Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981718
R. Alguliyev, R. Aliguliyev, L. Sukhostat
This paper proposes a weighted consensus approach for data clustering, where each input basic clustering method is weighted. The weights are automatically determined by solving an optimization problem. Experiments are carried out on three datasets: NSL-KDD, Forest Cover Type, and Phone Accelerometer datasets. The results show the effectiveness of the proposed approach to Big data clustering compared to single clustering methods.
{"title":"Consensus Clustering by Weight Optimization of Input Partitions","authors":"R. Alguliyev, R. Aliguliyev, L. Sukhostat","doi":"10.1109/AICT47866.2019.8981718","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981718","url":null,"abstract":"This paper proposes a weighted consensus approach for data clustering, where each input basic clustering method is weighted. The weights are automatically determined by solving an optimization problem. Experiments are carried out on three datasets: NSL-KDD, Forest Cover Type, and Phone Accelerometer datasets. The results show the effectiveness of the proposed approach to Big data clustering compared to single clustering methods.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130154099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981774
Nadine Obwaller, J. Langer, F. Eibensteiner
The increasing demand of wearable devices leads to evolving technologies within the smart industries field. Built-in sensors in fabrics represents a state of the art technology and open a new area in the development of smart systems. Smart sensor devices play an important role in the domains of healthcare, motion detection, sports and fitness. This paper presents the design, construction and evaluation of a piezoresistive woven fabric sewn into a wool glove which represents a versatile smart sensor tool for motion detection use cases. This wearable gesture sensing device provides a gesture-based realtime interaction with digital technologies as well as Virtual and Augmented Reality. We show in this paper that piezoresistive fabric proves to be a reliant sensing device due to the evaluation of resistance changes during stretch and strain. The paper includes research of wiring and electrical contacting of fabric patches to gain precise measurement results suppressing interferences caused by external factors like dermal contacts. The prototype, developed in this paper, shows detection of basic movements and gestures.
{"title":"Smart Clothing for Detecting Pressure-Sensitive Gestures","authors":"Nadine Obwaller, J. Langer, F. Eibensteiner","doi":"10.1109/AICT47866.2019.8981774","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981774","url":null,"abstract":"The increasing demand of wearable devices leads to evolving technologies within the smart industries field. Built-in sensors in fabrics represents a state of the art technology and open a new area in the development of smart systems. Smart sensor devices play an important role in the domains of healthcare, motion detection, sports and fitness. This paper presents the design, construction and evaluation of a piezoresistive woven fabric sewn into a wool glove which represents a versatile smart sensor tool for motion detection use cases. This wearable gesture sensing device provides a gesture-based realtime interaction with digital technologies as well as Virtual and Augmented Reality. We show in this paper that piezoresistive fabric proves to be a reliant sensing device due to the evaluation of resistance changes during stretch and strain. The paper includes research of wiring and electrical contacting of fabric patches to gain precise measurement results suppressing interferences caused by external factors like dermal contacts. The prototype, developed in this paper, shows detection of basic movements and gestures.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132622474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981719
S. I. Jabbar, A. Aladi
Contrast enhancement of the Magnetic Resonance Imaging (MRI) videos is a powerful tool that helps to illustrate different essential details. In this work, a new automated video contrast enhancement method was introduced and was applied on the cardiac MRI video. This technique was based on fuzzy image technique, which consists of three stages: fuzzification, modification of membership equation, and defuzzification. In the second stage, the parameters of the membership function were selected depending on evaluation of maximum fuzzy entropy. The quality of results was evaluated by comparison with other methods using quantitative metrics. The results demonstrate an improved contrast of MRI video using this method, where the contrast is 50% more than input MRI video and 10% higher compared other method.
{"title":"Automated Contrast Enhancement of the MRI Video Imaging","authors":"S. I. Jabbar, A. Aladi","doi":"10.1109/AICT47866.2019.8981719","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981719","url":null,"abstract":"Contrast enhancement of the Magnetic Resonance Imaging (MRI) videos is a powerful tool that helps to illustrate different essential details. In this work, a new automated video contrast enhancement method was introduced and was applied on the cardiac MRI video. This technique was based on fuzzy image technique, which consists of three stages: fuzzification, modification of membership equation, and defuzzification. In the second stage, the parameters of the membership function were selected depending on evaluation of maximum fuzzy entropy. The quality of results was evaluated by comparison with other methods using quantitative metrics. The results demonstrate an improved contrast of MRI video using this method, where the contrast is 50% more than input MRI video and 10% higher compared other method.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981790
V. Lanin, L. Lyadova, Irina Shalyaeva
Multifaceted ontology definition is suggested and an approach to storing multifaceted ontologies in the ontology-driven system for monitoring processes based on Internet sources is presented. This system can be adapted for events analysis and global processes monitoring, for social network analysis and etc. Ontology-driven architecture intends using an ontology. Ontologies are used to search data in the Internet sources with information retrieval tools and to structuring information according to the data structure defined by users. The multifaceted ontology combines different types of ontologies: the sources ontology defines information sources used by experts for analysis; the domain ontologies describes research interests of the experts needing analysis (they describe ontology of problem including domain ontologies); data formats are described with structures ontology used for structuring data. Multifaceted ontology is the information kernel of the analysis system. Researchers need tools for effective storing and processing information. An approach based on natural language addressing is proposed as perspective method of multifaceted ontology storing. Data structures and algorithms are described and discussed.
