Wednesday, July 28, 2021

INTELLIGENT SYSTEM FOR SOLVING PROBLEMS OF VETERINARY MEDICINE ON THE EXAMPLE OF DAIRY FARMS

Author :  Shopagulov Olzhas

Affiliation :  Kazakh Agro Technical University named after S. Seifullin

Country :  Kazakhstan

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 02, February, 2021

Abstract :

This article describes an automated expert system developed to diagnose cow diseases and assist veterinarians in treatment. We set before a diagnostic method based on the analysis of observed symptoms and experience of veterinarians. The system represents a web interface for maintaining a database of diseases, their symptoms and treatment methods, as well as a smartphone application for the diagnostics in offline mode. The developed intelligent system will allow agricultural producers to make specific decisions based on automated data analysis. Also presented in the article the information on the developed expert system, and the results of tests and testing during its use. The economic efficiency and importance of the work is determined by the possibility of automated recording of data on the livestock of animals, zoo technical and veterinary operations.

Keyword :  Intelligent system, diagnosis of diseases, application evaluation, milk yield, herd management

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110202.pdf

Sunday, July 25, 2021

VALIDATION METHOD TO IMPROVE BEHAVIORAL FLOWS ON UML REQUIREMENTS ANALYSIS MODEL BY CROSSCHECKING WITH STATE TRANSITION MODEL

Author :  Hikaru Morita

Affiliation :  Shibaura Institute of Technology

Country :  Japan

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 02, February, 2021

Abstract :

We propose a method to evaluate and improve the validity of required specifications by comparing models from different viewpoints. Inconsistencies are automatically extracted from the model in which the analyst defines the service procedure based on the initial requirement; thereafter, the analyst automatically compares it with a state transition model from the same initial requirement that has been created by an evaluator who is different from the analyst. The identified inconsistencies are reported to the analyst to enable the improvement of the required specifications. We develop a tool for extraction and comparison and then discuss its effectiveness by applying the method to a requirements specification example.

Keyword :  Requirements Specification, UML Modeling, Validation, Behavior Model.

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110201.pdf

Friday, July 23, 2021

GLYFN: A GLYPH-AWARE FUSION NETWORK FOR DISTRIBUTED CHINESE EVENT DETECTION

 Author :  Qi Zhai

Affiliation :  National University of Defense Technology

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

Recently, Chinese event detection has attracted more and more attention. As a special kind of hieroglyphics, Chinese glyphs are semantically useful but still unexplored in this task. In this paper, we propose a novel Glyph-Aware Fusion Network, named GlyFN. It introduces the glyphs' information into the pre-trained language model representation. To obtain a better representation, we design a Vector Linear Fusion mechanism to fuse them. Specifically, it first utilizes a max-pooling to capture salient information. Then, we use the linear operation of vectors to retain unique information. Moreover, for large-scale unstructured text, we distribute the data into different clusters parallelly. Finally, we conduct extensive experiments on ACE2005 and large-scale data. Experimental results show that GlyFN obtains increases of 7.48(10.18%) and 6.17(8.7%) in the F1-score for trigger identification and classification over the state-of-the-art methods, respectively. Furthermore, the event detection task for large-scale unstructured text can be efficiently accomplished through distribution.

Keyword :  Distributed Chinese Event Detection, Fusion Network, Glyph.

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110114.pdf

Friday, July 16, 2021

A CROSS-PLATFORM APPLICATION FOR COVID-19 DIAGNOSTIC

Author :  Hamza Chehili

Affiliation :  Frères Mentouri University

Country :  Algeria

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

The emergency of the Covid 19 pandemic has led technology to seek solutions to the different problems caused by the disease. In the monitoring area, connected devices offer new possibilities to a rapid detection and intervention of the new cases. They allow remote diagnostic to infected patients with covid 19 symptoms. However, the heterogeneity of the platform requires applications' developers to develop specific solutions for each platform. In this paper, we propose a cross-platform application that permits developer to use one code to build applications in different platforms. The paper describes the architecture of the application by presenting its three parts: interface screens (UI), data manipulation and authentication implementation. Finally, we show selected screens of an android release as an example.

Keyword :  Cross-Platform, Covid 19, Application, Development.

