{"title":"A Fuzzy Linguistic Programming for Sustainable Ecotourism Activities","authors":"Esra Çakır, H. Ulukan","doi":"10.1109/CCWC47524.2020.9031187","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031187","url":null,"abstract":"Ecotourism is a strategy that guarantees the sustainability of the earth's natural resources and promotes local people's economic development while maintaining and safeguarding their social and cultural integrity. However, the activities may not be suitable for sustainable environmental conditions. Therefore, activity selection is important in tourism management. In this paper, fuzzy linguistics Prolog is used to match ecotourism activities and suitable regions. Bousi ∼ Prolog is generated from classic fuzzy prolog that allows to operate with both fuzzy linguistic and linguistic tools to guide the Prolog structures into programming model phrases that can be very useful to the linguistic resources.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122034957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zoning Effect on the Capacity and Placement Planning for Battery Exchange Stations in Battery Consolidation Systems","authors":"Dara Nyknahad, Rojin Aslani, W. Bein, L. Gewali","doi":"10.1109/CCWC47524.2020.9031261","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031261","url":null,"abstract":"The concept of the battery exchange station (BES) as a part of the battery consolidation system (BCS) has certain criteria which makes it a significant player of better adaptation plan of electric vehicles (EVs) in the grid toward the smart grid (SG). In this paper, we focus on finding an efficient joint capacity and placement planning of BESs among candidate zones and exchange decisions of EV drivers at a BCS (CPPED) with the aim of minimizing the implementation cost of BESs placement, the distance traveled by EVs to exchange their batteries, and the waiting time of EVs at the BESs subject to the limitation on the number of BESs in the system. The formulated multi-objective optimization problem is non-convex with a combination of binary and continues variables which introduces a disjoint feasible solution set. To have a polynomial time complexity solution, we employ abstract Lagrangian duality and maximization-minimization methods to handle the binary variables. Our proposed method reaches to a robust solution of joint CPPED problem. Through simulation results, we investigate the effect of the number of zones and number of BESs on the performance of the proposed method for addressing the CPPED problem. Our numerical results show that increasing the number of zones and maximum number of BESs have significant effects on optimizing the CPPED problem, however after some certain points, their effects are less significant.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114993054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs","authors":"Mustafa Aydin, I. Butun, K. Bicakci, N. Baykal","doi":"10.1109/CCWC47524.2020.9031125","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031125","url":null,"abstract":"Phishing is a malicious form of online theft and needs to be prevented in order to increase the overall trust of the public on the Internet. In this study, for that purpose, the authors present their findings on the methods of detecting phishing websites. Data mining algorithms along with classifier algorithms are used in order to achieve a satisfactory result. In terms of classifiers, the Naïve Bayes, SMO, and J48 algorithms are used. As for the feature selection algorithm; Gain Ratio Attribute and ReliefF Attribute are selected. The results are provided in a comparative way. Accordingly; SMO and J48 algorithms provided satisfactory results in the detection of phishing websites, however, Naïve Bayes performed poor and is the least recommended method among all.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topic Analysis of Climate-Change News","authors":"S. Chawathe","doi":"10.1109/CCWC47524.2020.9031122","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031122","url":null,"abstract":"This paper explores the application of computational methods to the analysis of the large and growing corpus of news articles and related data on climate change. Topics are analyzed using Latent Dirichlet Allocation and methods customized to specific news sources that take advantage of keywords and other metadata that may be present. Results of this method on news articles drawn over several months are presented.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115194049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Reinforcement Learning Pairs Trading with a Double Deep Q-Network","authors":"Andrew Brim","doi":"10.1109/CCWC47524.2020.9031159","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031159","url":null,"abstract":"This research applies a deep reinforcement learning technique, Deep Q-network (DQN), to a stock market pairs trading strategy for profit. There is a need for this work, not only to further the use of reinforcement learning in stock market trading, but in many other areas of financial markets. The work utilizes a specific type of DQN, a Double Deep Q-Network to learn a pairs trading strategy. The DDQN is able to learn a cointegrated stock pair's mean reversion pattern, and successfully make predictions based on this pattern. Attesting that a reinforcement learning system, can effectively learn and execute a pairs trading strategy in the stock market. It also introduces a parameter, Negative Rewards Multiplier, during training that adjusts the system's ability to take more conservative actions. Based on the results, the next steps would be to employ this method in other financial markets, or perhaps use a DDQN to learn additional trading strategies.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122668614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combinatorial-Based Event Sequences for Reduction of Android Test Suites","authors":"Ryan Michaels, David Adamo, Renée C. Bryce","doi":"10.1109/CCWC47524.2020.9031238","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031238","url":null,"abstract":"Several studies show that combinational-based reduction techniques that consider user event combinations and sequences have the potential to reduce regression testing costs while maintaining high code coverage and fault finding effectiveness for desktop GUI and web-based applications. This work expands existing techniques to the mobile testing domain by utilizing not only user event coverage, but additionally element coverage. We use sequences of size $t=2$ to reduce test suites by user event coverage and element coverage using three scenarios for each, including sequences without respect to order of occurrence, sequences with respect to order of occurrence, and sequences of consecutive occurrences only. The results demonstrate that reductions guided by event sequences reduce the test suite by between 24.67%-66% while losing at most 0.39% code coverage. Element sequence guided reductions reduce the test suites more dramatically by 40% to 72.67%, losing less than 0.87% code coverage.