Tuesday, March 30, 2021

ANALYSIS OF ECHO CHARACTERISTICS FOR TIME - VARYING SCATTERERS

Author :  Junjie Wang

Affiliation :  National University of Defense Technology, Changsha, China

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  10, 01, January, 2020b

Abstract :

Phase modulation technique is that the phase information of signal varies proportionally with a modulated signal, which is commonly applied in the field of communications. The current processing method mainly uses the active devices to intercept, modulate and repeat, but the devices are complicated and require a certain processing time. In this paper, Phase modulation method based on phase-switched screen (PSS) is studied and the echo characteristics are analyzed. Meanwhile, the realization of PSS time-varying modulation is discussed. Simulation results are utilized to demonstrate the effectiveness of the proposed method.

Keyword :  Linear frequency modulation (LFM), frequency spectrum shifting, phase-switched screen (PSS)

For More Details https://aircconline.com/csit/papers/vol10/csit100104.pdf


Monday, March 29, 2021

TENSORFLOW 2.0 AND KUBEFLOW FOR SCALABLE AND REPRODUCABLE ENTERPRISE AI

Author :  Romeo Kienzler

Affiliation :  IBM Center for Open Source Data and AI Technologies, 505 Howard St, San Francisco

Country :  Switzerland

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  10, 01, January, 2020

Abstract :

Towards the End of 2015 Google released TensorFlow 1.0, which started out as just another numerical library, but has grown to become a de-facto standard in AI technologies. TensorFlow received a lot of hype as part of its initial release, in no small part because it was released by Google. Despite the hype, there have been complaints on usability as well. Especially, for example, the fact that debugging was only possible after construction of a static execution graph. In addition to that, neural networks needed to be expressed as a set of linear algebra operations which was considered as too low level by many practitioners. PyTorch and Keras addressed many of the flaws in TensorFlow and gained a lot of ground. TensorFlow 2.0 successfully addresses these complaints and promises to become the go-to framework for many AI problems. This paper introduces the most prominent changes in TensorFlow 2.0 targeted towards ease of use followed by introducing TensorFlow Extended Pipelines and KubeFlow in order to illustrate the latest TensorFlow and Kubernetes ecosystem movements towards simplification for large scale Enterprise AI adoption.

Keyword :  Artificial Intelligence, TensorFlow, Keras, Kubernetes, KubeFlow, TFX, TFX Pipelines

For More Detailshttps://aircconline.com/csit/papers/vol10/csit100103.pdf

Saturday, March 27, 2021

REVISIT DIALOGFLOW IN AN ENGLISH TEACHING VIRTUAL ASSISTANT USE CASE

Author :  M.S. Tran

Affiliation :  AI Lab, Topica Holding, Hanoi

Country :  Vietnam

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  10, 01, January, 2020

Abstract :

We deployed a conversation chatbot as a virtual assistant teaching English via Internet. The system was developed on the base of Moodle as Learning Management System and DialogFlow as Dialogue Management System. It is interesting that the crucial problem we had to face here is the lack of an efficient authoring tool in order to generate in mass the dialog scenarios fed into Moodle and DialogFlow. In our concrete case - teaching English for beginners - the Dialogflow platform seems to be a cumbersome tool. Especially with bad internet connection, sending messages back and forth to Dialogflow may degrade smooth conversation experience. We therefore built an authoring tool to fasten up the conversation rules generation. We also replace Dialogflow with a local browser-based dialogue management engine. The lessons taught with our systems – our English teaching virtual assistant – seem interesting to students and receive encouraging feedbacks.

Keyword :  Chatbot, Dialogflow. Artificial Intelligence, Natural Language Processing.

