{"title":"Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following \"STEAMS\" Methodology","authors":"Mason Chen, Chen Chen","doi":"10.29007/4jgz","DOIUrl":"https://doi.org/10.29007/4jgz","url":null,"abstract":"A “STEAMS” (Science, Technology, Engineering, Artificial Intelligence, Math, Statistics) approach was conducted to handle the missing value imputation of clustering Chocolate Science patterns. Hierarchical clustering and dendrogram analysis were utilized to cluster the commercial chocolate products into different product groups which can indicate the nutrition compositions and product health. To further handle the missing value imputation, a neural network algorithm was utilized to predict the missed Cocoa percentage (Cocoa%), based on other available nutritional components. The Hyperbolic Tangent activation function was used to create the hidden layer with three nodes. Neural networks are very flexible models and tend to over-fit data. A Definitive Screening Design (DSD) was conducted to optimize the neural setting in order to minimize the over-fit concern. Both the Goodness Fit of Training set and Validation set can reach 99% R-Square. The Profiler Sensitivity analysis has shown that the Chocolate Type and Vitamin C are the most sensitive factors to predict the missed Cocoa%. The results also indicated that the “Fruit” Chocolate can be added as the 4 th Chocolate Type. The Neural Black-Box algorithm revealed the hidden Chocolate Science and Product. This paper demonstrates the power of using the Engineering Design of Experiment (DOE) and Neural Network algorithm through STEAMS for the particular application of modeling chocolate products.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamza Abdelmalek, Gino Chénard, I. Khriss, A. Jakimi
{"title":"A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process","authors":"Hamza Abdelmalek, Gino Chénard, I. Khriss, A. Jakimi","doi":"10.29007/rbp7","DOIUrl":"https://doi.org/10.29007/rbp7","url":null,"abstract":"Organizations are highly dependent on their software in carrying out their daily activities. Unfortunately, the repeated changes that are applied to these systems make their evolution difficult. This evolution may be necessary to maintain the software, replace or upgrade it. In the case of complex and poorly documented legacy systems, modernization is the only feasible solution to achieving the evolution goals. The OMG (Object Management Group) consortium created the Architecture-Driven Modernization (ADM) initiative to cope with the challenges of modernization. This initiative proposes, among other things, modernization through model-driven engineering (MDE). In this context, the modernization of a legacy system, not developed in an MDE environment, begins with its migration towards this type of environment. This migration raises the problem of finding the models necessary for the use of MDE representing this system. In this paper, we present a new bimodal approach to ADM modernization by enabling automatic and interactive modes to discover a view of the implementation platform of a legacy object-oriented system. Also, we present the key ideas of the algorithms behind this discovery process. Finally, we describe our prototype tool that implements our approach. This tool has been validated on several systems written in C# and Java languages. EPiC Series in Computing Volume 69, 2020, Pages 98–111 Proceedings of 35th International Conference on Computers and Their Applications G. Lee and Y. Jin (eds.), CATA 2020 (EPiC Series in Computing, vol. 69), pp. 98–111","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125313993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Conor Carroll, Nupur Garg, Theresa Migler, B. E. Walker, Zoë J. Wood
{"title":"Mapping and visualization of publication networks of public university faculty in computer science and electrical engineering","authors":"Conor Carroll, Nupur Garg, Theresa Migler, B. E. Walker, Zoë J. Wood","doi":"10.29007/dk44","DOIUrl":"https://doi.org/10.29007/dk44","url":null,"abstract":"We present our process and development of a web-based system to explore the publication networks of faculty in California public universities in the fields of computer science and electrical engineering. Our project explores collaboration networks in the fields of computer science and electrical engineering with a focus on publication networks and an analysis of these collaborations with a focus on geospatial organization (which institutions are collaborating with which other institutions). We present our data gathering process, which relies on the Scopus[9] database (Scopus represents a “comprehensive overview of the world’s scientific research output across all disciplines”), and we present the development of a web-based tool using python and the Google Maps API [12] in order to allow visualizations and explorations of geospatial structures of the publications networks. These visualizations drove further network analysis, which we present here as well.