首页 > 最新文献

2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
On the Performance of End-to-End Routing in Complex Networks with Intermittent Links 断续链路复杂网络中端到端路由性能研究
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-100
Michikazu Ohnishi, Chuta Minamiguchi, H. Ohsaki
Emergence of IoT (Internet of Things) applications poses challenges on the networking infrastructure since those applications must accommodate a large number of end nodes (e.g., smart sensor devices), and the communication among those nodes are unreliable. In the last decade, DTN (Delay/Disruption-Tolerant Networking) has been actively studied by many researchers, which aims to provide efficient and reliable end-to-end communication in environments where end-to-end paths can not be reliably established. In DTN re-search, superiority and inferiority of several classes of routing mechanisms have been clarified. However, it is still an open question how effectively or ineffectively end-to-end routing performs in networks with moderately intermittent communication links. In this paper, we therefore address the following research questions: (1) does end-to-end routing perform effectively in a large-scale network with many nodes, each of which is connected with a few other nodes via intermittent communication links? (2) how is the average end-to-end message delivery delay affected by the degree (i.e., the total number of incoming and outgoing links) of source and destination nodes? To answer the above research questions, we analytically derive the average message delivery delay with end-to-end routing on a complex network with an arbitrary degree distribution.
IoT(物联网)应用的出现对网络基础设施提出了挑战,因为这些应用必须容纳大量的终端节点(例如智能传感器设备),而这些节点之间的通信是不可靠的。在过去的十年中,DTN (Delay/Disruption-Tolerant Networking,延迟/中断容忍网络)得到了许多研究人员的积极研究,其目的是在端到端路径无法可靠建立的环境中提供高效可靠的端到端通信。在DTN研究中,明确了几种路由机制的优劣。然而,端到端路由在具有中度间歇性通信链路的网络中如何有效或无效执行仍然是一个悬而未决的问题。因此,在本文中,我们解决了以下研究问题:(1)在具有许多节点的大型网络中,端到端路由是否有效,每个节点通过间歇通信链路与其他几个节点连接?(2)源节点和目的节点的程度(即传入和传出链路的总数)如何影响端到端消息传递的平均延迟?为了回答上述研究问题,我们解析导出了任意度分布的复杂网络上端到端路由的平均消息传递延迟。
{"title":"On the Performance of End-to-End Routing in Complex Networks with Intermittent Links","authors":"Michikazu Ohnishi, Chuta Minamiguchi, H. Ohsaki","doi":"10.1109/COMPSAC48688.2020.0-100","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-100","url":null,"abstract":"Emergence of IoT (Internet of Things) applications poses challenges on the networking infrastructure since those applications must accommodate a large number of end nodes (e.g., smart sensor devices), and the communication among those nodes are unreliable. In the last decade, DTN (Delay/Disruption-Tolerant Networking) has been actively studied by many researchers, which aims to provide efficient and reliable end-to-end communication in environments where end-to-end paths can not be reliably established. In DTN re-search, superiority and inferiority of several classes of routing mechanisms have been clarified. However, it is still an open question how effectively or ineffectively end-to-end routing performs in networks with moderately intermittent communication links. In this paper, we therefore address the following research questions: (1) does end-to-end routing perform effectively in a large-scale network with many nodes, each of which is connected with a few other nodes via intermittent communication links? (2) how is the average end-to-end message delivery delay affected by the degree (i.e., the total number of incoming and outgoing links) of source and destination nodes? To answer the above research questions, we analytically derive the average message delivery delay with end-to-end routing on a complex network with an arbitrary degree distribution.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114770303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AI and ML-Driving and Exponentiating Sustainable and Quantifiable Digital Transformation. 人工智能和机器学习驱动和指数可持续和可量化的数字化转型。
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-227
C. Naseeb
AI is a major transforming technology impacting every sector of life. AI is not a force to deprive humans and take over the control, rather a real enabler and lever for digital transformation. The former view aligns with Hollywood movies, and need to be undressed with the latter, which is realistic and becoming tangible over time as more organizations, and communities are leveraging AI's potential. Developing a practical understanding of AI, its capabilities, the challenges, and opportunities that it brings is fundamental to get the maximum out of its envisaged potential. The objective of this paper is to highlight how technology and industry have developed, discuss the role of AI in driving intelligent transformation concentrating on an applicable understanding of AI and related technologies. We introduce a new conceptual framework: AI's multi-dimensional role, to highlight its transformative power in multiple aspects. We also introduce an AI based Information and Model Governance Framework.
