首页 > 最新文献

2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
Cluster-Linkage Analysis in Traffic Data Clustering for Development of Advanced Driver Assistance Systems 面向高级驾驶辅助系统开发的交通数据聚类中的聚类-关联分析
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00017
Hiroki Watanabe, T. Malý, Johannes Wallner, G. Prokop
In terms of vehicle safety, the number of advanced driver assistance systems (ADAS) mounted in an automobile has been increasing recently. For an efficient conceptional design and system validation of ADAS, the representative test scenarios are indispensable. In order to identify the representative scenarios,the real-world traffic scenarios are to be clustered according to their similarity. The hierarchical agglomerative clustering is a well-known method to quantify the similarity of traffic scenarios existing in a database. However, the cluster structure is affected by the linkage criterion used in the agglomerative procedure.This study inquires into the similarity measurement of vehicle-pedestrian near-crashes in the USA. Various linkage criteria are selected to get better understanding of their influence on the clustering results and conduct a comparative study. Furthermore,a hybrid clustering algorithm is presented, which is based on k-covers and k-means clustering. Using the average silhouette width, the optimal number of clusters is calculated and the cluster structures are investigated. In the end, the representative scenarios are selected with the use of centrality measure and form the basis of the scenario catalog making for the reduction of test effort in ADAS development.
在车辆安全方面,最近汽车上安装的先进驾驶辅助系统(ADAS)越来越多。为了有效地进行ADAS的概念设计和系统验证,具有代表性的测试场景是必不可少的。为了识别具有代表性的场景,将现实世界的交通场景根据相似度进行聚类。层次聚合聚类是一种众所周知的量化数据库中存在的交通场景相似性的方法。然而,聚类结构受到聚类过程中使用的链接准则的影响。本研究探讨美国车辆与行人近距离碰撞的相似度测量。选择不同的联动准则,更好地了解其对聚类结果的影响,并进行比较研究。在此基础上,提出了基于k-覆盖和k-均值聚类的混合聚类算法。利用平均轮廓宽度计算了簇的最优数量,并对簇的结构进行了研究。最后,使用中心性度量选择具有代表性的场景,并形成场景目录的基础,以减少ADAS开发中的测试工作量。
{"title":"Cluster-Linkage Analysis in Traffic Data Clustering for Development of Advanced Driver Assistance Systems","authors":"Hiroki Watanabe, T. Malý, Johannes Wallner, G. Prokop","doi":"10.1109/ICICT50521.2020.00017","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00017","url":null,"abstract":"In terms of vehicle safety, the number of advanced driver assistance systems (ADAS) mounted in an automobile has been increasing recently. For an efficient conceptional design and system validation of ADAS, the representative test scenarios are indispensable. In order to identify the representative scenarios,the real-world traffic scenarios are to be clustered according to their similarity. The hierarchical agglomerative clustering is a well-known method to quantify the similarity of traffic scenarios existing in a database. However, the cluster structure is affected by the linkage criterion used in the agglomerative procedure.This study inquires into the similarity measurement of vehicle-pedestrian near-crashes in the USA. Various linkage criteria are selected to get better understanding of their influence on the clustering results and conduct a comparative study. Furthermore,a hybrid clustering algorithm is presented, which is based on k-covers and k-means clustering. Using the average silhouette width, the optimal number of clusters is calculated and the cluster structures are investigated. In the end, the representative scenarios are selected with the use of centrality measure and form the basis of the scenario catalog making for the reduction of test effort in ADAS development.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134338224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Environmentally Embedded Internet-of-Things for Secondary and Higher Education 面向中高等教育的环境嵌入式物联网
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00092
J. Yeh, Craig W. Bartholio, Elyse Shackleton, Levi Costello, Matthew Perera, Kyle Yeh, Chelsea Yeh
In this paper, we describe the application of the technologies of the Internet of Things (IoT) to secondary and higher education. Specifically, it seeks to monitor the status of the students and estimate student attention and engagement based on data collected by environmentally embedded IoT sensors, and provide real-time feedback to the instructor. The research was divided into three parts. The first part researched the IoT sensors and devices used to capture student physiological data. The second part developed the instructor feedback devices, which included tablet and smartwatch applications. The third part is the creation of the machine learning model that performed the estimation of student attention from the data.
