首页 > 最新文献

The International Arab Journal of Information Technology最新文献

英文 中文
Persian Handwritten Digit Recognition Using Combination of Convolutional Neural Network and Support Vector Machine Methods 结合卷积神经网络和支持向量机方法的波斯语手写数字识别
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/16
M. Parseh, M. Rahmanimanesh, P. Keshavarzi
Persian handwritten digit recognition is one of the important topics of image processing which significantly considered by researchers due to its many applications. The most important challenges in Persian handwritten digit recognition is the existence of various patterns in Persian digit writing that makes the feature extraction step to be more complicated. Since the handcraft feature extraction methods are complicated processes and their performance level are not stable, most of the recent studies have concentrated on proposing a suitable method for automatic feature extraction. In this paper, an automatic method based on machine learning is proposed for high-level feature extraction from Persian digit images by using convolutional neural network (CNN). After that, a non-linear multi-class SVM classifier is used for data classification instead of fully connected layer in final layer of CNN. The proposed method has been applied to HODA dataset and obtained 99.56% of recognition rate. Experimental results are comparable with previous state-of-the-art methods.
波斯语手写体数字识别由于其广泛的应用,一直是图像处理领域备受研究者关注的重要课题之一。波斯语手写数字识别面临的最大挑战是,波斯语手写数字存在多种模式,使得特征提取步骤更加复杂。由于手工特征提取方法过程复杂,性能水平不稳定,近年来的研究大多集中在提出一种合适的自动特征提取方法上。本文提出了一种基于机器学习的卷积神经网络(CNN)波斯语数字图像高级特征自动提取方法。之后,在CNN的最后一层不再使用全连通层,而是使用非线性多类SVM分类器进行数据分类。将该方法应用于HODA数据集,识别率达到99.56%。实验结果与以往最先进的方法相当。
{"title":"Persian Handwritten Digit Recognition Using Combination of Convolutional Neural Network and Support Vector Machine Methods","authors":"M. Parseh, M. Rahmanimanesh, P. Keshavarzi","doi":"10.34028/iajit/17/4/16","DOIUrl":"https://doi.org/10.34028/iajit/17/4/16","url":null,"abstract":"Persian handwritten digit recognition is one of the important topics of image processing which significantly considered by researchers due to its many applications. The most important challenges in Persian handwritten digit recognition is the existence of various patterns in Persian digit writing that makes the feature extraction step to be more complicated. Since the handcraft feature extraction methods are complicated processes and their performance level are not stable, most of the recent studies have concentrated on proposing a suitable method for automatic feature extraction. In this paper, an automatic method based on machine learning is proposed for high-level feature extraction from Persian digit images by using convolutional neural network (CNN). After that, a non-linear multi-class SVM classifier is used for data classification instead of fully connected layer in final layer of CNN. The proposed method has been applied to HODA dataset and obtained 99.56% of recognition rate. Experimental results are comparable with previous state-of-the-art methods.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125789057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Intelligent Association Classification Technique for Phishing Website Detection 网络钓鱼网站检测的智能关联分类技术
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/7
Mustafa A. Al-Fayoumi, J. Alwidian, Mohammad Abusaif
Many critical applications need more accuracy and speed in the decision making process. Data mining scholars developed set of artificial automated tools to enhance the entire decisions based on type of application. Phishing is one of the most critical application needs for high accuracy and speed in decision making when a malicious webpage impersonates as legitimate webpage to acquire secret information from the user. In this paper, we proposed a new Association Classification (AC) algorithm as an artificial automated tool to increase the accuracy level of the classification process that aims to discover any malicious webpage. An Intelligent Association Classification (IAC) algorithm developed in this article by employing the Harmonic Mean measure instead of the support and confidence measure to solve the estimation problem in these measures and discovering hidden pattern not generated by the existing AC algorithms. Our algorithm compared with four well-known AC algorithm in terms of accuracy, F1, Precision, Recall and execution time. The experiments and the visualization process show that the IAC algorithm outperformed the others in all cases and emphasize on the importance of the general and specific rules in the classification process.
