2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)最新文献

筛选
英文 中文
Function Perturbation Impact on Conjunctive Boolean Networks Under Asynchronous Update 异步更新下函数摄动对合布尔网络的影响
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/ISCSIC54682.2021.00080
Liyun Tong, Jinling Liang
{"title":"Function Perturbation Impact on Conjunctive Boolean Networks Under Asynchronous Update","authors":"Liyun Tong, Jinling Liang","doi":"10.1109/ISCSIC54682.2021.00080","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00080","url":null,"abstract":"In this paper, the function perturbation impact on the conjunctive Boolean network (CBN) under asynchronous update is considered. By resorting to the matrix semi-tensor product, the logical form of the addressed CBN is first transformed into its algebraic form, and some properties are then obtained. In order to globally asymptotic stabilize the considered CBN, a new concept is introduced with maximum probability transition, and the one-bit or multi-bit function perturbations are performed, which are summarized in an algorithm. Finally, a necessary and sufficient condition is presented for the global asymptotic stability of the CBN system. Several illustrative examples are simultaneously given to show validity of the derived results.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124504861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Mining Techniques to Build A Recommender System 构建推荐系统的数据挖掘技术
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/ISCSIC54682.2021.00047
Alicia Huidobro Espejel, Francisco J. Cantú Ortiz
{"title":"Data Mining Techniques to Build A Recommender System","authors":"Alicia Huidobro Espejel, Francisco J. Cantú Ortiz","doi":"10.1109/ISCSIC54682.2021.00047","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00047","url":null,"abstract":"Recommender systems are not a new topic but they are still current due to their broad applications and the impact that they can have in sales or revenues. There are different approaches to build a system that makes recommendations, the selection of a method depends on several factors. For example, the available data to extract knowledge and the technical resources of the company. In this article, we focus on the use of data mining techniques to build a recommender system. Then, we describe in more detail two methods: communities finding and market basket analysis. Both methods are easy to implement and they are efficient. We present our methodology to implement them as well as the advantages and disadvantages that we found in them. We used a publicly available dataset to test both methods offline. We were interested in evaluating both methods without a ground truth reference because the model selection is one of the challenges when building a new system. For the communities finding method, we used fitness functions that allowed us to compare and select a set of communities. For the market basket analysis, we tested different values for the parameters that can be controlled: support, confidence, and the number of items in transactions. With both methods, we obtained easy to interpret results that can be used to implement a recommender system. The tested methods are suggested when there is only historical data about transactions. When more information is available, there are more robust methods that can be implemented. For example, content-based methods.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131369804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Simulated Annealing Algorithm to Solve the Multi-objective Bike Routing Problem 求解多目标自行车路径问题的模拟退火算法
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/ISCSIC54682.2021.00019
P. Nunes, A. Moura, J. Santos, A. Completo
{"title":"A Simulated Annealing Algorithm to Solve the Multi-objective Bike Routing Problem","authors":"P. Nunes, A. Moura, J. Santos, A. Completo","doi":"10.1109/ISCSIC54682.2021.00019","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00019","url":null,"abstract":"With the increasing concern about sustainable means of transport, the use of bicycle is earning popularity. However, for cyclists, it may be a challenge to use this mean of transportation in an urban context, since there are plenty of route choices available and each of them may represent a different trade-off between multiple objectives, such as safety and travel distance. These trade-offs depend on cyclist's experience and preferences. Thus, while an experienced cyclist may choose the shortest path between the source and destination points, a beginner may prefer to travel longer distances to cycle in dedicated cycling infrastructures or to avoid motorized traffic. In this paper, it is proposed a simulated annealing algorithm, to achieve an approximated Pareto set. One uses the A-Star algorithm to create an initial solution and propose a perturbation method, which uses the A-Star algorithm, to generate a higher diversity of solutions. The methodology was tested in practical use cases and was able to find a set of quality solutions for the bike routing problem (BRP).","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127131018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Message From the General Chair 主席致辞
