International Conference on Computers and Their Applications最新文献

筛选
英文 中文
Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following "STEAMS" Methodology 基于“steam”方法的巧克力产品类型聚类缺失值插值优化神经网络算法
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/4jgz
Mason Chen, Chen Chen
{"title":"Optimize Neural Network Algorithm of Missing Value Imputation for Clustering Chocolate Product Types Following \"STEAMS\" Methodology","authors":"Mason Chen, Chen Chen","doi":"10.29007/4jgz","DOIUrl":"https://doi.org/10.29007/4jgz","url":null,"abstract":"A “STEAMS” (Science, Technology, Engineering, Artificial Intelligence, Math, Statistics) approach was conducted to handle the missing value imputation of clustering Chocolate Science patterns. Hierarchical clustering and dendrogram analysis were utilized to cluster the commercial chocolate products into different product groups which can indicate the nutrition compositions and product health. To further handle the missing value imputation, a neural network algorithm was utilized to predict the missed Cocoa percentage (Cocoa%), based on other available nutritional components. The Hyperbolic Tangent activation function was used to create the hidden layer with three nodes. Neural networks are very flexible models and tend to over-fit data. A Definitive Screening Design (DSD) was conducted to optimize the neural setting in order to minimize the over-fit concern. Both the Goodness Fit of Training set and Validation set can reach 99% R-Square. The Profiler Sensitivity analysis has shown that the Chocolate Type and Vitamin C are the most sensitive factors to predict the missed Cocoa%. The results also indicated that the “Fruit” Chocolate can be added as the 4 th Chocolate Type. The Neural Black-Box algorithm revealed the hidden Chocolate Science and Product. This paper demonstrates the power of using the Engineering Design of Experiment (DOE) and Neural Network algorithm through STEAMS for the particular application of modeling chocolate products.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process 现代化进程下遗留面向对象系统实现平台视图发现的双峰方法
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/rbp7
Hamza Abdelmalek, Gino Chénard, I. Khriss, A. Jakimi
{"title":"A Bimodal Approach for the Discovery of a View of the Implementation Platform of Legacy Object-Oriented Systems under Modernization Process","authors":"Hamza Abdelmalek, Gino Chénard, I. Khriss, A. Jakimi","doi":"10.29007/rbp7","DOIUrl":"https://doi.org/10.29007/rbp7","url":null,"abstract":"Organizations are highly dependent on their software in carrying out their daily activities. Unfortunately, the repeated changes that are applied to these systems make their evolution difficult. This evolution may be necessary to maintain the software, replace or upgrade it. In the case of complex and poorly documented legacy systems, modernization is the only feasible solution to achieving the evolution goals. The OMG (Object Management Group) consortium created the Architecture-Driven Modernization (ADM) initiative to cope with the challenges of modernization. This initiative proposes, among other things, modernization through model-driven engineering (MDE). In this context, the modernization of a legacy system, not developed in an MDE environment, begins with its migration towards this type of environment. This migration raises the problem of finding the models necessary for the use of MDE representing this system. In this paper, we present a new bimodal approach to ADM modernization by enabling automatic and interactive modes to discover a view of the implementation platform of a legacy object-oriented system. Also, we present the key ideas of the algorithms behind this discovery process. Finally, we describe our prototype tool that implements our approach. This tool has been validated on several systems written in C# and Java languages. EPiC Series in Computing Volume 69, 2020, Pages 98–111 Proceedings of 35th International Conference on Computers and Their Applications G. Lee and Y. Jin (eds.), CATA 2020 (EPiC Series in Computing, vol. 69), pp. 98–111","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125313993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mapping and visualization of publication networks of public university faculty in computer science and electrical engineering 公立大学计算机科学与电子工程学院出版网络的映射与可视化
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/dk44
Conor Carroll, Nupur Garg, Theresa Migler, B. E. Walker, Zoë J. Wood
{"title":"Mapping and visualization of publication networks of public university faculty in computer science and electrical engineering","authors":"Conor Carroll, Nupur Garg, Theresa Migler, B. E. Walker, Zoë J. Wood","doi":"10.29007/dk44","DOIUrl":"https://doi.org/10.29007/dk44","url":null,"abstract":"We present our process and development of a web-based system to explore the publication networks of faculty in California public universities in the fields of computer science and electrical engineering. Our project explores collaboration networks in the fields of computer science and electrical engineering with a focus on publication networks and an analysis of these collaborations with a focus on geospatial organization (which institutions are collaborating with which other institutions). We present our data gathering process, which relies on the Scopus[9] database (Scopus represents a “comprehensive overview of the world’s scientific research output across all disciplines”), and we present the development of a web-based tool using python and the Google Maps API [12] in order to allow visualizations and explorations of geospatial structures of the publications networks. These visualizations drove further network analysis, which we present here as well.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Threats and Alert Analytics in Autonomous Vehicles 自动驾驶汽车中的威胁和警报分析
