<span>This three-volume set constitues selected papers presented at the 18th International Conference on Computer Science and Education, ICCSE 2023, held in Sepang, Malaysia, in December 2023. <br>The 106 full papers and 36 short papers presented were thoroughly reviewed and selected from the 305 s
Computer Science and Education. Computer Science and Technology: 18th International Conference, ICCSE 2023, Sepang, Malaysia, December 1–7, 2023, ... in Computer and Information Science)
✍ Scribed by Wenxing Hong (editor), Geetha Kanaparan (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 519
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This three-volume set constitues selected papers presented at the 18th International Conference on Computer Science and Education, ICCSE 2023, held in Sepang, Malaysia, in December 2023.
The 106 full papers and 36 short papers presented were thoroughly reviewed and selected from the 305 submissions. They focus on a wide range of computer science topics, especially AI, data science, and engineering, and technology-based education, by addressing frontier technical and business issues essential to the applications of data science in both higher education and advancing e-Society.
✦ Table of Contents
Preface
Organization
Contents – Part I
Contents – Part II
Contents – Part III
Computer Science and Data Science
Optimization of Replica Technology with Two-Stages Dynamic Factor in Cloud Environment
1 Introduction
2 Hadoop Default Replica Policy
2.1 Default Replica Management Mechanism
2.2 Main Problems and Analysis
3 Dynamic Replica Factor Adjustment Strategy
3.1 Basic Idea of Improved Algorithm
3.2 Improved Dynamic Replica Factor Adjustment Algorithm
4 Simulation Verification and Analysis
5 Conclusion
References
Study of Encryption Strategy Based on Multi Owner Attribute
1 Introduction
2 Attribute Encryption Mechanism
3 Multi Attribute Encryption Mechanism
4 Simulation Experimental and Performance Analysis
5 Conclusion
References
Web Accessibility Enhancement for Medical Consultation Platforms
1 Introduction
2 Materials and Methods
2.1 Preliminary Study
2.2 System Design and Implementation
3 User Study and Result
3.1 Experiment Design and Study
3.2 Result Analysis
4 Discussion
5 Conclusions and Future Work
References
Philosophy and History from a Cross-Cultural Perspective: Learning Based on the Assassin's Creed
1 Introduction
2 The Historical and Educational Significance of Assassin’s Creed
2.1 A Realistic Restoration of History
2.2 The Abilities it Helps to Cultivate
2.3 The Practical Applications and Cases in the Field of Education
3 Three Types of Cross-Cultural Activities When Experiencing Assassin’s Creed
3.1 Experience Role-Playing and Enjoy Vivid History
3.2 Experience Diverse Civilizations and Have Better Cognition
3.3 Make Historical Comparisons and Have Profound Reflection
4 Recommendations for Assassin’s Creed
5 Conclusion
References
Data Transaction Mode and Its Legal Regulation in the Context of Market-Oriented Allocation of Data Elements
1 Current Situation and Practical Problems of Data Trading Market
2 Trading Mode of Data Factor Market
2.1 Type of Existing Data Transaction Mode
2.2 A New Type of Data Transaction Mode: Data Division Transaction Mode
3 Legal Regulation of Data Factor Transaction
3.1 Internal Review of Data Platform
3.2 External Specification of Data Platform
4 Peroration
References
Study on the Fundamentals of Electrical Engineering Based on Grey Correlation Analysis
1 Introduction
2 Important Courses of Basic Preface of Electrical Engineering
3 The Grey Correlation Cluster Analysis Theory
4 An Empirical Study of Learning Situation Analysis
5 Conclusions
References
The Network Planning for LSP Protection in PTN
1 Introduction
1.1 A Subsection Sample
2 The Problem of LSP Protection
2.1 False LSP Protection
2.2 Valid LSP Protection
3 ILP Model for Problem of LSP Protection
3.1 Definition of LSP Protection Problem
3.2 Notations and Variables
3.3 Objective and Constraints of LSP Protection Problem
4 Heuristic Algorithm
4.1 Most Request Demand Ordering Algorithm
5 Performance Evaluation
