Bernardo Leite, Henrique Lopes Cardoso, Luís Paulo Reis, Carlos Soares
{"title":"Factual Question Generation for the Portuguese Language","authors":"Bernardo Leite, Henrique Lopes Cardoso, Luís Paulo Reis, Carlos Soares","doi":"10.1109/INISTA49547.2020.9194631","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194631","url":null,"abstract":"Artificial Intelligence (AI) has seen numerous applications in the area of Education. Through the use of educational technologies such as Intelligent Tutoring Systems (ITS), learning possibilities have increased significantly. One of the main challenges for the widespread use of ITS is the ability to automatically generate questions. Bearing in mind that the act of questioning has been shown to improve the students learning outcomes, Automatic Question Generation (AQG) has proven to be one of the most important applications for optimizing this process. We present a tool for generating factual questions in Portuguese by proposing three distinct approaches. The first one performs a syntax-based analysis of a given text by using the information obtained from Part-of-speech tagging (PoS) and Named Entity Recognition (NER). The second approach carries out a semantic analysis of the sentences, through Semantic Role Labeling (SRL). The last method extracts the inherent dependencies within sentences using Dependency Parsing. All of these methods are possible thanks to Natural Language Processing (NLP) techniques. For evaluation, we have elaborated a pilot test that was answered by Portuguese teachers. The results verify the potential of these different approaches, opening up the possibility to use them in a teaching environment.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114976098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simona Nedelcheva, K. Georgieva, P. Koprinkova-Hristova
{"title":"Parallel Implementation of the Model of Retina Ganglion Cells Layer","authors":"Simona Nedelcheva, K. Georgieva, P. Koprinkova-Hristova","doi":"10.1109/INISTA49547.2020.9194616","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194616","url":null,"abstract":"The paper presents results from implementation of parallel simulation of a model of layer of retina ganglion cells. The aim was to decrease computational time since this layer appeared to be the bottleneck in the developed hierarchical model of human visual system. Each retina ganglion cell was modelled by a spatio-temporal filter convolved with visual scene observed by the eyes so its computational time was crucial to overall simulation. Our parallel implementation that distributes pieces of the layer to the several independently working processors decreased significantly the computational time.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117273978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Georgios Spanos, K. M. Giannoutakis, K. Votis, Brais Viaño, J. Augusto-Gonzalez, Georgios Aivatoglou, D. Tzovaras
{"title":"A Lightweight Cyber-Security Defense Framework for Smart Homes","authors":"Georgios Spanos, K. M. Giannoutakis, K. Votis, Brais Viaño, J. Augusto-Gonzalez, Georgios Aivatoglou, D. Tzovaras","doi":"10.1109/INISTA49547.2020.9194689","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194689","url":null,"abstract":"Inevitably, the explosion of the Internet of Things (IoT) has alerted the modern human life. Apart from the benefits that this new technology offers to the users of the IoT devices, there are also dangers related to Cyber Security. Traditional methodologies that support and strengthen the Cyber Security can not be applied to the low consumption IoT devices. Hence, many attack detection methodologies and systems that respect the constraints of the IoT have been presented recently. In this paper, an anomaly detection mechanism is proposed that focuses on the threat detection, by combining statistical and machine learning methodologies to detect abnormalities in time-series of the network traffic. Moreover, this new framework is a lightweight Cyber Security solution, since its computational logic is included in the edge layer. The results of the experiments that were conducted in a test bed, indicated the high performance of the methodology in terms of Accuracy, Precision, Recall and F-measure.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125167779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Brdjanin, Aleksandar Vukotic, G. Banjac, D. Banjac, S. Maric
{"title":"Automatic Derivation of Conceptual Database Model from a Set of Business Process Models","authors":"D. Brdjanin, Aleksandar Vukotic, G. Banjac, D. Banjac, S. Maric","doi":"10.1109/INISTA49547.2020.9194667","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194667","url":null,"abstract":"The paper presents an approach aimed at automatically deriving the conceptual database model from a set of business process models. The approach proposes the incremental synthesis of the target model by iteratively composing the partial conceptual database models that are derived from the models contained in the source set. The approach is implemented by the AMADEOS tool, which is the first online web-based tool enabling the automatic derivation of the conceptual database model from a set of business process models.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126046384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Heuristic Community Detection Approach","authors":"Salmi Cheikh, Bouchema Sara, Zaoui Sara","doi":"10.1109/INISTA49547.2020.9194648","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194648","url":null,"abstract":"Community detection is a very important concept in many disciplines such as sociology, biology and computer science, etc. Nowadays, a huge amount of data is produced by digital social networks. In fact, the analysis of this data make it possible to extract new knowledge about groups of individuals, their communication modes and orientations. This knowledge can be exploited in marketing, security, Web usage and many other decisional purposes. Community detection problem $(Cmathcal{DP})$ is NP-hard and many algorithms have been designed to solve it but not to a satisfactory level. In this paper we propose a hybrid heuristic approach that does not need any prior knowledge about the number or the size of each community to tackle the $Cmathcal{DP}$. This approach is evaluated on real world networks and the result of experiments show that the proposed algorithm outperforms many other algorithms according to the modularity $(mathcal{Q})$ measure.