首页 > 最新文献

Computer science & information technology最新文献

英文 中文
Parallel Evolutionary Biclustering of Short-term Electric Energy Consumption 短期电能消耗的并行进化双聚类
Pub Date : 2021-07-24 DOI: 10.5121/CSIT.2021.111110
D. Pinto-Roa, H. Medina, Federico Román, M. García-Torres, F. Divina, Francisco Gómez-Vela, Félix Morales, Gustavo Velázquez, Federico Daumas, José L. Vázquez-Noguera, Carlos Sauer Ayala, P. E. Gardel-Sotomayor
The discovery and description of patterns in electric energy consumption time series is fundamental for timely management of the system. A bicluster describes a subset of observation points in a time period in which a consumption pattern occurs as abrupt changes or instabilities homogeneously. Nevertheless, the pattern detection complexity increases with the number of observation points and samples of the study period. In this context, current bi-clustering techniques may not detect significant patterns given the increased search space. This study develops a parallel evolutionary computation scheme to find biclusters in electric energy. Numerical simulations show the benefits of the proposed approach, discovering significantly more electricity consumption patterns compared to a state-of-the-art non-parallel competitive algorithm.
电能消耗时间序列模式的发现和描述是系统及时管理的基础。双聚类描述了一个时间段内的观察点子集,在这个时间段内,消费模式均匀地发生突变或不稳定。然而,模式检测的复杂度随着观察点和研究周期样本的增加而增加。在这种情况下,鉴于搜索空间的增加,当前的双聚类技术可能无法检测到重要模式。本文提出了一种并行进化计算方法来寻找电能中的双簇。数值模拟显示了所提出方法的优点,与最先进的非并行竞争算法相比,发现了更多的电力消耗模式。
{"title":"Parallel Evolutionary Biclustering of Short-term Electric Energy Consumption","authors":"D. Pinto-Roa, H. Medina, Federico Román, M. García-Torres, F. Divina, Francisco Gómez-Vela, Félix Morales, Gustavo Velázquez, Federico Daumas, José L. Vázquez-Noguera, Carlos Sauer Ayala, P. E. Gardel-Sotomayor","doi":"10.5121/CSIT.2021.111110","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111110","url":null,"abstract":"The discovery and description of patterns in electric energy consumption time series is fundamental for timely management of the system. A bicluster describes a subset of observation points in a time period in which a consumption pattern occurs as abrupt changes or instabilities homogeneously. Nevertheless, the pattern detection complexity increases with the number of observation points and samples of the study period. In this context, current bi-clustering techniques may not detect significant patterns given the increased search space. This study develops a parallel evolutionary computation scheme to find biclusters in electric energy. Numerical simulations show the benefits of the proposed approach, discovering significantly more electricity consumption patterns compared to a state-of-the-art non-parallel competitive algorithm.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47320594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Protocol for Four D2D Scenarios 四种D2D场景的安全协议
Pub Date : 2021-07-24 DOI: 10.5121/CSIT.2021.111102
Hoda Nematy
In traditional cellular infrastructure, cellular devices communicate with each other directly even when they are close together. This strategy causes massive traffic to the cellular network therefore D2D communication has introduced to overcome this issue, bring more bandwidth and also higher rates to the cellular network. One of the major challenges for D2D Communication is to have one single secure protocol that can adapt in four D2D scenarios defined in references. These scenarios are Direct D2D and relaying D2D communication with and without cellular infrastructure. In this paper, we propose a Secure D2D protocol based on ARIADNE with TESLA. Also we use LTE-A AKA protocol for authentication and key agreement procedure between Source and Destination. Next, we adapt this scenario to be applicable in without cellular infrastructure ones. This protocol could be used in direct D2D also. Based on the results, our proposed protocol has a few computation overhead compare to recent works and have less communication overhead than SODE with preserve many security properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, Secure Routing Transmission…. We check Authentication, Confidentiality, Reachability and Secure Key Agreement of the proposed protocol with ProVerif verification tools.
