首页 > 最新文献

Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

英文 中文
Comparative analysis of TCP congestion control mechanisms TCP拥塞控制机制的比较分析
Kaoutar Bazi, B. Nassereddine
TCP (Transmission Control Protocol) is the most used transport protocol for wired and wireless networks. It provides many services (reliability, end to end delivery ...) to the applications running over the Internet, but to be able to manage traffics with a huge quantity of data, TCP must have robust congestion control mechanisms. Many researchers have agreed that despite the existence of some congestion control algorithms, TCP still suffers from disappointing performances for short and long flows. For that, researches are still launched by the network community in order to have the suitable mechanism ensuring fair and efficient bandwidth allocation. The works already carried out in this subject has elaborated several congestion control mechanisms. In this paper, we discuss, identify, analyze and compare the behavior of some congestion control mechanisms under congested wireless mech networks, in order to identify their advantages and their respective limits. For the simulation, we used the well known network simulator ns2. Simulation results show that TCP Tahoe, TCP Reno, TCP New Reno, Sack are loss-based, they are beneficial for latency-sensitive flows, while TCP Vegas which is delay-based, it is recommended for applications that don't endure the loss of information but suffers from fairness problems when sharing a bottleneck with competitive flows.
TCP(传输控制协议)是有线和无线网络中最常用的传输协议。它为运行在Internet上的应用程序提供了许多服务(可靠性、端到端交付……),但是为了能够管理大量数据的流量,TCP必须具有健壮的拥塞控制机制。许多研究人员一致认为,尽管存在一些拥塞控制算法,但TCP在短流和长流方面的性能仍然令人失望。为此,网络学界仍在开展研究,以期有合适的机制保证公平高效的带宽分配。本课题已经开展的工作阐述了几种拥塞控制机制。在本文中,我们讨论,识别,分析和比较一些拥塞控制机制在拥塞无线机械网络下的行为,以确定它们的优势和各自的局限性。在模拟中,我们使用了著名的网络模拟器ns2。仿真结果表明,TCP Tahoe、TCP Reno、TCP New Reno、Sack是基于时延的,它们有利于延迟敏感的流,而TCP Vegas是基于时延的,适合于不存在信息丢失,但在与竞争流共享瓶颈时存在公平性问题的应用。
{"title":"Comparative analysis of TCP congestion control mechanisms","authors":"Kaoutar Bazi, B. Nassereddine","doi":"10.1145/3386723.3387832","DOIUrl":"https://doi.org/10.1145/3386723.3387832","url":null,"abstract":"TCP (Transmission Control Protocol) is the most used transport protocol for wired and wireless networks. It provides many services (reliability, end to end delivery ...) to the applications running over the Internet, but to be able to manage traffics with a huge quantity of data, TCP must have robust congestion control mechanisms. Many researchers have agreed that despite the existence of some congestion control algorithms, TCP still suffers from disappointing performances for short and long flows. For that, researches are still launched by the network community in order to have the suitable mechanism ensuring fair and efficient bandwidth allocation. The works already carried out in this subject has elaborated several congestion control mechanisms. In this paper, we discuss, identify, analyze and compare the behavior of some congestion control mechanisms under congested wireless mech networks, in order to identify their advantages and their respective limits. For the simulation, we used the well known network simulator ns2. Simulation results show that TCP Tahoe, TCP Reno, TCP New Reno, Sack are loss-based, they are beneficial for latency-sensitive flows, while TCP Vegas which is delay-based, it is recommended for applications that don't endure the loss of information but suffers from fairness problems when sharing a bottleneck with competitive flows.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129716606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AGEM-based Multipath Routing Protocol using Triangle Link Quality for Wireless Multimedia Sensor networks 基于agem的无线多媒体传感器网络三角形链路质量多径路由协议
Asma Chikh, M. Lehsaini
The features of multimedia contents impose additional requirements such as high bandwidth demand, more energy consumption and processing capabilities. Routing multimedia data in a resource constrained network is a challenge in Wireless multimedia Sensor networks (WMSNs), multipath routing technique is a relevant solution for transmitting multimedia data in wireless sensor networks to satisfy multimedia QoS requirements. This paper proposes an improved version of AGEM protocol based Triangle link quality metric (TLQM-AGEM) which finds multiple node-disjoint paths. This routing scheme selects forwarding node based on distance, a triangle link quality metric and remaining energy. Simulation results indicate that protocol optimizes overall performance and improves network lifetime as compared with state of the art GEAMS and AGEM schemes.
