首页 > 最新文献

Proceedings of the 10th International Conference on Information Systems and Technologies最新文献

英文 中文
An ANFIS-based Computation to Study the Degradation-related Ageing effects in Nanoscale GAA-TFETs 基于anfiss的纳米级gaa - tfet降解老化效应研究
T. Bentrcia, F. Djeffal, H. Ferhati
The degradation aspects associated with Tunneling Field-Effect Transistors (TFETs) have become an active research area that needs further development. In this work, a new computation methodology based on an adaptive neuro-fuzzy inference system (ANFIS) is proposed for predicting the switching capabilities of Gate All Around (GAA) TFET devices including interface trap effects. Accordingly, several performance criteria including the current ratio (Ion/Ioff) ratio and the swing factor (S) are considered to analyze the device degradation phenomenon. ATLAS 2-D numerical simulator has been exploited for the elaboration of the training dataset of the neuro-fuzzy system. Based on the obtained outcomes, the proposed approach can provide new pathways for accurately predicting the performance of nanoelectronic circuits based on GAA-TFETs including the ageing effects.
与隧道场效应晶体管(tfet)相关的退化问题已成为一个活跃的研究领域,需要进一步发展。在这项工作中,提出了一种基于自适应神经模糊推理系统(ANFIS)的新的计算方法,用于预测包括界面陷阱效应在内的栅极全环(GAA) TFET器件的开关能力。因此,考虑了电流比(Ion/Ioff)比和摆幅因子(S)等几个性能标准来分析器件退化现象。利用ATLAS二维数值模拟器对神经模糊系统的训练数据集进行了细化。基于所获得的结果,所提出的方法可以为准确预测gaa - tfet纳米电子电路的性能(包括老化效应)提供新的途径。
{"title":"An ANFIS-based Computation to Study the Degradation-related Ageing effects in Nanoscale GAA-TFETs","authors":"T. Bentrcia, F. Djeffal, H. Ferhati","doi":"10.1145/3447568.3448546","DOIUrl":"https://doi.org/10.1145/3447568.3448546","url":null,"abstract":"The degradation aspects associated with Tunneling Field-Effect Transistors (TFETs) have become an active research area that needs further development. In this work, a new computation methodology based on an adaptive neuro-fuzzy inference system (ANFIS) is proposed for predicting the switching capabilities of Gate All Around (GAA) TFET devices including interface trap effects. Accordingly, several performance criteria including the current ratio (Ion/Ioff) ratio and the swing factor (S) are considered to analyze the device degradation phenomenon. ATLAS 2-D numerical simulator has been exploited for the elaboration of the training dataset of the neuro-fuzzy system. Based on the obtained outcomes, the proposed approach can provide new pathways for accurately predicting the performance of nanoelectronic circuits based on GAA-TFETs including the ageing effects.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-Driven approach to Cyber Risk Analysis in Industry 4.0 工业4.0网络风险分析的模型驱动方法
A. Capodieci, L. Mainetti, F. Dipietrangelo
In the contest of industrial process and automation, and in particular in the so-called Industry 4.0, the now intensive application of control systems in interconnected networks has led to an increase in unexpected threats to information security for supervisory control and data acquisition (SCADA) and control systems distributed (DCS). Risk assessment is essential and the its common methods such as HHM, IIM, and RFRM have been successfully applied to SCADA systems. Another equally important need is the use of metrics and methodologies to analyze the risk (PRA- probability risk analysis), which includes methods such as FTA, ETA and FEMA and HAZOP. The goal of these methods is, in general, to determine the impact of a problem on the process plant and the risk reduction associated with a particular countermeasure. In this paper we present a methodology named CRiSP (Cyber Risk Analysis in Industrial Process System Environment). CRiSP defines an approach to analyze the risk related to the manipulation of a single element of the plant and to analyze the consequence to entire plant and in the same time to a restricted portion.
