首页 > 最新文献

IADIS-International Journal on Computer Science and Information Systems最新文献

英文 中文
HETEROGENEOUS DESIGN AND EFFICIENT CPU-GPU IMPLEMENTATION OF COLLISION DETECTION 异构设计和高效的cpu-gpu实现碰撞检测
IF 0.2 Pub Date : 2019-01-01 DOI: 10.33965/ijcsis_2019140202
Mohid Tayyub, G. Khan
Collison detection is a wide-ranging real-world application. It is one of the key components used in gaming, simulation and animation. Efficient algorithms are required for collision detection as it is repeatedly executed throughout the course of an application. Moreover, due to its computationally intensive nature researchers are investigating ways to reduce its execution time. This paper furthers those research works by devising a parallel CPU-GPU implementation of both broad and narrow phase collision detection with heterogenous workload sharing. An important aspect of co-scheduling is to determine an optimal CPU-GPU partition ratio. We also showcase a successive approximation approach for CPU-GPU implementation of collision detection. The paper demonstrates that the framework is not only applicable to CPU/GPU systems but to other system configuration obtaining a peak performance improvement in the range of 18%.
碰撞检测在现实世界中有着广泛的应用。它是游戏、模拟和动画中使用的关键组件之一。碰撞检测需要高效的算法,因为它在整个应用程序过程中反复执行。此外,由于其计算密集的性质,研究人员正在研究减少其执行时间的方法。本文通过设计一种具有异构工作负载共享的宽相位和窄相位碰撞检测的并行CPU-GPU实现来进一步推进这些研究工作。协同调度的一个重要方面是确定最佳的CPU-GPU分区比例。我们还展示了CPU-GPU实现碰撞检测的连续逼近方法。本文表明,该框架不仅适用于CPU/GPU系统,也适用于其他系统配置,峰值性能提高了18%。
{"title":"HETEROGENEOUS DESIGN AND EFFICIENT CPU-GPU IMPLEMENTATION OF COLLISION DETECTION","authors":"Mohid Tayyub, G. Khan","doi":"10.33965/ijcsis_2019140202","DOIUrl":"https://doi.org/10.33965/ijcsis_2019140202","url":null,"abstract":"Collison detection is a wide-ranging real-world application. It is one of the key components used in gaming, simulation and animation. Efficient algorithms are required for collision detection as it is repeatedly executed throughout the course of an application. Moreover, due to its computationally intensive nature researchers are investigating ways to reduce its execution time. This paper furthers those research works by devising a parallel CPU-GPU implementation of both broad and narrow phase collision detection with heterogenous workload sharing. An important aspect of co-scheduling is to determine an optimal CPU-GPU partition ratio. We also showcase a successive approximation approach for CPU-GPU implementation of collision detection. The paper demonstrates that the framework is not only applicable to CPU/GPU systems but to other system configuration obtaining a peak performance improvement in the range of 18%.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85395348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient snapshot method for all-flash array 全闪存阵列的高效快照方法
IF 0.2 Pub Date : 2018-12-17 DOI: 10.33965/IJCSIS_2018130208
Miho Imazaki, Norio Shimozono, N. Komoda
{"title":"Efficient snapshot method for all-flash array","authors":"Miho Imazaki, Norio Shimozono, N. Komoda","doi":"10.33965/IJCSIS_2018130208","DOIUrl":"https://doi.org/10.33965/IJCSIS_2018130208","url":null,"abstract":"","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75491833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic generation of ontologies: a hierarchical word clustering approach 本体的自动生成:一种分层词聚类方法
IF 0.2 Pub Date : 2018-12-17 DOI: 10.33965/IJCSIS_2018130206
Smail Sellah, V. Hilaire
In the context of globalization, companies need to capitalize on their knowledge. The knowledge of a company is present in two forms tacit and explicit. Explicit knowledge represents all formalized information i.e all documents (pdf, words ...). Tacit knowledge is present in documents and mind of employees, this kind of knowledge is not formalized, it needs a reasoning process to discover it. The approach proposed focus on extracting tacit knowledge from textual documents. In this paper, we propose hierarchical word clustering as an improvement of word clusters generated in previous work, we also proposed an approach to extract relevant bigrams and trigrams. We use Reuters-21578 corpus to validate our approach. Our global work aims to ease the automatic building of ontologies.
