首页 > 最新文献

2021 26th International Computer Conference, Computer Society of Iran (CSICC)最新文献

英文 中文
User recommendation based on Hybrid filtering in Telegram messenger 基于混合过滤的Telegram messenger用户推荐
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420562
Davod Karimpour, M. Z. Chahooki, Ali Hashemi
Over the past decade, social networks and messengers have found a special place in the creation and development of businesses. User recommendation is a very important feature in social networks that has attracted the attention of many users to these environments. Using this system in an instant messenger environment is very useful. Telegram is a cloud-based messenger with more than 400 million monthly active users. Telegram is used as a social network in Iran, but does not offer the most widely used features of social networks, such as recommending users. This feature is important for marketers to find target audience. This paper presents a hybrid filtering-based algorithm to recommend Telegram users. This method combines the membership graph of users with the profile of groups. The membership graph, models users based on their membership in groups. Also, the profile of each group includes the name and description of the group. We have created a bag of words for each group based on natural language processing methods to combine it with the membership graph. After combination process, users are recommended based on the list of groups obtained. The data used in this study is the information of more than 120 million users and 900,000 supergroups in Telegram. This data is obtained through Telegram API by Idekav system. The evaluation of the proposed method has been done separately on two categories of specialized supergroups. Each category includes 25 specialized supergroups in Telegram. Selected supergroups for evaluation have between 2,000 and 10,000 members. Experimental results show the integrity of the model and error reduction in RMSE.
在过去的十年里,社交网络和信使在商业的创造和发展中占据了特殊的地位。用户推荐是社交网络中一个非常重要的特性,它吸引了许多用户对这些环境的关注。在即时通讯环境中使用该系统非常有用。Telegram是一个基于云的通讯软件,月活跃用户超过4亿。Telegram在伊朗被用作社交网络,但不提供社交网络最广泛使用的功能,比如推荐用户。这一功能对市场营销人员寻找目标受众非常重要。提出了一种基于混合过滤的Telegram用户推荐算法。该方法将用户的成员关系图与组的概要文件相结合。成员关系图根据用户在组中的成员关系对其建模。此外,每个组的配置文件包括组的名称和描述。我们基于自然语言处理方法为每个组创建了一个词包,并将其与隶属关系图结合起来。组合后,根据得到的组列表推荐用户。本研究使用的数据是Telegram中超过1.2亿用户和90万个超级组的信息。此数据由Idekav系统通过Telegram API获取。本文分别对两类特殊的超群进行了评价。每个类别在Telegram中包括25个专门的超级组。被选中进行评估的超级小组成员在2000到10000人之间。实验结果表明了模型的完整性和RMSE误差的降低。
{"title":"User recommendation based on Hybrid filtering in Telegram messenger","authors":"Davod Karimpour, M. Z. Chahooki, Ali Hashemi","doi":"10.1109/CSICC52343.2021.9420562","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420562","url":null,"abstract":"Over the past decade, social networks and messengers have found a special place in the creation and development of businesses. User recommendation is a very important feature in social networks that has attracted the attention of many users to these environments. Using this system in an instant messenger environment is very useful. Telegram is a cloud-based messenger with more than 400 million monthly active users. Telegram is used as a social network in Iran, but does not offer the most widely used features of social networks, such as recommending users. This feature is important for marketers to find target audience. This paper presents a hybrid filtering-based algorithm to recommend Telegram users. This method combines the membership graph of users with the profile of groups. The membership graph, models users based on their membership in groups. Also, the profile of each group includes the name and description of the group. We have created a bag of words for each group based on natural language processing methods to combine it with the membership graph. After combination process, users are recommended based on the list of groups obtained. The data used in this study is the information of more than 120 million users and 900,000 supergroups in Telegram. This data is obtained through Telegram API by Idekav system. The evaluation of the proposed method has been done separately on two categories of specialized supergroups. Each category includes 25 specialized supergroups in Telegram. Selected supergroups for evaluation have between 2,000 and 10,000 members. Experimental results show the integrity of the model and error reduction in RMSE.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127748794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hierarchical Method for Kannada-MNIST Classification Based on Convolutional Neural Networks 基于卷积神经网络的Kannada-MNIST分类分层方法
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420604
Ali Beikmohammadi, N. Zahabi
Handwritten digit classification considers one of the crucial subjects in machine vision due to its numerous practical usages in many recognition systems. In this regard, Kannada-MNIST was introduced as a challenging dataset. On the other hand, deep neural networks, especially convolutional neural networks, give us an encouraging promise to solve such a problem. In this paper, as a result, we propose a new hierarchically combination method with the help of two CNN models designed from scratch. The results of this novel approach on the Kannada-MNIST dataset indicate its excellent performance because the accuracy on the training, validation, and test sets are 99.86%, 99.66%, and 99.80%, respectively. Fortunately, this proposed method has been able to overcome all the state-of-the-art solutions with the best performance on this dataset.
