack Models 网络攻击存储库:网络攻击模型选择和组合的Web应用
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587012
Katia P. Maxwell, Levi Seibert
In the area of research and the process of being innovative, researchers know that sometimes the tools that are needed are something other than what can be attained off the shelf. During research conducted in the selection and composition of cyberattack models, a prototype application was built to assist in searching for cyberattack information against specific systems. This process of selection is only one step towards learning more about cyberattacks and how organizations can defend against them. An initial prototype web application was developed, and this project has expanded the functionality of that web application to not only allow the selection of cyberattack models but also to compose them. The composition is based on two approaches, sequential or parallel. The application has also been expanded to automate the process of assembling models. A description of the design specifications of the application and additional development plans are shown.
在研究领域和创新过程中,研究人员知道,有时需要的工具不是现成的东西。在网络攻击模型的选择和组成研究过程中,构建了一个原型应用程序,以帮助搜索针对特定系统的网络攻击信息。这一选择过程只是进一步了解网络攻击以及组织如何防御网络攻击的一步。开发了一个初始原型web应用程序,该项目扩展了该web应用程序的功能,不仅允许选择网络攻击模型,还允许组合它们。构图是基于两种方法,顺序或平行。该应用程序还被扩展为自动组装模型的过程。对应用程序的设计规范和其他开发计划进行了描述。
{"title":"Cyberattack Repository: A Web Application for the Selection and Composition of Cyberattack Models","authors":"Katia P. Maxwell, Levi Seibert","doi":"10.1145/3564746.3587012","DOIUrl":"https://doi.org/10.1145/3564746.3587012","url":null,"abstract":"In the area of research and the process of being innovative, researchers know that sometimes the tools that are needed are something other than what can be attained off the shelf. During research conducted in the selection and composition of cyberattack models, a prototype application was built to assist in searching for cyberattack information against specific systems. This process of selection is only one step towards learning more about cyberattacks and how organizations can defend against them. An initial prototype web application was developed, and this project has expanded the functionality of that web application to not only allow the selection of cyberattack models but also to compose them. The composition is based on two approaches, sequential or parallel. The application has also been expanded to automate the process of assembling models. A description of the design specifications of the application and additional development plans are shown.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131200744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Success with S-STEM: The Appalachian High Achievers in STEM S-STEM的成功:阿巴拉契亚人在STEM方面的高成就者
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587017
R. Tashakkori, Cindy Norris, Jennifer R. McGee
Since 1999, the National Science Foundation has supported a program that provides scholarships to low income students who pursue degrees in computer science, engineering, or mathematics. Originally, this program was called "Computer Science, Engineering, and Mathematics Scholarships" (CSEMS). In 2004, the program was renamed "Scholarships for Science, Technology, Engineering, and Mathematics" (S-STEM) and modified to include students from physical and life sciences. Appalachian State University (App State) has been the recipient of five CSEMS/S-STEM awards since 2001. Nearly all of the students in these programs experienced high levels of financial need and the majority were first generation college students. Our CSEMS and S-STEM programs have consistently maintained high rates of retention, significantly higher than national retention rates for these majors. Our current S-STEM program incorporates students from chemistry, geology, and physics and astronomy in addition to computer science and mathematics. We have also been able to maintain high rates of retention, over 88 percent, for this more diverse group of majors. We attribute this success to addressing financial, academic, and social barriers to success in STEM. This paper discusses the components of our current S-STEM program, The Appalachian High Achievers in STEM.
