首页 > 最新文献

2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)最新文献

英文 中文
Classifying Severity Level of Psychiatric Symptoms on Twitter Data 在Twitter数据上对精神症状的严重程度进行分类
M. Negash, Michael Melese Woldeyohannis
Internet-based social media sites such as Twitter represent a growing level of modern experience. These sites claim a large number of users and their influence is increasingly being experienced in clinical practice. Psychiatric disorders currently are affecting many people from different cultures, ages, and geographic locations. Although, the majority of individuals who experience symptom of psychiatric disorder practice the desire to be isolated, which drives them to use online channels to share their feelings. Hence, this sites provide a way to detect undiagnosed psychiatric disorders. In order to address this issue, we propose a model to classify the severity level of psychiatric symptoms (i.e. depression, anxiety, and bipolar) based on a data extracted from Twitter. The model is employed by fusing the linguistic features of Term Frequency Inverse Document Frequency (TFIDF) weighed by N-gram (unigram, bigram, and trigram), and word2vce, with Pattern of Life Feature (PLF) that take polarity, subjectivity, and gender. The experiment, is conducted by incorporating with machine learning classifiers of Support Vector Machine (SVM), Logistic Regression (LR), Random Forest (RF), and Naïve Bayes (NB). Experimental results show that SVM with features of TFIDF weighed by unigram combined with PLF outperforms with an accuracy score of 97.3%. In future, the proposed model could be employed to include lexicon-based features for classifying various psychiatric symptoms with a combined approach of machine learning and lexicon-based classification.
以互联网为基础的社交媒体网站,如Twitter,代表了现代体验水平的不断提高。这些网站声称拥有大量用户,并且在临床实践中越来越多地体验到它们的影响。精神疾病目前影响着许多来自不同文化、年龄和地理位置的人。尽管如此,大多数有精神障碍症状的人都有被孤立的愿望,这促使他们使用在线渠道来分享他们的感受。因此,这些网站提供了一种检测未确诊精神疾病的方法。为了解决这个问题,我们提出了一个模型,根据从Twitter提取的数据对精神症状(即抑郁、焦虑和双相情感障碍)的严重程度进行分类。该模型将n元(单元、双元和三元)加权的词频逆文档频率(TFIDF)和单词的语言特征与具有极性、主观性和性别的生活模式特征(PLF)融合在一起。该实验结合了支持向量机(SVM)、逻辑回归(LR)、随机森林(RF)和Naïve贝叶斯(NB)等机器学习分类器进行。实验结果表明,采用单图加权TFIDF特征与PLF特征相结合的SVM准确率达到97.3%。未来,提出的模型可以采用机器学习和基于词典的分类相结合的方法,包括基于词典的特征来分类各种精神症状。
{"title":"Classifying Severity Level of Psychiatric Symptoms on Twitter Data","authors":"M. Negash, Michael Melese Woldeyohannis","doi":"10.1109/ict4da53266.2021.9672228","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672228","url":null,"abstract":"Internet-based social media sites such as Twitter represent a growing level of modern experience. These sites claim a large number of users and their influence is increasingly being experienced in clinical practice. Psychiatric disorders currently are affecting many people from different cultures, ages, and geographic locations. Although, the majority of individuals who experience symptom of psychiatric disorder practice the desire to be isolated, which drives them to use online channels to share their feelings. Hence, this sites provide a way to detect undiagnosed psychiatric disorders. In order to address this issue, we propose a model to classify the severity level of psychiatric symptoms (i.e. depression, anxiety, and bipolar) based on a data extracted from Twitter. The model is employed by fusing the linguistic features of Term Frequency Inverse Document Frequency (TFIDF) weighed by N-gram (unigram, bigram, and trigram), and word2vce, with Pattern of Life Feature (PLF) that take polarity, subjectivity, and gender. The experiment, is conducted by incorporating with machine learning classifiers of Support Vector Machine (SVM), Logistic Regression (LR), Random Forest (RF), and Naïve Bayes (NB). Experimental results show that SVM with features of TFIDF weighed by unigram combined with PLF outperforms with an accuracy score of 97.3%. In future, the proposed model could be employed to include lexicon-based features for classifying various psychiatric symptoms with a combined approach of machine learning and lexicon-based classification.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Amharic Text Corpus based on Parts of Speech tagging and headwords 基于词性标注和主题词的阿姆哈拉语文本语料库
T. Abebe, E. Alemneh
