首页 > 最新文献

Applied Computing Review最新文献

英文 中文
Alleviating High Gas Costs by Secure and Trustless Off-chain Execution of Smart Contracts 通过安全、无信任的智能合约链下执行来降低高昂的天然气成本
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577833
Soroush Farokhnia, Amir Kafshdar Goharshady
Smart contracts are programs that are executed on the blockchain and can hold, manage and transfer assets in the form of cryptocurrencies. The contract's execution is then performed on-chain and is subject to consensus, i.e. every node on the blockchain network has to run the function calls and keep track of their side-effects including updates to the balances and contract's storage. The notion of gas is introduced in most programmable blockchains, which prevents DoS attacks from malicious parties who might try to slow down the network by performing time-consuming and resource-heavy computations. While the gas idea has largely succeeded in its goal of avoiding DoS attacks, the resulting fees are extremely high. For example, in June-September 2022, on Ethereum alone, there has been an average total gas usage of 2,706.8 ETH ≈ 3,938,749 USD per day. We propose a protocol for alleviating these costs by moving most of the computation off-chain while preserving enough data on-chain to guarantee an implicit consensus about the contract state and ownership of funds in case of dishonest parties. We perform extensive experiments over 3,330 real-world Solidity contracts that were involved in 327,132 transactions in June-September 2022 on Ethereum and show that our approach reduces their gas usage by 40.09 percent, which amounts to a whopping 442,651 USD.
智能合约是在区块链上执行的程序,可以以加密货币的形式持有、管理和转移资产。然后,合约的执行在链上执行,并受到共识的约束,即区块链网络上的每个节点都必须运行函数调用,并跟踪其副作用,包括更新余额和合约的存储。大多数可编程区块链中都引入了gas的概念,这可以防止恶意方的DoS攻击,恶意方可能会通过执行耗时且资源繁重的计算来减慢网络速度。虽然gas的想法在很大程度上成功地避免了DoS攻击,但由此产生的费用非常高。例如,在2022年6月至9月期间,仅在以太坊上,平均每天的总天然气使用量为2,706.8 ETH≈3,938,749美元。我们提出了一种协议,通过将大部分计算移到链下,同时在链上保留足够的数据,以保证在不诚实的各方的情况下,对合同状态和资金所有权达成隐含共识,从而降低这些成本。我们对3330份真实世界的Solidity合约进行了广泛的实验,这些合约在2022年6月至9月期间在以太坊上进行了327,132笔交易,并表明我们的方法将他们的天然气使用量减少了40.09%,这相当于高达442,651美元。
{"title":"Alleviating High Gas Costs by Secure and Trustless Off-chain Execution of Smart Contracts","authors":"Soroush Farokhnia, Amir Kafshdar Goharshady","doi":"10.1145/3555776.3577833","DOIUrl":"https://doi.org/10.1145/3555776.3577833","url":null,"abstract":"Smart contracts are programs that are executed on the blockchain and can hold, manage and transfer assets in the form of cryptocurrencies. The contract's execution is then performed on-chain and is subject to consensus, i.e. every node on the blockchain network has to run the function calls and keep track of their side-effects including updates to the balances and contract's storage. The notion of gas is introduced in most programmable blockchains, which prevents DoS attacks from malicious parties who might try to slow down the network by performing time-consuming and resource-heavy computations. While the gas idea has largely succeeded in its goal of avoiding DoS attacks, the resulting fees are extremely high. For example, in June-September 2022, on Ethereum alone, there has been an average total gas usage of 2,706.8 ETH ≈ 3,938,749 USD per day. We propose a protocol for alleviating these costs by moving most of the computation off-chain while preserving enough data on-chain to guarantee an implicit consensus about the contract state and ownership of funds in case of dishonest parties. We perform extensive experiments over 3,330 real-world Solidity contracts that were involved in 327,132 transactions in June-September 2022 on Ethereum and show that our approach reduces their gas usage by 40.09 percent, which amounts to a whopping 442,651 USD.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"137 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77813297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Sanitization Design for LSM-based Key-Value Store over 3D MLC NAND Flash 基于lsm的3D MLC NAND闪存键值存储的高效消毒设计
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577780
Liang-Chi Chen, Shu-Qi Yu, Chien-Chung Ho, Wei-Chen Wang, Yung-Chun Li
Conventional LSM tree designs delete data by inserting a delete mark to the specified key, and they thus it leaves several out-of-date values to the specified key on the LSM tree. As a result, the LSM tree encounters a serious data security issue due to the undeleted values when there arises the need for data sanitization. Sanitization is a time-consuming process that involves completely removing sensitive data from storage devices. Flash-based SSDs are widely used in many systems, but they lack an in-place update feature, which makes it difficult for LSM trees to maintain both privacy and performance on these devices. This work proposes an efficient sanitizable LSM-tree design for LSM-based key-value store over 3D NAND flash memories. Our proposed efficient sanitizable LSM-tree design focuses on integrating the processes of key-value pair updating and the execution of sanitization by exploiting our proposed influence-conscious programming method. The capability of the proposed design is evaluated by a series of experiments, for which we have very encouraging results.
