首页 > 最新文献

2020 International Conference on Advanced Science and Engineering (ICOASE)最新文献

英文 中文
Data Security System for IoT Applications 物联网应用的数据安全系统
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436579
Shahed Mohammed, M. H. Al-Jammas
The Internet of Things (IoT); can be defined as a think connected to the internet anywhere and anytime. Data security is one of the vital concepts in IoT security. So, the data to be uploaded should be made secure. There are many differenced cryptography algorithms such as Advanced Encryption Standard (AES), Nth degree truncates polynomial ring (NTRU), RSA, DES, and others to make security for data in IoT. In this paper, we suggest an algorithm that combines the feature of symmetric and asymmetric cryptography algorithms. Where the AES algorithm and NTRU public key used to create the special key at the receive side, then send the key to the sender side to make data security for IoT. The proposed algorithms provide strong security and low computation. The model has been simulating by MATLAB. The execution time for text (526 characters) for key generation is 0.092414 seconds, 0.020521 seconds for encryption and 0.060921 seconds for decryption and the execution time for image with size (512 * 512) for key generation is 0.101900 seconds, 1.699665 seconds for encryption and 12.82071 seconds for decryption.
物联网(IoT);可以定义为随时随地连接到互联网的思维。数据安全是物联网安全的重要概念之一。因此,上传的数据应该是安全的。有许多不同的加密算法,如高级加密标准(AES), n度截断多项式环(NTRU), RSA, DES等,以确保物联网数据的安全性。在本文中,我们提出了一种结合对称和非对称密码算法特征的算法。其中使用AES算法和NTRU公钥在接收端创建专用密钥,然后将密钥发送到发送端,为物联网提供数据安全保障。该算法安全性强,计算量小。利用MATLAB对该模型进行了仿真。生成密钥的文本(526个字符)的执行时间为0.092414秒,加密的执行时间为0.020521秒,解密的执行时间为0.060921秒;生成密钥的大小为(512 * 512)的图像的执行时间为0.101900秒,加密的执行时间为1.699665秒,解密的执行时间为12.82071秒。
{"title":"Data Security System for IoT Applications","authors":"Shahed Mohammed, M. H. Al-Jammas","doi":"10.1109/ICOASE51841.2020.9436579","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436579","url":null,"abstract":"The Internet of Things (IoT); can be defined as a think connected to the internet anywhere and anytime. Data security is one of the vital concepts in IoT security. So, the data to be uploaded should be made secure. There are many differenced cryptography algorithms such as Advanced Encryption Standard (AES), Nth degree truncates polynomial ring (NTRU), RSA, DES, and others to make security for data in IoT. In this paper, we suggest an algorithm that combines the feature of symmetric and asymmetric cryptography algorithms. Where the AES algorithm and NTRU public key used to create the special key at the receive side, then send the key to the sender side to make data security for IoT. The proposed algorithms provide strong security and low computation. The model has been simulating by MATLAB. The execution time for text (526 characters) for key generation is 0.092414 seconds, 0.020521 seconds for encryption and 0.060921 seconds for decryption and the execution time for image with size (512 * 512) for key generation is 0.101900 seconds, 1.699665 seconds for encryption and 12.82071 seconds for decryption.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130409016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transcript Validation System using biometric characteristics 使用生物特征的转录验证系统
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436576
Zahraa T. Al Ali, Ahmad M. Al Kababji, Mohammad B. Shukur
Recently transcripts and confirmations verification become one of the important issues for universities, institutes and organizations. This problem arises due to the spread out of many programs and modern technologies that allows the forgers to forge transcripts and confirmations which cannot be recognized by registrar persons how work for institutions or other entities. So, it becomes necessary for the entities to insure the validation of transcripts, confirmations or other documents from the original source. In this paper, we design a transcript validation system that can be used by different entities to reduce the time required for transcripts verification based on the information saved in a database. The system has been supported by a Graphic User Interface (GUI) to make the system as easy as possible to be used by users. The system works to verify the existing signatures on the transcript and compare them with the database by using offline signature verification depends on neural network method, also the system verifies the existing photo on the transcript using regression method in order to increase the reliability. The system has proven its reliability through high acceptance ratio of the genuine signatures and high rejection ratio for forged and random signatures.