多媒体内容的特性对带宽、能耗和处理能力提出了额外的要求。多媒体数据在资源受限网络中的路由是无线多媒体传感器网络(wmsn)面临的一个挑战,多路径路由技术是在无线传感器网络中传输多媒体数据以满足多媒体QoS要求的一种相关解决方案。本文提出了一种基于三角链路质量度量(TLQM-AGEM)的AGEM协议的改进版本,它可以发现多个节点不相交的路径。该路由方案根据距离、三角形链路质量度量和剩余能量选择转发节点。仿真结果表明,与现有的GEAMS和AGEM方案相比,该协议优化了整体性能,提高了网络寿命。
{"title":"AGEM-based Multipath Routing Protocol using Triangle Link Quality for Wireless Multimedia Sensor networks","authors":"Asma Chikh, M. Lehsaini","doi":"10.1145/3386723.3387855","DOIUrl":"https://doi.org/10.1145/3386723.3387855","url":null,"abstract":"The features of multimedia contents impose additional requirements such as high bandwidth demand, more energy consumption and processing capabilities. Routing multimedia data in a resource constrained network is a challenge in Wireless multimedia Sensor networks (WMSNs), multipath routing technique is a relevant solution for transmitting multimedia data in wireless sensor networks to satisfy multimedia QoS requirements. This paper proposes an improved version of AGEM protocol based Triangle link quality metric (TLQM-AGEM) which finds multiple node-disjoint paths. This routing scheme selects forwarding node based on distance, a triangle link quality metric and remaining energy. Simulation results indicate that protocol optimizes overall performance and improves network lifetime as compared with state of the art GEAMS and AGEM schemes.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116570644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature Selection Methods in Sentiment Analysis: A Review 情感分析中的特征选择方法综述
Nurilhami Izzatie Khairi, A. Mohamed, N. Yusof
The development of digital tecnnologies nowadays assists people by suggesting opinion, choices, preferences and feelings. This opinion is useful for company's engagement to make certain analysis to know their potential users and personalized their need. However, the information needs extraction to make further analysis. Thus, sentiment analysis is used to extract opinion and others and transform it into meaningful data. During the process of analysis, feature selection method is required to select a subset which consists of relevant features to construct a predictive model. This process requires some conditions during the selection of feature subset. The required conditions for feature selection are that the selected feature subset must be small and relevant for a high dimensional dataset which considers the presence of noise plus there are no redundant features. However, some of the feature selection methods unable to fulfill all conditions. In this research, 40 papers were collected, classified and reviewed. We discussed on the feature selection methods in sentiment analysis based on its level of analysis and make comparison between these methods to know its limitation and advantages. The comparison made between methods are based on its accuracy and CPU performance. Finally, suggest the best/benchmark method for feature selection. The findings obtained from this research shows that hybrid methods obtain the best accuracy and CPU performance compared to the other methods.
