Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623727
Dionisios N. Sotiropoulos, Chris D. Kounavis, G. Giaglis
This paper addresses the problem of semantically meaningful group detection within a sub-community of twitter micro-bloggers by utilizing a topic modeling, multi-objective clustering approach. The proposed group detection method is anchored on the Latent Dirichlet Allocation (LDA) topic modeling technique, aiming at identifying clusters of twitter users that are optimal in terms of both spatial and topical compactness. Specifically, the group detection problem is formulated as a multi-objective optimization problem taking into consideration two complementary cluster formation directives. The first objective, related to spatial compactness, is achieved by minimizing the overall deviation from the corresponding cluster centers. The second, related to topical compactness, is achieved by minimizing the portion of probability mass assigned to low probability topics for the corresponding cluster centroids. In our approach, optimization is performed by employing a multi-objective genetic algorithm, which results in a variety of cluster structures that are significantly more interpretable than cluster assignments obtained with traditional single-objective clustering algorithms.
{"title":"Identifying semantically meaningful sub-communities within Twitter blogosphere","authors":"Dionisios N. Sotiropoulos, Chris D. Kounavis, G. Giaglis","doi":"10.1109/IISA.2013.6623727","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623727","url":null,"abstract":"This paper addresses the problem of semantically meaningful group detection within a sub-community of twitter micro-bloggers by utilizing a topic modeling, multi-objective clustering approach. The proposed group detection method is anchored on the Latent Dirichlet Allocation (LDA) topic modeling technique, aiming at identifying clusters of twitter users that are optimal in terms of both spatial and topical compactness. Specifically, the group detection problem is formulated as a multi-objective optimization problem taking into consideration two complementary cluster formation directives. The first objective, related to spatial compactness, is achieved by minimizing the overall deviation from the corresponding cluster centers. The second, related to topical compactness, is achieved by minimizing the portion of probability mass assigned to low probability topics for the corresponding cluster centroids. In our approach, optimization is performed by employing a multi-objective genetic algorithm, which results in a variety of cluster structures that are significantly more interpretable than cluster assignments obtained with traditional single-objective clustering algorithms.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623732
M. Alamaniotis, L. Tsoukalas
The advent of data networks and the plethora of internet-based computing and control approaches have stimulated research on novel technologies for the intelligent management of electric power transmission and distribution networks (the “grid”). Such couplings of the conventional power infrastructure with information technologies is known under the term smart power grid. The Consortium of Intelligent Management of the Grid (CIMEG) has proposed a further evolution of a smart power grid to what is called an Energy Internet, which couples the basic principles and protocols of data networks with power flow. One of the key principles of the Energy Internet is the use of virtual buffers as large scale energy storage mechanisms. In this paper the idea of virtual buffer is extended into a multi-layer architecture and its main operational principles are introduced. Energy layers are controlled by intelligent agents, which bring power utilization to a higher level than that of a single user. Furthermore, they leverage the idea of virtual buffers and provide more stability in the power flow. The operability of layered based virtual storage in energy distribution and for grid stability is demonstrated through an illustrative example, where advantages and disadvantages in building future smart power systems are examined.
{"title":"Layered-based approach to virtual storage for smart power systems","authors":"M. Alamaniotis, L. Tsoukalas","doi":"10.1109/IISA.2013.6623732","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623732","url":null,"abstract":"The advent of data networks and the plethora of internet-based computing and control approaches have stimulated research on novel technologies for the intelligent management of electric power transmission and distribution networks (the “grid”). Such couplings of the conventional power infrastructure with information technologies is known under the term smart power grid. The Consortium of Intelligent Management of the Grid (CIMEG) has proposed a further evolution of a smart power grid to what is called an Energy Internet, which couples the basic principles and protocols of data networks with power flow. One of the key principles of the Energy Internet is the use of virtual buffers as large scale energy storage mechanisms. In this paper the idea of virtual buffer is extended into a multi-layer architecture and its main operational principles are introduced. Energy layers are controlled by intelligent agents, which bring power utilization to a higher level than that of a single user. Furthermore, they leverage the idea of virtual buffers and provide more stability in the power flow. The operability of layered based virtual storage in energy distribution and for grid stability is demonstrated through an illustrative example, where advantages and disadvantages in building future smart power systems are examined.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133444626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623690
K. Chrysafiadi, M. Virvou
In this paper a novel generic fuzzy adaptation tool (FAdapT) is presented. FAdapT uses fuzzy sets and a mechanism of rules over them in order to promote personalization in adaptive systems. It is applicable to systems, in which the user's changeable state and/or preferences are affected by the existing dependencies among the system's elements (like concepts, preferences, events, choices). FAdapT leads the system to make inferences about the changes of the user's state, preferences and/or choices and thus make useful adaptation decisions, offering dynamic adaptation to users' needs. To explain the operation of FAdapT, two case studies are described: an e-shop and an educational system.
