首页 > 最新文献

2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
GDPR Compliant Consent Driven Data Protection in Online Social Networks: A Blockchain-Based Approach 在线社交网络中符合GDPR的同意驱动的数据保护:基于区块链的方法
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00054
J. Ahmed, Sule YAYILGAN YILDIRIM, Mariusz Nowostaki, Raghvendra Ramachandra, Ogerta Elezaj, Mohamad Abomohara
The enforcement of the General Data Protection Regulation (GDPR) represents a great challenge for online social networks (OSNs). Several OSNs are making significant changes to their systems to achieve compliance with GDPR. OSNs are required to obtain meaningful consent from users to achieve GDPR compliance. GDPR recognizes user's consent as a legitimate ground for personal data processing in the context of online social networks. This article presents a comparative study about the criteria for valid consent under GDPR and existing consent seeking practices of OSNs. In order to simplify the comparative process, Facebook is taken as a case study for online social networks. In conclusion of the comparative study, we argue that existing consent mechanisms in OSNs are not GDPR compliant. To achieve GDPR compliance in online social networks, we advocate a blockchain-based approach for consent management. This paper paves the way for designing a blockchain-based GDPR compliant consent management model for personal data processing in online social networks.
通用数据保护条例(GDPR)的实施对在线社交网络(osn)提出了巨大的挑战。一些osn正在对其系统进行重大更改,以满足GDPR的要求。为了符合GDPR要求,osn需要获得用户的有意义的同意。GDPR承认用户同意是在线社交网络中处理个人数据的合法依据。本文对GDPR下的有效同意标准和现有的osn寻求同意的做法进行了比较研究。为了简化比较过程,将Facebook作为在线社交网络的案例研究。在比较研究的结论中,我们认为osn中现有的同意机制不符合GDPR。为了在在线社交网络中实现GDPR合规性,我们提倡基于区块链的同意管理方法。本文为设计基于区块链的GDPR合规同意管理模型铺平了道路,该模型适用于在线社交网络中的个人数据处理。
{"title":"GDPR Compliant Consent Driven Data Protection in Online Social Networks: A Blockchain-Based Approach","authors":"J. Ahmed, Sule YAYILGAN YILDIRIM, Mariusz Nowostaki, Raghvendra Ramachandra, Ogerta Elezaj, Mohamad Abomohara","doi":"10.1109/ICICT50521.2020.00054","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00054","url":null,"abstract":"The enforcement of the General Data Protection Regulation (GDPR) represents a great challenge for online social networks (OSNs). Several OSNs are making significant changes to their systems to achieve compliance with GDPR. OSNs are required to obtain meaningful consent from users to achieve GDPR compliance. GDPR recognizes user's consent as a legitimate ground for personal data processing in the context of online social networks. This article presents a comparative study about the criteria for valid consent under GDPR and existing consent seeking practices of OSNs. In order to simplify the comparative process, Facebook is taken as a case study for online social networks. In conclusion of the comparative study, we argue that existing consent mechanisms in OSNs are not GDPR compliant. To achieve GDPR compliance in online social networks, we advocate a blockchain-based approach for consent management. This paper paves the way for designing a blockchain-based GDPR compliant consent management model for personal data processing in online social networks.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116905563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the Design of Co-operating Blockchains for IoT 物联网协同区块链设计研究
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00093
Gokhan Sagirlar, John D. Sheehan, E. Ragnoli
Enabling blockchain technology into IoT can help to achieve a proper distributed consensus based IoT system that overcomes disadvantages of today’s centralized infrastructures, such as, among others, high cloud server maintenance costs, weakness for supporting time-critical IoT applications, security and trust issues. However, meeting requirements posed by IoT in blockchain domain is not an easy endeavour. [1] proposes Hybrid-IoT, as a step towards decentralizing IoT with the help of blockchain technology. Hybrid-IoT consists of multiple PoW sub-blockchains to achieve distributed consensus among IoT devices and an inter-connector framework, to execute transactions between sub-blockchains. In this paper, we take the first step towards designing an inter-connector for multiple blockchains for IoT that is specifically tailored for the Hybrid-IoT architecture. We also provide a detailed security discussion, in order to identify threats and we provide discussion on how to cope with threats.
