首页 > 最新文献

Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

英文 中文
Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security 基于同态加密的压缩感知和基于机器学习算法的WSN安全攻击分类
Samir Ifzarne, I. Hafidi, Nadia Idrissi
Data protection is essential for sensitive applications using Wireless Sensor Networks like health monitoring or video surveillance. WSN are deployed generally in harsh environment making them vulnerable for attacks thus it's important to secure data while being transferred from the sensor until the base station. This article is a proposal for a methodology which enable attack detection and classification on WSN. Compressive sensing is used to optimize the size of data exchange and hence optimize energy consumption. Homomorphic encryption allows to reduce encryption complexity by applying arithmetic operations on cypher text. Machine learning is applied to classify the attacks quickly.
数据保护对于使用无线传感器网络的敏感应用(如健康监测或视频监控)至关重要。无线传感器网络通常部署在恶劣的环境中,容易受到攻击,因此在从传感器传输到基站的过程中保护数据非常重要。本文提出了一种基于WSN的攻击检测与分类方法。压缩感知用于优化数据交换的大小,从而优化能耗。同态加密允许通过对密码文本应用算术运算来降低加密复杂度。利用机器学习对攻击进行快速分类。
{"title":"Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security","authors":"Samir Ifzarne, I. Hafidi, Nadia Idrissi","doi":"10.1145/3386723.3387859","DOIUrl":"https://doi.org/10.1145/3386723.3387859","url":null,"abstract":"Data protection is essential for sensitive applications using Wireless Sensor Networks like health monitoring or video surveillance. WSN are deployed generally in harsh environment making them vulnerable for attacks thus it's important to secure data while being transferred from the sensor until the base station. This article is a proposal for a methodology which enable attack detection and classification on WSN. Compressive sensing is used to optimize the size of data exchange and hence optimize energy consumption. Homomorphic encryption allows to reduce encryption complexity by applying arithmetic operations on cypher text. Machine learning is applied to classify the attacks quickly.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Distributed Information Retrieval Approach for Copyright Protection 版权保护的分布式信息检索方法
Sonia Benbelgacem, L. Guezouli, Rachid Seghir
Developments in telecommunications technology has opened up the possibility of circumventing intellectual property in the digital world, outside the legal and technical methods proposed for copyright protection, the information retrieval is considered as a computer field helping to protect these rights by proposing methods of search, analysis and comparison for protected documents. This article proposes an approach based on the distributed information retrieval allowing the detection of any unlawful manipulation for copyrighted works. In particular, we propose an architecture of a distributed information retrieval system on a peer-to-peer network as well as the specific architecture of its nodes, in addition, a double indexation (local & distributed) was proposed.
电讯技术的发展为在数字世界中规避知识产权提供了可能性。除了为保护版权而提出的法律和技术方法外,信息检索被认为是一个计算机领域,通过提出对受保护文件进行搜索、分析和比较的方法来帮助保护这些权利。本文提出了一种基于分布式信息检索的方法,允许对版权作品的非法操作进行检测。特别地,我们提出了一种基于点对点网络的分布式信息检索系统的体系结构及其节点的具体体系结构,并提出了双索引(本地和分布式)。
{"title":"A Distributed Information Retrieval Approach for Copyright Protection","authors":"Sonia Benbelgacem, L. Guezouli, Rachid Seghir","doi":"10.1145/3386723.3387882","DOIUrl":"https://doi.org/10.1145/3386723.3387882","url":null,"abstract":"Developments in telecommunications technology has opened up the possibility of circumventing intellectual property in the digital world, outside the legal and technical methods proposed for copyright protection, the information retrieval is considered as a computer field helping to protect these rights by proposing methods of search, analysis and comparison for protected documents. This article proposes an approach based on the distributed information retrieval allowing the detection of any unlawful manipulation for copyrighted works. In particular, we propose an architecture of a distributed information retrieval system on a peer-to-peer network as well as the specific architecture of its nodes, in addition, a double indexation (local & distributed) was proposed.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks 无线体域传感器网络中最小化路径损耗和提高电池寿命的传感器调换技术
R. A. Khan, S. Memon
There has been vast development leading to advanced systems like wireless communication and development of small sized devices and sensors which can perform several tasks simultaneously. These wireless sensors have provided a great potential towards a wearable technology, however; due to the small size of battery they have a limited power storage. There are vast applications of these sensors are in medical wireless sensor networks which are very critical. If the sensors not precisely positioned on the body of a patient, the communication between them may increase the power consumption of sensor nodes and diminish the life of battery. In this paper, a transposition technique for sensor position is being proposed by using Euclidean algorithm. In this technique, the sensor nodes may get placed in such a way that they have smaller distance to communicate with each other. This makes communication effective and increase battery life by reduction of path loss which occurs in wireless sensors communication.
