首页 > 最新文献

Proceedings of the ACMSE 2018 Conference最新文献

英文 中文
Vegetation density estimation in the wild 野外植被密度估算
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190690
R. Mihail, Wesley I. Cook, Brandi M. Griffin, T. Uyeno, C. Anderson
Remote sensing has revolutionized the efficiency of vegetation mapping, but such techniques remain impractical for mapping some types of flora over relatively limited spatial extents. We propose a deep-learning based framework for automated detection and planar mapping of an epiphytic plant in a forest from geotagged static imagery using inexpensive cameras. Our pipeline consists of two steps: segmentation and spatial distribution estimation. We evaluate several segmentation methods on a novel dataset of roughly 375 outdoor images with per-pixel labels indicating the presence of Spanish moss. We also evaluate the accuracy of the spatial distribution estimates with respect to field measurements by ecologists for Spanish moss.
遥感已经彻底改变了植被制图的效率,但是这种技术对于在相对有限的空间范围内绘制某些类型的植物群仍然是不切实际的。我们提出了一个基于深度学习的框架,用于使用廉价相机从地理标记的静态图像中自动检测和平面映射森林中的附生植物。我们的管道包括两个步骤:分割和空间分布估计。我们在大约375张户外图像的新数据集上评估了几种分割方法,这些图像的每像素标签表明西班牙苔藓的存在。我们还评估了空间分布估计的准确性,相对于生态学家对西班牙苔藓的实地测量。
{"title":"Vegetation density estimation in the wild","authors":"R. Mihail, Wesley I. Cook, Brandi M. Griffin, T. Uyeno, C. Anderson","doi":"10.1145/3190645.3190690","DOIUrl":"https://doi.org/10.1145/3190645.3190690","url":null,"abstract":"Remote sensing has revolutionized the efficiency of vegetation mapping, but such techniques remain impractical for mapping some types of flora over relatively limited spatial extents. We propose a deep-learning based framework for automated detection and planar mapping of an epiphytic plant in a forest from geotagged static imagery using inexpensive cameras. Our pipeline consists of two steps: segmentation and spatial distribution estimation. We evaluate several segmentation methods on a novel dataset of roughly 375 outdoor images with per-pixel labels indicating the presence of Spanish moss. We also evaluate the accuracy of the spatial distribution estimates with respect to field measurements by ecologists for Spanish moss.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using SMS as an interface for a virtual mentoring system 使用SMS作为虚拟师徒系统的接口
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190709
Leron Julian, Kinnis Gosha
Previous research has been done that has explored the use of embodied conversational agents as mentors in faculty-student relationships. This previous system requires users to go to a unique website to interact with the conversational agent. This paper presents the design and development of a conversational agent mentor that uses a more pervasive application for dialogue, short message service (SMS). The SMS conversational agent is constructed to be used as a virtual mentor, to mentor undergraduate computer science majors at a Historically Black College (HBCU) who are considering pursuing a graduate degree in computing. A study has been designed to compare the effectiveness of the SMS conversational agent to the original conversational agent, an embodied conversational agent (ECA).
先前的研究已经探索了在师生关系中使用具身会话代理作为导师。之前的系统要求用户访问一个独特的网站与会话代理进行交互。本文提出了一个会话代理导师的设计和开发,该导师使用了一个更普遍的对话应用程序,即短信服务(SMS)。SMS会话代理被构建为一个虚拟导师,用于指导传统黑人学院(HBCU)正在考虑攻读计算机研究生学位的计算机科学本科生。本研究旨在比较SMS会话代理与原始会话代理的有效性,即具体化会话代理(ECA)。
{"title":"Using SMS as an interface for a virtual mentoring system","authors":"Leron Julian, Kinnis Gosha","doi":"10.1145/3190645.3190709","DOIUrl":"https://doi.org/10.1145/3190645.3190709","url":null,"abstract":"Previous research has been done that has explored the use of embodied conversational agents as mentors in faculty-student relationships. This previous system requires users to go to a unique website to interact with the conversational agent. This paper presents the design and development of a conversational agent mentor that uses a more pervasive application for dialogue, short message service (SMS). The SMS conversational agent is constructed to be used as a virtual mentor, to mentor undergraduate computer science majors at a Historically Black College (HBCU) who are considering pursuing a graduate degree in computing. A study has been designed to compare the effectiveness of the SMS conversational agent to the original conversational agent, an embodied conversational agent (ECA).","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123116946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for validating aimed mobile digital forensics evidences
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190695
Rodney Wilson, H. Chi
The digital forensics tools, as well as the data collected by investigators, must ensure that integrity is kept throughout the investigation process, which is known as validation. Through this research project, an approach that validates mobile forensics tools and the data stored on the device will be developed. The goal of this research is to develop an approach that validates mobile forensics tools and the data stored on the device. An application will be implemented in a forensically sound manner using the approach, which will comprise of robust validation methods. This research will focus on iOS apps, whereas, the data collection is conducted on the iOS device and at the end of process, data is transferred to a laptop for validation. This tool is designed to assist in the validation of forensic evidence so that it holds admissibility in court and decrease the time spent acquiring data from a mobile device by leveraging an aimed approach.