由于手写体数字分类在许多识别系统中的大量实际应用,它被认为是机器视觉中的关键课题之一。在这方面,Kannada-MNIST作为一个具有挑战性的数据集被引入。另一方面,深度神经网络,特别是卷积神经网络,给了我们一个令人鼓舞的承诺来解决这样的问题。因此,在本文中,我们提出了一种新的分层组合方法,利用两个从头设计的CNN模型。该方法在Kannada-MNIST数据集上的结果表明,该方法在训练集、验证集和测试集上的准确率分别为99.86%、99.66%和99.80%,具有优异的性能。幸运的是,该方法已经能够克服所有最先进的解决方案,并在该数据集上获得最佳性能。
{"title":"A Hierarchical Method for Kannada-MNIST Classification Based on Convolutional Neural Networks","authors":"Ali Beikmohammadi, N. Zahabi","doi":"10.1109/CSICC52343.2021.9420604","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420604","url":null,"abstract":"Handwritten digit classification considers one of the crucial subjects in machine vision due to its numerous practical usages in many recognition systems. In this regard, Kannada-MNIST was introduced as a challenging dataset. On the other hand, deep neural networks, especially convolutional neural networks, give us an encouraging promise to solve such a problem. In this paper, as a result, we propose a new hierarchically combination method with the help of two CNN models designed from scratch. The results of this novel approach on the Kannada-MNIST dataset indicate its excellent performance because the accuracy on the training, validation, and test sets are 99.86%, 99.66%, and 99.80%, respectively. Fortunately, this proposed method has been able to overcome all the state-of-the-art solutions with the best performance on this dataset.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A practical resource management prototype for mobile networks 一个实用的移动网络资源管理原型
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420609
M. A. Nourian, A. Kusedghi, A. Akbari
Network slicing is a promising approach to meet the diverse requirements of the various use cases in the 5G networks. Hence, the mobile operators are moving forward to leveraging network slicing in order to measure up with the individual service expectations in their networks. Deploying different network slice types requires the global view of the network and the automated orchestration and management of the underlying resources. This is facilitated by utilizing software-defined networking and network function virtualization as the 5G key-enabler technologies. In this paper, we propose a practical network slicing resource management scheme which is comprised of a dynamic, priority-based resource allocation cooperating with an admission control unit. Adopting the proposed dynamic resource allocation would allow the admission control to comply with more NS requests while ensuring the desired requirements of the existing network slices. To validate the effectiveness of such a mechanism in a real environment, we take advantage of the features provided by OpenAirInterface and FlexRAN to efficiently manage multiple isolated network slices. In particular, we evaluate the significance of the network slicing, the isolation degree among created slices, and the effectiveness of the proposed scheme through several practical scenarios.
