首页 > 最新文献

2020 21st International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
Collaborative Team Construction in Open Multi-Agents System 开放多智能体系统中的协同团队建设
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300116
Z. Houhamdi, B. Athamena
Agents usually organize their behavior and cooperate to reach a common global goal by sharing constrained resources or perform complex tasks. Constructing an efficient collaborative team where agents are ready to collaborate without interests' conflict is fundamental for the success of any collaboration process. The construction of such teams was well discussed in closed Multi-Agents System (MAS). Nevertheless, it represents a real challenge in open MAS, where each agent joins and leaves the system unpredictably and frequently and has a set of goals to achieve concurrently (agent is self-interested). This study describes an entire decentralized method to the collaborative Team Construction Model (CTCM) for multi-goals agents in open MAS. CTCM defines a modified social reasoning model and a new decentralized team construction method. CTCM allows each agent to achieve its local and common goals concurrently in constrained resource open MAS by constructing collaborative teams. The agents share partial domain knowledge (to preserve privacy) and model their goal relations with other agents by applying modified social reasoning. The team construction method facilitates agents decision-making process in a decentralized way. The CTCM enables agents to adjust their self-interest level and adapt their readiness to construct effective collaborative teams.
智能体通常通过共享受约束的资源或执行复杂的任务来组织其行为并进行合作,以达到共同的全局目标。构建一个高效的协作团队,在这个团队中,各个主体都愿意在没有利益冲突的情况下进行协作,这是任何协作过程成功的基础。在封闭的多智能体系统(MAS)中对团队的构建进行了深入的探讨。然而,它在开放MAS中代表了一个真正的挑战,其中每个代理都不可预测地频繁地加入和离开系统,并且同时有一组目标要实现(代理是自利的)。本研究描述了开放MAS中多目标主体的协作团队构建模型(CTCM)的一种完整的分散方法。CTCM定义了一种改进的社会推理模型和一种新的分散式团队构建方法。CTCM通过构建协作团队,在资源受限的开放MAS中,允许每个agent同时实现其局部目标和共同目标。智能体共享部分领域知识(以保护隐私),并通过应用改进的社会推理对它们与其他智能体的目标关系进行建模。团队构建方法有利于分散agent的决策过程。CTCM使代理人能够调整自身的利益水平,调整其准备程度,以构建有效的协作团队。
{"title":"Collaborative Team Construction in Open Multi-Agents System","authors":"Z. Houhamdi, B. Athamena","doi":"10.1109/ACIT50332.2020.9300116","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300116","url":null,"abstract":"Agents usually organize their behavior and cooperate to reach a common global goal by sharing constrained resources or perform complex tasks. Constructing an efficient collaborative team where agents are ready to collaborate without interests' conflict is fundamental for the success of any collaboration process. The construction of such teams was well discussed in closed Multi-Agents System (MAS). Nevertheless, it represents a real challenge in open MAS, where each agent joins and leaves the system unpredictably and frequently and has a set of goals to achieve concurrently (agent is self-interested). This study describes an entire decentralized method to the collaborative Team Construction Model (CTCM) for multi-goals agents in open MAS. CTCM defines a modified social reasoning model and a new decentralized team construction method. CTCM allows each agent to achieve its local and common goals concurrently in constrained resource open MAS by constructing collaborative teams. The agents share partial domain knowledge (to preserve privacy) and model their goal relations with other agents by applying modified social reasoning. The team construction method facilitates agents decision-making process in a decentralized way. The CTCM enables agents to adjust their self-interest level and adapt their readiness to construct effective collaborative teams.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122703882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Deep CNN Approach for Plant Disease Detection 植物病害检测的深度CNN方法
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300072
Fatma Marzougui, M. Elleuch, M. Kherallah
The diagnosis of the plants is carried out with a visual inspection by experts and a biological examination is the second choice if necessary. They are usually expensive and time consuming. This inspired several computer methodologies to detect plant blights based on their leaf images. We apply a computer methodology on Deep Learning systems based on artificial neural networks, this branch also allows for the early detection of plant diseases, by applying convolutional neural networks (CNNs) familiar with some of the famous architectures, notably the “ResNet” architecture, using an augmented dataset containing images of healthy and diseased leaves (each leaf is manually cut and placed on a uniform background) with acceptable accuracy rates in the research environment. This Deep Learning technique has shown very good performance for various object detection problems. The model fulfills its role by classifying images into two categories (disease-free) and (diseased). According to the results obtained, the developed system achieves better detection performances than those proposed in the state of the art. Finally, to compare their performances, we use the implementation under Anaconda 2019.10.