Corpus is a milestone to study natural languages and to develop various tools for the processing of human languages. Since, few studies are carried out on the development of Amharic language corpus development, the existing corpora are very small in size and not well accessible for academicians as well as commercial and non-commercial organizations. This paper presents Amharic text corpus developed by applying the processes of annotating each word with its part of speech tag and reducing each orthographic word to its headword using either derivational or inflectional process. We extracted 12,720 sentences from various text documents collected in the domain of proclamations. Ethiopian 1987 E.C constitution and a few policies of Amhara regional state, Ethiopia and federal government of Ethiopia are some of those documents. We found 331,728 tokens from those sentences. 66 tag sets are compiled from base part of speech tag set classes and compound part of speech tag set classes based on different factors and representation of orthographic words. To help the manual annotation of each orthographic word, we developed a semi-automatic Amharic text tagger. The outputs of the research project are pre-processed Amharic text stored in plain text format and tagged Amharic text corpus encoded with extensible markup language format. The tag sets of annotated text corpora are represented in both Ge'ez script and English characters. We plan to increase the number of tag sets and size of text corpus in the near future. Moreover, we are working towards converting the semi-automatic Amharic text tagger to full automation.
语料库是研究自然语言和开发各种人类语言处理工具的一个里程碑。由于对阿姆哈拉语语料库开发的研究很少,现有的语料库规模很小,学术界以及商业和非商业组织都无法很好地获取。本文介绍了阿姆哈拉语文本语料库的开发过程中,应用的注释过程,每个词的词性标签和减少每个正字法的词,以它的词头使用衍生或屈折过程。我们从公告领域收集的各种文本文档中提取了12,720个句子。1987年欧共体宪法和阿姆哈拉地区国家的一些政策,埃塞俄比亚和埃塞俄比亚联邦政府是其中的一些文件。我们从这些句子中找到了331728个标记。根据不同的因素和正字法词的表示,从语音标签集类的基部分和语音标签集类的复合部分编译了66个标签集。为了帮助手动标注每个正字法单词,我们开发了一个半自动阿姆哈拉语文本标注器。研究项目的输出是以纯文本格式存储的预处理阿姆哈拉文文本和用可扩展标记语言格式编码的标记阿姆哈拉文文本语料库。标注文本语料库的标签集分别用葛孜文字和英文文字表示。我们计划在不久的将来增加标签集的数量和文本语料库的大小。此外,我们正在努力将半自动阿姆哈拉语文本标注器转换为全自动。
{"title":"Amharic Text Corpus based on Parts of Speech tagging and headwords","authors":"T. Abebe, E. Alemneh","doi":"10.1109/ict4da53266.2021.9672246","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672246","url":null,"abstract":"Corpus is a milestone to study natural languages and to develop various tools for the processing of human languages. Since, few studies are carried out on the development of Amharic language corpus development, the existing corpora are very small in size and not well accessible for academicians as well as commercial and non-commercial organizations. This paper presents Amharic text corpus developed by applying the processes of annotating each word with its part of speech tag and reducing each orthographic word to its headword using either derivational or inflectional process. We extracted 12,720 sentences from various text documents collected in the domain of proclamations. Ethiopian 1987 E.C constitution and a few policies of Amhara regional state, Ethiopia and federal government of Ethiopia are some of those documents. We found 331,728 tokens from those sentences. 66 tag sets are compiled from base part of speech tag set classes and compound part of speech tag set classes based on different factors and representation of orthographic words. To help the manual annotation of each orthographic word, we developed a semi-automatic Amharic text tagger. The outputs of the research project are pre-processed Amharic text stored in plain text format and tagged Amharic text corpus encoded with extensible markup language format. The tag sets of annotated text corpora are represented in both Ge'ez script and English characters. We plan to increase the number of tag sets and size of text corpus in the near future. Moreover, we are working towards converting the semi-automatic Amharic text tagger to full automation.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126772450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Enhanced Inter-Cell Interference Coordination on Heterogeneous Network Topology in LTE-A Using Cell Range Extension 利用小区范围扩展增强小区间干扰协调对LTE-A异构网络拓扑的影响
Kehali A. Jember, T. Abose, T. Olwal, Murad R. Hassen