数字取证工具以及调查人员收集的数据必须确保在整个调查过程中保持完整性,这被称为验证。通过该研究项目,将开发一种验证移动取证工具和存储在设备上的数据的方法。本研究的目标是开发一种方法来验证移动取证工具和存储在设备上的数据。应用程序将使用该方法以法医上合理的方式实现,该方法将包括健壮的验证方法。本研究将侧重于iOS应用程序,然而,数据收集是在iOS设备上进行的,在过程结束时,数据被传输到笔记本电脑进行验证。该工具旨在协助法医证据的验证,使其在法庭上具有可采性,并通过利用有针对性的方法减少从移动设备获取数据所花费的时间。
{"title":"A framework for validating aimed mobile digital forensics evidences","authors":"Rodney Wilson, H. Chi","doi":"10.1145/3190645.3190695","DOIUrl":"https://doi.org/10.1145/3190645.3190695","url":null,"abstract":"The digital forensics tools, as well as the data collected by investigators, must ensure that integrity is kept throughout the investigation process, which is known as validation. Through this research project, an approach that validates mobile forensics tools and the data stored on the device will be developed. The goal of this research is to develop an approach that validates mobile forensics tools and the data stored on the device. An application will be implemented in a forensically sound manner using the approach, which will comprise of robust validation methods. This research will focus on iOS apps, whereas, the data collection is conducted on the iOS device and at the end of process, data is transferred to a laptop for validation. This tool is designed to assist in the validation of forensic evidence so that it holds admissibility in court and decrease the time spent acquiring data from a mobile device by leveraging an aimed approach.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"616 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel meshes for multivariate interpolation and approximation 新颖的多元插值和逼近网格
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190687
T. Lux, L. Watson, Tyler H. Chang, Jon Bernard, Bo Li, Xiaodong Yu, Li Xu, Godmar Back, A. Butt, K. Cameron, D. Yao, Yili Hong
A rapid increase in the quantity of data available is allowing all fields of science to generate more accurate models of multivariate phenomena. Regression and interpolation become challenging when the dimension of data is large, especially while maintaining tractable computational complexity. This paper proposes three novel techniques for multivariate interpolation and regression that each have polynomial complexity with respect to number of instances (points) and number of attributes (dimension). Initial results suggest that these techniques are capable of effectively modeling multivariate phenomena while maintaining flexibility in different application domains.
可用数据量的迅速增加使所有科学领域都能够产生更精确的多元现象模型。当数据维数较大时,特别是在保持可处理的计算复杂性的情况下,回归和插值变得具有挑战性。本文提出了三种新的多元插值和回归技术,每种技术在实例数(点)和属性数(维)方面都具有多项式复杂度。初步结果表明,这些技术能够有效地建模多变量现象,同时在不同的应用领域保持灵活性。
{"title":"Novel meshes for multivariate interpolation and approximation","authors":"T. Lux, L. Watson, Tyler H. Chang, Jon Bernard, Bo Li, Xiaodong Yu, Li Xu, Godmar Back, A. Butt, K. Cameron, D. Yao, Yili Hong","doi":"10.1145/3190645.3190687","DOIUrl":"https://doi.org/10.1145/3190645.3190687","url":null,"abstract":"A rapid increase in the quantity of data available is allowing all fields of science to generate more accurate models of multivariate phenomena. Regression and interpolation become challenging when the dimension of data is large, especially while maintaining tractable computational complexity. This paper proposes three novel techniques for multivariate interpolation and regression that each have polynomial complexity with respect to number of instances (points) and number of attributes (dimension). Initial results suggest that these techniques are capable of effectively modeling multivariate phenomena while maintaining flexibility in different application domains.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125120513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cloud computing: cost, security, and performance 云计算:成本、安全性和性能
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190706
Jeremiah Bolin, Mengkun Yang
The cloud computing systems face challenges from various aspects, including deployment cost, security, and performance. This project surveys these challenges and the approaches to addressing them. Deployment cost is an intense challenge to cloud computing. The high network bandwidth required to support potentially millions of users is a key aspect that leads to the rising costs for cloud service providers. To alleviate the bandwidth consumption, lightweight frameworks such as Angular have been developed to reduce the bandwidth necessary to transmit the required data by allowing clients to optimize and interpret the data rather than sending large files over a network. Video streaming codecs have adapted to keep high quality images, while lowering the amount of bandwidth needed to deliver the high definition video. Security is a critically important aspect of cloud services. User's data is at risk of being intercepted when it is transmitted across an unsecured