Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00233
Abdullah Aljuhni, Shaji Yusuf, C. Edward Chow, Oluwatobi Akanbi, Amer Aljaedi
Operating systems use timers available in the processor to trigger timer interrupts that help the kernel manage several tasks, ranging from time management of system software to scheduling and task switching. Traditionally, operating systems program the system timer to tick at regular intervals ranging from 1 ms to 100 ms, depending on the required system response and type of load. The periodic tick timer is the simplest and most common way of managing the system’s management activities. However, advancements in microprocessors and operating system scheduler allows for a more efficient and better-performing solution by eliminating regular timer interrupts. In this research, we illustrate the implementation of Adaptive-ticks feature and analyze the performance of Adaptive-ticks scheduler in Linux kernel version 4.0.9. We also propose a new full Adaptive-ticks design to support multiple tasks in the ready queue. This new proposed design extends the current Adaptive-ticks feature to improve performance and power efficiency by getting rid of unwanted interrupts.
{"title":"Proposed Design for Effectively Expand Adaptive-ticks Feature in the Linux Kernel to Full Tickless Function","authors":"Abdullah Aljuhni, Shaji Yusuf, C. Edward Chow, Oluwatobi Akanbi, Amer Aljaedi","doi":"10.1109/CSCI51800.2020.00233","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00233","url":null,"abstract":"Operating systems use timers available in the processor to trigger timer interrupts that help the kernel manage several tasks, ranging from time management of system software to scheduling and task switching. Traditionally, operating systems program the system timer to tick at regular intervals ranging from 1 ms to 100 ms, depending on the required system response and type of load. The periodic tick timer is the simplest and most common way of managing the system’s management activities. However, advancements in microprocessors and operating system scheduler allows for a more efficient and better-performing solution by eliminating regular timer interrupts. In this research, we illustrate the implementation of Adaptive-ticks feature and analyze the performance of Adaptive-ticks scheduler in Linux kernel version 4.0.9. We also propose a new full Adaptive-ticks design to support multiple tasks in the ready queue. This new proposed design extends the current Adaptive-ticks feature to improve performance and power efficiency by getting rid of unwanted interrupts.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134577666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00263
Wangjie Xu, T. Fujimoto, Ziran Fan
This paper focuses on the problem of in-house split information systems and the resulting decline in operational efficiency. According to the result of the authors' investigation for the business environment of small and medium-sized enterprises, the simplification of information and communication among employees has become an issue to be solved in many enterprises today in order to improve operational efficiency. Based on this, in this paper, we design a composite platform that integrates information tools commonly used in companies. By covering all information-related operations with one platform, we support improvement of companies’ operational efficiency. We also show the effectiveness of the proposed platform by comparing it with existing information systems. We mainly examine the design concept of the composite platform and its construction requirements.
{"title":"Designing a composite platform for operational efficiency","authors":"Wangjie Xu, T. Fujimoto, Ziran Fan","doi":"10.1109/CSCI51800.2020.00263","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00263","url":null,"abstract":"This paper focuses on the problem of in-house split information systems and the resulting decline in operational efficiency. According to the result of the authors' investigation for the business environment of small and medium-sized enterprises, the simplification of information and communication among employees has become an issue to be solved in many enterprises today in order to improve operational efficiency. Based on this, in this paper, we design a composite platform that integrates information tools commonly used in companies. By covering all information-related operations with one platform, we support improvement of companies’ operational efficiency. We also show the effectiveness of the proposed platform by comparing it with existing information systems. We mainly examine the design concept of the composite platform and its construction requirements.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00097
Hyoung-Jin Oh, Donghoon Kim, Won-gyum Kim, Doosung Hwang
Tor (The Onion Router) ensures network anonymity by encrypting contents through multiple relay nodes. Recent studies on website fingerprinting (WF) showed that websites can be identified with high accuracy by analyzing traffic data. However, websites are changing over time by updating contents, which can significantly reduce the accuracy of WF attacks. This study analyzes the performance over time by using ensemble models with excellent WF attack performance. The experiment are conducted in two cases with the initial model. The not updated analyzes the accuracy of models made from initial data over time, whereas the updated adds data that has changed over time to update the model to analyzes the accuracy. The average accuracy of the initial ensemble models is over 90.0% and the Rotation Forest algorithm shows high performance of 93.5%. Comparing the models trained after 30 days with the initial model, the classification performance dropped in both cases; the not updated dropped by more than 30.0% and the updated dropped by about 10.0%. The experimental results suggest that WF using machine learning may require model learning on a regular basis.