人工智能是一项重大的变革技术,影响着生活的方方面面。人工智能不是剥夺人类、接管人类控制权的力量,而是数字化转型的真正推动者和杠杆。前一种观点与好莱坞电影的观点一致,需要用后者来解释,随着越来越多的组织和社区利用人工智能的潜力,这是现实的,并且随着时间的推移变得切实可行。对人工智能及其能力、挑战和机遇的实际理解是最大限度地发挥其预期潜力的基础。本文的目的是强调技术和产业是如何发展的,讨论人工智能在推动智能转型中的作用,重点是对人工智能和相关技术的适用理解。我们引入了一个新的概念框架:人工智能的多维角色,以突出其在多个方面的变革力量。我们还介绍了一个基于人工智能的信息和模型治理框架。
{"title":"AI and ML-Driving and Exponentiating Sustainable and Quantifiable Digital Transformation.","authors":"C. Naseeb","doi":"10.1109/COMPSAC48688.2020.0-227","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-227","url":null,"abstract":"AI is a major transforming technology impacting every sector of life. AI is not a force to deprive humans and take over the control, rather a real enabler and lever for digital transformation. The former view aligns with Hollywood movies, and need to be undressed with the latter, which is realistic and becoming tangible over time as more organizations, and communities are leveraging AI's potential. Developing a practical understanding of AI, its capabilities, the challenges, and opportunities that it brings is fundamental to get the maximum out of its envisaged potential. The objective of this paper is to highlight how technology and industry have developed, discuss the role of AI in driving intelligent transformation concentrating on an applicable understanding of AI and related technologies. We introduce a new conceptual framework: AI's multi-dimensional role, to highlight its transformative power in multiple aspects. We also introduce an AI based Information and Model Governance Framework.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dagbase: A Decentralized Database Platform Using DAG-Based Consensus Dagbase:使用基于dag的共识的去中心化数据库平台
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-164
Yepeng Ding, Hiroyuki Sato
As the infrastructure to provide support for distributed database management systems, the distributed database platform is very important to unify the management of data distributed in intricate environments. However, a traditional distributed database platform with centralized entities faces diverse and serious threats when the central entity is compromised. Consensus mechanisms in distributed ledger technology (DLT) can enhance the capability of defending threats by decentralizing the platform, but the efficiency and cost of consensus mechanisms in classic blockchain techniques are notable issues. In this paper, we propose a novel decentralized database platform, named Dagbase, with the support of an efficient and cost-effective consensus mechanism that uses the directed acyclic graph (DAG) as the structure. Dagbase decentralizes the management and distributes data to prevent threats in untrustworthy environments, which gains benefits from recent DLT. The performance of near-native data reading and high-efficiency data writing is ensured by a layered architecture and DAG-based consensus. Furthermore, we ensure flexibility by decoupling the consensus mechanism from the architecture. Dagbase is also easy-to-use and can be integrated with mainstream database products seamlessly on account of great interoperability. The implementation demonstrates our work and the security and performance analysis are enforced for evaluation.
