2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)最新文献

筛选
英文 中文
An Overview of Gamification in Conflict Resolution and Complex Problems Using Scaled Down Arenas in Areas of Contention 在冲突解决和复杂问题中使用缩小竞技场的游戏化概述
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718467
Maneerat Rumsamrong, A. Chiou
{"title":"An Overview of Gamification in Conflict Resolution and Complex Problems Using Scaled Down Arenas in Areas of Contention","authors":"Maneerat Rumsamrong, A. Chiou","doi":"10.1109/CSDE53843.2021.9718467","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718467","url":null,"abstract":"The process of testing new techniques for complex problems, especially in conflict resolution can be daunting. In this project, it proposes and attempts to implement a method of scaling down a problem into a manageable context. This approach using gamification to codify a problem into a smaller scale and then applying it onto a scaled-down arena of contention (i.e. smaller but accurate representation) where tests can be conducted under more manageable and controllable conditions.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126846602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of Handcrafted and Deep Neural Features for Melanoma Classification and Localization of Cancerous Region 结合人工与深度神经特征进行黑色素瘤分类与癌变区域定位
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718446
Mohammad Saminoor Rahman, Md. Jubayer Hossain, Md.Kamrul Hasan Sujon, Md.Nafiul Kabir, S. Islam, Md. Tanzim Reza, Md. Ashraful Alam
{"title":"Integration of Handcrafted and Deep Neural Features for Melanoma Classification and Localization of Cancerous Region","authors":"Mohammad Saminoor Rahman, Md. Jubayer Hossain, Md.Kamrul Hasan Sujon, Md.Nafiul Kabir, S. Islam, Md. Tanzim Reza, Md. Ashraful Alam","doi":"10.1109/CSDE53843.2021.9718446","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718446","url":null,"abstract":"Deep neural networks (DNNs) are widely utilized to automate medical image interpretation in many forms of cancer diagnosis and to support medical specialists with fast data processing. Although man-made characteristics have been used to diagnose since the 1990s, DNN is fairly new in this field and has shown extremely promising results. The fundamental goal of this study is to detect melanoma cancer in its early stages by obtaining a remarkable outcome with greater accuracy. Our purpose is to address the problem of an increase in skin cancer patients throughout the world, as well as an exponential increase in the danger of mortality from not commencing the diagnosis at an early stage, as a result of late detection. We propose that the research works on handcrafted features and merges the result with deep learning approaches with the initial help with a huge dataset of raw images. The DNN model used in this research has multiple layers with various effective filtering processes called batch normalization and dropout also with added layers named flatten and dense. In this process, images are classified to predict melanoma cancer at an early stage with Mean Shift, SIFT, and Gabor separately then the output was ensembled with later added Raw images results to give better accuracy. With an early integration model for separate featured databases and with a late and full integration model for ensemble with various results from the early integrated model we got our results. As a result, this neural network has provided an accuracy of 90% in early models and in late and full integration 86% and 84% respectfully, which is higher than other conventional approaches.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128751932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of Stream Cipher: Method Implementation 流密码的密码分析:方法实现
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718432
Aiman Al-Sabaawi
{"title":"Cryptanalysis of Stream Cipher: Method Implementation","authors":"Aiman Al-Sabaawi","doi":"10.1109/CSDE53843.2021.9718432","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718432","url":null,"abstract":"The study of techniques and methods to extract the text from encrypted texts is called cryptanalysis. Nowadays, the aim of ‘breaking’ cryptographic methods by analyzing them is called cryptanalysis. Cryptanalysis is essentially an approach that covers all usable information regarding the investigated techniques as well as the protected data and parameters. By cryptanalysing ciphertexts using stream ciphers, this paper describes the implementation of cryptanalysis techniques. The paper will show how the message was recovered without errors despite the use of simple algorithms. This paper will enhance students’ and researchers’ understanding of cryptanalysis. The ways in which numerical equations are used to analyze protected information systems to identify shrouded components and vulnerabilities are also described. In this contest, the major challenges are to understand these techniques and in using the CrypTool program to answer questions such as: how is each tool selected?; how are they connected?; and what are the inputs and the outputs for each tool? All these challenges are explained using texts or figures.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Australian COVID-19 Data Visualisation and Forecast Modelling Performance Analysis 澳大利亚COVID-19数据可视化和预测建模性能分析
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718385
Proma T. Ali, Ayesha K. Reddy
