首页 > 最新文献

2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
Development of the N-gram Model for Azerbaijani Language 阿塞拜疆语N-gram模型的发展
Aliya Bannayeva, Mustafa Aslanov
This research focuses on a text prediction model for the Azerbaijani language. Parsed and cleaned Azerbaijani Wikipedia is used as corpus for the language model. In total, there are more than a million distinct words and sentences, and over seven hundred million characters.For the language model itself, a statistical model with n-grams is implemented. N-grams are contiguous sequences of n strings or characters from a given sample of text or speech. The Markov Chain is used as the model to predict the next word.The Markov Chain focuses on the probabilities of the sequence of words in the n-grams, rather than the probabilities of the entire corpus. This simplifies the task at hand and yields in less computational overhead, while still maintaining sensible results. Logically, the higher the N in the n-grams, the more sensible the resulting prediction.Concretely, bigrams, trigrams, quadgrams and fivegrams are implemented. For the evaluation of the model, intrinsic type of evaluation is used, which computes the perplexity rate.
本研究的重点是阿塞拜疆语的文本预测模型。解析和清理的阿塞拜疆语维基百科被用作语言模型的语料库。总共有100多万个不同的单词和句子,以及7亿多个字符。对于语言模型本身,实现了一个n-gram的统计模型。n -gram是来自给定文本或语音样本的n个字符串或字符的连续序列。使用马尔可夫链作为预测下一个单词的模型。马尔可夫链关注的是n-gram中单词序列的概率,而不是整个语料库的概率。这简化了手头的任务,产生了更少的计算开销,同时仍然保持了合理的结果。从逻辑上讲,N -gram中的N越高,得到的预测越合理。具体来说,是双、三、四、五。对于模型的评价,采用内禀式评价,计算困惑率。
{"title":"Development of the N-gram Model for Azerbaijani Language","authors":"Aliya Bannayeva, Mustafa Aslanov","doi":"10.1109/AICT50176.2020.9368645","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368645","url":null,"abstract":"This research focuses on a text prediction model for the Azerbaijani language. Parsed and cleaned Azerbaijani Wikipedia is used as corpus for the language model. In total, there are more than a million distinct words and sentences, and over seven hundred million characters.For the language model itself, a statistical model with n-grams is implemented. N-grams are contiguous sequences of n strings or characters from a given sample of text or speech. The Markov Chain is used as the model to predict the next word.The Markov Chain focuses on the probabilities of the sequence of words in the n-grams, rather than the probabilities of the entire corpus. This simplifies the task at hand and yields in less computational overhead, while still maintaining sensible results. Logically, the higher the N in the n-grams, the more sensible the resulting prediction.Concretely, bigrams, trigrams, quadgrams and fivegrams are implemented. For the evaluation of the model, intrinsic type of evaluation is used, which computes the perplexity rate.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flying Ad hoc Network Expedited by DTN Scenario: Reliable and Cost-effective MAC Protocols Perspective 由DTN场景加速的飞行自组织网络:可靠和经济的MAC协议的观点
Sobiya Arsheen, A. Wahid, Khaleel Ahmad, Khujamatov Khalim
Flying Adhoc Network (FANET) is an emerging topic of research in the wireless network area, FANET has several common features with its predecessor e.g. Mobile Adhoc Network (MANET) and Vehicle Adhoc Network (VANET), but the network has several unique features also which make it different from other networks. The sparseness of nodes, coupled with frequent changing of topology significantly affects the data transmission rate of the network. To overcome this problem, FANET can be assisted with Delay Tolerant Network (DTN) approach to exploit its mobility and routing features. The main aim of this work is to make Flying Adhoc Network reliable by deploying two MAC protocols i.e. IEEE 802.11 and IEEE 802.15 and realize the functionality of Delay Tolerant Network (DTN) in a FANET.