在传统的蜂窝基础设施中,即使蜂窝设备靠得很近,它们也会直接相互通信。这种策略会给蜂窝网络带来巨大的流量,因此引入D2D通信来克服这个问题,为蜂窝网络带来更多的带宽和更高的速率。D2D通信的主要挑战之一是具有一个单一的安全协议,该协议可以适应参考文献中定义的四种D2D场景。这些场景是直接D2D和在有和没有蜂窝基础设施的情况下中继D2D通信。在本文中,我们提出了一种基于ARIADNE和TESLA的安全D2D协议。我们还使用LTE-A AKA协议进行源和目的地之间的身份验证和密钥协商过程。接下来,我们将此场景调整为适用于没有蜂窝基础设施的情况。该协议也可以用于直接D2D。基于这些结果,与最近的工作相比,我们提出的协议具有较少的计算开销,并且与SODE相比具有较少的通信开销,并且保留了许多安全属性,如身份验证、授权、机密性、完整性、安全密钥协议、安全路由传输等…。我们使用ProVerif验证工具检查所提出协议的身份验证、机密性、可达性和安全密钥协议。
{"title":"Secure Protocol for Four D2D Scenarios","authors":"Hoda Nematy","doi":"10.5121/CSIT.2021.111102","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111102","url":null,"abstract":"In traditional cellular infrastructure, cellular devices communicate with each other directly even when they are close together. This strategy causes massive traffic to the cellular network therefore D2D communication has introduced to overcome this issue, bring more bandwidth and also higher rates to the cellular network. One of the major challenges for D2D Communication is to have one single secure protocol that can adapt in four D2D scenarios defined in references. These scenarios are Direct D2D and relaying D2D communication with and without cellular infrastructure. In this paper, we propose a Secure D2D protocol based on ARIADNE with TESLA. Also we use LTE-A AKA protocol for authentication and key agreement procedure between Source and Destination. Next, we adapt this scenario to be applicable in without cellular infrastructure ones. This protocol could be used in direct D2D also. Based on the results, our proposed protocol has a few computation overhead compare to recent works and have less communication overhead than SODE with preserve many security properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, Secure Routing Transmission…. We check Authentication, Confidentiality, Reachability and Secure Key Agreement of the proposed protocol with ProVerif verification tools.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48217749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Multilinear Feature Space to Accelerate CNN Classification 利用多线性特征空间加速CNN分类
Pub Date : 2021-07-24 DOI: 10.5121/CSIT.2021.111109
M. A. L. Vinagreiro, Edson C. Kitani, A. Laganá, L. Yoshioka
Computer vision plays a crucial role in ADAS security and navigation, as most systems are based on deep CNN architectures the computational resource to run a CNN algorithm is demanding. Therefore, the methods to speed up computation have become a relevant research issue. Even though several works on acceleration techniques found in the literature have not yet been achieved satisfactory results for embedded real-time system applications. This paper presents an alternative approach based on the Multilinear Feature Space (MFS) method resorting to transfer learning from large CNN architectures. The proposed method uses CNNs to generate feature maps, although it does not work as complexity reduction approach. When the training process ends, the generated maps are used to create vector feature space. We use this new vector space to make projections of any new sample in order to classify them. Our method, named MFS-CNN, uses the transfer learning from pre trained CNN to reduce the classification time of new sample image, with minimal loss in accuracy. Our method uses the VGG-16 model as the base CNN architecture for experiments; however, the method works with any similar CNN model. Using the well-known Vehicle Image Database and the German Traffic Sign Recognition Benchmark we compared the classification time of original VGG-16 model with the MFS-CNN method and our method is, on average, 17 times faster. The fast classification time reduces the computational and memories demand in embedded applications that requires a large CNN architecture.
