{"title":"Duplicate record detection approach based on sentence embeddings","authors":"Hafsa Lattar, A. Salem, H. Ghézala","doi":"10.1109/WETICE49692.2020.00059","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00059","url":null,"abstract":"Duplicate record detection is a crucial task for data cleaning. Records representation is among the main challenges of this task. Word embeddings models have been widely applied in an attempt to improve records representation. However, despite the improvements made by word embeddings to enhance the semantic aspect, duplicate record detection results is still insufficient In this paper, we present a duplicate record detection approach based on sentence embeddings, where each attribute is viewed as a sentence. First, universal sentence encoder model is used to embed the values of records’ attributes into embeddings vectors. Afterwards, based on the created vectors, similarity vectors between the record pairs are computed. Finally, support vector machine algorithm is used to classify the similarity vectors. Experiments on two datasets (Cora and Restaurant) show that our proposal outperforms state-of-the-art baselines and leads to significant improvements in duplicate record detection effectiveness.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127701598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. N. Kaplan, M. Ridao, Miriam Sayão, N. Madhavji, Juan Carlos Lazo
{"title":"Organization","authors":"G. N. Kaplan, M. Ridao, Miriam Sayão, N. Madhavji, Juan Carlos Lazo","doi":"10.6027/9789289331302-7-en","DOIUrl":"https://doi.org/10.6027/9789289331302-7-en","url":null,"abstract":"","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124928394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maxime Houssin, S. Combettes, M. Gleizes, B. Lartigue
{"title":"SANDMAN: a Self-Adapted System for Anomaly Detection in Smart Buildings Data Streams","authors":"Maxime Houssin, S. Combettes, M. Gleizes, B. Lartigue","doi":"10.1109/WETICE49692.2020.00011","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00011","url":null,"abstract":"Currently, energy management within buildings is essential to mitigate climate change. To this end, buildings are increasingly equipped with sensors to assist the building manager. Yet, the heterogeneity and the large amount of generated data make this task quite difficult. The SANDMAN multi-agent system, described in this paper, aims to assist in the automatic detection, in constrained time, of several types of anomalies using raw and heterogeneous data. SANDMAN features a semi-supervised learning by considering some feedback from an expert in the field. The results show that SANDMAN detects different types of anomalies, is resilient to noise and is scalable.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122092808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abderrahim Ait Wakrime, Riadh Ben Halima, M. Sellami
{"title":"Track report of Future Internet Services and Applications (FISA’2020)","authors":"Abderrahim Ait Wakrime, Riadh Ben Halima, M. Sellami","doi":"10.1109/WETICE49692.2020.00034","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00034","url":null,"abstract":"The “Future Internet Services and Applications” (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet services: (i) their modeling, provisioning and management, (ii) data protection, and (iii) data collection, storage and analysis. FISA is in its fifth edition and aims at offering to academic and industrial researchers as well as practitioners a platform for discussions related to the aforementioned aspects of future Internet services and applications. This report briefly presents the main topics of FISA and lists the accepted papers.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124304494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Representation and Evolution of Knowledge Structures to Detect Anomalies in Financial Statements","authors":"Chip Venters, Rao V. Mikkilineni","doi":"10.1109/WETICE49692.2020.00020","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00020","url":null,"abstract":"Deep learning, has delivered a variety of practical uses in the past decade. It has revolutionized customer experience and machine translation. It has made language recognition, autonomous vehicles and computer vision a reality. A multitude of other AI applications are common now. With Deep Learning we gain insights about hidden correlations. We extract features and distinguish categories. But we lack transparency of reasoning behind these conclusions. Most importantly, there is the absence of common sense. Deep learning models might be the best at perceiving patterns. Yet they cannot comprehend what the patterns mean. And they lack the ability to model their behaviors and reason about them.We present a new approach to augment Deep Learning using model based Deep Reasoning and its application to address fraud detection using financial statements. Recent theoretical models of computing structures with cognizing agents go beyond neural networks to provide models of observations, abstractions and generalizations from experience and create time dependent evolution and history to provide reasoning and predictive. We use Knowledge Structures defined therein to represent relevant domain knowledge. In this case, in a company’s financial statements. We analyze their history to detect potential fraud based on specific rules and observations. We use information from governance and compliance rules and experience of past violations. We analyze SEC 10-K statements using Deep Learning and model based Deep Reasoning. We use the Knowledge Structures to identify red flags and anomalies.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capturing and Exploiting Citation Knowledge for Recommending Recently Published Papers","authors":"Anita Khadka, Iván Cantador, Miriam Fernández","doi":"10.1109/WETICE49692.2020.00054","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00054","url":null,"abstract":"With the continuous growth of scientific literature, discovering relevant academic papers for a researcher has become a challenging task, especially when looking for the latest, most recent papers. In this case, traditional collaborative filtering systems are ineffective, since they are unable to recommend items not previously seen, rated or cited. This is known as the item cold-start problem. In this paper, we explore the potential of exploiting citation knowledge to provide a given user with relevant suggestions about recent scientific publications. A novel hybrid recommendation method that encapsulates such citation knowledge is proposed. Experimental results show improvements over baseline methods, evidencing benefits of using citation knowledge to recommend recently published papers in a personalised way. Moreover, as a result of our work, we also provide a unique dataset that, differently to previous corpora, contains detailed paper citation information.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116382952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anderson Carlos Ferreira Da Silva, Fatiha Saïs, E. Waller, F. Andrès
