HAL (Le Centre pour la Communication Scientifique Directe), 2017
Scientific creativity and innovation is at the heart of scientific research which represents the ... more Scientific creativity and innovation is at the heart of scientific research which represents the essential driving force for economic growth. In this talk, I will talk about the latest development of a European Commission funded project, called the Dr Inventor, whose objective is to develop a prototype of scientific creativity model for enhancing scientific innovation. It is built on the vision that technologies have great potential to supplement and elevate human ingenuity by overcoming the limitations that people suffer in pursuing scientific discoveries. By exploiting the rich availability of web-based research resources, our research develops a virtual personal research assistant, utilising machine-empowered search and cognitive computation to bring scientific researchers novel and thought-provoking perspectives for scientific development. Dr Inventor is built on a cognitive model of the human ability to reason using analogies. An analogy is a comparison between two seemingly different ideas, which highlights some previously unnoticed similarities. Many scientists are familiar with the notion that a development in one field can have significant implications in another field, which suggests that an approach developed to solve a problem in one domain may be just as (or even more) applicable to another discipline. The project has been developed with an initial focus on the discipline of computer graphics, which can be extended to other disciplines.
HAL (Le Centre pour la Communication Scientifique Directe), 2009
Les reseaux Bayesiens constituent des outils tres puissants de representation de connaissances et... more Les reseaux Bayesiens constituent des outils tres puissants de representation de connaissances et de raisonnement sous incertitude. Cet article montre leur applicabilite avec facilite et efficacite a deux problemes importants en detection d'intrusions: la detection d'attaques elementaires et d'attaques coordonnees. Nous commencons par poser les problemes traites puis definir les variables necessaires pour les modeliser en utilisant des reseaux Bayesiens naifs. En plus du fait que la construction de ces modeles est simple et rapide, leurs performances sur des donnees representatives concurrencent les outils de classification les plus performants dans la litterature. Enfin, nous montrons comment les regles de decision utilisees dans les classifieurs Bayesiens peuvent etre ameliorees pour la detection de nouvelles attaques et d'activites anormales nouvelles et nous montrons experimentalement l'efficacite de ces ameliorations sur un trafic Web recent.
DL-Lite is a tractable family of description logics particularly suitable for query answering. On... more DL-Lite is a tractable family of description logics particularly suitable for query answering. One of the fundamental issues in this area is the dynamics of the knowledge base which is a problem closely related to the belief revision one. This paper investigates revision of prioritized DL-Lite knowledge bases when a new input piece of information, possibly conflicting or uncertain, becomes available. To encode the prioritized knowledge, we use a possibility theory-based DL-Lite logic. We first study revision at the semantic level consisting in directly conditioning possibility distributions. In particular, we show that such conditioning provides in some situations some counterintuitive results compared with the ones of conditioning directly the knowledge base syntactically. We then study revision at the syntactic level of possibilistic DL-Lite knowledge bases. Finally, we show that such revision process has a meaningful semantic counterpart.
Since Thai dance training system has been developed as preliminary work in AniAge project, we fou... more Since Thai dance training system has been developed as preliminary work in AniAge project, we found that this training system was still lack of learning motivation and entertainment features which could be led to the major problem such as high dropout rate. Therefore, "Thai dance training game-based model" has been proposed as a game-based learning framework which helps to promote learning motivation. The list of Thai dance instructional content, game characteristic, and a game cycle is also mentioned in this work. The combination of Thai dance and game-based learning could provide an interesting and challenging learning environment for the users.
Passing intangible knowledge like Thai dance to the new generation is still remain challenge issu... more Passing intangible knowledge like Thai dance to the new generation is still remain challenge issue since it is difficult to transfer. Recently, learning technology platform on different devices is paying for the main role to in education area. This technology may support and improve student's knowledge and skill of Thai dance. However, there is a lack of empirical research on Thai dance student technology usage. The understanding of student's technology usage could help developer or instructor to transfer intangible knowledge to technology. The objective of this study is to identify technology usage among Thai dance student in Chiang Mai College of Dramatic Arts, Chiang Mai, Thailand. The total participants are 79. According to the result, instructor and software developer are recommended to distribute learning content of Thai dance via smartphone.
