首页 > 最新文献

2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
A Survey: Security Threats and Countermeasures in Software Defined Networking 软件定义网络中的安全威胁与对策综述
A. Mubarakali, A. Alqahtani
Nowadays, the Software-Defined Networking (SDN) is the most important part of research work. SDN offers numerous benefits including on-demand provisioning, automated load balancing, streamlined physical infrastructure and the ability to scale network resources as per the need. SDN has the ability to manage network traffic through software and the administrator gain a much greater degree of control, which provides the ability to change network rules on the fly. In the near future, SDN can replace traditional networking. At the similar time, suspicious awareness necessitates being paid to protection at the early planning phase. In the paper majorly concentrates on the protection attributes of SDN. It starts by examining the architecture of SDN. Along with the design structure, we design the probable protection faults in SDN. Finally discuss various threats and its countermeasures based on three-layer architecture, i.e. data forwarding layer, the control layer, and the application layer. Additionally, those different defensive techniques are highlighted.
软件定义网络(SDN)是当前网络研究的重要内容。SDN提供了许多好处,包括按需配置、自动负载平衡、简化的物理基础设施以及根据需要扩展网络资源的能力。SDN具有通过软件管理网络流量的能力,并且管理员获得了更大程度的控制,这提供了动态更改网络规则的能力。在不久的将来,SDN可以取代传统网络。与此同时,必须在早期规划阶段对保护给予怀疑意识。本文主要对SDN的保护属性进行了研究。本文首先介绍SDN的体系结构。在设计结构的同时,对SDN中可能出现的保护故障进行了设计。最后讨论了基于数据转发层、控制层和应用层三层架构的各种威胁及其应对措施。此外,还强调了这些不同的防御技术。
{"title":"A Survey: Security Threats and Countermeasures in Software Defined Networking","authors":"A. Mubarakali, A. Alqahtani","doi":"10.1109/INFOCT.2019.8711319","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711319","url":null,"abstract":"Nowadays, the Software-Defined Networking (SDN) is the most important part of research work. SDN offers numerous benefits including on-demand provisioning, automated load balancing, streamlined physical infrastructure and the ability to scale network resources as per the need. SDN has the ability to manage network traffic through software and the administrator gain a much greater degree of control, which provides the ability to change network rules on the fly. In the near future, SDN can replace traditional networking. At the similar time, suspicious awareness necessitates being paid to protection at the early planning phase. In the paper majorly concentrates on the protection attributes of SDN. It starts by examining the architecture of SDN. Along with the design structure, we design the probable protection faults in SDN. Finally discuss various threats and its countermeasures based on three-layer architecture, i.e. data forwarding layer, the control layer, and the application layer. Additionally, those different defensive techniques are highlighted.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132282081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Chinese Texts Classification System 中文文本分类系统
Meng Zhu, Xudong Yang
In this article, we designed an automatic Chinese text classification system aiming to implement a system for classifying news texts. We propose two improved classification algorithms as two different choices for users to choose and then our system uses the chosen method for the obtaining of the classified result of the input text. There are two improved algorithms, one is k-Bayes using hierarchy conception based on NB method in machine learning field and another one adds attention layer to the convolutional neural network in deep learning field. Through experiments, our results showed that improved classification algorithms had better accuracy than based algorithms and our system is useful for making classifying news texts more reasonably and effectively.