网络切片是一种很有前途的方法,可以满足5G网络中各种用例的多样化需求。因此,移动运营商正朝着利用网络切片的方向前进,以满足其网络中的个人服务期望。部署不同的网络切片类型需要网络的全局视图以及底层资源的自动编排和管理。这是通过利用软件定义网络和网络功能虚拟化作为5G关键使能技术来实现的。在本文中,我们提出了一个实用的网络切片资源管理方案,该方案由一个动态的、基于优先级的资源分配和一个许可控制单元组成。采用建议的动态资源分配将允许允许控制遵守更多的NS请求,同时确保现有网络片的期望需求。为了验证这种机制在真实环境中的有效性,我们利用OpenAirInterface和FlexRAN提供的特性来有效地管理多个孤立的网络切片。特别是,我们通过几个实际场景评估了网络切片的重要性,创建的切片之间的隔离程度以及所提出方案的有效性。
{"title":"A practical resource management prototype for mobile networks","authors":"M. A. Nourian, A. Kusedghi, A. Akbari","doi":"10.1109/CSICC52343.2021.9420609","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420609","url":null,"abstract":"Network slicing is a promising approach to meet the diverse requirements of the various use cases in the 5G networks. Hence, the mobile operators are moving forward to leveraging network slicing in order to measure up with the individual service expectations in their networks. Deploying different network slice types requires the global view of the network and the automated orchestration and management of the underlying resources. This is facilitated by utilizing software-defined networking and network function virtualization as the 5G key-enabler technologies. In this paper, we propose a practical network slicing resource management scheme which is comprised of a dynamic, priority-based resource allocation cooperating with an admission control unit. Adopting the proposed dynamic resource allocation would allow the admission control to comply with more NS requests while ensuring the desired requirements of the existing network slices. To validate the effectiveness of such a mechanism in a real environment, we take advantage of the features provided by OpenAirInterface and FlexRAN to efficiently manage multiple isolated network slices. In particular, we evaluate the significance of the network slicing, the isolation degree among created slices, and the effectiveness of the proposed scheme through several practical scenarios.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Fragile Watermarking based on Distributed Hamming Code 一种基于分布式汉明码的脆弱水印算法
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420541
Faeze Rasouli, M. Taheri
In this paper, a novel fragile watermarking scheme is proposed for both tamper detection and tampered image recovery based on Hamming code. To serve this purpose, the authentication code (check bits) is computed using Hamming code from data bits. In this work, data bits were selected from the five Most Significant Bits (5_MSB) of the pixel values and authentication code is embedded into the three Least Significant Bits (3LSBs) to preserve image quality. Hamming (7,4) has been extended, in this paper, to (8,5) and is used for embedding, error detection and correction. Each instance of coding is applied on eight pixels (one bit per pixel) located in sufficient far parts of the image. Hence, for tampers smaller than a threshold, the recovery can be done perfectly. According to the experimental results, the proposed method achieves better performance in terms of recovering the tampered areas, compared to state-of-the-art.