network. Approaches to solving the problem of network security include data encryption and the use of Virtual Private Network (VPNs). Encryption prevents private data from leaking to unwanted users, with the cost of relatively high computational overhead. VPNs allow data to be delivered securely between authenticated end-points via a sub-network defined over a public underlying network. In addition to the networks, cloud servers themselves may be vulnerable to security attacks, both internally and externally. Internal attacks can be rogue administrators, exploiting cloud vulnerabilities, and using the cloud to conduct "nefarious activity". The damages range from stealing unprotected files to using the servers as tools to attack other organizations or users. External attacks include cross site scripting, information leakage and improper handling, broken authentication and session management, failure to restrict Web access, improper data validation, insecure communications, and malicious file execution. To resolve the security concerns on the cloud servers, various technologies have been developed, including storage with encryption, firewalls, packet filters, as well as virtual local area networks. Performance is another very important issue in cloud computing. Poor performance can be caused by various factors, including improper use of hardware resources on either end of the connection, and the network latency. From the hardware aspect, an effort to improve performance has been the move towards flash-based storage in order to increase read/write speeds and therefore decrease access times. In addition, parallel computing allows more work to be done in the same amount of time and significantly benefits large cloud server systems that run thousands of systems in parallel. Deploying small data centers closer to the end-users can help significantly reduce the latency perceived by users as well as the workload on the main datacenters, at the cost of increased deployment expense for cloud service pro
云计算系统面临着部署成本、安全性、性能等多方面的挑战。本项目探讨了这些挑战以及解决这些挑战的方法。部署成本是云计算面临的一个严峻挑战。支持潜在数百万用户所需的高网络带宽是导致云服务提供商成本上升的一个关键因素。为了减少带宽消耗,像Angular这样的轻量级框架已经被开发出来,通过允许客户端优化和解释数据,而不是通过网络发送大文件,来减少传输所需数据所需的带宽。视频流编解码器已经适应了保持高质量的图像,同时降低了传输高清晰度视频所需的带宽。安全性是云服务的一个至关重要的方面。当用户的数据在不安全的网络上传输时,有被拦截的风险。解决网络安全问题的方法包括数据加密和使用虚拟专用网(vpn)。加密可以防止私有数据泄露给不需要的用户,但代价是相对较高的计算开销。vpn允许数据通过在公共底层网络上定义的子网在经过身份验证的端点之间安全地传递。除了网络之外,云服务器本身也可能容易受到内部和外部的安全攻击。内部攻击可以是流氓管理员,利用云漏洞,并使用云进行“恶意活动”。损害范围从窃取未受保护的文件到使用服务器作为攻击其他组织或用户的工具。外部攻击包括跨站点脚本、信息泄漏和不当处理、身份验证和会话管理中断、无法限制Web访问、不正确的数据验证、不安全的通信和恶意文件执行。为了解决云服务器上的安全问题,已经开发了各种技术,包括带加密的存储、防火墙、包过滤器以及虚拟局域网。性能是云计算中另一个非常重要的问题。导致性能差的因素有很多,包括对连接两端硬件资源的使用不当,以及网络延迟。从硬件方面来看,为了提高读写速度,减少访问时间,人们一直在努力提高性能,转向基于闪存的存储。此外,并行计算允许在相同的时间内完成更多的工作,并且大大有利于并行运行数千个系统的大型云服务器系统。在离最终用户更近的地方部署小型数据中心可以帮助显著减少用户感知到的延迟以及主数据中心的工作负载,但代价是云服务提供商和内容分发网络的部署费用增加。
{"title":"Cloud computing: cost, security, and performance","authors":"Jeremiah Bolin, Mengkun Yang","doi":"10.1145/3190645.3190706","DOIUrl":"https://doi.org/10.1145/3190645.3190706","url":null,"abstract":"The cloud computing systems face challenges from various aspects, including deployment cost, security, and performance. This project surveys these challenges and the approaches to addressing them. Deployment cost is an intense challenge to cloud computing. The high network bandwidth required to support potentially millions of users is a key aspect that leads to the rising costs for cloud service providers. To alleviate the bandwidth consumption, lightweight frameworks such as Angular have been developed to reduce the bandwidth necessary to transmit the required data by allowing clients to optimize and interpret the data rather than sending large files over a network. Video streaming codecs have adapted to keep high quality images, while lowering the amount of bandwidth needed to deliver the high definition video. Security is a critically important aspect of cloud services. User's data is at risk of being intercepted when it is transmitted across an unsecured network. Approaches to solving the problem of network security include data encryption and the use of Virtual Private Network (VPNs). Encryption prevents private data from leaking to unwanted users, with the cost of relatively high computational overhead. VPNs allow data to be delivered securely between authenticated end-points via a sub-network defined over a public underlying network. In addition to the networks, cloud servers themselves may be vulnerable to security attacks, both internally and externally. Internal attacks can be rogue administrators, exploiting cloud vulnerabilities, and using the cloud to conduct \"nefarious activity\". The damages range from stealing unprotected files to using the servers as tools to attack other organizations or users. External attacks include cross site scripting, information leakage and improper handling, broken