Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042015
Hiba A. Abu-Alsaad
This research paper aims at closely reviewing what are the various applications in e-learning systems. In order to achieve this, it must first define e-learning systems, look at the various components, approaches, and examples of e-learning systems. This paper is divided into two parts; section II and section III. In the first part, the paper tackles the various agent applications in e-learning systems. While In the second section, the research paper looks at the current development, or evolution, of adaptive e-learning systems and the challenges this system faces. In the second section, a review of different forms of adaptive e-learning systems have been made and comparisons made between them.
{"title":"Agent Applications In E-Learning Systems And Current Development And Challenges Of Adaptive E-Learning Systems","authors":"Hiba A. Abu-Alsaad","doi":"10.1109/ECAI46879.2019.9042015","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042015","url":null,"abstract":"This research paper aims at closely reviewing what are the various applications in e-learning systems. In order to achieve this, it must first define e-learning systems, look at the various components, approaches, and examples of e-learning systems. This paper is divided into two parts; section II and section III. In the first part, the paper tackles the various agent applications in e-learning systems. While In the second section, the research paper looks at the current development, or evolution, of adaptive e-learning systems and the challenges this system faces. In the second section, a review of different forms of adaptive e-learning systems have been made and comparisons made between them.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042094
Thitimanan Damrongsakmethee, V. Neagoe
This paper presents a Nonlinear Autoregressive Exogenous (NARX) model using feed-forward neural network learning to forecast the exchange rate. We have evaluated the model performances by considering the exchange rate of the Thai baht per US dollar using the historical data from the Bank of Thailand for 10 years, from 2009 to 2018. We have used the following forecasting evaluation indices: Mean Squared Error (MSE), Mean Absolute Percentage Error (MAPE) and correlation coefficient (R). We have considered the following financial inputs for the neural system that predicts the current exchange rate: gross domestic product rate (GDP), interest rate, inflation rate, balance account, trade balance and a finite set of previous exchange rates. The best result showed that the NARX neural network technique leads to a MAPE of 3.001% and a MSE of 0.006. Therefore, we can conclude that the considered predictive model using the NARX neural network technique can be used to accurately forecast the exchange rate.
{"title":"A Neural NARX Approach for Exchange Rate Forecasting","authors":"Thitimanan Damrongsakmethee, V. Neagoe","doi":"10.1109/ECAI46879.2019.9042094","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042094","url":null,"abstract":"This paper presents a Nonlinear Autoregressive Exogenous (NARX) model using feed-forward neural network learning to forecast the exchange rate. We have evaluated the model performances by considering the exchange rate of the Thai baht per US dollar using the historical data from the Bank of Thailand for 10 years, from 2009 to 2018. We have used the following forecasting evaluation indices: Mean Squared Error (MSE), Mean Absolute Percentage Error (MAPE) and correlation coefficient (R). We have considered the following financial inputs for the neural system that predicts the current exchange rate: gross domestic product rate (GDP), interest rate, inflation rate, balance account, trade balance and a finite set of previous exchange rates. The best result showed that the NARX neural network technique leads to a MAPE of 3.001% and a MSE of 0.006. Therefore, we can conclude that the considered predictive model using the NARX neural network technique can be used to accurately forecast the exchange rate.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042074
Răzvan Andrei Gheorghiu, V. Stan, V. Iordache, D. Buretea, I. Costea
Traffic data gathering represents a key element in managing urban flows. Knowledge about vehicles' movements represent the basis for traffic signalling times calculation. In this regard, collection of traffic information (as detailed as possible for different categories) is done in all adaptive traffic management systems, but usually performed with static detectors (sometimes expensive ones, like video cameras with image processing software). This solution presents disadvantages like installing costs, lane closure (for some detectors), or maintenance costs. As the infotainment system inside vehicles is starting to be a standard for new vehicles, with capabilities of smartphone connection via Bluetooth, it appears that the detection of this wireless communication may provide information about the vehicle itself. In this article the authors have tested the possibility to detect Bluetooth communications inside vehicles using standard Bluetooth modules.
{"title":"Usage of Bluetooth scanners to detect urban traffic","authors":"Răzvan Andrei Gheorghiu, V. Stan, V. Iordache, D. Buretea, I. Costea","doi":"10.1109/ECAI46879.2019.9042074","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042074","url":null,"abstract":"Traffic data gathering represents a key element in managing urban flows. Knowledge about vehicles' movements represent the basis for traffic signalling times calculation. In this regard, collection of traffic information (as detailed as possible for different categories) is done in all adaptive traffic management systems, but usually performed with static detectors (sometimes expensive ones, like video cameras with image processing software). This solution presents disadvantages like installing costs, lane closure (for some detectors), or maintenance costs. As the infotainment system inside vehicles is starting to be a standard for new vehicles, with capabilities of smartphone connection via Bluetooth, it appears that the detection of this wireless communication may provide information about the vehicle itself. In this article the authors have tested the possibility to detect Bluetooth communications inside vehicles using standard Bluetooth modules.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134645932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042145
S. Soviany, S. Puscoci
This paper presents a biometric authentication model using the palmprint, in which the data processing is done using textural statistical features and co-occurrence matrices. Several features sets are extracted and then combined with a functional fusion rule, avoiding the commonly used concatenation feature-level fusion. The target application has several security levels in order to accurately identify the most authorized person. The designed system operates in identification mode because the goal is to guess the true identity of a person using the biometric credential without the user-name.