在工业过程和自动化的竞争中,特别是在所谓的工业4.0中,现在控制系统在互联网络中的大量应用导致对监控和数据采集(SCADA)和分布式控制系统(DCS)的信息安全的意外威胁增加。风险评估是关键,其常用方法如HHM、IIM和RFRM已成功应用于SCADA系统。另一个同样重要的需求是使用度量和方法来分析风险(PRA-概率风险分析),其中包括FTA、ETA、FEMA和HAZOP等方法。一般来说,这些方法的目标是确定问题对工艺工厂的影响,以及与特定对策相关的风险降低。在本文中,我们提出了一种名为CRiSP(工业过程系统环境中的网络风险分析)的方法。CRiSP定义了一种方法来分析与工厂单个元素操作相关的风险,并分析对整个工厂的影响,同时对受限制的部分的影响。
{"title":"Model-Driven approach to Cyber Risk Analysis in Industry 4.0","authors":"A. Capodieci, L. Mainetti, F. Dipietrangelo","doi":"10.1145/3447568.3448541","DOIUrl":"https://doi.org/10.1145/3447568.3448541","url":null,"abstract":"In the contest of industrial process and automation, and in particular in the so-called Industry 4.0, the now intensive application of control systems in interconnected networks has led to an increase in unexpected threats to information security for supervisory control and data acquisition (SCADA) and control systems distributed (DCS). Risk assessment is essential and the its common methods such as HHM, IIM, and RFRM have been successfully applied to SCADA systems. Another equally important need is the use of metrics and methodologies to analyze the risk (PRA- probability risk analysis), which includes methods such as FTA, ETA and FEMA and HAZOP. The goal of these methods is, in general, to determine the impact of a problem on the process plant and the risk reduction associated with a particular countermeasure. In this paper we present a methodology named CRiSP (Cyber Risk Analysis in Industrial Process System Environment). CRiSP defines an approach to analyze the risk related to the manipulation of a single element of the plant and to analyze the consequence to entire plant and in the same time to a restricted portion.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Numerical Study of the Aerodynamic Performance of a Stationary H-Darrieus-Type Vertical-Axis Wind Turbine 固定式h -达里厄型垂直轴风力机气动性能数值研究
F. Meguellati, F. Ferroudji, Bellaoui Mebrouk
This paper presents a computational study of aH-Darrieus vertical axis wind turbine with three straight blades by using ANSYS Fluent 6.3.26 software. Two dimensional (2D) CFD simulations were carried out in order to determine the effect of solidity on the aerodynamic performance (statictorque coefficientand static pressure) for wind turbine. The simulation results with the Realizable k-ε turbulence model are presented for three configurations of the blade chord length with 0.47 m, 0.53 m and 0.6 m. The results show that thesmall blade chord length presents a lower static torque coefficient, which increases with the increasing of the blade chord length.1
本文利用ANSYS Fluent 6.3.26软件对aH-Darrieus型三直叶垂直轴风力机进行了计算研究。为了确定固体度对风力机气动性能(静扭矩系数和静压)的影响,进行了二维CFD仿真。给出了Realizable k-ε湍流模型对0.47 m、0.53 m和0.6 m三种桨叶弦长构型的仿真结果。结果表明:叶片弦长越小,静扭矩系数越小,静扭矩系数随弦长增大而增大
{"title":"Numerical Study of the Aerodynamic Performance of a Stationary H-Darrieus-Type Vertical-Axis Wind Turbine","authors":"F. Meguellati, F. Ferroudji, Bellaoui Mebrouk","doi":"10.1145/3447568.3448554","DOIUrl":"https://doi.org/10.1145/3447568.3448554","url":null,"abstract":"This paper presents a computational study of aH-Darrieus vertical axis wind turbine with three straight blades by using ANSYS Fluent 6.3.26 software. Two dimensional (2D) CFD simulations were carried out in order to determine the effect of solidity on the aerodynamic performance (statictorque coefficientand static pressure) for wind turbine. The simulation results with the Realizable k-ε turbulence model are presented for three configurations of the blade chord length with 0.47 m, 0.53 m and 0.6 m. The results show that thesmall blade chord length presents a lower static torque coefficient, which increases with the increasing of the blade chord length.1","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129557302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE EMERGENCE OF DIGITAL DISTANCE LEARNING 数字远程教育的出现
Sean B. Eom, Mohamed Ridda Laouar
The introduction of mobile phones and devices into e-learning contexts over the past two decades has significantly transformed the nature of distance learning significantly. Now, a new term is needed for e-learning that accurately reflects the current state of university online education where 67 percent of fully online students used mobile devices to complete some of their online coursework. This paper aims to suggest the new term digital distance learning (DDL) should be used instead of e-learning.
