首页 > 最新文献

2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)最新文献

英文 中文
Optimizing stock market price prediction using a hybrid approach based on HP filter and support vector regression 基于HP滤波和支持向量回归的混合方法优化股票市场价格预测
Meryem Ouahilal, M. E. Mohajir, M. Chahhou, Badr Eddine El Mohajir
Predicting stock prices is an important task of financial time series forecasting, which is of great interest to stock investors, stock traders and applied researchers. Many machine learning techniques have been used in recent times to predict the stock price, including regression algorithms which can be useful tools to provide good accuracy of financial time series forecasting. In this paper, we propose a novel hybrid approach which combines Support Vector Regression and Hodrick-Prescott filter in order to optimize the prediction of stock price. To assess the performance of this proposed approach, we have conducted several experiments using Maroc Telecom (IAM) financial time series. It is daily data collected during the period between 2004 and 2016. The experimental results confirm that the proposed model is more powerful in term of predicting stock prices.
股票价格预测是金融时间序列预测的一项重要任务,是股票投资者、股票交易者和应用研究人员非常感兴趣的问题。近年来,许多机器学习技术被用于预测股票价格,包括回归算法,它可以提供良好的金融时间序列预测准确性。本文提出了一种将支持向量回归与Hodrick-Prescott滤波相结合的新型混合方法来优化股票价格预测。为了评估这种方法的性能,我们使用摩洛哥电信(IAM)金融时间序列进行了几次实验。这是2004年至2016年期间每天收集的数据。实验结果表明,该模型在股票价格预测方面具有较强的预测能力。
{"title":"Optimizing stock market price prediction using a hybrid approach based on HP filter and support vector regression","authors":"Meryem Ouahilal, M. E. Mohajir, M. Chahhou, Badr Eddine El Mohajir","doi":"10.1109/CIST.2016.7805059","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805059","url":null,"abstract":"Predicting stock prices is an important task of financial time series forecasting, which is of great interest to stock investors, stock traders and applied researchers. Many machine learning techniques have been used in recent times to predict the stock price, including regression algorithms which can be useful tools to provide good accuracy of financial time series forecasting. In this paper, we propose a novel hybrid approach which combines Support Vector Regression and Hodrick-Prescott filter in order to optimize the prediction of stock price. To assess the performance of this proposed approach, we have conducted several experiments using Maroc Telecom (IAM) financial time series. It is daily data collected during the period between 2004 and 2016. The experimental results confirm that the proposed model is more powerful in term of predicting stock prices.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122239660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Automation in code generation: Tertiary and systematic mapping review 代码生成中的自动化:第三次和系统的映射评审
Zouhair Ibn Batouta, R. Dehbi, M. Talea, Omar Hajoui
Automation and generation of complex solutions is a flowering field that is gaining ground day by day to this the need for a study to collect all the recent research development in this area. In fact, the research is very abundant in some point that research have not away or who are just redundant. The overall objective of this paper is to plot the landscape of published proposals in the field of automation and code generation, without restricting the search neither to a specific context nor to a particular programming language. We decide in our article to combine two interesting approaches which permit to focus effectively a given field: Tertiary review and Systematic mapping review; this combination is very constructive and allow us to enlarge and feed our study. Our review is based on a comprehensive set of 2450 selected resources over 6223 studies that were initially identified: 2347 secondary articles, and 103 primary articles selected. As a result of our study we conclude that there is need for research that validates and evaluates the existing proposals.
自动化和复杂解决方案的生成是一个开花的领域,正在日益取得进展,因此需要一项研究来收集该领域所有最新的研究进展。事实上,在某些方面的研究是非常丰富的,研究没有消失或只是多余的。本文的总体目标是绘制自动化和代码生成领域中已发布的建议的景观,而不限制搜索到特定的上下文或特定的编程语言。在我们的文章中,我们决定结合两种有趣的方法来有效地关注一个给定的领域:三级审查和系统映射审查;这种结合是非常有建设性的,可以扩大和充实我们的学习。我们的综述是基于最初确定的6223项研究的2450个精选资源的综合集:2347篇次要文章和103篇主要文章。根据我们的研究,我们得出结论,有必要进行研究,以验证和评估现有的建议。
{"title":"Automation in code generation: Tertiary and systematic mapping review","authors":"Zouhair Ibn Batouta, R. Dehbi, M. Talea, Omar Hajoui","doi":"10.1109/CIST.2016.7805042","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805042","url":null,"abstract":"Automation and generation of complex solutions is a flowering field that is gaining ground day by day to this the need for a study to collect all the recent research development in this area. In fact, the research is very abundant in some point that research have not away or who are just redundant. The overall objective of this paper is to plot the landscape of published proposals in the field of automation and code generation, without restricting the search neither to a specific context nor to a particular programming language. We decide in our article to combine two interesting approaches which permit to focus effectively a given field: Tertiary review and Systematic mapping review; this combination is very constructive and allow us to enlarge and feed our study. Our review is based on a comprehensive set of 2450 selected resources over 6223 studies that were initially identified: 2347 secondary articles, and 103 primary articles selected. As a result of our study we conclude that there is need for research that validates and evaluates the existing proposals.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124701672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A MAS model for O&M cost simulation and optimization: Case of a wind power operator 面向运维成本仿真与优化的MAS模型:以某风电运营商为例
Miguel Kpakpo, M. Itmi
The aim of this work in progress is to define a MAS model for cost optimization in an industrial environment. The system, a decision support instrument, must provide alerts and tips that maximize the benefits. In the following we highlight the MAS details. We mainly present the agents and give a detailed description for each one with its goals and its environment. The system purpose is to optimize the wind farms O&M cost.
