首页 > 最新文献

Proceedings of the 9th International Symposium on Information and Communication Technology最新文献

英文 中文
Fully Residual Convolutional Neural Networks for Aerial Image Segmentation 航空图像分割的全残差卷积神经网络
D. V. Sang, N. D. Minh
Semantic segmentation from aerial imagery is one of the most essential tasks in the field of remote sensing with various potential applications ranging from map creation to intelligence service. One of the most challenging factors of these tasks is the very heterogeneous appearance of artificial objects like buildings, cars and natural entities such as trees, low vegetation in very high-resolution digital images. In this paper, we propose an efficient deep learning approach to aerial image segmentation. Our approach utilizes the architecture of fully convolutional network (FCN) based on the backbone ResNet101 with additional upsampling skip connections. Besides typical color channels, we also use DSM and normalized DSM (nDSM) as the input data of our models. We achieve overall accuracy of 91%, which is in top 4 among 140 submissions from all over the world on the well-known Vaihingen dataset from ISPRS 2D Semantic Labeling Contest. Especially, our approach yields better results then all state-of-the-art methods in segmentation of car objects.
航空图像的语义分割是遥感领域最重要的任务之一,具有从地图制作到情报服务等多种潜在应用。这些任务中最具挑战性的因素之一是,在非常高分辨率的数字图像中,建筑物、汽车等人工物体和树木、低植被等自然实体的外观非常不同。在本文中,我们提出了一种高效的航空图像分割的深度学习方法。我们的方法利用基于骨干ResNet101的全卷积网络(FCN)架构,并具有额外的上采样跳过连接。除了典型的色彩通道外,我们还使用DSM和归一化DSM (nDSM)作为模型的输入数据。我们实现了91%的总体准确率,在ISPRS 2D语义标记竞赛中来自世界各地的140个提交的著名Vaihingen数据集中排名前四。特别是,我们的方法在分割汽车对象方面比所有最先进的方法产生更好的结果。
{"title":"Fully Residual Convolutional Neural Networks for Aerial Image Segmentation","authors":"D. V. Sang, N. D. Minh","doi":"10.1145/3287921.3287970","DOIUrl":"https://doi.org/10.1145/3287921.3287970","url":null,"abstract":"Semantic segmentation from aerial imagery is one of the most essential tasks in the field of remote sensing with various potential applications ranging from map creation to intelligence service. One of the most challenging factors of these tasks is the very heterogeneous appearance of artificial objects like buildings, cars and natural entities such as trees, low vegetation in very high-resolution digital images. In this paper, we propose an efficient deep learning approach to aerial image segmentation. Our approach utilizes the architecture of fully convolutional network (FCN) based on the backbone ResNet101 with additional upsampling skip connections. Besides typical color channels, we also use DSM and normalized DSM (nDSM) as the input data of our models. We achieve overall accuracy of 91%, which is in top 4 among 140 submissions from all over the world on the well-known Vaihingen dataset from ISPRS 2D Semantic Labeling Contest. Especially, our approach yields better results then all state-of-the-art methods in segmentation of car objects.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114493585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Personal Diary Generation from Wearable Cameras with Concept Augmented Image Captioning and Wide Trail Strategy 基于概念增强图像字幕和宽径策略的可穿戴相机的个人日记生成
Viet-Khoa Vo-Ho, Quoc-An Luong, Duy-Tam Nguyen, Mai-Khiem Tran, Minh-Triet Tran
Writing diary is not only a hobby but also provides a personal lifelog for better analysis and understanding of a user's daily activities and events. However, in a busy society, people may not have enough time to write in diary all their social interaction. This motivates our proposal to develop a ubiquitous system to automatically generate daily text diary using our novel method for image captioning from photos taken periodically from wearable cameras. We propose to incorporate common visual concepts extracted from a photo to enhance the details of the image description. We also propose a wide trail beam search strategy to enhance the naturalness of text caption. Our captioning method improves the results on MSCOCO dataset on four metrics: BLEU, METEOR, ROUGE-L, CIDEr. As compared to the method proposed by Xu et.al and Neuraltalk of Karpathy, our model has better performance on all four metrics. We also develop smart glasses and a prototype smart workplace in which people can have their personal diary generated from photos taken by smart glasses. Furthermore, we also apply a transformer machine translation model in order to translate captions into Vietnamese language. The results are promising and can be used for Vietnamese people.