计算机视觉在ADAS安全和导航中起着至关重要的作用,因为大多数系统都是基于深度CNN架构的,运行CNN算法的计算资源要求很高。因此,如何加快计算速度已成为一个相关的研究课题。尽管在文献中发现的一些关于加速技术的工作尚未在嵌入式实时系统应用中取得令人满意的结果。本文提出了一种基于多线性特征空间(MFS)方法的替代方法,该方法采用大型CNN架构的迁移学习。该方法使用cnn来生成特征映射,尽管它不能作为降低复杂度的方法。当训练过程结束时,生成的映射用于创建向量特征空间。我们使用这个新的向量空间对任何新的样本进行投影,以便对它们进行分类。我们的方法,MFS-CNN,使用预训练CNN的迁移学习来减少新样本图像的分类时间,并且精度损失最小。我们的方法使用VGG-16模型作为基础CNN架构进行实验;然而,该方法适用于任何类似的CNN模型。利用著名的车辆图像数据库和德国交通标志识别基准,我们将原始VGG-16模型的分类时间与MFS-CNN方法进行了比较,我们的方法平均快了17倍。快速的分类时间减少了需要大型CNN架构的嵌入式应用的计算和内存需求。
{"title":"Using Multilinear Feature Space to Accelerate CNN Classification","authors":"M. A. L. Vinagreiro, Edson C. Kitani, A. Laganá, L. Yoshioka","doi":"10.5121/CSIT.2021.111109","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111109","url":null,"abstract":"Computer vision plays a crucial role in ADAS security and navigation, as most systems are based on deep CNN architectures the computational resource to run a CNN algorithm is demanding. Therefore, the methods to speed up computation have become a relevant research issue. Even though several works on acceleration techniques found in the literature have not yet been achieved satisfactory results for embedded real-time system applications. This paper presents an alternative approach based on the Multilinear Feature Space (MFS) method resorting to transfer learning from large CNN architectures. The proposed method uses CNNs to generate feature maps, although it does not work as complexity reduction approach. When the training process ends, the generated maps are used to create vector feature space. We use this new vector space to make projections of any new sample in order to classify them. Our method, named MFS-CNN, uses the transfer learning from pre trained CNN to reduce the classification time of new sample image, with minimal loss in accuracy. Our method uses the VGG-16 model as the base CNN architecture for experiments; however, the method works with any similar CNN model. Using the well-known Vehicle Image Database and the German Traffic Sign Recognition Benchmark we compared the classification time of original VGG-16 model with the MFS-CNN method and our method is, on average, 17 times faster. The fast classification time reduces the computational and memories demand in embedded applications that requires a large CNN architecture.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48568170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product Quality Evaluation Method (PQEM): A Comprehensive Approach for the Software Product Life Cycle 产品质量评价方法(PQEM):一种软件产品生命周期的综合方法
Pub Date : 2021-07-24 DOI: 10.5121/CSIT.2021.111104
M. Falcó, Gabriela Robiolo
Project managers, product owners, and quality assurance leaders need to visualize and understand the entire picture of the development process as well as comprehend the product quality level, in a synthetic and intuitive way in order to facilitate the decision of accepting or rejecting each iteration within the software life cycle. This idea is extremely important nowadays, due to the fact that time is a key resource and it should be managed wisely to obtain a feasible quality level for each software deliverable. This article presents a novel solution called Product Quality Evaluation Method (PQEM) to evaluate a set of quality characteristics for each iteration of a software product. PQEM is based on the Goal-Question-Metric approach, the standard ISO/IEC 25010, and the extension made of testing coverage in order to obtain the quality coverage of each quality characteristic. The outcome of PQEM is a single value representing the quality per each iteration of a product, as an aggregated measure. Even though a value it is not the regular idea of measuring quality, we believe that it can be useful to use this value to understand easily the quality level of each iteration. An illustrative example of the method was carried out with a web and mobile application, within the healthcare environment.