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threats and Alert Analytics in Autonomous Vehicles","authors":"A. Rastogi, K. Nygard","doi":"10.29007/j6h1","DOIUrl":"https://doi.org/10.29007/j6h1","url":null,"abstract":"Autonomous vehicles or self-driving cars emerged with a promise to deliver a driving experience that is safe, secure, law-abiding, alleviates traffic congestion and reduces traffic accidents. These self-driving cars predominantly rely on wireless technology, vehicular ad-hoc networks (VANETs) and Vehicle to Vehicle (V2V) networks, Road Side Units (RSUs), Millimeter Wave radars, light detection and ranging (LiDAR), sensors and cameras, etc. Since these vehicles are so dexterous and equipped with such advanced driver assistance technological features, their dexterity invites threats, vulnerabilities and hacking attacks. This paper aims to understand and study the technology behind these self-driving cars and explore, identify and address popular threats, vulnerabilities and hacking attacks to which these cars are prone. This paper also establishes a relationship between these threats, trust and reliability. An analysis of the alert systems in self-driving cars is also presented. keywords: Self-driving cars, advanced driver assistance systems, trust, reliability, ethics, security, threats, vulnerabilities","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127331090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems","authors":"Nick Rahimi, Jordan Maynor, B. Gupta","doi":"10.29007/3xbb","DOIUrl":"https://doi.org/10.29007/3xbb","url":null,"abstract":"Machine learning is an attractive tool to make use of in various areas of computer science. It allows us to take a hands-off approach in various situations where previously manual work was required. One such area machine learning has not yet been applied entirely successfully is cybersecurity. The issue here is that most classical machine learning models do not consider the possibility of an adversary purposely attempting to mislead the machine learning system. If the possibility that incoming data will be deliberately crafted to mislead and break the machine learning system, these systems are useless in a cybersecurity setting. Taking this into account may allow us to modify existing security systems and introduce the power of machine learning to them.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133940429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Machine Learning Algorithms on Email Spam Classification","authors":"N. Sutta, Ziping Liu, Xuesong Zhang","doi":"10.29007/qshd","DOIUrl":"https://doi.org/10.29007/qshd","url":null,"abstract":"Despite the fact that different techniques have been developed to filter spam, due to the spammer’s rapid adoption of new spam detection techniques, we are still overwhelmed with spam emails. Currently, machine learning techniques are the most effective ways to classify and filter spam emails. In this paper, a comprehensive comparison and analysis of the performance of various classification models on the 2007 TREC Public Spam Corpus are exhibited in various cases of without or with NGrams as well as using separate or combined datasets. It is shown that the inclusion of the N-Grams in the pre-processing phase provides high accuracy results for classification models in most of the cases, and the models using the split approach with combined datasets give better results than models using the separate dataset.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115729236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Debnath, M. Peralta, C. Salgado, Luis A. C. Roque, D. Riesco, G. Montejano, Mouna Mazzi
{"title":"Metrics and Indicators to evaluate the degree of transformation to Smart City of a city. An Ad-Hoc Quality Model","authors":"N. Debnath, M. Peralta, C. Salgado, Luis A. C. Roque, D. Riesco, G. Montejano, Mouna Mazzi","doi":"10.29007/xcq9","DOIUrl":"https://doi.org/10.29007/xcq9","url":null,"abstract":"The extreme levels of intensity with which people live in large urban centers began to affect the productivity and quality of life of cities and their inhabitants, some of which have reached extremes close to collapse, as is the case of traffic congestion in the main cities of the world. On the other hand, from digital innovation and economic development, it is necessary to provide intelligent solutions to current problems, promoting the entrepreneurial ecosystem and the collaborative economy. Each government should administer, manage and update information from each region, and distribute it in the most convenient way to each company or agency that is part of a smart city. To achieve smart