传统的LSM树设计通过在指定的键中插入删除标记来删除数据,因此会在LSM树中为指定的键留下一些过期的值。因此,当需要进行数据清理时,由于未删除的值,LSM树会遇到严重的数据安全问题。消毒处理是一个耗时的过程,需要从存储设备中完全移除敏感数据。基于闪存的ssd广泛应用于许多系统,但它们缺乏就地更新功能,这使得LSM树难以在这些设备上同时维护隐私和性能。本研究提出了一种高效的可清理lsm树设计,用于基于lsm的键值存储在3D NAND闪存上。我们提出的高效的可清理的lsm树设计侧重于通过利用我们提出的影响意识编程方法集成键值对更新和清理的执行过程。通过一系列实验对所提出设计的性能进行了评价,得到了令人鼓舞的结果。
{"title":"Efficient Sanitization Design for LSM-based Key-Value Store over 3D MLC NAND Flash","authors":"Liang-Chi Chen, Shu-Qi Yu, Chien-Chung Ho, Wei-Chen Wang, Yung-Chun Li","doi":"10.1145/3555776.3577780","DOIUrl":"https://doi.org/10.1145/3555776.3577780","url":null,"abstract":"Conventional LSM tree designs delete data by inserting a delete mark to the specified key, and they thus it leaves several out-of-date values to the specified key on the LSM tree. As a result, the LSM tree encounters a serious data security issue due to the undeleted values when there arises the need for data sanitization. Sanitization is a time-consuming process that involves completely removing sensitive data from storage devices. Flash-based SSDs are widely used in many systems, but they lack an in-place update feature, which makes it difficult for LSM trees to maintain both privacy and performance on these devices. This work proposes an efficient sanitizable LSM-tree design for LSM-based key-value store over 3D NAND flash memories. Our proposed efficient sanitizable LSM-tree design focuses on integrating the processes of key-value pair updating and the execution of sanitization by exploiting our proposed influence-conscious programming method. The capability of the proposed design is evaluated by a series of experiments, for which we have very encouraging results.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"11 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90538526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MUTUAL: Multi-Domain Sentiment Classification via Uncertainty Sampling MUTUAL:基于不确定性采样的多领域情感分类
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577765
K. Katsarou, Roxana Jeney, K. Stefanidis
Multi-domain sentiment classification trains a classifier using multiple domains and then tests the classifier on one of the domains. Importantly, no domain is assumed to have sufficient labeled data; instead, the goal is leveraging information between domains, making multi-domain sentiment classification a very realistic scenario. Typically, labeled data is costly because humans must classify it manually. In this context, we propose the MUTUAL approach that learns general and domain-specific sentence embeddings that are also context-aware due to the attention mechanism. In this work, we propose using a stacked BiLSTM-based Autoencoder with an attention mechanism to generate the two above-mentioned types of sentence embeddings. Then, using the Jensen-Shannon (JS) distance, the general sentence embeddings of the four most similar domains to the target domain are selected. The selected general sentence embeddings and the domain-specific embeddings are concatenated and fed into a dense layer for training. Evaluation results on public datasets with 16 different domains demonstrate the efficiency of our model. In addition, we propose an active learning algorithm that first applies the elliptic envelope for outlier removal to a pool of unlabeled data that the MUTUAL model then classifies. Next, the most uncertain data points are selected to be labeled based on the least confidence metric. The experiments show higher accuracy for querying 38% of the original data than random sampling.