植物的诊断由专家进行目视检查,如有必要,生物检查是第二选择。它们通常既昂贵又耗时。这启发了几种基于叶子图像来检测植物枯萎病的计算机方法。我们将计算机方法应用于基于人工神经网络的深度学习系统,该分支还允许早期检测植物疾病,通过应用熟悉一些著名架构的卷积神经网络(cnn),特别是“ResNet”架构,使用包含健康和患病叶子图像的增强数据集(每片叶子都是手动切割并放置在统一的背景上)在研究环境中具有可接受的准确率。这种深度学习技术在各种目标检测问题上表现出了很好的性能。该模型通过将图像分为两类(无病)和(患病)来实现其作用。结果表明,所开发的系统比现有的检测系统具有更好的检测性能。最后,为了比较它们的性能,我们使用Anaconda 2019.10下的实现。
{"title":"A Deep CNN Approach for Plant Disease Detection","authors":"Fatma Marzougui, M. Elleuch, M. Kherallah","doi":"10.1109/ACIT50332.2020.9300072","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300072","url":null,"abstract":"The diagnosis of the plants is carried out with a visual inspection by experts and a biological examination is the second choice if necessary. They are usually expensive and time consuming. This inspired several computer methodologies to detect plant blights based on their leaf images. We apply a computer methodology on Deep Learning systems based on artificial neural networks, this branch also allows for the early detection of plant diseases, by applying convolutional neural networks (CNNs) familiar with some of the famous architectures, notably the “ResNet” architecture, using an augmented dataset containing images of healthy and diseased leaves (each leaf is manually cut and placed on a uniform background) with acceptable accuracy rates in the research environment. This Deep Learning technique has shown very good performance for various object detection problems. The model fulfills its role by classifying images into two categories (disease-free) and (diseased). According to the results obtained, the developed system achieves better detection performances than those proposed in the state of the art. Finally, to compare their performances, we use the implementation under Anaconda 2019.10.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122463426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
QoS-aware service composition in Fog-IoT computing using multi-population genetic algorithm 基于多种群遗传算法的Fog-IoT计算中qos感知服务组合
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300090
Idir Aoudia, L. Kahloul, Saber Benharzallah, O. Kazar
The Internet of things (IoT) is the integration of information space and physical space, becoming more and more popular in several places. In this paper, we will present QoS service composition approach based on multi-population genetic algorithm based on Fog-IoT computing, IoT-cloud architecture problems led us to use the 5-layared architecture implemented on a Fog computing system especially the transport layer. Our work was focus on this transport layer where we divided it into four sub-layers (security, storage, pre-processing & monitoring), it allows us to have promising advantages. Secondly, we implemented a multi-population genetic algorithm (MPGA) based on a QoS model, we considered seven QoS dimensions, i.e. Cost, response time, reliability, reputation, location, security and availability. Experimental results show the excellent results of MPGA in terms of fitness value and execution time to handle our ambulance emergency study case.