In existing access control systems, it is assumed that access control authorisation rules are def... more In existing access control systems, it is assumed that access control authorisation rules are defined on elementary actions and over concrete objects. This assumption does not hold in general. This paper proposes a slight extension of access control models where both elementary and non-elementary actions can be represented. A non-elementary action, called a plan, is a sequence of elementary actions, to be applied on objects, in order to achieve some task. We propose to represent a plan, denoted by P, as a partial pre-order over a subset of A x O where A is a set of elementary actions and O is a set of objects. We show how to derive explicit prohibitions in the presence of authorisation rules over plans.
In this preliminary work, we propose a system prototype for Thai Dance training. This paper consi... more In this preliminary work, we propose a system prototype for Thai Dance training. This paper considers the problem of teaching traditional dances from Thailand. This is particularly useful given the lack of teachers and tools for teaching dances. In order to build a software tool helping people learn Thai dances, the main problems are (i) how to represent the dance gestures and movements of the dance to teach, (ii) how to display it for the learner and how to rate the performance of the learner and provide him useful feedback. Fortunately, Natural User Interfaces (NUI) enables users to interact with a system in a natural and intuitive way. For instance, a user can interact with the system by his body through postures and movements. In this study, we developed a working prototype of a system teaching users traditional Thai dances. The system requires Kinect-based device to enable real-time skeleton tracking. For the reference postures/movements dataset, we collected dance movement from experts by Motion Capture System and used the collected data to represent the dance in the system. Moreover, the system is designed such that it rates the user’s performance and provides helpful and real-time feedback to the user.
ABSTRACT Bayesian networks are very powerful tools for knowledge representation and reasoning und... more ABSTRACT Bayesian networks are very powerful tools for knowledge representation and reasoning under uncertainty. This paper shows the applicability of naive Bayesian classifiers to two major problems in intrusion detection: the detection of elementary attacks and the detection of coordinated ones. We propose two models starting with stating the problems and defining the variables necessary for model building using naive Bayesian networks. In addition to the fact that the construction of such models is simple and efficient, the performance of naive Bayesian networks on a representative data is competing with the most efficient state of the art classification tools. We show how the decision rules used in naive Bayesian classifiers can be improved to detect new attacks and new anomalous activities. We experimentally show the effectiveness of these improvements on a recent Web-based traffic. Finally, we propose a naive Bayesian network-based approach especially designed to detect coordinated attacks and provide experimental results showing the effectiveness of this approach.
HAL (Le Centre pour la Communication Scientifique Directe), 2017
Scientific creativity and innovation is at the heart of scientific research which represents the ... more Scientific creativity and innovation is at the heart of scientific research which represents the essential driving force for economic growth. In this talk, I will talk about the latest development of a European Commission funded project, called the Dr Inventor, whose objective is to develop a prototype of scientific creativity model for enhancing scientific innovation. It is built on the vision that technologies have great potential to supplement and elevate human ingenuity by overcoming the limitations that people suffer in pursuing scientific discoveries. By exploiting the rich availability of web-based research resources, our research develops a virtual personal research assistant, utilising machine-empowered search and cognitive computation to bring scientific researchers novel and thought-provoking perspectives for scientific development. Dr Inventor is built on a cognitive model of the human ability to reason using analogies. An analogy is a comparison between two seemingly different ideas, which highlights some previously unnoticed similarities. Many scientists are familiar with the notion that a development in one field can have significant implications in another field, which suggests that an approach developed to solve a problem in one domain may be just as (or even more) applicable to another discipline. The project has been developed with an initial focus on the discipline of computer graphics, which can be extended to other disciplines.
HAL (Le Centre pour la Communication Scientifique Directe), 2009
Les reseaux Bayesiens constituent des outils tres puissants de representation de connaissances et... more Les reseaux Bayesiens constituent des outils tres puissants de representation de connaissances et de raisonnement sous incertitude. Cet article montre leur applicabilite avec facilite et efficacite a deux problemes importants en detection d'intrusions: la detection d'attaques elementaires et d'attaques coordonnees. Nous commencons par poser les problemes traites puis definir les variables necessaires pour les modeliser en utilisant des reseaux Bayesiens naifs. En plus du fait que la construction de ces modeles est simple et rapide, leurs performances sur des donnees representatives concurrencent les outils de classification les plus performants dans la litterature. Enfin, nous montrons comment les regles de decision utilisees dans les classifieurs Bayesiens peuvent etre ameliorees pour la detection de nouvelles attaques et d'activites anormales nouvelles et nous montrons experimentalement l'efficacite de ces ameliorations sur un trafic Web recent.
