Logo IIIS


International Institute of
Informatics and Systemics

Proceedings of the 12th International Multi-Conference on
Complexity, Informatics and Cybernetics: IMCIC 2021

VOLUME I (Papers)


A Data Oriented Approach to the Problem of Power Grid Non-Technical Losses in Developing Countries

Grant, Leonardo *; Latchman, Haniph ** (* Jamaica, ** United States)

ABSTRACT:
Power grids are made up of a robust collection of technologies that have changed very little for decades. However in recent years the falling costs of technology has led to rapid advancements the physical grid and utility operations. This has given rise to novel solutions for problems which have long plagued the energy sector such as the use of machine learning, smart grids and the combination of the two to detect and mitigate non-technical losses (NTL). NTL persist in developing countries where much of the energy generated is used without payment, either willfully through theft or unknowingly through meter defects. Developed countries use their smart grid’s advanced metering infrastructure (AMI), coupled with data analysis using machine learning to detect NTL. However, in developing countries, such as Jamaica, where there is less smart meter coverage, the utility cannot wait until all their meters are upgraded to smart meters before it combats nontechnical losses. This paper quantifies NTL in Jamaica, current trends in NTL detection and propose an effective mitigation solution.

Abstract | PDF


A Deep Learning Method for Change Detection in Synthetic Aperture Radar Images

Attioui, Sanae; Najah, Said (Morocco)

ABSTRACT:
Facing the challenges of speckle noise and the difficulty of producing labelled data in synthetic-aperture radar (SAR) image change detection methods, we propose a novel change detection method by taking advantage of a deep network. The main idea of the proposed method is to generate the final change map directly from the two original images through a Deep Belief Network (DBN) as the deep architecture without any preprocessing operations, which prevents the process of generating the difference image (DI), thus reducing the direct impact of the DI on change detection performance. The training process of this network included unsupervised feature learning followed by supervised network fine-tuning. Our two main objectives are to reduce the impact of the presence of speckle noise and also the processing time. On the one hand, high-quality training samples were selected by introducing a fast and robust pre-classification based on a morphological reconstruction and filtering of local members, thus, avoiding the network to produce a lot of redundant functionalities, and on the other hand, a virtual sample generation method that tries to enrich the training samples used which results in a reduction of overfitting raised by limited SAR data and a faster optimization of the network. The experimental results on two real SAR image datasets confirm the efficiency of the proposed method.

Abstract | PDF


A Literature Review: Accommodating Kids in Inner City Developments

Malaila, Charles Pfungwa *; Burger, Michelle *; van Heerden, Andries (Hennie) **; Chawynski, Greg ** (* South Africa, ** New Zealand)

ABSTRACT:
The global concept of child friendly cities is important and therefor needs to be explored. There is a growing need to analise the CBD and ensure that it is a friendly environment for its inhabitants. This article focusses on kids in the inner city developments. The importance of innovative entrepreneurship for community good is apparent. Innovative development is essential when planning and constructing within the inner city.

Abstract | PDF


An Application of Event-Driven Platform for Smart City Decision Making

Saric, Andrej; Zakarija, Ivona; Batos, Vedran (Croatia)

ABSTRACT:
This paper reviews the smart city framework based on analysis of selected event-driven models, presenting modified event-driven platform as the part of implemented software solution. In addition, the outcomes open future research opportunities. Rapid urbanization results in problems such as lack of resources including energy and overcrowding. By applying computing technology and the Internet of Things (IoT) we can prepare models for the development of smart cities and reduce these problems. In this paper, we propose a new event-driven platform triggered by smart city events and by simplified data transformation leading to successful decision making. The scope of input parameters includes tags, events and probability factors, that are leveraged to prepare optimized decision making process, and initiate reasonable actions.

Abstract | PDF


Analysis of Risks to Data Privacy in All United Nations Member Countries

Patterson, Wayne (United States)

ABSTRACT:
Over 20 years ago, the surprising research by LaTanya Sweeney demonstrated that publicly available database information exposed the overwhelming percentage of United States residents to information easily available, in order to facilitate the capture by hackers or other malevolent actors of such personal information, through techniques we now refer to as “dumpster diving.” In particular, her research demonstrated that approximately 87% of the United States population can be identified uniquely using only the Unites States’ five-digit postal code, date of birth (including year), and gender. Although this result has held up over time, Sweeney’s technique made no attempt to develop similar estimates for other countries. In this paper, we use Sweeney’s techniques in order to provide estimates of the ability of similar demographics to provide the same type of data for all United Nations member countries. Through this mechanism, we attempt to determine the susceptibility to data privacy attacks throughout a substantial portion of the world’s population.

