The degradation aspects associated with Tunneling Field-Effect Transistors (TFETs) have become an active research area that needs further development. In this work, a new computation methodology based on an adaptive neuro-fuzzy inference system (ANFIS) is proposed for predicting the switching capabilities of Gate All Around (GAA) TFET devices including interface trap effects. Accordingly, several performance criteria including the current ratio (Ion/Ioff) ratio and the swing factor (S) are considered to analyze the device degradation phenomenon. ATLAS 2-D numerical simulator has been exploited for the elaboration of the training dataset of the neuro-fuzzy system. Based on the obtained outcomes, the proposed approach can provide new pathways for accurately predicting the performance of nanoelectronic circuits based on GAA-TFETs including the ageing effects.
{"title":"An ANFIS-based Computation to Study the Degradation-related Ageing effects in Nanoscale GAA-TFETs","authors":"T. Bentrcia, F. Djeffal, H. Ferhati","doi":"10.1145/3447568.3448546","DOIUrl":"https://doi.org/10.1145/3447568.3448546","url":null,"abstract":"The degradation aspects associated with Tunneling Field-Effect Transistors (TFETs) have become an active research area that needs further development. In this work, a new computation methodology based on an adaptive neuro-fuzzy inference system (ANFIS) is proposed for predicting the switching capabilities of Gate All Around (GAA) TFET devices including interface trap effects. Accordingly, several performance criteria including the current ratio (Ion/Ioff) ratio and the swing factor (S) are considered to analyze the device degradation phenomenon. ATLAS 2-D numerical simulator has been exploited for the elaboration of the training dataset of the neuro-fuzzy system. Based on the obtained outcomes, the proposed approach can provide new pathways for accurately predicting the performance of nanoelectronic circuits based on GAA-TFETs including the ageing effects.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the contest of industrial process and automation, and in particular in the so-called Industry 4.0, the now intensive application of control systems in interconnected networks has led to an increase in unexpected threats to information security for supervisory control and data acquisition (SCADA) and control systems distributed (DCS). Risk assessment is essential and the its common methods such as HHM, IIM, and RFRM have been successfully applied to SCADA systems. Another equally important need is the use of metrics and methodologies to analyze the risk (PRA- probability risk analysis), which includes methods such as FTA, ETA and FEMA and HAZOP. The goal of these methods is, in general, to determine the impact of a problem on the process plant and the risk reduction associated with a particular countermeasure. In this paper we present a methodology named CRiSP (Cyber Risk Analysis in Industrial Process System Environment). CRiSP defines an approach to analyze the risk related to the manipulation of a single element of the plant and to analyze the consequence to entire plant and in the same time to a restricted portion.
{"title":"Model-Driven approach to Cyber Risk Analysis in Industry 4.0","authors":"A. Capodieci, L. Mainetti, F. Dipietrangelo","doi":"10.1145/3447568.3448541","DOIUrl":"https://doi.org/10.1145/3447568.3448541","url":null,"abstract":"In the contest of industrial process and automation, and in particular in the so-called Industry 4.0, the now intensive application of control systems in interconnected networks has led to an increase in unexpected threats to information security for supervisory control and data acquisition (SCADA) and control systems distributed (DCS). Risk assessment is essential and the its common methods such as HHM, IIM, and RFRM have been successfully applied to SCADA systems. Another equally important need is the use of metrics and methodologies to analyze the risk (PRA- probability risk analysis), which includes methods such as FTA, ETA and FEMA and HAZOP. The goal of these methods is, in general, to determine the impact of a problem on the process plant and the risk reduction associated with a particular countermeasure. In this paper we present a methodology named CRiSP (Cyber Risk Analysis in Industrial Process System Environment). CRiSP defines an approach to analyze the risk related to the manipulation of a single element of the plant and to analyze the consequence to entire plant and in the same time to a restricted portion.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a computational study of aH-Darrieus vertical axis wind turbine with three straight blades by using ANSYS Fluent 6.3.26 software. Two dimensional (2D) CFD simulations were carried out in order to determine the effect of solidity on the aerodynamic performance (statictorque coefficientand static pressure) for wind turbine. The simulation results with the Realizable k-ε turbulence model are presented for three configurations of the blade chord length with 0.47 m, 0.53 m and 0.6 m. The results show that thesmall blade chord length presents a lower static torque coefficient, which increases with the increasing of the blade chord length.1
