{"title":"2021 IEEE/ACIS 21st International Fall Conference on Computer and Information Science (ICIS 2021–Fall)","authors":"","doi":"10.1109/icisfall51598.2021.9627349","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627349","url":null,"abstract":"2021 IEEE/ACIS 21st International Fall Conference on Computer and Information Science (ICIS 2021–Fall).","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123960474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Control Scheme for Deadline-aware Streaming","authors":"Yongbei Yang, Yuan Zhang, Yang Chen, Jinyao Yan","doi":"10.1109/icisfall51598.2021.9627345","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627345","url":null,"abstract":"With increasing popularity on deadline-aware streaming service, how to deliver these multimedia data quickly and efficiently has become critical. Traditional transport protocols and congestion control schemes fail to meet expectations. On one hand, the traditional transport protocols like TCP are far away from minimizing the queuing delay. On the other hand, existing congestion control schemes is limited in transport layer, resulting in the neglect of features and deadline requirements in application layer. To address these issues, we propose a Heuristic Delay-based Adaptive Scheme, namely HDAS, based on Deadline-aware Transport Protocol (DTP). HDAS not only adjusts the window size and sending rate according to the network feedback but also schedules packets to improve the overall Quality of Experience (QoE). The proposed scheme adopts delay-based adaptive adjustment for congestion control and greedy strategy for scheduler. Extensive simulations demonstrate that our scheme outperforms most of the existing schemes on overall QoE.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131793345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Chinese Short Text Segmentation for New Media Comments","authors":"Pei-jun Gao, Yana Zhang, Suya Zhang, Zeyu Chen","doi":"10.1109/icisfall51598.2021.9627361","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627361","url":null,"abstract":"With the development of new media industry, comments based user interaction is now fairly routine in live broadcasting. User comments usually appear in the form of short text with freestyle and cyber new words. The general word segmentation methods could not adapt to Chinese short text in new media comments. This paper proposes a novel method of Chinese short text segmentation to solve the problem of word segmentation granularity self-adaption. A New Media Comment Short Text Dataset(NMCD) is built for our researches, a word vector text containing cyber new words and entity words as well. Our optimized bidirectional Long Short Term Memory(LSTM) model based on attention mechanism and transfer learning could make number and its unit together after the word segmentation. The experiment results show that the Fl-score is improved by 21.43%. The word segmentation method in this paper could be efficiently applied to the new media comments analysis system later.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao Yuan, Shaofei Li, Wanzhen Sun, Zheng Li, Xin Steven
{"title":"An Efficient Attention Based Image Adversarial Attack Algorithm with Differential Evolution on Realistic High-Resolution Image","authors":"Hao Yuan, Shaofei Li, Wanzhen Sun, Zheng Li, Xin Steven","doi":"10.1109/icisfall51598.2021.9627468","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627468","url":null,"abstract":"Deep learning methods with convolutional neural network (CNN) have achieved significant success in image classification tasks. Meanwhile, adversarial image attack algorithms are also becoming more effective within low-resolution images. However, in high-resolution images, such algorithms are still lacking a way to balance between efficiency and success rate. In this paper, we proposed an efficient attention-based image adversarial attack algorithm with differential evolution on realistic high-resolution images that make changes negligible to human eye but can achieve great success in deceiving Deep Neural Networks (DNNs) such as LeNet and ResNet. This attention-based algorithm uses the theory of Region of Interest (ROI) in the image and reduce the search area accordingly to maximize the attack accuracy. This paper proposed two image perturbation methods: strike-slip attack and Hue-Saturation-Value (HSV) filter attack, which apply changes universally to a given area of pixels to minimize the visual difference between two adjacent pixels. Then, based on population-based metaheuristic search theory, this paper used differential evolution algorithm to find the optimal attack solution. Finally, this paper compared above two attack methods and evaluate their effectiveness when attacking images of different resolutions.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Parallel LSTM Algorithm Based on Spark","authors":"Zhao Yangyang, Niu Wei, W. Meinan","doi":"10.1109/icisfall51598.2021.9627382","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627382","url":null,"abstract":"Aiming at the problems of large amount of data collected by airborne sensors, lack of data association, and low processing efficiency, this paper proposes a parallel LSTM algorithm model suitable for Spark platform. First, use the Spark platform to complete the traversal scan operation in the memory RDD of all nodes in the distributed cluster, and combine the directed acyclic graph to create a Pipeline pipeline to implement a parallel computing framework. An algorithm model to optimize the parameters of LSTM neural network is proposed, and load balancing processing method is introduced to realize that all nodes of the distributed system can share the computing tasks in a balanced manner. The experimental results show that compared to the stand-alone case, the parallelized LSTM algorithm improves the efficiency. The prediction efficiency of the LSTM algorithm model after load balancing processing is higher, which shows that the distribution of traversal tasks of each node is more balanced and the degree of parallelization is higher.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123716343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Complex System Intelligent Maintenance Decision Method","authors":"Peng Li, Wei Niu","doi":"10.1109/icisfall51598.2021.9627399","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627399","url":null,"abstract":"With the development of information technology, the goal of complex system maintenance and support is to be scientific prediction and precise logistics. There is an urgent need to build a flexible networked logistics architecture, to utilize the equipment's real-time health information efficiently and to schedule logistics resources successfully in a complex and dynamic logistics environment. In order to establish a precise, dynamic and networked maintenance system, the characteristics of logistics networks are analyzed entirely to improve logistics organization flexibility, a method of state collaborative analysis and intelligent support decision-making is proposed. This method generates test data through offline and online execution of fault test cases; based on online state monitoring and historical data of sensors, the equipment state is estimated and judged, thereby providing intelligent guarantee decision-making services.