分布式数据库平台作为为分布式数据库管理系统提供支持的基础设施,对于统一管理分布在复杂环境中的数据具有十分重要的意义。然而,传统的集中式实体分布式数据库平台在中心实体遭到破坏时,会面临多种严重的威胁。分布式账本技术(DLT)中的共识机制可以通过去中心化平台来增强防御威胁的能力,但经典区块链技术中共识机制的效率和成本是值得注意的问题。在本文中,我们提出了一种新的去中心化数据库平台,名为Dagbase,它支持一种高效且经济的共识机制,该机制使用有向无环图(DAG)作为结构。Dagbase分散管理和分发数据,以防止不可信环境中的威胁,这从最近的DLT中获益。通过分层架构和基于dag的共识,确保了接近本机数据读取和高效数据写入的性能。此外,我们通过将共识机制与体系结构解耦来确保灵活性。Dagbase也很容易使用,可以与主流数据库产品无缝集成,因为它具有很强的互操作性。实现演示了我们的工作,并且执行了安全性和性能分析以进行评估。
{"title":"Dagbase: A Decentralized Database Platform Using DAG-Based Consensus","authors":"Yepeng Ding, Hiroyuki Sato","doi":"10.1109/COMPSAC48688.2020.0-164","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-164","url":null,"abstract":"As the infrastructure to provide support for distributed database management systems, the distributed database platform is very important to unify the management of data distributed in intricate environments. However, a traditional distributed database platform with centralized entities faces diverse and serious threats when the central entity is compromised. Consensus mechanisms in distributed ledger technology (DLT) can enhance the capability of defending threats by decentralizing the platform, but the efficiency and cost of consensus mechanisms in classic blockchain techniques are notable issues. In this paper, we propose a novel decentralized database platform, named Dagbase, with the support of an efficient and cost-effective consensus mechanism that uses the directed acyclic graph (DAG) as the structure. Dagbase decentralizes the management and distributes data to prevent threats in untrustworthy environments, which gains benefits from recent DLT. The performance of near-native data reading and high-efficiency data writing is ensured by a layered architecture and DAG-based consensus. Furthermore, we ensure flexibility by decoupling the consensus mechanism from the architecture. Dagbase is also easy-to-use and can be integrated with mainstream database products seamlessly on account of great interoperability. The implementation demonstrates our work and the security and performance analysis are enforced for evaluation.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Study on Bottleneck Bandwidth Estimation Based on Acknowledge Reception on TCP BBR TCP BBR中基于确认接收的瓶颈带宽估计研究
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-117
Kanon Sasaki, Saneyasu Yamaguchi
In 2016, a novel TCP (Transmission Control Protocol) congestion control algorithm TCP BBR was proposed. Several papers on TCP fairness including TCP BBR have been published. In our previous work, we showed that the throughput of TCP BBR was significantly low at the beginning of connections. In this paper, we reveal the reason for this TCP BBR's severe throughput based on its behavior.
2016年,提出了一种新的TCP(传输控制协议)拥塞控制算法TCP BBR。包括TCP BBR在内的多篇关于TCP公平性的论文已经发表。在我们之前的工作中,我们发现TCP BBR的吞吐量在连接开始时非常低。本文从TCP BBR的行为出发,揭示了其高吞吐量的原因。
{"title":"A Study on Bottleneck Bandwidth Estimation Based on Acknowledge Reception on TCP BBR","authors":"Kanon Sasaki, Saneyasu Yamaguchi","doi":"10.1109/COMPSAC48688.2020.0-117","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-117","url":null,"abstract":"In 2016, a novel TCP (Transmission Control Protocol) congestion control algorithm TCP BBR was proposed. Several papers on TCP fairness including TCP BBR have been published. In our previous work, we showed that the throughput of TCP BBR was significantly low at the beginning of connections. In this paper, we reveal the reason for this TCP BBR's severe throughput based on its behavior.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department 一种评估业务流程可靠性的方法,该方法反映了每个部门的交易文档检查
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00047
Takafumi Komoto, K. Futatsugi, Nobukazu Yoshioka
An assessment method is proposed to classify the reliability of business processes related to transactions into those with a high and low risk of inconsistency according to the checking status of transaction documents (such as an order form, a delivery slip, an invoice, a receipt). We show a method for objectively examining the reliability of business processes without relying solely on expert knowledge and experience. In practice, however, some departments in a company can be expected to execute transaction documents checking reliably, while others may not be able to. To cope with this, the method is extended so that assessment can be performed by reflecting the certainty of transaction documents checking for each department. Transaction documents checking for departments outside the company and outsourced departments can be excluded (such as a low-level department), and the risk of inconsistency in transaction documents can then be determined, thus improving the practicality of the assessment method.