{"title":"Australian COVID-19 Data Visualisation and Forecast Modelling Performance Analysis","authors":"Proma T. Ali, Ayesha K. Reddy","doi":"10.1109/CSDE53843.2021.9718385","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718385","url":null,"abstract":"The rise of the Coronavirus pandemic was unanticipated, and it turned into a very serious and catastrophically dangerous scenario especially in terms of financial balance, physical and mental health, population growth, socialization, and globalization. This paper considers Australian COVID-19 data from its beginning on the 25th of January to this date for experimental study. The popular Microsoft Power BI tool and Python coding language were primarily utilized to visualize the data sets and understand the depth of the COVID-19 situation in Australia. More specifically Python is primarily used in this study on the data to generate visualizations and forecasted models for effective interpretation of the ongoing medical peril. The plots and graphs created significantly extract trends for the accumulative infection rates ongoing in Australia from February 2020 to September 2021. Such important comprehensions of the numerical data set allowed for a graphical understanding and representation with data science applications. Statistical forecasting models such as the autoregressive integrated moving average (ARIMA) model and the long short-term memory (LSTM) model were applied to the time series data of Australian COVID-19 infection numbers to predict the future trends of COVID-19 cases in Australia. Finally, we feel this research can help the policymakers and health practitioners to manage such global medical issues more efficiently in the future with the help of data science technology and applications which is the uprising heart of our technological era.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covid-19 Tracker: A data visualization tool for time series data of pandemic in India Covid-19 Tracker:印度大流行时间序列数据可视化工具
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718425
Yaksh Talavia, Priyanka Singh, S. Manoharan
{"title":"Covid-19 Tracker: A data visualization tool for time series data of pandemic in India","authors":"Yaksh Talavia, Priyanka Singh, S. Manoharan","doi":"10.1109/CSDE53843.2021.9718425","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718425","url":null,"abstract":"Covid-19 first originated in Wuhan, China, became a global pandemic and spread to many countries due to its high transmissibility. Digital technology could prove to be of great use in pandemic management with many strategies like screening for infection, tracking, contact tracing, and many more. Covid-19 tracker is one such application of digital technology. This helps in visualizing the pattern of public health through graphs, search results, and tables that can be easily understood by the user. It is built using HTML and JavaScript. Covid-19 Tracker uses data from certain authentic sources and helps to visualize the spread of Covid-19 throughout India. The main features incorporated in our dashboard are: total cases reported, graphs for daily trends, search functionality, state-wise comparative evaluations, and hotspot distribution map of the entire country. This dashboard provides a variety of user involvement possibilities and extracts useful data in a simple and easy-to-understand way.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital Supply Chain Management Ecosystem Powered by Blockchain Technology 区块链技术驱动的数字供应链管理生态系统
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718436
S. Ahsan, Ismat Sifat Yousuf, Zunaira Khan, Yousra Mehrin, M. Majumdar
{"title":"Digital Supply Chain Management Ecosystem Powered by Blockchain Technology","authors":"S. Ahsan, Ismat Sifat Yousuf, Zunaira Khan, Yousra Mehrin, M. Majumdar","doi":"10.1109/CSDE53843.2021.9718436","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718436","url":null,"abstract":"Most of the leading companies of the world invest heavily in a computerized system to maintain their supply chain management. From collecting manufacturing equipment to final delivery, products are being tracked by supply chain management software. Despite this huge investment in digitizing the supply chain system, complete visibility of a product at any given time is not fully achieved. Protecting authentic information throughout the supply chain management becomes a challenging task along with maintaining the quality of products. As all parties of a supply chain system have their standalone software, real-time communication amongst this software developed in different platforms using different technologies is not quite feasible. Other illegal parties can inject counterfeit products into the supply chain by taking advantage of this situation. This can pose a significant threat not only to the company’s revenue but also to its public image as well. In this paper, we propose a framework to implement a unique decentralized ecosystem powered by blockchain for the supply chain system.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130810803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autonomous UAV Landing on Mobile Platforms 自主无人机在移动平台上着陆
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718368
Darmesh Kumar, J. Raj, Krishna Raghuwaiya, J. Vanualailai
{"title":"Autonomous UAV Landing on Mobile Platforms","authors":"Darmesh Kumar, J. Raj, Krishna Raghuwaiya, J. Vanualailai","doi":"10.1109/CSDE53843.2021.9718368","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718368","url":null,"abstract":"Miniature Unmanned Aerial Vehicles, such as quadrotors, have short operational range because of limited battery capacities. As a result, they need to be charged more frequently. Mobile charging platforms are a solution to this problem. To be charged wirelessly, the Unmanned Aerial Vehicles need to communicate with the mobile charging platforms; hence the use of effective, fast and reliable technology, will be very beneficial to the quadrotors, ensuring fast charging and an effective means of transferring required data. In this paper, we consider a solution for autonomous landing of multiple quadrotors, modeled as point-masses. The multiple quadrotors, need to precisely land on mobile platforms, assumed to be equipped with wireless charging. In this article, the platforms are car-like vehicular robots, which are also modeled as point-masses in a dynamical environment, navigating in their workspace. The dynamic environment includes fixed and moving obstacles. We use a Lyapunov-based Control Scheme to propose a set of nonlinear control laws that guide the quadrotors to land safely on the moving vehicular robots which have designated targets. The effectiveness and robustness of the nonlinear acceleration control laws are verified via computer simulations.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"46 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113939438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-Based Access Control for the Internet of Things: A Survey 基于区块链的物联网访问控制:调查