项目经理、产品所有者和质量保证负责人需要以综合和直观的方式可视化和理解开发过程的全貌,并理解产品质量水平,以便于在软件生命周期内做出接受或拒绝每一次迭代的决定。这一想法在当今非常重要,因为时间是一种关键资源,应该明智地管理它,以获得每个软件交付的可行质量水平。本文提出了一种新的解决方案,称为产品质量评估方法(PQEM),用于评估软件产品每次迭代的一组质量特征。PQEM基于目标问题度量方法、标准ISO/IEC 25010以及测试覆盖范围的扩展,以获得每个质量特征的质量覆盖范围。PQEM的结果是表示产品每次迭代的质量的单个值,作为聚合度量。尽管一个值不是衡量质量的常规概念,但我们相信,使用这个值可以很容易地理解每次迭代的质量水平。该方法的一个示例是在医疗保健环境中使用web和移动应用程序进行的。
{"title":"Product Quality Evaluation Method (PQEM): A Comprehensive Approach for the Software Product Life Cycle","authors":"M. Falcó, Gabriela Robiolo","doi":"10.5121/CSIT.2021.111104","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111104","url":null,"abstract":"Project managers, product owners, and quality assurance leaders need to visualize and understand the entire picture of the development process as well as comprehend the product quality level, in a synthetic and intuitive way in order to facilitate the decision of accepting or rejecting each iteration within the software life cycle. This idea is extremely important nowadays, due to the fact that time is a key resource and it should be managed wisely to obtain a feasible quality level for each software deliverable. This article presents a novel solution called Product Quality Evaluation Method (PQEM) to evaluate a set of quality characteristics for each iteration of a software product. PQEM is based on the Goal-Question-Metric approach, the standard ISO/IEC 25010, and the extension made of testing coverage in order to obtain the quality coverage of each quality characteristic. The outcome of PQEM is a single value representing the quality per each iteration of a product, as an aggregated measure. Even though a value it is not the regular idea of measuring quality, we believe that it can be useful to use this value to understand easily the quality level of each iteration. An illustrative example of the method was carried out with a web and mobile application, within the healthcare environment.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48976993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Credit Card Fraud Detection using Supervised and Unsupervised Learning 使用监督和非监督学习的信用卡欺诈检测
Pub Date : 2021-07-24 DOI: 10.5121/CSIT.2021.111107
Vikas Thammanna Gowda
In the present monetary situation, credit card use has gotten normal. These cards allow the user to make payments online and even in person. Online payments are very convenient, but it comes with its own risk of fraud. With the expanding number of credit card users, frauds are also expanding at the same rate. Some machine learning algorithms can be applied to tackle this problem. In this paper an evaluation of supervised and unsupervised machine learning algorithms has been presented for credit card fraud detection.
在目前的货币形势下,信用卡的使用已经恢复正常。这些卡允许用户在线甚至亲自付款。在线支付非常方便,但也有欺诈风险。随着信用卡用户数量的增加,欺诈行为也在以同样的速度扩大。一些机器学习算法可以用来解决这个问题。本文对用于信用卡欺诈检测的有监督和无监督机器学习算法进行了评估。
{"title":"Credit Card Fraud Detection using Supervised and Unsupervised Learning","authors":"Vikas Thammanna Gowda","doi":"10.5121/CSIT.2021.111107","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111107","url":null,"abstract":"In the present monetary situation, credit card use has gotten normal. These cards allow the user to make payments online and even in person. Online payments are very convenient, but it comes with its own risk of fraud. With the expanding number of credit card users, frauds are also expanding at the same rate. Some machine learning algorithms can be applied to tackle this problem. In this paper an evaluation of supervised and unsupervised machine learning algorithms has been presented for credit card fraud detection.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44887981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Generalized Approach to Data Supply Chain Management – Balancing Data Value and Data Debt 数据供应链管理的一种通用方法——平衡数据价值和数据债务
Pub Date : 2021-07-24 DOI: 10.5121/CSIT.2021.111105
Roberto Maranca, M. Staiano
The “data supply chains” (DSCs), which are connecting the point where physical information is digitized to the point where the data is consumed, are getting longer and more convoluted. Although plenty of frameworks have emerged in the recent past, none of them, in the authors’ opinion, have so far provided a robust set of formalised “how to”, that would connect a “well built” DSC to a higher likelihood to achieve the expected value. This paper aims at demonstrating: (i) a generalized model of the DSC in its constituent parts (source, target, process, controls), and (ii) a quantification methodology that would link the underlying current quality as well as the legacy “bad data” to the cost or effort of attaining the desired value. Such approach offers a practical and scalable model enabling to restructure at its foundation some practices of data management priming them for the digital challenges of the future.