在全球化的背景下,公司需要利用他们的知识。企业的知识以隐性和显性两种形式存在。显式知识表示所有形式化信息,即所有文档(pdf、word…)。隐性知识存在于文件和员工的思想中,这种知识是不形式化的,需要一个推理的过程来发现它。该方法侧重于从文本文档中提取隐性知识。在本文中,我们提出了分层词聚类方法,作为对先前工作中生成的词聚类的改进,我们还提出了一种提取相关双元和三元词的方法。我们使用Reuters-21578语料库来验证我们的方法。我们的全球工作旨在简化本体的自动构建。
{"title":"Automatic generation of ontologies: a hierarchical word clustering approach","authors":"Smail Sellah, V. Hilaire","doi":"10.33965/IJCSIS_2018130206","DOIUrl":"https://doi.org/10.33965/IJCSIS_2018130206","url":null,"abstract":"In the context of globalization, companies need to capitalize on their knowledge. The knowledge of a company is present in two forms tacit and explicit. Explicit knowledge represents all formalized information i.e all documents (pdf, words ...). Tacit knowledge is present in documents and mind of employees, this kind of knowledge is not formalized, it needs a reasoning process to discover it. The approach proposed focus on extracting tacit knowledge from textual documents. In this paper, we propose hierarchical word clustering as an improvement of word clusters generated in previous work, we also proposed an approach to extract relevant bigrams and trigrams. We use Reuters-21578 corpus to validate our approach. Our global work aims to ease the automatic building of ontologies.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84286169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
First in-depth analysis of enterprise architectures and models for higher education institutions 首先深入分析高等教育机构的企业架构和模型
IF 0.2 Pub Date : 2018-12-17 DOI: 10.33965/IJCSIS_2018130203
Felix Sanchez-Puchol, J. Pastor-Collado, Baptista Borrell
Enterprise Reference Architectures (ERAs) and Reference Models (RMs) have emerged over the last years as relevant instruments for improving the quality and effectiveness of enterprise architecture (EA) practice. Whilst a wide variety of different ERAs and RMs have been proposed for different industries and types of business, only few of them have been devoted to the Higher Education (HE) sector. In this paper, we propose an in-depth analysis process which we then critically apply to review, compare and classify 20 existing ERAs and RMs targeted to the HE domain. Our process uses a common set of 12 definitional attributes. In so doing, we contribute to the existing body of knowledge by providing a unified, structured and comprehensive analysis process and catalog of these abstract EA artifacts. With this we aim to create awareness on their potential practical utility and to increase their visibility, transparency and opportunity for their reusability by different HE stakeholders. Hence, the proposed process and catalog is expected to be useful both for practitioners and researchers by providing a panoramic view of more or less ready-to-use existing ERAs and RMs for HE, as well as a structure way to regard them. Moreover, and by specifying their main scope, coverage and extend of knowledge captured, the process and catalog might become a valuable tool for providing guidance to HE stakeholders on making better-informed decisions on the selection of suitable architectural artifacts for being conveniently adapted or applied in different EA practices conducted at their respective institutions.