authentication and session management, failure to restrict Web access, improper data validation, insecure communications, and malicious file execution. To resolve the security concerns on the cloud servers, various technologies have been developed, including storage with encryption, firewalls, packet filters, as well as virtual local area networks. Performance is another very important issue in cloud computing. Poor performance can be caused by various factors, including improper use of hardware resources on either end of the connection, and the network latency. From the hardware aspect, an effort to improve performance has been the move towards flash-based storage in order to increase read/write speeds and therefore decrease access times. In addition, parallel computing allows more work to be done in the same amount of time and significantly benefits large cloud server systems that run thousands of systems in parallel. Deploying small data centers closer to the end-users can help significantly reduce the latency perceived by users as well as the workload on the main datacenters, at the cost of increased deployment expense for cloud service pro","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116492320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of cybersecurity hands-on laboratory exercises using secDLC framework 使用secDLC框架设计网络安全动手实验练习
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190704
H. Chi, Temilola Aderibigbe, E. Kalaimannan
In software development, the life cycle in general consists of four different phases, which includes the design phase, development phase, implementation phase, and testing phase. The phases are being followed to ensure production of high-quality software that meets the demands and expectation of its intended audience. Security development follows a similar life cycle known as the Security Development Life Cycle (SecDLC) [1] to keep improving security in the real world. SecDLC is comprised of four distinct stages: Assessment, Detection, Protection, and Response. The goal of the SecDLC is to maintain, preserve, monitor, and improve information security. This paper outlines the initial development of the hands-on labs that would address every stage of SecDLC and thus provide practical tools to educate cybersecurity professionals. The labs developed will be a part of a new Cybersecurity educational framework.
在软件开发中,生命周期通常由四个不同的阶段组成,包括设计阶段、开发阶段、实现阶段和测试阶段。要遵循这些阶段,以确保生产出高质量的软件,满足其目标受众的需求和期望。安全开发遵循一个类似的生命周期,称为安全开发生命周期(SecDLC)[1],以不断改进现实世界中的安全性。SecDLC由四个不同的阶段组成:评估、检测、保护和响应。SecDLC的目标是维护、保存、监控和改进信息安全。本文概述了动手实验室的初步发展,这些实验室将解决SecDLC的每个阶段,从而为教育网络安全专业人员提供实用工具。开发的实验室将成为新的网络安全教育框架的一部分。
{"title":"Design of cybersecurity hands-on laboratory exercises using secDLC framework","authors":"H. Chi, Temilola Aderibigbe, E. Kalaimannan","doi":"10.1145/3190645.3190704","DOIUrl":"https://doi.org/10.1145/3190645.3190704","url":null,"abstract":"In software development, the life cycle in general consists of four different phases, which includes the design phase, development phase, implementation phase, and testing phase. The phases are being followed to ensure production of high-quality software that meets the demands and expectation of its intended audience. Security development follows a similar life cycle known as the Security Development Life Cycle (SecDLC) [1] to keep improving security in the real world. SecDLC is comprised of four distinct stages: Assessment, Detection, Protection, and Response. The goal of the SecDLC is to maintain, preserve, monitor, and improve information security. This paper outlines the initial development of the hands-on labs that would address every stage of SecDLC and thus provide practical tools to educate cybersecurity professionals. The labs developed will be a part of a new Cybersecurity educational framework.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A model of a relative peer grading system for MOOCs mooc的相对同伴评分系统模型
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190684
Timothy Holston, D. Wilkins
This paper defines a model for a relative grading system that scales from low enrollment to large enrollment courses. The model allows peer grader to rank a small subset of submissions that are later merged into a global ranked set of all submissions for an assignment. This global set of ranked submissions and grades produced by expert graders(instructors and/or teachers assistants) who perform absolute grading of their own small subset of the submissions, are used to interpolate a cardinal grade for each submission of an assignment but excluding the ones graded by the experts. This model will be simulated to define the values of different parameters that produces valid and reliable grades. The research will also show that the model is scalable for different size courses by examining the effort of peer graders and expert graders.
