首页 > 最新文献

2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)最新文献

英文 中文
Deep And Machine Learning Towards Pneumonia And Asthma Detection 用于肺炎和哮喘检测的深度和机器学习
Amani Yahyaoui, N. Yumusak
Machine Learning is a branch of artificial intelligence widely used in the medical field to analyze high-dimensional medical data and the early detection of certain dangerous diseases. Lung diseases continue to increase the mortality rate in the world. The early and accurate prediction of lung diseases has become a primary necessity to save patient's lives and facilitate doctor's works. This paper focuses on predicting certain chest diseases such as Pneumonia and Asthma using Deep Learning (DL) and Machine Learning (ML) techniques, respectively, the Deep Neural Network (DNN), and the K-nearest Neighbors (KNN) methods. These approaches are evaluated using a private data set from the pulmonary diseases department of Diyarbakir hospital, Turkey. It consists of 212 samples, 38 input characteristics characterize each one. The results obtained showed the effectiveness of these methods to detect pulmonary diseases, particularly the KNN, by giving a detection accuracy of 95% and 94.3% by using the DNN method.
机器学习是人工智能的一个分支,广泛应用于医疗领域,用于分析高维医疗数据和早期发现某些危险疾病。肺部疾病继续增加世界上的死亡率。对肺部疾病进行早期、准确的预测,已成为挽救患者生命、方便医生工作的首要需要。本文的重点是分别使用深度学习(DL)和机器学习(ML)技术、深度神经网络(DNN)和k近邻(KNN)方法预测某些胸部疾病,如肺炎和哮喘。这些方法使用来自土耳其迪亚巴克尔医院肺病科的私人数据集进行评估。它由212个样本组成,每个样本有38个输入特征。所获得的结果显示了这些方法检测肺部疾病的有效性,特别是KNN,使用DNN方法的检测准确率为95%和94.3%。
{"title":"Deep And Machine Learning Towards Pneumonia And Asthma Detection","authors":"Amani Yahyaoui, N. Yumusak","doi":"10.1109/3ICT53449.2021.9581963","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581963","url":null,"abstract":"Machine Learning is a branch of artificial intelligence widely used in the medical field to analyze high-dimensional medical data and the early detection of certain dangerous diseases. Lung diseases continue to increase the mortality rate in the world. The early and accurate prediction of lung diseases has become a primary necessity to save patient's lives and facilitate doctor's works. This paper focuses on predicting certain chest diseases such as Pneumonia and Asthma using Deep Learning (DL) and Machine Learning (ML) techniques, respectively, the Deep Neural Network (DNN), and the K-nearest Neighbors (KNN) methods. These approaches are evaluated using a private data set from the pulmonary diseases department of Diyarbakir hospital, Turkey. It consists of 212 samples, 38 input characteristics characterize each one. The results obtained showed the effectiveness of these methods to detect pulmonary diseases, particularly the KNN, by giving a detection accuracy of 95% and 94.3% by using the DNN method.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Socio-technical Challenges in the Implementation of Smart City 智慧城市实施中的社会技术挑战
Hitesh Mohapatra
The smart city concept is a solution to many problems that we are facing in our day-to-day life. Many countries have been started adopting many prototypes to solve daily challenges. Still, the smart city term does not have any universally accepted definition. The smart city is a ubiquitous term whose definition varies from person to person, city to city, and country to country. The lack of a common definition remains the term smart city is in a chaotic state. This paper has presented the socio-technical challenges during the implementation of smart city plans. It has analyzed the smart city execution problems in the context of developed and underdeveloped countries.
