首页 > 最新文献

2020 21st International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
An IoT Based Healthcare using ECG 基于物联网的ECG医疗保健
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300104
R. Hodrob, Mahmoud Obaid, Abdulsalam Mansour Abdulsalam Mansour, Ali Sawahreh, Mokhles Naghnagheah, Shatha AbuShanab
the reliance of an electrocardiogram system in heart patients is paramount. It is essential to note that electrocardiography is a medical tactic used by doctors to assess the blood circulatory systems of their patients. In this paper we proposed a novel health care based Internet of Things (IoT) system that measures the ECG signal using Healthy-pi HAT, the system measures vital signs and ECG using Raspberry-pi, after that, the data will be sent to a cloud system to analyze it and the data will be saved in the database system. The proposed system has an android app used by the customer, and a web application used by the doctor. Likewise, the framework will advise the nearest clinical center if there should be an occurrence of the patient's unexpected wellbeing disintegration, an SMS for the patient location using GPS will be sent. The way toward investigating the ECG signal depends on extricating its highlights, this will be performed by perusing the P-wave, QRS-complex, and T-wave, these are the three principle waves that ECGs comprise, and a large number of arrhythmia diagnosing depends on these qualities.
心脏病患者对心电图系统的依赖是至关重要的。必须注意的是,心电图是医生用来评估病人血液循环系统的一种医疗策略。本文提出了一种新型的基于医疗保健的物联网(IoT)系统,该系统使用health -pi HAT测量心电信号,系统使用树莓派测量生命体征和心电,然后将数据发送到云系统进行分析,并将数据保存在数据库系统中。该系统有一个由客户使用的android应用程序和一个由医生使用的web应用程序。同样,该框架将向最近的临床中心提供建议,如果患者出现意外的健康解体,将使用GPS发送患者位置的短信。研究心电信号的方法取决于提取其亮点,这将通过仔细研究p波,qrs复合体和t波来完成,这是心电图组成的三个主要波,大量的心律失常诊断依赖于这些特征。
{"title":"An IoT Based Healthcare using ECG","authors":"R. Hodrob, Mahmoud Obaid, Abdulsalam Mansour Abdulsalam Mansour, Ali Sawahreh, Mokhles Naghnagheah, Shatha AbuShanab","doi":"10.1109/ACIT50332.2020.9300104","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300104","url":null,"abstract":"the reliance of an electrocardiogram system in heart patients is paramount. It is essential to note that electrocardiography is a medical tactic used by doctors to assess the blood circulatory systems of their patients. In this paper we proposed a novel health care based Internet of Things (IoT) system that measures the ECG signal using Healthy-pi HAT, the system measures vital signs and ECG using Raspberry-pi, after that, the data will be sent to a cloud system to analyze it and the data will be saved in the database system. The proposed system has an android app used by the customer, and a web application used by the doctor. Likewise, the framework will advise the nearest clinical center if there should be an occurrence of the patient's unexpected wellbeing disintegration, an SMS for the patient location using GPS will be sent. The way toward investigating the ECG signal depends on extricating its highlights, this will be performed by perusing the P-wave, QRS-complex, and T-wave, these are the three principle waves that ECGs comprise, and a large number of arrhythmia diagnosing depends on these qualities.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123865476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Issues in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Review IPv6在低功耗无线个人区域网络(6LoWPAN)上的安全问题综述
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300080
Samson Otieno Ooko, Jamila Kadam'manja, Marie Grace Uwizeye, Dagmawi Lemma
The use of Internet of Things (IoT) is fast growing and more objects need a connection to the internet to extend their capabilities. 6LoWPAN introduces the IPv6 usage to connect IEEE 802.15.4 networks providing a large address space to enable more devices to connect to the internet. Despite the advantages, there are also privacy and security issues that need to be mitigated. This review outlines the 6LoWPAN network architecture, the protocol stack, and its advantages and applications. The security and privacy issues have also been analyzed with solutions and recommendations given.