物联网(Internet of things, IoT)是信息空间与物理空间的融合,在很多地方越来越受欢迎。在本文中,我们将提出基于多种群遗传算法的基于雾-物联网计算的QoS服务组合方法,物联网云架构问题导致我们使用在雾计算系统上实现的5层架构,特别是传输层。我们的工作重点是这个传输层,我们将其分为四个子层(安全、存储、预处理和监控),这使我们具有很大的优势。其次,我们实现了基于QoS模型的多种群遗传算法(MPGA),我们考虑了QoS的7个维度,即成本、响应时间、可靠性、声誉、位置、安全性和可用性。实验结果表明,MPGA在适应度值和执行时间方面都取得了良好的效果。
{"title":"QoS-aware service composition in Fog-IoT computing using multi-population genetic algorithm","authors":"Idir Aoudia, L. Kahloul, Saber Benharzallah, O. Kazar","doi":"10.1109/ACIT50332.2020.9300090","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300090","url":null,"abstract":"The Internet of things (IoT) is the integration of information space and physical space, becoming more and more popular in several places. In this paper, we will present QoS service composition approach based on multi-population genetic algorithm based on Fog-IoT computing, IoT-cloud architecture problems led us to use the 5-layared architecture implemented on a Fog computing system especially the transport layer. Our work was focus on this transport layer where we divided it into four sub-layers (security, storage, pre-processing & monitoring), it allows us to have promising advantages. Secondly, we implemented a multi-population genetic algorithm (MPGA) based on a QoS model, we considered seven QoS dimensions, i.e. Cost, response time, reliability, reputation, location, security and availability. Experimental results show the excellent results of MPGA in terms of fitness value and execution time to handle our ambulance emergency study case.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123204285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Virtual Reality Applications in Education Domain 虚拟现实在教育领域的应用
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300056
Ghaliya Alfarsi, Azmi Bin Mohd Yusof
Virtual reality catches individuals' consideration. This innovation has been applied in numerous divisions, for example, medication, industry, training, computer games, or the travel industry. Maybe its most significant zone of intrigue has been relaxation and amusement. In any case, the part, the presentation of virtual or increased reality had a few limitations: it was costly, it had poor ergonomics, or inferred an excessive amount of work to make the substance. This study gives a general view of virtual reality applications that used primarily in the education sector. Late mechanical developments, including the quick selection of cell phones by society, have encouraged the entrance to computer-generated reality and enlarged the truth of anybody. Instructive organizations profit by better openness to virtual innovations. VR will make it conceivable to educate in virtual situations that are difficult to picture in physical study halls, such as getting into virtual research facilities, imagining machines, mechanical plants, or even clinical cases. The gigantic prospects of open virtual advancements will make it conceivable to break the limits of formal instruction.
虚拟现实吸引了个人的注意。这一创新已被应用于许多领域,例如医药、工业、培训、电脑游戏或旅游业。也许它最吸引人的地方是放松和娱乐。在任何情况下,虚拟现实或增强现实的呈现都有一些局限性:成本高,人体工程学不佳,或者需要大量的工作来制作内容。这项研究给出了主要用于教育部门的虚拟现实应用的总体视图。最近的机械发展,包括社会对手机的快速选择,鼓励人们进入计算机生成的现实,扩大了任何人的真相。指导性组织通过对虚拟创新更开放而获利。虚拟现实技术将使在现实学习厅里难以想象的虚拟环境中进行教育成为可能,比如进入虚拟的研究设施,想象机器、机械工厂,甚至临床病例。开放虚拟进步的巨大前景将使打破正规教学的限制成为可能。
{"title":"Virtual Reality Applications in Education Domain","authors":"Ghaliya Alfarsi, Azmi Bin Mohd Yusof","doi":"10.1109/ACIT50332.2020.9300056","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300056","url":null,"abstract":"Virtual reality catches individuals' consideration. This innovation has been applied in numerous divisions, for example, medication, industry, training, computer games, or the travel industry. Maybe its most significant zone of intrigue has been relaxation and amusement. In any case, the part, the presentation of virtual or increased reality had a few limitations: it was costly, it had poor ergonomics, or inferred an excessive amount of work to make the substance. This study gives a general view of virtual reality applications that used primarily in the education sector. Late mechanical developments, including the quick selection of cell phones by society, have encouraged the entrance to computer-generated reality and enlarged the truth of anybody. Instructive organizations profit by better openness to virtual innovations. VR will make it conceivable to educate in virtual situations that are difficult to picture in physical study halls, such as getting into virtual research facilities, imagining machines, mechanical plants, or even clinical cases. The gigantic prospects of open virtual advancements will make it conceivable to break the limits of formal instruction.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Diabetes Disease Prediction Using Artificial Intelligence 利用人工智能预测糖尿病疾病
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300066
Muntather Ayad, H. Kanaan, M. Ayache
For a long time, the major problem area for researchers is disease diagnosis and the main interest of the medicine is an accurate diagnosis. Many engineering techniques have been developed in the past to help the medical staff with a diagnosis tool. There are many traditional methods of disease diagnosis, but the application of machine learning techniques has given a new dimension to this area. In this work, two different approaches have been used for the purpose of classification between diabetic and non-diabetic, using Pima Indian Diabetes Dataset. Principal Component Analysis has been used in the purpose of feature dimension reduction before applying any proposed classifier. Support Vector Machine (SVM) and Naïve Bayes (NB) are the two classifiers used in our study. 94.14 % and 93.88% are the accuracies obtained for the SVM and NB approaches.The results obtained are very interesting and show improvement from the previous works. With this accurate learning technique, there is enough scope for improvement considerably in this field.
