首页 > 最新文献

2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
Using Support Vector Regression in multi-target prediction of drug toxicity 支持向量回归在药物毒性多目标预测中的应用
F. Adilova, Alisher Ikramov
We consider the task of drug activity prediction, specifically we predict the toxicity of fullerene-based nanoparticles in interaction with 1117 proteins. We use a multi-target Support Vector Regression model with a greedy feature selection technique to achieve RMSE of 362.9 on a test set. We also demonstrate the impact of hyperparameter tuning on model performance.
我们考虑药物活性预测的任务,特别是我们预测基于富勒烯的纳米颗粒与1117蛋白相互作用的毒性。我们使用多目标支持向量回归模型和贪婪特征选择技术,在测试集上实现了362.9的RMSE。我们还演示了超参数调优对模型性能的影响。
{"title":"Using Support Vector Regression in multi-target prediction of drug toxicity","authors":"F. Adilova, Alisher Ikramov","doi":"10.1109/AICT50176.2020.9368837","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368837","url":null,"abstract":"We consider the task of drug activity prediction, specifically we predict the toxicity of fullerene-based nanoparticles in interaction with 1117 proteins. We use a multi-target Support Vector Regression model with a greedy feature selection technique to achieve RMSE of 362.9 on a test set. We also demonstrate the impact of hyperparameter tuning on model performance.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sybil Attack Detection In Wireless Sensor Networks 无线传感器网络中的Sybil攻击检测
Zhukabayeva T. K, Mardenov E. M, Abdildaeva A.A
There are many vulnerabilities to attack in wireless sensor networks. Among them, the sybil attack is especially malicious to generate many false nodes and enter false information on the network. They are detrimental to many functions of the FSU, such as data pooling, fair distribution of resources, etc. Therefore, it is crucial to protect and detect Sybil attacks. The Sybil attack has a significant impact on network performance, and once it was detected, network performance will be obviously improving.In this article, we consider a new method of detecting Sybil attacks using random keys. In the proposed method, signs are used that there is a weak connection between the group of normal nodes and the group of false nodes. Experiment results show that the proposed method detects a false node with a probability of more than 90% with a small energy consumption.
无线传感器网络存在许多可攻击的漏洞。其中,符号攻击尤为恶意,会在网络上产生大量假节点,输入虚假信息。它们不利于FSU的许多功能,如数据池、资源公平分配等。因此,它是至关重要的,以保护和检测女巫攻击。Sybil攻击对网络性能的影响很大,一旦被检测到,网络性能会有明显的提升。在本文中,我们考虑了一种使用随机密钥检测Sybil攻击的新方法。在提出的方法中,使用符号表示正常节点组与假节点组之间存在弱连接。实验结果表明,该方法检测假节点的概率大于90%,且能耗小。
{"title":"Sybil Attack Detection In Wireless Sensor Networks","authors":"Zhukabayeva T. K, Mardenov E. M, Abdildaeva A.A","doi":"10.1109/AICT50176.2020.9368790","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368790","url":null,"abstract":"There are many vulnerabilities to attack in wireless sensor networks. Among them, the sybil attack is especially malicious to generate many false nodes and enter false information on the network. They are detrimental to many functions of the FSU, such as data pooling, fair distribution of resources, etc. Therefore, it is crucial to protect and detect Sybil attacks. The Sybil attack has a significant impact on network performance, and once it was detected, network performance will be obviously improving.In this article, we consider a new method of detecting Sybil attacks using random keys. In the proposed method, signs are used that there is a weak connection between the group of normal nodes and the group of false nodes. Experiment results show that the proposed method detects a false node with a probability of more than 90% with a small energy consumption.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132516621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Donabedian Approach for Simulation Modeling to Evaluate the Quality of Emergency Medical Services in a Large Metropolitan Area: A Case Study 基于Donabedian方法的大都市地区紧急医疗服务质量评估:一个案例研究
S. V. Begicheva
This study was carried out in order to develop a simulation model for a complex assessment of the quality of emergency medical services in a large metropolitan area. The study methods are based on the Donabedian model, a conceptual model that provides a framework for evaluating the quality of health care and emergency medical services. According to the Donabedian model, information about the quality of care can be drawn from three categories: the quality of structure, the quality of the process, and the quality of outcomes. The fourth category — environmental quality — is proposed to be added to the model in order to consider the specifics of emergency medical services in a large metropolitan area. The proposed conceptual model for the quality of emergency medical services defines the approach to emergency medical services modeling, i.e. creating a set of submodels that would allow assessing all the quality categories for emergency medical services. The paper includes a case study for such a model that combines methods from system dynamics and agent-based modeling. The study results can be used for health care institution modeling in order to lay down recommendations regarding how the health care institution management strategy can be improved.