在本文中,我们描述了物联网(IoT)技术在中等和高等教育中的应用。具体来说,它旨在监控学生的状态,并根据环境嵌入式物联网传感器收集的数据估计学生的注意力和参与度,并向教师提供实时反馈。本研究分为三个部分。第一部分研究了用于捕获学生生理数据的物联网传感器和设备。第二部分开发了教师反馈设备,包括平板电脑和智能手表应用程序。第三部分是创建机器学习模型,该模型从数据中执行对学生注意力的估计。
{"title":"Environmentally Embedded Internet-of-Things for Secondary and Higher Education","authors":"J. Yeh, Craig W. Bartholio, Elyse Shackleton, Levi Costello, Matthew Perera, Kyle Yeh, Chelsea Yeh","doi":"10.1109/ICICT50521.2020.00092","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00092","url":null,"abstract":"In this paper, we describe the application of the technologies of the Internet of Things (IoT) to secondary and higher education. Specifically, it seeks to monitor the status of the students and estimate student attention and engagement based on data collected by environmentally embedded IoT sensors, and provide real-time feedback to the instructor. The research was divided into three parts. The first part researched the IoT sensors and devices used to capture student physiological data. The second part developed the instructor feedback devices, which included tablet and smartwatch applications. The third part is the creation of the machine learning model that performed the estimation of student attention from the data.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling a Smart School Building System Using UML and TLA+ 基于UML和TLA+的智能学校建筑系统建模
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00028
Nawar H. Obeidat, C. Purdy
Designing smart systems has recently received much attention because of the ability to connect heterogeneous sub-systems together to build a fully controlled smart system. In this project, designing a smart, safe, secure school system for students is our eventual goal. In this paper, we propose a model for a smart school building system. We model the system using UML diagrams to illustrate the system's objects and sequences of actions. We use formal methods techniques to verify the properties of the system. Specifically, we use TLA+, the formal specification language, for our formal modeling. As for the smart school building, we design the school to be safe by requiring a username and password for entering the building. The system can also control the lighting system and the temperature for the whole building. For additional safety, the system has a smoke detection sub-system in case of fire. We propose this smart school building system and verify its properties and correctness using the TLA+ toolbox.
智能系统的设计由于能够将异构子系统连接在一起以构建一个完全可控的智能系统而受到广泛关注。在这个项目中,为学生设计一个智能、安全、可靠的学校系统是我们的最终目标。在本文中,我们提出了一个智能学校建筑系统模型。我们使用UML图对系统进行建模,以说明系统的对象和操作序列。我们使用形式化方法技术来验证系统的属性。具体地说,我们使用TLA+,即形式化规范语言,来进行形式化建模。对于智能教学楼,我们设计了安全的教学楼,进入教学楼需要用户名和密码。该系统还可以控制整个建筑的照明系统和温度。为了额外的安全,该系统有一个烟雾探测子系统,以防火灾。我们提出了这个智能校舍系统,并使用TLA+工具箱验证了它的性能和正确性。
{"title":"Modeling a Smart School Building System Using UML and TLA+","authors":"Nawar H. Obeidat, C. Purdy","doi":"10.1109/ICICT50521.2020.00028","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00028","url":null,"abstract":"Designing smart systems has recently received much attention because of the ability to connect heterogeneous sub-systems together to build a fully controlled smart system. In this project, designing a smart, safe, secure school system for students is our eventual goal. In this paper, we propose a model for a smart school building system. We model the system using UML diagrams to illustrate the system's objects and sequences of actions. We use formal methods techniques to verify the properties of the system. Specifically, we use TLA+, the formal specification language, for our formal modeling. As for the smart school building, we design the school to be safe by requiring a username and password for entering the building. The system can also control the lighting system and the temperature for the whole building. For additional safety, the system has a smoke detection sub-system in case of fire. We propose this smart school building system and verify its properties and correctness using the TLA+ toolbox.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133387742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved Generalizability of Deep-Fakes Detection using Transfer Learning Based CNN Framework 基于迁移学习的CNN框架改进深度假货检测的泛化性
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00021
Pranjal Ranjan, Sarvesh Patil, F. Kazi
Deep-Fakes are emerging as a significant threat to society, with potential to become weapons of mass disinformation and chaos. Simple tools provide ways to produce such digital forgeries at a large scale which makes it crucial to develop counter-attacking approaches for detection of these Deep-Learning based manipulations. This work analyzes a Transfer Learning based Convolutional Neural Network framework for the task of Deep-Fake Detection on three of the latest released datasets – DeepFakeDetection (DFD), Celeb-DF, and DeepFakeDetectionChallenge (DFDC) Preview. Additionally, a custom dataset of high-quality Deep-Fakes is compiled and used for evaluation of models. The intuition behind Transfer Learning for Deep-Fakes Detection is explored using the Explainable-AI technique of visualizing intermediate activations to provide interpretability. The critical problem of dataset shift and its effect on domain adaptation is explored by comparing cross-dataset test accuracies, with and without the usage of Transfer Learning. The results of this work indicate that even though Deep-Fake Detection is a highly domain specific task, there is a significant improvement in performance in terms of both single-domain classification accuracy and generalizability by utilizing Transfer Learning.