cities, we must train digital citizens and take into account the accessibility conditions provided by technology. For this, the implementation of Internet of Things (IoT) at all possible levels is of the utmost importance. From these points of view, mobility has become a central issue of urban development. Its relationship with sustainability issues and its ability to generate competitiveness and quality of life, puts us before the need to rethink its future. These are certain considerations to include in possible models of quality that allow to study the degree of intelligence of the cities. When talking about indicators or metrics, it begins to pose a problem of being able to generalize / extend each of these measures. In this line of research, a board of metrics and indicators has been defined that are applicable to an ad hoc quality model whose","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Toshiyuki Haruhara, Hideto Ohgi, Masaaki Suzuki, H. Takao, Takashi Suzuki, S. Fujimura, T. Ishibashi, M. Yamamoto, Y. Murayama, H. Ohwada
{"title":"Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information","authors":"Toshiyuki Haruhara, Hideto Ohgi, Masaaki Suzuki, H. Takao, Takashi Suzuki, S. Fujimura, T. Ishibashi, M. Yamamoto, Y. Murayama, H. Ohwada","doi":"10.29007/jjwt","DOIUrl":"https://doi.org/10.29007/jjwt","url":null,"abstract":"Stroke is a serious cerebrovascular condition in which brain cells die due to an abrupt blockage of arteries supplying blood and oxygen or when a blood vessel bursts or ruptures and causes bleeding in the brain. Because the onset of stroke is very sudden in most people, prevention is often difficult. In Japan, stroke is one of the major causes of death and is associated with high medical costs; these problems are exacerbated by the aging population. Therefore, stroke prediction and treatment are important. The incidence of stroke may be avoided by preventive treatment based on the patient’s risk of stroke. However, since judging the risk of stroke onset is largely dependent upon the individual experience and skill of the doctor, a highly accurate prediction method that is independent of the doctor’s experience and skills is necessary. This study focuses on a predictive method for subarachnoid hemorrhage, which is a type of stroke. LightGBM was used to predict the rupture of cerebral aneurysms using a machine learning model that takes clinical, hemodynamic and morphological information into account. This model was used to analyze samples from 338 cerebral aneurysm cases (35 ruptured, 303 unruptured). Simulation of cerebral blood-flow was used to calculate the hemodynamic features while the surface curvature was extracted from the 3D blood-vessel-shape data as morphological features. This model yielded a sensitivity of 0.77 and a specificity of 0.83.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127157520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using GeoHashes to Combine IOT and GIS to Provide Business Intelligence to the Informal Sector in South Africa","authors":"L. Butgereit","doi":"10.29007/rssv","DOIUrl":"https://doi.org/10.29007/rssv","url":null,"abstract":"South Africa has one of the highest GINI coeefficient indicating a high degree of inequality in the country. There is also extreme unemployment with the expanded unemployment rate being 38.3% and in some subsections of the economy as high as 68.3%. Despite this, the Informal Sector (non-agricultural) employs over three million people. Many corporates offer products to the formal sector, the informal sector or both. The commercial margins are often very slim in the informal sector. This paper looks at the use of Internet of Things, Geographical Information Systems, and GeoHashes to provide business intelligence to merchants in the Informal Sector thereby helping them improve their competitive advantage.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127944304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zero-skipping in CapsNet. Is it worth it?","authors":"R. Sharifi, Pouya Shiri, A. Baniasadi","doi":"10.29007/cd8h","DOIUrl":"https://doi.org/10.29007/cd8h","url":null,"abstract":"Capsule networks (CapsNet) are the next generation of neural networks. CapsNet can be used for classification of data of different types. Today’s General Purpose Graphical Processing Units (GPGPUs) are more capable than before and let us train these complex networks. However, time and energy consumption remains a challenge. In this work, we investigate if skipping trivial operations i.e. multiplication by zero in CapsNet, can possibly save energy. We base our analysis on the number of multiplications by zero detected while training CapsNet on MNIST and FashionMNIST datasets.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129972711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}