Abstract | PDF


Artificial Intelligence and Neuroscience: The Impact on Data Protection and Privacy

Fabiano, Nicola (Italy)

ABSTRACT:
Starting from a multidisciplinary approach, we want to investigate the impact of high technologies used in neuroscience to analyse the effects on data privacy and protection domain. It is still a field under a due course of deepening, and probably there are few scientific pieces of evidence, but it certainly is one of the most relevant challenges of our times although some people think this is a topic of the future. Neuroscience, data protection and privacy are current aspects, and we should deal with them now to avoid unrecoverable consequences or distorted findings. What will be the destiny of privacy and data protection in the neuroscience domain? Our approach is not technical, and thus we will not describe or propose specific technical solutions. Still, our goal is to warn about the possible effects on data protection and privacy, essentially on human dignity, hoping scientists would consider the principles laid down by the current laws. In the neuroscience field, there is some very innovative research on the human brain and behaviour where scientists decided to use high-technologies to investigate the effects. Here comes into play also another fundamental aspect: Ethics. We are facing a challenge, and we already heard about "neuroprivacy". This new term entails examining another privacy sector to deal with, and it led us to create a neologism which we defined as "neuroprivacy rights". Hence, there is needing to investigate all the legal effects on data protection and privacy derived from applied technologies in the neuroscience field to clarify whether we have a new category of rights. We think it is crucial to apply the Data Protection and Privacy Relationships Model (its acronym is DAPPREMO) in this deepening path.

Abstract | PDF


Bestination: A Sustainable Approach to Problem Solving for Entrepreneurs

Sachayansrisakul, Navarat *; Ponnara, Nattawat ** (* Australia, ** Thailand)

ABSTRACT:
Despite our humanity has significantly progressed over the past decades in terms of advanced technology, it has also brought along an excessive consumerism and dysfunctional societies. People have the constant urge to buy and consume unnecessary products and services just to be seen on different social media platforms. This could be viewed as an opportunity as well as a threat for the entrepreneurs. Our world appears to be smaller in its size through better connection via social media platforms; and yet people feel further isolated. By saying all this, this paper is not against the advanced technology or capitalism. Rather, this paper suggests a moderate approach to ‘moderation’ in business practices.
Bestination studies offer a moral and an ethical approach to achieving the best destination for small to medium enterprises. Problem solving is an essential component for entrepreneurs to deal with on a regular basis. It is common for entrepreneurs to solve problems by dealing with the end results without realising the actual causes of any problems. Henceforth, this study provides a model to ethically solve problems from the root causes so that it will lead to sustainability.
This research semi-structurally interviewed 93 entrepreneurs over the period of 4 months. The respondents have operated their businesses beyond their first few years of operation. The questions addressed are: How can businesses identify root causes of a problem and solve it in a manner that leads to sustainability? According to Buddhist principles and some findings, a model called ‘The bestination problem solving model, was developed for entrepreneurs.

Abstract | PDF


Blockchain Technology and Cryptomarket: Vulnerabilities and Risk Assessment

Dumas, Jean-Guillaume; Jimenez-Garces, Sonia; Șoiman, Florentina (France)

ABSTRACT:
After ten years of continuous development and innovation, the cryptomarket and the Blockchain technology are still very much challenged and far from the mainstream adoption. We thus here propose a detailed risk assessment based on a combined financial and technological analysis. We take into consideration technological issues, such as consensus, network, cryptographic primitives, quantum and smart contract attacks, together with financial concerns such as market, information, liquidity, supply, reputation and environmental risks. Then, to complete this study, we propose ways to determine the probability that technological vulnerabilities can trigger financial risk. Here, we tackle concepts such as financial behavior, responsible investment and Blockchain literacy, as possible tools for assessing risk. The results are relative to: 1. an identified continuity between the technological risks and financial ones; 2. a way to determine the likelihood of triggering financial risks through technical vulnerabilities.