在过去的二十年中,移动电话和设备进入电子学习环境,极大地改变了远程学习的性质。现在,电子学习需要一个新的术语来准确地反映大学在线教育的现状,67%的完全在线的学生使用移动设备来完成他们的一些在线课程。本文旨在建议使用数字远程学习(DDL)这个新名词来代替e-learning。
{"title":"THE EMERGENCE OF DIGITAL DISTANCE LEARNING","authors":"Sean B. Eom, Mohamed Ridda Laouar","doi":"10.1145/3447568.3448524","DOIUrl":"https://doi.org/10.1145/3447568.3448524","url":null,"abstract":"The introduction of mobile phones and devices into e-learning contexts over the past two decades has significantly transformed the nature of distance learning significantly. Now, a new term is needed for e-learning that accurately reflects the current state of university online education where 67 percent of fully online students used mobile devices to complete some of their online coursework. This paper aims to suggest the new term digital distance learning (DDL) should be used instead of e-learning.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115118489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On an Empirical Study: Face Recognition using Machine Learning and Deep Learning Techniques 基于机器学习和深度学习技术的人脸识别实证研究
Chahreddine Medjahed, Freha Mezzoudj, Abdellatif Rahmoun, C. Charrier
Face recognition is an interesting topic in biometrics research, which can be divided into two sub-problems: face detection followed by face recognition. The application of face recognition in real life situations and pose variations still remains a challenge. The aim of this paper is to evaluate and compare various systems of face recognition based on speed and high accuracy Machine Learning algorithms. The Support Vectors Machine is a strong algorithm for mutli-classification. The feed- forward Neural Network is a popular one. Recently, Deep Learning is becoming a very important subset of machine learning due to its high level of performance across many types of data, in particular using Convolutional Neural Networks (CNNs). A large colored Face Database is used to evaluate these three proposed and adapted architectures. The results are competitive.
人脸识别是生物识别研究中的一个有趣的课题,它可以分为两个子问题:人脸检测和人脸识别。人脸识别在现实生活中的应用和姿态变化仍然是一个挑战。本文的目的是评估和比较基于速度和高精度机器学习算法的各种人脸识别系统。支持向量机是一种强大的多分类算法。前馈神经网络是一种流行的神经网络。最近,深度学习正在成为机器学习的一个非常重要的子集,因为它在许多类型的数据上具有高水平的性能,特别是使用卷积神经网络(cnn)。使用一个大型彩色人脸数据库来评估这三种提出的和调整的架构。结果是竞争性的。
{"title":"On an Empirical Study: Face Recognition using Machine Learning and Deep Learning Techniques","authors":"Chahreddine Medjahed, Freha Mezzoudj, Abdellatif Rahmoun, C. Charrier","doi":"10.1145/3447568.3448521","DOIUrl":"https://doi.org/10.1145/3447568.3448521","url":null,"abstract":"Face recognition is an interesting topic in biometrics research, which can be divided into two sub-problems: face detection followed by face recognition. The application of face recognition in real life situations and pose variations still remains a challenge. The aim of this paper is to evaluate and compare various systems of face recognition based on speed and high accuracy Machine Learning algorithms. The Support Vectors Machine is a strong algorithm for mutli-classification. The feed- forward Neural Network is a popular one. Recently, Deep Learning is becoming a very important subset of machine learning due to its high level of performance across many types of data, in particular using Convolutional Neural Networks (CNNs). A large colored Face Database is used to evaluate these three proposed and adapted architectures. The results are competitive.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Collection Data Approach to Crisis Situation Based on Ontologies 基于本体的危机态势收集数据方法研究
Asma Hadj-Mbarek, A. Maalel
Disasters bring unforeseen situations to the public, requiring a quick and immediate response from official organizations. During these periods, access to rapidly changing information plays an important role in decision-making. However, the transmissions of information hinder this task and ultimately delay response operations. Social networks such as Twitter and Facebook create new opportunities to address this type of real-world problems. The involved actors use these channels at the time of crisis to share various information, whether they are requesting assistance, or describing an event. In this article, we will present the first steps of validation of a collect data approach from Twitter. This approach is based on a domain ontology.