飞行自组网(Flying Adhoc Network,简称FANET)是无线网络领域的一个新兴研究课题,它既有其前身移动自组网(MANET)和车载自组网(VANET)的一些共同特点,又有一些独特的特点,使其区别于其他网络。节点的稀疏性,加上拓扑结构的频繁变化,极大地影响了网络的数据传输速率。为了克服这一问题,可以利用容延迟网络(DTN)方法来辅助FANET,利用其移动性和路由特性。本工作的主要目的是通过部署IEEE 802.11和IEEE 802.15两种MAC协议,使飞行Adhoc网络可靠,并在FANET中实现延迟容忍网络(DTN)功能。
{"title":"Flying Ad hoc Network Expedited by DTN Scenario: Reliable and Cost-effective MAC Protocols Perspective","authors":"Sobiya Arsheen, A. Wahid, Khaleel Ahmad, Khujamatov Khalim","doi":"10.1109/AICT50176.2020.9368575","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368575","url":null,"abstract":"Flying Adhoc Network (FANET) is an emerging topic of research in the wireless network area, FANET has several common features with its predecessor e.g. Mobile Adhoc Network (MANET) and Vehicle Adhoc Network (VANET), but the network has several unique features also which make it different from other networks. The sparseness of nodes, coupled with frequent changing of topology significantly affects the data transmission rate of the network. To overcome this problem, FANET can be assisted with Delay Tolerant Network (DTN) approach to exploit its mobility and routing features. The main aim of this work is to make Flying Adhoc Network reliable by deploying two MAC protocols i.e. IEEE 802.11 and IEEE 802.15 and realize the functionality of Delay Tolerant Network (DTN) in a FANET.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Web-based Sound and Speech Training Software to Help Hearing-impaired People 帮助听障人士的基于网络的声音和语言训练软件
M. Farkhadov, N. Petukhova, Mukhabbat Farkhadova
This paper proposes a computerized audio simulator to teach how to correctly pronounce sounds, syllables, and words of the Russian language; the simulator is based on automatic speech recognition systems. The sound and speech simulator is designed to help hearing-impaired people to learn how to correctly pronounce sounds. If we deploy such a service on the Internet and provide high-speed online access to the service, we significantly increase the number of people who can learn how to pronounce sounds.
本文提出了一种计算机音频模拟器,用于教授俄语语音、音节和单词的正确发音;该模拟器基于自动语音识别系统。声音和语音模拟器是为了帮助听力受损的人学习如何正确发音而设计的。如果我们在互联网上部署这样的服务,并提供高速在线访问服务,我们将大大增加能够学习如何发音的人数。
{"title":"Web-based Sound and Speech Training Software to Help Hearing-impaired People","authors":"M. Farkhadov, N. Petukhova, Mukhabbat Farkhadova","doi":"10.1109/AICT50176.2020.9368675","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368675","url":null,"abstract":"This paper proposes a computerized audio simulator to teach how to correctly pronounce sounds, syllables, and words of the Russian language; the simulator is based on automatic speech recognition systems. The sound and speech simulator is designed to help hearing-impaired people to learn how to correctly pronounce sounds. If we deploy such a service on the Internet and provide high-speed online access to the service, we significantly increase the number of people who can learn how to pronounce sounds.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hadith Authenticity Prediction using Sentiment Analysis and Machine Learning 基于情感分析和机器学习的圣训真实性预测
F. Haque, Anika Hossain Orthy, Shahnewaz Siddique
Starting around 815AD/200AH scholars have put immense effort towards gathering and sifting authentic hadiths, which are prophetic traditions of the Muslim community. The authenticity of a hadith solely depends on the reliability of its reporters and narrators. Till now scholars have had to do this task manually by precisely anatomizing each hadith’s chain of narrators or the list of people related to the transmission of a particular hadith. The evolution of modern computer science techniques has enabled new methods and introduced a potential paradigm shift in the science of hadith authentication. Focusing on the chain of narrators (also known as "Isnad") of a hadith, we have used a technique called ‘Sentiment Analysis’ from Natural Language Processing (NLP) to build a text classifier which tries to predict the authenticity of a hadith. It learns from our custom-made dataset of Isnads and predicts an unknown hadith to be either authentic or fabricated based upon its Isnad. Our classifier was 86% accurate when tested on the test hadith dataset.
