首页 > 最新文献

Computers最新文献

英文 中文
Low-Cost Multisensory Robot for Optimized Path Planning in Diverse Environments 用于在不同环境中优化路径规划的低成本多感知机器人
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-12-01 DOI: 10.3390/computers12120250
Rohit Mittal, Geeta Rani, Vibhakar Pathak, Sonam Chhikara, V. Dhaka, E. Vocaturo, Ester Zumpano
The automation industry faces the challenge of avoiding interference with obstacles, estimating the next move of a robot, and optimizing its path in various environments. Although researchers have predicted the next move of a robot in linear and non-linear environments, there is a lack of precise estimation of sectorial error probability while moving a robot on a curvy path. Additionally, existing approaches use visual sensors, incur high costs for robot design, and ineffective in achieving motion stability on various surfaces. To address these issues, the authors in this manuscript propose a low-cost and multisensory robot capable of moving on an optimized path in diverse environments with eight degrees of freedom. The authors use the extended Kalman filter and unscented Kalman filter for localization and position estimation of the robot. They also compare the sectorial path prediction error at different angles from 0° to 180° and demonstrate the mathematical modeling of various operations involved in navigating the robot. The minimum deviation of 1.125 cm between the actual and predicted path proves the effectiveness of the robot in a real-life environment.
自动化行业面临的挑战是避免障碍物的干扰,估计机器人的下一步行动,并在各种环境中优化其路径。虽然研究人员已经预测了机器人在线性和非线性环境下的下一步移动,但缺乏对机器人在曲线路径上移动时的扇形误差概率的精确估计。此外,现有的方法使用视觉传感器,导致机器人设计成本高,并且无法在各种表面上实现运动稳定性。为了解决这些问题,本文的作者提出了一种低成本的多感官机器人,能够在不同的环境中以优化的路径移动,具有八个自由度。作者采用扩展卡尔曼滤波和无气味卡尔曼滤波对机器人进行定位和位置估计。他们还比较了从0°到180°不同角度的扇形路径预测误差,并演示了导航机器人所涉及的各种操作的数学建模。实际路径与预测路径之间的最小偏差为1.125 cm,证明了机器人在现实环境中的有效性。
{"title":"Low-Cost Multisensory Robot for Optimized Path Planning in Diverse Environments","authors":"Rohit Mittal, Geeta Rani, Vibhakar Pathak, Sonam Chhikara, V. Dhaka, E. Vocaturo, Ester Zumpano","doi":"10.3390/computers12120250","DOIUrl":"https://doi.org/10.3390/computers12120250","url":null,"abstract":"The automation industry faces the challenge of avoiding interference with obstacles, estimating the next move of a robot, and optimizing its path in various environments. Although researchers have predicted the next move of a robot in linear and non-linear environments, there is a lack of precise estimation of sectorial error probability while moving a robot on a curvy path. Additionally, existing approaches use visual sensors, incur high costs for robot design, and ineffective in achieving motion stability on various surfaces. To address these issues, the authors in this manuscript propose a low-cost and multisensory robot capable of moving on an optimized path in diverse environments with eight degrees of freedom. The authors use the extended Kalman filter and unscented Kalman filter for localization and position estimation of the robot. They also compare the sectorial path prediction error at different angles from 0° to 180° and demonstrate the mathematical modeling of various operations involved in navigating the robot. The minimum deviation of 1.125 cm between the actual and predicted path proves the effectiveness of the robot in a real-life environment.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"53 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138626317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
B-PSA: A Binary Pendulum Search Algorithm for the Feature Selection Problem B-PSA:针对特征选择问题的二元摆式搜索算法
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-29 DOI: 10.3390/computers12120249
Broderick Crawford, Felipe Cisternas-Caneo, Katherine Sepúlveda, Ricardo Soto, Álex Paz, Alvaro Peña, Claudio León de la Barra, E. Rodriguez-Tello, Gino Astorga, Carlos Castro, Franklin Johnson, Giovanni Giachetti
The digitization of information and technological advancements have enabled us to gather vast amounts of data from various domains, including but not limited to medicine, commerce, and mining. Machine learning techniques use this information to improve decision-making, but they have a big problem: they are very sensitive to data variation, so it is necessary to clean them to remove irrelevant and redundant information. This removal of information is known as the Feature Selection Problem. This work presents the Pendulum Search Algorithm applied to solve the Feature Selection Problem. As the Pendulum Search Algorithm is a metaheuristic designed for continuous optimization problems, a binarization process is performed using the Two-Step Technique. Preliminary results indicate that our proposal obtains competitive results when compared to other metaheuristics extracted from the literature, solving well-known benchmarks.
