2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)最新文献

筛选
英文 中文
Gumbel Distribution Adjustment Improvement for Accurate Extreme Values Prediction 精确极值预测的甘贝尔分布调整改进
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686828
Nesrine Khabou, I. Rodriguez, Oumayma Jameleddine, Amal Mateur
{"title":"Gumbel Distribution Adjustment Improvement for Accurate Extreme Values Prediction","authors":"Nesrine Khabou, I. Rodriguez, Oumayma Jameleddine, Amal Mateur","doi":"10.1109/AICCSA53542.2021.9686828","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686828","url":null,"abstract":"In this paper, we focus on using the Extreme Value Theory (EVT), especially the Gumbel Distribution (GD) for Extreme values prediction in a time series. GD is used to model the distribution of extreme values in a time series. Furthermore, if a time series formed by extreme values follows (can be adjusted to) the Gumbel distribution, the GD parameters can be estimated on the basis of the observed data, then these parameters are used to predict future extreme values/events. However, in the literature, most studies rely on a visual adjustment method to prove that the time series formed by extreme values follows the Gumbel Distribution. In this paper, our main contribution consists on studying different adjustment methods, compare them and use an automated mathematical adjustment method to demonstrate the adjustment of the studied time series to the Gumbel Distribution.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Membership, syndromic and causality graphs to represent the emergency physician’s reasoning 成员关系,症状和因果关系图,以表示急诊医生的推理
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686758
Loïc Etienne, Francis Faux, Olivier Roecker
{"title":"Membership, syndromic and causality graphs to represent the emergency physician’s reasoning","authors":"Loïc Etienne, Francis Faux, Olivier Roecker","doi":"10.1109/AICCSA53542.2021.9686758","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686758","url":null,"abstract":"The reasoning of an emergency doctor is very particular because he often has no prior knowledge (he generally knows nothing about the patient), he has little time to understand the situation, and he must, by means of questioning, quickly make a decision based on diagnostic hypotheses and an estimate of the seriousness of the patient’s condition. In a previous paper we presented the 10 step reasoning model of an emergency physician used by the symptom checker MedVIR. This model is represented by a membership graph which describes the clinical information that helps physicians in their diagnosis by allowing them to ask the essential questions.This paper extends membership graphs to syndromic vision as well as to causality graphs. Syndromic graphs enable the simplification of the memorization of a disease whereas causality graphs make it possible to define the first cause of a disease, the chain of pathological processes, the syndromes which constitute it. These graphs enable the clinician to have a global view of diseases belonging to different and unrelated specialities and they will be able to contribute to the training of doctors and health professionals.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic user profile enrichment in collective intelligence context: a Healthcare case study 集体智能上下文中语义用户概要的丰富:一个医疗保健案例研究
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686833
Meriem Hafidi, Sara Qassimi, E. Abdelwahed, Aimad Qazdar
{"title":"Semantic user profile enrichment in collective intelligence context: a Healthcare case study","authors":"Meriem Hafidi, Sara Qassimi, E. Abdelwahed, Aimad Qazdar","doi":"10.1109/AICCSA53542.2021.9686833","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686833","url":null,"abstract":"The Personalized systems are generally based on collecting and exploiting users’ preferences by exploring their traces’ data. Actually, they find users who have similar attributes, cluster them, and then applying algorithms using the subnets. The similarity between users compares their profiles including their attributes. The adding of tags to enrich the user profile must take into consideration the long and short term criteria of the user’s attributes that change over time. In this paper, we present a tag-based profile enrichment approach by adding a time score describing the short and long term criteria of the attribute. Then we use graph analytics to draw clusters of users by inspecting similar tags. Our approach helps companies to make their predictions and conclusions. The datasets of patients’ images ChestX-Ray14 have been conducted to evaluate the effectiveness of our approach.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Layer Mapping of Cyberspace for Intrusion Detection 面向入侵检测的网络空间多层映射
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686823
Sicong Shao, P. Satam, Shalaka Satam, Khalid R. AL-Awady, G. Ditzler, S. Hariri, Cihan Tunc