连接物理信息数字化点和数据消费点的“数据供应链”(dsc)正变得越来越长,越来越复杂。尽管最近出现了大量的框架,但在作者看来,到目前为止,没有一个框架提供了一套强有力的形式化的“如何做”,将“构建良好的”DSC与实现预期价值的更高可能性联系起来。本文旨在证明:(i) DSC在其组成部分(来源、目标、过程、控制)中的广义模型,以及(ii)一种量化方法,该方法将潜在的当前质量以及遗留的“坏数据”与获得期望价值的成本或努力联系起来。这种方法提供了一种实用且可扩展的模型,能够在其基础上重构一些数据管理实践,为未来的数字挑战做好准备。
{"title":"A Generalized Approach to Data Supply Chain Management – Balancing Data Value and Data Debt","authors":"Roberto Maranca, M. Staiano","doi":"10.5121/CSIT.2021.111105","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111105","url":null,"abstract":"The “data supply chains” (DSCs), which are connecting the point where physical information is digitized to the point where the data is consumed, are getting longer and more convoluted. Although plenty of frameworks have emerged in the recent past, none of them, in the authors’ opinion, have so far provided a robust set of formalised “how to”, that would connect a “well built” DSC to a higher likelihood to achieve the expected value. This paper aims at demonstrating: (i) a generalized model of the DSC in its constituent parts (source, target, process, controls), and (ii) a quantification methodology that would link the underlying current quality as well as the legacy “bad data” to the cost or effort of attaining the desired value. Such approach offers a practical and scalable model enabling to restructure at its foundation some practices of data management priming them for the digital challenges of the future.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45045387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Care – A Framework for a Multimedia Assistance System for Singletons “Does It Help?” Care——单身人士多媒体辅助系统的框架“它有帮助吗?”
Pub Date : 2021-07-10 DOI: 10.5121/CSIT.2021.111010
T. Schirgi
In contrast to the increasing degree of automation in the production industry, commissioning and maintenance activities will essentially be limited to manual activities. Production involves repetitive actions that are manageable and clearly defined as a process. Unlike this, commissioning and maintenance have to deal with uncontrollable, undefined, and non - standardized processes. The paper provides a framework for a multimedia assistance system for singletons. It was found that the paradigm has to consist of five key components to provide tailored assistance to customers. These key components are Expertise, Infrastructure, Application & Platforms, Security & Privacy and Business Process & Business Model. The resulting stack and the overlaying business model are called "CaRE – Custom Assistance for Remote Employees". With a user-centered approach, the needs of the target group were identified. Based on this, the framework was implemented in the form of a prototypical application. To check, whether the assumptions regarding a Multimedia Assistance System are correct, the prototypical developed application was tested with aremote-usability test.
与生产行业自动化程度的不断提高形成对比的是,调试和维护活动基本上将仅限于手动活动。生产涉及可管理且明确定义为一个过程的重复操作。与此不同的是,调试和维护必须处理不可控、不明确和非标准化的过程。本文为单身人士多媒体辅助系统提供了一个框架。研究发现,该模式必须由五个关键组成部分组成,才能为客户提供量身定制的帮助。这些关键组成部分包括专业知识、基础设施、应用程序和平台、安全和隐私以及业务流程和业务模式。生成的堆栈和覆盖的业务模型称为“CaRE–远程员工自定义协助”。通过以用户为中心的方法,确定了目标群体的需求。在此基础上,以原型应用程序的形式实现了该框架。为了检查有关多媒体辅助系统的假设是否正确,对原型开发的应用程序进行了远程可用性测试。
{"title":"Care – A Framework for a Multimedia Assistance System for Singletons “Does It Help?”","authors":"T. Schirgi","doi":"10.5121/CSIT.2021.111010","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111010","url":null,"abstract":"In contrast to the increasing degree of automation in the production industry, commissioning and maintenance activities will essentially be limited to manual activities. Production involves repetitive actions that are manageable and clearly defined as a process. Unlike this, commissioning and maintenance have to deal with uncontrollable, undefined, and non - standardized processes. The paper provides a framework for a multimedia assistance system for singletons. It was found that the paradigm has to consist of five key components to provide tailored assistance to customers. These key components are Expertise, Infrastructure, Application & Platforms, Security & Privacy and Business Process & Business Model. The resulting stack and the overlaying business model are called \"CaRE – Custom Assistance for Remote Employees\". With a user-centered approach, the needs of the target group were identified. Based on this, the framework was implemented in the form of a prototypical application. To check, whether the assumptions regarding a Multimedia Assistance System are correct, the prototypical developed application was tested with aremote-usability test.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45988453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Security in Internet of Things Environment by Developing an AuthenticationMechanism using COAP Protocol 利用COAP协议开发认证机制提高物联网环境下的安全性
