首页 > 最新文献

2020 21st International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
An IoT Based Healthcare using ECG 基于物联网的ECG医疗保健
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300104
R. Hodrob, Mahmoud Obaid, Abdulsalam Mansour Abdulsalam Mansour, Ali Sawahreh, Mokhles Naghnagheah, Shatha AbuShanab
the reliance of an electrocardiogram system in heart patients is paramount. It is essential to note that electrocardiography is a medical tactic used by doctors to assess the blood circulatory systems of their patients. In this paper we proposed a novel health care based Internet of Things (IoT) system that measures the ECG signal using Healthy-pi HAT, the system measures vital signs and ECG using Raspberry-pi, after that, the data will be sent to a cloud system to analyze it and the data will be saved in the database system. The proposed system has an android app used by the customer, and a web application used by the doctor. Likewise, the framework will advise the nearest clinical center if there should be an occurrence of the patient's unexpected wellbeing disintegration, an SMS for the patient location using GPS will be sent. The way toward investigating the ECG signal depends on extricating its highlights, this will be performed by perusing the P-wave, QRS-complex, and T-wave, these are the three principle waves that ECGs comprise, and a large number of arrhythmia diagnosing depends on these qualities.
心脏病患者对心电图系统的依赖是至关重要的。必须注意的是,心电图是医生用来评估病人血液循环系统的一种医疗策略。本文提出了一种新型的基于医疗保健的物联网(IoT)系统,该系统使用health -pi HAT测量心电信号,系统使用树莓派测量生命体征和心电,然后将数据发送到云系统进行分析,并将数据保存在数据库系统中。该系统有一个由客户使用的android应用程序和一个由医生使用的web应用程序。同样,该框架将向最近的临床中心提供建议,如果患者出现意外的健康解体,将使用GPS发送患者位置的短信。研究心电信号的方法取决于提取其亮点,这将通过仔细研究p波,qrs复合体和t波来完成,这是心电图组成的三个主要波,大量的心律失常诊断依赖于这些特征。
{"title":"An IoT Based Healthcare using ECG","authors":"R. Hodrob, Mahmoud Obaid, Abdulsalam Mansour Abdulsalam Mansour, Ali Sawahreh, Mokhles Naghnagheah, Shatha AbuShanab","doi":"10.1109/ACIT50332.2020.9300104","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300104","url":null,"abstract":"the reliance of an electrocardiogram system in heart patients is paramount. It is essential to note that electrocardiography is a medical tactic used by doctors to assess the blood circulatory systems of their patients. In this paper we proposed a novel health care based Internet of Things (IoT) system that measures the ECG signal using Healthy-pi HAT, the system measures vital signs and ECG using Raspberry-pi, after that, the data will be sent to a cloud system to analyze it and the data will be saved in the database system. The proposed system has an android app used by the customer, and a web application used by the doctor. Likewise, the framework will advise the nearest clinical center if there should be an occurrence of the patient's unexpected wellbeing disintegration, an SMS for the patient location using GPS will be sent. The way toward investigating the ECG signal depends on extricating its highlights, this will be performed by perusing the P-wave, QRS-complex, and T-wave, these are the three principle waves that ECGs comprise, and a large number of arrhythmia diagnosing depends on these qualities.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123865476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Issues in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Review IPv6在低功耗无线个人区域网络(6LoWPAN)上的安全问题综述
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300080
Samson Otieno Ooko, Jamila Kadam'manja, Marie Grace Uwizeye, Dagmawi Lemma
The use of Internet of Things (IoT) is fast growing and more objects need a connection to the internet to extend their capabilities. 6LoWPAN introduces the IPv6 usage to connect IEEE 802.15.4 networks providing a large address space to enable more devices to connect to the internet. Despite the advantages, there are also privacy and security issues that need to be mitigated. This review outlines the 6LoWPAN network architecture, the protocol stack, and its advantages and applications. The security and privacy issues have also been analyzed with solutions and recommendations given.