提出了一种评估方法,根据事务文档(如订单、送货单、发票、收据)的检查状态,将与事务相关的业务流程的可靠性分为具有高不一致风险和低不一致风险的业务流程。我们展示了一种方法,可以客观地检查业务流程的可靠性,而无需仅仅依赖于专家知识和经验。然而,在实践中,可以期望公司中的某些部门可靠地执行交易文档检查,而其他部门则可能无法执行。为了解决这个问题,对该方法进行了扩展,以便通过反映每个部门的交易文件检查的确定性来进行评估。可以排除对公司外部部门和外包部门(如低级别部门)的交易文件检查,从而确定交易文件不一致的风险,从而提高评估方法的实用性。
{"title":"A Method for Assessing the Reliability of Business Processes that Reflects Transaction Documents Checking for each Department","authors":"Takafumi Komoto, K. Futatsugi, Nobukazu Yoshioka","doi":"10.1109/COMPSAC48688.2020.00047","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00047","url":null,"abstract":"An assessment method is proposed to classify the reliability of business processes related to transactions into those with a high and low risk of inconsistency according to the checking status of transaction documents (such as an order form, a delivery slip, an invoice, a receipt). We show a method for objectively examining the reliability of business processes without relying solely on expert knowledge and experience. In practice, however, some departments in a company can be expected to execute transaction documents checking reliably, while others may not be able to. To cope with this, the method is extended so that assessment can be performed by reflecting the certainty of transaction documents checking for each department. Transaction documents checking for departments outside the company and outsourced departments can be excluded (such as a low-level department), and the risk of inconsistency in transaction documents can then be determined, thus improving the practicality of the assessment method.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Smart Cyber-Human System to Support Mental Well-Being through Social Engagement 通过社会参与支持心理健康的智能网络-人类系统
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-134
A. J. Majumder, Jack Wilson Dedmondt, Sean Jones, Amir A. Asif
The widespread adoption of wearable devices and social media is generating population-scale data about people's behavior as situated in their everyday lives. In this paper, an embedded Cyber-Human System (CHS) is used to monitor a person's mental health via physiological, behavioral, and social data. These three data streams will then be relayed to an application used by a professional within the medical industry, to allow remote monitoring of the user's mental health without the uncertainty that face-to-face interviews can introduce. Experimentation and verification have been conducted on a group of test subjects with different test scenarios including a happy, sad, angry, and neutral state of being. We propose to use physiological data to predict a person's emotional state using a machine learning classification algorithm. The proposed system can distinguish between the different emotional states with an accuracy of 92.9%.
