{"title":"Intelligent tutoring chatbot for solving mathematical problems in High-school","authors":"H. Nguyen, Vuong T. Pham, Dung A. Tran, T. T. Le","doi":"10.1109/KSE.2019.8919396","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919396","url":null,"abstract":"Nowadays, information technology is applied for teaching and learning in high-school. It is an essential trend for the modern education, especially building intelligent systems to support the learning of mathematics. In the math subjects of Vietnamese high-school, problems about surveying properties of a function are popular in high-school exams. There are some current tools can solve them automatically. However, they only can display the graph of a function; they cannot solve problems about determining the value of a parameter to satisfy some conditions about this function’s properties. In this paper, we will present a method to design an intelligent chatbot for solving problems in this knowledge domain. It plays as an instructor to give some tips and tutor the learner how to solve problems automatically. This program can communicate with the learner through the question-answering process by chatbot. This tutoring of our system simulates the tutoring method of the teacher to the students in practice.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"50 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132174110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach of Rhetorical Status Recognition for Judgments in Court Documents using Deep Learning Models","authors":"Vu D. Tran, M. Nguyen, Kiyoaki Shirai, K. Satoh","doi":"10.1109/KSE.2019.8919370","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919370","url":null,"abstract":"In a court document, the rhetorical status of a sentence conveys the intention of the sentence, whether is is a claim or contains supporting evidences, thus, is beneficial to court document processing systems, for example, court document retrieval systems. Besides, rhetorical structure analysis has high-impact applications in natural language processing, for instances, text summarization, sentiment analysis, question answering. The output structures of the analysis contain high-level relationship between clauses and so provides valuable information. Despite of a wide range of applications and the necessity for automatic court document processing, automatic rhetorical structure analysis has not been well noticed in the legal domain. We propose to use deep learning models for tackling the task of recognizing the rhetorical status of each sentence in a court document. Deep learning has been shown effective towards natural language processing tasks including discourse analysis. We have achieved promising results for the task, which suggests the applicability of artificial neural module embedding rhetorical information for other tasks, for example, summarization and information retrieval.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alpha-DBL: A Reasonable High Secure Double-Block-Length Hash Function","authors":"L. Dinh, Thai Tran Hong","doi":"10.1109/KSE.2019.8919354","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919354","url":null,"abstract":"We propose a new double-block-length compression function which is called Alpha-DBL. This scheme using two parallel secure single block length schemes based on a block cipher with 2n-bits key and n-bits block size to compress a 3n-bits string to a 2n-bits one. We show that Alpha-DBL scheme attains nearly optimal collision security and preimage security bounds (up to 2n and 22n queries for finding a collision and a preimage, respectively). More precisely, for n=128 no adversary making less than 2n−1.27= 2126.73 queries can find a collision with probability greater than 1/2. With our knowledge, this collision security bound is better than other of such a compression function. In addition, we give a preimage security analysis of Alpha-DBL that show security bound of 22n−5 = 2251 queries for n=128. Using this scheme in the iterated hash function construction can preserve the collision resistance security and the preimage resistance security.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128712465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Santipong Thaiprayoon, P. Palingoon, Kanokorn Trakultaweekoon
{"title":"Design and Development of a Plagiarism Corpus in Thai for Plagiarism Detection","authors":"Santipong Thaiprayoon, P. Palingoon, Kanokorn Trakultaweekoon","doi":"10.1109/KSE.2019.8919436","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919436","url":null,"abstract":"One of the main problems of creating a plagiarism corpus in Thai is that it is quite a difficult task to acquire the plagiarized documents with real cases due to the copyright issue. To solve the problem, we present a design and development of a Thai plagiarism corpus to evaluate and compare plagiarism detection algorithms for Thai. The corpus is developed by using the simulated plagiarism method based on Thai Wikipedia articles and web page articles. For this method, we provide a Thai plagiarism annotation tool and a Thai plagiarism guideline for assisting human annotators to plagiarize text passages. Our corpus contains simulated cases of plagiarized documents based on four classes of Thai plagiarism and linguistic mechanisms including copy-based change, lexicon-based change, structure- based change, and semantic-based change. We show that the suspicious documents in the corpus are manually created by using different obfuscation strategies, which make the suspicious documents more realistic and challenging. We then believe that the corpus developed in this paper will be a valuable contribution in the development, comparison, and evaluation of plagiarism detection algorithms. Moreover, our corpus is free and publicly available for research purposes.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115845427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. V. Hung, P. N. Dung, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi
{"title":"Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network","authors":"N. V. Hung, P. N. Dung, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi","doi":"10.1109/KSE.2019.8919284","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919284","url":null,"abstract":"In recent years, malware has grown constantly in both quantity and complexity. Traditional malware detection methods such as string search, hash code comparison, etc. have to face the challenging appearance of more and more new malware variations. One of the most promising approaches to tackling them is to use machine learning techniques to automatically analyze and detect unknown malicious softwares. In this paper, we introduce a novel method of using dynamic behavior data to represent malicious code in the form of multi-edge directed quantitative data flow graphs and a deep learning technique to detect malicious code. Our experimental result shows that the proposed method archived a higher detection rate than other machine learning methods, and a higher unknown malware detection rate, compared with commercial antivirus software.