许多关键应用程序在决策过程中需要更高的准确性和速度。数据挖掘学者开发了一套人工自动化工具来增强基于应用类型的整体决策。当恶意网页冒充合法网页获取用户的机密信息时,网络钓鱼对决策的准确性和速度的要求是应用程序中最关键的要求之一。在本文中,我们提出了一种新的关联分类(AC)算法,作为一种人工自动化工具来提高分类过程的准确性,旨在发现任何恶意网页。本文提出了一种智能关联分类(IAC)算法,采用谐波均值测度代替支持度和置信度测度,解决了这些测度中的估计问题,并发现了现有AC算法无法生成的隐藏模式。我们的算法在准确率、F1、精密度、召回率和执行时间等方面与四种知名的AC算法进行了比较。实验和可视化过程表明,IAC算法在所有情况下都优于其他算法,并强调了分类过程中一般规则和特定规则的重要性。
{"title":"Intelligent Association Classification Technique for Phishing Website Detection","authors":"Mustafa A. Al-Fayoumi, J. Alwidian, Mohammad Abusaif","doi":"10.34028/iajit/17/4/7","DOIUrl":"https://doi.org/10.34028/iajit/17/4/7","url":null,"abstract":"Many critical applications need more accuracy and speed in the decision making process. Data mining scholars developed set of artificial automated tools to enhance the entire decisions based on type of application. Phishing is one of the most critical application needs for high accuracy and speed in decision making when a malicious webpage impersonates as legitimate webpage to acquire secret information from the user. In this paper, we proposed a new Association Classification (AC) algorithm as an artificial automated tool to increase the accuracy level of the classification process that aims to discover any malicious webpage. An Intelligent Association Classification (IAC) algorithm developed in this article by employing the Harmonic Mean measure instead of the support and confidence measure to solve the estimation problem in these measures and discovering hidden pattern not generated by the existing AC algorithms. Our algorithm compared with four well-known AC algorithm in terms of accuracy, F1, Precision, Recall and execution time. The experiments and the visualization process show that the IAC algorithm outperformed the others in all cases and emphasize on the importance of the general and specific rules in the classification process.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Design and Implementation of Inter-operable and Secure Agent Migration Protocol 可互操作的安全代理迁移协议的设计与实现
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/4
S. Shah, Jamil Ahmad, N. Rehman
Mobile agent technology is an active research topic and has found its uses in various diverse areas ranging from simple personal assistance to complex distributed big data systems. Its usage permits offline and autonomous execution as compared to classical distributed systems. The free roaming nature of agents makes it prone to several security threats during its transit state, with an added overhead in its interoperability among different types of platforms. To address these problems, both software and hardware based approaches have been proposed to ensure protection at various transit points. However, these approaches do not ensure interoperability and protection to agents during transit over a channel, simultaneously. In this regard, an agent requires a trustworthy, interoperable, and adaptive protocol for secure migration. In this paper, to answer these research issues, we first analyse security flaws in existing agent protection frameworks. Second, we implemented a novel migration architecture which is: (i) fully inter-operable compliance to the foundation for intelligent physical agents (FIPA) and (ii) trustworthy based on Computing Trusted Platform Module (TPM). The proposed approach is validated by testing on software TPM of IBM, JSR321, and jTPMTools as TPM and Trusted Computing Software Stack (TSS) interfaces, JADE-agent framework and JADE Inter-Platform Mobility Service (JIPMS). Validation is also performed on systems bearing physical TPM-chips. Moreover, some packages of JIPMS are also modified by embedding our proposed approach into their functions. Our performance results show that our approach merely adds an execution overhead during the binding and unbinding phases.
