首页 > 最新文献

2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)最新文献

英文 中文
Employing Software Agents and Constructivism to make Massive Open Online Courses more student-oriented 运用软件代理和建构主义使大规模网络公开课程更加以学生为中心
Ufuoma Chima Apoki, G. Crişan
This paper aims at reviewing and applying constructivism, as a learning theory, in the design and development of automated technologies for Massive Open Online Courses in higher education. Although new in the field of online education, these courses hold the promise of ensuring many people get access to higher education. As it promises many advantages, its multiple challenges also lurk around. Applying the right learning theories would provide a platform that delivers a learning environment which is both automated (to account for the high number of users) and personalized. The methodology uses big data technologies and natural language processing skills to provide quality interaction between platform and student. A review of the types of MOOCs is done, and the challenges of delivery and assessment which limits its recognition as a standard means of education. Then, the use of software agents is explored to accommodate for the stream of big data generated by the high number of students. Learning theories and styles, which are relevant in the design of these courses, are also discussed. Finally, a model is proposed which employs software agents and constructivism (as a learning theory) to make massive open online courses more student-oriented.
本文旨在回顾建构主义这一学习理论,并将其应用于高等教育大规模在线开放课程自动化技术的设计与开发。尽管这些课程是在线教育领域的新事物,但它们有望确保许多人接受高等教育。由于它承诺了许多优势,它的多重挑战也潜伏在周围。应用正确的学习理论将提供一个平台,提供一个既自动化(考虑到大量用户)又个性化的学习环境。该方法使用大数据技术和自然语言处理技能,在平台和学生之间提供高质量的交互。本文对mooc的类型进行了回顾,并对其作为一种标准教育手段所面临的交付和评估方面的挑战进行了回顾。然后,探索软件代理的使用,以适应大量学生产生的大数据流。本文还讨论了与课程设计相关的学习理论和学习风格。最后,提出了一种采用软件代理和建构主义(作为一种学习理论)的模型,使大规模在线开放课程更加以学生为中心。
{"title":"Employing Software Agents and Constructivism to make Massive Open Online Courses more student-oriented","authors":"Ufuoma Chima Apoki, G. Crişan","doi":"10.1109/ECAI46879.2019.9042001","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042001","url":null,"abstract":"This paper aims at reviewing and applying constructivism, as a learning theory, in the design and development of automated technologies for Massive Open Online Courses in higher education. Although new in the field of online education, these courses hold the promise of ensuring many people get access to higher education. As it promises many advantages, its multiple challenges also lurk around. Applying the right learning theories would provide a platform that delivers a learning environment which is both automated (to account for the high number of users) and personalized. The methodology uses big data technologies and natural language processing skills to provide quality interaction between platform and student. A review of the types of MOOCs is done, and the challenges of delivery and assessment which limits its recognition as a standard means of education. Then, the use of software agents is explored to accommodate for the stream of big data generated by the high number of students. Learning theories and styles, which are relevant in the design of these courses, are also discussed. Finally, a model is proposed which employs software agents and constructivism (as a learning theory) to make massive open online courses more student-oriented.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Data for Human Resources 人力资源数据挖掘
Andreea Nedelcu, Bogdan Nedelcu, I. Sgârciu, V. Sgârciu
The article shows the complexity of the human resource field, offering an insight on the issues that many decision makers are facing, in a world where any software solution designed to offer value, is no longer viable without big data capabilities. This paper's main objective is to prove the importance of mining human resource data by proving its accuracy. Furthermore, such a way of mining big data can be a starting point for more intelligent systems that could offer decision makers valuable real-time information. The study shows an objective view on how accurate the public available web search data is and how it can be mined for achieving valuable information for HR.