可穿戴设备和社交媒体的广泛采用正在产生关于人们日常生活中行为的人口规模数据。在本文中,一个嵌入式的网络-人类系统(CHS)通过生理、行为和社会数据来监测一个人的心理健康。然后,这三种数据流将被转发到医疗行业专业人士使用的应用程序中,从而允许远程监控用户的心理健康,而无需面对面访谈可能带来的不确定性。对一组被试进行了实验和验证,被试有不同的测试场景,包括快乐、悲伤、愤怒和中立的状态。我们建议使用机器学习分类算法,使用生理数据来预测一个人的情绪状态。该系统可以区分不同的情绪状态,准确率为92.9%。
{"title":"A Smart Cyber-Human System to Support Mental Well-Being through Social Engagement","authors":"A. J. Majumder, Jack Wilson Dedmondt, Sean Jones, Amir A. Asif","doi":"10.1109/COMPSAC48688.2020.0-134","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-134","url":null,"abstract":"The widespread adoption of wearable devices and social media is generating population-scale data about people's behavior as situated in their everyday lives. In this paper, an embedded Cyber-Human System (CHS) is used to monitor a person's mental health via physiological, behavioral, and social data. These three data streams will then be relayed to an application used by a professional within the medical industry, to allow remote monitoring of the user's mental health without the uncertainty that face-to-face interviews can introduce. Experimentation and verification have been conducted on a group of test subjects with different test scenarios including a happy, sad, angry, and neutral state of being. We propose to use physiological data to predict a person's emotional state using a machine learning classification algorithm. The proposed system can distinguish between the different emotional states with an accuracy of 92.9%.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132243867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comprehensive Review of Collaborative Network Attacks in MANET MANET协同网络攻击研究综述
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-36
Olufemi Fasunlade, Shikun Zhou, D. Sanders
This paper considers multiple network attacks in a Mobile Ad hoc Network (MANET). MANET is a type of network that does not require any infrastructure for nodes to communicate with each other. The general assumption in MANET is that each node is a trusted node. However, due to its lack of infrastructure and dynamic topology, the MANET is exposed to network layer attacks. In this paper, some of the network layer attacks such as the black hole attack, worm hole attack and gray hole attack are discussed. Frequent multiple network attacks are highlighted, and the identification of collaborative network attacks is discussed. There are several symptoms and observations in a network that signal the presence of an attack and some of the symptoms of these attacks will be highlighted. Finally, an analysis of existing multiple network attacks will be discussed, and the identification of prospective multiple network attacks is considered.
本文研究了移动自组网(MANET)中的多重网络攻击问题。MANET是一种不需要任何基础设施的网络,节点之间可以相互通信。MANET中的一般假设是每个节点都是可信节点。然而,由于其缺乏基础设施和动态拓扑结构,MANET容易受到网络层攻击。本文讨论了网络层的一些攻击,如黑洞攻击、蠕虫洞攻击和灰洞攻击。重点分析了频繁发生的多网络攻击,讨论了协同网络攻击的识别问题。在网络中有几种症状和观察结果表明存在攻击,这些攻击的一些症状将被突出显示。最后,对现有的多重网络攻击进行分析,并考虑识别潜在的多重网络攻击。
{"title":"Comprehensive Review of Collaborative Network Attacks in MANET","authors":"Olufemi Fasunlade, Shikun Zhou, D. Sanders","doi":"10.1109/COMPSAC48688.2020.00-36","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-36","url":null,"abstract":"This paper considers multiple network attacks in a Mobile Ad hoc Network (MANET). MANET is a type of network that does not require any infrastructure for nodes to communicate with each other. The general assumption in MANET is that each node is a trusted node. However, due to its lack of infrastructure and dynamic topology, the MANET is exposed to network layer attacks. In this paper, some of the network layer attacks such as the black hole attack, worm hole attack and gray hole attack are discussed. Frequent multiple network attacks are highlighted, and the identification of collaborative network attacks is discussed. There are several symptoms and observations in a network that signal the presence of an attack and some of the symptoms of these attacks will be highlighted. Finally, an analysis of existing multiple network attacks will be discussed, and the identification of prospective multiple network attacks is considered.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Method to Mask Dynamic Content Areas Based on Positional Relationship of Screen Elements for Visual Regression Testing 视觉回归测试中基于屏幕元素位置关系的动态内容区域掩码方法
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.000-1
Yuu Adachi, Haruto Tanno, Yu Yoshimura
There are areas on an application screen where the content changes every time the screen is displayed such as advertisements and news articles (hereafter, dynamic content areas). When there are dynamic content areas, many differences in false positive are detected in Visual Regression Testing. Such differences due to dynamic content areas prevent the tester from efficiently checking the important differences. Therefore, specifying a dynamic content area as a masked area and excluding it from the comparison area is effective for reducing the human effort required to confirm these differences. We propose a method of accurately specifying the area to be masked based on the relative positional relationship of multiple screen elements and excluding dynamic content areas from the comparison area.
