2019 11th International Conference on Knowledge and Systems Engineering (KSE)最新文献

筛选
英文 中文
Intelligent tutoring chatbot for solving mathematical problems in High-school 解决高中数学问题的智能辅导聊天机器人
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919396
H. Nguyen, Vuong T. Pham, Dung A. Tran, T. T. Le
{"title":"Intelligent tutoring chatbot for solving mathematical problems in High-school","authors":"H. Nguyen, Vuong T. Pham, Dung A. Tran, T. T. Le","doi":"10.1109/KSE.2019.8919396","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919396","url":null,"abstract":"Nowadays, information technology is applied for teaching and learning in high-school. It is an essential trend for the modern education, especially building intelligent systems to support the learning of mathematics. In the math subjects of Vietnamese high-school, problems about surveying properties of a function are popular in high-school exams. There are some current tools can solve them automatically. However, they only can display the graph of a function; they cannot solve problems about determining the value of a parameter to satisfy some conditions about this function’s properties. In this paper, we will present a method to design an intelligent chatbot for solving problems in this knowledge domain. It plays as an instructor to give some tips and tutor the learner how to solve problems automatically. This program can communicate with the learner through the question-answering process by chatbot. This tutoring of our system simulates the tutoring method of the teacher to the students in practice.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"50 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132174110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Approach of Rhetorical Status Recognition for Judgments in Court Documents using Deep Learning Models 基于深度学习模型的法庭文书判决书修辞状态识别方法
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919370
Vu D. Tran, M. Nguyen, Kiyoaki Shirai, K. Satoh
{"title":"An Approach of Rhetorical Status Recognition for Judgments in Court Documents using Deep Learning Models","authors":"Vu D. Tran, M. Nguyen, Kiyoaki Shirai, K. Satoh","doi":"10.1109/KSE.2019.8919370","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919370","url":null,"abstract":"In a court document, the rhetorical status of a sentence conveys the intention of the sentence, whether is is a claim or contains supporting evidences, thus, is beneficial to court document processing systems, for example, court document retrieval systems. Besides, rhetorical structure analysis has high-impact applications in natural language processing, for instances, text summarization, sentiment analysis, question answering. The output structures of the analysis contain high-level relationship between clauses and so provides valuable information. Despite of a wide range of applications and the necessity for automatic court document processing, automatic rhetorical structure analysis has not been well noticed in the legal domain. We propose to use deep learning models for tackling the task of recognizing the rhetorical status of each sentence in a court document. Deep learning has been shown effective towards natural language processing tasks including discourse analysis. We have achieved promising results for the task, which suggests the applicability of artificial neural module embedding rhetorical information for other tasks, for example, summarization and information retrieval.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Alpha-DBL: A Reasonable High Secure Double-Block-Length Hash Function Alpha-DBL:一个合理的高安全双块长度哈希函数
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919354
L. Dinh, Thai Tran Hong
{"title":"Alpha-DBL: A Reasonable High Secure Double-Block-Length Hash Function","authors":"L. Dinh, Thai Tran Hong","doi":"10.1109/KSE.2019.8919354","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919354","url":null,"abstract":"We propose a new double-block-length compression function which is called Alpha-DBL. This scheme using two parallel secure single block length schemes based on a block cipher with 2n-bits key and n-bits block size to compress a 3n-bits string to a 2n-bits one. We show that Alpha-DBL scheme attains nearly optimal collision security and preimage security bounds (up to 2n and 22n queries for finding a collision and a preimage, respectively). More precisely, for n=128 no adversary making less than 2n−1.27= 2126.73 queries can find a collision with probability greater than 1/2. With our knowledge, this collision security bound is better than other of such a compression function. In addition, we give a preimage security analysis of Alpha-DBL that show security bound of 22n−5 = 2251 queries for n=128. Using this scheme in the iterated hash function construction can preserve the collision resistance security and the preimage resistance security.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128712465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of a Plagiarism Corpus in Thai for Plagiarism Detection 用于抄袭检测的泰语抄袭语料库的设计与开发
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919436
Santipong Thaiprayoon, P. Palingoon, Kanokorn Trakultaweekoon