Tor (The Onion Router)通过多个中继节点对内容进行加密,保证了网络的匿名性。近年来对网站指纹技术的研究表明,通过对流量数据的分析,可以较准确地识别出网站。然而,随着时间的推移,网站会不断更新内容,这大大降低了WF攻击的准确性。本研究通过使用具有优异WF攻击性能的集成模型来分析性能随时间的变化。用初始模型进行了两种情况下的实验。未更新的模型分析基于初始数据的模型随时间的准确性,而更新的模型添加随时间变化的数据来更新模型以分析准确性。初始集成模型的平均精度超过90.0%,旋转森林算法的性能达到93.5%。将30天后训练的模型与初始模型进行比较,两种情况下的分类性能都有所下降;未更新的降幅超过30.0%,更新的降幅约为10.0%。实验结果表明,使用机器学习的WF可能需要定期进行模型学习。
{"title":"Performance Analysis of Tor Website Fingerprinting over Time using Tree Ensemble Models","authors":"Hyoung-Jin Oh, Donghoon Kim, Won-gyum Kim, Doosung Hwang","doi":"10.1109/CSCI51800.2020.00097","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00097","url":null,"abstract":"Tor (The Onion Router) ensures network anonymity by encrypting contents through multiple relay nodes. Recent studies on website fingerprinting (WF) showed that websites can be identified with high accuracy by analyzing traffic data. However, websites are changing over time by updating contents, which can significantly reduce the accuracy of WF attacks. This study analyzes the performance over time by using ensemble models with excellent WF attack performance. The experiment are conducted in two cases with the initial model. The not updated analyzes the accuracy of models made from initial data over time, whereas the updated adds data that has changed over time to update the model to analyzes the accuracy. The average accuracy of the initial ensemble models is over 90.0% and the Rotation Forest algorithm shows high performance of 93.5%. Comparing the models trained after 30 days with the initial model, the classification performance dropped in both cases; the not updated dropped by more than 30.0% and the updated dropped by about 10.0%. The experimental results suggest that WF using machine learning may require model learning on a regular basis.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00036
Salahaldeen Duraibi, Wasim Alhamdani, Frederick T. Sheldon
In this paper, we explore the use of the deep learning approach for replay spoof detection in speaker verification systems. Automatic speaker verifications (ASVs) can be easily spoofed by previously recorded genuine speech. In order to counter the issues of spoofing, detecting spoofing attacks play an important role. Hence, we consider the detection of replay attack spoofing that is the most easily accomplished spoofing attack. In this light, we propose a deep neural network-based (DNN) classifier using a hybrid feature from Mel-frequency cepstral coefficient (MFCC) and constant Q cepstral coefficient (CQCC). Several experiments were conducted on the latest version of ASVspoof 2017 dataset. The results are compared with a base line system that uses the Gaussian mixture model (GMM) classifier with different features that include MFCC, CQCC, and the hybrid feature of the two. The experiment results reveal that the DNN classifier outperforms the conventional GMM classifier. It was found that the hybrid-based features are superior to single features, such as CQCC and MFCC in terms of equal error rate (ERR). In addition, like many previous researchers have found, it turned out that high-frequency regions of speech utterance convey much more discriminative information for replay attack detection.