应用程序屏幕上有一些区域,每次显示屏幕时,其内容都会发生变化,例如广告和新闻文章(以下称为动态内容区域)。当存在动态内容区域时,在视觉回归测试中可以检测到许多假阳性的差异。这种由于动态内容区域而产生的差异会阻止测试人员有效地检查重要的差异。因此,将动态内容区域指定为屏蔽区域并将其排除在比较区域之外,可以有效地减少确认这些差异所需的人力。我们提出了一种基于多个屏幕元素的相对位置关系精确指定要屏蔽的区域,并将动态内容区域排除在比较区域之外的方法。
{"title":"A Method to Mask Dynamic Content Areas Based on Positional Relationship of Screen Elements for Visual Regression Testing","authors":"Yuu Adachi, Haruto Tanno, Yu Yoshimura","doi":"10.1109/COMPSAC48688.2020.000-1","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.000-1","url":null,"abstract":"There are areas on an application screen where the content changes every time the screen is displayed such as advertisements and news articles (hereafter, dynamic content areas). When there are dynamic content areas, many differences in false positive are detected in Visual Regression Testing. Such differences due to dynamic content areas prevent the tester from efficiently checking the important differences. Therefore, specifying a dynamic content area as a masked area and excluding it from the comparison area is effective for reducing the human effort required to confirm these differences. We propose a method of accurately specifying the area to be masked based on the relative positional relationship of multiple screen elements and excluding dynamic content areas from the comparison area.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Agent Program in an IoT System to Recommend Plans of Activities to Minimize Childhood Obesity 物联网系统中的代理程序推荐活动计划以减少儿童肥胖
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-181
Lucas Vieira Alves, Rodrigo Teixeira de Melo, L. Costa, C. Rocha, Eriko Araujo, G. Campos, J. Souza
Overweight and obesity in children is a recognized worldwide epidemic. They are associated with several current and future chronic diseases. OCARIoT is a joint EU-Brazil joint that aims to develop a sophisticated, noninvasive, unobtrusive, personalized IoT system to detect and normalize the behaviors that put a child at risk of developing obesity or eating disorders. In a recent written work, we proposed the design of an agent-based approach to recommend individual physical and food-related activities, based on data collected from wearable devices. In this paper, we present the design of an expanded approach that, in addition to recommendations for individual activities, should recommend activity plans, i.e., sequences of activities organized to minimize childhood obesity. The first results with the extended version were very promising. During the experiments, the selected individual activities and sequences of activities organized by the approach proved to be effective in conducting children, with different profiles and initial states, to the desired states of various attributes associated with childhood obesity.
