首页 > 最新文献

Data最新文献

英文 中文
Detecting Depression in Alzheimer and MCI Using Artificial Neural Networks (ANN) 应用人工神经网络(ANN)检测阿尔茨海默病和轻度认知损伤患者的抑郁
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460765
Bashar Mohammad Abdallah Qasaimeh, A. Abdallah, S. Ratté
Depression is very common among patients with Alzheimer's while identifying depression in patients with Alzheimer's can be difficult, since dementia can cause some of the same symptoms. The related work in deep learning and machine learning proposed classification models that assist in detecting depression. However, classifying Alzheimer patients into depressive and non-depressive is not an easy task. Therefore, the objective of this research paper is to establish a starting point to use Artificial Neural Networks (ANN) to classify Alzheimer patients into depressive and non-depressive using speech analysis. The research paper proposes an analysis of the performance rates (accuracy, recall, precision) for ANN. The analysis performs three experiments and compare the performance rates among selected audio features. Our classification model shows promising classification results: the classification accuracy is ranged between 72.5% and 77.1%. This result provides a positive indication that ANN can assist the medical communities in future research. This could be accomplished by developing the feature extraction process, choosing the appropriate data and audio features, and developing the classification methods.
抑郁症在阿尔茨海默病患者中很常见,而识别阿尔茨海默病患者的抑郁症可能很困难,因为痴呆症可能会引起一些相同的症状。深度学习和机器学习的相关工作提出了有助于检测抑郁症的分类模型。然而,将阿尔茨海默病患者分为抑郁和非抑郁并不是一件容易的事。因此,本研究的目的是建立一个起点,使用人工神经网络(ANN)通过语音分析将阿尔茨海默病患者分为抑郁和非抑郁。本文对人工神经网络的性能(正确率、召回率、准确率)进行了分析。分析了三个实验,并比较了所选音频特征的性能。我们的分类模型显示了很好的分类结果:分类准确率在72.5% ~ 77.1%之间。这一结果为人工神经网络在未来的研究中可以帮助医学界提供了积极的指示。这可以通过开发特征提取流程、选择合适的数据和音频特征以及开发分类方法来实现。
{"title":"Detecting Depression in Alzheimer and MCI Using Artificial Neural Networks (ANN)","authors":"Bashar Mohammad Abdallah Qasaimeh, A. Abdallah, S. Ratté","doi":"10.1145/3460620.3460765","DOIUrl":"https://doi.org/10.1145/3460620.3460765","url":null,"abstract":"Depression is very common among patients with Alzheimer's while identifying depression in patients with Alzheimer's can be difficult, since dementia can cause some of the same symptoms. The related work in deep learning and machine learning proposed classification models that assist in detecting depression. However, classifying Alzheimer patients into depressive and non-depressive is not an easy task. Therefore, the objective of this research paper is to establish a starting point to use Artificial Neural Networks (ANN) to classify Alzheimer patients into depressive and non-depressive using speech analysis. The research paper proposes an analysis of the performance rates (accuracy, recall, precision) for ANN. The analysis performs three experiments and compare the performance rates among selected audio features. Our classification model shows promising classification results: the classification accuracy is ranged between 72.5% and 77.1%. This result provides a positive indication that ANN can assist the medical communities in future research. This could be accomplished by developing the feature extraction process, choosing the appropriate data and audio features, and developing the classification methods.","PeriodicalId":36824,"journal":{"name":"Data","volume":"33 7 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82776216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reviews of using solar energy to cover the energy deficit after the recent war in Mosul city 在摩苏尔市最近的战争后,使用太阳能来弥补能源短缺的评论
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460766
Zozan Hussain, Z. Dallalbashi, Shaymaa Alhayali
This study provides a review of solar energy in Iraq, as Iraq is one of the oil-rich countries that are considered more intelligent in the field of alternative energy for the post-oil era, especially as it is located near the solar belt, which makes the solar radiation of high intensity and brightness a period of the year. We must replace non-renewable energy resources (traditional or fossil fuels) with renewable (sustainable) energy resources. This renewable energy (solar energy) is possible, clean, unlimited and environmentally friendly, and it can be used in many applications of lighting, water heating and heating in the winter, and this Reduces the electricity needed during winter for this application. And if we talk about Mosul, the climate of Mosul It’s marked by high summer and cold temperatures .degrees Celsius in the middle of the day, and in December, January and February, temperatures range from -1 degrees Celsius to 8 degrees Celsius. As Iraq is suffering from electricity shortages during this time, so the Iraqi government and the local government of Mosul in particular must take serious decisions and steps to confront and overcome these challenges, and develop developed strategies, and programs of specialized and expert people to meet the increases in demands on electric power. Renewable energies such as solar and wind energy which could play a significant role in Iraq’s future , especially the solar energy covered in this study.