将区块链技术应用于物联网可以帮助实现一个适当的基于分布式共识的物联网系统,克服当今集中式基础设施的缺点,例如云服务器维护成本高、支持时间关键型物联网应用的弱点、安全和信任问题。然而,满足物联网在区块链领域提出的要求并非易事。[1]提出了混合物联网,作为在区块链技术的帮助下实现物联网去中心化的一步。混合物联网由多个PoW子区块链组成,以实现物联网设备之间的分布式共识,并由一个互连框架组成,以执行子区块链之间的交易。在本文中,我们迈出了为物联网的多个区块链设计一个内部连接器的第一步,该连接器是专门为混合物联网架构量身定制的。我们还提供了详细的安全讨论,以便识别威胁,并提供了如何应对威胁的讨论。
{"title":"On the Design of Co-operating Blockchains for IoT","authors":"Gokhan Sagirlar, John D. Sheehan, E. Ragnoli","doi":"10.1109/ICICT50521.2020.00093","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00093","url":null,"abstract":"Enabling blockchain technology into IoT can help to achieve a proper distributed consensus based IoT system that overcomes disadvantages of today’s centralized infrastructures, such as, among others, high cloud server maintenance costs, weakness for supporting time-critical IoT applications, security and trust issues. However, meeting requirements posed by IoT in blockchain domain is not an easy endeavour. [1] proposes Hybrid-IoT, as a step towards decentralizing IoT with the help of blockchain technology. Hybrid-IoT consists of multiple PoW sub-blockchains to achieve distributed consensus among IoT devices and an inter-connector framework, to execute transactions between sub-blockchains. In this paper, we take the first step towards designing an inter-connector for multiple blockchains for IoT that is specifically tailored for the Hybrid-IoT architecture. We also provide a detailed security discussion, in order to identify threats and we provide discussion on how to cope with threats.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1084 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face Recognition Techniques using Statistical and Artificial Neural Network: A Comparative Study 基于统计和人工神经网络的人脸识别技术的比较研究
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00032
Nawaf O. Alsrehin, Mu’tasem A. Al-Taamneh
Face recognition is the process of identifying a person by their facial characteristics from a digital image or a video frame. Face recognition has extensive applications and there will be a massive development in future technologies. The main contribution of this research is to perform a comparative study between different statistical-based face recognition techniques, namely: Eigen-faces, Fisher-faces, and Local Binary Patterns Histograms (LBPH) to measure their effectiveness and efficiency using real-database images. These recognizers still used on top of commercial face recognition products. Additionally, this research is comprehensively comparing 17 face-recognition techniques adopted in research and industry that use artificial-neural network, criticize and categories them into an understandable category. Also, this research provides some directions and suggestions to overcome the direct and indirect issues for face recognition. It has found that there is no existing recognition method that the community of face recognition has agreed on and solves all the issues that face the recognition, such as different pose variation, illumination, blurry and low-resolution images. This study is important to the recognition communities, software companies, and government security officials. It has a direct impact on drawing clear path for new face recognition propositions. This study is one of the studies with respect to the size of its reviewed approaches and techniques.