写日记不仅是一种爱好,也是一种个人生活日志,可以更好地分析和理解用户的日常活动和事件。然而,在一个繁忙的社会中,人们可能没有足够的时间在日记中写下他们所有的社交活动。这促使我们提出开发一种无处不在的系统,使用我们的新方法从可穿戴相机定期拍摄的照片中自动生成每日文本日记。我们建议结合从照片中提取的常见视觉概念来增强图像描述的细节。我们还提出了一种宽尾束搜索策略来增强文本标题的自然度。我们的字幕方法在四个指标上改进了MSCOCO数据集上的结果:BLEU, METEOR, ROUGE-L, CIDEr。与Xu等人和Karpathy的Neuraltalk提出的方法相比,我们的模型在所有四个指标上都有更好的表现。我们还开发了智能眼镜和一个原型智能工作场所,人们可以通过智能眼镜拍摄的照片生成个人日记。此外,我们还应用了一个变压器机器翻译模型,将字幕翻译成越南语。结果是有希望的,可以用于越南人民。
{"title":"Personal Diary Generation from Wearable Cameras with Concept Augmented Image Captioning and Wide Trail Strategy","authors":"Viet-Khoa Vo-Ho, Quoc-An Luong, Duy-Tam Nguyen, Mai-Khiem Tran, Minh-Triet Tran","doi":"10.1145/3287921.3287955","DOIUrl":"https://doi.org/10.1145/3287921.3287955","url":null,"abstract":"Writing diary is not only a hobby but also provides a personal lifelog for better analysis and understanding of a user's daily activities and events. However, in a busy society, people may not have enough time to write in diary all their social interaction. This motivates our proposal to develop a ubiquitous system to automatically generate daily text diary using our novel method for image captioning from photos taken periodically from wearable cameras. We propose to incorporate common visual concepts extracted from a photo to enhance the details of the image description. We also propose a wide trail beam search strategy to enhance the naturalness of text caption. Our captioning method improves the results on MSCOCO dataset on four metrics: BLEU, METEOR, ROUGE-L, CIDEr. As compared to the method proposed by Xu et.al and Neuraltalk of Karpathy, our model has better performance on all four metrics. We also develop smart glasses and a prototype smart workplace in which people can have their personal diary generated from photos taken by smart glasses. Furthermore, we also apply a transformer machine translation model in order to translate captions into Vietnamese language. The results are promising and can be used for Vietnamese people.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130237580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation 采用区块链技术进行革命性创新的机遇与挑战调查
Phan The Duy, Do Thi Thu Hien, Do Hoang Hien, V. Pham
In the "Industry 4.0" era, blockchain as well as related distributed ledger technologies has been an unmissable trend for both academy and industry recently. Blockchain technology has become famous as the innovative technology that underlies cryptocurrencies such as Bitcoin and Ethereum platform. It also has been spreading with multiple industries exploring their capabilities and new blockchain use cases springing up on a daily basis. Its emergence has brought a great deal of impact on how the information will be stored and processed securely. Furthermore, almost of advocates say that blockchain will disrupt and change everything from education to financial payments, insurance, intellectual property, healthcare,... in the years to come. However, a comprehensive survey on potential and issues of blockchain adoption in academy and industry has not been yet accomplished. This paper tries to conduct a comprehensive survey on the blockchain technology adoption by discussing its influences as well as the opportunities and challenges when utilizing it in the real-world scenarios.