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718468
Ebtihal Abdulrahman, Suhair Alshehri, A. Cherif
{"title":"Blockchain-Based Access Control for the Internet of Things: A Survey","authors":"Ebtihal Abdulrahman, Suhair Alshehri, A. Cherif","doi":"10.1109/CSDE53843.2021.9718468","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718468","url":null,"abstract":"Recently, the IoT environment is becoming more fertile for malicious users to break the security and privacy of users. Access control becomes a critical requirement to protect against illegal access that usually leads to sensitive data leakage. Unfortunately, the traditional access control mechanisms are centralized in terms of design and management, thus are not suitable for decentralized IoT systems. To deal with the distributed IoT environment, blockchain is considered as a promising distributed data management technology to different non-crypto currency areas, including IoT. Although blockchain can optimize some IoT requirements such as dynamicity, security, decentralization, and anonymity, it has some issues such as complex consensus algorithms, overhead, and scalability. This paper surveys and compares the most recent researches in the blockchain-based access control for IoT and suggests a set of requirements that should be considered while applying blockchain to control access in the IoT environment.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"25 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Selective Flushing of Modified Data for Smartphone Buffer Cache Management 智能手机缓冲区缓存管理中修改数据的选择性刷新
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718418
Soojung Lim, H. Bahn
{"title":"Selective Flushing of Modified Data for Smartphone Buffer Cache Management","authors":"Soojung Lim, H. Bahn","doi":"10.1109/CSDE53843.2021.9718418","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718418","url":null,"abstract":"Buffer cache plays an important role to hide the slow performance of smartphone storage systems. However, as buffer cache consists of volatile DRAM, data may be lost upon a sudden power failure situation. To cope with this situation, data in the buffer cache are periodically flushed to storage. Although periodic flushing improves the reliability of smartphone data, it degrades the efficiency of buffer cache greatly as it amplifies write traffic to storage. In this paper, we show that a small size of persistent memory can eliminate the periodic flushing overhead of smartphone buffer cache by making use of some distinct write I/O behaviors of smartphones. Specifically, our write I/O analysis from popular smartphone applications shows that a limited number of hot data account for most file writes in smartphones, whereas a large portion of file data accessed in smartphones are written only once. Based on this observation, we present the selective flushing policy that adds small persistent memory to buffer cache and keeps frequently modified data in persistent memory without flushing to storage. We perform storage flushing only for written-once data, which are prohibited from entering persistent memory for space efficiency. By replaying popular smartphone application I/O traces, we show that the proposed selective flushing policy reduces the storage write I/O by 25.8% on average and up to 37.8%.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Systematic Review of Modern Malicious Softwares and Applicable Recommendations 现代恶意软件的系统回顾和适用的建议
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) Pub Date : 2021-12-08 DOI: 10.1109/CSDE53843.2021.9718392
Neeraj Anand Sharma, Kunal Kumar, Manisha Aradhna Raj, A. B. M. S. Ali
{"title":"A Systematic Review of Modern Malicious Softwares and Applicable Recommendations","authors":"Neeraj Anand Sharma, Kunal Kumar, Manisha Aradhna Raj, A. B. M. S. Ali","doi":"10.1109/CSDE53843.2021.9718392","DOIUrl":"https://doi.org/10.1109/CSDE53843.2021.9718392","url":null,"abstract":"The world as we know it is evolving at a rapid pace and this leads to a society utilizing computer technologies for almost everything. Whether it is buying groceries or ordering food it all can be done online. This potentially can lead us to a malicious software’s path and even though antivirus software’s are installed computers are never safe from online intruders or perpetrators who will try to expose our computer systems. From an attacker’s point of view now it is easier to penetrate a system when compared to the last decade. This is because of the enhancement in online activities and with new malicious software’s getting introduced, it also becomes widely available online. This paper identifies the twenty different types of malicious software one should be aware of while using a computer or being online. The basic idea here is to create awareness and show analyzed data comparing the severity of a malicious act. The author also proposes a novel approach for developing a simple and unique software application to counter the majority of the malicious software identified in this paper. It also provides recommendations to prevent one from getting their systems infected.","PeriodicalId":166950,"journal":{"name":"2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116843673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信