无线通信等先进系统的发展以及可以同时执行多项任务的小型设备和传感器的发展取得了巨大的进展。然而,这些无线传感器为可穿戴技术提供了巨大的潜力;由于电池体积小,它们的电量存储有限。这些传感器有着广泛的应用,在医疗无线传感器网络中起着至关重要的作用。如果传感器没有精确地放置在患者身上,传感器之间的通信可能会增加传感器节点的功耗,降低电池的寿命。本文提出了一种基于欧几里得算法的传感器位置置换技术。在这种技术中,传感器节点可以以这样一种方式放置,使它们彼此之间的通信距离更小。这使得通信有效,并通过减少无线传感器通信中发生的路径损耗来增加电池寿命。
{"title":"Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks","authors":"R. A. Khan, S. Memon","doi":"10.1145/3386723.3387828","DOIUrl":"https://doi.org/10.1145/3386723.3387828","url":null,"abstract":"There has been vast development leading to advanced systems like wireless communication and development of small sized devices and sensors which can perform several tasks simultaneously. These wireless sensors have provided a great potential towards a wearable technology, however; due to the small size of battery they have a limited power storage. There are vast applications of these sensors are in medical wireless sensor networks which are very critical. If the sensors not precisely positioned on the body of a patient, the communication between them may increase the power consumption of sensor nodes and diminish the life of battery. In this paper, a transposition technique for sensor position is being proposed by using Euclidean algorithm. In this technique, the sensor nodes may get placed in such a way that they have smaller distance to communicate with each other. This makes communication effective and increase battery life by reduction of path loss which occurs in wireless sensors communication.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114617175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ankle gait-pattern generators 脚踝步态模式生成器
Mohamed Amine Mamou, N. Saadia
Different lower limbs robotic rehabilitation devices are under study to help patients to recover gestures altered, affected or lost after traffic accident injury, illness or disability. Especially ankle because is a complex part of the human skeleton. In this paper we present our contribution to the ankle foot robotic device. We will present our strategy to generate the setpoint trajectory for ankle devices that is based on neural networks. The latter will generate the trajectory of the ankle from the angular position sensors of the hip joint and the knee joint. This gave good results, but we noticed during the tests that the ankle trajectory contained sporadic peaks. This was the case of the right and left ankle. An optimization algorithm is developed to eliminate this phenomenon; it will be presented soon.