人脸识别是通过数字图像或视频帧的面部特征识别一个人的过程。人脸识别有着广泛的应用,未来的技术将会有巨大的发展。本研究的主要贡献是对不同的基于统计的人脸识别技术进行比较研究,即:特征脸、fisher脸和局部二值模式直方图(LBPH),并使用真实数据库图像来衡量它们的有效性和效率。这些识别器仍然在商业人脸识别产品之上使用。此外,本研究全面比较了17种在研究和工业中采用的使用人工神经网络的面部识别技术,批评并将其分类为可理解的类别。同时,本研究也为克服人脸识别的直接和间接问题提供了一些方向和建议。研究发现,目前还没有一种识别方法能够解决人脸识别所面临的各种姿态变化、光照、图像模糊和低分辨率等问题。本研究对识别社区、软件公司和政府安全官员具有重要意义。它直接影响到新的人脸识别命题绘制清晰的路径。本研究是其中一项研究,其审查的方法和技术的规模。
{"title":"Face Recognition Techniques using Statistical and Artificial Neural Network: A Comparative Study","authors":"Nawaf O. Alsrehin, Mu’tasem A. Al-Taamneh","doi":"10.1109/ICICT50521.2020.00032","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00032","url":null,"abstract":"Face recognition is the process of identifying a person by their facial characteristics from a digital image or a video frame. Face recognition has extensive applications and there will be a massive development in future technologies. The main contribution of this research is to perform a comparative study between different statistical-based face recognition techniques, namely: Eigen-faces, Fisher-faces, and Local Binary Patterns Histograms (LBPH) to measure their effectiveness and efficiency using real-database images. These recognizers still used on top of commercial face recognition products. Additionally, this research is comprehensively comparing 17 face-recognition techniques adopted in research and industry that use artificial-neural network, criticize and categories them into an understandable category. Also, this research provides some directions and suggestions to overcome the direct and indirect issues for face recognition. It has found that there is no existing recognition method that the community of face recognition has agreed on and solves all the issues that face the recognition, such as different pose variation, illumination, blurry and low-resolution images. This study is important to the recognition communities, software companies, and government security officials. It has a direct impact on drawing clear path for new face recognition propositions. This study is one of the studies with respect to the size of its reviewed approaches and techniques.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122066221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Architecture for Network Information Management 一种高效的网络信息管理体系结构
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00080
Maria Zafar, Seerat Iqbal Cheema
Session initiation protocol deployments in VoIP networks primarily emerged with an aim to ensure high scalability, simplicity and flexibility. Despite all the listed advantages, the increasing SIP signaling traffic needs to invoke methods attempting to mitigate overload and fail over that the data centers are usually facing. In this paper, a load balancing model based on cluster based replication architecture is proposed to achieve high capacity and a highly available architecture. We quantitatively measure the improvements by implementing asterisk and openSIP based server setup for voice exchange for the indication of scalable and redundant architecture. In the past years, high availability was achieved by host per host redundancy declaring it as an expensive technique for hardware. Our proposed technique is suitable for a redundant system with mission critical applications and can be offered to extend the service level by sharing the running virtual machines while duplicating the resources. The proposed model implemented in our test-bed configured three asterisk servers and the node statistics are tested via cacti server to guarantee the failover technique. The experimental results establish that the proposed model reduce low server utilization and lack of power proportionality. The proposed solution is unique in its way that it is also recommended for complex and unmanageable environment without relying on add on balancing methods.
在VoIP网络中部署会话发起协议主要是为了确保高可扩展性、简单性和灵活性。尽管列出了所有这些优点,但是不断增加的SIP信令流量需要调用一些方法来减轻数据中心通常面临的过载和故障转移。本文提出了一种基于集群复制架构的负载均衡模型,以实现高容量和高可用性架构。我们通过为语音交换实现星号和基于openSIP的服务器设置来定量测量改进,以指示可扩展和冗余架构。在过去的几年里,高可用性是通过主机对主机的冗余来实现的,这对硬件来说是一种昂贵的技术。我们提出的技术适用于具有关键任务应用程序的冗余系统,并且可以通过在复制资源的同时共享正在运行的虚拟机来扩展服务级别。在我们的测试平台上实现的模型配置了三个星号服务器,节点统计数据通过cacti服务器进行测试,以保证故障转移技术。实验结果表明,该模型降低了服务器利用率低和功耗不成比例的问题。所提出的解决方案的独特之处在于它也被推荐用于复杂和难以管理的环境,而不依赖于添加平衡方法。