Recently, wireless data traffic is growing exponentially due to innovative wireless devices such as smart phones, tablets, and machine-to-machine communications and so on. 3GPP introduces LTE release-8 as first standard and continues further research to introduce LTE-A for network improvement having those innovative devices and services in mind. As far as LTE-A is concerned, Heterogeneous Networks are introduced to improve network performance by deploying small cells over the coverage area of the serving Macro cells. The essential target of deploying such a small cell is to offload the users from the congested Macro cells towards the small cells. Small cell covers only limited areas due to low transmit power. To increase coverage and capacity of small cell, cell range extension was introduced in this research. Cell range extension boosts received signal power of small cell users by adding positive offset bias. Computer simulations are carried out following the developed analytical frameworks. The simulation results validates that deploying small cell over Macro cell improves user and cell throughput.
最近,由于智能手机、平板电脑和机器对机器通信等创新无线设备的出现,无线数据流量呈指数级增长。3GPP将LTE release-8作为第一个标准引入,并继续进一步研究引入LTE- a,以改进网络,并考虑到这些创新设备和服务。就LTE-A而言,引入异构网络是为了通过在服务宏蜂窝的覆盖区域上部署小型蜂窝来提高网络性能。部署这种小型计算单元的基本目标是将用户从拥挤的宏计算单元转移到小型计算单元。由于发射功率低,小型蜂窝只能覆盖有限的区域。为了提高小基站的覆盖和容量,本研究引入了小区范围扩展技术。小区范围扩展通过增加正偏移偏置提高小小区用户的接收信号功率。根据开发的分析框架进行了计算机模拟。仿真结果验证了在宏小区上部署小小区可以提高用户和小区的吞吐量。
{"title":"Impact of Enhanced Inter-Cell Interference Coordination on Heterogeneous Network Topology in LTE-A Using Cell Range Extension","authors":"Kehali A. Jember, T. Abose, T. Olwal, Murad R. Hassen","doi":"10.1109/ict4da53266.2021.9672236","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672236","url":null,"abstract":"Recently, wireless data traffic is growing exponentially due to innovative wireless devices such as smart phones, tablets, and machine-to-machine communications and so on. 3GPP introduces LTE release-8 as first standard and continues further research to introduce LTE-A for network improvement having those innovative devices and services in mind. As far as LTE-A is concerned, Heterogeneous Networks are introduced to improve network performance by deploying small cells over the coverage area of the serving Macro cells. The essential target of deploying such a small cell is to offload the users from the congested Macro cells towards the small cells. Small cell covers only limited areas due to low transmit power. To increase coverage and capacity of small cell, cell range extension was introduced in this research. Cell range extension boosts received signal power of small cell users by adding positive offset bias. Computer simulations are carried out following the developed analytical frameworks. The simulation results validates that deploying small cell over Macro cell improves user and cell throughput.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122351075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Hate and Offensive speech detection framework from social media: the case of Afaan Oromoo language 来自社交媒体的仇恨和攻击性语音自动检测框架:以阿法安奥罗莫语为例
Lata Guta Kanessa, S. Tulu
The easily accessibility of different online platform allows every individuals people to express their ideas and share experiences easily without any restriction because of freedom of speech. Since social media don't have general framework to identify hate and neutral speech this results anonymity. However, the propagation of hate speech on social media distresses the society in many aspects, such as affecting the mental health of targeted audiences, affects social interaction and distraction of properties. This research proposed the SVM with TF-IDF, N-gram, and W2vec feature extraction to construct dataset which is binary classifier to detect hate speech for Afaan Oromoo language. To construct dataset for this study first we crawl data from Facebook posts and comments by using Face pager and scrap storm API. After we collect we labeled the collected data to two class hate and neutral class. The general objective of this research is to design a framework which classify hate and neutral speech. Furthermore, when we compare the results of different Machine Learning algorithms. The experiment is evaluated based on accuracy, F-score, recall and precision measurements. The framework based on SVM with n-gram combination with TF-IDF achieve 96% in all metrics.