Abstract | PDF


Cognition Follows from Entropy Increasing and World Complexity

Mikheev, Yuriy (Russian Federation)

ABSTRACT:
The paper demonstrates that cognition is a direct result of functioning fundamental physical phenomenon – the entropy increasing and the existence of complex relations among observed events. Cognition is considered as a process of changes in the system that results in getting the ability to make accurate prognoses and decisions. Decision and in particular accurate prognosis are the results of cognition functioning. In the previous work [6] the Z measure was introduced and its usefulness for regularities recognition was demonstrated. In this paper, we show the connection of the Z measure with the second law of thermodynamics applied to nonequilibrium dynamic systems [8]. On that basis, we infer that cognition exists in such kind of systems and depends on the complexity of relations among observed events of the environment. By several examples, we show that the Z measure allows creating of artificial cognitive systems that find out regular relations in various types of information - tabular data, texts, images.

Abstract | PDF


Constraint Programming as an AI Option

Abbott, Russ; Lim, Jung Soo (United States)

ABSTRACT:
We examine the history of Artificial Intelligence, from its audacious beginnings to the current day. We argue that constraint programming (a) is the rightful heir and modern-day descendent of that early work and (b) offers a more stable and reliable platform for AI than deep machine learning.
We offer a tutorial on constraint programming solvers that should be accessible to most software developers. We show how constraint programming works, how to implement constraint programming in Python, and how to integrate a Python constraint-programming solver with other Python code.

Abstract | PDF


Creative Accounting versus Fraud – An Interdisciplinary Approach

Chiriac (Matei), Alina; Nișulescu, Ileana (Romania)

ABSTRACT:
This article aims to present not only the similarities and differences between creative accounting and tax fraud, but also the connection of these two phenomena with the concept of underground economy. The topic is one of real interest for both theorists and practitioners, due to its controversial nature and the divergences of opinion in national and international literature. The paper is of a qualitative type and we used a series of bibliographic sources consisting of books, accounting, tax and legal regulations, studies and articles published both nationally and internationally by various bodies in the field, web pages of some institutions with responsibilities in the field, both on national and European Union level, in order to achieve the objectives set. The research methodology begins with the identification of scientific databases that host articles related to our research context. Ten major scientific databases were selected. We have established four criteria, stipulating that the article must (1) contain one of the keywords: tax fraud, tax evasion, gray economy, underground economy, creative accounting or tax optimization, (2) be written in English and / or Romanian, (3) have been published between 1958 and 2020 or be approved for publication (4) have the full text available in at least one of the ten databases. Thus, approximately 62 years of research were reviewed. The main purpose of this paper is to establish the delimitations of the terms. The results reveal clear definitions of the concepts and the framing of each concept in times of existing economy, but also the connection of each concept with the other. Also, the implications of the results are that all actors can outline an overview of the phenomenon, but especially reveals the legislative gaps that need to be filled. The research is an interdisciplinary one, because in order to understand the concepts we need many disciplines such as ethics, law, taxation, accounting and more.

Abstract | PDF


Development of Game-Based Learning Scenarios for Social Engineering and Security Risk Management for SMEs in the Manufacturing Industry

Scholl, Margit; Gube, Stefanie; Koppatz, Peter (Germany)

ABSTRACT:
With increasing digitization, information security (IS) is becoming an important issue for all employees working in companies and organizations. If the human factor is to be seen as strength rather than a weakness, appropriate awareness-raising measures are required. One way to raise awareness is through game-based learning (GBL), which can be used as an ongoing means of motivating employees to engage emotionally with the subject of IS and changing their online behavior accordingly. As part of the project Mittelstand 4.0—Kompetenzzentrum Stuttgart (Mittel-stand 4.0—Competence Center Stuttgart), two analog GBL scenarios on the topics Social Engineering and Security Risk Management for SMEs are currently being developed over the period of a year, from April 2020 until March 2021. In this paper, the development process—including the phases prototyping, testing, and adaptation—are described and the prototype results shown. Testing analog prototypes in times of COVID-19 is particularly challenging. The experience gained in this mini project will be incorporated into the new three-year project Awareness Lab SMEs (ALARM) Information Security, which is funded by the Federal Ministry of Economics and has been running since October 1, 2020.