灾难给公众带来无法预料的情况,需要官方机构迅速作出反应。在这些时期,获取快速变化的信息在决策中起着重要作用。然而,信息的传输阻碍了这项任务,并最终延迟了响应操作。Twitter和Facebook等社交网络为解决这类现实问题创造了新的机会。在危机发生时,相关的参与者使用这些渠道来共享各种信息,无论他们是在请求援助,还是在描述事件。在本文中,我们将介绍验证从Twitter收集数据方法的第一步。这种方法是基于领域本体的。
{"title":"Towards a Collection Data Approach to Crisis Situation Based on Ontologies","authors":"Asma Hadj-Mbarek, A. Maalel","doi":"10.1145/3447568.3448526","DOIUrl":"https://doi.org/10.1145/3447568.3448526","url":null,"abstract":"Disasters bring unforeseen situations to the public, requiring a quick and immediate response from official organizations. During these periods, access to rapidly changing information plays an important role in decision-making. However, the transmissions of information hinder this task and ultimately delay response operations. Social networks such as Twitter and Facebook create new opportunities to address this type of real-world problems. The involved actors use these channels at the time of crisis to share various information, whether they are requesting assistance, or describing an event. In this article, we will present the first steps of validation of a collect data approach from Twitter. This approach is based on a domain ontology.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Segmentation and detection of Human Face 人脸分割与检测
Nizar Zaghden, S. Ammar, M. Neji
In this paper, we propose a system that classify Human faces, which are issued from video sequences captures. Segmentation of moving objects from video sequences plays an important role in many fields of computer science. We present some background subtraction approaches, then we compare their results. The DeepSphere" is employed in this paper to perform foreground objects detection and segmentation in video sequences. We employ the Deeplearning approach and the viola& Jones algorithms to segment faces from images. Finally, we classify the obtained faces using fractal dimensions.
本文提出了一种基于视频序列的人脸分类系统。从视频序列中分割运动目标在计算机科学的许多领域中起着重要的作用。提出了几种背景减法,并对其结果进行了比较。本文利用DeepSphere对视频序列进行前景目标的检测和分割。我们采用深度学习方法和viola&jones算法从图像中分割人脸。最后,利用分形维数对得到的人脸进行分类。
{"title":"Segmentation and detection of Human Face","authors":"Nizar Zaghden, S. Ammar, M. Neji","doi":"10.1145/3447568.3448522","DOIUrl":"https://doi.org/10.1145/3447568.3448522","url":null,"abstract":"In this paper, we propose a system that classify Human faces, which are issued from video sequences captures. Segmentation of moving objects from video sequences plays an important role in many fields of computer science. We present some background subtraction approaches, then we compare their results. The DeepSphere\" is employed in this paper to perform foreground objects detection and segmentation in video sequences. We employ the Deeplearning approach and the viola& Jones algorithms to segment faces from images. Finally, we classify the obtained faces using fractal dimensions.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132867235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using a High-Level Conceptual Model as a Support for the Generalized World Entities (GWEs) Paradigm 使用高级概念模型支持广义世界实体(gwe)范式
G. P. Zarri
This paper concerns the Generalized World Entities (GWEs) paradigm, an extension of the ordinary IoT/WoT (Internet of Things/Web of Things) approach. GWEs offer a unified way to seamlessly model i) conceptual representations of physical objects, humans, robots and low-level events and ii) higher level of abstractions corresponding to structured situations/behaviors implying mutual relationships among low level entities. The GWEs approach is currently implemented in terms of NKRL, the "Narrative Knowledge Representation Language", which is both a Knowledge Representation language and a Computer Science environment. It is expected to represent a significant contribution with respect to bridge the gap between the recognition of entities at sensor level and their description/management at conceptual level.
