994,233 results
Search Results
102. Alice-Mary Talbot, Varieties of Monastic Experience in Byzantium, 800–1453. (Conway Lectures in Medieval Studies.) Notre Dame, IN: University of Notre Dame Press, 2019. Paper. Pp. xiv, 295; 10 black-and-white figures and 1 table. $45. ISBN: 978-0-2681-0562-4
- Author
-
Derek Krueger
- Subjects
Cultural Studies ,History ,White (horse) ,Literature and Literary Theory ,Visual Arts and Performing Arts ,media_common.quotation_subject ,Religious studies ,Art history ,Art ,Philosophy ,Table (landform) ,Alice (programming language) ,Medieval studies ,computer ,media_common ,computer.programming_language - Published
- 2021
103. Faith and the Freedpeople - Nicole Myers Turner. Soul Liberty: The Evolution of Black Religious Politics in Postemancipation Virginia. Chapel Hill: University of North Carolina Press, 2020. xx + 209 pp. $29.95 (paper), ISBN 9781469655239
- Author
-
H. Paul Thompson
- Subjects
Faith ,History ,Politics ,media_common.quotation_subject ,Chapel ,Art ,Theology ,Soul ,computer ,media_common ,computer.programming_language - Published
- 2021
104. Vaudeville and American Modernity - David Monod. Vaudeville and the Making of Modern Entertainment, 1890–1925. Chapel Hill: University of North Carolina Press, 2020. 288 pp. $29.95 (paper), ISBN 978-1-4696-6055-4
- Author
-
Susan Kattwinkel
- Subjects
Entertainment ,History ,Modernity ,media_common.quotation_subject ,Chapel ,Art history ,Art ,computer ,Making-of ,media_common ,computer.programming_language - Published
- 2021
105. Organic Resistance: The Struggle over Industrial Farming in Postwar France. By Venus Bivar. Flows, Migrations, and Exchanges. Edited by Mart A. Stewart and Harriet Ritvo. Chapel Hill: University of North Carolina Press, 2018. Pp. xvi+224. $90.00 (cloth); $29.95 (paper); $22.99 (e-book)
- Author
-
Grégory Quénet
- Subjects
History ,biology ,Intensive farming ,media_common.quotation_subject ,Chapel ,Economic history ,Venus ,Art ,biology.organism_classification ,Resistance (creativity) ,computer ,computer.programming_language ,media_common - Published
- 2021
106. Ted Ownby Hurtin’ Words: Debating Family Problems in the Twentieth-Century South. Chapel Hill: University of North Carolina Press, 2018. Pp. 352. $29.95 (paper)
- Author
-
Krystal D. F. Akehinmi
- Subjects
History ,Chapel ,computer ,Classics ,computer.programming_language - Published
- 2021
107. The Laywoman Project: Remaking Catholic Womanhood in the Vatican II Era. By Mary J. Henold. Chapel Hill: University of North Carolina Press, 2020. xi + 233 pp. $90.00 cloth; $29.95 paper
- Author
-
Colleen McDannell
- Subjects
Cultural Studies ,History ,media_common.quotation_subject ,Chapel ,Religious studies ,Art ,Theology ,Holy See ,computer ,media_common ,computer.programming_language - Published
- 2021
108. Interference mitigation in heterogeneous networks with simple dirty paper coding
- Author
-
Krishna Balachandran, Kiran M. Rege, Kemal M. Karakayali, and Joseph H. Kang
- Subjects
Scheme (programming language) ,SIMPLE (military communications protocol) ,Computer Networks and Communications ,Computer science ,Frequency band ,Distributed computing ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Interference (wave propagation) ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Dirty paper coding ,Electrical and Electronic Engineering ,computer ,Heterogeneous network ,Information Systems ,computer.programming_language - Abstract
In heterogeneous networks where macro cells and metro cells use the same frequency band to communicate with their respective users, the major problem limiting performance is the interference caused by macro cells to metro cells. The information theoretic result known as dirty paper coding provides a way to address this problem and significantly improve the performance of heterogeneous networks with co-channel deployment. In this paper, we show how a simple dirty paper coding scheme employing Tomlinson-Harashima pre-coding with partial interference pre-subtraction can be employed by metro cells to mitigate the interference caused by macro cells. A performance study included in this paper shows that the proposed dirty paper coding scheme can lead to significant improvement in user rate statistics.
- Published
- 2019
109. Automatic zone identification in scientific papers via fusion techniques
- Author
-
Kambiz Badie, Maryam Mahmoudi, and Nasrin Asadi
- Subjects
Fusion ,Computer science ,business.industry ,05 social sciences ,General Social Sciences ,Paper based ,Library and Information Sciences ,050905 science studies ,computer.software_genre ,Automatic summarization ,Computer Science Applications ,Identification (information) ,Information extraction ,Simple (abstract algebra) ,Sequential minimal optimization ,Artificial intelligence ,0509 other social sciences ,050904 information & library sciences ,business ,computer ,Natural language processing - Abstract
Zone identification is a topic in the area of text mining which helps researchers be benefited by the content of scientific papers in a satisfactory manner. The major aim of zone identification is to classify the sentences of scientific texts into some predefined zone categories which can be useful for summarization as well as information extraction. In this paper, we propose a two-level approach to zone identification within which the first level is in charge of classifying the sentences in a given paper based on some semantic and lexical features. In this respect, several machine learning algorithms such as Simple Logistics, Logistic Model Trees and Sequential Minimal Optimization are applied. The second level is responsible for applying fusion to the classification results obtained for consecutive sentences of the first level in order to make the final decision. The proposed method is evaluated on ART and DRI corpora as two well-known data sets. Results obtained for the accuracy of zone identification for these corpora are respectively 65.75% and 84.15%, which seem to be quite promising compared to those obtained by previous approaches.
- Published
- 2019
110. Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework
- Author
-
Aviad Cohen, Jian Wu, Yuval Elovici, C. Lee Giles, Lior Rokach, Andrea Lanzi, and Nir Nissim
- Subjects
021110 strategic, defence & security studies ,General Computer Science ,Exploit ,Scholarly ,Computer science ,digital ,malware ,paper ,0211 other engineering and technologies ,General Engineering ,library ,02 engineering and technology ,Digital library ,computer.software_genre ,World Wide Web ,PDF documents ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,020201 artificial intelligence & image processing ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,computer ,lcsh:TK1-9971 - Abstract
Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library to be contaminated with a surprisingly large number (0.3-2%) of malicious PDF documents (over 55% were crawled from the IPs of US-universities). We developed a two layered detection framework aimed at enhancing the detection of malicious PDF documents, Sec-Lib, which offers a security solution for large digital libraries. Sec-Lib includes a deterministic layer for detecting known malware, and a machine learning based layer for detecting unknown malware. Our evaluation showed that scholarly digital libraries can detect 96.9% of malware with Sec-Lib, while minimizing the number of PDF-files requiring labeling, and thus reducing the manual inspection efforts of security-experts by 98%.