智慧城市的概念是我们在日常生活中面临的许多问题的解决方案。许多国家已经开始采用许多原型来解决日常挑战。然而,智慧城市这个术语并没有一个被普遍接受的定义。智慧城市是一个无处不在的术语,它的定义因人而异、因人而异、因人而异、因人而异。由于缺乏统一的定义,智慧城市这一术语仍然处于混乱状态。本文介绍了智慧城市规划实施过程中的社会技术挑战。分析了发达国家和欠发达国家背景下智慧城市的执行问题。
{"title":"Socio-technical Challenges in the Implementation of Smart City","authors":"Hitesh Mohapatra","doi":"10.1109/3ICT53449.2021.9581905","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581905","url":null,"abstract":"The smart city concept is a solution to many problems that we are facing in our day-to-day life. Many countries have been started adopting many prototypes to solve daily challenges. Still, the smart city term does not have any universally accepted definition. The smart city is a ubiquitous term whose definition varies from person to person, city to city, and country to country. The lack of a common definition remains the term smart city is in a chaotic state. This paper has presented the socio-technical challenges during the implementation of smart city plans. It has analyzed the smart city execution problems in the context of developed and underdeveloped countries.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133876544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Implementation of Access Control in Ethereum Blockchain 以太坊区块链中访问控制的实现
Insaf Achour, S. Ayed, H. Idoudi
Access control is a main component in Blockchain systems. It is usually implemented in smart contracts and defines the security policy, in other words, it determines who can access a protected resource in the network. In this paper, we present a review of the major implementations of access control in Ethereum platform. The latter is based on RBAC model (Role-Based Access Control). Implementations require to take into account the whole RBAC process, that is, user role assignment and permission assignment. Three implementations currently exist and are described and compared in this work according to several features: RBAC-SC, Smart policies and OpenZepplin contracts.
访问控制是区块链系统的主要组成部分。它通常在智能合约中实现,并定义安全策略,换句话说,它决定谁可以访问网络中受保护的资源。在本文中,我们回顾了以太坊平台中访问控制的主要实现。后者基于RBAC模型(基于角色的访问控制)。实现需要考虑整个RBAC过程,即用户角色分配和权限分配。本文根据RBAC-SC、Smart策略和OpenZepplin合约的几个特性,对目前存在的三种实现进行了描述和比较。
{"title":"On the Implementation of Access Control in Ethereum Blockchain","authors":"Insaf Achour, S. Ayed, H. Idoudi","doi":"10.1109/3ICT53449.2021.9581591","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581591","url":null,"abstract":"Access control is a main component in Blockchain systems. It is usually implemented in smart contracts and defines the security policy, in other words, it determines who can access a protected resource in the network. In this paper, we present a review of the major implementations of access control in Ethereum platform. The latter is based on RBAC model (Role-Based Access Control). Implementations require to take into account the whole RBAC process, that is, user role assignment and permission assignment. Three implementations currently exist and are described and compared in this work according to several features: RBAC-SC, Smart policies and OpenZepplin contracts.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116133469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of COVID-19 mRNA Vaccine Degradation Prediction System 新型冠状病毒mRNA疫苗降解预测系统的研制
Soon Hwai Ing, A. Abdullah, Shigehiko Kanaya
The threatening Coronavirus which was assigned as the global pandemic concussed not only the public health but society, economy and every walks of life. Some measurements are taken to stifle the spread and one of the best ways is to carry out some precautions to prevent the contagion of SARS-CoV-2 virus to uninfected populaces. Injecting prevention vaccines is one of the precaution steps under the grandiose blueprint. Among all vaccines, it is found that mRNA vaccine which shows no side effect with marvelous effectiveness is the most preferable candidates to be considered. However, degradation had become its biggest drawback to be implemented. Hereby, this study is held with desideratum to develop prediction models specifically to predict the degradation rate of mRNA vaccine for COVID-19.3 machine learning algorithms, which are, Linear Regression (LR), Light Gradient Boosting Machine (LGBM) and Random Forest (RF) are proposed for 12 models development. Dataset comprises of thousands of RNA molecules that holds degradation rates at each position from Eterna platform is extracted, pre-processed and encoded with label encoding before loaded into algorithms. The results show that the LGBM-based model which is trained along with auxiliary bpps features and encoded with method 1 label encoding performs the best (RMSE = 0.24466), followed by the same criteria LGBM-based model but encoded with label encoding method 2, with a difference in 0.00003 in tow the topnotch model. The RF-based model with applaudable performance (RMSE = 0.25302) even without the ubieties of the riddled bpps features in contradistinction to the training and encoding criteria of the superb mellowed LGBM-based model is worth being further cultivated for the prediction study on COVID-19 mRNA vaccines' degradation rate.