深度造假正成为对社会的重大威胁,有可能成为制造大规模虚假信息和混乱的武器。简单的工具提供了大规模生产此类数字伪造的方法,这使得开发用于检测这些基于深度学习的操作的反击方法至关重要。这项工作分析了基于迁移学习的卷积神经网络框架,用于在三个最新发布的数据集上进行深度假检测任务——DeepFakeDetection (DFD)、Celeb-DF和DeepFakeDetectionChallenge (DFDC)预览。此外,还编译了高质量Deep-Fakes的自定义数据集并用于模型评估。使用可视化中间激活的Explainable-AI技术来探索深度假货检测迁移学习背后的直觉,以提供可解释性。通过比较使用和不使用迁移学习的跨数据集测试精度,探讨了数据集迁移的关键问题及其对领域自适应的影响。这项工作的结果表明,尽管Deep-Fake Detection是一个高度特定领域的任务,但通过利用迁移学习,在单领域分类精度和泛化性方面的性能都有显着提高。
{"title":"Improved Generalizability of Deep-Fakes Detection using Transfer Learning Based CNN Framework","authors":"Pranjal Ranjan, Sarvesh Patil, F. Kazi","doi":"10.1109/ICICT50521.2020.00021","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00021","url":null,"abstract":"Deep-Fakes are emerging as a significant threat to society, with potential to become weapons of mass disinformation and chaos. Simple tools provide ways to produce such digital forgeries at a large scale which makes it crucial to develop counter-attacking approaches for detection of these Deep-Learning based manipulations. This work analyzes a Transfer Learning based Convolutional Neural Network framework for the task of Deep-Fake Detection on three of the latest released datasets – DeepFakeDetection (DFD), Celeb-DF, and DeepFakeDetectionChallenge (DFDC) Preview. Additionally, a custom dataset of high-quality Deep-Fakes is compiled and used for evaluation of models. The intuition behind Transfer Learning for Deep-Fakes Detection is explored using the Explainable-AI technique of visualizing intermediate activations to provide interpretability. The critical problem of dataset shift and its effect on domain adaptation is explored by comparing cross-dataset test accuracies, with and without the usage of Transfer Learning. The results of this work indicate that even though Deep-Fake Detection is a highly domain specific task, there is a significant improvement in performance in terms of both single-domain classification accuracy and generalizability by utilizing Transfer Learning.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114563288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Conditionally Optimal Parallelization for Global FP on Multi-core Systems 多核系统全局FP的条件最优并行化
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00071
Daechul Park, Youngeun Cho, Chang-Gun Lee
Throughout the last decade, the importance of parallel computing has risen greatly to match the ever-increasing computational demand. Frameworks such as OpenMP and OpenCL allow easy parallelization of computing tasks into desirable number of threads, opening up a chance to greatly utilize the parallel computing resources. We call this "parallelization freedom". However, this does not come for free, as parallelization overhead increase with parallelization option (i.e. the number of thread each task is parallelized). Thus parallelization option must be carefully decided to better utilize a given computing resource. This paper addresses the problem of assigning parallelization option to each task for global FP scheduler. For this, we extend the approaches made by Cho, which is limited to the global EDF scheduler case. We prove that a conditionally optimal parallelization assignment of parallelization option also exists for the global FP case. Through extensive simulations, we show a significant improvement of schedulability.