本文提出了一种新的基于汉明码的篡改检测和篡改图像恢复的脆弱水印方案。为了达到这个目的,使用汉明码从数据位中计算身份验证码(校验位)。在这项工作中,数据位从像素值的五个最高有效位(5_MSB)中选择,并将认证码嵌入到三个最低有效位(3lsb)中以保持图像质量。本文将Hamming(7,4)扩展为(8,5),并将其用于嵌入、错误检测和纠错。每个编码实例应用于位于图像足够远部分的八个像素(每个像素一个比特)。因此,对于小于阈值的篡改,可以完美地进行恢复。实验结果表明,与现有方法相比,该方法在恢复篡改区域方面取得了更好的效果。
{"title":"A New Fragile Watermarking based on Distributed Hamming Code","authors":"Faeze Rasouli, M. Taheri","doi":"10.1109/CSICC52343.2021.9420541","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420541","url":null,"abstract":"In this paper, a novel fragile watermarking scheme is proposed for both tamper detection and tampered image recovery based on Hamming code. To serve this purpose, the authentication code (check bits) is computed using Hamming code from data bits. In this work, data bits were selected from the five Most Significant Bits (5_MSB) of the pixel values and authentication code is embedded into the three Least Significant Bits (3LSBs) to preserve image quality. Hamming (7,4) has been extended, in this paper, to (8,5) and is used for embedding, error detection and correction. Each instance of coding is applied on eight pixels (one bit per pixel) located in sufficient far parts of the image. Hence, for tampers smaller than a threshold, the recovery can be done perfectly. According to the experimental results, the proposed method achieves better performance in terms of recovering the tampered areas, compared to state-of-the-art.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving Minimum Dominating Set in Multiplex Networks Using Learning Automata 用学习自动机求解多路网络中的最小支配集
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420625
M. D. Khomami, Alireza Rezvanian, A. Saghiri, M. Meybodi
The dominating set (DS) problem has noticed the selecting a subset of vertices that every vertex in the graph is either is adjacent to one or more nodes of this subset. The DS with the minimum cardinality is called MDS (minimum dominating set). The MDS problem has several applications in different domains, such as network monitoring, routing, epidemic control and social network. The MDS is known as the NP-Hard problem. Nevertheless, the existing research has focused on the MDS problem to single networks. However, in many real structures, there exist a complex structure involving a set of components combined up by different connections and known as multiplex networks. In this paper, we introduce a learning automaton (LA) based algorithm for find the MDS problem in multiplex networks. In the proposed algorithm, each node of the multiplex network is considered an LA with two actions of a candidate or non-candidate corresponding to the dominating set and non-dominating set. By selecting candidate DS and evaluation mechanisms, the algorithm tries to find a dominating set with the smallest cardinality and as the algorithm proceeds, a candidate solution converges to the optimal solution of the MDS of multiplex networks. With the aid of learning and the behavior of learning automata for finding solution, this algorithm which is present in this paper reduces the number of dominating set, in multiplex networks iteratively. Experimental results demonstrate that in many well-known datasets, the proposed algorithm is efficient with respect to the evaluation measure.
支配集(DS)问题关注的是选择一个顶点子集,即图中的每个顶点与该子集的一个或多个节点相邻。具有最小基数的DS称为最小支配集(MDS)。MDS问题在网络监控、路由、疫情防控、社交网络等领域有着广泛的应用。MDS被称为NP-Hard问题。然而,现有的研究主要集中在单个网络的MDS问题上。然而,在许多实际结构中,存在着一种复杂的结构,它是由一组由不同连接组合而成的组件,称为多路网络。本文介绍了一种基于学习自动机(LA)的多路网络中MDS问题的求解算法。在该算法中,复用网络的每个节点被认为是一个具有候选或非候选两个动作的LA,分别对应于支配集和非支配集。该算法通过选择候选MDS和评估机制,寻找具有最小基数的支配集,随着算法的进行,候选解收敛于多路网络MDS的最优解。本文提出的算法利用学习和学习自动机的寻解行为,迭代地减少了多路网络中的控制集数量。实验结果表明,在许多知名的数据集中,该算法在评价度量方面是有效的。
{"title":"Solving Minimum Dominating Set in Multiplex Networks Using Learning Automata","authors":"M. D. Khomami, Alireza Rezvanian, A. Saghiri, M. Meybodi","doi":"10.1109/CSICC52343.2021.9420625","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420625","url":null,"abstract":"The dominating set (DS) problem has noticed the selecting a subset of vertices that every vertex in the graph is either is adjacent to one or more nodes of this subset. The DS with the minimum cardinality is called MDS (minimum dominating set). The MDS problem has several applications in different domains, such as network monitoring, routing, epidemic control and social network. The MDS is known as the NP-Hard problem. Nevertheless, the existing research has focused on the MDS problem to single networks. However, in many real structures, there exist a complex structure involving a set of components combined up by different connections and known as multiplex