Abstract | PDF


Distribution Based Image Classification and its Application in Person Re-Identification

Ding, Guangtai *; Chen, Fuhua **; Zhang, Xuemao ** (* China, ** United States)

ABSTRACT:
Image classification is widely used in many fields. Traditional metric learning based classification methods always maximize inter-class distances and minimize intra-class distances based on features calculated from each individual. Different from traditional methods, this paper takes each class as a distribution and try to maximize the distances among different distributions using information geometry. In order to minimize the distance among individuals inside a class, this paper assume that each class follows a joint Gaussian distribution and take an exploratory study on the relation between intra-class distance and the determinant of the covariance matrix of the distribution. It is found that under some assumptions, the average intra-class distance among the same class is proportional to the standard deviation or product of standard deviations of each feature. We therefore use the determinant of the covariance matrix to substitute the intra-class distance in the metric learning. The proposed method therefore saves a lot of computational cost. The method is then applied to person re-identification. To our surprise, the proposed method is very competitive than many state-of-the-art methods while saving the computational cost in the learning process. Experimental results demonstrate the effectiveness of the proposed method.

Abstract | PDF


District Optimization Based on Population and Geometry – Using Taichung City as an Example

Huang, Hsiang; Tang, Cheng-Yuan; Hor, Maw-Kae (Taiwan)

ABSTRACT:
Districting has attracted the researchers’ interests recently. More than ten years ago, the legislative election of the Republic of China (ROC) has changed from elect multiple legislators in one district to elect single legislator in one district. Hence, the districting method has direct impact to the election outcomes. The Central Election Commission (CEC) which in charge of the electoral affairs in ROC has established a set rules for districting. CEC also announced the districting results which are subjected to be reviewed every ten years. However, many of the districts in the CEC’s newly announced districting results have been found violate the population tolerance limits set by the CEC. Thus, how to improve the existing districting results to reach a more fair election has become the goal of this study.
In this paper, we proposed a mechanism to improve the existing districting results using evolutionary algorithm through the knowledge of computational geometry as well as the information obtained from geographic information systems. One can seek for the fair districting results that satisfy the districting regulations set by the CEC including the limits of population error tolerance as well as the other issues. We also presented a set of evaluation guidelines that can be used to evaluate the outcomes of any districting methods. The population error, region contiguity, and region compactness were all considered in our evaluation rules. Better districting results can be obtained through our evolutionary algorithm using acquire, release and exchanging operations.
The data of Taichung City was analyzed and used in testing our mechanism. Based on the CEC’s regulations, Taichung City has to be districted into eight districts. However, three districts in the districting results announced by the CEC violate the population error tolerance limits set by the CEC. Using our evolutionary mechanism, we have modified all the districts of Taichung City that conform the districting rules successfully.

Abstract | PDF


Domain Ontologies and the Conversion of Tacit Knowledge in Software Development

Evangelista, Euler; Muylder, Cristiana (Brazil)

ABSTRACT:
Purpose – This study presents a proposal to build and analyze a domain ontology as a tool to support the knowledge transfer process in the context of software requirements analysis in the medical/pharmaceutical industry. The proposal is to use ontologies as an engineering artifact with the objective of representing knowledge in a specific domain, which, in the context of this research, is software modeling.
Design/methodology/approach – A domain ontology is built to represent the requirements of a data warehouse/business intelligence software in the medical/pharmaceutical industry. The ontology-building process is supported by a specific methodology, defined with the purpose of building such artifacts, named “Methondology,” and selected based on the research requirements. A prototype is created in the implementation phase of the ontology-building process.
Findings – The results demonstrate that ontology domains can contribute to the process of analyzing and representing software requirements, as well as serving as a tool for organizational knowledge transfer through continuous knowledge conversion, which is critical for business sustainability.
Originality/value – This study is an attempt to understand the knowledge conversion process in software development projects. Tacit knowledge is complex to articulate through formal language once it has been embedded with individual experience. Use of the artifact proposed in this study can assist in externalizing the tacit knowledge needed to elicit software requirements.

Abstract | PDF


Economic Inequality and Power Imbalance in the United States: The Role of Globalization

Aboagye, Bright Da-Costa (United States)

ABSTRACT:
Social inequality has become a challenging social phenomenon in many advanced countries. Individuals are affected by social divisions of race, gender, economic, cultural, and political structures. Among these social divisions, income and power inequality have become the major political preoccupation in most developed countries. In the United States, income disparity between the upper and middle classes has been increasing for several decades. While the top 1% earners who contributed to 10% of the U.S. national income in 1980 increased to 20% in 2016, the bottom 50% earners who contributed to 20% of national income in 1980 decreased to 13% in 2016. There have been several interpretations of this phenomenon but from a globalization point of view. This study, therefore, explores the phenomenon of economic and power inequality from a globalization standpoint. Using intersectionality as the theoretical framework, this paper explores how various social constructs intersect in a globalized economy to create income and power disparities. The author adopts a systematic literature review approach to identify gaps, contradictions, inconsistencies, interpretations, and connections in the literature relative to the phenomenon being explored. The findings will add to the scholarly literature on socioeconomic inequality and provide meaningful recommendations to improve U.S. social policies.