- Published
- 2019
111. Robust authentication for paper-based text documents based on text watermarking technology
- Author
-
Zong Ming Guo, Tong Zhang, Yuxin Liu, Xi Feng Fang, Wei Guo, and Wen Fa Qi
- Subjects
Scheme (programming language) ,Computer science ,Data_MISCELLANEOUS ,02 engineering and technology ,Pattern Recognition, Automated ,Image (mathematics) ,0502 economics and business ,Computer Graphics ,0202 electrical engineering, electronic engineering, information engineering ,Digital watermarking ,Computer Security ,Language ,computer.programming_language ,Authentication ,Information retrieval ,Content integrity ,Applied Mathematics ,05 social sciences ,Watermark ,General Medicine ,Paper based ,Data Compression ,Computational Mathematics ,Nonlinear Dynamics ,Modeling and Simulation ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Embedding ,020201 artificial intelligence & image processing ,General Agricultural and Biological Sciences ,computer ,Algorithms ,Medical Informatics ,Software ,050203 business & management - Abstract
Aiming at the problem of easy tampering and difficult integrity authentication of paper text documents, this paper proposes a robust content authentication method for printed documents based on text watermarking scheme resisting print-and-scan attack. Firstly, an authentication watermark signal sequence related to content of text document is generated based on the Logistic chaotic map model; then, the authentication watermark signal sequence is embedded into printed paper document by using a robust text watermarking scheme; finally, the watermark information is extracted from scanned image of paper document, and compared with the authentication watermark information calculated in real time by the text document content obtained by OCR technology, thereby performing content integrity authentication of the paper text documents. Experimental results show that our method can achieve the robust content integrity authentication of paper text documents, and can also accurately locate the tampering position. In addition, the document after embedding the watermark information has a good visual effect, and the text watermarking scheme has a large information capacity.
- Published
- 2019
112. Network Security for Home IoT Devices Must Involve the User: A Position Paper
- Author
-
Antonio Mignano and Lorenzo De Carli
- Subjects
business.industry ,Bar (music) ,Computer science ,Security design ,Network security ,05 social sciences ,Fingerprint (computing) ,050801 communication & media studies ,Computer security ,computer.software_genre ,0508 media and communications ,Position paper ,0501 psychology and cognitive sciences ,Internet of Things ,business ,computer ,050107 human factors - Abstract
Many home IoT devices suffer from poor security design and confusing interfaces, lowering the bar for successful cyberattacks. A popular approach to identify compromised IoT devices is network-based detection, in which network traffic is analyzed to fingerprint and identify such devices. However, while several network-based techniques for identifying misbehaving devices have been proposed, the role of the user in remediating IoT security incidents has been conspicuously overlooked.
- Published
- 2021
113. Experience Paper: Danaus
- Author
-
Stergios V. Anastasiadis and Giorgos Kappes
- Subjects
Multitenancy ,business.industry ,Computer science ,Cloud computing ,Client-side ,computer.software_genre ,Virtualization ,Shared resource ,Stateful firewall ,Distributed data store ,Scalability ,Operating system ,business ,computer - Abstract
Containers are a mainstream virtualization technique commonly used to run stateful workloads over persistent storage. In multi-tenant hosts with high utilization, resource contention at the system kernel often leads to inefficient handling of the container I/O. Assuming a distributed storage architecture for scalability, resource sharing is particularly problematic at the client hosts serving the applications of competing tenants. Although increasing the scalability of a system kernel can improve resource efficiency, it is highly challenging to refactor the kernel for fair access to system services. As a realistic alternative, we isolate the storage I/O paths of different tenants by serving them with distinct clients running at user level. We introduce the Danaus client architecture to let each tenant access the container root and application filesystems over a private host path. We developed a Danaus prototype that integrates a union filesystem with a Ceph distributed filesystem client and a configurable shared cache. Across different host configurations, workloads and systems, Danaus achieves improved performance stability because it handles I/O with reserved per-tenant resources and avoids intensive kernel locking. Danaus offers up to 14.4x higher throughput than a popular kernel-based client under conditions of I/O contention. In comparison to a FUSE-based user-level client, Danaus also reduces by 14.2x the time to start 256 high-performance webservers. Based on our extensive experience from building and evaluating Danaus, we share several valuable lessons that we learned about resource contention, file management, service separation and performance stability.
- Published
- 2021
114. Experience Paper: Towards enhancing cost efficiency in serverless machine learning training
- Author
-
Pablo Gimeno Sarroca and Marc Sanchez-Artigas
- Subjects
Cost efficiency ,Computer science ,business.industry ,media_common.quotation_subject ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Filter (higher-order function) ,Machine learning ,computer.software_genre ,Nagging ,Matrix decomposition ,Task (computing) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Use case ,Artificial intelligence ,business ,computer ,media_common - Abstract
Function-as-a-Service (FaaS) has raised a growing interest in how to "tame" serverless to enable domain-specific use cases such as data-intensive applications and machine learning (ML), to name a few. Recently, several systems have been implemented for training ML models. Certainly, these research articles are significant steps in the correct direction. However, they do not completely answer the nagging question of when serverless ML training can be more cost-effective compared to traditional "serverful" computing. To help in this task, we propose MLLess, a FaaS-based ML training prototype built atop IBM Cloud Functions. To boost cost-efficiency, MLLess implements two key optimizations: a significance filter and a scale-in auto-tuner, and leverages them to specialize model training to the FaaS model. Our results certify that MLLess can be 15X faster than serverful ML systems [24] at a lower cost for ML models (such as sparse logistic regression and matrix factorization) that exhibit fast convergence.
- Published
- 2021
115. Flip It or Click It: Equivalent Learning of Vocabulary From Paper, Laptop, and Smartphone Flashcards
- Author
-
Sydney Ewing, Kara D. Sage, John Charles Downey, and Michael Piazzini
- Subjects
Vocabulary ,business.product_category ,Multimedia ,business.industry ,Computer science ,media_common.quotation_subject ,05 social sciences ,050301 education ,Time on task ,computer.software_genre ,050105 experimental psychology ,Vocabulary development ,Digital media ,Postsecondary education ,Laptop ,ComputingMilieux_COMPUTERSANDEDUCATION ,0501 psychology and cognitive sciences ,business ,0503 education ,Mobile device ,computer ,media_common - Abstract
Students frequently utilize digital devices and applications to assist studying. Past research has yielded mixed results on their effectiveness, and scant research has compared portable technologies with each other or focused on smartphones specifically. We compared college students’ learning of vocabulary on paper, laptop, and smartphone. Students were randomly assigned to one platform for reviewing vocabulary flashcards, and then they completed a memory quiz and answered questions regarding perceptions of these technologies. Results showed equivalency in students’ learning across platforms, with the only exception being that students spent longer reviewing paper flashcards. Self-reported cognitive load and satisfaction were equal across platforms. Quantitative and qualitative data also suggested that, though students quickly label both laptops and smartphones as helpful for education, they see more educational value in laptops. This research suggests that smartphones present new ways of learning, but care must be taken with how smartphones are utilized in educational settings.
