首页 > 最新文献

2021 26th International Computer Conference, Computer Society of Iran (CSICC)最新文献

英文 中文
Aspects Extraction for Aspect Level Opinion Analysis Based on Deep CNN 基于深度CNN的面向方面层次意见分析的方面提取
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420630
Ali Alemi Matin Pour, S. Jalili
Extracting aspect term is essential for aspect level sentiment analysis; Sentiment analysis collects and extracts the opinions expressed in social media and websites' comments and then analyzes them, helping users and stakeholders understand public views on the issues raised better and more quickly. Aspect-level sentiment analysis provides more detailed information, which is very beneficial for use in many various domains. In this paper, the significant contribution is to provide a data preprocessing method and a deep convolutional neural network (CNN) to label each word in opinionated sentences as an aspect or non-aspect word. The proposed method extracts the terms of the aspect that can be used in analyzing the sentiment of the expressed aspect terms in the comments and opinions. The experimental results of the proposed method performed on the SemEval-2014 dataset show that it performs better than other prominent methods such as deep CNN. The proposed data preprocessing method with the deep CNN network can improve extraction of aspect terms according to F-measure by at least 1.05% and 0.95% on restaurant and laptop domains.
方面项的提取是方面级情感分析的关键;情感分析收集和提取社交媒体和网站评论中表达的观点,然后进行分析,帮助用户和利益相关者更好、更快地了解公众对所提出问题的看法。方面级情感分析提供了更详细的信息,这对许多不同领域的使用非常有益。本文的重要贡献是提供了一种数据预处理方法和一种深度卷积神经网络(CNN),将自以为是句子中的每个词标记为方面或非方面词。该方法提取出可用于分析评论和意见中所表达的方面术语的情感的方面术语。在SemEval-2014数据集上进行的实验结果表明,该方法的性能优于其他著名的方法,如深度CNN。本文提出的基于深度CNN网络的数据预处理方法在餐厅和笔记本电脑领域根据F-measure提取方面项的效率分别提高了1.05%和0.95%。
{"title":"Aspects Extraction for Aspect Level Opinion Analysis Based on Deep CNN","authors":"Ali Alemi Matin Pour, S. Jalili","doi":"10.1109/CSICC52343.2021.9420630","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420630","url":null,"abstract":"Extracting aspect term is essential for aspect level sentiment analysis; Sentiment analysis collects and extracts the opinions expressed in social media and websites' comments and then analyzes them, helping users and stakeholders understand public views on the issues raised better and more quickly. Aspect-level sentiment analysis provides more detailed information, which is very beneficial for use in many various domains. In this paper, the significant contribution is to provide a data preprocessing method and a deep convolutional neural network (CNN) to label each word in opinionated sentences as an aspect or non-aspect word. The proposed method extracts the terms of the aspect that can be used in analyzing the sentiment of the expressed aspect terms in the comments and opinions. The experimental results of the proposed method performed on the SemEval-2014 dataset show that it performs better than other prominent methods such as deep CNN. The proposed data preprocessing method with the deep CNN network can improve extraction of aspect terms according to F-measure by at least 1.05% and 0.95% on restaurant and laptop domains.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Learning to Predict Software Testability 学习预测软件的可测试性
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420548
Morteza Zakeri Nasrabadi, S. Parsa
Software testability is the propensity of code to reveal its existing faults, particularly during automated testing. Testing success depends on the testability of the program under test. On the other hand, testing success relies on the coverage of the test data provided by a given test data generation algorithm. However, little empirical evidence has been shown to clarify whether and how software testability affects test coverage. In this article, we propose a method to shed light on this subject. Our proposed framework uses the coverage of Software Under Test (SUT), provided by different automatically generated test suites, to build machine learning models, determining the testability of programs based on many source code metrics. The resultant models can predict the code coverage provided by a given test data generation algorithm before running the algorithm, reducing the cost of additional testing. The predicted coverage is used as a concrete proxy to quantify source code testability. Experiments show an acceptable accuracy of 81.94% in measuring and predicting software testability.
