首页 > 最新文献

EPiC series in computing最新文献

英文 中文
Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search 炉石战场:一个AI助手与蒙特卡洛树搜索
Pub Date : 2022-01-01 DOI: 10.29007/mn6n
Namuunbadralt Zolboot, Quinn Johnson, Dakun Shen, Alexander Redei
We are in the golden age of AI. Developing AI software for computer games is one of the most exciting trends of today’s day and age. Recently games like Hearthstone Bat- tlegrounds have captivated millions of players due to it’s sophistication, with an infinite number of unique interactions that can occur in the game. In this research, a Monte-Carlo simulation was built to help players achieve higher ranks. This was achieved through a learned simulation which was trained against a top Hearthstone Battleground player’s historic win. In our experiment, we collected 3 data sets from strategic Hearthstone Bat- tleground games. Each data set includes 6 turns of battle phases, 42 minions for battle boards, and 22 minions for Bob’s tavern. The evaluation demonstrated that the AI assis- tant achieved better performance — loosing on average only 9.56% of turns vs 26.26% for the experienced Hearthstone Battleground players, and winning 56% vs 46.91%.
我们正处于人工智能的黄金时代。为电脑游戏开发人工智能软件是当今最令人兴奋的趋势之一。最近,像《炉石传说:蝙蝠战场》这样的游戏因为其复杂性以及游戏中可能出现的无数独特互动而吸引了数百万玩家。在这项研究中,建立了一个蒙特卡洛模拟来帮助球员获得更高的排名。这是通过学习模拟来实现的,该模拟是针对顶级《炉石传说:战场》玩家的历史性胜利进行训练的。在我们的实验中,我们从战略游戏《炉石传说:蝙蝠战场》中收集了3个数据集。每个数据集包括6个回合的战斗阶段,42个小黄人的战斗板,22个小黄人的鲍勃的酒馆。评估表明,AI助手取得了更好的表现——平均只有9.56%的回合失败,而经验丰富的《炉石战场》玩家的回合失败率为26.26%,胜率为56%,而《炉石战场》玩家的回合失败率为46.91%。
{"title":"Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search","authors":"Namuunbadralt Zolboot, Quinn Johnson, Dakun Shen, Alexander Redei","doi":"10.29007/mn6n","DOIUrl":"https://doi.org/10.29007/mn6n","url":null,"abstract":"We are in the golden age of AI. Developing AI software for computer games is one of the most exciting trends of today’s day and age. Recently games like Hearthstone Bat- tlegrounds have captivated millions of players due to it’s sophistication, with an infinite number of unique interactions that can occur in the game. In this research, a Monte-Carlo simulation was built to help players achieve higher ranks. This was achieved through a learned simulation which was trained against a top Hearthstone Battleground player’s historic win. In our experiment, we collected 3 data sets from strategic Hearthstone Bat- tleground games. Each data set includes 6 turns of battle phases, 42 minions for battle boards, and 22 minions for Bob’s tavern. The evaluation demonstrated that the AI assis- tant achieved better performance — loosing on average only 9.56% of turns vs 26.26% for the experienced Hearthstone Battleground players, and winning 56% vs 46.91%.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69445624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation 在人群密度估计中捕获尺度不变上下文的扩展卷积
Pub Date : 2022-01-01 DOI: 10.29007/qdm6
Thishen Packirisamy, Richard Klein
Crowd Density Estimation (CDE) can be used ensure safety of crowds by preventing stampedes or reducing spread of disease which was made urgent with the rise of Covid-19. CDE a challenging problem due to problems such as occlusion and massive scale varia- tions. This research looks to create, evaluate and compare different approaches to crowd counting focusing on the ability for dilated convolution to extract scale-invariant contex- tual information. In this work we build and train three different model architectures: a Convolutional Neural Network (CNN) without dilation, a CNN with dilation to capture context and a CNN with an Atrous Spatial Pyramid Pooling (ASPP) layer to capture scale-invariant contextual features. We train each architecture multiple times to ensure statistical significance and evaluate them using the Mean Squared Error (MSE), Mean Average Error (MAE) and Grid Average Mean Absolute Error (GAME) on the Shang- haiTech and UCF CC 50 datasets. Comparing the results between approaches we find that applying dilated convolution to more sparse crowd images with little scale variations does not make a significant difference but, on highly congested crowd images, dilated con- volutions are more resilient to occlusion and perform better. Furthermore, we find that adding an ASPP layer improves performance in the case when there are significant differ- ences in the scale of objects within the crowds. The code for this research is available at https://github.com/ThishenP/crowd-density.
