{"title":"PARTIAL LINEARIZATION WITHOUT LINESEARCH FOR NETWORK EQUILIBRIUM PROBLEMS","authors":"I. Konnov, E. Laitinen, O. Pinyagina","doi":"10.33965/ac2019_201912l023","DOIUrl":"https://doi.org/10.33965/ac2019_201912l023","url":null,"abstract":"In the present paper, we propose a simplified variant of the partial linearization method for the network equilibrium problem. This modification uses an adaptive stepsize procedure. It maintains the basic convergence properties and enables one to reduce the total volume of computational efforts. The key element of this approach is a given majorant stepsize sequence converging to zero. In accordance with this majorant, the next decreased value of the stepsize is taken only when the current iterate does not give a sufficient descent, which is estimated with the help of an Armijo-type condition. Preliminary numeric tests show the efficiency of this approach in comparison with the original variant of method.","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TWITTER USERS CREDIBLITY EVALUATION BASED ON SOCIAL GRAPH IMPRESSION","authors":"Hamda Slimi, Ibrahim Bounhas, Y. Slimani","doi":"10.33965/ac2019_201912l002","DOIUrl":"https://doi.org/10.33965/ac2019_201912l002","url":null,"abstract":"In the era of social media, information became abundant, versatile and easily accessible. Such characteristics enable almost anyone to publish and share their opinion about a variety of subjects. Such freedom comes at a cost since information and source credibility are in jeopardy. Therefore, numerous solutions were proposed to evaluate source credibility. In this paper, we review previous efforts on twitter credibility evaluation. We also propose an approach that relies on the impression of user social network on his tweets to determine his credibility. Furthermore, we incorporate a feature that determines the credibility of the URLs shared by the user through his tweets. The evaluation of our approach has shown it outperforms the baseline in both precision and recall.","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127261436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AUTOMATIC CREATION OF LISTS FROM WIKIPEDIA ARTICLES","authors":"Martin Seleng, L. Hluchý","doi":"10.33965/ac2019_201912l024","DOIUrl":"https://doi.org/10.33965/ac2019_201912l024","url":null,"abstract":"In the paper, we will introduce an approach to automatic list completion based on few keywords specified by the user, using knowledge base constructed previously from English Wikipedia articles. Our approach is similar to Google Sets experiment which does not exist nowadays but its part was integrated in Google Drive (formerly Google Docs) for some time. After writing few words the system recommends additional words to create the list. Our solution is based on offline processing of the English Wikipedia corpus where it searches for tables and lists (as a special case of one column table). These tables/lists are indexed by the system and this index is used to extend user defined keywords by relevant items.","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129160646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Skvortsova, V. Terekhov, Valery Chernenky, Ivan Chernenky
{"title":"COGNITIVE VISUALIZATION IN A HYBRID INTELLIGENT RISK CONTROLLING SYSTEM","authors":"M. Skvortsova, V. Terekhov, Valery Chernenky, Ivan Chernenky","doi":"10.33965/ac2019_201912c028","DOIUrl":"https://doi.org/10.33965/ac2019_201912c028","url":null,"abstract":"Currently developed hybrid intelligent systems that use a combination of traditional data processing methods and intelligent methods are able to analyze and assess the existing risks in all areas of human activity. This article shows the positive effect of cognitive computer visualization as a means of activating the mechanisms of visual-figurative thinking of the person making a decision in the tasks of controlling the integral indicator of risks. The essence of the anamorphic method is shown, which is the transition from one visual image built on the basis of Euclidean metrics to another visual image based on the quantitative metric of the selected risk. The mathematical formulation of the dynamic meta-anamorphine method is disassembled. The advantages of the constructed meta-anamorphosis in the risk controlling HIS are given. The problem of calculating the integral risk index, which combines the risks of different spheres of activity and visualizations built on this basis, is analyzed. Conclusions are made regarding the construction of a hybrid model based on the hierarchy analysis method and the dynamic meta-anamorphosis method. The directions of further research are determined.","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123409708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPROVING THE POPULARITY OF EDUCATIONAL GAMES USING OPTIMAL GAME DEVELOPMENT","authors":"Johann Allers, G. Drevin, Trudie Benadé","doi":"10.33965/ac2019_201912l018","DOIUrl":"https://doi.org/10.33965/ac2019_201912l018","url":null,"abstract":"Educational games are powerful tools that can be utilized to help people learn