For More Detailshttps://aircconline.com/csit/papers/vol10/csit100102.pdf

Friday, March 26, 2021

INNOCROWD, A CONTRIBUTION TO AN IOT BASED ENGINEERING PRODUCT DEVELOPMENT

Author :  Camille Salinesi

Affiliation :  CRI -Paris 1 Sorbonne University

Country :  France

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  10, 01, January, 2020

Abstract :

System engineering focuses on the realization of complex systems, from design all the way to management. Meanwhile, in the era of Industry 4.0 and Internet of Things, systems are getting more and more complex. This complexity comes from the usage of smart sub systems (e.g. smart objects, new communication protocols, etc.) and new engineering product development processes (e.g. through Open Innovation). These two aspects namely the IoTrelated sub system and product development process are our main discussion topics in our research work. The creation of smart objects such as innovative fleets of connected devices is a compelling case. Fleets of devices in smart buildings, smart cars or smart consumer products (e.g. cameras, sensors, etc.) are confronted with complex, dynamic, rapidly changing and resource-constrained environments. In order to align with these context fluctuations, we develop a framework representing the dimensions for building Self-adaptive fleets for IoT applications. The emerging product development process Open Innovation is proven to be three time faster and ten times cheaper than conventional ones. However, it is relatively new to the industry, and therefore, many aspects are not clearly known, starting from the specific product requirements definition, design and engineering process (task assignment), until quality assurance, time and cost. Therefore, acceptance of this new approach in the industry is still limited. Research activities are mainly dealing with high and qualitative levels. Whereas methods that supply more transparent numbers remain unlikely. The project-related risks are therefore unclear, consequently, the Go / noGo decisions become difficult. This paper contributes ideas to handle issues mentioned above by proposing a new integrated method, we call it InnoCrowd. This approach, from the perspective of IoT, can be used as a base for the establishment of a related decision support system.

Keyword :  Industry 4.0, Internet of Thing, Crowdsourcing, Neural Network, Decision Support System

For More Detailshttps://aircconline.com/csit/papers/vol10/csit100101.pdf

Wednesday, March 24, 2021

AN AUGMENTED INTELLIGENCE MODEL TO EXTRACT PRAGMATIC MARKERS

Author :  Vijay Perincherry

Affiliation :  Indiggo Associates, Bethesda, Marylan

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

This paper presents a novel methodology for automatically extracting pragmatic markers from large streams of texts and repositories of documents. Pragmatic markers typically are implications, innuendos, suggestions, contradictions, sarcasms or references that are difficult to define objectively, but that are subjectively evident. Our methodology uses a two-stage augmented learning model applied to a specific use case, extracting from a repository of over 1500 Article IV country reports prepared for government officials by International Monetary Fund (IMF) staff. The model uses principles of evidence theory to train a machine to decipher the textual patterns of suggested actions for government officials and to extract those suggestions from the country reports at scale. We demonstrate the effectiveness of the model with impressive precision and recall metrics that over time outperform even the human trainers.

Keyword :  Natural Language Understanding, Augmented Intelligence,Pragmatics, Text Processing

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91110.pdf

Monday, March 22, 2021

MITIGATE CONTENT POISONING ATTACK IN NDN BY NAMESPACE AUTHORIZATION

Author :  Pengfei Yue

Affiliation :  Department of Computer Inner Mongolia University Hohhot

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

The Named Data Networking (NDN) immunes to most of the attacks which exist in today’s Internet. However, this newborn network architecture may still subject to Distributed Denial of Service (DDOS) attacks if less evaluation is paid. In this paper, we firstly give a survey of the state of art works on the mitigations of the Content Poisoning Attack (CPA) in NDN and discuss their limitations as well. After this, we give out our mitigation and the results from simulations show that with the implementation of our mitigation, the Interest Satisfaction Rate (ISR) of all Consumers maintains a highly acceptable rate even when network is under CPA.

Keyword :  The Named Data networking (NDN), Denial of service attack (Dos), Content Poisoning Attack (CPA)

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91109.pdf

INFORMATION –SYMMETRY AND FEYNMANDIAGRAMS APPLIED TO COMPUTING MODELS

Author :  Carlos J. Martinez

Affiliation :  Department of Research, Hispatel Ing., Murcia

Country :  Spain

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

The evolving complexity of modern technologies brings new concepts, solutions, tools, but also new needs and problems. We review a computing and communication model inspired in physics, to examine complex systems under a perspective of physics-inspired principles like symmetry and conservation-laws. Aiming to help design, build, and control systems, we apply concepts like Information-Symmetry, propagation of information, or inertia to model communications. Modelling computing under physics reactions and conservation laws gives tools to automatically audit each process and create side effects on deviations, bringing advantages in verification, security, and to gain reliability. We review the Feynman-diagrams in computing, rotating diagrams to obtain reversible operations from one formula, and using the diagrams to verify consistency against a unique computing expression. Applications include dealing with data uncertainty, we show advantages to control fuzzy systems and reduce dataset needing further screening. Model and diagrams are proposed as tools to help automate and refine designs, and to gain in reliability.

