Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042001
Ufuoma Chima Apoki, G. Crişan
This paper aims at reviewing and applying constructivism, as a learning theory, in the design and development of automated technologies for Massive Open Online Courses in higher education. Although new in the field of online education, these courses hold the promise of ensuring many people get access to higher education. As it promises many advantages, its multiple challenges also lurk around. Applying the right learning theories would provide a platform that delivers a learning environment which is both automated (to account for the high number of users) and personalized. The methodology uses big data technologies and natural language processing skills to provide quality interaction between platform and student. A review of the types of MOOCs is done, and the challenges of delivery and assessment which limits its recognition as a standard means of education. Then, the use of software agents is explored to accommodate for the stream of big data generated by the high number of students. Learning theories and styles, which are relevant in the design of these courses, are also discussed. Finally, a model is proposed which employs software agents and constructivism (as a learning theory) to make massive open online courses more student-oriented.
{"title":"Employing Software Agents and Constructivism to make Massive Open Online Courses more student-oriented","authors":"Ufuoma Chima Apoki, G. Crişan","doi":"10.1109/ECAI46879.2019.9042001","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042001","url":null,"abstract":"This paper aims at reviewing and applying constructivism, as a learning theory, in the design and development of automated technologies for Massive Open Online Courses in higher education. Although new in the field of online education, these courses hold the promise of ensuring many people get access to higher education. As it promises many advantages, its multiple challenges also lurk around. Applying the right learning theories would provide a platform that delivers a learning environment which is both automated (to account for the high number of users) and personalized. The methodology uses big data technologies and natural language processing skills to provide quality interaction between platform and student. A review of the types of MOOCs is done, and the challenges of delivery and assessment which limits its recognition as a standard means of education. Then, the use of software agents is explored to accommodate for the stream of big data generated by the high number of students. Learning theories and styles, which are relevant in the design of these courses, are also discussed. Finally, a model is proposed which employs software agents and constructivism (as a learning theory) to make massive open online courses more student-oriented.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042148
Andreea Nedelcu, Bogdan Nedelcu, I. Sgârciu, V. Sgârciu
The article shows the complexity of the human resource field, offering an insight on the issues that many decision makers are facing, in a world where any software solution designed to offer value, is no longer viable without big data capabilities. This paper's main objective is to prove the importance of mining human resource data by proving its accuracy. Furthermore, such a way of mining big data can be a starting point for more intelligent systems that could offer decision makers valuable real-time information. The study shows an objective view on how accurate the public available web search data is and how it can be mined for achieving valuable information for HR.
{"title":"Mining Data for Human Resources","authors":"Andreea Nedelcu, Bogdan Nedelcu, I. Sgârciu, V. Sgârciu","doi":"10.1109/ECAI46879.2019.9042148","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042148","url":null,"abstract":"The article shows the complexity of the human resource field, offering an insight on the issues that many decision makers are facing, in a world where any software solution designed to offer value, is no longer viable without big data capabilities. This paper's main objective is to prove the importance of mining human resource data by proving its accuracy. Furthermore, such a way of mining big data can be a starting point for more intelligent systems that could offer decision makers valuable real-time information. The study shows an objective view on how accurate the public available web search data is and how it can be mined for achieving valuable information for HR.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127335395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042013
Balduino Estison Mugilila Camachi, D. Popescu, L. Ichim
The purpose of this paper is to illustrate the vulnerabilities found through the studies, mainly through the methods of preventing an attack of a Smart Grid. Having a contingency plan of attacks is not something complex and should be part of everyday business, it's wrong to think that answering a security incident only happens in cases of mega attacks, such as WannaCry. Any Security threat must be taken seriously, no matter how small the threat is, because the threat might just be a test of vulnerability. The main goal of this article is to prevent cyber-attacks of Smart Grid using MAC Value Analysis. On this article the goal is to protect the network from these attacks.
{"title":"Smart Grid Protection using MAC Value Analysis","authors":"Balduino Estison Mugilila Camachi, D. Popescu, L. Ichim","doi":"10.1109/ECAI46879.2019.9042013","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042013","url":null,"abstract":"The purpose of this paper is to illustrate the vulnerabilities found through the studies, mainly through the methods of preventing an attack of a Smart Grid. Having a contingency plan of attacks is not something complex and should be part of everyday business, it's wrong to think that answering a security incident only happens in cases of mega attacks, such as WannaCry. Any Security threat must be taken seriously, no matter how small the threat is, because the threat might just be a test of vulnerability. The main goal of this article is to prevent cyber-attacks of Smart Grid using MAC Value Analysis. On this article the goal is to protect the network from these attacks.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127637392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042145
S. Soviany, S. Puscoci
This paper presents a biometric authentication model using the palmprint, in which the data processing is done using textural statistical features and co-occurrence matrices. Several features sets are extracted and then combined with a functional fusion rule, avoiding the commonly used concatenation feature-level fusion. The target application has several security levels in order to accurately identify the most authorized person. The designed system operates in identification mode because the goal is to guess the true identity of a person using the biometric credential without the user-name.