不同网络平台的便捷接入,使得每一个人都可以不受言论自由的限制,轻松地表达自己的想法,分享自己的经历。由于社交媒体没有一般的框架来识别仇恨和中立言论,这就导致了匿名。然而,社交媒体上仇恨言论的传播给社会带来了多方面的困扰,比如影响目标受众的心理健康,影响社会互动,分散财产。本研究提出了结合TF-IDF、N-gram和W2vec特征提取的支持向量机构建二分类器数据集,用于阿法奥罗莫语仇恨言论检测。为了构建本研究的数据集,我们首先使用Face pager和scrap storm API从Facebook帖子和评论中抓取数据。收集后我们将收集到的数据分为讨厌类和中性类。本研究的总体目标是设计一个分类仇恨和中性言论的框架。此外,当我们比较不同机器学习算法的结果时。实验是根据准确性,F-score,召回率和精度测量来评估的。基于n-gram与TF-IDF相结合的SVM框架在所有指标上均达到96%。
{"title":"Automatic Hate and Offensive speech detection framework from social media: the case of Afaan Oromoo language","authors":"Lata Guta Kanessa, S. Tulu","doi":"10.1109/ict4da53266.2021.9672232","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672232","url":null,"abstract":"The easily accessibility of different online platform allows every individuals people to express their ideas and share experiences easily without any restriction because of freedom of speech. Since social media don't have general framework to identify hate and neutral speech this results anonymity. However, the propagation of hate speech on social media distresses the society in many aspects, such as affecting the mental health of targeted audiences, affects social interaction and distraction of properties. This research proposed the SVM with TF-IDF, N-gram, and W2vec feature extraction to construct dataset which is binary classifier to detect hate speech for Afaan Oromoo language. To construct dataset for this study first we crawl data from Facebook posts and comments by using Face pager and scrap storm API. After we collect we labeled the collected data to two class hate and neutral class. The general objective of this research is to design a framework which classify hate and neutral speech. Furthermore, when we compare the results of different Machine Learning algorithms. The experiment is evaluated based on accuracy, F-score, recall and precision measurements. The framework based on SVM with n-gram combination with TF-IDF achieve 96% in all metrics.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Maturity of information systems security in selected private Banks in Ethiopia 埃塞俄比亚选定私人银行信息系统安全的成熟度
Tadele Shimels, Lemma F. Lessa
Information system security is more critical than ever before because security threats are rapidly growing and the environment requires organizations to continuously adapt to changes. Before putting in place information systems security measures, organizations are required to determine the maturity level of their information security governance. Extant literature reveals that there is no recent study on information systems security maturity level of banks in Ethiopia. This study, thus, seeks to measure the existing maturity level and examine the security gaps in order to propose possible changes in Ethiopian private banking industry's information system security maturity indicators. Four private banks are selected as a representative sample. SSE-CMM (System Security Engineering Capability Maturity Model) is used as the maturity measurement criteria and the measurement was based on ISO/IEC 27001 information security control areas. The data for the study was gathered using a questionnaire. A total of 93 valid questionnaires were gathered from 110 participants in the study. Based on the SSE-CMM maturity model assessment criteria, the private banking industry's current maturity level is level 2 (repeatable but intuitive). Institutions have a pattern that is repeated when completing information security operations, but its existence was not thoroughly proven, and institutional inconsistency still exists. Recommendations are forwarded for management intervention in order to address the identified gaps.