5.1 ILP and Heuristic Algorithms Under a Small Topology
5.2 Heuristic Algorithms in a Large Topology
6 Conclusion
References
The Static Virtual Machine Placement and Routing Spectrum Assignment for Multi-tenant in Elastic Optical Networks
1 Introduction
1.1 A Subsection Sample
2 Virtual Machine Placement and Routing Spectrum Assignment
2.1 Traffic Demands Driven by VM Placement
2.2 Virtual Machine Placement and Routing Spectrum Assignment
3 ILP Model
3.1 Notations and Variables
3.2 Objective and Constraints of the VMPRSA Problem
4 Heuristic Algorithm
4.1 Two-Tier Algorithm Framework
4.2 Random Placement
4.3 Residual Node Capacity Priority
5 Performance Evaluation
5.1 ILP and Heuristic Algorithms Under a Small Topology
5.2 Heuristic Algorithms in a Large Topology
6 Conclusion
References
Machine Learning and Its Applications
CTAN: Collaborative Tag-Aware Attentive Network for Recommendation
1 Introduction
2 Related Work
2.1 Tag-Aware Recommendation
2.2 Graph-Based Representation
3 Method
3.1 Problem Formulation
3.2 Collaborative Tag-Aware Attentive Network for Recommendation
4 Experiment Setup
4.1 Dataset
4.2 Evaluation Metrics
4.3 Implementation Detail
5 Result
5.1 Performance Evaluation
5.2 Ablation Study
5.3 Parameter Experiment
6 Conclusion and Future Work
References
Research of Network Intrusion Detection Based on Improved Seagull Optimization Algorithm with Deep Learning
1 Introduction
2 Network Intrusion Detection Method Based on Improved Seagull Optimization Algorithm and Gated Recurrent Unit
2.1 Improved Seagull Optimization Algorithm
2.2 Experiment and Analysis
3 Conclusion
References
Improved Dragonfly Algorithm Based on Mixed Strategy
1 Introduction
2 Related Work
3 Mixed Strategy Improved Dragonfly Algorithm
3.1 Initialization Population Based on Sobol Sequence
3.2 Nonlinearly Decreasing Inertia Weights
3.3 Random Learning Strategy
3.4 Cauchy Mutation Strategy
3.5 Algorithm Implementation
4 Experiment
5 Conclusion
References
Deep Learning Based Network Intrusion Detection
1 Introduction
2 Related Work
3 Network Intrusion Detection Method Based on CNN and LSTM
4 Experiment and Analysis
4.1 Data Sets
4.2 Experimental Results and Analysis
5 Conclusion
References
An Optimization Algorithm Based on Levy’s Flight Improvement
1 Introduction
2 Related Works
2.1 Levy’s Flight Theory
2.2 Levy’s Flight Mathematical Representation
3 Lightning Connection Process Optimization Algorithm Combined with Levy’s Flight
3.1 Algorithm Design Idea
3.2 Algorithm Steps and Flow Chart of Levy-LAPO
4 Experiment
5 Summary of This Chapter
References
Image Classification Based on Improved Unsupervised Clustering Algorithm
1 Introduction
2 An Unsupervised Classification Model Based on Improved Kmeans Clustering Algorithm
2.1 Unsupervised Clustering Algorithm
2.2 Canopy Algorithm
2.3 Improved K-Means Algorithm Based on Density-Weighted Canopy Algorithm
3 Image Classification Combined with Residual Network Resnet Models
3.1 Unsupervised Classification Model Design
4 Simulation
4.1 Experimental Dataset
4.2 Evaluation Indicators
4.3 Experimental Results and Analysis
5 Conclusion
References
Partial Attention-Based Direction-Aware Vehicle Re-identification
1 Introduction
2 Methodology
2.1 Network Architecture
2.2 Squeeze-and-Excitation Attention Mechanism
2.3 Local Co-occurrence Attention Mechanism
2.4 Direction Weighted Fusion Strategy
3 Experiments
3.1 Datasets
3.2 Implementation Details
3.3 Experiments on VeRi776 Dataset
3.4 Experiments on VehicleID Dataset
4 Ablation Study
4.1 The Effects of Key Components
5 Qualitative Analysis
6 Conclusion
References
A Deep Learning-Based Method for Classroom Crowd Counting and Localization
1 Introduction
2 Related Work
2.1 Detection-Based Methods
2.2 Map-Based Methods
3 Proposed Method
3.1 SENet Module
3.2 Feature Fusion Module for Bilateral Three-Path Module
3.3 Loss Function
4 Experiment
4.1 Experimental Environment and Parameter Settings
4.2 Experimental Dataset and Preprocessing
4.3 Experimental Results and Comparison
5 Conclusion
References
Use of Computer Vision to Authenticate Retail Invoices with the Convolution-Neural Networks
1 Introduction
2 Literature Review