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Critical Success Factors in Designing Cloud-based Application Solutions","authors":"Shin-Jer Yang, Zi-Ling Lai, Ming-Chin Hung","doi":"10.1109/icisfall51598.2021.9627489","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627489","url":null,"abstract":"In recent years, Cloud Computing is one of the more influential technologies. Cloud users do not need to deeply understand the technical knowledge underlying the cloud infrastructure. System developers enable enterprises and organizations to quickly implement systems and deploy applications in the cloud environment, and also reduce the cost from development to maintenance. Hence, many companies have begun to use cloud-based systems. They need to consider related essential requirements during developing a comprehensive cloud-based application system. Therefore, this paper did survey functional and non-functional requirements to be divided into six facets. In the first stage, we invite scholars and experts to interview and fill out the questionnaire, and conduct a reliability analysis through Statistical Product and Service Solutions (SPSS) to make corrections in questionnaire of the first stage, and erase unnecessary influencing factors to select the critical success factors (CSFs). In the second stage, we will calculate the weight ratio and rank the sequence for each of the CSFs through the analytic hierarchy process (AHP). After performing two stages experiments, the final results indicate that Security and Privacy, System Performance, and Processing Features are the top three of the six facets. In the calculation of the overall weights of CSFs across the six facets, the top six ranked CSFs cover Data Accuracy, Reliability, Computing Logic, Robustness, Accessibility, and Data Privacy and Encryption. In the future, the proposed methodology can be applied to IoT and smart factors applications.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"97 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117297622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaofang Deng, Liuyue Shi, Yanlong Li, Liyan Luo, Lin Zheng
{"title":"A Void-Avoidable and Reliability-Based Opportunistic Energy Efficiency Routing for Mobile Sparse Underwater Acoustic Sensor Network","authors":"Xiaofang Deng, Liuyue Shi, Yanlong Li, Liyan Luo, Lin Zheng","doi":"10.1109/icisfall51598.2021.9627469","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627469","url":null,"abstract":"Mobile and sparse underwater acoustic sensor networks (MS-UASNs) have attracted much attention due to their wide applications in various fields. However, MS-UASNs comes with intrinsic constraints because it is deployed in the aquatic environment and uses the acoustic signals to communicate. The sparse deployment and topology changes of the network leads to void areas that reduce packet delivery ratio. And the network efficiency is reduced and the lifetime of networks is shortened due to limited energy. Besides, the low speed of the acoustic waves produces high latency. Thereby, our proposed a void-avoidable and reliability-based opportunistic energy efficiency routing (VBOER) protocol is designed to achieve voids avoidance, energy fairness and improve reliability. First, the valid transmission areas (VTA) of the node are divided to avoid unnecessary transmission. Second, the novelty of VBOER is that the qualified forwarding nodes (QFNs) are determined by considering the continual degree (CD) and the life-time of nodes. Then, the VBOER shapes the node energy state prediction model and the node location state prediction model based on Markov chain. Finally, to achieve a balance between the energy efficiency and the network benefits, forward fitness value (FFV) of nodes is proposed, and an opportunistic routing protocol based on FFV is developed to coordinate packet forwarding. The verification of simulation results shows the effectiveness of our proposed VBOER in terms of packet delivery ratio, network lifetime and end-to-end delay in comparison to existing routing protocols.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"90 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Cooking Video Games and Testing Considerations","authors":"Sanchit Bista, M. Garcia-Ruiz","doi":"10.1109/icisfall51598.2021.9627376","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627376","url":null,"abstract":"Video games are an important part of the lives of many people, being a popular entertainment medium, and providing engaging and motivating player experiences. Some types of video games are also played to learn about a particular topic, working as serious games (games that have a purpose beyond pure entertainment). That is the case of cooking games, a hybrid game genre where simulation, casual and other genres are involved. In cooking games, food preparation and presentation isare the central gameplay mechanic. In this paper, we present a review of popular cooking games, and suggestions for analyzing and testing cooking video games, taking into account the games' usability, training and learning components. These components could help designing and developing new cooking games. We conclude that in order to improve cooking games testing, testers should know the basics of cooking shown in the game beforehand, and be aware of the importance of the game's look and feel to evoke meaningful and compelling culinary experiences. Cooking games can help people to learn a life skill such as meal preparation, beyond just playing a casual game.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133004619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yifeng He, Anzhong Jin, Lei Chen, Shikang Nie, Yi Zhang, Gang Dong
{"title":"Acquisition Algorithm of High-Order BOC Modulation Satellite Communication Signal Based on Big Data","authors":"Yifeng He, Anzhong Jin, Lei Chen, Shikang Nie, Yi Zhang, Gang Dong","doi":"10.1109/icisfall51598.2021.9627380","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627380","url":null,"abstract":"Satellite navigation and positioning systems play a key role in the political, military and economic aspects of a country. With the rapid development of our country's Beidou satellite navigation system, the research on signal receiving technology, especially satellite communication signal acquisition algorithm, has become an important field of navigation system application development. Starting from big data, this paper conducts in-depth research on the acquisition algorithm of high-order BOC modulation satellite communication signals. This article first analyzes the capture performance of the traditional serial capture algorithm, summarizes the relevant characteristics of BPSK-R and BOC modulation signals, designs a double-sideband capture scheme based on matched filters, and gives the design process and parameters of the scheme in detail. In this paper, taking BOC (15, 2.5) modulated satellite signal as an example, the acquisition performance of multi-peak detection time-domain parallel acquisition algorithm is studied. Through simulation and testing, the simulation data shows that when the carrier-to-noise ratio is 40dB. Hz and the false alarm probability is 0.001, the detection probability can reach more than 0.99. Therefore, the multi-peak detection time-domain parallel capture algorithm in this paper is a capture algorithm that can meet performance requirements, improves capture efficiency and reduces resource usage.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133722583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}