2021 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

筛选
英文 中文
Analysis of Routing Entropy in Hyperbolic Trees 双曲树路由熵的分析
Zalán Heszberger, András Majdán, A. Gulyás, András Bíró, László Balázs, J. Bíró
{"title":"Analysis of Routing Entropy in Hyperbolic Trees","authors":"Zalán Heszberger, András Majdán, A. Gulyás, András Bíró, László Balázs, J. Bíró","doi":"10.1109/CSCI54926.2021.00161","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00161","url":null,"abstract":"Recent results have shown that the memory requirements of destination-based hop-by-hop routing in largescale communication networks can efficiently be estimated by the information theoretic!! entropy of the forwarding tables placed at the nodes. For calculating and analyzing the memory usage the forwarding tables are to be inferred according to the routing algorithm, then the entropy values can be established. This could be a computationally intensive task, especially in case of large networks operated along complex routing policies making the analysis hard and less tractable. In this paper we focus on a special case, when the routing is based on a spanning tree the so called hyperbolic tree. We show that the routing entropy can efficiently be computed in this case without generating the forwarding tables. Based on this computation, analytical results on routing scalability with respect to memory usage can also be derived, which confirms observations on numerical investigations. These network theoretical results will expectedly have significance in the forthcoming 5th generation (5G) and the future 6th generation (6G) complex communication systems. The representation and modelling power of hyperbolic complex networks may greatly help in mastering the complexity of rapidly expanding systems like 5G and 6G communication networks.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"78 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Circular Framework from Branding to Recruitment in Perspective of Higher Education : Type of the submission: Full/Regular Research Paper Symposium acronyms is: CSCI-ISED 从高等教育的角度来看,从品牌推广到招聘的循环框架:提交类型:完整/定期研究论文研讨会缩写为:CSCI-ISED
Miao Chen, Ali A. Al-Babawat, A. Alsadoon, Srujal Patel, R. M. Salah, P. Prasad
{"title":"A Circular Framework from Branding to Recruitment in Perspective of Higher Education : Type of the submission: Full/Regular Research Paper Symposium acronyms is: CSCI-ISED","authors":"Miao Chen, Ali A. Al-Babawat, A. Alsadoon, Srujal Patel, R. M. Salah, P. Prasad","doi":"10.1109/CSCI54926.2021.00067","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00067","url":null,"abstract":"This paper aims to enhance alumni loyalty as time passes with the help of technologies and also to propose a model regarding how branding links to university recruitment through the mediating role of alumni loyalty.The proposed model added a new stage called situational assessment by separating the single student loyalty into current student loyalty and alumni loyalty to enhance alumni loyalty as time passes with the help of effective loyalty programs, leading to new student recruitment and university reputation via positive Word-Of-Mouth, and included positive academic experience and quality digital technologies to solve the problem of difficulty in measuring service quality as they play a significant effect on alumni loyalty as time passes in terms of new student recruitment and university reputation.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131513510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redesigning An Undergraduate Course: Principles of Programming Languages 重新设计本科课程:程序设计语言原理
Xuguang Chen
{"title":"Redesigning An Undergraduate Course: Principles of Programming Languages","authors":"Xuguang Chen","doi":"10.1109/CSCI54926.2021.00015","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00015","url":null,"abstract":"This paper describes the effort of redesigning an undergraduate course: CSC370 Principles of Programming Languages. Like courses similar to CSC370, the book Concepts of Programming Languages and written by Robert Sebesta is as the textbook. The lectures sequentially cover the topics from its Chapters 1-10. Based on the students' feedback and their performance, this book is good, however, with several limitations. Hence, the lectures were redesigned in the Summer of 2021 to reflect the concerns. In the new design, the topics selected from the book will be reorganized into three categories, and the coursework will include two term projects for different purposes. It will be piloted in the Spring of 2022.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131030234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the security level of Aruba wireless networks in an educational center 某教育中心Aruba无线网络安全等级评估
De La Cruz De La Cruz Paola, Rúsbel Domínguez Domínguez