本文展示了人力资源领域的复杂性,并提供了许多决策者所面临的问题的见解,在这个世界上,任何旨在提供价值的软件解决方案,如果没有大数据功能就不再可行。本文的主要目的是通过证明人力资源数据挖掘的准确性来证明其重要性。此外,这种挖掘大数据的方式可以成为更智能系统的起点,为决策者提供有价值的实时信息。该研究显示了一个客观的观点,即公共网络搜索数据的准确性,以及如何挖掘这些数据以获得对人力资源有价值的信息。
{"title":"Mining Data for Human Resources","authors":"Andreea Nedelcu, Bogdan Nedelcu, I. Sgârciu, V. Sgârciu","doi":"10.1109/ECAI46879.2019.9042148","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042148","url":null,"abstract":"The article shows the complexity of the human resource field, offering an insight on the issues that many decision makers are facing, in a world where any software solution designed to offer value, is no longer viable without big data capabilities. This paper's main objective is to prove the importance of mining human resource data by proving its accuracy. Furthermore, such a way of mining big data can be a starting point for more intelligent systems that could offer decision makers valuable real-time information. The study shows an objective view on how accurate the public available web search data is and how it can be mined for achieving valuable information for HR.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127335395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Grid Protection using MAC Value Analysis 基于MAC值分析的智能电网保护
Balduino Estison Mugilila Camachi, D. Popescu, L. Ichim
The purpose of this paper is to illustrate the vulnerabilities found through the studies, mainly through the methods of preventing an attack of a Smart Grid. Having a contingency plan of attacks is not something complex and should be part of everyday business, it's wrong to think that answering a security incident only happens in cases of mega attacks, such as WannaCry. Any Security threat must be taken seriously, no matter how small the threat is, because the threat might just be a test of vulnerability. The main goal of this article is to prevent cyber-attacks of Smart Grid using MAC Value Analysis. On this article the goal is to protect the network from these attacks.
本文的目的是说明通过研究发现的漏洞,主要是通过防止智能电网攻击的方法。制定攻击应急计划并不是一件复杂的事情,应该成为日常业务的一部分。如果认为应对安全事件只发生在像WannaCry这样的大型攻击中,那就错了。任何安全威胁都必须认真对待,无论威胁有多小,因为威胁可能只是对脆弱性的测试。本文的主要目的是利用MAC值分析来防止智能电网的网络攻击。本文的目标是保护网络免受这些攻击。
{"title":"Smart Grid Protection using MAC Value Analysis","authors":"Balduino Estison Mugilila Camachi, D. Popescu, L. Ichim","doi":"10.1109/ECAI46879.2019.9042013","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042013","url":null,"abstract":"The purpose of this paper is to illustrate the vulnerabilities found through the studies, mainly through the methods of preventing an attack of a Smart Grid. Having a contingency plan of attacks is not something complex and should be part of everyday business, it's wrong to think that answering a security incident only happens in cases of mega attacks, such as WannaCry. Any Security threat must be taken seriously, no matter how small the threat is, because the threat might just be a test of vulnerability. The main goal of this article is to prevent cyber-attacks of Smart Grid using MAC Value Analysis. On this article the goal is to protect the network from these attacks.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127637392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Biometric Security Model with Co-Occurrence Matrices for Palmprint features 基于共生矩阵的掌纹特征安全模型
S. Soviany, S. Puscoci
This paper presents a biometric authentication model using the palmprint, in which the data processing is done using textural statistical features and co-occurrence matrices. Several features sets are extracted and then combined with a functional fusion rule, avoiding the commonly used concatenation feature-level fusion. The target application has several security levels in order to accurately identify the most authorized person. The designed system operates in identification mode because the goal is to guess the true identity of a person using the biometric credential without the user-name.
