首页 > 最新文献

Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

英文 中文
Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network Classifier 基于卷积神经网络分类器的冷却风扇组合故障振动分析
A. Dekhane, Adel Djellal, Fouaz Boutebbakh, R. Lakel
In this paper, an application of Convolutional Neural Network (CNN) to detect a predefined fault in vibration signal without any feature extraction. The vibration signal, after being normalized, is converted into a 2-D data called vibration image, and these images are passed in the CNN as input to detect whether there is a fault or not. Experiments are carried out with bearing data from the cooling Fan of a cement oven in CILAS-Biskra. Tests are done using different image sizes, and different training/testing data sets.
本文在不进行特征提取的情况下,应用卷积神经网络(CNN)检测振动信号中的预定义故障。振动信号经过归一化处理后,转换为二维数据,称为振动图像,这些图像作为输入传递到CNN中,用于检测是否存在故障。利用CILAS-Biskra水泥炉冷却风扇的轴承数据进行了实验。测试使用不同的图像大小和不同的训练/测试数据集。
{"title":"Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network Classifier","authors":"A. Dekhane, Adel Djellal, Fouaz Boutebbakh, R. Lakel","doi":"10.1145/3386723.3387898","DOIUrl":"https://doi.org/10.1145/3386723.3387898","url":null,"abstract":"In this paper, an application of Convolutional Neural Network (CNN) to detect a predefined fault in vibration signal without any feature extraction. The vibration signal, after being normalized, is converted into a 2-D data called vibration image, and these images are passed in the CNN as input to detect whether there is a fault or not. Experiments are carried out with bearing data from the cooling Fan of a cement oven in CILAS-Biskra. Tests are done using different image sizes, and different training/testing data sets.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Collaborative Consumption Motives: A Review 协同消费动机:综述
N. Ruslan, A. Mohamed, Norjansalika Janom
With the rise of information and communication technology (ICT), the traditional way of sharing has now been enhanced with the existence of collaborative consumption (CC). CC is described as a peer-to-peer activity in giving, sharing, or lending (as access over ownership) through a community-based online platform facilitated by technology. To further develop the growth of this new concept, it is necessary to understand the motives that contribute to the use of CC. Thus, the purpose of this study is to understand the motives that influence the usage of CC. In achieving this, a thorough analysis of 50 articles to identify the motives from three actors namely (1) the customer, (2) the peer service provider and (3) the peer platform provider was extracted. The six motives found were pertaining to environmental, economic, hedonic, social, utilitarian, and technology factors. From the analysis of the review, the motives were ranked based on the number of frequencies and mapped on a proposed triadic relationship of CC. The study concludes with the opportunity of a business model in this area, and further research on the deterrents of using CC is also suggested.
随着信息通信技术(ICT)的兴起,传统的共享方式随着协作消费(CC)的存在而得到加强。CC被描述为通过技术促进的基于社区的在线平台,在给予、分享或借贷(作为访问而不是所有权)方面的点对点活动。为了进一步发展这一新概念的增长,有必要了解有助于使用CC的动机。因此,本研究的目的是了解影响CC使用的动机。为了实现这一目标,对50篇文章进行了全面分析,以确定三个参与者的动机,即(1)客户,(2)对等服务提供商和(3)对等平台提供商。这六种动机分别与环境、经济、享乐、社会、功利和技术因素有关。从回顾的分析来看,动机根据频率的数量进行排名,并映射到提出的CC的三元关系上。研究总结了这一领域的商业模式的机会,并建议进一步研究使用CC的阻碍因素。
{"title":"Collaborative Consumption Motives: A Review","authors":"N. Ruslan, A. Mohamed, Norjansalika Janom","doi":"10.1145/3386723.3387852","DOIUrl":"https://doi.org/10.1145/3386723.3387852","url":null,"abstract":"With the rise of information and communication technology (ICT), the traditional way of sharing has now been enhanced with the existence of collaborative consumption (CC). CC is described as a peer-to-peer activity in giving, sharing, or lending (as access over ownership) through a community-based online platform facilitated by technology. To further develop the growth of this new concept, it is necessary to understand the motives that contribute to the use of CC. Thus, the purpose of this study is to understand the motives that influence the usage of CC. In achieving this, a thorough analysis of 50 articles to identify the motives from three actors namely (1) the customer, (2) the peer service provider and (3) the peer platform provider was extracted. The six motives found were pertaining to environmental, economic, hedonic, social, utilitarian, and technology factors. From the analysis of the review, the motives were ranked based on the number of frequencies and mapped on a proposed triadic relationship of CC. The study concludes with the opportunity of a business model in this area, and further research on the deterrents of using CC is also suggested.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"639 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced Duplicate Count Strategy: Towards New Algorithms to Improve Duplicate Detection 增强重复计数策略:改进重复检测的新算法
Y. Aassem, I. Hafidi, N. Aboutabit
Duplicate detection is the process of detecting multiple representations of same real world's entities. Nowadays, data is known to be heterogeneous, and the larger it becomes, the pairwise comparisons number grows highly as well which makes the task more complex. In recent years, many approaches have been developed and attempted to reduce the number of record pair's comparisons in the process while maintaining high matching quality. There are two well-known algorithms, which are the Sorted Neighborhood Method (SNM) and the Blocking algorithms. Being inspired by both algorithms, we propose an Enhanced Duplicate Count Strategy which is a new hybrid approach that creates iterative blocks using windows with dynamic size. It is based on comparing next element with last duplicate found in the current window. Consequently, comparisons are saved, and similarity distance is minimized, which can lead to higher matching quality.