长期以来,研究人员的主要问题领域是疾病诊断,医学的主要兴趣是准确的诊断。过去已经开发了许多工程技术来帮助医务人员使用诊断工具。传统的疾病诊断方法有很多,但机器学习技术的应用为这一领域提供了一个新的维度。在这项工作中,两种不同的方法被用于糖尿病和非糖尿病之间的分类,使用皮马印度糖尿病数据集。在应用任何分类器之前,主成分分析已用于特征降维的目的。支持向量机(SVM)和Naïve贝叶斯(NB)是我们研究中使用的两种分类器。SVM和NB方法的准确率分别为94.14%和93.88%。所得结果非常有趣,与以往的工作相比有很大的改进。有了这种精确的学习技术,在这个领域有足够的改进空间。
{"title":"Diabetes Disease Prediction Using Artificial Intelligence","authors":"Muntather Ayad, H. Kanaan, M. Ayache","doi":"10.1109/ACIT50332.2020.9300066","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300066","url":null,"abstract":"For a long time, the major problem area for researchers is disease diagnosis and the main interest of the medicine is an accurate diagnosis. Many engineering techniques have been developed in the past to help the medical staff with a diagnosis tool. There are many traditional methods of disease diagnosis, but the application of machine learning techniques has given a new dimension to this area. In this work, two different approaches have been used for the purpose of classification between diabetic and non-diabetic, using Pima Indian Diabetes Dataset. Principal Component Analysis has been used in the purpose of feature dimension reduction before applying any proposed classifier. Support Vector Machine (SVM) and Naïve Bayes (NB) are the two classifiers used in our study. 94.14 % and 93.88% are the accuracies obtained for the SVM and NB approaches.The results obtained are very interesting and show improvement from the previous works. With this accurate learning technique, there is enough scope for improvement considerably in this field.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust and reputation in Wireless Sensors networks 无线传感器网络中的信任与声誉
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300101
Lara Saleh, Anas Abu Taleb, W. Salameh
The wireless sensor networks are characterized by the infrastructure less configuring these sensors are used in different application such in defense, healthcare and in some applications that take care of the early detection of forest fires, also the wireless sensors networks can be in remote areas for long periods so because of the natural and the use of these sensors they are subject to exposure many security attacks; So the reputation-based trust systems was developed to keep the eye on the un normal activities, this paper listed the attacks that the wireless sensor networks may suffer from and listed trust models in these networks and finally the immunity of the trust models from the malicious attacks is shown.
无线传感器网络的特点是基础设施配置较少,这些传感器用于不同的应用,如国防,医疗保健和一些应用中,照顾森林火灾的早期检测,无线传感器网络可以在偏远地区长时间使用,因此由于这些传感器的自然和使用,它们容易受到许多安全攻击;为此,提出了基于信誉的信任系统,对无线传感器网络可能遭受的攻击进行监控。本文列举了无线传感器网络可能遭受的攻击,并给出了这些网络中的信任模型,最后给出了信任模型对恶意攻击的免疫力。
{"title":"Trust and reputation in Wireless Sensors networks","authors":"Lara Saleh, Anas Abu Taleb, W. Salameh","doi":"10.1109/ACIT50332.2020.9300101","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300101","url":null,"abstract":"The wireless sensor networks are characterized by the infrastructure less configuring these sensors are used in different application such in defense, healthcare and in some applications that take care of the early detection of forest fires, also the wireless sensors networks can be in remote areas for long periods so because of the natural and the use of these sensors they are subject to exposure many security attacks; So the reputation-based trust systems was developed to keep the eye on the un normal activities, this paper listed the attacks that the wireless sensor networks may suffer from and listed trust models in these networks and finally the immunity of the trust models from the malicious attacks is shown.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130831359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method to Verify the Search Results of Database Queries on Cloud Computing 基于云计算的数据库查询结果验证方法
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300079
Safaa Hraiz, Ghazi Al-Naymat, A. Awajan
With the attractive characteristics of cloud computing, most companies manage to use it in order to decrease the costs and efforts of management. Database as a service is one of the attractive delivery models on cloud computing. It represents great opportunities for companies to decrease the efforts and costs of managing the databases. Because of that, most companies outsourced their databases to the cloud but new challenges have arisen including the guarantee of the integrity of the search results. This paper proposes a new technique that aids to ensure the integrity of the search results. It uses variants of the Bloom Filter data structure. The analysis using the TPC-H benchmark affirms that the proposed method is secure and efficient for practical deployment.