从公元815年/公元200年左右开始,学者们投入了巨大的努力来收集和筛选真正的圣训,这是穆斯林社区的预言传统。圣训的真实性完全取决于它的记者和叙述者的可靠性。到目前为止,学者们不得不通过精确地解剖每个圣训的叙述者链或与特定圣训传播有关的人员名单来手工完成这项任务。现代计算机科学技术的发展使新方法成为可能,并在圣训认证科学中引入了潜在的范式转变。专注于圣训的叙述者链(也称为“Isnad”),我们使用了自然语言处理(NLP)中的“情感分析”技术来构建一个文本分类器,试图预测圣训的真实性。它从我们定制的Isnad数据集中学习,并根据Isnad预测未知的圣训是真实的还是捏造的。在测试hadith数据集上测试时,我们的分类器准确率为86%。
{"title":"Hadith Authenticity Prediction using Sentiment Analysis and Machine Learning","authors":"F. Haque, Anika Hossain Orthy, Shahnewaz Siddique","doi":"10.1109/AICT50176.2020.9368569","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368569","url":null,"abstract":"Starting around 815AD/200AH scholars have put immense effort towards gathering and sifting authentic hadiths, which are prophetic traditions of the Muslim community. The authenticity of a hadith solely depends on the reliability of its reporters and narrators. Till now scholars have had to do this task manually by precisely anatomizing each hadith’s chain of narrators or the list of people related to the transmission of a particular hadith. The evolution of modern computer science techniques has enabled new methods and introduced a potential paradigm shift in the science of hadith authentication. Focusing on the chain of narrators (also known as \"Isnad\") of a hadith, we have used a technique called ‘Sentiment Analysis’ from Natural Language Processing (NLP) to build a text classifier which tries to predict the authenticity of a hadith. It learns from our custom-made dataset of Isnads and predicts an unknown hadith to be either authentic or fabricated based upon its Isnad. Our classifier was 86% accurate when tested on the test hadith dataset.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Experimental Design Approach to Analyse the Performance of Island-Based Parallel Artificial Bee Colony Algorithm 基于孤岛的并行人工蜂群算法性能分析的实验设计方法
Thaer Thaher, Badie Sartawi
The Artificial Bee Colony (ABC) is a novel nature-inspired metaheuristic optimization algorithm that mimics the behavior of honey bees searching for food sources. The main drawback of ABC, similar to the most of metaheuristics, is the premature convergence (i.e., the earlier stuck into local optima). Recently, the structured population approach, in which the individuals are distributed into multiple sub-populations (called islands), has been widely exploited to maintain the required diversity during the search process and thus reducing the prematurity problem. In this paper, the island model, which is a common structured population approach, is incorporated with the ABC to introduce a parallel variant called (iABC). Besides, an experimental design approach is proposed to analyze the sensitivity of iABC to the parameters of the island model as well as the main specific parameters. The linear regression model and the Analysis of variance (ANOVA) are utilized to estimate the effect of parameters and identify the importance of them. Two well-known benchmark functions are used for evaluation purposes. Experimental results revealed that most parameters and their low-order interactions have a significant influence on the performance of the iABC. Furthermore, the proposed iABC proved its superiority compared to other state-of-the-art algorithms.