本文定义了一个从低招生到大招生课程的相对评分系统模型。该模型允许同行评分者对提交的一小部分进行排名,然后将其合并到一个作业的所有提交的全局排名集中。专家评分者(指导员和/或教师助理)对提交的一小部分进行绝对评分,这些评分者生成的排名和评分的全局集用于为每次提交的作业插入一个基本评分,但不包括专家评分。将对该模型进行模拟,以确定产生有效可靠等级的不同参数的值。研究还将表明,该模型是可扩展的不同规模的课程,通过检查同级评分和专家评分的努力。
{"title":"A model of a relative peer grading system for MOOCs","authors":"Timothy Holston, D. Wilkins","doi":"10.1145/3190645.3190684","DOIUrl":"https://doi.org/10.1145/3190645.3190684","url":null,"abstract":"This paper defines a model for a relative grading system that scales from low enrollment to large enrollment courses. The model allows peer grader to rank a small subset of submissions that are later merged into a global ranked set of all submissions for an assignment. This global set of ranked submissions and grades produced by expert graders(instructors and/or teachers assistants) who perform absolute grading of their own small subset of the submissions, are used to interpolate a cardinal grade for each submission of an assignment but excluding the ones graded by the experts. This model will be simulated to define the values of different parameters that produces valid and reliable grades. The research will also show that the model is scalable for different size courses by examining the effort of peer graders and expert graders.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129153624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for identity based on situation theory 基于情境理论的认同框架
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190713
Janelle C. Mason, K. Kyei, Darrion Long, Hannah Foster, William Nick, James Mayes, A. Esterline
This paper presents a computational framework for identity (initially about the culprit in a crime scene) based on Barwise's situation theory. Situations support information and can carry information about other situations. An utterance situation carries information about a described situation thanks to the constraints imposed by natural language. We are concerned with utterance situations (which we call an id-situation or id-case) in which identity judgments are made about the culprit in a crime scene, which is the corresponding described situation. The id-situation and crime scene along with various resource situations make up a case in the legal sense. Resource situations include such things as where a fingerprint was filed and where one took a facial image used to train a classifier. In an investigation, there may be several coordinated id-cases that use different means in search of the same judgment. We utilize Semantic Web standards to express cases in our framework. We have developed Web Ontology Language (OWL) ontologies to provide concepts and principled vocabularies for encoding our scenarios in Resource Description Framework (RDF), and we present an example of a SPARQL Protocol and RDF Query Language (SPARQL) query of one of our encodings that spans situations. To follow how evidence supports hypotheses on the identity of the culprit in a crime scene, we use Dempster-Shafer theory, which provides numerical values for evidence-based confidence one should have in our identities. We tightly integrate it with our ontologies by having the representation of a case per our ontologies present a network containing situations and stitched together by objects; evidence "flows" along this network, diminishing and combining. We review the modifications of Dempster-Shafer theory required when one goes from a closed world assumption, where the number of suspects or candidates is bounded, to an open world assumption, where there is an unbounded number of suspects or candidates. We review our plans regarding equational reasoning based on identities established in our id-cases, and we review the related issues regarding the meanings of Universal Resource Identifiers (URIs). URIs are the fundamental denoting expressions ("names") on the Semantic Web, and an account of identity using Semantic-Web resources must be clear on what is required for a URI to denote something. On the pre-Semantic Web, a URI just identifies the web-page its protocol accesses, but on the Semantic Web, URIs are used to identify all resources, causing confusion between a thing and a page about it. We review three positions on the meanings of denoting expression and note that they apply to URIs as used in our encodings of scenarios.