重复检测是对现实世界中相同实体的多个表示进行检测的过程。如今,数据是异构的,数据越大,两两比较的数量也会增加,这使得任务更加复杂。近年来,人们开发了许多方法,试图在保持高匹配质量的同时减少过程中记录对的比较次数。有两种著名的算法,即排序邻域法(SNM)和块算法。受这两种算法的启发,我们提出了一种增强重复计数策略,这是一种新的混合方法,使用动态大小的窗口创建迭代块。它基于将下一个元素与当前窗口中发现的最后一个重复元素进行比较。因此,可以节省比较,最小化相似距离,从而提高匹配质量。
{"title":"Enhanced Duplicate Count Strategy: Towards New Algorithms to Improve Duplicate Detection","authors":"Y. Aassem, I. Hafidi, N. Aboutabit","doi":"10.1145/3386723.3387877","DOIUrl":"https://doi.org/10.1145/3386723.3387877","url":null,"abstract":"Duplicate detection is the process of detecting multiple representations of same real world's entities. Nowadays, data is known to be heterogeneous, and the larger it becomes, the pairwise comparisons number grows highly as well which makes the task more complex. In recent years, many approaches have been developed and attempted to reduce the number of record pair's comparisons in the process while maintaining high matching quality. There are two well-known algorithms, which are the Sorted Neighborhood Method (SNM) and the Blocking algorithms. Being inspired by both algorithms, we propose an Enhanced Duplicate Count Strategy which is a new hybrid approach that creates iterative blocks using windows with dynamic size. It is based on comparing next element with last duplicate found in the current window. Consequently, comparisons are saved, and similarity distance is minimized, which can lead to higher matching quality.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey of Intrusion Detection Algorithm in VANET VANET入侵检测算法综述
Boughanja Manale, T. Mazri
Wireless communication technologies have known a huge evolution and they have greatly affected our daily lives. This enhancement has not only influenced the development of mobile communication, but also the development of vehicular communication. VANET is one of the new technologies that mark the development of transport. This new development faces enormous challenges, particularly in terms of network security. In order to solve this problem, some research has been carried out, particularly in terms of detection. In our paper, we will describe the architecture of VANET, and then present the different security problems that the technology faces. Finally, we will study different intrusion detection algorithms to improve the security of VANET networks.
无线通信技术已经有了巨大的发展,它们极大地影响了我们的日常生活。这种增强不仅影响了移动通信的发展,也影响了车载通信的发展。VANET是标志着交通发展的新技术之一。这一新的发展面临着巨大的挑战,特别是在网络安全方面。为了解决这个问题,已经进行了一些研究,特别是在检测方面。在本文中,我们将描述VANET的体系结构,然后介绍该技术面临的不同安全问题。最后,我们将研究不同的入侵检测算法,以提高VANET网络的安全性。
{"title":"A Survey of Intrusion Detection Algorithm in VANET","authors":"Boughanja Manale, T. Mazri","doi":"10.1145/3386723.3387830","DOIUrl":"https://doi.org/10.1145/3386723.3387830","url":null,"abstract":"Wireless communication technologies have known a huge evolution and they have greatly affected our daily lives. This enhancement has not only influenced the development of mobile communication, but also the development of vehicular communication. VANET is one of the new technologies that mark the development of transport. This new development faces enormous challenges, particularly in terms of network security. In order to solve this problem, some research has been carried out, particularly in terms of detection. In our paper, we will describe the architecture of VANET, and then present the different security problems that the technology faces. Finally, we will study different intrusion detection algorithms to improve the security of VANET networks.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verification of Integrity in Vehicle Architectures 车辆架构完整性验证
Christine Jakobs, Billy Naumann, Matthias Werner, Karsten Schmidt
The draft version of ISO 21434 demands, among others, the verification of the car architecture with respect to the enforcement of the security goals. We present a distinct definition of integrity as a system property as well as a formal modeling and analysis approach to verify integrity in a given architecture. Thereby, we discuss the idea of integrity levels as well as security measure levels as metrics to represent a functions worthiness of protection and the reduction of risk, respectively. We present how the beneficence of security measures may be ranked for gaining the global security measure levels. We assign those levels to the system parts and interpret integrity as a global information flow problem. Formal properties enforce the relation between the integrity levels of a function and the assigned security measure level as well as between the communication links and the receiver functions. The relation between communication functions and functions in the same unit of isolation are enforced to follow the policy of no command-up.
