{"title":"[Copyright notice]","authors":"","doi":"10.1109/cds52072.2021.00003","DOIUrl":"https://doi.org/10.1109/cds52072.2021.00003","url":null,"abstract":"","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115865357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Fast Fourier Transform in A Class of Two-point Boundary Value Problem","authors":"Boxun Feng","doi":"10.1109/CDS52072.2021.00013","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00013","url":null,"abstract":"Nowadays, Fast Fourier Transform (FFT) is applied in various industries, which facilitates the development of human society. Besides, this algorithm is improving continuously in the meantime. This paper is to introduce the historical background, mathematical theory and several applications of Fast Fourier Transform (FFT), and to explore a method for solving linear two-point boundary value problem using this algorithm in details. Finally, based on the above, the analysis and discussion of the results is shown.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115871453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of biometric recognition in the COVID-19 period","authors":"Yicheng Zhou","doi":"10.1109/CDS52072.2021.00049","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00049","url":null,"abstract":"The new coronavirus is causing a global health crisis. Many biometric authentication methods have been affected in this epidemic. In this study, we first give a comprehensive evaluation of the COVID-19's impact on various biometric authentication methods and provide an alternative solution based on periocular recognition. The experiments on the Ethnic-ocular dataset show that the Siamese structure could provide a better performance for periocular recognition","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123312842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asmin Alev Aktas, Okan Tunali, Ahmet Tugrul Bayrak
{"title":"Comparative Unsupervised Clustering Approaches for Customer Segmentation","authors":"Asmin Alev Aktas, Okan Tunali, Ahmet Tugrul Bayrak","doi":"10.1109/CDS52072.2021.00097","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00097","url":null,"abstract":"Machine learning-driven studies to get potent insights about customers are essential for the business world to grow as they achieve smarter in marketing and sales activities. Finding the consociate patterns of customer interaction activities leads to finding sensible segments. By this, strategists can reach out to different groups of customers with customized services, offers and plans. However, although clustering algorithms are reliable by virtue of them being competent studies, not all of them fit the studied domain. In this study, six well-known clustering algorithms with different parameters are applied to real-life customer purchase history data. The outcomes are compared, and the density distribution of data features in created clusters are visualized. Thus, it is possible to see the role of each selected feature on the differentiation of clusters. The cluster labels of data points (customers) are mapped in pairs of algorithms. As a result, the similarities and differences in clusters created by different algorithms are more straightforward to catch. Moreover, in addition to labeling data points with class labels, a hybrid approach is presented to obtain information about class label probabilities by fitting the support vector classification model. The proposed study gives promising results in understanding how different clustering algorithms fit the customer data and stands out with multi-sides evaluation and comparison experiments.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"100 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Learning in Credit Card Fraud Detection Using Boosting Methods","authors":"Haonan Feng","doi":"10.1109/CDS52072.2021.00009","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00009","url":null,"abstract":"With the continuous prosperity of the financial market, credit card volume has always been booming these years. The fraud businesses are also raising rapidly. Under this circumstance, fraud detection has become a more and more valuable problem. But the proportion of the fraud is absolutely much lower than the genius transaction, so the imbalance dataset makes this problem much more challenging. In this paper we mainly tell how to cope with the credit card fraud detection problem by using boosting methods and also gave a contribution of the brief comparison between these boosting methods.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption","authors":"Qixin Zhang","doi":"10.1109/CDS52072.2021.00111","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00111","url":null,"abstract":"In the current scenario, various forms of information are spread everywhere, especially through the Internet. A lot of valuable information is contained in the dissemination, so security issues have always attracted attention. With the emergence of cryptographic algorithms, information security has been further improved. Generally, cryptography encryption is divided into symmetric encryption and asymmetric encryption. Although symmetric encryption has a very fast computation speed and is beneficial to encrypt a large amount of data, the security is not as high as asymmetric encryption. The same pair of keys used in symmetric algorithms leads to security threats. Thus, if the key can be protected, the security could be improved. Using an asymmetric algorithm to protect the key and encrypting the message with a symmetric algorithm would be a good choice. This paper will review security issues in the information transmission and the method of hybrid encryption algorithms that will be widely used in the future. Also, the various characteristics of algorithms in different systems and some typical cases of hybrid encryption will be reviewed and analyzed to showcase the reinforcement by combining algorithms. Hybrid encryption algorithms will improve the security of the transmission without causing more other problems. Additionally, the way how the encryption algorithms combine to strength the security will be discussed with the aid of an example.