本文提出了一种基于掌纹的生物特征认证模型,该模型采用纹理统计特征和共现矩阵进行数据处理。该方法提取多个特征集,并结合功能融合规则进行融合,避免了常见的拼接特征级融合。目标应用程序具有几个安全级别,以便准确地识别最授权的人员。设计的系统以识别模式运行,因为目标是在没有用户名的情况下,使用生物识别凭证猜测一个人的真实身份。
{"title":"A Biometric Security Model with Co-Occurrence Matrices for Palmprint features","authors":"S. Soviany, S. Puscoci","doi":"10.1109/ECAI46879.2019.9042145","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042145","url":null,"abstract":"This paper presents a biometric authentication model using the palmprint, in which the data processing is done using textural statistical features and co-occurrence matrices. Several features sets are extracted and then combined with a functional fusion rule, avoiding the commonly used concatenation feature-level fusion. The target application has several security levels in order to accurately identify the most authorized person. The designed system operates in identification mode because the goal is to guess the true identity of a person using the biometric credential without the user-name.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"28 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment of ZigBee communications efficiency for truck platooning applications 卡车队列应用中ZigBee通信效率评估
Răzvan Andrei Gheorghiu, V. Iordache, M. Minea
Truck platooning represents an innovative solution to increase fuel efficiency of the freight road transport. This method assumes short gaps between trucks and truck platooning is recommended for obtaining better fuel consumption. However, this may require a specific and/or dedicated infrastructure, since the total length of the convoy may be considerable, with a possible negative impact on the general traffic behaviour: other vehicles would need significantly increased space (and time) to overtake the truck platoon. To solve this situation and allow other vehicles to gradually overtake the platoon a solution is proposed for dynamic platoon formation, based on vehicle-to-vehicle communications. The ZigBee communication technology is proposed to ensure the identification of vehicles that are obstructed by the platoon and a series of laboratory measurements and field tests have been undertaken to assess validity.
卡车车队是提高公路货运燃油效率的一种创新解决方案。该方法假设卡车之间的间隔很短,并且建议卡车队列行驶以获得更好的燃油消耗。然而,这可能需要一个特定的和/或专用的基础设施,因为车队的总长度可能相当大,可能对一般交通行为产生负面影响:其他车辆将需要显著增加的空间(和时间)来超过卡车排。为了解决这种情况,并允许其他车辆逐渐超车,提出了一种基于车对车通信的动态组队方案。提出了ZigBee通信技术,以确保识别被车队阻挡的车辆,并进行了一系列实验室测量和现场测试,以评估有效性。
{"title":"Assessment of ZigBee communications efficiency for truck platooning applications","authors":"Răzvan Andrei Gheorghiu, V. Iordache, M. Minea","doi":"10.1109/ECAI46879.2019.9041989","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9041989","url":null,"abstract":"Truck platooning represents an innovative solution to increase fuel efficiency of the freight road transport. This method assumes short gaps between trucks and truck platooning is recommended for obtaining better fuel consumption. However, this may require a specific and/or dedicated infrastructure, since the total length of the convoy may be considerable, with a possible negative impact on the general traffic behaviour: other vehicles would need significantly increased space (and time) to overtake the truck platoon. To solve this situation and allow other vehicles to gradually overtake the platoon a solution is proposed for dynamic platoon formation, based on vehicle-to-vehicle communications. The ZigBee communication technology is proposed to ensure the identification of vehicles that are obstructed by the platoon and a series of laboratory measurements and field tests have been undertaken to assess validity.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122367310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling and Simulation of Quadrotor UAV Using PID Controller 基于PID控制器的四旋翼无人机建模与仿真
Mehmet Karahan, C. Kasnakoğlu
Recent developments in sensor technology, actuators and energy storage devices provides opportunities for development of micro flying robots. This paper provides information about modeling and control of a Quadrotor. Proportional Integral Derivative (PID) controller is designed for altitude and attitude control of Quadrotor. Various simulations were performed and it could be interpreted that the PID controller is capable of tracking the desired reference values. Finally, the last section is devoted for discussing the results of each simulation.
传感器技术、执行器和能量存储装置的最新发展为微型飞行机器人的发展提供了机会。本文提供了有关建模和控制四旋翼的信息。针对四旋翼飞行器的高度和姿态控制,设计了比例积分导数(PID)控制器。进行了各种仿真,可以解释为PID控制器能够跟踪所需的参考值。最后,最后一节专门讨论每个模拟的结果。
{"title":"Modeling and Simulation of Quadrotor UAV Using PID Controller","authors":"Mehmet Karahan, C. Kasnakoğlu","doi":"10.1109/ECAI46879.2019.9042043","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042043","url":null,"abstract":"Recent developments in sensor technology, actuators and energy storage devices provides opportunities for development of micro flying robots. This paper provides information about modeling and control of a Quadrotor. Proportional Integral Derivative (PID) controller is designed for altitude and attitude control of Quadrotor. Various simulations were performed and it could be interpreted that the PID controller is capable of tracking the desired reference values. Finally, the last section is devoted for discussing the results of each simulation.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Malware's Double Anti Analysis (DAA) Analysis Methodology 恶意软件的双重反分析(DAA)分析方法
Yanis Beqqali, Hamza Es Sadik, Francine Herrmann, Fabrice Sabatier
Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have analyzed several existing approaches aimed to evade malware in order to use the most effective ones. A new open source software tool has been designed and developed. We tested our software with more than 300000 LHS's malwares. This implementation allowed us to confirm the importance of studying the behaviour of malwares in an environment able to counter the anti-analysis techniques.