ISO 21434的草案版本要求,除其他外,在安全目标的实施方面对汽车架构进行验证。我们提出了完整性作为系统属性的明确定义,以及在给定体系结构中验证完整性的形式化建模和分析方法。因此,我们将讨论完整性级别和安全度量级别的概念,作为分别表示功能值得保护和降低风险的度量。我们提出了如何对安全措施的好处进行排名,以获得全球安全措施水平。我们将这些级别分配给系统部件,并将完整性解释为一个全局信息流问题。形式化属性强化了功能的完整性级别与指定的安全度量级别之间的关系,以及通信链接与接收函数之间的关系。通信功能和同一隔离单元中的功能之间的关系强制遵循不命令的策略。
{"title":"Verification of Integrity in Vehicle Architectures","authors":"Christine Jakobs, Billy Naumann, Matthias Werner, Karsten Schmidt","doi":"10.1145/3386723.3387883","DOIUrl":"https://doi.org/10.1145/3386723.3387883","url":null,"abstract":"The draft version of ISO 21434 demands, among others, the verification of the car architecture with respect to the enforcement of the security goals. We present a distinct definition of integrity as a system property as well as a formal modeling and analysis approach to verify integrity in a given architecture. Thereby, we discuss the idea of integrity levels as well as security measure levels as metrics to represent a functions worthiness of protection and the reduction of risk, respectively. We present how the beneficence of security measures may be ranked for gaining the global security measure levels. We assign those levels to the system parts and interpret integrity as a global information flow problem. Formal properties enforce the relation between the integrity levels of a function and the assigned security measure level as well as between the communication links and the receiver functions. The relation between communication functions and functions in the same unit of isolation are enforced to follow the policy of no command-up.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Internet of Things: Classification of attacks using CTM method 物联网:使用CTM方法对攻击进行分类
Meziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae
The Internet of Things (IoT) which is also known as Web 3.0, represents the interconnection between the internet and objects, places and physical environments. IoT has some challenges in security: in fact, the problem exceeds largely data theft. For example, stopping the operation of a factory or causing material or human damage to it, opening the doors of a house or a store to make thefts, remote control of flying vehicle, blocking road traffic of an entire city, etc. To process this problem, it seems necessary to start with an analysis of existing classifications of attacks, and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classification has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.
物联网(IoT)也被称为Web 3.0,代表了互联网与物体、地点和物理环境之间的互连。物联网在安全方面存在一些挑战:事实上,这个问题在很大程度上超过了数据盗窃。例如,停止工厂的运作或造成物质或人为损害,打开房屋或商店的门进行盗窃,远程控制飞行车辆,阻塞整个城市的道路交通等。要处理这个问题,似乎有必要从分析现有的攻击分类开始,并指出它们的优缺点。然后,为了提取可能与我们的研究相关的内容,研究每个分类法的标准将是明智的。实际上,现有的每一种分类都是为特定目的而制定的。因此,我们将消除最无用的标准,并提出其他标准;目标是对物联网中的攻击进行一般分类。为了实现这一目标,我们提出了一种新的基于分类树方法(CTM)的物联网攻击分类方法。简而言之,我们使用CTE(分类树编辑器)工具来生成和选择测试用例。
{"title":"Internet of Things: Classification of attacks using CTM method","authors":"Meziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae","doi":"10.1145/3386723.3387876","DOIUrl":"https://doi.org/10.1145/3386723.3387876","url":null,"abstract":"The Internet of Things (IoT) which is also known as Web 3.0, represents the interconnection between the internet and objects, places and physical environments. IoT has some challenges in security: in fact, the problem exceeds largely data theft. For example, stopping the operation of a factory or causing material or human damage to it, opening the doors of a house or a store to make thefts, remote control of flying vehicle, blocking road traffic of an entire city, etc. To process this problem, it seems necessary to start with an analysis of existing classifications of attacks, and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classification has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122573713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phones 5G手机小型化叶形天线的新设计
Asma Khabba, Sanaa Errahili, S. Ibnyaich, M. Hassani
In this letter a new design of miniaturized Leaf Shaped Antenna using slotted ground has been presented. The proposed leaf shaped antenna is designed on the RTRogers5880 substrate to operate at 28GHz for fifth generation. Ten elements of the single antenna are printed on the top edge of the substrate with overall dimensions are 60×100x0.8mm3 to form a linear phased array for 5G mobile phone. The 5G antenna is designed using CST software, the simulated results show good performances in terms of S-parameters, gain, efficiency and phased array property which make it suitable for 5G mobile phone applications.