本研究的目的是建立一个模拟模型,用于对大城市地区的紧急医疗服务质量进行复杂评估。研究方法基于Donabedian模型,这是一个概念模型,为评估卫生保健和紧急医疗服务的质量提供了框架。根据Donabedian模型,关于护理质量的信息可以从三个方面得出:结构质量、过程质量和结果质量。建议将第四类————环境质量————添加到模型中,以便考虑大城市地区紧急医疗服务的具体情况。提议的紧急医疗服务质量概念模型定义了紧急医疗服务建模的方法,即创建一组子模型,以便评估紧急医疗服务的所有质量类别。本文包括这样一个模型的案例研究,该模型结合了系统动力学和基于代理的建模方法。研究结果可用于医疗机构建模,为医疗机构管理策略的改进提供建议。
{"title":"Donabedian Approach for Simulation Modeling to Evaluate the Quality of Emergency Medical Services in a Large Metropolitan Area: A Case Study","authors":"S. V. Begicheva","doi":"10.1109/AICT50176.2020.9368653","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368653","url":null,"abstract":"This study was carried out in order to develop a simulation model for a complex assessment of the quality of emergency medical services in a large metropolitan area. The study methods are based on the Donabedian model, a conceptual model that provides a framework for evaluating the quality of health care and emergency medical services. According to the Donabedian model, information about the quality of care can be drawn from three categories: the quality of structure, the quality of the process, and the quality of outcomes. The fourth category — environmental quality — is proposed to be added to the model in order to consider the specifics of emergency medical services in a large metropolitan area. The proposed conceptual model for the quality of emergency medical services defines the approach to emergency medical services modeling, i.e. creating a set of submodels that would allow assessing all the quality categories for emergency medical services. The paper includes a case study for such a model that combines methods from system dynamics and agent-based modeling. The study results can be used for health care institution modeling in order to lay down recommendations regarding how the health care institution management strategy can be improved.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Business Projects in the Agent Model of the Russian Federation Spatial Development 俄罗斯联邦空间开发代理模型中的商业项目模拟
A. Mashkova, E. Novikova, O. Savina
In this paper we present the agent-based model of the Russian Federation spatial development as a tool for simulation of business projects in key industries and their impact on the regional economy. The model interface is used to define the region and industries for each project, as well as structure of its co-financing by organizations, federal and regional budget. Within the algorithm of the project realization the plan of investment supplies is determined, supplementary processes of the organization are simulated and reflected in the accounting. Within the computational experiment results of business projects realization in various regions were studied. The experimental program includes four regions from different federal districts. In each region, three key industries were selected according to perspective economic specializations defined in the Strategy of the Russian Federation spatial development. The results show significant increase in the output, property and equipment of the organizations, and also in employment and income of population in the selected regions.