移动代理技术是一个活跃的研究课题,已经在从简单的个人协助到复杂的分布式大数据系统的各个不同领域得到了应用。与传统的分布式系统相比,它的使用允许离线和自主执行。代理的自由漫游特性使其在传输状态中容易受到几种安全威胁,并且在不同类型平台之间的互操作性方面增加了开销。为了解决这些问题,提出了基于软件和硬件的方法,以确保在各个过境点得到保护。然而,这些方法不能同时确保在通道上传输期间对代理的互操作性和保护。在这方面,代理需要可靠的、可互操作的和自适应的协议来实现安全迁移。在本文中,为了回答这些研究问题,我们首先分析了现有代理保护框架中的安全缺陷。其次,我们实现了一种新的迁移架构,它:(i)完全可互操作,符合智能物理代理(FIPA)的基础;(ii)基于计算可信平台模块(TPM)的可信赖性。通过在IBM的软件TPM、JSR321和jTPMTools作为TPM和可信计算软件栈(TSS)接口、JADE-agent框架和JADE跨平台移动服务(JIPMS)上进行测试,验证了该方法的有效性。验证也在承载物理tpm芯片的系统上执行。此外,还通过将本文提出的方法嵌入到一些JIPMS包的函数中来修改这些包。我们的性能结果表明,我们的方法只是在绑定和解除绑定阶段增加了执行开销。
{"title":"Design and Implementation of Inter-operable and Secure Agent Migration Protocol","authors":"S. Shah, Jamil Ahmad, N. Rehman","doi":"10.34028/iajit/17/4/4","DOIUrl":"https://doi.org/10.34028/iajit/17/4/4","url":null,"abstract":"Mobile agent technology is an active research topic and has found its uses in various diverse areas ranging from simple personal assistance to complex distributed big data systems. Its usage permits offline and autonomous execution as compared to classical distributed systems. The free roaming nature of agents makes it prone to several security threats during its transit state, with an added overhead in its interoperability among different types of platforms. To address these problems, both software and hardware based approaches have been proposed to ensure protection at various transit points. However, these approaches do not ensure interoperability and protection to agents during transit over a channel, simultaneously. In this regard, an agent requires a trustworthy, interoperable, and adaptive protocol for secure migration. In this paper, to answer these research issues, we first analyse security flaws in existing agent protection frameworks. Second, we implemented a novel migration architecture which is: (i) fully inter-operable compliance to the foundation for intelligent physical agents (FIPA) and (ii) trustworthy based on Computing Trusted Platform Module (TPM). The proposed approach is validated by testing on software TPM of IBM, JSR321, and jTPMTools as TPM and Trusted Computing Software Stack (TSS) interfaces, JADE-agent framework and JADE Inter-Platform Mobility Service (JIPMS). Validation is also performed on systems bearing physical TPM-chips. Moreover, some packages of JIPMS are also modified by embedding our proposed approach into their functions. Our performance results show that our approach merely adds an execution overhead during the binding and unbinding phases.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132143135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
3D Radon Transform for Shape Retrieval Using Bag-of-Visual-Features 基于视觉特征袋的三维Radon变换形状检索
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/5
Jinlin Ma, Ziping Ma
In order to improve the accuracy and efficiency of extracting features for 3D models retrieval, a novel approach using 3D radon transform and Bag-of-Visual-Features is proposed in this paper. Firstly the 3D radon transform is employed to obtain a view image using the different features in different angels. Then a set of local descriptor vectors are extracted by the SURF algorithm from the local features of the view. The similarity distance between geometrical transformed models is evaluated by using K-means algorithm to verify the geometric invariance of the proposed method. The numerical experiments are conducted to evaluate the retrieval efficiency compared to other typical methods. The experimental results show that the change of parameters has small effect on the retrieval performance of the proposed method
为了提高三维模型特征提取的精度和效率,提出了一种基于三维氡变换和视觉特征袋的三维模型特征提取方法。首先利用三维radon变换得到不同角度的不同特征的视图图像;然后利用SURF算法从视图的局部特征中提取一组局部描述子向量。利用K-means算法评估几何变换模型之间的相似距离,验证该方法的几何不变性。通过数值实验,比较了该方法与其他典型方法的检索效率。实验结果表明,参数的变化对该方法的检索性能影响较小