在本文中,我们设计了一个中文文本自动分类系统,旨在实现一个新闻文本分类系统。我们提出了两种改进的分类算法作为两种不同的选择供用户选择,然后我们的系统使用选择的方法来获得输入文本的分类结果。有两种改进算法,一种是机器学习领域中基于NB方法的层次概念的k-Bayes算法,另一种是深度学习领域中在卷积神经网络上增加注意层的算法。实验结果表明,改进后的分类算法比现有的分类算法具有更好的准确率,有助于对新闻文本进行更合理、更有效的分类。
{"title":"Chinese Texts Classification System","authors":"Meng Zhu, Xudong Yang","doi":"10.1109/INFOCT.2019.8710894","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710894","url":null,"abstract":"In this article, we designed an automatic Chinese text classification system aiming to implement a system for classifying news texts. We propose two improved classification algorithms as two different choices for users to choose and then our system uses the chosen method for the obtaining of the classified result of the input text. There are two improved algorithms, one is k-Bayes using hierarchy conception based on NB method in machine learning field and another one adds attention layer to the convolutional neural network in deep learning field. Through experiments, our results showed that improved classification algorithms had better accuracy than based algorithms and our system is useful for making classifying news texts more reasonably and effectively.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Newly-Coined Words and Emoticon Polarity for Social Emotional Opinion Decision 社会情感意见决策的新词与表情极性
J. Yang, Kwang Sik Chung
Nowadays, based-on mobile devices and internet, social network services(SNS) are common trends to everyone. Thus, decision of social and public opinions, and polarity about social happenings, political issues, government policies and decision, or commercial products is very important to the government, company, and a person. But, SNS are basically making newly-coined words and emoticons. Especially, emoticons are made by a person or companies. Newly-coined words are mostly made by communities. The SNS big data mainly consists of his kinds of newly-coined words and emoticons so that newly-coined words and emoticons analysis are very important to understand the social and public opinions, and polarity about social happenings, political issues, government policies and decision, or commercial products. Social big data is unstructured data and contains many newly-coined words and various emoticons. Therefore, there is a limitation to guarantee the accuracy and analysis range of social data of emotional analysis. The newly-coined words contains the social phenomena and trends of modern society implicitly. And the emoticons are electronic quasi-languages made up of letters and symbols, and express the emotional state more implicitly. Although the newly-coined words and emoticons are an important part of the emotional analysis, they are excluded from the emotional dictionary and analysis. In this research, newly-coined words and emoticons extracted from the raw twit messages include polarity and weight with pre-built dictionary. The polarity and weight would be calculated for emotional classification. The proposed emotional classification equation adds up the weights among the same polarity(positive or negative) and sums the negative weight value with the positive weight values. The polarity summation result is recorded in the variable. If the polarity summation result is more than threshold value, the twit message is decided as positive. If it is less than threshold value, it is decided as negative and the other values are decided as neutral. The accuracy of social big data analysis is improved by quantifying and analyzing emoticons and new-coined words.
如今,基于移动设备和互联网的社交网络服务(SNS)是大家共同的趋势。因此,社会舆论和公众舆论的决定,社会事件、政治问题、政府政策和决策、商业产品的极性,对政府、公司和个人都是非常重要的。但是,社交网站基本上都是在创造新词和表情符号。特别是,表情符号是由个人或公司制作的。新词大多是由社区创造的。SNS大数据主要由他的各种新词和表情符号组成,所以对新词和表情符号的分析对于了解社会舆情、社会事件、政治问题、政府政策决策或商业产品的极性都是非常重要的。社交大数据是非结构化的数据,包含许多新词和各种表情符号。因此,情感分析的社会数据的准确性和分析范围都有一定的局限性。新词含蓄地蕴涵着现代社会的社会现象和趋势。而表情符号是由字母和符号组成的电子类语言,更含蓄地表达情感状态。虽然新造词语和表情符号是情感分析的重要组成部分,但它们被排除在情感词典和分析之外。在本研究中,从原始tweet消息中提取新词和表情符号,包括极性和权重,并预先构建字典。极性和权重将被计算用于情感分类。提出的情绪分类方程将相同极性(正极性或负极性)之间的权重相加,并将负极性的权重值与正极性的权重值相加。极性求和结果记录在变量中。如果极性求和结果大于阈值,则判定该tweet消息为正消息。如果小于阈值,则判定为负值,其他值判定为中性。通过对表情符号和新词进行量化分析,提高社交大数据分析的准确性。