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/j6h1
A. Rastogi, K. Nygard
{"title":"Threats and Alert Analytics in Autonomous Vehicles","authors":"A. Rastogi, K. Nygard","doi":"10.29007/j6h1","DOIUrl":"https://doi.org/10.29007/j6h1","url":null,"abstract":"Autonomous vehicles or self-driving cars emerged with a promise to deliver a driving experience that is safe, secure, law-abiding, alleviates traffic congestion and reduces traffic accidents. These self-driving cars predominantly rely on wireless technology, vehicular ad-hoc networks (VANETs) and Vehicle to Vehicle (V2V) networks, Road Side Units (RSUs), Millimeter Wave radars, light detection and ranging (LiDAR), sensors and cameras, etc. Since these vehicles are so dexterous and equipped with such advanced driver assistance technological features, their dexterity invites threats, vulnerabilities and hacking attacks. This paper aims to understand and study the technology behind these self-driving cars and explore, identify and address popular threats, vulnerabilities and hacking attacks to which these cars are prone. This paper also establishes a relationship between these threats, trust and reliability. An analysis of the alert systems in self-driving cars is also presented. keywords: Self-driving cars, advanced driver assistance systems, trust, reliability, ethics, security, threats, vulnerabilities","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127331090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems 对抗性机器学习:将机器学习应用于现有网络安全系统的困难
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/3xbb
Nick Rahimi, Jordan Maynor, B. Gupta
{"title":"Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems","authors":"Nick Rahimi, Jordan Maynor, B. Gupta","doi":"10.29007/3xbb","DOIUrl":"https://doi.org/10.29007/3xbb","url":null,"abstract":"Machine learning is an attractive tool to make use of in various areas of computer science. It allows us to take a hands-off approach in various situations where previously manual work was required. One such area machine learning has not yet been applied entirely successfully is cybersecurity. The issue here is that most classical machine learning models do not consider the possibility of an adversary purposely attempting to mislead the machine learning system. If the possibility that incoming data will be deliberately crafted to mislead and break the machine learning system, these systems are useless in a cybersecurity setting. Taking this into account may allow us to modify existing security systems and introduce the power of machine learning to them.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133940429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Study of Machine Learning Algorithms on Email Spam Classification 垃圾邮件分类的机器学习算法研究
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/qshd
N. Sutta, Ziping Liu, Xuesong Zhang
{"title":"A Study of Machine Learning Algorithms on Email Spam Classification","authors":"N. Sutta, Ziping Liu, Xuesong Zhang","doi":"10.29007/qshd","DOIUrl":"https://doi.org/10.29007/qshd","url":null,"abstract":"Despite the fact that different techniques have been developed to filter spam, due to the spammer’s rapid adoption of new spam detection techniques, we are still overwhelmed with spam emails. Currently, machine learning techniques are the most effective ways to classify and filter spam emails. In this paper, a comprehensive comparison and analysis of the performance of various classification models on the 2007 TREC Public Spam Corpus are exhibited in various cases of without or with NGrams as well as using separate or combined datasets. It is shown that the inclusion of the N-Grams in the pre-processing phase provides high accuracy results for classification models in most of the cases, and the models using the split approach with combined datasets give better results than models using the separate dataset.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115729236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Metrics and Indicators to evaluate the degree of transformation to Smart City of a city. An Ad-Hoc Quality Model 衡量一个城市向智慧城市转型程度的度量和指标。Ad-Hoc质量模型
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/xcq9
N. Debnath, M. Peralta, C. Salgado, Luis A. C. Roque, D. Riesco, G. Montejano, Mouna Mazzi
{"title":"Metrics and Indicators to evaluate the degree of transformation to Smart City of a city. An Ad-Hoc Quality Model","authors":"N. Debnath, M. Peralta, C. Salgado, Luis A. C. Roque, D. Riesco, G. Montejano, Mouna Mazzi","doi":"10.29007/xcq9","DOIUrl":"https://doi.org/10.29007/xcq9","url":null,"abstract":"The extreme levels of intensity with which people live in large urban centers began to affect the productivity and quality of life of cities and their inhabitants, some of which have reached extremes close to collapse, as is the case of traffic congestion in the main cities of the world. On the other hand, from digital innovation and economic development, it is necessary to provide intelligent solutions to current problems, promoting the entrepreneurial ecosystem and the collaborative economy. Each government should administer, manage and update information from each region, and distribute it in the most convenient