首页 > 最新文献

Computing and Informatics最新文献

英文 中文
Integration a Contextual Observation System in a Multi-Process Architecture for Autonomous Vehicles 基于多进程架构的自动驾驶车辆情境观测系统集成
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_716
Ahmed-Chawki Chaouche, J. Ilié, Assem Hebik, François Pêcheux
. We propose a software layered architecture for autonomous vehicles whose efficiency is driven by pull-based acquisition of sensor data. This multi-process software architecture, to be embedded into the control loop of these vehicles,
. 我们提出了一种自动驾驶汽车的软件分层架构,其效率由基于拉的传感器数据采集驱动。这种多进程软件架构将嵌入到这些车辆的控制回路中,
{"title":"Integration a Contextual Observation System in a Multi-Process Architecture for Autonomous Vehicles","authors":"Ahmed-Chawki Chaouche, J. Ilié, Assem Hebik, François Pêcheux","doi":"10.31577/cai_2023_3_716","DOIUrl":"https://doi.org/10.31577/cai_2023_3_716","url":null,"abstract":". We propose a software layered architecture for autonomous vehicles whose efficiency is driven by pull-based acquisition of sensor data. This multi-process software architecture, to be embedded into the control loop of these vehicles,","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"716-740"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70010020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
mTreeIllustrator: A Mixed-Initiative Framework for Visual Exploratory Analysis of Multidimensional Hierarchical Data mTreeIllustrator:用于多维层次数据可视化探索性分析的混合主动框架
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_690
Guijuan Wang, Yu Zhao, Boyou Tan, Zhong Wang, Jiansong Wang, Hao Guo, Yadong Wu
. Multidimensional hierarchical (mTree) data are very common in daily life and scientific research. However, mTree data exploration is a laborious and time-consuming process due to its structural complexity and large dimension combination space. To address this problem, we present mTreeIllustrator, a mixed-initiative framework for exploratory analysis of multidimensional hierarchical data with faceted visualizations. First, we propose a recommendation pipeline for the automatic selection and visual representation of important subspaces of mTree data. Furthermore, we design a visual framework and an interaction schema to couple automatic recommendations with human specifications to facilitate progressive exploratory analysis. Comparative experiments and user studies demonstrate the usability and effectiveness of our framework.
. 多维层次(mTree)数据在日常生活和科学研究中非常常见。然而,由于mTree的结构复杂和大维度的组合空间,它的数据挖掘是一个费时费力的过程。为了解决这个问题,我们提出了mTreeIllustrator,这是一个混合倡议框架,用于探索性分析具有面形可视化的多维层次数据。首先,我们提出了一个推荐管道,用于自动选择和可视化表示mTree数据的重要子空间。此外,我们设计了一个可视化框架和交互模式,将自动推荐与人类规范结合起来,以促进渐进式探索性分析。对比实验和用户研究证明了我们的框架的可用性和有效性。
{"title":"mTreeIllustrator: A Mixed-Initiative Framework for Visual Exploratory Analysis of Multidimensional Hierarchical Data","authors":"Guijuan Wang, Yu Zhao, Boyou Tan, Zhong Wang, Jiansong Wang, Hao Guo, Yadong Wu","doi":"10.31577/cai_2023_3_690","DOIUrl":"https://doi.org/10.31577/cai_2023_3_690","url":null,"abstract":". Multidimensional hierarchical (mTree) data are very common in daily life and scientific research. However, mTree data exploration is a laborious and time-consuming process due to its structural complexity and large dimension combination space. To address this problem, we present mTreeIllustrator, a mixed-initiative framework for exploratory analysis of multidimensional hierarchical data with faceted visualizations. First, we propose a recommendation pipeline for the automatic selection and visual representation of important subspaces of mTree data. Furthermore, we design a visual framework and an interaction schema to couple automatic recommendations with human specifications to facilitate progressive exploratory analysis. Comparative experiments and user studies demonstrate the usability and effectiveness of our framework.","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"690-715"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70009959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large Scale Fine-Tuned Transformers Models Application for Business Names Generation 大规模微调变压器模型在企业名称生成中的应用
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_525
Mantas Lukauskas, Tomas Rasymas, Matas Minelga, Domas Vaitmonas
. Natural language processing (NLP) involves the computer analysis and processing of human languages using a variety of techniques aimed at adapting various tasks or computer programs to linguistically process natural language. Currently, NLP is increasingly applied to a wide range of real-world problems. These tasks can vary from extracting meaningful information from unstructured data, analyzing sentiment, translating text between languages, to generating human-level text autonomously. The goal of this study is to employ transformer-based natural language models to generate high-quality business names. Specifically, this work investigates whether larger models, which require more training time, yield better results for generating relatively short texts, such as business names. To achieve