自1999年以来,美国国家科学基金会一直支持一个项目,为攻读计算机科学、工程或数学学位的低收入学生提供奖学金。最初,这个项目被称为“计算机科学、工程和数学奖学金”(cems)。2004年,该项目更名为“科学、技术、工程和数学奖学金”(S-STEM),并修改为包括物理和生命科学专业的学生。阿巴拉契亚州立大学(App State)自2001年以来已获得五项cems /S-STEM奖项。在这些项目中,几乎所有的学生都经历了高水平的经济需求,其中大多数是第一代大学生。我们的cems和S-STEM项目一直保持着很高的保留率,远远高于这些专业的全国保留率。除了计算机科学和数学之外,我们目前的S-STEM项目还包括化学、地质学、物理学和天文学的学生。我们也能够保持较高的保留率,超过88%,对于这个更加多样化的专业群体。我们将这一成功归因于解决STEM成功的财务、学术和社会障碍。本文讨论了我们目前的S-STEM项目的组成部分,即“阿巴拉契亚高成就者”。
{"title":"Success with S-STEM: The Appalachian High Achievers in STEM","authors":"R. Tashakkori, Cindy Norris, Jennifer R. McGee","doi":"10.1145/3564746.3587017","DOIUrl":"https://doi.org/10.1145/3564746.3587017","url":null,"abstract":"Since 1999, the National Science Foundation has supported a program that provides scholarships to low income students who pursue degrees in computer science, engineering, or mathematics. Originally, this program was called \"Computer Science, Engineering, and Mathematics Scholarships\" (CSEMS). In 2004, the program was renamed \"Scholarships for Science, Technology, Engineering, and Mathematics\" (S-STEM) and modified to include students from physical and life sciences. Appalachian State University (App State) has been the recipient of five CSEMS/S-STEM awards since 2001. Nearly all of the students in these programs experienced high levels of financial need and the majority were first generation college students. Our CSEMS and S-STEM programs have consistently maintained high rates of retention, significantly higher than national retention rates for these majors. Our current S-STEM program incorporates students from chemistry, geology, and physics and astronomy in addition to computer science and mathematics. We have also been able to maintain high rates of retention, over 88 percent, for this more diverse group of majors. We attribute this success to addressing financial, academic, and social barriers to success in STEM. This paper discusses the components of our current S-STEM program, The Appalachian High Achievers in STEM.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128866938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a GUI Application: GPU-Accelerated Malicious Domain Detection 开发GUI应用程序:gpu加速恶意域检测
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587105
Trevor Rice, Dae Wook Kim, Mengkun Yang
Our study uses the power of a graphics processing unit (GPU) to run malicious domain detection algorithms quickly and efficiently. We have developed a graphical user interface-based system that allows users to upload datasets (malicious domains) into a local database and then run tests with a list of domains to identify whether they are malicious. We have collected real malicious domain data from malicious domain websites and tested the five most widely used string-matching algorithms (Naïve, Levenshtein distance, Hamming distance, KMP and Rabin Karp), which allow users to compare the speeds of different string algorithms with varying time complexities against the number of domains both on the GPU (or the CPU) and our sample. On a CPU, this task becomes slower as our dataset grows. On a GPU, however, these algorithms can be run on any dataset size within the limit of the GPU's capacity with consistent performance.
我们的研究使用图形处理单元(GPU)的功能来快速有效地运行恶意域检测算法。我们开发了一个基于图形用户界面的系统,允许用户将数据集(恶意域)上传到本地数据库,然后使用域列表运行测试,以确定它们是否恶意。我们从恶意域名网站收集了真实的恶意域名数据,并测试了五种最广泛使用的字符串匹配算法(Naïve, Levenshtein距离,Hamming距离,KMP和Rabin Karp),这允许用户比较不同时间复杂度的不同字符串算法的速度,以及GPU(或CPU)和我们的样本上的域名数量。在CPU上,随着数据集的增长,这个任务会变慢。然而,在GPU上,这些算法可以在GPU容量限制的任何数据集大小上运行,并且性能一致。
{"title":"Developing a GUI Application: GPU-Accelerated Malicious Domain Detection","authors":"Trevor Rice, Dae Wook Kim, Mengkun Yang","doi":"10.1145/3564746.3587105","DOIUrl":"https://doi.org/10.1145/3564746.3587105","url":null,"abstract":"Our study uses the power of a graphics processing unit (GPU) to run malicious domain detection algorithms quickly and efficiently. We have developed a graphical user interface-based system that allows users to upload datasets (malicious domains) into a local database and then run tests with a list of domains to identify whether they are malicious. We have collected real malicious domain data from malicious domain websites and tested the five most widely used string-matching algorithms (Naïve, Levenshtein distance, Hamming distance, KMP and Rabin Karp), which allow users to compare the speeds of different string algorithms with varying time complexities against the number of domains both on the GPU (or the CPU) and our sample. On a CPU, this task becomes slower as our dataset grows. On a GPU, however, these algorithms can be run on any dataset size within the limit of the GPU's capacity with consistent performance.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124091443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobility-based Optimal Relay Node Selection for IoT-oriented SDWSN 面向物联网的SDWSN基于移动性的中继节点优化选择
