首页 > 最新文献

Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications最新文献

英文 中文
Design and Development of a Microstrip Patch Antenna Array for Rectenna System 整流天线系统微带贴片天线阵列的设计与研制
Salah Ihlou, H. Tizyi, A. Bakkali, A. Abbassi, J. Foshi
In this paper, an attempt has been made to design and develop a 1 X 2 rectangular linearly polarized microstrip patch antenna array for microwave power transmission (MPT). The antenna array is operating at 5.8 GHz frequency. The system was designed by means of simulation using CST MWS software. The results showed that the proposed antenna array achieves a gain of 9.19 dB, a return loss less than -25.05 dB, and a good axial ratio less than 0.63 dB at center frequency (5.8 GHz).
本文尝试设计和研制一种用于微波功率传输的1 × 2矩形线极化微带贴片天线阵列。天线阵列工作在5.8 GHz频率。采用CST MWS软件对系统进行了仿真设计。结果表明,该天线阵列在中心频率(5.8 GHz)下的增益为9.19 dB,回波损耗小于-25.05 dB,轴比小于0.63 dB。
{"title":"Design and Development of a Microstrip Patch Antenna Array for Rectenna System","authors":"Salah Ihlou, H. Tizyi, A. Bakkali, A. Abbassi, J. Foshi","doi":"10.1145/3419604.3419766","DOIUrl":"https://doi.org/10.1145/3419604.3419766","url":null,"abstract":"In this paper, an attempt has been made to design and develop a 1 X 2 rectangular linearly polarized microstrip patch antenna array for microwave power transmission (MPT). The antenna array is operating at 5.8 GHz frequency. The system was designed by means of simulation using CST MWS software. The results showed that the proposed antenna array achieves a gain of 9.19 dB, a return loss less than -25.05 dB, and a good axial ratio less than 0.63 dB at center frequency (5.8 GHz).","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125851367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of security risks using Apriori algorithm 基于Apriori算法的安全风险评估
W. Abbass, Amine Baïna, M. Bellafkih
The progress of IT technologies offers many means to collect and store an extremely large quantity of data and conveys a prodigious quantity of information in several sectors of activity. However, this progress is not only exposed to classic operational risks such as fire or blackouts, but also to various viruses and data theft. These extremely technologically complex risks have risen a big challenge at responding to a large-scale of intangible threats within an industry of perpetual change. Wherefore, the value of Security Risk Assessment "SRA" at ensuring the protection of the organizations' business services. However, conducting SRA is difficult and time-consuming and its results may not project the risky behaviors which often leads to unnecessary controls being implemented. Therefore, we tolerate using the Apriori algorithm as a prominent approach accurately determining the threat sources emerging within the risky behaviors. The Apriori algorithm is very useful at better mapping the relationship between organization critical assets and the potential threats-vulnerabilities. We use a history dataset of security risks in order to determine association rules between vulnerabilities and the potential threats. The algorithm performs classification which successfully reduces assessment time. As a result, the improved algorithm undertakes recommendations for a better SRA conduction.