近年来,成绩单和确认书的审核成为高校、研究机构和组织的重要问题之一。这一问题的产生是由于许多程序和现代技术的传播,使伪造者能够伪造成绩单和确认,而这些成绩单和确认无法被注册人员识别,如何为机构或其他实体工作。因此,实体有必要确保原始来源的抄本、确认书或其他文件的有效性。在本文中,我们设计了一个可以由不同实体使用的成绩单验证系统,以减少根据数据库中保存的信息进行成绩单验证所需的时间。该系统已支持图形用户界面(GUI),使系统尽可能容易被用户使用。该系统采用基于神经网络的离线签名验证方法对抄本上已有的签名进行验证,并与数据库进行比对,同时采用回归方法对抄本上已有的照片进行验证,以提高可靠性。通过对真实签名的高接受率和对伪造签名和随机签名的高拒绝率,证明了该系统的可靠性。
{"title":"Transcript Validation System using biometric characteristics","authors":"Zahraa T. Al Ali, Ahmad M. Al Kababji, Mohammad B. Shukur","doi":"10.1109/ICOASE51841.2020.9436576","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436576","url":null,"abstract":"Recently transcripts and confirmations verification become one of the important issues for universities, institutes and organizations. This problem arises due to the spread out of many programs and modern technologies that allows the forgers to forge transcripts and confirmations which cannot be recognized by registrar persons how work for institutions or other entities. So, it becomes necessary for the entities to insure the validation of transcripts, confirmations or other documents from the original source. In this paper, we design a transcript validation system that can be used by different entities to reduce the time required for transcripts verification based on the information saved in a database. The system has been supported by a Graphic User Interface (GUI) to make the system as easy as possible to be used by users. The system works to verify the existing signatures on the transcript and compare them with the database by using offline signature verification depends on neural network method, also the system verifies the existing photo on the transcript using regression method in order to increase the reliability. The system has proven its reliability through high acceptance ratio of the genuine signatures and high rejection ratio for forged and random signatures.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114685066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twitter Sentiment Analysis using an Ensemble Weighted Majority Vote Classifier 使用集成加权多数投票分类器的Twitter情感分析
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436590
R. H. H. Aziz, Nazife Dimililer
Sentiment analysis extracts the emotions expressed in text and has been employed in many fields including politics, elections, movies, retail businesses and in recent years microblogs to understand, track and control the human sentiments or reactions toward products events or ideas. Nevertheless challenges such as different styles of writing, use of negation and sarcasm, existence of spelling mistakes, invention of new words etc. provide obstacle in the correct classification of sentiments. This paper provides an ensemble of classifiers framework for sentiment analysis. The proposed weighted majority voting ensemble method combines six models including Naïve Bayes, Logistic Regression, Stochastic Gradient Descent, Random Forest, Decision Tree and Support Vector Machine to form a single classifier. Weights of the individual classifiers of the ensemble are chosen as accuracy or Fl-score by optimizing their performance. This approach combines models based on the simple majority voting as opposed to the one based on weighted majority voting. Additionally, a comparison is drawn among these six individual classifiers to evaluate their performance. The proposed ensemble model is tested on some existing sentiment datasets, including SemEval 2017 Task 4A, 4B and 4C. The results demonstrate that the Logistic Regression classifier is optimal as compared to other individual classifiers. Furthermore, the proposed ensemble weighted majority voting classifier with the six individual classifiers performs better compared to the simple majority voting and all independent classifiers.