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587026
Poornima M R, Vimala H S, J Shreyas
Mobile IoT is a collection of wireless moving nodes that function together to form a momentary network without centralized management or regular support services. Node moving at high mobility speed results in link failure and periodic topological variations in the network, often forcing nodes to restart the route discovery process. Existing multi-path routing that considers optimized hop count is the primary focus of the routing algorithm. Any connection interruption leads to packet loss, which increases delay and energy costs for retransmission. To mitigate these issues, we propose a mobility-based dynamic energy-efficient routing (DEER) through the link stability for mobile IoT nodes in software-defined wireless sensor networks (SDWSNs). The proposed DEER uses fuzzy logic to determine the link strength between nodes using an expected transmission count and path loss ratio. Then by assessing the residual energy of each node, the DEER system chooses relay nodes and decides on multipath routing while preserving link stability, reliability, and extended network lifetime.
移动物联网是无线移动节点的集合,这些节点共同作用,形成一个瞬间网络,没有集中管理或定期支持服务。节点的高迁移速度会导致链路故障和网络中的周期性拓扑变化,通常会迫使节点重新开始路由发现过程。考虑最优跳数的现有多路径路由是路由算法的主要关注点。任何连接中断都会导致丢包,从而增加延迟和重传的能量成本。为了缓解这些问题,我们通过软件定义无线传感器网络(sdwsn)中移动物联网节点的链路稳定性,提出了一种基于移动性的动态节能路由(DEER)。提出的DEER使用模糊逻辑来确定节点之间的链路强度,使用预期的传输计数和路径损失率。然后,通过评估每个节点的剩余能量,选择中继节点并确定多径路由,同时保持链路的稳定性、可靠性和延长网络生存期。
{"title":"Mobility-based Optimal Relay Node Selection for IoT-oriented SDWSN","authors":"Poornima M R, Vimala H S, J Shreyas","doi":"10.1145/3564746.3587026","DOIUrl":"https://doi.org/10.1145/3564746.3587026","url":null,"abstract":"Mobile IoT is a collection of wireless moving nodes that function together to form a momentary network without centralized management or regular support services. Node moving at high mobility speed results in link failure and periodic topological variations in the network, often forcing nodes to restart the route discovery process. Existing multi-path routing that considers optimized hop count is the primary focus of the routing algorithm. Any connection interruption leads to packet loss, which increases delay and energy costs for retransmission. To mitigate these issues, we propose a mobility-based dynamic energy-efficient routing (DEER) through the link stability for mobile IoT nodes in software-defined wireless sensor networks (SDWSNs). The proposed DEER uses fuzzy logic to determine the link strength between nodes using an expected transmission count and path loss ratio. Then by assessing the residual energy of each node, the DEER system chooses relay nodes and decides on multipath routing while preserving link stability, reliability, and extended network lifetime.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115474008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Node Classification Uncertainty in Graph Neural Networks 探索图神经网络中节点分类的不确定性
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587019
Md. Farhadul Islam, Sarah Zabeen, Fardin Bin Rahman, Md. Azharul Islam, Fahmid Bin Kibria, Meem Arafat Manab, Dewan Ziaul Karim, Annajiat Alim Rasel
In order to represent and investigate interconnected data, Graph Neural Networks (GNN) offer a robust framework that deftly combines Graph theory with Machine learning. Most of the studies focus on performance but uncertainty measurement does not get enough attention. In this study, we measure the predictive uncertainty of several GNN models, to show how high performance does not ensure reliable performance. We use dropouts during the inference phase to quantify the uncertainty of these transformer models. This method, often known as Monte Carlo Dropout (MCD), is an effective low-complexity approximation for calculating uncertainty. Benchmark dataset was used with five GNN models: Graph Convolutional Network (GCN), Graph Attention Network (GAT), Personalized Propagation of Neural Predictions (PPNP), PPNP's fast approximation (APPNP) and GraphSAGE in our investigation. GAT proved to be superior to all the other models in terms of accuracy and uncertainty both in node classification. Among the other models, some that fared better in accuracy fell behind when compared using classification uncertainty.