在本文中,我们提出了基于主体的俄罗斯联邦空间发展模型,作为模拟关键行业商业项目及其对区域经济影响的工具。模型接口用于定义每个项目的地区和行业,以及由组织、联邦和地区预算共同资助的结构。在项目实现的算法中,确定了投资供给计划,模拟了组织的补充过程,并反映在会计中。在计算实验中,研究了不同地区商业项目实现的结果。实验项目包括来自不同联邦区的四个地区。在每个区域,根据俄罗斯联邦空间发展战略中确定的经济专业化角度,选择了三个重点产业。结果表明,这些组织的产出、财产和设备以及所选地区的就业和人口收入都有显著增加。
{"title":"Simulation of Business Projects in the Agent Model of the Russian Federation Spatial Development","authors":"A. Mashkova, E. Novikova, O. Savina","doi":"10.1109/AICT50176.2020.9368665","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368665","url":null,"abstract":"In this paper we present the agent-based model of the Russian Federation spatial development as a tool for simulation of business projects in key industries and their impact on the regional economy. The model interface is used to define the region and industries for each project, as well as structure of its co-financing by organizations, federal and regional budget. Within the algorithm of the project realization the plan of investment supplies is determined, supplementary processes of the organization are simulated and reflected in the accounting. Within the computational experiment results of business projects realization in various regions were studied. The experimental program includes four regions from different federal districts. In each region, three key industries were selected according to perspective economic specializations defined in the Strategy of the Russian Federation spatial development. The results show significant increase in the output, property and equipment of the organizations, and also in employment and income of population in the selected regions.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-level lecture video classification using text content 基于文本内容的多级讲座视频分类
Veysel Sercan Ağzıyağlı, H. Oğul
Recent interest in e-learning and distance education services has significantly increased the amount of lecture video data in public and institutional repositories. In their current forms, users can browse in these collections using meta-data-based search queries such as course name, description, instructor and syllabus. However, lecture video entries have rich contents, including image, text and speech, which can not be easily represented by meta-data annotations. Therefore, there is an emerging need to develop tools that will automatically annotate lecture videos to facilitate more targeted search. A simple way to realize this is to classify lectures into known categories. With this objective, this paper presents a method for classifying videos based on extracted text content in several semantic levels. The method is based on Bidirectional Long-Short Term Memory (Bi-LSTM) applied on word embedding vectors of text content extracted by Optical Character Recognition (OCR). This approach can outperform conventional machine learning models and provide a useful solution for automatic lecture video annotation to support online education.
最近对电子学习和远程教育服务的兴趣大大增加了公共和机构存储库中的讲座视频数据量。在当前的形式中,用户可以使用基于元数据的搜索查询来浏览这些集合,例如课程名称、描述、讲师和教学大纲。然而,讲座视频条目内容丰富,包括图像、文本和语音,不容易用元数据注释来表示。因此,有一个新兴的需要,开发工具,将自动注释讲座视频,以方便更有针对性的搜索。实现这一点的一个简单方法是将讲座分为已知的类别。为此,本文提出了一种基于提取文本内容在多个语义层次上对视频进行分类的方法。该方法将双向长短期记忆(Bi-LSTM)技术应用于光学字符识别(OCR)提取的文本内容的词嵌入向量。该方法优于传统的机器学习模型,为支持在线教育的讲座视频自动注释提供了一个有用的解决方案。
{"title":"Multi-level lecture video classification using text content","authors":"Veysel Sercan Ağzıyağlı, H. Oğul","doi":"10.1109/AICT50176.2020.9368692","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368692","url":null,"abstract":"Recent interest in e-learning and distance education services has significantly increased the amount of lecture video data in public and institutional repositories. In their current forms, users can browse in these collections using meta-data-based search queries such as course name, description, instructor and syllabus. However, lecture video entries have rich contents, including image, text and speech, which can not be easily represented by meta-data annotations. Therefore, there is an emerging need to develop tools that will automatically annotate lecture videos to facilitate more targeted search. A simple way to realize this is to classify lectures into known categories. With this objective, this paper presents a method for classifying videos based on extracted text content in several semantic levels. The method is based on Bidirectional Long-Short Term Memory (Bi-LSTM) applied on word embedding vectors of text content extracted by Optical Character Recognition (OCR). This approach can outperform conventional machine learning models and provide a useful solution for automatic lecture video annotation to support online education.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116802963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based open infrastructure for URL filtering in an Internet browser 基于区块链的开放基础设施,用于互联网浏览器中的URL过滤
Obadah Hammoud, I. Tarkhanov
this research is dedicated to the development of a prototype of open infrastructure for users’ internet traffic filtering on a browser level. We described the advantages of a distributed approach in comparison with current centralized solutions. Besides, we suggested a solution to define the optimum size for a URL storage block in Ethereum network. This solution may be used for the development of infrastructure of DApps applications on Ethereum network in future. The efficiency of the suggested approach is supported by several experiments.