- Published
- 2020
116. Development and mining of a database of historic European paper properties
- Author
-
Yun Liu, Richard G. Brereton, Irena Kralj Cigić, Dirk Andreas Dr. Lichtblau, Thea Winther, Gerrit de Bruin, Barry Knight, and Matija Strlič
- Subjects
Grammage ,Polymers and Plastics ,Database ,010401 analytical chemistry ,Rosin ,02 engineering and technology ,021001 nanoscience & nanotechnology ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,chemistry.chemical_compound ,chemistry ,European origin ,Principal component analysis ,medicine ,Environmental science ,Lignin ,Degradation (geology) ,Cellulose ,0210 nano-technology ,computer ,medicine.drug - Abstract
A database of historic paper properties was developed using 729 samples of European origin (1350–1990), analysed for acidity, degree or polymerisation (DP), molecular weight of cellulose, grammage, tensile strength, as well as contents of ash, aluminium, carbonyl groups, rosin, protein, lignin and fibre furnish. Using Spearman’s rank correlation coefficient and principal component analysis, the data were examined with respect to methods of manufacture, as well as chemical stability of paper. Novel patterns emerged related to loss of DP and accumulation of carbonyl groups and acidity with time and the role of lignin and rosin, as well as rate of degradation (k = 10−5 year−1) at room conditions. In-depth understanding of long-term degradation of lignin and rosin is needed to better understand the relationships between composition and degradation of historic paper. This study highlights the importance of mining significant volumes of analytical data, and its variability, obtained from real historic objects.
- Published
- 2020
117. EXPERIMENTAL DESIGN TO ANALYZE THE EFFECT OF WRITING FORMAT ON STUDENT READING COMPREHENSION ON PAPER MEDIA USING COMPLETELY RANDOMIZED FACTORIAL DESIGN
- Author
-
Yuswono Hadi and Rexy Satrya Yuwana Adam
- Subjects
lcsh:T55.4-60.8 ,business.industry ,Computer science ,media_common.quotation_subject ,completely randomized factorial experimental design ,Factorial experiment ,computer.software_genre ,writing format ,Test (assessment) ,Factorial experimental design ,Environmental destruction ,Reading comprehension ,excessive paper usage ,Reading (process) ,Multiple comparisons problem ,lcsh:Industrial engineering. Management engineering ,Artificial intelligence ,business ,computer ,Natural language processing ,media_common - Abstract
Paper writing with the existing writing format causing excessive paper usage. Excessive paper usage could lead to environmental destruction. Therefore, it is necessary to find an alternative in the writing procedure by doing an experimental design based on student reading comprehensive. This study uses Completely Randomized Factorial Experimental Design. After analysis of variance and the multiple comparisons test done, it results a new writing format alternative that use less paper than the existing writing procedure. In other hand, it results greater student reading comprehensive than the existing writing procedure. With the results, the application of the alternative procedure can save the paper usage and make student easier to understand the paper .
- Published
- 2018
118. A blockchain future for internet of things security: a position paper
- Author
-
Mandrita Banerjee, Junghee Lee, and Kim-Kwang Raymond Choo
- Subjects
Blockchain ,lcsh:T58.5-58.64 ,Computer Networks and Communications ,Computer science ,business.industry ,lcsh:Information technology ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,World Wide Web ,Smart grid ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Position paper ,020201 artificial intelligence & image processing ,Research questions ,Intrusion prevention system ,Internet of Things ,business ,computer - Abstract
Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of-Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a number of observations, including the lack of publicly available IoT datasets that can be used by the research and practitioner communities. Given the potentially sensitive nature of IoT datasets, there is a need to develop a standard for sharing IoT datasets among the research and practitioner communities and other relevant stakeholders. Thus, we posit the potential for blockchain technology in facilitating secure sharing of IoT datasets (e.g., using blockchain to ensure the integrity of shared datasets) and securing IoT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions. Keywords: Blockchain, Blockchain security, Collaborative security, Internet-of-military things, IoT dataset, IoT self-healing, IoT security, Intrusion-prevention system, Predictive IoT security, Predictive security
- Published
- 2018
119. Optimization of the development of latent fingermarks on thermal papers
- Author
-
Laurent Tamisier, Pierre Ledroit, Marianne Malo, Damien Henrot, and Florine Hallez
- Subjects
Paper ,Hot Temperature ,Luminescent Agents ,Time Factors ,business.industry ,Computer science ,Ninhydrin ,Acetates ,Comparative trial ,Machine learning ,computer.software_genre ,Pathology and Forensic Medicine ,Magnetic powder ,Acetone ,Indans ,Humans ,Indicators and Reagents ,Cyanoacrylates ,Artificial intelligence ,Dermatoglyphics ,Powders ,Volatilization ,business ,Law ,computer - Abstract
Thermal papers, commonly used for printed receipts or lottery tickets, are omnipresent in our everyday life. They are regarded as semi-porous substrates, and yet can be critical to analyze when looking for latent fingermarks due to their thermosensibility. The aim of this study was to investigate a development sequence that would better combine the adequate detection techniques in order to maximize the chances to develop latent fingermarks left on these substrates. Different methods of development have been compared on test substrates: black magnetic powder, Lumicyano™, thermal development, ninhydrin and 1,2-indanedione/ZnCl2. Whitening stages and thermal development have been focused on, tested and optimized. The results of these preliminary tests enabled the study of three development sequences. They have subsequently been compared to the one currently used in the Gendarmerie's laboratories and the best results have been provided during pseudo-operational comparative trials by one of these sequences, consisting in 6 stages.
- Published
- 2019
120. Blockchain based secure data sharing system for Internet of vehicles: A position paper
- Author
-
Jiangtao Li, Mingxing Luo, Man Ho Au, Tong Chen, Shengwei Tian, Kim-Kwang Raymond Choo, and Lei Zhang
- Subjects
Cryptocurrency ,Blockchain ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,010501 environmental sciences ,Computer security ,computer.software_genre ,01 natural sciences ,Data sharing ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Position paper ,The Internet ,Electrical and Electronic Engineering ,business ,computer ,0105 earth and related environmental sciences ,Block (data storage) - Abstract
One of the benefits of Internet of Vehicles (IoV) is improved traffic safety and efficiency, for example due to the capability to share vehicular messages in real-time. While most of the vehicular messages only need to be shared by nearby vehicles, some messages (e.g., announcement messages) may need to be more broadly distributed, for example to vehicles in a wider region. Finding a single trusted entity to store and distribute such messages can be challenging, and vehicles may not be inclined to participate (e.g., generation and distribution of announcement messages) unless they can benefit from such participation. In addition, achieving both security and privacy can be challenging. In this paper, we propose a blockchain based secure data sharing system to address the above challenges in an IoV setting. Specifically, in our system, announcement messages are stored using blockchain. To encourage/incentivize participation, vehicles that faithfully broadcast the announcement messages and/or contribute to the block generation will be rewarded by some cryptocurrency. Our system is also designed to be privacy-preserving and realizes both priori and posteriori countermeasures.