企业参考架构(era)和参考模型(rm)在过去几年中作为相关工具出现,用于改进企业架构(EA)实践的质量和有效性。虽然针对不同行业和业务类型提出了各种不同的era和rm,但其中只有少数是专门针对高等教育(HE)部门的。在本文中,我们提出了一个深入的分析过程,然后我们批判性地应用于审查,比较和分类20个现有的针对HE领域的era和rm。我们的流程使用一组共有12个定义属性。在这样做的过程中,我们通过提供这些抽象EA工件的统一的、结构化的和全面的分析过程和目录,为现有的知识体系做出贡献。这样,我们的目标是让人们意识到它们潜在的实际效用,并增加它们的可见性、透明度和机会,以便不同的HE涉众可以重用它们。因此,所建议的过程和目录有望对从业者和研究人员都很有用,因为它为HE提供了或多或少现成的现有era和rm的全景视图,以及一种考虑它们的结构方式。此外,通过指定它们的主要范围、覆盖范围和所获取的知识的扩展,过程和目录可能会成为一个有价值的工具,为HE涉众提供指导,以便在选择合适的体系结构工件方面做出更明智的决策,以便在各自机构进行的不同EA实践中方便地进行调整或应用。
{"title":"First in-depth analysis of enterprise architectures and models for higher education institutions","authors":"Felix Sanchez-Puchol, J. Pastor-Collado, Baptista Borrell","doi":"10.33965/IJCSIS_2018130203","DOIUrl":"https://doi.org/10.33965/IJCSIS_2018130203","url":null,"abstract":"Enterprise Reference Architectures (ERAs) and Reference Models (RMs) have emerged over the last years as relevant instruments for improving the quality and effectiveness of enterprise architecture (EA) practice. Whilst a wide variety of different ERAs and RMs have been proposed for different industries and types of business, only few of them have been devoted to the Higher Education (HE) sector. In this paper, we propose an in-depth analysis process which we then critically apply to review, compare and classify 20 existing ERAs and RMs targeted to the HE domain. Our process uses a common set of 12 definitional attributes. In so doing, we contribute to the existing body of knowledge by providing a unified, structured and comprehensive analysis process and catalog of these abstract EA artifacts. With this we aim to create awareness on their potential practical utility and to increase their visibility, transparency and opportunity for their reusability by different HE stakeholders. Hence, the proposed process and catalog is expected to be useful both for practitioners and researchers by providing a panoramic view of more or less ready-to-use existing ERAs and RMs for HE, as well as a structure way to regard them. Moreover, and by specifying their main scope, coverage and extend of knowledge captured, the process and catalog might become a valuable tool for providing guidance to HE stakeholders on making better-informed decisions on the selection of suitable architectural artifacts for being conveniently adapted or applied in different EA practices conducted at their respective institutions.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85222434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Video color grading via deep neural networks 基于深度神经网络的视频色彩分级
IF 0.2 Pub Date : 2018-12-17 DOI: 10.33965/IJCSIS_2018130201
J. Gibbs
The task of color grading (or color correction) for film and video is significant and complex, involving aesthetic and technical decisions that require a trained operator and a good deal of time. In order to determine whether deep neural networks are capable of learning this complex aesthetic task, we compare two network frameworks—a classification network, and a conditional generative adversarial network, or cGAN—examining the quality and consistency of their output as potential automated solutions to color correction. Results are very good for both networks, though each exhibits problem areas. The classification network has issues with generalizing due to the need to collect and especially to label all data being used to train it. The cGAN on the other hand can use unlabeled data, which is much easier to collect. While the classification network does not directly affect images, only identifying image problems, the cGAN, creates a new image, introducing potential image degradation in the process; thus multiple adjustments to the network need to be made to create high quality output. We find that the data labeling issue for the classification network is a less tractable problem than the image correction and continuity issues discovered with the cGAN method, which have direct solutions. Thus we conclude the cGAN is the more promising network with which to automate color correction and grading.