儿童超重和肥胖是公认的世界性流行病。它们与几种当前和未来的慢性疾病有关。OCARIoT是欧盟和巴西的联合项目,旨在开发一种复杂、无创、不显眼、个性化的物联网系统,以检测和规范导致儿童肥胖或饮食失调风险的行为。在最近的一份书面工作中,我们提出了一种基于代理的方法,根据从可穿戴设备收集的数据,推荐个人身体和食物相关的活动。在本文中,我们提出了一种扩展方法的设计,除了推荐个人活动外,还应该推荐活动计划,即组织活动序列以减少儿童肥胖。扩展版本的第一个结果非常有希望。在实验中,通过该方法组织的选定的个体活动和活动序列被证明是有效的,可以将具有不同概况和初始状态的儿童引导到与儿童肥胖相关的各种属性的期望状态。
{"title":"An Agent Program in an IoT System to Recommend Plans of Activities to Minimize Childhood Obesity","authors":"Lucas Vieira Alves, Rodrigo Teixeira de Melo, L. Costa, C. Rocha, Eriko Araujo, G. Campos, J. Souza","doi":"10.1109/COMPSAC48688.2020.0-181","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-181","url":null,"abstract":"Overweight and obesity in children is a recognized worldwide epidemic. They are associated with several current and future chronic diseases. OCARIoT is a joint EU-Brazil joint that aims to develop a sophisticated, noninvasive, unobtrusive, personalized IoT system to detect and normalize the behaviors that put a child at risk of developing obesity or eating disorders. In a recent written work, we proposed the design of an agent-based approach to recommend individual physical and food-related activities, based on data collected from wearable devices. In this paper, we present the design of an expanded approach that, in addition to recommendations for individual activities, should recommend activity plans, i.e., sequences of activities organized to minimize childhood obesity. The first results with the extended version were very promising. During the experiments, the selected individual activities and sequences of activities organized by the approach proved to be effective in conducting children, with different profiles and initial states, to the desired states of various attributes associated with childhood obesity.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an Architecture for Customizable Drones 迈向可定制无人机的架构
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00019
Mahmoud Hussein, R. Nouacer
Drones/UAVs are able to carry out air operations which are difficult to be performed by manned aircrafts. In addition, their use brings significant economic savings and environmental benefits, while reducing risks to human life. However, current generation of embedded drone architectures consist of loosely coupled sub-systems that run in dedicated monolithic platforms. Therefore, this approach reaches its limits when the demand of autonomy increases and when the weight, volume, and power consumption of the dedicated sub-systems encounter the drone restrictions. To overcome these limitations, we, in this paper, propose a modular architectural approach inspired from the very famous three-layered architecture within the mobile robots' domain. Our architecture separates the different system's concerns into three layers: control, flight management, and planning. Thus, each architecture layer can be evolved/customized separately without affecting the other layers. To ensure the applicability of our architecture, we have applied it to a drone system used for a rescue scenario.
无人驾驶飞机/无人机能够执行有人驾驶飞机难以执行的空中作战。此外,它们的使用带来了显著的经济节约和环境效益,同时降低了对人类生命的风险。然而,当前一代的嵌入式无人机架构由松散耦合的子系统组成,这些子系统运行在专用的单片平台上。因此,当自主性需求增加时,当专用子系统的重量、体积和功耗受到无人机的限制时,这种方法就会达到极限。为了克服这些限制,我们在本文中提出了一种模块化架构方法,其灵感来自于移动机器人领域中非常著名的三层架构。我们的体系结构将不同的系统关注点分成三层:控制、飞行管理和计划。因此,可以在不影响其他层的情况下单独发展/定制每个体系结构层。为了确保我们架构的适用性,我们将其应用于用于救援场景的无人机系统。
{"title":"Towards an Architecture for Customizable Drones","authors":"Mahmoud Hussein, R. Nouacer","doi":"10.1109/COMPSAC48688.2020.00019","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00019","url":null,"abstract":"Drones/UAVs are able to carry out air operations which are difficult to be performed by manned aircrafts. In addition, their use brings significant economic savings and environmental benefits, while reducing risks to human life. However, current generation of embedded drone architectures consist of loosely coupled sub-systems that run in dedicated monolithic platforms. Therefore, this approach reaches its limits when the demand of autonomy increases and when the weight, volume, and power consumption of the dedicated sub-systems encounter the drone restrictions. To overcome these limitations, we, in this paper, propose a modular architectural approach inspired from the very famous three-layered architecture within the mobile robots' domain. Our architecture separates the different system's concerns into three layers: control, flight management, and planning. Thus, each architecture layer can be evolved/customized separately without affecting the other layers. To ensure the applicability of our architecture, we have applied it to a drone system used for a rescue scenario.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1