{"title":"End-to-End System QoS Modeling based on Network Calculus: A Multi-Media Case Study","authors":"Xiao Hu, Zhonghai Lu","doi":"10.1145/3424311.3424320","DOIUrl":"https://doi.org/10.1145/3424311.3424320","url":null,"abstract":"Network Calculus has been used for formal modeling and analysis of timing properties, i.e., Quality-of-Service (QoS), in realtime embedded systems. Prior analyses often focus only on a particular aspect of an entire system such as scheduling algorithm, traffic shaping, or a hardware subsystem such as network-on-chip, leaving end-to-end system QoS analysis seldomly touched. Based on a video playback system, we intend to conduct an end-to-end system-level QoS modeling using network calculus. We build an abstract end-to-end service model for various software routines and hardware modules dealing with both computation and communication. In FPGA prototype experiments running real video clips, we show that the parameters in the service model can be measured and QoS-related operational details can be monitored for continuous assessment of QoS fulfillment at runtime.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133806166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Different RNN Variants to Generate Realist Reviews","authors":"Wuwei Ma, Jingwei Wu","doi":"10.1145/3424311.3424328","DOIUrl":"https://doi.org/10.1145/3424311.3424328","url":null,"abstract":"This project aims to implement LSTM and GRU to generate realistic text. First, some basic background information will be introduced. After that, the design of models will be presented, then the performance of different RNN variants will be compared. In addition, the time consumption also as a factor of performance to compare. At last, the reason for the difference in performance will be discussed.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"545 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116255958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Recommendation Strategies Integrating Emotional Tendency and User Influences","authors":"Chen Jing, Duan Liuqian, Zhang Hong","doi":"10.1145/3424311.3424314","DOIUrl":"https://doi.org/10.1145/3424311.3424314","url":null,"abstract":"At present, the topic model based on LDA as an information recommendation method has the defect of neglecting the emotional information in social platform. Therefore, a microblog user recommendation strategy I-TES (influence topic emotionality similarity model) is proposed which combines emotional orientation with user influence model in this paper. Firstly, the user's theme distribution and emotional tendency is obtained based on JST model, the JS distance is used to calculate the similarity of user's theme probability distribution, and the two is combined to get the user's interest similarity score. Secondly, the user's influence measurement indicators are summarized into microblog influence, user's activity and fan's influence, and the weights of the three indicators are calculated according to AHP(analytic hierarchy process). Finally, the combination of the two is used to obtain the final score as the recommendation result. The strategy is tested on Sina Weibo user data set, and the experiment shows that this strategy has higher recommendation accuracy than the traditional recommendation method.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":" 1055","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113946653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Machine Learning for Process Control in Semiconductor Manufacturing","authors":"Lei Wang, Yang Wang","doi":"10.1145/3424311.3424326","DOIUrl":"https://doi.org/10.1145/3424311.3424326","url":null,"abstract":"In this article, the authors attempt to describe the core quality inspection during semiconductor manufacturing in terms of production efficiency and yield. Special focus is therefore given to photolithography, which is the most critical step for the fabrication of wafer patterns in front-end processes. Further, machine learning approaches are demonstrated and their applicability in semiconductor manufacturing industry is discussed. Also, a technical concept regarding virtual metrology for advanced process control in semiconductor production is introduced as a potential utilization case. Finally, current status and future trends in technology as well as application are summarized based on authors' perspective in the concluding section.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114483764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Remodularization Using Tabu Search","authors":"Photjanat Janvattanavong, P. Muenchaisri","doi":"10.1145/3424311.3424321","DOIUrl":"https://doi.org/10.1145/3424311.3424321","url":null,"abstract":"One desired quality attribute of software is software modularity which is a degree to which the software is decomposed into loosely couple packages. Each software package consists of highly cohesive classes. When the software is modified due to software changes, the modularity of the software is affected. The software needs to be remodularized in order to maintain its modularity. This paper proposes an approach to remodularize the software using Tabu search for improving the modularity of the modified software. An evaluation is conducted with two examples and the results of a preliminary evaluation are reported.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128902569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection","authors":"Mubarak Albarka Umar, Zhanfang Chen, Yan Liu","doi":"10.1145/3424311.3424330","DOIUrl":"https://doi.org/10.1145/3424311.3424330","url":null,"abstract":"One of the key challenges of the machine learning (ML) based intrusion detection system (IDS) is the expensive computation time which is largely caused by the redundant, incomplete, and unrelated features contain in the IDS datasets. To overcome such challenges and ensure building efficient and more accurate IDS models, many researchers utilize preprocessing techniques such as normalization and feature selection, and a hybrid modeling approach is typically used. In this work, we propose a hybrid IDS modeling approach with an algorithm for feature selection (FS) and another for building the IDS. The FS method is a wrapper-based FS with a decision tree as the feature evaluator. Five selected ML algorithms are individually used in combination with the proposed FS method to build five IDS models using the UNSW-NB15 dataset. As a baseline, five more IDS models are built, in a single modeling approach, using the full features of the datasets. We evaluate the effectiveness of our proposed method by comparing it with the baseline models and also with state-of-the-art works. Our method achieves the best DR of 97.95% and proved to be quite effective in comparison to state-of-the-art works. We, therefore, recommend its usage especially in IDS modeling with the UNSW-NB15 dataset.