物联网(IoT)的使用正在快速增长,越来越多的对象需要连接到互联网以扩展其功能。6LoWPAN引入了IPv6的用法来连接IEEE 802.15.4网络,提供了一个大的地址空间,使更多的设备能够连接到互联网。尽管有这些优点,但也存在需要减轻的隐私和安全问题。本文概述了6LoWPAN网络的体系结构、协议栈及其优点和应用。本文还分析了安全和隐私问题,并给出了解决方案和建议。
{"title":"Security Issues in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Review","authors":"Samson Otieno Ooko, Jamila Kadam'manja, Marie Grace Uwizeye, Dagmawi Lemma","doi":"10.1109/ACIT50332.2020.9300080","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300080","url":null,"abstract":"The use of Internet of Things (IoT) is fast growing and more objects need a connection to the internet to extend their capabilities. 6LoWPAN introduces the IPv6 usage to connect IEEE 802.15.4 networks providing a large address space to enable more devices to connect to the internet. Despite the advantages, there are also privacy and security issues that need to be mitigated. This review outlines the 6LoWPAN network architecture, the protocol stack, and its advantages and applications. The security and privacy issues have also been analyzed with solutions and recommendations given.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124286286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating the Lack of Utilization of Information and Communication Technologies in Saudi Schools 调查沙特学校缺乏对信息和通信技术的利用
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300058
Nouf Aljuhani, Elaaf Aljohani, Raghad Alharbi, Rasha Almutairi, Maram Meccawy
Information and Communication Technologies (ICT) make the educational process more efficient by facilitating the imparting of information. Recently, many research and studies asserted that the use of ICT will significantly improve the outcomes of the educational process. Therefore, Saudi Arabia's government invested massively to integrate ICT in the education sector, but the implementation has been disappointing and not achieving the desired goals. Therefore, this study aims to explore the main factors behind the lack of ICT utilization in Saudi schools. Furthermore, the results of this study and the recommendations set forth in this paper will contribute towards the successful utilization of ICT in the education sector of Saudi Arabia and other Arab countries. Data have been collected by conducting semistructured questionnaires and interviews with teachers working at secondary schools in Madinah city. Then, these data have been analyzed by using qualitative and quantitative data analysis methods. The study reveals that there are four main factors behind the lack of ICT utilization, which are: lack of infrastructure and technical support, lack of ICT management and strategies, lack of ICT training courses, and negative teachers' attitudes and beliefs towards utilization of ICT. In conclusion, we provide some recommendations that contribute to overcoming these factors and promoting the full usage of ICT in the educational process.
信息和通信技术(ICT)通过促进信息的传授,使教育过程更有效率。最近,许多研究断言,使用信息通信技术将显著改善教育过程的结果。因此,沙特阿拉伯政府投入大量资金将ICT整合到教育部门,但实施情况令人失望,没有达到预期目标。因此,本研究旨在探讨沙特学校缺乏ICT利用背后的主要因素。此外,本研究的结果和本文提出的建议将有助于在沙特阿拉伯和其他阿拉伯国家的教育部门成功利用信息和通信技术。通过对在麦地那市中学工作的教师进行半结构化问卷调查和访谈收集了数据。然后,运用定性和定量的数据分析方法对这些数据进行分析。研究发现,ICT利用不足的主要原因有四个:缺乏基础设施和技术支持,缺乏ICT管理和策略,缺乏ICT培训课程,以及教师对ICT利用的消极态度和信念。最后,我们提出了一些建议,有助于克服这些因素,促进信息通信技术在教育过程中的充分利用。
{"title":"Investigating the Lack of Utilization of Information and Communication Technologies in Saudi Schools","authors":"Nouf Aljuhani, Elaaf Aljohani, Raghad Alharbi, Rasha Almutairi, Maram Meccawy","doi":"10.1109/ACIT50332.2020.9300058","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300058","url":null,"abstract":"Information and Communication Technologies (ICT) make the educational process more efficient by facilitating the imparting of information. Recently, many research and studies asserted that the use of ICT will significantly improve the outcomes of the educational process. Therefore, Saudi Arabia's government invested massively to integrate ICT in the education sector, but the implementation has been disappointing and not achieving the desired goals. Therefore, this study aims to explore the main factors behind the lack of ICT utilization in Saudi schools. Furthermore, the results of this study and the recommendations set forth in this paper will contribute towards the successful utilization of ICT in the education sector of Saudi Arabia and other Arab countries. Data have been collected by conducting semistructured questionnaires and interviews with teachers working at secondary schools in Madinah city. Then, these data have been analyzed by using qualitative and quantitative data analysis methods. The study reveals that there are four main factors behind the lack of ICT utilization, which are: lack of infrastructure and technical support, lack of ICT management and strategies, lack of ICT training courses, and negative teachers' attitudes and beliefs towards utilization of ICT. In conclusion, we provide some recommendations that contribute to overcoming these factors and promoting the full usage of ICT in the educational process.