本文提出了一个基于Barwise情境理论的身份计算框架(最初是关于犯罪现场的罪犯)。情景支持信息,并且可以携带关于其他情景的信息。由于自然语言的约束,话语情景承载着所描述情景的信息。我们关注的是话语情境(我们称之为id-situation或id-case),在这种情境中,人们对犯罪现场的罪犯做出身份判断,这是相应的描述情境。犯罪现场和犯罪现场以及各种资源情况构成了法律意义上的案件。资源情况包括指纹被归档的位置,以及用于训练分类器的面部图像的位置。在调查中,可能会有几个协调的身份案件,使用不同的手段来寻求相同的判决。我们利用语义Web标准来表达框架中的用例。我们已经开发了Web本体语言(Web Ontology Language, OWL)本体,为在资源描述框架(Resource Description Framework, RDF)中对我们的场景进行编码提供了概念和有原则的词汇表,并给出了一个SPARQL协议和RDF查询语言(SPARQL)对我们的一种跨场景编码进行查询的示例。为了遵循证据如何支持犯罪现场罪犯身份的假设,我们使用了Dempster-Shafer理论,该理论为人们应该对自己的身份拥有的基于证据的信心提供了数值。我们将它与我们的本体紧密地结合在一起,通过每个本体的案例表示呈现一个包含情境的网络,并由对象拼接在一起;证据沿着这个网络“流动”,减少和结合。我们回顾了Dempster-Shafer理论的修改,当一个人从一个封闭的世界假设,其中嫌疑人或候选人的数量是有限的,到一个开放的世界假设,其中有一个无界的嫌疑人或候选人的数量。我们回顾了关于基于id-case中建立的身份的等式推理的计划,并回顾了关于通用资源标识符(uri)含义的相关问题。URI是语义Web上的基本表示表达式(“名称”),使用语义Web资源的身份说明必须清楚URI表示某些东西所需的条件。在前语义Web上,URI仅标识其协议访问的Web页面,但在语义Web上,URI用于标识所有资源,这导致了事物和关于它的页面之间的混淆。我们回顾了表示表达式含义的三种位置,并注意它们适用于场景编码中使用的uri。
{"title":"A framework for identity based on situation theory","authors":"Janelle C. Mason, K. Kyei, Darrion Long, Hannah Foster, William Nick, James Mayes, A. Esterline","doi":"10.1145/3190645.3190713","DOIUrl":"https://doi.org/10.1145/3190645.3190713","url":null,"abstract":"This paper presents a computational framework for identity (initially about the culprit in a crime scene) based on Barwise's situation theory. Situations support information and can carry information about other situations. An utterance situation carries information about a described situation thanks to the constraints imposed by natural language. We are concerned with utterance situations (which we call an id-situation or id-case) in which identity judgments are made about the culprit in a crime scene, which is the corresponding described situation. The id-situation and crime scene along with various resource situations make up a case in the legal sense. Resource situations include such things as where a fingerprint was filed and where one took a facial image used to train a classifier. In an investigation, there may be several coordinated id-cases that use different means in search of the same judgment. We utilize Semantic Web standards to express cases in our framework. We have developed Web Ontology Language (OWL) ontologies to provide concepts and principled vocabularies for encoding our scenarios in Resource Description Framework (RDF), and we present an example of a SPARQL Protocol and RDF Query Language (SPARQL) query of one of our encodings that spans situations. To follow how evidence supports hypotheses on the identity of the culprit in a crime scene, we use Dempster-Shafer theory, which provides numerical values for evidence-based confidence one should have in our identities. We tightly integrate it with our ontologies by having the representation of a case per our ontologies present a network containing situations and stitched together by objects; evidence \"flows\" along this network, diminishing and combining. We review the modifications of Dempster-Shafer theory required when one goes from a closed world assumption, where the number of suspects or candidates is bounded, to an open world assumption, where there is an unbounded number of suspects or candidates. We review our plans regarding equational reasoning based on identities established in our id-cases, and we review the related issues regarding the meanings of Universal Resource Identifiers (URIs). URIs are the fundamental denoting expressions (\"names\") on the Semantic Web, and an account of identity using Semantic-Web resources must be clear on what is required for a URI to denote something. On the pre-Semantic Web, a URI just identifies the web-page its protocol accesses, but on the Semantic Web, URIs are used to identify all resources, causing confusion between a thing and a page about it. We review three positions on the meanings of denoting expression and note that they apply to URIs as used in our encodings of scenarios.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131659957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grading algorithm for cascading failures and propagation of precision error for the engineering course exams 工程课程考试级联故障及精度误差传播的分级算法
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190708
Dongjin Kim
Grading a classic open-ended problem-solving type engineering test is very time consuming and labor intensive. In order to investigate test taker's extent of interpretation on the given problem statement and the ability of the employment of governing equations and solving skills, test takers have been asked to solve on papers by hand. Recently, we can easily find online learning systems providing variety of ways of automatic grading tools but they are still limited to multiple choice questions or at most short answer questions. Hence, any kinds of minor errors, such as typos, precision propagation and failure cascades, are still lack of consideration. In the study, an algorithm and sample grading tool programmed in HTML/PHP for simple and most frequently score-losing failure modes, typo and calculation uncertainty, are introduced. The generic solution procedure for the open-ended type question follows: 1) problem