信息技术的进步提供了许多方法来收集和存储大量的数据,并在几个活动部门中传递大量的信息。然而,这一进展不仅暴露于火灾或停电等经典操作风险,而且还暴露于各种病毒和数据被盗。这些技术上极其复杂的风险在应对一个不断变化的行业中的大规模无形威胁方面提出了巨大挑战。因此,安全风险评估(SRA)的价值在于确保组织的业务服务得到保护。然而,进行SRA是困难和耗时的,其结果可能无法预测风险行为,这往往导致实施不必要的控制。因此,我们容忍使用Apriori算法作为准确确定危险行为中出现的威胁来源的突出方法。Apriori算法在更好地映射组织关键资产与潜在威胁-漏洞之间的关系方面非常有用。我们使用安全风险的历史数据集来确定漏洞和潜在威胁之间的关联规则。该算法进行分类,成功地减少了评估时间。因此,改进的算法为更好的SRA传导提供了建议。
{"title":"Evaluation of security risks using Apriori algorithm","authors":"W. Abbass, Amine Baïna, M. Bellafkih","doi":"10.1145/3419604.3419789","DOIUrl":"https://doi.org/10.1145/3419604.3419789","url":null,"abstract":"The progress of IT technologies offers many means to collect and store an extremely large quantity of data and conveys a prodigious quantity of information in several sectors of activity. However, this progress is not only exposed to classic operational risks such as fire or blackouts, but also to various viruses and data theft. These extremely technologically complex risks have risen a big challenge at responding to a large-scale of intangible threats within an industry of perpetual change. Wherefore, the value of Security Risk Assessment \"SRA\" at ensuring the protection of the organizations' business services. However, conducting SRA is difficult and time-consuming and its results may not project the risky behaviors which often leads to unnecessary controls being implemented. Therefore, we tolerate using the Apriori algorithm as a prominent approach accurately determining the threat sources emerging within the risky behaviors. The Apriori algorithm is very useful at better mapping the relationship between organization critical assets and the potential threats-vulnerabilities. We use a history dataset of security risks in order to determine association rules between vulnerabilities and the potential threats. The algorithm performs classification which successfully reduces assessment time. As a result, the improved algorithm undertakes recommendations for a better SRA conduction.","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126030698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An implementation of a multivariate discretization for supervised learning using Forestdisc 用Forestdisc实现监督学习的多元离散化
Maissae Haddouchi, A. Berrado
Discretization is a key pre-processing step in Machine Learning that transforms continuous attributes into discrete ones, through different methods available in the literature. In this regard, this work provides the ForestDisc framework that discretizes data based on a supervised, multivariate and hybrid approach. It uses, at first, a splitting process relying on a tree learning ensemble to generate a large set of cut points. It then uses a merging process based on moment matching optimization, to transform this set into a reduced and representative one. ForestDisc is a non-parametric discretizer in the sense that it does not require the user to introduce any initial setting parameters. We implemented ForestDisc algorithm in the "ForestDisc" R package.
离散化是机器学习中关键的预处理步骤,通过文献中可用的不同方法将连续属性转换为离散属性。在这方面,这项工作提供了基于监督、多元和混合方法离散数据的ForestDisc框架。首先,它使用一个依赖于树学习集成的分裂过程来生成一个大的切点集。然后利用基于矩匹配优化的归并过程,将该集合转化为约简后的具有代表性的集合。ForestDisc是一种非参数离散器,它不需要用户引入任何初始设置参数。我们在“ForestDisc”R包中实现了ForestDisc算法。
{"title":"An implementation of a multivariate discretization for supervised learning using Forestdisc","authors":"Maissae Haddouchi, A. Berrado","doi":"10.1145/3419604.3419772","DOIUrl":"https://doi.org/10.1145/3419604.3419772","url":null,"abstract":"Discretization is a key pre-processing step in Machine Learning that transforms continuous attributes into discrete ones, through different methods available in the literature. In this regard, this work provides the ForestDisc framework that discretizes data based on a supervised, multivariate and hybrid approach. It uses, at first, a splitting process relying on a tree learning ensemble to generate a large set of cut points. It then uses a merging process based on moment matching optimization, to transform this set into a reduced and representative one. ForestDisc is a non-parametric discretizer in the sense that it does not require the user to introduce any initial setting parameters. We implemented ForestDisc algorithm in the \"ForestDisc\" R package.","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Latent Graph Predictor Factorization Machine (LGPFM) for modeling feature interactions weight 潜在图预测因子分解机(LGPFM)用于建模特征相互作用的权重
Abdessamad Chanaa, N. E. Faddouli
Regression is a machine learning model that predicts the target based on input data. Factorization Machines (FMs) are new class models that in addition to regression, present factorized interactions between a pair of features. FMs have been proven to accomplish good accuracy for the rating prediction tasks such as recommender systems. However, FM models all the interactions with the same weight which can be ineffective, since useless interactions may cause noisy results. In this paper, we propose a new model named: Latent Graph Predictor Factorization Machine (LGPFM) that capture the interaction weight of each pair of features using Convolutional Neural Network (CNN). LGPFM combines FM model with the benefits of the CNN that works efficiently in grid-type topology, which would improve significantly the accuracy of results.