人群密度估算(CDE)可以通过防止踩踏事件或减少疾病传播来确保人群安全,这在Covid-19的兴起中变得迫在眉睫。由于诸如遮挡和大规模变化等问题,CDE是一个具有挑战性的问题。本研究旨在创建、评估和比较不同的人群计数方法,重点关注扩展卷积提取尺度不变上下文信息的能力。在这项工作中,我们建立并训练了三种不同的模型架构:一个没有扩张的卷积神经网络(CNN),一个有扩张的CNN来捕捉上下文,一个有空间金字塔池(ASPP)层来捕捉尺度不变的上下文特征。我们对每个架构进行了多次训练,以确保统计显著性,并使用上海科技和UCF CC 50数据集上的均方误差(MSE)、平均误差(MAE)和网格平均绝对误差(GAME)对它们进行评估。比较两种方法的结果,我们发现将扩展卷积应用于更稀疏的人群图像,规模变化较小,不会产生显着差异,但在高度拥挤的人群图像上,扩展卷积对遮挡更具弹性,表现更好。此外,我们发现在人群中对象的规模存在显著差异的情况下,添加ASPP层可以提高性能。这项研究的代码可在https://github.com/ThishenP/crowd-density上获得。
{"title":"Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation","authors":"Thishen Packirisamy, Richard Klein","doi":"10.29007/qdm6","DOIUrl":"https://doi.org/10.29007/qdm6","url":null,"abstract":"Crowd Density Estimation (CDE) can be used ensure safety of crowds by preventing stampedes or reducing spread of disease which was made urgent with the rise of Covid-19. CDE a challenging problem due to problems such as occlusion and massive scale varia- tions. This research looks to create, evaluate and compare different approaches to crowd counting focusing on the ability for dilated convolution to extract scale-invariant contex- tual information. In this work we build and train three different model architectures: a Convolutional Neural Network (CNN) without dilation, a CNN with dilation to capture context and a CNN with an Atrous Spatial Pyramid Pooling (ASPP) layer to capture scale-invariant contextual features. We train each architecture multiple times to ensure statistical significance and evaluate them using the Mean Squared Error (MSE), Mean Average Error (MAE) and Grid Average Mean Absolute Error (GAME) on the Shang- haiTech and UCF CC 50 datasets. Comparing the results between approaches we find that applying dilated convolution to more sparse crowd images with little scale variations does not make a significant difference but, on highly congested crowd images, dilated con- volutions are more resilient to occlusion and perform better. Furthermore, we find that adding an ASPP layer improves performance in the case when there are significant differ- ences in the scale of objects within the crowds. The code for this research is available at https://github.com/ThishenP/crowd-density.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69449602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions 不同室内条件下自动真空机器人性能的验证与评估
Pub Date : 2022-01-01 DOI: 10.29007/w64v
Thitivatr Patanasakpinyo, Natcha Chen, Natthikarn Singsornsri, Nattapach Kanchanaporn
Artificial intelligence has become the mainstream technology. Automatic vacuum clean- ers or robot vacuums change the field of vacuum cleaners with an involvement of an au- tomation, which is a technology that makes people’s daily life easier and more economical. Robot vacuums were invented by the Massachusetts Institute of Technology in 1990. To- day, robot vacuums are successful and have many users all around the world. More than 2.5 million families live in 60 countries use them. However, a question that is still being asked about robot vacuum is the efficiency of room coverage and the ability to remem- ber the redundant areas that have already been cleaned. The answers to these questions are unclear, as manufacturers do not reveal the algorithms that are learned by robots, or sometimes they just partially did, due to business reasons. This study was proposed in response to the above questions by using our mobile application for tracking and recording actual geolocations of the robot walking across various points of the room by extracting the real geolocation data from satellites consisting of a latitude and a longitude under multiple different room conditions. Once the robot has cleaned throughout the room, the applica- tion reported all areas that the robot has cleaned for analysis purpose. We presented the actual route map, the coverage area map, and the duplicate area map of the robot that potentially led the further understanding of robot vacuum’s effectiveness.