不同的下肢机器人康复设备正在研究中,以帮助患者恢复因交通事故受伤、疾病或残疾而改变、影响或失去的手势。尤其是脚踝,因为它是人体骨骼的一个复杂部分。在本文中,我们介绍了我们对踝关节足机器人装置的贡献。我们将介绍基于神经网络的策略来生成脚踝装置的设定点轨迹。后者将从髋关节和膝关节的角度位置传感器生成踝关节的运动轨迹。这是一个很好的结果,但是我们注意到在测试中脚踝的轨迹有零星的峰值。这是左右脚踝的情况。为了消除这种现象,提出了一种优化算法;它将很快呈现。
{"title":"Ankle gait-pattern generators","authors":"Mohamed Amine Mamou, N. Saadia","doi":"10.1145/3386723.3387833","DOIUrl":"https://doi.org/10.1145/3386723.3387833","url":null,"abstract":"Different lower limbs robotic rehabilitation devices are under study to help patients to recover gestures altered, affected or lost after traffic accident injury, illness or disability. Especially ankle because is a complex part of the human skeleton. In this paper we present our contribution to the ankle foot robotic device. We will present our strategy to generate the setpoint trajectory for ankle devices that is based on neural networks. The latter will generate the trajectory of the ankle from the angular position sensors of the hip joint and the knee joint. This gave good results, but we noticed during the tests that the ankle trajectory contained sporadic peaks. This was the case of the right and left ankle. An optimization algorithm is developed to eliminate this phenomenon; it will be presented soon.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sampling techniques for Arabic Sentiment Classification: A Comparative Study 阿拉伯语情感分类的抽样技术:比较研究
H. A. Addi, R. Ezzahir
Over the last decade, the web 2.0 has been shifting the web to turn it into an opinion platform. This results in a large amount of raw data that overwhelms human capacity to extract valuable knowledge without assistance of machines. In real world applications, sentiment analysis faces imbalanced data problem. To tackle this problem, sampling techniques have been proposed. In this paper, we focus on studying the performance of these techniques on Imbalanced Data of Arabic Sentiment. We then conduct a comparative evaluation using Support Vector Machine (SVM), Naive Bayes (NB), and Random Forest (RF) as classification algorithms.
在过去的十年里,web2.0已经把网络变成了一个意见平台。这导致了大量的原始数据,超出了人类在没有机器帮助的情况下提取有价值知识的能力。在实际应用中,情感分析面临着数据不平衡的问题。为了解决这个问题,人们提出了采样技术。在本文中,我们重点研究了这些技术在阿拉伯语情绪不平衡数据上的表现。然后,我们使用支持向量机(SVM)、朴素贝叶斯(NB)和随机森林(RF)作为分类算法进行比较评估。
{"title":"Sampling techniques for Arabic Sentiment Classification: A Comparative Study","authors":"H. A. Addi, R. Ezzahir","doi":"10.1145/3386723.3387899","DOIUrl":"https://doi.org/10.1145/3386723.3387899","url":null,"abstract":"Over the last decade, the web 2.0 has been shifting the web to turn it into an opinion platform. This results in a large amount of raw data that overwhelms human capacity to extract valuable knowledge without assistance of machines. In real world applications, sentiment analysis faces imbalanced data problem. To tackle this problem, sampling techniques have been proposed. In this paper, we focus on studying the performance of these techniques on Imbalanced Data of Arabic Sentiment. We then conduct a comparative evaluation using Support Vector Machine (SVM), Naive Bayes (NB), and Random Forest (RF) as classification algorithms.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web OAuth-based SSO Systems Security 基于Web oauth的SSO系统安全性
Yassine Sadqi, Yousra Belfaik, S. Safi
In the present digital world, users have to access multiple applications for carrying out their day-to-day business activities. As the amount of apps increase, the number of credentials (e.g. username/password) for each user increases and thereby the possibility of losing or forgetting them also increases. Single Sign-On (SSO) can be used to solve many problems related to web user authentication. OAuth-based SSO Systems are widely deployed by big tech companies such as Facebook and Google. In this paper we provide an in-depth review analysis of OAuth-based SSO systems security issues. In fact, previous efforts have been aimed either at finding errors in specific implementations, or at finding security problems within the specification itself. The main paper contribution is twofold: (1) describe in detail the OAuth 2.0 authorization flows and summarize the differences between the flows of each scenario that affect the security of the OAuth 2.0 protocol, and (2) examine the security problems related to the OAuth 2.0 specification and its implementation in the Web environment.