interpretation 2) isolation of unknowns in the chosen governing equation 3) plugging in knowns to obtain the final answer. The suggested approach is to divide aforementioned three steps into sub questions to the extent of each variable in the governing equation. The questions are sequentially related from researching the given properties to determining the ultimate target value. The sub question set can investigate the depth of the test taker's knowledge on the utilizing equation. That means whether the person comprehends the physical/chemical meaning of each term or each variable; the reason of any canceled or ignored term; and the solution process. Precision error or truncation error is generic in the engineering problem solving. Sequential sub questions are related in a way that such errors implied in the previous questions transfer to the consecutive questions. As the result, the error range enlarges with the number of sub questions. This phenomena is similar to that occurs due to the measurement uncertainty propagation in metrology More challenging and labor intensive part in grading is tracking failures that cascaded to the consecutive steps. Test grader has to recalculate the question from the beginning to the end plugging in both correct numbers and incorrect numbers. The suggested algorithm is to use Boolean at each sub question for each variable and each step among values: (1) typed in value at the corresponding step and the corresponding variable; (2) originally saved correct answer with set tolerance; and (3) newly estimated answer using incorrect answer typed in the previous step. The effect of the failures made in the previous steps as well as the steps where the incorrect answers were typed in are investigated. Referring to the result of such logical analysis, test takers will receive a detailed feedback on what kind of errors they made, like the feedback from classic human grading method. This method has been utilized for several practical exams and verified that the grading time can be enormously reduced as well as provi
一个经典的开放式问题解决型工程测试的评分是非常耗时和劳动密集型的。为了考察考生对给定问题陈述的理解程度以及运用控制方程和解决技巧的能力,考生被要求在纸上手工解决问题。最近,我们可以很容易地找到提供各种自动评分工具的在线学习系统,但它们仍然局限于选择题或最多的简答题。因此,任何类型的小错误,如打字错误、精度传播和故障级联,仍然缺乏考虑。本文介绍了一种用HTML/PHP编写的算法和样例评分工具,用于简单和最常见的失分错误模式,打字错误和计算不确定性。开放式问题的通解步骤如下:1)问题解释2)隔离所选控制方程中的未知数3)代入已知得到最终答案。建议的方法是根据控制方程中每个变量的程度将上述三个步骤分成子问题。这些问题依次从研究给定的属性到确定最终的目标值。子题集可以考察考生对运用方程的知识深度。这意味着这个人是否理解了每个术语或每个变量的物理/化学含义;取消或忽略条款的原因;还有解的过程。精度误差或截断误差是工程问题求解中普遍存在的问题。顺序子题的关联方式是将前题中隐含的错误转移到连续题中。因此,误差范围随着子题数量的增加而扩大。这种现象与计量学中由于测量不确定度传播而发生的现象类似。分级中更具挑战性和劳动密集型的部分是跟踪级联到连续步骤的故障。考试评分员必须从头到尾重新计算问题,把正确的数字和错误的数字都填进去。建议的算法是在每个子问题上对每个变量和值之间的每一步使用布尔值:(1)在相应的步骤和相应的变量上键入值;(2)原保存的正确答案具有设定的公差;(3)使用前一步输入的错误答案重新估计答案。在前面的步骤中失败的影响以及错误答案输入的步骤进行了调查。根据这种逻辑分析的结果,考生会收到关于他们犯了什么样的错误的详细反馈,就像经典的人工评分方法的反馈一样。这种方法已经在几次实际考试中得到了应用,并证明了评分时间大大减少,不仅在学生之间,而且在多个部分和学期中都能提供更客观的评分
{"title":"Grading algorithm for cascading failures and propagation of precision error for the engineering course exams","authors":"Dongjin Kim","doi":"10.1145/3190645.3190708","DOIUrl":"https://doi.org/10.1145/3190645.3190708","url":null,"abstract":"Grading a classic open-ended problem-solving type engineering test is very time consuming and labor intensive. In order to investigate test taker's extent of interpretation on the given problem statement and the ability of the employment of governing equations and solving skills, test takers have been asked to solve on papers by hand. Recently, we can easily find online learning systems providing variety of ways of automatic grading tools but they are still limited to multiple choice questions or at most short answer questions. Hence, any kinds of minor errors, such as typos, precision propagation and failure cascades, are still lack of consideration. In the study, an algorithm and sample grading tool programmed in HTML/PHP for simple and most frequently score-losing failure modes, typo and calculation uncertainty, are introduced. The generic solution procedure for the open-ended type question follows: 1) problem interpretation 2) isolation of unknowns in the chosen governing equation 3) plugging in knowns to obtain the final answer. The suggested approach is to divide aforementioned three steps into sub questions to the extent of each variable in the governing equation. The questions are sequentially related from researching the given properties to determining the ultimate target value. The sub question set can investigate the depth of the test taker's knowledge on the utilizing equation. That means whether the person comprehends the physical/chemical meaning of each term or each variable; the reason of any canceled or ignored term; and the solution process. Precision error or truncation error is generic in the engineering problem solving. Sequential sub questions are related in a way that such errors implied in the previous questions transfer to the consecutive questions. As the result, the error range enlarges with the number of sub questions. This phenomena is similar to that occurs due to the measurement uncertainty propagation in metrology More challenging and labor intensive part in grading is tracking failures