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location Based Model For Prevention DNS Spoofing","authors":"Nabih T. Abdelmajid, A. Amin, S. A. Farhan","doi":"10.1145/3424311.3424329","DOIUrl":"https://doi.org/10.1145/3424311.3424329","url":null,"abstract":"Authentication is one of most important security issues that need to be addressed in any organizations. It enables them to keep their data secure by permitting only authenticated users to access their protected resources. Resources may include computer systems, networks, databases, websites and other network-based applications or services. Through observations, it has been noticed that the authentication factors - something you now, something you have and something you are - need to be rebuild and develop in-order to increase their level of authenticity. This paper proposes a new factor in authentication by integrating user's physical location using Global Position System (GPS). This proposal can be used to prevent the Domain name server (DNS) spoofing and replay attack. In addition, it adds more values with its applications in specific areas such as banking and government.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124122254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Gas Insulator Model on Large-scale Instruments and Equipment of Opening up and Sharing for State Key Laboratory","authors":"Xiang Zhao","doi":"10.1145/3424311.3424319","DOIUrl":"https://doi.org/10.1145/3424311.3424319","url":null,"abstract":"There is evidence that opening up and sharing large-scale instruments and equipment of state key laboratory plays a crucial role in regulating resources, reduce costs, maximize efficiency, etc. In which, the performance of insulator and insulation parts is an important factor in the large-scale instruments and equipment, and plays a key role in safety facility protection system. This paper proposed investigation of the gas insulator model in difference gases by developed a numerical model. Meanwhile, utilizing literature for verification and validation the present model. We got the good agreement results. Therefore, together with breakdown features of gases, they are can be clearly observed the trends. Base on this model, the more results can be obtained for practical application of the large-scale instruments and equipment of opening up and sharing for the state key Laboratory.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122678995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on an Improved Degree Influence Maximization Algorithm","authors":"Jing Chen, Xiaofang Wu, Xian Liu","doi":"10.1145/3424311.3424315","DOIUrl":"https://doi.org/10.1145/3424311.3424315","url":null,"abstract":"The problem of influence maximization is an important research topic in social networks. The problem is described as follows: under a specific propagation model, how to select a specified number of seed-node sets for message propagation, that the number of influence nodes reaches a maximum at the end of propagation. There are some imperfections in the existing algorithms. It may not estimate the influence of the node accurately, when the selected seed-nodes have overlapping influences and the edges in the network have different propagation probabilities. To solve this problem, an improved influence maximization algorithm APCA (Active Probability Coverage Algorithm) is proposed. Firstly, calculating influence of the node with the improved k-shell algorithm to select the first seed-node; Secondly, the activated-easily node is marked as covered status by the coverage threshold &thgr;, and the influence of the node is updated until a specified number of seed-nodes are selected; Finally, the CCA (Core Covering Algorithm), MaxDegree (Maximum Degree Algorithm), IRIE algorithm (Impact Ranking Impact Estimation) and APCA were compared, and analyzed with three real data sets from the website. The experimental results show that under the IC model (Independent Cascade Model) and the WC model (Weight Cascade Model), the influence of APCA is better than the other three algorithms.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131829741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Citation Network Analysis for Journal Selection of University Library","authors":"Nopanan Pongitthidej, V. Muangsin","doi":"10.1145/3424311.3424324","DOIUrl":"https://doi.org/10.1145/3424311.3424324","url":null,"abstract":"Every academic year, a university library must subscribe tons of journals to provide the best resource for the students and researchers. However, subscribed journals have been used unequally and some relevant journals are not subscribed. Therefore, the library needs supporting information about usedness and demand of journals for efficient collection management. In this paper, citation network analysis is applied to analyze the articles published by university researchers and their references. The result is two overlapping lists of journals that are recommended for the library collection i.e. (a) journals that the university researchers have published in and (b) journals that the university researchers have cited. The importance of the journals is scored based on multiple centrality metrics. We used articles published by Chulalongkorn University (CU) researchers between 2016 and 2018 to analyze and compared the results with articles publishing in 2019 to validate the proposed method. The results show that top journals have not changed much over the years. The experimental results show that the ranked journal lists created from publication data of previous years closely matches the list produced from publication data in the subsequent year. The proposed model can help the university library to understand usedness and demand of journals and give suggestion of journals that should be included in the university library collection based on past publication data. The journal lists can also help researchers to choose journals for publication and reference.","PeriodicalId":330920,"journal":{"name":"Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115137314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}