情感分析提取文本中表达的情感,并已被用于许多领域,包括政治、选举、电影、零售业务,以及近年来的微博,以了解、跟踪和控制人类对产品、事件或想法的情绪或反应。然而,不同的写作风格、否定和讽刺的使用、拼写错误的存在、新单词的发明等挑战为正确分类情感提供了障碍。本文提供了一个用于情感分析的分类器集成框架。提出的加权多数投票集成方法将Naïve贝叶斯、逻辑回归、随机梯度下降、随机森林、决策树和支持向量机等6种模型结合在一起,形成一个单一的分类器。通过优化单个分类器的性能,选择其权重为准确率或fl分。这种方法结合了基于简单多数投票的模型,而不是基于加权多数投票的模型。此外,还对这六个分类器进行了比较,以评估它们的性能。提出的集成模型在一些现有的情感数据集上进行了测试,包括SemEval 2017 Task 4A, 4B和4C。结果表明,与其他单个分类器相比,逻辑回归分类器是最优的。此外,与简单多数投票和所有独立分类器相比,所提出的具有六个独立分类器的集成加权多数投票分类器表现更好。
{"title":"Twitter Sentiment Analysis using an Ensemble Weighted Majority Vote Classifier","authors":"R. H. H. Aziz, Nazife Dimililer","doi":"10.1109/ICOASE51841.2020.9436590","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436590","url":null,"abstract":"Sentiment analysis extracts the emotions expressed in text and has been employed in many fields including politics, elections, movies, retail businesses and in recent years microblogs to understand, track and control the human sentiments or reactions toward products events or ideas. Nevertheless challenges such as different styles of writing, use of negation and sarcasm, existence of spelling mistakes, invention of new words etc. provide obstacle in the correct classification of sentiments. This paper provides an ensemble of classifiers framework for sentiment analysis. The proposed weighted majority voting ensemble method combines six models including Naïve Bayes, Logistic Regression, Stochastic Gradient Descent, Random Forest, Decision Tree and Support Vector Machine to form a single classifier. Weights of the individual classifiers of the ensemble are chosen as accuracy or Fl-score by optimizing their performance. This approach combines models based on the simple majority voting as opposed to the one based on weighted majority voting. Additionally, a comparison is drawn among these six individual classifiers to evaluate their performance. The proposed ensemble model is tested on some existing sentiment datasets, including SemEval 2017 Task 4A, 4B and 4C. The results demonstrate that the Logistic Regression classifier is optimal as compared to other individual classifiers. Furthermore, the proposed ensemble weighted majority voting classifier with the six individual classifiers performs better compared to the simple majority voting and all independent classifiers.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Email Common Weaknesses and Enumeration Through Software Customer Perspective 从软件客户的角度分析电子邮件的常见弱点和列举
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436624
Falak Uossien Hasan
Ontology represents a best tool for knowledge management, concepts definitions and semantic search. It is considered a successful style work to organize and manage the knowledge in a single given domain. This paper is an attempt to establish knowledge base for email weaknesses using ontology, which represents a best method for illustrating relationships among Common Weakness Enumeration (CWE) email entries as defined by MITRE Corporation Weakness List Dictionary. The ontology usage is demonstrated with sufficient samples of queries by analyzing email software products weaknesses according to software customer point of view. This work is based on the MITRE community effort CWE List, Version 3.1 - Research Concept view CWE-1000, the effort in this work is limited by software customer perspective.