被指定为全球大流行的冠状病毒不仅给公共卫生带来了冲击,而且给社会、经济和各行各业带来了冲击。采取了一些措施来遏制传播,最好的方法之一是采取一些预防措施,防止SARS-CoV-2病毒传染给未感染的人群。注射预防疫苗是宏伟蓝图下的预防措施之一。在所有疫苗中,发现无副作用且疗效显著的mRNA疫苗是最值得考虑的候选疫苗。然而,退化已成为其实施的最大缺点。为此,本研究旨在建立针对COVID-19.3机器学习算法的mRNA疫苗降解率预测模型,提出了线性回归(LR),光梯度增强机(LGBM)和随机森林(RF) 12个模型开发。数据集由数千个RNA分子组成,这些RNA分子在Eterna平台的每个位置保持降解率,在加载到算法之前,提取,预处理并使用标签编码进行编码。结果表明,使用方法1标签编码方法对辅助bpps特征进行训练的基于lgbm的模型表现最佳(RMSE = 0.24466),其次是使用方法2标签编码方法对相同标准的基于lgbm的模型进行编码,与一流模型的RMSE相差0.00003。与成熟的lgbm模型的训练和编码标准相比,即使没有千孔化bpps特征的普遍存在,基于rf的模型也具有令人赞赏的性能(RMSE = 0.25302),值得进一步培养用于COVID-19 mRNA疫苗降解率的预测研究。
{"title":"Development of COVID-19 mRNA Vaccine Degradation Prediction System","authors":"Soon Hwai Ing, A. Abdullah, Shigehiko Kanaya","doi":"10.1109/3ICT53449.2021.9582052","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9582052","url":null,"abstract":"The threatening Coronavirus which was assigned as the global pandemic concussed not only the public health but society, economy and every walks of life. Some measurements are taken to stifle the spread and one of the best ways is to carry out some precautions to prevent the contagion of SARS-CoV-2 virus to uninfected populaces. Injecting prevention vaccines is one of the precaution steps under the grandiose blueprint. Among all vaccines, it is found that mRNA vaccine which shows no side effect with marvelous effectiveness is the most preferable candidates to be considered. However, degradation had become its biggest drawback to be implemented. Hereby, this study is held with desideratum to develop prediction models specifically to predict the degradation rate of mRNA vaccine for COVID-19.3 machine learning algorithms, which are, Linear Regression (LR), Light Gradient Boosting Machine (LGBM) and Random Forest (RF) are proposed for 12 models development. Dataset comprises of thousands of RNA molecules that holds degradation rates at each position from Eterna platform is extracted, pre-processed and encoded with label encoding before loaded into algorithms. The results show that the LGBM-based model which is trained along with auxiliary bpps features and encoded with method 1 label encoding performs the best (RMSE = 0.24466), followed by the same criteria LGBM-based model but encoded with label encoding method 2, with a difference in 0.00003 in tow the topnotch model. The RF-based model with applaudable performance (RMSE = 0.25302) even without the ubieties of the riddled bpps features in contradistinction to the training and encoding criteria of the superb mellowed LGBM-based model is worth being further cultivated for the prediction study on COVID-19 mRNA vaccines' degradation rate.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123502102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COCOSO-based Network Interface Selection Algorithm for Heterogeneous Wireless Networks 基于cocoso的异构无线网络接口选择算法
Brahim Mefgouda, H. Idoudi
Network Interface Selection (NIS) aims to connect the user equipment to the best available network in the context of heterogeneous wireless networks environments (HWN). NIS is one of the main current issues in HWNs that raised great scientific interest in the last few years. Multi-attribute decision-making (MADM) are the most common approaches applied to solve the NIS problem as they are easy to understand, they can be used in real scenarios, and they perform fast networks' ranking. In this paper, we apply, for the first time, the Combined Compromise Solution (COCOSO) to model and solve the network interface selection problem. Simulation results showed that our proposed approach outperforms the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Simple Additive Weighting (SAW) in terms of reducing the rank reversal problem and meeting QoS requirements.