本研究对伊拉克的太阳能进行了回顾,因为伊拉克是石油资源丰富的国家之一,在后石油时代的替代能源领域被认为是更聪明的,特别是因为它位于太阳带附近,这使得太阳辐射在一年中的一段时间内强度和亮度都很高。我们必须用可再生(可持续)能源取代不可再生能源(传统或化石燃料)。这种可再生能源(太阳能)是可能的、清洁的、无限的、环保的,它可以用于许多照明、水加热和冬季供暖的应用中,这就减少了冬季这种应用所需的电力。如果我们谈论摩苏尔,摩苏尔的气候特点是夏季高温,白天气温低至摄氏10度,而在12月、1月和2月,气温在摄氏零下1度到摄氏8度之间。由于伊拉克目前正遭受电力短缺的困扰,因此伊拉克政府,特别是摩苏尔地方政府必须采取严肃的决定和步骤来面对和克服这些挑战,并制定成熟的战略,以及由专业人员和专家组成的计划,以满足对电力需求的增长。可再生能源,如太阳能和风能,可在伊拉克的未来发挥重要作用,特别是本研究中涉及的太阳能。
{"title":"Reviews of using solar energy to cover the energy deficit after the recent war in Mosul city","authors":"Zozan Hussain, Z. Dallalbashi, Shaymaa Alhayali","doi":"10.1145/3460620.3460766","DOIUrl":"https://doi.org/10.1145/3460620.3460766","url":null,"abstract":"This study provides a review of solar energy in Iraq, as Iraq is one of the oil-rich countries that are considered more intelligent in the field of alternative energy for the post-oil era, especially as it is located near the solar belt, which makes the solar radiation of high intensity and brightness a period of the year. We must replace non-renewable energy resources (traditional or fossil fuels) with renewable (sustainable) energy resources. This renewable energy (solar energy) is possible, clean, unlimited and environmentally friendly, and it can be used in many applications of lighting, water heating and heating in the winter, and this Reduces the electricity needed during winter for this application. And if we talk about Mosul, the climate of Mosul It’s marked by high summer and cold temperatures .degrees Celsius in the middle of the day, and in December, January and February, temperatures range from -1 degrees Celsius to 8 degrees Celsius. As Iraq is suffering from electricity shortages during this time, so the Iraqi government and the local government of Mosul in particular must take serious decisions and steps to confront and overcome these challenges, and develop developed strategies, and programs of specialized and expert people to meet the increases in demands on electric power. Renewable energies such as solar and wind energy which could play a significant role in Iraq’s future , especially the solar energy covered in this study.","PeriodicalId":36824,"journal":{"name":"Data","volume":"1 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82985365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fake News Detection Using Machine Learning Methods 使用机器学习方法检测假新闻
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460753
Arun Nagaraja, Soumya K N, Anubhav Sinha, Jain Vinay RAJENDRA KUMAR, Prajwal S Nayak
The paper is about the detection of unauthenticated news using Machine-learning methods with different algorithms. There is lot of scope to check the reality of the news received from various sources like websites, blogs, e-content. To identify the fake news, there is a need of some application in real time. Many methods were proposed earlier to observe fake news such as style-based, propagation-based and user-based. Automatic fake news detection application can be generated using natural language processing, information retrieval techniques, as well as graph theory. Language modeling is used to predict the missing or next word in a sentence based on the context. It is believed that mainstream media platforms are publishing fake news to grasp the attention of readers; most likely, it is done to increase the number of visitors on that particular page so that with an increasing number of visitors the page could claim more advertisement. This paper proposes an efficient method to detect fake news with better accuracy by using the available data set to detect the news is FAKE or REAL. Various methods are used for collecting the data and the data mining techniques are applied to clean and visualize it. Data mining helps to differentiate between the qualities of data depending upon its properties. The performance of detecting news only from the body of news is not sufficient but also social engagements should be considered. The objective of the work is to provide end-users with a robust solution so that they can figure out phishy and misguiding information. This technique combines the title and the body of the news to predict fake news more efficiently. The application is concerned with finding a result that could be used to identify fake news to help users.