本研究致力于开发一个开放的基础架构原型,用于在浏览器层面上对用户的互联网流量进行过滤。我们描述了分布式方法与当前集中式解决方案相比的优势。此外,我们还提出了一个解决方案来定义以太坊网络中URL存储块的最佳大小。该解决方案可用于未来以太坊网络上DApps应用基础设施的开发。实验结果证明了该方法的有效性。
{"title":"Blockchain-based open infrastructure for URL filtering in an Internet browser","authors":"Obadah Hammoud, I. Tarkhanov","doi":"10.1109/AICT50176.2020.9368678","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368678","url":null,"abstract":"this research is dedicated to the development of a prototype of open infrastructure for users’ internet traffic filtering on a browser level. We described the advantages of a distributed approach in comparison with current centralized solutions. Besides, we suggested a solution to define the optimum size for a URL storage block in Ethereum network. This solution may be used for the development of infrastructure of DApps applications on Ethereum network in future. The efficiency of the suggested approach is supported by several experiments.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114663966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of the N-gram Model for Azerbaijani Language 阿塞拜疆语N-gram模型的发展
Aliya Bannayeva, Mustafa Aslanov
This research focuses on a text prediction model for the Azerbaijani language. Parsed and cleaned Azerbaijani Wikipedia is used as corpus for the language model. In total, there are more than a million distinct words and sentences, and over seven hundred million characters.For the language model itself, a statistical model with n-grams is implemented. N-grams are contiguous sequences of n strings or characters from a given sample of text or speech. The Markov Chain is used as the model to predict the next word.The Markov Chain focuses on the probabilities of the sequence of words in the n-grams, rather than the probabilities of the entire corpus. This simplifies the task at hand and yields in less computational overhead, while still maintaining sensible results. Logically, the higher the N in the n-grams, the more sensible the resulting prediction.Concretely, bigrams, trigrams, quadgrams and fivegrams are implemented. For the evaluation of the model, intrinsic type of evaluation is used, which computes the perplexity rate.
本研究的重点是阿塞拜疆语的文本预测模型。解析和清理的阿塞拜疆语维基百科被用作语言模型的语料库。总共有100多万个不同的单词和句子,以及7亿多个字符。对于语言模型本身,实现了一个n-gram的统计模型。n -gram是来自给定文本或语音样本的n个字符串或字符的连续序列。使用马尔可夫链作为预测下一个单词的模型。马尔可夫链关注的是n-gram中单词序列的概率,而不是整个语料库的概率。这简化了手头的任务,产生了更少的计算开销,同时仍然保持了合理的结果。从逻辑上讲,N -gram中的N越高,得到的预测越合理。具体来说,是双、三、四、五。对于模型的评价,采用内禀式评价,计算困惑率。
{"title":"Development of the N-gram Model for Azerbaijani Language","authors":"Aliya Bannayeva, Mustafa Aslanov","doi":"10.1109/AICT50176.2020.9368645","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368645","url":null,"abstract":"This research focuses on a text prediction model for the Azerbaijani language. Parsed and cleaned Azerbaijani Wikipedia is used as corpus for the language model. In total, there are more than a million distinct words and sentences, and over seven hundred million characters.For the language model itself, a statistical model with n-grams is implemented. N-grams are contiguous sequences of n strings or characters from a given sample of text or speech. The Markov Chain is used as the model to predict the next word.The Markov Chain focuses on the probabilities of the sequence of words in the n-grams, rather than the probabilities of the entire corpus. This simplifies the task at hand and yields in less computational overhead, while still maintaining sensible results. Logically, the higher the N in the n-grams, the more sensible the resulting prediction.Concretely, bigrams, trigrams, quadgrams and fivegrams are implemented. For the evaluation of the model, intrinsic type of evaluation is used, which computes the perplexity rate.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QoS Analysis of the MANET routing protocols with Respect to Delay, Throughput, & Network load: Challenges and Open Issues 关于延迟、吞吐量和网络负载的MANET路由协议的QoS分析:挑战和开放问题
K. Nisar, Ibrahim A. Lawal, Usman Ismail Abdulmalik, A. Mu'azu, B. Chowdhry, Sohrab Khan, Shuaib K. Memon