本体是知识管理、概念定义和语义搜索的最佳工具。组织和管理单个给定领域中的知识被认为是一种成功的风格工作。本文尝试用本体的方法建立电子邮件弱点知识库,本体是描述MITRE公司弱点列表词典定义的CWE (Common Weakness Enumeration)电子邮件条目之间关系的最佳方法。从软件客户的角度出发,通过对电子邮件软件产品弱点的分析,结合足够的查询样本,论证了本体的使用。本工作基于MITRE社区成果CWE List, Version 3.1 - Research Concept view CWE-1000,本工作的努力受到软件客户角度的限制。
{"title":"Email Common Weaknesses and Enumeration Through Software Customer Perspective","authors":"Falak Uossien Hasan","doi":"10.1109/ICOASE51841.2020.9436624","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436624","url":null,"abstract":"Ontology represents a best tool for knowledge management, concepts definitions and semantic search. It is considered a successful style work to organize and manage the knowledge in a single given domain. This paper is an attempt to establish knowledge base for email weaknesses using ontology, which represents a best method for illustrating relationships among Common Weakness Enumeration (CWE) email entries as defined by MITRE Corporation Weakness List Dictionary. The ontology usage is demonstrated with sufficient samples of queries by analyzing email software products weaknesses according to software customer point of view. This work is based on the MITRE community effort CWE List, Version 3.1 - Research Concept view CWE-1000, the effort in this work is limited by software customer perspective.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"380 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Denial of Service Attack Mitigation using High Availability Proxy and Network Load Balancing 使用高可用性代理和网络负载平衡缓解分布式拒绝服务攻击
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436545
R. Zebari, Subhi R. M. Zeebaree, A. Sallow, Hanan M. Shukur, Omar M. Ahmad, Karwan Jacksi
Nowadays, cybersecurity threat is a big challenge to all organizations that present their services over the Internet. Distributed Denial of Service (DDoS) attack is the most effective and used attack and seriously affects the quality of service of each E-organization. Hence, mitigation this type of attack is considered a persistent need. In this paper, we used Network Load Balancing (NLB) and High Availability Proxy (HAProxy) as mitigation techniques. The NLB is used in the Windows platform and HAProxy in the Linux platform. Moreover, Internet Information Service (IIS) 10.0 is implemented on Windows server 2016 and Apache 2 on Linux Ubuntu 16.04 as web servers. We evaluated each load balancer efficiency in mitigating synchronize (SYN) DDoS attack on each platform separately. The evaluation process is accomplished in a real network and average response time and average CPU are utilized as metrics. The results illustrated that the NLB in the Windows platform achieved better performance in mitigation SYN DDOS compared to HAProxy in the Linux platform. Whereas, the average response time of the Window webservers is reduced with NLB. However, the impact of the SYN DDoS on the average CPU usage of the IIS 10.0 webservers was more than those of the Apache 2 webservers.
如今,网络安全威胁对所有通过互联网提供服务的组织来说都是一个巨大的挑战。分布式拒绝服务攻击(Distributed Denial of Service, DDoS)是一种最有效、最常用的攻击方式,严重影响着各个电子机构的服务质量。因此,缓解这种类型的攻击被认为是一种持久的需求。在本文中,我们使用网络负载平衡(NLB)和高可用性代理(HAProxy)作为缓解技术。NLB应用于Windows平台,HAProxy应用于Linux平台。Internet Information Service (IIS) 10.0是在Windows server 2016上实现的,Apache 2是在Linux Ubuntu 16.04上实现的。我们在每个平台上分别评估了每个负载均衡器在缓解同步(SYN) DDoS攻击方面的效率。评估过程在真实网络中完成,并使用平均响应时间和平均CPU作为指标。结果表明,与Linux平台的HAProxy相比,Windows平台的NLB在缓解SYN DDOS攻击方面具有更好的性能。然而,使用NLB可以减少windows web服务器的平均响应时间。但是,SYN DDoS攻击对IIS 10.0服务器平均CPU占用率的影响要大于Apache 2服务器。
{"title":"Distributed Denial of Service Attack Mitigation using High Availability Proxy and Network Load Balancing","authors":"R. Zebari, Subhi R. M. Zeebaree, A. Sallow, Hanan M. Shukur, Omar M. Ahmad, Karwan Jacksi","doi":"10.1109/ICOASE51841.2020.9436545","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436545","url":null,"abstract":"Nowadays, cybersecurity threat is a big challenge to all organizations that present their services over the Internet. Distributed Denial of Service (DDoS) attack is the most effective and used attack and seriously affects the quality of service of each E-organization. Hence, mitigation this type of attack is considered a persistent need. In this paper, we used Network Load Balancing (NLB) and High Availability Proxy (HAProxy) as mitigation techniques. The NLB is used in the Windows platform and HAProxy in the Linux platform. Moreover, Internet Information Service (IIS) 