软件可测试性是代码揭示其现有错误的倾向,特别是在自动化测试期间。测试的成功取决于被测程序的可测试性。另一方面,测试的成功依赖于给定测试数据生成算法所提供的测试数据的覆盖率。然而,很少有经验证据表明软件可测试性是否以及如何影响测试覆盖率。在这篇文章中,我们提出了一种方法来阐明这个问题。我们提出的框架使用由不同自动生成的测试套件提供的测试下软件(SUT)的覆盖范围来构建机器学习模型,根据许多源代码度量确定程序的可测试性。结果模型可以在运行算法之前预测由给定的测试数据生成算法提供的代码覆盖率,从而减少额外测试的成本。预测的覆盖率被用作量化源代码可测试性的具体代理。实验表明,该方法测量和预测软件可测试性的准确度为81.94%。
{"title":"Learning to Predict Software Testability","authors":"Morteza Zakeri Nasrabadi, S. Parsa","doi":"10.1109/CSICC52343.2021.9420548","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420548","url":null,"abstract":"Software testability is the propensity of code to reveal its existing faults, particularly during automated testing. Testing success depends on the testability of the program under test. On the other hand, testing success relies on the coverage of the test data provided by a given test data generation algorithm. However, little empirical evidence has been shown to clarify whether and how software testability affects test coverage. In this article, we propose a method to shed light on this subject. Our proposed framework uses the coverage of Software Under Test (SUT), provided by different automatically generated test suites, to build machine learning models, determining the testability of programs based on many source code metrics. The resultant models can predict the code coverage provided by a given test data generation algorithm before running the algorithm, reducing the cost of additional testing. The predicted coverage is used as a concrete proxy to quantify source code testability. Experiments show an acceptable accuracy of 81.94% in measuring and predicting software testability.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigation of the Place of BIAN Standard in Digital Banking Enterprise Architecture BIAN标准在数字银行企业架构中的地位探讨
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420582
Narjes Farzi
today organizations encounter many issues such as newfound technologies, new business models, and rapid changes. That is, following the evolutions in the global context, caused by information and communication technology in the field of trade, industry, and specifically information technology, organizations, companies, and particularly banks have undergone changes and altered their reaction method to the market. In this way, the role of enterprise architecture and using standards and reference models are crucial to the organizations. Accordingly, organizations which want to be active in the digital transformation and move towards digital banking should be able to implement an agile enterprise architecture and use reference models such as BIAN. The objective of this article is to investigate the role of BIAN standard in moving towards digital banking.
今天的组织遇到了许多问题,比如新发现的技术、新的业务模型和快速的变化。也就是说,随着全球范围内的演变,由信息和通信技术引起的贸易,工业,特别是信息技术领域,组织,公司,特别是银行发生了变化,改变了他们对市场的反应方法。通过这种方式,企业架构的角色以及使用标准和参考模型对组织来说是至关重要的。因此,希望积极参与数字化转型并向数字银行迈进的组织应该能够实现敏捷的企业架构,并使用像BIAN这样的参考模型。本文的目的是研究BIAN标准在迈向数字银行方面的作用。
{"title":"Investigation of the Place of BIAN Standard in Digital Banking Enterprise Architecture","authors":"Narjes Farzi","doi":"10.1109/CSICC52343.2021.9420582","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420582","url":null,"abstract":"today organizations encounter many issues such as newfound technologies, new business models, and rapid changes. That is, following the evolutions in the global context, caused by information and communication technology in the field of trade, industry, and specifically information technology, organizations, companies, and particularly banks have undergone changes and altered their reaction method to the market. In this way, the role of enterprise architecture and using standards and reference models are crucial to the organizations. Accordingly, organizations which want to be active in the digital transformation and move towards digital banking should be able to implement an agile enterprise architecture and use reference models such as BIAN. The objective of this article is to investigate the role of BIAN standard in moving towards digital banking.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Fragile Watermarking based on Distributed Hamming Code 一种基于分布式汉明码的脆弱水印算法
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420541
Faeze Rasouli, M. Taheri
In this paper, a novel fragile watermarking scheme is proposed for both tamper detection and tampered image recovery based on Hamming code. To serve this purpose, the authentication code (check bits) is computed using Hamming code from data bits. In this work, data bits were selected from the five Most Significant Bits (5_MSB) of the pixel values and authentication code is embedded into the three Least Significant Bits (3LSBs) to preserve image quality. Hamming (7,4) has been extended, in this paper, to (8,5) and is used for embedding, error detection and correction. Each instance of coding is applied on eight pixels (one bit per pixel) located in sufficient far parts of the image. Hence, for tampers smaller than a threshold, the recovery can be done perfectly. According to the experimental results, the proposed method achieves better performance in terms of recovering the tampered areas, compared to state-of-the-art.