{"title":"Numerical Study of the Aerodynamic Performance of a Stationary H-Darrieus-Type Vertical-Axis Wind Turbine","authors":"F. Meguellati, F. Ferroudji, Bellaoui Mebrouk","doi":"10.1145/3447568.3448554","DOIUrl":"https://doi.org/10.1145/3447568.3448554","url":null,"abstract":"This paper presents a computational study of aH-Darrieus vertical axis wind turbine with three straight blades by using ANSYS Fluent 6.3.26 software. Two dimensional (2D) CFD simulations were carried out in order to determine the effect of solidity on the aerodynamic performance (statictorque coefficientand static pressure) for wind turbine. The simulation results with the Realizable k-ε turbulence model are presented for three configurations of the blade chord length with 0.47 m, 0.53 m and 0.6 m. The results show that thesmall blade chord length presents a lower static torque coefficient, which increases with the increasing of the blade chord length.1","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129557302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The introduction of mobile phones and devices into e-learning contexts over the past two decades has significantly transformed the nature of distance learning significantly. Now, a new term is needed for e-learning that accurately reflects the current state of university online education where 67 percent of fully online students used mobile devices to complete some of their online coursework. This paper aims to suggest the new term digital distance learning (DDL) should be used instead of e-learning.
{"title":"THE EMERGENCE OF DIGITAL DISTANCE LEARNING","authors":"Sean B. Eom, Mohamed Ridda Laouar","doi":"10.1145/3447568.3448524","DOIUrl":"https://doi.org/10.1145/3447568.3448524","url":null,"abstract":"The introduction of mobile phones and devices into e-learning contexts over the past two decades has significantly transformed the nature of distance learning significantly. Now, a new term is needed for e-learning that accurately reflects the current state of university online education where 67 percent of fully online students used mobile devices to complete some of their online coursework. This paper aims to suggest the new term digital distance learning (DDL) should be used instead of e-learning.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115118489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chahreddine Medjahed, Freha Mezzoudj, Abdellatif Rahmoun, C. Charrier
Face recognition is an interesting topic in biometrics research, which can be divided into two sub-problems: face detection followed by face recognition. The application of face recognition in real life situations and pose variations still remains a challenge. The aim of this paper is to evaluate and compare various systems of face recognition based on speed and high accuracy Machine Learning algorithms. The Support Vectors Machine is a strong algorithm for mutli-classification. The feed- forward Neural Network is a popular one. Recently, Deep Learning is becoming a very important subset of machine learning due to its high level of performance across many types of data, in particular using Convolutional Neural Networks (CNNs). A large colored Face Database is used to evaluate these three proposed and adapted architectures. The results are competitive.
{"title":"On an Empirical Study: Face Recognition using Machine Learning and Deep Learning Techniques","authors":"Chahreddine Medjahed, Freha Mezzoudj, Abdellatif Rahmoun, C. Charrier","doi":"10.1145/3447568.3448521","DOIUrl":"https://doi.org/10.1145/3447568.3448521","url":null,"abstract":"Face recognition is an interesting topic in biometrics research, which can be divided into two sub-problems: face detection followed by face recognition. The application of face recognition in real life situations and pose variations still remains a challenge. The aim of this paper is to evaluate and compare various systems of face recognition based on speed and high accuracy Machine Learning algorithms. The Support Vectors Machine is a strong algorithm for mutli-classification. The feed- forward Neural Network is a popular one. Recently, Deep Learning is becoming a very important subset of machine learning due to its high level of performance across many types of data, in particular using Convolutional Neural Networks (CNNs). A large colored Face Database is used to evaluate these three proposed and adapted architectures. The results are competitive.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Disasters bring unforeseen situations to the public, requiring a quick and immediate response from official organizations. During these periods, access to rapidly changing information plays an important role in decision-making. However, the transmissions of information hinder this task and ultimately delay response operations. Social networks such as Twitter and Facebook create new opportunities to address this type of real-world problems. The involved actors use these channels at the time of crisis to share various information, whether they are requesting assistance, or describing an event. In this article, we will present the first steps of validation of a collect data approach from Twitter. This approach is based on a domain ontology.