电影和视频的色彩分级(或色彩校正)任务重要而复杂,涉及美学和技术决策,需要训练有素的操作员和大量的时间。为了确定深度神经网络是否能够学习这种复杂的美学任务,我们比较了两个网络框架——分类网络和条件生成对抗网络,或cgan——检查它们输出的质量和一致性,作为颜色校正的潜在自动化解决方案。两个网络的结果都非常好,尽管每个网络都有问题。由于需要收集,特别是需要标记用于训练的所有数据,分类网络在泛化方面存在问题。另一方面,cGAN可以使用未标记的数据,这更容易收集。虽然分类网络不直接影响图像,仅识别图像问题,但cGAN创建新图像,在此过程中引入潜在的图像退化;因此,需要对网络进行多次调整以产生高质量的输出。我们发现,与使用cGAN方法发现的图像校正和连续性问题相比,分类网络的数据标注问题更难处理,这两个问题有直接的解决方案。因此,我们得出结论,cGAN是更有前途的网络,用于自动色彩校正和分级。
{"title":"Video color grading via deep neural networks","authors":"J. Gibbs","doi":"10.33965/IJCSIS_2018130201","DOIUrl":"https://doi.org/10.33965/IJCSIS_2018130201","url":null,"abstract":"The task of color grading (or color correction) for film and video is significant and complex, involving aesthetic and technical decisions that require a trained operator and a good deal of time. In order to determine whether deep neural networks are capable of learning this complex aesthetic task, we compare two network frameworks—a classification network, and a conditional generative adversarial network, or cGAN—examining the quality and consistency of their output as potential automated solutions to color correction. Results are very good for both networks, though each exhibits problem areas. The classification network has issues with generalizing due to the need to collect and especially to label all data being used to train it. The cGAN on the other hand can use unlabeled data, which is much easier to collect. While the classification network does not directly affect images, only identifying image problems, the cGAN, creates a new image, introducing potential image degradation in the process; thus multiple adjustments to the network need to be made to create high quality output. We find that the data labeling issue for the classification network is a less tractable problem than the image correction and continuity issues discovered with the cGAN method, which have direct solutions. Thus we conclude the cGAN is the more promising network with which to automate color correction and grading.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72511810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of tcp spurious timeout detection methods under delay spike and packet loss emulating lte handover 仿真lte切换时延迟尖峰和丢包情况下tcp伪超时检测方法的性能评价
IF 0.2 Pub Date : 2018-12-17 DOI: 10.33965/ijcsis_2018130202
Toshihiko Kato, M. Moriyama, R. Yamamoto, S. Ohzahata
This paper describes the performance evaluation of the well-known spurious timeout detection methods implemented within TCP, Eifel, DSACK, and F-RTO, through experiments with the network emulator emulating handovers over LTE (Long Term Evolution) networks. Specifically, the emulator supports to insert the time-variant delay and packet loss in TCP streams. By taking account of the lossless handover in LTE, this paper shows the results for the cases only the delay spike is inserted, and both delay spike and packet loss are inserted. In the former case, the three methods show the similar performance, but in the latter case, the performance of Eifel is worse than the others. This paper also shows the results when two methods are used together for the delay spike and packet loss case, and indicates that the performance is not improved even if multiple spurious timeout detection methods are implemented.