{"title":"3D Radon Transform for Shape Retrieval Using Bag-of-Visual-Features","authors":"Jinlin Ma, Ziping Ma","doi":"10.34028/iajit/17/4/5","DOIUrl":"https://doi.org/10.34028/iajit/17/4/5","url":null,"abstract":"In order to improve the accuracy and efficiency of extracting features for 3D models retrieval, a novel approach using 3D radon transform and Bag-of-Visual-Features is proposed in this paper. Firstly the 3D radon transform is employed to obtain a view image using the different features in different angels. Then a set of local descriptor vectors are extracted by the SURF algorithm from the local features of the view. The similarity distance between geometrical transformed models is evaluated by using K-means algorithm to verify the geometric invariance of the proposed method. The numerical experiments are conducted to evaluate the retrieval efficiency compared to other typical methods. The experimental results show that the change of parameters has small effect on the retrieval performance of the proposed method","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning 增强Bagging (eBagging):一种集成学习的新方法
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/10
Goksu Tuysuzoglu, Derya Birant
Bagging is one of the well-known ensemble learning methods, which combines several classifiers trained on different subsamples of the dataset. However, a drawback of bagging is its random selection, where the classification performance depends on chance to choose a suitable subset of training objects. This paper proposes a novel modified version of bagging, named enhanced Bagging (eBagging), which uses a new mechanism (error-based bootstrapping) when constructing training sets in order to cope with this problem. In the experimental setting, the proposed eBagging technique was tested on 33 well-known benchmark datasets and compared with both bagging, random forest and boosting techniques using well-known classification algorithms: Support Vector Machines (SVM), decision trees (C4.5), k-Nearest Neighbour (kNN) and Naive Bayes (NB). The results show that eBagging outperforms its counterparts by classifying the data points more accurately while reducing the training error.
Bagging是一种众所周知的集成学习方法,它结合了在数据集的不同子样本上训练的多个分类器。然而,bagging的一个缺点是它的随机选择,其中分类性能取决于选择合适的训练对象子集的机会。本文提出了一种改进的bagging算法,称为enhanced bagging (eBagging),它在构造训练集时使用了一种新的机制(基于错误的bootstrapping)来解决这个问题。在实验环境中,提出的eBagging技术在33个知名的基准数据集上进行了测试,并使用知名的分类算法(支持向量机(SVM)、决策树(C4.5)、k近邻(kNN)和朴素贝叶斯(NB))与bagging、随机森林和boosting技术进行了比较。结果表明,eBagging在减少训练误差的同时,对数据点的分类更加准确,优于同类方法。
{"title":"Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning","authors":"Goksu Tuysuzoglu, Derya Birant","doi":"10.34028/iajit/17/4/10","DOIUrl":"https://doi.org/10.34028/iajit/17/4/10","url":null,"abstract":"Bagging is one of the well-known ensemble learning methods, which combines several classifiers trained on different subsamples of the dataset. However, a drawback of bagging is its random selection, where the classification performance depends on chance to choose a suitable subset of training objects. This paper proposes a novel modified version of bagging, named enhanced Bagging (eBagging), which uses a new mechanism (error-based bootstrapping) when constructing training sets in order to cope with this problem. In the experimental setting, the proposed eBagging technique was tested on 33 well-known benchmark datasets and compared with both bagging, random forest and boosting techniques using well-known classification algorithms: Support Vector Machines (SVM), decision trees (C4.5), k-Nearest Neighbour (kNN) and Naive Bayes (NB). The results show that eBagging outperforms its counterparts by classifying the data points more accurately while reducing the training error.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Conceptual Persian Text Summarizer: A New Model in Continuous Vector Space 概念波斯语文本摘要器:连续向量空间中的新模型
Pub Date : 2020-07-01 DOI: 10.34028/IAJIT/17/4/11
M. Khademi, M. Fakhredanesh, S. Hoseini