Mobile Ad Hoc Networks (MANETs) are types of wireless networks that communicate with mobile devices without centralized infrastructures. MANET networks are established through interconnected devices that communicate wirelessly within a relatively small, shared area. In MANET every single mobile node is presumed to travel in all directions at different speeds with challenges and open issues. Hence there is no guaranteed long-term path from one node to the next. This work proposes testing the three most common ad hoc routing protocols Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Optimized Link State Routing Protocol (OLSR) using Optimized Network Engineering Tool (OPNET) Modeler simulations using the performance metrics of Throughput, Delay, and Network loading to find an effective routing protocol for routing. The traffic network is used by the File Transfer Protocol (FTP), Digital Education, Battlefield, Surveillance and Security Agencies may benefit from the research work. MANETs reduced the costs of installation, maintenance and operation of such facilities as base stations and also reduced the risk to a minimum such as pollution. The outcome of the simulation shows that: according to the AODV and DSR, the lowest delay in 50 nodes was around 31.25 seconds respectively. And OLSR also had a high throughput performance of around 80 per cent compared with AODV and DSR. And it can be concluded that OLSR is the most suitable routing protocol for MANET, based on the routing protocols suggested.
移动自组织网络(manet)是一种无需集中基础设施即可与移动设备通信的无线网络。MANET网络是通过在相对较小的共享区域内进行无线通信的互连设备建立的。在MANET中,假定每个单个移动节点以不同的速度向各个方向移动,并存在挑战和开放问题。因此,没有保证从一个节点到下一个节点的长期路径。这项工作提出测试三种最常见的自组织路由协议-自组织按需距离矢量(AODV),动态源路由(DSR)和优化链路状态路由协议(OLSR),使用优化网络工程工具(OPNET) Modeler模拟,使用吞吐量,延迟和网络负载的性能指标来找到有效的路由协议。该通信网用于文件传输协议(FTP)、数字教育、战场、监视和安全机构的研究工作可能会受益。无线网络减少了诸如基站等设施的安装、维护和操作费用,并将诸如污染等风险降低到最低限度。仿真结果表明:根据AODV和DSR, 50个节点的最低延迟分别为31.25秒左右。与AODV和DSR相比,OLSR也具有约80%的高通量性能。根据所提出的路由协议,可以得出OLSR是最适合MANET的路由协议。
{"title":"QoS Analysis of the MANET routing protocols with Respect to Delay, Throughput, & Network load: Challenges and Open Issues","authors":"K. Nisar, Ibrahim A. Lawal, Usman Ismail Abdulmalik, A. Mu'azu, B. Chowdhry, Sohrab Khan, Shuaib K. Memon","doi":"10.1109/AICT50176.2020.9368835","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368835","url":null,"abstract":"Mobile Ad Hoc Networks (MANETs) are types of wireless networks that communicate with mobile devices without centralized infrastructures. MANET networks are established through interconnected devices that communicate wirelessly within a relatively small, shared area. In MANET every single mobile node is presumed to travel in all directions at different speeds with challenges and open issues. Hence there is no guaranteed long-term path from one node to the next. This work proposes testing the three most common ad hoc routing protocols Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Optimized Link State Routing Protocol (OLSR) using Optimized Network Engineering Tool (OPNET) Modeler simulations using the performance metrics of Throughput, Delay, and Network loading to find an effective routing protocol for routing. The traffic network is used by the File Transfer Protocol (FTP), Digital Education, Battlefield, Surveillance and Security Agencies may benefit from the research work. MANETs reduced the costs of installation, maintenance and operation of such facilities as base stations and also reduced the risk to a minimum such as pollution. The outcome of the simulation shows that: according to the AODV and DSR, the lowest delay in 50 nodes was around 31.25 seconds respectively. And OLSR also had a high throughput performance of around 80 per cent compared with AODV and DSR. And it can be concluded that OLSR is the most suitable routing protocol for MANET, based on the routing protocols suggested.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128505672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hadith Authenticity Prediction using Sentiment Analysis and Machine Learning 基于情感分析和机器学习的圣训真实性预测
F. Haque, Anika Hossain Orthy, Shahnewaz Siddique
Starting around 815AD/200AH scholars have put immense effort towards gathering and sifting authentic hadiths, which are prophetic traditions of the Muslim community. The authenticity of a hadith solely depends on the reliability of its reporters and narrators. Till now scholars have had to do this task manually by precisely anatomizing each hadith’s chain of narrators or the list of people related to the transmission of a particular hadith. The evolution of modern computer science techniques has enabled new methods and introduced a potential paradigm shift in the science of hadith authentication. Focusing on the chain of narrators (also known as "Isnad") of a hadith, we have used a technique called ‘Sentiment Analysis’ from Natural Language Processing (NLP) to build a text classifier which tries to predict the authenticity of a hadith. It learns from our custom-made dataset of Isnads and predicts an unknown hadith to be either authentic or fabricated based upon its Isnad. Our classifier was 86% accurate when tested on the test hadith dataset.