这项正在进行的工作的目的是为工业环境中的成本优化定义一个MAS模型。该系统作为一种决策支持工具,必须提供警报和提示,使效益最大化。下面我们将重点介绍MAS的细节。我们主要介绍了代理,并对每个代理的目标和环境进行了详细的描述。该系统的目的是优化风电场的运维成本。
{"title":"A MAS model for O&M cost simulation and optimization: Case of a wind power operator","authors":"Miguel Kpakpo, M. Itmi","doi":"10.1109/CIST.2016.7804974","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804974","url":null,"abstract":"The aim of this work in progress is to define a MAS model for cost optimization in an industrial environment. The system, a decision support instrument, must provide alerts and tips that maximize the benefits. In the following we highlight the MAS details. We mainly present the agents and give a detailed description for each one with its goals and its environment. The system purpose is to optimize the wind farms O&M cost.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124923634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Timed distributed testing rules for the distributed test architecture 分布式测试体系结构的定时分布式测试规则
M. E. H. Charaf, Salma Azzouzi
The paper presents some technical issues for testing distributed systems. The proposed approach consists on exploring the temporal properties that specify the time required to exchange messages between the various components of the distributed test application. Thereby taking into consideration the temporal properties in the specification of the behavior of conformance testing, it will provide a higher degree of expressiveness and flexibility. In other side, the paper show how to cope with problems encountered in distributed testing using timed distributed testing rules. Afterwards, we present our algorithm allowing the generation of such rules and a prototype of test using a Distributed Algorithmic and Rule-Based System (DARBS).
本文介绍了分布式系统测试中的一些技术问题。建议的方法包括探索指定在分布式测试应用程序的各个组件之间交换消息所需时间的时间属性。因此,考虑到一致性测试行为规范中的时间属性,它将提供更高程度的表达性和灵活性。另一方面,介绍了如何利用定时分布式测试规则处理分布式测试中遇到的问题。随后,我们提出了允许生成此类规则的算法和使用分布式算法和基于规则的系统(DARBS)的测试原型。
{"title":"Timed distributed testing rules for the distributed test architecture","authors":"M. E. H. Charaf, Salma Azzouzi","doi":"10.1109/CIST.2016.7805063","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805063","url":null,"abstract":"The paper presents some technical issues for testing distributed systems. The proposed approach consists on exploring the temporal properties that specify the time required to exchange messages between the various components of the distributed test application. Thereby taking into consideration the temporal properties in the specification of the behavior of conformance testing, it will provide a higher degree of expressiveness and flexibility. In other side, the paper show how to cope with problems encountered in distributed testing using timed distributed testing rules. Afterwards, we present our algorithm allowing the generation of such rules and a prototype of test using a Distributed Algorithmic and Rule-Based System (DARBS).","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A security scheme for mobile cloud using multi-agents system 基于多代理系统的移动云安全方案
Abderrahim Abdellaoui, Anas Laksantini, H. Chaoui
With The advent of technologies such as 4G 5G, Smartphone and cloud computing, a new technology has emerged it is the mobile cloud computing. It's a concept that exploits the benefits of cloud computing in order to overcome some problems related to mobile systems such as computing capability, searching, and multimedia processing. However, the second architecture of mobile cloud computing composed of a cluster of mobile devices suffers from some security problems such as user's privacy when different node communicate with each other. Therefore, and in order to overcome this problem we propose to secure this architecture by integrating a multi-agents system which provides the required intelligence level so as to overcome privacy, availability issues and to support the computing performance.