- Published
- 2019
121. White Paper: the Provision of School Psychological Services to Dual Language Learners
- Author
-
Cathi Draper Rodríguez, Pedro Olvera, and Carol Robinson-Zañartu
- Subjects
Medical education ,05 social sciences ,School psychology ,050301 education ,Spec# ,Educational psychology ,General Medicine ,White paper ,Second language ,Dual language ,0501 psychology and cognitive sciences ,Psychology ,0503 education ,computer ,Neuroscience of multilingualism ,Competence (human resources) ,050104 developmental & child psychology ,computer.programming_language - Abstract
School psychologists are increasingly tasked with assessing, supporting, and intervening with dual language learner (DLL) students, their teachers, and their families. Understanding the assets of bilingualism along with multiple issues associated with comprehensive practice with DLL has become paramount. Currently, practitioners often lack the depth in knowledge of cultural variables, dual language acquisition, knowledge of programs to effectively serve DLL students, bilingual assessment, and research and evidence-based practice to serve DLLs competently, as well as depth in second language competence. This white paper, endorsed by the School Psychology Educators of California (SPEC) and the California Association of School Psychologists (CASP), outlines areas of competence deemed to be essential to all psychologists, as well as additional areas of competence for practitioners identifying themselves bilingual school psychologists.
- Published
- 2019
122. Geospatial and Image Data from the 'When Computers Dream of Charcoal: Using Deep Learning, Open Tools and Open Data to Identify Relict Charcoal Hearths in and Around State Game Lands in Pennsylvania' Paper
- Author
-
Jeff Blackadar, Weston Conner, and Benjamin Carter
- Subjects
Geospatial analysis ,iron production ,Shapefile ,rch ,computer.software_genre ,Upload ,relict charcoal hearth ,mask r-cnn ,Archaeology, History ,Digital elevation model ,Charcoal ,pennsylvania ,deep learning ,computer.file_format ,Archaeology ,Object detection ,Open data ,Geography ,Relict Charcoal Hearth ,RCH ,Mask R-CNN ,Pennsylvania ,Digital Elevation Model ,Iron Production ,Deep Learning ,visual_art ,digital elevation model ,visual_art.visual_art_medium ,State (computer science) ,computer ,CC1-960 - Abstract
These data were used to build an object detection model to locate Relict Charcoal Hearths (RCH) as described in the paper “When Computers Dream of Charcoal: Using Deep Learning, Open Tools and Open Data to Identify Relict Charcoal Hearths in and around State Game Lands in Pennsylvania” [1]. This is the first grouping of data for the paper above. The second grouping is also available in this journal, see “Object detection model, image data and results from the “When Computers Dream of Charcoal: Using Deep Learning, Open Tools and Open Data to Identify Relict Charcoal Hearths in and around State Game Lands in Pennsylvania” paper”. These files consist of georeferenced Digital Elevation Model, Hillshade and Slope files derived from LiDAR for the State Game Lands (SGL). Included is a Shapefile and GeoJSON of State Game Land borders as well as the program used for downloading the LiDAR files. These data are stored on Zenodo.org .
- Published
- 2021
123. Reproducibility Companion Paper
- Author
-
Zhenzhong Kuang, Xinke Li, Zekun Tong, Cise Midoglu, Yabang Zhao, Yuqing Liao, and Andrew Lim
- Subjects
Source code ,Computer science ,business.industry ,media_common.quotation_subject ,Deep learning ,Point cloud ,computer.software_genre ,File format ,Replication (computing) ,Photogrammetry ,Benchmark (surveying) ,Segmentation ,Artificial intelligence ,Data mining ,business ,computer ,media_common - Abstract
This companion paper is to support the replication of paper "Campus3D: A Photogrammetry Point Cloud Benchmark for Outdoor Scene Hierarchical Understanding", which was presented at ACM Multimedia 2020. The supported paper's main purpose was to provide a photogrammetry point cloud-based dataset with hierarchical multilabels to facilitate the area of 3D deep learning. Based on this provided dataset and source code, in this work, we build a complete package to reimplement the proposed methods and experiments (i.e., the hierarchical learning framework and the benchmarks of the hierarchical semantic segmentation task). Specifically, this paper contains the technical details of the package, including file structure, dataset preparation, installation package, and the conduction of the experiment. We also present the replicated experiment results and indicate our contributions to the original implementation.
- Published
- 2021
124. Reproducibility Companion Paper
- Author
-
Zhenzhong Kuang, Fan Yu, Jinhui Tang, Gangshan Wu, Tongwei Ren, Jingjing Chen, and Haonan Wang
- Subjects
Reproducibility ,Source code ,Information retrieval ,Relation (database) ,business.industry ,Computer science ,media_common.quotation_subject ,Inference ,File format ,computer.software_genre ,Image (mathematics) ,Scripting language ,business ,Publication ,computer ,media_common - Abstract
In this companion paper, we provide the details of the reproducibility artifacts of the paper "Visual Relation of Interest Detection" presented at MM'20. Visual Relation of Interest Detection (VROID) aims to detect visual relations that are important for conveying the main content of an image. In this paper, we explain the file structure of the source code and publish the details of our ViROI dataset, which can be used to retrain the model with custom parameters. We also detail the scripts for component analysis and comparison with other methods and list the parameters that can be modified for custom training and inference.