DL-Lite is a tractable family of description logics particularly suitable for query answering. On... more DL-Lite is a tractable family of description logics particularly suitable for query answering. One of the fundamental issues in this area is the dynamics of the knowledge base which is a problem closely related to the belief revision one. This paper investigates revision of prioritized DL-Lite knowledge bases when a new input piece of information, possibly conflicting or uncertain, becomes available. To encode the prioritized knowledge, we use a possibility theory-based DL-Lite logic. We first study revision at the semantic level consisting in directly conditioning possibility distributions. In particular, we show that such conditioning provides in some situations some counterintuitive results compared with the ones of conditioning directly the knowledge base syntactically. We then study revision at the syntactic level of possibilistic DL-Lite knowledge bases. Finally, we show that such revision process has a meaningful semantic counterpart.
Since Thai dance training system has been developed as preliminary work in AniAge project, we fou... more Since Thai dance training system has been developed as preliminary work in AniAge project, we found that this training system was still lack of learning motivation and entertainment features which could be led to the major problem such as high dropout rate. Therefore, "Thai dance training game-based model" has been proposed as a game-based learning framework which helps to promote learning motivation. The list of Thai dance instructional content, game characteristic, and a game cycle is also mentioned in this work. The combination of Thai dance and game-based learning could provide an interesting and challenging learning environment for the users.
Passing intangible knowledge like Thai dance to the new generation is still remain challenge issu... more Passing intangible knowledge like Thai dance to the new generation is still remain challenge issue since it is difficult to transfer. Recently, learning technology platform on different devices is paying for the main role to in education area. This technology may support and improve student's knowledge and skill of Thai dance. However, there is a lack of empirical research on Thai dance student technology usage. The understanding of student's technology usage could help developer or instructor to transfer intangible knowledge to technology. The objective of this study is to identify technology usage among Thai dance student in Chiang Mai College of Dramatic Arts, Chiang Mai, Thailand. The total participants are 79. According to the result, instructor and software developer are recommended to distribute learning content of Thai dance via smartphone.
In existing access control systems, it is assumed that access control authorisation rules are def... more In existing access control systems, it is assumed that access control authorisation rules are defined on elementary actions and over concrete objects. This assumption does not hold in general. This paper proposes a slight extension of access control models where both elementary and non-elementary actions can be represented. A non-elementary action, called a plan, is a sequence of elementary actions, to be applied on objects, in order to achieve some task. We propose to represent a plan, denoted by P, as a partial pre-order over a subset of A x O where A is a set of elementary actions and O is a set of objects. We show how to derive explicit prohibitions in the presence of authorisation rules over plans.
In this preliminary work, we propose a system prototype for Thai Dance training. This paper consi... more In this preliminary work, we propose a system prototype for Thai Dance training. This paper considers the problem of teaching traditional dances from Thailand. This is particularly useful given the lack of teachers and tools for teaching dances. In order to build a software tool helping people learn Thai dances, the main problems are (i) how to represent the dance gestures and movements of the dance to teach, (ii) how to display it for the learner and how to rate the performance of the learner and provide him useful feedback. Fortunately, Natural User Interfaces (NUI) enables users to interact with a system in a natural and intuitive way. For instance, a user can interact with the system by his body through postures and movements. In this study, we developed a working prototype of a system teaching users traditional Thai dances. The system requires Kinect-based device to enable real-time skeleton tracking. For the reference postures/movements dataset, we collected dance movement from experts by Motion Capture System and used the collected data to represent the dance in the system. Moreover, the system is designed such that it rates the user’s performance and provides helpful and real-time feedback to the user.
ABSTRACT Bayesian networks are very powerful tools for knowledge representation and reasoning und... more ABSTRACT Bayesian networks are very powerful tools for knowledge representation and reasoning under uncertainty. This paper shows the applicability of naive Bayesian classifiers to two major problems in intrusion detection: the detection of elementary attacks and the detection of coordinated ones. We propose two models starting with stating the problems and defining the variables necessary for model building using naive Bayesian networks. In addition to the fact that the construction of such models is simple and efficient, the performance of naive Bayesian networks on a representative data is competing with the most efficient state of the art classification tools. We show how the decision rules used in naive Bayesian classifiers can be improved to detect new attacks and new anomalous activities. We experimentally show the effectiveness of these improvements on a recent Web-based traffic. Finally, we propose a naive Bayesian network-based approach especially designed to detect coordinated attacks and provide experimental results showing the effectiveness of this approach.
Uploads
Papers by Karim Tabia