本文介绍了一种采用开槽接地的小型化叶形天线的新设计。所提出的叶状天线设计在RTRogers5880基板上,工作频率为28GHz,适用于第五代。将单天线的10个元件印刷在基板的上边缘,整体尺寸为60×100x0.8mm3,形成用于5G手机的线性相控阵。利用CST软件设计了5G天线,仿真结果表明,该天线在s参数、增益、效率和相控阵性能等方面都具有良好的性能,适合5G手机应用。
{"title":"A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phones","authors":"Asma Khabba, Sanaa Errahili, S. Ibnyaich, M. Hassani","doi":"10.1145/3386723.3387878","DOIUrl":"https://doi.org/10.1145/3386723.3387878","url":null,"abstract":"In this letter a new design of miniaturized Leaf Shaped Antenna using slotted ground has been presented. The proposed leaf shaped antenna is designed on the RTRogers5880 substrate to operate at 28GHz for fifth generation. Ten elements of the single antenna are printed on the top edge of the substrate with overall dimensions are 60×100x0.8mm3 to form a linear phased array for 5G mobile phone. The 5G antenna is designed using CST software, the simulated results show good performances in terms of S-parameters, gain, efficiency and phased array property which make it suitable for 5G mobile phone applications.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128910811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Sketch Recognition-An Overview 人脸素描识别概述
Khalid Ounachad, M. Oualla, A. Souhar, A. Sadiq
Face Sketch recognition has been one of the most studied topics in Forensic literature. The automatic retrieval of suspect photos from the mug-shot police data-base can help them, quickly reduce and deduct potential suspects, but in most cases, the photographic image of a suspect is not available. The best substitute is often sketch based on the memory of an eyewitness or a victim. Generally, this process is slow and really not effective, it does not allow to find and arrest the right suspect. So, a stronger algorithm for even partial face sketch recognition can be useful. Although many methods have been proposed in this scenario, especially the techniques that are applied to face recognition system and ranked among the perfect and most effective. The main objective of this paper is to presents a review of recent and different researches on recognizing face sketches. We wrote this work to discover and analyze multiple researches on face sketch recognition. We wrote it to review the different classes of approaches, of datasets and evaluation protocols used, by analyzing their kernels and identifying their limitations.