networks. In this paper, we introduce a learning automaton (LA) based algorithm for find the MDS problem in multiplex networks. In the proposed algorithm, each node of the multiplex network is considered an LA with two actions of a candidate or non-candidate corresponding to the dominating set and non-dominating set. By selecting candidate DS and evaluation mechanisms, the algorithm tries to find a dominating set with the smallest cardinality and as the algorithm proceeds, a candidate solution converges to the optimal solution of the MDS of multiplex networks. With the aid of learning and the behavior of learning automata for finding solution, this algorithm which is present in this paper reduces the number of dominating set, in multiplex networks iteratively. Experimental results demonstrate that in many well-known datasets, the proposed algorithm is efficient with respect to the evaluation measure.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129052472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIN: A Programmable Platform for Swarm Robotics 群机器人的可编程平台
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420596
A. Foroutannia, Milad Shoryabi, Amirali Alizadeh Anaraki, A. Rowhanimanesh
Swarm robotics is an inspiration from nature and incorporates swarm intelligence to help collective robotics. This recent technology is usually characterized by a swarm of simple, low-cost, and small robots instead of a complicated and expensive robot. Designing optimal and reliable swarm intelligence algorithms require real-world test environments. As a practical solution, physical platforms can efficiently address this issue. In this paper, a programmable physical platform, called SIN, is introduced for swarm robotics. Different design parameters such as communication range, signaling pattern, types of sensors and actuators, cooperation rules, and degree of uncertainty and noise can be simply adjusted by user. The building blocks of each agent has been developed in a modular form to improve the hardware flexibility. To illustrate the efficiency of the proposed platform, a cooperative multi-robot target tracking problem is implemented on this platform as a case study, where the robots interact by artificial attraction-repulsion forces based on short-range and noisy optical communication. The results demonstrate how the details of swarm behaviors such as decentralized aggregation and collective target tracking can be successfully implemented on the proposed platform.
群体机器人是一种来自大自然的灵感,并结合了群体智能来帮助集体机器人。这项最新技术的特点通常是一群简单、低成本、小型的机器人,而不是复杂、昂贵的机器人。设计最优可靠的群体智能算法需要真实的测试环境。作为一种实用的解决方案,物理平台可以有效地解决这个问题。本文介绍了一种用于群体机器人的可编程物理平台SIN。不同的设计参数,如通信范围,信号模式,传感器和执行器的类型,合作规则,不确定性和噪声的程度,可以由用户简单地调整。每个代理的构建块都以模块化的形式开发,以提高硬件的灵活性。为了说明所提平台的有效性,以一个多机器人协同目标跟踪问题为例,在该平台上实现了基于近距离和噪声光通信的机器人相互作用的人工吸引-排斥力。结果表明,在该平台上可以成功地实现分散聚集和集体目标跟踪等群体行为的细节。
{"title":"SIN: A Programmable Platform for Swarm Robotics","authors":"A. Foroutannia, Milad Shoryabi, Amirali Alizadeh Anaraki, A. Rowhanimanesh","doi":"10.1109/CSICC52343.2021.9420596","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420596","url":null,"abstract":"Swarm robotics is an inspiration from nature and incorporates swarm intelligence to help collective robotics. This recent technology is usually characterized by a swarm of simple, low-cost, and small robots instead of a complicated and expensive robot. Designing optimal and reliable swarm intelligence algorithms require real-world test environments. As a practical solution, physical platforms can efficiently address this issue. In this paper, a programmable physical platform, called SIN, is introduced for swarm robotics. Different design parameters such as communication range, signaling pattern, types of sensors and actuators, cooperation rules, and degree of uncertainty and noise can be simply adjusted by user. The building blocks of each agent has been developed in a modular form to improve the hardware flexibility. To illustrate the efficiency of the proposed platform, a cooperative multi-robot target tracking problem is implemented on this platform as a case study, where the robots interact by artificial attraction-repulsion forces based on short-range and noisy optical communication. The results demonstrate how the details of swarm behaviors such as decentralized aggregation and collective target tracking can be successfully implemented on the proposed platform.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FT-LFSR: A Fault Tolerant Architecture for Linear Feedback Shift Registers 线性反馈移位寄存器的FT-LFSR容错结构
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420598