信息数字化和技术进步使我们能够从各个领域收集大量数据,包括但不限于医学、商业和采矿。机器学习技术利用这些信息来改进决策,但它们有一个很大的问题:它们对数据变化非常敏感,因此有必要对它们进行清理,以去除不相关的冗余信息。这种信息去除被称为特征选择问题。本作品介绍了用于解决特征选择问题的钟摆搜索算法。由于钟摆搜索算法是一种为连续优化问题而设计的元启发式算法,因此使用两步法进行了二值化处理。初步结果表明,与从文献中提取的其他元启发式算法相比,我们的建议在解决著名的基准问题时获得了有竞争力的结果。
{"title":"B-PSA: A Binary Pendulum Search Algorithm for the Feature Selection Problem","authors":"Broderick Crawford, Felipe Cisternas-Caneo, Katherine Sepúlveda, Ricardo Soto, Álex Paz, Alvaro Peña, Claudio León de la Barra, E. Rodriguez-Tello, Gino Astorga, Carlos Castro, Franklin Johnson, Giovanni Giachetti","doi":"10.3390/computers12120249","DOIUrl":"https://doi.org/10.3390/computers12120249","url":null,"abstract":"The digitization of information and technological advancements have enabled us to gather vast amounts of data from various domains, including but not limited to medicine, commerce, and mining. Machine learning techniques use this information to improve decision-making, but they have a big problem: they are very sensitive to data variation, so it is necessary to clean them to remove irrelevant and redundant information. This removal of information is known as the Feature Selection Problem. This work presents the Pendulum Search Algorithm applied to solve the Feature Selection Problem. As the Pendulum Search Algorithm is a metaheuristic designed for continuous optimization problems, a binarization process is performed using the Two-Step Technique. Preliminary results indicate that our proposal obtains competitive results when compared to other metaheuristics extracted from the literature, solving well-known benchmarks.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"19 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139209721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit Risk Prediction Based on Psychometric Data 基于心理测量数据的信用风险预测
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-28 DOI: 10.3390/computers12120248
Eren Duman, Mehmet S. Aktas, Ezgi Yahsi
In today’s financial landscape, traditional banking institutions rely extensively on customers’ historical financial data to evaluate their eligibility for loan approvals. While these decision support systems offer predictive accuracy for established customers, they overlook a crucial demographic: individuals without a financial history. To address this gap, our study presents a methodology for a decision support system that is intended to assist in determining credit risk. Rather than solely focusing on past financial records, our methodology assesses customer credibility by generating credit risk scores derived from psychometric test results. Utilizing machine learning algorithms, we model customer credibility through multidimensional metrics such as character traits and attitudes toward money management. Preliminary results from our prototype testing indicate that this innovative approach holds promise for accurate risk assessment.