物联网(IoT)的使用正在快速增长,越来越多的对象需要连接到互联网以扩展其功能。6LoWPAN引入了IPv6的用法来连接IEEE 802.15.4网络,提供了一个大的地址空间,使更多的设备能够连接到互联网。尽管有这些优点,但也存在需要减轻的隐私和安全问题。本文概述了6LoWPAN网络的体系结构、协议栈及其优点和应用。本文还分析了安全和隐私问题,并给出了解决方案和建议。
{"title":"Security Issues in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Review","authors":"Samson Otieno Ooko, Jamila Kadam'manja, Marie Grace Uwizeye, Dagmawi Lemma","doi":"10.1109/ACIT50332.2020.9300080","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300080","url":null,"abstract":"The use of Internet of Things (IoT) is fast growing and more objects need a connection to the internet to extend their capabilities. 6LoWPAN introduces the IPv6 usage to connect IEEE 802.15.4 networks providing a large address space to enable more devices to connect to the internet. Despite the advantages, there are also privacy and security issues that need to be mitigated. This review outlines the 6LoWPAN network architecture, the protocol stack, and its advantages and applications. The security and privacy issues have also been analyzed with solutions and recommendations given.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124286286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating the Lack of Utilization of Information and Communication Technologies in Saudi Schools 调查沙特学校缺乏对信息和通信技术的利用
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300058
Nouf Aljuhani, Elaaf Aljohani, Raghad Alharbi, Rasha Almutairi, Maram Meccawy
Information and Communication Technologies (ICT) make the educational process more efficient by facilitating the imparting of information. Recently, many research and studies asserted that the use of ICT will significantly improve the outcomes of the educational process. Therefore, Saudi Arabia's government invested massively to integrate ICT in the education sector, but the implementation has been disappointing and not achieving the desired goals. Therefore, this study aims to explore the main factors behind the lack of ICT utilization in Saudi schools. Furthermore, the results of this study and the recommendations set forth in this paper will contribute towards the successful utilization of ICT in the education sector of Saudi Arabia and other Arab countries. Data have been collected by conducting semistructured questionnaires and interviews with teachers working at secondary schools in Madinah city. Then, these data have been analyzed by using qualitative and quantitative data analysis methods. The study reveals that there are four main factors behind the lack of ICT utilization, which are: lack of infrastructure and technical support, lack of ICT management and strategies, lack of ICT training courses, and negative teachers' attitudes and beliefs towards utilization of ICT. In conclusion, we provide some recommendations that contribute to overcoming these factors and promoting the full usage of ICT in the educational process.
信息和通信技术(ICT)通过促进信息的传授,使教育过程更有效率。最近,许多研究断言,使用信息通信技术将显著改善教育过程的结果。因此,沙特阿拉伯政府投入大量资金将ICT整合到教育部门,但实施情况令人失望,没有达到预期目标。因此,本研究旨在探讨沙特学校缺乏ICT利用背后的主要因素。此外,本研究的结果和本文提出的建议将有助于在沙特阿拉伯和其他阿拉伯国家的教育部门成功利用信息和通信技术。通过对在麦地那市中学工作的教师进行半结构化问卷调查和访谈收集了数据。然后,运用定性和定量的数据分析方法对这些数据进行分析。研究发现,ICT利用不足的主要原因有四个:缺乏基础设施和技术支持,缺乏ICT管理和策略,缺乏ICT培训课程,以及教师对ICT利用的消极态度和信念。最后,我们提出了一些建议,有助于克服这些因素,促进信息通信技术在教育过程中的充分利用。
{"title":"Investigating the Lack of Utilization of Information and Communication Technologies in Saudi Schools","authors":"Nouf Aljuhani, Elaaf Aljohani, Raghad Alharbi, Rasha Almutairi, Maram Meccawy","doi":"10.1109/ACIT50332.2020.9300058","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300058","url":null,"abstract":"Information and Communication Technologies (ICT) make the educational process more efficient by facilitating the imparting of information. Recently, many research and studies asserted that the use of ICT will significantly improve the outcomes of the educational process. Therefore, Saudi Arabia's government invested massively to integrate ICT in the education sector, but the implementation has been disappointing and not achieving the desired goals. Therefore, this study aims to explore the main factors behind the lack of ICT utilization in Saudi schools. Furthermore, the results of this study and the recommendations set forth in this paper will contribute towards the successful utilization of ICT in the education sector of Saudi Arabia and other Arab countries. Data have been collected by conducting semistructured questionnaires and interviews with teachers working at secondary schools in Madinah city. Then, these data have been analyzed by using qualitative and quantitative data analysis methods. The study reveals that there are four main factors behind the lack of ICT utilization, which are: lack of infrastructure and technical support, lack of ICT management and strategies, lack of ICT training courses, and negative teachers' attitudes and beliefs towards utilization of ICT. In conclusion, we provide some recommendations that contribute to overcoming these factors and promoting the full usage of ICT in the educational process.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124292402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building an Intelligent Telemonitoring System for Heart Failure: The Use of the Internet of Things, Big Data, and Machine Learning 构建心力衰竭智能远程监测系统:利用物联网、大数据和机器学习
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300113
S. Eletter, Tahira Yasmin, G. Elrefae, H. Aliter, Abdullah Elrefae
Heart failure (HF) is a significant and chronic health disease. Nevertheless, despite the high mortality rate and associated costs, it can be managed. Emerging technologies such as artificial intelligence, big data, and internet of things offer advantages for the management of HF. Using the medical records of HF patients, five machine learning algorithms - deep learning (DL), generalized linear models (GLM), naïve base (NB), random forest (RF), and support vector machines(SVM) were used to build classifiers to predict HF. The results indicate that machine learning algorithms are effective tools for classifying the medical records of HF patients. GLM and SVM can potentially be utilized together to predict HF with high classification accuracy.