{"title":"Fuzzy logic for dynamic adaptation: Represent and manage changeable user states","authors":"K. Chrysafiadi, M. Virvou","doi":"10.1109/IISA.2013.6623690","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623690","url":null,"abstract":"In this paper a novel generic fuzzy adaptation tool (FAdapT) is presented. FAdapT uses fuzzy sets and a mechanism of rules over them in order to promote personalization in adaptive systems. It is applicable to systems, in which the user's changeable state and/or preferences are affected by the existing dependencies among the system's elements (like concepts, preferences, events, choices). FAdapT leads the system to make inferences about the changes of the user's state, preferences and/or choices and thus make useful adaptation decisions, offering dynamic adaptation to users' needs. To explain the operation of FAdapT, two case studies are described: an e-shop and an educational system.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116285258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623685
A. Maronidis, C. Voutounos, A. Lanitis
An integrated tool that can be used for damage detection, shape restoration and texture restoration of faces appearing in Byzantine icons, is presented. The damage detection process involves the estimation of residuals obtained after the coding and reconstruction of face image regions using trained Principal Component Analysis (PCA) texture models. Shape restoration is accomplished using a model-based approach that employs a 3D shape model generated by taking into account a set of geometrical rules adopted by Byzantine style iconographers. Texture restoration is performed using a customized version of the recursive PCA technique. For this purpose dedicated PCA texture models representing different categories of faces appearing in icons, are used. All methods developed as part of the project are incorporated into a user-friendly application, which can be utilized by both amateurs and professionals. Indicative visual and quantitative results show the potential of the developed application.
{"title":"An integrated tool for virtual restoration of Byzantine icons","authors":"A. Maronidis, C. Voutounos, A. Lanitis","doi":"10.1109/IISA.2013.6623685","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623685","url":null,"abstract":"An integrated tool that can be used for damage detection, shape restoration and texture restoration of faces appearing in Byzantine icons, is presented. The damage detection process involves the estimation of residuals obtained after the coding and reconstruction of face image regions using trained Principal Component Analysis (PCA) texture models. Shape restoration is accomplished using a model-based approach that employs a 3D shape model generated by taking into account a set of geometrical rules adopted by Byzantine style iconographers. Texture restoration is performed using a customized version of the recursive PCA technique. For this purpose dedicated PCA texture models representing different categories of faces appearing in icons, are used. All methods developed as part of the project are incorporated into a user-friendly application, which can be utilized by both amateurs and professionals. Indicative visual and quantitative results show the potential of the developed application.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123075994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623711
S. Nikolopoulos, S. Papadopoulos, Y. Kompatsiaris
The widespread adoption of smartphones and other sensor-capable devices and the availability of infrastructure capable of storing and sharing sensor information have been the main enablers for the intriguing and ambitious concept of Reality Mining. Reality mining is concerned with the collection and analysis of sensed data pertaining to different aspects of human social behavior, allowing to observe the societal dynamics and predict what individuals will do next, model the behavior of large organizations, detect trends, spot emerging phenomena and events, mine public opinion, etc. The concept of reality mining is even more intriguing when applied in the context of urban space, since user-generated content can be analyzed to reveal the citizens' perspective on various aspects of the city reality. In this paper, after elaborating on the concept of reality mining in urban space, we present three cases where user-generated content is employed to discover the citizens' perspective about: a) the city attractions, b) the city issues/problems, and c) major events in the city.
