{"title":"Managing Uncertainty in Ontology Mapping in E-Learning Context","authors":"T. Ivanova","doi":"10.1109/InfoTech.2019.8860886","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860886","url":null,"abstract":"Many mapping methods have been proposed in recent years, but every of them works well only for specific type of ontologies or in well-defined context. A grand number of mapping methods propose mappings, leading to inconsistency of resulting ontological network, and in such a way make it unusable in many reasoning-based applications. And most of automatically proposed mappings are uncertain in some sense. In this paper we make a short analysis of the approaches for modelling ontology mapping uncertainty and the ways for detecting logical errors, resulting from incorrect mappings. We discuss some important mapping, mapping evaluation and refinement strategies, well working in e-learning domain.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Georgi Tsochev, R. Trifonov, R. Yoshinov, Slavcho Manolov, G. Pavlova
{"title":"Improving the Efficiency of IDPS by using Hybrid Methods from Artificial Intelligence","authors":"Georgi Tsochev, R. Trifonov, R. Yoshinov, Slavcho Manolov, G. Pavlova","doi":"10.1109/InfoTech.2019.8860895","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860895","url":null,"abstract":"The present paper describes some of the results obtained in the Faculty of Computer Systems and Technology at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. Also is made a survey about existing hybrid methods, which are using several artificial intelligent methods for cyber defense. The paper introduces a model for intrusion detection systems where multi agent systems are the bases and artificial intelligence are applicable by the means simple real-time models constructed in laboratory environment.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130536958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Krutikov, Guzel Shkaberina, Mikhail Nikolaevich Zhalnin, Lev Kazakovtsev
{"title":"New Methods of Training Two-Layer Sigmoidal Neural Networks with Regularization","authors":"V. Krutikov, Guzel Shkaberina, Mikhail Nikolaevich Zhalnin, Lev Kazakovtsev","doi":"10.1109/InfoTech.2019.8860890","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860890","url":null,"abstract":"We propose an algorithm for training two-layer sigmoidal artificial neural networks (ANN) in the presence of significant interference and low-informative variables. To obtain an efficient initial ANN parameters approximation, the algorithm applies a uniform distribution of the neuron work areas in the data domain, followed by training of fixed neurons. The proposed algorithm for ANN learning in combination with non-smooth regularization allows us to obtain efficient ANN models for classification problems.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122627273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Transform Real Time Traffic Information into a Historical Database Used for Dynamic Routing","authors":"L. Rothkrantz","doi":"10.1109/InfoTech.2019.8860873","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860873","url":null,"abstract":"Most routing devices use real time traffic information. It proved that the first hours of a new day can be used to find a good matching day in the past. The traffic data from the matching day can be used to predict traffic streams on the current day. We designed a historic database storing traffic information from real time available public domain databases. A dynamic version of the well-known Dijkstra shortest path algorithm was used to design a dynamic routing algorithm.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Liarokapis, Dimitrios Exarhos, Constantinos Tsibanis, L. Merakos
{"title":"Extending an Open Source Learning Management System (Open eClass) as a Student Project","authors":"D. Liarokapis, Dimitrios Exarhos, Constantinos Tsibanis, L. Merakos","doi":"10.1109/InfoTech.2019.8860875","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860875","url":null,"abstract":"Learning management systems (LMS) are predominant in supporting all levels of education. Many educational institutions rely on open source systems that are free. Even though such systems are mature enough, there is a constant need to be extended. In this work, we present our experiences in attempting to extend an open source e-learning system, Open eClass that is widely used in Greece, in the context of a student project. We expect that our work will help toward forming a framework for facilitating community contributions to open source e-learning systems such as Open eClass.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132716448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Space Features – Security and Data Protection Requirements","authors":"R. Romansky, I. Noninska","doi":"10.1109/InfoTech.2019.8860880","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860880","url":null,"abstract":"The paper deals with some problems, determined in the contemporary digital age which are closely connected with the collecting, using and disseminating user's personal data. The discussion is based on a short presentation of the digital age features and contemporary cyber technologies related to the user's privacy. A summarization of the main challenges of the cyber space is made and some requirements for protection of privacy and user's security are formulated.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115572485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Kryeziu, F. Ismaili, Jaumin Ajdari, Bujar Raufi, Xhemal Zenuni
{"title":"Energy Provider Data Warehouse Design and Implementation - Case Study","authors":"N. Kryeziu, F. Ismaili, Jaumin Ajdari, Bujar Raufi, Xhemal Zenuni","doi":"10.1109/InfoTech.2019.8860876","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860876","url":null,"abstract":"An important issue in data warehousing is to extract, clean and design suitable multi-dimensional data models as required by organizational decision making where the main objective is to support exploring, querying, reporting and analysis. This paper shows the design and implementation of data warehouse within context of Energy Provider Company which collects various data from seven different transactional database instances and unifies them under single schema, in order to improve the reporting process.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128294852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Detection from ASR Output","authors":"I. Tashev, Dimitra Emmanouilidou","doi":"10.1109/InfoTech.2019.8860888","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860888","url":null,"abstract":"Emotion and sentiment detection from text have been one of the first text analysis applications. Practical use includes human-computer interaction, media content discovery and applications for monitoring the quality of customer service calls. In this paper we perform a review of established and novel features for text analysis, combine them with the latest deep learning algorithms and evaluate the proposed models for the needs of sentiment detection for monitoring of the customer satisfaction from support calls. The issues we address are robustness to the low ASR recognition rate, the variable length of the text queries, and the case of highly imbalanced data sets. The proposed approaches are shown to significantly outperform the accuracy of the baseline algorithms.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114949231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hand Gesture Detection","authors":"Pınar Kırcı, M.Fatih Cambek","doi":"10.1109/InfoTech.2019.8860894","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860894","url":null,"abstract":"Almost all of today's portable computers have a built-in camera. However, these cameras are used by people only as display devices. Instead of the users make computer management and control in a limited physical space with contacting the computer, they want to move away from the computer screen at the time of presentation and communicate with the computer without touching any device. In this study, by using computer vision and image processing techniques, with interpreting the hand movements of the user that enter the vision field of the camera, it can be used more functionally and the user can manage the computer without any physical contact and as being away from the monitor.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Selective Evolutionary Hyperheuristic for Large Scale Economic Load Dispatch Problem","authors":"E. Sopov, S. Videnin","doi":"10.1109/InfoTech.2019.8860884","DOIUrl":"https://doi.org/10.1109/InfoTech.2019.8860884","url":null,"abstract":"The economic load dispatch (ELD) problem is known as a hard optimization problem in the field of power system planning and control. Evolutionary algorithms (EAs) have demonstrated high performance in solving ELD problems with the number of power generator up to 40, but they lose their efficiency with high dimensionalities. In this study, we have proposed and have estimated the performance of a selective hyperheuristic for the online synthesis of an optimization algorithm based on large-scale optimization approaches.","PeriodicalId":179336,"journal":{"name":"2019 International Conference on Information Technologies (InfoTech)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129507272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}