心力衰竭(HF)是一种重要的慢性疾病。然而,尽管死亡率和相关费用很高,但它是可以控制的。人工智能、大数据、物联网等新兴技术为高频管理提供了优势。采用深度学习(DL)、广义线性模型(GLM)、naïve base (NB)、随机森林(RF)、支持向量机(SVM)等5种机器学习算法,构建HF分类器进行预测。结果表明,机器学习算法是对心衰患者病历进行分类的有效工具。GLM和SVM可以共同用于高频预测,分类精度较高。
{"title":"Building an Intelligent Telemonitoring System for Heart Failure: The Use of the Internet of Things, Big Data, and Machine Learning","authors":"S. Eletter, Tahira Yasmin, G. Elrefae, H. Aliter, Abdullah Elrefae","doi":"10.1109/ACIT50332.2020.9300113","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300113","url":null,"abstract":"Heart failure (HF) is a significant and chronic health disease. Nevertheless, despite the high mortality rate and associated costs, it can be managed. Emerging technologies such as artificial intelligence, big data, and internet of things offer advantages for the management of HF. Using the medical records of HF patients, five machine learning algorithms - deep learning (DL), generalized linear models (GLM), naïve base (NB), random forest (RF), and support vector machines(SVM) were used to build classifiers to predict HF. The results indicate that machine learning algorithms are effective tools for classifying the medical records of HF patients. GLM and SVM can potentially be utilized together to predict HF with high classification accuracy.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A New Hybrid Shape Moment Invariant Techniques for Face Identification in Thermal and Visible Visions 一种基于热视觉和视觉的混合形状不变人脸识别技术
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300069
S. Hamandi, A. M. Rahma, R. Hassan
Presently, the extraction of robust facial features is becoming very effective for accurate face recognition especially for smart security surveillance systems. This paper investigates three different moment invariants techniques for robust facial features extraction and then determine how each one of these moments is affected by whether the face image was thermal or on a greyscale with the proposal of a hybrid technique that deals with the robust descriptors of each method. This hybrid technique has improved the results and gave robust facial features for face identification. A feed-forward neural network is trained with these moments' features where the recognized faces are classified to one of the basic faces of IRIS and CARL face datasets which achieved high accuracy reaching 98.1% for thermal images and 81.2% for grey images.