3 Methodology
4 Results and Discussion
5 The Conclusion and Future Works
References
Automated Analysis of Chemistry Experiment Videos: New Challenges for Video Understanding
1 Introduction
1.1 Declarative Knowledge and Procedural Knowledge
1.2 Evaluation of Procedural Knowledge
2 Chemistry Experimental Video Dataset
3 The Analysis of Chemistry Experimental Videos
4 The Results on Temporal Action Segmentation
5 Conclusion
References
Exploiting Adaptive Adversarial Transfer Network for Cross Domain Teacher's Speech Emotion Recognition
1 Introduction
2 Method
2.1 Problem Definition
2.2 Overall Architecture
3 Experiments
3.1 Datasets
3.2 Parameter Configuration and Model Comparison
3.3 Results and Analysis
4 Conclusions
References
Personalized Programming Guidance Based on Deep Programming Learning Style Capturing
1 Introduction
2 Related Works
2.1 Sequential Recommendation
2.2 Sequential Recommendation in E-Learning
2.3 Learning Style Model
3 Preliminaries
3.1 Programming Learning Style Model
3.2 Problem Definition
4 PERS Framework
4.1 Representing Module
4.2 Differentiating Module
4.3 Updating Module
4.4 Predicting Module
5 Experiments
5.1 Experimental Settings
5.2 RQ1: Overall Performance
5.3 RQ2: Ablation Study
5.4 RQ3: Sensitivity Analysis of Hyperparameters
5.5 RQ4: Case Study on Visualization Analysis
6 Conclusions
References
Design Intelligent Manufacturing Teaching Experiments with Machine Learning
1 Introduction
1.1 Background
1.2 Challenge in Teaching Intelligent Manufacturing Practice
2 Experiment Teaching Platform
2.1 SMT Production and Teaching Experiment Platform
2.2 Intelligent Manufacturing Teaching Experiment Process and Practical Teaching Platform Design
2.3 SMT Intelligent Manufacturing Practice Teaching System and Machine Learning Algorithm Principle
3 Machine Learning Experiment in Teaching Design
3.1 Workflow of Defect Detection in Soldering
3.2 Application of Prototype of Image Processing Method
3.3 SVM Model for Single Defect Type Recognition
3.4 Multi-classification CNN Model
4 Experimental Performance and Teaching Effect
5 Conclusion
References
Privacy-Preserving Educational Credentials Management Based on Decentralized Identity and Zero-Knowledge Proof
1 Introduction
2 Relate Work
2.1 Blockchain and Decentralized Identity
2.2 Zero-Knowledge Proof
3 System Model
3.1 Overview
3.2 Architecture
3.3 Smart Contract
4 Experiment
4.1 Implementation
4.2 Evaluation
5 Conclusion
References
Sentiment Analysis of Teaching Evaluation Based on Complex Semantic Analysis
1 Introduction
2 SL-TeaE(CSA) Model Diagram
3 Complex Semantic Analysis
3.1 Sentiment Center Sentences
4 Experimental Results Analysis
4.1 SET Data
4.2 Experimental Metrics
4.3 Performance Comparison
5 Conclusion
References
An Intelligent Scheduling System for Large-Scale Online Judging
1 Introduction
2 Related Work
2.1 Code Running Time Prediction
2.2 Improving OJ Systems
3 The Intelligent Scheduling System for Online Judging
3.1 Code Running Time Prediction Based on Deep Representation Models
3.2 Code Judging Scheduling Based on Running Time Prediction
4 Performance Evaluation
4.1 The Dataset
4.2 Evaluation Metrics
4.3 Hyperparameter Settings
4.4 The Results
5 Conclusion
References
Large Language Model
Automated Comment Generation Based on the Large Language Model
1 Introduction
2 Related Work
2.1 Automated Essay Evaluation
2.2 LLM Prompting
3 Method
3.1 Comment Definition
3.2 Two-Stage Comment Generation
3.3 Writing Cases Searching
3.4 Comment Generation
4 Experiments
4.1 Dataset
4.2 Baseline
4.3 Experiment Settings
4.4 Evaluation Metrics
4.5 Results
4.6 Analysis
5 Examples
6 Conclusion
References
Enhancing Database Principles Teaching with ChatGPT-Like Language Models
1 Introduction
2 System Design Concept
2.1 ChatGPT-Like Model-Based Auxiliary Teaching System
2.2 Blended Teaching Model
3 Teaching Strategy Implementation
3.1 Pre-class Preparation
3.2 Application of the Auxiliary Teaching System
3.3 Post-class Practice and Extension
4 Effectiveness Assessment and Analysis
4.1 Evaluation Methodologies
4.2 Analysis of Course Application Effects
5 Future Directions
6 Conclusion
References