信息系统安全比以往任何时候都更加重要,因为安全威胁正在迅速增长,环境要求组织不断适应变化。在实施信息系统安全措施之前,组织需要确定其信息安全治理的成熟度级别。现有文献表明,目前尚无对埃塞俄比亚银行信息系统安全成熟度水平的研究。因此,本研究旨在衡量现有的成熟度水平并检查安全缺口,以提出埃塞俄比亚私人银行业信息系统安全成熟度指标可能发生的变化。选取四家民营银行作为代表性样本。使用SSE-CMM(系统安全工程能力成熟度模型)作为成熟度度量标准,度量基于ISO/IEC 27001信息安全控制领域。这项研究的数据是通过问卷调查收集的。本研究共收集到110名参与者的93份有效问卷。基于SSE-CMM成熟度模型评估标准,私人银行业目前的成熟度等级为2级(可重复但直观)。机构在完成信息安全操作时存在重复的模式,但其存在并未得到彻底证实,机构不一致性仍然存在。提出建议供管理部门干预,以解决已查明的差距。
{"title":"Maturity of information systems security in selected private Banks in Ethiopia","authors":"Tadele Shimels, Lemma F. Lessa","doi":"10.1109/ict4da53266.2021.9672221","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672221","url":null,"abstract":"Information system security is more critical than ever before because security threats are rapidly growing and the environment requires organizations to continuously adapt to changes. Before putting in place information systems security measures, organizations are required to determine the maturity level of their information security governance. Extant literature reveals that there is no recent study on information systems security maturity level of banks in Ethiopia. This study, thus, seeks to measure the existing maturity level and examine the security gaps in order to propose possible changes in Ethiopian private banking industry's information system security maturity indicators. Four private banks are selected as a representative sample. SSE-CMM (System Security Engineering Capability Maturity Model) is used as the maturity measurement criteria and the measurement was based on ISO/IEC 27001 information security control areas. The data for the study was gathered using a questionnaire. A total of 93 valid questionnaires were gathered from 110 participants in the study. Based on the SSE-CMM maturity model assessment criteria, the private banking industry's current maturity level is level 2 (repeatable but intuitive). Institutions have a pattern that is repeated when completing information security operations, but its existence was not thoroughly proven, and institutional inconsistency still exists. Recommendations are forwarded for management intervention in order to address the identified gaps.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126199986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA) - Spine art 2021年信息和通信技术促进非洲发展国际会议(ICT4DA) -脊柱艺术
{"title":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA) - Spine art","authors":"","doi":"10.1109/ict4da53266.2021.9672238","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672238","url":null,"abstract":"","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilingual Neural Machine Translation for Low Resourced Languages: Ometo-English 低资源语言的多语言神经机器翻译:Ometo-English
Mesay Gemeda Yigezu, Michael Melese Woldeyohannis, A. Tonja
Unlike technologically favored languages, under-resourced languages highly suffer from the lack of language resources for machine translation. In this paper, we present a new approach to overcome the problem of language resources that share significant amount of linguistic resource in the Ometo language family. The dataset for the experiment are collected from religious domain consisting of four Ometo (Wolaita, Gamo, Gofa, and Dawuro) languages paired with English sentence and automatically extracted from the web. The collected corpus were used for conducting neural machine translation experiments from Ometo to English. Among the experiments, the Wolaita, Dawuro and Gamo paired with English sentence combination for training and Gofa for testing gives highest BLEU score 4.5 than the other combinations while the Wolaita, Gamo, and Gofa with Dawuro testing provide the lowest result. The BLEU score of the machine translation system shows a promising result despite the language differences, the morphological richness, and complexity of the Ometo languages which has high impact on the performance of the Ometo-English machine translation. Further, we are now working towards developing a translation system that significantly reduces the effect of morphological richness and complexity of the Ometo languages through different linguistic processing.
