Advances in Intelligent Systems and Computing. 3rd International Scientific Conference on Intelligent Information Technologies for Industry, IITI 2018
This book contains papers presented in the main track of IITI 2018, the Third International Scientific Conference on Intelligent Information Technologies for Industry held in Sochi, Russia on September 17–21. The conference was jointly co-organized by Rostov State Transport University (Russia) and VŠB – Technical University of Ostrava (Czech Republic) with the participation of Russian Association for Artificial Intelligence (RAAI).
IITI 2018 was devoted to practical models and industrial applications related to intelligent information systems. It was considered as a meeting point for researchers and practitioners to enable the implementation of advanced information technologies into various industries. Nevertheless, some theoretical talks concerning the state-of-the-art in intelligent systems and soft computing were also included into proceedings.
Bayesian Belief Networks (BBN) provide a comprehensible framework for representing complex systems that allows including expert knowledge and statistical data simultaneously. We explored BBN models for estimating risky behavior rate and compared several network structures, both expert-based and data-based. To learn and evaluate models we used generated behavior data with 9393 observations. We applied both score-based and constraint-based structure learning algorithms. The score-based structures represented better quality scores according to BIC and log-likelihood, prediction quality was almost the same for databased models and lower but sufficient for expert-based models. Hence, in case of limited data we can reduce computations and apply expert-based structure for solving practical issues.
This report reviews and summarizes legal, technical and psychological methods of data and information protection considered as critical elements of a comprehensive information security management system for global supply chains. An intelligent system to automate the functions of such information security management system is suggested.