Traditional methods of summarization are not cost-effective and possible today. Extractive summarization is a process that helps to extract the most important sentences from a text automatically, and generates a short informative summary. In this work, we propose a novel unsupervised method to summarize Persian texts. The proposed method adopt a hybrid approach that clusters the concepts of the text using deep learning and traditional statistical methods. First we produce a word embedding based on Hamshahri2 corpus and a dictionary of word frequencies. Then the proposed algorithm extracts the keywords of the document, clusters its concepts, and finally ranks the sentences to produce the summary. We evaluated the proposed method on Pasokh single-document corpus using the ROUGE evaluation measure. Without using any hand-crafted features, our proposed method achieves better results than the state-of-the-art related work results. We compared our unsupervised method with the best supervised Persian methods and we achieved an overall improvement of ROUGE-2 recall
传统的总结方法在今天已经不具有成本效益和可行性。摘要提取是指自动从文本中提取出最重要的句子,并生成简短的信息摘要的过程。在这项工作中,我们提出了一种新的无监督方法来总结波斯语文本。该方法采用了一种混合的方法,使用深度学习和传统的统计方法对文本的概念进行聚类。首先,我们基于Hamshahri2语料库和词频字典生成一个词嵌入。然后,该算法提取文档的关键词,对其概念进行聚类,最后对句子进行排序生成摘要。我们使用ROUGE评价度量对Pasokh单文档语料库进行评价。在不使用任何手工特征的情况下,我们提出的方法取得了比目前最先进的相关工作结果更好的结果。我们将我们的无监督方法与最好的监督波斯方法进行了比较,我们实现了ROUGE-2召回率的全面提高
{"title":"Conceptual Persian Text Summarizer: A New Model in Continuous Vector Space","authors":"M. Khademi, M. Fakhredanesh, S. Hoseini","doi":"10.34028/IAJIT/17/4/11","DOIUrl":"https://doi.org/10.34028/IAJIT/17/4/11","url":null,"abstract":"Traditional methods of summarization are not cost-effective and possible today. Extractive summarization is a process that helps to extract the most important sentences from a text automatically, and generates a short informative summary. In this work, we propose a novel unsupervised method to summarize Persian texts. The proposed method adopt a hybrid approach that clusters the concepts of the text using deep learning and traditional statistical methods. First we produce a word embedding based on Hamshahri2 corpus and a dictionary of word frequencies. Then the proposed algorithm extracts the keywords of the document, clusters its concepts, and finally ranks the sentences to produce the summary. We evaluated the proposed method on Pasokh single-document corpus using the ROUGE evaluation measure. Without using any hand-crafted features, our proposed method achieves better results than the state-of-the-art related work results. We compared our unsupervised method with the best supervised Persian methods and we achieved an overall improvement of ROUGE-2 recall","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128765967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Swarm Intelligence Approach to QRS Detection QRS检测的群体智能方法
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/6
M. Belkadi, A. Daamouche
The QRS detection is a crucial step in ECG signal analysis; it has a great impact on the beats segmentation and in the final classification of the ECG signal. The Pan-Tompkins is one of the first and best-performing algorithms for QRS detection. It performs filtering for noise suppression, differentiation for slope dominance, and thresholding for decision making. All of the parameters of the Pan-Tompkins algorithm are selected empirically. However, we think that the Pan-Tompkins method can achieve better performance if the parameters were optimized. Therefore, we propose an adaptive algorithm that looks for the best set of parameters that improves the Pan-Tompkins algorithm performance. For this purpose, we formulate the parameter design as an optimization problem within a particle swarm optimization framework. Experiments conducted on the 24 hours recording of the MIT/BIH arrhythmia benchmark dataset achieved an overall accuracy of 99.83% which outperforms the stateof-the-art time-domain algorithms.