{"title":"Replay Spoof Attack Detection using Deep Neural Networks for Classification","authors":"Salahaldeen Duraibi, Wasim Alhamdani, Frederick T. Sheldon","doi":"10.1109/CSCI51800.2020.00036","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00036","url":null,"abstract":"In this paper, we explore the use of the deep learning approach for replay spoof detection in speaker verification systems. Automatic speaker verifications (ASVs) can be easily spoofed by previously recorded genuine speech. In order to counter the issues of spoofing, detecting spoofing attacks play an important role. Hence, we consider the detection of replay attack spoofing that is the most easily accomplished spoofing attack. In this light, we propose a deep neural network-based (DNN) classifier using a hybrid feature from Mel-frequency cepstral coefficient (MFCC) and constant Q cepstral coefficient (CQCC). Several experiments were conducted on the latest version of ASVspoof 2017 dataset. The results are compared with a base line system that uses the Gaussian mixture model (GMM) classifier with different features that include MFCC, CQCC, and the hybrid feature of the two. The experiment results reveal that the DNN classifier outperforms the conventional GMM classifier. It was found that the hybrid-based features are superior to single features, such as CQCC and MFCC in terms of equal error rate (ERR). In addition, like many previous researchers have found, it turned out that high-frequency regions of speech utterance convey much more discriminative information for replay attack detection.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00135
Shinjin Kang, Sookyun Kim
In this paper, we introduce a system that can detect the space outlier utilization of residents in indoor environment at low cost. Our system facilitates autonomous data collection from mobile app logs and the Google app server and generates a high-dimensional dataset required to detect outlier behaviors. For this, we used density-based clustering algorithm with t-distributed stochastic neighbor embedding (t-SNE). Our system enables easy acquisition of large volumes of data required for outlier detection. Our methodology can assist spatial analysis for indoor environments housing residents and help reduce the cost of space utilization feedback.
{"title":"Behavior-based Outlier Detection for Indoor Environment","authors":"Shinjin Kang, Sookyun Kim","doi":"10.1109/CSCI51800.2020.00135","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00135","url":null,"abstract":"In this paper, we introduce a system that can detect the space outlier utilization of residents in indoor environment at low cost. Our system facilitates autonomous data collection from mobile app logs and the Google app server and generates a high-dimensional dataset required to detect outlier behaviors. For this, we used density-based clustering algorithm with t-distributed stochastic neighbor embedding (t-SNE). Our system enables easy acquisition of large volumes of data required for outlier detection. Our methodology can assist spatial analysis for indoor environments housing residents and help reduce the cost of space utilization feedback.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00266
Noah W. Scott, D. Hodson, Richard Dill, M. Grimaila
Serialization is the process of translating a data structure into a format that can be stored and/or transmitted, and then subsequently reconstructed at a later time to create an identical clone of the original. The use of data serialization assures data objects can be transmitted, stored, and reliably reconstructed across differing computer architectures, even with different data type sizes or endianness, with no additional effort.Serializing the data in an architecture-independent format prevents the problems of byte ordering, memory layout, or representing data structures in different programming languages. This is especially important in the context of live, virtual, and constructive (LVC) simulation environments where multiple geographically separated computers, each with many independent threads, are connected and must communicate with as little latency as possible to remain near "real-time" like in terms of responsiveness.In this paper, we demonstrate the use of Serde, a Rust-based systems programming language crate, to serialize and deserialize IEEE standard Distribute Interactive Simulation (DIS) Protocol Data Units (PDUs) to support DIS-based network interoperability. The results show that Serde is an efficient mechanism for serialization/deserialization when using the inherently safe Rust programming language.