. 自然语言处理(NLP)涉及使用各种技术对人类语言进行计算机分析和处理,旨在使各种任务或计算机程序在语言上处理自然语言。目前,NLP越来越多地应用于广泛的现实问题。这些任务可以从非结构化数据中提取有意义的信息,分析情感,在语言之间翻译文本,到自动生成人类级别的文本。本研究的目标是使用基于转换器的自然语言模型来生成高质量的企业名称。具体来说,这项工作调查了需要更多训练时间的大型模型是否在生成相对较短的文本(如企业名称)时产生更好的结果。为了实现
{"title":"Large Scale Fine-Tuned Transformers Models Application for Business Names Generation","authors":"Mantas Lukauskas, Tomas Rasymas, Matas Minelga, Domas Vaitmonas","doi":"10.31577/cai_2023_3_525","DOIUrl":"https://doi.org/10.31577/cai_2023_3_525","url":null,"abstract":". Natural language processing (NLP) involves the computer analysis and processing of human languages using a variety of techniques aimed at adapting various tasks or computer programs to linguistically process natural language. Currently, NLP is increasingly applied to a wide range of real-world problems. These tasks can vary from extracting meaningful information from unstructured data, analyzing sentiment, translating text between languages, to generating human-level text autonomously. The goal of this study is to employ transformer-based natural language models to generate high-quality business names. Specifically, this work investigates whether larger models, which require more training time, yield better results for generating relatively short texts, such as business names. To achieve","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"525-545"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70009995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EEG-EMG Analysis Method in Hybrid Brain Computer Interface for Hand Rehabilitation Training 手康复训练混合脑机接口的脑肌电分析方法
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_741
Lubo Fu, Hao Li, Hongfei Ji, Jie Li
. Brain-computer interfaces (BCIs) have demonstrated immense potential in aiding stroke patients during their physical rehabilitation journey. By reshaping the neural circuits connecting the patient’s brain and limbs, these interfaces contribute to the restoration of motor functions, ultimately leading to a significant improvement in the patient’s overall quality of life. However, the current BCI primarily relies on Electroencephalogram (EEG) motor imagery (MI), which has relatively coarse recognition granularity and struggles to accurately recognize specific hand movements. To address this limitation, this paper proposes a hybrid BCI framework based on Electroencephalogram and Electromyography (EEG-∗ Corresponding author
. 脑机接口(bci)在帮助中风患者进行身体康复过程中显示出巨大的潜力。通过重塑连接患者大脑和四肢的神经回路,这些接口有助于运动功能的恢复,最终显著改善患者的整体生活质量。然而,目前的脑机接口主要依赖于脑电图(EEG)运动图像(MI),其识别粒度相对粗糙,难以准确识别特定的手部动作。为了解决这一限制,本文提出了一个基于脑电图和肌电图(EEG)的混合脑机接口框架
{"title":"EEG-EMG Analysis Method in Hybrid Brain Computer Interface for Hand Rehabilitation Training","authors":"Lubo Fu, Hao Li, Hongfei Ji, Jie Li","doi":"10.31577/cai_2023_3_741","DOIUrl":"https://doi.org/10.31577/cai_2023_3_741","url":null,"abstract":". Brain-computer interfaces (BCIs) have demonstrated immense potential in aiding stroke patients during their physical rehabilitation journey. By reshaping the neural circuits connecting the patient’s brain and limbs, these interfaces contribute to the restoration of motor functions, ultimately leading to a significant improvement in the patient’s overall quality of life. However, the current BCI primarily relies on Electroencephalogram (EEG) motor imagery (MI), which has relatively coarse recognition granularity and struggles to accurately recognize specific hand movements. To address this limitation, this paper proposes a hybrid BCI framework based on Electroencephalogram and Electromyography (EEG-∗ Corresponding author","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"741-761"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70010077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steganography Approach to Image Authentication Using Pulse Coupled Neural Network 基于脉冲耦合神经网络的图像认证隐写方法
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_591
R. Forgác, M. Očkay, Martin Javurek, Bianca Badidová
. This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network. This neural network generates position matrices based on which the embedding of authentication data into cover images is applied. Emphasis is placed on the minimalization of the stego image entropy change. Stego image entropy is consequently compared with the reference entropy of the cover image. The security of the suggested solution is granted by the neural network weights initialized with a steganographic key and by the encryption of accompanying steganographic data using the AES-256 algorithm. The integrity of the images is verified through the SHA-256 hash function. The integration of the accompanying and authentication data directly into the stego image and the authentication of the large images are the main contributions of the work.