本文是关于使用不同算法的机器学习方法检测未经认证的新闻。有很多地方可以检查从网站、博客、电子内容等各种来源收到的新闻的真实性。为了识别假新闻,需要一些实时应用程序。之前提出了许多观察假新闻的方法,如基于风格、基于传播和基于用户。自动假新闻检测应用程序可以使用自然语言处理,信息检索技术,以及图论生成。语言建模用于根据上下文预测句子中缺失的单词或下一个单词。认为主流媒体平台发布假新闻是为了抓住读者的注意力;最有可能的是,这样做是为了增加该特定页面上的访问者数量,以便随着访问者数量的增加,该页面可以要求更多的广告。本文提出了一种有效的检测假新闻的方法,通过使用可用的数据集来检测新闻是fake还是REAL。使用各种方法收集数据,并应用数据挖掘技术对数据进行清理和可视化。数据挖掘有助于根据数据的属性区分数据的质量。仅从新闻主体中发现新闻的表现是不够的,还应考虑社会参与。这项工作的目标是为最终用户提供一个健壮的解决方案,以便他们能够找出不真实和误导性的信息。这种技术结合了新闻的标题和正文,可以更有效地预测假新闻。该应用程序关注的是找到一个可以用来识别假新闻的结果,以帮助用户。
{"title":"Fake News Detection Using Machine Learning Methods","authors":"Arun Nagaraja, Soumya K N, Anubhav Sinha, Jain Vinay RAJENDRA KUMAR, Prajwal S Nayak","doi":"10.1145/3460620.3460753","DOIUrl":"https://doi.org/10.1145/3460620.3460753","url":null,"abstract":"The paper is about the detection of unauthenticated news using Machine-learning methods with different algorithms. There is lot of scope to check the reality of the news received from various sources like websites, blogs, e-content. To identify the fake news, there is a need of some application in real time. Many methods were proposed earlier to observe fake news such as style-based, propagation-based and user-based. Automatic fake news detection application can be generated using natural language processing, information retrieval techniques, as well as graph theory. Language modeling is used to predict the missing or next word in a sentence based on the context. It is believed that mainstream media platforms are publishing fake news to grasp the attention of readers; most likely, it is done to increase the number of visitors on that particular page so that with an increasing number of visitors the page could claim more advertisement. This paper proposes an efficient method to detect fake news with better accuracy by using the available data set to detect the news is FAKE or REAL. Various methods are used for collecting the data and the data mining techniques are applied to clean and visualize it. Data mining helps to differentiate between the qualities of data depending upon its properties. The performance of detecting news only from the body of news is not sufficient but also social engagements should be considered. The objective of the work is to provide end-users with a robust solution so that they can figure out phishy and misguiding information. This technique combines the title and the body of the news to predict fake news more efficiently. The application is concerned with finding a result that could be used to identify fake news to help users.","PeriodicalId":36824,"journal":{"name":"Data","volume":"1 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82999789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design of Gaussian Similarity Measure for Network Anomaly Detection 网络异常检测中高斯相似度量的设计
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460759
Arun Nagaraja, U. Boregowda, V. Radhakrishna, R. Gunupudi
Identifying intrusion in networks is one of the important concerns in computer networks. The task of dimensionality reduction and choice of classifier plays an important role in network intrusion detection. Dimensionality reduction should make sure that the efficacy of classifier on reduced dimensionality data is atleast retained if not improved. In this paper, we suggest a similarity function which can be used to find similarity between any two network elements expressed as vectors. The similarity measure is designed to make sure that the attribute distribution is taken into account for finding similarity value.