本文提出了一种新的基于汉明码的篡改检测和篡改图像恢复的脆弱水印方案。为了达到这个目的,使用汉明码从数据位中计算身份验证码(校验位)。在这项工作中,数据位从像素值的五个最高有效位(5_MSB)中选择,并将认证码嵌入到三个最低有效位(3lsb)中以保持图像质量。本文将Hamming(7,4)扩展为(8,5),并将其用于嵌入、错误检测和纠错。每个编码实例应用于位于图像足够远部分的八个像素(每个像素一个比特)。因此,对于小于阈值的篡改,可以完美地进行恢复。实验结果表明,与现有方法相比,该方法在恢复篡改区域方面取得了更好的效果。
{"title":"A New Fragile Watermarking based on Distributed Hamming Code","authors":"Faeze Rasouli, M. Taheri","doi":"10.1109/CSICC52343.2021.9420541","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420541","url":null,"abstract":"In this paper, a novel fragile watermarking scheme is proposed for both tamper detection and tampered image recovery based on Hamming code. To serve this purpose, the authentication code (check bits) is computed using Hamming code from data bits. In this work, data bits were selected from the five Most Significant Bits (5_MSB) of the pixel values and authentication code is embedded into the three Least Significant Bits (3LSBs) to preserve image quality. Hamming (7,4) has been extended, in this paper, to (8,5) and is used for embedding, error detection and correction. Each instance of coding is applied on eight pixels (one bit per pixel) located in sufficient far parts of the image. Hence, for tampers smaller than a threshold, the recovery can be done perfectly. According to the experimental results, the proposed method achieves better performance in terms of recovering the tampered areas, compared to state-of-the-art.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving Minimum Dominating Set in Multiplex Networks Using Learning Automata 用学习自动机求解多路网络中的最小支配集
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420625
M. D. Khomami, Alireza Rezvanian, A. Saghiri, M. Meybodi
The dominating set (DS) problem has noticed the selecting a subset of vertices that every vertex in the graph is either is adjacent to one or more nodes of this subset. The DS with the minimum cardinality is called MDS (minimum dominating set). The MDS problem has several applications in different domains, such as network monitoring, routing, epidemic control and social network. The MDS is known as the NP-Hard problem. Nevertheless, the existing research has focused on the MDS problem to single networks. However, in many real structures, there exist a complex structure involving a set of components combined up by different connections and known as multiplex networks. In this paper, we introduce a learning automaton (LA) based algorithm for find the MDS problem in multiplex networks. In the proposed algorithm, each node of the multiplex network is considered an LA with two actions of a candidate or non-candidate corresponding to the dominating set and non-dominating set. By selecting candidate DS and evaluation mechanisms, the algorithm tries to find a dominating set with the smallest cardinality and as the algorithm proceeds, a candidate solution converges to the optimal solution of the MDS of multiplex networks. With the aid of learning and the behavior of learning automata for finding solution, this algorithm which is present in this paper reduces the number of dominating set, in multiplex networks iteratively. Experimental results demonstrate that in many well-known datasets, the proposed algorithm is efficient with respect to the evaluation measure.