人脸素描识别一直是法医学领域研究最多的课题之一。从犯罪嫌疑人数据库中自动检索犯罪嫌疑人照片可以帮助他们迅速减少和扣除潜在的犯罪嫌疑人,但在大多数情况下,犯罪嫌疑人的照片图像是不可用的。最好的替代方法往往是根据目击证人或受害者的记忆绘制草图。一般来说,这个过程是缓慢的,而且真的没有效果,它不允许找到和逮捕正确的嫌疑人。因此,一种更强的算法甚至可以用于部分人脸素描识别。尽管针对这一场景已经提出了许多方法,特别是应用于人脸识别系统的技术,并且是最完善和最有效的。本文的主要目的是对近年来人脸草图识别的不同研究进行综述。我们写这项工作是为了发现和分析在人脸素描识别方面的多项研究。我们写这篇文章是为了通过分析它们的内核和识别它们的局限性,来回顾不同类型的方法,使用的数据集和评估协议。
{"title":"Face Sketch Recognition-An Overview","authors":"Khalid Ounachad, M. Oualla, A. Souhar, A. Sadiq","doi":"10.1145/3386723.3387857","DOIUrl":"https://doi.org/10.1145/3386723.3387857","url":null,"abstract":"Face Sketch recognition has been one of the most studied topics in Forensic literature. The automatic retrieval of suspect photos from the mug-shot police data-base can help them, quickly reduce and deduct potential suspects, but in most cases, the photographic image of a suspect is not available. The best substitute is often sketch based on the memory of an eyewitness or a victim. Generally, this process is slow and really not effective, it does not allow to find and arrest the right suspect. So, a stronger algorithm for even partial face sketch recognition can be useful. Although many methods have been proposed in this scenario, especially the techniques that are applied to face recognition system and ranked among the perfect and most effective. The main objective of this paper is to presents a review of recent and different researches on recognizing face sketches. We wrote this work to discover and analyze multiple researches on face sketch recognition. We wrote it to review the different classes of approaches, of datasets and evaluation protocols used, by analyzing their kernels and identifying their limitations.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Question answering System with a sequence to sequence grammatical correction 具有顺序到顺序语法纠正的问答系统
Bghiel Afrae, M. Ahmed, A. Boudhir
Dialogue or conversational systems including chatbots, and personal assistants are becoming ubiquitous in modern society. Here we present a question answering system that's help a customer to search a product in an ecommerce website and inquiring about it. This article describes a question answering bot, which is based on deep learning. We develop a set of deep learning models for natural language retrieval and generation --- including recurrent neural networks, sequence-to-sequence models and attention mechanism --- and evaluate them in the context of natural language processing. Thus; we have used those technologies in a grammatical correction system, and a question answering system by passing the first model result as input to the second one, in order to improve result.
包括聊天机器人和个人助理在内的对话或会话系统在现代社会变得无处不在。在这里,我们提出了一个问答系统,它可以帮助客户在电子商务网站上搜索产品并查询它。本文描述了一个基于深度学习的问答机器人。我们开发了一套用于自然语言检索和生成的深度学习模型——包括循环神经网络、序列到序列模型和注意机制——并在自然语言处理的背景下对它们进行评估。因此;我们在语法纠错系统和问答系统中使用了这些技术,通过将第一个模型结果作为输入传递给第二个模型结果,以提高结果。
{"title":"A Question answering System with a sequence to sequence grammatical correction","authors":"Bghiel Afrae, M. Ahmed, A. Boudhir","doi":"10.1145/3386723.3387894","DOIUrl":"https://doi.org/10.1145/3386723.3387894","url":null,"abstract":"Dialogue or conversational systems including chatbots, and personal assistants are becoming ubiquitous in modern society. Here we present a question answering system that's help a customer to search a product in an ecommerce website and inquiring about it. This article describes a question answering bot, which is based on deep learning. We develop a set of deep learning models for natural language retrieval and generation --- including recurrent neural networks, sequence-to-sequence models and attention mechanism --- and evaluate them in the context of natural language processing. Thus; we have used those technologies in a grammatical correction system, and a question answering system by passing the first model result as input to the second one, in order to improve result.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131927258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning Algorithms and Their Applications in the Perception Problem 深度学习算法及其在感知问题中的应用
Redouane Lhiadi
The objective of this paper is to summarize a comparative account of unsupervised and supervised deep learning models and their applications. The design of a model system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples and performance evaluation. Classification plays a vital role in deep learning algorithms and we found that, though the error backpropagation learning algorithm as provided by supervised learning model, is very efficient for a number of non-linear real-time problems, KSOM of unsupervised learning model, offers efficient solution and classification in the perception problem.
本文的目的是总结无监督和有监督深度学习模型及其应用的比较。模型系统的设计需要仔细考虑以下问题:模式类的定义、感知环境、模式表示、特征提取和选择、聚类分析、分类器的设计和学习、训练和测试样本的选择以及性能评估。分类在深度学习算法中起着至关重要的作用,我们发现,虽然有监督学习模型提供的误差反向传播学习算法对于许多非线性实时问题是非常有效的,但无监督学习模型的KSOM在感知问题中提供了有效的求解和分类。
{"title":"Deep Learning Algorithms and Their Applications in the Perception Problem","authors":"Redouane Lhiadi","doi":"10.1145/3386723.3387866","DOIUrl":"https://doi.org/10.1145/3386723.3387866","url":null,"abstract":"The objective of this paper is to summarize a comparative account of unsupervised and supervised deep learning models and their applications. The design of a model system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples and performance evaluation. Classification plays a vital role in deep learning algorithms and we found that, though the error backpropagation learning algorithm as provided by supervised learning model, is very efficient for a number of non-linear real-time problems, KSOM of unsupervised learning model, offers efficient solution and classification in the perception problem.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"132 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132801204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 3rd International Conference on Networking, Information Systems & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1