{"title":"Newly-Coined Words and Emoticon Polarity for Social Emotional Opinion Decision","authors":"J. Yang, Kwang Sik Chung","doi":"10.1109/INFOCT.2019.8711413","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711413","url":null,"abstract":"Nowadays, based-on mobile devices and internet, social network services(SNS) are common trends to everyone. Thus, decision of social and public opinions, and polarity about social happenings, political issues, government policies and decision, or commercial products is very important to the government, company, and a person. But, SNS are basically making newly-coined words and emoticons. Especially, emoticons are made by a person or companies. Newly-coined words are mostly made by communities. The SNS big data mainly consists of his kinds of newly-coined words and emoticons so that newly-coined words and emoticons analysis are very important to understand the social and public opinions, and polarity about social happenings, political issues, government policies and decision, or commercial products. Social big data is unstructured data and contains many newly-coined words and various emoticons. Therefore, there is a limitation to guarantee the accuracy and analysis range of social data of emotional analysis. The newly-coined words contains the social phenomena and trends of modern society implicitly. And the emoticons are electronic quasi-languages made up of letters and symbols, and express the emotional state more implicitly. Although the newly-coined words and emoticons are an important part of the emotional analysis, they are excluded from the emotional dictionary and analysis. In this research, newly-coined words and emoticons extracted from the raw twit messages include polarity and weight with pre-built dictionary. The polarity and weight would be calculated for emotional classification. The proposed emotional classification equation adds up the weights among the same polarity(positive or negative) and sums the negative weight value with the positive weight values. The polarity summation result is recorded in the variable. If the polarity summation result is more than threshold value, the twit message is decided as positive. If it is less than threshold value, it is decided as negative and the other values are decided as neutral. The accuracy of social big data analysis is improved by quantifying and analyzing emoticons and new-coined words.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116015667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Framework to Evaluate the Performance of Video Watermarking Techniques 评价视频水印技术性能的框架
Farnaz Arab, M. Zamani, Sofya Poger, Carol Manigault, Songmei Yu
This paper focuses on the current challenging problems of video watermarking techniques, especially the robustness of spatial domain. This paper starts with background of the problem, and then illustrates a framework to evaluate the performance of video watermarking techniques.
本文重点研究了当前视频水印技术的难点问题,特别是空间域的鲁棒性问题。本文首先介绍了问题的背景,然后给出了一个评估视频水印技术性能的框架。
{"title":"A Framework to Evaluate the Performance of Video Watermarking Techniques","authors":"Farnaz Arab, M. Zamani, Sofya Poger, Carol Manigault, Songmei Yu","doi":"10.1109/infoct.2019.8711154","DOIUrl":"https://doi.org/10.1109/infoct.2019.8711154","url":null,"abstract":"This paper focuses on the current challenging problems of video watermarking techniques, especially the robustness of spatial domain. This paper starts with background of the problem, and then illustrates a framework to evaluate the performance of video watermarking techniques.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Wind Power Generation Low Voltage Ride-through Protection Circuit Based on Energy Storage Component 基于储能元件的风力发电低压穿越保护电路研究
Xiao Wenjuan, Mai Xiaoqin
The low voltage ride through capability of wind turbines is an important indicator to measure the ability of wind power systems to be connected to the grid. With traditional control strategy, the low voltage ride-through capability with direct drive permanent magnet synchronous wind power generation system has limited. This paper improves the LVRT capability of DPMG by adding a chopper protection circuit with energy storage device to the DC side of wind power system. In this paper, the control method of Chopper protection circuit with energy storage device, the selection of energy storage components and the control principle of bidirectional converter are analyzed. The improved circuit is simulated by MATLAB/simulink. The result proves that when the grid voltage drops, the existence of the chopper protection circuit with energy storage components can maintain the input and output power balance of the system in a short time, stabilize the DC side voltage, and improve the low voltage ride through capability of the wind turbine.