{"title":"An Efficient Architecture for Network Information Management","authors":"Maria Zafar, Seerat Iqbal Cheema","doi":"10.1109/ICICT50521.2020.00080","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00080","url":null,"abstract":"Session initiation protocol deployments in VoIP networks primarily emerged with an aim to ensure high scalability, simplicity and flexibility. Despite all the listed advantages, the increasing SIP signaling traffic needs to invoke methods attempting to mitigate overload and fail over that the data centers are usually facing. In this paper, a load balancing model based on cluster based replication architecture is proposed to achieve high capacity and a highly available architecture. We quantitatively measure the improvements by implementing asterisk and openSIP based server setup for voice exchange for the indication of scalable and redundant architecture. In the past years, high availability was achieved by host per host redundancy declaring it as an expensive technique for hardware. Our proposed technique is suitable for a redundant system with mission critical applications and can be offered to extend the service level by sharing the running virtual machines while duplicating the resources. The proposed model implemented in our test-bed configured three asterisk servers and the node statistics are tested via cacti server to guarantee the failover technique. The experimental results establish that the proposed model reduce low server utilization and lack of power proportionality. The proposed solution is unique in its way that it is also recommended for complex and unmanageable environment without relying on add on balancing methods.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126881649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Brief Survey of the Main Internet-Based Approaches. An Outlook from the Internet of Things Perspective 基于互联网的主要方法综述。从物联网的角度展望
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00091
Pablo Pico-Valencia, J. A. Holgado-Terriza, Xavier Quiñónez-Ku
The Internet of Things (IoT) is an approach that arose as an alternative to handle billions of digital devices, people and services of the real-world which are interconnected over Internet. In this paper, we present a comprehensive survey where main paradigms associated with IoT -Internet of Services (IoS), Internet of People (IoP), Internet of Content (IoC) and the emerging Internet of Agents (IoA)- are outlined. We analyze these paradigms in terms of their definition, scope, goals and their correlation with the IoT in order to identify the main challenges that will involve to the next generation of the IoT applying a process of agentification to achieve more autonomous, collaborative and intelligent IoT systems.
物联网(IoT)是一种作为处理数十亿通过互联网互联的现实世界的数字设备、人员和服务的替代方案而出现的方法。在本文中,我们提出了一项全面的调查,其中概述了与物联网相关的主要范式-服务互联网(IoS),人联网(IoP),内容互联网(IoC)和新兴的代理互联网(IoA)。我们根据这些范式的定义、范围、目标及其与物联网的相关性来分析这些范式,以确定下一代物联网将面临的主要挑战,并应用代理过程来实现更加自主、协作和智能的物联网系统。
{"title":"A Brief Survey of the Main Internet-Based Approaches. An Outlook from the Internet of Things Perspective","authors":"Pablo Pico-Valencia, J. A. Holgado-Terriza, Xavier Quiñónez-Ku","doi":"10.1109/ICICT50521.2020.00091","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00091","url":null,"abstract":"The Internet of Things (IoT) is an approach that arose as an alternative to handle billions of digital devices, people and services of the real-world which are interconnected over Internet. In this paper, we present a comprehensive survey where main paradigms associated with IoT -Internet of Services (IoS), Internet of People (IoP), Internet of Content (IoC) and the emerging Internet of Agents (IoA)- are outlined. We analyze these paradigms in terms of their definition, scope, goals and their correlation with the IoT in order to identify the main challenges that will involve to the next generation of the IoT applying a process of agentification to achieve more autonomous, collaborative and intelligent IoT systems.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126374700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Image Cipher Based on Latin Cubes 基于拉丁立方体的图像密码
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00033
Ming Xu, Z. Tian
An image cipher based on Latin cubes is presented in this paper. Latin cube is the high-dimensional form of Latin square. Although Latin squares have been widely used in image encryption, the applications of Latin cubes in image encryption are still relatively few. Analogous to Latin squares, Latin cubes also have some excellent cryptographic properties, such as discreteness and uniformity. Specifically, Latin cubes have 3D attribute. Based on these properties, a permutation scheme which is highly plaintext-related and a substitution scheme which has strong diffusivity have been constructed in this paper. Simulation results demonstrate that the proposed algorithm has high security. It is therefore very suitable for the insecure network environment.