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Deep Learning-based Approaches for COVID-19 Detection","authors":"Jinyang Liu","doi":"10.1109/CDS52072.2021.00069","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00069","url":null,"abstract":"As the COVID-19 pandemic broke out worldwide, many deep learning-based methods are proposed to assist the doctors in COVID-19 diagnosis. This paper introduces open-source datasets of COVID-19 images and tests state-of-the-art COVID-19 diagnosis methods to provide a comprehensive review of these technologies. According to the experimental results, this paper introduces two interesting observations: 1) deep learning-based methods focus on big visual features rather than small detailed features; 2) the convolutional neural networks pay attention to the region of Lung Ultrasound images, which is also considered as crucial observation region from doctors' perspectives. These observations prove the efficiency of deep-learning solutions since they can learn essential doctors' COVID-19 diagnosis rules.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Annotated Corpus of Comments and Basic Semantic Analysis","authors":"Semih Çelik, Gülsah Tümüklü Özyer","doi":"10.1109/CDS52072.2021.00064","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00064","url":null,"abstract":"This article presents an annotated corpus of Turkish comment texts gathered from employees. Special attention is given to neutrality of paragraphs in the corpus and quality of the annotation. We employ the majority voting of the annotators. We describe the details of the dataset, the annotation methodology and the experiments with basic methods to investigate the corpus. The corpus has three classes, positive, negative and neutral.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing User Behavior Patterns in Casual Games Using Time Series Clustering","authors":"Yiheng Zhou, Zhipeng Hu, Yongcheng Liu","doi":"10.1109/CDS52072.2021.00070","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00070","url":null,"abstract":"User behavior pattern classification based on time series clustering is playing an increasingly important role in the game industry. However, user behavior and data performance are quite different in lightweight casual games, compared with those in MMORPGs (Massively Multiplayer Online Role-Playing Games) that many research institutes studied before. With the development of mobile devices and the fragmentation of users' time, both the number of users and the importance in today's gaming industry for casual games jump rapidly. The unique user data performance, such as high sparsity, poses new challenges to clustering time-series data of user behavior based on this kind of game. In this paper, we take UNO!, a mobile card game with hundreds of millions of users, as our research object, and propose an improved time series similarity measurement via the smoothed sequence Euclidean distance to realize clustering analysis of user behavior patterns. In this analysis, we purposefully use the user feature sequence that is more consistent with the game feature. Finally, we explore the correlation of clustering results with user payment, and propose a visualization scheme that can comprehensively show users' payment behavior, including short-term and long-term, and its relationship with users' game behavior.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129333258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamadys L. Benavides Gutiérrez, Óscar Gómez, Mateo Dulce Rubio, Paula Rodríguez Díaz, Álvaro J. Riascos Villegas, J. S. M. Pabón
{"title":"Zero-Inflated Embeddings to Analyze Homicide Occurrence Patterns","authors":"Hamadys L. Benavides Gutiérrez, Óscar Gómez, Mateo Dulce Rubio, Paula Rodríguez Díaz, Álvaro J. Riascos Villegas, J. S. M. Pabón","doi":"10.1109/CDS52072.2021.00065","DOIUrl":"https://doi.org/10.1109/CDS52072.2021.00065","url":null,"abstract":"Analyzing crime data is a challenging task, especially homicide data due to the low-frequency and spatial sparsity of the occurrences. In this work, we use Zero Inflated Exponential Family Embeddings (ZIE) and Autoencoders to analyze spatial patterns in the capital city of Colombia, Bogotá. We obtain low dimensional embeddings of spatial units of the city, cuadrantes, and analyze the clustering assignments they produce. We observe that the ZIE model generally provides useful insights about the different types of cuadrantes in the city as they can recover their spatial characteristics. Clustering the embeddings corresponds to an intuitive classification of high, medium, and low homicide-rate. This classification can be interpreted through spatial characteristics of the cuadrantes.","PeriodicalId":380426,"journal":{"name":"2021 2nd International Conference on Computing and Data Science (CDS)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133650975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}