2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)最新文献

筛选
英文 中文
Factual Question Generation for the Portuguese Language 葡萄牙语的事实问题生成
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194631
Bernardo Leite, Henrique Lopes Cardoso, Luís Paulo Reis, Carlos Soares
{"title":"Factual Question Generation for the Portuguese Language","authors":"Bernardo Leite, Henrique Lopes Cardoso, Luís Paulo Reis, Carlos Soares","doi":"10.1109/INISTA49547.2020.9194631","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194631","url":null,"abstract":"Artificial Intelligence (AI) has seen numerous applications in the area of Education. Through the use of educational technologies such as Intelligent Tutoring Systems (ITS), learning possibilities have increased significantly. One of the main challenges for the widespread use of ITS is the ability to automatically generate questions. Bearing in mind that the act of questioning has been shown to improve the students learning outcomes, Automatic Question Generation (AQG) has proven to be one of the most important applications for optimizing this process. We present a tool for generating factual questions in Portuguese by proposing three distinct approaches. The first one performs a syntax-based analysis of a given text by using the information obtained from Part-of-speech tagging (PoS) and Named Entity Recognition (NER). The second approach carries out a semantic analysis of the sentences, through Semantic Role Labeling (SRL). The last method extracts the inherent dependencies within sentences using Dependency Parsing. All of these methods are possible thanks to Natural Language Processing (NLP) techniques. For evaluation, we have elaborated a pilot test that was answered by Portuguese teachers. The results verify the potential of these different approaches, opening up the possibility to use them in a teaching environment.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114976098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Parallel Implementation of the Model of Retina Ganglion Cells Layer 视网膜神经节细胞层模型的并行实现
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194616
Simona Nedelcheva, K. Georgieva, P. Koprinkova-Hristova
{"title":"Parallel Implementation of the Model of Retina Ganglion Cells Layer","authors":"Simona Nedelcheva, K. Georgieva, P. Koprinkova-Hristova","doi":"10.1109/INISTA49547.2020.9194616","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194616","url":null,"abstract":"The paper presents results from implementation of parallel simulation of a model of layer of retina ganglion cells. The aim was to decrease computational time since this layer appeared to be the bottleneck in the developed hierarchical model of human visual system. Each retina ganglion cell was modelled by a spatio-temporal filter convolved with visual scene observed by the eyes so its computational time was crucial to overall simulation. Our parallel implementation that distributes pieces of the layer to the several independently working processors decreased significantly the computational time.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117273978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Cyber-Security Defense Framework for Smart Homes 智能家居的轻量级网络安全防御框架
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194689
Georgios Spanos, K. M. Giannoutakis, K. Votis, Brais Viaño, J. Augusto-Gonzalez, Georgios Aivatoglou, D. Tzovaras
{"title":"A Lightweight Cyber-Security Defense Framework for Smart Homes","authors":"Georgios Spanos, K. M. Giannoutakis, K. Votis, Brais Viaño, J. Augusto-Gonzalez, Georgios Aivatoglou, D. Tzovaras","doi":"10.1109/INISTA49547.2020.9194689","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194689","url":null,"abstract":"Inevitably, the explosion of the Internet of Things (IoT) has alerted the modern human life. Apart from the benefits that this new technology offers to the users of the IoT devices, there are also dangers related to Cyber Security. Traditional methodologies that support and strengthen the Cyber Security can not be applied to the low consumption IoT devices. Hence, many attack detection methodologies and systems that respect the constraints of the IoT have been presented recently. In this paper, an anomaly detection mechanism is proposed that focuses on the threat detection, by combining statistical and machine learning methodologies to detect abnormalities in time-series of the network traffic. Moreover, this new framework is a lightweight Cyber Security solution, since its computational logic is included in the edge layer. The results of the experiments that were conducted in a test bed, indicated the high performance of the methodology in terms of Accuracy, Precision, Recall and F-measure.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125167779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automatic Derivation of Conceptual Database Model from a Set of Business Process Models 从一组业务流程模型中自动派生概念数据库模型
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194667
D. Brdjanin, Aleksandar Vukotic, G. Banjac, D. Banjac, S. Maric
{"title":"Automatic Derivation of Conceptual Database Model from a Set of Business Process Models","authors":"D. Brdjanin, Aleksandar Vukotic, G. Banjac, D. Banjac, S. Maric","doi":"10.1109/INISTA49547.2020.9194667","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194667","url":null,"abstract":"The paper presents an approach aimed at automatically deriving the conceptual database model from a set of business process models. The approach proposes the incremental synthesis of the target model by iteratively composing the partial conceptual database models that are derived from the models contained in the source set. The approach is implemented by the AMADEOS tool, which is the first online web-based tool enabling the automatic derivation of the conceptual database model from a set of business process models.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126046384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Hybrid Heuristic Community Detection Approach 一种混合启发式社区检测方法
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194648
Salmi Cheikh, Bouchema Sara, Zaoui Sara