人工蜂群(ABC)是一种新颖的自然启发的元启发式优化算法,它模仿蜜蜂寻找食物来源的行为。ABC的主要缺点,类似于大多数元启发式,是过早收敛(即,早期陷入局部最优)。近年来,将个体分布到多个亚种群(称为岛屿)中的结构化种群方法已被广泛用于在搜索过程中保持所需的多样性,从而减少早产问题。本文将海岛模型作为一种常见的结构化种群方法,与ABC相结合,引入了一种并行的变量(iABC)。此外,提出了一种实验设计方法来分析iABC对岛屿模型参数和主要具体参数的敏感性。利用线性回归模型和方差分析(ANOVA)来估计参数的影响和识别它们的重要性。两个众所周知的基准函数用于评估目的。实验结果表明,大多数参数及其低阶相互作用对iABC的性能有显著影响。此外,与其他最先进的算法相比,所提出的iABC证明了其优越性。
{"title":"An Experimental Design Approach to Analyse the Performance of Island-Based Parallel Artificial Bee Colony Algorithm","authors":"Thaer Thaher, Badie Sartawi","doi":"10.1109/AICT50176.2020.9368747","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368747","url":null,"abstract":"The Artificial Bee Colony (ABC) is a novel nature-inspired metaheuristic optimization algorithm that mimics the behavior of honey bees searching for food sources. The main drawback of ABC, similar to the most of metaheuristics, is the premature convergence (i.e., the earlier stuck into local optima). Recently, the structured population approach, in which the individuals are distributed into multiple sub-populations (called islands), has been widely exploited to maintain the required diversity during the search process and thus reducing the prematurity problem. In this paper, the island model, which is a common structured population approach, is incorporated with the ABC to introduce a parallel variant called (iABC). Besides, an experimental design approach is proposed to analyze the sensitivity of iABC to the parameters of the island model as well as the main specific parameters. The linear regression model and the Analysis of variance (ANOVA) are utilized to estimate the effect of parameters and identify the importance of them. Two well-known benchmark functions are used for evaluation purposes. Experimental results revealed that most parameters and their low-order interactions have a significant influence on the performance of the iABC. Furthermore, the proposed iABC proved its superiority compared to other state-of-the-art algorithms.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114779960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Threats Classification Method for the Transport Infrastructure of a Smart City 智慧城市交通基础设施威胁分类方法
K. Izrailov, A. Chechulin, L. Vitkova
The concept of a Smart City is the forefront in the development of our near future. One of the most important parts of such cities is the transport infrastructure. Threats implementation for such infrastructure can have critical consequences for a city. To prevent such threats in the future we should investigate and counteraction them in the present. The first step in this way can be the creation of a threats classification for the transport infrastructure of a Smart City. The paper describes a set of methods that can be used for this. As a result, a scheme for categorical and cluster classifications creation is proposed. The categorical classification relies on the division of categories for elements grouping. The cluster one uses machine learning methods for elements grouping. Examples of classifications applying for the top-10 threats from the official state database are given.
智慧城市的概念是我们不久的将来发展的前沿。这些城市最重要的部分之一是交通基础设施。此类基础设施的威胁实施可能对城市产生严重后果。为了防止将来出现这种威胁,我们现在就应该对它们进行调查和反击。以这种方式进行的第一步可以是为智慧城市的交通基础设施创建威胁分类。本文介绍了一套可用于此的方法。在此基础上,提出了一种分类和聚类分类创建方案。类别分类依赖于对元素分组的类别划分。集群一使用机器学习方法对元素进行分组。给出了应用于国家官方数据库的前10大威胁的分类示例。
{"title":"Threats Classification Method for the Transport Infrastructure of a Smart City","authors":"K. Izrailov, A. Chechulin, L. Vitkova","doi":"10.1109/AICT50176.2020.9368828","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368828","url":null,"abstract":"The concept of a Smart City is the forefront in the development of our near future. One of the most important parts of such cities is the transport infrastructure. Threats implementation for such infrastructure can have critical consequences for a city. To prevent such threats in the future we should investigate and counteraction them in the present. The first step in this way can be the creation of a threats classification for the transport infrastructure of a Smart City. The paper describes a set of methods that can be used for this. As a result, a scheme for categorical and cluster classifications creation is proposed. The categorical classification relies on the division of categories for elements grouping. The cluster one uses machine learning methods for elements grouping. Examples of classifications applying for the top-10 threats from the official state database are given.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement the schemes and models of detecting network traffic anomalies on computer systems 改进计算机系统网络流量异常检测的方案和模型
Yusupov Sabirjan Yusupdjanovich, Gulomov Sherzod Rajaboevich
This paper proposes an approach to the classification of network anomalies and provides a description of the relationship of anomalies classified due to the occurrence and nature of changes in network traffic. A scheme for detecting network anomalies and abuses based on network traffic indicators also models for identifying and detecting network anomalies are presented.
