2020 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

筛选
英文 中文
Proposed Design for Effectively Expand Adaptive-ticks Feature in the Linux Kernel to Full Tickless Function 一种有效扩展Linux内核自适应滴答特性为完全无滴答功能的设计方案
Abdullah Aljuhni, Shaji Yusuf, C. Edward Chow, Oluwatobi Akanbi, Amer Aljaedi
{"title":"Proposed Design for Effectively Expand Adaptive-ticks Feature in the Linux Kernel to Full Tickless Function","authors":"Abdullah Aljuhni, Shaji Yusuf, C. Edward Chow, Oluwatobi Akanbi, Amer Aljaedi","doi":"10.1109/CSCI51800.2020.00233","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00233","url":null,"abstract":"Operating systems use timers available in the processor to trigger timer interrupts that help the kernel manage several tasks, ranging from time management of system software to scheduling and task switching. Traditionally, operating systems program the system timer to tick at regular intervals ranging from 1 ms to 100 ms, depending on the required system response and type of load. The periodic tick timer is the simplest and most common way of managing the system’s management activities. However, advancements in microprocessors and operating system scheduler allows for a more efficient and better-performing solution by eliminating regular timer interrupts. In this research, we illustrate the implementation of Adaptive-ticks feature and analyze the performance of Adaptive-ticks scheduler in Linux kernel version 4.0.9. We also propose a new full Adaptive-ticks design to support multiple tasks in the ready queue. This new proposed design extends the current Adaptive-ticks feature to improve performance and power efficiency by getting rid of unwanted interrupts.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134577666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing a composite platform for operational efficiency 设计一个提高作业效率的复合平台
Wangjie Xu, T. Fujimoto, Ziran Fan
{"title":"Designing a composite platform for operational efficiency","authors":"Wangjie Xu, T. Fujimoto, Ziran Fan","doi":"10.1109/CSCI51800.2020.00263","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00263","url":null,"abstract":"This paper focuses on the problem of in-house split information systems and the resulting decline in operational efficiency. According to the result of the authors' investigation for the business environment of small and medium-sized enterprises, the simplification of information and communication among employees has become an issue to be solved in many enterprises today in order to improve operational efficiency. Based on this, in this paper, we design a composite platform that integrates information tools commonly used in companies. By covering all information-related operations with one platform, we support improvement of companies’ operational efficiency. We also show the effectiveness of the proposed platform by comparing it with existing information systems. We mainly examine the design concept of the composite platform and its construction requirements.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Tor Website Fingerprinting over Time using Tree Ensemble Models 基于树集成模型的Tor网站指纹识别性能分析
Hyoung-Jin Oh, Donghoon Kim, Won-gyum Kim, Doosung Hwang
{"title":"Performance Analysis of Tor Website Fingerprinting over Time using Tree Ensemble Models","authors":"Hyoung-Jin Oh, Donghoon Kim, Won-gyum Kim, Doosung Hwang","doi":"10.1109/CSCI51800.2020.00097","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00097","url":null,"abstract":"Tor (The Onion Router) ensures network anonymity by encrypting contents through multiple relay nodes. Recent studies on website fingerprinting (WF) showed that websites can be identified with high accuracy by analyzing traffic data. However, websites are changing over time by updating contents, which can significantly reduce the accuracy of WF attacks. This study analyzes the performance over time by using ensemble models with excellent WF attack performance. The experiment are conducted in two cases with the initial model. The not updated analyzes the accuracy of models made from initial data over time, whereas the updated adds data that has changed over time to update the model to analyzes the accuracy. The average accuracy of the initial ensemble models is over 90.0% and the Rotation Forest algorithm shows high performance of 93.5%. Comparing the models trained after 30 days with the initial model, the classification performance dropped in both cases; the not updated dropped by more than 30.0% and the updated dropped by about 10.0%. The experimental results suggest that WF using machine learning may require model learning on a regular basis.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Replay Spoof Attack Detection using Deep Neural Networks for Classification 基于深度神经网络分类的重放欺骗攻击检测
Salahaldeen Duraibi, Wasim Alhamdani, Frederick T. Sheldon