网络接口选择(NIS)旨在将用户设备连接到异构无线网络环境(HWN)中的最佳可用网络。NIS是近年来引起极大科学兴趣的HWNs当前主要问题之一。多属性决策(Multi-attribute decision- MADM,多属性决策)是解决NIS问题最常用的方法,因为它易于理解,可以在实际场景中使用,并且可以实现快速的网络排序。在本文中,我们首次使用组合妥协解(COCOSO)来建模和解决网络接口选择问题。仿真结果表明,该方法在减少秩反转问题和满足QoS要求方面优于理想解相似性偏好排序法(TOPSIS)和简单加性加权法(SAW)。
{"title":"COCOSO-based Network Interface Selection Algorithm for Heterogeneous Wireless Networks","authors":"Brahim Mefgouda, H. Idoudi","doi":"10.1109/3ICT53449.2021.9581462","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581462","url":null,"abstract":"Network Interface Selection (NIS) aims to connect the user equipment to the best available network in the context of heterogeneous wireless networks environments (HWN). NIS is one of the main current issues in HWNs that raised great scientific interest in the last few years. Multi-attribute decision-making (MADM) are the most common approaches applied to solve the NIS problem as they are easy to understand, they can be used in real scenarios, and they perform fast networks' ranking. In this paper, we apply, for the first time, the Combined Compromise Solution (COCOSO) to model and solve the network interface selection problem. Simulation results showed that our proposed approach outperforms the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Simple Additive Weighting (SAW) in terms of reducing the rank reversal problem and meeting QoS requirements.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defeating the Credit Card Scams Through Machine Learning Algorithms 通过机器学习算法击败信用卡诈骗
Kameron Bains, Adebamigbe Fasanmade, J. Morden, A. Al-Bayatti, M. S. Sharif, A. S. Alfakeeh
Credit card fraud is a significant problem that is not going to go away. It is a growing problem and surged during the Covid-19 pandemic since more transactions are done without cash in hand now. Credit card frauds are complicated to distinguish as the characteristics of legitimate and fraudulent transactions are very similar. The performance evaluation of various Machine Learning (ML)-based credit card fraud recognition schemes are significantly pretentious due to data processing, including collecting variables and corresponding ML mechanism being used. One possible way to counter this problem is to apply ML algorithms such as Support Vector Machine (SVM), K nearest neighbor (KNN), Naive Bayes, and logistic regression. This research work aims to compare the ML as mentioned earlier models and its impact on credit card scam detection, especially in situations with imbalanced datasets. Moreover, we have proposed state of the art data balancing algorithm to solve data unbalancing problems in such situations. Our experiments show that the logistic regression has an accuracy of 99.91%, and naive bays have an accuracy of 97.65%. K nearest neighbor has an accuracy is 99.92%, support vector machine has an accuracy of 99.95%. The precision and accuracy comparison of our proposed approach shows that our model is state of the art.