风电机组的低压穿越能力是衡量风电系统并网能力的重要指标。采用传统的控制策略,直接驱动永磁同步风力发电系统的低压穿越能力受到限制。本文通过在风电系统直流侧增加带储能装置的斩波保护电路,提高了DPMG的LVRT能力。本文分析了带储能装置的斩波保护电路的控制方法、储能元件的选择以及双向变换器的控制原理。利用MATLAB/simulink对改进后的电路进行了仿真。结果表明,当电网电压下降时,带储能元件的斩波保护电路的存在可以在短时间内维持系统的输入输出功率平衡,稳定直流侧电压,提高风电机组的低压穿越能力。
{"title":"Research on Wind Power Generation Low Voltage Ride-through Protection Circuit Based on Energy Storage Component","authors":"Xiao Wenjuan, Mai Xiaoqin","doi":"10.1109/infoct.2019.8710867","DOIUrl":"https://doi.org/10.1109/infoct.2019.8710867","url":null,"abstract":"The low voltage ride through capability of wind turbines is an important indicator to measure the ability of wind power systems to be connected to the grid. With traditional control strategy, the low voltage ride-through capability with direct drive permanent magnet synchronous wind power generation system has limited. This paper improves the LVRT capability of DPMG by adding a chopper protection circuit with energy storage device to the DC side of wind power system. In this paper, the control method of Chopper protection circuit with energy storage device, the selection of energy storage components and the control principle of bidirectional converter are analyzed. The improved circuit is simulated by MATLAB/simulink. The result proves that when the grid voltage drops, the existence of the chopper protection circuit with energy storage components can maintain the input and output power balance of the system in a short time, stabilize the DC side voltage, and improve the low voltage ride through capability of the wind turbine.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123409350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service-Oriented Systems as A Thining Machine: A Case Study of Customer Relationship Management 以服务为导向的系统是一种思维机器:客户关系管理的案例研究
S. Al-Fedaghi, Mona Al-Otaibi
This paper concerns the intersection of enterprise models and IT services. In particular, it focuses on modeling in IT customer relationship management as a process-oriented control. The paper’s case study relates to an Information Technology Infrastructure Library processes project in a government ministry. The research objective is to model the organization’s customer relationship management system based on a recently proposed conceptual model: an abstract thinging machine. This model is used to depict conceptual (application-independent) machines in customer relationship management systems. The paper’s overarching question is whether thinging machines produce models that are as viable as those produced by methodologies such as Unified Modeling Language and Object-Process Methodology.
本文关注企业模型和IT服务的交叉。特别地,它将重点放在作为面向过程控制的it客户关系管理中的建模上。本文的案例研究涉及政府部门的信息技术基础设施图书馆流程项目。研究目标是基于最近提出的概念模型:抽象事物机,对组织的客户关系管理系统进行建模。该模型用于描述客户关系管理系统中的概念性(与应用程序无关)机器。这篇论文的首要问题是,事物机器产生的模型是否像统一建模语言和对象过程方法论产生的模型一样可行。
{"title":"Service-Oriented Systems as A Thining Machine: A Case Study of Customer Relationship Management","authors":"S. Al-Fedaghi, Mona Al-Otaibi","doi":"10.1109/INFOCT.2019.8710891","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710891","url":null,"abstract":"This paper concerns the intersection of enterprise models and IT services. In particular, it focuses on modeling in IT customer relationship management as a process-oriented control. The paper’s case study relates to an Information Technology Infrastructure Library processes project in a government ministry. The research objective is to model the organization’s customer relationship management system based on a recently proposed conceptual model: an abstract thinging machine. This model is used to depict conceptual (application-independent) machines in customer relationship management systems. The paper’s overarching question is whether thinging machines produce models that are as viable as those produced by methodologies such as Unified Modeling Language and Object-Process Methodology.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Comparative Study of Deep Learning Approaches for Query-Focused Extractive Multi-Document Summarization 面向查询的深度学习提取多文档摘要方法的比较研究
Yuliska, T. Sakai
Query-focused multi-document summarization aims to produce a single, short document that summarizes a set of documents that are relevant to a given query. During the past few years, deep learning approaches have been utilized to generate summaries in an abstractive or extractive manner. In this study, we employ six deep neural network approaches to solving a query-focused extractive multi-document summarization task and compare their performances. To the best of our knowledge, our study is the first to compare deep learning techniques on extractive query-focused multi-document summarization. Our experiments with DUC 2005–2007 benchmark datasets show that Bi-LSTM with Max-pooling achieves the highest performance among the methods compared.