多领域情感分类利用多个领域训练分类器,然后在其中一个领域上对分类器进行测试。重要的是,没有假设领域有足够的标记数据;相反,目标是利用域之间的信息,使多域情感分类成为一个非常现实的场景。通常,标记数据的成本很高,因为人类必须手动对其进行分类。在这种情况下,我们提出了MUTUAL方法,该方法学习一般和特定领域的句子嵌入,由于注意机制,它们也具有上下文感知能力。在这项工作中,我们提出使用一种带有注意机制的基于堆叠bilstm的自动编码器来生成上述两种类型的句子嵌入。然后,利用Jensen-Shannon (JS)距离,选择与目标域最相似的4个域的一般句子嵌入。将选择的一般句子嵌入和特定领域嵌入连接并馈送到密集层中进行训练。在16个不同领域的公共数据集上的评估结果证明了该模型的有效性。此外,我们提出了一种主动学习算法,该算法首先将椭圆包络用于异常值去除,然后对MUTUAL模型进行分类的未标记数据池进行分类。其次,选择最不确定的数据点,根据最小置信度度量进行标记。实验表明,与随机抽样相比,对原始数据的查询精度提高了38%。
{"title":"MUTUAL: Multi-Domain Sentiment Classification via Uncertainty Sampling","authors":"K. Katsarou, Roxana Jeney, K. Stefanidis","doi":"10.1145/3555776.3577765","DOIUrl":"https://doi.org/10.1145/3555776.3577765","url":null,"abstract":"Multi-domain sentiment classification trains a classifier using multiple domains and then tests the classifier on one of the domains. Importantly, no domain is assumed to have sufficient labeled data; instead, the goal is leveraging information between domains, making multi-domain sentiment classification a very realistic scenario. Typically, labeled data is costly because humans must classify it manually. In this context, we propose the MUTUAL approach that learns general and domain-specific sentence embeddings that are also context-aware due to the attention mechanism. In this work, we propose using a stacked BiLSTM-based Autoencoder with an attention mechanism to generate the two above-mentioned types of sentence embeddings. Then, using the Jensen-Shannon (JS) distance, the general sentence embeddings of the four most similar domains to the target domain are selected. The selected general sentence embeddings and the domain-specific embeddings are concatenated and fed into a dense layer for training. Evaluation results on public datasets with 16 different domains demonstrate the efficiency of our model. In addition, we propose an active learning algorithm that first applies the elliptic envelope for outlier removal to a pool of unlabeled data that the MUTUAL model then classifies. Next, the most uncertain data points are selected to be labeled based on the least confidence metric. The experiments show higher accuracy for querying 38% of the original data than random sampling.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89737340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rotated-DETR: an End-to-End Transformer-based Oriented Object Detector for Aerial Images 旋转- detr:一种基于端到端变换的航空图像定向目标检测器
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577745
Gil-beom Lee, Jinbeom Kim, Taejune Kim, Simon S. Woo
Oriented object detection in aerial images is a challenging task due to the highly complex backgrounds and objects with arbitrary oriented and usually densely arranged. Existing oriented object detection methods adopt CNN-based methods, and they can be divided into three types: two-stage, one-stage, and anchor-free methods. All of them require non-maximum suppression (NMS) to eliminate the duplicated predictions. Recently, object detectors based on the transformer remove hand-designed components by directly solving set prediction problems via performing bipartite matching, and achieve state-of-the-art performances in general object detection. Motivated by this research, we propose a transformer-based oriented object detector named Rotated DETR with oriented bounding boxes (OBBs) labeling. We embed the scoring network to reduce the tokens corresponding to the background. In addition, we apply a proposal generator and iterative proposal refinement module in order to provide proposals with angle information to the transformer decoder. Rotated DETR achieves state-of-the-art performance on the single-stage and anchor-free oriented object detectors on DOTA, UCAS-AOD, and DIOR-R datasets with only 10% feature tokens. In the experiment, we show the effectiveness of the scoring network and iterative proposal refinement module.