Keyword :  Unconventional Computing Model, Inertia, Data Communications, Symmetry, Reliability, Cloud, Fuzzy.

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91108.pdf

Friday, March 19, 2021

CYBER SECURITY INSIGHTS INTO SELFPROCLAIMED VIRTUAL WORLD HACKERS

Author :  Nicholas Patterson

Affiliation :  Deakin University, Geelon

Country :  Australia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

Virtual worlds have become highly popular in recent years with reports of over a billion people accessing these environments and the virtual goods market growing to near 50 billion US dollars. An undesirable outcome to this popularity and market value is thriving criminal activity in these worlds. The most profitable cyber security problem in virtual worlds is named Virtual Property Theft. The aim of this study is to use an online survey to gain insight into how hackers (n=100) in these synthetic worlds conduct their criminal activity. This survey is the first to report an insight into the criminal mind of hackers (virtual thieves). Results showed a clear-cut profile of a virtual property thief, they appear to be mainly aged 20-24 years of age, live in the United States of America, while using virtual worlds for 5-7 hours a day. These and the other key results of this study will provide a pathway for designing an effective anti-theft framework capable of abolishing this cyber security issue.

Keyword :  Virtual world environments, virtual property theft, cyber security, hackers, massively multiplayer online games

For More Details https://aircconline.com/csit/papers/vol9/csit91107.pdf


Thursday, March 18, 2021

THE FEASIBILITY OF USING BEHAVIOURAL PROFILING TECHNIQUE FOR MITIGATING INSIDER THREATS: REVIEW

Author :  Gaseb Alotibi

Affiliation :  IT Department Plymouth University

Country :  South Africa

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

Insider threat has become a serious issue to the many organizations. Various companies are increasingly deploying many information technologies to prevent unauthorized access to getting inside their system. Biometrics approaches have some techniques that contribute towards controlling the point of entry. However, these methods mainly are not able to continuously validate the users reliability. In contrast behavioral profiling is one of the biometrics technologies but it focusing on the activities of the users during using the system and comparing that with a previous history. This paper presents a comprehensive analysis, literature review and limitations on behavioral profiling approach and to what extent that can be used for mitigating insider misuse.

Keyword :  insider threat, behaviouial profiling, insider misuse

For More Details https://aircconline.com/csit/papers/vol9/csit91106.pdf

Wednesday, March 17, 2021

RATE DISTORTION STUDY FOR TIMEVARYING AUTOREGRESSIVE GAUSSIAN PROCESS

 Author :  Jia-Chyi Wu

Affiliation :  National Taiwan Ocean University

Country :  Taiwan

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

Formulation of the Rate-distortion association is an information-theoretic study in the field of signal encoding systems. Since a more general approach to model the nonstationarity exhibited by real-world signals is to use appropriately fitted time varying autoregressive (TVAR) models, we have investigated the rate-distortion function R(D) for the class of time varying nonstationary signals. In this study, we present formulations of the rate-distortion function for the Gaussian TVAR processes. The R(D) function can serve as an information-theoretic bound on the performance achievable by source encoding techniques when the processing signal is represented exclusively by a Gaussian TVAR model.

