2021 2nd International Conference on Computing and Data Science (CDS)最新文献

筛选
英文 中文
[Copyright notice] (版权)
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/cds52072.2021.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/cds52072.2021.00003","DOIUrl":"https://doi.org/10.1109/cds52072.2021.00003","url":null,"abstract":"","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115865357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Fast Fourier Transform in A Class of Two-point Boundary Value Problem 快速傅里叶变换在一类两点边值问题中的应用
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00013
Boxun Feng
{"title":"Application of Fast Fourier Transform in A Class of Two-point Boundary Value Problem","authors":"Boxun Feng","doi":"10.1109/CDS52072.2021.00013","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00013","url":null,"abstract":"Nowadays, Fast Fourier Transform (FFT) is applied in various industries, which facilitates the development of human society. Besides, this algorithm is improving continuously in the meantime. This paper is to introduce the historical background, mathematical theory and several applications of Fast Fourier Transform (FFT), and to explore a method for solving linear two-point boundary value problem using this algorithm in details. Finally, based on the above, the analysis and discussion of the results is shown.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115871453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of biometric recognition in the COVID-19 period COVID-19期间生物特征识别评估
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00049
Yicheng Zhou
{"title":"Evaluation of biometric recognition in the COVID-19 period","authors":"Yicheng Zhou","doi":"10.1109/CDS52072.2021.00049","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00049","url":null,"abstract":"The new coronavirus is causing a global health crisis. Many biometric authentication methods have been affected in this epidemic. In this study, we first give a comprehensive evaluation of the COVID-19's impact on various biometric authentication methods and provide an alternative solution based on periocular recognition. The experiments on the Ethnic-ocular dataset show that the Siamese structure could provide a better performance for periocular recognition","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123312842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Unsupervised Clustering Approaches for Customer Segmentation 客户细分的比较无监督聚类方法
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00097
Asmin Alev Aktas, Okan Tunali, Ahmet Tugrul Bayrak
{"title":"Comparative Unsupervised Clustering Approaches for Customer Segmentation","authors":"Asmin Alev Aktas, Okan Tunali, Ahmet Tugrul Bayrak","doi":"10.1109/CDS52072.2021.00097","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00097","url":null,"abstract":"Machine learning-driven studies to get potent insights about customers are essential for the business world to grow as they achieve smarter in marketing and sales activities. Finding the consociate patterns of customer interaction activities leads to finding sensible segments. By this, strategists can reach out to different groups of customers with customized services, offers and plans. However, although clustering algorithms are reliable by virtue of them being competent studies, not all of them fit the studied domain. In this study, six well-known clustering algorithms with different parameters are applied to real-life customer purchase history data. The outcomes are compared, and the density distribution of data features in created clusters are visualized. Thus, it is possible to see the role of each selected feature on the differentiation of clusters. The cluster labels of data points (customers) are mapped in pairs of algorithms. As a result, the similarities and differences in clusters created by different algorithms are more straightforward to catch. Moreover, in addition to labeling data points with class labels, a hybrid approach is presented to obtain information about class label probabilities by fitting the support vector classification model. The proposed study gives promising results in understanding how different clustering algorithms fit the customer data and stands out with multi-sides evaluation and comparison experiments.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"100 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ensemble Learning in Credit Card Fraud Detection Using Boosting Methods 集成学习在信用卡欺诈检测中的应用
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00009
Haonan Feng
{"title":"Ensemble Learning in Credit Card Fraud Detection Using Boosting Methods","authors":"Haonan Feng","doi":"10.1109/CDS52072.2021.00009","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00009","url":null,"abstract":"With the continuous prosperity of the financial market, credit card volume has always been booming these years. The fraud businesses are also raising rapidly. Under this circumstance, fraud detection has become a more and more valuable problem. But the proportion of the fraud is absolutely much lower than the genius transaction, so the imbalance dataset makes this problem much more challenging. In this paper we mainly tell how to cope with the credit card fraud detection problem by using boosting methods and also gave a contribution of the brief comparison between these boosting methods.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption 混合加密概述与分析:对称加密与非对称加密的结合
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00111
Qixin Zhang