在“工业4.0”时代,区块链及其相关的分布式账本技术已经成为学术界和工业界不可错过的趋势。区块链技术作为比特币和以太坊平台等加密货币的基础创新技术而闻名。它也一直在传播,多个行业都在探索自己的能力,每天都有新的区块链用例涌现。它的出现给信息的安全存储和处理带来了很大的影响。此外,几乎所有的倡导者都表示,区块链将颠覆和改变一切,从教育到金融支付、保险、知识产权、医疗保健……在未来的岁月里。然而,关于区块链在学术界和工业界采用的潜力和问题的全面调查尚未完成。本文试图对区块链技术的采用进行全面调查,讨论其影响以及在现实场景中使用它时的机遇和挑战。
{"title":"A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation","authors":"Phan The Duy, Do Thi Thu Hien, Do Hoang Hien, V. Pham","doi":"10.1145/3287921.3287978","DOIUrl":"https://doi.org/10.1145/3287921.3287978","url":null,"abstract":"In the \"Industry 4.0\" era, blockchain as well as related distributed ledger technologies has been an unmissable trend for both academy and industry recently. Blockchain technology has become famous as the innovative technology that underlies cryptocurrencies such as Bitcoin and Ethereum platform. It also has been spreading with multiple industries exploring their capabilities and new blockchain use cases springing up on a daily basis. Its emergence has brought a great deal of impact on how the information will be stored and processed securely. Furthermore, almost of advocates say that blockchain will disrupt and change everything from education to financial payments, insurance, intellectual property, healthcare,... in the years to come. However, a comprehensive survey on potential and issues of blockchain adoption in academy and industry has not been yet accomplished. This paper tries to conduct a comprehensive survey on the blockchain technology adoption by discussing its influences as well as the opportunities and challenges when utilizing it in the real-world scenarios.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Detecting Attacks on Web Applications using Autoencoder 使用自动编码器检测对Web应用程序的攻击
Hieu Mac, Dung Truong, Lam Nguyen, Hoa Nguyen, H. Tran, Duc Tran
Web attacks have become a real threat to the Internet. This paper proposes the use of autoencoder to detect malicious pattern in the HTTP/HTTPS requests. The autoencoder is able to operate on the raw data and thus, does not require the hand-crafted features to be extracted. We evaluate the original autoencoder and its variants and end up with the Regularized Deep Autoencoder, which can achieve an F1-score of 0.9463 on the CSIC 2010 dataset. It also produces a better performance with respect to OWASP Core Rule Set and other one-class methods, reported in the literature. The Regularized Deep Autoencoder is then combined with Modsecurity in order to protect a website in real time. This algorithm proves to be comparable to the original Modsecurity in terms of computation time and is ready to be deployed in practice.
网络攻击已经成为互联网的真正威胁。本文提出使用自编码器检测HTTP/HTTPS请求中的恶意模式。自动编码器能够对原始数据进行操作,因此不需要提取手工制作的特征。我们评估了原始的自编码器及其变体,最终得到了正则化深度自编码器,该自编码器在CSIC 2010数据集上的f1得分为0.9463。根据文献报道,相对于OWASP核心规则集和其他单类方法,它也产生了更好的性能。然后将正则化深度自动编码器与Modsecurity相结合,以实时保护网站。该算法在计算时间上与原来的Modsecurity算法相当,可以在实际中部署。
{"title":"Detecting Attacks on Web Applications using Autoencoder","authors":"Hieu Mac, Dung Truong, Lam Nguyen, Hoa Nguyen, H. Tran, Duc Tran","doi":"10.1145/3287921.3287946","DOIUrl":"https://doi.org/10.1145/3287921.3287946","url":null,"abstract":"Web attacks have become a real threat to the Internet. This paper proposes the use of autoencoder to detect malicious pattern in the HTTP/HTTPS requests. The autoencoder is able to operate on the raw data and thus, does not require the hand-crafted features to be extracted. We evaluate the original autoencoder and its variants and end up with the Regularized Deep Autoencoder, which can achieve an F1-score of 0.9463 on the CSIC 2010 dataset. It also produces a better performance with respect to OWASP Core Rule Set and other one-class methods, reported in the literature. The Regularized Deep Autoencoder is then combined with Modsecurity in order to protect a website in real time. This algorithm proves to be comparable to the original Modsecurity in terms of computation time and is ready to be deployed in practice.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124205649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Quantifying the Approaching Behaviors for Interactions in Detecting Estrus of Breeding Cattle 种牛发情检测中相互作用接近行为的量化
Shunta Fukumoto, Ryo Nishide, Yumi Takaki, C. Ohta, K. Oyama, T. Ohkawa
In the management of beef cattle breeding, estrus detection is especially important for improving productivity. Generally, pedometers have been used since the past few decades to measure the increase in momentum, which is likely to occur during estrus. Cattle are known to be social animals which take unique actions such as the approaching or mounting other cattle during estrus. However, the sociality of cattle has not been focused much on detecting estrus accurately. In this paper, we propose the method to detect estrus in relation to the approaching behavior between cattle. We extract the approaching behaviorbased on position information from GPS devices attached to the cattle. Our method focuses on moving direction to detect even small approaching actions with which the momentum may not increase clearly. Furthermore, we conducted an experiment based on the records of artificial insemination to examine the efficiency of our method. As a result, we verified some cases with a distinctive characteristic related to approaching behavior, which occurred during the days when the pregnancy was confirmed from the artificial insemination records.