{"title":"Evaluation of the security level of Aruba wireless networks in an educational center","authors":"De La Cruz De La Cruz Paola, Rúsbel Domínguez Domínguez","doi":"10.1109/CSCI54926.2021.00275","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00275","url":null,"abstract":"Wireless networks have made it possible to connect mobile devices, providing great advantages for today's communication. However, this has made communications a target of continuous security attacks. The risks can range from being left without connectivity in an organization, to the theft or hijacking of valuable information for institutions. To minimize the risk of a cyber-attack on a wireless network, there are complex and external methodologies to evaluate security, detect failures in the network and help find solutions.This research proposes the use of a methodology based on \"ethical hacking\" in order to evaluate, analyze and expose the vulnerabilities that may have a \"cluster\" formed by Aruba Network equipment within an institution of higher education in northeastern Mexico. In the application of this methodology a total of forty-seven vulnerabilities were found, four of them considered critical, eighteen are high risk, twenty-four have a medium score and one low risk level vulnerabilty.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131093755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Network Forensics Labs for Teaching-oriented Institutions 面向教学院校的网络取证实验室设计
Kewei Sha, Wei Wei, Arpit Jain
{"title":"Design of Network Forensics Labs for Teaching-oriented Institutions","authors":"Kewei Sha, Wei Wei, Arpit Jain","doi":"10.1109/CSCI54926.2021.00213","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00213","url":null,"abstract":"Network-related cyber crimes including Phishing attacks, DDoS attacks, Identity Theft, etc. increase significantly with the extension of networked devices and systems. Cyber crime investigation conducted by network forensic professionals is critical not only to discover the source of security attacks but also to prevent future crimes. Although colleges and universities start involving forensics in education programs and forensics professionals training based on well-designed and effective curricula, there is still a significant gap between the supply of qualified network forensics professionals and what the market demands. As a highly technical subject, network forensics requires practitioners to obtain necessary knowledge and skills through both theoretical learning hands-on labs. However, survey of existing curricula shows the lack of hands-on network forensics labs. Therefore, we aim to develop a suite of initial hands-on network forensics labs that can be easily integrated into a Network Forensics course. The design focuses on addressing two major issues, building an isolated lab environment from the existing campus network and creating labs that provide realistic and practical experiences. In this paper, we first discuss the challenges of developing network forensics labs, then we describe our approaches to overcome those challenges. In addition, we also present the design of three typical network forensics labs. We believe that our designed labs, as well as the lessons learned, can help other institutions to develop effective network forensics courses.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sentiment Analysis Approach for Abusive Content Detection using Improved Dataset 一种基于改进数据集的滥用内容检测情感分析方法
Aziz L. Ngou Njikam Abdou, Elie Fute Tagne
{"title":"A Sentiment Analysis Approach for Abusive Content Detection using Improved Dataset","authors":"Aziz L. Ngou Njikam Abdou, Elie Fute Tagne","doi":"10.1109/CSCI54926.2021.00283","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00283","url":null,"abstract":"The rapid growth of information and communications technologies has led to the generation of enormous amount of information daily. Consequently, there has been an increased interest in effective data processing. The nature of the information is varied and can in some cases include users’ emotions and opinions. Faced with this situation, the need of proposing social media monitoring and content filtering is a major asset for the community. The specific case of abusive content is becoming more relevant these recent years leading to the proposition of many models which unfortunately suffer from the unbalanced nature of the dataset used. We propose a sentiment analysis approach which classifies social media posts according to three categories: hate, abusive and neutral. The approach is based on a constructed dataset which reduces unbalancing and improves classification results.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lateral Flow Test Interpretation with Residual Networks 用残余网络解释横向流动试验
Dena F. Mujtaba, N. Mahapatra
