首页 > 最新文献

Array最新文献

英文 中文
Music is in the air. Sounding performances in hybrid and virtual space 空气中弥漫着音乐。混合空间和虚拟空间的探测性能
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.25370/array.v20223484
Miriam Akkermann
While physical space is fundamental to any sound's (physical) being – and thus being heard – advancements in technology and COVID pandemic-related limitations to physical travel and meeting in larger crowds prompted debate on how to design hybrid and virtual spaces in which music and sound art can be performed adequately. The question of how to make music together while being located at distant places, as well as issues concerning the integration of a wide-spread audience using telecommunication technologies, is, however, neither completely new nor limited to digital virtuality. Currently termed as ‘telematic’and ‘networked’art works and performances, there exists a quite long history of using distributed sounds and sound related information in order to create artistic settings and performances. For example, listening to live music performances or entertainment programs from a distance was already possible in the transition to the 20th century. Facilitated by Electrophone telespace
虽然物理空间是任何声音(物理)存在和被听到的基础,但技术的进步以及与COVID大流行相关的物理旅行和集会限制引发了关于如何设计混合空间和虚拟空间的辩论,以充分发挥音乐和声音艺术。然而,如何在相距遥远的地方一起制作音乐的问题,以及使用电信技术将广泛的听众整合在一起的问题,既不是全新的,也不局限于数字虚拟。目前被称为“远程信息”和“网络”的艺术作品和表演,为了创造艺术场景和表演,使用分布式声音和声音相关信息的历史相当悠久。例如,在向20世纪过渡时,从远处听现场音乐表演或娱乐节目已经成为可能。由电子电话电话空间提供便利
{"title":"Music is in the air. Sounding performances in hybrid and virtual space","authors":"Miriam Akkermann","doi":"10.25370/array.v20223484","DOIUrl":"https://doi.org/10.25370/array.v20223484","url":null,"abstract":"While physical space is fundamental to any sound's (physical) being – and thus being heard – advancements in technology and COVID pandemic-related limitations to physical travel and meeting in larger crowds prompted debate on how to design hybrid and virtual spaces in which music and sound art can be performed adequately. The question of how to make music together while being located at distant places, as well as issues concerning the integration of a wide-spread audience using telecommunication technologies, is, however, neither completely new nor limited to digital virtuality. Currently termed as ‘telematic’and ‘networked’art works and performances, there exists a quite long history of using distributed sounds and sound related information in order to create artistic settings and performances. For example, listening to live music performances or entertainment programs from a distance was already possible in the transition to the 20th century. Facilitated by Electrophone telespace","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69207573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harmonizing motion and contrast vision for robust looming detection 协调运动和对比度视觉,实现鲁棒逼近检测
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-12-01 DOI: 10.2139/ssrn.4251104
Qinbing Fu, Zhiqiang Li, Jigen Peng
{"title":"Harmonizing motion and contrast vision for robust looming detection","authors":"Qinbing Fu, Zhiqiang Li, Jigen Peng","doi":"10.2139/ssrn.4251104","DOIUrl":"https://doi.org/10.2139/ssrn.4251104","url":null,"abstract":"","PeriodicalId":8417,"journal":{"name":"Array","volume":"17 1","pages":"100272"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47671232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Vehicle Re-identification method based on Swin-Transformer network 基于swing - transformer网络的车辆再识别方法
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-12-01 DOI: 10.2139/ssrn.4207513
Jianrong Li, C. Yu, Jinyuan Shi, Chuanlei Zhang, Ting Ke