在肉牛养殖管理中,发情检测对提高生产力尤为重要。一般来说,计步器自过去几十年以来一直用于测量动量的增加,这可能发生在发情期。众所周知,牛是群居动物,在发情期间会采取独特的行动,如接近或骑上其他牛。然而,牛的社会性并没有集中在准确地检测发情上。在本文中,我们提出了一种检测发情与牛之间接近行为之间关系的方法。我们根据安装在牛身上的GPS设备的位置信息提取接近行为。我们的方法侧重于移动方向,以检测即使是很小的接近动作,动量可能不会明显增加。此外,我们还根据人工授精的记录进行了实验,以检验我们的方法的效率。因此,我们验证了一些与接近行为相关的明显特征的病例,这些病例发生在从人工授精记录中确认怀孕的日子里。
{"title":"Quantifying the Approaching Behaviors for Interactions in Detecting Estrus of Breeding Cattle","authors":"Shunta Fukumoto, Ryo Nishide, Yumi Takaki, C. Ohta, K. Oyama, T. Ohkawa","doi":"10.1145/3287921.3287944","DOIUrl":"https://doi.org/10.1145/3287921.3287944","url":null,"abstract":"In the management of beef cattle breeding, estrus detection is especially important for improving productivity. Generally, pedometers have been used since the past few decades to measure the increase in momentum, which is likely to occur during estrus. Cattle are known to be social animals which take unique actions such as the approaching or mounting other cattle during estrus. However, the sociality of cattle has not been focused much on detecting estrus accurately. In this paper, we propose the method to detect estrus in relation to the approaching behavior between cattle. We extract the approaching behaviorbased on position information from GPS devices attached to the cattle. Our method focuses on moving direction to detect even small approaching actions with which the momentum may not increase clearly. Furthermore, we conducted an experiment based on the records of artificial insemination to examine the efficiency of our method. As a result, we verified some cases with a distinctive characteristic related to approaching behavior, which occurred during the days when the pregnancy was confirmed from the artificial insemination records.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133944252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Parallel Algorithm for Computing the Closeness Centrality in Social Networks 一种计算社交网络亲密度中心性的高效并行算法
P. Du, N. Chau, K. Nguyen, N. Nguyen
Closeness centrality is an substantial metric used in large-scale network analysis, in particular social networks. Determining closeness centrality from a vertex to all other vertices in the graph is a high complexity problem. Prior work has a strong focuses on the algorithmic aspect of the problem, and little attention has been paid to the definition of the data structure supporting the implementation of the algorithm. Thus, we present in this paper an efficient algorithm to compute the closeness centrality of all nodes in a social network. Our algorithm is based on (i) an appropriate data structure for increasing the cache hit rate, and then reducing amount of time accessing the main memory for the graph data, and (ii) an efficient and parallel complete BFS search to reduce the execution time. We tested performance of our algorithm, namely BigGraph, with five different real-world social networks and compare the performance to that of current approaches including TeexGraph and NetworKit. Experiment results show that BigGraph is faster than TeexGraph and NetworKit 1.27-2.12 and 14.78-68.21 times, respectively.