. 本文介绍了一种大规模图像认证模型。该模型的关键要素是优化后的脉冲耦合神经网络。该神经网络生成位置矩阵,在此基础上将认证数据嵌入到封面图像中。重点放在最小化的隐写图像熵的变化。将隐去图像熵与封面图像的参考熵进行比较。该方案的安全性由隐写密钥初始化的神经网络权重和使用AES-256算法对隐写数据进行加密来保证。通过SHA-256哈希函数验证图像的完整性。将伴随数据和认证数据直接集成到隐写图像中以及对大图像进行认证是本工作的主要贡献。
{"title":"Steganography Approach to Image Authentication Using Pulse Coupled Neural Network","authors":"R. Forgác, M. Očkay, Martin Javurek, Bianca Badidová","doi":"10.31577/cai_2023_3_591","DOIUrl":"https://doi.org/10.31577/cai_2023_3_591","url":null,"abstract":". This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network. This neural network generates position matrices based on which the embedding of authentication data into cover images is applied. Emphasis is placed on the minimalization of the stego image entropy change. Stego image entropy is consequently compared with the reference entropy of the cover image. The security of the suggested solution is granted by the neural network weights initialized with a steganographic key and by the encryption of accompanying steganographic data using the AES-256 algorithm. The integrity of the images is verified through the SHA-256 hash function. The integration of the accompanying and authentication data directly into the stego image and the authentication of the large images are the main contributions of the work.","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"591-614"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70010206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Sentiment Using Optimized Hybrid Deep Learning Model 基于优化混合深度学习模型的情感分类
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_651
Chaima Ahle Touate, R. Ayachi, M. Biniz
{"title":"Classification of Sentiment Using Optimized Hybrid Deep Learning Model","authors":"Chaima Ahle Touate, R. Ayachi, M. Biniz","doi":"10.31577/cai_2023_3_651","DOIUrl":"https://doi.org/10.31577/cai_2023_3_651","url":null,"abstract":"","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"651-666"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70009764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Game-Theoretic Convolutional Neural Network Applied for the Multi-Pursuer Multi-Evader Game 新型博弈论卷积神经网络在多追踪者多逃避者博弈中的应用
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_546
Nabila Sid, M. Djezzar, Mohammed El Habib Souidi, M. Hemam
. Pursuit-Evasion Game (PEG) can be defined as a set of agents known as pursuers, which cooperate with the aim forming dynamic coalitions to capture dynamic evader agents, while the evaders try to avoid this capture by moving in the environment according to specific velocities. The factor of capturing time was treated by various studies before, but remain the powerful tools used to satisfy this factor object of research. To improve the capturing time factor we proposed in this work a novel online decentralized coalition formation algorithm equipped with Convolutional Neural Network (CNN) and based on the Iterated Elimination of Dominated Strategies (IEDS). The coalition is formed such that the pursuer should learn at each iteration the approximator formation achieving the capture in the shortest time. The pursuer’s learning process depends on the features extracted by CNN at each iteration. The proposed supervised technique is compared through simulation, with the IEDS algorithm, AGR algorithm. Simulation results show that the proposed learning technique outperform the IEDS algorithm and the AGR algorithm with respect to the learning time which represents an important factor in a chasing game.