{"title":"Vehicle Re-identification method based on Swin-Transformer network","authors":"Jianrong Li, C. Yu, Jinyuan Shi, Chuanlei Zhang, Ting Ke","doi":"10.2139/ssrn.4207513","DOIUrl":"https://doi.org/10.2139/ssrn.4207513","url":null,"abstract":"","PeriodicalId":8417,"journal":{"name":"Array","volume":"32 1","pages":"100255"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68729487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nonlinear anisotropic diffusion methods for image denoising problems: Challenges and future research opportunities 图像去噪问题的非线性各向异性扩散方法:挑战与未来研究机会
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-11-01 DOI: 10.2139/ssrn.4191365
B. Maiseli
{"title":"Nonlinear anisotropic diffusion methods for image denoising problems: Challenges and future research opportunities","authors":"B. Maiseli","doi":"10.2139/ssrn.4191365","DOIUrl":"https://doi.org/10.2139/ssrn.4191365","url":null,"abstract":"","PeriodicalId":8417,"journal":{"name":"Array","volume":"17 1","pages":"100265"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44490407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BreastMultiNet: A multi-scale feature fusion method using deep neural network to detect breast cancer BreastMultiNet:一种利用深度神经网络检测癌症的多尺度特征融合方法
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-11-01 DOI: 10.2139/ssrn.4199184
M. Monibor Rahman, Md. Saikat Islam Khan, H. M. H. Babu
{"title":"BreastMultiNet: A multi-scale feature fusion method using deep neural network to detect breast cancer","authors":"M. Monibor Rahman, Md. Saikat Islam Khan, H. M. H. Babu","doi":"10.2139/ssrn.4199184","DOIUrl":"https://doi.org/10.2139/ssrn.4199184","url":null,"abstract":"","PeriodicalId":8417,"journal":{"name":"Array","volume":"16 1","pages":"100256"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41950178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Post-quantum cryptography Algorithm's standardization and performance analysis 后量子密码算法的标准化与性能分析
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-01 DOI: 10.1016/j.array.2022.100242
Manish Kumar

-Quantum computer is no longer a hypothetical idea. It is the world's most important technology and there is a race among countries to get supremacy in quantum technology. It is the technology that will reduce the computing time from years to hours or even minutes. The power of quantum computing will be a great support for the scientific community. However, it raises serious threats to cybersecurity. Theoretically, all the cryptography algorithms are vulnerable to attack. The practical quantum computers, when available with millions of qubits capacity, will be able to break nearly all modern public-key cryptographic systems. Before the quantum computers arrive with sufficient ‘qubit’ capacity, we must be ready with quantum-safe cryptographic algorithms, tools, techniques, and deployment strategies to protect the ICT infrastructure. This paper discusses in detail the global effort for the design, development, and standardization of various quantum-safe cryptography algorithms along with the performance analysis of some of the potential quantum-safe algorithms. Most quantum-safe algorithms need more CPU cycles, higher runtime memory, and a large key size. The objective of the paper is to analyze the feasibility of the various quantum-safe cryptography algorithms.

量子计算机不再是一个假想的想法。这是世界上最重要的技术,各国之间正在进行一场争夺量子技术霸权的竞赛。这项技术将把计算时间从几年缩短到几小时甚至几分钟。量子计算的力量将为科学界提供巨大的支持。然而,它对网络安全构成了严重威胁。从理论上讲,所有的加密算法都容易受到攻击。实用的量子计算机,当拥有数百万量子位容量时,将能够破解几乎所有现代公钥加密系统。在量子计算机具备足够的“量子比特”容量之前,我们必须准备好量子安全的加密算法、工具、技术和部署策略,以保护ICT基础设施。本文详细讨论了各种量子安全加密算法的设计、开发和标准化的全球努力,并对一些潜在的量子安全算法进行了性能分析。大多数量子安全算法需要更多的CPU周期、更高的运行时内存和更大的密钥大小。本文的目的是分析各种量子安全密码算法的可行性。