亲密中心性是大规模网络分析中使用的重要度量,特别是社会网络。确定图中一个顶点到所有其他顶点的接近中心性是一个高度复杂的问题。先前的工作强烈关注问题的算法方面,而很少关注支持算法实现的数据结构的定义。因此,我们提出了一种有效的算法来计算社交网络中所有节点的接近中心性。我们的算法是基于(i)一个适当的数据结构,以提高缓存命中率,然后减少访问主内存的时间为图形数据,和(ii)一个有效的和并行的完整BFS搜索,以减少执行时间。我们在五种不同的现实世界社交网络上测试了我们的算法,即BigGraph的性能,并将其与现有方法(包括texgraph和NetworKit)的性能进行了比较。实验结果表明,BigGraph比texgraph和NetworKit分别快1.27 ~ 2.12倍和14.78 ~ 68.21倍。
{"title":"An Efficient Parallel Algorithm for Computing the Closeness Centrality in Social Networks","authors":"P. Du, N. Chau, K. Nguyen, N. Nguyen","doi":"10.1145/3287921.3287981","DOIUrl":"https://doi.org/10.1145/3287921.3287981","url":null,"abstract":"Closeness centrality is an substantial metric used in large-scale network analysis, in particular social networks. Determining closeness centrality from a vertex to all other vertices in the graph is a high complexity problem. Prior work has a strong focuses on the algorithmic aspect of the problem, and little attention has been paid to the definition of the data structure supporting the implementation of the algorithm. Thus, we present in this paper an efficient algorithm to compute the closeness centrality of all nodes in a social network. Our algorithm is based on (i) an appropriate data structure for increasing the cache hit rate, and then reducing amount of time accessing the main memory for the graph data, and (ii) an efficient and parallel complete BFS search to reduce the execution time. We tested performance of our algorithm, namely BigGraph, with five different real-world social networks and compare the performance to that of current approaches including TeexGraph and NetworKit. Experiment results show that BigGraph is faster than TeexGraph and NetworKit 1.27-2.12 and 14.78-68.21 times, respectively.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A matrix completion method for drug response prediction in personalized medicine 个体化医疗中药物反应预测的矩阵补全方法
Giang T. T. Nguyen, Duc-Hau Le
One of the significant goals of personalized medicine is to provide the right treatment to patients based on their molecular features. Several big projects have been launched and generated a large amount of -omics and drug response data for cell lines of the human. These projects are very useful for testing of drug responses on cell lines before employing clinical trials on humans. However, a range of drugs and cell lines have not been tested yet. Thus, many computational methods attempt to predict such the responses to maximize the treatment efficiency and to minimize side-effects. These methods use not only known drug -- cell lines responses but also the similarity between drugs and between cell lines. Nevertheless, -omics data for cell lines which is used to calculate the cell-line similarities usually varies among platforms leading to heterogeneous results. Therefore, in this study, we propose a drug response prediction method (MCDRP) based on a matrix completion technique using only known drug -- cell lines response information to predict drug responses for untested cell lines. The method can impute responses for not only one at time but also all drugs simultaneously. In comparison with other methods, we found that our method achieved better performance for IC50 response measurement.