10.0 is implemented on Windows server 2016 and Apache 2 on Linux Ubuntu 16.04 as web servers. We evaluated each load balancer efficiency in mitigating synchronize (SYN) DDoS attack on each platform separately. The evaluation process is accomplished in a real network and average response time and average CPU are utilized as metrics. The results illustrated that the NLB in the Windows platform achieved better performance in mitigation SYN DDOS compared to HAProxy in the Linux platform. Whereas, the average response time of the Window webservers is reduced with NLB. However, the impact of the SYN DDoS on the average CPU usage of the IIS 10.0 webservers was more than those of the Apache 2 webservers.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123909223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Selective Crystallization of Highly Dispersed Silicoaluminophosphate SAPO-11 高分散磷酸硅铝SAPO-11的选择性结晶
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436625
Z. Khayrullina, K. Ahmed, M. Agliullin
The authors have proposed a method for selective crystallization of a high dispersion SAPO-11 silicoaluminophosphate molecular sieve. X-ray diffraction analysis, low-temperature nitrogen adsorption and scanning electron microscopy were used to determine the chemical and phase compositions, characteristics of the porous structure, and the morphology of SAPO-11. It has been shown that crystallization of a silicoaluminophosphate gel prepared using pseudoboehmite as a source of aluminum and aged at 90 0 C allows obtaining the above zeolite of high phase purity and a degree of crystallinity equal to 96%. According to the data of scanning electron microscopy, the obtained SAPO-11 samples are characterized by a morphology close to cubic and a crystal size from 0.2 to 0.5 µm.
提出了一种高分散SAPO-11硅铝磷酸酯分子筛的选择性结晶方法。采用x射线衍射分析、低温氮吸附和扫描电镜对SAPO-11的化学成分、物相组成、孔隙结构特征和形貌进行了表征。研究表明,以拟薄水铝石为铝源制备的硅铝磷酸凝胶在90℃时效后结晶,可获得高相纯度、结晶度达96%的上述沸石。扫描电镜数据显示,制备的SAPO-11样品形貌接近立方,晶粒尺寸在0.2 ~ 0.5µm之间。
{"title":"Selective Crystallization of Highly Dispersed Silicoaluminophosphate SAPO-11","authors":"Z. Khayrullina, K. Ahmed, M. Agliullin","doi":"10.1109/ICOASE51841.2020.9436625","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436625","url":null,"abstract":"The authors have proposed a method for selective crystallization of a high dispersion SAPO-11 silicoaluminophosphate molecular sieve. X-ray diffraction analysis, low-temperature nitrogen adsorption and scanning electron microscopy were used to determine the chemical and phase compositions, characteristics of the porous structure, and the morphology of SAPO-11. It has been shown that crystallization of a silicoaluminophosphate gel prepared using pseudoboehmite as a source of aluminum and aged at 90 0 C allows obtaining the above zeolite of high phase purity and a degree of crystallinity equal to 96%. According to the data of scanning electron microscopy, the obtained SAPO-11 samples are characterized by a morphology close to cubic and a crystal size from 0.2 to 0.5 µm.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Association Rules based on Compression and Cryptography (PPAR-CC) 基于压缩和加密的隐私保护关联规则(PPAR-CC)
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436603
W. A. Salman, S. Sadkhan
Privacy-Preserving Data Mining (PPDM) is a modern technique through which data is mined while maintaining the confidentiality and privacy of sensitive information from unauthorized persons. The Privacy-Preserving Association Rules Mining (PPARM) is the most important technique for privacy-preserving data mining. PPARM means the mining of association rules with preserving the non-disclosure of sensitive correlations among items or features for competitors or the public, especially data of sensitive organizations such as financial organizations and others. In this paper, we propose an approach to hiding association rules after performing the mining process and obtaining knowledge through vertical and horizontal compressing then encoded the compressing form by using cryptography methods. The proposed approach is resistant to many known attacks and is undetectable because it includes three stages of compression and encryption in which the basic representation and size of the data change dramatically. The proposed approach significantly reduces storage space, maintains knowledge security, reduces transmission time, and facilitates the transmission of knowledge over any network.