本文描述了在TCP, Eifel, DSACK和F-RTO中实现的众所周知的虚假超时检测方法的性能评估,通过在LTE(长期演进)网络上模拟切换的网络模拟器进行实验。具体来说,仿真器支持在TCP流中插入时变延迟和丢包。考虑到LTE的无损切换特性,给出了只插入延迟尖峰和同时插入延迟尖峰和丢包两种情况下的结果。在前一种情况下,三种方法表现出相似的性能,但在后一种情况下,Eifel的性能比其他方法差。本文还给出了两种方法同时应用于延迟尖峰和丢包情况下的结果,并指出即使采用多种假超时检测方法,性能也没有提高。
{"title":"Performance evaluation of tcp spurious timeout detection methods under delay spike and packet loss emulating lte handover","authors":"Toshihiko Kato, M. Moriyama, R. Yamamoto, S. Ohzahata","doi":"10.33965/ijcsis_2018130202","DOIUrl":"https://doi.org/10.33965/ijcsis_2018130202","url":null,"abstract":"This paper describes the performance evaluation of the well-known spurious timeout detection methods implemented within TCP, Eifel, DSACK, and F-RTO, through experiments with the network emulator emulating handovers over LTE (Long Term Evolution) networks. Specifically, the emulator supports to insert the time-variant delay and packet loss in TCP streams. By taking account of the lossless handover in LTE, this paper shows the results for the cases only the delay spike is inserted, and both delay spike and packet loss are inserted. In the former case, the three methods show the similar performance, but in the latter case, the performance of Eifel is worse than the others. This paper also shows the results when two methods are used together for the delay spike and packet loss case, and indicates that the performance is not improved even if multiple spurious timeout detection methods are implemented.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77262995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feasibility analysis of using the maui scheduler for job simulation of large-scale pbs based clusters maui调度器用于大规模pbs集群作业模拟的可行性分析
IF 0.2 Pub Date : 2018-12-17 DOI: 10.33965/IJCSIS_2018130204
Georg Zitzlsberger, B. Jansik, J. Martinovič
For large-scale High Performance Computing centers with a wide range of different projects and heterogeneous infrastructures, efficiency is an important consideration. Understanding how compute jobs are scheduled is necessary for improving the job scheduling strategies in order to optimize cluster utilization and job wait times. This increases the importance of a reliable simulation capability, which in turn requires accuracy and comparability with historic workloads from the cluster. Not all job schedulers have a simulation capability, including the Portable Batch System (PBS) resource manager. Hence, PBS based centers have no direct way to simulate changes and optimizations before they are applied to the production system. We propose and discuss how to run job simulations for large-scale PBS based clusters with the Maui Scheduler. This also includes awareness of node downtimes, scheduled and unexpected. For validation purposes, we use historic workloads collected at the IT4Innovations supercomputing center. The viability of our approach is demonstrated by measuring the accuracy of the simulation results compared to the real workloads. In addition, we discuss how the change of the simulator’s time step resolution affects the accuracy as well as simulation times. We are confident that our approach is also transferable to enable job simulations for other computing centers using PBS.
对于具有各种不同项目和异构基础设施的大型高性能计算中心,效率是一个重要的考虑因素。为了优化集群利用率和作业等待时间,了解如何调度计算作业是改进作业调度策略所必需的。这增加了可靠的模拟功能的重要性,这反过来又需要与集群的历史工作负载的准确性和可比性。并非所有作业调度器都具有模拟功能,包括便携式批处理系统(Portable Batch System, PBS)资源管理器。因此,基于PBS的中心在将更改和优化应用到生产系统之前没有直接的方法来模拟它们。我们提出并讨论了如何使用Maui Scheduler为基于大规模PBS的集群运行作业模拟。这还包括了解节点停机时间,计划的和意外的。出于验证目的,我们使用了在IT4Innovations超级计算中心收集的历史工作负载。通过测量仿真结果与实际工作负载的准确性,证明了我们方法的可行性。此外,还讨论了仿真器时间步长分辨率的变化对仿真精度和仿真次数的影响。我们相信,我们的方法也可以转移到使用PBS的其他计算中心进行工作模拟。
{"title":"Feasibility analysis of using the maui scheduler for job simulation of large-scale pbs based clusters","authors":"Georg Zitzlsberger, B. Jansik, J. Martinovič","doi":"10.33965/IJCSIS_2018130204","DOIUrl":"https://doi.org/10.33965/IJCSIS_2018130204","url":null,"abstract":"For large-scale High Performance Computing centers with a wide range of different projects and heterogeneous infrastructures, efficiency is an important consideration. Understanding how compute jobs are scheduled is necessary for improving the job scheduling strategies in order to optimize cluster utilization and job wait times. This increases the importance of a reliable simulation capability, which in turn requires accuracy and comparability with historic workloads from the cluster. Not all job schedulers have a simulation capability, including the Portable Batch System (PBS) resource manager. Hence, PBS based centers have no direct way to simulate changes and optimizations before they are applied to the production system. We propose and discuss how to run job simulations for large-scale PBS based clusters with the Maui Scheduler. This also includes awareness of node downtimes, scheduled and unexpected. For validation purposes, we use historic workloads collected at the IT4Innovations supercomputing center. The viability of our approach is demonstrated by measuring the accuracy of the simulation results compared to the real workloads. In addition, we discuss how the change of the simulator’s time step resolution affects the accuracy as well as simulation times. We are confident that our approach is also transferable to enable job simulations for other computing centers using PBS.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90653987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Uri-aware user input interfaces for the unobtrusive reference to linked data 支持uri的用户输入接口,用于不显眼地引用链接数据