为了表示和研究相互关联的数据,图神经网络(GNN)提供了一个强大的框架,巧妙地将图论与机器学习相结合。大多数研究关注的是绩效,而不确定度的测量没有得到足够的重视。在本研究中,我们测量了几个GNN模型的预测不确定性,以显示高性能如何不能确保可靠的性能。我们在推理阶段使用dropout来量化这些变压器模型的不确定性。这种方法通常被称为蒙特卡罗Dropout (MCD),是一种计算不确定性的有效的低复杂度近似方法。在我们的研究中,基准数据集使用了5种GNN模型:图卷积网络(GCN)、图注意力网络(GAT)、个性化神经预测传播(PPNP)、PPNP的快速逼近(APPNP)和GraphSAGE。结果表明,GAT在节点分类精度和不确定性方面均优于其他模型。在其他模型中,与使用分类不确定性相比,一些在准确性方面表现较好的模型落后了。
{"title":"Exploring Node Classification Uncertainty in Graph Neural Networks","authors":"Md. Farhadul Islam, Sarah Zabeen, Fardin Bin Rahman, Md. Azharul Islam, Fahmid Bin Kibria, Meem Arafat Manab, Dewan Ziaul Karim, Annajiat Alim Rasel","doi":"10.1145/3564746.3587019","DOIUrl":"https://doi.org/10.1145/3564746.3587019","url":null,"abstract":"In order to represent and investigate interconnected data, Graph Neural Networks (GNN) offer a robust framework that deftly combines Graph theory with Machine learning. Most of the studies focus on performance but uncertainty measurement does not get enough attention. In this study, we measure the predictive uncertainty of several GNN models, to show how high performance does not ensure reliable performance. We use dropouts during the inference phase to quantify the uncertainty of these transformer models. This method, often known as Monte Carlo Dropout (MCD), is an effective low-complexity approximation for calculating uncertainty. Benchmark dataset was used with five GNN models: Graph Convolutional Network (GCN), Graph Attention Network (GAT), Personalized Propagation of Neural Predictions (PPNP), PPNP's fast approximation (APPNP) and GraphSAGE in our investigation. GAT proved to be superior to all the other models in terms of accuracy and uncertainty both in node classification. Among the other models, some that fared better in accuracy fell behind when compared using classification uncertainty.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"13 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128987784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Performance Evaluation Between Virtual/Native Nodes Running on ARM-based SBCs Using KVM as Hypervisor 基于arm的sbc虚拟/本机节点网络性能评估(KVM为Hypervisor
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587015
Eric Gamess
Single-Board Computers (SBCs) are increasingly being used due to their small form factor, reduced energy consumption, versatility, affordability, and increasing computational power. Therefore, they are now used in projects where they were not initially contemplated, such as running a Virtual Machine Manager (VMM). In this work, two ARM-based SBCs were selected (Raspberry Pi 4 Model B and ODROID-N2+) and an empirical evaluation was carried out to evaluate the network performance between two nodes running in the same SBC, or in different SBCs directly connected through WiFi or Ethernet. Although several hypervisors are suitable for these SBCs, Kernel-based Virtual Machine (KVM) was chosen since it seems to be the most active project that is developed for the ARM-based architecture. The metrics reported in this study include the TCP latency, UDP latency, TCP throughput, and HTTP latency. In general, the network performance of the ODROID-N2+ exceeded the Raspberry Pi 4 Model B. However, the latter has an indisputable advantage over the former with a much larger and more active community, making the development and deployment of applications much faster and straightforward. Hence, selecting the suitable SBCs should be done cautiously, considering the required software and additional hardware that the project is planning to connect to the SBCs.