隐私保护数据挖掘(PPDM)是一种现代技术,通过该技术可以在挖掘数据的同时保持敏感信息的机密性和隐私性。隐私保护关联规则挖掘(PPARM)是隐私保护数据挖掘中最重要的技术。PPARM是指对关联规则进行挖掘,同时保留竞争对手或公众的项目或特征之间的敏感相关性,特别是金融机构等敏感组织的数据。在本文中,我们提出了一种隐藏关联规则的方法,在进行挖掘过程后,通过垂直和水平压缩获取知识,然后使用密码学方法对压缩形式进行编码。所提出的方法可以抵抗许多已知的攻击,并且无法检测,因为它包括三个阶段的压缩和加密,其中数据的基本表示和大小发生了巨大的变化。该方法大大减少了存储空间,维护了知识的安全性,缩短了传输时间,并使知识在任何网络上都能方便地传输。
{"title":"Privacy Preserving Association Rules based on Compression and Cryptography (PPAR-CC)","authors":"W. A. Salman, S. Sadkhan","doi":"10.1109/ICOASE51841.2020.9436603","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436603","url":null,"abstract":"Privacy-Preserving Data Mining (PPDM) is a modern technique through which data is mined while maintaining the confidentiality and privacy of sensitive information from unauthorized persons. The Privacy-Preserving Association Rules Mining (PPARM) is the most important technique for privacy-preserving data mining. PPARM means the mining of association rules with preserving the non-disclosure of sensitive correlations among items or features for competitors or the public, especially data of sensitive organizations such as financial organizations and others. In this paper, we propose an approach to hiding association rules after performing the mining process and obtaining knowledge through vertical and horizontal compressing then encoded the compressing form by using cryptography methods. The proposed approach is resistant to many known attacks and is undetectable because it includes three stages of compression and encryption in which the basic representation and size of the data change dramatically. The proposed approach significantly reduces storage space, maintains knowledge security, reduces transmission time, and facilitates the transmission of knowledge over any network.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134265974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mini Jarvis Patrick -Based Graph Clustering for Scientific Institutions 基于微型Jarvis Patrick的科研机构图聚类
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436589
Hussein Z. Almngoshi, Eman S. Alshamery
The competition between scientific institutions is increased every day. Every institution tends to improve its reputation by producing and publishing high-quality scientific research. Clustering and evaluating the educational institutions are important for professors, policymakers, as well as students. This research aims to develop a Jarvis-Patrick algorithm for scientific institutions clustering, which is one of the graph-based techniques. It suffers from the problem of a large number of clusters. In addition to the Shared Nearest Neighbor (SNN) similarity included in the standard Mini Jarvis-Patrick (MJP) algorithm, the merging clusters of low separation are proposed to improve algorithm performance. The SNN similarity measures the number of shared neighbors between every two points in the data. Besides that, the merging is implemented by combining the clusters that have low separation. The proposed algorithm takes advantage of cluster validity measures (separation) to produce rational and reasonable clusters. The SciVal dataset for USA scientific institutions 2016–2018 dataset is used. The proposed MJP detected 8 clusters (Cluster0 %6, Cluster16%, Cluster2 6%, Cluster3 2%, Cluster4 7%, Cluster5 7.3%, Cluster6 26.6%, Cluster7 32%). In addition to the standard MJP, the proposed technique is compared with known methods; the cobweb, DBSCAN, and HierarchicalClusterer. The results have proved that the MJP is superior to other methods.