航空图像中的定向目标检测是一项非常具有挑战性的任务,因为背景和目标的方向任意且通常排列密集。现有的面向目标检测方法采用基于cnn的方法,分为两阶段、一阶段和无锚点三种方法。它们都需要非最大抑制(NMS)来消除重复的预测。近年来,基于变压器的目标检测器通过执行二部匹配直接解决集合预测问题,从而消除了人工设计的组件,达到了一般目标检测中最先进的性能。受此研究启发,我们提出了一种基于变压器的定向目标检测器,命名为旋转DETR,带有定向边界框(OBBs)标记。我们嵌入了评分网络来减少与背景相对应的token。此外,为了向变压器解码器提供具有角度信息的提案,我们应用提案生成器和迭代提案细化模块。在DOTA、UCAS-AOD和DIOR-R数据集上,旋转DETR在单级和无锚定向目标检测器上实现了最先进的性能,只有10%的特征令牌。在实验中,我们证明了评分网络和迭代提议优化模块的有效性。
{"title":"Rotated-DETR: an End-to-End Transformer-based Oriented Object Detector for Aerial Images","authors":"Gil-beom Lee, Jinbeom Kim, Taejune Kim, Simon S. Woo","doi":"10.1145/3555776.3577745","DOIUrl":"https://doi.org/10.1145/3555776.3577745","url":null,"abstract":"Oriented object detection in aerial images is a challenging task due to the highly complex backgrounds and objects with arbitrary oriented and usually densely arranged. Existing oriented object detection methods adopt CNN-based methods, and they can be divided into three types: two-stage, one-stage, and anchor-free methods. All of them require non-maximum suppression (NMS) to eliminate the duplicated predictions. Recently, object detectors based on the transformer remove hand-designed components by directly solving set prediction problems via performing bipartite matching, and achieve state-of-the-art performances in general object detection. Motivated by this research, we propose a transformer-based oriented object detector named Rotated DETR with oriented bounding boxes (OBBs) labeling. We embed the scoring network to reduce the tokens corresponding to the background. In addition, we apply a proposal generator and iterative proposal refinement module in order to provide proposals with angle information to the transformer decoder. Rotated DETR achieves state-of-the-art performance on the single-stage and anchor-free oriented object detectors on DOTA, UCAS-AOD, and DIOR-R datasets with only 10% feature tokens. In the experiment, we show the effectiveness of the scoring network and iterative proposal refinement module.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"10 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89429724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are alternatives to backpropagation useful for training Binary Neural Networks? An experimental study in image classification 反向传播的替代方法对训练二元神经网络有用吗?图像分类的实验研究
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577674
Ben Crulis, Barthélémy Serres, Cyril de Runz, G. Venturini
Current artificial neural networks are trained with parameters encoded as floating point numbers that occupy lots of memory space at inference time. Due to the increase in size of deep learning models, it is becoming very difficult to consider training and using artificial neural networks on edge devices such as smartphones. Binary neural networks promise to reduce the size of deep neural network models as well as increasing inference speed while decreasing energy consumption and so allow the deployment of more powerful models on edge devices. However, binary neural networks are still proven to be difficult to train using the backpropagation based gradient descent scheme. We propose to adapt to binary neural networks two training algorithms considered as promising alternatives to backpropagation but for continuous neural networks. We provide experimental comparative results for image classification including the backpropagation baseline on the MNIST, Fashion MNIST and CIFAR-10 datasets in both continuous and binary settings. The results demonstrate that binary neural networks can not only be trained using alternative algorithms to backpropagation but can also be shown to lead better performance and a higher tolerance to the presence or absence of batch normalization layers.
目前的人工神经网络是用浮点数编码的参数来训练的,在推理时占用了大量的内存空间。由于深度学习模型规模的增加,考虑在智能手机等边缘设备上训练和使用人工神经网络变得非常困难。二元神经网络有望减少深度神经网络模型的大小,提高推理速度,同时降低能耗,从而允许在边缘设备上部署更强大的模型。然而,使用基于反向传播的梯度下降方案训练二元神经网络仍然被证明是困难的。我们提出了适合于二元神经网络的两种训练算法,这两种算法被认为是有前途的反向传播替代方案,但适用于连续神经网络。在连续和二进制设置下,我们提供了包括MNIST、Fashion MNIST和CIFAR-10数据集上的反向传播基线图像分类的实验比较结果。结果表明,二元神经网络不仅可以使用反向传播的替代算法进行训练,而且还可以显示出更好的性能和对批处理归一化层存在或不存在的更高容忍度。
{"title":"Are alternatives to backpropagation useful for training Binary Neural Networks? An experimental study in image classification","authors":"Ben Crulis, Barthélémy Serres, Cyril de Runz, G. Venturini","doi":"10.1145/3555776.3577674","DOIUrl":"https://doi.org/10.1145/3555776.3577674","url":null,"abstract":"Current artificial neural networks are trained with parameters encoded as floating point numbers that occupy lots of memory space at inference time. Due to the increase in size of deep learning models, it is becoming very difficult to consider training and using artificial neural networks on edge devices such as smartphones. Binary neural networks promise to reduce the size of deep neural network models as well as increasing inference speed while decreasing energy consumption and so allow the deployment of more powerful models on edge devices. However, binary neural networks are still proven to be difficult to train using the backpropagation based gradient descent scheme. We propose to adapt to binary neural networks two training algorithms considered as promising alternatives to backpropagation but for continuous neural networks. We provide experimental comparative results for image classification including the backpropagation baseline on the MNIST, Fashion MNIST and CIFAR-10 datasets in both continuous and binary settings. The results demonstrate that binary neural networks can not only be trained using alternative algorithms to backpropagation but can also be shown to lead better performance and a higher tolerance to the presence or absence of batch normalization layers.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"35 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77059636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating Phenotypic Characteristics of Tuberculosis Bacteria 估计结核杆菌的表型特征