在过去的十年中,并行计算的重要性已经大大提高,以满足不断增长的计算需求。像OpenMP和OpenCL这样的框架允许将计算任务轻松地并行化为理想数量的线程,从而有机会极大地利用并行计算资源。我们称之为“并行化自由”。然而,这并不是免费的,因为并行化开销随着并行化选项的增加而增加(即每个任务并行化的线程数)。因此,必须仔细决定并行化选项,以便更好地利用给定的计算资源。本文研究了全局FP调度器中为每个任务分配并行化选项的问题。为此,我们扩展了Cho提出的方法,该方法仅限于全局EDF调度器情况。证明了在全局FP情况下,存在一个条件最优的并行化分配方案。通过大量的仿真,我们展示了可调度性的显著改进。
{"title":"Conditionally Optimal Parallelization for Global FP on Multi-core Systems","authors":"Daechul Park, Youngeun Cho, Chang-Gun Lee","doi":"10.1109/ICICT50521.2020.00071","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00071","url":null,"abstract":"Throughout the last decade, the importance of parallel computing has risen greatly to match the ever-increasing computational demand. Frameworks such as OpenMP and OpenCL allow easy parallelization of computing tasks into desirable number of threads, opening up a chance to greatly utilize the parallel computing resources. We call this \"parallelization freedom\". However, this does not come for free, as parallelization overhead increase with parallelization option (i.e. the number of thread each task is parallelized). Thus parallelization option must be carefully decided to better utilize a given computing resource. This paper addresses the problem of assigning parallelization option to each task for global FP scheduler. For this, we extend the approaches made by Cho, which is limited to the global EDF scheduler case. We prove that a conditionally optimal parallelization assignment of parallelization option also exists for the global FP case. Through extensive simulations, we show a significant improvement of schedulability.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124896706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Case of Use in the Management of Administrative Processes, Control of Procedures and Services to Citizens In E-Government 电子政务在行政流程管理、程序控制和公民服务中的应用案例
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00014
Giovanni Ortegón Cortázar, O. Garcia-Bedoya, J. Samper, Francisco García-Sánchez
One of the objectives of the fourth industrial revolution is the use of data to make decisions, in this sense the decisions of the government could be better if they are based on useful data sources, with quality and focused on services to citizens. This article presents a case of use in the government of Colombia in which an information system was created for the management of complaints and claims by means of control panels, visualization of statistical information and high personalization in the processes for more than 1200 offices and 8000 employees.
第四次工业革命的目标之一是利用数据进行决策,从这个意义上说,如果政府的决策基于有用的数据来源,质量高,并专注于为公民提供服务,那么政府的决策可能会更好。本文介绍了哥伦比亚政府的一个使用案例,在该案例中,通过控制面板、统计信息可视化和高度个性化的流程,为1200多个办事处和8000多名员工创建了一个信息系统,用于管理投诉和索赔。
{"title":"A Case of Use in the Management of Administrative Processes, Control of Procedures and Services to Citizens In E-Government","authors":"Giovanni Ortegón Cortázar, O. Garcia-Bedoya, J. Samper, Francisco García-Sánchez","doi":"10.1109/ICICT50521.2020.00014","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00014","url":null,"abstract":"One of the objectives of the fourth industrial revolution is the use of data to make decisions, in this sense the decisions of the government could be better if they are based on useful data sources, with quality and focused on services to citizens. This article presents a case of use in the government of Colombia in which an information system was created for the management of complaints and claims by means of control panels, visualization of statistical information and high personalization in the processes for more than 1200 offices and 8000 employees.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127180148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Multi-port Memory Performance on Single-Port Memory with Coding Techniques 利用编码技术在单端口存储器上实现多端口存储器性能
Pub Date : 2020-01-27 DOI: 10.1109/ICICT50521.2020.00065
Hardik B. Jain, M. Edwards, Ethan R. Elenberg, A. Rawat, S. Vishwanath
Many performance critical systems today must rely on performance enhancements, such as multi-port memories, to keep up with the increasing demand of memory-access capacity. However, the large area footprints and complexity of existing multi-port memory designs limit their applicability. This paper explores a coding theoretic framework to address this problem. In particular, this paper introduces a framework to encode data across multiple single-port memory banks in order to algorithmically realize the functionality of multi-port memory. This paper proposes three code designs with significantly less storage overhead compared to the existing replication based emulations of multi-port memories. To further improve performance, we also demonstrate a memory controller design that utilizes redundancy across coded memory banks to more efficiently schedule read and write requests sent across multiple cores. Furthermore, guided by DRAM traces, the paper explores dynamic coding techniques to improve the efficiency of the coding based memory design. We then show significant performance improvements in critical word read and write latency in the proposed coded-memory design when compared to a traditional uncoded-memory design.