{"title":"An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption","authors":"Qixin Zhang","doi":"10.1109/CDS52072.2021.00111","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00111","url":null,"abstract":"In the current scenario, various forms of information are spread everywhere, especially through the Internet. A lot of valuable information is contained in the dissemination, so security issues have always attracted attention. With the emergence of cryptographic algorithms, information security has been further improved. Generally, cryptography encryption is divided into symmetric encryption and asymmetric encryption. Although symmetric encryption has a very fast computation speed and is beneficial to encrypt a large amount of data, the security is not as high as asymmetric encryption. The same pair of keys used in symmetric algorithms leads to security threats. Thus, if the key can be protected, the security could be improved. Using an asymmetric algorithm to protect the key and encrypting the message with a symmetric algorithm would be a good choice. This paper will review security issues in the information transmission and the method of hybrid encryption algorithms that will be widely used in the future. Also, the various characteristics of algorithms in different systems and some typical cases of hybrid encryption will be reviewed and analyzed to showcase the reinforcement by combining algorithms. Hybrid encryption algorithms will improve the security of the transmission without causing more other problems. Additionally, the way how the encryption algorithms combine to strength the security will be discussed with the aid of an example.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Review of Deep Learning-based Approaches for COVID-19 Detection 基于深度学习的COVID-19检测方法综述
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00069
Jinyang Liu
{"title":"Review of Deep Learning-based Approaches for COVID-19 Detection","authors":"Jinyang Liu","doi":"10.1109/CDS52072.2021.00069","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00069","url":null,"abstract":"As the COVID-19 pandemic broke out worldwide, many deep learning-based methods are proposed to assist the doctors in COVID-19 diagnosis. This paper introduces open-source datasets of COVID-19 images and tests state-of-the-art COVID-19 diagnosis methods to provide a comprehensive review of these technologies. According to the experimental results, this paper introduces two interesting observations: 1) deep learning-based methods focus on big visual features rather than small detailed features; 2) the convolutional neural networks pay attention to the region of Lung Ultrasound images, which is also considered as crucial observation region from doctors' perspectives. These observations prove the efficiency of deep-learning solutions since they can learn essential doctors' COVID-19 diagnosis rules.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Annotated Corpus of Comments and Basic Semantic Analysis 注释语料库与基本语义分析
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00064
Semih Çelik, Gülsah Tümüklü Özyer
{"title":"Annotated Corpus of Comments and Basic Semantic Analysis","authors":"Semih Çelik, Gülsah Tümüklü Özyer","doi":"10.1109/CDS52072.2021.00064","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00064","url":null,"abstract":"This article presents an annotated corpus of Turkish comment texts gathered from employees. Special attention is given to neutrality of paragraphs in the corpus and quality of the annotation. We employ the majority voting of the annotators. We describe the details of the dataset, the annotation methodology and the experiments with basic methods to investigate the corpus. The corpus has three classes, positive, negative and neutral.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing User Behavior Patterns in Casual Games Using Time Series Clustering 利用时间序列聚类分析休闲游戏中的用户行为模式
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00070
Yiheng Zhou, Zhipeng Hu, Yongcheng Liu
{"title":"Analyzing User Behavior Patterns in Casual Games Using Time Series Clustering","authors":"Yiheng Zhou, Zhipeng Hu, Yongcheng Liu","doi":"10.1109/CDS52072.2021.00070","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00070","url":null,"abstract":"User behavior pattern classification based on time series clustering is playing an increasingly important role in the game industry. However, user behavior and data performance are quite different in lightweight casual games, compared with those in MMORPGs (Massively Multiplayer Online Role-Playing Games) that many research institutes studied before. With the development of mobile devices and the fragmentation of users' time, both the number of users and the importance in today's gaming industry for casual games jump rapidly. The unique user data performance, such as high sparsity, poses new challenges to clustering time-series data of user behavior based on this kind of game. In this paper, we take UNO!, a mobile card game with hundreds of millions of users, as our research object, and propose an improved time series similarity measurement via the smoothed sequence Euclidean distance to realize clustering analysis of user behavior patterns. In this analysis, we purposefully use the user feature sequence that is more consistent with the game feature. Finally, we explore the correlation of clustering results with user payment, and propose a visualization scheme that can comprehensively show users' payment behavior, including short-term and long-term, and its relationship with users' game behavior.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129333258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-Inflated Embeddings to Analyze Homicide Occurrence Patterns 零膨胀嵌入分析凶杀发生模式
2021 2nd International Conference on Computing and Data Science (CDS) Pub Date : 2021-01-01 DOI: 10.1109/CDS52072.2021.00065
Hamadys L. Benavides Gutiérrez, Óscar Gómez, Mateo Dulce Rubio, Paula Rodríguez Díaz, Álvaro J. Riascos Villegas, J. S. M. Pabón
{"title":"Zero-Inflated Embeddings to Analyze Homicide Occurrence Patterns","authors":"Hamadys L. Benavides Gutiérrez, Óscar Gómez, Mateo Dulce Rubio, Paula Rodríguez Díaz, Álvaro J. Riascos Villegas, J. S. M. Pabón","doi":"10.1109/CDS52072.2021.00065","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00065","url":null,"abstract":"Analyzing crime data is a challenging task, especially homicide data due to the low-frequency and spatial sparsity of the occurrences. In this work, we use Zero Inflated Exponential Family Embeddings (ZIE) and Autoencoders to analyze spatial patterns in the capital city of Colombia, Bogotá. We obtain low dimensional embeddings of spatial units of the city, cuadrantes, and analyze the clustering assignments they produce. We observe that the ZIE model generally provides useful insights about the different types of cuadrantes in the city as they can recover their spatial characteristics. Clustering the embeddings corresponds to an intuitive classification of high, medium, and low homicide-rate. This classification can be interpreted through spatial characteristics of the cuadrantes.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133650975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信