提出了一种基于拉丁立方体的图像密码。拉丁立方体是拉丁方的高维形式。虽然拉丁平方在图像加密中得到了广泛的应用,但拉丁立方在图像加密中的应用还比较少。与拉丁方块类似,拉丁立方体也具有一些优秀的密码特性,如离散性和均匀性。具体来说,拉丁多维数据集具有3D属性。基于这些性质,本文构造了一种与明文高度相关的置换方案和一种具有强扩散性的置换方案。仿真结果表明,该算法具有较高的安全性。因此非常适用于不安全的网络环境。
{"title":"An Image Cipher Based on Latin Cubes","authors":"Ming Xu, Z. Tian","doi":"10.1109/ICICT50521.2020.00033","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00033","url":null,"abstract":"An image cipher based on Latin cubes is presented in this paper. Latin cube is the high-dimensional form of Latin square. Although Latin squares have been widely used in image encryption, the applications of Latin cubes in image encryption are still relatively few. Analogous to Latin squares, Latin cubes also have some excellent cryptographic properties, such as discreteness and uniformity. Specifically, Latin cubes have 3D attribute. Based on these properties, a permutation scheme which is highly plaintext-related and a substitution scheme which has strong diffusivity have been constructed in this paper. Simulation results demonstrate that the proposed algorithm has high security. It is therefore very suitable for the insecure network environment.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115823645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Initial Feasibility Study to Identify Loneliness Among Mental Health Patients from Clinical Notes 从临床记录中识别心理健康患者孤独感的初步可行性研究
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00019
P. Bearse, Omar Manejwala, Atif Farid Mohammad, I. R. I. Haque
There is increasing evidence that better health outcomes for patients can be achieved with improvement in mental health. Loneliness, one such condition, is itself toxic consequently driving increase in both chronic disease morbidity and mortality. Thus, the early identification of loneliness and interventions to address it are of urgent importance. One potential mechanism for identifying loneliness rests in analyzing care provider notes which include details regarding a provider's interaction with patients and often provide insights about both mental and physical health. To automatically determine which patients are suffering from loneliness, a data science analysis based on natural language processing techniques was performed on clinical notes from 12 care providers for 128 patients. The analysis techniques included co-occurrence of uni-gram, bi-gram, tri-gram and quad-gram words; sentiment analysis using AFINN sentiment lexicon scores; and word usage frequencies. The results surfaced key challenges associated with determining the presence of loneliness suggested the importance of including validated clinical questionnaires specifically designed for identifying loneliness.
越来越多的证据表明,改善心理健康可以为患者带来更好的健康结果。孤独就是这样一种情况,它本身是有毒的,因此会导致慢性病发病率和死亡率的增加。因此,早期识别孤独并采取干预措施来解决它是迫切重要的。识别孤独的一种潜在机制在于分析护理提供者的笔记,其中包括提供者与患者互动的细节,并且通常提供有关心理和身体健康的见解。为了自动确定哪些患者正在遭受孤独,基于自然语言处理技术的数据科学分析对来自12名护理提供者的128名患者的临床记录进行了分析。分析方法包括单词、双词、三词和四词共现;基于AFINN情感词汇评分的情感分析;以及单词的使用频率。研究结果揭示了与确定孤独存在相关的关键挑战,表明了包括专门为识别孤独而设计的有效临床问卷的重要性。
{"title":"An Initial Feasibility Study to Identify Loneliness Among Mental Health Patients from Clinical Notes","authors":"P. Bearse, Omar Manejwala, Atif Farid Mohammad, I. R. I. Haque","doi":"10.1109/ICICT50521.2020.00019","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00019","url":null,"abstract":"There is increasing evidence that better health outcomes for patients can be achieved with improvement in mental health. Loneliness, one such condition, is itself toxic consequently driving increase in both chronic disease morbidity and mortality. Thus, the early identification of loneliness and interventions to address it are of urgent importance. One potential mechanism for identifying loneliness rests in analyzing care provider notes which include details regarding a provider's interaction with patients and often provide insights about both mental and physical health. To automatically determine which patients are suffering from loneliness, a data science analysis based on natural language processing techniques was performed on clinical notes from 12 care providers for 128 patients. The analysis techniques included co-occurrence of uni-gram, bi-gram, tri-gram and quad-gram words; sentiment analysis using AFINN sentiment lexicon scores; and word usage frequencies. The results surfaced key challenges associated with determining the presence of loneliness suggested the importance of including validated clinical questionnaires specifically designed for identifying loneliness.