S. Turner
{"title":"Message From the General Chair","authors":"S. Turner","doi":"10.1109/pads.2006.23","DOIUrl":"https://doi.org/10.1109/pads.2006.23","url":null,"abstract":"It is my honor and privilege to welcome you to the 2010 IEEE Symposium on Security and Privacy. It has now been 30 years since the very first symposium in this series was held at the Claremont. While many things in the world of computing and networking have changed since 1980, this conference continues to be the premier forum for researchers to present and discuss the latest developments in computer security and electronic privacy. This year, we reflect on the past 30 years in a special anniversary celebration, and we prepare for the future with a very exciting technical program.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116668972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis the Household Activity Chains Based on Utility-Maximizing Model 基于效用最大化模型的家庭活动链分析
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/ISCSIC54682.2021.00022
Wissam Qassim Al-Salih, D. Esztergár-Kiss
{"title":"Analysis the Household Activity Chains Based on Utility-Maximizing Model","authors":"Wissam Qassim Al-Salih, D. Esztergár-Kiss","doi":"10.1109/ISCSIC54682.2021.00022","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00022","url":null,"abstract":"Most activity-based models of transport planning depend on an individual decision-making process modelling daily activity and the activity chains. The dependence on individual decision-making approaches may be partially due to the deficiency of modelling methodologies for group decision-making within the household. Therefore, in this paper, we present a study to analyse the group decision-making among the household members. This paper aims to analyse and estimate the activity allocation and the activity chains between the household members by using the mixed multinomial logit model based on the utility function. The study is using the 2014 Budapest city Travel Survey. This paper presents a model for the activity type and activity chains that household members pursue during the daily activity. The study assumes that the household members allocate their activity type and duration within the activity chains to get a high utility. Besides that, the effects of household and individual socio-demographics, travel and activity variables on the activity allocation are examined. According to the results that indicated that the activity purpose with (3.392 & 2.136) is an essential factor and positively affects the likelihood of choice among the activity types or activity chains. Finally, the implications of the results for travel behaviour and transportation planning are identified.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115102564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Approach of Recommendation in Business Processes Using Decision Trees 基于决策树的业务流程推荐方法研究
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/ISCSIC54682.2021.00068
Fatima Zohra Trabelsi, A. Khtira, B. E. Asri
{"title":"Towards an Approach of Recommendation in Business Processes Using Decision Trees","authors":"Fatima Zohra Trabelsi, A. Khtira, B. E. Asri","doi":"10.1109/ISCSIC54682.2021.00068","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00068","url":null,"abstract":"A recommender system analyses users' data in order to extract their interests and preferences and suggest them relevant items. The recommendation systems have shown their applicability in many domains, especially in business processes (BP). Business processes are defined as a set of tasks that are performed by an organization to achieve a business goal. Using recommendation techniques in business processes consists of proposing relevant tasks at a certain point, which helps managers making the right decisions. In this paper, we propose an approach of recommending in BPMN-based business processes. The recommendation technique that we considered in this approach is the decision trees.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTD: Run-time System Call Mapping Randomization 运行时系统调用映射随机化
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/ISCSIC54682.2021.00054
Takeshi Masumoto, Wai Kyi Kyi Oo, Hiroshi Koide