回归是一种基于输入数据预测目标的机器学习模型。因子分解机(FMs)是一种新的类模型,除了回归之外,还提供了一对特征之间的因子交互。FMs已被证明在评级预测任务(如推荐系统)中具有良好的准确性。然而,FM用相同的权重对所有相互作用进行建模,这可能是无效的,因为无用的相互作用可能会导致有噪声的结果。本文提出了一种利用卷积神经网络(CNN)捕获每对特征的交互权重的新模型:潜在图预测因子分解机(LGPFM)。LGPFM结合了FM模型和CNN在网格型拓扑下高效工作的优点,可以显著提高结果的准确性。
{"title":"Latent Graph Predictor Factorization Machine (LGPFM) for modeling feature interactions weight","authors":"Abdessamad Chanaa, N. E. Faddouli","doi":"10.1145/3419604.3419618","DOIUrl":"https://doi.org/10.1145/3419604.3419618","url":null,"abstract":"Regression is a machine learning model that predicts the target based on input data. Factorization Machines (FMs) are new class models that in addition to regression, present factorized interactions between a pair of features. FMs have been proven to accomplish good accuracy for the rating prediction tasks such as recommender systems. However, FM models all the interactions with the same weight which can be ineffective, since useless interactions may cause noisy results. In this paper, we propose a new model named: Latent Graph Predictor Factorization Machine (LGPFM) that capture the interaction weight of each pair of features using Convolutional Neural Network (CNN). LGPFM combines FM model with the benefits of the CNN that works efficiently in grid-type topology, which would improve significantly the accuracy of results.","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123531179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study of Arabic Text Categorization Using Feature Selection Techniques and Four Classifier Models 基于特征选择技术和四种分类器模型的阿拉伯语文本分类的比较研究
Said Bahassine, Abdellah Madani, M. Kissi
Text classification is the process of assigning appropriate categories to free text according to its content. It is one of the important task in Text mining. Numerous studies have been conducted for natural languages processing using Japanese, French, Latin and Turkish documents, but the number of works related to the text written in Arabic language is still limited. In this paper we conduct a comparative study of three methods of feature selection using four well-known classifiers namely: Decision Tree, Naive Bayes, K-Nearest Neighbors and Support Vector Machine. A corpus contained 250 Arabic text belonging into five classes: sport, politics, economics, culture and art, and society. The data set is used to evaluate and compare the effectiveness of the obtained model. The experimental results reveal that using improved Chi-square method as feature selection and Support Vector Machine as classifier outperforms other combinations in terms of precision. This combination significantly improves the performance of Arabic text classification model. The highest value of precision measure for this model is 89.9%.
文本分类是根据自由文本的内容对其进行适当分类的过程。它是文本挖掘的重要任务之一。对使用日文、法文、拉丁文和土耳其文的自然语言处理进行了许多研究,但与以阿拉伯文编写的文本有关的工作数量仍然有限。本文采用决策树、朴素贝叶斯、k近邻和支持向量机四种分类器对三种特征选择方法进行了比较研究。语料库包含250个阿拉伯语文本,分为五个类别:体育、政治、经济、文化和艺术以及社会。该数据集用于评估和比较所获得模型的有效性。实验结果表明,使用改进的卡方方法作为特征选择和支持向量机作为分类器在精度上优于其他组合。这种组合显著提高了阿拉伯语文本分类模型的性能。该模型的最高精度测量值为89.9%。
{"title":"Comparative Study of Arabic Text Categorization Using Feature Selection Techniques and Four Classifier Models","authors":"Said Bahassine, Abdellah Madani, M. Kissi","doi":"10.1145/3419604.3419778","DOIUrl":"https://doi.org/10.1145/3419604.3419778","url":null,"abstract":"Text classification is the process of assigning appropriate categories to free text according to its content. It is one of the important task in Text mining. Numerous studies have been conducted for natural languages processing using Japanese, French, Latin and Turkish documents, but the number of works related to the text written in Arabic language is still limited. In this paper we conduct a comparative study of three methods of feature selection using four well-known classifiers namely: Decision Tree, Naive Bayes, K-Nearest Neighbors and Support Vector Machine. A corpus contained 250 Arabic text belonging into five classes: sport, politics, economics, culture and art, and society. The data set is used to evaluate and compare the effectiveness of the obtained model. The experimental results reveal that using improved Chi-square method as feature selection and Support Vector Machine as classifier outperforms other combinations in terms of precision. This combination significantly improves the performance of Arabic text classification model. The highest value of precision measure for this model is 89.9%.","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129733314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting Ships Estimated Time of Arrival based on AIS Data 基于AIS数据的船舶预计到达时间预测