{"title":"Reality mining in urban space","authors":"S. Nikolopoulos, S. Papadopoulos, Y. Kompatsiaris","doi":"10.1109/IISA.2013.6623711","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623711","url":null,"abstract":"The widespread adoption of smartphones and other sensor-capable devices and the availability of infrastructure capable of storing and sharing sensor information have been the main enablers for the intriguing and ambitious concept of Reality Mining. Reality mining is concerned with the collection and analysis of sensed data pertaining to different aspects of human social behavior, allowing to observe the societal dynamics and predict what individuals will do next, model the behavior of large organizations, detect trends, spot emerging phenomena and events, mine public opinion, etc. The concept of reality mining is even more intriguing when applied in the context of urban space, since user-generated content can be analyzed to reveal the citizens' perspective on various aspects of the city reality. In this paper, after elaborating on the concept of reality mining in urban space, we present three cases where user-generated content is employed to discover the citizens' perspective about: a) the city attractions, b) the city issues/problems, and c) major events in the city.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123733742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623689
P. Nastou, P. Spirakis, Y. Stamatiou, Christina Vichou
In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from which the agents start, may even be independent of each other, implying that the two agents need not have had previous access to common information sources. In addition, the common knowledge extracted upon the termination of the protocols depends, in a fair way, on the (possibly independent) information items initially known, separately, by the two agents. It is fair in the sense that there is a negotiation between the two agents instead of one agent forcing the other to conform to its own knowledge. These protocols, may be extended in order to support security applications where the establishment of a common knowledge is required. Moreover, the implementation of the protocols leads to reasonably small code that can also fit within resource limited devices involved in any communication network while, at the same time, it is efficient as simulation results demonstrate.
{"title":"Agent agreement protocols based on golay error-correcting code","authors":"P. Nastou, P. Spirakis, Y. Stamatiou, Christina Vichou","doi":"10.1109/IISA.2013.6623689","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623689","url":null,"abstract":"In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from which the agents start, may even be independent of each other, implying that the two agents need not have had previous access to common information sources. In addition, the common knowledge extracted upon the termination of the protocols depends, in a fair way, on the (possibly independent) information items initially known, separately, by the two agents. It is fair in the sense that there is a negotiation between the two agents instead of one agent forcing the other to conform to its own knowledge. These protocols, may be extended in order to support security applications where the establishment of a common knowledge is required. Moreover, the implementation of the protocols leads to reasonably small code that can also fit within resource limited devices involved in any communication network while, at the same time, it is efficient as simulation results demonstrate.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623709
K. Drossos, Rigas Kotsakis, George M. Kalliris, A. Floros
A variety of recent researches in Audio Emotion Recognition (AER) outlines high performance and retrieval accuracy results. However, in most works music is considered as the original sound content that conveys the identified emotions. One of the music characteristics that is found to represent a fundamental means for conveying emotions are the rhythm-related acoustic cues. Although music is an important aspect of everyday life, there are numerous non-linguistic and nonmusical sounds surrounding humans, generally defined as sound events (SEs). Despite this enormous impact of SEs to humans, a scarcity of investigations regarding AER from SEs is observed. There are only a few recent investigations concerned with SEs and AER, presenting a semantic connection between the former and the listener's triggered emotion. In this work we analytically investigate the connection of rhythm-related characteristics of a wide range of common SEs with the arousal of the listener using sound events with semantic content. To this aim, several feature evaluation and classification tasks are conducted using different ranking and classification algorithms. High accuracy results are obtained, demonstrating a significant relation of SEs rhythmic characteristics to the elicited arousal.