{"title":"Multi-Layer Mapping of Cyberspace for Intrusion Detection","authors":"Sicong Shao, P. Satam, Shalaka Satam, Khalid R. AL-Awady, G. Ditzler, S. Hariri, Cihan Tunc","doi":"10.1109/AICCSA53542.2021.9686823","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686823","url":null,"abstract":"The ubiquity and vulnerability of computer applications make them ideal places for intrusion attacks that increase in intensity and complexity. Computer applications have a relationship with various networks, physical components, host devices, and users with different roles and requirements. Therefore, securing computer applications in such a complex and dynamic cyberspace is urgent and challenging. This paper attempts to tackle the challenges by proposing a Multi-Layer Abnormal Behaviors Analysis (MLABA) framework for intrusion detection associated with three layers (i.e., system, process, and network layers) in cyberspace for characterizing their normal operations and detect any abnormal behavior that might be triggered by malicious activities. The proposed technique was evaluated on several popular applications (i.e., Firefox, Opera, Chrome, and Ruby). The experimental results demonstrate the feasibility of MLABA framework that can detect the intrusion and abuse for applications.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126463447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Face Verification Under Makeup Changes Using Few Salient Regions 利用少数显著区域进行化妆变化下的有效人脸验证
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686843
Khouloud Ferchichi, Haythem Ghazouani, W. Barhoumi
{"title":"Efficient Face Verification Under Makeup Changes Using Few Salient Regions","authors":"Khouloud Ferchichi, Haythem Ghazouani, W. Barhoumi","doi":"10.1109/AICCSA53542.2021.9686843","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686843","url":null,"abstract":"Face recognition has attracted the attention of many researchers during the last years due to its many applications in various fields. However, this task faces several challenges related to many changes that can affect the human face. In particular, make-up faces represent a major challenge for facial verification. To deal with this issue, we propose in this work an efficient salient patch-based method for verifying faces under makeup variation. Firstly, we use Mutli-Task Cascaded Convolutional Neural Networks (MTCNN) in order to jointly detect and align the face. Then, we have adapted the O-NET network in order to robustly detect five landmarks by training it on makeup faces. The Histogram of Oriented Gradients (HOG) descriptor and the Local Binary Patterns (LBP) are then used to represent the face by concatenating their histogram features in few salient regions around the detected landmarks. Finally, we estimate the similarity measure between the extracted features in order to compare the two faces while determining whether they are for the same person or not. The performance of the proposed method has been validated on the challenging YMU (YouTube Makeup dataset ) and MIFS (Makeup Induced Face Spoofing) datasets, and the obtained results proved the superiority of the proposed method against relevant multi-patch-based methods from the state of the art.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"67 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128026631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Approach for Optimizing Arabic Semantic Query Expansion 一种优化阿拉伯语语义查询扩展的混合方法
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686890
Azzah Allahim, A. Cherif, Abdessamad Imine
{"title":"A Hybrid Approach for Optimizing Arabic Semantic Query Expansion","authors":"Azzah Allahim, A. Cherif, Abdessamad Imine","doi":"10.1109/AICCSA53542.2021.9686890","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686890","url":null,"abstract":"Nowadays, information retrieval systems face significant challenges in providing users with accurate information due to the enormous growth of information. To better reformulate the query and narrow its results, semantic query expansion techniques add semantically related terms to the original query. However, semantic query expansion for Arabic queries is still a challenge due to the lack of rich semantic sources. Most of the existing solutions rely on using either English sources or specific-domain Arabic ontologies. Using English sources requires a translation phase which may lead to query drift, thus providing unrelated expansion terms. In this paper, we provide an overview of the query expansion approaches. Besides, we propose a hybrid comprehensive reference framework for Arabic semantic query expansion that overcomes the lack of Arabic semantic sources by using rich English ontologies to complement the limited Arabic sources (Arabic Wordnet) currently available. It ensures the Arabic-English translation process using a customized machine learning translation model to avoid query drifting. It also transforms natural language to SPARQL (an ontology query language) to easily query English sources (e.g., DBpedia). For enhanced accuracy, it provides an optimization module where meta-heuristics can be used for pertinent terms selection. This work represents a step forward in combining English sources and AI to design a practical Arabic semantic expansion.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Risk-aware Business Process Modeling Tool for Healthcare processes 为医疗保健流程开发具有风险意识的业务流程建模工具
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686913
Rafika Thabet, E. Lamine, H. Pingaud
{"title":"Development of a Risk-aware Business Process Modeling Tool for Healthcare processes","authors":"Rafika Thabet, E. Lamine, H. Pingaud","doi":"10.1109/AICCSA53542.2021.9686913","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686913","url":null,"abstract":"Healthcare organizations are environments of high management complexity and are subject to risk. Indeed, risk management is one of the most relevant aspects put forward in the literature which highlights the necessity to perform comprehensive analyses intended to uncover the root causes of risks. However, the healthcare sector still suffers from a lack of attention in this context, especially with regard to the establishment of risk management and process-oriented management, which is the motivation for the study described in this paper. In light of these observations, it would be essential for healthcare organizations to explore new risk management approaches. Contributing to this field, the present paper applies a risk-aware business process management method to work out a systemic methodology to study risks impacting healthcare processes. This framework aims to improve healthcare organizations’ maturity towards risk management. A case study related to the management of potential risks in a given healthcare process shall illustrate the usage of the developed framework.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130958640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Distributed Healthcare Systems – Virtual Data Pooling Between Cancer Registries as Backbone of Care and Research 面向分布式医疗保健系统——作为护理和研究骨干的癌症登记处之间的虚拟数据池
