{"title":"CLEMI-Imputation Evaluation","authors":"Anthony Chapman, Wei Pang, G. Coghill","doi":"10.1109/SACI.2018.8440981","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440981","url":null,"abstract":"Missing data is challenging enough without the added complexities posed by a lack of research in evaluating imputation. Not only could we potentially increase the impact and validity of studies from many different sectors (research, public and private), we also believe that by creating evaluation software, more researchers may be willing to use and justify using imputation methods. This paper aims to encourage further research for efficient imputation evaluation by defining a framework which could be used to optimise the way we impute datasets prior to data analysis. We propose a framework which uses a prototypical approach to create testing data and machine learning methods to create a new metric for evaluation. Preliminary results are presented which show how, for our dataset, records with less than 40% missingness could be used for analysis, increasing the amount of available data.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116903031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine Tuning Deep Boltzmann Machines Through Meta-Heuristic Approaches","authors":"L. A. Passos, D. Rodrigues, J. Papa","doi":"10.1109/SACI.2018.8440959","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440959","url":null,"abstract":"The Deep learning framework has been widely used in different applications from medicine to engineering. However, there is a lack of works that manage to deal with the issue of hyperparameter fine-tuning, since machine learning techniques often require a considerable human effort in this task. In this paper, we propose to fine-tune Deep Boltzmann Machines using meta-heuristic techniques, which do not require the computation of the gradient of the fitness function, that may be insurmountable in high-dimensional optimization spaces. We demonstrate the validity of the proposed approach against Deep Belief Networks concerning binary image reconstruction.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124856233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content Driven Engineering Model System for Cyber Physical Systems","authors":"L. Horváth, Andrea Serester","doi":"10.1109/SACI.2018.8440958","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440958","url":null,"abstract":"Engineering model system is complex description and representation of an engineering structure. It serves as active media for all engineering activities during lifecycle of engineering structure. By now, engineering model system is capable of representation systems operated engineering structure and it can be configured to include organized experiments for engineering related research and development activities. Active knowledge is represented in engineering model system with the demand for integration of theory and practice. Recently, systems operated engineering structure is modeled as cyber physical system. Consequently, engineering modeling capabilities must be appropriate for description and representation of cooperating systems considering cyber and physical units. Despite their suitability for modeling systems, former analysis by the authors revealed that current engineering model systems would require organized knowledge background to support repeated and changed decisions on engineering object parameters in description and representation of engineering structure. To establish this background, former research introduced and defined a new concept called as information content. Model structure of information content was established as new integrated unit of engineering model system. Purpose of this paper is to introduce recent research results in rethinking and restructuring of information content for engineering model system which describe and represent cyber physical system. For that reason, extended engineering model system is given to answer how cyber physical system changes demand for information content in engineering model system. This is followed by introduction and discussion of cyber physical system eligible extended structure of information content representations. Connections are defined between information content and cyber physical system. Finally, implementation issues are discussed.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129229973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seam Carving Detection Using Convolutional Neural Networks","authors":"Luiz Fernandoda Silva Cieslak, K. Costa, J. Papa","doi":"10.1109/SACI.2018.8441016","DOIUrl":"https://doi.org/10.1109/SACI.2018.8441016","url":null,"abstract":"Deep Learning techniques have been widely used in the recent years, primarily because of their efficiency in several applications, such as engineering, medicine, and data security. Seam carving is a content-aware image resizing method that can also be used for image tampering, being not straightforward to be identified. In this paper, we combine Convolutional Neural Networks and Local Binary Patterns to recognize whether an image has been modified automatically or not by seam carving. The experimental results show that the proposed approach can achieve accuracies within the range [81%-98%] depending on the severity of the tampering procedure.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117061531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. A. Passos, C. R. Pereira, Edmar R. S. Rezende, Tiago J. Carvalho, S. Weber, C. Hook, J. Papa
{"title":"Parkinson Disease Identification Using Residual Networks and Optimum-Path Forest","authors":"L. A. Passos, C. R. Pereira, Edmar R. S. Rezende, Tiago J. Carvalho, S. Weber, C. Hook, J. Papa","doi":"10.1109/SACI.2018.8441012","DOIUrl":"https://doi.org/10.1109/SACI.2018.8441012","url":null,"abstract":"Known as one of the most significant neurodegenerative diseases of the central nervous system, Parkinson's disease (PD) has a combination of several symptoms, such as tremor, postural instability, loss of movements, depression, anxiety, and dementia, among others. For the medicine, to point an exam that can diagnose a patient with such illness is challenging due to the symptoms that are easily related to other diseases. Therefore, developing computational methods capable of identifying PD in its early stages has been of paramount importance in the scientific community. Thence, this paper proposes to use a deep neural network called ResNet-50 to learn the patterns and extract features from images draw by patients. Afterwards, the Optimum-Path Forest (OPF) classifier is employed to identify Parkinson's disease automatically, being the results compared against two well-known classifiers, i.e., Support Vector Machines and the Bayes, as well as the ones provided by ResNet-50 itself. The experiments showed promising results concerning OPF, reachinz over 96% of identification rate.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124478076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kinan Morani, G. Eigner, T. Ferenci, L. Kovács, Ş. Engin