{"title":"Using Serde to Serialize and Deserialize DIS PDUs","authors":"Noah W. Scott, D. Hodson, Richard Dill, M. Grimaila","doi":"10.1109/CSCI51800.2020.00266","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00266","url":null,"abstract":"Serialization is the process of translating a data structure into a format that can be stored and/or transmitted, and then subsequently reconstructed at a later time to create an identical clone of the original. The use of data serialization assures data objects can be transmitted, stored, and reliably reconstructed across differing computer architectures, even with different data type sizes or endianness, with no additional effort.Serializing the data in an architecture-independent format prevents the problems of byte ordering, memory layout, or representing data structures in different programming languages. This is especially important in the context of live, virtual, and constructive (LVC) simulation environments where multiple geographically separated computers, each with many independent threads, are connected and must communicate with as little latency as possible to remain near \"real-time\" like in terms of responsiveness.In this paper, we demonstrate the use of Serde, a Rust-based systems programming language crate, to serialize and deserialize IEEE standard Distribute Interactive Simulation (DIS) Protocol Data Units (PDUs) to support DIS-based network interoperability. The results show that Serde is an efficient mechanism for serialization/deserialization when using the inherently safe Rust programming language.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00242
Sakir Yucel
The boundaries on different domains are blurring as corporations and infrastructure providers are collaborating to offer end-to-end services over the networks and infrastructures of various network, service, cloud, content delivery and other infrastructure providers as well as the customer premises. To capture opportunities and shine in competitive service market, infrastructure and service providers need to excel in addressing the changing customer requirements and in the operations and management of the resources. They should welcome effective collaboration with other network and infrastructure providers in delivering quality services to customers. Effective sharing of the infrastructure resources is essential in meeting the customer demands and reducing the cost. Server placement problem for end-to-end virtual services becomes a crucial optimization challenge for providers in such collaborative environments. We formulate the collaborative virtual server placement problem and suggest density-based clustering algorithms to address this problem.
{"title":"Density-Based Server Placement for Collaborative Virtual Services","authors":"Sakir Yucel","doi":"10.1109/CSCI51800.2020.00242","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00242","url":null,"abstract":"The boundaries on different domains are blurring as corporations and infrastructure providers are collaborating to offer end-to-end services over the networks and infrastructures of various network, service, cloud, content delivery and other infrastructure providers as well as the customer premises. To capture opportunities and shine in competitive service market, infrastructure and service providers need to excel in addressing the changing customer requirements and in the operations and management of the resources. They should welcome effective collaboration with other network and infrastructure providers in delivering quality services to customers. Effective sharing of the infrastructure resources is essential in meeting the customer demands and reducing the cost. Server placement problem for end-to-end virtual services becomes a crucial optimization challenge for providers in such collaborative environments. We formulate the collaborative virtual server placement problem and suggest density-based clustering algorithms to address this problem.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00127
Kabir Nagrecha, Pratyush Muthukumar, Emmanuel Cocom, Jeanne Holm, Dawn Comer, Irene Burga, M. Pourhomayoun
The devastating impacts of air pollution have be-come more and more evident in recent years. As our measurement technologies improve, we gain better insight into the true impact of this deadly, yet often ignored, threat. The first step in reducing the damages caused by this problem is being able to analyze and predict its patterns. The problem of predicting air quality and the presence of particulate matter lies in the nature of the data needed to create an accurate system. The sheer number of factors affecting air quality mean that previously proposed approaches often utilize a great many sources of data, aiming to incorporate images, wind graphs, traffic information, and more. Yet in truth, most areas outside large metropolises lack ready access to high-quality data, preventing them from ever implementing an effective system. We propose a system utilizing a 1-D deep convolutional neural network to analyze past sensor readings and predict air pollutant concentrations up to a day in the future at a 3-hour resolution. We specifically developed this model for predicting PM2.5 values. The system receives PM2.5 sensor values and discovers temporal pattern in the data, which will be later used for prediction. By removing the dependency on complex data inputs, the system becomes accesible and easily implementable for any region. Despite this simplified approach, the results are comparable to — and often better than — any current state-of-the-art predictive systems in this domain.