在当今的金融环境中,传统银行机构广泛依赖客户的历史财务数据来评估其贷款审批资格。虽然这些决策支持系统能为成熟客户提供准确的预测,但却忽略了一个重要的群体:没有财务历史的个人。为了弥补这一不足,我们的研究提出了一种决策支持系统方法,旨在协助确定信贷风险。我们的方法不是只关注过去的财务记录,而是通过心理测试结果生成信用风险分数来评估客户的可信度。利用机器学习算法,我们通过性格特征和理财态度等多维指标来建立客户可信度模型。原型测试的初步结果表明,这种创新方法有望实现准确的风险评估。
{"title":"Credit Risk Prediction Based on Psychometric Data","authors":"Eren Duman, Mehmet S. Aktas, Ezgi Yahsi","doi":"10.3390/computers12120248","DOIUrl":"https://doi.org/10.3390/computers12120248","url":null,"abstract":"In today’s financial landscape, traditional banking institutions rely extensively on customers’ historical financial data to evaluate their eligibility for loan approvals. While these decision support systems offer predictive accuracy for established customers, they overlook a crucial demographic: individuals without a financial history. To address this gap, our study presents a methodology for a decision support system that is intended to assist in determining credit risk. Rather than solely focusing on past financial records, our methodology assesses customer credibility by generating credit risk scores derived from psychometric test results. Utilizing machine learning algorithms, we model customer credibility through multidimensional metrics such as character traits and attitudes toward money management. Preliminary results from our prototype testing indicate that this innovative approach holds promise for accurate risk assessment.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"13 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139220012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implement an Accurate Automated Static Analysis Checker to Detect Insecure Use of SecurityManager 设计并实施精确的自动静态分析检查器,检测不安全使用 SecurityManager 的情况
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-28 DOI: 10.3390/computers12120247
Midya Alqaradaghi, Muhammad Zafar Iqbal Nazir, Tamás Kozsik
Static analysis is a software testing technique that analyzes the code without executing it. It is widely used to detect vulnerabilities, errors, and other issues during software development. Many tools are available for static analysis of Java code, including SpotBugs. Methods that perform a security check must be declared private or final; otherwise, they can be compromised when a malicious subclass overrides the methods and omits the checks. In Java, security checks can be performed using the SecurityManager class. This paper addresses the aforementioned problem by building a new automated checker that raises an issue when this rule is violated. The checker is built under the SpotBugs static analysis tool. We evaluated our approach on both custom test cases and real-world software, and the results revealed that the checker successfully detected related bugs in both with optimal metrics values.
静态分析是一种在不执行代码的情况下对代码进行分析的软件测试技术。它被广泛用于检测软件开发过程中的漏洞、错误和其他问题。有许多工具可用于 Java 代码的静态分析,包括 SpotBugs。执行安全检查的方法必须声明为私有或最终;否则,当恶意子类覆盖这些方法并省略检查时,这些方法就会被破坏。在 Java 中,可以使用 SecurityManager 类执行安全检查。本文通过构建一个新的自动检查器来解决上述问题,该检查器可在违反该规则时提出问题。该检查程序是在 SpotBugs 静态分析工具下构建的。我们在自定义测试用例和实际软件上对我们的方法进行了评估,结果表明,检查器成功地检测出了两者中的相关漏洞,并取得了最佳指标值。
{"title":"Design and Implement an Accurate Automated Static Analysis Checker to Detect Insecure Use of SecurityManager","authors":"Midya Alqaradaghi, Muhammad Zafar Iqbal Nazir, Tamás Kozsik","doi":"10.3390/computers12120247","DOIUrl":"https://doi.org/10.3390/computers12120247","url":null,"abstract":"Static analysis is a software testing technique that analyzes the code without executing it. It is widely used to detect vulnerabilities, errors, and other issues during software development. Many tools are available for static analysis of Java code, including SpotBugs. Methods that perform a security check must be declared private or final; otherwise, they can be compromised when a malicious subclass overrides the methods and omits the checks. In Java, security checks can be performed using the SecurityManager class. This paper addresses the aforementioned problem by building a new automated checker that raises an issue when this rule is violated. The checker is built under the SpotBugs static analysis tool. We evaluated our approach on both custom test cases and real-world software, and the results revealed that the checker successfully detected related bugs in both with optimal metrics values.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"46 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139216075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset 在 CSE-CIC-IDS-2018 数据集上分三个阶段优化入侵检测系统
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-24 DOI: 10.3390/computers12120245
Surasit Songma, Theera Sathuphan, Thanakorn Pamutha
This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018 dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory data analysis, and data normalization procedures (min-max and Z-score) are used to prepare data for use with various classifiers; second, in order to improve processing speed and reduce model complexity, a combination of principal component analysis (PCA) and random forest (RF) is used to reduce non-significant features by comparing them to the full dataset; finally, machine learning methods (XGBoost, CART, DT, KNN, MLP, RF, LR, and Bayes) are applied to specific features and preprocessing procedures, with the XGBoost, DT, and RF models outperforming the others in terms of both ROC values and CPU runtime. The evaluation concludes with the discovery of an optimal set, which includes PCA and RF feature selection.