目前,鲁棒性人脸特征的提取是实现准确人脸识别的重要手段,尤其是在智能安防监控系统中。本文研究了三种不同的矩不变量鲁棒人脸特征提取技术,然后确定了每个矩是如何受到人脸图像是热图像还是灰度图像的影响,并提出了一种处理每种方法鲁棒描述子的混合技术。这种混合技术改善了结果,并为人脸识别提供了鲁棒的面部特征。利用这些矩量特征训练前馈神经网络,将识别的人脸分类为IRIS和CARL人脸数据集的基本人脸之一,热图像和灰度图像的识别准确率分别达到98.1%和81.2%。
{"title":"A New Hybrid Shape Moment Invariant Techniques for Face Identification in Thermal and Visible Visions","authors":"S. Hamandi, A. M. Rahma, R. Hassan","doi":"10.1109/ACIT50332.2020.9300069","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300069","url":null,"abstract":"Presently, the extraction of robust facial features is becoming very effective for accurate face recognition especially for smart security surveillance systems. This paper investigates three different moment invariants techniques for robust facial features extraction and then determine how each one of these moments is affected by whether the face image was thermal or on a greyscale with the proposal of a hybrid technique that deals with the robust descriptors of each method. This hybrid technique has improved the results and gave robust facial features for face identification. A feed-forward neural network is trained with these moments' features where the recognized faces are classified to one of the basic faces of IRIS and CARL face datasets which achieved high accuracy reaching 98.1% for thermal images and 81.2% for grey images.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A WebGIS Decision Support System for Wadi El Natrun Rural Land Management Wadi El Natrun农村土地管理的WebGIS决策支持系统
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300106
Sayed Ahmed, A. Kotb, Ehab Samir, M. Moustafa, E. Farg, Ahmed Abd Elhay, S. Arafat
Recently, the Egyptian government benefits from the digital transformation by developing different platforms to help manage and monitor the routine process. Rural land management is one of the critical issues that could significantly improve the economy. As far as we know, rural land management affects farmers and may cause agricultural land loss and waste of irrigation resources. Many attempts have been investigated to address this issue in Egypt. Therefore, we design and implement a WebGIS decision support system for rural land management in Wadi El-Natrun valley (WNDSS), El-Beheria governorate. The proposed WNDSS was developed using the client/server model and contains several functions, including data extraction, statistical analysis, and visualization via an interactive map. RESTful Web Service Application Programming Interfaces (APIs) were utilized as the communication interface between client and server. Finally, we use the browser to get the data by predefined API and to present the rural farms with Google Map API and jQuery JavaScript library. The online system provides several tools for governorate managers to (a) precise survey data, (b) powerful change detection suite, (c) Normalized Difference Vegetation Index (NDVI) multi-temporal,(d) multi-date land use land cover information, (e) statistics reporting tools, (f) tabular or spatial query for associated data.
最近,埃及政府从数字化转型中受益,开发了不同的平台来帮助管理和监控日常流程。农村土地管理是能够显著改善经济的关键问题之一。据我们所知,农村土地管理影响农民,可能造成农业用地流失和灌溉资源浪费。为了在埃及解决这一问题,已经调查了许多尝试。因此,我们在El-Beheria省Wadi El-Natrun河谷(WNDSS)设计并实现了一个用于农村土地管理的WebGIS决策支持系统。WNDSS采用客户端/服务器模型开发,包含数据提取、统计分析和交互式地图可视化等功能。采用RESTful Web服务应用程序编程接口(api)作为客户端和服务器之间的通信接口。最后,我们使用浏览器通过预定义的API获取数据,并使用谷歌Map API和jQuery JavaScript库呈现农村农场。在线系统为省管理者提供了几种工具,以(a)精确的调查数据,(b)强大的变化检测套件,(c)标准化植被指数(NDVI)多时相,(d)多日期土地利用和土地覆盖信息,(e)统计报告工具,(f)相关数据的表格或空间查询。
{"title":"A WebGIS Decision Support System for Wadi El Natrun Rural Land Management","authors":"Sayed Ahmed, A. Kotb, Ehab Samir, M. Moustafa, E. Farg, Ahmed Abd Elhay, S. Arafat","doi":"10.1109/ACIT50332.2020.9300106","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300106","url":null,"abstract":"Recently, the Egyptian government benefits from the digital transformation by developing different platforms to help manage and monitor the routine process. Rural land management is one of the critical issues that could significantly improve the economy. As far as we know, rural land management affects farmers and may cause agricultural land loss and waste of irrigation resources. Many attempts have been investigated to address this issue in Egypt. Therefore, we design and implement a WebGIS decision support system for rural land management in Wadi El-Natrun valley (WNDSS), El-Beheria governorate. The proposed WNDSS was developed using the client/server model and contains several functions, including data extraction, statistical analysis, and visualization via an interactive map. RESTful Web Service Application Programming Interfaces (APIs) were utilized as the communication interface between client and server. Finally, we use the browser to get the data by predefined API and to present the rural farms with Google Map API and jQuery JavaScript library. The online system provides several tools for governorate managers to (a) precise survey data, (b) powerful change detection suite, (c) Normalized Difference Vegetation Index (NDVI) multi-temporal,(d) multi-date land use land cover information, (e) statistics reporting tools, (f) tabular or spatial query for associated data.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115065480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm 基于聚类有效性和K-means算法的类分解评价
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300084