{"title":"A Biometric Security Model with Co-Occurrence Matrices for Palmprint features","authors":"S. Soviany, S. Puscoci","doi":"10.1109/ECAI46879.2019.9042145","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042145","url":null,"abstract":"This paper presents a biometric authentication model using the palmprint, in which the data processing is done using textural statistical features and co-occurrence matrices. Several features sets are extracted and then combined with a functional fusion rule, avoiding the commonly used concatenation feature-level fusion. The target application has several security levels in order to accurately identify the most authorized person. The designed system operates in identification mode because the goal is to guess the true identity of a person using the biometric credential without the user-name.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"28 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9041989
Răzvan Andrei Gheorghiu, V. Iordache, M. Minea
Truck platooning represents an innovative solution to increase fuel efficiency of the freight road transport. This method assumes short gaps between trucks and truck platooning is recommended for obtaining better fuel consumption. However, this may require a specific and/or dedicated infrastructure, since the total length of the convoy may be considerable, with a possible negative impact on the general traffic behaviour: other vehicles would need significantly increased space (and time) to overtake the truck platoon. To solve this situation and allow other vehicles to gradually overtake the platoon a solution is proposed for dynamic platoon formation, based on vehicle-to-vehicle communications. The ZigBee communication technology is proposed to ensure the identification of vehicles that are obstructed by the platoon and a series of laboratory measurements and field tests have been undertaken to assess validity.
{"title":"Assessment of ZigBee communications efficiency for truck platooning applications","authors":"Răzvan Andrei Gheorghiu, V. Iordache, M. Minea","doi":"10.1109/ECAI46879.2019.9041989","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9041989","url":null,"abstract":"Truck platooning represents an innovative solution to increase fuel efficiency of the freight road transport. This method assumes short gaps between trucks and truck platooning is recommended for obtaining better fuel consumption. However, this may require a specific and/or dedicated infrastructure, since the total length of the convoy may be considerable, with a possible negative impact on the general traffic behaviour: other vehicles would need significantly increased space (and time) to overtake the truck platoon. To solve this situation and allow other vehicles to gradually overtake the platoon a solution is proposed for dynamic platoon formation, based on vehicle-to-vehicle communications. The ZigBee communication technology is proposed to ensure the identification of vehicles that are obstructed by the platoon and a series of laboratory measurements and field tests have been undertaken to assess validity.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122367310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042043
Mehmet Karahan, C. Kasnakoğlu
Recent developments in sensor technology, actuators and energy storage devices provides opportunities for development of micro flying robots. This paper provides information about modeling and control of a Quadrotor. Proportional Integral Derivative (PID) controller is designed for altitude and attitude control of Quadrotor. Various simulations were performed and it could be interpreted that the PID controller is capable of tracking the desired reference values. Finally, the last section is devoted for discussing the results of each simulation.
{"title":"Modeling and Simulation of Quadrotor UAV Using PID Controller","authors":"Mehmet Karahan, C. Kasnakoğlu","doi":"10.1109/ECAI46879.2019.9042043","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042043","url":null,"abstract":"Recent developments in sensor technology, actuators and energy storage devices provides opportunities for development of micro flying robots. This paper provides information about modeling and control of a Quadrotor. Proportional Integral Derivative (PID) controller is designed for altitude and attitude control of Quadrotor. Various simulations were performed and it could be interpreted that the PID controller is capable of tracking the desired reference values. Finally, the last section is devoted for discussing the results of each simulation.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042164
Yanis Beqqali, Hamza Es Sadik, Francine Herrmann, Fabrice Sabatier
Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have analyzed several existing approaches aimed to evade malware in order to use the most effective ones. A new open source software tool has been designed and developed. We tested our software with more than 300000 LHS's malwares. This implementation allowed us to confirm the importance of studying the behaviour of malwares in an environment able to counter the anti-analysis techniques.