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130957680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Explainable Deep-Fake Detection Using Visual Interpretability Methods 使用视觉可解释性方法的可解释深度假检测
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00051
Badhrinarayan Malolan, Ankit Parekh, F. Kazi
Deep-Fakes have sparked concerns throughout the world because of their potentially explosive consequences. A dystopian future where all forms of digital media are potentially compromised and public trust in Government is scarce doesn't seem far off. If not dealt with the requisite seriousness, the situation could easily spiral out of control. Current methods of Deep-Fake detection aim to accurately solve the issue at hand but may fail to convince a lay-person of its reliability and thus, lack the trust of the general public. Since the fundamental issue revolves around earning the trust of human agents, the construction of interpretable and also easily explainable models is imperative. We propose a framework to detect these Deep-Fake videos using a Deep Learning Approach: we have trained a Convolutional Neural Network architecture on a database of extracted faces from FaceForensics' DeepFakeDetection Dataset. Furthermore, we have tested the model on various Explainable AI techniques such as LRP and LIME to provide crisp visualizations of the salient regions of the image focused on by the model. The prospective and elusive goal is to localize the facial manipulations caused by Faceswaps. We hope to use this approach to build trust between AI and Human agents and to demonstrate the applicability of XAI in various real-life scenarios.
深度造假因其潜在的爆炸性后果而引发了全世界的担忧。一个反乌托邦的未来,所有形式的数字媒体都可能受到损害,公众对政府的信任稀缺,这似乎并不遥远。如果不采取必要的严肃措施,局势很容易失控。目前的Deep-Fake检测方法旨在准确地解决手头的问题,但可能无法让外行人相信其可靠性,因此缺乏公众的信任。由于基本问题围绕着赢得人类代理的信任,因此构建可解释且易于解释的模型势在必行。我们提出了一个使用深度学习方法检测这些深度伪造视频的框架:我们在从facefrenics的DeepFakeDetection数据集提取的人脸数据库上训练了一个卷积神经网络架构。此外,我们在各种可解释的人工智能技术(如LRP和LIME)上测试了该模型,以提供模型所关注的图像突出区域的清晰可视化。有前景的和难以实现的目标是定位面部操作引起的换脸。我们希望用这种方法在人工智能和人类代理之间建立信任,并展示XAI在各种现实场景中的适用性。
{"title":"Explainable Deep-Fake Detection Using Visual Interpretability Methods","authors":"Badhrinarayan Malolan, Ankit Parekh, F. Kazi","doi":"10.1109/ICICT50521.2020.00051","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00051","url":null,"abstract":"Deep-Fakes have sparked concerns throughout the world because of their potentially explosive consequences. A dystopian future where all forms of digital media are potentially compromised and public trust in Government is scarce doesn't seem far off. If not dealt with the requisite seriousness, the situation could easily spiral out of control. Current methods of Deep-Fake detection aim to accurately solve the issue at hand but may fail to convince a lay-person of its reliability and thus, lack the trust of the general public. Since the fundamental issue revolves around earning the trust of human agents, the construction of interpretable and also easily explainable models is imperative. We propose a framework to detect these Deep-Fake videos using a Deep Learning Approach: we have trained a Convolutional Neural Network architecture on a database of extracted faces from FaceForensics' DeepFakeDetection Dataset. Furthermore, we have tested the model on various Explainable AI techniques such as LRP and LIME to provide crisp visualizations of the salient regions of the image focused on by the model. The prospective and elusive goal is to localize the facial manipulations caused by Faceswaps. We hope to use this approach to build trust between AI and Human agents and to demonstrate the applicability of XAI in various real-life scenarios.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133687010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Obstacle Detection Using Faster R-CNN Oriented to an Autonomous Feeding Assistance System 面向自主馈送辅助系统的更快R-CNN障碍物检测