个性化医疗的一个重要目标是根据患者的分子特征为他们提供正确的治疗。几个大型项目已经启动,并产生了大量的人类细胞系组学和药物反应数据。这些项目对于在对人体进行临床试验之前在细胞系上测试药物反应非常有用。然而,一系列药物和细胞系尚未经过测试。因此,许多计算方法试图预测这样的反应,以最大限度地提高治疗效率和最小化副作用。这些方法不仅利用已知的药物-细胞系反应,而且利用药物之间和细胞系之间的相似性。然而,用于计算细胞系相似性的细胞系组学数据通常因平台而异,导致结果不一致。因此,在本研究中,我们提出了一种基于矩阵补全技术的药物反应预测方法(MCDRP),该方法仅使用已知的药物-细胞系反应信息来预测未经测试的细胞系的药物反应。该方法不仅可以同时计算一种药物的反应,还可以同时计算所有药物的反应。与其他方法相比,我们发现我们的方法获得了更好的IC50响应测量性能。
{"title":"A matrix completion method for drug response prediction in personalized medicine","authors":"Giang T. T. Nguyen, Duc-Hau Le","doi":"10.1145/3287921.3287974","DOIUrl":"https://doi.org/10.1145/3287921.3287974","url":null,"abstract":"One of the significant goals of personalized medicine is to provide the right treatment to patients based on their molecular features. Several big projects have been launched and generated a large amount of -omics and drug response data for cell lines of the human. These projects are very useful for testing of drug responses on cell lines before employing clinical trials on humans. However, a range of drugs and cell lines have not been tested yet. Thus, many computational methods attempt to predict such the responses to maximize the treatment efficiency and to minimize side-effects. These methods use not only known drug -- cell lines responses but also the similarity between drugs and between cell lines. Nevertheless, -omics data for cell lines which is used to calculate the cell-line similarities usually varies among platforms leading to heterogeneous results. Therefore, in this study, we propose a drug response prediction method (MCDRP) based on a matrix completion technique using only known drug -- cell lines response information to predict drug responses for untested cell lines. The method can impute responses for not only one at time but also all drugs simultaneously. In comparison with other methods, we found that our method achieved better performance for IC50 response measurement.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127955635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Semantics Based Substituting Technique for Reducing Code Bloat in Genetic Programming 减少遗传规划中代码膨胀的基于语义的替换技术
Thi Huong Chu, Nguyen Quang Uy, V. Cao
Genetic Programming (GP) is a technique that allows computer programs encoded as a set of tree structures to be evolved using an evolutionary algorithm. In GP, code bloat is a common phenomenon characterized by the size of individuals gradually increasing during the evolution. This phenomenon has a negative impact on GP performance in solving problems. In order to address this problem, we have recently introduced a code bloat control method based on semantics: Substituting a subtree with an Approximate Terminal (SAT-GP). In this paper, we propose an extension of SAT-GP, namely Substituting a subtree with an Approximate Subprogram (SAS-GP). We tested this method with different GP parameter settings on a real-world time series forecasting problem. The experimental results demonstrate the benefit of the proposed method in reducing the code bloat phenomenon and improving GP performance. Particularly, SAS-GP often achieves the best performance compared to other tested GP systems using four popular performance metrics in GP.
遗传编程(GP)是一种技术,它允许将计算机程序编码为一组树结构,并使用进化算法进行进化。在GP中,代码膨胀是一种常见的现象,其特征是个体的大小在进化过程中逐渐增加。这种现象对GP解决问题的表现有负面影响。为了解决这个问题,我们最近引入了一种基于语义的代码膨胀控制方法:用近似终端(SAT-GP)代替子树。本文提出了SAT-GP的一个扩展,即用近似子规划代替子树(SAS-GP)。我们在一个真实的时间序列预测问题上用不同的GP参数设置测试了这种方法。实验结果表明,该方法在减少代码膨胀现象和提高GP性能方面具有良好的效果。特别是,SAS-GP使用GP中四个流行的性能指标,与其他经过测试的GP系统相比,通常可以实现最佳性能。
{"title":"Semantics Based Substituting Technique for Reducing Code Bloat in Genetic Programming","authors":"Thi Huong Chu, Nguyen Quang Uy, V. Cao","doi":"10.1145/3287921.3287948","DOIUrl":"https://doi.org/10.1145/3287921.3287948","url":null,"abstract":"Genetic Programming (GP) is a technique that allows computer programs encoded as a set of tree structures to be evolved using an evolutionary algorithm. In GP, code bloat is a common phenomenon characterized by the size of individuals gradually increasing during the evolution. This phenomenon has a negative impact on GP performance in solving problems. In order to address this problem, we have recently introduced a code bloat control method based on semantics: Substituting a subtree with an Approximate Terminal (SAT-GP). In this paper, we propose an extension of SAT-GP, namely Substituting a subtree with an Approximate Subprogram (SAS-GP). We tested this method with different GP parameter settings on a real-world time series forecasting problem. The experimental results demonstrate the benefit of the proposed method in reducing the code bloat phenomenon and improving GP performance. Particularly, SAS-GP often achieves the best performance compared to other tested GP systems using four popular performance metrics in GP.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Blockchain and Internet of Things Opportunities and Challenges 区块链与物联网的机遇与挑战