人工智能已经成为主流技术。自动真空吸尘器或机器人真空吸尘器以一种自动化的方式改变了真空吸尘器的领域,这是一种使人们的日常生活更容易、更经济的技术。机器人吸尘器是由麻省理工学院于1990年发明的。时至今日,机器人真空吸尘器是成功的,在世界各地有许多用户。生活在60个国家的250多万个家庭使用它们。然而,关于机器人吸尘器的一个问题仍然是房间覆盖的效率和记住已经打扫过的多余区域的能力。这些问题的答案尚不清楚,因为制造商没有透露机器人学习的算法,或者有时出于商业原因,他们只是部分透露了算法。针对上述问题,本研究提出了我们的移动应用程序,通过提取多个不同房间条件下由纬度和经度组成的卫星的真实地理位置数据,来跟踪和记录机器人在房间各个点上行走的实际地理位置。一旦机器人打扫了整个房间,应用程序就会报告机器人打扫过的所有区域,以便进行分析。我们提出了机器人的实际路线图、覆盖区域图和重复区域图,这可能会进一步了解机器人真空的有效性。
{"title":"Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions","authors":"Thitivatr Patanasakpinyo, Natcha Chen, Natthikarn Singsornsri, Nattapach Kanchanaporn","doi":"10.29007/w64v","DOIUrl":"https://doi.org/10.29007/w64v","url":null,"abstract":"Artificial intelligence has become the mainstream technology. Automatic vacuum clean- ers or robot vacuums change the field of vacuum cleaners with an involvement of an au- tomation, which is a technology that makes people’s daily life easier and more economical. Robot vacuums were invented by the Massachusetts Institute of Technology in 1990. To- day, robot vacuums are successful and have many users all around the world. More than 2.5 million families live in 60 countries use them. However, a question that is still being asked about robot vacuum is the efficiency of room coverage and the ability to remem- ber the redundant areas that have already been cleaned. The answers to these questions are unclear, as manufacturers do not reveal the algorithms that are learned by robots, or sometimes they just partially did, due to business reasons. This study was proposed in response to the above questions by using our mobile application for tracking and recording actual geolocations of the robot walking across various points of the room by extracting the real geolocation data from satellites consisting of a latitude and a longitude under multiple different room conditions. Once the robot has cleaned throughout the room, the applica- tion reported all areas that the robot has cleaned for analysis purpose. We presented the actual route map, the coverage area map, and the duplicate area map of the robot that potentially led the further understanding of robot vacuum’s effectiveness.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69452920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality 在虚拟现实中利用360视频和眼动追踪模拟病人交接的应用
Pub Date : 2022-01-01 DOI: 10.29007/82j6
Christopher Lewis, Sven Diaz-Juarez, Steven J. Anbro, Alison J. Szarko, Ramona Houmanfar, Laura Crosswell, Michelle Rebaleati, Luka Starmer, Frederick Harris
Virtual reality (VR) is a relatively new and rapidly growing field which is becoming accessible by the larger research community as well as being commercially available for en- tertainment. Relatively cheap and commercially available head mounted displays (HMDs) are the largest reason for this increase in availability. This work uses Unity and an HMD to create a VR environment to display a 360◦video of a pre-recorded patient handoff be- tween a nurse and doctor. The VR environment went through different designs while in development. This works discusses each stage of it’s design and the unique challenges we encountered during development. This work also discusses the implementation of the user study and the visualization of collected eye tracking data.