Bilal I. Sowan, N. Matar, Firas Omar, Mohammad Alauthman, Mohammed Eshtay
A class decomposition is one of the possible solutions and the most important factors of success for the improvement of classification performance. The idea is to transform a dataset by categorizing each class label into groups or clusters. Thus, the transformation is done concerning data characteristics and similarities. This paper proposed a hybrid model for a class decomposition by the integration of gap statistic, k-means clustering algorithm, and Naive Bayes classifier. The model is based on clustering validity using gap statistic for enhancing the classifier performance. The model works by dividing each dataset into several subsets regarding its class labels. After that, the clustering validity using gap statistic is employed for estimating the optimal number of clusters for each subset that belong to a particular class label. The estimated number of clusters is used then as an input parameter for the k-means clustering algorithm for relabeling the data objects with a new class label in each subset. Every data object is allocated to each of the clusters generated by the k-means clustering algorithm, which consider it as the new class label. The proposed model integrates the class decomposition approach with Naive Bayes classifier to compare the performance of the proposed model under several classification measures. The model is validated and evaluated by employing different real-world datasets collected from the UCI machine learning repository. The experimental results show that a significant improvement in classification accuracy and F-measure when the class decomposition is applied. Also, the experiments indicate that using a class decomposition is not appropriate for all datasets.
类分解是一种可能的解决方案,也是成功提高分类性能的最重要因素。其思想是通过将每个类标签分类为组或簇来转换数据集。因此,根据数据的特征和相似度进行转换。本文提出了一种结合间隙统计、k-means聚类算法和朴素贝叶斯分类器的混合分类模型。该模型基于聚类有效性,利用间隙统计来提高分类器的性能。该模型通过将每个数据集根据其类标签划分为几个子集来工作。然后,使用间隙统计的聚类有效性来估计属于特定类标签的每个子集的最优聚类数量。然后使用估计的簇数作为k-means聚类算法的输入参数,用于在每个子集中使用新的类标签重新标记数据对象。将每个数据对象分配给k-means聚类算法生成的每个聚类,并将其作为新的类标号。该模型将分类分解方法与朴素贝叶斯分类器相结合,比较了该模型在几种分类度量下的性能。该模型通过使用从UCI机器学习存储库收集的不同真实数据集进行验证和评估。实验结果表明,采用分类分解方法后,分类精度和f测度都有了显著提高。实验还表明,类分解并不适用于所有的数据集。
{"title":"Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm","authors":"Bilal I. Sowan, N. Matar, Firas Omar, Mohammad Alauthman, Mohammed Eshtay","doi":"10.1109/ACIT50332.2020.9300084","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300084","url":null,"abstract":"A class decomposition is one of the possible solutions and the most important factors of success for the improvement of classification performance. The idea is to transform a dataset by categorizing each class label into groups or clusters. Thus, the transformation is done concerning data characteristics and similarities. This paper proposed a hybrid model for a class decomposition by the integration of gap statistic, k-means clustering algorithm, and Naive Bayes classifier. The model is based on clustering validity using gap statistic for enhancing the classifier performance. The model works by dividing each dataset into several subsets regarding its class labels. After that, the clustering validity using gap statistic is employed for estimating the optimal number of clusters for each subset that belong to a particular class label. The estimated number of clusters is used then as an input parameter for the k-means clustering algorithm for relabeling the data objects with a new class label in each subset. Every data object is allocated to each of the clusters generated by the k-means clustering algorithm, which consider it as the new class label. The proposed model integrates the class decomposition approach with Naive Bayes classifier to compare the performance of the proposed model under several classification measures. The model is validated and evaluated by employing different real-world datasets collected from the UCI machine learning repository. The experimental results show that a significant improvement in classification accuracy and F-measure when the class decomposition is applied. Also, the experiments indicate that using a class decomposition is not appropriate for all datasets.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Social-aware Web API Recommendation in IoT 物联网中社交感知Web API推荐
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300092
Marwa Meissa, Saber Benharzallah, L. Kahloul, O. Kazar
The core idea of IoT is the connectivity of real-world devices to the Internet, which allows them to expose their functionalities in APIs ways, communicate to other entities, and flow their data over internet. With the massive growth of connected IoT devices, the number of APIs have also increased. Thus, led up to overload information problem, which is making APIs selection more and more difficult for devices owners and users. Therefore, this paper propose web APIs recommendation framework in IoT environment based on social relationships. The main purpose is providing a novel Recommendation method, which enable to discover APIs and provide relevant suggestion for users. The proposed hybrid algorithm is combined content-based filtering and collaborative filtering techniques to improve the accuracy of rating prediction. Finally, experiments are conducted to evaluate the performance of recommendation.