Sara El Mekkaoui, L. Benabbou, A. Berrado
Using appropriate tools to verify and ascertain the accuracy of the estimated time of arrival (ETA) provided by ships during their approach to ports has never been more needed than it is today. This is owed to the traffic increase and the considerable variations in ETAs that port actors are suffering from. But now the opportunity presents itself with the maritime digital transformation enabling ports and ships to produce important amounts of data that can serve in building predictive systemsfor ships' arrival time projection. This paper presents the existing approaches to predict ETAs, outlines three of the data sources that can serve in ETAs' prediction, and shows the results of Neural Networks (NN) models prediction of the arrival time of a ship to its destination using AIS data.
使用适当的工具来核实和确定船舶在接近港口时提供的估计到达时间(ETA)的准确性,从来没有像今天这样迫切需要。这是由于运输量的增加和港口行动者所遭受的eta的相当大的变化。但现在机遇出现了,海事数字化转型使港口和船舶能够产生大量数据,这些数据可以用于建立船舶到达时间预测系统。本文介绍了现有的预测eta的方法,概述了可以用于eta预测的三种数据源,并展示了神经网络(NN)模型使用AIS数据预测船舶到达目的地时间的结果。
{"title":"Predicting Ships Estimated Time of Arrival based on AIS Data","authors":"Sara El Mekkaoui, L. Benabbou, A. Berrado","doi":"10.1145/3419604.3419768","DOIUrl":"https://doi.org/10.1145/3419604.3419768","url":null,"abstract":"Using appropriate tools to verify and ascertain the accuracy of the estimated time of arrival (ETA) provided by ships during their approach to ports has never been more needed than it is today. This is owed to the traffic increase and the considerable variations in ETAs that port actors are suffering from. But now the opportunity presents itself with the maritime digital transformation enabling ports and ships to produce important amounts of data that can serve in building predictive systemsfor ships' arrival time projection. This paper presents the existing approaches to predict ETAs, outlines three of the data sources that can serve in ETAs' prediction, and shows the results of Neural Networks (NN) models prediction of the arrival time of a ship to its destination using AIS data.","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133898658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep Learning Approach for Forecasting Athletes' Performance in Sports Tournaments 预测运动员在体育比赛中的表现的深度学习方法
Hadeel T. El Kassabi, Khaled Khalil, M. Serhani
Sports and international tournaments have gained world attention in the past decade. Enhancing sports activities and promoting sports to participate in international events, competitions, and tournaments play a substantial role in the development and advancement of nations around the globe. In this paper, we applied different deep learning models for predicting athletes' performance in tournaments to help them improve their results. We propose a deep learning selection algorithm to evaluate the effectiveness of the athletes' current training by predicting their race results upon completing each additional training, which potentially improves their performance. We gathered public training data for athletes who participated in the 2017 Boston Marathon within a five-month window prior to the race. Deep learning models were applied and evaluated to predict marathon finishing times. These include Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), and Gated Recurrent Units (GRU). Results show that Deep Learning models give improved race time prediction accuracy over the baseline machine learning model, such as standard Linear Regression (LR).