Abstract | PDF


Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers

Vaidyan, V.M.; Tyagi, Akhilesh (United States)

ABSTRACT:
A Controller in Adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault identification and malware detection in safety critical applications. Electromagnetic field emission based identification of controllers execution state from distance will help ascertain security vulnerabilities early on. Machine Learning models for instruction identification, Principal Component Analysis (PCA), Adaptive Boosting (AB) and Naïve Bayes (NB) were developed to meet this goal. Our preliminary results of implementation on a 2-stage pipelined controller processor architecture demonstrate that the EM side-channel classification approach identifies a controller execution state in Adaptive control with 93% success rate.

Abstract | PDF


Emerging Cyberbiosecurity Threats in the Chemical, Biological, Radiological, and Nuclear (CBRN) Domain

Franchina, Luisa; Inzerilli, Giulia; Scatto, Enrico; Calabrese, Alessandro; Coda, Natascia; Giuliana, Marco Antonio (Italy)

ABSTRACT:
Cyberbiosecurity is an emerging hybrid discipline built around the concepts of cybersecurity and biosecurity. It deals with the inappropriate use of valuable information, processes and materials pertaining to the areas of life sciences and the digital world. The overwhelming industrial and technological development, expanding globalization, permeability of borders, along with the spread of terrorist movements at the international level, are factors that amplify and fuel Chemical, Biological, Radiological and Nuclear (CBRN) threats. In addition to the need for coordination at the national and international level, there is the necessity to raise awareness on the subject, among the public and the institutional world. Considering that the nature of CBRN threat is transversal, we need a truly multidisciplinary approach.
In this regard, establishing working groups composed of specialist technical staff and intelligence analysts would be able to ensure the maximum degree of coordination and support in the phases of preparation, prevention, protection and response to the threat.
In an increasingly globalized world, the 2020 pandemic, which has caused a high number of deaths and significant economic damage, has revealed the vulnerability of Critical Infrastructure (CI) and health structures of different countries. As a consequence of this critical situation, a general interest in the danger of the spreading, both intentional and unintentional, of biological agents increased due to the fact that this type of threat could pose one of the most significant risks to our societies in the future.
It would be desirable to build a strategic-institutional partnership between the public and private sector aimed at including cyberbiosecurity in the national architecture of each country system. This collaboration would have a positive impact on the protection of corporate assets and on the entire sector. Cyberbiosecurity and CBRN threats could affect Critical Infrastructure. In order to tackle the severe problem represented by internal threats to CI and all installations holding CBRN materials, it is crucial to improve the exchange of information on nuclear - biological - chemical - radiological materials, in relation to information on cyber security and cyberbiosecurity.

Abstract | PDF


Enterprise Systems and Threats

Blair, Risa (United States)

ABSTRACT:
The scenario included a medium-sized international company. The guidelines were to select and include three enterprise systems that were based on databases, one cloud-based and one that was not SQL-based. Systems were accessible via a browser and included mobile applications. Of key importance for this project was to research potential and known vulnerabilities for these three enterprise systems. The systems selected were ADP Streamline Payroll, Salesforce, and MongoDB. There are numerous threats described in this project, including excessive privileges, SQLi attacks, weak auditing, storage media exposure, unnecessary features enabled, broken configurations, and buffer overflows. Enterprise systems are a potential magnet for hackers on the black market and the Dark Web, as they provide extensive confidential data, particularly in the technology, finance, government, education, healthcare, and retail sectors. It was impressive to see how both ADP and Salesforce provided up-to-date known and potential vulnerabilities. What was the most interesting throughout the research was uncovering the Mongo Lock ransomware and the Salesforce Meatpistol malware. What is worse is that the Salesforce team provided a talk in Las Vegas in July of 2017, where they explained how Salesforce attacked its own system to see how well it would hold up against cyber attacks. The talk focused on Meat pistol, a malware too for making it easier to conduct the attacks from the standpoint of infrastructure automation, implant creating, and interaction. The intent was to make it easier for the Salesforce teams to conduct their attacks. They utilized the methodology of the well-known tool, Metasploit, which does not exploit systems or launch attacks. It just provides the framework for hackers to control systems after they have been able to access what they choose. The duo of “red team” inside hackers explained their process for access the system through the utilization of Meatpistol, against the advice of their superiors. Immediately after the presentation, they were fired.

