2023 6th International Conference on Information and Computer Technologies (ICICT)最新文献

筛选
英文 中文
Long Text Classification Using Pre-trained Language Model for a Low-Resource Language 基于预训练语言模型的低资源语言长文本分类
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/icict58900.2023.00026
Hailemariam Mehari Yohannes, T. Amagasa
{"title":"Long Text Classification Using Pre-trained Language Model for a Low-Resource Language","authors":"Hailemariam Mehari Yohannes, T. Amagasa","doi":"10.1109/icict58900.2023.00026","DOIUrl":"https://doi.org/10.1109/icict58900.2023.00026","url":null,"abstract":"Text classification is an essential task of Natural Language Processing (NLP) that intends to classify texts into predefined classes. Most recent studies show that transformer-based pre-trained language models such as BERT and RoBERTa have achieved state-of-the-art performance in several downstream NLP tasks. Despite their advantages, these models suffer from one primary drawback of the restricted input size. Because of this limitation, they cannot operate the entire input long texts. This paper presents an approach that utilizes the self-attention mechanism to address the bottleneck of most pre-trained language models of long input texts in the case of Amharic, regarded as a low-resourced language. Specifically, our method carefully investigates the significance of each word in the dataset using a self-attention mechanism. Then identify and select the most relevant words according to their attention scores. Finally, we train our model on the filtered text. Our results show that the approach achieves better performance in terms of accuracy compared to the baseline model.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133553123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Machine and Deep Learning Models for the Prediction of Land Degradation 机器和深度学习模型在土地退化预测中的比较
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00009
Joshua Edwards, Gülüstan Dogan, N. Pricope
{"title":"Comparison of Machine and Deep Learning Models for the Prediction of Land Degradation","authors":"Joshua Edwards, Gülüstan Dogan, N. Pricope","doi":"10.1109/ICICT58900.2023.00009","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00009","url":null,"abstract":"The primary purpose of this study was to develop and compare artificial intelligence algorithms to determine which gives the best predictions on variables related to land degradation. Data for this project was taken from satellite imagery and readings from ground stations. Data used included precipitation, temperature, and ground cover (EVI) readings. After comparing both the machine and deep learning methods it was found that overall machine learning vastly outperformed the deep learning models. In the end, random forest was the most accurate with a mean absolute percent error of 10.52%, and the top three models were all based on decision trees.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128217161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
mpiPython: Prospects for Node Performance mpiPython:展望节点性能
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00038
Judah Nava, Hanku Lee
{"title":"mpiPython: Prospects for Node Performance","authors":"Judah Nava, Hanku Lee","doi":"10.1109/ICICT58900.2023.00038","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00038","url":null,"abstract":"Python as an interpreted language is limited in performance by its ability to optimize code. With it being a high-level programming language, it’s still a strong choice for data scientists to learn and use. If Python could be optimized for parallel programming, its full potential in parallel and cloud computing environments could be achieved. mpiPython is a message-passing module that gives Python the ability to be used in SPMD (Single Program Multiple Data) environments. In this paper, we review basic features of mpiPython, including its runtime communication libraries and design strategies. mpiPython also has new features to help mpiPython programmers, that includes simplifying traditional MPI initialization. During the development of mpiPython, we realized that individual node performance of mpiPython is uncertain and critical. mpiPython node performance will be analyzed within the benchmarks.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Combined Method for Face Recognition 一种人脸识别的组合方法
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00021
Laura Mukhamadiyeva, A. Moldagulova
{"title":"A Combined Method for Face Recognition","authors":"Laura Mukhamadiyeva, A. Moldagulova","doi":"10.1109/ICICT58900.2023.00021","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00021","url":null,"abstract":"Nowadays face recognition methods are in great interest of computer vision area. The development of a face recognition method that provides a high level of reliability of the solution in the absence of restrictions on the source image is a very crucial task. The paper deals with analysis of existing algorithms for recognizing the geometric characteristics of the face. As a result a combined method for identifying the face was developed. The main goal of this paper is to develop methods for recognizing and detecting faces that increase the reliability of identification of objects of analysis, reduce the level of false recognition, reduce the training time of the classifier and the time of preliminary processing and recognition of the image.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132785695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Representation Theorems Obtained by Mining across Web Sources for Hints 通过跨Web源挖掘提示获得的表示定理