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple Model for Reasoning about Limits on Coupling in Object-Oriented Software","authors":"H. Melton","doi":"10.1109/CCWC47524.2020.9031128","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031128","url":null,"abstract":"Given that all of a program's code must be reachable from its main method, and that type-safety causes this reachability to substantially manifest as compilation dependencies among the program's classes, a simple model for reasoning about limits on coupling among a program's classes—a long-standing question in the software design literature—is proposed. The model takes the form of a directed graph with classes as nodes and four distinct forms of compilation dependencies as labeled edges. As manifested in compilation dependencies, the model suggests that there is a trade-off between direct and transitive coupling, and that certain forms of coupling in a class are prerequisites for the existence of other forms in that same class.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Methods for Authentication Using Variable Transmission Power Patterns","authors":"Hosam Alamleh, A. A. AlQahtani","doi":"10.1109/CCWC47524.2020.9031210","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031210","url":null,"abstract":"In the last decade, the adoption of wireless systems has increased. These systems allow multiple devices to send data wirelessly using radio waves. Moreover, in some applications, authentication is done wirelessly by exchanging authentication data over the air as in wireless locks and keyless entry systems. On the other hand, most of the wireless devices today can control the radio frequency transmission power to optimize the system's performance and minimize interference. In this paper, we explore the possibility of modulating the radio frequency transmission power in wireless systems for authentication purposes and using it for source authentication. Furthermore, we propose two system models that perform authentication using variable power transmission patterns. Then, we discuss possible applications. Finally, we implement and test a prototype system using IEEE 802.11 (Wi-Fi) devices.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Wild Species in Texas from Camera-trap Images using Deep Neural Network for Conservation Monitoring","authors":"Sazida B. Islam, Damian Valles","doi":"10.1109/CCWC47524.2020.9031190","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031190","url":null,"abstract":"Protection of endangered species requires continuous monitoring and updated information about the existence, location, and behavioral alterations in their habitat. Remotely activated camera or “camera traps” is a reliable and effective method of photo documentation of local population size, locomotion, and predator-prey relationships of wild species. However, manual data processing from a large volume of images and captured videos is extremely laborious, time-consuming, and expensive. The recent advancement of deep learning methods has shown great outcomes for object and species identification in images. This paper proposes an automated wildlife monitoring system by image classification using computer vision algorithms and machine learning techniques. The goal is to train and validate a Convolutional Neural Network (CNN) that will be able to detect Snakes, Lizards and Toads/Frogs from camera trap images. The initial experiment implies building a flexible CNN architecture with labeled images accumulated from standard benchmark datasets of different citizen science projects. After accessing satisfactory accuracy, new camera-trap imagery data (collected from Bastrop County, Texas) will be implemented to the model to detect species. The performance will be evaluated based on the accuracy of prediction within their classification. The suggested hardware and software framework will offer an efficient monitoring system, speed up wildlife investigation analysis, and formulate resource management decisions.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129105961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Human Behaviors in Real-Time Swarms","authors":"G. Willcox, Louis B. Rosenberg, Colin Domnauer","doi":"10.1109/CCWC47524.2020.9031150","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031150","url":null,"abstract":"Many species reach group decisions by deliberating in real-time systems. This natural process, known as Swarm Intelligence (SI), has been studied extensively in a range of social organisms, from schools of fish to swarms of bees. A new technique called Artificial Swarm Intelligence (ASI) has enabled networked human groups to reach decisions in systems modeled after natural swarms. The present research seeks to understand the behavioral dynamics of such “human swarms.” Data was collected from ten human groups, each having between 21 and 25 members. The groups were tasked with answering a set of 25 ordered ranking questions on a 1-5 scale, first independently by survey and then collaboratively as a real-time swarm. We found that groups reached significantly different answers, on average, by swarm versus survey ($mathrm{p}=0.02$). Initially, the distribution of individual responses in each swarm was little different than the distribution of survey responses, but through the process of real-time deliberation, the swarm's average answer changed significantly ($mathrm{p} < 0.001$). We discuss possible interpretations of this dynamic behavior. Importantly, the we find that swarm's answer is not simply the arithmetic mean of initial individual “votes” ($mathrm{p} < 0.001$) as in a survey, suggesting a more complex mechanism is at play—one that relies on the time-varying behaviors of the participants in swarms. Finally, we publish a set of data that enables other researchers to analyze human behaviors in real-time swarms.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127811426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}