- Published
- 2021
125. Reproducibility Companion Paper
- Author
-
Lucjan Janowski, Jakub Nawała, Bogdan Ćmiel, Marc A. Kastner, Krzysztof Rusek, and Jan Zahálka
- Subjects
FOS: Computer and information sciences ,Soundness ,Reproducibility ,business.industry ,Computer science ,P–P plot ,H.5.1 ,G.3 ,computer.software_genre ,Plot (graphics) ,Multimedia (cs.MM) ,Software framework ,62-04 ,Consistency (negotiation) ,Subjective data ,p-value ,Artificial intelligence ,business ,computer ,Computer Science - Multimedia ,Natural language processing - Abstract
In this paper we reproduce experimental results presented in our earlier work titled "Describing Subjective Experiment Consistency by $p$-Value P-P Plot" that was presented in the course of the 28th ACM International Conference on Multimedia. The paper aims at verifying the soundness of our prior results and helping others understand our software framework. We present artifacts that help reproduce tables, figures and all the data derived from raw subjective responses that were included in our earlier work. Using the artifacts we show that our results are reproducible. We invite everyone to use our software framework for subjective responses analyses going beyond reproducibility efforts., Comment: Please refer to the original publication: https://dl.acm.org/doi/10.1145/3474085.3477935 Related paper: https://dl.acm.org/doi/abs/10.1145/3394171.3413749 or arXiv:2009.13372
- Published
- 2021
126. Perancangan Tampilan User Interface Pada Website Klinik Sehat Berdasarkan Metode Paper Prototype
- Author
-
Hendy Tannady, Dina Natalia, and Dela Haeraini
- Subjects
Computer science ,Operating system ,computer.software_genre ,computer - Abstract
Peran teknologi informasi bagi perusahaan mempunyai peranan penting dan dapat menjadi pusat strategi bisnis untuk memperoleh keunggulan bersaing. Saat ini teknologi informasi sudah menjadi kebutuhan dasar bagi setiap perusahaan. Perusahaan yang ingin dikenal secara luas maupun perusahaan yang ingin menjaga hubungan dengan pelanggannya perlu membuat situs/website yang berisi informasi profil perusahaan maupun jasa/produk yang diberikan. Setiap website pasti memiliki sebuah user interface yang berbeda-beda. Klinik Sehat sama seperti klinik pada umumnya yang memberikan pelayanan yang efektif dan efisien. Untuk meningkatkan pelayanan klinik, pihak klinik ingin membuat website yang dapat digunakan pengguna untuk mudah melihat aktifitas yang sedang berlangsung di klinik. Dengan membuat website klinik, tampilan antarmuka (interface) berperan penting dalam pembuatan website. Interface merupakan hal yang di lihat pertama kali pada saat pengguna membuka website Klinik Sehat. Interface menjadi patokan. Untuk membuat interface yang bersifat user friendly pihak kinik membuat interface dengan metode paper prototype. Paper prototype dapat membantu membuat interface pada awal pengembangannya. Hasil yang di dapat pada paper ini adalah metode paper prototype cocok digunakan untuk membuat tampilan user interface pada website seperti Klinik Sehat, tampilan user interface yang user friendly bagi para pengguna website, Pengguna dapat melakukan ujicoba antarmuka dengan aksi-aksi yang nyata dan juga dapat menentukan sendiri aksi atau tugas apa saja yang bisa dipahami dan dilakukan ketika menggunakan aplikasi/website tersebut secara intuitif.
- Published
- 2021
127. New technology of waste paper deinking based on cost control and machine learning
- Author
-
Hao Wang, Tianran Chen, and Lei Chen
- Subjects
Production line ,Artificial neural network ,Computer science ,business.industry ,Fuzzy set ,Control (management) ,Machine learning ,computer.software_genre ,Deinking ,Rprop ,Fuzzy logic ,law.invention ,law ,Control system ,Artificial intelligence ,business ,computer - Abstract
This chapter focuses on cost control by analyzing the intelligent control system of waste paper deinking production line, and finally designs a solution. In the aspect of control index, machine learning has designed a solution that pays less attention to the benefit of a single control loop and focuses on maximizing the overall benefit of the production line. In the aspect of control demand, according to the complexity of waste paper deinking production line, a distributed control solution is designed Finally, according to the dynamic fuzziness in machine learning system, the basic concept of dynamic fuzzy machine learning is constructed by using dynamic fuzzy set The dynamic fuzzy machine learning model is described and the related learning algorithm is given. Finally, a simulation example is given, and satisfactory results are obtained by comparing with the elastic BP algorithm RPROP of neural network.
- Published
- 2021
128. Paper Basis Weight Control in Paper Mill using Dead Time Approximation and Dead Time Compensation Techniques
- Author
-
Pradeep Kumar Juneja, Amit Mittal, Sudhanshu Maurya, Govind Singh, Sandeep Kumar Sunori, Abhijit Singh Bhakuni, and Shweta Arora
- Subjects
Control theory ,Computer science ,Control system ,Process (computing) ,Process control ,Production (economics) ,Dead time ,MATLAB ,computer ,Transfer function ,computer.programming_language ,Smith predictor - Abstract
This work is centered on the paper making process in an industrial paper mill. There exist plenty of sub-processes in a paper mill for transformation of raw material to finished product. A particular process that is taken up in this research is paper basis weight control process, which is very important for good quality paper production. But the controller design for this process is very challenging due to the involvement of severe dead time value, which in addition to delaying the control output, makes the control system unstable. So, two different approaches are used here, in MATLAB, for controller design, one is the dead time approximation using Pade approximation technique and the other is dead time compensation using Smith predictor technique. Hence, the performance of the designed control systems is compared.
- Published
- 2021
129. A comparative analysis of an electronic exams versus paper exams between different gender of iraqi students
- Author
-
Marwa M. Ismail, Bashar S. Bashar, and Bashar Bahaa Qas Elias
- Subjects
Response rate (survey) ,Control and Optimization ,Multimedia ,Computer Networks and Communications ,Computer science ,Process (engineering) ,computer.software_genre ,Continuous training ,Paper exam ,MSQ, SQL server ,E-exam ,NET Framework 4.5 ,Hardware and Architecture ,Signal Processing ,ComputingMilieux_COMPUTERSANDEDUCATION ,Electrical and Electronic Engineering ,computer ,Information Systems - Abstract
When students believe they can get smarter, they understand that effort makes them stronger. Therefore, they put in extra time and effort, and that leads to higher achievement. Besides that, the arrangement of question papers and answer sheets process for a high number of students takes a long time. In this paper, the sheet exam has been proposed to change into an electric exam (E-exam). This system depended on the client-server framework to convert the traditional exam environment into an electronic exam, providing multiple and different questions at the same time. In additions, kept the grades of students and providing them automatically. In this paper, Visual Studio and Microsoft SQL server have been proposed to develop the electronic exam. The questionnaire is made by distributed it among 30 students, and after the data analysis, the results have been collected have been represented a response rate of 100%. It is recommended that, to take electronic exams and e-learning for students periodically. To improve their performance through continuous training on computerized exams and to increase the student’s efficiency in this type of learning.