Abstract | PDF


Information Security: New Encryption and Decryption Methodology Based on e-Books Library Used in Plain Text Cryptography

Skrobanek, Paweł; Górski, Grzegorz; Wojsa, Mateusz (Poland)

ABSTRACT:
In this paper, a new methodology for the text encryption using e-books library is proposed. The essential of the presented methodology is an encryption based on the replacement of words from the encrypted text into a vector of two numbers (in the basic version). These numbers determine page (indirectly) and offset in a randomly selected book. In addition, the algorithm, some results of experiments and examples of the application of the presented method are given. The presented method can provide additional protection to standard methods such as AES, DES or can be used alternatively to them.

Abstract | PDF


Interdisciplinary Skills Development Through Final Qualification Assessment: Survey Study for European and Oriental Languages Programs

Makhachashvili, Rusudan; Semenist, Ivan (Ukraine)

ABSTRACT:
The global pandemic and subsequent quarantine measures and restrictions have posed an array of challenges to the structure and procedure of university summative assessment process. Qualification assessment for Foreign Languages major programs in particular is a strict regimen process that involves different stages (oral and written exams, final project viva, internal and external review). Cross-sectorial factors of societal change, that provide the backdrop for an interdisciplinary skillset critical transformation, crucial for the COVID-19 emergency educational framework, are considered. The study premise is based on identification of various interdisciplinary competency principles, derivative of 21st century skills for university staff members and projected digital literacy requirements. It is determined how in the situation of the COVID-19 pandemic lockdown all elements of the Final Qualification Assessment at Borys Grinchenko Kyiv University for European and Oriental Languages programs have been relegated to the digital, remote or blended format with the use of ICT tools and skills that comprise an interdisciplinary realm of Foreign Languages acquisition and assessment. Every step of the procedure adaptation to digital format required accelerated development of interdisciplinary skills of all participants and officials and cross-sectorial activities, otherwise not carried out through assessment of Foreign Languages programs.

Abstract | PDF


Multivariate Analysis of the University Labor Climate in Virtual Emergency Education Conditions Due to the Coronavirus Pandemic

Villa González Del Pino, Eulalia M.; Pons Murguía, Ramón A.; Peñate Santana, Yaimara (Ecuador)

ABSTRACT:
The global situation experienced due to the advance of the covid-19 pandemic and the requirements of social isolation have affected multiple sectors, especially the education sector. Teachers, support workers and university students have taken on a great challenge by recognizing that conditions have changed but learning is not delayed. Therefore, they have seen the need to implement virtual education strategies in a short period of time. For the universities in which face-to-face was the daily learning model, which do not have the necessary infrastructure for the new virtual modality, it has been a threat to the environment as they were forced, under these conditions, to migrate from face-to-face education to non-attendance. face-to-face, emergent way.
That is why this study emphasizes the adverse effects of the social emergency caused by COVID-19 in the university teaching work environment, the appearance of stress and the need for institutions to adopt measures to improve their situation in terms of technology organization, methods, techniques, and their digital skills in line with emerging global trends and realities, to avoid negative consequences on the mental health of their teachers and students.

Abstract | PDF


Q-Learning Interacting with Kalman Filters

Takahata, Kei; Miura, Takao (Japan)

ABSTRACT:
Reinforcement Learning allows us to acquire knowledge without any training data. However, for learning it takes time. We discuss a case in which an agent receives a large negative reward. We assume that the reverse action allows us to improve the current situation. In this work, we propose a method to perform Reverse action by using Retrospective Kalman Filter that estimates the state one step before. We show an experience by a Hunter Prey problem. And discuss the usefulness of our proposed method.