IF 0.2 Pub Date : 2018-12-17 DOI: 10.33965/IJCSIS_2018130205
André Langer, Christoph Göpfert, M. Gaedke
Using appropriate entity URIs is a crucial factor for the success of semantic-enabled applications for data management and data retrieval. Especially data applications that collect data to build knowledge graphs rely on correct concept identifiers in favor of ambiguous literals. This collection involves human interaction in the web frontend without annoying the user. But appropriate user interfaces for this task are still a challenge. In this article, we focus on the design of form elements that unobtrusively allow input data both for human and machine interaction from a semantic point of view. Motivated by web-based scholarly document-submission systems, we first present a brief current-state analysis on the support of semantic input operations, investigate how these users input interfaces can be improved for concept linking purposes with an auto-suggestion behavior and finally evaluate with a proof-of concept implementation and user survey the advantages and acceptance of our approach.
使用适当的实体uri是支持语义的数据管理和数据检索应用程序成功的关键因素。特别是收集数据以构建知识图的数据应用程序依赖于正确的概念标识符,而不是模棱两可的字面量。这个集合包含了web前端的人机交互,而不会惹恼用户。但是为这项任务提供合适的用户界面仍然是一个挑战。在本文中,我们将重点关注表单元素的设计,从语义的角度来看,表单元素可以不显眼地为人机交互提供输入数据。在基于网络的学术文件提交系统的激励下,我们首先对语义输入操作的支持进行了简要的现状分析,研究了如何通过自动建议行为来改进这些用户输入界面,以实现概念链接的目的,最后通过概念验证实现和用户调查来评估我们方法的优势和接受程度。
{"title":"Uri-aware user input interfaces for the unobtrusive reference to linked data","authors":"André Langer, Christoph Göpfert, M. Gaedke","doi":"10.33965/IJCSIS_2018130205","DOIUrl":"https://doi.org/10.33965/IJCSIS_2018130205","url":null,"abstract":"Using appropriate entity URIs is a crucial factor for the success of semantic-enabled applications for data management and data retrieval. Especially data applications that collect data to build knowledge graphs rely on correct concept identifiers in favor of ambiguous literals. This collection involves human interaction in the web frontend without annoying the user. But appropriate user interfaces for this task are still a challenge. In this article, we focus on the design of form elements that unobtrusively allow input data both for human and machine interaction from a semantic point of view. Motivated by web-based scholarly document-submission systems, we first present a brief current-state analysis on the support of semantic input operations, investigate how these users input interfaces can be improved for concept linking purposes with an auto-suggestion behavior and finally evaluate with a proof-of concept implementation and user survey the advantages and acceptance of our approach.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86832066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluating user vulnerabilities vs phisher skills in spear phishing 评估用户漏洞与鱼叉式网络钓鱼中的钓鱼者技能
IF 0.2 Pub Date : 2018-12-17 DOI: 10.33965/ijcsis_2018130207
Mathew Nicho, H. Fakhry, Uche Egbue
Spear phishing emails pose great danger to employees of organizations due to the inherent weakness of the employees in identifying the threat from spear phishing cues, as well as the spear phisher’s skill in crafting contextually convincing emails. This raises the main question of which construct (user vulnerabilities or phisher skills) has a greater influence on the vulnerable user. Researchers have provided enough evidence of user vulnerabilities, namely the desire for monetary gain, curiosity of the computer user, carelessness on the part of the user, the trust placed in the purported sender by the user, and a lack of awareness on the part of the computer user. However, there is a lack of research on the magnitude of each of these factors in influencing an unsuspecting user to fall for a phishing or spear phishing attack which we explored in this paper. While user vulnerabilities pose major risk, the effect of the spear phisher’s ability in skillfully crafting convincing emails (using fear appeals, urgency of action, and email contextualization) to trap even skillful IT security personnel is an area that needs to be explored. Therefore, we explored the relationships between the two major constructs namely ‘user vulnerabilities’ and ‘email contextualization’, through the theory of planned behavior with the objective to find out the major factors that lead to computer users biting the phishers’ bait. In this theoretical version of the paper, we provided the resulting two constructs that needed to be tested.