- Published
- 2020
130. Categorisation of Computer Science Research Papers using Supervised Machine Learning Techniques
- Author
-
Sameerchand Pudaruth and Hemrajsingh Gheeseewan
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Document classification ,Deep learning ,computer.software_genre ,Logistic regression ,Machine learning ,Computer Graphics and Computer-Aided Design ,Human-Computer Interaction ,Artificial Intelligence ,Management of Technology and Innovation ,Artificial intelligence ,business ,computer ,Information Systems - Published
- 2020
131. Image Matching Across Wide Baselines: From Paper to Practice
- Author
-
Yuhe Jin, Kwang Moo Yi, Pascal Fua, Eduard Trulls, Jiri Matas, Dmytro Mishkin, and Anastasiia Mishchuk
- Subjects
FOS: Computer and information sciences ,Computer science ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,02 engineering and technology ,computer.software_genre ,benchmark ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,dataset ,Structure from motion ,local features ,3d reconstruction ,structure from motion ,stereo ,Benchmarking ,Pipeline (software) ,Pattern recognition (psychology) ,Metric (mathematics) ,Benchmark (computing) ,Embedding ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Data mining ,Heuristics ,computer ,performance ,Software - Abstract
We introduce a comprehensive benchmark for local features and robust estimation algorithms, focusing on the downstream task -- the accuracy of the reconstructed camera pose -- as our primary metric. Our pipeline's modular structure allows easy integration, configuration, and combination of different methods and heuristics. This is demonstrated by embedding dozens of popular algorithms and evaluating them, from seminal works to the cutting edge of machine learning research. We show that with proper settings, classical solutions may still outperform the perceived state of the art. Besides establishing the actual state of the art, the conducted experiments reveal unexpected properties of Structure from Motion (SfM) pipelines that can help improve their performance, for both algorithmic and learned methods. Data and code are online https://github.com/vcg-uvic/image-matching-benchmark, providing an easy-to-use and flexible framework for the benchmarking of local features and robust estimation methods, both alongside and against top-performing methods. This work provides a basis for the Image Matching Challenge https://vision.uvic.ca/image-matching-challenge., Comment: Added: KeyNet-SOSNet, AffNet-HardNet, TFeat, MKD from kornia
- Published
- 2020
132. THE INFUSION SPEECH SKELETON APPLICATION (APP) AS A TEACHING MEDIUM FOR STUDENTS OF OFFICE MANAGEMENT & TECHNOLOGY (OMT): A CONCEPTUAL PAPER
- Author
-
Shamsinar Ibrahim, Norhafiza Hashim, Nurliyana Abas, and Syahrini Shawalluddin
- Subjects
Multimedia ,Computer science ,General Arts and Humanities ,media_common.quotation_subject ,Interactive design ,05 social sciences ,Novelty ,050301 education ,General Social Sciences ,computer.software_genre ,Focus group ,Learning experience ,030507 speech-language pathology & audiology ,03 medical and health sciences ,Public speaking ,Originality ,Office management ,ComputingMilieux_COMPUTERSANDEDUCATION ,0305 other medical science ,0503 education ,computer ,media_common - Abstract
Purpose of the study: This study aimed to utilize the usage of App in Public Speaking course to ease and engage students of Office Management & Technology (OMT) in their learning experience by providing the simplified version of speech draft development. Methodology: The development of the App divided into two divisions, (a) the App content and, (b) the App design and concept. The content of the App was from the main textbook, simplified to serve the needs of OMT students, whereas the Apps’ design and concept were based on interactive design and waterfall models. Analysis, Design, Development, Implementation, and Evaluation (ADDIE) and Focus Group were also included. Main Findings: The Infusion Speech Skeleton App is projected to be a vital platform for students to improve their understanding of the course. The App is also expected to improve students’ performance particularly those who have trouble comprehending speech draft development. Applications of this study: Because the App is mainly developed with OMT students in the loop, most of the settings will be in OMT students’ favors. However, the Apps also can be beneficial to those taking literature, and other communications studies for basic reference. Novelty/Originality of this study: The App usage in learning was introduced in many courses, however, to our best knowledge this is the first attempt of App development and implementation in the course of public speaking, focusing on the need for non-communication students, OMT students.
- Published
- 2020
133. Johann Wolfgang von Goethe, Faust: A Tragedy, Part I. Edited and translated by Eugene Stelzig. Lewiston, PA: Bucknell University Press, 2019. ix+233 pp. US$19.95 (paper)
- Author
-
Edward T. Larkin
- Subjects
Cultural Studies ,Literature and Literary Theory ,media_common.quotation_subject ,FAUST ,Art history ,Tragedy (event) ,Art ,computer ,computer.programming_language ,media_common - Published
- 2020
134. Effects of Data-Collection Designs in the Comparison of Computer-Based and Paper-Based Tests
- Author
-
Alvaro J. Arce-Ferrer and Okan Bulut
- Subjects
Data collection ,Computer science ,Item analysis ,05 social sciences ,Computer based ,050301 education ,Test validity ,Paper based ,computer.software_genre ,Education ,Item response theory ,Developmental and Educational Psychology ,Data mining ,0503 education ,computer - Abstract
This study investigated the performance of four widely used data-collection designs in detecting test-mode effects (i.e., computer-based versus paper-based testing). The experimental conditions inc...
- Published
- 2018
135. A Paper Machine of Clinical Research in the Early Twentieth Century
- Author
-
Volker Hess
- Subjects
Cognitive science ,History ,Paper machine ,business.product_category ,Mode (computer interface) ,History and Philosophy of Science ,Computer science ,Earth and Planetary Sciences (miscellaneous) ,business ,Turing ,computer ,computer.programming_language - Abstract
This article introduces Turing’s idea of a “paper machine” to identify and understand one important mode of clinical research in the modern hospital, how that research worked, and how offic...
- Published
- 2018
136. Quantitative and Qualitative Approach of Scientific Paper Popularity By Naïve Bayes Classifier
- Author
-
Glauber Tadaiesky Marques, J. Felipe Almeida, Tobias Ribeiro Sombra, P.H.O.V. Campos, Otavio Andre Chase, Alex de Jesus Zissou, Paulo Cerqueira dos Santos Júnior, Emerson Cordeiro Morais, Rose Marie Santini, and Walmir Oliveira Couto
- Subjects
Naive Bayes classifier ,Computer science ,business.industry ,General Medicine ,Artificial intelligence ,Machine learning ,computer.software_genre ,business ,Popularity ,computer - Abstract
Usually, scientific research begins with the collection of data in which online social media tools can be some of the most rewarding and informative resources. The extensive measure of accessible information pulls in users from undergraduate students to postdoc. The search for scientific themes has popularized due to the availability of abundant publications that resides in scientific social networks such as Mendeley, ResearchGate etc. Articles are published on these media inform of text for knowledge dissemination, scientific support, research, updates etc, and are frequently uploaded after its publication in a proceedings or journal. In this sense, data collected from database often contains high noise and its analysis can be treated as a characterization undertaking as it groups the introduction of a content into either good or bad. In this text, we present quantitative and qualitative analysis of papers popularity in Mendeley repository by using naive Bayes Classifier.