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578609
D. Sloan, E. Dombay, W. Sabiiti, B. Mtafya, Ognjen Arandelovic, Marios Zachariou
Microscopy analysis of sputum images for bacilli screening is a common method used for both diagnosis and therapy monitoring of tuberculosis (TB). Nonetheless, it is a challenging procedure, since sputum examination is time-consuming and needs highly competent personnel to provide accurate results which are important for clinical decision-making. In addition, manual fluorescence microscopy examination of sputum samples for tuberculosis diagnosis and treatment monitoring is a subjective operation. In this work, we automate the process of examining fields of view (FOVs) of TB bacteria in order to determine the lipid content, and bacterial length and width. We propose a modified version of the UNet model to rapidly localise potential bacteria inside a FOV. We introduce a novel method that uses Fourier descriptors to exclude contours that do not belong to the class of bacteria, hence minimising the amount of false positives. Finally, we propose a new feature as a means of extracting a representation fed into a support vector multi-regressor in order to estimate the length and width of each bacterium. Using a real-world data corpus, the proposed method i) outperformed previous methods, and ii) estimated the cell length and width with a root mean square error of less than 0.01%.
痰图像显微镜分析用于杆菌筛查是结核病(TB)诊断和治疗监测的常用方法。然而,这是一个具有挑战性的过程,因为痰液检查耗时,需要高素质的人员提供准确的结果,这对临床决策很重要。此外,人工荧光显微镜检查痰样进行肺结核诊断和治疗监测是一种主观操作。在这项工作中,我们自动化了检查TB细菌视野(FOVs)的过程,以确定脂质含量,细菌的长度和宽度。我们提出了一个修改版本的UNet模型,以快速定位潜在细菌在视场内。我们引入了一种新的方法,使用傅里叶描述符来排除不属于细菌类的轮廓,从而最大限度地减少误报的数量。最后,我们提出了一种新的特征,作为一种提取表征的手段,该表征被输入到支持向量多回归器中,以估计每个细菌的长度和宽度。使用真实世界的数据语料库,所提出的方法i)优于先前的方法,ii)估计单元长度和宽度的均方根误差小于0.01%。
{"title":"Estimating Phenotypic Characteristics of Tuberculosis Bacteria","authors":"D. Sloan, E. Dombay, W. Sabiiti, B. Mtafya, Ognjen Arandelovic, Marios Zachariou","doi":"10.1145/3555776.3578609","DOIUrl":"https://doi.org/10.1145/3555776.3578609","url":null,"abstract":"Microscopy analysis of sputum images for bacilli screening is a common method used for both diagnosis and therapy monitoring of tuberculosis (TB). Nonetheless, it is a challenging procedure, since sputum examination is time-consuming and needs highly competent personnel to provide accurate results which are important for clinical decision-making. In addition, manual fluorescence microscopy examination of sputum samples for tuberculosis diagnosis and treatment monitoring is a subjective operation. In this work, we automate the process of examining fields of view (FOVs) of TB bacteria in order to determine the lipid content, and bacterial length and width. We propose a modified version of the UNet model to rapidly localise potential bacteria inside a FOV. We introduce a novel method that uses Fourier descriptors to exclude contours that do not belong to the class of bacteria, hence minimising the amount of false positives. Finally, we propose a new feature as a means of extracting a representation fed into a support vector multi-regressor in order to estimate the length and width of each bacterium. Using a real-world data corpus, the proposed method i) outperformed previous methods, and ii) estimated the cell length and width with a root mean square error of less than 0.01%.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"51 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85130465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DISO: A Domain Ontology for Modeling Dislocations in Crystalline Materials 晶体材料位错建模的领域本体
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578739
Ahmad Zainul Ihsan, S. Fathalla, S. Sandfeld
Crystalline materials, such as metals and semiconductors, nearly always contain a special defect type called dislocation. This defect decisively determines many important material properties, e.g., strength, fracture toughness, or ductility. Over the past years, significant effort has been put into understanding dislocation behavior across different length scales via experimental characterization techniques and simulations. This paper introduces the dislocation ontology (DISO), which defines the concepts and relationships related to linear defects in crystalline materials. We developed DISO using a top-down approach in which we start defining the most general concepts in the dislocation domain and subsequent specialization of them. DISO is published through a persistent URL following W3C best practices for publishing Linked Data. Two potential use cases for DISO are presented to illustrate its usefulness in the dislocation dynamics domain. The evaluation of the ontology is performed in two directions, evaluating the success of the ontology in modeling a real-world domain and the richness of the ontology.