本文利用 CSE-CIC-IDS-2018 数据集深入研究了入侵检测系统。研究分为三个阶段:首先,使用数据清理、探索性数据分析和数据归一化程序(最小最大值和 Z-score)来准备数据,以便与各种分类器配合使用;其次,为了提高处理速度并降低模型复杂性,使用主成分分析(PCA)和随机森林(RF)相结合的方法,通过与完整数据集进行比较来减少非显著特征;最后,对特定特征和预处理程序采用机器学习方法(XGBoost、CART、DT、KNN、MLP、RF、LR 和 Bayes),其中 XGBoost、DT 和 RF 模型在 ROC 值和 CPU 运行时间方面都优于其他模型。评估最后发现了一个最佳集,其中包括 PCA 和 RF 特征选择。
{"title":"Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset","authors":"Surasit Songma, Theera Sathuphan, Thanakorn Pamutha","doi":"10.3390/computers12120245","DOIUrl":"https://doi.org/10.3390/computers12120245","url":null,"abstract":"This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018 dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory data analysis, and data normalization procedures (min-max and Z-score) are used to prepare data for use with various classifiers; second, in order to improve processing speed and reduce model complexity, a combination of principal component analysis (PCA) and random forest (RF) is used to reduce non-significant features by comparing them to the full dataset; finally, machine learning methods (XGBoost, CART, DT, KNN, MLP, RF, LR, and Bayes) are applied to specific features and preprocessing procedures, with the XGBoost, DT, and RF models outperforming the others in terms of both ROC values and CPU runtime. The evaluation concludes with the discovery of an optimal set, which includes PCA and RF feature selection.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"62 37","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139240036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hard-Timeliness Blockchain-Based Contract Signing Protocol 基于区块链的高时效合同签署协议
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-24 DOI: 10.3390/computers12120246
J. Ferrer-Gomila, M. F. Hinarejos
In this article, we present the first proposal for contract signing based on blockchain that meets the requirements of fairness, hard-timeliness, and bc-optimism. The proposal, thanks to the use of blockchain, does not require the use of trusted third parties (TTPs), thus avoiding a point of failure and the problem of signatories having to agree on a TTP that is trusted by both. The presented protocol is fair because it is designed such that no honest signatory can be placed at a disadvantage. It meets the hard-timeliness requirement because both signatories can end the execution of the protocol at any time they wish. Finally, the proposal is bc-optimistic because blockchain functions are only executed in case of exception (and not in each execution of the protocol), with consequent savings when working with public blockchains. No previous proposal simultaneously met these three requirements. In addition to the above, this article clarifies the concept of timeliness, which previously has been defined in a confusing way (starting with the authors who used the term for the first time). We conducted a security review that allowed us to verify that our proposal meets the desired requirements. Furthermore, we provide the specifications of a smart contract designed for the Ethereum blockchain family and verified the economic feasibility of the proposal, ensuring it can be aligned with the financial requirements of different scenarios.