{"title":"Design and Development of a Plagiarism Corpus in Thai for Plagiarism Detection","authors":"Santipong Thaiprayoon, P. Palingoon, Kanokorn Trakultaweekoon","doi":"10.1109/KSE.2019.8919436","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919436","url":null,"abstract":"One of the main problems of creating a plagiarism corpus in Thai is that it is quite a difficult task to acquire the plagiarized documents with real cases due to the copyright issue. To solve the problem, we present a design and development of a Thai plagiarism corpus to evaluate and compare plagiarism detection algorithms for Thai. The corpus is developed by using the simulated plagiarism method based on Thai Wikipedia articles and web page articles. For this method, we provide a Thai plagiarism annotation tool and a Thai plagiarism guideline for assisting human annotators to plagiarize text passages. Our corpus contains simulated cases of plagiarized documents based on four classes of Thai plagiarism and linguistic mechanisms including copy-based change, lexicon-based change, structure- based change, and semantic-based change. We show that the suspicious documents in the corpus are manually created by using different obfuscation strategies, which make the suspicious documents more realistic and challenging. We then believe that the corpus developed in this paper will be a valuable contribution in the development, comparison, and evaluation of plagiarism detection algorithms. Moreover, our corpus is free and publicly available for research purposes.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115845427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network 基于有向多边数据流图表示和卷积神经网络的恶意软件检测
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919284
N. V. Hung, P. N. Dung, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi
{"title":"Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network","authors":"N. V. Hung, P. N. Dung, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi","doi":"10.1109/KSE.2019.8919284","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919284","url":null,"abstract":"In recent years, malware has grown constantly in both quantity and complexity. Traditional malware detection methods such as string search, hash code comparison, etc. have to face the challenging appearance of more and more new malware variations. One of the most promising approaches to tackling them is to use machine learning techniques to automatically analyze and detect unknown malicious softwares. In this paper, we introduce a novel method of using dynamic behavior data to represent malicious code in the form of multi-edge directed quantitative data flow graphs and a deep learning technique to detect malicious code. Our experimental result shows that the proposed method archived a higher detection rate than other machine learning methods, and a higher unknown malware detection rate, compared with commercial antivirus software.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115515756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On The Capacitated Scheduling Problem with Conflict Jobs 具有冲突作业的有能力调度问题
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919323
Minh Hoàng Hà, Duy Manh Vu, Y. Zinder, T. Nguyen
{"title":"On The Capacitated Scheduling Problem with Conflict Jobs","authors":"Minh Hoàng Hà, Duy Manh Vu, Y. Zinder, T. Nguyen","doi":"10.1109/KSE.2019.8919323","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919323","url":null,"abstract":"The paper is concerned with scheduling jobs on parallel identical machines under the restrictions imposed by a conflict graph. The nodes of this conflict graph represent jobs and each edge indicates that the jobs associated with the nodes, incident to this edge, can not be processed concurrently. The jobs have a common due date and each job has the associated weight. The goal is to maximise the total weight of jobs which completion times do not exceed the due date. The considered scheduling model was motivated by the problem arising in the telecommunication industry. The paper identifies polynomially solvable and NP-hard particular cases and presents two mixed integer linear programming formulations together with their comparison by means of computational experiments.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114284145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human Gait Patterns Classification based on MEMS Data using Unsupervised and Supervised Learning Algorithms 基于MEMS数据的无监督和有监督学习算法的人体步态模式分类
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919264
My-Nhi Nguyen, J. Zao, T. Nguyen
{"title":"Human Gait Patterns Classification based on MEMS Data using Unsupervised and Supervised Learning Algorithms","authors":"My-Nhi Nguyen, J. Zao, T. Nguyen","doi":"10.1109/KSE.2019.8919264","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919264","url":null,"abstract":"With the proliferation of smartphones and wearable devices having Micro-Electro-Mechanical Systems (MEMS) sensors built in, data samples of linear acceleration and angular velocity can be collected almost anytime anywhere. These motion data can be used to identify various types of human motions and to detect the anomaly of individuals movements. This work presents attempts to use the unsupervised Affinity Propagation (AP) clustering algorithm and the supervised Support Vector Machine (SVM) classification algorithm to identify four types of human gait motions: walking, jogging, climbing upstairs and downstairs. Features of three-dimensional linear acceleration that can enable the algorithms to identify these motion types correctly were selected by analyzing the variation of the feature values among different motion types. Efficacy of Affinity Propagation (AP), Linear and Non-linear Support Vector Machine (SVM) algorithms were also studied by comparing their ratios of correct, false positive, false negative and F1 score classification. This preliminary study demonstrated Linear SVM achieved the best performance, followed by Affinity Propagation. Quite surprisingly, Non-linear SVM appeared to be inferior to the other two algorithms.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Metagenome-based Disease Prediction by Unsupervised Binning Approaches 基于宏基因组的无监督分类方法增强疾病预测