M. Zaree, Mohsen Raji
Linear Feedback Shift Registers (LFSR) are extensively used in variety of applications such as Built-In-Self-Test circuits or Pseudo Random Number Generators. Hence, fault tolerant design of LFSR is essential for the applications with high reliability demands. Traditional fault tolerant LFSRs include large number of Single-Point-of-Failures (SPoFs) in which any fault results in the whole system failure. In this paper, a new fault tolerant architecture for LFSR (named as FT-LFSR) is proposed in which the number of SPoFs are significantly reduced compared to the previous ones. To this end, a modified version of Triple Modular Redundancy (TMR) empowered with some extra controlling units for identifying the operational module is used. In addition, a novel metric called Reliability-Area-Factor (RAF) is introduced to evaluate the efficacy of the redundancy-based fault tolerant techniques (such as FT-LFSR) in terms of number of SPoFs and the area overhead. Experimental results show that, the FT-LFSR is resilient to all single transient and permanent faults except in its limited SPoFs and many patterns of multiple faults.
线性反馈移位寄存器(LFSR)广泛用于各种应用,如内置自检电路或伪随机数发生器。因此,LFSR的容错设计对于高可靠性应用至关重要。传统的容错lfsr包含大量的单点故障(spof),其中任何故障都会导致整个系统故障。本文提出了一种新的LFSR容错体系结构(称为FT-LFSR),该体系结构中spf的数量比以前显著减少。为此,使用了修改版的三模冗余(TMR),增加了一些额外的控制单元来识别操作模块。此外,引入了一种称为可靠性面积因子(Reliability-Area-Factor, RAF)的新度量,以评估基于冗余的容错技术(如FT-LFSR)在spof数量和面积开销方面的有效性。实验结果表明,FT-LFSR除了有限的单点频点和多故障模式外,对所有单一暂态和永久故障都有弹性。
{"title":"FT-LFSR: A Fault Tolerant Architecture for Linear Feedback Shift Registers","authors":"M. Zaree, Mohsen Raji","doi":"10.1109/CSICC52343.2021.9420598","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420598","url":null,"abstract":"Linear Feedback Shift Registers (LFSR) are extensively used in variety of applications such as Built-In-Self-Test circuits or Pseudo Random Number Generators. Hence, fault tolerant design of LFSR is essential for the applications with high reliability demands. Traditional fault tolerant LFSRs include large number of Single-Point-of-Failures (SPoFs) in which any fault results in the whole system failure. In this paper, a new fault tolerant architecture for LFSR (named as FT-LFSR) is proposed in which the number of SPoFs are significantly reduced compared to the previous ones. To this end, a modified version of Triple Modular Redundancy (TMR) empowered with some extra controlling units for identifying the operational module is used. In addition, a novel metric called Reliability-Area-Factor (RAF) is introduced to evaluate the efficacy of the redundancy-based fault tolerant techniques (such as FT-LFSR) in terms of number of SPoFs and the area overhead. Experimental results show that, the FT-LFSR is resilient to all single transient and permanent faults except in its limited SPoFs and many patterns of multiple faults.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"687 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying the relationship between human self-esteem and general health using data mining 使用数据挖掘识别人类自尊与一般健康之间的关系
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420612
M. Shabestari, A. Ahmadi
There exist a lot of data associated with psychology, nowadays. Using data mining science, the relation between different subjects including self-esteem, general health, depression, etc. can be detected. Self-esteem is considered a subject of great importance in psychology, since it is one of the most significant factors in favorable human growth which shows how one feels about his worthiness and self-confirmation. Depression is a psychic state which is identified by the person’s unhappiness over time. Mental health, which is a significant moderator in the process of stress, plays a vital role in mitigating stress, increasing health, and improving the quality of life in the society. In order that the level of self-esteem would be measured, special questionnaires are used. Proper and accurate analysis of the questionnaires is one of the challenges of psychology. Several efforts have been made to improve the quality of processing psychological data by using through artificial intelligence. In the present paper, the relation between self-esteem and general health has been analyzed using Coopersmith’s self-esteem questionnaire, Goldberg’s general health questionnaire, clustering algorithms, and semantic data mining techniques. The results have shown that low self-esteem has a weak relationship with three out of four general health subscales; however, there has been a strong relationship with three subscales in high self-esteem levels.