大多数现代恶意软件使用反分析技术来逃避现有的检测和分析解决方案。我们设计了一种新的方法DAA来分析恶意软件,即使它们使用这种倾向。为此,我们分析了几种现有的旨在逃避恶意软件的方法,以便使用最有效的方法。设计并开发了一种新的开源软件工具。我们用超过30万个LHS的恶意软件测试了我们的软件。这个实现使我们确认了在一个能够对抗反分析技术的环境中研究恶意软件行为的重要性。
{"title":"Malware's Double Anti Analysis (DAA) Analysis Methodology","authors":"Yanis Beqqali, Hamza Es Sadik, Francine Herrmann, Fabrice Sabatier","doi":"10.1109/ECAI46879.2019.9042164","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042164","url":null,"abstract":"Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have analyzed several existing approaches aimed to evade malware in order to use the most effective ones. A new open source software tool has been designed and developed. We tested our software with more than 300000 LHS's malwares. This implementation allowed us to confirm the importance of studying the behaviour of malwares in an environment able to counter the anti-analysis techniques.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117077320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keratoconus Detection Algorithm using Convolutional Neural Networks: Challenges 使用卷积神经网络的圆锥角膜检测算法:挑战
A. Lavric, V. Popa, Cristina David, Cristian Costel Paval
Over the last few years, we are witnessing a development of image processing algorithms, which, alongside neuronal networks and Artificial Intelligence (A.I.) allowed their application in various medical fields. There is a great potential in having a safer, faster diagnosis, which oftentimes means saving more lives. The development of new mechanisms tailored to diagnosing keratoconus which make use of the latest machine vision technologies of a machine vision type as well as neuronal networks is of utmost necessity. The main contribution of this scientific paper lies in its analysis and study dealing with the importance of using neural networks within the field of ophthalmology, as well as in the representation of the neuronal algorithm when it comes to the detection of keratoconus. The detection algorithm needs to help the ophthalmologist by facilitating the correct diagnosis of early keratoconus, thus helping with the effective long-term management of keratoconus.
在过去的几年里,我们见证了图像处理算法的发展,这些算法与神经网络和人工智能(A.I.)一起,使它们能够在各种医学领域得到应用。更安全、更快速的诊断有很大的潜力,这通常意味着挽救更多的生命。利用机器视觉类型的最新机器视觉技术以及神经网络,开发适合圆锥角膜诊断的新机制是非常必要的。这篇科学论文的主要贡献在于分析和研究了在眼科领域中使用神经网络的重要性,以及在圆锥角膜检测中神经元算法的表示。检测算法需要帮助眼科医生通过促进早期圆锥角膜的正确诊断,从而帮助圆锥角膜的有效长期治疗。
{"title":"Keratoconus Detection Algorithm using Convolutional Neural Networks: Challenges","authors":"A. Lavric, V. Popa, Cristina David, Cristian Costel Paval","doi":"10.1109/ECAI46879.2019.9042100","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042100","url":null,"abstract":"Over the last few years, we are witnessing a development of image processing algorithms, which, alongside neuronal networks and Artificial Intelligence (A.I.) allowed their application in various medical fields. There is a great potential in having a safer, faster diagnosis, which oftentimes means saving more lives. The development of new mechanisms tailored to diagnosing keratoconus which make use of the latest machine vision technologies of a machine vision type as well as neuronal networks is of utmost necessity. The main contribution of this scientific paper lies in its analysis and study dealing with the importance of using neural networks within the field of ophthalmology, as well as in the representation of the neuronal algorithm when it comes to the detection of keratoconus. The detection algorithm needs to help the ophthalmologist by facilitating the correct diagnosis of early keratoconus, thus helping with the effective long-term management of keratoconus.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Evolving Fuzzy and Neural Network Models of Finger Dynamics for Prosthetic Hand Myoelectric-based Control 假手肌电控制手指动力学的进化模糊和神经网络模型
R. Precup, Teodor-Adrian Teban, A. Albu
This paper first presents a structure for prosthetic hand myoelectric-based control systems (MBCSs). A set of evolving Takagi-Sugeno fuzzy and neural network models of the human hand dynamics, i.e., the finger dynamics, is next offered. These models will be used as reference models in structures of MBCSs. The inputs of the models are the myoelectric signals obtained from eight sensors placed on human subject's arm, and the outputs of these models are the flexion percentages of midcarpal joint angles. Elements of model-based fuzzy control are included. This plenary keynote paper is supported by authors' recent papers on modeling in the framework of prosthetic hand myoelectric-based control.