虚拟现实(VR)是一个相对较新的和快速发展的领域,它正在被更大的研究团体所使用,并且在商业上可用于娱乐。相对便宜和商用的头戴式显示器(hmd)是这种可用性增加的最大原因。这项工作使用Unity和HMD来创建一个VR环境,以显示一个360度的视频,一个预先录制的病人交接护士和医生之间。VR环境在开发过程中经历了不同的设计。这个作品讨论了它的设计的每个阶段和我们在开发过程中遇到的独特挑战。本工作还讨论了用户研究的实现和收集的眼动追踪数据的可视化。
{"title":"An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality","authors":"Christopher Lewis, Sven Diaz-Juarez, Steven J. Anbro, Alison J. Szarko, Ramona Houmanfar, Laura Crosswell, Michelle Rebaleati, Luka Starmer, Frederick Harris","doi":"10.29007/82j6","DOIUrl":"https://doi.org/10.29007/82j6","url":null,"abstract":"Virtual reality (VR) is a relatively new and rapidly growing field which is becoming accessible by the larger research community as well as being commercially available for en- tertainment. Relatively cheap and commercially available head mounted displays (HMDs) are the largest reason for this increase in availability. This work uses Unity and an HMD to create a VR environment to display a 360◦video of a pre-recorded patient handoff be- tween a nurse and doctor. The VR environment went through different designs while in development. This works discusses each stage of it’s design and the unique challenges we encountered during development. This work also discusses the implementation of the user study and the visualization of collected eye tracking data.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69423371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signing made easy – hiding complexity of eSignature solutions in a black box 签名变得容易——在黑盒中隐藏签名解决方案的复杂性
Pub Date : 2022-01-01 DOI: 10.29007/7knd
Janina Mincer-Daszkiewicz, Tadeusz Gąsior
For many years Polish Higher Education Institutions (HEIs) have been actively incorporating digital solutions. Through the financial support of the state, as part of the Digital Poland program (carried out from 2014-2020), universities deployed student management systems and the Ministry of Science and Higher Education built central systems collecting data from HEIs. Changes in law introduced in 2019 in higher education, opened the way towards a fully electronic equivalent of the so-called student records folder.In early 2020, the world faced the COVID-19 pandemic which accelerated the digitalization process advancing forward the transition to remote handling of student information. As a result, many provisions were introduced by the Ministry of Science and Higher Education, which sanctioned the replacement of paper documents with electronic ones, provided that their authentication, integrity, non-repudiation and confidentiality are preserved.The amount and diversity of documents produced in HEIs is substantial. Many of them need to be signed: both for internal use (e.g. student records supporting study processes) and for external use (e.g. documents on student achievements required for further studies or employment). Furthermore, some of these documents travel across borders due to the increasing internationalization of higher education in Europe and beyond.Polish HEIs range in size from 1,000 to almost 50,000 students and often share the same student management system. Therefore, they would benefit from easy-to-share, customizable, simple to install and use, low-cost solution for storing digital certificates, signing documents and validating their signatures.The subject of this paper is the eSignForStudy project which addresses these needs. The objective of the project is to design and develop a highly configurable eSignature solution to be used in the Polish higher education area, interoperable with Erasmus Without Paper Network for cross-border digital document validation.
多年来,波兰高等教育机构(HEIs)一直在积极采用数字解决方案。作为数字波兰计划(2014-2020年实施)的一部分,通过国家的财政支持,大学部署了学生管理系统,科学和高等教育部建立了从高等教育机构收集数据的中央系统。2019年在高等教育中引入的法律变化,为所谓的学生档案文件夹的完全电子化铺平了道路。2020年初,全球面临2019冠状病毒病大流行,这加快了数字化进程,推动了向远程处理学生信息的过渡。因此,科学和高等教育部提出了许多规定,批准用电子文件代替纸质文件,但必须保证其认证、完整性、不可否认性和保密性。高等教育院校制作的文件数量庞大,种类繁多。其中许多需要签名:内部使用(例如支持学习过程的学生记录)和外部使用(例如进一步学习或就业所需的学生成绩文件)。此外,由于欧洲及其他地区高等教育的日益国际化,其中一些文件跨越国界。波兰高等教育机构的学生规模从1000人到近5万人不等,通常采用相同的学生管理系统。因此,他们将受益于易于共享、可定制、易于安装和使用、低成本的存储数字证书、签名文档和验证签名的解决方案。本文的主题是解决这些需求的eSignForStudy项目。该项目的目标是设计和开发一个高度可配置的设计签名解决方案,用于波兰高等教育领域,可与Erasmus无纸化网络进行跨境数字文件验证。
{"title":"Signing made easy – hiding complexity of eSignature solutions in a black box","authors":"Janina Mincer-Daszkiewicz, Tadeusz Gąsior","doi":"10.29007/7knd","DOIUrl":"https://doi.org/10.29007/7knd","url":null,"abstract":"For many years Polish Higher Education Institutions (HEIs) have been actively incorporating digital solutions. Through the financial support of the state, as part of the Digital Poland program (carried out from 2014-2020), universities deployed student management systems and the Ministry of Science and Higher Education built central systems collecting data from HEIs. Changes in law introduced in 2019 in higher education, opened the way towards a fully electronic equivalent of the so-called student records folder.In early 2020, the world faced the