No abstract available.
Proceeding Downloads
Parametrical Construction of MDS Based on Block Cyclic Shift
With the advent of the information age, using the same standard algorithm with fixed logic is difficult to meet the increasingly diversified cryptographic application requirements of cloud computing, Internet of things and 5g network environment. ...
Determining the Rumour Stance with Ensemble Method Based on BSAF Model
With the development of social platforms, the public can easily access lots of online information and express personal opinions. However, various unconfirmed rumors are flooding on social networks and leading public opinion which caused serious social ...
Multi-interest sequence recommendation algorithm based on BERT
Many studies use a fixed vector to represent the user ' s various interest preferences, and this embedding vector does not have enough ability to effectively capture the user ' s different interests, resulting in a lot of user interest representation ...
An Image Encryption Method based on Pixel-level Diffusion and Bit Flip
With the rapid development of multimedia technology, digital images are increasingly used. These applications bring great convenience to users but increase the risk of information leakage. According to the granularity of operation, the existing image ...
Exploring Support Vector Machines for Big Data Analyses
The traditional support vector machines perform well in classification and prediction on small and medium-sized data sets, but there are some problems such as the low training efficiency and the low accuracy in large sample number, high dimension and ...
The topic model of voice interactive dialogue based on the localized command and control system
The core problem of the human-machine dialogue system in the localized command and control system is to understand the information of the dialogue, and then give a reasonable answer that is satisfactory to the command system commander or assist the ...
A controllable historical message playback method and application of message middleware
The purpose of this paper is to propose a historical message playback method and a general technical solution for message middleware that follow the time interval between historical messages and the playback process is controllable. To solve the problem ...
Research on software service risk uncertainty calculation method based on information entropy
Software is the soul of computer system. The risk faced by software service directly determines the trustworthiness of software system. Taking the information entropy theory as the main method, this paper proposes a software service risk uncertainty ...
Synthetic Aperture Radar Image Target Recognition Based on Improved Fusion of R-FCN and SRC
In order to solve the problem of inaccurate classification caused by enhanced recognition ability and coherent speckle noise in synthetic spatial aperture radar image target recognition, a synthetic aperture radar target recognition algorithm based on ...
Distant Supervision Relation Extraction via Reinforcement Learning with Potential Energy Function
Distant supervision has become an essential method for relation extraction. Although distant supervision is very effective, there is a large amount of noise in the dataset produced by distant supervision. To filter out the noise in the dataset, most ...
Developing a Suitability Assessment Criteria for Software Developers: Behavioral Assessment Using Psychometric Test
A suitability assessment instrument for software developers was created using a psychometric criteria that identify the impact of behavior on the performance of software engineers. The instrument uses a questionnaire to help both individuals and IT ...
On Ethically-Sensitive User Story Engineering
The increasingly anthropomorphic, at times even autocratic, nature of software, exhibited during routine activities such as decision-making, question-answering, or recommending, has only contributed to the enduring issue of software ethics. This paper, ...
Safety Modeling and Analysis of Undercarriage System Based on Cross-Verification of FHA and PHA
FHA and PHA are two common methods applied in analysis of system safety. However, the two methods have some problems such as to omit hazard analysis or control solution. Meanwhile it is not practical and not effective to deal with enormous work manually ...
Test Sequence Generation Based on Chain Unique Input-Output Sequence in FSM Conformance Testing
This paper introduces a test method based on chain unique input/output (CUIO) sequence in finite state machine (FSM) conformance testing. For FSMs with UIO for each state, the test sequence based on CUIO can identify all the states and verify all the ...
Chinese Text Similarity Calculation Model Based on Multi-Attention Siamese Bi-LSTM
Measuring text similarity is a key research area in natural language processing technology. In this research, we proposed a multi-attention Siamese bi-directional long short-term memory (MAS-Bi-LSTM) to calculate the semantic similarity between two ...
A Review of Fatigue Driving Detection Based on Electrooculogram
Fatigue driving is one of the main causes of traffic collision, which causes great loss of life and property. Therefore, the study of fatigue driving is of great significance for preventing fatigue-related road accidents and reducing the number of ...
A new process algebra more suitable for formal specification
The paper shows that some usual specifications cannot be conveniently expressed in traditional process calculi. To solve the problem in formal specification, a new process calculus based on value-passing CCS, Calculus of Communicating Systems with ...
The Implementation of Video DES Encryption Engine in FPGA
In DVB and VOD system, the DES and Triple DES(3DES) algorithm are still be widely used for MPEG-2 packets encryption during the video traffic transmission.
This paper specifies one DES and 3DES mixture encryption engine. This engine supports video DES ...
Evaluating machine learning algorithms for intrusion detection systems using the dataset CIDDS-002
Intrusion detection systems play a vital role in protecting computer systems from external attacks. In recent years, many open-source intrusion datasets have been released to let researchers study and evaluate their detection methods. These datasets ...
Self-supervised Fine-grained Image Classification via Progressive Global Disturbance
Recently, self-supervised learning has shown to surpass the supervised counterpart for finetuning downstream applications such as ImageNet classification. However, in the area of fine-grained image recognition, self-supervised learning still lags far ...
Understanding Tail-latency in Sphinx Speech Recognition System
Tail latency in intelligent speech recognition system has become the key to improve user experience. In this study, we use Sphinx program in Tailbench suite which is a latency-critical application to analyze the causes of tail latency. The aim of ...
Analyzing the Tail Latency in TailBench Image Recognition Application IMG-DNN
In intelligence image recognition application, tail latency becomes a core factor to affect user experience. Although the tail latency is only a high-percentile latency of the total latency, reducing the tail latency can significantly improve the user ...
Refactoring Java Loops to Streams Automatically
Java, starting from version 8, adopted the functional paradigm, comprising lambda expressions, streams, functional interfaces, etc. This paper proposes an approach to automatically refactor for loops to streams. In our approach, code implementing for ...
Reflections on Computer Pipeline Technology from an Analytical Perspective
In this study, we discuss some basic concepts in the computer system about how an instruction executes. We then introduce the mechanisms of pipeline technology, its advantages, hazards, and methods to solve the hazards. We also proposed two general and ...
A Pilot Study of Requirement Prioritization Techniques in Agile Software Development.
Requirement prioritization (RP) is a method for identifying the most critical requirements that should be immediately addressed. The results show how much all parties truly understand the requirements of the project. A trustworthy requirements ...
Improving Graph Neural Network by Filter Preprocessing
For graph-based semi-supervised learning, Graph Convolutional Networks (GCNs) and their variants has shown outstanding results and gained wide attention. Several works on analyzing GCNs from the perspective of spectral graph theory shows that GCNs has ...
Memory Mountain Experiment Analysis
In this paper, we made a reflection based on the development and analysis of future CPUs. We measured the performance of two machines based on memory mountain experiments. TXT files, 2D images and 3D images were output and analyzed to consider the ...
Development of Personalized IoT Mobile Applications Using MIT APP Inventor 2
With the development of Internet of Things(IoT), sensing technology and communication technology, the interconnection of everything is the trend of social development. IoT applications are a bridge to connect objects and networks, widely used in various ...
Analysis of Machine Learning techniques for Predicting Student Success in an Educational Institution
The student success is one of the essential components to assess the quality of the educational institutions. Monitoring student performance is of no use unless or otherwise it is done from the early stage. This research work will definitely consider ...
Index Terms
- Proceedings of the 4th International Conference on Computer Science and Software Engineering
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CSSE '19 | 74 | 33 | 45% |
Overall | 74 | 33 | 45% |