如今,数字技术的发展通过提出意见、选择、偏好和感受来帮助人们。这一观点有助于公司的参与度进行一定的分析,了解他们的潜在用户并个性化他们的需求。但是,这些信息需要提取,以便进一步分析。因此,情感分析用于提取意见和其他并将其转换为有意义的数据。在分析过程中,特征选择方法需要选择一个由相关特征组成的子集来构建预测模型。这个过程在特征子集的选择过程中需要一些条件。特征选择的必要条件是所选择的特征子集必须小且与考虑噪声存在且没有冗余特征的高维数据集相关。然而,一些特征选择方法无法满足所有条件。在本研究中,收集、分类和评审了40篇论文。基于情感分析的分析层次,对情感分析中的特征选择方法进行了讨论,并对这些方法进行了比较,了解其局限性和优势。各种方法之间的比较主要基于其精度和CPU性能。最后,提出特征选择的最佳/基准方法。研究结果表明,与其他方法相比,混合方法获得了最好的精度和CPU性能。
{"title":"Feature Selection Methods in Sentiment Analysis: A Review","authors":"Nurilhami Izzatie Khairi, A. Mohamed, N. Yusof","doi":"10.1145/3386723.3387840","DOIUrl":"https://doi.org/10.1145/3386723.3387840","url":null,"abstract":"The development of digital tecnnologies nowadays assists people by suggesting opinion, choices, preferences and feelings. This opinion is useful for company's engagement to make certain analysis to know their potential users and personalized their need. However, the information needs extraction to make further analysis. Thus, sentiment analysis is used to extract opinion and others and transform it into meaningful data. During the process of analysis, feature selection method is required to select a subset which consists of relevant features to construct a predictive model. This process requires some conditions during the selection of feature subset. The required conditions for feature selection are that the selected feature subset must be small and relevant for a high dimensional dataset which considers the presence of noise plus there are no redundant features. However, some of the feature selection methods unable to fulfill all conditions. In this research, 40 papers were collected, classified and reviewed. We discussed on the feature selection methods in sentiment analysis based on its level of analysis and make comparison between these methods to know its limitation and advantages. The comparison made between methods are based on its accuracy and CPU performance. Finally, suggest the best/benchmark method for feature selection. The findings obtained from this research shows that hybrid methods obtain the best accuracy and CPU performance compared to the other methods.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122735356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Algorithm for Digital Image Watermarking using 2-Level DWT, DCT and QR Decomposition based on Optimal Blocks Selection 基于最优块选择的2级DWT、DCT和QR分解数字图像水印算法
M. Zairi, T. Boujiha, Ouelli Abdelhaq
Digital image Watermarking is a way to achieve information security. In this paper, we present an algorithm for digital image watermarking based on 2-level Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and QR decomposition. The watermark embedding process is performed on specific blocks of the host image according to its entropy values. The experimental results show that this algorithm has good features of imperceptibility and it is robust against different attacks.
数字图像水印是实现信息安全的一种手段。本文提出了一种基于2级离散小波变换(DWT)、离散余弦变换(DCT)和QR分解的数字图像水印算法。根据图像的熵值,在图像的特定块上进行水印嵌入。实验结果表明,该算法具有良好的不可感知性和抗各种攻击的鲁棒性。
{"title":"An Algorithm for Digital Image Watermarking using 2-Level DWT, DCT and QR Decomposition based on Optimal Blocks Selection","authors":"M. Zairi, T. Boujiha, Ouelli Abdelhaq","doi":"10.1145/3386723.3387863","DOIUrl":"https://doi.org/10.1145/3386723.3387863","url":null,"abstract":"Digital image Watermarking is a way to achieve information security. In this paper, we present an algorithm for digital image watermarking based on 2-level Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and QR decomposition. The watermark embedding process is performed on specific blocks of the host image according to its entropy values. The experimental results show that this algorithm has good features of imperceptibility and it is robust against different attacks.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LSTM-based Models for Earthquake Prediction 基于lstm的地震预测模型
Asmae Berhich, Fatima-Zahra Belouadha, M. Kabbaj
Over the last few years, many works have been done in earthquake prediction using different techniques and precursors in order to warn of earthquake damages and save human lives. Plenty of works have failed to sufficiently predict earthquakes, because of the complexity and the unpredictable nature of this task. Therefore, in this work we use the powerful deep learning technique. A useful algorithm that captures complex relationships in time series data. The technique is called long short-term memory (LSTM). The work employs this method in two cases of study; the first learns all the datasets in one model, the second case learns the correlations on two divided groups considering their range of magnitude. The results show that learning decomposed datasets gives more well-functioning predictions since it exploits the nature of each type of seismic events.