Keyword :  Rate Distortion, Nonstationary, Time Varying Autoregressive (TVAR) Process

For More Details https://aircconline.com/csit/papers/vol9/csit91105.pdf

Tuesday, March 16, 2021

INSPECTION OF METHODS OF EMPIRICAL MODE DECOMPOSITION

Author :  Roberto Hernández Santander

Affiliation :  Universidad Distrital Francisco José de Caldas

Country :  Colombia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

Empirical Mode Decomposition is an adaptive and local tool that extracts underlying analytical components of a non-linear and non-stationary process, in turn, is the basis of Hilbert Huang transform, however, there are problems such as interfering modes or ensuring the orthogonality of decomposition. Three variants of the algorithm are evaluated, with different experimental parameters and on a set of 10 time series obtained from surface electromyography. Experimental results show that obtaining low error in reconstruction with the analytical signals obtained from a process is not a valid characteristic to ensure that the purpose of decomposition has been fulfilled (physical significance and no interference between modes), in addition, freedom must be generated in the iterative processes of decomposition so that it has consistency and does not generate biased information. This project was developed within the framework of the research group DIGITI of the Universidad Distrital Francisco José de Caldas.

Keyword :  EMD, EEMD, CEEMDAN, mix of modes, non-linearity and non-stationarity

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91104.pdf

Sunday, March 14, 2021

MULTI-VARIABLE LINEAR REGRESSIONBASED PREDICTION OF A COMPUTATIONALLYHEAVY LINK STABILITY METRIC FOR MOBILE SENSOR NETWORKS

 Author :  Natarajan Meghanathan

Affiliation :  Jackson State University

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

Until now, we were determining stable data gathering (DG) trees for mobile sensor networks (MSNs) using a link stability metric (computationally-light or computationally-heavy) that is directly computed on the egocentric edge network. Among such DG trees, the BPI' (complement of bipartivity index)-based DG trees were observed to be the most stable, but the BPI' metric is also computationally-heavy. Hence, we seek to build a multi-variable linear regression model to predict the BPI' values for the egocentric networks of edges using three computationally-light metrics (neighborhood overlap: NOVER, one-hop two-hop neighborhood: OTH, and normalized neighbor degree: NND) that are also computed on the egocentric edge networks. The training and testing are conducted as part of a single simulation run (i.e., in-situ). The training dataset comprises of the BPI', NOVER, OTH and NND values of randomly sampled egocentric edge networks during the first phase of the simulation (1/5th of the total simulation time). We observe the R-square values for the prediction to be above 0.85 for both low density and high density networks. We also observe the lifetimes of the predicted BPI'-based DG trees to be 87-92% and 55-75% of the actual BPI'-based DG trees for low-moderate and moderate-high density networks respectively.

Keyword :  Multi-variable Regression, Bipartivity Index, Computationally-Light, Computationally-Heavy, Mobile Sensor Networks, Data Gathering Tree

For More Details https://aircconline.com/csit/papers/vol9/csit91103.pdf

Thursday, March 11, 2021

MATBASE – A TOOL FOR TRANSPARENT PROGRAMMING WHILE MODELLING DATA AT CONCEPTUAL LEVELS

 Author :  Christian Mancas

Affiliation :  Ovidius University, Constanta

Country :  Romania

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 11, August, 2019

Abstract :

MatBase is a prototype intelligent data and knowledge base management system based on the Relational, Entity-Relationship, and (Elementary) Mathematical Data Models, having two current versions (MS SQL Server and C#, MS Access and VBA). Users may work with it only at one or any combination of these conceptual levels, without any programming knowledge (be it SQL, C#, VBA, etc.), to create, populate, update, and delete databases and corresponding management software applications. The paper introduces the MatBase architecture and the principles used to transparently program while modelling data at these three conceptual levels with this tool. A real-life example illustrates them.

Keyword :  Conceptual Data Modelling, Automatic Code Generation, Relational Constraints, Non-relational Constraints, DBMS Engine Architectures, The (Elementary) Mathematic Data Model, MatBase

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91102.pdf

Wednesday, March 10, 2021

AN IMAGE CLASSIFICATION-BASED APPROACH TO AUTOMATE VIDEO PLAYING DETECTION AT SYSTEM LEVEL

 Author :  Eric Liu

Affiliation :  Aracadia High School, Arcadia

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 12, September, 2019

Abstract :

Tech distraction has become a critical issue on people’s work and study productivity, particularly with the growing amount of digital content from the social media site such as Youtube. Although browser-based plug-ins are available to help block and monitor the sites, they do not work for all scenarios. In this paper, we present a system-level video playing detection engine that captures screenshots and analyze the screenshot image using deep learning, in order to predict whether the image has videos in it or not. A mobile app has also been developed to enable parents to control the video playing detection remotely.