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124292402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm 基于聚类有效性和K-means算法的类分解评价
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300084
Bilal I. Sowan, N. Matar, Firas Omar, Mohammad Alauthman, Mohammed Eshtay
A class decomposition is one of the possible solutions and the most important factors of success for the improvement of classification performance. The idea is to transform a dataset by categorizing each class label into groups or clusters. Thus, the transformation is done concerning data characteristics and similarities. This paper proposed a hybrid model for a class decomposition by the integration of gap statistic, k-means clustering algorithm, and Naive Bayes classifier. The model is based on clustering validity using gap statistic for enhancing the classifier performance. The model works by dividing each dataset into several subsets regarding its class labels. After that, the clustering validity using gap statistic is employed for estimating the optimal number of clusters for each subset that belong to a particular class label. The estimated number of clusters is used then as an input parameter for the k-means clustering algorithm for relabeling the data objects with a new class label in each subset. Every data object is allocated to each of the clusters generated by the k-means clustering algorithm, which consider it as the new class label. The proposed model integrates the class decomposition approach with Naive Bayes classifier to compare the performance of the proposed model under several classification measures. The model is validated and evaluated by employing different real-world datasets collected from the UCI machine learning repository. The experimental results show that a significant improvement in classification accuracy and F-measure when the class decomposition is applied. Also, the experiments indicate that using a class decomposition is not appropriate for all datasets.
类分解是一种可能的解决方案,也是成功提高分类性能的最重要因素。其思想是通过将每个类标签分类为组或簇来转换数据集。因此,根据数据的特征和相似度进行转换。本文提出了一种结合间隙统计、k-means聚类算法和朴素贝叶斯分类器的混合分类模型。该模型基于聚类有效性,利用间隙统计来提高分类器的性能。该模型通过将每个数据集根据其类标签划分为几个子集来工作。然后,使用间隙统计的聚类有效性来估计属于特定类标签的每个子集的最优聚类数量。然后使用估计的簇数作为k-means聚类算法的输入参数,用于在每个子集中使用新的类标签重新标记数据对象。将每个数据对象分配给k-means聚类算法生成的每个聚类,并将其作为新的类标号。该模型将分类分解方法与朴素贝叶斯分类器相结合,比较了该模型在几种分类度量下的性能。该模型通过使用从UCI机器学习存储库收集的不同真实数据集进行验证和评估。实验结果表明,采用分类分解方法后,分类精度和f测度都有了显著提高。实验还表明,类分解并不适用于所有的数据集。
{"title":"Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm","authors":"Bilal I. Sowan, N. Matar, Firas Omar, Mohammad Alauthman, Mohammed Eshtay","doi":"10.1109/ACIT50332.2020.9300084","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300084","url":null,"abstract":"A class decomposition is one of the possible solutions and the most important factors of success for the improvement of classification performance. The idea is to transform a dataset by categorizing each class label into groups or clusters. Thus, the transformation is done concerning data characteristics and similarities. This paper proposed a hybrid model for a class decomposition by the integration of gap statistic, k-means clustering algorithm, and Naive Bayes classifier. The model is based on clustering validity using gap statistic for enhancing the classifier performance. The model works by dividing each dataset into several subsets regarding its class labels. After that, the clustering validity using gap statistic is employed for estimating the optimal number of clusters for each subset that belong to a particular class label. The estimated number of clusters is used then as an input parameter for the k-means clustering algorithm for relabeling the data objects with a new class label in each subset. Every data object