Pub Date : 2021-07-10 DOI: 10.5121/CSIT.2021.111008
Hernandez Pedro, Espitia Edinson
{"title":"Enhancing Security in Internet of Things Environment by Developing an AuthenticationMechanism using COAP Protocol","authors":"Hernandez Pedro, Espitia Edinson","doi":"10.5121/CSIT.2021.111008","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111008","url":null,"abstract":"","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":"11 1","pages":"101"},"PeriodicalIF":0.0,"publicationDate":"2021-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70598815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Manufacturers, AI Models and Machine Learning, Value Chains, and 5th Generation Wireless Networks 制造商,人工智能模型和机器学习,价值链和第五代无线网络
Pub Date : 2021-07-10 DOI: 10.5121/CSIT.2021.111003
obert B. Cohen
When AI models and machine learning are fully interconnected in factories with cabling-free 5G wireless networks, firms become “fully digital”. This analysis argues that it is not the initial efficiencies gained by optimizing a plant’s operations but rather a firm’s ability to build a collection of knowledge about each step of its operations, what we call “knowledge synthesis”. This is information about how each product is produced, how the process to produce it is managed and optimized, and the software and systems required. This knowledge is important because it permits firms to exploit network effects based upon connecting plants together or sharing expertise with partners. This greatly expands the potential for economic benefits from the use of AI and 5G. This review explores cases from firms with smart factories that have adopted AI and 5G communications including Moderna, Sanofi, Mercedes, Ford, and VW. It examines how these firms have benefitted from the move to smart factories with 5G communications networks. It also explores how firms have improved their value chains by building smart factories that connect nearly all manufacturing processes to machine learning and AI models that analyze machine and process data rapidly. Next, they take advantage of network effects – due to “knowledge synthesis” that permits early smart factories with 5G networks --to derive even larger benefits inside their production operations and in their supply chains. In both phases, the adoption of 5th Generation wireless in plants ramps up firms’ abilities to interconnect their digital systems. Once the interconnected systems exist, firms exploit network effects to create “knowledge synthesis” or knowledge platforms to consolidate insights gained from optimizing many machines and processes. Using “knowledge synthesis”, firms can also transfer knowledge from one group of equipment to another that is not optimized even when the equipment is in different facilities. This makes firms far more flexible, interoperable, and scalable.
当人工智能模型和机器学习在工厂中通过无布线的5G无线网络完全互联时,公司就会变得“完全数字化”。该分析认为,这不是通过优化工厂运营获得的初始效率,而是企业建立关于其运营每一步的知识集合的能力,我们称之为“知识综合”。这是关于每种产品是如何生产的,生产过程是如何管理和优化的,以及所需的软件和系统的信息。这些知识很重要,因为它允许企业在将工厂连接在一起或与合作伙伴共享专业知识的基础上利用网络效应。这大大扩大了人工智能和5G的使用带来的经济效益潜力。这篇综述探讨了拥有智能工厂的公司采用人工智能和5G通信的案例,包括莫德纳、赛诺菲、梅赛德斯、福特和大众。它考察了这些公司如何从向拥有5G通信网络的智能工厂的转变中受益。它还探讨了企业如何通过建立智能工厂来改善其价值链,这些工厂将几乎所有的制造过程与快速分析机器和过程数据的机器学习和人工智能模型连接起来。接下来,他们利用网络效应——由于“知识合成”允许早期拥有5G网络的智能工厂——在生产运营和供应链中获得更大的利益。在这两个阶段,工厂采用第五代无线技术提高了公司互连数字系统的能力。一旦互联系统存在,企业就会利用网络效应创建“知识合成”或知识平台,以巩固从优化许多机器和流程中获得的见解。使用“知识综合”,企业还可以将知识从一组设备转移到另一组未优化的设备,即使这些设备位于不同的设施中。这使得公司更加灵活、可互操作和可扩展。