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00041
M. Caminati, J. Bowles
{"title":"Representation Theorems Obtained by Mining across Web Sources for Hints","authors":"M. Caminati, J. Bowles","doi":"10.1109/ICICT58900.2023.00041","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00041","url":null,"abstract":"A representation theorem relates different mathematical structures by providing an isomorphism between them: that is, a one-to-one correspondence preserving their original properties. Establishing that the two structures substantially behave in the same way, representation theorems typically provide insight and generate powerful techniques to study the involved structures, by cross-fertilising between the methodologies existing for each of the respective branches of mathematics. When the related structures have no obvious a priori connection, however, such results can be, by their own nature, elusive. Here, we show how data-mining across distinct web sources (including the Online Encyclopedia of Integer Sequences, OEIS), was crucial in the discovery of two original representation theorems relating event structures (mathematical structures commonly used to represent concurrent discrete systems) to families of sets (endowed with elementary disjointness and subset relations) and to full graphs, respectively. The latter originally emerged in the apparently unrelated field of bioinformatics. As expected, our representation theorems are powerful, allowing to capitalise on existing theorems about full graphs to immediately conclude new facts about event structures. Our contribution is twofold: on one hand, we illustrate our novel method to mine the web, resulting in thousands of candidate connections between distinct mathematical realms; on the other hand, we explore one of these connections to obtain our new representation theorems. We hope this paper can encourage people with relevant expertise to scrutinize these candidate connections. We anticipate that, building on the ideas presented here, further connections can be unearthed, by refining the mining techniques and by extending the mined repositories.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127261104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Fake News Using Machine Learning Based Approaches 使用基于机器学习的方法检测假新闻
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00027
Ty Edwards, Ridwan Rashid Noel
{"title":"Detecting Fake News Using Machine Learning Based Approaches","authors":"Ty Edwards, Ridwan Rashid Noel","doi":"10.1109/ICICT58900.2023.00027","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00027","url":null,"abstract":"The spread of false information, commonly known as “fake news,” has become a significant problem in recent years, with the potential to mislead the public and influence important decisions. In this research, we focus on creating an automated system for fake news detection using natural language processing of news texts. We investigate different machine learning-based classification techniques to predict whether a text is a real or fake news. We utilized popular datasets from Kaggle and implemented Logistic Regression, Support Vector Machine, decision tree, k-Nearest Neighbors, multinomial naïve Bayes, and Multilayer Perceptron, as well as an ensemble technique called stacking, which utilizes the other models in its prediction. We also perform a comparative analysis of the accuracies of the different techniques in fake news detection. From our experimental analysis, we found that the ensemble learner, Support Vector Machine, and Multilayer Perceptron outperform the other approaches and have the highest overall accuracies.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Consistency in Price Negotiation Dialogue System Using Parameterized Action Space with Generative Adversarial Imitation Learning 基于生成对抗模仿学习的参数化动作空间改进价格谈判对话系统一致性
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00039
Makoto Sato, T. Takagi
{"title":"Improved Consistency in Price Negotiation Dialogue System Using Parameterized Action Space with Generative Adversarial Imitation Learning","authors":"Makoto Sato, T. Takagi","doi":"10.1109/ICICT58900.2023.00039","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00039","url":null,"abstract":"A price negotiation dialogue system should not only gain profit but also pay attention to the negotiation process, such as the consistency of price proposals. In particular, when using a parameterized action space to make price proposals as a continuous action, the proposals can be more flexible but potentially inconsistent. In this study, we propose introducing Generative Adversarial Imitation Learning (GAIL) to price negotiation dialogues with a parameterized action space. To the best of our knowledge, this is the first case study to introduce GAIL in parameterized action space. In addition, we work on extending the dialogue act to maintain consistency, and on combining parameteried action reinforcement learning(RL) and GAIL by using Multi-Critic. The proposed method is applied to the CRAIGSLISTBARGAIN negotiation task, which is a practical negotiation task and is trained in a multi-agent format as a seller and buyer without using a simulator, and is evaluated by interacting with agents that combine supervised learning and rule-based methods. The results show that GAIL can reduce price inconsistencies better than RL with the designed reward function for consistency maintenance or the combination of RL and behavior cloning. Furthermore, we confirmed that the combined method of RL with the designed reward function and GAIL can reduce price inconsistencies the most and also enhance profit-seeking abilities.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126715368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool 通过社会工程工具StormBreaker对Android设备进行渗透评估和打击攻击的方法