与技术上受欢迎的语言不同,资源不足的语言严重缺乏用于机器翻译的语言资源。在本文中,我们提出了一种新的方法来克服在Ometo语族中共享大量语言资源的语言资源问题。实验数据集由四种欧米图语(沃莱塔语、加莫语、戈法语和达乌罗语)组成的宗教域与英语句子配对,并自动从网络中提取。将收集到的语料库用于从Ometo到English的神经机器翻译实验。其中,Wolaita、Dawuro和Gamo与英语句子组合进行训练和Gofa进行测试的组合BLEU得分最高,为4.5分,Wolaita、Gamo和Gofa与Dawuro测试的组合BLEU得分最低。机器翻译系统的BLEU分数显示了良好的结果,尽管语言差异、形态丰富度和复杂性对机器翻译的性能有很大影响。此外,我们现在正在努力开发一个翻译系统,通过不同的语言处理,显著降低欧梅托语的形态学丰富度和复杂性的影响。
{"title":"Multilingual Neural Machine Translation for Low Resourced Languages: Ometo-English","authors":"Mesay Gemeda Yigezu, Michael Melese Woldeyohannis, A. Tonja","doi":"10.1109/ict4da53266.2021.9671270","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9671270","url":null,"abstract":"Unlike technologically favored languages, under-resourced languages highly suffer from the lack of language resources for machine translation. In this paper, we present a new approach to overcome the problem of language resources that share significant amount of linguistic resource in the Ometo language family. The dataset for the experiment are collected from religious domain consisting of four Ometo (Wolaita, Gamo, Gofa, and Dawuro) languages paired with English sentence and automatically extracted from the web. The collected corpus were used for conducting neural machine translation experiments from Ometo to English. Among the experiments, the Wolaita, Dawuro and Gamo paired with English sentence combination for training and Gofa for testing gives highest BLEU score 4.5 than the other combinations while the Wolaita, Gamo, and Gofa with Dawuro testing provide the lowest result. The BLEU score of the machine translation system shows a promising result despite the language differences, the morphological richness, and complexity of the Ometo languages which has high impact on the performance of the Ometo-English machine translation. Further, we are now working towards developing a translation system that significantly reduces the effect of morphological richness and complexity of the Ometo languages through different linguistic processing.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126570493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Past Event Recall Test for Mitigating Session Hijacking and Cross-Site Request Forgery 减轻会话劫持和跨站点请求伪造的过去事件回忆测试
O. Salami, Abdulrazaq Muhammad Bashir, E. A. Adedokun, Yahaya Basira
Authentication of user on a computer or network enable privacy protection and directing information to appropriate audience. Present authentication mechanisms only authenticate user once at the beginning of a communication session. The new wave of attacks that are used to steal information has made one-time authentication of users inadequate because the authenticated session can now be hijacked. Thus, it has become necessary for the communicating parties in a computer transaction session to reconfirm the other party on the other end periodically. Researchers have proposed different solutions to prevent or detect malicious taking over of a computer session. The solutions either work for particular types of attacks or only suitable for specific applications used to develop it. Others would fail in the face of spoofing attacks. This research proposed PERT for mitigating session hijacking and Cross-Site Request Forgery attacks. PERT ensure that a node is communicating only with a known system that it had previously successfully transacted with. The prototype was tested in NS-3 testbed. The tests were carried out to observe the proposed solution's performance against spoofing attacks and identity theft attacks. PERT performed satisfactorily better than two other solutions used to benchmark it as presented in the results section. It recorded 35% longer average execution time than the faster benchmark but 20.06% shorter average execution time than the slower benchmark. It prevented 97% and 95% of requests from an identity thief and a spoofing attacker respectively. The benchmark solutions recorded lower prevention efficiency.
