首页 > 最新文献

2021 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)最新文献

英文 中文
An Image Dataset for Lung Disease Detection and Classification 用于肺部疾病检测与分类的图像数据集
Yassamine Lala Bouali, Isra Boucetta, I. E. I. Bekkouch, Mourad Bouache, S. Mazouzi
Lung diseases are part of several fatal illnesses. Although there are advances in the healthcare domain, some of them still top the list of worldwide mortal diseases. This paper analyzes how X-ray images, processed according to Artificial Intelligence, can be used to assist medical physicians and radiologists in their diagnosis by automatic detection and classification of lung diseases. In this study, we present a new image dataset that consists of 1071 chest X-ray images with two common lung pathologies, i.e. pneumonia and tuberculosis. In addition, with the help of medical specialists, we manually provided each image with disease bounding boxes. We used the proposed dataset to train Deep Learning based object detection models to demonstrate that thoracic pathologies can be automatically detected, classified and most importantly, localized. Our results are promising and show that the proposed dataset allows training accurate lung disease detection models.
肺部疾病是几种致命疾病的一部分。尽管在医疗保健领域取得了进步,但其中一些疾病仍然是世界上最致命的疾病。本文分析了如何利用人工智能处理的x射线图像,通过对肺部疾病的自动检测和分类,帮助内科医生和放射科医生进行诊断。在这项研究中,我们提出了一个新的图像数据集,该数据集由1071张胸部x射线图像组成,这些图像具有两种常见的肺部病变,即肺炎和肺结核。此外,在医学专家的帮助下,我们手动为每张图像提供疾病边界框。我们使用提出的数据集来训练基于深度学习的对象检测模型,以证明胸部病变可以自动检测、分类,最重要的是,可以定位。我们的结果是有希望的,并且表明所提出的数据集允许训练准确的肺部疾病检测模型。
{"title":"An Image Dataset for Lung Disease Detection and Classification","authors":"Yassamine Lala Bouali, Isra Boucetta, I. E. I. Bekkouch, Mourad Bouache, S. Mazouzi","doi":"10.1109/ICTAACS53298.2021.9715227","DOIUrl":"https://doi.org/10.1109/ICTAACS53298.2021.9715227","url":null,"abstract":"Lung diseases are part of several fatal illnesses. Although there are advances in the healthcare domain, some of them still top the list of worldwide mortal diseases. This paper analyzes how X-ray images, processed according to Artificial Intelligence, can be used to assist medical physicians and radiologists in their diagnosis by automatic detection and classification of lung diseases. In this study, we present a new image dataset that consists of 1071 chest X-ray images with two common lung pathologies, i.e. pneumonia and tuberculosis. In addition, with the help of medical specialists, we manually provided each image with disease bounding boxes. We used the proposed dataset to train Deep Learning based object detection models to demonstrate that thoracic pathologies can be automatically detected, classified and most importantly, localized. Our results are promising and show that the proposed dataset allows training accurate lung disease detection models.","PeriodicalId":284572,"journal":{"name":"2021 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128899847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet of Things: new Architecture to ensure Robustness, Security and Privacy of IoT Systems 物联网:确保物联网系统鲁棒性、安全性和隐私性的新架构
Cherif Benali, R. Maamri
with the rapid development in computing and networking capabilities, a new technology has been emerged known as internet of things (IoT). IoT is a giant network of connected and interacted devices, which collect data and send it using the internet. Today, IoT is playing important role in daily life; it adds intelligence to several domains, such as health care, smart homes and cities, and smart transportation.Nevertheless, several challenges are introduced by the new IoT system requirements, which cannot be adequately addressed by current models and architectures. Security and privacy present the main challenges of IoT, which are more important now than ever, due to the explosive growth of connected devices and the huge amount of generated data. All these challenges really should be taken in consideration. Good reference architecture is the main key to ensure security, privacy and many other emergent requirements, because it presents the functional view of IoT. So, IoT requires new architectures to address these new challenges and face these problems. Therefore, the aim of this paper is to suggest powerful architecture to build secure IoT system, and which guarantees the privacy of all its users. It tries to fulfill the new emergent requirements, and solve the previous challenges. In addition, it explains the role of each part to achieve a robust secure IoT system, and how it contributes in the integration of other technologies.