晶体材料,如金属和半导体,几乎总是包含一种特殊的缺陷类型,称为位错。这种缺陷决定性地决定了许多重要的材料性能,例如强度、断裂韧性或延展性。在过去的几年中,通过实验表征技术和模拟,已经投入了大量的努力来理解不同长度尺度上的位错行为。本文介绍了位错本体(DISO),它定义了晶体材料中线性缺陷的相关概念和关系。我们采用自上而下的方法开发了DISO,在这种方法中,我们开始定义位错域中最一般的概念,并随后对它们进行专业化。DISO遵循发布关联数据的W3C最佳实践,通过持久URL发布。提出了DISO的两个潜在用例来说明它在位错动力学领域的有用性。对本体的评价从两个方面进行,即评价本体在现实世界领域建模的成功程度和本体的丰富性。
{"title":"DISO: A Domain Ontology for Modeling Dislocations in Crystalline Materials","authors":"Ahmad Zainul Ihsan, S. Fathalla, S. Sandfeld","doi":"10.1145/3555776.3578739","DOIUrl":"https://doi.org/10.1145/3555776.3578739","url":null,"abstract":"Crystalline materials, such as metals and semiconductors, nearly always contain a special defect type called dislocation. This defect decisively determines many important material properties, e.g., strength, fracture toughness, or ductility. Over the past years, significant effort has been put into understanding dislocation behavior across different length scales via experimental characterization techniques and simulations. This paper introduces the dislocation ontology (DISO), which defines the concepts and relationships related to linear defects in crystalline materials. We developed DISO using a top-down approach in which we start defining the most general concepts in the dislocation domain and subsequent specialization of them. DISO is published through a persistent URL following W3C best practices for publishing Linked Data. Two potential use cases for DISO are presented to illustrate its usefulness in the dislocation dynamics domain. The evaluation of the ontology is performed in two directions, evaluating the success of the ontology in modeling a real-world domain and the richness of the ontology.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"33 5 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85565649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
S-ViT: Sparse Vision Transformer for Accurate Face Recognition S-ViT:用于精确人脸识别的稀疏视觉变换
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577640
Geunsu Kim, Gyudo Park, Soohyeok Kang, Simon S. Woo
Most of the existing face recognition applications using deep learning models have leveraged CNN-based architectures as the feature extractor. However, recent studies have shown that in computer vision tasks, vision transformer-based models often outperform CNN-based models. Therefore, in this work, we propose a Sparse Vision Transformer (S-ViT) based on the Vision Transformer (ViT) architecture to improve the face recognition tasks. After the model is trained, S-ViT tends to have a sparse distribution of weights compared to ViT, so we named it according to these characteristics. Unlike the conventional ViT, our proposed S-ViT adopts image Relative Positional Encoding (iRPE) method for positional encoding. Also, S-ViT has been modified so that all token embeddings, not just class token, participate in the decoding process. Through extensive experiment, we showed that S-ViT achieves better performance in closed-set than the other baseline models, and showed better performance than the baseline ViT-based models. For example, when using ArcFace as the loss function in the identification protocol, S-ViT achieved up to 3.27% higher accuracy than ResNet50. We also show that the use of ArcFace loss functions yields greater performance gains in S-ViT than in baseline models. In addition, S-ViT has an advantage in cost-performance trade-off because it tends to be more robust to the pruning technique than the underlying model, ViT. Therefore, S-ViT offers the additional advantage, which can be applied more flexibly in the target devices with limited resources.