{"title":"Storing Multifaceted Ontologies with Natural Language Addressing","authors":"V. Lanin, L. Lyadova, Irina Shalyaeva","doi":"10.1109/AICT47866.2019.8981790","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981790","url":null,"abstract":"Multifaceted ontology definition is suggested and an approach to storing multifaceted ontologies in the ontology-driven system for monitoring processes based on Internet sources is presented. This system can be adapted for events analysis and global processes monitoring, for social network analysis and etc. Ontology-driven architecture intends using an ontology. Ontologies are used to search data in the Internet sources with information retrieval tools and to structuring information according to the data structure defined by users. The multifaceted ontology combines different types of ontologies: the sources ontology defines information sources used by experts for analysis; the domain ontologies describes research interests of the experts needing analysis (they describe ontology of problem including domain ontologies); data formats are described with structures ontology used for structuring data. Multifaceted ontology is the information kernel of the analysis system. Researchers need tools for effective storing and processing information. An approach based on natural language addressing is proposed as perspective method of multifaceted ontology storing. Data structures and algorithms are described and discussed.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981788
I. Veselov, E. Zamyatina, S. Plaksin, L. Farshatova
early diagnosis of patients' diseases allows to prescribe effective treatment in a timely manner. This article presents the results of research related to the recognition of images of pleural effusions. The purpose of the research is the recognition of images characteristic of pathologies associated with oncological diseases. When recognizing images, convolutional neural networks were used. When developing software, the authors used the TenzorFlow and OpenCV libraries. Image recognition accuracy is 95%. The studies are incomplete; the authors are trying to improve the results of research by replenishing the training sample with new copies of images of pleural effusions and using combinations of pattern recognition methods.
{"title":"Towards Recognition of Pleural Effusion Images","authors":"I. Veselov, E. Zamyatina, S. Plaksin, L. Farshatova","doi":"10.1109/AICT47866.2019.8981788","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981788","url":null,"abstract":"early diagnosis of patients' diseases allows to prescribe effective treatment in a timely manner. This article presents the results of research related to the recognition of images of pleural effusions. The purpose of the research is the recognition of images characteristic of pathologies associated with oncological diseases. When recognizing images, convolutional neural networks were used. When developing software, the authors used the TenzorFlow and OpenCV libraries. Image recognition accuracy is 95%. The studies are incomplete; the authors are trying to improve the results of research by replenishing the training sample with new copies of images of pleural effusions and using combinations of pattern recognition methods.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981798
A. Lofaro
It is proposed a design methodology definition for a system of systems (or “ecosystem”) for risk assessment, including elements based on different approaches and technologies, and its development and validation through application to a case study, radiation health risk hazard in the context of long-term space exploration, including a Proof of Concept. Characteristics and reasons for the choice of the case study are discussed, together with results of the analysis so far, possible evolution, and possible generalisation to a number of cases beyond and outside the case study, for other types of risks or even not for risk assessment
{"title":"A Dynamic Modular Ecosystem Approach for Risk Assessment Systems: Feasibility, design methodology, and generalisable application to a case study on ionising radiation and space exploration scenarios with realisation of a proof of concept","authors":"A. Lofaro","doi":"10.1109/AICT47866.2019.8981798","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981798","url":null,"abstract":"It is proposed a design methodology definition for a system of systems (or “ecosystem”) for risk assessment, including elements based on different approaches and technologies, and its development and validation through application to a case study, radiation health risk hazard in the context of long-term space exploration, including a Proof of Concept. Characteristics and reasons for the choice of the case study are discussed, together with results of the analysis so far, possible evolution, and possible generalisation to a number of cases beyond and outside the case study, for other types of risks or even not for risk assessment","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128119314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981769
A. Zalzala
This paper presents a data-driven qualitative research approach to identifying the role of technology for chronic disease management and control in large underserved communities. Within the context of a knowledge translation framework, the main emphasis of this work is on tailoring knowledge from data provided by a community using mobile health (m-health) solutions followed by analysis leading to synthesizing models that are ultimately used for providing feasible technology solutions. The research design is described, along with an application case study for data capturing from a slum community in India. The reported results present the methodology and capturing process for data-driven grounded theory and include details of text-mining and qualitative results.