在当今的数字世界中,用户必须访问多个应用程序来进行日常业务活动。随着应用数量的增加,每个用户的凭据(例如用户名/密码)数量也会增加,因此丢失或忘记它们的可能性也会增加。单点登录(Single Sign-On, SSO)可以解决许多与web用户认证相关的问题。基于oauth的单点登录系统被Facebook和谷歌等大型科技公司广泛部署。在本文中,我们对基于oauth的SSO系统安全问题进行了深入的回顾分析。事实上,以前的工作的目的不是寻找特定实现中的错误,就是寻找规范本身中的安全问题。本文的主要贡献有两个方面:(1)详细描述了OAuth 2.0授权流程,并总结了影响OAuth 2.0协议安全性的每种场景的流程之间的差异;(2)研究了与OAuth 2.0规范及其在Web环境中的实现相关的安全问题。
{"title":"Web OAuth-based SSO Systems Security","authors":"Yassine Sadqi, Yousra Belfaik, S. Safi","doi":"10.1145/3386723.3387888","DOIUrl":"https://doi.org/10.1145/3386723.3387888","url":null,"abstract":"In the present digital world, users have to access multiple applications for carrying out their day-to-day business activities. As the amount of apps increase, the number of credentials (e.g. username/password) for each user increases and thereby the possibility of losing or forgetting them also increases. Single Sign-On (SSO) can be used to solve many problems related to web user authentication. OAuth-based SSO Systems are widely deployed by big tech companies such as Facebook and Google. In this paper we provide an in-depth review analysis of OAuth-based SSO systems security issues. In fact, previous efforts have been aimed either at finding errors in specific implementations, or at finding security problems within the specification itself. The main paper contribution is twofold: (1) describe in detail the OAuth 2.0 authorization flows and summarize the differences between the flows of each scenario that affect the security of the OAuth 2.0 protocol, and (2) examine the security problems related to the OAuth 2.0 specification and its implementation in the Web environment.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide 快速和有效的恶意图像分类器使用减少GIST特征为新的防御指南
B. Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, B. Mohammed
Malwares attacks are becoming increasingly destructive. Hackers target all types of devices from big to the most little ones. Researcher's communities in cybersecurity field are working hard to defend malwares attacks as well as any other malicious activity. In fact, the primary goal is to defend cyberattacks as fast as possible to avoid catastrophic damages. In this paper, we proposed new cybersecurity architecture specialized in malwares attacks defense. This proposal puts together four layers based on malwares behaviors. In addition, we perform malware classifier using malware visualization technique, GIST descriptor features and K-Nearest Neighbor algorithm. The classifier is able to put each input malware image into its corresponding family. Families distribution is been divided by malwares behaviors. For the purpose of attaining speedy malwares classifier, we use Univariate Feature Selection technique to reduce GIST feature. So we succeeded in getting from 320 to only 50 features in less timing with very close accuracy of 97,67%.
恶意软件攻击的破坏性越来越大。黑客的目标是所有类型的设备,从大型设备到最小的设备。网络安全领域的研究人员社区正在努力防御恶意软件攻击以及任何其他恶意活动。事实上,首要目标是尽快防御网络攻击,以避免灾难性的损失。在本文中,我们提出了一种新的网络安全架构,专门用于防御恶意软件攻击。该建议基于恶意软件行为将四个层放在一起。此外,我们还利用恶意软件可视化技术、GIST描述符特征和k -最近邻算法进行恶意软件分类。分类器能够将每个输入的恶意软件图像放入相应的族中。家庭分布按恶意行为划分。为了获得快速的恶意分类器,我们使用单变量特征选择技术来减少GIST特征。所以我们成功地从320到50个特征在更短的时间内准确度接近97,67%。
{"title":"Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide","authors":"B. Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, B. Mohammed","doi":"10.1145/3386723.3387839","DOIUrl":"https://doi.org/10.1145/3386723.3387839","url":null,"abstract":"Malwares attacks are becoming increasingly destructive. Hackers target all types of devices from big to the most little ones. Researcher's communities in cybersecurity field are working hard to defend malwares attacks as well as any other malicious activity. In fact, the primary goal is to defend cyberattacks as fast as possible to avoid catastrophic damages. In this paper, we proposed new cybersecurity architecture specialized in malwares attacks defense. This proposal puts together four layers based on malwares behaviors. In addition, we perform malware classifier using malware visualization technique, GIST descriptor features and K-Nearest Neighbor algorithm. The classifier is able to put each input malware image into its corresponding family. Families distribution is been divided by malwares behaviors. For the purpose of attaining speedy malwares classifier, we use Univariate Feature Selection technique to reduce GIST feature. So we succeeded in getting from 320 to only 50 features in less timing with very close accuracy of 97,67%.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity 用于智能医疗数据分析的雾计算:迫切需要