鱼叉式网络钓鱼邮件给组织的员工带来了巨大的危险,因为员工在识别鱼叉式网络钓鱼线索的威胁方面存在固有的弱点,以及鱼叉式网络钓鱼者在制作上下文令人信服的电子邮件方面的技能。这就提出了一个主要问题,即哪种构造(用户漏洞还是网络钓鱼者技能)对易受攻击的用户有更大的影响。研究人员已经提供了足够的证据证明用户的脆弱性,即对金钱利益的渴望,计算机用户的好奇心,用户的粗心大意,用户对所谓的发件人的信任,以及计算机用户缺乏意识。然而,我们在本文中探讨的影响毫无戒心的用户遭受网络钓鱼或鱼叉式网络钓鱼攻击的每个因素的大小,缺乏研究。虽然用户漏洞构成了主要风险,但鱼叉式网络钓鱼者熟练地制作令人信服的电子邮件(使用恐惧呼吁、行动紧迫性和电子邮件上下文化)来诱骗甚至熟练的IT安全人员的能力的影响是一个需要探索的领域。因此,我们通过计划行为理论,探索“用户漏洞”和“邮件语境化”这两个主要构式之间的关系,目的是找出导致计算机用户上钩的主要因素。在本文的理论版本中,我们提供了需要测试的两个构造。
{"title":"Evaluating user vulnerabilities vs phisher skills in spear phishing","authors":"Mathew Nicho, H. Fakhry, Uche Egbue","doi":"10.33965/ijcsis_2018130207","DOIUrl":"https://doi.org/10.33965/ijcsis_2018130207","url":null,"abstract":"Spear phishing emails pose great danger to employees of organizations due to the inherent weakness of the employees in identifying the threat from spear phishing cues, as well as the spear phisher’s skill in crafting contextually convincing emails. This raises the main question of which construct (user vulnerabilities or phisher skills) has a greater influence on the vulnerable user. Researchers have provided enough evidence of user vulnerabilities, namely the desire for monetary gain, curiosity of the computer user, carelessness on the part of the user, the trust placed in the purported sender by the user, and a lack of awareness on the part of the computer user. However, there is a lack of research on the magnitude of each of these factors in influencing an unsuspecting user to fall for a phishing or spear phishing attack which we explored in this paper. While user vulnerabilities pose major risk, the effect of the spear phisher’s ability in skillfully crafting convincing emails (using fear appeals, urgency of action, and email contextualization) to trap even skillful IT security personnel is an area that needs to be explored. Therefore, we explored the relationships between the two major constructs namely ‘user vulnerabilities’ and ‘email contextualization’, through the theory of planned behavior with the objective to find out the major factors that lead to computer users biting the phishers’ bait. In this theoretical version of the paper, we provided the resulting two constructs that needed to be tested.","PeriodicalId":41878,"journal":{"name":"IADIS-International Journal on Computer Science and Information Systems","volume":null,"pages":null},"PeriodicalIF":0.2,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90172557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
IADIS-International Journal on Computer Science and Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1