{"title":"Sensor-Based Air Pollution Prediction Using Deep CNN-LSTM","authors":"Kabir Nagrecha, Pratyush Muthukumar, Emmanuel Cocom, Jeanne Holm, Dawn Comer, Irene Burga, M. Pourhomayoun","doi":"10.1109/CSCI51800.2020.00127","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00127","url":null,"abstract":"The devastating impacts of air pollution have be-come more and more evident in recent years. As our measurement technologies improve, we gain better insight into the true impact of this deadly, yet often ignored, threat. The first step in reducing the damages caused by this problem is being able to analyze and predict its patterns. The problem of predicting air quality and the presence of particulate matter lies in the nature of the data needed to create an accurate system. The sheer number of factors affecting air quality mean that previously proposed approaches often utilize a great many sources of data, aiming to incorporate images, wind graphs, traffic information, and more. Yet in truth, most areas outside large metropolises lack ready access to high-quality data, preventing them from ever implementing an effective system. We propose a system utilizing a 1-D deep convolutional neural network to analyze past sensor readings and predict air pollutant concentrations up to a day in the future at a 3-hour resolution. We specifically developed this model for predicting PM2.5 values. The system receives PM2.5 sensor values and discovers temporal pattern in the data, which will be later used for prediction. By removing the dependency on complex data inputs, the system becomes accesible and easily implementable for any region. Despite this simplified approach, the results are comparable to — and often better than — any current state-of-the-art predictive systems in this domain.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115929970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00081
Tasnim Gharaibeh, E. Doncker
As COVID-19 patients flood hospitals worldwide, physicians are trying to search for effective antiviral therapies to save lives. However, there is currently a lack of proven effective medications against COVID-19. Multiple COVID-19 vaccine trials and treatments are underway, but yet need more time and testing. Furthermore, the SARS-CoV-2 virus that causes COVID-19 replicates poorly in multiple animals, including dogs, pigs, chickens, and ducks, which limits preclinical animal studies. We built an unsupervised deep learning model (CDVec) to produce word-embeddings using word2vec from a corpus of articles selectively focusing on COVID-19 candidate drugs that appeared in the literature to identify promising target drugs that could be used in COVID-19 treatment.
{"title":"Unsupervised Learning with Word Embeddings Captures Quiescent Knowledge from COVID-19 Drugs Literature","authors":"Tasnim Gharaibeh, E. Doncker","doi":"10.1109/CSCI51800.2020.00081","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00081","url":null,"abstract":"As COVID-19 patients flood hospitals worldwide, physicians are trying to search for effective antiviral therapies to save lives. However, there is currently a lack of proven effective medications against COVID-19. Multiple COVID-19 vaccine trials and treatments are underway, but yet need more time and testing. Furthermore, the SARS-CoV-2 virus that causes COVID-19 replicates poorly in multiple animals, including dogs, pigs, chickens, and ducks, which limits preclinical animal studies. We built an unsupervised deep learning model (CDVec) to produce word-embeddings using word2vec from a corpus of articles selectively focusing on COVID-19 candidate drugs that appeared in the literature to identify promising target drugs that could be used in COVID-19 treatment.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117066475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/CSCI51800.2020.00313
W. Phillips, L. Deligiannidis
The use of digital photo albums, social media posts, and embedded videos connect people closer to their memories. We believe the next generation of visual albums will immerse individuals through modern virtual reality technologies. This paper examines new methods for enhancing photo albums and visual content; achieved in highly interactive and realistic environments where users are presented with interactable frames, 360 imagery, videos, and dynamic exhibits.
{"title":"Next Generation of Gallery Sharing in VR","authors":"W. Phillips, L. Deligiannidis","doi":"10.1109/CSCI51800.2020.00313","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00313","url":null,"abstract":"The use of digital photo albums, social media posts, and embedded videos connect people closer to their memories. We believe the next generation of visual albums will immerse individuals through modern virtual reality technologies. This paper examines new methods for enhancing photo albums and visual content; achieved in highly interactive and realistic environments where users are presented with interactable frames, 360 imagery, videos, and dynamic exhibits.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114527609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}