that cascaded to the consecutive steps. Test grader has to recalculate the question from the beginning to the end plugging in both correct numbers and incorrect numbers. The suggested algorithm is to use Boolean at each sub question for each variable and each step among values: (1) typed in value at the corresponding step and the corresponding variable; (2) originally saved correct answer with set tolerance; and (3) newly estimated answer using incorrect answer typed in the previous step. The effect of the failures made in the previous steps as well as the steps where the incorrect answers were typed in are investigated. Referring to the result of such logical analysis, test takers will receive a detailed feedback on what kind of errors they made, like the feedback from classic human grading method. This method has been utilized for several practical exams and verified that the grading time can be enormously reduced as well as provi","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132586664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid genetic algorithm for network intrusion detection 一种网络入侵检测的混合遗传算法
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190702
S. Bagui, Debarghya Nandi, S. Bagui
Featurel selection is common in prediction tasks because it helps in reducing computation time as well as dimensionality of the data. A hybrid filter wrapper approach has been presented in this paper to detect network intrusion attacks using the genetic algorithm. The genetic algorithm is a popular search algorithm with wide applications in optimization problems like the TSP problem. One of the biggest advantages of the genetic algorithm is its continuous evolution towards better solutions. However, it does take a greedy approach, evaluating its strength against a fitness function, making it vulnerable to local optima. A certain amount of randomness at each generation can help us overcome this problem. In Network Intrusion Detection systems, the number of attacks is sometimes far less than the false alarm rate, causing the real attacks to be ignored. To overcome this problem, we propose an objective function which not only rewards higher score for higher accuracy, but also heavily penalizes false positives. Features are initially selected based on information gain and each feature is weighted differently based on domain knowledge, and then the selected subset of features is scored based on accuracy with higher penalty for false positives. In addition, crossover and mutation is carried out to allow for sufficient randomness in feature selection and avoid overfitting. Sample experimentation on the UNSW-NB15 dataset show that our approach performs much better compared to traditional methods and other state-of-the-art intrusion detection classification algorithms.
特征选择在预测任务中很常见,因为它有助于减少计算时间和数据的维数。本文提出了一种利用遗传算法检测网络入侵攻击的混合过滤包装方法。遗传算法是一种流行的搜索算法,在TSP问题等优化问题中有着广泛的应用。遗传算法的最大优点之一是它不断向更好的解进化。然而,它确实采取了贪婪的方法,根据适应度函数评估其强度,使其容易受到局部最优的影响。每一代的一定数量的随机性可以帮助我们克服这个问题。在网络入侵检测系统中,攻击次数有时远低于虚警率,导致真实的攻击被忽略。为了克服这个问题,我们提出了一个目标函数,它不仅奖励更高的准确率,而且严重惩罚误报。首先根据信息增益选择特征,然后根据领域知识对每个特征进行不同的加权,然后根据准确率对所选择的特征子集进行评分,对误报进行更高的惩罚。此外,进行交叉和变异,使特征选择具有足够的随机性,避免过拟合。在UNSW-NB15数据集上的样本实验表明,与传统方法和其他最先进的入侵检测分类算法相比,我们的方法表现得更好。
{"title":"A hybrid genetic algorithm for network intrusion detection","authors":"S. Bagui, Debarghya Nandi, S. Bagui","doi":"10.1145/3190645.3190702","DOIUrl":"https://doi.org/10.1145/3190645.3190702","url":null,"abstract":"Featurel selection is common in prediction tasks because it helps in reducing computation time as well as dimensionality of the data. A hybrid filter wrapper approach has been presented in this paper to detect network intrusion attacks using the genetic algorithm. The genetic algorithm is a popular search algorithm with wide applications in optimization problems like the TSP problem. One of the biggest advantages of the genetic algorithm is its continuous evolution towards better solutions. However, it does take a greedy approach, evaluating its strength against a fitness function, making it vulnerable to local optima. A certain amount of randomness at each generation can help us overcome this problem. In Network Intrusion Detection systems, the number of attacks is sometimes far less than the false alarm rate, causing the real attacks to be ignored. To overcome this problem, we propose an objective function which not only rewards higher score for higher accuracy, but also heavily penalizes false positives. Features are initially selected based on information gain and each feature is weighted differently based on domain knowledge, and then the selected subset of features is scored based on accuracy with higher penalty for false positives. In addition, crossover and mutation is carried out to allow for sufficient randomness in feature selection and avoid overfitting. Sample experimentation on the UNSW-NB15 dataset show that our approach performs much better compared to traditional methods and other state-of-the-art intrusion detection classification algorithms.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the ACMSE 2018 Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1