- Published
- 2020
137. White paper: technology for surgical telementoring—SAGES Project 6 Technology Working Group
- Author
-
Christopher M. Schlachta, Etai M. Bogen, and Todd A. Ponsky
- Subjects
Health Insurance Portability and Accountability Act ,geography ,Summit ,geography.geographical_feature_category ,Multimedia ,Guiding Principles ,Video capture ,business.industry ,Mentoring ,Usability ,computer.software_genre ,Telemedicine ,United States ,Videoconferencing ,White paper ,Need to know ,Humans ,Minimally Invasive Surgical Procedures ,Medicine ,Surgery ,Prospective Studies ,business ,computer ,Design technology - Abstract
Recent advances in telecommunication technology and video conferencing systems have opened a new avenue for surgical instruction called “surgical telementoring.” This report from the Technology Working Group of the SAGES Project 6 Summit reviews the telementoring technology that currently exists and proposes recommendations for minimum technology requirements and future technology development. While also providing insight in regulatory considerations, this review offers what prospective surgical telementoring participants need to know about the underlying technology with a specific focus on safety, reliability, transmission quality, ease of use, and cost. Content experts from around the world, in minimally invasive surgery, surgical mentoring and telementoring, surgical education, business development, healthcare innovation, and regulation were invited to attend a 2-day summit in Los Angeles, USA to outline the current state of surgical telementoring and chart the challenges and opportunities going forward. This article summarizes the discussion, conclusions, and recommendation of the technology group with regard to telementoring technology. This article reviews the technical requirements which can be divided into the following categories: (1) safety, (2) reliability, (3) transmission quality, (4) ease of use, and (5) cost. Telementoring applications are technology driven. Given the pace of change of technology, guiding principles in technology design and selection are warranted (Table 4). Telementoring technologies require two basic components, video capturing and display devices at the transmitting and receiving end, and a telecommunication link between them. Many additional features can be added to this basic setup including multiple cameras or video sources, remote camera zoom and pan, recording and storage of videos and images, and telestration capabilities to mention just a few. In general, the cost of these technologies is feature driven. The education framework for each specific application should determine the need for these features (Schlachta in Surg Endosc https://doi.org/10.1007/s00464-016-4988-5 ).
- Published
- 2019
138. Auto-generated Test Paper Based on Knowledge Embedding
- Author
-
Guo-Sheng Hao, Fang Luo, Yi-Yang He, Xiao-Dan He, Zeng-Hui Duan, and Xing-Liu Hu
- Subjects
Computer science ,Embedding ,Data mining ,Paper based ,computer.software_genre ,computer ,Computer Science Applications ,Education ,Test (assessment) - Published
- 2019
139. The Limits of Party: Congress and Lawmaking in a Polarized Era. By James M. Curry and Frances E. Lee. Chicago: University of Chicago Press, 2020. 200p. $95.00 cloth, $30.00 paper
- Author
-
Jonathan Lewallen
- Subjects
media_common.quotation_subject ,Political Science and International Relations ,Curry ,Lawmaking ,Art ,computer ,Humanities ,computer.programming_language ,media_common - Published
- 2021
140. Indigenous Community Policing - Self-Defense in Mexico: Indigenous Community Policing and the New Dirty Wars. By Luis Hernández Navarro. Translated by Ramor Ryan. Chapel Hill: University of North Carolina Press, 2020. Pp. x, 263. Bibliography. Index. $90.00 cloth; $29.95 paper; $22.99 e-Book
- Author
-
Adela Cedillo
- Subjects
Cultural Studies ,History ,Index (economics) ,Chapel ,Ethnology ,Community policing ,Sociology ,Self defense ,computer ,Indigenous ,computer.programming_language - Published
- 2021
141. Visions in a Seer Stone: Joseph Smith and the Making of the Book of Mormon. By William L. Davis. Chapel Hill: The University of North Carolina Press, 2020. viii + 250 pp. $90.00 hardcover; $29.95 paper
- Author
-
Janiece Johnson
- Subjects
Cultural Studies ,History ,Vision ,media_common.quotation_subject ,Chapel ,Religious studies ,Art history ,Art ,Making-of ,computer ,computer.programming_language ,media_common - Published
- 2021
142. Confederate Exceptionalism: Civil War Myth and Memory in the Twenty-First Century. By Nicole Maurantonio (Lawrence, University of Kansas Press, 2019) 264 pp. $32.50 Civil War Monuments and the Militarization of America. By Thomas J. Brown (Chapel Hill, University of North Carolina Press, 2019) 384 pp. $90.00 cloth $29.95 paper
- Author
-
Barbara A. Gannon
- Subjects
History ,media_common.quotation_subject ,Twenty-First Century ,Mythology ,Art ,Ancient history ,Atomic and Molecular Physics, and Optics ,Exceptionalism ,Spanish Civil War ,History and Philosophy of Science ,Chapel ,Electrical and Electronic Engineering ,computer ,Militarization ,media_common ,computer.programming_language - Published
- 2021
143. American Slavery and Russian Serfdom in the Post-Emancipation Imagination. By Amanda Brickell Bellows (Chapel Hill, University of North Carolina Press, 2020) 304 pp. $90.00 cloth $29.95 paper
- Author
-
Alessandro Stanziani
- Subjects
History ,Emancipation ,History and Philosophy of Science ,media_common.quotation_subject ,Chapel ,Serfdom ,Art history ,Art ,Electrical and Electronic Engineering ,computer ,Atomic and Molecular Physics, and Optics ,computer.programming_language ,media_common - Published
- 2021
144. Short Paper: Secure Multiparty Logic Programming
- Author
-
Alisa Pankova and Joosep Jääger
- Subjects
021110 strategic, defence & security studies ,Focus (computing) ,Computer science ,Programming language ,Simple (abstract algebra) ,Process (engineering) ,Short paper ,0211 other engineering and technologies ,Secure multi-party computation ,02 engineering and technology ,computer.software_genre ,computer ,Logic programming - Abstract
Logic Programming (LP) is considered to be relatively simple for non-programmers, and allows the developer to focus on developing facts and rules of a logical derivation, and not on algorithms. Secure multiparty computation (MPC) is a methodology that allows several parties to process private data collaboratively without revealing the data to any party. In this paper, we bring together the notions of MPC and LP, allowing users to write privacy-preserving applications in logic programming language.
- Published
- 2020
145. Position Paper:Defending Direct Memory Access with CHERI Capabilities
- Author
-
John Baldwin, Simon W. Moore, A. Theodore Markettos, Peter G. Neumann, Robert N. M. Watson, and Ruslan Bukin
- Subjects
Microcontroller ,Software ,Computer science ,business.industry ,Systems architecture ,Position paper ,business ,Computer security ,computer.software_genre ,Direct memory access ,computer ,Bridge (nautical) - Abstract
We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security. Previous work has shown that existing defenses are insufficient and poorly deployed, in part due to performance concerns. In this paper we explore the threat and its implications for system architecture. We propose a range of protection techniques, from lightweight to heavyweight, across different classes of systems. We consider how emerging capability architectures (and specifically the CHERI protection model) can enhance protection and provide a convenient bridge to describe interactions among software and hardware components. Finally, we describe how new schemes may be more efficient than existing defenses.