Kimheng Sok, Jean-Noel Colin, Kimtho Po
We are now living in the significant era where technologies are advancing very quickly. Among the leading technologies, Internet of Things or IoT in short is standing at the peak of inflated expectation in the Gartner Hype Cycle [1]. The application of IoT has evolved from home appliances in the smart home environment such as smart tv, smart refrigerator, smart door and has grown into smart building, smart city, smart healthcare, smart industry. We could imagine that everything could go online to cut cost, add value to businesses and increase users convenience. The prediction has been made [2] that there will be 50 Billion IoT devices by 2020. Along the new revolution there has also been threats that significantly warned us if we didn't take security into account some bad things could happen, such as Mirai botnet [3] attacked dyn DNS server by using vulnerable IoT devices which turned smart devices became exploitable or vulnerable devices and named as the weakness link of the network. At the same time another hype among technology communities of using Blockchain Technology to secure the Internet of Things is getting mainstream. Blockchain is not a silver bullet to secure Internet of Things, in this paper we will propose an architecture model of using a Blockchain called Hyperledger Fabric to secure the Internet of Things network in a smart classroom scenario and integrated with The Thing Networks (TTN) cloud server and demonstrates the opportunities and challenges of this concept by taking security properties such as confidentiality, integrity, availability and non-repudiation to evaluate the concept.
我们现在生活在一个科技飞速发展的重要时代。在领先的技术中,物联网(Internet of Things,简称IoT)在Gartner Hype Cycle中处于膨胀预期的顶峰[1]。物联网的应用已经从智能电视、智能冰箱、智能门等智能家居环境中的家电发展到智能建筑、智慧城市、智慧医疗、智慧产业。我们可以想象,所有东西都可以放到网上,以降低成本,为企业增值,并增加用户的便利性。据预测[2],到2020年将有500亿台物联网设备。在新的革命中,也有一些威胁,如果我们不考虑安全问题,一些不好的事情可能会发生,例如Mirai僵尸网络[3]通过使用易受攻击的物联网设备攻击dyn DNS服务器,使智能设备成为可利用或易受攻击的设备,并被命名为网络的薄弱环节。与此同时,另一种利用区块链技术来保护物联网的炒作正在成为主流。区块链并不是保护物联网安全的灵丹妙策,在本文中,我们将提出一种架构模型,使用称为超级账本结构的区块链来保护智能教室场景中的物联网网络,并与物联网(TTN)云服务器集成,并通过采用机密性、完整性、可用性和不可否认性等安全属性来评估这一概念,从而展示这一概念的机遇和挑战。
{"title":"Blockchain and Internet of Things Opportunities and Challenges","authors":"Kimheng Sok, Jean-Noel Colin, Kimtho Po","doi":"10.1145/3287921.3287933","DOIUrl":"https://doi.org/10.1145/3287921.3287933","url":null,"abstract":"We are now living in the significant era where technologies are advancing very quickly. Among the leading technologies, Internet of Things or IoT in short is standing at the peak of inflated expectation in the Gartner Hype Cycle [1]. The application of IoT has evolved from home appliances in the smart home environment such as smart tv, smart refrigerator, smart door and has grown into smart building, smart city, smart healthcare, smart industry. We could imagine that everything could go online to cut cost, add value to businesses and increase users convenience. The prediction has been made [2] that there will be 50 Billion IoT devices by 2020. Along the new revolution there has also been threats that significantly warned us if we didn't take security into account some bad things could happen, such as Mirai botnet [3] attacked dyn DNS server by using vulnerable IoT devices which turned smart devices became exploitable or vulnerable devices and named as the weakness link of the network. At the same time another hype among technology communities of using Blockchain Technology to secure the Internet of Things is getting mainstream. Blockchain is not a silver bullet to secure Internet of Things, in this paper we will propose an architecture model of using a Blockchain called Hyperledger Fabric to secure the Internet of Things network in a smart classroom scenario and integrated with The Thing Networks (TTN) cloud server and demonstrates the opportunities and challenges of this concept by taking security properties such as confidentiality, integrity, availability and non-repudiation to evaluate the concept.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133971490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Inspecting rice seed species purity on a large dataset using geometrical and morphological features 利用几何和形态特征在大数据集上检测水稻种子物种纯度