{"title":"Towards a Collection Data Approach to Crisis Situation Based on Ontologies","authors":"Asma Hadj-Mbarek, A. Maalel","doi":"10.1145/3447568.3448526","DOIUrl":"https://doi.org/10.1145/3447568.3448526","url":null,"abstract":"Disasters bring unforeseen situations to the public, requiring a quick and immediate response from official organizations. During these periods, access to rapidly changing information plays an important role in decision-making. However, the transmissions of information hinder this task and ultimately delay response operations. Social networks such as Twitter and Facebook create new opportunities to address this type of real-world problems. The involved actors use these channels at the time of crisis to share various information, whether they are requesting assistance, or describing an event. In this article, we will present the first steps of validation of a collect data approach from Twitter. This approach is based on a domain ontology.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a system that classify Human faces, which are issued from video sequences captures. Segmentation of moving objects from video sequences plays an important role in many fields of computer science. We present some background subtraction approaches, then we compare their results. The DeepSphere" is employed in this paper to perform foreground objects detection and segmentation in video sequences. We employ the Deeplearning approach and the viola& Jones algorithms to segment faces from images. Finally, we classify the obtained faces using fractal dimensions.
{"title":"Segmentation and detection of Human Face","authors":"Nizar Zaghden, S. Ammar, M. Neji","doi":"10.1145/3447568.3448522","DOIUrl":"https://doi.org/10.1145/3447568.3448522","url":null,"abstract":"In this paper, we propose a system that classify Human faces, which are issued from video sequences captures. Segmentation of moving objects from video sequences plays an important role in many fields of computer science. We present some background subtraction approaches, then we compare their results. The DeepSphere\" is employed in this paper to perform foreground objects detection and segmentation in video sequences. We employ the Deeplearning approach and the viola& Jones algorithms to segment faces from images. Finally, we classify the obtained faces using fractal dimensions.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132867235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper concerns the Generalized World Entities (GWEs) paradigm, an extension of the ordinary IoT/WoT (Internet of Things/Web of Things) approach. GWEs offer a unified way to seamlessly model i) conceptual representations of physical objects, humans, robots and low-level events and ii) higher level of abstractions corresponding to structured situations/behaviors implying mutual relationships among low level entities. The GWEs approach is currently implemented in terms of NKRL, the "Narrative Knowledge Representation Language", which is both a Knowledge Representation language and a Computer Science environment. It is expected to represent a significant contribution with respect to bridge the gap between the recognition of entities at sensor level and their description/management at conceptual level.
{"title":"Using a High-Level Conceptual Model as a Support for the Generalized World Entities (GWEs) Paradigm","authors":"G. P. Zarri","doi":"10.1145/3447568.3448547","DOIUrl":"https://doi.org/10.1145/3447568.3448547","url":null,"abstract":"This paper concerns the Generalized World Entities (GWEs) paradigm, an extension of the ordinary IoT/WoT (Internet of Things/Web of Things) approach. GWEs offer a unified way to seamlessly model i) conceptual representations of physical objects, humans, robots and low-level events and ii) higher level of abstractions corresponding to structured situations/behaviors implying mutual relationships among low level entities. The GWEs approach is currently implemented in terms of NKRL, the \"Narrative Knowledge Representation Language\", which is both a Knowledge Representation language and a Computer Science environment. It is expected to represent a significant contribution with respect to bridge the gap between the recognition of entities at sensor level and their description/management at conceptual level.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adriana Caione, A. Fiore, L. Mainetti, Luigi Manco, R. Vergallo
Commercial voice services like Google Assistant and Amazon Alexa are reaching extreme popularity. While Natural Language Processing (NLP) and Artificial Intelligence (AI) techniques -- applied to the aural channel -- deliver high quality voice recognition, the voice channel still lacks a good methodology to design user experiences. For instance, The Amazon Alexa team suggests gathering the information model of Alexa skills by talking with test users behind a curtain, pretending to be the machine. In our opinion, such kind of bottom-up strategy is not effective because it overfits the UX to very specific cases. A top-down approach could provide the right answer also in unseen and unpredictable situations instead. Our work aims to propose a novel model driven approach that allows authors to design from scratch the overall vocal UX as well as rethink existing visual UX before porting them to the aural channel. Our approach, which is inherently top-down, is based on Aural IDM, an UX design method thought for screen readers modelling in the early '00. In this paper we've refactored the Spotify Alexa skill to demonstrate the validity of Aural IDM for designing vocal UXs. The experience of Spotify on Alexa is quite primordial and does not reflect the richness of the desktop app. A prototype is currently under development, and the result of a comparison between the AS-IS and TO-BE voice skill will be subject of a future work.