支配集(DS)问题关注的是选择一个顶点子集,即图中的每个顶点与该子集的一个或多个节点相邻。具有最小基数的DS称为最小支配集(MDS)。MDS问题在网络监控、路由、疫情防控、社交网络等领域有着广泛的应用。MDS被称为NP-Hard问题。然而,现有的研究主要集中在单个网络的MDS问题上。然而,在许多实际结构中,存在着一种复杂的结构,它是由一组由不同连接组合而成的组件,称为多路网络。本文介绍了一种基于学习自动机(LA)的多路网络中MDS问题的求解算法。在该算法中,复用网络的每个节点被认为是一个具有候选或非候选两个动作的LA,分别对应于支配集和非支配集。该算法通过选择候选MDS和评估机制,寻找具有最小基数的支配集,随着算法的进行,候选解收敛于多路网络MDS的最优解。本文提出的算法利用学习和学习自动机的寻解行为,迭代地减少了多路网络中的控制集数量。实验结果表明,在许多知名的数据集中,该算法在评价度量方面是有效的。
{"title":"Solving Minimum Dominating Set in Multiplex Networks Using Learning Automata","authors":"M. D. Khomami, Alireza Rezvanian, A. Saghiri, M. Meybodi","doi":"10.1109/CSICC52343.2021.9420625","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420625","url":null,"abstract":"The dominating set (DS) problem has noticed the selecting a subset of vertices that every vertex in the graph is either is adjacent to one or more nodes of this subset. The DS with the minimum cardinality is called MDS (minimum dominating set). The MDS problem has several applications in different domains, such as network monitoring, routing, epidemic control and social network. The MDS is known as the NP-Hard problem. Nevertheless, the existing research has focused on the MDS problem to single networks. However, in many real structures, there exist a complex structure involving a set of components combined up by different connections and known as multiplex networks. In this paper, we introduce a learning automaton (LA) based algorithm for find the MDS problem in multiplex networks. In the proposed algorithm, each node of the multiplex network is considered an LA with two actions of a candidate or non-candidate corresponding to the dominating set and non-dominating set. By selecting candidate DS and evaluation mechanisms, the algorithm tries to find a dominating set with the smallest cardinality and as the algorithm proceeds, a candidate solution converges to the optimal solution of the MDS of multiplex networks. With the aid of learning and the behavior of learning automata for finding solution, this algorithm which is present in this paper reduces the number of dominating set, in multiplex networks iteratively. Experimental results demonstrate that in many well-known datasets, the proposed algorithm is efficient with respect to the evaluation measure.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129052472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIN: A Programmable Platform for Swarm Robotics 群机器人的可编程平台
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420596
A. Foroutannia, Milad Shoryabi, Amirali Alizadeh Anaraki, A. Rowhanimanesh
Swarm robotics is an inspiration from nature and incorporates swarm intelligence to help collective robotics. This recent technology is usually characterized by a swarm of simple, low-cost, and small robots instead of a complicated and expensive robot. Designing optimal and reliable swarm intelligence algorithms require real-world test environments. As a practical solution, physical platforms can efficiently address this issue. In this paper, a programmable physical platform, called SIN, is introduced for swarm robotics. Different design parameters such as communication range, signaling pattern, types of sensors and actuators, cooperation rules, and degree of uncertainty and noise can be simply adjusted by user. The building blocks of each agent has been developed in a modular form to improve the hardware flexibility. To illustrate the efficiency of the proposed platform, a cooperative multi-robot target tracking problem is implemented on this platform as a case study, where the robots interact by artificial attraction-repulsion forces based on short-range and noisy optical communication. The results demonstrate how the details of swarm behaviors such as decentralized aggregation and collective target tracking can be successfully implemented on the proposed platform.