在过去的几年里,人们利用不同的技术和前兆进行了许多地震预报工作,以预警地震危害,拯救人类生命。由于这项工作的复杂性和不可预测性,许多工作都未能充分预测地震。因此,在这项工作中,我们使用了强大的深度学习技术。捕获时间序列数据中复杂关系的有用算法。这种技术被称为长短期记忆(LSTM)。这项工作在两个研究案例中采用了这种方法;第一种情况是学习一个模型中的所有数据集,第二种情况是学习考虑其幅度范围的两个划分组的相关性。结果表明,学习分解的数据集可以提供更有效的预测,因为它利用了每种地震事件的性质。
{"title":"LSTM-based Models for Earthquake Prediction","authors":"Asmae Berhich, Fatima-Zahra Belouadha, M. Kabbaj","doi":"10.1145/3386723.3387865","DOIUrl":"https://doi.org/10.1145/3386723.3387865","url":null,"abstract":"Over the last few years, many works have been done in earthquake prediction using different techniques and precursors in order to warn of earthquake damages and save human lives. Plenty of works have failed to sufficiently predict earthquakes, because of the complexity and the unpredictable nature of this task. Therefore, in this work we use the powerful deep learning technique. A useful algorithm that captures complex relationships in time series data. The technique is called long short-term memory (LSTM). The work employs this method in two cases of study; the first learns all the datasets in one model, the second case learns the correlations on two divided groups considering their range of magnitude. The results show that learning decomposed datasets gives more well-functioning predictions since it exploits the nature of each type of seismic events.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132780400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Speckled correlation fringes denoising and demodulation using directional total variation and ridgelet transform 基于方向全变分和脊波变换的相干条纹去噪与解调
Mustapha Bahich, Mohammed Bailich
One of the challenges in many industrial activities is to analyze the products and investigate their dimensional properties, such as deformations. The digital speckle pattern interferometry technique offers several solutions for the measurement of wide range of parameters (deformations, displacements...) with high accuracy. Generally, there is a correlation between these parameters and the phase of the noisy reflected intensity images (also called correlation fringe patterns or correlograms) of the tested products. Thus, getting access to these parameters requires a good estimation of the phase information. To extract this phase, we propose a ridgelet transform based algorithm for the fringes demodulation, after have been denoised by a new variant of total variation denoising method. These algorithms provide an automatic estimation of the phase feature with high accuracy. Because of such advantages, this method is particularly suitable for real time analyzing of dynamic events even in perturbative environments.
许多工业活动中的挑战之一是分析产品并研究它们的尺寸特性,例如变形。数字散斑干涉测量技术为高精度测量大范围参数(变形、位移等)提供了多种解决方案。通常,这些参数与被测产品的噪声反射强度图像(也称为相关条纹图案或相关图)的相位之间存在相关性。因此,要访问这些参数需要对相位信息进行良好的估计。为了提取这一相位,我们提出了一种基于脊波变换的条纹解调算法,该算法在用一种新的全变分去噪方法去噪后进行解调。这些算法提供了高精度的相位特征自动估计。由于这些优点,该方法特别适用于动态事件的实时分析,即使在摄动环境中也是如此。
{"title":"Speckled correlation fringes denoising and demodulation using directional total variation and ridgelet transform","authors":"Mustapha Bahich, Mohammed Bailich","doi":"10.1145/3386723.3387864","DOIUrl":"https://doi.org/10.1145/3386723.3387864","url":null,"abstract":"One of the challenges in many industrial activities is to analyze the products and investigate their dimensional properties, such as deformations. The digital speckle pattern interferometry technique offers several solutions for the measurement of wide range of parameters (deformations, displacements...) with high accuracy. Generally, there is a correlation between these parameters and the phase of the noisy reflected intensity images (also called correlation fringe patterns or correlograms) of the tested products. Thus, getting access to these parameters requires a good estimation of the phase information. To extract this phase, we propose a ridgelet transform based algorithm for the fringes demodulation, after have been denoised by a new variant of total variation denoising method. These algorithms provide an automatic estimation of the phase feature with high accuracy. Because of such advantages, this method is particularly suitable for real time analyzing of dynamic events even in perturbative environments.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Normality Test to Detect the Congestion in MANET by Using OLSR Protocol 使用OLSR协议检测MANET拥塞的正常性测试
A. Nabou, M. Laanaoui, M. Ouzzif, Mohammed-Alamine El Houssaini
Mobile Ad hoc Network (MANET) considers as simple network that use the wireless communication between difference wireless devices named as nodes. MANET has many challenges in its functions due to absence of fixed infrastructure and autoconfiguration. Optimized Link State Routing Protocol (OLSR) is proactive MANET routing protocol dedicated to the large network density. However it can be affected by the congestion that decrease its performance by losing packets, taking more delay to receive packets and also minimize the throughput of the protocol. In this paper, we propose new method reckons on Normality Test that applied in statistic domain to detect the congestion in OLSR protocol without any modification in the algorithm and without any other additional control messages. To detect the congestion in OLSR we use Shapiro_Wilk (W) method to analyze the results of Throughput following two scenarios that leads to the congestion.