Hayat Khaloufi, Karim Abouelmehdi, A. B. Hssane
The advent of Internet of Things (IoT) technologies in the 21st century has led to exciting achievements. IoT smart medical devices along with wearables are generating and communicating high volume and high-velocity of heterogeneous data. Consequently, services provided by traditional methods such as cloud computing to manage these data become insufficient. Fog computing is seen as being the most effective solution for IoT-based healthcare. The stringy demand of this model was principally driven by a growing need for real-time analysis and low latency. It is apparently envisioned that the medicine field expects to draw enormous interest in combining IoT and fog computing. This in turn, improved the patient treatment, staff satisfaction, and operational efficiency and showed positive influence on all aspects of healthcare. This paper has reviewed fog computing in the context of medical IoT while comparing it with cloud computing and has attempted to present the three-layer architecture of fog-based healthcare system containing: edge, fog and cloud. It has also highlighted challenges facing IoT-driven healthcare in an ever-changing world.
21世纪物联网(IoT)技术的出现带来了令人兴奋的成就。物联网智能医疗设备和可穿戴设备正在产生和传输大量、高速的异构数据。因此,通过云计算等传统方法提供的管理这些数据的服务变得不足。雾计算被认为是基于物联网的医疗保健最有效的解决方案。该模型的需求主要是由对实时分析和低延迟的日益增长的需求所驱动的。显然,预计医疗领域将对物联网和雾计算的结合产生巨大的兴趣。这反过来又改善了患者治疗、员工满意度和运营效率,并对医疗保健的各个方面产生了积极影响。本文回顾了医疗物联网背景下的雾计算,并将其与云计算进行了比较,尝试提出了基于雾的医疗保健系统的三层架构:边缘、雾和云。它还强调了在不断变化的世界中物联网驱动的医疗保健面临的挑战。
{"title":"Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity","authors":"Hayat Khaloufi, Karim Abouelmehdi, A. B. Hssane","doi":"10.1145/3386723.3387861","DOIUrl":"https://doi.org/10.1145/3386723.3387861","url":null,"abstract":"The advent of Internet of Things (IoT) technologies in the 21st century has led to exciting achievements. IoT smart medical devices along with wearables are generating and communicating high volume and high-velocity of heterogeneous data. Consequently, services provided by traditional methods such as cloud computing to manage these data become insufficient. Fog computing is seen as being the most effective solution for IoT-based healthcare. The stringy demand of this model was principally driven by a growing need for real-time analysis and low latency. It is apparently envisioned that the medicine field expects to draw enormous interest in combining IoT and fog computing. This in turn, improved the patient treatment, staff satisfaction, and operational efficiency and showed positive influence on all aspects of healthcare. This paper has reviewed fog computing in the context of medical IoT while comparing it with cloud computing and has attempted to present the three-layer architecture of fog-based healthcare system containing: edge, fog and cloud. It has also highlighted challenges facing IoT-driven healthcare in an ever-changing world.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review 推荐系统在医学领域应用的最新趋势:系统综述
O. Stitini, S. Kaloun, O. Bencharef
Recommender systems use algorithms to provide users with product or service recommendations. In recent times, these systems have been using Artificial Intelligence algorithms. However, choosing a suitable AI algorithm for a recommender system is difficult because of the number of algorithms described in the literature. Researchers and practitioners developing recommender systems are left with little information about the current approaches in algorithm usage. Moreover, the development of recommender systems using AI algorithms often faces problems and raises questions that must be resolved. In this context developing recommender system in the medical domain are presented as complementary tools in decision-making processes in healthcare services, it allows to increase the usability of technologies and reduce information overload in processes. This paper presents a systematic review of the literature that analyze the use of AI algorithms in recommender system and identify new research opportunities. The goals of this study are to (i) identify latest trends in the use or research of AI algorithms in recommender system applied in the medical domain;(ii)identify open questions in the use or research of AI algorithms, and (iii)assist new researchers to position new research activity in this domain appropriately.