{"title":"Replay Spoof Attack Detection using Deep Neural Networks for Classification","authors":"Salahaldeen Duraibi, Wasim Alhamdani, Frederick T. Sheldon","doi":"10.1109/CSCI51800.2020.00036","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00036","url":null,"abstract":"In this paper, we explore the use of the deep learning approach for replay spoof detection in speaker verification systems. Automatic speaker verifications (ASVs) can be easily spoofed by previously recorded genuine speech. In order to counter the issues of spoofing, detecting spoofing attacks play an important role. Hence, we consider the detection of replay attack spoofing that is the most easily accomplished spoofing attack. In this light, we propose a deep neural network-based (DNN) classifier using a hybrid feature from Mel-frequency cepstral coefficient (MFCC) and constant Q cepstral coefficient (CQCC). Several experiments were conducted on the latest version of ASVspoof 2017 dataset. The results are compared with a base line system that uses the Gaussian mixture model (GMM) classifier with different features that include MFCC, CQCC, and the hybrid feature of the two. The experiment results reveal that the DNN classifier outperforms the conventional GMM classifier. It was found that the hybrid-based features are superior to single features, such as CQCC and MFCC in terms of equal error rate (ERR). In addition, like many previous researchers have found, it turned out that high-frequency regions of speech utterance convey much more discriminative information for replay attack detection.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Behavior-based Outlier Detection for Indoor Environment 基于行为的室内环境异常点检测
Shinjin Kang, Sookyun Kim
{"title":"Behavior-based Outlier Detection for Indoor Environment","authors":"Shinjin Kang, Sookyun Kim","doi":"10.1109/CSCI51800.2020.00135","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00135","url":null,"abstract":"In this paper, we introduce a system that can detect the space outlier utilization of residents in indoor environment at low cost. Our system facilitates autonomous data collection from mobile app logs and the Google app server and generates a high-dimensional dataset required to detect outlier behaviors. For this, we used density-based clustering algorithm with t-distributed stochastic neighbor embedding (t-SNE). Our system enables easy acquisition of large volumes of data required for outlier detection. Our methodology can assist spatial analysis for indoor environments housing residents and help reduce the cost of space utilization feedback.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Serde to Serialize and Deserialize DIS PDUs 使用Serde对DIS pdu进行序列化和反序列化
Noah W. Scott, D. Hodson, Richard Dill, M. Grimaila
{"title":"Using Serde to Serialize and Deserialize DIS PDUs","authors":"Noah W. Scott, D. Hodson, Richard Dill, M. Grimaila","doi":"10.1109/CSCI51800.2020.00266","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00266","url":null,"abstract":"Serialization is the process of translating a data structure into a format that can be stored and/or transmitted, and then subsequently reconstructed at a later time to create an identical clone of the original. The use of data serialization assures data objects can be transmitted, stored, and reliably reconstructed across differing computer architectures, even with different data type sizes or endianness, with no additional effort.Serializing the data in an architecture-independent format prevents the problems of byte ordering, memory layout, or representing data structures in different programming languages. This is especially important in the context of live, virtual, and constructive (LVC) simulation environments where multiple geographically separated computers, each with many independent threads, are connected and must communicate with as little latency as possible to remain near \"real-time\" like in terms of responsiveness.In this paper, we demonstrate the use of Serde, a Rust-based systems programming language crate, to serialize and deserialize IEEE standard Distribute Interactive Simulation (DIS) Protocol Data Units (PDUs) to support DIS-based network interoperability. The results show that Serde is an efficient mechanism for serialization/deserialization when using the inherently safe Rust programming language.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Density-Based Server Placement for Collaborative Virtual Services 基于密度的协同虚拟服务服务器布局
Sakir Yucel