识别网络中的入侵是计算机网络中的重要问题之一。降维和分类器的选择在网络入侵检测中起着重要的作用。降维应确保分类器在降维数据上的有效性即使没有得到提高,至少也能得到保留。在本文中,我们提出了一个相似函数,它可以用来寻找任何两个以向量表示的网络元素之间的相似性。设计相似度度量是为了确保在查找相似值时考虑属性分布。
{"title":"Design of Gaussian Similarity Measure for Network Anomaly Detection","authors":"Arun Nagaraja, U. Boregowda, V. Radhakrishna, R. Gunupudi","doi":"10.1145/3460620.3460759","DOIUrl":"https://doi.org/10.1145/3460620.3460759","url":null,"abstract":"Identifying intrusion in networks is one of the important concerns in computer networks. The task of dimensionality reduction and choice of classifier plays an important role in network intrusion detection. Dimensionality reduction should make sure that the efficacy of classifier on reduced dimensionality data is atleast retained if not improved. In this paper, we suggest a similarity function which can be used to find similarity between any two network elements expressed as vectors. The similarity measure is designed to make sure that the attribute distribution is taken into account for finding similarity value.","PeriodicalId":36824,"journal":{"name":"Data","volume":"62 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83105021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Android Applications Permissions Android应用权限分析
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460764
Amal Saif, Hamzeh Al-Kilani, Malik Qasaimeh, Abdullah Al-Refai
As Android is one of the most popular mobile open-source platforms, it is very important to ensure the security and privacy of Android apps. Android has an authorization system that allows developers to announce their applications requiring essential services, and when running such applications, users need to comply with these requirements. Users frequently download applications, giving them infinite permissions easily without thinking about the impact on their privacy. In this paper, we analyze 222 applications manually to grant these permissions to see how they are compatible with user privacy depending on many criteria.
Android作为最流行的移动开源平台之一,确保Android应用的安全性和隐私性是非常重要的。Android有一个授权系统,允许开发者宣布他们的应用程序需要基本的服务,当运行这些应用程序时,用户需要遵守这些要求。用户经常下载应用程序,给他们无限的权限,而不考虑对他们的隐私的影响。在本文中,我们手动分析222个应用程序以授予这些权限,以查看它们如何根据许多标准与用户隐私兼容。
{"title":"Analysis of Android Applications Permissions","authors":"Amal Saif, Hamzeh Al-Kilani, Malik Qasaimeh, Abdullah Al-Refai","doi":"10.1145/3460620.3460764","DOIUrl":"https://doi.org/10.1145/3460620.3460764","url":null,"abstract":"As Android is one of the most popular mobile open-source platforms, it is very important to ensure the security and privacy of Android apps. Android has an authorization system that allows developers to announce their applications requiring essential services, and when running such applications, users need to comply with these requirements. Users frequently download applications, giving them infinite permissions easily without thinking about the impact on their privacy. In this paper, we analyze 222 applications manually to grant these permissions to see how they are compatible with user privacy depending on many criteria.","PeriodicalId":36824,"journal":{"name":"Data","volume":"17 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81972080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Feature Similarity Functions for Feature Clustering and Dimensionality Reduction 用于特征聚类和降维的模糊特征相似函数
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460758
Arun Nagaraja, U. Boregowda, V. Radhakrishna
Dimensionality reduction is usually obtained by applying some of the most well unknown methods such as principal component analysis, singular value decomposition, feature selection algorithms which are based on information gain, Gini index etc. The objective behind achievement of dimensionality reduction is reducing computational complexity and at the same time aiming to attain better performance by learning algorithms which may perform supervised or unsupervised learning. In this paper, we present a feature clustering similarity function for dimensionality reduction so that the eventual reduced dataset may be used to reduce the computational complexity and also result better classifier evaluation results interms of accuracy, precision etc.