信用卡欺诈是一个不会消失的重大问题。这是一个日益严重的问题,在Covid-19大流行期间激增,因为现在更多的交易是在没有现金的情况下完成的。由于合法交易和欺诈交易的特征非常相似,信用卡诈骗很难区分。各种基于机器学习(ML)的信用卡欺诈识别方案的性能评估由于数据处理而显着矫情,包括收集变量和使用相应的ML机制。解决这个问题的一个可能方法是应用ML算法,如支持向量机(SVM)、K近邻(KNN)、朴素贝叶斯和逻辑回归。这项研究工作旨在比较前面提到的模型及其对信用卡诈骗检测的影响,特别是在数据集不平衡的情况下。此外,我们提出了最先进的数据平衡算法来解决这种情况下的数据不平衡问题。我们的实验表明,逻辑回归的准确率为99.91%,朴素bays的准确率为97.65%。K最近邻的准确率为99.92%,支持向量机的准确率为99.95%。我们提出的方法的精度和准确度的比较表明,我们的模型是最先进的。
{"title":"Defeating the Credit Card Scams Through Machine Learning Algorithms","authors":"Kameron Bains, Adebamigbe Fasanmade, J. Morden, A. Al-Bayatti, M. S. Sharif, A. S. Alfakeeh","doi":"10.1109/3ICT53449.2021.9582060","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9582060","url":null,"abstract":"Credit card fraud is a significant problem that is not going to go away. It is a growing problem and surged during the Covid-19 pandemic since more transactions are done without cash in hand now. Credit card frauds are complicated to distinguish as the characteristics of legitimate and fraudulent transactions are very similar. The performance evaluation of various Machine Learning (ML)-based credit card fraud recognition schemes are significantly pretentious due to data processing, including collecting variables and corresponding ML mechanism being used. One possible way to counter this problem is to apply ML algorithms such as Support Vector Machine (SVM), K nearest neighbor (KNN), Naive Bayes, and logistic regression. This research work aims to compare the ML as mentioned earlier models and its impact on credit card scam detection, especially in situations with imbalanced datasets. Moreover, we have proposed state of the art data balancing algorithm to solve data unbalancing problems in such situations. Our experiments show that the logistic regression has an accuracy of 99.91%, and naive bays have an accuracy of 97.65%. K nearest neighbor has an accuracy is 99.92%, support vector machine has an accuracy of 99.95%. The precision and accuracy comparison of our proposed approach shows that our model is state of the art.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123060860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Support Vector Machine and Decision Tree-Based Elective Course Suggestion System: A Case Study 基于支持向量机与决策树的选修课建议系统案例研究
M. F. Adak, S. Ercan
Nowadays, online education has become widespread, and the search for new techniques has begun to increase. The high number of quotas in university education in Turkey increases the number of students per instructor. It is not at the desired level for the student to receive a good education in the presence of an advisor and choose the appropriate course for his / her field due to a large number of students. In this study, a suggestion system is proposed by analyzing the previous courses taken by university students in directing the elective course. In this study, which courses would be beneficial to choose and which would be useless are presented with a web interface in which Support Vector Machine and decision trees are used. In the pilot study that the model developed conducted in the Computer Engineering department, an average of 76% success was achieved in test data sets. This success shows that the student can examine the compulsory courses and suggest elective courses suitable for his/her field and that he/she will like.
如今,在线教育已经普及,对新技术的探索也开始增加。土耳其大学教育的高配额增加了每位教师的学生数量。由于学生人数众多,学生在指导老师的指导下接受良好的教育,并选择适合自己领域的课程,这并不是理想的水平。本研究通过对大学生选修课程指导的分析,提出了一个建议系统。在本研究中,选择哪些课程是有益的,哪些课程是无用的,并通过使用支持向量机和决策树的web界面来呈现。在计算机工程系进行的该模型的试点研究中,测试数据集的平均成功率为76%。这个成功表明学生可以检查必修课,并建议适合他/她的领域和他/她喜欢的选修课程。
{"title":"Support Vector Machine and Decision Tree-Based Elective Course Suggestion System: A Case Study","authors":"M. F. Adak, S. Ercan","doi":"10.1109/3ICT53449.2021.9581846","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581846","url":null,"abstract":"Nowadays, online education has become widespread, and the search for new techniques has begun to increase. The high number of quotas in university education in Turkey increases the number of students per instructor. It is not at the desired level for the student to receive a good education in the presence of an advisor and choose the appropriate course for his / her field due to a large number of students. In this study, a suggestion system is proposed by analyzing the previous courses taken by university students in directing the elective course. In this study, which courses would be beneficial to choose and which would be useless are presented with a web interface in which Support Vector Machine and decision trees are used. In the pilot study that the model developed conducted in the Computer Engineering department, an average of 76% success was achieved in test data sets. This success shows that the student can examine the compulsory courses and suggest elective courses suitable for his/her field and that he/she will like.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach for Labelling XML Data 标记XML数据的新方法
Alhadi A. Klaib, A. Milad, Mustafa Almahdi Algaet
Extensible Markup Language (XML) has become a key technique for transferring data through the internet. Updating and retrieving a large amount of XML data is a very active research field. The XML labelling schemes play an important role in handling XML data efficiently and robustly. Thus, many labelling schemes have been proposed. Nevertheless, these labelling schemes have limitations. Therefore, in this paper, a new method for labelling XML documents is developed. In addition, this approach used the idea of clustering-based XML data and dividing the nodes of an XML document into groups and labelling them accordingly. Two existing labelling schemes were chosen to label the clusters and their nodes as well. The level-based labelling scheme (LLS) and Dewey labelling scheme were used to label the nodes and clusters. The data model of this scheme has been developed. The mechanism of the proposed scheme also has been developed. Finally, this proposed scheme and the other two labelling schemes that used to build the proposed scheme have been implemented.
