2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

筛选
英文 中文
ICCAIS 2020 Cover Page ICCAIS 2020封面
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/iccais48893.2020.9096803
{"title":"ICCAIS 2020 Cover Page","authors":"","doi":"10.1109/iccais48893.2020.9096803","DOIUrl":"https://doi.org/10.1109/iccais48893.2020.9096803","url":null,"abstract":"","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arabic Dialect Identification in Social Media 社交媒体中的阿拉伯语方言识别
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096847
Reem AlYami, Rabeah Alzaidy
{"title":"Arabic Dialect Identification in Social Media","authors":"Reem AlYami, Rabeah Alzaidy","doi":"10.1109/ICCAIS48893.2020.9096847","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096847","url":null,"abstract":"PURPOSE/AIM & BACKGROUNDAlthough the Arabic language is spoken in twenty-two countries by more than 250 million speakers, it is still considered by Natural Language Processing NLP practitioners as a low resource language. Formal sources of Arabic texts are typically written in Modern Standard (or Written) Arabic (MSA), which is a form that is used in formal writing and taught in schools to Arabic speakers. However, informal communication among Arabic speakers is through informal local diglossic dialects. A diglossic language is one where the speakers of the same language have varying dialects. In Arabic, there are multiple dialects in different regions of the Arab world: Gulf, Levantine and North Africa. Users commonly communicate in social media using their local dialect rather than the formal MSA. This introduces a core NLP problem for Arabic, which is dialect identification. It is essential to identify the specific dialect prior to performing tasks such as parsing, tokenizing and other downstream tasks such as semantic inferences. Processing massive amounts of data written in these local dialects requires this identification step to improve accuracies, especially for automatic text comprehension tasks. Although Arabic dialects share a majority of common words, it is not uncommon for the same word to have different meanings across dialects. In addition to improving NLP task accuracies, Arabic Dialect Identification ADI enables a finer-grained demographic identification for mining texts related to consumer reports, health forums, entertainment and tourism reviews, and many others which ultimately lead to improved services for each demographic.The problem of ADI has been addressed by several studies such as (Al-Walaie & Khan, 2017), and (Harrat et al., 2019). Some works focus mainly on curating data sets for the problem such as the Sham dataset proposed by (Abu Kwaik et al., 2018).In this work we focus on both tasks: we curate an Arabic dialect dataset for two variants of Arabic (Saudi Arabian and Egyptian) and we train supervised machine learning models to address the identification task.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Twitter Data Analysis on the Topic: Tec de Monterrey 推特数据分析的主题:蒙特雷Tec
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096806
Juan Carlos Angeles Ceron, Laura Jaideny Perez Gomez, H. Ceballos, Franciso J. Cantu-Ortiz
{"title":"Twitter Data Analysis on the Topic: Tec de Monterrey","authors":"Juan Carlos Angeles Ceron, Laura Jaideny Perez Gomez, H. Ceballos, Franciso J. Cantu-Ortiz","doi":"10.1109/ICCAIS48893.2020.9096806","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096806","url":null,"abstract":"The active population in social networks has been increasing during the last decade. A large part of this population obtains information through these networks, replacing traditional media such as the newspaper or television news. Therefore, institutions from various fields have found an informational and advertising resource on social networks, in addition, using them as a means to interact and keep in touch with their community. In particular, educational institutions use social networks as a tool for direct communication, as well as a means to improve their brand. For this reason, an evaluation of the publications made on Twitter on the topic: Tecnologico de Monterrey was carried out. This evaluation implied the realization of an analysis of the vocabulary used within each publication and the impact that this has on the reactions made from the social network by the community, with the objective of identifying the characteristics that the published contents with more reactions have in common. This analysis may be beneficial for this and other educational institutions, as it will provide them with information that allows them to improve their image, generate greater reach and get to know their audience better.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132438227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an artificial intelligence strategy for higher education in Saudi Arabia 沙特阿拉伯高等教育的人工智能战略
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096833
M. Elhajji, Abdulaziz S. Alsayyari, A. Alblawi