物联网的核心思想是将现实世界的设备连接到互联网,这使得它们能够以api的方式暴露其功能,与其他实体通信,并通过互联网传输数据。随着连接物联网设备的大量增长,api的数量也在增加。这就导致了信息过载的问题,使得设备所有者和用户越来越难以选择api。因此,本文提出了物联网环境下基于社会关系的web api推荐框架。主要目的是提供一种新颖的推荐方法,能够发现api并为用户提供相关的建议。该混合算法将基于内容的过滤和协同过滤技术相结合,提高了评级预测的准确性。最后,通过实验对推荐的性能进行了评价。
{"title":"Social-aware Web API Recommendation in IoT","authors":"Marwa Meissa, Saber Benharzallah, L. Kahloul, O. Kazar","doi":"10.1109/ACIT50332.2020.9300092","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300092","url":null,"abstract":"The core idea of IoT is the connectivity of real-world devices to the Internet, which allows them to expose their functionalities in APIs ways, communicate to other entities, and flow their data over internet. With the massive growth of connected IoT devices, the number of APIs have also increased. Thus, led up to overload information problem, which is making APIs selection more and more difficult for devices owners and users. Therefore, this paper propose web APIs recommendation framework in IoT environment based on social relationships. The main purpose is providing a novel Recommendation method, which enable to discover APIs and provide relevant suggestion for users. The proposed hybrid algorithm is combined content-based filtering and collaborative filtering techniques to improve the accuracy of rating prediction. Finally, experiments are conducted to evaluate the performance of recommendation.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware 恶意软件分类与检测的机器学习技术比较分析
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300081
Maryam Al-Janabi, A. Altamimi
Malicious software, commonly known as malware, is one of the most harmful threats developed by cyber attackers to intentionally cause damage or gaining access to computer systems. Malware has evolved over the years and comes in all shapes with different types and functions depending on the goals of the developer. Virus, Spyware, Bots, and Ransomware are just some examples of malware. While those described above found themselves causing issues by accident, however, they all share one thing in common, harming the system. As a response, many infection treatments and detecting methods have been proposed. The signature-based methods are currently utilized to delete malware; however, these methods cannot provide accurate detection of zero-day attacks and polymorphic viruses. Contrarily, the use of machine learning-based detection has been recognized as one of the most modern and notable methods. Specifically, these methods can be categorized based on their analysis technique into static, dynamic, or hybrid. The purpose of this work was to provide a survey that determines the best features extraction and classification methods that result in the best accuracy in detecting malware. Moreover, a review of representable research papers in this topic is represented with a detailed tabular comparison between them based on their accuracy in detecting malware. Among these methods, the J48 algorithm and Hybrid analysis outperformed the others with the accuracy of 100% in detecting malware in the Windows system. On the other hand, the same accuracy has been achieved in the Android system when employing the Decision Tree algorithm through Dynamic analysis. We believe that this study performs a base for further research in the field of malware analysis with machine learning methods.