移动自组织网络(MANET)是一种简单的网络,在不同的无线设备之间进行无线通信,这些设备被称为节点。由于缺乏固定的基础设施和自动配置,MANET在功能上面临许多挑战。OLSR (Optimized Link State Routing Protocol)是面向大网络密度的主动MANET路由协议。然而,它可能会受到拥塞的影响,它的性能会因为丢失数据包而降低,接收数据包的延迟更长,并且还会使协议的吞吐量最小化。本文提出了一种应用于统计域的基于正态性检验的方法来检测OLSR协议中的拥塞,而不需要对算法进行任何修改,也不需要增加任何控制消息。为了检测OLSR中的拥塞,我们使用Shapiro_Wilk (W)方法来分析导致拥塞的两种情况下的吞吐量结果。
{"title":"Normality Test to Detect the Congestion in MANET by Using OLSR Protocol","authors":"A. Nabou, M. Laanaoui, M. Ouzzif, Mohammed-Alamine El Houssaini","doi":"10.1145/3386723.3387836","DOIUrl":"https://doi.org/10.1145/3386723.3387836","url":null,"abstract":"Mobile Ad hoc Network (MANET) considers as simple network that use the wireless communication between difference wireless devices named as nodes. MANET has many challenges in its functions due to absence of fixed infrastructure and autoconfiguration. Optimized Link State Routing Protocol (OLSR) is proactive MANET routing protocol dedicated to the large network density. However it can be affected by the congestion that decrease its performance by losing packets, taking more delay to receive packets and also minimize the throughput of the protocol. In this paper, we propose new method reckons on Normality Test that applied in statistic domain to detect the congestion in OLSR protocol without any modification in the algorithm and without any other additional control messages. To detect the congestion in OLSR we use Shapiro_Wilk (W) method to analyze the results of Throughput following two scenarios that leads to the congestion.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128610861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its Improvement 从改进的影响和复杂性看人工神经网络在完备性预测中的贡献
Jaouad Maqboul, Bouchaib Bounabat Jaouad
The technological evolution and the immensity of the data produced, circulated into company makes these data, the real capital of the companies to the detriment of the customers. The erroneous data put the knockout to relationships with customers, the company must address this problem and identify the quality projects on which it must make an effort. In this article, we will present an approach based on qualitative and quantitative analysis to help the decision-makers to target data by its impacts and complexities of process improvement. The Qualitative study will be a survey and a quantitative to learn from survey data to decide the prediction and the completeness of data.