{"title":"A Biometric Security Model with Co-Occurrence Matrices for Palmprint features","authors":"S. Soviany, S. Puscoci","doi":"10.1109/ECAI46879.2019.9042145","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042145","url":null,"abstract":"This paper presents a biometric authentication model using the palmprint, in which the data processing is done using textural statistical features and co-occurrence matrices. Several features sets are extracted and then combined with a functional fusion rule, avoiding the commonly used concatenation feature-level fusion. The target application has several security levels in order to accurately identify the most authorized person. The designed system operates in identification mode because the goal is to guess the true identity of a person using the biometric credential without the user-name.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"28 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9041989
Răzvan Andrei Gheorghiu, V. Iordache, M. Minea
Truck platooning represents an innovative solution to increase fuel efficiency of the freight road transport. This method assumes short gaps between trucks and truck platooning is recommended for obtaining better fuel consumption. However, this may require a specific and/or dedicated infrastructure, since the total length of the convoy may be considerable, with a possible negative impact on the general traffic behaviour: other vehicles would need significantly increased space (and time) to overtake the truck platoon. To solve this situation and allow other vehicles to gradually overtake the platoon a solution is proposed for dynamic platoon formation, based on vehicle-to-vehicle communications. The ZigBee communication technology is proposed to ensure the identification of vehicles that are obstructed by the platoon and a series of laboratory measurements and field tests have been undertaken to assess validity.
{"title":"Assessment of ZigBee communications efficiency for truck platooning applications","authors":"Răzvan Andrei Gheorghiu, V. Iordache, M. Minea","doi":"10.1109/ECAI46879.2019.9041989","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9041989","url":null,"abstract":"Truck platooning represents an innovative solution to increase fuel efficiency of the freight road transport. This method assumes short gaps between trucks and truck platooning is recommended for obtaining better fuel consumption. However, this may require a specific and/or dedicated infrastructure, since the total length of the convoy may be considerable, with a possible negative impact on the general traffic behaviour: other vehicles would need significantly increased space (and time) to overtake the truck platoon. To solve this situation and allow other vehicles to gradually overtake the platoon a solution is proposed for dynamic platoon formation, based on vehicle-to-vehicle communications. The ZigBee communication technology is proposed to ensure the identification of vehicles that are obstructed by the platoon and a series of laboratory measurements and field tests have been undertaken to assess validity.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122367310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042043
Mehmet Karahan, C. Kasnakoğlu
Recent developments in sensor technology, actuators and energy storage devices provides opportunities for development of micro flying robots. This paper provides information about modeling and control of a Quadrotor. Proportional Integral Derivative (PID) controller is designed for altitude and attitude control of Quadrotor. Various simulations were performed and it could be interpreted that the PID controller is capable of tracking the desired reference values. Finally, the last section is devoted for discussing the results of each simulation.
{"title":"Modeling and Simulation of Quadrotor UAV Using PID Controller","authors":"Mehmet Karahan, C. Kasnakoğlu","doi":"10.1109/ECAI46879.2019.9042043","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042043","url":null,"abstract":"Recent developments in sensor technology, actuators and energy storage devices provides opportunities for development of micro flying robots. This paper provides information about modeling and control of a Quadrotor. Proportional Integral Derivative (PID) controller is designed for altitude and attitude control of Quadrotor. Various simulations were performed and it could be interpreted that the PID controller is capable of tracking the desired reference values. Finally, the last section is devoted for discussing the results of each simulation.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042164
Yanis Beqqali, Hamza Es Sadik, Francine Herrmann, Fabrice Sabatier
Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have analyzed several existing approaches aimed to evade malware in order to use the most effective ones. A new open source software tool has been designed and developed. We tested our software with more than 300000 LHS's malwares. This implementation allowed us to confirm the importance of studying the behaviour of malwares in an environment able to counter the anti-analysis techniques.