降维通常通过应用一些最不为人知的方法来实现,如主成分分析、奇异值分解、基于信息增益的特征选择算法、基尼指数等。实现降维的目的是降低计算复杂度,同时通过学习算法来获得更好的性能,这些算法可以执行监督学习或无监督学习。在本文中,我们提出了一个特征聚类相似函数用于降维,以便最终的降维数据集可以用于降低计算复杂度,并得到更好的分类器评估结果,包括准确性,精密度等。
{"title":"Fuzzy Feature Similarity Functions for Feature Clustering and Dimensionality Reduction","authors":"Arun Nagaraja, U. Boregowda, V. Radhakrishna","doi":"10.1145/3460620.3460758","DOIUrl":"https://doi.org/10.1145/3460620.3460758","url":null,"abstract":"Dimensionality reduction is usually obtained by applying some of the most well unknown methods such as principal component analysis, singular value decomposition, feature selection algorithms which are based on information gain, Gini index etc. The objective behind achievement of dimensionality reduction is reducing computational complexity and at the same time aiming to attain better performance by learning algorithms which may perform supervised or unsupervised learning. In this paper, we present a feature clustering similarity function for dimensionality reduction so that the eventual reduced dataset may be used to reduce the computational complexity and also result better classifier evaluation results interms of accuracy, precision etc.","PeriodicalId":36824,"journal":{"name":"Data","volume":"1 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82348202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Effective Algorithm for Extracting Maximal Bipartite Cliques 一种提取极大二部团的有效算法
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460735
Raghda Fawzey Hriez, Ghazi Al-Naymat, A. Awajan
The reduction of bipartite clique enumeration problem into a clique enumeration problem is a well-known approach for extracting maximal bipartite cliques. In this approach, the graph inflation is used to transform a bipartite graph to a general graph, then any maximal clique enumeration algorithm can be used. However, between every two vertices (in the same set), the traditional inflation algorithm adds a new edge. Therefore incurring high computation overhead, which is impractical and cannot be scaled up to handle large graphs. This paper proposes a new algorithm for extracting maximal bipartite cliques based on an efficient graph inflation algorithm. The proposed algorithm adds the minimal number of edges that are required to convert all maximal bipartite cliques to maximal cliques. The proposed algorithm has been evaluated, using different real world benchmark graphs, according to the correctness of the algorithm, running time (in the inflation and enumeration steps), and according to the overhead of the inflation algorithm on the size of the generated general graph. The empirical evaluation proves that the proposed algorithm is accurate, efficient, effective, and applicable to real world graphs more than the traditional algorithm.
将二部团枚举问题简化为团枚举问题是一种众所周知的提取极大二部团的方法。在这种方法中,利用图膨胀将二部图转化为一般图,然后可以使用任意极大团枚举算法。然而,在每两个顶点之间(在同一集合中),传统的膨胀算法会增加一条新边。因此,会产生很高的计算开销,这是不切实际的,也不能扩展到处理大型图形。本文提出了一种基于高效图膨胀算法的极大二部团提取新算法。该算法增加了将所有最大二部团转换为最大团所需的最小边数。使用不同的真实基准图,根据算法的正确性、运行时间(在膨胀和枚举步骤中)以及膨胀算法对生成的一般图大小的开销,对所提出的算法进行了评估。经验评价表明,与传统算法相比,该算法准确、高效、有效,更适用于现实世界的图。
{"title":"An Effective Algorithm for Extracting Maximal Bipartite Cliques","authors":"Raghda Fawzey Hriez, Ghazi Al-Naymat, A. Awajan","doi":"10.1145/3460620.3460735","DOIUrl":"https://doi.org/10.1145/3460620.3460735","url":null,"abstract":"The reduction of bipartite clique enumeration problem into a clique enumeration problem is a well-known approach for extracting maximal bipartite cliques. In this approach, the graph inflation is used to transform a bipartite graph to a general graph, then any maximal clique enumeration algorithm can be used. However, between every two vertices (in the same set), the traditional inflation algorithm adds a new edge. Therefore incurring high computation overhead, which is impractical and cannot be scaled up to handle large graphs. This paper proposes a new algorithm for extracting maximal bipartite cliques based on an efficient graph inflation algorithm. The proposed algorithm adds the minimal number of edges that are required to convert all maximal bipartite cliques to maximal cliques. The proposed algorithm has been evaluated, using different real world benchmark graphs, according to the correctness of the algorithm, running time (in the inflation and enumeration steps), and according to the overhead of the inflation algorithm on the size of the generated general graph. The empirical evaluation proves that the proposed algorithm is accurate, efficient, effective, and applicable to real world graphs more than the traditional algorithm.","PeriodicalId":36824,"journal":{"name":"Data","volume":"422 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84929347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SECA: A Feedback Rules Model in a Ubiquitous Microlearning Context SECA:泛在微学习环境中的反馈规则模型
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460745
M. S. Tabares, Paola Vallejo-Correa, Alex Montoya, Jose D. Sanchez, Daniel Correa
Understanding learner behavior is the key to the success of any learning process. The more we know about learners, the more likely we are to personalize learning experiences and provide successful feedback. This paper presents a feedback rules model called SECA: (i) Scenario, that defines the context behavior in a microlearning environment, (ii) Event, provided by a predictive model, (iii) Condition, that evaluates the events, and (iv) Action, that provides the learner’s feedback. The proposal is achieved through a controlled experiment in which a microlearning environment is available to collect data from a ubiquitous context, and predictive analytics are applied to guide the definition of a set of feedback rules intended to support the learner’s learning process. In the end, we presented an exemplified set of feedback rules, which could be used to provide automatic recommendations and improve the learner experience. Thus, the experiment allows us to analyze the learner behavior in a ubiquitous microlearning context from a feedback perspective.