群体机器人是一种来自大自然的灵感,并结合了群体智能来帮助集体机器人。这项最新技术的特点通常是一群简单、低成本、小型的机器人,而不是复杂、昂贵的机器人。设计最优可靠的群体智能算法需要真实的测试环境。作为一种实用的解决方案,物理平台可以有效地解决这个问题。本文介绍了一种用于群体机器人的可编程物理平台SIN。不同的设计参数,如通信范围,信号模式,传感器和执行器的类型,合作规则,不确定性和噪声的程度,可以由用户简单地调整。每个代理的构建块都以模块化的形式开发,以提高硬件的灵活性。为了说明所提平台的有效性,以一个多机器人协同目标跟踪问题为例,在该平台上实现了基于近距离和噪声光通信的机器人相互作用的人工吸引-排斥力。结果表明,在该平台上可以成功地实现分散聚集和集体目标跟踪等群体行为的细节。
{"title":"SIN: A Programmable Platform for Swarm Robotics","authors":"A. Foroutannia, Milad Shoryabi, Amirali Alizadeh Anaraki, A. Rowhanimanesh","doi":"10.1109/CSICC52343.2021.9420596","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420596","url":null,"abstract":"Swarm robotics is an inspiration from nature and incorporates swarm intelligence to help collective robotics. This recent technology is usually characterized by a swarm of simple, low-cost, and small robots instead of a complicated and expensive robot. Designing optimal and reliable swarm intelligence algorithms require real-world test environments. As a practical solution, physical platforms can efficiently address this issue. In this paper, a programmable physical platform, called SIN, is introduced for swarm robotics. Different design parameters such as communication range, signaling pattern, types of sensors and actuators, cooperation rules, and degree of uncertainty and noise can be simply adjusted by user. The building blocks of each agent has been developed in a modular form to improve the hardware flexibility. To illustrate the efficiency of the proposed platform, a cooperative multi-robot target tracking problem is implemented on this platform as a case study, where the robots interact by artificial attraction-repulsion forces based on short-range and noisy optical communication. The results demonstrate how the details of swarm behaviors such as decentralized aggregation and collective target tracking can be successfully implemented on the proposed platform.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FT-LFSR: A Fault Tolerant Architecture for Linear Feedback Shift Registers 线性反馈移位寄存器的FT-LFSR容错结构
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420598
M. Zaree, Mohsen Raji
Linear Feedback Shift Registers (LFSR) are extensively used in variety of applications such as Built-In-Self-Test circuits or Pseudo Random Number Generators. Hence, fault tolerant design of LFSR is essential for the applications with high reliability demands. Traditional fault tolerant LFSRs include large number of Single-Point-of-Failures (SPoFs) in which any fault results in the whole system failure. In this paper, a new fault tolerant architecture for LFSR (named as FT-LFSR) is proposed in which the number of SPoFs are significantly reduced compared to the previous ones. To this end, a modified version of Triple Modular Redundancy (TMR) empowered with some extra controlling units for identifying the operational module is used. In addition, a novel metric called Reliability-Area-Factor (RAF) is introduced to evaluate the efficacy of the redundancy-based fault tolerant techniques (such as FT-LFSR) in terms of number of SPoFs and the area overhead. Experimental results show that, the FT-LFSR is resilient to all single transient and permanent faults except in its limited SPoFs and many patterns of multiple faults.
线性反馈移位寄存器(LFSR)广泛用于各种应用,如内置自检电路或伪随机数发生器。因此,LFSR的容错设计对于高可靠性应用至关重要。传统的容错lfsr包含大量的单点故障(spof),其中任何故障都会导致整个系统故障。本文提出了一种新的LFSR容错体系结构(称为FT-LFSR),该体系结构中spf的数量比以前显著减少。为此,使用了修改版的三模冗余(TMR),增加了一些额外的控制单元来识别操作模块。此外,引入了一种称为可靠性面积因子(Reliability-Area-Factor, RAF)的新度量,以评估基于冗余的容错技术(如FT-LFSR)在spof数量和面积开销方面的有效性。实验结果表明,FT-LFSR除了有限的单点频点和多故障模式外,对所有单一暂态和永久故障都有弹性。
{"title":"FT-LFSR: A Fault Tolerant Architecture for Linear Feedback Shift Registers","authors":"M. Zaree, Mohsen Raji","doi":"10.1109/CSICC52343.2021.9420598","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420598","url":null,"abstract":"Linear Feedback Shift Registers (LFSR) are extensively used in variety of applications such as Built-In-Self-Test circuits or Pseudo Random Number Generators. Hence, fault tolerant design of LFSR is essential for the applications with high reliability demands. Traditional fault tolerant LFSRs include large number of Single-Point-of-Failures (SPoFs) in which any fault results in the whole system failure. In this paper, a new fault tolerant architecture for LFSR (named as FT-LFSR) is proposed in which the number of SPoFs are significantly reduced compared to the previous ones. To this end, a modified version of Triple Modular Redundancy (TMR) empowered with some extra controlling units for identifying the operational module is used. In addition, a novel metric called Reliability-Area-Factor (RAF) is introduced to evaluate the efficacy of the redundancy-based fault tolerant techniques (such as FT-LFSR) in terms of number of SPoFs and the area overhead. Experimental results show that, the FT-LFSR is resilient to all single transient and permanent faults except in its limited SPoFs and many patterns of multiple faults.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"687 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying the relationship between human self-esteem and general health using data mining 使用数据挖掘识别人类自尊与一般健康之间的关系