在过去的十年里,体育和国际比赛获得了全世界的关注。加强体育活动,促进体育参与国际赛事、比赛和锦标赛,对世界各国的发展和进步具有重要作用。在本文中,我们应用不同的深度学习模型来预测运动员在比赛中的表现,以帮助他们提高成绩。我们提出了一种深度学习选择算法,通过预测运动员完成每次额外训练后的比赛结果来评估他们当前训练的有效性,这可能会提高他们的表现。我们收集了参加2017年波士顿马拉松比赛的运动员在比赛前五个月的公开训练数据。应用深度学习模型预测马拉松跑完时间,并对其进行评估。其中包括循环神经网络(RNN)、长短期记忆(LSTM)和门控循环单元(GRU)。结果表明,深度学习模型比基线机器学习模型(如标准线性回归(LR))提供了更高的比赛时间预测精度。
{"title":"Deep Learning Approach for Forecasting Athletes' Performance in Sports Tournaments","authors":"Hadeel T. El Kassabi, Khaled Khalil, M. Serhani","doi":"10.1145/3419604.3419786","DOIUrl":"https://doi.org/10.1145/3419604.3419786","url":null,"abstract":"Sports and international tournaments have gained world attention in the past decade. Enhancing sports activities and promoting sports to participate in international events, competitions, and tournaments play a substantial role in the development and advancement of nations around the globe. In this paper, we applied different deep learning models for predicting athletes' performance in tournaments to help them improve their results. We propose a deep learning selection algorithm to evaluate the effectiveness of the athletes' current training by predicting their race results upon completing each additional training, which potentially improves their performance. We gathered public training data for athletes who participated in the 2017 Boston Marathon within a five-month window prior to the race. Deep learning models were applied and evaluated to predict marathon finishing times. These include Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), and Gated Recurrent Units (GRU). Results show that Deep Learning models give improved race time prediction accuracy over the baseline machine learning model, such as standard Linear Regression (LR).","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124832606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Construction of a database for speech recognition of isolated Arabic words 阿拉伯孤立词语音识别数据库的构建
Ahmed Boumehdi, A. Yousfi
Automatic speech recognition for the Arabic language is a field that is in a current remarkable development and still attracts many researchers who try to improve year after year the recognition rate. Many works, nowadays, have been focused on automatic speech recognition (ASR) for the Arabic language. The paper presents the significance of the ASR systems built in the past few years. This work also aims to introduce a new Arabic database for isolated word by defining a new concept of phonetic units: semi-syllable units. Thus, the corpus contains a collection of semi-syllable audio files as well as their corresponding transcription files. This database will help us in future works.
阿拉伯语语音自动识别是当前发展迅速的一个领域,仍然吸引着许多研究者,他们不断努力提高识别率。目前,许多工作都集中在阿拉伯语的自动语音识别(ASR)上。本文介绍了近年来建立的ASR系统的意义。这项工作还旨在通过定义一个新的语音单位概念:半音节单位,引入一个新的阿拉伯语孤立词数据库。因此,语料库包含了半音节音频文件及其相应的转录文件的集合。这个数据库对我们今后的工作很有帮助。
{"title":"Construction of a database for speech recognition of isolated Arabic words","authors":"Ahmed Boumehdi, A. Yousfi","doi":"10.1145/3419604.3419752","DOIUrl":"https://doi.org/10.1145/3419604.3419752","url":null,"abstract":"Automatic speech recognition for the Arabic language is a field that is in a current remarkable development and still attracts many researchers who try to improve year after year the recognition rate. Many works, nowadays, have been focused on automatic speech recognition (ASR) for the Arabic language. The paper presents the significance of the ASR systems built in the past few years. This work also aims to introduce a new Arabic database for isolated word by defining a new concept of phonetic units: semi-syllable units. Thus, the corpus contains a collection of semi-syllable audio files as well as their corresponding transcription files. This database will help us in future works.","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Flooding Intrusion Detection System for MANETs Using Deep Learning Approach 基于深度学习方法的数据泛洪入侵检测系统
Oussama Sbai, M. Elboukhari
Today mobile ad hoc networks (MANETs) and its derivatives such as vehicular ad-hoc networks (VANETs), wireless sensor network (WSN), are more interesting subject for researchers, seen particularly from the appearance of the paradigm of smart cities, smart homes, and Internet of Things (IoT). In addition to this widespread use, several vulnerabilities and attacks appear like for instance black hole attack and data flooding attack. Nevertheless, the limitations of hardware generally used in MANETs make many views the tasks of detection and countermeasure of attacks. In this paper, using the technology of deep neural network (DNN) deep learning, we try to propose an intrusion detection system (IDS) for the subclass of the big class DDoS: Data flooding attack, with using the dataset CICDDoS2019. Our obtained results show that the proposed architecture model can achieve very interesting performance (Accuracy, Precision, Recall and F1-score).