{"title":"Towards an artificial intelligence strategy for higher education in Saudi Arabia","authors":"M. Elhajji, Abdulaziz S. Alsayyari, A. Alblawi","doi":"10.1109/ICCAIS48893.2020.9096833","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096833","url":null,"abstract":"The implementation of information and communication technologies (ICT) in the classroom had resulted in revolutionizing the methods of teaching and learning, where the emergence of artificial intelligence (AI) made the use of such technologies in higher education institutes more practical. This conceptual paper presents a prediction for strategy of using artificial intelligence in higher education for promoting learning outcomes and educational quality. The paper addresses AI-based learning by trying to analyze and investigate how AI can be effectively exploited and adopted by universities in the Kingdom of Saudi Arabia in accordance to the Kingdom's 2030 vision. Furthermore, this paper concentrates on challenges of teaching/learning process and benefits in the adoption of this old/new technology, empowering academic committee to an AI- powered context. In summary, a framework consolidated by a set of recommendations is presented in this work.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Segmentation of Brain Stroke Lesions using Marker-based Algorithms in CT images 基于标记的CT图像脑卒中病灶分割算法
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096866
Dr. Yousif Mohamed Yousif Abdallah
{"title":"Segmentation of Brain Stroke Lesions using Marker-based Algorithms in CT images","authors":"Dr. Yousif Mohamed Yousif Abdallah","doi":"10.1109/ICCAIS48893.2020.9096866","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096866","url":null,"abstract":"The computed tomography has huge role in the assessment of the hemorrhagic lesions of the brain. Physicians widely use CT to delineate the size and magnitude of the bleeding. In the medical image processing, the separation and detection of the objects is very crucial issue. The water-based segmentation (subdivision) is an approach that use to detect the closely contact margins tissues within the images. Manual outlining of the stroke in CT images considers as subjective operation that takes long time with less accuracy. In this study, the lesions were detected firstly and followed by Contrast augmentation and Segmentation. The suggested technique was evaluated to endorse its achievability and efficiency. These techniques attained 0.97 + 0.01, 0.98 + 0.02 and 0.991 + 0.01 (P = 0.001) for sensitivity, specificity and operating curve analysis, respectively. The analysis of the results images showed that the proposed approach is effective in detecting of the smaller lesions which might missed by using other segmentation methods. (Abstract)","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Copyright Protection for Online Text Information : Using Watermarking and Cryptography 在线文本信息的版权保护:使用水印和加密
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096817
N. Mir, Mohammad A. U. Khan
{"title":"Copyright Protection for Online Text Information : Using Watermarking and Cryptography","authors":"N. Mir, Mohammad A. U. Khan","doi":"10.1109/ICCAIS48893.2020.9096817","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096817","url":null,"abstract":"Information and security are interdependent elements. Information security has evolved to be a matter of global interest and to achieve this; it requires tools, policies and assurance of technologies against any relevant security risks. Internet influx while providing a flexible means of sharing the online information economically has rapidly attracted countless writers. Text being an important constituent of online information sharing, creates a huge demand of intellectual copyright protection of text and web itself. Various visible watermarking techniques have been studied for text documents but few for web-based text. In this paper, web page watermarking and cryptography for online content copyrights protection is proposed utilizing the semantic and syntactic rules using HTML (Hypertext Markup Language) and is tested for English and Arabic languages.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125285376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Where to Eat? An Automatic Summarization System for Opinions in Restaurant Reviews 去哪里吃饭?饭店评论意见自动汇总系统
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096724
Hessah Alsaaran, Waad Alowain, Duaa Aldrees, Shahad Almadhi, Wadha Alqahtani
{"title":"Where to Eat? An Automatic Summarization System for Opinions in Restaurant Reviews","authors":"Hessah Alsaaran, Waad Alowain, Duaa Aldrees, Shahad Almadhi, Wadha Alqahtani","doi":"10.1109/ICCAIS48893.2020.9096724","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096724","url":null,"abstract":"Technology has been an essential part of our lives. When going out to a new restaurant or cafe, people usually use websites or applications to lookup nearby places and then select one based on average rating. However, the average rating is sometimes not enough to predict the quality of the restaurant as people have different perspectives and priorities when evaluating a restaurant. In this paper, a summarization system for opinions in restaurant reviews is proposed. The system is a helpful tool for users on-the-go to help them make better judgments about the quality of a restaurant while saving their time. This is done by automatically and quickly providing the users with a summary of the opinions in the restaurant’s reviews. The proposed summarization system has been implemented in a mobile location-based application for Arabic restaurant reviews and it achieved a high usability score.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信