{"title":"Post-quantum cryptography Algorithm's standardization and performance analysis","authors":"Manish Kumar","doi":"10.1016/j.array.2022.100242","DOIUrl":"https://doi.org/10.1016/j.array.2022.100242","url":null,"abstract":"<div><p>-Quantum computer is no longer a hypothetical idea. It is the world's most important technology and there is a race among countries to get supremacy in quantum technology. It is the technology that will reduce the computing time from years to hours or even minutes. The power of quantum computing will be a great support for the scientific community. However, it raises serious threats to cybersecurity. Theoretically, all the cryptography algorithms are vulnerable to attack. The practical quantum computers, when available with millions of qubits capacity, will be able to break nearly all modern public-key cryptographic systems. Before the quantum computers arrive with sufficient ‘qubit’ capacity, we must be ready with quantum-safe cryptographic algorithms, tools, techniques, and deployment strategies to protect the ICT infrastructure. This paper discusses in detail the global effort for the design, development, and standardization of various quantum-safe cryptography algorithms along with the performance analysis of some of the potential quantum-safe algorithms. Most quantum-safe algorithms need more CPU cycles, higher runtime memory, and a large key size. The objective of the paper is to analyze the feasibility of the various quantum-safe cryptography algorithms.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"15 ","pages":"Article 100242"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005622000777/pdfft?md5=75d79c7ee26fdefa0ae827069af84d57&pid=1-s2.0-S2590005622000777-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138135192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Natural language model for automatic identification of Intimate Partner Violence reports from Twitter 自动识别Twitter亲密伴侣暴力报告的自然语言模型
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-01 DOI: 10.1016/j.array.2022.100217
Mohammed Ali Al-Garadi , Sangmi Kim , Yuting Guo , Elise Warren , Yuan-Chi Yang , Sahithi Lakamana , Abeed Sarker

Intimate partner violence (IPV) is a preventable public health problem that affects millions of people worldwide. Approximately one in four women are estimated to be or have been victims of severe violence at some point in their lives, irrespective of age, ethnicity, and economic status. Victims often report IPV experiences on social media, and automatic detection of such reports via machine learning may enable improved surveillance and targeted distribution of support and/or interventions for those in need. However, no artificial intelligence systems for automatic detection currently exists, and we attempted to address this research gap. We collected posts from Twitter using a list of IPV-related keywords, manually reviewed subsets of retrieved posts, and prepared annotation guidelines to categorize tweets into IPV-report or non-IPV-report. We annotated 6,348 tweets in total, with the inter-annotator agreement (IAA) of 0.86 (Cohen's kappa) among 1,834 double-annotated tweets. The class distribution in the annotated dataset was highly imbalanced, with only 668 posts (∼11%) labeled as IPV-report. We then developed an effective natural language processing model to identify IPV-reporting tweets automatically. The developed model achieved classification F1-scores of 0.76 for the IPV-report class and 0.97 for the non-IPV-report class. We conducted post-classification analyses to determine the causes of system errors and to ensure that the system did not exhibit biases in its decision making, particularly with respect to race and gender. Our automatic model can be an essential component for a proactive social media-based intervention and support framework, while also aiding population-level surveillance and large-scale cohort studies.

亲密伴侣暴力是一个可预防的公共卫生问题,影响着全世界数百万人。据估计,不论年龄、种族和经济地位如何,大约四分之一的妇女在其生命的某个阶段是或曾经是严重暴力的受害者。受害者经常在社交媒体上报告IPV经历,通过机器学习自动检测此类报告可能有助于改善监测,并有针对性地为有需要的人提供支持和/或干预措施。然而,目前还没有用于自动检测的人工智能系统,我们试图解决这一研究空白。我们使用与ipv6相关的关键字列表从Twitter收集帖子,手动审查检索到的帖子的子集,并准备注释指南,将tweet分类为ipv6 -report或非ipv6 -report。我们一共注释了6348条tweet,在1834条双注释tweet中,注释者间协议(IAA)为0.86 (Cohen’s kappa)。注释数据集中的类分布高度不平衡,只有668篇文章(约11%)标记为ipv6 -report。然后,我们开发了一个有效的自然语言处理模型来自动识别ipv6报告推文。所开发的模型实现了分类f1 - 0.76分的ipv4 -报告类和0.97分的非ipv6 -报告类。我们进行了分类后分析,以确定系统错误的原因,并确保系统在决策过程中没有表现出偏见,特别是在种族和性别方面。我们的自动模型可以成为主动的基于社交媒体的干预和支持框架的重要组成部分,同时也有助于人口水平的监测和大规模队列研究。