{"title":"Density-Based Server Placement for Collaborative Virtual Services","authors":"Sakir Yucel","doi":"10.1109/CSCI51800.2020.00242","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00242","url":null,"abstract":"The boundaries on different domains are blurring as corporations and infrastructure providers are collaborating to offer end-to-end services over the networks and infrastructures of various network, service, cloud, content delivery and other infrastructure providers as well as the customer premises. To capture opportunities and shine in competitive service market, infrastructure and service providers need to excel in addressing the changing customer requirements and in the operations and management of the resources. They should welcome effective collaboration with other network and infrastructure providers in delivering quality services to customers. Effective sharing of the infrastructure resources is essential in meeting the customer demands and reducing the cost. Server placement problem for end-to-end virtual services becomes a crucial optimization challenge for providers in such collaborative environments. We formulate the collaborative virtual server placement problem and suggest density-based clustering algorithms to address this problem.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sensor-Based Air Pollution Prediction Using Deep CNN-LSTM 基于传感器的深度CNN-LSTM空气污染预测
Kabir Nagrecha, Pratyush Muthukumar, Emmanuel Cocom, Jeanne Holm, Dawn Comer, Irene Burga, M. Pourhomayoun
{"title":"Sensor-Based Air Pollution Prediction Using Deep CNN-LSTM","authors":"Kabir Nagrecha, Pratyush Muthukumar, Emmanuel Cocom, Jeanne Holm, Dawn Comer, Irene Burga, M. Pourhomayoun","doi":"10.1109/CSCI51800.2020.00127","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00127","url":null,"abstract":"The devastating impacts of air pollution have be-come more and more evident in recent years. As our measurement technologies improve, we gain better insight into the true impact of this deadly, yet often ignored, threat. The first step in reducing the damages caused by this problem is being able to analyze and predict its patterns. The problem of predicting air quality and the presence of particulate matter lies in the nature of the data needed to create an accurate system. The sheer number of factors affecting air quality mean that previously proposed approaches often utilize a great many sources of data, aiming to incorporate images, wind graphs, traffic information, and more. Yet in truth, most areas outside large metropolises lack ready access to high-quality data, preventing them from ever implementing an effective system. We propose a system utilizing a 1-D deep convolutional neural network to analyze past sensor readings and predict air pollutant concentrations up to a day in the future at a 3-hour resolution. We specifically developed this model for predicting PM2.5 values. The system receives PM2.5 sensor values and discovers temporal pattern in the data, which will be later used for prediction. By removing the dependency on complex data inputs, the system becomes accesible and easily implementable for any region. Despite this simplified approach, the results are comparable to — and often better than — any current state-of-the-art predictive systems in this domain.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115929970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Unsupervised Learning with Word Embeddings Captures Quiescent Knowledge from COVID-19 Drugs Literature 使用词嵌入的无监督学习从COVID-19药物文献中捕获静态知识
Tasnim Gharaibeh, E. Doncker
{"title":"Unsupervised Learning with Word Embeddings Captures Quiescent Knowledge from COVID-19 Drugs Literature","authors":"Tasnim Gharaibeh, E. Doncker","doi":"10.1109/CSCI51800.2020.00081","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00081","url":null,"abstract":"As COVID-19 patients flood hospitals worldwide, physicians are trying to search for effective antiviral therapies to save lives. However, there is currently a lack of proven effective medications against COVID-19. Multiple COVID-19 vaccine trials and treatments are underway, but yet need more time and testing. Furthermore, the SARS-CoV-2 virus that causes COVID-19 replicates poorly in multiple animals, including dogs, pigs, chickens, and ducks, which limits preclinical animal studies. We built an unsupervised deep learning model (CDVec) to produce word-embeddings using word2vec from a corpus of articles selectively focusing on COVID-19 candidate drugs that appeared in the literature to identify promising target drugs that could be used in COVID-19 treatment.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117066475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Next Generation of Gallery Sharing in VR VR中的下一代画廊共享
W. Phillips, L. Deligiannidis
{"title":"Next Generation of Gallery Sharing in VR","authors":"W. Phillips, L. Deligiannidis","doi":"10.1109/CSCI51800.2020.00313","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00313","url":null,"abstract":"The use of digital photo albums, social media posts, and embedded videos connect people closer to their memories. We believe the next generation of visual albums will immerse individuals through modern virtual reality technologies. This paper examines new methods for enhancing photo albums and visual content; achieved in highly interactive and realistic environments where users are presented with interactable frames, 360 imagery, videos, and dynamic exhibits.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114527609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信