way to each company or agency that is part of a smart city. To achieve smart cities, we must train digital citizens and take into account the accessibility conditions provided by technology. For this, the implementation of Internet of Things (IoT) at all possible levels is of the utmost importance. From these points of view, mobility has become a central issue of urban development. Its relationship with sustainability issues and its ability to generate competitiveness and quality of life, puts us before the need to rethink its future. These are certain considerations to include in possible models of quality that allow to study the degree of intelligence of the cities. When talking about indicators or metrics, it begins to pose a problem of being able to generalize / extend each of these measures. In this line of research, a board of metrics and indicators has been defined that are applicable to an ad hoc quality model whose","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information 基于临床、血流动力学和形态学信息的梯度增强决策树预测脑动脉瘤破裂
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/jjwt
Toshiyuki Haruhara, Hideto Ohgi, Masaaki Suzuki, H. Takao, Takashi Suzuki, S. Fujimura, T. Ishibashi, M. Yamamoto, Y. Murayama, H. Ohwada
{"title":"Predicting Cerebral Aneurysm Rupture by Gradient Boosting Decision Tree using Clinical, Hemodynamic, and Morphological Information","authors":"Toshiyuki Haruhara, Hideto Ohgi, Masaaki Suzuki, H. Takao, Takashi Suzuki, S. Fujimura, T. Ishibashi, M. Yamamoto, Y. Murayama, H. Ohwada","doi":"10.29007/jjwt","DOIUrl":"https://doi.org/10.29007/jjwt","url":null,"abstract":"Stroke is a serious cerebrovascular condition in which brain cells die due to an abrupt blockage of arteries supplying blood and oxygen or when a blood vessel bursts or ruptures and causes bleeding in the brain. Because the onset of stroke is very sudden in most people, prevention is often difficult. In Japan, stroke is one of the major causes of death and is associated with high medical costs; these problems are exacerbated by the aging population. Therefore, stroke prediction and treatment are important. The incidence of stroke may be avoided by preventive treatment based on the patient’s risk of stroke. However, since judging the risk of stroke onset is largely dependent upon the individual experience and skill of the doctor, a highly accurate prediction method that is independent of the doctor’s experience and skills is necessary. This study focuses on a predictive method for subarachnoid hemorrhage, which is a type of stroke. LightGBM was used to predict the rupture of cerebral aneurysms using a machine learning model that takes clinical, hemodynamic and morphological information into account. This model was used to analyze samples from 338 cerebral aneurysm cases (35 ruptured, 303 unruptured). Simulation of cerebral blood-flow was used to calculate the hemodynamic features while the surface curvature was extracted from the 3D blood-vessel-shape data as morphological features. This model yielded a sensitivity of 0.77 and a specificity of 0.83.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127157520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using GeoHashes to Combine IOT and GIS to Provide Business Intelligence to the Informal Sector in South Africa 利用geohash将物联网和地理信息系统相结合,为南非的非正规部门提供商业智能
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/rssv
L. Butgereit
{"title":"Using GeoHashes to Combine IOT and GIS to Provide Business Intelligence to the Informal Sector in South Africa","authors":"L. Butgereit","doi":"10.29007/rssv","DOIUrl":"https://doi.org/10.29007/rssv","url":null,"abstract":"South Africa has one of the highest GINI coeefficient indicating a high degree of inequality in the country. There is also extreme unemployment with the expanded unemployment rate being 38.3% and in some subsections of the economy as high as 68.3%. Despite this, the Informal Sector (non-agricultural) employs over three million people. Many corporates offer products to the formal sector, the informal sector or both. The commercial margins are often very slim in the informal sector. This paper looks at the use of Internet of Things, Geographical Information Systems, and GeoHashes to provide business intelligence to merchants in the Informal Sector thereby helping them improve their competitive advantage.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127944304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Zero-skipping in CapsNet. Is it worth it? CapsNet中的跳零。值得吗?
International Conference on Computers and Their Applications Pub Date : 2020-03-09 DOI: 10.29007/cd8h
R. Sharifi, Pouya Shiri, A. Baniasadi
{"title":"Zero-skipping in CapsNet. Is it worth it?","authors":"R. Sharifi, Pouya Shiri, A. Baniasadi","doi":"10.29007/cd8h","DOIUrl":"https://doi.org/10.29007/cd8h","url":null,"abstract":"Capsule networks (CapsNet) are the next generation of neural networks. CapsNet can be used for classification of data of different types. Today’s General Purpose Graphical Processing Units (GPGPUs) are more capable than before and let us train these complex networks. However, time and energy consumption remains a challenge. In this work, we investigate if skipping trivial operations i.e. multiplication by zero in CapsNet, can possibly save energy. We base our analysis on the number of multiplications by zero detected while training CapsNet on MNIST and FashionMNIST datasets.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129972711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信