科研机构之间的竞争日益激烈。每个机构都倾向于通过生产和发表高质量的科学研究来提高自己的声誉。对教育机构进行聚类和评估对教授、政策制定者和学生都很重要。本研究旨在开发一种用于科研机构聚类的Jarvis-Patrick算法,这是一种基于图的聚类技术。它面临着集群数量过多的问题。除了标准Mini Jarvis-Patrick (MJP)算法中包含的共享最近邻(SNN)相似度外,还提出了低分离度的合并聚类来提高算法性能。SNN相似度度量数据中每两个点之间共享邻居的数量。此外,合并是通过组合低分离度的聚类来实现的。该算法利用聚类有效性度量(分离)来生成合理的聚类。使用美国科研机构SciVal数据集2016-2018数据集。MJP检测到8个集群(Cluster0 % 6%, Cluster16%, Cluster2 %, Cluster3 %, Cluster4 %, Cluster5 %, Cluster6 %, Cluster7 %, 32%)。除了标准的MJP外,还将所提出的技术与已知方法进行了比较;蛛网、DBSCAN和HierarchicalClusterer。结果表明,该方法优于其他方法。
{"title":"Mini Jarvis Patrick -Based Graph Clustering for Scientific Institutions","authors":"Hussein Z. Almngoshi, Eman S. Alshamery","doi":"10.1109/ICOASE51841.2020.9436589","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436589","url":null,"abstract":"The competition between scientific institutions is increased every day. Every institution tends to improve its reputation by producing and publishing high-quality scientific research. Clustering and evaluating the educational institutions are important for professors, policymakers, as well as students. This research aims to develop a Jarvis-Patrick algorithm for scientific institutions clustering, which is one of the graph-based techniques. It suffers from the problem of a large number of clusters. In addition to the Shared Nearest Neighbor (SNN) similarity included in the standard Mini Jarvis-Patrick (MJP) algorithm, the merging clusters of low separation are proposed to improve algorithm performance. The SNN similarity measures the number of shared neighbors between every two points in the data. Besides that, the merging is implemented by combining the clusters that have low separation. The proposed algorithm takes advantage of cluster validity measures (separation) to produce rational and reasonable clusters. The SciVal dataset for USA scientific institutions 2016–2018 dataset is used. The proposed MJP detected 8 clusters (Cluster0 %6, Cluster16%, Cluster2 6%, Cluster3 2%, Cluster4 7%, Cluster5 7.3%, Cluster6 26.6%, Cluster7 32%). In addition to the standard MJP, the proposed technique is compared with known methods; the cobweb, DBSCAN, and HierarchicalClusterer. The results have proved that the MJP is superior to other methods.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Making Approaches in Cognitive Radio-Status, Challenges and Future Trends 认知无线电中的决策方法——现状、挑战和未来趋势
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436597
Akeel Bdrany, S. Sadkhan
In the past few years, we have seen a lot of research in the field of cognitive radio technology, because this technology represents a promising behavior for the problem of scarcity of spectrum, and the increase in the demand for spectrum frequencies by individuals, companies, and the so-called Internet of things. The cognitive radio cycle consists of several steps, and one of the most important steps is the step of analysis and decision-making. There are many algorithms and approaches to investigate at this step. This article will survey the most important current trends in this field, as well as the problems and challenges that are still open in this field, and it will review future trends algorithms, and techniques for analysis and decision-making.