COVID-19 pandemic which accelerated the digitalization process advancing forward the transition to remote handling of student information. As a result, many provisions were introduced by the Ministry of Science and Higher Education, which sanctioned the replacement of paper documents with electronic ones, provided that their authentication, integrity, non-repudiation and confidentiality are preserved.The amount and diversity of documents produced in HEIs is substantial. Many of them need to be signed: both for internal use (e.g. student records supporting study processes) and for external use (e.g. documents on student achievements required for further studies or employment). Furthermore, some of these documents travel across borders due to the increasing internationalization of higher education in Europe and beyond.Polish HEIs range in size from 1,000 to almost 50,000 students and often share the same student management system. Therefore, they would benefit from easy-to-share, customizable, simple to install and use, low-cost solution for storing digital certificates, signing documents and validating their signatures.The subject of this paper is the eSignForStudy project which addresses these needs. The objective of the project is to design and develop a highly configurable eSignature solution to be used in the Polish higher education area, interoperable with Erasmus Without Paper Network for cross-border digital document validation.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69423437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Study of Software-based Encrypting Data at Rest 基于软件的静态数据加密性能研究
Pub Date : 2022-01-01 DOI: 10.29007/1j1p
Luka Daoud, Hingkwan Huen
Data security is an increasing concern, not only in cloud storage data centers but also in personal computing and memory devices. It is important to maintain the confidentiality of data at rest against ransom and theft attacks. However, securing data, in runtime, into the drives is associated with performance penalties. In this paper, a study of the performance impact for software-based self-encrypting solid-state drives is presented. This performance evaluation is conducted on the NVMe subsystem which supports encryption and decryption of the user data on an I/O command basis. Additionally, this paper demonstrates the potential of encryption and decryption acceleration for data storage in self-encrypting drives.
数据安全越来越受到关注,不仅在云存储数据中心,而且在个人计算和内存设备中。保持静态数据的机密性以抵御勒索和盗窃攻击是非常重要的。但是,在运行时将数据保护到驱动器中会带来性能损失。本文对基于软件的自加密固态硬盘的性能影响进行了研究。该性能评估是在NVMe子系统上进行的,NVMe子系统支持基于I/O命令对用户数据进行加密和解密。此外,本文还演示了在自加密驱动器中数据存储的加密和解密加速的潜力。
{"title":"Performance Study of Software-based Encrypting Data at Rest","authors":"Luka Daoud, Hingkwan Huen","doi":"10.29007/1j1p","DOIUrl":"https://doi.org/10.29007/1j1p","url":null,"abstract":"Data security is an increasing concern, not only in cloud storage data centers but also in personal computing and memory devices. It is important to maintain the confidentiality of data at rest against ransom and theft attacks. However, securing data, in runtime, into the drives is associated with performance penalties. In this paper, a study of the performance impact for software-based self-encrypting solid-state drives is presented. This performance evaluation is conducted on the NVMe subsystem which supports encryption and decryption of the user data on an I/O command basis. Additionally, this paper demonstrates the potential of encryption and decryption acceleration for data storage in self-encrypting drives.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69418931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an African cybersecurity community of practice 建立一个非洲网络安全实践社区
Pub Date : 2022-01-01 DOI: 10.29007/cv1x
Rutendo Chibanda, S. Kabanda
In recent years cybersecurity challenges and concerns have become a common theme for discussion by both the government and private sector. These challenges are partly brought on by the continued use of and dependence on information technology, such as the internet, wireless networks and the development and use of smart devices. Additionally, the Covid-19 pandemic has also led to the increase in internet use as it altered the way in which people live and work through forcing businesses and even schools to move to remote working. All these events have made cybersecurity challenges and concerns spiral and more so in Africa where cybercrime continues to rise and be a constant threat. This study proposes a cybersecurity community of practice as a strategy to address African contextual cybersecurity challenges. This qualitative enquiry, based on organizations on the African continent, identifies key characteristics and objectives of an African cybersecurity CoP. These findings provide practical implications for CoP African members and a steppingstone on what to consider prior to implementing an African CoP for addressing cybersecurity challenges and concerns.