is allocated to each of the clusters generated by the k-means clustering algorithm, which consider it as the new class label. The proposed model integrates the class decomposition approach with Naive Bayes classifier to compare the performance of the proposed model under several classification measures. The model is validated and evaluated by employing different real-world datasets collected from the UCI machine learning repository. The experimental results show that a significant improvement in classification accuracy and F-measure when the class decomposition is applied. Also, the experiments indicate that using a class decomposition is not appropriate for all datasets.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Hybrid Shape Moment Invariant Techniques for Face Identification in Thermal and Visible Visions 一种基于热视觉和视觉的混合形状不变人脸识别技术
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300069
S. Hamandi, A. M. Rahma, R. Hassan
Presently, the extraction of robust facial features is becoming very effective for accurate face recognition especially for smart security surveillance systems. This paper investigates three different moment invariants techniques for robust facial features extraction and then determine how each one of these moments is affected by whether the face image was thermal or on a greyscale with the proposal of a hybrid technique that deals with the robust descriptors of each method. This hybrid technique has improved the results and gave robust facial features for face identification. A feed-forward neural network is trained with these moments' features where the recognized faces are classified to one of the basic faces of IRIS and CARL face datasets which achieved high accuracy reaching 98.1% for thermal images and 81.2% for grey images.
目前,鲁棒性人脸特征的提取是实现准确人脸识别的重要手段,尤其是在智能安防监控系统中。本文研究了三种不同的矩不变量鲁棒人脸特征提取技术,然后确定了每个矩是如何受到人脸图像是热图像还是灰度图像的影响,并提出了一种处理每种方法鲁棒描述子的混合技术。这种混合技术改善了结果,并为人脸识别提供了鲁棒的面部特征。利用这些矩量特征训练前馈神经网络,将识别的人脸分类为IRIS和CARL人脸数据集的基本人脸之一,热图像和灰度图像的识别准确率分别达到98.1%和81.2%。
{"title":"A New Hybrid Shape Moment Invariant Techniques for Face Identification in Thermal and Visible Visions","authors":"S. Hamandi, A. M. Rahma, R. Hassan","doi":"10.1109/ACIT50332.2020.9300069","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300069","url":null,"abstract":"Presently, the extraction of robust facial features is becoming very effective for accurate face recognition especially for smart security surveillance systems. This paper investigates three different moment invariants techniques for robust facial features extraction and then determine how each one of these moments is affected by whether the face image was thermal or on a greyscale with the proposal of a hybrid technique that deals with the robust descriptors of each method. This hybrid technique has improved the results and gave robust facial features for face identification. A feed-forward neural network is trained with these moments' features where the recognized faces are classified to one of the basic faces of IRIS and CARL face datasets which achieved high accuracy reaching 98.1% for thermal images and 81.2% for grey images.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Keystroke Identifier Using Fuzzy Logic to Increase Password Security 使用模糊逻辑的击键标识符提高密码安全性
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300107
A. Shaout, Nathan Schmidt
Cybersecurity is a major issue today. It is predicted that cybercrime will cost the world $6 trillion annually by 2021. It is important to make logins secure as well as to make advances in security in order to catch cybercriminals. This paper will design and create a device that will use Fuzzy logic to identify a person by the rhythm and frequency of their typing. The device will take data from a user from a normal password entry session. This data will be used to make a Fuzzy system that will be able to identify the user by their typing speed. An application of this project could be used to make a more secure log-in system for a user. The log-in system would not only check that the correct password was entered but also that the rhythm of how the password was typed matched the user. Another application of this system could be used to help catch cybercriminals. A cybercriminal may have a certain rhythm at which they type at and this could be used like a fingerprint to help officials locate cybercriminals.