{"title":"A Hybrid Heuristic Community Detection Approach","authors":"Salmi Cheikh, Bouchema Sara, Zaoui Sara","doi":"10.1109/INISTA49547.2020.9194648","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194648","url":null,"abstract":"Community detection is a very important concept in many disciplines such as sociology, biology and computer science, etc. Nowadays, a huge amount of data is produced by digital social networks. In fact, the analysis of this data make it possible to extract new knowledge about groups of individuals, their communication modes and orientations. This knowledge can be exploited in marketing, security, Web usage and many other decisional purposes. Community detection problem $(Cmathcal{DP})$ is NP-hard and many algorithms have been designed to solve it but not to a satisfactory level. In this paper we propose a hybrid heuristic approach that does not need any prior knowledge about the number or the size of each community to tackle the $Cmathcal{DP}$. This approach is evaluated on real world networks and the result of experiments show that the proposed algorithm outperforms many other algorithms according to the modularity $(mathcal{Q})$ measure.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129133172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Object-oriented software metrics in software code vulnerability analysis 软件代码漏洞分析中的面向对象软件度量
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194645
K. Kuk, Petar Milić, Stefan Denić
{"title":"Object-oriented software metrics in software code vulnerability analysis","authors":"K. Kuk, Petar Milić, Stefan Denić","doi":"10.1109/INISTA49547.2020.9194645","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194645","url":null,"abstract":"Development of quality object-oriented software contains security as an integral aspect of that process. During that process, a ceaseless burden on the developers was posed in order to maximize the development and at the same time to reduce the expense and time invested in security. In this paper, the authors analyzed metrics for object-oriented software in order to evaluate and identify the relation between metric value and security of the software. Identification of these relations was achieved by study of software vulnerabilities with code level metrics. By using OWASP classification of vulnerabilities and experimental results, we proved that there was relation between metric values and possible security issues in software. For experimental code analysis, we have developed special software called SOFTMET.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Copyright 版权
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/inista49547.2020.9194687
{"title":"Copyright","authors":"","doi":"10.1109/inista49547.2020.9194687","DOIUrl":"https://doi.org/10.1109/inista49547.2020.9194687","url":null,"abstract":"","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131269913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Controlled IoT System Based on Context-Driven Rule Engine 基于上下文驱动规则引擎的语音控制物联网系统
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194642
Renato Soic, M. Vuković, G. Jezic
{"title":"Speech Controlled IoT System Based on Context-Driven Rule Engine","authors":"Renato Soic, M. Vuković, G. Jezic","doi":"10.1109/INISTA49547.2020.9194642","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194642","url":null,"abstract":"Smart systems are designed to improve various aspects of human activities, both in business and private environments. In most cases, such systems require a real-time insight into state and events in the given environment. We present a concept of a framework which can be used as a foundation for more advanced, experimental applications. The core framework provides generic, configurable monitoring and control mechanisms, and enables task automation based on events in the environment. Additionally, it includes a set of features allowing context sharing according to user-defined rules. Regarding possible applications, our emphasis was on speech interaction between human users and the system. Therefore, an experimental application is presented, providing recognition of simple spoken commands, with the ability to generate spoken notifications as well. The application is designed to support simple spoken interaction between a human user and the system in Croatian language, which makes a rare example.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127068632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Analysis for Improving The Clinical Pathway of Lung Cancer 智能分析改善肺癌临床路径
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194643
Yan Kang, Wenbo Xu, Yan Zhu, Fang Xie, Shuangshuang Dai, Weihui Dai
{"title":"Intelligent Analysis for Improving The Clinical Pathway of Lung Cancer","authors":"Yan Kang, Wenbo Xu, Yan Zhu, Fang Xie, Shuangshuang Dai, Weihui Dai","doi":"10.1109/INISTA49547.2020.9194643","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194643","url":null,"abstract":"In order to make a best treatment plan for different patients of lung cancers, the prognosis of disease's development and its influence factors should be evaluated and analyzed accurately. In the traditional clinical pathway, we can only consider the linear classification of those factors or divide them into different stages. This paper proposed an effective machine learning method based on the combination of Cox regressive model and BP-GA neural network to predict the patient's expectation of survival rate, and so as to find the best treatment regime for each different patient. After the above intelligent analysis, the treatment decision procedures were presented for improving the current clinical pathway of lung cancer, and had been designed into the decision support system based on Hadoop system and Spring cloud framework for distributed applications of doctor's workbench system or mobile terminals from hospitals.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116372624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning SEADer++ v2:使用自然语言处理和机器学习检测社会工程攻击
2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) Pub Date : 2020-08-01 DOI: 10.1109/INISTA49547.2020.9194623
Merton Lansley, S. Kapetanakis, Nikolaos Polatidis
{"title":"SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning","authors":"Merton Lansley, S. Kapetanakis, Nikolaos Polatidis","doi":"10.1109/INISTA49547.2020.9194623","DOIUrl":"https://doi.org/10.1109/INISTA49547.2020.9194623","url":null,"abstract":"Social engineering attacks are well known attacks in the cyberspace and relatively easy to try and implement because no technical knowledge is required. In various online environments such as business domains where customers talk through a chat service with employees or in social networks potential hackers can try to manipulate other people by employing social attacks against them to gain information that will benefit them in future attacks. Thus, we have used a number of natural language processing steps and a machine learning algorithm to identify potential attacks. The proposed method has been tested on a semi-synthetic dataset and it is shown to be both practical and effective.","PeriodicalId":124632,"journal":{"name":"2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123930845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信