{"title":"Malware's Double Anti Analysis (DAA) Analysis Methodology","authors":"Yanis Beqqali, Hamza Es Sadik, Francine Herrmann, Fabrice Sabatier","doi":"10.1109/ECAI46879.2019.9042164","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042164","url":null,"abstract":"Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have analyzed several existing approaches aimed to evade malware in order to use the most effective ones. A new open source software tool has been designed and developed. We tested our software with more than 300000 LHS's malwares. This implementation allowed us to confirm the importance of studying the behaviour of malwares in an environment able to counter the anti-analysis techniques.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117077320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042100
A. Lavric, V. Popa, Cristina David, Cristian Costel Paval
Over the last few years, we are witnessing a development of image processing algorithms, which, alongside neuronal networks and Artificial Intelligence (A.I.) allowed their application in various medical fields. There is a great potential in having a safer, faster diagnosis, which oftentimes means saving more lives. The development of new mechanisms tailored to diagnosing keratoconus which make use of the latest machine vision technologies of a machine vision type as well as neuronal networks is of utmost necessity. The main contribution of this scientific paper lies in its analysis and study dealing with the importance of using neural networks within the field of ophthalmology, as well as in the representation of the neuronal algorithm when it comes to the detection of keratoconus. The detection algorithm needs to help the ophthalmologist by facilitating the correct diagnosis of early keratoconus, thus helping with the effective long-term management of keratoconus.
{"title":"Keratoconus Detection Algorithm using Convolutional Neural Networks: Challenges","authors":"A. Lavric, V. Popa, Cristina David, Cristian Costel Paval","doi":"10.1109/ECAI46879.2019.9042100","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042100","url":null,"abstract":"Over the last few years, we are witnessing a development of image processing algorithms, which, alongside neuronal networks and Artificial Intelligence (A.I.) allowed their application in various medical fields. There is a great potential in having a safer, faster diagnosis, which oftentimes means saving more lives. The development of new mechanisms tailored to diagnosing keratoconus which make use of the latest machine vision technologies of a machine vision type as well as neuronal networks is of utmost necessity. The main contribution of this scientific paper lies in its analysis and study dealing with the importance of using neural networks within the field of ophthalmology, as well as in the representation of the neuronal algorithm when it comes to the detection of keratoconus. The detection algorithm needs to help the ophthalmologist by facilitating the correct diagnosis of early keratoconus, thus helping with the effective long-term management of keratoconus.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9042090
R. Precup, Teodor-Adrian Teban, A. Albu
This paper first presents a structure for prosthetic hand myoelectric-based control systems (MBCSs). A set of evolving Takagi-Sugeno fuzzy and neural network models of the human hand dynamics, i.e., the finger dynamics, is next offered. These models will be used as reference models in structures of MBCSs. The inputs of the models are the myoelectric signals obtained from eight sensors placed on human subject's arm, and the outputs of these models are the flexion percentages of midcarpal joint angles. Elements of model-based fuzzy control are included. This plenary keynote paper is supported by authors' recent papers on modeling in the framework of prosthetic hand myoelectric-based control.
{"title":"Evolving Fuzzy and Neural Network Models of Finger Dynamics for Prosthetic Hand Myoelectric-based Control","authors":"R. Precup, Teodor-Adrian Teban, A. Albu","doi":"10.1109/ECAI46879.2019.9042090","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9042090","url":null,"abstract":"This paper first presents a structure for prosthetic hand myoelectric-based control systems (MBCSs). A set of evolving Takagi-Sugeno fuzzy and neural network models of the human hand dynamics, i.e., the finger dynamics, is next offered. These models will be used as reference models in structures of MBCSs. The inputs of the models are the myoelectric signals obtained from eight sensors placed on human subject's arm, and the outputs of these models are the flexion percentages of midcarpal joint angles. Elements of model-based fuzzy control are included. This plenary keynote paper is supported by authors' recent papers on modeling in the framework of prosthetic hand myoelectric-based control.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/ECAI46879.2019.9041964
Andreea Scurtu, Mihai-Lica Pura
Over the last two decades, Casper & FDR have proved to be two very important tools in the domain of formal verification of security protocols. Both their creators and the formal verification community have used these tools to find attacks on proposed security protocols and to also design fixes for them. This paper presents a web application developed with the purpose of automating the use of Casper & FDR in order to ease the model checking process and to provide some extra functionality for the analysis of the obtained results (e.g. graphical representation of the verified protocols and of the reported attacks). The mentioned ongoing importance of these tools has motivated the work described in this paper and also indicates its potential importance.
{"title":"Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4","authors":"Andreea Scurtu, Mihai-Lica Pura","doi":"10.1109/ECAI46879.2019.9041964","DOIUrl":"https://doi.org/10.1109/ECAI46879.2019.9041964","url":null,"abstract":"Over the last two decades, Casper & FDR have proved to be two very important tools in the domain of formal verification of security protocols. Both their creators and the formal verification community have used these tools to find attacks on proposed security protocols and to also design fixes for them. This paper presents a web application developed with the purpose of automating the use of Casper & FDR in order to ease the model checking process and to provide some extra functionality for the analysis of the obtained results (e.g. graphical representation of the verified protocols and of the reported attacks). The mentioned ongoing importance of these tools has motivated the work described in this paper and also indicates its potential importance.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}