可扩展标记语言(XML)已成为通过互联网传输数据的关键技术。更新和检索大量XML数据是一个非常活跃的研究领域。XML标记方案在高效、鲁棒地处理XML数据方面起着重要作用。因此,提出了许多标签方案。然而,这些标签方案有其局限性。为此,本文提出了一种新的标记XML文档的方法。此外,该方法使用了基于聚类的XML数据的思想,并将XML文档的节点划分为组并相应地标记它们。选择了两种现有的标记方案来标记聚类及其节点。采用基于水平的标记方案(LLS)和Dewey标记方案对节点和聚类进行标记。建立了该方案的数据模型。拟议方案的机制也已发展。最后,该建议方案和用于构建建议方案的其他两个标签方案已经实施。
{"title":"A New Approach for Labelling XML Data","authors":"Alhadi A. Klaib, A. Milad, Mustafa Almahdi Algaet","doi":"10.1109/3ICT53449.2021.9581352","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581352","url":null,"abstract":"Extensible Markup Language (XML) has become a key technique for transferring data through the internet. Updating and retrieving a large amount of XML data is a very active research field. The XML labelling schemes play an important role in handling XML data efficiently and robustly. Thus, many labelling schemes have been proposed. Nevertheless, these labelling schemes have limitations. Therefore, in this paper, a new method for labelling XML documents is developed. In addition, this approach used the idea of clustering-based XML data and dividing the nodes of an XML document into groups and labelling them accordingly. Two existing labelling schemes were chosen to label the clusters and their nodes as well. The level-based labelling scheme (LLS) and Dewey labelling scheme were used to label the nodes and clusters. The data model of this scheme has been developed. The mechanism of the proposed scheme also has been developed. Finally, this proposed scheme and the other two labelling schemes that used to build the proposed scheme have been implemented.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Future Micro Hydro Power: Generation of Hydroelectricity and IoT based Monitoring System 未来微型水电:水力发电和基于物联网的监测系统
A. Akib, S. Mahmud, M. Mridha
The paper focuses on the Future Micro Hydro Power: generation of hydroelectricity and its monitoring system. The world is moving towards technological advancement day by day. For this reason, the energy need will surge further in the coming days. But we could not yet ensure the proper electricity needs in the poor or developing country. Now it's an essential needy thing to survive this 4.0 industry's time. This ‘Future Micro Hydro Power’ device will generate energy by exploiting the small water sources (i.e., Washroom, Kitchen, Etc.) in the multi steroid buildings. A massive amount of water is used in the house every day. Water taps are used not only in homes but in all modern buildings. We have demonstrated how hydropower will generate from these tiny water sources and how this power can run a house. Here the user will be able to monitor the amount of energy produced and use it if desired. The cost of the devices will be much lower, and their performance will be much higher. After the experimental installation, we got some data that proves its outstanding efficiency.