对计算机或网络上的用户进行身份验证可以保护隐私并将信息定向到适当的受众。目前的身份验证机制只在通信会话开始时对用户进行一次身份验证。用于窃取信息的新一波攻击使得用户的一次性身份验证不足,因为经过身份验证的会话现在可以被劫持。因此,在计算机事务会话中通信的各方有必要定期对另一端的另一方进行再确认。研究人员提出了不同的解决方案来防止或检测恶意接管计算机会话。这些解决方案要么适用于特定类型的攻击,要么只适用于用于开发攻击的特定应用程序。另一些则会在欺骗攻击面前失败。本研究提出PERT来减轻会话劫持和跨站请求伪造攻击。PERT确保节点只与以前成功处理过事务的已知系统通信。样机在NS-3试验台进行了测试。进行了测试,以观察所提出的解决方案对欺骗攻击和身份盗窃攻击的性能。如结果部分所示,PERT的性能比用于对其进行基准测试的另外两种解决方案要好得多。它记录的平均执行时间比较快的基准长35%,但比较慢的基准短20.06%。它分别阻止了97%和95%的身份窃贼和欺骗攻击者的请求。基准解决方案的预防效率较低。
{"title":"Past Event Recall Test for Mitigating Session Hijacking and Cross-Site Request Forgery","authors":"O. Salami, Abdulrazaq Muhammad Bashir, E. A. Adedokun, Yahaya Basira","doi":"10.1109/ict4da53266.2021.9672244","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672244","url":null,"abstract":"Authentication of user on a computer or network enable privacy protection and directing information to appropriate audience. Present authentication mechanisms only authenticate user once at the beginning of a communication session. The new wave of attacks that are used to steal information has made one-time authentication of users inadequate because the authenticated session can now be hijacked. Thus, it has become necessary for the communicating parties in a computer transaction session to reconfirm the other party on the other end periodically. Researchers have proposed different solutions to prevent or detect malicious taking over of a computer session. The solutions either work for particular types of attacks or only suitable for specific applications used to develop it. Others would fail in the face of spoofing attacks. This research proposed PERT for mitigating session hijacking and Cross-Site Request Forgery attacks. PERT ensure that a node is communicating only with a known system that it had previously successfully transacted with. The prototype was tested in NS-3 testbed. The tests were carried out to observe the proposed solution's performance against spoofing attacks and identity theft attacks. PERT performed satisfactorily better than two other solutions used to benchmark it as presented in the results section. It recorded 35% longer average execution time than the faster benchmark but 20.06% shorter average execution time than the slower benchmark. It prevented 97% and 95% of requests from an identity thief and a spoofing attacker respectively. The benchmark solutions recorded lower prevention efficiency.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"496 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latency optimized architectures for a real-time inference pipeline for control tasks 用于控制任务的实时推理管道的延迟优化架构
Florian Schellroth, Jannik Lehner, A. Verl
With the increasing development of GPUs, the inference time of CNNs continues to decrease. This enables new AI applications in manufacturing that have a direct impact on the control of a process. For this, a GPU is integrated into a real-time system so that the CNN can be executed in real-time. However, it is not sufficient to consider the inference process only, but also to minimize the latency of the whole pipeline. For this purpose, execution strategies of the inference pipeline are presented and evaluated in this paper. The presented architectures are compared using criteria for latency, implementation effort, and exchangeability. The latencies are quantified with measurements on a demonstrator. As a result, the most synchronous architecture has the lowest latency but is not suitable for the use in a service-oriented architecture as targeted by the Industry 4.0. For this, another architecture is presented, providing a good balance between latency and service orientation.