以查询为中心的多文档摘要旨在生成一个简短的文档,该文档总结了与给定查询相关的一组文档。在过去的几年中,深度学习方法已被用于以抽象或抽取的方式生成摘要。在这项研究中,我们采用六种深度神经网络方法来解决一个以查询为中心的提取多文档摘要任务,并比较了它们的性能。据我们所知,我们的研究是第一个比较深度学习技术对提取查询为重点的多文档摘要的研究。在DUC 2005-2007的基准数据集上进行的实验表明,采用最大池的Bi-LSTM方法在比较的方法中性能最高。
{"title":"A Comparative Study of Deep Learning Approaches for Query-Focused Extractive Multi-Document Summarization","authors":"Yuliska, T. Sakai","doi":"10.1109/INFOCT.2019.8710851","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710851","url":null,"abstract":"Query-focused multi-document summarization aims to produce a single, short document that summarizes a set of documents that are relevant to a given query. During the past few years, deep learning approaches have been utilized to generate summaries in an abstractive or extractive manner. In this study, we employ six deep neural network approaches to solving a query-focused extractive multi-document summarization task and compare their performances. To the best of our knowledge, our study is the first to compare deep learning techniques on extractive query-focused multi-document summarization. Our experiments with DUC 2005–2007 benchmark datasets show that Bi-LSTM with Max-pooling achieves the highest performance among the methods compared.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"84 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116372693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Compliance with Open Data Principles: A Longitudinal Content Analysis of the Saudi’s National Open Data Platform in 2016 and 2018 遵守开放数据原则:2016年和2018年沙特国家开放数据平台的纵向内容分析
Mohammed A. Gharawi, Khalid M. Al Hamed, Hashim H. Alneami
This study attempts to analyze the content of the National Open Data Platform (NODP) of the Kingdom of Saudi Arabia (KSA) in two time intervals with the aim of identifying the main developments occurred with regard to participants, available datasets and the aspects they cover, as well as the volume, quantity and quality of available data. The researchers attempted, through the study, to evaluate the applicability of the original eight principles of open data (OD) regarding data available on the Platform. The study concluded that the data that are now available through the NODP are timely, accessible, machine processable, non-discriminatory, and license-free. It also concluded that there are three OD principles that are not applied. These three principles relate to the data being complete, primary, and available in open formats. The study concluded with a set of recommendations that should enhance tendency towards implementing OD in the KSA.
本研究试图在两个时间间隔内分析沙特阿拉伯王国(KSA)国家开放数据平台(NODP)的内容,目的是确定参与者、可用数据集及其涵盖的方面以及可用数据的数量、数量和质量方面发生的主要发展。研究人员试图通过这项研究来评估开放数据(OD)的原始八项原则对平台上可用数据的适用性。该研究的结论是,现在通过NODP提供的数据是及时的、可访问的、机器可处理的、非歧视的和免许可的。它还得出结论,有三项OD原则没有适用。这三个原则与数据的完整性、主要性和开放格式的可用性有关。该研究最后提出了一套建议,这些建议将加强在沙特阿拉伯实施OD的趋势。
{"title":"Compliance with Open Data Principles: A Longitudinal Content Analysis of the Saudi’s National Open Data Platform in 2016 and 2018","authors":"Mohammed A. Gharawi, Khalid M. Al Hamed, Hashim H. Alneami","doi":"10.1109/infoct.2019.8711298","DOIUrl":"https://doi.org/10.1109/infoct.2019.8711298","url":null,"abstract":"This study attempts to analyze the content of the National Open Data Platform (NODP) of the Kingdom of Saudi Arabia (KSA) in two time intervals with the aim of identifying the main developments occurred with regard to participants, available datasets and the aspects they cover, as well as the volume, quantity and quality of available data. The researchers attempted, through the study, to evaluate the applicability of the original eight principles of open data (OD) regarding data available on the Platform. The study concluded that the data that are now available through the NODP are timely, accessible, machine processable, non-discriminatory, and license-free. It also concluded that there are three OD principles that are not applied. These three principles relate to the data being complete, primary, and available in open formats. The study concluded with a set of recommendations that should enhance tendency towards implementing OD in the KSA.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assertion Detection in Clinical Natural Language Processing: A Knowledge-Poor Machine Learning Approach 临床自然语言处理中的断言检测:缺乏知识的机器学习方法