恶意软件,通常被称为恶意软件,是网络攻击者开发的最有害的威胁之一,旨在故意造成损害或获取计算机系统的访问权限。恶意软件已经发展了多年,并且根据开发人员的目标,具有不同类型和功能的各种形状。病毒、间谍软件、机器人和勒索软件只是恶意软件的一些例子。虽然上面描述的这些问题都是偶然造成的,但是它们都有一个共同点,那就是损害系统。作为回应,许多感染治疗和检测方法被提出。基于签名的方法目前被用于删除恶意软件;然而,这些方法不能提供零日攻击和多态病毒的准确检测。相反,使用基于机器学习的检测已被认为是最现代和最显著的方法之一。具体来说,这些方法可以根据其分析技术分为静态、动态或混合。这项工作的目的是提供一项调查,以确定最佳特征提取和分类方法,从而在检测恶意软件时达到最佳准确性。此外,回顾了该主题的代表性研究论文,并根据它们在检测恶意软件方面的准确性对它们进行了详细的表格比较。其中,J48算法和Hybrid分析方法在Windows系统下检测恶意软件的准确率达到100%,优于其他方法。另一方面,通过动态分析,采用决策树算法在Android系统中也达到了同样的精度。我们相信这项研究为进一步研究机器学习方法在恶意软件分析领域奠定了基础。
{"title":"A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware","authors":"Maryam Al-Janabi, A. Altamimi","doi":"10.1109/ACIT50332.2020.9300081","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300081","url":null,"abstract":"Malicious software, commonly known as malware, is one of the most harmful threats developed by cyber attackers to intentionally cause damage or gaining access to computer systems. Malware has evolved over the years and comes in all shapes with different types and functions depending on the goals of the developer. Virus, Spyware, Bots, and Ransomware are just some examples of malware. While those described above found themselves causing issues by accident, however, they all share one thing in common, harming the system. As a response, many infection treatments and detecting methods have been proposed. The signature-based methods are currently utilized to delete malware; however, these methods cannot provide accurate detection of zero-day attacks and polymorphic viruses. Contrarily, the use of machine learning-based detection has been recognized as one of the most modern and notable methods. Specifically, these methods can be categorized based on their analysis technique into static, dynamic, or hybrid. The purpose of this work was to provide a survey that determines the best features extraction and classification methods that result in the best accuracy in detecting malware. Moreover, a review of representable research papers in this topic is represented with a detailed tabular comparison between them based on their accuracy in detecting malware. Among these methods, the J48 algorithm and Hybrid analysis outperformed the others with the accuracy of 100% in detecting malware in the Windows system. On the other hand, the same accuracy has been achieved in the Android system when employing the Decision Tree algorithm through Dynamic analysis. We believe that this study performs a base for further research in the field of malware analysis with machine learning methods.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133782891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DNA Sequence Error Corrections based on TensorFlow 基于TensorFlow的DNA序列错误校正
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300094
Hassanin M. Al-Barhamtoshy, R. Younis
The study aims to use artificial intelligent model to accelerate multi-disciplinary sciences such as biology and physics in scientific discoveries to predict protein structure based on its genetic sequences. This paper presents an intelligent model to correct error sequences of the DNA. Therefore, dataset in genome structure will be used to predict error corrections in DNA sequences of proteins. Accordingly, Nucleus library and TensorFlow are integrated and used for these corrections. To correct sequence errors of DNA, three types of errors: insert spurious base, delete of base, and substitute one base by another. The paper will implement a computational deep neural network based on CNN with TensorFlow to correct such DNA sequence errors.
该研究的目的是利用人工智能模型加速生物学和物理学等多学科科学的科学发现,以基因序列为基础预测蛋白质结构。提出了一种DNA错误序列修正的智能模型。因此,基因组结构数据集将用于预测蛋白质DNA序列的错误修正。因此,Nucleus库和TensorFlow被集成并用于这些校正。为了纠正DNA序列错误,有三种类型的错误:插入假碱基、删除碱基和用一个碱基代替另一个碱基。本文将利用TensorFlow实现一个基于CNN的计算深度神经网络来纠正这类DNA序列错误。
{"title":"DNA Sequence Error Corrections based on TensorFlow","authors":"Hassanin M. Al-Barhamtoshy, R. Younis","doi":"10.1109/ACIT50332.2020.9300094","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300094","url":null,"abstract":"The study aims to use artificial intelligent model to accelerate multi-disciplinary sciences such as biology and physics in scientific discoveries to predict protein structure based on its genetic sequences. This paper presents an intelligent model to correct error sequences of the DNA. Therefore, dataset in genome structure will be used to predict error corrections in DNA sequences of proteins. Accordingly, Nucleus library and TensorFlow are integrated and used for these corrections. To correct sequence errors of DNA, three types of errors: insert spurious base, delete of base, and substitute one base by another. The paper will implement a computational deep neural network based on CNN with TensorFlow to correct such DNA sequence errors.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 21st International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1