在过去的几年里,我们看到了很多关于认知无线电技术领域的研究,因为这项技术代表了一种很有前途的行为,可以解决频谱稀缺的问题,以及个人、公司和所谓的物联网对频谱频率需求的增加。认知无线电周期包括几个步骤,其中最重要的一个步骤是分析和决策步骤。在这一步有许多算法和方法可以研究。本文将调查该领域最重要的当前趋势,以及该领域仍然存在的问题和挑战,并将回顾未来的趋势,算法以及分析和决策的技术。
{"title":"Decision Making Approaches in Cognitive Radio-Status, Challenges and Future Trends","authors":"Akeel Bdrany, S. Sadkhan","doi":"10.1109/ICOASE51841.2020.9436597","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436597","url":null,"abstract":"In the past few years, we have seen a lot of research in the field of cognitive radio technology, because this technology represents a promising behavior for the problem of scarcity of spectrum, and the increase in the demand for spectrum frequencies by individuals, companies, and the so-called Internet of things. The cognitive radio cycle consists of several steps, and one of the most important steps is the step of analysis and decision-making. There are many algorithms and approaches to investigate at this step. This article will survey the most important current trends in this field, as well as the problems and challenges that are still open in this field, and it will review future trends algorithms, and techniques for analysis and decision-making.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Brain Tumor Detection and Classifiaction Using CNN Algorithm and Deep Learning Techniques 基于CNN算法和深度学习技术的脑肿瘤检测与分类
Pub Date : 2020-12-23 DOI: 10.1109/ICOASE51841.2020.9436599
Sultan B. Fayyadh, A. Ibrahim
Detection of brain tumors through image processing is done by using an integrated approach. This work was planned to present a system to classify and detect brain tumors using the CNN algorithm and deep learning techniques from MRI images to the most popular tumors in the world. This work was performed using an MRI image dataset as input, Preprocessing and segmentation were performed to enhance the images. Our neural network design is simpler to train and it's possible to run it on another computer because the designed algorithm requires fewer resources. The dataset was used contains 3064 images related to different tumors meningioma (708 slices), glioma (1426 slices), and pituitary tumor (930 slices), the convolution neural network (CNN) was used through which the brain tumor is classified according to a special structure of this algorithm consisting of several layers, The implementation of the neural network consist blocks each block include many types of layer, first, the input layer then followed by convolution layer, then the activation function that used was Rectified Linear Units (ReLU), normalization layer, and pooling layer. Also, it contains the classification layer fully connected and softmax layer the overall accuracy rate obtained from the proposed approach was (98,029%) in the testing stage and (98.29%) in the training stage for the data set were used.
通过图像处理来检测脑肿瘤是一种综合的方法。这项工作计划提出一个系统,利用CNN算法和深度学习技术,从MRI图像到世界上最流行的肿瘤,对脑肿瘤进行分类和检测。本工作采用MRI图像数据集作为输入,进行预处理和分割以增强图像。我们的神经网络设计更容易训练,并且可以在另一台计算机上运行,因为设计的算法需要更少的资源。使用的数据集包含3064张不同肿瘤相关的图像,脑膜瘤(708片)、胶质瘤(1426片)和脑垂体瘤(930片),采用卷积神经网络(CNN)对脑肿瘤进行分类,该算法采用由多层组成的特殊结构,神经网络的实现由块组成,每个块包含多种类型的层,首先是输入层,然后是卷积层;则使用的激活函数为整流线性单元(ReLU)、归一化层和池化层。此外,它还包含了完全连接的分类层和softmax层,对于所使用的数据集,该方法在测试阶段获得的总体准确率为98029%,在训练阶段获得的总体准确率为98.29%。
{"title":"Brain Tumor Detection and Classifiaction Using CNN Algorithm and Deep Learning Techniques","authors":"Sultan B. Fayyadh, A. Ibrahim","doi":"10.1109/ICOASE51841.2020.9436599","DOIUrl":"https://doi.org/10.1109/ICOASE51841.2020.9436599","url":null,"abstract":"Detection of brain tumors through image processing is done by using an integrated approach. This work was planned to present a system to classify and detect brain tumors using the CNN algorithm and deep learning techniques from MRI images to the most popular tumors in the world. This work was performed using an MRI image dataset as input, Preprocessing and segmentation were performed to enhance the images. Our neural network design is simpler to train and it's possible to run it on another computer because the designed algorithm requires fewer resources. The dataset was used contains 3064 images related to different tumors meningioma (708 slices), glioma (1426 slices), and pituitary tumor (930 slices), the convolution neural network (CNN) was used through which the brain tumor is classified according to a special structure of this algorithm consisting of several layers, The implementation of the neural network consist blocks each block include many types of layer, first, the input layer then followed by convolution layer, then the activation function that used was Rectified Linear Units (ReLU), normalization layer, and pooling layer. Also, it contains the classification layer fully connected and softmax layer the overall accuracy rate obtained from the proposed approach was (98,029%) in the testing stage and (98.29%) in the training stage for the data set were used.","PeriodicalId":126112,"journal":{"name":"2020 International Conference on Advanced Science and Engineering (ICOASE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 International Conference on Advanced Science and Engineering (ICOASE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1