推荐系统使用算法向用户提供产品或服务推荐。最近,这些系统一直在使用人工智能算法。然而,由于文献中描述的算法数量众多,为推荐系统选择合适的AI算法是困难的。开发推荐系统的研究人员和实践者对算法使用的当前方法知之甚少。此外,使用人工智能算法开发推荐系统经常会遇到问题,并提出必须解决的问题。在这种情况下,在医疗领域开发推荐系统作为辅助工具,在医疗保健服务的决策过程中,它允许增加技术的可用性,并减少过程中的信息过载。本文对文献进行了系统回顾,分析了人工智能算法在推荐系统中的使用,并确定了新的研究机会。本研究的目标是(i)确定AI算法在医疗领域推荐系统中使用或研究的最新趋势;(ii)确定AI算法使用或研究中的开放性问题;(iii)协助新研究人员在该领域适当定位新的研究活动。
{"title":"Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review","authors":"O. Stitini, S. Kaloun, O. Bencharef","doi":"10.1145/3386723.3387860","DOIUrl":"https://doi.org/10.1145/3386723.3387860","url":null,"abstract":"Recommender systems use algorithms to provide users with product or service recommendations. In recent times, these systems have been using Artificial Intelligence algorithms. However, choosing a suitable AI algorithm for a recommender system is difficult because of the number of algorithms described in the literature. Researchers and practitioners developing recommender systems are left with little information about the current approaches in algorithm usage. Moreover, the development of recommender systems using AI algorithms often faces problems and raises questions that must be resolved. In this context developing recommender system in the medical domain are presented as complementary tools in decision-making processes in healthcare services, it allows to increase the usability of technologies and reduce information overload in processes. This paper presents a systematic review of the literature that analyze the use of AI algorithms in recommender system and identify new research opportunities. The goals of this study are to (i) identify latest trends in the use or research of AI algorithms in recommender system applied in the medical domain;(ii)identify open questions in the use or research of AI algorithms, and (iii)assist new researchers to position new research activity in this domain appropriately.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"19 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Approach of Constructing an Islamic Pattern Respecting the "HASBA" Method 尊重“HASBA”方法构建伊斯兰模式的途径
Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed
In this article, we put forth an approach to build a geometric Islamic pattern, according to a method called Hasba. This kind of geometric pattern is generally found in Moroccan geometric art, adopted by artisans; it is rather suitable for sculpture and painting on wood. It is based on geometric rules and the concept of symmetry. Here we describe step by step the basic approach to create a new model respecting certain rules of the "Hasba" method.
在本文中,我们提出了一种建立几何伊斯兰图案的方法,这种方法被称为Hasba。这种几何图案一般见于摩洛哥几何艺术中,为工匠所采用;它非常适合在木头上雕刻和绘画。它是基于几何规则和对称的概念。在这里,我们一步一步地描述创建一个尊重“Hasba”方法的某些规则的新模型的基本方法。
{"title":"Approach of Constructing an Islamic Pattern Respecting the \"HASBA\" Method","authors":"Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed","doi":"10.1145/3386723.3387872","DOIUrl":"https://doi.org/10.1145/3386723.3387872","url":null,"abstract":"In this article, we put forth an approach to build a geometric Islamic pattern, according to a method called Hasba. This kind of geometric pattern is generally found in Moroccan geometric art, adopted by artisans; it is rather suitable for sculpture and painting on wood. It is based on geometric rules and the concept of symmetry. Here we describe step by step the basic approach to create a new model respecting certain rules of the \"Hasba\" method.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 3rd International Conference on Networking, Information Systems & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1