如今,许多性能关键型系统必须依赖于性能增强,例如多端口内存,以满足不断增长的内存访问容量需求。然而,现有多端口存储器设计的面积占用和复杂性限制了它们的适用性。本文探讨了一个编码理论框架来解决这个问题。本文特别介绍了一种跨多个单端口存储库的数据编码框架,以算法实现多端口存储的功能。与现有的基于复制的多端口存储器仿真相比,本文提出了三种显著减少存储开销的代码设计。为了进一步提高性能,我们还演示了一种内存控制器设计,该设计利用编码内存库的冗余来更有效地调度跨多个内核发送的读写请求。此外,以DRAM轨迹为指导,本文探索动态编码技术,以提高基于编码的存储器设计的效率。然后,我们展示了与传统的非编码存储器设计相比,所提出的编码存储器设计在关键字读写延迟方面的显着性能改进。
{"title":"Achieving Multi-port Memory Performance on Single-Port Memory with Coding Techniques","authors":"Hardik B. Jain, M. Edwards, Ethan R. Elenberg, A. Rawat, S. Vishwanath","doi":"10.1109/ICICT50521.2020.00065","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00065","url":null,"abstract":"Many performance critical systems today must rely on performance enhancements, such as multi-port memories, to keep up with the increasing demand of memory-access capacity. However, the large area footprints and complexity of existing multi-port memory designs limit their applicability. This paper explores a coding theoretic framework to address this problem. In particular, this paper introduces a framework to encode data across multiple single-port memory banks in order to algorithmically realize the functionality of multi-port memory. This paper proposes three code designs with significantly less storage overhead compared to the existing replication based emulations of multi-port memories. To further improve performance, we also demonstrate a memory controller design that utilizes redundancy across coded memory banks to more efficiently schedule read and write requests sent across multiple cores. Furthermore, guided by DRAM traces, the paper explores dynamic coding techniques to improve the efficiency of the coding based memory design. We then show significant performance improvements in critical word read and write latency in the proposed coded-memory design when compared to a traditional uncoded-memory design.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123110720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulate Forest Trees by Integrating L-System and 3D CAD Files 通过集成L-System和3D CAD文件模拟森林树木
Pub Date : 2020-01-13 DOI: 10.1109/ICICT50521.2020.00022
M. H. Tanveer, Antony Thomas, Xiaowei Wu, Hongxiao Zhu
In this article, we propose a new approach for simu-lating trees, including their branches, sub-branches, and leaves. This approach combines the theory of biological development, mathematical models, and computer graphics, producing simu-lated trees and forest with full geometry. Specifically, we adopt the Lindenmayer process to simulate the branching pattern of trees and modify the available measurements and dimensions of 3D CAD developed object files to create natural looking sub-branches and leaves. Randomization has been added to the placement of all branches, sub branches and leaves. To simulate a forest, we adopt Inhomogeneous Poisson process to generate random locations of trees. Our approach can be used to create complex structured 3D virtual environment for the purpose of testing new sensors and training robotic algorithms. We look forward to applying this approach to test biosonar sensors that mimick bats' fly in the simulated environment.