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686918
Arno Appenzeller, S. Bartholomäus, Rüdiger Breitschwerdt, Carsten Claussen, Sandra Geisler, Tobias Hartz, Philipp Kachel, E. Krempel, Sebastian Robert, S. Zeissig
{"title":"Towards Distributed Healthcare Systems – Virtual Data Pooling Between Cancer Registries as Backbone of Care and Research","authors":"Arno Appenzeller, S. Bartholomäus, Rüdiger Breitschwerdt, Carsten Claussen, Sandra Geisler, Tobias Hartz, Philipp Kachel, E. Krempel, Sebastian Robert, S. Zeissig","doi":"10.1109/AICCSA53542.2021.9686918","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686918","url":null,"abstract":"German cancer registries offer a systematic approach for the collection, storage, and management of data on patients with cancer and related diseases. Much hope in research and healthcare in general is depending on such register-based analyses in order to comprehensively consider the features of a highly diverse population. Next to the data collection the cancer registries are responsible for data protection. To fulfill legal regulations, access to data has to be controlled in a strict way leading to sometimes bureaucratic and slow processes. The situation is especially complicated in Germany, since cancer data is distributed over numerous federal cancer registries. If a nationwide data evaluation is conducted a research team has to negotiate a separate contract with each cancer registry.In a joint work in progress effort of cancer registries, technical, medical, and economical experts we propose a different solution for cooperative data processing. Our approach aims for combining data in a virtual pool based on the selection criteria of individual requests from researchers. To achieve our goal, we adapt the Fraunhofer Medical Data Space as enabling technology. The architecture we propose will allow us to pool data of multiple partners regulated by data access policies. In doing so, each of the data sources can introduce its own rules and specifications on how data is used. Additionally, we add a digital consent management that will allow individual patients to decide how their data is used. Finally, we show the high potential of the cooperative analysis of distributed cancer data supported by the proposed solution in our approach.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"57 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Text detection in Arabic news video based on MSER and RetinaNet 基于MSER和retanet的阿拉伯语新闻视频文本检测
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686930
Sadek Mansouri, Salah Zrigui, M. Zrigui, Dhaou Berchech
{"title":"Text detection in Arabic news video based on MSER and RetinaNet","authors":"Sadek Mansouri, Salah Zrigui, M. Zrigui, Dhaou Berchech","doi":"10.1109/AICCSA53542.2021.9686930","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686930","url":null,"abstract":"In this paper, we propose a novel approach for text detection in Arabic news videos. Firstly, we apply MSER method and morphological operators (open and close) to extract candidate regions of text in image. Then, we use a deep learning method called RatinaNet. It is based in two stages. The first one aims to extract features using residual network (ResNet) and a pyramidal feature network (FPN). In the second step, we use two fully convolutional networks (FCN), one is for the classification task and the other for the bounding box regression task. For training and testing stages, we have used the AcTiVD [18] dataset. Experiments results proves the efficiency and performance of the proposed method.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Monitoring System and Faults Prediction for Internet of Things System 物联网系统监测系统及故障预测
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686915
Radia Bendimerad, K. Smiri, A. Jemai
{"title":"A Monitoring System and Faults Prediction for Internet of Things System","authors":"Radia Bendimerad, K. Smiri, A. Jemai","doi":"10.1109/AICCSA53542.2021.9686915","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686915","url":null,"abstract":"With the emerging Internet of Things (IoT), the real-time applications are increasingly deployed on IoT systems using Multi Processing System On Chip (MPSoC). Real-time applications have strict temporal constraints, and are not fault-tolerant. Any defective IoT device can lead to serious faults such as data loss or even application failure. It is possible to predict the defective IoT device using a predictive model to prevent faults. Data on CPU load, consumption and thermal state of devices are correlated with the state of the device. In this paper, we show how to classify the state of MPSoC IoT Devices using a decision tree with ID3 algorithm as a split heuristic based on hardware measurement features.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信