{"title":"Manufacturers, AI Models and Machine Learning, Value Chains, and 5th Generation Wireless Networks","authors":"obert B. Cohen","doi":"10.5121/CSIT.2021.111003","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111003","url":null,"abstract":"When AI models and machine learning are fully interconnected in factories with cabling-free 5G wireless networks, firms become “fully digital”. This analysis argues that it is not the initial efficiencies gained by optimizing a plant’s operations but rather a firm’s ability to build a collection of knowledge about each step of its operations, what we call “knowledge synthesis”. This is information about how each product is produced, how the process to produce it is managed and optimized, and the software and systems required. This knowledge is important because it permits firms to exploit network effects based upon connecting plants together or sharing expertise with partners. This greatly expands the potential for economic benefits from the use of AI and 5G. This review explores cases from firms with smart factories that have adopted AI and 5G communications including Moderna, Sanofi, Mercedes, Ford, and VW. It examines how these firms have benefitted from the move to smart factories with 5G communications networks. It also explores how firms have improved their value chains by building smart factories that connect nearly all manufacturing processes to machine learning and AI models that analyze machine and process data rapidly. Next, they take advantage of network effects – due to “knowledge synthesis” that permits early smart factories with 5G networks --to derive even larger benefits inside their production operations and in their supply chains. In both phases, the adoption of 5th Generation wireless in plants ramps up firms’ abilities to interconnect their digital systems. Once the interconnected systems exist, firms exploit network effects to create “knowledge synthesis” or knowledge platforms to consolidate insights gained from optimizing many machines and processes. Using “knowledge synthesis”, firms can also transfer knowledge from one group of equipment to another that is not optimized even when the equipment is in different facilities. This makes firms far more flexible, interoperable, and scalable.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47365838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seasonal Heavy Rain Forecasting Method 季节性暴雨预报方法
Pub Date : 2021-07-10 DOI: 10.5121/CSIT.2021.111002
Jaekwang Kim
In this study, we study the technique for predicting heavy / non-rain rainfall after 6 hours from the present using the values of the weather attributes. Through this study, we investigated whether each attribute value is influenced by a specific pattern of weather maps representing heavy and non-heavy rains or seasonally when making heavy / non-heavy forecasts. For the experiment, a 20-year cumulative weather map was learned with Support Vector Machine (SVM) and tested using a set of correct answers for heavy rain and heavy rain. As a result of the experiment, it was found that the heavy rain prediction of SVM showed an accuracy rate of up to 70%, and that it was seasonal variation rather than a specific pattern that influenced the prediction.
在这项研究中,我们研究了利用天气属性值预测从现在开始6小时后的强/非降雨的技术。通过这项研究,我们调查了在进行强/非强天气预报时,每个属性值是否受到代表暴雨和非暴雨的特定天气图模式或季节性的影响。在实验中,使用支持向量机(SVM)学习20年累积天气图,并使用一组大雨和大雨的正确答案进行测试。实验结果表明,SVM的暴雨预测准确率高达70%,影响预测的是季节变化而不是特定的模式。
{"title":"Seasonal Heavy Rain Forecasting Method","authors":"Jaekwang Kim","doi":"10.5121/CSIT.2021.111002","DOIUrl":"https://doi.org/10.5121/CSIT.2021.111002","url":null,"abstract":"In this study, we study the technique for predicting heavy / non-rain rainfall after 6 hours from the present using the values of the weather attributes. Through this study, we investigated whether each attribute value is influenced by a specific pattern of weather maps representing heavy and non-heavy rains or seasonally when making heavy / non-heavy forecasts. For the experiment, a 20-year cumulative weather map was learned with Support Vector Machine (SVM) and tested using a set of correct answers for heavy rain and heavy rain. As a result of the experiment, it was found that the heavy rain prediction of SVM showed an accuracy rate of up to 70%, and that it was seasonal variation rather than a specific pattern that influenced the prediction.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41589923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer science & information technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1