理解学习者的行为是任何学习过程成功的关键。我们对学习者了解得越多,我们就越有可能个性化学习体验并提供成功的反馈。本文提出了一个名为SECA的反馈规则模型:(i)场景,它定义了微学习环境中的上下文行为;(ii)事件,由预测模型提供;(iii)条件,评估事件;(iv)行动,提供学习者的反馈。该建议是通过一个控制实验来实现的,在这个实验中,微学习环境可以从无处不在的环境中收集数据,并应用预测分析来指导一组旨在支持学习者学习过程的反馈规则的定义。最后,我们给出了一组反馈规则的示例,这些规则可用于提供自动推荐并改善学习者的体验。因此,该实验使我们能够从反馈的角度分析无处不在的微学习环境中的学习者行为。
{"title":"SECA: A Feedback Rules Model in a Ubiquitous Microlearning Context","authors":"M. S. Tabares, Paola Vallejo-Correa, Alex Montoya, Jose D. Sanchez, Daniel Correa","doi":"10.1145/3460620.3460745","DOIUrl":"https://doi.org/10.1145/3460620.3460745","url":null,"abstract":"Understanding learner behavior is the key to the success of any learning process. The more we know about learners, the more likely we are to personalize learning experiences and provide successful feedback. This paper presents a feedback rules model called SECA: (i) Scenario, that defines the context behavior in a microlearning environment, (ii) Event, provided by a predictive model, (iii) Condition, that evaluates the events, and (iv) Action, that provides the learner’s feedback. The proposal is achieved through a controlled experiment in which a microlearning environment is available to collect data from a ubiquitous context, and predictive analytics are applied to guide the definition of a set of feedback rules intended to support the learner’s learning process. In the end, we presented an exemplified set of feedback rules, which could be used to provide automatic recommendations and improve the learner experience. Thus, the experiment allows us to analyze the learner behavior in a ubiquitous microlearning context from a feedback perspective.","PeriodicalId":36824,"journal":{"name":"Data","volume":"31 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74916095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Text from Video with Customized Trained Anatomy 从视频中检测文本与定制训练解剖
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460623
Manasa Devi Mortha, S. Maddala, V. Raju
With the influence of diverse architectures like ImageNet, VGGNet, ResNet for detection of objects in images, we are proposing a novel architecture for detection of text in video. It is challenging to detect text candidates due to its nature of properties that varies from normal objects in terms of contours, connectionist, size, scaling to motion occlusion, color contrast, poor illumination, etc. Also, it is not possible to apply the existing architecture for the proposed anatomy with incompatibility in targets, parameters. Hence, working on video takes different path of learning and validation. The proposed architecture reads the temporal data to train the sequence of learning features. These features are fed to periodic connectionist to learn successive features to obtain the text candidate. Later, representation of the features are fed to regional proposal network to obtain the regions of interest by comparing with the ground-truth data followed by pooling the text regions with bounding box and finding the probability of their occurrence. The proposed structure evaluated on an ICDAR 2013 “Text in Video” dataset of different indoor and outdoor videos achieves high detection rates and performed better than labeled features.