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00029
J. Pinzón-Arenas, R. Jiménez-Moreno
Obstacle detection has been a relevant issue for the implementation of autonomous robotic systems, within which increasingly robust algorithms have begun to be applied, especially Deep Learning techniques. However, these have not been widely used for the detection of obstacles in static robotic agents, contrary to what happens with mobile agents. For this reason, this work explores the use of one of these techniques, which is a neural network based on the Faster R-CNN, focused on detecting a specific obstacle (hands) in an application environment for a food assistance robot. For this purpose, a database containing 6205 training images and 1350 validation images was prepared, where 31 users perform different movements with their hands. To verify the capacity of the network, 3 architectures of different depths were implemented, which were evaluated and compared, resulting in the network of greater depth obtained the highest accuracy, of 77.4%, taking into account that the hands are not only still but also in movement, generating distortion in them and greater difficulty for their detection. Also, the internal behavior of the network was visualized through activations, to verify what it had learned, showing that it managed to focus on the hands, with some activations located in parts of the user's body such as face and arm.
障碍物检测一直是实现自主机器人系统的一个相关问题,其中越来越强大的算法已经开始应用,特别是深度学习技术。然而,这些并没有被广泛用于检测静态机器人代理中的障碍物,与移动代理相反。出于这个原因,这项工作探索了其中一种技术的使用,这是一种基于Faster R-CNN的神经网络,专注于在食品援助机器人的应用环境中检测特定的障碍物(手)。为此,我们准备了一个包含6205张训练图像和1350张验证图像的数据库,其中31个用户用手做不同的动作。为了验证网络的能力,我们实现了3种不同深度的架构,并对其进行了评估和比较,结果表明,考虑到手既静止又运动,会产生扭曲,检测难度较大,深度越大的网络准确率最高,达到77.4%。此外,该网络的内部行为通过激活来可视化,以验证它所学到的内容,显示它设法专注于手,一些激活位于用户身体的某些部位,如面部和手臂。
{"title":"Obstacle Detection Using Faster R-CNN Oriented to an Autonomous Feeding Assistance System","authors":"J. Pinzón-Arenas, R. Jiménez-Moreno","doi":"10.1109/ICICT50521.2020.00029","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00029","url":null,"abstract":"Obstacle detection has been a relevant issue for the implementation of autonomous robotic systems, within which increasingly robust algorithms have begun to be applied, especially Deep Learning techniques. However, these have not been widely used for the detection of obstacles in static robotic agents, contrary to what happens with mobile agents. For this reason, this work explores the use of one of these techniques, which is a neural network based on the Faster R-CNN, focused on detecting a specific obstacle (hands) in an application environment for a food assistance robot. For this purpose, a database containing 6205 training images and 1350 validation images was prepared, where 31 users perform different movements with their hands. To verify the capacity of the network, 3 architectures of different depths were implemented, which were evaluated and compared, resulting in the network of greater depth obtained the highest accuracy, of 77.4%, taking into account that the hands are not only still but also in movement, generating distortion in them and greater difficulty for their detection. Also, the internal behavior of the network was visualized through activations, to verify what it had learned, showing that it managed to focus on the hands, with some activations located in parts of the user's body such as face and arm.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Title page iii] [标题页iii]
Pub Date : 2020-03-01 DOI: 10.1109/icict50521.2020.00002
{"title":"[Title page iii]","authors":"","doi":"10.1109/icict50521.2020.00002","DOIUrl":"https://doi.org/10.1109/icict50521.2020.00002","url":null,"abstract":"","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130665147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 3rd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1