随着gpu的不断发展,cnn的推理时间不断缩短。这使得制造业中的新人工智能应用能够直接影响过程的控制。为此,将GPU集成到实时系统中,使CNN可以实时执行。然而,仅仅考虑推理过程是不够的,还要最小化整个管道的延迟。为此,本文提出并评价了推理管道的执行策略。使用延迟、实现工作量和可交换性标准对所提供的体系结构进行比较。通过在演示器上的测量,对延迟进行了量化。因此,最同步的体系结构具有最低的延迟,但不适合在工业4.0目标的面向服务的体系结构中使用。为此,提出了另一种体系结构,在延迟和面向服务之间提供了良好的平衡。
{"title":"Latency optimized architectures for a real-time inference pipeline for control tasks","authors":"Florian Schellroth, Jannik Lehner, A. Verl","doi":"10.1109/ict4da53266.2021.9672224","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672224","url":null,"abstract":"With the increasing development of GPUs, the inference time of CNNs continues to decrease. This enables new AI applications in manufacturing that have a direct impact on the control of a process. For this, a GPU is integrated into a real-time system so that the CNN can be executed in real-time. However, it is not sufficient to consider the inference process only, but also to minimize the latency of the whole pipeline. For this purpose, execution strategies of the inference pipeline are presented and evaluated in this paper. The presented architectures are compared using criteria for latency, implementation effort, and exchangeability. The latencies are quantified with measurements on a demonstrator. As a result, the most synchronous architecture has the lowest latency but is not suitable for the use in a service-oriented architecture as targeted by the Industry 4.0. For this, another architecture is presented, providing a good balance between latency and service orientation.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and Heuristic-based Usability Evaluation of an e-partograph 基于启发式的电子文档可用性评估
Tegegn Kebebaw, E. Alemneh, M. Azage, Eyava Misgan, Dabere Nigatu, Enyew Abate
Globally, high number of mothers and infants die every year during childbirth. To reduce this problem WHO recommends use of partograph to monitor the progression of labor. However, the conventional paper-based partograph is usually improperly used or it is not used at all. Filling paper partograph and drawing graphs based on measured parameters takes time and it is tiresome and complex. Automating partograph enhances partograph utilization and reduces adverse maternal and fetal outcomes. In this paper, we present the development and usability evaluations made to an electronic partograph (e-partograph). The usability evaluation was done to identify usability problems on the e-partograph and take remedies before putting it in operation. Four usability experts have involved in evaluating the application in each of the three devices (smartphones, tablets, & desktops) used for testing the application. Most of the usability problems were detected by experts who had used small sized devices. In order to give more attentions on the most serious problems we had conducted severity analysis. The analysis shows that the majority of the usability problems (82.8%) that were detected by smartphone users are ranked minor problems. Because of the size of the screens, usability discomforts must have been categorized as usability problems.
在全球范围内,每年有大量母亲和婴儿死于分娩。为了减少这一问题,世卫组织建议使用产程监护仪监测产程。然而,传统的纸本段落通常使用不当或根本不使用。根据测量的参数填充纸面和绘制图形既费时又繁琐。自动化产程提高产程利用率,减少不良母婴结局。在本文中,我们介绍了开发和可用性评估的一个电子段落(e-段落)。进行可用性评估是为了识别电子部件上的可用性问题,并在将其投入运行之前采取补救措施。四名可用性专家分别在三种设备(智能手机、平板电脑和台式电脑)上对应用程序进行评估,用于测试应用程序。大多数可用性问题都是由使用过小型设备的专家发现的。为了对最严重的问题给予更多的关注,我们进行了严重性分析。分析显示,智能手机用户发现的大多数可用性问题(82.8%)都是次要问题。由于屏幕的大小,可用性不适必须被归类为可用性问题。
{"title":"Development and Heuristic-based Usability Evaluation of an e-partograph","authors":"Tegegn Kebebaw, E. Alemneh, M. Azage, Eyava Misgan, Dabere Nigatu, Enyew Abate","doi":"10.1109/ict4da53266.2021.9672245","DOIUrl":"https://doi.org/10.1109/ict4da53266.2021.9672245","url":null,"abstract":"Globally, high number of mothers and infants die every year during childbirth. To reduce this problem WHO recommends use of partograph to monitor the progression of labor. However, the conventional paper-based partograph is usually improperly used or it is not used at all. Filling paper partograph and drawing graphs based on measured parameters takes time and it is tiresome and complex. Automating partograph enhances partograph utilization and reduces adverse maternal and fetal outcomes. In this paper, we present the development and usability evaluations made to an electronic partograph (e-partograph). The usability evaluation was done to identify usability problems on the e-partograph and take remedies before putting it in operation. Four usability experts have involved in evaluating the application in each of the three devices (smartphones, tablets, & desktops) used for testing the application. Most of the usability problems were detected by experts who had used small sized devices. In order to give more attentions on the most serious problems we had conducted severity analysis. The analysis shows that the majority of the usability problems (82.8%) that were detected by smartphone users are ranked minor problems. Because of the size of the screens, usability discomforts must have been categorized as usability problems.","PeriodicalId":371663,"journal":{"name":"2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130336592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Information and Communication Technology for Development for Africa (ICT4DA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1