while having fun, but it is one of the least played genres of games to date. This paper addresses the problem of increasing the popularity of educational games by identifying optimal game elements and characteristics and implementing it in an educational game. In other words, the goal was to create a fun-to-play and educational game. A literature survey was done to identify these elements with the goal to create a game which enables a user to play the popular educational game, Scrabble. A desktop application that implemented all of these elements, identified in the study, was created and it allows the user to play Scrabble against artificial intelligence opponents.","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122646569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paolo Locatelli, F. Cirilli, Antonio Jacopo Scardigno
{"title":"AN INTEGRATED DIGITAL SOLUTION TO IMPROVE THE GOVERNANCE AND THE MONITORING OF LOGISTICS FOR MEDICINES AND MEDICAL DEVICES","authors":"Paolo Locatelli, F. Cirilli, Antonio Jacopo Scardigno","doi":"10.33965/ac2019_201912p042","DOIUrl":"https://doi.org/10.33965/ac2019_201912p042","url":null,"abstract":"In the last years, global healthcare is going through a consistent growth and a significant transformation of its information systems and supply chains. This evolution affects the traditional medicines and medical devices logistics and operating models and the integration of healthcare systems and healthcare information management systems. Digital solutions show to play an important role in tackle the abovementioned issues but these applications are generally focused on one or few specific aspects. The project “LIFEMED – Integrated Logistics of Medicines and Medical Devices” aims at introducing an innovative integrated platform that manages all the logistics components of medicines and medical devices and enables an improved clinical governance. In particular, together with a set of telemedicine, traceability, clinical management and transport monitoring platforms for the monitoring and management of the logistics and clinical processes, the solution will be also characterized by an evidence-based decision making system and by an effective risk management module so to strategically analyze all the gathered data. In this regard, attention must be paid in considering the wide heterogeneity of the processed data and the privacy, ethical and security implications.","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132627638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DETERMINISTIC TOURIST WALK FOR EFFECTIVE DIVERSIFICATION OF QUERY RESULTS","authors":"S. Z. Oliva, J. C. Felipe, M. X. Ribeiro","doi":"10.33965/ac2019_201912l020","DOIUrl":"https://doi.org/10.33965/ac2019_201912l020","url":null,"abstract":"","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117132101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MODELLING TECHNICAL COUNTERMEASURES OF ADVANCED PERSISTENT THREATS","authors":"Mathew Nicho, Christopher D. McDermott","doi":"10.33965/ac2019_201912c038","DOIUrl":"https://doi.org/10.33965/ac2019_201912c038","url":null,"abstract":"An advanced persistent threat (APT) is a highly targeted and sophisticated attack directed at the internetworked computer user at the workplace. They typically employ zero-day malware, stealth, and multiple advanced techniques to gain entry and maintain presence undetected inside the network. As a result, preventing their ingress at the network perimeter and detection once infiltration occurs, continues to be a challenge. In this respect, the major objective of this research is to propose a classification schema for the APT technical countermeasures. We interviewed senior managers working in government and private organizations in the United Arab Emirates over a period of four years (2014 to 2017) to gain their perspective of the threat and elicit technical countermeasures. We anticipate the proposed methods and practices can assist organizations, not only in the UAE but also in the wider global context, to implement an appropriate mix of countermeasures for APT threats from a multi-dimensional perspective.","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114072053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andréia R. Casare, C. D. Silva, Paulo S. Martin Paulo S. Martin, Regina Moraes
{"title":"MAPPING WCAG GUIDELINES TO NIELSEN'S HEURISTICS","authors":"Andréia R. Casare, C. D. Silva, Paulo S. Martin Paulo S. Martin, Regina Moraes","doi":"10.33965/ac2019_201912l010","DOIUrl":"https://doi.org/10.33965/ac2019_201912l010","url":null,"abstract":"","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128593251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A COMPARATIVE ANALYSIS OF CRYPTOCURRENCY CONSENSUS ALGORITHMS","authors":"K. Wagner, Thomas Keller, Rolger Seiler","doi":"10.33965/ac2019_201912l026","DOIUrl":"https://doi.org/10.33965/ac2019_201912l026","url":null,"abstract":"","PeriodicalId":432605,"journal":{"name":"Proceedings of the 16th International Conference on Applied Computing 2019","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}