QRS检测是心电信号分析的关键步骤;它对心电信号的心跳分割和最终的分类有很大的影响。Pan-Tompkins是QRS检测中最早也是性能最好的算法之一。它对噪声抑制进行滤波,对斜率优势进行微分,对决策进行阈值设置。Pan-Tompkins算法的所有参数都是经验选择的。然而,我们认为如果对参数进行优化,Pan-Tompkins方法可以获得更好的性能。因此,我们提出了一种自适应算法,该算法寻找最佳参数集,以提高Pan-Tompkins算法的性能。为此,我们将参数设计表述为粒子群优化框架中的优化问题。在MIT/BIH心律失常基准数据集的24小时记录上进行的实验实现了99.83%的总体准确率,优于最先进的时域算法。
{"title":"Swarm Intelligence Approach to QRS Detection","authors":"M. Belkadi, A. Daamouche","doi":"10.34028/iajit/17/4/6","DOIUrl":"https://doi.org/10.34028/iajit/17/4/6","url":null,"abstract":"The QRS detection is a crucial step in ECG signal analysis; it has a great impact on the beats segmentation and in the final classification of the ECG signal. The Pan-Tompkins is one of the first and best-performing algorithms for QRS detection. It performs filtering for noise suppression, differentiation for slope dominance, and thresholding for decision making. All of the parameters of the Pan-Tompkins algorithm are selected empirically. However, we think that the Pan-Tompkins method can achieve better performance if the parameters were optimized. Therefore, we propose an adaptive algorithm that looks for the best set of parameters that improves the Pan-Tompkins algorithm performance. For this purpose, we formulate the parameter design as an optimization problem within a particle swarm optimization framework. Experiments conducted on the 24 hours recording of the MIT/BIH arrhythmia benchmark dataset achieved an overall accuracy of 99.83% which outperforms the stateof-the-art time-domain algorithms.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration 基于多用户协作的移动服务数据聚合框架
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/3
Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu
Considering the untrusted server, differential privacy and local differential privacy has been used for privacy-preserving in data aggregation. Through our analysis, differential privacy and local differential privacy cannot achieve Nash equilibrium between privacy and utility for mobile service based multiuser collaboration, which is multiuser negotiating a desired privacy budget in a collaborative manner for privacy-preserving. To this end, we proposed a Privacy-Preserving Data Aggregation Framework (PPDAF) that reached Nash equilibrium between privacy and utility. Firstly, we presented an adaptive Gaussian mechanism satisfying Nash equilibrium between privacy and utility by multiplying expected utility factor with conditional filtering noise under expected privacy budget. Secondly, we constructed PPDAF using adaptive Gaussian mechanism based on negotiating privacy budget with heuristic obfuscation. Finally, our theoretical analysis and experimental evaluation showed that the PPDAF could achieve Nash equilibrium between privacy and utility. Furthermore, this framework can be extended to engineering instances in a data aggregation setting
考虑到不可信服务器,采用差分隐私和本地差分隐私进行数据聚合中的隐私保护。通过我们的分析,差分隐私和局部差分隐私在基于移动服务的多用户协作中不能实现隐私和效用的纳什均衡,即多用户以协作的方式协商期望的隐私预算以保护隐私。为此,我们提出了一种隐私保护数据聚合框架(PPDAF),该框架在隐私和效用之间达到纳什均衡。首先,在期望隐私预算下,将期望效用因子与条件滤波噪声相乘,提出了一种满足隐私与效用纳什均衡的自适应高斯机制;其次,基于启发式混淆协商隐私预算的自适应高斯机制构建了PPDAF;最后,理论分析和实验评价表明,PPDAF能够实现隐私与效用的纳什均衡。此外,该框架可以扩展到数据聚合设置中的工程实例
{"title":"Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration","authors":"Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu","doi":"10.34028/iajit/17/4/3","DOIUrl":"https://doi.org/10.34028/iajit/17/4/3","url":null,"abstract":"Considering the untrusted server, differential privacy and local differential privacy has been used for privacy-preserving in data aggregation. Through our analysis, differential privacy and local differential privacy cannot achieve Nash equilibrium between privacy and utility for mobile service based multiuser collaboration, which is multiuser negotiating a desired privacy budget in a collaborative manner for privacy-preserving. To this end, we proposed a Privacy-Preserving Data Aggregation Framework (PPDAF) that reached Nash equilibrium between privacy and utility. Firstly, we presented an adaptive Gaussian mechanism satisfying Nash equilibrium between privacy and utility by multiplying expected utility factor with conditional filtering noise under expected privacy budget. Secondly, we constructed PPDAF using adaptive Gaussian mechanism based on negotiating privacy budget with heuristic obfuscation. Finally, our theoretical analysis and experimental evaluation showed that the PPDAF could achieve Nash equilibrium between privacy and utility. Furthermore, this framework can be extended to engineering instances in a data aggregation setting","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128156331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Framework for Modelling Data Warehouse Systems Using UML Profile 使用UML概要文件对数据仓库系统建模的改进框架