由于云计算具有吸引人的特性,大多数公司都设法使用它,以减少管理成本和工作量。数据库即服务是云计算中最吸引人的交付模式之一。它为公司减少管理数据库的工作量和成本提供了巨大的机会。因此,大多数公司将其数据库外包给云计算,但新的挑战已经出现,包括保证搜索结果的完整性。本文提出了一种有助于保证搜索结果完整性的新技术。它使用了Bloom Filter数据结构的变体。通过对TPC-H基准测试的分析,验证了该方法在实际部署中的安全性和有效性。
{"title":"A Novel Method to Verify the Search Results of Database Queries on Cloud Computing","authors":"Safaa Hraiz, Ghazi Al-Naymat, A. Awajan","doi":"10.1109/ACIT50332.2020.9300079","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300079","url":null,"abstract":"With the attractive characteristics of cloud computing, most companies manage to use it in order to decrease the costs and efforts of management. Database as a service is one of the attractive delivery models on cloud computing. It represents great opportunities for companies to decrease the efforts and costs of managing the databases. Because of that, most companies outsourced their databases to the cloud but new challenges have arisen including the guarantee of the integrity of the search results. This paper proposes a new technique that aids to ensure the integrity of the search results. It uses variants of the Bloom Filter data structure. The analysis using the TPC-H benchmark affirms that the proposed method is secure and efficient for practical deployment.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131272731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy logic Applied to Smart Baby's Health and Feeding Sequence Monitoring System 模糊逻辑在智能婴儿健康及喂养顺序监测系统中的应用
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300087
J. C. Tuyisenge, N. Gaudence, D. Mukanyiligira, Jean Pierre Nyakuri
Nowadays, with technology development, home healthcare and remote monitoring of physiological data have gained importance. It is popular in the tracking of home healthcare of patients, particularly babies. The existing IoT solutions cover the health monitoring of babies by the use of biometric sensors and a smart cradle. This work proposes a system where by a smart dining room is added to the existing solution, by the use of an IP Camera, Fingerprint based access, room temperature and humidity control by fuzzy inference system. The smart room contains also an alert system to remind the maidservant the time to feed the baby, an alert system to the parents alerting them if the maidservant has not respected the time to feed the baby so that parents can remind the maidservant to do so. In addition to this, a mobile application was developed for parents to monitor the smart dining room's activities. An IP camera will be automatically activated once the maidservant and child enter in the dining room, to provide full information to the parents about the diet prepared.
如今,随着科技的发展,家庭医疗和生理数据的远程监测变得越来越重要。它在跟踪患者,特别是婴儿的家庭保健方面很受欢迎。现有的物联网解决方案包括使用生物识别传感器和智能摇篮对婴儿进行健康监测。本工作提出了一个系统,在现有的解决方案中增加一个智能餐厅,通过使用IP摄像头,基于指纹的访问,通过模糊推理系统控制房间的温度和湿度。智能房间还包含一个警报系统,提醒女佣喂奶的时间,如果女佣没有遵守喂奶的时间,则向父母发出警报系统,以便父母可以提醒女佣这样做。除此之外,还开发了一个移动应用程序,供家长监控智能餐厅的活动。一旦女仆和孩子进入餐厅,IP摄像头将自动启动,向父母提供有关准备的饮食的完整信息。
{"title":"Fuzzy logic Applied to Smart Baby's Health and Feeding Sequence Monitoring System","authors":"J. C. Tuyisenge, N. Gaudence, D. Mukanyiligira, Jean Pierre Nyakuri","doi":"10.1109/ACIT50332.2020.9300087","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300087","url":null,"abstract":"Nowadays, with technology development, home healthcare and remote monitoring of physiological data have gained importance. It is popular in the tracking of home healthcare of patients, particularly babies. The existing IoT solutions cover the health monitoring of babies by the use of biometric sensors and a smart cradle. This work proposes a system where by a smart dining room is added to the existing solution, by the use of an IP Camera, Fingerprint based access, room temperature and humidity control by fuzzy inference system. The smart room contains also an alert system to remind the maidservant the time to feed the baby, an alert system to the parents alerting them if the maidservant has not respected the time to feed the baby so that parents can remind the maidservant to do so. In addition to this, a mobile application was developed for parents to monitor the smart dining room's activities. An IP camera will be automatically activated once the maidservant and child enter in the dining room, to provide full information to the parents about the diet prepared.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Visual Steganography and Encryption Tachniques with Hardware Implementation 视觉隐写和加密技术与硬件实现
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300055
Hare Ram Sah, Hemang Shrivastava, M. Ramaiya
The visual steganography is used to hide secret message within an image and extracting it from destination image. The secure forms of steganography are visual steganography which is implemented in image files. For securing data encryption method is used with mathematical concepts and achieves higher level of secured communication. Both the techniques visual steganography and encryption technique are combined to achieve two layer of security. Instead of sequential search, the thread based parallel search is implemented to increase the retrieval speed at high rate of concurrent search which can be implemented on any real-time architecture.