在本文中,我们提出了第一个基于区块链的合同签署提案,该提案符合公平性、硬及时性和 bc-optimism 的要求。由于使用了区块链,该提案不需要使用可信第三方(TTP),从而避免了失败点,也避免了签署方必须就双方都信任的 TTP 达成一致的问题。所提出的协议是公平的,因为它的设计不会让诚实的签名者处于不利地位。该协议符合严格的及时性要求,因为签署双方可以随时结束协议的执行。最后,该提案具有 bc-optimistic 特性,因为区块链功能只在出现异常时执行(而不是在每次执行协议时执行),从而在使用公共区块链时节省了成本。此前没有任何提案能同时满足这三个要求。除上述内容外,本文还澄清了及时性的概念,因为以前对及时性的定义比较混乱(从首次使用该术语的作者开始)。我们进行了安全审查,从而验证了我们的建议符合预期要求。此外,我们还提供了为以太坊区块链系列设计的智能合约的规格,并验证了该提案的经济可行性,确保其能够符合不同场景的财务要求。
{"title":"A Hard-Timeliness Blockchain-Based Contract Signing Protocol","authors":"J. Ferrer-Gomila, M. F. Hinarejos","doi":"10.3390/computers12120246","DOIUrl":"https://doi.org/10.3390/computers12120246","url":null,"abstract":"In this article, we present the first proposal for contract signing based on blockchain that meets the requirements of fairness, hard-timeliness, and bc-optimism. The proposal, thanks to the use of blockchain, does not require the use of trusted third parties (TTPs), thus avoiding a point of failure and the problem of signatories having to agree on a TTP that is trusted by both. The presented protocol is fair because it is designed such that no honest signatory can be placed at a disadvantage. It meets the hard-timeliness requirement because both signatories can end the execution of the protocol at any time they wish. Finally, the proposal is bc-optimistic because blockchain functions are only executed in case of exception (and not in each execution of the protocol), with consequent savings when working with public blockchains. No previous proposal simultaneously met these three requirements. In addition to the above, this article clarifies the concept of timeliness, which previously has been defined in a confusing way (starting with the authors who used the term for the first time). We conducted a security review that allowed us to verify that our proposal meets the desired requirements. Furthermore, we provide the specifications of a smart contract designed for the Ethereum blockchain family and verified the economic feasibility of the proposal, ensuring it can be aligned with the financial requirements of different scenarios.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"402 ","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139240316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specification and Description Language Models Automatic Execution in a High-Performance Environment 在高性能环境中自动执行的规范和描述语言模型
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-22 DOI: 10.3390/computers12120244
Pau Fonseca i Casas, I. Romanowska, Joan Garcia i Subirana
Specification and Description Language (SDL) is a language that can represent the behavior and structure of a model completely and unambiguously. It allows the creation of frameworks that can run a model without the need to code it in a specific programming language. This automatic process simplifies the key phases of model building: validation and verification. SDLPS is a simulator that enables the definition and execution of models using SDL. In this paper, we present a new library that enables the execution of SDL models defined on SDLPS infrastructure on a HPC platform, such as a supercomputer, thus significantly speeding up simulation runtime. Moreover, we apply the SDL language to a social science use case, thus opening a new avenue for facilitating the use of HPC power to new groups of users. The tools presented here have the potential to increase the robustness of modeling software by improving the documentation, verification, and validation of the models.
规范和描述语言(SDL)是一种能够完整、明确地表示模型的行为和结构的语言。它允许创建框架来运行模型,而无需使用特定的编程语言进行编码。这一自动过程简化了模型构建的关键阶段:验证和确认。SDLPS 是一种模拟器,可使用 SDL 定义和执行模型。在本文中,我们介绍了一个新的库,它可以在超级计算机等高性能计算平台上执行 SDLPS 基础架构上定义的 SDL 模型,从而大大加快仿真运行时间。此外,我们还将 SDL 语言应用于社会科学用例,从而为促进新用户群体使用高性能计算能力开辟了一条新途径。本文介绍的工具通过改进模型的记录、验证和确认,有可能提高建模软件的稳健性。