随着4G、5G、智能手机、云计算等技术的出现,一种新的技术应运而生,这就是移动云计算。这是一个利用云计算的好处来克服与移动系统相关的一些问题的概念,如计算能力、搜索和多媒体处理。然而,由移动设备集群组成的移动云计算第二种架构在不同节点间通信时存在用户隐私等安全问题。因此,为了克服这个问题,我们提出通过集成一个多代理系统来保护这个体系结构,该系统提供了所需的智能水平,以克服隐私、可用性问题并支持计算性能。
{"title":"A security scheme for mobile cloud using multi-agents system","authors":"Abderrahim Abdellaoui, Anas Laksantini, H. Chaoui","doi":"10.1109/CIST.2016.7804959","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804959","url":null,"abstract":"With The advent of technologies such as 4G 5G, Smartphone and cloud computing, a new technology has emerged it is the mobile cloud computing. It's a concept that exploits the benefits of cloud computing in order to overcome some problems related to mobile systems such as computing capability, searching, and multimedia processing. However, the second architecture of mobile cloud computing composed of a cluster of mobile devices suffers from some security problems such as user's privacy when different node communicate with each other. Therefore, and in order to overcome this problem we propose to secure this architecture by integrating a multi-agents system which provides the required intelligence level so as to overcome privacy, availability issues and to support the computing performance.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A hybrid scheme for robust color image watermarking using DSWT in DCT domain 一种基于DCT域DSWT的混合鲁棒彩色图像水印方案
Khalid A. Al-Afandy, O. Faragallah, S. El-Rabaie, F. El-Samie, Ahmed Elmhalawy
This paper proposes a hybrid robust image watermarking scheme based on three levels of Discrete Stationary Wavelet Transform (DSWT) in the Discrete Cosine Transform (DCT) domain. The host image colors (red, green and blue) are separated, and then the DCT is applied on each color after separation. The DSWT is utilized to divide the DCT output into four sub-bands (3 levels). These sub-bands are (A, H, V, D) matrices with the same image size. The watermark is embedded on matrix A. The results of the proposed watermarking scheme are compared with other state-of-the-art schemes. The comparison is based on visualization to detect any degradation of the watermarked image, Peak Signal-to-Noise Ratio (PSNR) of the watermarked image, Normal Correlation (NC) of the extracted watermark after detection, applying attacks, and then calculating the PSNR and NC.
提出了一种基于离散余弦变换域中三阶离散平稳小波变换(DSWT)的混合鲁棒图像水印方案。将主图像颜色(红、绿、蓝)分离,分离后对每种颜色应用DCT。利用DSWT将DCT输出分为四个子带(3个电平)。这些子带是具有相同图像大小的(A, H, V, D)矩阵。将水印嵌入到矩阵a中,并将所提水印方案的结果与其他最先进的方案进行了比较。基于可视化方法检测水印图像的退化程度,检测水印图像的峰值信噪比(PSNR),检测后提取的水印的正态相关(NC),应用攻击,然后计算PSNR和NC。
{"title":"A hybrid scheme for robust color image watermarking using DSWT in DCT domain","authors":"Khalid A. Al-Afandy, O. Faragallah, S. El-Rabaie, F. El-Samie, Ahmed Elmhalawy","doi":"10.1109/CIST.2016.7805088","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805088","url":null,"abstract":"This paper proposes a hybrid robust image watermarking scheme based on three levels of Discrete Stationary Wavelet Transform (DSWT) in the Discrete Cosine Transform (DCT) domain. The host image colors (red, green and blue) are separated, and then the DCT is applied on each color after separation. The DSWT is utilized to divide the DCT output into four sub-bands (3 levels). These sub-bands are (A, H, V, D) matrices with the same image size. The watermark is embedded on matrix A. The results of the proposed watermarking scheme are compared with other state-of-the-art schemes. The comparison is based on visualization to detect any degradation of the watermarked image, Peak Signal-to-Noise Ratio (PSNR) of the watermarked image, Normal Correlation (NC) of the extracted watermark after detection, applying attacks, and then calculating the PSNR and NC.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Visual sentiment prediction with transfer learning and big data analytics for smart cities 智能城市的视觉情感预测与迁移学习和大数据分析
K. B. Ahmed, M. Bouhorma, M. B. Ahmed, A. Radenski
Internet of things and social media platforms have changed the way people communicate and express themselves. People are now sharing their experiences and views in blogs, micro-blogs, comments, photos, videos, and other postings in social sites. It has been recognized that timely reactions to public opinions and sentiments and its proper use by city governments are of paramount importance to their missions. Despite of the widely recognized potential of sentiment analysis, relatively little is known about how to best harness its potential benefits for smart cities. The objective of this article is to help fill the void by reviewing the state of the art and opportunities of data sources and applications of sentiment analysis for smart cities. Additionally, The article explores deep features of photos shared by users in Twitter via transfer learning. Thus revealing interesting research opportunities and applications.