随着计算和网络能力的快速发展,一种新的技术被称为物联网(IoT)。物联网是一个由连接和交互设备组成的巨大网络,它收集数据并使用互联网发送数据。如今,物联网在日常生活中发挥着重要作用;它将智能添加到多个领域,如医疗保健、智能家居和城市,以及智能交通。然而,新的物联网系统需求带来了一些挑战,目前的模型和架构无法充分解决这些挑战。安全和隐私是物联网的主要挑战,由于连接设备的爆炸式增长和产生的大量数据,物联网现在比以往任何时候都更加重要。所有这些挑战都应该被考虑在内。良好的参考架构是确保安全、隐私和许多其他紧急需求的关键,因为它呈现了物联网的功能视图。因此,物联网需要新的架构来应对这些新挑战并面对这些问题。因此,本文的目的是提出强大的架构来构建安全的物联网系统,并保证所有用户的隐私。它试图满足新的紧急需求,并解决以往的挑战。此外,它还解释了每个部分在实现强大的安全物联网系统中的作用,以及它如何在其他技术的集成中做出贡献。
{"title":"Internet of Things: new Architecture to ensure Robustness, Security and Privacy of IoT Systems","authors":"Cherif Benali, R. Maamri","doi":"10.1109/ICTAACS53298.2021.9715203","DOIUrl":"https://doi.org/10.1109/ICTAACS53298.2021.9715203","url":null,"abstract":"with the rapid development in computing and networking capabilities, a new technology has been emerged known as internet of things (IoT). IoT is a giant network of connected and interacted devices, which collect data and send it using the internet. Today, IoT is playing important role in daily life; it adds intelligence to several domains, such as health care, smart homes and cities, and smart transportation.Nevertheless, several challenges are introduced by the new IoT system requirements, which cannot be adequately addressed by current models and architectures. Security and privacy present the main challenges of IoT, which are more important now than ever, due to the explosive growth of connected devices and the huge amount of generated data. All these challenges really should be taken in consideration. Good reference architecture is the main key to ensure security, privacy and many other emergent requirements, because it presents the functional view of IoT. So, IoT requires new architectures to address these new challenges and face these problems. Therefore, the aim of this paper is to suggest powerful architecture to build secure IoT system, and which guarantees the privacy of all its users. It tries to fulfill the new emergent requirements, and solve the previous challenges. In addition, it explains the role of each part to achieve a robust secure IoT system, and how it contributes in the integration of other technologies.","PeriodicalId":284572,"journal":{"name":"2021 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Evolutionary Based Recommendation Approach 基于进化的推荐方法
Ismail Bouacha, Safia Bekhouche
A recommender system aims to satisfy its users by offering them relevant items (films, books, products, etc). This is done by comparing the items deemed satisfactory by the user with all of the items (content-based filtering), or by searching for similar users (collaborative filtering). We propose a genetic based approach to recommend relevant items without needing an explicit request from the user. Our approach looks for the most similar users using a genetic algorithm. Then, a recommendation space is constructed by grouping the items preferred by each similar user, and removing those preferred by the active user. After that, the system predicts a rating for each unrated item. The recommendation space will be reduced by keeping only relevant items using a threshold. An experimental study has been made in comparison with KNN algorithm. Experimental results seem interesting and show an improvement in precision, recall and F-Measure. Also Mean Absolute Error (MAE) has been reduced.