本文关注的是广义世界实体(gwe)范式,这是普通IoT/WoT(物联网/物联网)方法的扩展。gwe提供了一种统一的方式来无缝地建模:1)物理对象、人类、机器人和低级事件的概念表示;2)与暗示低级实体之间相互关系的结构化情况/行为相对应的高级抽象。ges方法目前在NKRL(叙述性知识表示语言)方面实现,NKRL既是一种知识表示语言,也是一种计算机科学环境。预计它将在弥合传感器一级实体识别与概念一级实体描述/管理之间的差距方面作出重大贡献。
{"title":"Using a High-Level Conceptual Model as a Support for the Generalized World Entities (GWEs) Paradigm","authors":"G. P. Zarri","doi":"10.1145/3447568.3448547","DOIUrl":"https://doi.org/10.1145/3447568.3448547","url":null,"abstract":"This paper concerns the Generalized World Entities (GWEs) paradigm, an extension of the ordinary IoT/WoT (Internet of Things/Web of Things) approach. GWEs offer a unified way to seamlessly model i) conceptual representations of physical objects, humans, robots and low-level events and ii) higher level of abstractions corresponding to structured situations/behaviors implying mutual relationships among low level entities. The GWEs approach is currently implemented in terms of NKRL, the \"Narrative Knowledge Representation Language\", which is both a Knowledge Representation language and a Computer Science environment. It is expected to represent a significant contribution with respect to bridge the gap between the recognition of entities at sensor level and their description/management at conceptual level.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Refactoring the UX of a popular voice application 重构流行语音应用程序的用户体验
Adriana Caione, A. Fiore, L. Mainetti, Luigi Manco, R. Vergallo
Commercial voice services like Google Assistant and Amazon Alexa are reaching extreme popularity. While Natural Language Processing (NLP) and Artificial Intelligence (AI) techniques -- applied to the aural channel -- deliver high quality voice recognition, the voice channel still lacks a good methodology to design user experiences. For instance, The Amazon Alexa team suggests gathering the information model of Alexa skills by talking with test users behind a curtain, pretending to be the machine. In our opinion, such kind of bottom-up strategy is not effective because it overfits the UX to very specific cases. A top-down approach could provide the right answer also in unseen and unpredictable situations instead. Our work aims to propose a novel model driven approach that allows authors to design from scratch the overall vocal UX as well as rethink existing visual UX before porting them to the aural channel. Our approach, which is inherently top-down, is based on Aural IDM, an UX design method thought for screen readers modelling in the early '00. In this paper we've refactored the Spotify Alexa skill to demonstrate the validity of Aural IDM for designing vocal UXs. The experience of Spotify on Alexa is quite primordial and does not reflect the richness of the desktop app. A prototype is currently under development, and the result of a comparison between the AS-IS and TO-BE voice skill will be subject of a future work.