物联网和社交媒体平台改变了人们交流和表达自己的方式。人们现在在博客、微博、评论、照片、视频和社交网站上的其他帖子上分享他们的经历和观点。人们已经认识到,城市政府对公众意见和情绪的及时反应及其适当利用对其任务至关重要。尽管情绪分析的潜力得到了广泛认可,但人们对如何最好地利用其对智慧城市的潜在好处知之甚少。本文的目的是通过回顾智能城市的数据源和情感分析应用的最新技术和机会来帮助填补这一空白。此外,本文还通过迁移学习对Twitter用户分享的照片的深层特征进行了探索。从而揭示了有趣的研究机会和应用。
{"title":"Visual sentiment prediction with transfer learning and big data analytics for smart cities","authors":"K. B. Ahmed, M. Bouhorma, M. B. Ahmed, A. Radenski","doi":"10.1109/CIST.2016.7804997","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804997","url":null,"abstract":"Internet of things and social media platforms have changed the way people communicate and express themselves. People are now sharing their experiences and views in blogs, micro-blogs, comments, photos, videos, and other postings in social sites. It has been recognized that timely reactions to public opinions and sentiments and its proper use by city governments are of paramount importance to their missions. Despite of the widely recognized potential of sentiment analysis, relatively little is known about how to best harness its potential benefits for smart cities. The objective of this article is to help fill the void by reviewing the state of the art and opportunities of data sources and applications of sentiment analysis for smart cities. Additionally, The article explores deep features of photos shared by users in Twitter via transfer learning. Thus revealing interesting research opportunities and applications.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Handling alerts for intrusion detection system using stateful pattern matching 使用有状态模式匹配处理入侵检测系统的警报
El Mostapha Chakir, Y. I. Khamlichi, M. Moughit
Over the years, network intrusion detection systems have evolved to handle varying types of threats. These days, network managers expect network intrusion detection systems (IDS) to detect attacks and include anomaly-awareness, in addition to handling older threats that haven't disappeared. Researchers have proposed different methods and algorithms to improve intrusion detection systems (IDS). There are different types of these systems, most of them are capable of detecting many attacks, but cannot provide a clear idea to the analyst because of the huge number of the false alerts generated by these systems. This weakness has led to the emergence of many methods in which to deal with these alerts. The aim of conducted research in thisfield is to propose a new technique to handle the alerts, to reduce them and distinguish real attacks from false alerts and low importance events. In this paper a new alert classification algorithm for IDS proposed, that uses the Pattern Matching. The proposed algorithm reduces alerts and distinguishes serious alerts, low importance and irrelevant one with a high performance. By the experimental results on DARPA KDD cup 99 Dataset the system is able to classify alerts and causes reducing false alerts considerably.
多年来,网络入侵检测系统已经发展到可以处理各种类型的威胁。如今,网络管理人员希望网络入侵检测系统(IDS)除了处理尚未消失的旧威胁外,还能检测攻击并包括异常感知。研究人员提出了不同的方法和算法来改进入侵检测系统。这些系统有不同的类型,其中大多数能够检测到许多攻击,但由于这些系统产生的大量错误警报,因此无法向分析师提供清晰的想法。这一弱点导致了许多处理这些警报的方法的出现。在这一领域进行研究的目的是提出一种新的技术来处理警报,减少它们,区分真实的攻击,假警报和低重要性事件。本文提出了一种新的基于模式匹配的入侵检测警报分类算法。该算法能够有效地区分严重告警、低重要性告警和不相关告警。通过在DARPA KDD cup 99数据集上的实验结果,该系统能够对警报进行分类,大大减少了误报。
{"title":"Handling alerts for intrusion detection system using stateful pattern matching","authors":"El Mostapha Chakir, Y. I. Khamlichi, M. Moughit","doi":"10.1109/CIST.2016.7805031","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805031","url":null,"abstract":"Over the years, network intrusion detection systems have evolved to handle varying types of threats. These days, network managers expect network intrusion detection systems (IDS) to detect attacks and include anomaly-awareness, in addition to handling older threats that haven't disappeared. Researchers have proposed different methods and algorithms to improve intrusion detection systems (IDS). There are different types of these systems, most of them are capable of detecting many attacks, but cannot provide a clear idea to the analyst because of the huge number of the false alerts generated by these systems. This weakness has led to the emergence of many methods in which to deal with these alerts. The aim of conducted research in thisfield is to propose a new technique to handle the alerts, to reduce them and distinguish real attacks from false alerts and low importance events. In this paper a new alert classification algorithm for IDS proposed, that uses the Pattern Matching. The proposed algorithm reduces alerts and distinguishes serious alerts, low importance and irrelevant one with a high performance. By the experimental results on DARPA KDD cup 99 Dataset the system is able to classify alerts and causes reducing false alerts considerably.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"70 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129641137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparative analysis of drug supply and inventory management methods literature review 文献综述药品供应与库存管理方法的比较分析
Sara Jebbor, A. E. Afia, R. Chiheb, F. Ouzayd
Nowadays, scientific researches attribute a crucial importance to hospital sector. The improvement of this sector is considered by the literature as strongly depending on well mastered hospital supply chain, more exactly drug supply chain. Hence, several research studies have worked on the management of drug supply chain by offering diverse approaches and management models. In this paper, we focus on stochastic drug supply chain and our goal is to present a literature review about the drug supply chain and drug supply and inventory management methods, in order to establish a comparative analysis of the methods and approaches recently proposed by various research projects to identify the most appropriate one.