今天,移动自组织网络(manet)及其衍生产品,如车载自组织网络(VANETs)、无线传感器网络(WSN),对研究人员来说是更有趣的主题,特别是从智能城市、智能家居和物联网(IoT)范例的出现来看。除了这种广泛使用之外,还出现了一些漏洞和攻击,例如黑洞攻击和数据泛滥攻击。然而,由于无线网络中普遍使用的硬件的局限性,使得许多人对攻击的检测和对抗任务有了不同的看法。本文利用深度神经网络(DNN)深度学习技术,利用数据集CICDDoS2019,尝试提出一种针对大类DDoS子类:数据洪水攻击的入侵检测系统(IDS)。我们得到的结果表明,所提出的架构模型可以获得非常有趣的性能(准确性,精度,召回率和f1分数)。
{"title":"Data Flooding Intrusion Detection System for MANETs Using Deep Learning Approach","authors":"Oussama Sbai, M. Elboukhari","doi":"10.1145/3419604.3419777","DOIUrl":"https://doi.org/10.1145/3419604.3419777","url":null,"abstract":"Today mobile ad hoc networks (MANETs) and its derivatives such as vehicular ad-hoc networks (VANETs), wireless sensor network (WSN), are more interesting subject for researchers, seen particularly from the appearance of the paradigm of smart cities, smart homes, and Internet of Things (IoT). In addition to this widespread use, several vulnerabilities and attacks appear like for instance black hole attack and data flooding attack. Nevertheless, the limitations of hardware generally used in MANETs make many views the tasks of detection and countermeasure of attacks. In this paper, using the technology of deep neural network (DNN) deep learning, we try to propose an intrusion detection system (IDS) for the subclass of the big class DDoS: Data flooding attack, with using the dataset CICDDoS2019. Our obtained results show that the proposed architecture model can achieve very interesting performance (Accuracy, Precision, Recall and F1-score).","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SPM SPM
Aola Yousfi, Moulay Hafid El Yazidi, A. Zellou
The Set Program Mask instruction, SPM, is used to change the 2-bit condition code and 4-bit program mask in the current PSW. Before executing SPM, you should set bits 34 and 35 of general register R1 to the desired value of the condition code. You should also initialize bits 3639 of general register R1 – these values will replace the program mask. Bits 0-33 and 40-63 of general register R1 are ignored. Here is an example:
设置程序掩码指令SPM用于改变当前PSW中的2位条件码和4位程序掩码。在执行SPM之前,应该将通用寄存器R1的第34位和第35位设置为条件码的期望值。您还应该初始化通用寄存器R1的3639位-这些值将替换程序掩码。一般寄存器R1的0-33位和40-63位被忽略。下面是一个例子:
{"title":"SPM","authors":"Aola Yousfi, Moulay Hafid El Yazidi, A. Zellou","doi":"10.1145/3419604.3419782","DOIUrl":"https://doi.org/10.1145/3419604.3419782","url":null,"abstract":"The Set Program Mask instruction, SPM, is used to change the 2-bit condition code and 4-bit program mask in the current PSW. Before executing SPM, you should set bits 34 and 35 of general register R1 to the desired value of the condition code. You should also initialize bits 3639 of general register R1 – these values will replace the program mask. Bits 0-33 and 40-63 of general register R1 are ignored. Here is an example:","PeriodicalId":250715,"journal":{"name":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1