{"title":"Natural language model for automatic identification of Intimate Partner Violence reports from Twitter","authors":"Mohammed Ali Al-Garadi ,&nbsp;Sangmi Kim ,&nbsp;Yuting Guo ,&nbsp;Elise Warren ,&nbsp;Yuan-Chi Yang ,&nbsp;Sahithi Lakamana ,&nbsp;Abeed Sarker","doi":"10.1016/j.array.2022.100217","DOIUrl":"10.1016/j.array.2022.100217","url":null,"abstract":"<div><p>Intimate partner violence (IPV) is a preventable public health problem that affects millions of people worldwide. Approximately one in four women are estimated to be or have been victims of severe violence at some point in their lives, irrespective of age, ethnicity, and economic status. Victims often report IPV experiences on social media, and automatic detection of such reports via machine learning may enable improved surveillance and targeted distribution of support and/or interventions for those in need. However, no artificial intelligence systems for automatic detection currently exists, and we attempted to address this research gap. We collected posts from Twitter using a list of IPV-related keywords, manually reviewed subsets of retrieved posts, and prepared annotation guidelines to categorize tweets into IPV-report or non-IPV-report. We annotated 6,348 tweets in total, with the inter-annotator agreement (IAA) of 0.86 (Cohen's kappa) among 1,834 double-annotated tweets. The class distribution in the annotated dataset was highly imbalanced, with only 668 posts (∼11%) labeled as IPV-report. We then developed an effective natural language processing model to identify IPV-reporting tweets automatically. The developed model achieved classification F<sub>1</sub>-scores of 0.76 for the IPV-report class and 0.97 for the non-IPV-report class. We conducted post-classification analyses to determine the causes of system errors and to ensure that the system did not exhibit biases in its decision making, particularly with respect to race and gender. Our automatic model can be an essential component for a proactive social media-based intervention and support framework, while also aiding population-level surveillance and large-scale cohort studies.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"15 ","pages":"Article 100217"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ftp.ncbi.nlm.nih.gov/pub/pmc/oa_pdf/48/57/nihms-1882589.PMC10065459.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9282928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Using textual bug reports to predict the fault category of software bugs 使用文本错误报告预测软件错误的故障类别
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-01 DOI: 10.1016/j.array.2022.100189
Thomas Hirsch, Birgit Hofer

Debugging is a time-consuming and expensive process. Developers have to select appropriate tools, methods and approaches in order to efficiently reproduce, localize and fix bugs. These choices are based on the developers’ assessment of the type of fault for a given bug report. This paper proposes a machine learning (ML) based approach that predicts the fault type for a given textual bug report. We built a dataset from 70+ projects for training and evaluation of our approach. Further, we performed a user study to establish a baseline for non-expert human performance on this task. Our models, incorporating our custom preprocessing approaches, reach up to 0.69% macro average F1 score on this bug classification problem. We demonstrate inter-project transferability of our approach. Further, we identify and discuss issues and limitations of ML classification approaches applied on textual bug reports. Our models can support researchers in data collection efforts, as for example bug benchmark creation. In future, such models could aid inexperienced developers in debugging tool selection, helping save time and resources.