目前,科学研究对医院部门的重视程度很高。该部门的改善被文献认为强烈依赖于良好的医院供应链,更确切地说是药品供应链。因此,一些研究通过提供不同的方法和管理模式对药品供应链的管理进行了研究。本文以随机药品供应链为研究对象,对药品供应链和药品供应与库存管理方法进行文献综述,对近年来各种研究项目提出的方法和途径进行比较分析,找出最合适的方法和途径。
{"title":"Comparative analysis of drug supply and inventory management methods literature review","authors":"Sara Jebbor, A. E. Afia, R. Chiheb, F. Ouzayd","doi":"10.1109/CIST.2016.7805036","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805036","url":null,"abstract":"Nowadays, scientific researches attribute a crucial importance to hospital sector. The improvement of this sector is considered by the literature as strongly depending on well mastered hospital supply chain, more exactly drug supply chain. Hence, several research studies have worked on the management of drug supply chain by offering diverse approaches and management models. In this paper, we focus on stochastic drug supply chain and our goal is to present a literature review about the drug supply chain and drug supply and inventory management methods, in order to establish a comparative analysis of the methods and approaches recently proposed by various research projects to identify the most appropriate one.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129009827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of association rules based on K-means algorithm 基于K-means算法的关联规则分类
A. Dahbi, Mohammed Mouhir, Y. Balouki, T. Gadi
Association rule mining is one of the most relevant techniques in data mining, aiming to extract correlation among sets of items or products in transactional databases. The huge number of association rules extracted represents the main obstacle that a decision maker faces. Hence, many interestingness measures have been proposed to evaluate the association rules. However, the abundance of these measures caused a new problem, which is the selection of measures that is best suited to the users. To bypass this problem, we propose an approach based on K-means algorithm to classify and to store Association Rules without favoring or excluding any measures. The experiments, performed on numerous datasets, show a significant performance of the proposed approach and it effectively classify the association rules.
关联规则挖掘是数据挖掘中最相关的技术之一,旨在提取事务数据库中项目或产品集之间的相关性。提取的大量关联规则是决策者面临的主要障碍。因此,人们提出了许多有趣度度量来评估关联规则。然而,这些措施的丰富带来了一个新问题,即选择最适合用户的措施。为了绕过这个问题,我们提出了一种基于K-means算法的方法来对关联规则进行分类和存储,而不偏袒或排除任何度量。在大量数据集上进行的实验表明,该方法具有显著的性能,并能有效地对关联规则进行分类。
{"title":"Classification of association rules based on K-means algorithm","authors":"A. Dahbi, Mohammed Mouhir, Y. Balouki, T. Gadi","doi":"10.1109/CIST.2016.7805061","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805061","url":null,"abstract":"Association rule mining is one of the most relevant techniques in data mining, aiming to extract correlation among sets of items or products in transactional databases. The huge number of association rules extracted represents the main obstacle that a decision maker faces. Hence, many interestingness measures have been proposed to evaluate the association rules. However, the abundance of these measures caused a new problem, which is the selection of measures that is best suited to the users. To bypass this problem, we propose an approach based on K-means algorithm to classify and to store Association Rules without favoring or excluding any measures. The experiments, performed on numerous datasets, show a significant performance of the proposed approach and it effectively classify the association rules.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"87 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127998016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1