{"title":"Refactoring the UX of a popular voice application","authors":"Adriana Caione, A. Fiore, L. Mainetti, Luigi Manco, R. Vergallo","doi":"10.1145/3447568.3448538","DOIUrl":"https://doi.org/10.1145/3447568.3448538","url":null,"abstract":"Commercial voice services like Google Assistant and Amazon Alexa are reaching extreme popularity. While Natural Language Processing (NLP) and Artificial Intelligence (AI) techniques -- applied to the aural channel -- deliver high quality voice recognition, the voice channel still lacks a good methodology to design user experiences. For instance, The Amazon Alexa team suggests gathering the information model of Alexa skills by talking with test users behind a curtain, pretending to be the machine. In our opinion, such kind of bottom-up strategy is not effective because it overfits the UX to very specific cases. A top-down approach could provide the right answer also in unseen and unpredictable situations instead. Our work aims to propose a novel model driven approach that allows authors to design from scratch the overall vocal UX as well as rethink existing visual UX before porting them to the aural channel. Our approach, which is inherently top-down, is based on Aural IDM, an UX design method thought for screen readers modelling in the early '00. In this paper we've refactored the Spotify Alexa skill to demonstrate the validity of Aural IDM for designing vocal UXs. The experience of Spotify on Alexa is quite primordial and does not reflect the richness of the desktop app. A prototype is currently under development, and the result of a comparison between the AS-IS and TO-BE voice skill will be subject of a future work.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123449950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Walid Bouamra, Moisés Díaz, M. A. Ferrer-Ballester, B. Nini
Run-length features have shown its effectivity in off-line signature verification. Configurations of these handcrafted features include four direction-based features. In this paper, we propose to add further spatial information of the signature to the standard run-length features. Such information is worked out in two stages: firstly, beyond classical four directions, more directions are studied. Secondly, improving the knowledge of each direction by combining the information of the neighbor directions. This new configuration has been used in two classifiers, one based on Euclidean distance and another based on a one-class support vector machine. We outperformed previous performances with the proposed configuration regarding the last ICFHR 2018 competition on Thai student signatures and GPDS-960 signature database.
{"title":"Off-line Signature Verification Using Multidirectional Run-Length Features","authors":"Walid Bouamra, Moisés Díaz, M. A. Ferrer-Ballester, B. Nini","doi":"10.1145/3447568.3448551","DOIUrl":"https://doi.org/10.1145/3447568.3448551","url":null,"abstract":"Run-length features have shown its effectivity in off-line signature verification. Configurations of these handcrafted features include four direction-based features. In this paper, we propose to add further spatial information of the signature to the standard run-length features. Such information is worked out in two stages: firstly, beyond classical four directions, more directions are studied. Secondly, improving the knowledge of each direction by combining the information of the neighbor directions. This new configuration has been used in two classifiers, one based on Euclidean distance and another based on a one-class support vector machine. We outperformed previous performances with the proposed configuration regarding the last ICFHR 2018 competition on Thai student signatures and GPDS-960 signature database.","PeriodicalId":335307,"journal":{"name":"Proceedings of the 10th International Conference on Information Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}