大多数使用深度学习模型的现有人脸识别应用都利用基于cnn的架构作为特征提取器。然而,最近的研究表明,在计算机视觉任务中,基于视觉变换的模型往往优于基于cnn的模型。因此,在这项工作中,我们提出了一种基于视觉转换器(ViT)架构的稀疏视觉转换器(S-ViT)来改进人脸识别任务。经过模型训练后,S-ViT相对于ViT的权值分布趋于稀疏,所以我们根据这些特征来命名它。与传统的ViT不同,本文提出的S-ViT采用图像相对位置编码(iRPE)方法进行位置编码。此外,S-ViT已被修改,以便所有令牌嵌入,而不仅仅是类令牌,参与解码过程。通过大量的实验,我们发现S-ViT在闭集中的性能优于其他基线模型,并且优于基于基线vit的模型。例如,在识别协议中使用ArcFace作为损失函数时,S-ViT的准确率比ResNet50高出3.27%。我们还表明,使用ArcFace损失函数在S-ViT中比在基线模型中产生更大的性能收益。此外,S-ViT在成本-性能权衡方面具有优势,因为它比底层模型ViT对剪枝技术更健壮。因此,S-ViT提供了额外的优势,可以更灵活地应用于资源有限的目标设备。
{"title":"S-ViT: Sparse Vision Transformer for Accurate Face Recognition","authors":"Geunsu Kim, Gyudo Park, Soohyeok Kang, Simon S. Woo","doi":"10.1145/3555776.3577640","DOIUrl":"https://doi.org/10.1145/3555776.3577640","url":null,"abstract":"Most of the existing face recognition applications using deep learning models have leveraged CNN-based architectures as the feature extractor. However, recent studies have shown that in computer vision tasks, vision transformer-based models often outperform CNN-based models. Therefore, in this work, we propose a Sparse Vision Transformer (S-ViT) based on the Vision Transformer (ViT) architecture to improve the face recognition tasks. After the model is trained, S-ViT tends to have a sparse distribution of weights compared to ViT, so we named it according to these characteristics. Unlike the conventional ViT, our proposed S-ViT adopts image Relative Positional Encoding (iRPE) method for positional encoding. Also, S-ViT has been modified so that all token embeddings, not just class token, participate in the decoding process. Through extensive experiment, we showed that S-ViT achieves better performance in closed-set than the other baseline models, and showed better performance than the baseline ViT-based models. For example, when using ArcFace as the loss function in the identification protocol, S-ViT achieved up to 3.27% higher accuracy than ResNet50. We also show that the use of ArcFace loss functions yields greater performance gains in S-ViT than in baseline models. In addition, S-ViT has an advantage in cost-performance trade-off because it tends to be more robust to the pruning technique than the underlying model, ViT. Therefore, S-ViT offers the additional advantage, which can be applied more flexibly in the target devices with limited resources.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"18 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81609493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Effect of Low-Ranked Documents: A New Sampling Function for Selective Gradient Boosting 关于低排序文档的效果:一种新的用于选择性梯度增强的抽样函数
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577597
C. Lucchese, Federico Marcuzzi, S. Orlando
Learning to Rank is the task of learning a ranking function from a set of query-documents pairs. Generally, documents within a query are thousands but not all documents are informative for the learning phase. Different strategies were designed to select the most informative documents from the training set. However, most of them focused on reducing the size of the training set to speed up the learning phase, sacrificing effectiveness. A first attempt in this direction was achieved by Selective Gradient Boosting a learning algorithm that makes use of customisable sampling strategy to train effective ranking models. In this work, we propose a new sampling strategy called High_Low_Sampl for selecting negative examples applicable to Selective Gradient Boosting, without compromising model effectiveness. The proposed sampling strategy allows Selective Gradient Boosting to compose a new training set by selecting from the original one three document classes: the positive examples, high-ranked negative examples and low-ranked negative examples. The resulting dataset aims at minimizing the mis-ranking risk, i.e., enhancing the discriminative power of the learned model and maintaining generalisation to unseen instances. We demonstrated through an extensive experimental analysis on publicly available datasets, that the proposed selection algorithm is able to make the most of the negative examples within the training set and leads to models capable of obtaining statistically significant improvements in terms of NDCG, compared to the state of the art.