{"title":"Prediction of the Survival of Patients with Cardiac Failure by Using Soft Computing Techniques","authors":"Kinan Morani, G. Eigner, T. Ferenci, L. Kovács, Ş. Engin","doi":"10.1109/SACI.2018.8440931","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440931","url":null,"abstract":"The following paper presents a piece of work done on a relatively small dataset-with 1099 samples and 20 attributes-obtained from hospital records in Hungary. It goes to prove that by using a well tuned support vector machine model brought in better predicting results in terms of accuracy and calculation cost to a classification problem compared to an artificial neural network, random forest or the decision tree models. Next further improvements were suggested for the dataset and the preparation process as well.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"10 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114019890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Granular Computing and Sequential Analysis of Deep Embeddings in Fast Still-to-Video Face Recognition","authors":"A. Savchenko","doi":"10.1109/SACI.2018.8441009","DOIUrl":"https://doi.org/10.1109/SACI.2018.8441009","url":null,"abstract":"This paper is focused on still-to-video face recognition with large number of subjects based on computation of distances between high-dimensional embeddings extracted using deep convolution neural networks. We propose to utilize granular structures and sequentially process granular representations of all frames of the input video. The coarse-grained granules include only low number of the first principal components of deep embeddings. The representation of each frame at finer granularity levels is matched with the representations of photos of only those individuals, for whom the decision at previous levels was reliable. The reliability is checked by thresholding the ratio of distance between reference instance and input frame to the minimal distance. As a result, the photos of all unreliable individuals are not examined anymore for a particular frame at the next levels with finer granularity. Decisions for all frames are united into a candidate set of identities, and the maximal a-posterior final decision is chosen. The experimental study with the LFW, YTF and IJB-A datasets and the state-of-the-art deep embeddings demonstrated that the proposed approach is 2–10 times faster than conventional methods.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123072394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy of Clients' Locations in Big Data and Cloud Computing","authors":"Imad Ali Hassoon, N. Tapus, Anwar Chitheer Jasim","doi":"10.1109/SACI.2018.8440940","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440940","url":null,"abstract":"Amid the very hot issues, nowadays, the one related to Locations' privacy (GPS related) finds itself in top position. When it comes to talking about clients' locations in cloud or big data, the probable risk to privacy of clients' location is one of the major challenges should to be faced. In the recent years, a lot of developers and researchers have been paying attention to improve methods to provide privacy for data of clients' locations which it always processed by third-party. Big data could be like a puzzle for many researchers if they didn't understand it in the correct-side. Big data has to be understood as the process of gathering as much data as can be permitted in order to collect knowledge out of them (ideally in ground-breaking ways). so, this concept gives us attention that is privacy of clients' locations in cloud or big data could be under risks if it is used to collect knowledge or sell it to third-party. In our research, we try to show how we have implemented our algorithm (Diff-Anonym) in real data set (available at http://openaddresses.io) as to offer privacy for the clients' Locations in Big Data and cloud computing, as well as to improve our previous work which was simulation in normal data that appeared little differences in the results.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123332754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programming Concepts in the Silver Code Guide for Elders","authors":"O. Lupse, Ciprian-Bogdan Chirila, H. Ciocarlie","doi":"10.1109/SACI.2018.8441001","DOIUrl":"https://doi.org/10.1109/SACI.2018.8441001","url":null,"abstract":"In the context of our digital society the elders are using less the new technologies. In order to encourage their interaction with the electronic devices they need a better understanding of the underlying mechanisms. To facilitate the understanding of the digital world we propose the idea of creating a dedicated community named Silver Code community. The community will be built with people from seven European countries around a set of didactic materials on programming published on web site.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127622704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of Monitoring Concerns Implementation in Object Oriented Systems","authors":"G. Cojocar, A. Guran","doi":"10.1109/SACI.2018.8440997","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440997","url":null,"abstract":"Monitoring concerns are crosscutting concerns that record the behaviour of a software system during development, testing and execution in its own environment. Their implementation using the object oriented paradigm affects an important part of a software system's source code, and, also, the system's maintainability and understandability. Complementary programming paradigms could be used for their design and implementation in order to improve these qualities. In order to refactor the existing implementation first we need to identify the monitoring concerns in the source code. In this article we describe our findings about how monitoring concerns are implemented in object oriented systems, as a starting point in developing an automatic approach for their identification and refactoring. We have analyzed ten open source object oriented software systems developed in Java or C#, and we have performed a comparative analysis of their implementation. We have also identified possible challenges in their automatic identification.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134605019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}