{"title":"Lateral Flow Test Interpretation with Residual Networks","authors":"Dena F. Mujtaba, N. Mahapatra","doi":"10.1109/CSCI54926.2021.00261","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00261","url":null,"abstract":"Lateral flow tests (LFTs) are a cost-effective, quick, and frequently used testing method in many domains such as food safety and environmental and clinical applications. However, a major challenge is accurate interpretation of LFT results. Often, if a low level of target substance is present in the input liquid, the test line indicator may appear faint, causing a test interpreter to read the test result as a false negative. Therefore, to address this problem, we propose a deep-learning-based method to interpret images of LFT results. Our model is based on ResNet-101, a state-of-the-art image classification model that uses residual networks, or skip-connections between layers to improve learning on the training dataset. We further improve our model by using data augmentation to generate additional and more difficult images of LFTs for the model to learn from, thereby improving its performance and reducing overfitting to the training dataset. Our approach is also trained and tested on a dataset of SARS-CoV-2 LFT images, containing both positive and negative results. We compare our ResNet approach to a baseline convolutional neural network model. Our results show the ResNet model achieves a higher specificity and sensitivity than the baseline model to interpret LFT results.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131995421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantifying the Impact of Vulnerabilities of the Components of an Information System towards the Composite Rise Exposure 量化信息系统组件脆弱性对复合上升暴露的影响
Yanzhen Qu, Adam English, Brace Hannon
{"title":"Quantifying the Impact of Vulnerabilities of the Components of an Information System towards the Composite Rise Exposure","authors":"Yanzhen Qu, Adam English, Brace Hannon","doi":"10.1109/CSCI54926.2021.00193","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00193","url":null,"abstract":"To compensate the lacking of any concrete scoring formula of the CVSS v3 for the category of \"Environment\", in this paper, we present a novel formula for objectively quantifying composite vulnerability exposures for non-terminal components of an information system. The paper examines limitations of the CVSS v3 calculator definition, notably the capacity to characterize vulnerabilities from a composite perspective, providing a means to output a composite CVSS-compliant vulnerability score for aggregated system components. We provide the definitions for related concepts, formulas for determining component vulnerability, and a formula for calculating composite vulnerability. The common implementation of a Linux, Apache, MySQL, PHP (LAMP) stack provides a practical demonstration of the foundational formulas.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128866744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weakly Supervised Crowdsourcing Learning Based on Adversarial Consensus 基于对抗共识的弱监督众包学习
Menglong Wei, Shao-Yuan Li, Sheng-Jun Huang
{"title":"Weakly Supervised Crowdsourcing Learning Based on Adversarial Consensus","authors":"Menglong Wei, Shao-Yuan Li, Sheng-Jun Huang","doi":"10.1109/CSCI54926.2021.00052","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00052","url":null,"abstract":"Crowdsourcing provides an efficient way to obtain labels for large datasets in the deep learning era. However, due to the non-expert workers, the annotations are usually noisy.Besides, concerning the labeling cost, sparse annotations are common. To face this challenge, we propose an approach based on adversarial consensus, which trains one classifier for each worker, and enforces their predictions over the ground-truth labels to be maximally consistent by exploiting the generative adversarial learning idea. We give two implementations respectively for the light and heavy noise cases. Extensive experiments on real-world and synthetic datasets demonstrate the effectiveness of our approach.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134647114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-Based Security Testing of Vehicle Networks 基于模型的车辆网络安全测试
Florian Sommer, R. Kriesten, F. Kargl
{"title":"Model-Based Security Testing of Vehicle Networks","authors":"Florian Sommer, R. Kriesten, F. Kargl","doi":"10.1109/CSCI54926.2021.00179","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00179","url":null,"abstract":"Modern vehicles consist of a large number of electronic information technology components, which communicate with each other and external components. To protect vehicles against security attacks, automotive-specific standards and regulations require an integration of security concepts and measures in vehicles. Security testing techniques, such as penetration tests, are used to verify and validate those measures. However, these methods are usually carried out manually in late phases of development. Thus, identified vulnerabilities can only be eliminated at a late stage leading to a high investment of time and resources. This paper presents a model-based security testing approach which aims to enable security tests early on in the vehicle development process in an automated way. This allows vulnerabilities to be identified and eliminated at an early stage during development. Therefore, we show our concept to create a security model based on a vehicle network. This model can be used to automatically derive attack paths for security testing. We further illustrate our approach by applying it to a real-world vehicle network.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131272753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信