Long Chen
Natural language processing (NLP) have been recently used to extract clinical information from free text in Electronic Health Record (EHR). In clinical NLP one challenge is that the meaning of clinical entities is heavily affected by assertion modifiers such as negation, uncertain, hypothetical, experiencer and so on. Incorrect assertion assignment could cause inaccurate diagnosis of patients’ condition or negatively influence following study like disease modeling. Thus, clinical NLP systems which can detect assertion status of given target medical findings (e.g. disease, symptom) in clinical context are highly demanded. Here in this work, we propose a deep-learning system based on word embedding, RNN and attention mechanism (more specifically: Attention-based Bidirectional Long Short-Term Memory networks) for assertion detection in clinical notes. Unlike previous state-of-art methods which require knowledge input or feature engineering, our system is a knowledge poor machine learning system and can be easily extended or transferred to other domains. The evaluation of our system on public benchmarking corpora demonstrates that a knowledge poor deep-learning system can also achieve high performance for detecting negation and assertions comparing to state-of-the-art systems.
自然语言处理(NLP)最近被用于从电子健康记录(EHR)的自由文本中提取临床信息。临床NLP面临的一个挑战是临床实体的意义受到否定、不确定、假设、经验等断言修饰语的严重影响。不正确的断言赋值可能导致对患者病情的不准确诊断或对疾病建模等后续研究产生负面影响。因此,临床NLP系统在临床环境中可以检测给定目标医学发现(例如疾病,症状)的断言状态是非常需要的。在这项工作中,我们提出了一个基于词嵌入、RNN和注意机制(更具体地说:基于注意的双向长短期记忆网络)的深度学习系统,用于临床笔记中的断言检测。与以前需要知识输入或特征工程的最先进方法不同,我们的系统是一个知识贫乏的机器学习系统,可以很容易地扩展或转移到其他领域。我们的系统在公共基准语料库上的评估表明,与最先进的系统相比,知识贫乏的深度学习系统也可以在检测否定和断言方面取得高性能。
{"title":"Assertion Detection in Clinical Natural Language Processing: A Knowledge-Poor Machine Learning Approach","authors":"Long Chen","doi":"10.1109/INFOCT.2019.8710921","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710921","url":null,"abstract":"Natural language processing (NLP) have been recently used to extract clinical information from free text in Electronic Health Record (EHR). In clinical NLP one challenge is that the meaning of clinical entities is heavily affected by assertion modifiers such as negation, uncertain, hypothetical, experiencer and so on. Incorrect assertion assignment could cause inaccurate diagnosis of patients’ condition or negatively influence following study like disease modeling. Thus, clinical NLP systems which can detect assertion status of given target medical findings (e.g. disease, symptom) in clinical context are highly demanded. Here in this work, we propose a deep-learning system based on word embedding, RNN and attention mechanism (more specifically: Attention-based Bidirectional Long Short-Term Memory networks) for assertion detection in clinical notes. Unlike previous state-of-art methods which require knowledge input or feature engineering, our system is a knowledge poor machine learning system and can be easily extended or transferred to other domains. The evaluation of our system on public benchmarking corpora demonstrates that a knowledge poor deep-learning system can also achieve high performance for detecting negation and assertions comparing to state-of-the-art systems.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125185203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Machine Learning and the Problem of the Hermeneutic Gap 机器学习与解释学缺口问题
Y. Shaev