在本文中,我们提出了一种新的方法来模拟树,包括它们的分支、子分支和叶子。这种方法结合了生物发育理论、数学模型和计算机图形学,产生了具有完整几何形状的模拟树木和森林。具体来说,我们采用Lindenmayer过程来模拟树木的分支模式,并修改3D CAD开发的对象文件的可用测量和尺寸,以创建自然外观的子树枝和叶子。随机化已经添加到所有分支,子分支和叶子的位置。为了模拟森林,我们采用非齐次泊松过程生成树木的随机位置。我们的方法可用于创建复杂的结构化3D虚拟环境,以测试新的传感器和训练机器人算法。我们期待着将这种方法应用于在模拟环境中模拟蝙蝠飞行的生物声纳传感器的测试。
{"title":"Simulate Forest Trees by Integrating L-System and 3D CAD Files","authors":"M. H. Tanveer, Antony Thomas, Xiaowei Wu, Hongxiao Zhu","doi":"10.1109/ICICT50521.2020.00022","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00022","url":null,"abstract":"In this article, we propose a new approach for simu-lating trees, including their branches, sub-branches, and leaves. This approach combines the theory of biological development, mathematical models, and computer graphics, producing simu-lated trees and forest with full geometry. Specifically, we adopt the Lindenmayer process to simulate the branching pattern of trees and modify the available measurements and dimensions of 3D CAD developed object files to create natural looking sub-branches and leaves. Randomization has been added to the placement of all branches, sub branches and leaves. To simulate a forest, we adopt Inhomogeneous Poisson process to generate random locations of trees. Our approach can be used to create complex structured 3D virtual environment for the purpose of testing new sensors and training robotic algorithms. We look forward to applying this approach to test biosonar sensors that mimick bats' fly in the simulated environment.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Is Cryptojacking Dead After Coinhive Shutdown? Coinhive关闭后,加密劫持是否已经消亡?
Pub Date : 2020-01-07 DOI: 10.1109/ICICT50521.2020.00068
Said Varlioglu, Bilal Gonen, Murat Ozer, Mehmet F. Bastug
Cryptojacking is the exploitation of victims' computer resources to mine for cryptocurrency using malicious scripts. It had become popular after 2017 when attackers started to exploit legal mining scripts, especially Coinhive scripts. Coinhive was actually a legal mining service that provided scripts and servers for in-browser mining activities. Nevertheless, over 10 million web users had been victims every month before the Coinhive shutdown that happened in Mar 2019. This paper explores the new era of the cryptojacking world after Coinhive discontinued its service. We aimed to see whether and how attackers continue cryptojacking, generate new malicious scripts, and developed new methods. We used a capable cryptojacking detector named CMTracker that proposed by Hong et al. in 2018. We automatically and manually examined 2770 websites that had been detected by CMTracker before the Coinhive shutdown. The results revealed that 99% of sites no longer continue cryptojacking. 1% of websites still run 8 unique mining scripts. By tracking these mining scripts, we detected 632 unique cryptojacking websites. Moreover, open-source investigations (OSINT) demonstrated that attackers still use the same methods. Therefore, we listed the typical patterns of cryptojacking. We concluded that cryptojacking is not dead after the Coinhive shutdown. It is still alive, but not as attractive as it used to be.