单板计算机(sbc)由于其小尺寸、低能耗、多功能性、可负担性和不断提高的计算能力而越来越多地被使用。因此,它们现在被用于最初没有考虑到的项目中,例如运行虚拟机管理器(VMM)。本文选择了两个基于arm的SBC (Raspberry Pi 4 Model B和ODROID-N2+),对运行在同一SBC中的两个节点,以及通过WiFi或以太网直接连接的不同SBC中的两个节点之间的网络性能进行了实证评估。尽管有几个管理程序适合这些sbc,但我们选择了基于内核的虚拟机(KVM),因为它似乎是为基于arm的架构开发的最活跃的项目。本研究报告的指标包括TCP延迟、UDP延迟、TCP吞吐量和HTTP延迟。总的来说,ODROID-N2+的网络性能超过了Raspberry Pi 4 Model b。然而,后者比前者具有无可争辩的优势,因为它拥有更大、更活跃的社区,使得应用程序的开发和部署更快、更直接。因此,应该谨慎选择合适的sbc,考虑项目计划连接到sbc所需的软件和其他硬件。
{"title":"Network Performance Evaluation Between Virtual/Native Nodes Running on ARM-based SBCs Using KVM as Hypervisor","authors":"Eric Gamess","doi":"10.1145/3564746.3587015","DOIUrl":"https://doi.org/10.1145/3564746.3587015","url":null,"abstract":"Single-Board Computers (SBCs) are increasingly being used due to their small form factor, reduced energy consumption, versatility, affordability, and increasing computational power. Therefore, they are now used in projects where they were not initially contemplated, such as running a Virtual Machine Manager (VMM). In this work, two ARM-based SBCs were selected (Raspberry Pi 4 Model B and ODROID-N2+) and an empirical evaluation was carried out to evaluate the network performance between two nodes running in the same SBC, or in different SBCs directly connected through WiFi or Ethernet. Although several hypervisors are suitable for these SBCs, Kernel-based Virtual Machine (KVM) was chosen since it seems to be the most active project that is developed for the ARM-based architecture. The metrics reported in this study include the TCP latency, UDP latency, TCP throughput, and HTTP latency. In general, the network performance of the ODROID-N2+ exceeded the Raspberry Pi 4 Model B. However, the latter has an indisputable advantage over the former with a much larger and more active community, making the development and deployment of applications much faster and straightforward. Hence, selecting the suitable SBCs should be done cautiously, considering the required software and additional hardware that the project is planning to connect to the SBCs.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121892734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding College Level Student Learning of Basic Programming at an Open Access Institution 了解大学水平的学生在开放存取机构学习基本程式设计
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587007
Cindy Robertson, Anca Doloc-Mihu
In this study, we present our findings with regard to teaching basic programming concepts at an Open Access Institution. The goal was to gather insight into how to best introduce programming to our students. We found that our students should start with block coding, as a means to slowly and easily introduce coding concepts. Then they are ready for text-based programming skills. This flow allows them to understand and be able to apply basic computing concepts and enjoy the process of learning. Also, introducing block coding should be done via a fun game or activity to entice them to want to learn programming.
在这项研究中,我们提出了关于在开放获取机构中教授基本编程概念的研究结果。我们的目标是收集关于如何最好地向学生介绍编程的见解。我们发现我们的学生应该从分组编码开始,作为一种缓慢而轻松地介绍编码概念的方法。然后他们就可以学习基于文本的编程技能了。这个流程使他们能够理解并能够应用基本的计算概念,并享受学习的过程。此外,应该通过有趣的游戏或活动来介绍块编码,以吸引他们想要学习编程。
{"title":"Understanding College Level Student Learning of Basic Programming at an Open Access Institution","authors":"Cindy Robertson, Anca Doloc-Mihu","doi":"10.1145/3564746.3587007","DOIUrl":"https://doi.org/10.1145/3564746.3587007","url":null,"abstract":"In this study, we present our findings with regard to teaching basic programming concepts at an Open Access Institution. The goal was to gather insight into how to best introduce programming to our students. We found that our students should start with block coding, as a means to slowly and easily introduce coding concepts. Then they are ready for text-based programming skills. This flow allows them to understand and be able to apply basic computing concepts and enjoy the process of learning. Also, introducing block coding should be done via a fun game or activity to entice them to want to learn programming.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantum Computing Arithmetic-logic Unit 量子计算算术逻辑单元
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587005
Bryson Phillip, Ethan Butler, Ben Ulrich, David Carroll
We show that a quantum version of a classical arithmetic-logic unit (ALU) can be implemented on a quantum circuit. It would perform the same functions as a classical ALU, with the possibility of adding quantum functions in conjunction. To create the quantum ALU, we utilized IBM's Python package Qiskit and JupyterLab. We believe that a quantum ALU has the potential to be faster than its classical counterpart and the ability to calculate quantum specific operations. The simple classical functions translated to a quantum circuit show a promising future for the development of a full quantum ALU with unique quantum operations.