现在有很多与心理学相关的数据。利用数据挖掘科学,可以检测不同主题之间的关系,包括自尊,一般健康,抑郁等。自尊在心理学中被认为是一个非常重要的主题,因为它是人类良好成长中最重要的因素之一,它表明了一个人对自己的价值和自我确认的感觉。抑郁症是一种精神状态,它是由一个人随着时间的推移而不快乐所确定的。心理健康在压力过程中起着重要的调节作用,在缓解压力、增进健康、提高社会生活质量方面起着至关重要的作用。为了测量自尊水平,使用了特殊的问卷。正确准确地分析问卷是心理学的挑战之一。人们已经做出了一些努力,通过使用人工智能来提高处理心理数据的质量。本文采用Coopersmith自尊问卷、Goldberg一般健康问卷、聚类算法和语义数据挖掘技术,分析了自尊与一般健康的关系。结果表明,低自尊与四分之三的一般健康量表之间的关系较弱;然而,在高自尊水平中,这与三个子量表有很强的关系。
{"title":"Identifying the relationship between human self-esteem and general health using data mining","authors":"M. Shabestari, A. Ahmadi","doi":"10.1109/CSICC52343.2021.9420612","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420612","url":null,"abstract":"There exist a lot of data associated with psychology, nowadays. Using data mining science, the relation between different subjects including self-esteem, general health, depression, etc. can be detected. Self-esteem is considered a subject of great importance in psychology, since it is one of the most significant factors in favorable human growth which shows how one feels about his worthiness and self-confirmation. Depression is a psychic state which is identified by the person’s unhappiness over time. Mental health, which is a significant moderator in the process of stress, plays a vital role in mitigating stress, increasing health, and improving the quality of life in the society. In order that the level of self-esteem would be measured, special questionnaires are used. Proper and accurate analysis of the questionnaires is one of the challenges of psychology. Several efforts have been made to improve the quality of processing psychological data by using through artificial intelligence. In the present paper, the relation between self-esteem and general health has been analyzed using Coopersmith’s self-esteem questionnaire, Goldberg’s general health questionnaire, clustering algorithms, and semantic data mining techniques. The results have shown that low self-esteem has a weak relationship with three out of four general health subscales; however, there has been a strong relationship with three subscales in high self-esteem levels.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130871283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Injection Shilling Attack Tool for Recommender Systems 推荐系统的注入先令攻击工具
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420553
Fatemeh Rezaimehr, Chitra Dadkhah
Recommender systems help people in finding a particular item based on their preference from a wide range of products in online shopping rapidly. One of the most popular models of recommendation systems is the Collaborative Filtering Recommendation System (CFRS) that recommend the top-K items to active user based on peer grouping user ratings. The implementation of CFRS is easy and it can easily be attacked by fake users and affect the recommendation. Fake users create a fake profile to attack the RS and change the output of it. Different attack types with different features and attacking methods exist in which decrease the accuracy. It is important to detect fake users, remove their rating from rating matrix and recognize the items has been attacked. In the recent years, many algorithms have been proposed to detect the attackers but first, researchers have to inject the attack type into their dataset and then evaluate their proposed approach. The purpose of this article is to develop a tool to inject the different attack types to datasets. Proposed tool constructs a new dataset containing the fake users therefore researchers can use it for evaluating their proposed attack detection methods. Researchers could choose the attack type and the size of attack with a user interface of our proposed tool easily.