近年来,网络安全的挑战和担忧已成为政府和私营部门讨论的共同主题。这些挑战的部分原因是对信息技术的持续使用和依赖,例如互联网、无线网络以及智能设备的开发和使用。此外,新冠肺炎大流行还导致互联网使用量增加,因为它迫使企业甚至学校转向远程工作,改变了人们的生活和工作方式。所有这些事件都使网络安全挑战和担忧螺旋式上升,尤其是在网络犯罪持续上升并成为持续威胁的非洲。本研究提出了一个网络安全实践社区,作为解决非洲环境网络安全挑战的战略。这种基于非洲大陆组织的定性调查确定了非洲网络安全CoP的关键特征和目标。这些发现为缔约方会议非洲成员国提供了实际意义,并为实施非洲缔约方会议解决网络安全挑战和问题之前的考虑奠定了基础。
{"title":"Towards an African cybersecurity community of practice","authors":"Rutendo Chibanda, S. Kabanda","doi":"10.29007/cv1x","DOIUrl":"https://doi.org/10.29007/cv1x","url":null,"abstract":"In recent years cybersecurity challenges and concerns have become a common theme for discussion by both the government and private sector. These challenges are partly brought on by the continued use of and dependence on information technology, such as the internet, wireless networks and the development and use of smart devices. Additionally, the Covid-19 pandemic has also led to the increase in internet use as it altered the way in which people live and work through forcing businesses and even schools to move to remote working. All these events have made cybersecurity challenges and concerns spiral and more so in Africa where cybercrime continues to rise and be a constant threat. This study proposes a cybersecurity community of practice as a strategy to address African contextual cybersecurity challenges. This qualitative enquiry, based on organizations on the African continent, identifies key characteristics and objectives of an African cybersecurity CoP. These findings provide practical implications for CoP African members and a steppingstone on what to consider prior to implementing an African CoP for addressing cybersecurity challenges and concerns.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69431717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SARS-CoV-2 variants classification and characterization SARS-CoV-2变体的分类和表征
Pub Date : 2022-01-01 DOI: 10.29007/5qpk
Sofia Borgato, Marco Bottino, Marta Lovino, E. Ficarra
As of late 2019, the SARS-CoV-2 virus has spread globally, giving several variants over time. These variants, unfortunately, differ from the original sequence identified in Wuhan, thus risking compromising the efficacy of the vaccines developed. Some software has been released to recognize currently known and newly spread variants. However, some of these tools are not entirely automatic. Some others, instead, do not return a detailed characterization of all the mutations in the samples. Indeed, such characterization can be helpful for biologists to understand the variability between samples. This paper presents a Machine Learning (ML) approach to identifying existing and new variants completely automatically. In addition, a detailed table showing all the alterations and mutations found in the samples is provided in output to the user. SARS-CoV-2 sequences are obtained from the GISAID database, and a list of features is custom designed (e.g., number of mutations in each gene of the virus) to train the algorithm. The recognition of existing variants is performed through a Random Forest classifier while identifying newly spread variants is accomplished by the DBSCAN algorithm. Both Random Forest and DBSCAN techniques demonstrated high precision on a new variant that arose during the drafting of this paper (used only in the testing phase of the algorithm). Therefore, researchers will significantly benefit from the proposed algorithm and the detailed output with the main alterations of the samples.