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129133172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object-oriented software metrics in software code vulnerability analysis","authors":"K. Kuk, Petar Milić, Stefan Denić","doi":"10.1109/INISTA49547.2020.9194645","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194645","url":null,"abstract":"Development of quality object-oriented software contains security as an integral aspect of that process. During that process, a ceaseless burden on the developers was posed in order to maximize the development and at the same time to reduce the expense and time invested in security. In this paper, the authors analyzed metrics for object-oriented software in order to evaluate and identify the relation between metric value and security of the software. Identification of these relations was achieved by study of software vulnerabilities with code level metrics. By using OWASP classification of vulnerabilities and experimental results, we proved that there was relation between metric values and possible security issues in software. For experimental code analysis, we have developed special software called SOFTMET.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copyright","authors":"","doi":"10.1109/inista49547.2020.9194687","DOIUrl":"https://doi.org/10.1109/inista49547.2020.9194687","url":null,"abstract":"","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131269913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech Controlled IoT System Based on Context-Driven Rule Engine","authors":"Renato Soic, M. Vuković, G. Jezic","doi":"10.1109/INISTA49547.2020.9194642","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194642","url":null,"abstract":"Smart systems are designed to improve various aspects of human activities, both in business and private environments. In most cases, such systems require a real-time insight into state and events in the given environment. We present a concept of a framework which can be used as a foundation for more advanced, experimental applications. The core framework provides generic, configurable monitoring and control mechanisms, and enables task automation based on events in the environment. Additionally, it includes a set of features allowing context sharing according to user-defined rules. Regarding possible applications, our emphasis was on speech interaction between human users and the system. Therefore, an experimental application is presented, providing recognition of simple spoken commands, with the ability to generate spoken notifications as well. The application is designed to support simple spoken interaction between a human user and the system in Croatian language, which makes a rare example.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127068632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Kang, Wenbo Xu, Yan Zhu, Fang Xie, Shuangshuang Dai, Weihui Dai
{"title":"Intelligent Analysis for Improving The Clinical Pathway of Lung Cancer","authors":"Yan Kang, Wenbo Xu, Yan Zhu, Fang Xie, Shuangshuang Dai, Weihui Dai","doi":"10.1109/INISTA49547.2020.9194643","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194643","url":null,"abstract":"In order to make a best treatment plan for different patients of lung cancers, the prognosis of disease's development and its influence factors should be evaluated and analyzed accurately. In the traditional clinical pathway, we can only consider the linear classification of those factors or divide them into different stages. This paper proposed an effective machine learning method based on the combination of Cox regressive model and BP-GA neural network to predict the patient's expectation of survival rate, and so as to find the best treatment regime for each different patient. After the above intelligent analysis, the treatment decision procedures were presented for improving the current clinical pathway of lung cancer, and had been designed into the decision support system based on Hadoop system and Spring cloud framework for distributed applications of doctor's workbench system or mobile terminals from hospitals.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116372624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Merton Lansley, S. Kapetanakis, Nikolaos Polatidis
{"title":"SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning","authors":"Merton Lansley, S. Kapetanakis, Nikolaos Polatidis","doi":"10.1109/INISTA49547.2020.9194623","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194623","url":null,"abstract":"Social engineering attacks are well known attacks in the cyberspace and relatively easy to try and implement because no technical knowledge is required. In various online environments such as business domains where customers talk through a chat service with employees or in social networks potential hackers can try to manipulate other people by employing social attacks against them to gain information that will benefit them in future attacks. Thus, we have used a number of natural language processing steps and a machine learning algorithm to identify potential attacks. The proposed method has been tested on a semi-synthetic dataset and it is shown to be both practical and effective.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123930845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}