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420612
M. Shabestari, A. Ahmadi
There exist a lot of data associated with psychology, nowadays. Using data mining science, the relation between different subjects including self-esteem, general health, depression, etc. can be detected. Self-esteem is considered a subject of great importance in psychology, since it is one of the most significant factors in favorable human growth which shows how one feels about his worthiness and self-confirmation. Depression is a psychic state which is identified by the person’s unhappiness over time. Mental health, which is a significant moderator in the process of stress, plays a vital role in mitigating stress, increasing health, and improving the quality of life in the society. In order that the level of self-esteem would be measured, special questionnaires are used. Proper and accurate analysis of the questionnaires is one of the challenges of psychology. Several efforts have been made to improve the quality of processing psychological data by using through artificial intelligence. In the present paper, the relation between self-esteem and general health has been analyzed using Coopersmith’s self-esteem questionnaire, Goldberg’s general health questionnaire, clustering algorithms, and semantic data mining techniques. The results have shown that low self-esteem has a weak relationship with three out of four general health subscales; however, there has been a strong relationship with three subscales in high self-esteem levels.
现在有很多与心理学相关的数据。利用数据挖掘科学,可以检测不同主题之间的关系,包括自尊,一般健康,抑郁等。自尊在心理学中被认为是一个非常重要的主题,因为它是人类良好成长中最重要的因素之一,它表明了一个人对自己的价值和自我确认的感觉。抑郁症是一种精神状态,它是由一个人随着时间的推移而不快乐所确定的。心理健康在压力过程中起着重要的调节作用,在缓解压力、增进健康、提高社会生活质量方面起着至关重要的作用。为了测量自尊水平,使用了特殊的问卷。正确准确地分析问卷是心理学的挑战之一。人们已经做出了一些努力,通过使用人工智能来提高处理心理数据的质量。本文采用Coopersmith自尊问卷、Goldberg一般健康问卷、聚类算法和语义数据挖掘技术,分析了自尊与一般健康的关系。结果表明,低自尊与四分之三的一般健康量表之间的关系较弱;然而,在高自尊水平中,这与三个子量表有很强的关系。
{"title":"Identifying the relationship between human self-esteem and general health using data mining","authors":"M. Shabestari, A. Ahmadi","doi":"10.1109/CSICC52343.2021.9420612","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420612","url":null,"abstract":"There exist a lot of data associated with psychology, nowadays. Using data mining science, the relation between different subjects including self-esteem, general health, depression, etc. can be detected. Self-esteem is considered a subject of great importance in psychology, since it is one of the most significant factors in favorable human growth which shows how one feels about his worthiness and self-confirmation. Depression is a psychic state which is identified by the person’s unhappiness over time. Mental health, which is a significant moderator in the process of stress, plays a vital role in mitigating stress, increasing health, and improving the quality of life in the society. In order that the level of self-esteem would be measured, special questionnaires are used. Proper and accurate analysis of the questionnaires is one of the challenges of psychology. Several efforts have been made to improve the quality of processing psychological data by using through artificial intelligence. In the present paper, the relation between self-esteem and general health has been analyzed using Coopersmith’s self-esteem questionnaire, Goldberg’s general health questionnaire, clustering algorithms, and semantic data mining techniques. The results have shown that low self-esteem has a weak relationship with three out of four general health subscales; however, there has been a strong relationship with three subscales in high self-esteem levels.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130871283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Injection Shilling Attack Tool for Recommender Systems 推荐系统的注入先令攻击工具
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420553
Fatemeh Rezaimehr, Chitra Dadkhah
Recommender systems help people in finding a particular item based on their preference from a wide range of products in online shopping rapidly. One of the most popular models of recommendation systems is the Collaborative Filtering Recommendation System (CFRS) that recommend the top-K items to active user based on peer grouping user ratings. The implementation of CFRS is easy and it can easily be attacked by fake users and affect the recommendation. Fake users create a fake profile to attack the RS and change the output of it. Different attack types with different features and attacking methods exist in which decrease the accuracy. It is important to detect fake users, remove their rating from rating matrix and recognize the items has been attacked. In the recent years, many algorithms have been proposed to detect the attackers but first, researchers have to inject the attack type into their dataset and then evaluate their proposed approach. The purpose of this article is to develop a tool to inject the different attack types to datasets. Proposed tool constructs a new dataset containing the fake users therefore researchers can use it for evaluating their proposed attack detection methods. Researchers could choose the attack type and the size of attack with a user interface of our proposed tool easily.