Abstract | PDF


Security, Privacy and Interoperability Requirements for Peruvian Remote Digital Signatures

Papa Quiroz, Erik Alex; Cruzado Quispe, Ever; Quiroz Papa de Garcia, Rosalia (Peru)

ABSTRACT:
There are several technological solutions currently available in the market that allow customers/citizens to digitally sign electronic documents through their smartphones. Regardless of how user-friendly they are, most of these platforms use proprietary schemes designed for particular use cases, which could not necessarily be applied to open, interoperable scenarios and where there could be legal consequences. To establish a general framework that may provide manufacturers with minimum safety, reliability, and legal requirements, several international organizations have proposed standards for both manufacturers and potential users. Within this context, this paper presents, for the first time in Peru, a list of security, privacy, and interoperability requirements for remote digital signature for the Peruvian state. This research was based on features of the current state of the art, the existing international standards and the current state of the technology. The relevance and viability of these requirements were validated by RENIEC (Spanish acronym of National Registry of Identification and Civil Status) specialist personnel through an inter institutional cooperation agreement between RENIEC and PNICP (Spanish acronym of National Program of Innovation for the Competitivity and Productivity).

Abstract | PDF


SOLVeR: A Blueprint for Collaborative Optimization in Practice

Blank, Julian; Deb, Kalyanmoy (United States)

ABSTRACT:
Collaboration among different stakeholders in achieving a problem-solving task is increasingly recognized as a vital component of applied research today. For instance, in various research areas in engineering, economics, medicine, and society, optimization methods are used to find efficient solutions. Such a problem-solving task involves at least two types of collaborators – optimization experts and domain experts. Each collaborator cannot solve a problem most efficiently and meaningfully alone, but a systematic collaborative effort in utilizing each other’s expert knowledge plays a critical and essential role. While many articles on the outcome of such collaborations have been published, and the justification of domain-specific information within an optimization has been established, systematic approaches to collaborative optimization have not been proposed yet. In this paper, methodical descriptions and challenges of collaborative optimization in practice are provided, and a blueprint illustrating the essential phases of the collaborative process is proposed. Moreover, collaborative optimization is illustrated by case studies of previous optimization projects with several industries. The study should encourage and pave the way for optimization researchers and practitioners to come together and embrace each other’s expertise to solve complex problems of the twenty-first century.

Abstract | PDF


Teaching Mathematics as Communication, Trigonometry Comes Before Geometry, and Probably Makes Every Other Boy an Excited Engineer

Tarp, Allan (Denmark)

ABSTRACT:
Before 1970 both foreign language and mathematics was hard to learn because the two taught grammar before language. Then a turn took place in foreign language education allowing students to learn it through communication. Mathematics education never had a similar turn, so it is still hard to many. Therefore, this paper asks if it is possible to learn mathematics as communication. We see that three different kinds of mathematics are taught, pre-setcentric, setcentric and post-setcentric. Being inspired by the fact that children communicate about the physical fact Many with two-dimensional box- and bundle-numbers with units, a curriculum is designed where trigonometry is rooted in mutual recounting of the three sides in a box halved by its diagonal. So, the answer is: Yes, core mathematics can be learned as communication about boxes since it is directly connected to counting and recounting Many in boxes and bundles.

Abstract | PDF


The Brotherhood and the Islamization Discourse in Egypt

Taha, Mohamed (United Kingdom)

ABSTRACT:
This paper focuses on changes in the Media-Political Communications of the Muslim Brotherhood while in power in Egypt in 2012 and 2013. The MB or al-Ikhwan al-Muslimun is regarded as the mother of Islamist movements in the Middle East. During their period in power, the group established its first TV channel Misr25 and launched a daily newspaper al- Hurria wa al- 'Adala. No other studies have researched the communications of the Brotherhood or their approach to media while they were in power. The Brotherhood’s communications during this period were little more than themes and trends that were communicated from the top down by the group’s leadership to their media outlets, which lacked sufficient independence to do their work based on editorial values alone. This study identifies these themes, analyses them, and places them within the wider context of the literature in historical and regional contexts. This paper concludes that the Brotherhood’s main aim was to achieve a constitution with an Islamic background regardless of hostility and criticism. The study also shows that the Brotherhood moved towards antagonist discourses as the opposition rallied against them, and underlines the troubled relationship between the Brotherhood and the main actors in Egyptian society, which were the army, the Christians and the secular opposition. The paper uniquely answers questions related to the Brotherhood’s rule in Egypt in 2012 and 2013 through the analysis of its media.