加密劫持是利用受害者的计算机资源使用恶意脚本挖掘加密货币。2017年之后,攻击者开始利用合法的挖矿脚本,尤其是Coinhive脚本,它变得流行起来。Coinhive实际上是一个合法的挖掘服务,为浏览器内挖掘活动提供脚本和服务器。然而,在2019年3月发生的Coinhive关闭之前,每个月都有超过1000万的网络用户成为受害者。本文探讨了Coinhive停止服务后加密世界的新时代。我们旨在了解攻击者是否以及如何继续加密劫持,生成新的恶意脚本并开发新的方法。我们使用了Hong等人在2018年提出的名为CMTracker的加密劫持检测器。我们自动和手动检查了在Coinhive关闭之前CMTracker检测到的2770个网站。结果显示,99%的网站不再继续加密劫持。1%的网站仍然运行8个独特的挖掘脚本。通过跟踪这些挖矿脚本,我们检测到632个独特的加密劫持网站。此外,开源调查(OSINT)表明攻击者仍然使用相同的方法。因此,我们列出了典型的加密劫持模式。我们的结论是,在Coinhive关闭后,加密劫持并没有消亡。它还活着,但不像以前那么吸引人了。
{"title":"Is Cryptojacking Dead After Coinhive Shutdown?","authors":"Said Varlioglu, Bilal Gonen, Murat Ozer, Mehmet F. Bastug","doi":"10.1109/ICICT50521.2020.00068","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00068","url":null,"abstract":"Cryptojacking is the exploitation of victims' computer resources to mine for cryptocurrency using malicious scripts. It had become popular after 2017 when attackers started to exploit legal mining scripts, especially Coinhive scripts. Coinhive was actually a legal mining service that provided scripts and servers for in-browser mining activities. Nevertheless, over 10 million web users had been victims every month before the Coinhive shutdown that happened in Mar 2019. This paper explores the new era of the cryptojacking world after Coinhive discontinued its service. We aimed to see whether and how attackers continue cryptojacking, generate new malicious scripts, and developed new methods. We used a capable cryptojacking detector named CMTracker that proposed by Hong et al. in 2018. We automatically and manually examined 2770 websites that had been detected by CMTracker before the Coinhive shutdown. The results revealed that 99% of sites no longer continue cryptojacking. 1% of websites still run 8 unique mining scripts. By tracking these mining scripts, we detected 632 unique cryptojacking websites. Moreover, open-source investigations (OSINT) demonstrated that attackers still use the same methods. Therefore, we listed the typical patterns of cryptojacking. We concluded that cryptojacking is not dead after the Coinhive shutdown. It is still alive, but not as attractive as it used to be.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133935861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
New Perspective of Interpretability of Deep Neural Networks 深度神经网络可解释性的新视角
Pub Date : 2019-09-12 DOI: 10.1109/ICICT50521.2020.00020
Masanari Kimura, Masayuki Tanaka
Deep neural networks (DNNs) are known as black-box models. In other words, it is difficult to interpret the internal state of the model. Improving the interpretability of DNNs is one of the hot research topics. However, at present, the definition of interpretability for DNNs is vague, and the question of what is a highly explanatory model is still controversial. To address this issue, we provide the definition of the human predictability of the model, as a part of the interpretability of the DNNs. The human predictability proposed in this paper is defined by easiness to predict the change of the inference when perturbating the model of the DNNs. In addition, we introduce one example of high human-predictable DNNs. We discuss that our definition will help to the research of the interpretability of the DNNs considering various types of applications.
深度神经网络(dnn)被称为黑盒模型。换句话说,很难解释模型的内部状态。提高深度神经网络的可解释性是目前研究的热点之一。然而,目前对于深度神经网络的可解释性的定义是模糊的,什么是高度解释性模型的问题仍然存在争议。为了解决这个问题,我们提供了模型的人类可预测性的定义,作为dnn可解释性的一部分。本文提出的人类可预测性是指当对深度神经网络的模型进行扰动时,推理的变化易于预测。此外,我们还介绍了一个高人类可预测深度神经网络的例子。我们讨论了我们的定义将有助于研究dnn的可解释性,考虑到各种类型的应用。
{"title":"New Perspective of Interpretability of Deep Neural Networks","authors":"Masanari Kimura, Masayuki Tanaka","doi":"10.1109/ICICT50521.2020.00020","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00020","url":null,"abstract":"Deep neural networks (DNNs) are known as black-box models. In other words, it is difficult to interpret the internal state of the model. Improving the interpretability of DNNs is one of the hot research topics. However, at present, the definition of interpretability for DNNs is vague, and the question of what is a highly explanatory model is still controversial. To address this issue, we provide the definition of the human predictability of the model, as a part of the interpretability of the DNNs. The human predictability proposed in this paper is defined by easiness to predict the change of the inference when perturbating the model of the DNNs. In addition, we introduce one example of high human-predictable DNNs. We discuss that our definition will help to the research of the interpretability of the DNNs considering various types of applications.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132820532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 3rd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1