视觉隐写技术用于隐藏隐藏在图像中的秘密信息,并从目标图像中提取秘密信息。隐写的安全形式是在图像文件中实现的视觉隐写。为了保证数据的安全,采用了数学概念的加密方法,实现了更高层次的安全通信。将视觉隐写技术和加密技术相结合,实现两层安全。采用基于线程的并行搜索代替顺序搜索,提高了检索速度,实现了高并发搜索率,可在任何实时体系结构上实现。
{"title":"Visual Steganography and Encryption Tachniques with Hardware Implementation","authors":"Hare Ram Sah, Hemang Shrivastava, M. Ramaiya","doi":"10.1109/ACIT50332.2020.9300055","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300055","url":null,"abstract":"The visual steganography is used to hide secret message within an image and extracting it from destination image. The secure forms of steganography are visual steganography which is implemented in image files. For securing data encryption method is used with mathematical concepts and achieves higher level of secured communication. Both the techniques visual steganography and encryption technique are combined to achieve two layer of security. Instead of sequential search, the thread based parallel search is implemented to increase the retrieval speed at high rate of concurrent search which can be implemented on any real-time architecture.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"12 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132154438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algerian Dialect Sentiment Analysis: Sate of Art 阿尔及利亚方言情感分析:艺术境界
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300060
Salima Brachemi-Meftah, F. Barigou
Sentiment Analysis tries to predict the polarity of comments in social media. In this paper we present a state of art about sentiment analysis for the Algerian dialect, one of the Arabic languages used on social media and which has few resources. First, a brief description is given regarding the characteristics and challenges of the Algerian dialect. Then the study of papers dealing with sentiment analysis for the Algerian dialect is done with their classification by approach considering tools used and the best results obtained. We also try to enumerate resources that are used in Algerian dialect sentiment analysis works.
情感分析试图预测社交媒体上评论的极性。在本文中,我们介绍了阿尔及利亚方言的情感分析技术,阿尔及利亚方言是社交媒体上使用的阿拉伯语言之一,资源很少。首先,简要介绍了阿尔及利亚方言的特点和面临的挑战。然后对阿尔及利亚方言的情感分析论文进行了研究,并根据所使用的工具和所获得的最佳结果进行了分类。我们还尝试列举阿尔及利亚方言情感分析工作中使用的资源。
{"title":"Algerian Dialect Sentiment Analysis: Sate of Art","authors":"Salima Brachemi-Meftah, F. Barigou","doi":"10.1109/ACIT50332.2020.9300060","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300060","url":null,"abstract":"Sentiment Analysis tries to predict the polarity of comments in social media. In this paper we present a state of art about sentiment analysis for the Algerian dialect, one of the Arabic languages used on social media and which has few resources. First, a brief description is given regarding the characteristics and challenges of the Algerian dialect. Then the study of papers dealing with sentiment analysis for the Algerian dialect is done with their classification by approach considering tools used and the best results obtained. We also try to enumerate resources that are used in Algerian dialect sentiment analysis works.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131245844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 21st International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1