For More Details https://aircconline.com/csit/papers/vol11/csit110113.pdf

DSURVEY: A BLOCKCHAIN-ENHANCED SURVEY PLATFORM FOR THE DATA ECONOMY

Author :  Alessio Bonti

Affiliation :  Deakin University

Country :  Australia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

The data economy is predicted to boom and become a 156B dollars business by 2025. In this demo we introduce the use of distributed ledger technologies (DLT) applied to digital surveys in order to create an ecosystem where data becomes a central piece of a complex economy. Our system allows for interesting key features; ownership, traceability, secure profiles, and anonymity where required. Also, the most important feature, is the incentive mechanism that rewards all participants, both users creating surveys and those answering the surveys. DSurvey (decentralized survey) is a novel application framework that aims at moving away from the large commercial data sink paradigm whose business is restricted to gathering data and reselling it. Our solution makes so that no central data sink exists, and it always belongs to the creator, who are able to know who is using it, and receive royalties.

Keyword :  Decentralized survey, data ownership, incentive mechanism, ICO, blockchain.

For More Details https://aircconline.com/csit/papers/vol11/csit110112.pdf

Thursday, July 15, 2021

COMPARATIVE ANALYSIS OF TRANSFORMER BASED LANGUAGE MODELS

Author :  Aman Pathak

Affiliation :  Medi-Caps University

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

Natural language processing (NLP) has witnessed many substantial advancements in the past three years. With the introduction of the Transformer and self-attention mechanism, language models are now able to learn better representations of the natural language. These attentionbased models have achieved exceptional state-of-the-art results on various NLP benchmarks. One of the contributing factors is the growing use of transfer learning. Models are pre-trained on unsupervised objectives using rich datasets that develop fundamental natural language abilities that are fine-tuned further on supervised data for downstream tasks. Surprisingly, current researches have led to a novel era of powerful models that no longer require finetuning. The objective of this paper is to present a comparative analysis of some of the most influential language models. The benchmarks of the study are problem-solving methodologies, model architecture, compute power, standard NLP benchmark accuracies and shortcomings.

Keyword :  Natural Language Processing, Transformers, Attention-Based Models, Representation Learning, Transfer Learning

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110111.pdf

Wednesday, July 14, 2021

LOCAL TRANSLATION SERVICES FOR NEGLECTED LANGUAGES

Author :  David Noever

Affiliation :  Auburn University

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

Taking advantage of computationally lightweight, but high-quality translators prompt consideration of new applications that address neglected languages. For projects with protected or personal data, translators for less popular or low-resource languages require specific compliance checks before posting to a public translation API. In these cases, locally run translators can render reasonable, cost-effective solutions if done with an army of offline, smallscale pair translators. Like handling a specialist’s dialect, this research illustrates translating two historically interesting, but obfuscated languages: 1) hacker-speak (“l33t”) and 2) reverse (or “mirror”) writing as practiced by Leonardo da Vinci. The work generalizes a deep learning architecture to translatable variants of hacker-speak with lite, medium, and hard vocabularies. The original contribution highlights a fluent translator of hacker-speak in under 50 megabytes and demonstrates a companion text generator for augmenting future datasets with greater than a million bilingual sentence pairs. A primary motivation stems from the need to understand and archive the evolution of the international computer community, one that continuously enhances their talent for speaking openly but in hidden contexts. This training of bilingual sentences supports deep learning models using a long short-term memory, recurrent neural network (LSTM-RNN). It extends previous work demonstrating an English-to-foreign translation service built from as little as 10,000 bilingual sentence pairs. This work further solves the equivalent translation problem in twenty-six additional (non-obfuscated) languages and rank orders those models and their proficiency quantitatively with Italian as the most successful and Mandarin Chinese as the most challenging.

Keyword :  Recurrent Neural Network, Long Short-Term Memory (LSTM) Network, Machine Translation, Encoder-Decoder Architecture, Obfuscation.

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110110.pdf

Tuesday, July 13, 2021

MEGALITE: A NEW SPANISH LITERATURE CORPUS FOR NLP TASKS

Author :  Luis-Gil Moreno-Jiménez

Affiliation :  Université d’Avignon

Country :  France

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

In this work we introduce the Spanish Literary corpus MegaLite, a new corpus well adapted to Natural Language Processing (NLP), Computational Creativity (CC), Text generation and others studies. We address the creation of this corpus of literary documents to evaluate or design algorithms in automatic text generation, classification, stylometry and rhetorical analysis, sentiment detection, among other tasks. We have constituted this corpus manually in order to avoir genre classification errors. Near of 5 200 works on the genres narrative, poetry and plays constitute this corpus. Some statistics and applications of MegaLite corpus are presented and discussed. The MegaLite corpus will be available to the community as a free resource, under several adequate formats.

Keyword :  Emotion Corpus, Spanish Literary Corpus, Learning algorithms, Linguistic resources.