截至2019年底,SARS-CoV-2病毒已在全球传播,随着时间的推移产生了几种变体。不幸的是,这些变异与在武汉发现的原始序列不同,因此有可能损害所开发疫苗的效力。已经发布了一些软件来识别当前已知的和新传播的变体。然而,其中一些工具并不是完全自动的。另一些则不返回样本中所有突变的详细特征。事实上,这样的特征可以帮助生物学家了解样本之间的可变性。本文提出了一种完全自动识别现有和新变体的机器学习(ML)方法。此外,在输出给用户时还提供了一个详细的表,显示了样本中发现的所有变化和突变。从GISAID数据库获得SARS-CoV-2序列,并定制设计特征列表(例如,病毒每个基因的突变数量)来训练算法。现有变体的识别通过随机森林分类器完成,而新传播的变体的识别则通过DBSCAN算法完成。Random Forest和DBSCAN技术在本文起草期间出现的新变体(仅在算法的测试阶段使用)上都展示了高精度。因此,研究人员将显著受益于所提出的算法和样本主要变化的详细输出。
{"title":"SARS-CoV-2 variants classification and characterization","authors":"Sofia Borgato, Marco Bottino, Marta Lovino, E. Ficarra","doi":"10.29007/5qpk","DOIUrl":"https://doi.org/10.29007/5qpk","url":null,"abstract":"As of late 2019, the SARS-CoV-2 virus has spread globally, giving several variants over time. These variants, unfortunately, differ from the original sequence identified in Wuhan, thus risking compromising the efficacy of the vaccines developed. Some software has been released to recognize currently known and newly spread variants. However, some of these tools are not entirely automatic. Some others, instead, do not return a detailed characterization of all the mutations in the samples. Indeed, such characterization can be helpful for biologists to understand the variability between samples. This paper presents a Machine Learning (ML) approach to identifying existing and new variants completely automatically. In addition, a detailed table showing all the alterations and mutations found in the samples is provided in output to the user. SARS-CoV-2 sequences are obtained from the GISAID database, and a list of features is custom designed (e.g., number of mutations in each gene of the virus) to train the algorithm. The recognition of existing variants is performed through a Random Forest classifier while identifying newly spread variants is accomplished by the DBSCAN algorithm. Both Random Forest and DBSCAN techniques demonstrated high precision on a new variant that arose during the drafting of this paper (used only in the testing phase of the algorithm). Therefore, researchers will significantly benefit from the proposed algorithm and the detailed output with the main alterations of the samples.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69422483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sarcasm Detection with External Entity Information 基于外部实体信息的讽刺检测
Pub Date : 2022-01-01 DOI: 10.29007/zbzq
Xu Xufei, Shimada Kazutaka
Sarcasm is generally characterized as ironic or satirical that is intended to blame, mock, or amuse in an implied way. Recently, pre-trained language models, such as BERT, have achieved remarkable success in sarcasm detection. However, there are many problems that cannot be solved by using such state-of-the-art models. One problem is attribute infor- mation of entities in sentences. This work investigates the potential of external knowledge about entities in knowledge bases to improve BERT for sarcasm detection. We apply em- bedded knowledge graph from Wikipedia to the task. We generate vector representations from entities of knowledge graph. Then we incorporate them with BERT by a mechanism based on self-attention. Experimental results indicate that our approach improves the accuracy as compared with the BERT model without external knowledge.