从公元815年/公元200年左右开始,学者们投入了巨大的努力来收集和筛选真正的圣训,这是穆斯林社区的预言传统。圣训的真实性完全取决于它的记者和叙述者的可靠性。到目前为止,学者们不得不通过精确地解剖每个圣训的叙述者链或与特定圣训传播有关的人员名单来手工完成这项任务。现代计算机科学技术的发展使新方法成为可能,并在圣训认证科学中引入了潜在的范式转变。专注于圣训的叙述者链(也称为“Isnad”),我们使用了自然语言处理(NLP)中的“情感分析”技术来构建一个文本分类器,试图预测圣训的真实性。它从我们定制的Isnad数据集中学习,并根据Isnad预测未知的圣训是真实的还是捏造的。在测试hadith数据集上测试时,我们的分类器准确率为86%。
{"title":"Hadith Authenticity Prediction using Sentiment Analysis and Machine Learning","authors":"F. Haque, Anika Hossain Orthy, Shahnewaz Siddique","doi":"10.1109/AICT50176.2020.9368569","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368569","url":null,"abstract":"Starting around 815AD/200AH scholars have put immense effort towards gathering and sifting authentic hadiths, which are prophetic traditions of the Muslim community. The authenticity of a hadith solely depends on the reliability of its reporters and narrators. Till now scholars have had to do this task manually by precisely anatomizing each hadith’s chain of narrators or the list of people related to the transmission of a particular hadith. The evolution of modern computer science techniques has enabled new methods and introduced a potential paradigm shift in the science of hadith authentication. Focusing on the chain of narrators (also known as \"Isnad\") of a hadith, we have used a technique called ‘Sentiment Analysis’ from Natural Language Processing (NLP) to build a text classifier which tries to predict the authenticity of a hadith. It learns from our custom-made dataset of Isnads and predicts an unknown hadith to be either authentic or fabricated based upon its Isnad. Our classifier was 86% accurate when tested on the test hadith dataset.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mathematical models of optimal distribution of water in main channels 干渠水量优化分配的数学模型
S. Rakhimov, A. Seytov, N. Rakhimova, Bahrom Xonimqulov
Mathematical models of optimum water distribution in channels of irrigation systems under the conditions of discrete water supply to consumers have been developed. These include the models of direct wave, kinematical wave, convectional and diffusive model, as well as complete model of unsteady water flow in channel sections, and take into account all main hydraulic characteristics of the channel section.
建立了离散给水条件下灌溉系统渠道最佳配水量的数学模型。这些模型包括直达波模型、运动波模型、对流和扩散模型,以及完整的槽段非定常水流模型,并考虑了槽段的所有主要水力特性。
{"title":"Mathematical models of optimal distribution of water in main channels","authors":"S. Rakhimov, A. Seytov, N. Rakhimova, Bahrom Xonimqulov","doi":"10.1109/AICT50176.2020.9368798","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368798","url":null,"abstract":"Mathematical models of optimum water distribution in channels of irrigation systems under the conditions of discrete water supply to consumers have been developed. These include the models of direct wave, kinematical wave, convectional and diffusive model, as well as complete model of unsteady water flow in channel sections, and take into account all main hydraulic characteristics of the channel section.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1