Keyword :  Machine learning, Tech distraction, Image classification

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91215.pdf

Tuesday, March 9, 2021

A BLUETOOTH-BASED PROXIMITY SENSING AND OBJECT-TRACKING SYSTEM

 Author :  MikeQu

Affiliation :  Northwood High School, Irvine, CA

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 12, September, 2019

Abstract :

This paper proposes the concept overall concept of a bluetooth-based proximity IoT device. Its methodology is introduced along with a working prototype. Potential applications and viability for data analysis is also discussed. In summary, such a device accomplishes the goal of closerange information communication in an effective, secure and reliable way through the use of beacons utilizing the BLE (Bluetooth Low Energy) Technology, a variety of different receiver devices that has native support for Bluetooth as well as a database used for data storage and retrieval. The biggest advantage of this technology is that proximity-based Internet has virtually endless potential for applications in the real world, including healthcare, retail and industrial manufacturing.

Keyword :  BLE, Proximity sensing, Machine learning

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91214.pdf

Sunday, March 7, 2021

REMINISCENCE: A MOBILE INTELLIGENT SYSTEM TO ASSIST DEMENTIA PATIENTS

Author :  Joan Wang

Affiliation :  Aliso Niguel High School, Aliso Viejo

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 12, September, 2019

Abstract :

Since people pay more attention to health issues, how to effectively diagnose potential diseases becomes gradually important in that most of us are not physical experts. This paper proposes a single collective app that offers solutions to both potential and diagnosed patients based on machine learning. Users can use the app to evaluate their status by uploading their documents. It is helpful to tell users the potential issues concerning health in advance.

Keyword :  Machine Learning, disease diagnose, dementia prevention

For More Details :  https://aircconline.com/csit/papers/vol9/csit91213.pdf

Friday, March 5, 2021

DEEP LEARNING THROUGH ENVIRONMENTAL DETECTION

Author :  Junyi Lu

Affiliation :  California State Polytechnic University

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 12, September, 2019

Abstract :

Many of the urban areas are highly polluted. They are aware of the damage caused by pollution but lack efficient and economical solutions to address it. The purpose of this project is to design a portable pollution sensor that is able to communicate with an online database and allow users to access data through the internet. The algorithm of machine learning is able to create data models to predict future pollution level with existed data values.

Keyword :  Deep Learning, Environmental detection, Machine Learning, Wireless Network

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91212.pdf

Thursday, March 4, 2021

A CROWD-SOURCING MOBILE PLATFORM FOR TEXTBOOK SELLING AND EXCHANGE USING INFORMATION RETRIEVAL

Author :  Yuhan Chen

Affiliation :  Santa Margarita Catholic High School, Rancho Santa Margarita CA 92688

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 12, September, 2019

Abstract :

Book selling and exchange is very popular among students at campus, especially at the beginning of each semester, which can save students’ expense on text books. Generally, a used book may be only worth one third or half of the original price or even less. However, existing book selling platforms have various issues in practice, such as not user-friendly, not efficient, or not widely used among students. In this paper, we develop a new book selling and exchange platform, which facilitates the distribution of book selling information and the communication between sellers and buyers. This application can be easily used on smartphone after it is properly downloaded and installed from app store.

Keyword :  Book selling platform, distributed system, iOS and Android system, Firebase

For More Details https://aircconline.com/csit/papers/vol9/csit91211.pdf

Wednesday, March 3, 2021

GRANULATED TESTING. TNT FOR THE PEAK OF THE HILL

Author :  Sergei Zhuk

Affiliation :  Quality Department of Shopify, Berlin

Country :  Germany

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  9, 12, September, 2019

Abstract :

This contribution gives a review of granulated a testing approach for JSE 2019 committee.

Keyword :  Issues, defects, bugs, test management, test planning, development planning, waterfall, sashimi testing.

For More Detailshttps://aircconline.com/csit/papers/vol9/csit91210.pdf