{"title":"Dissimilarity-based approach for Identity Link Invalidation","authors":"Anderson Carlos Ferreira Da Silva, Fatiha Saïs, E. Waller, F. Andrès","doi":"10.1109/WETICE49692.2020.00056","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00056","url":null,"abstract":"More and more datasets are currently connected by identity links using properties such as owl:sameAs expressed in OWL. Identity links are statements that declare that two resources refer to the same real-world entity. However, we cannot attest the correctness of all identity links. Without a central name authority, most identity links are generated by heuristics and they are not reviewed by experts. The main issue in invalidating identity links is the heterogeneity of datasets, they commonly do not share the same predicates. Furthermore, the description of the resources can be incomplete. Despite how the resources are described, identity links are necessary to link data for posterior use. In this paper, we present a framework to invalidate identity links by dissimilarity and outlier detection in equivalence classes of identity links.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127007478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Frikha Hounaida, Wided Ben Daoud, A. Meddeb-Makhlouf, F. Zarai
{"title":"A Learning based Secure Anomaly Detection for Healthcare Applications","authors":"Frikha Hounaida, Wided Ben Daoud, A. Meddeb-Makhlouf, F. Zarai","doi":"10.1109/WETICE49692.2020.00032","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00032","url":null,"abstract":"The wireless body sensor network (WBSN) is an emerging technology in the healthcare domain, which collects data from vital parameters of the patient’s body, using small portable components such as sensors. It allows to continuously monitor patients without restricting their movements and to inform the health specialist of the evolution of their states. However, the deployment of new technologies in health applications without taking into account data security makes the privacy of patients vulnerable. Thus, these systems have insufficient performance for large and varied data sets, because they do not process information sufficiently diverse to cover all scenarios. Moreover, the interpretation of physiological signals is a tedious process in which human errors can be caused.To address these issues, we propose, in this paper, an effective health system that ensures the secure collection and transfer of patient data to the physician, to facilitate the diagnosis and the detection of life threatening diseases. Our main contribution is to offer real-time, high quality processing, learning and analysis capabilities, in a smart and secure system. For that, we have collected real patient datasets from Tunisian doctors.To achieve this goal, we used ANN and XgBoost as learning algorithms and AES as an encryption protocol for sending secure data to medical personnel for diagnostic purposes. The results show an accuracy of 80% with an execution time of 1.54 s.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130738384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2020)","authors":"F. Bergenti, M. Blake, Giacomo Cabri, U. Wajid","doi":"10.1109/WETICE49692.2020.00008","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00008","url":null,"abstract":"The 18th edition of the “Adaptive Computing (and Agents) for Enhanced Collaboration” (ACEC) track at WETICE 2020 focuses mostly on the area of adaptive agent-based techniques for the enterprise. The aim of the track is to bring together researches and practitioners from the fields of software agents and adaptive computing to present results and discuss innovative ideas. This report outlines the content of the papers accepted for presentation at the track.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132099471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication management for reliable service based IoT systems","authors":"Patryk Schauer, Lukasz Falas","doi":"10.1109/WETICE49692.2020.00030","DOIUrl":"https://doi.org/10.1109/WETICE49692.2020.00030","url":null,"abstract":"Internet of Things (IoT) systems are becoming more and more popular. Moreover, service-based approach to IoT systems development is practically a standard utilized in their architecture. uti. IoT communication problems ware discussed in many articles about wireless communication, sensor networks or cloud computing. However the topic of high-level end to end communication in IoT systems is much less often the point of researchers’ interest. Despite that, the reliability of communication makes much more sense especially when it is considered at the application layer. Furthermore, networks utilized in IoT systems are usually virtual and software-based. Due to this fact, it is reasonable to take consider this problem with a novel and adequate approach, rather with classical models of communication resource allocation. In this article authors presented an idea of reliable communication management for IoT systems based on resource allocation. This idea is discussed in context of service-based IoT system lifecycle, especially considering the stages of resource allocation and services execution. Concerning the presented concept, three algorithms were prepared and tested in the simulation process.","PeriodicalId":114214,"journal":{"name":"2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}