本文提出了一种网络异常分类的方法,描述了网络流量变化的发生和性质所分类的异常之间的关系。提出了一种基于网络流量指标的网络异常和滥用检测方案,以及识别和检测网络异常的模型。
{"title":"Improvement the schemes and models of detecting network traffic anomalies on computer systems","authors":"Yusupov Sabirjan Yusupdjanovich, Gulomov Sherzod Rajaboevich","doi":"10.1109/AICT50176.2020.9368781","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368781","url":null,"abstract":"This paper proposes an approach to the classification of network anomalies and provides a description of the relationship of anomalies classified due to the occurrence and nature of changes in network traffic. A scheme for detecting network anomalies and abuses based on network traffic indicators also models for identifying and detecting network anomalies are presented.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliable Priority Based QoS Real-Time Traffic Routing in VANET: Open Issues & Parameter VANET中基于可靠优先级的QoS实时流量路由:开放问题与参数
K. Nisar, A. Mu'azu, Ibrahim A. Lawal, Sohrab Khan, Shuaib K. Memon
It has proven that to provide priority to different traffic types in wireless vehicular networking (VANET) is attracting wide attention for guaranteeing high quality real-time traffic routing. Choosing a reliable and stable route with Quality of Service (QoS) constraints is always a challenging task because of the high mobility in VANET. This paper proposes an approach that prioritizes the transmission of traffic data packet according to the transmission distance and urgency metrics of messages before making a selection of routes. The approach utilizes a priority classifying a mechanism to differentiate traffic information into various priorities imposed in the VANET communications. The performance of the proposed approach was simulated extensively using NCTUns simulator in terms of throughput, packet loss and delay. The results obtained show efficient solutions on the impact of mobility for the prioritized flows in enhancing safety messaging. This approach makes safety messages to be transmitted with high reliability and low delay as compared to non-prioritized traffic flows.
实践证明,在无线车联网(VANET)中为不同的交通类型提供优先级是保证高质量实时交通路由的重要途径。由于VANET的高移动性,在服务质量(QoS)约束下选择可靠稳定的路由一直是一个具有挑战性的任务。本文提出了在选择路由之前,根据报文的传输距离和紧急度指标对流量数据包的传输进行优先级排序的方法。该方法利用优先级分类机制将交通信息区分为VANET通信中施加的各种优先级。利用NCTUns模拟器对该方法的吞吐量、丢包率和时延进行了仿真。得到的结果显示了在增强安全消息传递中对优先流的移动性影响的有效解决方案。与非优先级交通流相比,该方法使安全消息的传输具有高可靠性和低延迟。
{"title":"Reliable Priority Based QoS Real-Time Traffic Routing in VANET: Open Issues & Parameter","authors":"K. Nisar, A. Mu'azu, Ibrahim A. Lawal, Sohrab Khan, Shuaib K. Memon","doi":"10.1109/AICT50176.2020.9368689","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368689","url":null,"abstract":"It has proven that to provide priority to different traffic types in wireless vehicular networking (VANET) is attracting wide attention for guaranteeing high quality real-time traffic routing. Choosing a reliable and stable route with Quality of Service (QoS) constraints is always a challenging task because of the high mobility in VANET. This paper proposes an approach that prioritizes the transmission of traffic data packet according to the transmission distance and urgency metrics of messages before making a selection of routes. The approach utilizes a priority classifying a mechanism to differentiate traffic information into various priorities imposed in the VANET communications. The performance of the proposed approach was simulated extensively using NCTUns simulator in terms of throughput, packet loss and delay. The results obtained show efficient solutions on the impact of mobility for the prioritized flows in enhancing safety messaging. This approach makes safety messages to be transmitted with high reliability and low delay as compared to non-prioritized traffic flows.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Explained Artificial Intelligence Helps to Integrate Artificial and Human Intelligence Into Medical Diagnostic Systems: Analytical Review of Publications 解释人工智能有助于将人工智能和人类智能集成到医疗诊断系统中:出版物的分析评论
M. Farkhadov, Aleksander Eliseev, N. Petukhova
Artificial intelligence-based medical systems can by now diagnose various disorders highly accurately. However, we should stress that despite encouraging and ever improving results, people still distrust such systems. We review relevant publications over the past five years, to identify the main causes of such mistrust and ways to overcome it. Our study showes that the main reasons to distrust these systems are opaque models, blackbox algorithms, and potentially unrepresentful training samples. We demonstrate that explainable artificial intelligence, aimed to create more user-friendly and understandable systems, has become a noticeable new topic in theoretical research and practical development. Another notable trend is to develop approaches to build hybrid systems, where artificial and human intelligence interact according to the teamwork model.