调试是一个耗时且昂贵的过程。开发者必须选择合适的工具、方法和方法,以便有效地复制、本地化和修复漏洞。这些选择是基于开发人员对给定错误报告的错误类型的评估。本文提出了一种基于机器学习(ML)的方法来预测给定文本错误报告的故障类型。我们从70多个项目中建立了一个数据集,用于培训和评估我们的方法。此外,我们进行了用户研究,为非专业人员在此任务中的表现建立基线。我们的模型,结合我们自定义的预处理方法,在这个bug分类问题上达到了0.69%的宏观平均F1分数。我们展示了我们的方法在项目间的可移植性。此外,我们确定并讨论了应用于文本错误报告的ML分类方法的问题和局限性。我们的模型可以支持研究人员进行数据收集工作,例如创建bug基准。将来,这样的模型可以帮助没有经验的开发人员选择调试工具,帮助节省时间和资源。
{"title":"Using textual bug reports to predict the fault category of software bugs","authors":"Thomas Hirsch,&nbsp;Birgit Hofer","doi":"10.1016/j.array.2022.100189","DOIUrl":"10.1016/j.array.2022.100189","url":null,"abstract":"<div><p>Debugging is a time-consuming and expensive process. Developers have to select appropriate tools, methods and approaches in order to efficiently reproduce, localize and fix bugs. These choices are based on the developers’ assessment of the type of fault for a given bug report. This paper proposes a machine learning (ML) based approach that predicts the fault type for a given textual bug report. We built a dataset from 70+ projects for training and evaluation of our approach. Further, we performed a user study to establish a baseline for non-expert human performance on this task. Our models, incorporating our custom preprocessing approaches, reach up to 0.69% macro average F1 score on this bug classification problem. We demonstrate inter-project transferability of our approach. Further, we identify and discuss issues and limitations of ML classification approaches applied on textual bug reports. Our models can support researchers in data collection efforts, as for example bug benchmark creation. In future, such models could aid inexperienced developers in debugging tool selection, helping save time and resources.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"15 ","pages":"Article 100189"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S259000562200042X/pdfft?md5=d85c4e5667d78881a25943827c972501&pid=1-s2.0-S259000562200042X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49366653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers 利用MongoDB和Linux容器增强大数据分析框架安全性的机制和技术
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-01 DOI: 10.1016/j.array.2022.100236
Akalanka Mailewa , Susan Mengel , Lisa Gittner , Hafiz Khan

The frequency and scale of unauthorized access cases and misuses of data access privileges are a growing concern of many organizations. The protection of confidential data, such as social security numbers, financial information, etc., of the customers and/or employees is among the key responsibilities of any organization, and damage to such sensitive data can easily pose a threat to the future of a business and the security of the customers. Therefore, this paper proposes and implements some security mechanisms and techniques, such as secure authentication, secure authorization, and encryption, to assure the overall security of a big data analytic framework with MongoDB free community edition. This paper presents the fourth phase of our continuous research where in the first phase we proposed a data analytic framework with MongoDB and Linux Containers (LXCs) with basic security requirements. Next, in the second phase we proposed a vulnerability analysis testbed to find vulnerabilities associated with the system. Finally, in the third phase we discussed in detail root causes and some prevention techniques of vulnerabilities found in the system. In addition, this paper introduces a new security mechanism for privacy preserving data handling with MongoDB to ensure the privacy of the data before being processed. Our results show, with our initial model of the analytic framework, how well our newly introduced security mechanisms work and how these security mechanisms and techniques can be used to assure the confidentiality, integrity, and availability (CIA) of any data science project conducted on our proposed analytic framework. In addition, these security mechanisms and techniques help us to strengthen the current system against zero-day attacks where attacks on vulnerabilities that have not been patched or made public yet. Therefore, our vulnerability analysis testbed which is proposed in the second phase of this research will not be able to finds vulnerabilities related to zero-day attacks.