Sarcasm通常被描述为讽刺或讽刺,意在以一种隐含的方式指责、嘲笑或逗乐。近年来,预训练语言模型,如BERT,在讽刺检测方面取得了显著的成功。然而,有许多问题无法用最先进的模型来解决。一个问题是句子中实体的属性信息。这项工作研究了关于知识库中实体的外部知识的潜力,以改进BERT的讽刺检测。我们将维基百科的嵌入式知识图谱应用到任务中。我们从知识图谱的实体中生成向量表示。然后我们通过一种基于自我关注的机制将它们与BERT结合起来。实验结果表明,与没有外部知识的BERT模型相比,我们的方法提高了准确率。
{"title":"Sarcasm Detection with External Entity Information","authors":"Xu Xufei, Shimada Kazutaka","doi":"10.29007/zbzq","DOIUrl":"https://doi.org/10.29007/zbzq","url":null,"abstract":"Sarcasm is generally characterized as ironic or satirical that is intended to blame, mock, or amuse in an implied way. Recently, pre-trained language models, such as BERT, have achieved remarkable success in sarcasm detection. However, there are many problems that cannot be solved by using such state-of-the-art models. One problem is attribute infor- mation of entities in sentences. This work investigates the potential of external knowledge about entities in knowledge bases to improve BERT for sarcasm detection. We apply em- bedded knowledge graph from Wikipedia to the task. We generate vector representations from entities of knowledge graph. Then we incorporate them with BERT by a mechanism based on self-attention. Experimental results indicate that our approach improves the accuracy as compared with the BERT model without external knowledge.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69454181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor 基于仿真的RISC-V处理器位交互侧信道泄漏评估
Pub Date : 2021-01-01 DOI: 10.29007/5wq7
Tamon Asano, T. Sugawara
Masking is a promising countermeasure against side-channel attack, and share slic- ing is its efficient software implementation that stores all the shares in a single register to exploit the parallelism of Boolean instructions. However, the security of share slicing relies on the assumption of bit-independent leakage from those instructions. Gao et al. recently discovered a violation causing a security degradation, called the bit-interaction leakage, by experimentally evaluating ARM processors. However, its causality remained open because of the blackbox inside the target processors. In this paper, we approach this problem with simulation-based side-channel leakage evaluation using a RISC-V processor. More specifically, we use Western Digital’s open-source SweRV EH1 core as a target plat- form and measure its side-channel traces by running logic simulation and counting the number of signal transitions in the synthesized ALU netlist. We successfully replicate the bit-interaction leakage from a shifter using the simulated traces. By exploiting the flexi- bility of simulation-based analysis, we positively verify Gao et al.’s hypothesis on how the shifter causes the leakage. Moreover, we discover a new bit-interaction leakage from an arithmetic adder caused by carry propagation. Finally, we discuss hardware and software countermeasures against the bit-interaction leakage.
屏蔽是一种很有前途的对抗侧信道攻击的方法,共享分片是一种有效的软件实现,它将所有的共享存储在一个寄存器中,以利用布尔指令的并行性。然而,共享切片的安全性依赖于这些指令的位无关泄漏的假设。Gao等人最近通过实验评估ARM处理器,发现了一种导致安全性下降的违规行为,称为位交互泄漏。然而,由于目标处理器内部的黑盒子,它的因果关系仍然是开放的。在本文中,我们使用RISC-V处理器通过基于仿真的侧信道泄漏评估来解决这个问题。更具体地说,我们使用西部数据的开源SweRV EH1核心作为目标平台,并通过运行逻辑仿真和计算合成ALU网表中的信号转换次数来测量其侧通道走线。我们利用模拟走线成功地复制了移位器的位相互作用泄漏。通过利用基于仿真分析的灵活性,我们积极地验证了Gao等人关于换档器如何导致泄漏的假设。此外,我们还发现了由进位传播引起的算术加法器位交互泄漏。最后,我们讨论了防止位交互泄漏的硬件和软件对策。
{"title":"Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor","authors":"Tamon Asano, T. Sugawara","doi":"10.29007/5wq7","DOIUrl":"https://doi.org/10.29007/5wq7","url":null,"abstract":"Masking is a promising countermeasure against side-channel attack, and share slic- ing is its efficient software implementation that stores all the shares in a single register to exploit the parallelism of Boolean instructions. However, the security of share slicing relies on the assumption of bit-independent leakage from those instructions. Gao et al. recently discovered a violation causing a security degradation, called the bit-interaction leakage, by experimentally evaluating ARM processors. However, its causality remained open because of the blackbox inside the target processors. In this paper, we approach this problem with simulation-based side-channel leakage evaluation using a RISC-V processor. More specifically, we use Western Digital’s open-source SweRV EH1 core as a target plat- form and measure its side-channel traces by running logic simulation and counting the number of signal transitions in the synthesized ALU netlist. We successfully replicate the bit-interaction leakage from a shifter using the simulated traces. By exploiting the flexi- bility of simulation-based analysis, we positively verify Gao et al.’s hypothesis on how the shifter causes the leakage. Moreover, we discover a new bit-interaction leakage from an arithmetic adder caused by carry propagation. Finally, we discuss hardware and software countermeasures against the bit-interaction leakage.","PeriodicalId":93549,"journal":{"name":"EPiC series in computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69422270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EPiC series in computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1