我们证明了经典算术逻辑单元(ALU)的量子版本可以在量子电路上实现。它将执行与经典ALU相同的功能,并可能添加量子函数。为了创建量子ALU,我们使用了IBM的Python包Qiskit和JupyterLab。我们相信,量子ALU有潜力比经典ALU更快,并有能力计算量子特定操作。将简单的经典函数转化为量子电路,为开发具有独特量子操作的全量子ALU提供了广阔的前景。
{"title":"A Quantum Computing Arithmetic-logic Unit","authors":"Bryson Phillip, Ethan Butler, Ben Ulrich, David Carroll","doi":"10.1145/3564746.3587005","DOIUrl":"https://doi.org/10.1145/3564746.3587005","url":null,"abstract":"We show that a quantum version of a classical arithmetic-logic unit (ALU) can be implemented on a quantum circuit. It would perform the same functions as a classical ALU, with the possibility of adding quantum functions in conjunction. To create the quantum ALU, we utilized IBM's Python package Qiskit and JupyterLab. We believe that a quantum ALU has the potential to be faster than its classical counterpart and the ability to calculate quantum specific operations. The simple classical functions translated to a quantum circuit show a promising future for the development of a full quantum ALU with unique quantum operations.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Efficient License Plate and Character Detection System Based on Simplified CNN 基于简化CNN的稳健高效车牌特征检测系统
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587108
Selena He, Tu N. Nguyen, Kun Suo
Current license plate recognition systems struggle with image noise reduction and license plate feature detecting processes. This paper presents an efficient and highly accurate license plate detection and character detection program based on the YOLO neural network, which is a simplified CNN-based neural network frame for robust image processing systems. Different than most approaches, the system we proposed simply requires a prioritized analysis of the dataset in order to evaluate potential noises inside images so that program implementations could be more effective and more targeted to design and optimize with YOLO neural network. With our presented system, the accuracy of license plate detection improves from 63% which is performed by traditional image processing methods to 90.3%.
当前的车牌识别系统在图像降噪和车牌特征检测过程中遇到了困难。本文提出了一种基于YOLO神经网络的高效、高精度车牌检测和字符检测方案。YOLO神经网络是一种简化的基于cnn的神经网络框架,用于鲁棒图像处理系统。与大多数方法不同,我们提出的系统只需要对数据集进行优先级分析,以评估图像内部的潜在噪声,以便程序实现可以更有效,更有针对性地使用YOLO神经网络进行设计和优化。该系统将车牌检测的准确率从传统图像处理方法的63%提高到90.3%。
{"title":"Robust Efficient License Plate and Character Detection System Based on Simplified CNN","authors":"Selena He, Tu N. Nguyen, Kun Suo","doi":"10.1145/3564746.3587108","DOIUrl":"https://doi.org/10.1145/3564746.3587108","url":null,"abstract":"Current license plate recognition systems struggle with image noise reduction and license plate feature detecting processes. This paper presents an efficient and highly accurate license plate detection and character detection program based on the YOLO neural network, which is a simplified CNN-based neural network frame for robust image processing systems. Different than most approaches, the system we proposed simply requires a prioritized analysis of the dataset in order to evaluate potential noises inside images so that program implementations could be more effective and more targeted to design and optimize with YOLO neural network. With our presented system, the accuracy of license plate detection improves from 63% which is performed by traditional image processing methods to 90.3%.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2023 ACM Southeast Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1