谷歌Assistant和亚马逊Alexa等商业语音服务正变得非常受欢迎。虽然应用于听觉通道的自然语言处理(NLP)和人工智能(AI)技术提供了高质量的语音识别,但语音通道仍然缺乏设计用户体验的良好方法。例如,亚马逊Alexa团队建议,通过在幕后与测试用户交谈,假装是机器,来收集Alexa技能的信息模型。在我们看来,这种自底向上的策略是无效的,因为它将用户体验过度适应于非常具体的情况。自上而下的方法也可以在看不见和不可预测的情况下提供正确的答案。我们的工作旨在提出一种新颖的模型驱动方法,允许作者从头开始设计整个声音UX,并在将其移植到听觉通道之前重新思考现有的视觉UX。我们的方法,本质上是自上而下的,是基于听觉IDM的,这是一种在2000年初为屏幕阅读器建模而设计的用户体验设计方法。在本文中,我们重构了Spotify Alexa技能,以证明听觉IDM在设计声音ux时的有效性。Spotify在Alexa上的体验是相当原始的,并不能反映桌面应用程序的丰富性。一个原型目前正在开发中,目前和将来的语音技能之间的比较结果将是未来工作的主题。
{"title":"Refactoring the UX of a popular voice application","authors":"Adriana Caione, A. Fiore, L. Mainetti, Luigi Manco, R. Vergallo","doi":"10.1145/3447568.3448538","DOIUrl":"https://doi.org/10.1145/3447568.3448538","url":null,"abstract":"Commercial voice services like Google Assistant and Amazon Alexa are reaching extreme popularity. While Natural Language Processing (NLP) and Artificial Intelligence (AI) techniques -- applied to the aural channel -- deliver high quality voice recognition, the voice channel still lacks a good methodology to design user experiences. For instance, The Amazon Alexa team suggests gathering the information model of Alexa skills by talking with test users behind a curtain, pretending to be the machine. In our opinion, such kind of bottom-up strategy is not effective because it overfits the UX to very specific cases. A top-down approach could provide the right answer also in unseen and unpredictable situations instead. Our work aims to propose a novel model driven approach that allows authors to design from scratch the overall vocal UX as well as rethink existing visual UX before porting them to the aural channel. Our approach, which is inherently top-down, is based on Aural IDM, an UX design method thought for screen readers modelling in the early '00. In this paper we've refactored the Spotify Alexa skill to demonstrate the validity of Aural IDM for designing vocal UXs. The experience of Spotify on Alexa is quite primordial and does not reflect the richness of the desktop app. A prototype is currently under development, and the result of a comparison between the AS-IS and TO-BE voice skill will be subject of a future work.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123449950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Off-line Signature Verification Using Multidirectional Run-Length Features 使用多向跑长特征的离线签名验证
Walid Bouamra, Moisés Díaz, M. A. Ferrer-Ballester, B. Nini
Run-length features have shown its effectivity in off-line signature verification. Configurations of these handcrafted features include four direction-based features. In this paper, we propose to add further spatial information of the signature to the standard run-length features. Such information is worked out in two stages: firstly, beyond classical four directions, more directions are studied. Secondly, improving the knowledge of each direction by combining the information of the neighbor directions. This new configuration has been used in two classifiers, one based on Euclidean distance and another based on a one-class support vector machine. We outperformed previous performances with the proposed configuration regarding the last ICFHR 2018 competition on Thai student signatures and GPDS-960 signature database.
运行长度特征在离线签名验证中已显示出其有效性。这些手工功能的配置包括四个基于方向的功能。在本文中,我们建议在标准游程特征中增加更多的签名空间信息。这些信息分两个阶段得到:首先,在经典的四个方向之外,研究更多的方向。其次,结合相邻方向的信息,提高对各个方向的认识。这种新的配置已经在两个分类器中使用,一个基于欧几里得距离,另一个基于单类支持向量机。在ICFHR 2018上一场关于泰国学生签名和GPDS-960签名数据库的比赛中,我们提出的配置优于以往的表现。
{"title":"Off-line Signature Verification Using Multidirectional Run-Length Features","authors":"Walid Bouamra, Moisés Díaz, M. A. Ferrer-Ballester, B. Nini","doi":"10.1145/3447568.3448551","DOIUrl":"https://doi.org/10.1145/3447568.3448551","url":null,"abstract":"Run-length features have shown its effectivity in off-line signature verification. Configurations of these handcrafted features include four direction-based features. In this paper, we propose to add further spatial information of the signature to the standard run-length features. Such information is worked out in two stages: firstly, beyond classical four directions, more directions are studied. Secondly, improving the knowledge of each direction by combining the information of the neighbor directions. This new configuration has been used in two classifiers, one based on Euclidean distance and another based on a one-class support vector machine. We outperformed previous performances with the proposed configuration regarding the last ICFHR 2018 competition on Thai student signatures and GPDS-960 signature database.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 10th International Conference on Information Systems and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1