目前,基于人工智能的医疗系统可以非常准确地诊断各种疾病。然而,我们应该强调的是,尽管令人鼓舞和不断改善的结果,人们仍然不信任这样的系统。我们审查了过去五年的有关出版物,以确定这种不信任的主要原因和克服这种不信任的方法。我们的研究表明,不信任这些系统的主要原因是不透明的模型、黑箱算法和潜在的不具代表性的训练样本。我们证明,可解释的人工智能,旨在创造更多的用户友好和可理解的系统,已经成为一个值得注意的理论研究和实践发展的新课题。另一个值得注意的趋势是开发构建混合系统的方法,其中人工智能和人类智能根据团队合作模型进行交互。
{"title":"Explained Artificial Intelligence Helps to Integrate Artificial and Human Intelligence Into Medical Diagnostic Systems: Analytical Review of Publications","authors":"M. Farkhadov, Aleksander Eliseev, N. Petukhova","doi":"10.1109/AICT50176.2020.9368576","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368576","url":null,"abstract":"Artificial intelligence-based medical systems can by now diagnose various disorders highly accurately. However, we should stress that despite encouraging and ever improving results, people still distrust such systems. We review relevant publications over the past five years, to identify the main causes of such mistrust and ways to overcome it. Our study showes that the main reasons to distrust these systems are opaque models, blackbox algorithms, and potentially unrepresentful training samples. We demonstrate that explainable artificial intelligence, aimed to create more user-friendly and understandable systems, has become a noticeable new topic in theoretical research and practical development. Another notable trend is to develop approaches to build hybrid systems, where artificial and human intelligence interact according to the teamwork model.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133692436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Secured Service Provisioning for the Internet of Healthcare Things 面向医疗物联网的安全服务配置
Fahiba Farhin, M. S. Kaiser, M. Mahmud
The Internet of Healthcare Things (IoHT) is an emerging intelligent pervasive framework that interconnects smart healthcare devices, stakeholders (e.g., doctors, patients, researchers, healthcare professionals, etc.), and infrastructure using smart sensors. Emergence of novel tools and techniques for data sensing and analysis during the last decade have allowed many researchers to develop and deliver services tailored for the IoHT. This resulted in a considerable number of research outcomes addressing the applications, challenges, and probable solutions targeting secured communication within the IoHT framework. Despite considerable efforts dedicated to it, secured service provisioning still remains as a major challenge. This work provides a detailed account on the current challenges and solutions towards providing secured service provisioning focusing on the IoHT attacks and countermeasures with an aim to facilitate more investigation in this area.
医疗物联网(IoHT)是一种新兴的智能普及框架,它将智能医疗设备、利益相关者(例如医生、患者、研究人员、医疗保健专业人员等)和使用智能传感器的基础设施相互连接。在过去的十年中,数据传感和分析的新工具和技术的出现,使许多研究人员能够开发和提供适合IoHT的服务。这导致了相当多的研究成果,解决了IoHT框架内安全通信的应用、挑战和可能的解决方案。尽管为此付出了相当大的努力,但安全服务供应仍然是一个主要挑战。这项工作详细介绍了当前的挑战和解决方案,以提供安全的服务供应,重点是物联网攻击和对策,旨在促进该领域的更多调查。
{"title":"Towards Secured Service Provisioning for the Internet of Healthcare Things","authors":"Fahiba Farhin, M. S. Kaiser, M. Mahmud","doi":"10.1109/AICT50176.2020.9368580","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368580","url":null,"abstract":"The Internet of Healthcare Things (IoHT) is an emerging intelligent pervasive framework that interconnects smart healthcare devices, stakeholders (e.g., doctors, patients, researchers, healthcare professionals, etc.), and infrastructure using smart sensors. Emergence of novel tools and techniques for data sensing and analysis during the last decade have allowed many researchers to develop and deliver services tailored for the IoHT. This resulted in a considerable number of research outcomes addressing the applications, challenges, and probable solutions targeting secured communication within the IoHT framework. Despite considerable efforts dedicated to it, secured service provisioning still remains as a major challenge. This work provides a detailed account on the current challenges and solutions towards providing secured service provisioning focusing on the IoHT attacks and countermeasures with an aim to facilitate more investigation in this area.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117314004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1