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/15
M. Babar, Akmal Saeed Khattak, F. Arif, M. Tariq
Data Warehouse (DW) applications provide past detail for judgment process for the companies. It is acknowledged that these systems depend on Multidimensional (MD) modelling different from traditional database modelling. MD modelling keeps data in the form of facts and dimensions. Some proposals have been presented to achieve the modelling of these systems, but none of them covers the MD modelling completely. There is no any approach which considers all the major components of MD systems. Some proposals provide their proprietary visual notations, which force the architects to gain knowledge of new precise model. This paper describes a framework which is in the form of an extension to Unified Modelling Language (UML). UML is worldwide known to design a variety of perspectives of software systems. Therefore, any method using the UML reduces the endeavour of designers in understanding the novel notations. Another exceptional characteristic of the UML is that it can be extended to bring in novel elements for different domains. In addition, the proposed UML profile focuses on the accurate representations of the properties of the MD systems based on domain specific information. The proposed framework is validated using a specific case study. Moreover, an evaluation and comparative analysis of the proposed framework is also provided to show the efficiency of the proposed work.
数据仓库(DW)应用程序为公司的判断过程提供了过去的细节。与传统的数据库建模不同,这些系统依赖于多维建模。MD建模以事实和维度的形式保存数据。已经提出了一些建议来实现这些系统的建模,但没有一个完全涵盖了MD建模。没有任何方法可以考虑MD系统的所有主要组成部分。一些建议提供了他们专有的可视化符号,这迫使架构师获得新的精确模型的知识。本文描述了一个统一建模语言(UML)扩展形式的框架。UML以设计软件系统的各种透视图而闻名于世。因此,任何使用UML的方法都减少了设计者理解新符号的努力。UML的另一个特殊特征是,它可以被扩展为为不同的领域引入新的元素。此外,建议的UML概要文件关注于基于领域特定信息的MD系统属性的准确表示。使用一个具体的案例研究验证了所建议的框架。此外,还对所建议的框架进行了评价和比较分析,以表明所建议的工作的效率。
{"title":"An Improved Framework for Modelling Data Warehouse Systems Using UML Profile","authors":"M. Babar, Akmal Saeed Khattak, F. Arif, M. Tariq","doi":"10.34028/iajit/17/4/15","DOIUrl":"https://doi.org/10.34028/iajit/17/4/15","url":null,"abstract":"Data Warehouse (DW) applications provide past detail for judgment process for the companies. It is acknowledged that these systems depend on Multidimensional (MD) modelling different from traditional database modelling. MD modelling keeps data in the form of facts and dimensions. Some proposals have been presented to achieve the modelling of these systems, but none of them covers the MD modelling completely. There is no any approach which considers all the major components of MD systems. Some proposals provide their proprietary visual notations, which force the architects to gain knowledge of new precise model. This paper describes a framework which is in the form of an extension to Unified Modelling Language (UML). UML is worldwide known to design a variety of perspectives of software systems. Therefore, any method using the UML reduces the endeavour of designers in understanding the novel notations. Another exceptional characteristic of the UML is that it can be extended to bring in novel elements for different domains. In addition, the proposed UML profile focuses on the accurate representations of the properties of the MD systems based on domain specific information. The proposed framework is validated using a specific case study. Moreover, an evaluation and comparative analysis of the proposed framework is also provided to show the efficiency of the proposed work.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117071491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finger Knuckle Print Recognition using MMDA with Fuzzy Vault 基于模糊Vault的MMDA指关节指纹识别