推荐系统的目的是通过向用户提供相关的项目(电影、书籍、产品等)来满足用户。这是通过将用户认为满意的项目与所有项目进行比较(基于内容的过滤),或通过搜索相似的用户(协作过滤)来完成的。我们提出了一种基于遗传的方法来推荐相关的项目,而不需要用户明确的请求。我们的方法使用遗传算法寻找最相似的用户。然后,通过将每个相似用户喜欢的项目分组,并删除活跃用户喜欢的项目,构建推荐空间。之后,系统会预测每个未评级物品的评级。通过使用阈值只保留相关条目,可以减少推荐空间。并与KNN算法进行了对比实验研究。实验结果似乎很有趣,显示出精确度、召回率和F-Measure的提高。平均绝对误差(MAE)也降低了。
{"title":"An Evolutionary Based Recommendation Approach","authors":"Ismail Bouacha, Safia Bekhouche","doi":"10.1109/ICTAACS53298.2021.9715214","DOIUrl":"https://doi.org/10.1109/ICTAACS53298.2021.9715214","url":null,"abstract":"A recommender system aims to satisfy its users by offering them relevant items (films, books, products, etc). This is done by comparing the items deemed satisfactory by the user with all of the items (content-based filtering), or by searching for similar users (collaborative filtering). We propose a genetic based approach to recommend relevant items without needing an explicit request from the user. Our approach looks for the most similar users using a genetic algorithm. Then, a recommendation space is constructed by grouping the items preferred by each similar user, and removing those preferred by the active user. After that, the system predicts a rating for each unrated item. The recommendation space will be reduced by keeping only relevant items using a threshold. An experimental study has been made in comparison with KNN algorithm. Experimental results seem interesting and show an improvement in precision, recall and F-Measure. Also Mean Absolute Error (MAE) has been reduced.","PeriodicalId":284572,"journal":{"name":"2021 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124714728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection Systems for Industrial Internet of Things: A Survey 工业物联网入侵检测系统综述
Djallel Hamouda, M. Ferrag, Nadjette Benhamida, Hamid Seridi
Industrial Internet of Things (IIoT) applies Internet of Things (IoT) technology in industrial systems, to optimize business processes efficiency, service quality, and reliability. However, with a large of isolated IoT networks deployed in various industries, many vulnerabilities have been exposed to security incidents and posed threats to IIoT security. An intrusion detection system (IDS) is a security monitoring mechanism that promotes cyber security solutions for information systems. The system’s role is to detect abnormal activities of intruders and enable preventive measures to avoid risks. However, applying a traditional IDS-based solution to IIoT is challenging due to its particular characteristics such as resource-constrained, data privacy, and heterogeneity. Researchers are using the new emerging technologies such as Fog/Edge computing, Machine Learning (ML), Deep Learning (DL) to deploy an effective and adaptive IDS for various IIoT operating environments. This study focus is on the development of IDS in particular industrial environments. To this end, we provide a systemic review that addresses IDS deployment strategies, detection approaches, and methodologies and data sources used for evaluation. We also present some suggestions and challenges to be considered when designing IDS-based security for Industrial IoT as future research.
工业物联网(Industrial Internet of Things, IIoT)是将物联网技术应用于工业系统中,以优化业务流程效率、服务质量和可靠性。然而,随着大量孤立的物联网网络部署在各个行业,许多漏洞暴露在安全事件中,对物联网安全构成威胁。入侵检测系统(IDS)是一种促进信息系统网络安全解决方案的安全监控机制。系统的作用是检测入侵者的异常活动,并启用预防措施以避免风险。然而,将传统的基于ids的解决方案应用于工业物联网是具有挑战性的,因为它具有资源约束、数据隐私和异构性等特殊特征。研究人员正在使用雾/边缘计算、机器学习(ML)、深度学习(DL)等新兴技术,为各种工业物联网操作环境部署有效且自适应的IDS。本研究的重点是IDS在特定工业环境中的发展。为此,我们提供了一个系统的审查,涉及IDS部署策略,检测方法,以及用于评估的方法和数据源。我们还提出了一些建议和挑战,在设计基于ids的工业物联网安全作为未来的研究时需要考虑。