网络安全是当今的一个主要问题。据预测,到2021年,网络犯罪将使全球每年损失6万亿美元。重要的是确保登录安全以及在安全方面取得进展,以便抓住网络罪犯。本文将设计和创建一个设备,将使用模糊逻辑来识别一个人的节奏和频率,他们的打字。该设备将从普通密码输入会话中获取用户的数据。这些数据将被用来制作一个模糊系统,该系统将能够通过用户的打字速度来识别用户。这个项目的一个应用程序可以用来为用户制作一个更安全的登录系统。登录系统不仅会检查输入的密码是否正确,还会检查输入密码的节奏是否与用户相符。该系统的另一个应用是帮助抓捕网络罪犯。网络罪犯可能有一定的打字节奏,这可以像指纹一样用来帮助官员定位网络罪犯。
{"title":"Keystroke Identifier Using Fuzzy Logic to Increase Password Security","authors":"A. Shaout, Nathan Schmidt","doi":"10.1109/ACIT50332.2020.9300107","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300107","url":null,"abstract":"Cybersecurity is a major issue today. It is predicted that cybercrime will cost the world $6 trillion annually by 2021. It is important to make logins secure as well as to make advances in security in order to catch cybercriminals. This paper will design and create a device that will use Fuzzy logic to identify a person by the rhythm and frequency of their typing. The device will take data from a user from a normal password entry session. This data will be used to make a Fuzzy system that will be able to identify the user by their typing speed. An application of this project could be used to make a more secure log-in system for a user. The log-in system would not only check that the correct password was entered but also that the rhythm of how the password was typed matched the user. Another application of this system could be used to help catch cybercriminals. A cybercriminal may have a certain rhythm at which they type at and this could be used like a fingerprint to help officials locate cybercriminals.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114248370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A WebGIS Decision Support System for Wadi El Natrun Rural Land Management Wadi El Natrun农村土地管理的WebGIS决策支持系统
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300106
Sayed Ahmed, A. Kotb, Ehab Samir, M. Moustafa, E. Farg, Ahmed Abd Elhay, S. Arafat
Recently, the Egyptian government benefits from the digital transformation by developing different platforms to help manage and monitor the routine process. Rural land management is one of the critical issues that could significantly improve the economy. As far as we know, rural land management affects farmers and may cause agricultural land loss and waste of irrigation resources. Many attempts have been investigated to address this issue in Egypt. Therefore, we design and implement a WebGIS decision support system for rural land management in Wadi El-Natrun valley (WNDSS), El-Beheria governorate. The proposed WNDSS was developed using the client/server model and contains several functions, including data extraction, statistical analysis, and visualization via an interactive map. RESTful Web Service Application Programming Interfaces (APIs) were utilized as the communication interface between client and server. Finally, we use the browser to get the data by predefined API and to present the rural farms with Google Map API and jQuery JavaScript library. The online system provides several tools for governorate managers to (a) precise survey data, (b) powerful change detection suite, (c) Normalized Difference Vegetation Index (NDVI) multi-temporal,(d) multi-date land use land cover information, (e) statistics reporting tools, (f) tabular or spatial query for associated data.
最近,埃及政府从数字化转型中受益,开发了不同的平台来帮助管理和监控日常流程。农村土地管理是能够显著改善经济的关键问题之一。据我们所知,农村土地管理影响农民,可能造成农业用地流失和灌溉资源浪费。为了在埃及解决这一问题,已经调查了许多尝试。因此,我们在El-Beheria省Wadi El-Natrun河谷(WNDSS)设计并实现了一个用于农村土地管理的WebGIS决策支持系统。WNDSS采用客户端/服务器模型开发,包含数据提取、统计分析和交互式地图可视化等功能。采用RESTful Web服务应用程序编程接口(api)作为客户端和服务器之间的通信接口。最后,我们使用浏览器通过预定义的API获取数据,并使用谷歌Map API和jQuery JavaScript库呈现农村农场。在线系统为省管理者提供了几种工具,以(a)精确的调查数据,(b)强大的变化检测套件,(c)标准化植被指数(NDVI)多时相,(d)多日期土地利用和土地覆盖信息,(e)统计报告工具,(f)相关数据的表格或空间查询。
{"title":"A WebGIS Decision Support System for Wadi El Natrun Rural Land Management","authors":"Sayed Ahmed, A. Kotb, Ehab Samir, M. Moustafa, E. Farg, Ahmed Abd Elhay, S. Arafat","doi":"10.1109/ACIT50332.2020.9300106","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300106","url":null,"abstract":"Recently, the Egyptian government benefits from the digital transformation by developing different platforms to help manage and monitor the routine process. Rural land management is one of the critical issues that could significantly improve the economy. As far as we know, rural land management affects farmers and may cause agricultural land loss and waste of irrigation resources. Many attempts have been investigated to address this issue in Egypt. Therefore, we design and implement a WebGIS decision support system for rural land management in Wadi