Assistant Teaching System for Computer Hardware Courses Based on Large Language Model
1 Introduction
2 Related Technical Methods
3 Proposed Assistant Teaching System
3.1 Q&A System
3.2 Assistant Debugging and Checking System
4 System Implementation
4.1 Q&A System Implementation
4.2 Assistant Debugging and Checking System Implementation
5 Conclusion
References
Automatic Generation of Multiple-Choice Questions for CS0 and CS1 Curricula Using Large Language Models
1 Introduction
2 Related Work
2.1 Multiple Choice Questions Generation
2.2 Quality Evaluation Metrics
2.3 Prompting Engineering
3 Methodology
3.1 Multiple Choice Questions
3.2 The Framework of EduCS
4 Experimental Evaluation
4.1 Student Level
4.2 The Different Types of MCQs
4.3 Quality Evaluation
5 Conclusion
References
Data Mining in Social Science
Research of Virtual Simulation Experiment System for Geomorphologic Evolution of Taiwan Strait
1 Introduction
2 Scenario Setting for the Virtual Reality Experiment of Coastal Landform Evolution in the Taiwan Strait
3 Simulation of Coastal Landform Evolution Process in Taiwan Strait
3.1 Reproduce Sea Level Evolution Process Based on Sedimentological Method
3.2 Processing of Sea Level Change Data
3.3 Fitting the Sea Level Change Curve
3.4 Dynamic Simulation of Coastal Landform Evolution
4 System Integrated Design and Demonstrated Application
4.1 System Construction Goals
4.2 Overall System Architecture
4.3 Display of Typical Modules of System Functions
5 Conclusion
References
Research on Traffic Flow Prediction Based on Spatio-Temporal Correlation Analysis
1 Introduction
2 Traffic Flow Prediction Model Based on Gated TCN
2.1 Model Construction
2.2 Building a Gated TCN Network
3 Experiment
References
Hotspot Prediction Based on Temporal Characteristics
1 Introduction
2 The Algorithms
2.1 Algorithm Improvement - Construction of a Hybrid ARIMA-LSTM Model
2.2 Combined ARIMA-LSTM Model Modelling
3 Experiment
3.1 Evaluation Criteria
3.2 Model Experimental Validation and Results
4 Conclusion
References
Governance Framework and Legal Regulation of Data Security
1 Question Raised
2 Data Development and Current Situation of Date Security Protection
2.1 The Current Situation of Data Development: Vigorous and Disordered
2.2 Data Security Protection Status
3 Summary of Data Security Problems in China
3.1 Exercise Dilemma of Individual Data
3.2 The Internal and External Hidden Dangers of Digital Platform
3.3 The Dilemma Between Sharing and Protecting Public Data
4 Governance Framework and Legal Regulation of Data Security
4.1 Building a Governance Framework for Data Security: Protection and Sharing Go Hand in Hand
4.2 Information Data Sharing: Public Data Pool
4.3 Class Action System
5 Conclusion
References
Design of Urban Smart Parking Management System Based on Credit System
1 Introduction
2 Design of Urban Credit System
3 Key Module Design of System
3.1 Overall Architecture
3.2 Shared Parking Process Design
3.3 Design of Main Business Functions
3.4 Shared Parking Safety Design
4 Conclusions
References
Research on Short-Term Traffic Flow Forecast Based on Improved Cuckoo Search Algorithm
1 Introduction
2 Short-Term Traffic Flow Prediction Based on AWCS-LSTM Model
2.1 Construction of Neural Network Model Based on AWCS-LSTM
2.2 Experimental Results and Analysis
3 Conclusion
References
Research on the Internet Access and Usage Gap in Rural Areas and Its Influencing Factors
1 Introduction
2 Theoretical Analysis and Literature Review
2.1 New Characteristics of China’s Rural Areas in the New Era
2.2 Digital Divide
2.3 Literature Review: From Internet Access to Internet Use
3 Data Sources and Research Methodology
3.1 Data Sources
3.2 Research Methodology
4 Empirical Results
4.1 Determinants of Internet Access
4.2 Determinants of Internet Use (First Stage)
4.3 Determinants of Internet Use (Second Stage)
5 Conclusions and Recommendations
References
Exploring the Causal Relationship Between Forgiveness and Sentencing Outcomes in Dangerous Driving Cases
1 Introduction
2 Literature Review
3 Experiment Design and Data Collection
4 Estimators for the Average Treatment Effect
4.1 Conditional Outcome Estimator