. 追赶-逃避博弈(PEG)可以定义为一组被称为追赶者的智能体,它们与目标合作形成动态联盟来捕获动态逃避者,而逃避者则根据特定的速度在环境中移动以避免被捕获。捕获时间这一因素在以前的各种研究中都有涉及,但仍然是满足这一因素研究对象的有力工具。为了提高捕获时间因子,本文提出了一种基于卷积神经网络(CNN)和劣势策略迭代消除(IEDS)的在线分散联盟形成算法。该联盟的形成使得追踪者在每次迭代中学习在最短时间内捕获的逼近器编队。跟踪器的学习过程取决于CNN在每次迭代中提取的特征。通过仿真,将提出的监督算法与IEDS算法、AGR算法进行了比较。仿真结果表明,所提学习方法在学习时间方面优于IEDS算法和AGR算法,而学习时间是追逐博弈中的一个重要因素。
{"title":"New Game-Theoretic Convolutional Neural Network Applied for the Multi-Pursuer Multi-Evader Game","authors":"Nabila Sid, M. Djezzar, Mohammed El Habib Souidi, M. Hemam","doi":"10.31577/cai_2023_3_546","DOIUrl":"https://doi.org/10.31577/cai_2023_3_546","url":null,"abstract":". Pursuit-Evasion Game (PEG) can be defined as a set of agents known as pursuers, which cooperate with the aim forming dynamic coalitions to capture dynamic evader agents, while the evaders try to avoid this capture by moving in the environment according to specific velocities. The factor of capturing time was treated by various studies before, but remain the powerful tools used to satisfy this factor object of research. To improve the capturing time factor we proposed in this work a novel online decentralized coalition formation algorithm equipped with Convolutional Neural Network (CNN) and based on the Iterated Elimination of Dominated Strategies (IEDS). The coalition is formed such that the pursuer should learn at each iteration the approximator formation achieving the capture in the shortest time. The pursuer’s learning process depends on the features extracted by CNN at each iteration. The proposed supervised technique is compared through simulation, with the IEDS algorithm, AGR algorithm. Simulation results show that the proposed learning technique outperform the IEDS algorithm and the AGR algorithm with respect to the learning time which represents an important factor in a chasing game.","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"546-567"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70010097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BERTDom: Protein Domain Boundary Prediction Using BERT BERT:基于BERT的蛋白质结构域边界预测
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_667
Ahmad Haseeb, Maryam Bashir, Aamir Wali
. The domains of a protein provide an insight on the functions that the protein can perform. Delineation of proteins using high-throughput experimental methods is difficult and a time-consuming task. Template-free and sequence-based computational methods that mainly rely on machine learning techniques can be used. However, some of the drawbacks of computational methods are low accuracy and their limitation in predicting different types of multi-domain proteins. Biological language modeling and deep learning techniques can be useful in such situations. In this study, we propose BERTDom for segmenting protein sequences. BERTDOM uses BERT for feature representation and stacked bi-directional long short term memory for classification. We pre-train BERT from scratch on a corpus of protein sequences obtained from UniProt knowledge base with reference clusters. For comparison, we also used two other deep learning architectures: LSTM and feed-forward neural networks. We also experimented with protein-to-vector (Pro2Vec) feature representation that uses word2vec to encode protein bio-words. For testing, three other bench-marked datasets were used. The experimental re-sults on benchmarks datasets show that BERTDom produces the best F-score as compared to other template-based and template-free protein domain boundary prediction methods. Employing deep learning architectures can significantly improve domain boundary prediction. Furthermore, BERT used extensively in NLP for feature representation, has shown promising results when used for encoding bio-words. The code is available at https://github.com/maryam988/BERTDom-Code .
. 蛋白质的结构域提供了对蛋白质可以执行的功能的洞察。使用高通量实验方法描述蛋白质是一项困难且耗时的任务。可以使用主要依赖于机器学习技术的无模板和基于序列的计算方法。然而,计算方法的一些缺点是精度低,并且在预测不同类型的多结构域蛋白质方面存在局限性。生物语言建模和深度学习技术在这种情况下很有用。在这项研究中,我们提出了BERTDom来分割蛋白质序列。BERTDOM使用BERT进行特征表示,使用堆叠双向长短期记忆进行分类。我们在从UniProt知识库获得的蛋白质序列语料库上使用参考聚类从头开始预训练BERT。为了比较,我们还使用了另外两种深度学习架构:LSTM和前馈神经网络。我们还实验了蛋白质-载体(Pro2Vec)特征表示,使用word2vec编码蛋白质生物词。为了进行测试,使用了三个其他基准数据集。在基准数据集上的实验结果表明,与其他基于模板和无模板的蛋白质结构域边界预测方法相比,BERTDom产生了最好的f值。采用深度学习架构可以显著改善领域边界预测。此外,BERT在NLP中广泛用于特征表示,在用于编码生物词时显示出有希望的结果。代码可在https://github.com/maryam988/BERTDom-Code上获得。
{"title":"BERTDom: Protein Domain Boundary Prediction Using BERT","authors":"Ahmad Haseeb, Maryam Bashir, Aamir Wali","doi":"10.31577/cai_2023_3_667","DOIUrl":"https://doi.org/10.31577/cai_2023_3_667","url":null,"abstract":". The domains of a protein provide an insight on the functions that the protein can perform. Delineation of proteins using high-throughput experimental methods is difficult and a time-consuming task. Template-free and sequence-based computational methods that mainly rely on machine learning techniques can be used. However, some of the drawbacks of computational methods are low accuracy and their limitation in predicting different types of multi-domain proteins. Biological language modeling and deep learning techniques can be useful in such situations. In this study, we propose BERTDom