推荐系统帮助人们根据自己的喜好从网上购物的众多产品中快速找到特定的商品。推荐系统中最流行的模型之一是协同过滤推荐系统(CFRS),它根据同行分组用户评分向活跃用户推荐top-K项目。CFRS实现简单,容易被虚假用户攻击,影响推荐。假用户创建假配置文件来攻击RS并更改其输出。不同的攻击类型具有不同的特征和攻击方法,降低了攻击的准确性。重要的是要检测虚假用户,从评级矩阵中删除他们的评级,并识别已被攻击的项目。近年来,已经提出了许多算法来检测攻击者,但首先,研究人员必须将攻击类型注入到他们的数据集中,然后评估他们提出的方法。本文的目的是开发一种工具,将不同的攻击类型注入数据集。该工具构建了一个包含假用户的新数据集,因此研究人员可以使用它来评估他们提出的攻击检测方法。研究人员可以通过我们所提出的工具的用户界面轻松选择攻击类型和攻击规模。
{"title":"Injection Shilling Attack Tool for Recommender Systems","authors":"Fatemeh Rezaimehr, Chitra Dadkhah","doi":"10.1109/CSICC52343.2021.9420553","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420553","url":null,"abstract":"Recommender systems help people in finding a particular item based on their preference from a wide range of products in online shopping rapidly. One of the most popular models of recommendation systems is the Collaborative Filtering Recommendation System (CFRS) that recommend the top-K items to active user based on peer grouping user ratings. The implementation of CFRS is easy and it can easily be attacked by fake users and affect the recommendation. Fake users create a fake profile to attack the RS and change the output of it. Different attack types with different features and attacking methods exist in which decrease the accuracy. It is important to detect fake users, remove their rating from rating matrix and recognize the items has been attacked. In the recent years, many algorithms have been proposed to detect the attackers but first, researchers have to inject the attack type into their dataset and then evaluate their proposed approach. The purpose of this article is to develop a tool to inject the different attack types to datasets. Proposed tool constructs a new dataset containing the fake users therefore researchers can use it for evaluating their proposed attack detection methods. Researchers could choose the attack type and the size of attack with a user interface of our proposed tool easily.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"444 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Model-Based on Filtration Technique for Speckle Noise Removal from Ultrasound Images 基于模型的超声图像斑点噪声去除技术
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420572
M. Mohammadi, R. Mokhtari
This paper proposes an equation based on a nonlinear filter for speckle noise removal by introducing a region indicator. The use of Gaussian convolution in the proposed region indicator makes the quality of the edges of the image better than other models. The proposed equation also removes noise well due to having a nonlinear filter while preserving important image details such as edges. Experimental results show that the proposed model can handle speckle noise removal quite well.
本文通过引入区域指示器,提出了一种基于非线性滤波的散斑噪声去除方程。在提出的区域指示器中使用高斯卷积使得图像的边缘质量优于其他模型。由于具有非线性滤波器,所提出的方程还可以很好地去除噪声,同时保留重要的图像细节,如边缘。实验结果表明,该模型能较好地去除散斑噪声。
{"title":"A Model-Based on Filtration Technique for Speckle Noise Removal from Ultrasound Images","authors":"M. Mohammadi, R. Mokhtari","doi":"10.1109/CSICC52343.2021.9420572","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420572","url":null,"abstract":"This paper proposes an equation based on a nonlinear filter for speckle noise removal by introducing a region indicator. The use of Gaussian convolution in the proposed region indicator makes the quality of the edges of the image better than other models. The proposed equation also removes noise well due to having a nonlinear filter while preserving important image details such as edges. Experimental results show that the proposed model can handle speckle noise removal quite well.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"36 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 26th International Computer Conference, Computer Society of Iran (CSICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1