推荐系统帮助人们根据自己的喜好从网上购物的众多产品中快速找到特定的商品。推荐系统中最流行的模型之一是协同过滤推荐系统(CFRS),它根据同行分组用户评分向活跃用户推荐top-K项目。CFRS实现简单,容易被虚假用户攻击,影响推荐。假用户创建假配置文件来攻击RS并更改其输出。不同的攻击类型具有不同的特征和攻击方法,降低了攻击的准确性。重要的是要检测虚假用户,从评级矩阵中删除他们的评级,并识别已被攻击的项目。近年来,已经提出了许多算法来检测攻击者,但首先,研究人员必须将攻击类型注入到他们的数据集中,然后评估他们提出的方法。本文的目的是开发一种工具,将不同的攻击类型注入数据集。该工具构建了一个包含假用户的新数据集,因此研究人员可以使用它来评估他们提出的攻击检测方法。研究人员可以通过我们所提出的工具的用户界面轻松选择攻击类型和攻击规模。
{"title":"Injection Shilling Attack Tool for Recommender Systems","authors":"Fatemeh Rezaimehr, Chitra Dadkhah","doi":"10.1109/CSICC52343.2021.9420553","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420553","url":null,"abstract":"Recommender systems help people in finding a particular item based on their preference from a wide range of products in online shopping rapidly. One of the most popular models of recommendation systems is the Collaborative Filtering Recommendation System (CFRS) that recommend the top-K items to active user based on peer grouping user ratings. The implementation of CFRS is easy and it can easily be attacked by fake users and affect the recommendation. Fake users create a fake profile to attack the RS and change the output of it. Different attack types with different features and attacking methods exist in which decrease the accuracy. It is important to detect fake users, remove their rating from rating matrix and recognize the items has been attacked. In the recent years, many algorithms have been proposed to detect the attackers but first, researchers have to inject the attack type into their dataset and then evaluate their proposed approach. The purpose of this article is to develop a tool to inject the different attack types to datasets. Proposed tool constructs a new dataset containing the fake users therefore researchers can use it for evaluating their proposed attack detection methods. Researchers could choose the attack type and the size of attack with a user interface of our proposed tool easily.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"444 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Model-Based on Filtration Technique for Speckle Noise Removal from Ultrasound Images 基于模型的超声图像斑点噪声去除技术
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420572
M. Mohammadi, R. Mokhtari
This paper proposes an equation based on a nonlinear filter for speckle noise removal by introducing a region indicator. The use of Gaussian convolution in the proposed region indicator makes the quality of the edges of the image better than other models. The proposed equation also removes noise well due to having a nonlinear filter while preserving important image details such as edges. Experimental results show that the proposed model can handle speckle noise removal quite well.
本文通过引入区域指示器,提出了一种基于非线性滤波的散斑噪声去除方程。在提出的区域指示器中使用高斯卷积使得图像的边缘质量优于其他模型。由于具有非线性滤波器,所提出的方程还可以很好地去除噪声,同时保留重要的图像细节,如边缘。实验结果表明,该模型能较好地去除散斑噪声。
{"title":"A Model-Based on Filtration Technique for Speckle Noise Removal from Ultrasound Images","authors":"M. Mohammadi, R. Mokhtari","doi":"10.1109/CSICC52343.2021.9420572","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420572","url":null,"abstract":"This paper proposes an equation based on a nonlinear filter for speckle noise removal by introducing a region indicator. The use of Gaussian convolution in the proposed region indicator makes the quality of the edges of the image better than other models. The proposed equation also removes noise well due to having a nonlinear filter while preserving important image details such as edges. Experimental results show that the proposed model can handle speckle noise removal quite well.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"36 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 26th International Computer Conference, Computer Society of Iran (CSICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1