4.2 Grouped Conditional Outcome Estimator
4.3 Inverse Probability Weighting Estimator
4.4 Doubly Robust Estimator
5 Model Specification
6 Estimation Results
6.1 Estimation of P(A|X,Z)
6.2 Estimation of P(Y|A,X,Z)
6.3 Estimation of ATE
7 Conclusion and Future Research
References
Fourier-Based Instance Selective Whitening for Domain Generalized Lane Detection
1 Introduction
2 Relate Work
3 Methods
3.1 Fourier-Based Source Domain Style Extension
3.2 Standardized Instance Selective Whitening
4 Experiments
4.1 Dataset
4.2 Experimental Setup
4.3 Implementation Details
4.4 Comparison with DG Methods
4.5 Ablation Studies
5 Conclusions
References
Research on Traceability of Atmospheric Particulate Pollutants Based on Particle Size Data
1 Introduction
1.1 Research Background
1.2 Related Studies
1.3 Purpose
2 Data Analysis
2.1 Particle Size Data Description
2.2 Characterization of Pollution Sources Based on Pollution Source Spectrum Data
2.3 Correlation Analysis of Particle Size Monitoring Data
2.4 Similarity Analysis of Particle Size Monitoring Data
3 Research on Traceability Model for Particulate Pollutants
3.1 Overall Design
3.2 Classification Model Based on Random Forest
3.3 Method 1: Optimized Model Based on Factor Analysis
3.4 Method 2: Statistical Model Based on Random Forest
4 Experiments and Discussions
4.1 Experimental Setup and Evaluation Indicators
4.2 Comparative Experiment of the Two Methods
4.3 Case Study
4.4 Expert Experience
5 Conclusion
References
Analysis of Social Support Network on the Topic of “Smiling Depression” in Zhihu Online Community
1 Introduction
2 Related Work
3 Social Network Analysis
4 Process of Experiment
5 Experiment and Discussion
5.1 Collecting Data
5.2 Preprocessing Data
5.3 Building a Social Support Matrix
5.4 Analysis of Overall Network Structure
5.5 Analysis of Individual Network Structure
5.6 Analysis of Core Node Features
6 Discussion
7 Conclusion and Future Work
References
A Study on the Physiological Effects of Pen Usage
1 Introduction
2 Nonlinear Analysis of Brain Waves
3 Experimental Method
3.1 Experimental Variables
3.2 Data Analysis
4 Results
5 Discussion
6 Conclusion
References
Development of Kanji Learning Materials for Dysgraphia and EEG Measurement
1 Introduction
2 Experimental Method
2.1 Special Support Education Measures
2.2 Cognitive Science Measures
2.3 Neuroscientific Measures
3 Method
4 Results
5 Discussion
References
Effects of Light-Dark Adaptation Processes on the Body as a Basic Study for Visually Induced Motion Sickness
1 Introduction
2 Method
2.1 Experiment 1
2.2 Experiment 2
3 Results and Discussion
3.1 Experiment 1
3.2 Experiment 2
4 Conclusion
References
Association Between Brain Activity of Dominant Ocular Mechanism and Visually Evoked Postural Responses
1 Introduction
2 Methods
2.1 Experiments on the Visualization of Brain Activity
2.2 Relationship Between the Dominant Eye and VEPRs
3 Results
4 Discussion
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the proceedings of the 18th International Conference, ICTERI 2023, held in Ivano-Frankivsk, Ukraine, during September 18–22, 2023.</span><p><span>The 21 full papers included in this volume were carefully reviewed and selected from 90 submissions. The volume focuses on res
<span>This book constitutes the proceedings of the 11th Ecuadorian Conference on Information and Communication Technologies, TICEC 2023, held in Cuenca, Ecuador, during October 18–20, 2023.<br>The 31 full papers presented were carefully reviewed and selected from 120 submissions. The papers cover a
<span>This book constitutes proceedings of the 7th International Conference on Information, Communication and Computing Technology, ICICCT 2022, held in New Delhi, India, in July 2022.<br>The 11 papers presented in this volume were carefully reviewed and selected from 65 submissions. The papers cove
<span>This book constitutes the refereed proceedings of the 4th International Conference on Computing Science, Communication and Security, COMS2 2023, held in Gandhinagar, India, during February 6–7, 2023. <br>The 20 full papers included in this book were carefully reviewed and selected from 190 sub