在ImageNet、VGGNet、ResNet等多种图像对象检测体系结构的影响下,我们提出了一种新的视频文本检测体系结构。检测文本候选对象是具有挑战性的,因为它的属性在轮廓、连接、大小、缩放到运动遮挡、颜色对比、光照不足等方面与普通对象不同。此外,在目标、参数不兼容的情况下,不可能将现有的结构应用于所建议的解剖结构。因此,制作视频需要不同的学习和验证路径。该架构通过读取时态数据来训练学习特征序列。将这些特征反馈给周期性联结器学习连续特征,得到候选文本。然后,将特征的表示形式输入到区域建议网络中,通过与ground-truth数据的比较得到感兴趣的区域,然后将具有边界框的文本区域池化,并找到它们出现的概率。在不同室内和室外视频的ICDAR 2013“视频中的文本”数据集上对所提出的结构进行了评估,获得了较高的检测率,并且表现优于标记特征。
{"title":"Detection of Text from Video with Customized Trained Anatomy","authors":"Manasa Devi Mortha, S. Maddala, V. Raju","doi":"10.1145/3460620.3460623","DOIUrl":"https://doi.org/10.1145/3460620.3460623","url":null,"abstract":"With the influence of diverse architectures like ImageNet, VGGNet, ResNet for detection of objects in images, we are proposing a novel architecture for detection of text in video. It is challenging to detect text candidates due to its nature of properties that varies from normal objects in terms of contours, connectionist, size, scaling to motion occlusion, color contrast, poor illumination, etc. Also, it is not possible to apply the existing architecture for the proposed anatomy with incompatibility in targets, parameters. Hence, working on video takes different path of learning and validation. The proposed architecture reads the temporal data to train the sequence of learning features. These features are fed to periodic connectionist to learn successive features to obtain the text candidate. Later, representation of the features are fed to regional proposal network to obtain the regions of interest by comparing with the ground-truth data followed by pooling the text regions with bounding box and finding the probability of their occurrence. The proposed structure evaluated on an ICDAR 2013 “Text in Video” dataset of different indoor and outdoor videos achieves high detection rates and performed better than labeled features.","PeriodicalId":36824,"journal":{"name":"Data","volume":"22 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85566133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Cyber-Attack Detection: A Comparative Analysis 物联网网络攻击检测:比较分析
IF 2.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460742
Abdul Hanan K. Mohammed, Hrag-Harout Jebamikyous, Dina Nawara, R. Kashef
A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls for advanced innovation in defensive strategies and detection. Traditional approaches for detecting cyber-attacks suffer from low efficiency, especially with the high demands of increasing security threats. With the substitutional increase of computational power, machine learning and deep learning methods are considered significant solutions for defending and detecting those threats or attacks. In this paper, we performed a comparative analysis of IoT cyberattack detection methods. We utilized six different algorithms including, Random Forest, Logistic Regression, SVM, NB, KNN, and MLP. Each model is evaluated using precision, recall, F-score, and ROC.
网络攻击是使用恶意软件对计算机系统和网络进行预防性操作,以协调数据或限制进程或操作。这些类型的攻击近年来急剧增加。这种结构和复杂性的增加要求在防御策略和检测方面进行先进的创新。传统的网络攻击检测方法存在效率低下的问题,尤其是在安全威胁日益增加的情况下。随着计算能力的替代性提高,机器学习和深度学习方法被认为是防御和检测这些威胁或攻击的重要解决方案。在本文中,我们对物联网网络攻击检测方法进行了对比分析。我们使用了六种不同的算法,包括随机森林、逻辑回归、支持向量机、NB、KNN和MLP。使用精度、召回率、f值和ROC对每个模型进行评估。
{"title":"IoT Cyber-Attack Detection: A Comparative Analysis","authors":"Abdul Hanan K. Mohammed, Hrag-Harout Jebamikyous, Dina Nawara, R. Kashef","doi":"10.1145/3460620.3460742","DOIUrl":"https://doi.org/10.1145/3460620.3460742","url":null,"abstract":"A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls for advanced innovation in defensive strategies and detection. Traditional approaches for detecting cyber-attacks suffer from low efficiency, especially with the high demands of increasing security threats. With the substitutional increase of computational power, machine learning and deep learning methods are considered significant solutions for defending and detecting those threats or attacks. In this paper, we performed a comparative analysis of IoT cyberattack detection methods. We utilized six different algorithms including, Random Forest, Logistic Regression, SVM, NB, KNN, and MLP. Each model is evaluated using precision, recall, F-score, and ROC.","PeriodicalId":36824,"journal":{"name":"Data","volume":"40 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81842816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Data
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1