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115515756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On The Capacitated Scheduling Problem with Conflict Jobs","authors":"Minh Hoàng Hà, Duy Manh Vu, Y. Zinder, T. Nguyen","doi":"10.1109/KSE.2019.8919323","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919323","url":null,"abstract":"The paper is concerned with scheduling jobs on parallel identical machines under the restrictions imposed by a conflict graph. The nodes of this conflict graph represent jobs and each edge indicates that the jobs associated with the nodes, incident to this edge, can not be processed concurrently. The jobs have a common due date and each job has the associated weight. The goal is to maximise the total weight of jobs which completion times do not exceed the due date. The considered scheduling model was motivated by the problem arising in the telecommunication industry. The paper identifies polynomially solvable and NP-hard particular cases and presents two mixed integer linear programming formulations together with their comparison by means of computational experiments.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114284145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Gait Patterns Classification based on MEMS Data using Unsupervised and Supervised Learning Algorithms","authors":"My-Nhi Nguyen, J. Zao, T. Nguyen","doi":"10.1109/KSE.2019.8919264","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919264","url":null,"abstract":"With the proliferation of smartphones and wearable devices having Micro-Electro-Mechanical Systems (MEMS) sensors built in, data samples of linear acceleration and angular velocity can be collected almost anytime anywhere. These motion data can be used to identify various types of human motions and to detect the anomaly of individuals movements. This work presents attempts to use the unsupervised Affinity Propagation (AP) clustering algorithm and the supervised Support Vector Machine (SVM) classification algorithm to identify four types of human gait motions: walking, jogging, climbing upstairs and downstairs. Features of three-dimensional linear acceleration that can enable the algorithms to identify these motion types correctly were selected by analyzing the variation of the feature values among different motion types. Efficacy of Affinity Propagation (AP), Linear and Non-linear Support Vector Machine (SVM) algorithms were also studied by comparing their ratios of correct, false positive, false negative and F1 score classification. This preliminary study demonstrated Linear SVM achieved the best performance, followed by Affinity Propagation. Quite surprisingly, Non-linear SVM appeared to be inferior to the other two algorithms.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Metagenome-based Disease Prediction by Unsupervised Binning Approaches","authors":"T. Nguyen, Jean-Daniel Zucker","doi":"10.1109/KSE.2019.8919295","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919295","url":null,"abstract":"Metagenomic data from human microbiome is a novel data source to improve diagnosis and prognosis for human diseases. Nevertheless, since the number of considered features is much higher than the number of samples, we meet numerous challenges to perform a prediction task based on individual bacteria data. In addition, we face difficulties related to the very high complexity of different diseases. Deep Learning (DL) has been obtaining great success on major metagenomics problems related to Operational Taxonomic Unit (OTU)- clustering, and gene prediction, comparative metagenomics, assignment and binning of taxonomic. In this study, we introduce one-dimensional (1D) representations based on the unsupervised binning approaches and scaling algorithms to enhance the prediction performance for metagenome-based diseases using artificial neural networks. The proposed method is evaluated on seven microbial datasets related to six different diseases including Liver Cirrhosis, Colorectal Cancer, Inflammatory Bowel Disease (IBD), Type 2 Diabetes, Obesity and HIV with 2 types of data consisting of species abundance and read counts at the genus level. As shown from the results, the proposed method can improve the performance of Metagenome-based Disease Prediction.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116446484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kiran Shrestha, A. Alsadoon, P. Prasad, Angelika Maag, Pham Duong Thu Hang, A. Elchouemi
{"title":"Health Monitoring based on Wireless Sensor Networks: A Comprehensive Framework","authors":"Kiran Shrestha, A. Alsadoon, P. Prasad, Angelika Maag, Pham Duong Thu Hang, A. Elchouemi","doi":"10.1109/KSE.2019.8919390","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919390","url":null,"abstract":"Sensor-based wireless technology is today often used as a relatively non-invasive method for the early diagnosis of diseases. Monitoring systems differ greatly and not all meet high standards in terms of efficiency, accuracy, reliability and longterm usefulness. This is often caused by sensor quality, issues concerning power consumption and connectivity. This research aims to establish a framework for sensor-based health monitoring systems as a basis for a dialogue on systems usefulness. We introduce ‘Data, Wireless communication allocator and Monitoring techniques’ (DWM) as vital elements of such framework. We further identify sub-components of each of the elements and justify their inclusion. Evaluation and validation confirm the value of the framework. This paper further provides a detailed analysis of sensors for gathering vital health data such as heart beat rate (HR), blood pressure (BP), body temperature and others. The resulting data are transmitted via Bluetooth, ZigBee, WIFI and other wireless technologies. Access to this information is through displays in remote healthcare facilities by authorized medical personnel, to be used to design treatment. We evaluate the DWM framework based on reliability, and ease of use and make comparisons with current state of the start systems. This research makes a major contribution towards standardization of sensor-based monitoring systems.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134505369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vu Dinh Phai, Nathan Shone, Phan Huy Dung, Qi Shi, N. V. Hung, Nguyen Ngoc Tran
{"title":"Behaviour-aware Malware Classification: Dynamic Feature Selection","authors":"Vu Dinh Phai, Nathan Shone, Phan Huy Dung, Qi Shi, N. V. Hung, Nguyen Ngoc Tran","doi":"10.1109/KSE.2019.8919491","DOIUrl":"https://doi.org/10.1109/KSE.2019.8919491","url":null,"abstract":"Despite the continued advancements in security research, malware persists as being a major threat in this digital age. Malware detection is a primary defence strategy for most networks but the identification of malware strains is becoming increasingly difficult. Reliable identification is based upon characteristic features being detectable within an object. However, the limitations and expense of current malware feature extraction methods is significantly hindering this process. In this paper, we present a new method for identifying malware based on behavioural feature extraction. Our proposed method has been evaluated using seven classification methods whilst analysing 2,068 malware samples from eight different families. The results achieved thus far have demonstrated promising improvements over existing approaches.","PeriodicalId":439841,"journal":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131968679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}