Hai Vu, Van Ngoc Duong, Thuy Thi Nguyen
Although there is a great interest in developing automatical machines for classifying rice seed varieties, it is still unclear if differences in performance of existing techniques come from better feature descriptors or if this is due to varying inter-class or intra-class among the examined species. In this paper, we present a novel method for inspecting purity of rice seed species from the largest number of rice species dataset. The proposed method is conducted utilizing both morphological and geometrical features extracted from high resolution RGB images. Particularly, we take into account relevant pre-processing techniques so that the collected seeds are normalized by their biological structure. As a consequent, the geometrical features at local part of a seed can measured precisely. In addition, whereas existing methods include a limitation number (or a few) of examined species, we construct a dataset a much larger number of species. Because of a sufficient number of species, we can analyze the dependence of a classification performance on similarities of species (or their distinguishable), or types of the extracted features. In the evaluations, we confirm that both morphological features and geometrical features are informative. Combinations of them achieve the highest performances. Extensive evaluations on several schemes of different classifiers as well as several sub-datasets which consist of varying similarity of species are taken into account. These evaluations confirm stability and feasibility of the proposed method.
尽管人们对开发用于水稻种子品种分类的自动机器很感兴趣,但尚不清楚现有技术的性能差异是来自更好的特征描述符,还是由于所研究物种之间的类间或类内差异。在本文中,我们提出了一种从最大量的水稻物种数据集中检测水稻种子物种纯度的新方法。该方法利用从高分辨率RGB图像中提取的形态和几何特征进行。特别是,我们考虑到相关的预处理技术,使收集的种子按其生物结构进行规范化。因此,可以精确地测量种子局部的几何特征。此外,尽管现有的方法只包含有限数量(或少数)的被检查物种,但我们构建了一个物种数量大得多的数据集。由于物种数量足够多,我们可以分析分类性能对物种相似性(或其可区分性)或提取特征类型的依赖性。在评估中,我们确认形态特征和几何特征都是信息丰富的。它们的组合可以达到最高的性能。对不同分类器的几种方案以及由不同物种相似度组成的几个子数据集进行了广泛的评估。这些评价证实了所提方法的稳定性和可行性。
{"title":"Inspecting rice seed species purity on a large dataset using geometrical and morphological features","authors":"Hai Vu, Van Ngoc Duong, Thuy Thi Nguyen","doi":"10.1145/3287921.3287983","DOIUrl":"https://doi.org/10.1145/3287921.3287983","url":null,"abstract":"Although there is a great interest in developing automatical machines for classifying rice seed varieties, it is still unclear if differences in performance of existing techniques come from better feature descriptors or if this is due to varying inter-class or intra-class among the examined species. In this paper, we present a novel method for inspecting purity of rice seed species from the largest number of rice species dataset. The proposed method is conducted utilizing both morphological and geometrical features extracted from high resolution RGB images. Particularly, we take into account relevant pre-processing techniques so that the collected seeds are normalized by their biological structure. As a consequent, the geometrical features at local part of a seed can measured precisely. In addition, whereas existing methods include a limitation number (or a few) of examined species, we construct a dataset a much larger number of species. Because of a sufficient number of species, we can analyze the dependence of a classification performance on similarities of species (or their distinguishable), or types of the extracted features. In the evaluations, we confirm that both morphological features and geometrical features are informative. Combinations of them achieve the highest performances. Extensive evaluations on several schemes of different classifiers as well as several sub-datasets which consist of varying similarity of species are taken into account. These evaluations confirm stability and feasibility of the proposed method.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123969343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 9th International Symposium on Information and Communication Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1