未经授权访问案例的频率和规模以及数据访问权限的滥用是许多组织日益关注的问题。保护客户和/或员工的机密数据,如社会安全号码、财务信息等,是任何组织的主要责任之一,对这些敏感数据的破坏很容易对业务的未来和客户的安全构成威胁。为此,本文提出并实现了安全认证、安全授权、加密等安全机制和技术,以保证MongoDB免费社区版大数据分析框架的整体安全。本文介绍了我们持续研究的第四阶段,在第一阶段,我们提出了一个具有基本安全要求的MongoDB和Linux容器(LXCs)的数据分析框架。接下来,在第二阶段,我们提出了一个漏洞分析测试平台,以发现与系统相关的漏洞。最后,在第三阶段,我们详细讨论了系统中漏洞的根源和一些预防技术。此外,本文还引入了一种新的MongoDB数据处理隐私保护安全机制,确保数据在处理前的隐私性。我们的结果显示,使用我们的分析框架的初始模型,我们新引入的安全机制是如何工作的,以及如何使用这些安全机制和技术来确保在我们提议的分析框架上进行的任何数据科学项目的机密性、完整性和可用性(CIA)。此外,这些安全机制和技术帮助我们加强当前系统对抗零日攻击,即针对尚未修补或尚未公开的漏洞的攻击。因此,我们在本研究第二阶段提出的漏洞分析测试平台将无法发现与零日攻击相关的漏洞。
{"title":"Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers","authors":"Akalanka Mailewa ,&nbsp;Susan Mengel ,&nbsp;Lisa Gittner ,&nbsp;Hafiz Khan","doi":"10.1016/j.array.2022.100236","DOIUrl":"10.1016/j.array.2022.100236","url":null,"abstract":"<div><p>The frequency and scale of unauthorized access cases and misuses of data access privileges are a growing concern of many organizations. The protection of confidential data, such as social security numbers, financial information, etc., of the customers and/or employees is among the key responsibilities of any organization, and damage to such sensitive data can easily pose a threat to the future of a business and the security of the customers. Therefore, this paper proposes and implements some security mechanisms and techniques, such as secure authentication, secure authorization, and encryption, to assure the overall security of a big data analytic framework with MongoDB free community edition. This paper presents the fourth phase of our continuous research where in the first phase we proposed a data analytic framework with MongoDB and Linux Containers (LXCs) with basic security requirements. Next, in the second phase we proposed a vulnerability analysis testbed to find vulnerabilities associated with the system. Finally, in the third phase we discussed in detail root causes and some prevention techniques of vulnerabilities found in the system. In addition, this paper introduces a new security mechanism for privacy preserving data handling with MongoDB to ensure the privacy of the data before being processed. Our results show, with our initial model of the analytic framework, how well our newly introduced security mechanisms work and how these security mechanisms and techniques can be used to assure the confidentiality, integrity, and availability (CIA) of any data science project conducted on our proposed analytic framework. In addition, these security mechanisms and techniques help us to strengthen the current system against zero-day attacks where attacks on vulnerabilities that have not been patched or made public yet. Therefore, our vulnerability analysis testbed which is proposed in the second phase of this research will not be able to finds vulnerabilities related to zero-day attacks.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"15 ","pages":"Article 100236"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S259000562200073X/pdfft?md5=9f51815b652b7bb9179c0c3a886fec36&pid=1-s2.0-S259000562200073X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45932587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How statistical modeling and machine learning could help in the calibration of numerical simulation and fluid mechanics models? Application to the calibration of models reproducing the vibratory behavior of an overhead line conductor 统计建模和机器学习如何帮助校准数值模拟和流体力学模型?应用于模拟架空线路导体振动特性的模型校正
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-01 DOI: 10.1016/j.array.2022.100187
Hamdi Amroun , Fikri Hafid , Ammi Mehdi

The world of fluid mechanics is increasingly generating a large amount of data, thanks to the use of numerical simulation techniques. This offers interesting opportunities for incorporating machine learning methods to solve data-related problems such as model calibration. One of the applications that machine learning can offer to the world of Engineering and Fluid Mechanics in particular is the calibration of models making it possible to approximate a phenomenon. Indeed, the computational cost generated by some models of fluid mechanics pushes scientists to use other models close to the original models but less computationally intensive in order to facilitate their handling. Among the different approaches used: machine learning coupled with some optimization methods and algorithms in order to reduce the computation cost induced. In this paper, we propose a framework which is a new flexible, optimized and improved method, to calibrate a physical model, called the wake oscillator (WO), which simulates the vibratory behaviors of overhead line conductors. an approximation of a heavy and complex model called the strip theory (ST) model. OPTI-ENS is composed of an ensemble machine learning algorithm (ENS) and an optimization algorithm of the WO model so that the WO model can generate the adequate training data as input to the ENS model. ENS model will therefore take as input the data from the WO model and output the data from the ST model. As a benchmark, a series of Machine learning models have been implemented and tested. The OPTI-ENS algorithm was retained with a best Coefficient of determination (R2 Score) of almost 0.7 and a Root mean square error (RMSE) of 7.57e−09. In addition, this model is approximately 170 times faster (in terms of calculation time) than an ENS model without optimization of the generation of training data by the WO model. This type of approach therefore makes it possible to calibrate the WO model so that simulations of the behavior of overhead line conductors are carried out only with the WO model.