学习排序是从一组查询文档对中学习排序函数的任务。通常,一个查询中的文档有数千个,但并不是所有文档都对学习阶段提供信息。设计了不同的策略来从训练集中选择信息量最大的文档。然而,他们中的大多数人都专注于减少训练集的大小来加快学习阶段,牺牲了效率。在这个方向上的第一次尝试是通过选择性梯度增强学习算法实现的,该算法利用可定制的采样策略来训练有效的排名模型。在这项工作中,我们提出了一种新的采样策略,称为High_Low_Sampl,用于选择适用于选择性梯度增强的负例,而不影响模型的有效性。所提出的采样策略允许选择性梯度增强从原始的三个文档类别中选择一个新的训练集:正例、高阶负例和低阶负例。生成的数据集旨在最大限度地降低错误排序的风险,即增强学习模型的判别能力,并保持对未见实例的泛化。通过对公开可用数据集的广泛实验分析,我们证明了所提出的选择算法能够在训练集中充分利用负面示例,并导致模型能够在NDCG方面获得统计上显着的改进,与最先进的状态相比。
{"title":"On the Effect of Low-Ranked Documents: A New Sampling Function for Selective Gradient Boosting","authors":"C. Lucchese, Federico Marcuzzi, S. Orlando","doi":"10.1145/3555776.3577597","DOIUrl":"https://doi.org/10.1145/3555776.3577597","url":null,"abstract":"Learning to Rank is the task of learning a ranking function from a set of query-documents pairs. Generally, documents within a query are thousands but not all documents are informative for the learning phase. Different strategies were designed to select the most informative documents from the training set. However, most of them focused on reducing the size of the training set to speed up the learning phase, sacrificing effectiveness. A first attempt in this direction was achieved by Selective Gradient Boosting a learning algorithm that makes use of customisable sampling strategy to train effective ranking models. In this work, we propose a new sampling strategy called High_Low_Sampl for selecting negative examples applicable to Selective Gradient Boosting, without compromising model effectiveness. The proposed sampling strategy allows Selective Gradient Boosting to compose a new training set by selecting from the original one three document classes: the positive examples, high-ranked negative examples and low-ranked negative examples. The resulting dataset aims at minimizing the mis-ranking risk, i.e., enhancing the discriminative power of the learned model and maintaining generalisation to unseen instances. We demonstrated through an extensive experimental analysis on publicly available datasets, that the proposed selection algorithm is able to make the most of the negative examples within the training set and leads to models capable of obtaining statistically significant improvements in terms of NDCG, compared to the state of the art.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"18 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81259953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions 弱信任假设下的可伸缩抗强制电子投票
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578730
Thomas Haines, Johannes Müller, Iñigo Querejeta-Azurmendi
Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these systems were designed to provide coercion-resistance. This property protects against potential adversaries trying to swing an election by coercing voters. Despite the multitude of existing coercion-resistant e-voting systems, to date, only few of them can handle large-scale Internet elections efficiently. One of these systems, VoteAgain (USENIX Security 2020), was originally claimed secure under similar trust assumptions to state-of-the-art e-voting systems without coercion-resistance. In this work, we review VoteAgain's security properties. We discover that, unlike originally claimed, VoteAgain is no more secure than a trivial voting system with a completely trusted election authority. In order to mitigate this issue, we propose a variant of VoteAgain which effectively mitigates trust on the election authorities and, at the same time, preserves VoteAgain's usability and efficiency. Altogether, our findings bring the state of science one step closer to the goal of scalable coercion-resistant e-voting being secure under reasonable trust assumptions.
电子投票(e-voting)在许多国家和组织中经常用于具有法律约束力的选举。为了安全地进行这样的选举,在过去的几十年里,人们提出了许多电子投票系统。值得注意的是,其中一些系统旨在提供抗矫顽力。这一属性可以防止潜在的对手试图通过胁迫选民来影响选举。尽管现有的电子投票系统众多,但迄今为止,只有少数能够有效地处理大规模的互联网选举。其中一个系统VoteAgain (USENIX Security 2020)最初被声称在与最先进的电子投票系统类似的信任假设下是安全的,没有强制阻力。在本文中,我们将回顾VoteAgain的安全属性。我们发现,与最初声称的不同,VoteAgain并不比一个具有完全可信的选举机构的微不足道的投票系统更安全。为了缓解这个问题,我们提出了一个VoteAgain的变体,它有效地减轻了对选举当局的信任,同时保持了VoteAgain的可用性和效率。总而言之,我们的研究结果使科学状态更接近可扩展的抗强制电子投票在合理信任假设下是安全的目标。
{"title":"Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions","authors":"Thomas Haines, Johannes Müller, Iñigo Querejeta-Azurmendi","doi":"10.1145/3555776.3578730","DOIUrl":"https://doi.org/10.1145/3555776.3578730","url":null,"abstract":"Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these systems were designed to provide coercion-resistance. This property protects against potential adversaries trying to swing an election by coercing voters. Despite the multitude of existing coercion-resistant e-voting systems, to date, only few of them can handle large-scale Internet elections efficiently. One of these systems, VoteAgain (USENIX Security 2020), was originally claimed secure under similar trust assumptions to state-of-the-art e-voting systems without coercion-resistance. In this work, we review VoteAgain's security properties. We discover that, unlike originally claimed, VoteAgain is no more secure than a trivial voting system with a completely trusted election authority. In order to mitigate this issue, we propose a variant of VoteAgain which effectively mitigates trust on the election authorities and, at the same time, preserves VoteAgain's usability and efficiency. Altogether, our findings bring the state of science one step closer to the goal of scalable coercion-resistant e-voting being secure under reasonable trust assumptions.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"22 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89267605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1