Rapid development of information technologies has been distinguished in recent years. Neural network technologies, which are using artificial intelligence algorithms, are becoming widespread. In accordance with the nearest futurological predictions, the state of technological singularity is approaching - the unity of man and technologies. In the framework of the approach towards technological singularity, a person tries to understand technologies and to consider them as something human-like, correlated with physicality, participation in everyday practices, and solving a wide variety of tasks. According to experts, artificial intelligence may be developed to such level that it will be harder for the human mind to „understand„ it in the nearest future. Even now, a computer is capable to solve very complicated intellectual problems, many of which previously were considered the sphere of action of the human mind. The problem of a possible „hermeneutic gap„ between the capabilities of artificial intelligence and the human mind appears - whether a person will be able to use the results of the work of artificial intelligence and understand them. Here we can fix „understanding„ in the hermeneutic sense, as one of the fundamental properties of human existence, which makes it possible to build the vital world of a person full of meanings. Whether a person will be able to understand artificial intelligence and vice versa - whether artificial intelligence can „understand„ a person, become an organic part of the living space and diverse human practices is an urgent issue that requires rethinking within the framework of philosophy. A philosophical analysis of this problem should include a deep understanding of the connection between the life world and the body, practices, mental mechanisms (including unconscious aspects) of a person in the universe of the technological future.
近年来,信息技术飞速发展。使用人工智能算法的神经网络技术正在普及。根据最近的未来学预测,技术奇点的状态正在接近——人与技术的统一。在技术奇点方法的框架中,人们试图理解技术,并将其视为类似人类的东西,与物理相关,参与日常实践,解决各种各样的任务。据专家称,人工智能的发展可能会使人类的大脑在不久的将来更难“理解”它。即使是现在,计算机也能够解决非常复杂的智力问题,其中许多问题以前被认为是人类思维的活动范围。人工智能和人类思维能力之间可能存在“解释学鸿沟”的问题出现了——一个人是否能够使用人工智能的工作结果并理解它们。在这里,我们可以将“理解”固定在解释学意义上,作为人类存在的基本属性之一,这使得建立一个充满意义的人的生命世界成为可能。人是否能够理解人工智能,反之亦然——人工智能是否能够“理解”人,成为生存空间和多样化人类实践的有机组成部分,是一个迫切需要在哲学框架内重新思考的问题。对这个问题的哲学分析应该包括对生活世界与身体、实践、心理机制(包括无意识方面)在技术未来宇宙中的联系的深刻理解。
{"title":"Machine Learning and the Problem of the Hermeneutic Gap","authors":"Y. Shaev","doi":"10.1109/INFOCT.2019.8711093","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711093","url":null,"abstract":"Rapid development of information technologies has been distinguished in recent years. Neural network technologies, which are using artificial intelligence algorithms, are becoming widespread. In accordance with the nearest futurological predictions, the state of technological singularity is approaching - the unity of man and technologies. In the framework of the approach towards technological singularity, a person tries to understand technologies and to consider them as something human-like, correlated with physicality, participation in everyday practices, and solving a wide variety of tasks. According to experts, artificial intelligence may be developed to such level that it will be harder for the human mind to „understand„ it in the nearest future. Even now, a computer is capable to solve very complicated intellectual problems, many of which previously were considered the sphere of action of the human mind. The problem of a possible „hermeneutic gap„ between the capabilities of artificial intelligence and the human mind appears - whether a person will be able to use the results of the work of artificial intelligence and understand them. Here we can fix „understanding„ in the hermeneutic sense, as one of the fundamental properties of human existence, which makes it possible to build the vital world of a person full of meanings. Whether a person will be able to understand artificial intelligence and vice versa - whether artificial intelligence can „understand„ a person, become an organic part of the living space and diverse human practices is an urgent issue that requires rethinking within the framework of philosophy. A philosophical analysis of this problem should include a deep understanding of the connection between the life world and the body, practices, mental mechanisms (including unconscious aspects) of a person in the universe of the technological future.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1