{"title":"Intrusion Detection Systems for Industrial Internet of Things: A Survey","authors":"Djallel Hamouda, M. Ferrag, Nadjette Benhamida, Hamid Seridi","doi":"10.1109/ICTAACS53298.2021.9715177","DOIUrl":"https://doi.org/10.1109/ICTAACS53298.2021.9715177","url":null,"abstract":"Industrial Internet of Things (IIoT) applies Internet of Things (IoT) technology in industrial systems, to optimize business processes efficiency, service quality, and reliability. However, with a large of isolated IoT networks deployed in various industries, many vulnerabilities have been exposed to security incidents and posed threats to IIoT security. An intrusion detection system (IDS) is a security monitoring mechanism that promotes cyber security solutions for information systems. The system’s role is to detect abnormal activities of intruders and enable preventive measures to avoid risks. However, applying a traditional IDS-based solution to IIoT is challenging due to its particular characteristics such as resource-constrained, data privacy, and heterogeneity. Researchers are using the new emerging technologies such as Fog/Edge computing, Machine Learning (ML), Deep Learning (DL) to deploy an effective and adaptive IDS for various IIoT operating environments. This study focus is on the development of IDS in particular industrial environments. To this end, we provide a systemic review that addresses IDS deployment strategies, detection approaches, and methodologies and data sources used for evaluation. We also present some suggestions and challenges to be considered when designing IDS-based security for Industrial IoT as future research.","PeriodicalId":284572,"journal":{"name":"2021 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"14 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127842672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fuzzy Logic Based self-switching multi-strategic pedagogical agent 基于模糊逻辑的自切换多策略教学代理
Roumaysa Bousselidj, Soufiane Boulehoueche
The Self-Switching Multi-Strategic Pedagogical Agent is designed following the Autonomic Computing and the Component-Based Agents approaches. It is comprised of two sub-components: Manager (MrSS) and Managed (MdSS) Sub-Systems. These sub-systems are built independently, but they constantly interact with one another. The Multiple Pedagogical Strategies (MPSs) that are used by the system are implemented by MdSS. While the Switching Logic (SL), that is used to (re)conFigure the MdSS, is implemented by the MrSS as an Autonomic Control Loop (ACL). The MPSs and the SL permit to trigger the appropriate PS regarding the crisp values of the Student Knowledge Level (SKL). However, the SKL is characterized by a high degree of uncertainty. To overcome this deficiency, we integrate fuzzy control in the MrSS to handle the uncertainty and consequently improve the strategy selection process. Fuzzy MrSS links the different context parameters and SKL through fuzzy rules taking into account the system’s fuzziness and uncertainties. We will present experiments carried with the Math sub-domain.
自交换多策略教学智能体是根据自主计算和基于组件的智能体方法设计的。它由两个子组件组成:管理子系统(MrSS)和被管理子系统(MdSS)。这些子系统是独立构建的,但它们之间不断地相互作用。系统使用的多种教学策略(mps)是由MdSS实施的。而用于(重新)配置MdSS的交换逻辑(SL)则由MrSS作为自治控制环路(ACL)来实现。mps和SL允许根据学生知识水平(SKL)的清晰值触发适当的PS。然而,SKL的特点是高度的不确定性。为了克服这一缺陷,我们将模糊控制集成到MrSS中以处理不确定性,从而改进策略选择过程。模糊MrSS考虑到系统的模糊性和不确定性,通过模糊规则将不同的上下文参数和SKL联系起来。我们将介绍用数学子域进行的实验。
{"title":"Fuzzy Logic Based self-switching multi-strategic pedagogical agent","authors":"Roumaysa Bousselidj, Soufiane Boulehoueche","doi":"10.1109/ICTAACS53298.2021.9715226","DOIUrl":"https://doi.org/10.1109/ICTAACS53298.2021.9715226","url":null,"abstract":"The Self-Switching Multi-Strategic Pedagogical Agent is designed following the Autonomic Computing and the Component-Based Agents approaches. It is comprised of two sub-components: Manager (MrSS) and Managed (MdSS) Sub-Systems. These sub-systems are built independently, but they constantly interact with one another. The Multiple Pedagogical Strategies (MPSs) that are used by the system are implemented by MdSS. While the Switching Logic (SL), that is used to (re)conFigure the MdSS, is implemented by the MrSS as an Autonomic Control Loop (ACL). The MPSs and the SL permit to trigger the appropriate PS regarding the crisp values of the Student Knowledge Level (SKL). However, the SKL is characterized by a high degree of uncertainty. To overcome this deficiency, we integrate fuzzy control in the MrSS to handle the uncertainty and consequently improve the strategy selection process. Fuzzy MrSS links the different context parameters and SKL through fuzzy rules taking into account the system’s fuzziness and uncertainties. We will present experiments carried with the Math sub-domain.","PeriodicalId":284572,"journal":{"name":"2021 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1