El-Natrun valley (WNDSS), El-Beheria governorate. The proposed WNDSS was developed using the client/server model and contains several functions, including data extraction, statistical analysis, and visualization via an interactive map. RESTful Web Service Application Programming Interfaces (APIs) were utilized as the communication interface between client and server. Finally, we use the browser to get the data by predefined API and to present the rural farms with Google Map API and jQuery JavaScript library. The online system provides several tools for governorate managers to (a) precise survey data, (b) powerful change detection suite, (c) Normalized Difference Vegetation Index (NDVI) multi-temporal,(d) multi-date land use land cover information, (e) statistics reporting tools, (f) tabular or spatial query for associated data.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115065480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Fault Tolerance Mechanism for an IoT Healthcare system 物联网医疗系统的分布式容错机制
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300103
M. Zaiter, S. Hacini
IoT environment is one of important upshots of IT development; it offers comfort to human daily life. We are interested in our paper in the healthcare IoT field which aims to remotely monitor the patient's health state using a set of physiological IoT sensors. In IoT systems dependability is a strong constraint because the fault occurrence can have a bad consequence on human life. The fault tolerance is one of the mechanisms that can insure a dependable function of the IoT healthcare system. To do this, we improve in this paper the centralized agent based architecture [1] by proposing more robust distributed one. That is by eliminating the weakness due to the centralization of the control. This upgrading is motivated by the fact that the current improvement of the network technologies and the occurrence of new promising paradigms like edge computing and 5G [2] require different reasoning philosophy.
物联网环境是IT发展的重要成果之一;它为人类的日常生活提供了安慰。我们对医疗物联网领域的论文感兴趣,该论文旨在使用一组生理物联网传感器远程监控患者的健康状态。在物联网系统中,可靠性是一个很强的约束条件,因为故障的发生可能会对人类的生命造成严重后果。容错是确保物联网医疗系统可靠运行的机制之一。为此,我们在本文中改进了基于集中式代理的体系结构[1],提出了更健壮的分布式体系结构。这是通过消除由于集中控制而造成的弱点。这种升级的动机是,当前网络技术的改进以及边缘计算和5G[2]等新的有前途的范式的出现需要不同的推理哲学。
{"title":"A Distributed Fault Tolerance Mechanism for an IoT Healthcare system","authors":"M. Zaiter, S. Hacini","doi":"10.1109/ACIT50332.2020.9300103","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300103","url":null,"abstract":"IoT environment is one of important upshots of IT development; it offers comfort to human daily life. We are interested in our paper in the healthcare IoT field which aims to remotely monitor the patient's health state using a set of physiological IoT sensors. In IoT systems dependability is a strong constraint because the fault occurrence can have a bad consequence on human life. The fault tolerance is one of the mechanisms that can insure a dependable function of the IoT healthcare system. To do this, we improve in this paper the centralized agent based architecture [1] by proposing more robust distributed one. That is by eliminating the weakness due to the centralization of the control. This upgrading is motivated by the fact that the current improvement of the network technologies and the occurrence of new promising paradigms like edge computing and 5G [2] require different reasoning philosophy.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133736286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social-aware Web API Recommendation in IoT 物联网中社交感知Web API推荐
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300092
Marwa Meissa, Saber Benharzallah, L. Kahloul, O. Kazar
The core idea of IoT is the connectivity of real-world devices to the Internet, which allows them to expose their functionalities in APIs ways, communicate to other entities, and flow their data over internet. With the massive growth of connected IoT devices, the number of APIs have also increased. Thus, led up to overload information problem, which is making APIs selection more and more difficult for devices owners and users. Therefore, this paper propose web APIs recommendation framework in IoT environment based on social relationships. The main purpose is providing a novel Recommendation method, which enable to discover APIs and provide relevant suggestion for users. The proposed hybrid algorithm is combined content-based filtering and collaborative filtering techniques to improve the accuracy of rating prediction. Finally, experiments are conducted to evaluate the performance of recommendation.