for segmenting protein sequences. BERTDOM uses BERT for feature representation and stacked bi-directional long short term memory for classification. We pre-train BERT from scratch on a corpus of protein sequences obtained from UniProt knowledge base with reference clusters. For comparison, we also used two other deep learning architectures: LSTM and feed-forward neural networks. We also experimented with protein-to-vector (Pro2Vec) feature representation that uses word2vec to encode protein bio-words. For testing, three other bench-marked datasets were used. The experimental re-sults on benchmarks datasets show that BERTDom produces the best F-score as compared to other template-based and template-free protein domain boundary prediction methods. Employing deep learning architectures can significantly improve domain boundary prediction. Furthermore, BERT used extensively in NLP for feature representation, has shown promising results when used for encoding bio-words. The code is available at https://github.com/maryam988/BERTDom-Code .","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"667-689"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70009806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-Based Access Control Policy Generation Approach from Access Logs Based on the CatBoost 基于CatBoost的基于属性的访问控制策略生成方法
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_615
Shan Quan, Yongdan Zhao, N. Helil
. Attribute-based access control (ABAC) has higher flexibility and better scalability than traditional access control and can be used for fine-grained access control of large-scale information systems. Although ABAC can depict a dynamic, complex access control policy, it is costly, tedious, and error-prone to manually define. Therefore, it is worth studying how to construct an ABAC policy efficiently and accurately. This paper proposes an ABAC policy generation approach based on the CatBoost algorithm to automatically learn policies from historical access logs. First, we perform a weighted reconstruction of the attributes for the policy to be mined. Second, we provide an ABAC rule extraction algorithm, rule pruning algorithm, and rule optimization algorithm, among which the rule pruning and rule optimization algorithms are used to improve the accuracy of the generated policies. In addition, we present a new policy quality indicator to measure the accuracy and simplicity of the generated policies. Finally, the results of an experiment conducted to validate the approach verify its feasibility and effectiveness.
. 基于属性的访问控制(ABAC)比传统的访问控制具有更高的灵活性和更好的可扩展性,可用于大规模信息系统的细粒度访问控制。尽管ABAC可以描述一个动态的、复杂的访问控制策略,但是手工定义它是昂贵的、繁琐的,而且容易出错。因此,如何高效、准确地构建ABAC策略是一个值得研究的问题。提出了一种基于CatBoost算法的ABAC策略生成方法,从历史访问日志中自动学习策略。首先,我们对要挖掘的策略的属性进行加权重建。其次,我们提供了ABAC规则提取算法、规则剪枝算法和规则优化算法,其中规则剪枝和规则优化算法用于提高生成策略的准确性。此外,我们提出了一个新的策略质量指标来衡量所生成策略的准确性和简单性。最后,通过实验验证了该方法的可行性和有效性。
{"title":"Attribute-Based Access Control Policy Generation Approach from Access Logs Based on the CatBoost","authors":"Shan Quan, Yongdan Zhao, N. Helil","doi":"10.31577/cai_2023_3_615","DOIUrl":"https://doi.org/10.31577/cai_2023_3_615","url":null,"abstract":". Attribute-based access control (ABAC) has higher flexibility and better scalability than traditional access control and can be used for fine-grained access control of large-scale information systems. Although ABAC can depict a dynamic, complex access control policy, it is costly, tedious, and error-prone to manually define. Therefore, it is worth studying how to construct an ABAC policy efficiently and accurately. This paper proposes an ABAC policy generation approach based on the CatBoost algorithm to automatically learn policies from historical access logs. First, we perform a weighted reconstruction of the attributes for the policy to be mined. Second, we provide an ABAC rule extraction algorithm, rule pruning algorithm, and rule optimization algorithm, among which the rule pruning and rule optimization algorithms are used to improve the accuracy of the generated policies. In addition, we present a new policy quality indicator to measure the accuracy and simplicity of the generated policies. Finally, the results of an experiment conducted to validate the approach verify its feasibility and effectiveness.","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"42 1","pages":"615-650"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70009751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for Spatiotemporal Crime Prediction with Improved Deep Learning 基于改进深度学习的时空犯罪预测模型
IF 0.7 4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.31577/cai_2023_3_568
Ature Angbera, H. Chan
{"title":"Model for Spatiotemporal Crime Prediction with Improved Deep Learning","authors":"Ature Angbera, H. Chan","doi":"10.31577/cai_2023_3_568","DOIUrl":"https://doi.org/10.31577/cai_2023_3_568","url":null,"abstract":"","PeriodicalId":55215,"journal":{"name":"Computing and Informatics","volume":"8 1","pages":"568-590"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70010113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computing and Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1