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/14
MuthuKumar Arunachalamand, Kavipriya Amuthan
Currently frequent biometric scientific research such as with biometric applications like face, iris, voice, hand-based biometrics traits like palm print and fingerprint technique are utilized for spotting out the persons. These specific biometrics habits have their own improvement and weakness so that no particular biometrics can adequately opt for all terms like the accuracy and cost of all applications. In recent times, in addition, to distinct with the hand-based biometrics technique, Finger Knuckle Print (FKP) has been appealed to boom the attention among biometric researchers. The image template pattern formation of FKP embraces the report that is suitable for spotting the uniqueness of individuality. This FKP trait observes a person based on the knuckle print and the framework in the outer finger surface. This FKP feature determines the line anatomy and finger structures which are well established and persistent throughout the life of an individual. In this paper, a novel method for personal identification will be introduced, along with that data to be stored in a secure way has also been proposed. The authentication process includes the transformation of features using 2D Log Gabor filter and Eigen value representation of Multi-Manifold Discriminant Analysis (MMDA) of FKP. Finally, these features are grouped using k-means clustering for both identification and verification process. This proposed system is initialized based on the FKP framework without a template based on the fuzzy vault. The key idea of fuzzy vault storing is utilized to safeguard the secret key in the existence of random numbers as chaff pints.
目前频繁的生物识别科学研究,如面部、虹膜、声音等生物识别应用,以及基于手的生物识别特征,如掌纹和指纹技术,被用来识别人。这些特定的生物识别习惯有其自身的改进和弱点,因此没有特定的生物识别技术可以充分选择所有应用程序的准确性和成本等所有方面。近年来,手指指关节指纹(FKP)作为一种不同于基于手的生物识别技术,受到了生物识别研究人员的广泛关注。FKP的图像模板模式形成包含了适合发现个性独特性的报告。这种FKP特征是根据指关节印和外指表面的框架来观察一个人的。这种FKP特征决定了线条解剖结构和手指结构,这些结构在个体的一生中都很好地建立和持续。本文将介绍一种新的个人身份识别方法,并提出了一种安全存储数据的方法。该认证过程包括利用二维Log Gabor滤波器对特征进行变换和利用多流形判别分析(MMDA)的特征值表示。最后,使用k-means聚类对这些特征进行分组,以进行识别和验证过程。该系统是基于FKP框架初始化的,没有基于模糊vault的模板。利用模糊保险库存储密钥的思想,在存在随机数的情况下保护密钥。
{"title":"Finger Knuckle Print Recognition using MMDA with Fuzzy Vault","authors":"MuthuKumar Arunachalamand, Kavipriya Amuthan","doi":"10.34028/iajit/17/4/14","DOIUrl":"https://doi.org/10.34028/iajit/17/4/14","url":null,"abstract":"Currently frequent biometric scientific research such as with biometric applications like face, iris, voice, hand-based biometrics traits like palm print and fingerprint technique are utilized for spotting out the persons. These specific biometrics habits have their own improvement and weakness so that no particular biometrics can adequately opt for all terms like the accuracy and cost of all applications. In recent times, in addition, to distinct with the hand-based biometrics technique, Finger Knuckle Print (FKP) has been appealed to boom the attention among biometric researchers. The image template pattern formation of FKP embraces the report that is suitable for spotting the uniqueness of individuality. This FKP trait observes a person based on the knuckle print and the framework in the outer finger surface. This FKP feature determines the line anatomy and finger structures which are well established and persistent throughout the life of an individual. In this paper, a novel method for personal identification will be introduced, along with that data to be stored in a secure way has also been proposed. The authentication process includes the transformation of features using 2D Log Gabor filter and Eigen value representation of Multi-Manifold Discriminant Analysis (MMDA) of FKP. Finally, these features are grouped using k-means clustering for both identification and verification process. This proposed system is initialized based on the FKP framework without a template based on the fuzzy vault. The key idea of fuzzy vault storing is utilized to safeguard the secret key in the existence of random numbers as chaff pints.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
The International Arab Journal of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1