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00043
E. Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon
{"title":"Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool","authors":"E. Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon","doi":"10.1109/ICICT58900.2023.00043","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00043","url":null,"abstract":"With the continuous advancement of technology, it became necessary to use the internet to communicate and exchange information. Since the internet is a known open platform, malicious people also utilize it with the dangerous intention of exploiting confidential information. With unethical hacking, attackers ensure that the user does not discover their exploitation methods. At a higher level of hacking, the attacker aims not to be detected by security enhancement software or technical staff. Social media is one of the most common means of exposure to attacks such as social engineering, wherein individuals receive unsolicited e-mails, messages, or any form of text that contains a malicious link that can endanger their sensitive data. Most people are unaware of the security risks that may harm their identity and device. With this, the study conducted an online survey to determine whether people are knowledgeable of suspicious activities that may occur with a social engineering attack. The survey revealed that twenty-four (24) respondents are aware of suspicious URL links that can access their personal information when clicked. To further understand the methods of social engineering attacks, the researchers performed a simulation attack using StormBreaker, a Social Engineering Toolkit (SET). Results show that StormBreaker can access device information, accurate location, webcam or front camera, and device microphone. Thus, the researchers recommend implementing a firewall to enhance network security and to be more vigilant in internet usage.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Educational Group Formation Problem Resolution Based on an Improved Swarm Particle Optimization Using Fuzzy Knowledge 基于改进的模糊知识群粒子优化的教育群体形成问题求解
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00010
Bikhtiyar Hasan, A. Boufaied
{"title":"Educational Group Formation Problem Resolution Based on an Improved Swarm Particle Optimization Using Fuzzy Knowledge","authors":"Bikhtiyar Hasan, A. Boufaied","doi":"10.1109/ICICT58900.2023.00010","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00010","url":null,"abstract":"In educational context, instructors usually partition students into collaborative learning teams to perform collaborative learning tasks. Indeed, one of the grouping criteria most utilized by instructors is based on the students’ roles and on forming similar teams according to the roles of their members which is costly and complex. In this paper, we address the optimization problem of forming automatically learning teams by minimizing the knowledge-difference cost among formed teams. The knowledge index of each group depends on the Belbin roles of their students’ members in the form of a sum of students’ fuzzy rating indexes. The proposed algorithm is called improved particle swarm optimization with multi-parent order crossover (IPSOMPOX). The multi-parent order crossover is used in IPSOMPOX in order to investigate new solutions in the search space and to accelerate the convergence of the proposed algorithm to the best global solution. To evaluate the performance of the proposed algorithm, we apply it on several different experiments with different numbers of teams and students. The proposed algorithm is compared with the standard PSO and has proved better performance are shown in our results.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rainfall Forecasting with Variational Autoencoders and LSTMs 用变分自编码器和lstm进行降雨预报
2023 6th International Conference on Information and Computer Technologies (ICICT) Pub Date : 2023-03-01 DOI: 10.1109/ICICT58900.2023.00013
Eron Neill, Gülüstan Dogan
{"title":"Rainfall Forecasting with Variational Autoencoders and LSTMs","authors":"Eron Neill, Gülüstan Dogan","doi":"10.1109/ICICT58900.2023.00013","DOIUrl":"https://doi.org/10.1109/ICICT58900.2023.00013","url":null,"abstract":"In this paper we present a case study using a novel machine learning system for rainfall forecasting in a localized area over Colombia, South America. We explore a new forecasting approach inspired by established techniques used in computer vision and generative modeling to create a predictive model for precipitation maps. Using an ensemble made of a Variational Autoencoder and a stacked LSTM we were able to create a system which learns the spatial and temporal features of weather patterns in an integrated way, but also allows them to be measured and studied independently. Such a system introduces practical benefits in applications such as detection of rare weather patterns or analysis of anomalous events in addition to its regular forecasting capabilities.","PeriodicalId":425057,"journal":{"name":"2023 6th International Conference on Information and Computer Technologies (ICICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信