{"title":"Specification and Description Language Models Automatic Execution in a High-Performance Environment","authors":"Pau Fonseca i Casas, I. Romanowska, Joan Garcia i Subirana","doi":"10.3390/computers12120244","DOIUrl":"https://doi.org/10.3390/computers12120244","url":null,"abstract":"Specification and Description Language (SDL) is a language that can represent the behavior and structure of a model completely and unambiguously. It allows the creation of frameworks that can run a model without the need to code it in a specific programming language. This automatic process simplifies the key phases of model building: validation and verification. SDLPS is a simulator that enables the definition and execution of models using SDL. In this paper, we present a new library that enables the execution of SDL models defined on SDLPS infrastructure on a HPC platform, such as a supercomputer, thus significantly speeding up simulation runtime. Moreover, we apply the SDL language to a social science use case, thus opening a new avenue for facilitating the use of HPC power to new groups of users. The tools presented here have the potential to increase the robustness of modeling software by improving the documentation, verification, and validation of the models.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"32 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139249200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revealing People’s Sentiment in Natural Italian Language Sentences 从自然意大利语句子中揭示人们的情绪
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-21 DOI: 10.3390/computers12120241
Andrea Calvagna, E. Tramontana, Gabriella Verga
Social network systems are constantly fed with text messages. While this enables rapid communication and global awareness, some messages could be aptly made to hurt or mislead. Automatically identifying meaningful parts of a sentence, such as, e.g., positive or negative sentiments in a phrase, would give valuable support for automatically flagging hateful messages, propaganda, etc. Many existing approaches concerned with the study of people’s opinions, attitudes and emotions and based on machine learning require an extensive labelled dataset and provide results that are not very decisive in many circumstances due to the complexity of the language structure and the fuzziness inherent in most of the techniques adopted. This paper proposes a deterministic approach that automatically identifies people’s sentiments at the sentence level. The approach is based on text analysis rules that are manually derived from the way Italian grammar works. Such rules are embedded in finite-state automata and then expressed in a way that facilitates checking unstructured Italian text. A few grammar rules suffice to analyse an ample amount of correctly formed text. We have developed a tool that has validated the proposed approach by analysing several hundreds of sentences gathered from social media: hence, they are actual comments given by users. Such a tool exploits parallel execution to make it ready to process many thousands of sentences in a fraction of a second. Our approach outperforms a well-known previous approach in terms of precision.
社交网络系统不断收到文字信息。虽然这有助于快速交流和全球意识的提高,但有些信息可能会恰到好处地造成伤害或误导。自动识别句子中有意义的部分,如短语中的积极或消极情绪,将为自动标记仇恨信息和宣传等提供宝贵的支持。现有的许多研究人们观点、态度和情绪的方法都是基于机器学习的,需要大量的标注数据集,而且由于语言结构的复杂性和所采用的大多数技术的固有模糊性,在许多情况下所提供的结果并不具有决定性。本文提出了一种在句子层面自动识别人们情感的确定性方法。该方法基于从意大利语语法工作方式中人工推导出的文本分析规则。这些规则被嵌入到有限状态自动机中,然后以一种便于检查非结构化意大利语文本的方式表达出来。少量语法规则就足以分析大量正确的文本。我们开发了一款工具,通过分析从社交媒体上收集的数百个句子验证了我们提出的方法:这些句子都是用户发表的真实评论。这种工具利用并行执行,可在几分之一秒内处理数千个句子。在精确度方面,我们的方法优于之前一种著名的方法。
{"title":"Revealing People’s Sentiment in Natural Italian Language Sentences","authors":"Andrea Calvagna, E. Tramontana, Gabriella Verga","doi":"10.3390/computers12120241","DOIUrl":"https://doi.org/10.3390/computers12120241","url":null,"abstract":"Social network systems are constantly fed with text messages. While this enables rapid communication and global awareness, some messages could be aptly made to hurt or mislead. Automatically identifying meaningful parts of a sentence, such as, e.g., positive or negative sentiments in a phrase, would give valuable support for automatically flagging hateful messages, propaganda, etc. Many existing approaches concerned with the study of people’s opinions, attitudes and emotions and based on machine learning require an extensive labelled dataset and provide results that are not very decisive in many circumstances due to the complexity of the language structure and the fuzziness inherent in most of the techniques adopted. This paper proposes a deterministic approach that automatically identifies people’s sentiments at the sentence level. The approach is based on text analysis rules that are manually derived from the way Italian grammar works. Such rules are embedded in finite-state automata and then expressed in a way that facilitates checking unstructured Italian text. A few grammar rules suffice to analyse an ample amount of correctly formed text. We have developed a tool that has validated the proposed approach by analysing several hundreds of sentences gathered from social media: hence, they are actual comments given by users. Such a tool exploits parallel execution to make it ready to process many thousands of sentences in a fraction of a second. Our approach outperforms a well-known previous approach in terms of precision.