技术的发展和大量的数据产生,流通到公司,使得这些数据,公司的真正资本,损害了客户。错误的数据破坏了与客户的关系,公司必须解决这个问题,并确定它必须努力的高质量项目。在本文中,我们将介绍一种基于定性和定量分析的方法,以帮助决策者通过过程改进的影响和复杂性来确定目标数据。定性研究将是一个调查和定量研究,从调查数据中学习,以确定预测和数据的完整性。
{"title":"Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its Improvement","authors":"Jaouad Maqboul, Bouchaib Bounabat Jaouad","doi":"10.1145/3386723.3387850","DOIUrl":"https://doi.org/10.1145/3386723.3387850","url":null,"abstract":"The technological evolution and the immensity of the data produced, circulated into company makes these data, the real capital of the companies to the detriment of the customers. The erroneous data put the knockout to relationships with customers, the company must address this problem and identify the quality projects on which it must make an effort. In this article, we will present an approach based on qualitative and quantitative analysis to help the decision-makers to target data by its impacts and complexities of process improvement. The Qualitative study will be a survey and a quantitative to learn from survey data to decide the prediction and the completeness of data.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128963029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient Algorithm for medical image classification using Deep Convolutional Network: Case of Cancer Pathology 一种高效的基于深度卷积网络的医学图像分类算法:以癌症病理为例
Dahdouh Yousra, A. Boudhir, M. Ahmed
Automatic classification of medical images especially of tissue images is an important task in computer aided diagnosis (CAD) systems. Deep learning methods such as convolutional networks (ConvNets) outperform other state of-the-art methods in images classification tasks. This article describes an accurate and efficient algorithms for this challenging problem, and aims to present different convolutional neural networks to classify the tissue images. first, we built a model that consist of feature extraction and the classification with simple CNN, the second model consist of a CNN as feature extractor by removing the classification layers and using the activations of the last fully connected layer to train Random Forest, and the last one using transfer learning --Fine-Tuning-- pre-trained CNN "DenseNet201". Finally, we have evaluated our models using three metrics: accuracy, Precision and F1 Score.
医学图像尤其是组织图像的自动分类是计算机辅助诊断(CAD)系统中的一项重要任务。卷积网络(ConvNets)等深度学习方法在图像分类任务中优于其他最先进的方法。本文描述了一种准确有效的算法来解决这一具有挑战性的问题,并旨在提出不同的卷积神经网络来对组织图像进行分类。首先,我们用简单的CNN建立了一个由特征提取和分类组成的模型,第二个模型由CNN作为特征提取器组成,通过去除分类层并使用最后一个完全连接层的激活来训练随机森林,最后一个模型使用迁移学习-微调-预训练CNN“DenseNet201”。最后,我们使用三个指标来评估我们的模型:准确性、精度和F1分数。
{"title":"An efficient Algorithm for medical image classification using Deep Convolutional Network: Case of Cancer Pathology","authors":"Dahdouh Yousra, A. Boudhir, M. Ahmed","doi":"10.1145/3386723.3387896","DOIUrl":"https://doi.org/10.1145/3386723.3387896","url":null,"abstract":"Automatic classification of medical images especially of tissue images is an important task in computer aided diagnosis (CAD) systems. Deep learning methods such as convolutional networks (ConvNets) outperform other state of-the-art methods in images classification tasks. This article describes an accurate and efficient algorithms for this challenging problem, and aims to present different convolutional neural networks to classify the tissue images. first, we built a model that consist of feature extraction and the classification with simple CNN, the second model consist of a CNN as feature extractor by removing the classification layers and using the activations of the last fully connected layer to train Random Forest, and the last one using transfer learning --Fine-Tuning-- pre-trained CNN \"DenseNet201\". Finally, we have evaluated our models using three metrics: accuracy, Precision and F1 Score.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131129535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some Properties of Free Cyclic Codes over Finite Chain Rings 有限链环上自由循环码的一些性质
M. Sabiri, Youssef Bensalih, A. Elbour
Free codes are investigated. It is illustrated that every free cyclic has some important proprieties and the minimal distance of every code depends upon its associated direct component.
研究免费代码。说明了每一个自由循环都有一些重要的性质,每一个码的最小距离取决于它所关联的直接分量。
{"title":"Some Properties of Free Cyclic Codes over Finite Chain Rings","authors":"M. Sabiri, Youssef Bensalih, A. Elbour","doi":"10.1145/3386723.3387856","DOIUrl":"https://doi.org/10.1145/3386723.3387856","url":null,"abstract":"Free codes are investigated. It is illustrated that every free cyclic has some important proprieties and the minimal distance of every code depends upon its associated direct component.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128639869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 3rd International Conference on Networking, Information Systems & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1