本文重点研究了未来微型水力发电——水力发电及其监测系统。世界正日益走向科技进步。因此,未来几天能源需求将进一步飙升。但我们还不能确保贫穷或发展中国家的适当电力需求。现在,这是在工业4.0时代生存下去的必要条件。这种“未来微型水力发电”装置将通过利用多类固醇建筑中的小型水源(如洗手间、厨房等)来产生能量。每天房子里要用大量的水。水龙头不仅用于家庭,而且用于所有现代建筑。我们已经演示了如何从这些微小的水源中产生水力发电,以及这些电力如何运行一个房子。在这里,用户将能够监控产生的能量,并在需要时使用它。这些设备的成本会低得多,性能会高得多。实验安装后,我们得到了一些数据,证明了其出色的效率。
{"title":"Future Micro Hydro Power: Generation of Hydroelectricity and IoT based Monitoring System","authors":"A. Akib, S. Mahmud, M. Mridha","doi":"10.1109/3ICT53449.2021.9581590","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581590","url":null,"abstract":"The paper focuses on the Future Micro Hydro Power: generation of hydroelectricity and its monitoring system. The world is moving towards technological advancement day by day. For this reason, the energy need will surge further in the coming days. But we could not yet ensure the proper electricity needs in the poor or developing country. Now it's an essential needy thing to survive this 4.0 industry's time. This ‘Future Micro Hydro Power’ device will generate energy by exploiting the small water sources (i.e., Washroom, Kitchen, Etc.) in the multi steroid buildings. A massive amount of water is used in the house every day. Water taps are used not only in homes but in all modern buildings. We have demonstrated how hydropower will generate from these tiny water sources and how this power can run a house. Here the user will be able to monitor the amount of energy produced and use it if desired. The cost of the devices will be much lower, and their performance will be much higher. After the experimental installation, we got some data that proves its outstanding efficiency.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new approach to detect next generation of malware based on machine learning 基于机器学习的下一代恶意软件检测新方法
Ikram Ben abdel ouahab, Lotfi Elaachak, Yasser A. Alluhaidan, M. Bouhorma
In these days, malware attacks target different kinds of devices as IoT, mobiles, servers even the cloud. It causes several hardware damages and financial losses especially for big companies. Malware attacks represent a serious issue to cybersecurity specialists. In this paper, we propose a new approach to detect unknown malware families based on machine learning classification and visualization technique. A malware binary is converted to grayscale image, then for each image a GIST descriptor is used as input to the machine learning model. For the malware classification part we use 3 machine learning algorithms. These classifiers are so efficient where the highest precision reach 98%. Once we train, test and evaluate models we move to simulate 2 new malware families. We do not expect a good prediction since the model did not know the family; however our goal is to analyze the behavior of our classifiers in the case of new family. Finally, we propose an approach using a filter to know either the classification is normal or it's a zero-day malware.
如今,恶意软件攻击的目标是不同类型的设备,如物联网、移动设备、服务器甚至云。它会造成硬件损坏和经济损失,尤其是对大公司而言。对于网络安全专家来说,恶意软件攻击是一个严重的问题。本文提出了一种基于机器学习分类和可视化技术的未知恶意软件家族检测新方法。将恶意软件二进制文件转换为灰度图像,然后对每个图像使用GIST描述符作为机器学习模型的输入。对于恶意软件分类部分,我们使用了3种机器学习算法。这些分类器非常高效,最高精度达到98%。一旦我们训练、测试和评估模型,我们就开始模拟两个新的恶意软件家族。我们不期望一个好的预测,因为模型不知道家族;然而,我们的目标是分析分类器在新家族的情况下的行为。最后,我们提出了一种使用过滤器来判断分类是正常的还是零日恶意软件的方法。
{"title":"A new approach to detect next generation of malware based on machine learning","authors":"Ikram Ben abdel ouahab, Lotfi Elaachak, Yasser A. Alluhaidan, M. Bouhorma","doi":"10.1109/3ICT53449.2021.9581625","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581625","url":null,"abstract":"In these days, malware attacks target different kinds of devices as IoT, mobiles, servers even the cloud. It causes several hardware damages and financial losses especially for big companies. Malware attacks represent a serious issue to cybersecurity specialists. In this paper, we propose a new approach to detect unknown malware families based on machine learning classification and visualization technique. A malware binary is converted to grayscale image, then for each image a GIST descriptor is used as input to the machine learning model. For the malware classification part we use 3 machine learning algorithms. These classifiers are so efficient where the highest precision reach 98%. Once we train, test and evaluate models we move to simulate 2 new malware families. We do not expect a good prediction since the model did not know the family; however our goal is to analyze the behavior of our classifiers in the case of new family. Finally, we propose an approach using a filter to know either the classification is normal or it's a zero-day malware.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130642630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1