物联网的核心思想是将现实世界的设备连接到互联网,这使得它们能够以api的方式暴露其功能,与其他实体通信,并通过互联网传输数据。随着连接物联网设备的大量增长,api的数量也在增加。这就导致了信息过载的问题,使得设备所有者和用户越来越难以选择api。因此,本文提出了物联网环境下基于社会关系的web api推荐框架。主要目的是提供一种新颖的推荐方法,能够发现api并为用户提供相关的建议。该混合算法将基于内容的过滤和协同过滤技术相结合,提高了评级预测的准确性。最后,通过实验对推荐的性能进行了评价。
{"title":"Social-aware Web API Recommendation in IoT","authors":"Marwa Meissa, Saber Benharzallah, L. Kahloul, O. Kazar","doi":"10.1109/ACIT50332.2020.9300092","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300092","url":null,"abstract":"The core idea of IoT is the connectivity of real-world devices to the Internet, which allows them to expose their functionalities in APIs ways, communicate to other entities, and flow their data over internet. With the massive growth of connected IoT devices, the number of APIs have also increased. Thus, led up to overload information problem, which is making APIs selection more and more difficult for devices owners and users. Therefore, this paper propose web APIs recommendation framework in IoT environment based on social relationships. The main purpose is providing a novel Recommendation method, which enable to discover APIs and provide relevant suggestion for users. The proposed hybrid algorithm is combined content-based filtering and collaborative filtering techniques to improve the accuracy of rating prediction. Finally, experiments are conducted to evaluate the performance of recommendation.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DNA Sequence Error Corrections based on TensorFlow 基于TensorFlow的DNA序列错误校正
Pub Date : 2020-11-28 DOI: 10.1109/ACIT50332.2020.9300094
Hassanin M. Al-Barhamtoshy, R. Younis
The study aims to use artificial intelligent model to accelerate multi-disciplinary sciences such as biology and physics in scientific discoveries to predict protein structure based on its genetic sequences. This paper presents an intelligent model to correct error sequences of the DNA. Therefore, dataset in genome structure will be used to predict error corrections in DNA sequences of proteins. Accordingly, Nucleus library and TensorFlow are integrated and used for these corrections. To correct sequence errors of DNA, three types of errors: insert spurious base, delete of base, and substitute one base by another. The paper will implement a computational deep neural network based on CNN with TensorFlow to correct such DNA sequence errors.
该研究的目的是利用人工智能模型加速生物学和物理学等多学科科学的科学发现,以基因序列为基础预测蛋白质结构。提出了一种DNA错误序列修正的智能模型。因此,基因组结构数据集将用于预测蛋白质DNA序列的错误修正。因此,Nucleus库和TensorFlow被集成并用于这些校正。为了纠正DNA序列错误,有三种类型的错误:插入假碱基、删除碱基和用一个碱基代替另一个碱基。本文将利用TensorFlow实现一个基于CNN的计算深度神经网络来纠正这类DNA序列错误。
{"title":"DNA Sequence Error Corrections based on TensorFlow","authors":"Hassanin M. Al-Barhamtoshy, R. Younis","doi":"10.1109/ACIT50332.2020.9300094","DOIUrl":"https://doi.org/10.1109/ACIT50332.2020.9300094","url":null,"abstract":"The study aims to use artificial intelligent model to accelerate multi-disciplinary sciences such as biology and physics in scientific discoveries to predict protein structure based on its genetic sequences. This paper presents an intelligent model to correct error sequences of the DNA. Therefore, dataset in genome structure will be used to predict error corrections in DNA sequences of proteins. Accordingly, Nucleus library and TensorFlow are integrated and used for these corrections. To correct sequence errors of DNA, three types of errors: insert spurious base, delete of base, and substitute one base by another. The paper will implement a computational deep neural network based on CNN with TensorFlow to correct such DNA sequence errors.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 21st International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1