{"title":"A Data-Driven Approach to Problem Assessment, Technology Design, and Sustainable Business Planning for m-Health Delivery","authors":"A. Zalzala","doi":"10.1109/AICT47866.2019.8981769","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981769","url":null,"abstract":"This paper presents a data-driven qualitative research approach to identifying the role of technology for chronic disease management and control in large underserved communities. Within the context of a knowledge translation framework, the main emphasis of this work is on tailoring knowledge from data provided by a community using mobile health (m-health) solutions followed by analysis leading to synthesizing models that are ultimately used for providing feasible technology solutions. The research design is described, along with an application case study for data capturing from a slum community in India. The reported results present the methodology and capturing process for data-driven grounded theory and include details of text-mining and qualitative results.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128109704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981794
R. Alakbarov
Article analyses problems occurring in Mobile Cloud Computing (MCC) created in order to eliminate existing limitations in mobile devices' resources (energy consumption, computing and memory resources etc.) and their solution methods. It is noted that, proposed architecture meets the demands of the mobile devices for resources more effectively and eliminates delays occurring in the network. Reducing energy consumption and network delays during the use of multimedia software applications by the mobile devices of the cloudlet based mobile network are described.
{"title":"Study of Architectural- Technological Principles of Cloudlet Based Mobile Cloud Computing","authors":"R. Alakbarov","doi":"10.1109/AICT47866.2019.8981794","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981794","url":null,"abstract":"Article analyses problems occurring in Mobile Cloud Computing (MCC) created in order to eliminate existing limitations in mobile devices' resources (energy consumption, computing and memory resources etc.) and their solution methods. It is noted that, proposed architecture meets the demands of the mobile devices for resources more effectively and eliminates delays occurring in the network. Reducing energy consumption and network delays during the use of multimedia software applications by the mobile devices of the cloudlet based mobile network are described.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981779
Ag. Asri Ag. Ibrahim, K. Nisar, Yeoh Keng Hzou, I. Welch
This review paper is based on Radio Frequency Identification (RFID) technology, Wireless Sensor Networks (WSNs) and wireless information & communication networks. RFID technology use for tags and readers enclosed to shop-floor industrial stuffs such as operators, terminals, vessels, stocks and Smart Home (SH) architecture that includes sensors, data communication and data integration. The system collect movement based activities data from the objects using Radio Frequency Identification (RFID) technology. Passive RFID tags can be deliver at a gap and do not require a Line of Sight Antenna (LoSA) between tag and reader. Furthermore, RFID is an another expertise with a prospective to substitute old technology such as Universal Product Code (UPC) barcodes reader over network. In this review paper also discussed why RFID is chosen between other sensors.
{"title":"Review and Analyzing RFID Technology Tags and Applications","authors":"Ag. Asri Ag. Ibrahim, K. Nisar, Yeoh Keng Hzou, I. Welch","doi":"10.1109/AICT47866.2019.8981779","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981779","url":null,"abstract":"This review paper is based on Radio Frequency Identification (RFID) technology, Wireless Sensor Networks (WSNs) and wireless information & communication networks. RFID technology use for tags and readers enclosed to shop-floor industrial stuffs such as operators, terminals, vessels, stocks and Smart Home (SH) architecture that includes sensors, data communication and data integration. The system collect movement based activities data from the objects using Radio Frequency Identification (RFID) technology. Passive RFID tags can be deliver at a gap and do not require a Line of Sight Antenna (LoSA) between tag and reader. Furthermore, RFID is an another expertise with a prospective to substitute old technology such as Universal Product Code (UPC) barcodes reader over network. In this review paper also discussed why RFID is chosen between other sensors.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134250714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/AICT47866.2019.8981727
F. Abdullayeva
Malware creators generate new malicious software samples by making minor changes in previously generated samples. Here, similar features of the samples from the same malware family may be used in the detection of newly generated malicious software. In this paper, a new malware detection model based on the similarity of images is proposed. Malware detection is ensured by identifying the changes made in images. For the detection of the changes in malware images, a probabilistic framework is proposed. As a result of the experiments carried out on the two images of the program code from the same class, the proposed method accurately determines the changes made to these codes. The proposed model is tested on the Malimg dataset, and the model recognizes the changes in the software code with high accuracy.
{"title":"Malware Detection in Cloud Computing using an Image Visualization Technique","authors":"F. Abdullayeva","doi":"10.1109/AICT47866.2019.8981727","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981727","url":null,"abstract":"Malware creators generate new malicious software samples by making minor changes in previously generated samples. Here, similar features of the samples from the same malware family may be used in the detection of newly generated malicious software. In this paper, a new malware detection model based on the similarity of images is proposed. Malware detection is ensured by identifying the changes made in images. For the detection of the changes in malware images, a probabilistic framework is proposed. As a result of the experiments carried out on the two images of the program code from the same class, the proposed method accurately determines the changes made to these codes. The proposed model is tested on the Malimg dataset, and the model recognizes the changes in the software code with high accuracy.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133272402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}