由于数值模拟技术的使用,流体力学的世界正日益产生大量的数据。这为结合机器学习方法来解决数据相关问题(如模型校准)提供了有趣的机会。机器学习可以为工程和流体力学领域提供的应用之一是模型的校准,这使得近似现象成为可能。事实上,一些流体力学模型产生的计算成本促使科学家使用其他接近原始模型但计算强度较低的模型,以方便他们的处理。其中采用的不同方法有:机器学习与一些优化方法和算法相结合,以减少所引起的计算成本。在本文中,我们提出了一个框架,这是一个新的灵活的,优化和改进的方法,校准一个物理模型,称为尾流振荡器(WO),模拟架空线路导体的振动行为。它近似于一种重而复杂的模型,即条形理论(ST)模型。OPTI-ENS由集成机器学习算法(ENS)和WO模型的优化算法组成,使WO模型能够生成足够的训练数据作为ENS模型的输入。因此,ENS模型将采用WO模型的数据作为输入,并输出ST模型的数据。作为一个基准,一系列的机器学习模型已经被实现和测试。OPTI-ENS算法的最佳决定系数(R2 Score)接近0.7,均方根误差(RMSE)为7.57e−09。此外,该模型比没有优化WO模型生成训练数据的ENS模型大约快170倍(在计算时间方面)。因此,这种方法使校准WO模型成为可能,以便仅使用WO模型对架空线路导体的行为进行模拟。
{"title":"How statistical modeling and machine learning could help in the calibration of numerical simulation and fluid mechanics models? Application to the calibration of models reproducing the vibratory behavior of an overhead line conductor","authors":"Hamdi Amroun ,&nbsp;Fikri Hafid ,&nbsp;Ammi Mehdi","doi":"10.1016/j.array.2022.100187","DOIUrl":"10.1016/j.array.2022.100187","url":null,"abstract":"<div><p>The world of fluid mechanics is increasingly generating a large amount of data, thanks to the use of numerical simulation techniques. This offers interesting opportunities for incorporating machine learning methods to solve data-related problems such as model calibration. One of the applications that machine learning can offer to the world of Engineering and Fluid Mechanics in particular is the calibration of models making it possible to approximate a phenomenon. Indeed, the computational cost generated by some models of fluid mechanics pushes scientists to use other models close to the original models but less computationally intensive in order to facilitate their handling. Among the different approaches used: machine learning coupled with some optimization methods and algorithms in order to reduce the computation cost induced. In this paper, we propose a framework which is a new flexible, optimized and improved method, to calibrate a physical model, called the wake oscillator (WO), which simulates the vibratory behaviors of overhead line conductors. an approximation of a heavy and complex model called the strip theory (ST) model. OPTI-ENS is composed of an ensemble machine learning algorithm (ENS) and an optimization algorithm of the WO model so that the WO model can generate the adequate training data as input to the ENS model. ENS model will therefore take as input the data from the WO model and output the data from the ST model. As a benchmark, a series of Machine learning models have been implemented and tested. The OPTI-ENS algorithm was retained with a best Coefficient of determination (R2 Score) of almost 0.7 and a Root mean square error (RMSE) of 7.57e−09. In addition, this model is approximately 170 times faster (in terms of calculation time) than an ENS model without optimization of the generation of training data by the WO model. This type of approach therefore makes it possible to calibrate the WO model so that simulations of the behavior of overhead line conductors are carried out only with the WO model.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"15 ","pages":"Article 100187"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005622000418/pdfft?md5=a1d8ae6efd49cb986e23ea0e4664614d&pid=1-s2.0-S2590005622000418-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45989153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Array
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1