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919295
T. Nguyen, Jean-Daniel Zucker
{"title":"Enhancing Metagenome-based Disease Prediction by Unsupervised Binning Approaches","authors":"T. Nguyen, Jean-Daniel Zucker","doi":"10.1109/KSE.2019.8919295","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919295","url":null,"abstract":"Metagenomic data from human microbiome is a novel data source to improve diagnosis and prognosis for human diseases. Nevertheless, since the number of considered features is much higher than the number of samples, we meet numerous challenges to perform a prediction task based on individual bacteria data. In addition, we face difficulties related to the very high complexity of different diseases. Deep Learning (DL) has been obtaining great success on major metagenomics problems related to Operational Taxonomic Unit (OTU)- clustering, and gene prediction, comparative metagenomics, assignment and binning of taxonomic. In this study, we introduce one-dimensional (1D) representations based on the unsupervised binning approaches and scaling algorithms to enhance the prediction performance for metagenome-based diseases using artificial neural networks. The proposed method is evaluated on seven microbial datasets related to six different diseases including Liver Cirrhosis, Colorectal Cancer, Inflammatory Bowel Disease (IBD), Type 2 Diabetes, Obesity and HIV with 2 types of data consisting of species abundance and read counts at the genus level. As shown from the results, the proposed method can improve the performance of Metagenome-based Disease Prediction.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116446484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Health Monitoring based on Wireless Sensor Networks: A Comprehensive Framework 基于无线传感器网络的健康监测:一个综合框架
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919390
Kiran Shrestha, A. Alsadoon, P. Prasad, Angelika Maag, Pham Duong Thu Hang, A. Elchouemi
{"title":"Health Monitoring based on Wireless Sensor Networks: A Comprehensive Framework","authors":"Kiran Shrestha, A. Alsadoon, P. Prasad, Angelika Maag, Pham Duong Thu Hang, A. Elchouemi","doi":"10.1109/KSE.2019.8919390","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919390","url":null,"abstract":"Sensor-based wireless technology is today often used as a relatively non-invasive method for the early diagnosis of diseases. Monitoring systems differ greatly and not all meet high standards in terms of efficiency, accuracy, reliability and longterm usefulness. This is often caused by sensor quality, issues concerning power consumption and connectivity. This research aims to establish a framework for sensor-based health monitoring systems as a basis for a dialogue on systems usefulness. We introduce ‘Data, Wireless communication allocator and Monitoring techniques’ (DWM) as vital elements of such framework. We further identify sub-components of each of the elements and justify their inclusion. Evaluation and validation confirm the value of the framework. This paper further provides a detailed analysis of sensors for gathering vital health data such as heart beat rate (HR), blood pressure (BP), body temperature and others. The resulting data are transmitted via Bluetooth, ZigBee, WIFI and other wireless technologies. Access to this information is through displays in remote healthcare facilities by authorized medical personnel, to be used to design treatment. We evaluate the DWM framework based on reliability, and ease of use and make comparisons with current state of the start systems. This research makes a major contribution towards standardization of sensor-based monitoring systems.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134505369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behaviour-aware Malware Classification: Dynamic Feature Selection 行为感知恶意软件分类:动态特征选择
2019 11th International Conference on Knowledge and Systems Engineering (KSE) Pub Date : 2019-10-01 DOI: 10.1109/KSE.2019.8919491
Vu Dinh Phai, Nathan Shone, Phan Huy Dung, Qi Shi, N. V. Hung, Nguyen Ngoc Tran
{"title":"Behaviour-aware Malware Classification: Dynamic Feature Selection","authors":"Vu Dinh Phai, Nathan Shone, Phan Huy Dung, Qi Shi, N. V. Hung, Nguyen Ngoc Tran","doi":"10.1109/KSE.2019.8919491","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919491","url":null,"abstract":"Despite the continued advancements in security research, malware persists as being a major threat in this digital age. Malware detection is a primary defence strategy for most networks but the identification of malware strains is becoming increasingly difficult. Reliable identification is based upon characteristic features being detectable within an object. However, the limitations and expense of current malware feature extraction methods is significantly hindering this process. In this paper, we present a new method for identifying malware based on behavioural feature extraction. Our proposed method has been evaluated using seven classification methods whilst analysing 2,068 malware samples from eight different families. The results achieved thus far have demonstrated promising improvements over existing approaches.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131968679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信