{"title":"Sound events and emotions: Investigating the relation of rhythmic characteristics and arousal","authors":"K. Drossos, Rigas Kotsakis, George M. Kalliris, A. Floros","doi":"10.1109/IISA.2013.6623709","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623709","url":null,"abstract":"A variety of recent researches in Audio Emotion Recognition (AER) outlines high performance and retrieval accuracy results. However, in most works music is considered as the original sound content that conveys the identified emotions. One of the music characteristics that is found to represent a fundamental means for conveying emotions are the rhythm-related acoustic cues. Although music is an important aspect of everyday life, there are numerous non-linguistic and nonmusical sounds surrounding humans, generally defined as sound events (SEs). Despite this enormous impact of SEs to humans, a scarcity of investigations regarding AER from SEs is observed. There are only a few recent investigations concerned with SEs and AER, presenting a semantic connection between the former and the listener's triggered emotion. In this work we analytically investigate the connection of rhythm-related characteristics of a wide range of common SEs with the arousal of the listener using sound events with semantic content. To this aim, several feature evaluation and classification tasks are conducted using different ranking and classification algorithms. High accuracy results are obtained, demonstrating a significant relation of SEs rhythmic characteristics to the elicited arousal.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623698
D. Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, C. Douligeris, M. Theoharidou, D. Gritzalis
Port Information and Communication Technology (PICT) systems offer a series of critical services rendering their effective security management an issue of vital importance. Existing regulation, standardization, and risk management methodologies do not adequately address the cyber threats the dependent environment of PICT systems is exposed to. In the SPort project, we identified and addressed these needs by proposing a collaborative environment offering customized security management services targeted at the unique needs of port authorities. The success of S-Port has been deployed in three commercial ports, so as to assist them in self managing security and risks. In this paper, we present the main objectives and core functionalities of S-Port environment, as well as the overall results of its assessment.
{"title":"S-Port: Collaborative security management of Port Information systems","authors":"D. Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, C. Douligeris, M. Theoharidou, D. Gritzalis","doi":"10.1109/IISA.2013.6623698","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623698","url":null,"abstract":"Port Information and Communication Technology (PICT) systems offer a series of critical services rendering their effective security management an issue of vital importance. Existing regulation, standardization, and risk management methodologies do not adequately address the cyber threats the dependent environment of PICT systems is exposed to. In the SPort project, we identified and addressed these needs by proposing a collaborative environment offering customized security management services targeted at the unique needs of port authorities. The success of S-Port has been deployed in three commercial ports, so as to assist them in self managing security and risks. In this paper, we present the main objectives and core functionalities of S-Port environment, as well as the overall results of its assessment.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126761764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623734
Nitesh B. Guinde, R. Rojas-Cessa, Sotirios G. Ziavras
Data rates on Internet links keep increasing with the deployment of optical technology. Packets coming into highspeed networks need to be classified quickly. Different packet classification schemes have been developed but they require a number of memory accesses as classification is complex and memory is slow. We follow the approach of providing support with fast memory, as cache, in computer systems, to support packet classification schemes. Here, we propose a scheme based on memory cache to support packet classification. The scheme not only makes use of faster and smaller memories but also reduces the number of memory accesses to perform packet classification. It can make the performance of the adopted classification scheme independent of the number of connection flows. We present various packet-classification caching schemes for performing classification and provide the cache hit ratio results for various traffic models generated with Classbench.
{"title":"Packet classification using rule caching","authors":"Nitesh B. Guinde, R. Rojas-Cessa, Sotirios G. Ziavras","doi":"10.1109/IISA.2013.6623734","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623734","url":null,"abstract":"Data rates on Internet links keep increasing with the deployment of optical technology. Packets coming into highspeed networks need to be classified quickly. Different packet classification schemes have been developed but they require a number of memory accesses as classification is complex and memory is slow. We follow the approach of providing support with fast memory, as cache, in computer systems, to support packet classification schemes. Here, we propose a scheme based on memory cache to support packet classification. The scheme not only makes use of faster and smaller memories but also reduces the number of memory accesses to perform packet classification. It can make the performance of the adopted classification scheme independent of the number of connection flows. We present various packet-classification caching schemes for performing classification and provide the cache hit ratio results for various traffic models generated with Classbench.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129483796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}