{"title":"MTD: Run-time System Call Mapping Randomization","authors":"Takeshi Masumoto, Wai Kyi Kyi Oo, Hiroshi Koide","doi":"10.1109/ISCSIC54682.2021.00054","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00054","url":null,"abstract":"The purpose of our research is to provide defense against code injection attacks on the system. Code injection attack is one of the most dangerous attacks to a system, which can even give an attacker a chance to fully compromise the system by executing arbitrary code. Moving Target Defense (MTD) can protect the system from attacks by dynamically changing the target area of attacks including vulnerability as well as reduce the reachability of attacks. System call randomization is an MTD technique that disables code injection attacks by randomizing the mapping between system call numbers and the functions called by them. The purpose of system call randomization is to limit the processing and resources that the injected program can perform and access. As system calls are the only way for user applications to access system resources, randomizing system calls can give attackers more difficulty to achieve their goals, even if they can inj ect the program. Existing system call randomization techniques once performed randomization before loading the program, however, such methods only once in advance have no effect when information about randomization is disclosed to attackers. In this paper, we propose a method of re-randomizing multiple times at runtime to solve this problem. We implemented a script that directly edits the ELF executable format. In fact, as a result of running the script on a small program, we succeeded in generating a new executable file to which the method is applied. Our experiments show that run-time system call randomization is effective against code injection attacks, and this technique may also be applied to existing compiled programs. We implemented a script that directly edits the ELF executable format. In fact, as a result of running the script on a small program, we succeeded in generating a new executable file to which the method is applied. Our experiments show that run-time system call randomization is effective against code injection attacks, and this technique may also be applied to existing compiled programs.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmented Inverse Kinematics and Trajectory Planning of Quasi-continuous Manipulator 准连续机械臂分段逆运动学与轨迹规划
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/ISCSIC54682.2021.00064
Longfei Jia, Tingsong Chen, Yaxing Guo, Jing-Kun Chen, Y. Tao, Yuping Huang
{"title":"Segmented Inverse Kinematics and Trajectory Planning of Quasi-continuous Manipulator","authors":"Longfei Jia, Tingsong Chen, Yaxing Guo, Jing-Kun Chen, Y. Tao, Yuping Huang","doi":"10.1109/ISCSIC54682.2021.00064","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00064","url":null,"abstract":"In this paper, a method of segmented inverse kinematics is proposed for the complex inverse kinematics of the quasi-continuous manipulator and the trajectory planning of the middle joint and the end effector. According to various obstacles, eight links can be divided into different types of segments and inverse kinematics is performed on each segment, so as to ensure that any position of the manipulator does not touch the obstacle during the process of moving the target. Based on the above method, two examples corresponding to two obstacles are introduced. Through simulation, it is found that the change law of 17 degrees of freedom that meets the structural constraints of the quasi-continuous manipulator can be obtained by utilizing the method of segmented inverse kinematics, which proves the effectiveness and practicability of the method.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115846445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/iscsic54682.2021.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iscsic54682.2021.00003","DOIUrl":"https://doi.org/10.1109/iscsic54682.2021.00003","url":null,"abstract":"","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134423106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Channel Pruning Method Based on Squeeze-and-Excitation Mechanism and Upper Quartile Truncation 基于挤压激励机制和上四分位截断的模型通道剪枝方法
2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC) Pub Date : 2021-11-01 DOI: 10.1109/ISCSIC54682.2021.00031
Z. Ding, Jianyu Zhao, Jiaqi Sun
{"title":"Model Channel Pruning Method Based on Squeeze-and-Excitation Mechanism and Upper Quartile Truncation","authors":"Z. Ding, Jianyu Zhao, Jiaqi Sun","doi":"10.1109/ISCSIC54682.2021.00031","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00031","url":null,"abstract":"As the application of neural networks becomes more profound and more widespread, it is common to deepen the network or increase the number of parameters to improve its performance. Nevertheless, the accompanying increase in computational complexity makes the model difficult to implement on resource-limited mobile devices. Pruning connections are one of the main methods used for deep network compression. The existing pruning techniques suffer from disadvantages such as generating additional energy consumption, short practical estimation of channel importance, and leading the network to fall into overfitting. In this paper, we propose a channel pruning method based on the SE mechanism and upper quartile truncation, which uses the SE mechanism to extract the channel feature importance and upper quartile points as truncation factors to accelerate the model and reduce its computational effort, and the effectiveness of the method was demonstrated by experiments.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131990360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信