{"title":"Malware's Double Anti Analysis (DAA) Analysis Methodology","authors":"Yanis Beqqali, Hamza Es Sadik, Francine Herrmann, Fabrice Sabatier","doi":"10.1109/ECAI46879.2019.9042164","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042164","url":null,"abstract":"Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have analyzed several existing approaches aimed to evade malware in order to use the most effective ones. A new open source software tool has been designed and developed. We tested our software with more than 300000 LHS's malwares. This implementation allowed us to confirm the importance of studying the behaviour of malwares in an environment able to counter the anti-analysis techniques.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117077320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042100
A. Lavric, V. Popa, Cristina David, Cristian Costel Paval
Over the last few years, we are witnessing a development of image processing algorithms, which, alongside neuronal networks and Artificial Intelligence (A.I.) allowed their application in various medical fields. There is a great potential in having a safer, faster diagnosis, which oftentimes means saving more lives. The development of new mechanisms tailored to diagnosing keratoconus which make use of the latest machine vision technologies of a machine vision type as well as neuronal networks is of utmost necessity. The main contribution of this scientific paper lies in its analysis and study dealing with the importance of using neural networks within the field of ophthalmology, as well as in the representation of the neuronal algorithm when it comes to the detection of keratoconus. The detection algorithm needs to help the ophthalmologist by facilitating the correct diagnosis of early keratoconus, thus helping with the effective long-term management of keratoconus.
{"title":"Keratoconus Detection Algorithm using Convolutional Neural Networks: Challenges","authors":"A. Lavric, V. Popa, Cristina David, Cristian Costel Paval","doi":"10.1109/ECAI46879.2019.9042100","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042100","url":null,"abstract":"Over the last few years, we are witnessing a development of image processing algorithms, which, alongside neuronal networks and Artificial Intelligence (A.I.) allowed their application in various medical fields. There is a great potential in having a safer, faster diagnosis, which oftentimes means saving more lives. The development of new mechanisms tailored to diagnosing keratoconus which make use of the latest machine vision technologies of a machine vision type as well as neuronal networks is of utmost necessity. The main contribution of this scientific paper lies in its analysis and study dealing with the importance of using neural networks within the field of ophthalmology, as well as in the representation of the neuronal algorithm when it comes to the detection of keratoconus. The detection algorithm needs to help the ophthalmologist by facilitating the correct diagnosis of early keratoconus, thus helping with the effective long-term management of keratoconus.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042090
R. Precup, Teodor-Adrian Teban, A. Albu
This paper first presents a structure for prosthetic hand myoelectric-based control systems (MBCSs). A set of evolving Takagi-Sugeno fuzzy and neural network models of the human hand dynamics, i.e., the finger dynamics, is next offered. These models will be used as reference models in structures of MBCSs. The inputs of the models are the myoelectric signals obtained from eight sensors placed on human subject's arm, and the outputs of these models are the flexion percentages of midcarpal joint angles. Elements of model-based fuzzy control are included. This plenary keynote paper is supported by authors' recent papers on modeling in the framework of prosthetic hand myoelectric-based control.
{"title":"Evolving Fuzzy and Neural Network Models of Finger Dynamics for Prosthetic Hand Myoelectric-based Control","authors":"R. Precup, Teodor-Adrian Teban, A. Albu","doi":"10.1109/ECAI46879.2019.9042090","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042090","url":null,"abstract":"This paper first presents a structure for prosthetic hand myoelectric-based control systems (MBCSs). A set of evolving Takagi-Sugeno fuzzy and neural network models of the human hand dynamics, i.e., the finger dynamics, is next offered. These models will be used as reference models in structures of MBCSs. The inputs of the models are the myoelectric signals obtained from eight sensors placed on human subject's arm, and the outputs of these models are the flexion percentages of midcarpal joint angles. Elements of model-based fuzzy control are included. This plenary keynote paper is supported by authors' recent papers on modeling in the framework of prosthetic hand myoelectric-based control.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9041964
Andreea Scurtu, Mihai-Lica Pura
Over the last two decades, Casper & FDR have proved to be two very important tools in the domain of formal verification of security protocols. Both their creators and the formal verification community have used these tools to find attacks on proposed security protocols and to also design fixes for them. This paper presents a web application developed with the purpose of automating the use of Casper & FDR in order to ease the model checking process and to provide some extra functionality for the analysis of the obtained results (e.g. graphical representation of the verified protocols and of the reported attacks). The mentioned ongoing importance of these tools has motivated the work described in this paper and also indicates its potential importance.
{"title":"Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4","authors":"Andreea Scurtu, Mihai-Lica Pura","doi":"10.1109/ECAI46879.2019.9041964","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9041964","url":null,"abstract":"Over the last two decades, Casper & FDR have proved to be two very important tools in the domain of formal verification of security protocols. Both their creators and the formal verification community have used these tools to find attacks on proposed security protocols and to also design fixes for them. This paper presents a web application developed with the purpose of automating the use of Casper & FDR in order to ease the model checking process and to provide some extra functionality for the analysis of the obtained results (e.g. graphical representation of the verified protocols and of the reported attacks). The mentioned ongoing importance of these tools has motivated the work described in this paper and also indicates its potential importance.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}