scholarly journals Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments

Author(s):  
Youcef Djenouri ◽  
Gautam Srivastava ◽  
Asma Belhadi ◽  
Jerry Chun‐Wei Lin



2021 ◽  
pp. 274-289
Author(s):  
Jiao Xing ◽  
Baozhu Liu ◽  
Jianxin Li ◽  
Farhana Murtaza Choudhury ◽  
Xin Wang


2021 ◽  
Vol 11 (19) ◽  
pp. 9160
Author(s):  
Savvas Varitimiadis ◽  
Konstantinos Kotis ◽  
Dimitra Pittou ◽  
Georgios Konstantakis

Nowadays, museums are developing chatbots to assist their visitors and to provide an enhanced visiting experience. Most of these chatbots do not provide a human-like conversation and fail to deliver the complete requested knowledge by the visitors. There are plenty of stand-alone museum chatbots, developed using a chatbot platform, that provide predefined dialog routes. However, as chatbot platforms are evolving and AI technologies mature, new architectural approaches arise. Museums are already designing chatbots that are trained using machine learning techniques or chatbots connected to knowledge graphs, delivering more intelligent chatbots. This paper is surveying a representative set of developed museum chatbots and platforms for implementing them. More importantly, this paper presents the result of a systematic evaluation approach for evaluating both chatbots and platforms. Furthermore, the paper is introducing a novel approach in developing intelligent chatbots for museums. This approach emphasizes graph-based, distributed, and collaborative multi-chatbot conversational AI systems for museums. The paper accentuates the use of knowledge graphs as the key technology for potentially providing unlimited knowledge to chatbot users, satisfying conversational AI’s need for rich machine-understandable content. In addition, the proposed architecture is designed to deliver an efficient deployment solution where knowledge can be distributed (distributed knowledge graphs) and shared among different chatbots that collaborate when is needed.



2011 ◽  
Author(s):  
Paola F. Spadaro ◽  
Alessia Rodi ◽  
Beatrice M. Ligorio ◽  
Neil H. Schwartz


2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.





Author(s):  
Tianshuo Zhou ◽  
Ziyang Li ◽  
Gong Cheng ◽  
Jun Wang ◽  
Yu'Ang Wei


Sign in / Sign up

Export Citation Format

Share Document