本文首先介绍了假手肌电控制系统(MBCSs)的结构。一套进化的Takagi-Sugeno模糊和神经网络模型的人手动力学,即手指动力学,是下一步提供。这些模型将作为mbcs结构的参考模型。模型的输入是放置在人体手臂上的8个传感器获得的肌电信号,输出是腕中关节角度的屈曲百分比。包括基于模型的模糊控制的组成部分。这篇全体会议主题论文得到了作者最近关于假手肌电控制框架下建模的论文的支持。
{"title":"Evolving Fuzzy and Neural Network Models of Finger Dynamics for Prosthetic Hand Myoelectric-based Control","authors":"R. Precup, Teodor-Adrian Teban, A. Albu","doi":"10.1109/ECAI46879.2019.9042090","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042090","url":null,"abstract":"This paper first presents a structure for prosthetic hand myoelectric-based control systems (MBCSs). A set of evolving Takagi-Sugeno fuzzy and neural network models of the human hand dynamics, i.e., the finger dynamics, is next offered. These models will be used as reference models in structures of MBCSs. The inputs of the models are the myoelectric signals obtained from eight sensors placed on human subject's arm, and the outputs of these models are the flexion percentages of midcarpal joint angles. Elements of model-based fuzzy control are included. This plenary keynote paper is supported by authors' recent papers on modeling in the framework of prosthetic hand myoelectric-based control.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4 使用Casper和FDR4自动化安全协议正式验证的Web GUI
Andreea Scurtu, Mihai-Lica Pura
Over the last two decades, Casper & FDR have proved to be two very important tools in the domain of formal verification of security protocols. Both their creators and the formal verification community have used these tools to find attacks on proposed security protocols and to also design fixes for them. This paper presents a web application developed with the purpose of automating the use of Casper & FDR in order to ease the model checking process and to provide some extra functionality for the analysis of the obtained results (e.g. graphical representation of the verified protocols and of the reported attacks). The mentioned ongoing importance of these tools has motivated the work described in this paper and also indicates its potential importance.
在过去的二十年中,Casper和FDR已被证明是安全协议形式化验证领域中两个非常重要的工具。它们的创建者和正式的验证社区都使用这些工具来发现对提议的安全协议的攻击,并为它们设计修复程序。本文介绍了一个web应用程序的开发,其目的是自动化使用Casper和FDR,以简化模型检查过程,并为分析获得的结果提供一些额外的功能(例如,已验证协议的图形表示和报告的攻击)。这些工具的持续重要性已经激发了本文所描述的工作,也表明了其潜在的重要性。
{"title":"Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4","authors":"Andreea Scurtu, Mihai-Lica Pura","doi":"10.1109/ECAI46879.2019.9041964","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9041964","url":null,"abstract":"Over the last two decades, Casper & FDR have proved to be two very important tools in the domain of formal verification of security protocols. Both their creators and the formal verification community have used these tools to find attacks on proposed security protocols and to also design fixes for them. This paper presents a web application developed with the purpose of automating the use of Casper & FDR in order to ease the model checking process and to provide some extra functionality for the analysis of the obtained results (e.g. graphical representation of the verified protocols and of the reported attacks). The mentioned ongoing importance of these tools has motivated the work described in this paper and also indicates its potential importance.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1