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"6 2","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139254491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Malicious Software Detection Accuracy through Genetic Programming Symbolic Classifier with Application of Dataset Oversampling Techniques 应用数据集超采样技术,通过遗传编程符号分类器提高恶意软件检测精度
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-21 DOI: 10.3390/computers12120242
N. Anđelić, Sandi Baressi Baressi Šegota, Z. Car
Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling automated pattern recognition, anomaly detection, and continuous learning, allowing security systems to adapt to evolving threats and identify complex, polymorphic malware that may exhibit varied behaviors. This synergy of hybrid features with AI empowers malware detection systems to efficiently and proactively identify and respond to sophisticated cyber threats in real time. In this paper, the genetic programming symbolic classifier (GPSC) algorithm was applied to the publicly available dataset to obtain symbolic expressions (SEs) that could detect the malware software with high classification performance. The initial problem with the dataset was a high imbalance between class samples, so various oversampling techniques were utilized to obtain balanced dataset variations on which GPSC was applied. To find the optimal combination of GPSC hyperparameter values, the random hyperparameter value search method (RHVS) was developed and applied to obtain SEs with high classification accuracy. The GPSC was trained with five-fold cross-validation (5FCV) to obtain a robust set of SEs on each dataset variation. To choose the best SEs, several evaluation metrics were used, i.e., the length and depth of SEs, accuracy score (ACC), area under receiver operating characteristic curve (AUC), precision, recall, f1-score, and confusion matrix. The best-obtained SEs are applied on the original imbalanced dataset to see if the classification performance is the same as it was on balanced dataset variations. The results of the investigation showed that the proposed method generated SEs with high classification accuracy (0.9962) in malware software detection.
使用混合功能(将二进制和十六进制分析与 DLL 调用相结合)进行恶意软件检测,对于发挥静态和动态分析方法的优势至关重要。人工智能(AI)通过自动模式识别、异常检测和持续学习增强了这一过程,使安全系统能够适应不断变化的威胁,并识别可能表现出各种行为的复杂多态恶意软件。这种混合功能与人工智能的协同作用使恶意软件检测系统能够高效、主动地实时识别和应对复杂的网络威胁。本文将遗传编程符号分类器(GPSC)算法应用于公开可用的数据集,以获得能够以高分类性能检测恶意软件的符号表达式(SE)。数据集最初的问题是类样本之间的高度不平衡,因此利用了各种超采样技术来获得平衡的数据集变化,并在此基础上应用 GPSC。为了找到 GPSC 超参数值的最佳组合,开发并应用了随机超参数值搜索法(RHVS),以获得分类准确率高的 SE。使用五倍交叉验证(5FCV)训练 GPSC,以在每个数据集变化上获得一组稳健的 SE。为了选择最佳 SE,使用了几个评估指标,即 SE 的长度和深度、准确度得分(ACC)、接收器工作特征曲线下面积(AUC)、精确度、召回率、f1-分数和混淆矩阵。将获得的最佳 SE 应用于原始不平衡数据集,以观察分类性能是否与平衡数据集变化时的性能相同。调查结果表明,在恶意软件检测方面,建议的方法生成的 SE 具有较高的分类准确率(0.9962)。
{"title":"Improvement of Malicious Software Detection Accuracy through Genetic Programming Symbolic Classifier with Application of Dataset Oversampling Techniques","authors":"N. Anđelić, Sandi Baressi Baressi Šegota, Z. Car","doi":"10.3390/computers12120242","DOIUrl":"https://doi.org/10.3390/computers12120242","url":null,"abstract":"Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling automated pattern recognition, anomaly detection, and continuous learning, allowing security systems to adapt to evolving threats and identify complex, polymorphic malware that may exhibit varied behaviors. This synergy of hybrid features with AI empowers malware detection systems to efficiently and proactively identify and respond to sophisticated cyber threats in real time. In this paper, the genetic programming symbolic classifier (GPSC) algorithm was applied to the publicly available dataset to obtain symbolic expressions (SEs) that could detect the malware software with high classification performance. The initial problem with the dataset was a high imbalance between class samples, so various oversampling techniques were utilized to obtain balanced dataset variations on which GPSC was applied. To find the optimal combination of GPSC