- Published
- 2020
146. Watermarking for Paper-Based Digital Microfluidic Biochips
- Author
-
Tsung-Yi Ho, Katherine Shu-Min Li, Jian-De Li, and Sying-Jyan Wang
- Subjects
Scheme (programming language) ,021110 strategic, defence & security studies ,Computer science ,business.industry ,Microfluidics ,0211 other engineering and technologies ,02 engineering and technology ,Paper based ,Man-in-the-middle attack ,020202 computer hardware & architecture ,Trojan ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Biochip ,business ,computer ,Digital watermarking ,Countermeasure (computer) ,computer.programming_language - Abstract
Paper-based digital microfluidic biochip (PB-DMFB) technology provides a promising solution to many biochemical applications. However, PB-DMFB manufacturing process may suffer from potential security threats. For example, both Trojan insertion and man-in-the-middle attack may affect the functionality of PB-DMFBs. To ensure the correct functionality of PB-DMFBs, we propose a watermarking scheme to hides information in the PB-DMFB layout, which allows users to check design integrity and authenticate the source of the PB-DMFB design. As a result, it serves as a first countermeasure against both Trojan insertion and man-in-the-middle attacks for PB-DMFBs.
- Published
- 2020
147. Vision Paper
- Author
-
Juheon Yi, Fahim Kawsar, and Chulhong Min
- Subjects
Multimedia ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Service provider ,computer.software_genre ,System requirements ,Software ,Analytics ,Software deployment ,Systems architecture ,Key (cryptography) ,Architecture ,business ,computer - Abstract
Video cameras are becoming ubiquitous in our daily lives. With the recent advancement of Artificial Intelligence (AI), live video analytics are enabling various useful services, including traffic monitoring and campus surveillance. However, current video analytics systems are highly limited in leveraging the enormous opportunities of the deployed cameras due to (i) centralized processing architecture (i.e., cameras are treated as dumb streaming-only sensors), (ii) hard-coded analytics capabilities from tightly coupled hardware and software, (iii) isolated and fragmented camera deployment from different service providers, and (iv) independent processing of camera streams without any collaboration. In this paper, we envision a full-fledged system for software-defined video analytics with cross-camera collaboration that overcomes the aforementioned limitations. We illustrate its detailed system architecture, carefully analyze the key system requirements with representative app scenarios, and derive potential research issues along with a summary of the status quo of existing works.
- Published
- 2021
148. Disaster Damage Estimation from Real-time Population Dynamics using Graph Convolutional Network (Industrial Paper)
- Author
-
Keiichi Ochiai, Yamada Wataru, Masayuki Terada, and Hiroto Akatsuka
- Subjects
education.field_of_study ,Emergency management ,Exploit ,Flood myth ,Computer science ,business.industry ,Population ,computer.software_genre ,Cellular network ,Graph (abstract data type) ,Data mining ,business ,Baseline (configuration management) ,education ,Natural disaster ,computer - Abstract
Storm and flood disasters such as typhoons and torrential rains are becoming more intense and frequent. The national government and municipalities must respond to such natural disasters as soon as possible. When the scale of damage is large; however, it takes much time to investigate the severity of damage, and the initial response can be delayed. If we could precisely and rapidly estimate the severity of damage for each city at an early stage, the national government would be able to better support the municipalities, and consequently respond quickly to help citizens. In this paper, we propose a novel approach to estimate the severity of disaster damage within a short time period after a disaster occurs by exploiting real-time population data generated from cellular networks. First, we investigate the relationship between real-time population data and the severity of damage. Then, we design a Graph Convolutional Networks for Disaster Damage Estimation, called D2E-GCN, which fully exploits the directed and weighted characteristics of human mobility graph. We conduct an offline evaluation on real-world datasets including two typhoons that hit Japan. The evaluation results show that the proposed method outperforms baseline methods which do not consider the graph structure of cities, and the proposed method can estimate the severity of damage approximately 48 hours after typhoons passed. Moreover, we find the experimental insight that the estimation performance can be significantly affected by the graph construction method for GCN models.
- Published
- 2021
149. Separation of Powers in Federated Learning (Poster Paper)
- Author
-
Zhongshu Gu, Hani Jamjoom, Kevin Eykholt, Pau-Chen Cheng, K. R. Jayaram, Enriquillo Valdez, and Ashish Verma
- Subjects
Trustworthiness ,Training set ,Computer science ,Distributed computing ,Information leakage ,Separation of powers ,Computer security model ,Architecture ,computer.software_genre ,computer ,Federated learning ,News aggregator - Abstract
In federated learning (FL), model updates from mutually distrusting parties are aggregated in a centralized fusion server. The concentration of model updates simplifies FL's model building process, but might lead to unforeseeable information leakage. This problem has become acute due to recent FL attacks that can reconstruct large fractions of training data from ostensibly "sanitized" model updates. In this paper, we re-examine the current design of FL systems under the new security model of reconstruction attacks. To break down information concentration, we build TRUDA, a new cross-silo FL system, employing a trustworthy and decentralized aggregation architecture. Based on the unique computational properties of model-fusion algorithms, we disassemble all exchanged model updates at the parameter-granularity and re-stitch them to form random partitions designated for multiple hardware-protected aggregators. Thus, each aggregator only has a fragmentary and shuffled view of model updates and is oblivious to the model architecture. The deployed security mechanisms in TRUDA can effectively mitigate training data reconstruction attacks, while still preserving the accuracy of trained models and keeping performance overheads low.
- Published
- 2021
150. Reproducibility Companion Paper
- Author
-
Jari Korhonen, Cise Midoglu, Junyong You, Yicheng Su, and Steven Alexander Hicks
- Subjects
Computer science ,business.industry ,Human visual system model ,Process (computing) ,Natural (music) ,Artificial intelligence ,Machine learning ,computer.software_genre ,business ,Video quality ,Convolutional neural network ,computer - Abstract
Blind natural video quality assessment (BVQA), also known as no-reference video quality assessment, is a highly active research topic. In our recent contribution titled "Blind Natural Video Quality Prediction via Statistical Temporal Features and Deep Spatial Features" published in ACM Multimedia 2020, we proposed a two-level video quality model employing statistical temporal features and spatial features extracted by a deep convolutional neural network (CNN) for this purpose. At the time of publishing, the proposed model (CNN-TLVQM) achieved state-of-the-art results in BVQA. In this paper, we describe the process of reproducing the published results by using CNN-TLVQM on two publicly available natural video quality datasets.
- Published
- 2021
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.