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110109.pdf

Monday, July 12, 2021

MAKING CROSS-DOMAIN RECOMMENDATIONS BY ASSOCIATING DISJOINT USERS AND ITEMS THROUGH THE AFFECTIVE AWARE PSEUDO ASSOCIATION METHOD

Author :  John Kalung Leung

Affiliation :  George Mason University

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

This paper utilizes an ingenious text-based affective aware pseudo association method (AAPAM) to link disjoint pseudo users and items across different information domains and leverage them to make cross-domain content-based and collaborative filtering recommendations. This paper demonstrates that the AAPAM method could seamlessly join different information domain datasets to act as one without any additional cross-domain information retrieval protocols. Besides making cross-domain recommendations, the benefit of joining datasets from different information domains through AAPAM is that it eradicates cold start issues while making serendipitous recommendations.

Keyword :  Behavioral Analysis, Emotion-aware Recommender System, Emotion prediction, Personality, Pseudo Users Association.

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110108.pdf

Tuesday, July 6, 2021

A DATA-DRIVEN STRATEGY TO COMBINE WORD EMBEDDINGS IN INFORMATION RETRIEVAL

Author :  Alfredo Silva

Affiliation :  Universidad Técnica Federico Santa María

Country :  Chile

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

Word embeddings are vital descriptors of words in unigram representations of documents for many tasks in natural language processing and information retrieval. The representation of queries has been one of the most critical challenges in this area because it consists of a few terms and has little descriptive capacity. Strategies such as average word embeddings can enrich the queries' descriptive capacity since they favor the identification of related terms from the continuous vector representations that characterize these approaches. We propose a datadriven strategy to combine word embeddings. We use Idf combinations of embeddings to represent queries, showing that these representations outperform the average word embeddings recently proposed in the literature. Experimental results on benchmark data show that our proposal performs well, suggesting that data-driven combinations of word embeddings are a promising line of research in ad-hoc information retrieval.

Keyword :  Word embeddings, information retrieval, query representation

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110107.pdf

Sunday, July 4, 2021

CONVOLUTIONAL NEURAL NETWORK FOR MALWARE CLASSIFICATION BASED ON API CALL SEQUENCE

Author :  Matthew Schofield

Affiliation :  Rowan University

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

Malicious software is constantly being developed and improved, so detection and classification of malicious applications is an ever-evolving problem. Since traditional malware detection techniques fail to detect new or unknown malware, machine learning algorithms have been used to overcome this disadvantage. We present a Convolutional Neural Network (CNN) for malware type classification based on the Windows system API (Application Program Interface) calls. This research uses a database of 5385 instances of API call streams labeled with eight types of malware of the source malicious application. We use a 1-Dimensional CNN by mapping API call streams as categorical and term frequency-inverse document frequency (TF-IDF) vectors respectively. We achieved accuracy scores of 98.17% using TF-IDF vector and 95.40% via categorical vector. The proposed 1-D CNN outperformed other traditional classification techniques with overall accuracy score of 91.0%.

Keyword :  Convolutional Neural Network, Malware Classification, Windows API Calls, Term Frequency Inverse Document Frequency Vectors

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110106.pdf

Thursday, July 1, 2021

MITIGATING PHISHING ATTACK IN ORGANISATIONS: A LITERATURE REVIEW

Author :  Wosah Peace Nmachi

Affiliation :  School of Computing & Engineering University of Gloucestershire

Country :  United Kingdom

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

Email is a channel of communication which is increasingly used by individuals and organisations for exchange of information. It is considered to be a confidential medium of communication but this is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an exploration into how phishing detection can be improved.

Keyword :  Cyber-security, Phishing Email Attack, Deep Learning, Stylometric Analysis

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110105.pdf


SOCIAL ENGINEERING INFOSEC POLICIES (SE-IPS)

Author :  Dalal Alharthi

Affiliation :  University of California Irvine

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  11, 01, January, 2021

Abstract :

The sudden increase in employees working primarily or even exclusively at home has generated unique societal and economic circumstances which makes the protection of information assets a major problem for organizations. The application of security policies is essential for mitigating the risk of social engineering attacks. However, incorporating and enforcing successful security policies in an organization is not a straightforward task. To that end, this paper develops a model of Social Engineering InfoSec Policies (SE-IPs) and investigates the incorporation of those SE-IPs in organizations. This paper proposes a customizable model of SE-IPs that can be adopted by a wide variety of organizations. The authors designed and distributed a survey to measure the incorporation level of formal SE-IPs in organizations. After collecting and analyzing the data which included over fifteen hundred responses, the authors found that on average, organizations incorporated just over fifty percent of the identified formal Social Engineering InfoSec Policies.

Keyword :  Cybersecurity, InfoSec, Security Policies, Social Engineering.

For More Detailshttps://aircconline.com/csit/papers/vol11/csit110104.pdf