hyperparameter values, the random hyperparameter value search method (RHVS) was developed and applied to obtain SEs with high classification accuracy. The GPSC was trained with five-fold cross-validation (5FCV) to obtain a robust set of SEs on each dataset variation. To choose the best SEs, several evaluation metrics were used, i.e., the length and depth of SEs, accuracy score (ACC), area under receiver operating characteristic curve (AUC), precision, recall, f1-score, and confusion matrix. The best-obtained SEs are applied on the original imbalanced dataset to see if the classification performance is the same as it was on balanced dataset variations. The results of the investigation showed that the proposed method generated SEs with high classification accuracy (0.9962) in malware software detection.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"46 10","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139252986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meshfree Interpolation of Multidimensional Time-Varying Scattered Data 多维时变散射数据的无网格插值
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-21 DOI: 10.3390/computers12120243
Vaclav Skala, Eliska Mourycová
Interpolating and approximating scattered scalar and vector data is fundamental in resolving numerous engineering challenges. These methodologies predominantly rely on establishing a triangulated structure within the data domain, typically constrained to the dimensions of 2D or 3D. Subsequently, an interpolation or approximation technique is employed to yield a smooth and coherent outcome. This contribution introduces a meshless methodology founded upon radial basis functions (RBFs). This approach exhibits a nearly dimensionless character, facilitating the interpolation of data evolving over time. Specifically, it enables the interpolation of dispersed spatio-temporally varying data, allowing for interpolation within the space-time domain devoid of the conventional “time-frames”. Meshless methodologies tailored for scattered spatio-temporal data hold applicability across a spectrum of domains, encompassing the interpolation, approximation, and assessment of data originating from various sources, such as buoys, sensor networks, tsunami monitoring instruments, chemical and radiation detectors, vessel and submarine detection systems, weather forecasting models, as well as the compression and visualization of 3D vector fields, among others.
对分散的标量和矢量数据进行插值和近似处理,是解决众多工程难题的基础。这些方法主要依赖于在数据域内建立三角结构,通常受限于二维或三维空间。随后,采用插值或近似技术来获得平滑、连贯的结果。本文介绍了一种基于径向基函数(RBF)的无网格方法。这种方法具有近乎无量纲的特性,便于对随时间演变的数据进行插值。具体来说,它可以对分散的时空变化数据进行插值,从而在时空域内进行插值,而无需使用传统的 "时间框架"。为分散的时空数据定制的无网格方法适用于各种领域,包括对各种来源的数据进行插值、近似和评估,如浮标、传感器网络、海啸监测仪器、化学和辐射探测器、船舶和潜艇探测系统、天气预报模型,以及三维矢量场的压缩和可视化等。
{"title":"Meshfree Interpolation of Multidimensional Time-Varying Scattered Data","authors":"Vaclav Skala, Eliska Mourycová","doi":"10.3390/computers12120243","DOIUrl":"https://doi.org/10.3390/computers12120243","url":null,"abstract":"Interpolating and approximating scattered scalar and vector data is fundamental in resolving numerous engineering challenges. These methodologies predominantly rely on establishing a triangulated structure within the data domain, typically constrained to the dimensions of 2D or 3D. Subsequently, an interpolation or approximation technique is employed to yield a smooth and coherent outcome. This contribution introduces a meshless methodology founded upon radial basis functions (RBFs). This approach exhibits a nearly dimensionless character, facilitating the interpolation of data evolving over time. Specifically, it enables the interpolation of dispersed spatio-temporally varying data, allowing for interpolation within the space-time domain devoid of the conventional “time-frames”. Meshless methodologies tailored for scattered spatio-temporal data hold applicability across a spectrum of domains, encompassing the interpolation, approximation, and assessment of data originating from various sources, such as buoys, sensor networks, tsunami monitoring instruments, chemical and radiation detectors, vessel and submarine detection systems, weather forecasting models, as well as the compression and visualization of 3D vector fields, among others.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"34 6","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139252052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1