Abstract | PDF


The Future of Education in Ghana: Promoting Critical Pedagogy Through Problem-Posing Education

Nkansah, Joan Nkansaa (United States)

ABSTRACT:
The instructional delivery methods in many Ghanaian tertiary institutions are characterized by rigid curricula with little or no classroom discussions and interaction. These practices restrict creativity and transformation as students are separated from inquiry and only perform the role of listening, memorizing, and repeating the thoughts and ideas teachers narrate. Students lack exposure to learning environments that are conducive to cultivate critical thinking skills and develop critical consciousness. This qualitative case study explored how problem-posing education informs the instructional delivery methods in a Ghanaian university. The study focused on problem-posing education, a principle of Paulo Freire’s critical pedagogy as the framework for the study. The study purposefully selected 11 participants (two faculty members, eight students, and one administrative staff) who provided substantial data and deeper meaning and understanding of the phenomenon. The data revealed that problem-posing education informs the institution’s instructional delivery methods through problem-based curricula content, entrepreneurial skill development, and feedback/partnership opportunities. The study’s findings indicate that problem-posing education advocates cognition and transformative learning.

Abstract | PDF


The Interface of Human (Nous) and Artificial (Computer) Intelligence in Inter-Disciplinary Research, International Communication and Education

Nikolarea, Ekaterini (Greece)

ABSTRACT:
First, this study will be a philosophical/etymological exploration into human intelligence (nous) and artificial intelligence (computer / computare), and a SWOT analysis that their interface offers to all scientists and, especially, to those whose English is not their mother tongue. Second, it will be a meta-cognitive discussion about whether non-English scientists know: (1) about the existence of computer tools – such as electronic dictionaries, CAT [Computer Assisted Translation] tools and how to use them; and (2) what to do when they “hit” on issues of inter-scientificity (e.g. “bar” with 17 different terms in Greek) and reverse inter-scientificity (e.g. πρόγραμμα with 6 different terms in English). Third, it will discuss that only human mind/intelligence (nous) - with the aid artificial intelligence (computer –CAT tools) and through different mental/cognitive processes (noesis) - can establish certain criteria in choosing appropriate terms and expressions, so that an inter-disciplinary research can be communicated properly. Finally, it will propose that HEIs in North America and in Europe should, first, become “aware” (nous - noesis) of the concepts of inter-scientificity and reverse inter-scientificity and, then, train their administrative and academic staff in those concepts and how to use translation tools appropriately, should they wish to achieve an appropriate and an effective international scientific communication.

Abstract | PDF


Unsupervised Machine Learning Applied to Multivariate Time Series Data of a Rotating Machine from an Oil and Gas Platform

Figueirêdo, Ilan Sousa; Carvalho, Tássio Farias; Silva, Wenisten Dantas da; Guarieiro, Lílian Lefol Nani; Santos, Alex Alisson Bandeira; Filho, Leonildes Soares De Melo; Vargas, Ricardo Emmanuel Vaz; Nascimento, Erick Giovani Sperandio (Brazil)

ABSTRACT:
Deep Learning (DP) models have been successfully applied to detect and predict failures in rotating machines. However, these models are often based on the supervised learning paradigm and require annotated data with operational status labels (e.g. normal or failure). Furthermore, machine measurement data is not commonly labeled by industry because of the manual and specialized effort that they require. In situations where labels are nonexistent or cannot be developed, unsupervised machine learning has been successfully applied for pattern recognition in large and multivariate datasets. Thus, instead of experts labeling a large amount of structured and/or non-structured data instances (also referred to as Big Data), unsupervised learning allows the annotation of the dataset from the few underlying interesting patterns detected. Therefore, we evaluate the performance of six unsupervised learning algorithms for the identification of anomalous patterns from a turbogenerator installed and operating in an oil and gas platform. The algorithms were C-AMDATS, Luminol Bitmap, SAX-REPEAT, k-NN, Bootstrap, and Robust Random Cut Forest. The evaluation performance was calculated with seven classification metrics. The C-AMDATS algorithm was able to effectively and better detect the anomalous patterns, and it presented an accuracy of 99%, which leverages the further development of supervised models.

Abstract | PDF

contact-us  
  Postal Address:
  13750 West Colonial Dr, Suite 350-408
  Winter Garden, Florida 34787, USA
  All rights reserved.
  © 2021 International Institute
   of Informatics and Systemics