Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420630
Ali Alemi Matin Pour, S. Jalili
Extracting aspect term is essential for aspect level sentiment analysis; Sentiment analysis collects and extracts the opinions expressed in social media and websites' comments and then analyzes them, helping users and stakeholders understand public views on the issues raised better and more quickly. Aspect-level sentiment analysis provides more detailed information, which is very beneficial for use in many various domains. In this paper, the significant contribution is to provide a data preprocessing method and a deep convolutional neural network (CNN) to label each word in opinionated sentences as an aspect or non-aspect word. The proposed method extracts the terms of the aspect that can be used in analyzing the sentiment of the expressed aspect terms in the comments and opinions. The experimental results of the proposed method performed on the SemEval-2014 dataset show that it performs better than other prominent methods such as deep CNN. The proposed data preprocessing method with the deep CNN network can improve extraction of aspect terms according to F-measure by at least 1.05% and 0.95% on restaurant and laptop domains.
{"title":"Aspects Extraction for Aspect Level Opinion Analysis Based on Deep CNN","authors":"Ali Alemi Matin Pour, S. Jalili","doi":"10.1109/CSICC52343.2021.9420630","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420630","url":null,"abstract":"Extracting aspect term is essential for aspect level sentiment analysis; Sentiment analysis collects and extracts the opinions expressed in social media and websites' comments and then analyzes them, helping users and stakeholders understand public views on the issues raised better and more quickly. Aspect-level sentiment analysis provides more detailed information, which is very beneficial for use in many various domains. In this paper, the significant contribution is to provide a data preprocessing method and a deep convolutional neural network (CNN) to label each word in opinionated sentences as an aspect or non-aspect word. The proposed method extracts the terms of the aspect that can be used in analyzing the sentiment of the expressed aspect terms in the comments and opinions. The experimental results of the proposed method performed on the SemEval-2014 dataset show that it performs better than other prominent methods such as deep CNN. The proposed data preprocessing method with the deep CNN network can improve extraction of aspect terms according to F-measure by at least 1.05% and 0.95% on restaurant and laptop domains.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420548
Morteza Zakeri Nasrabadi, S. Parsa
Software testability is the propensity of code to reveal its existing faults, particularly during automated testing. Testing success depends on the testability of the program under test. On the other hand, testing success relies on the coverage of the test data provided by a given test data generation algorithm. However, little empirical evidence has been shown to clarify whether and how software testability affects test coverage. In this article, we propose a method to shed light on this subject. Our proposed framework uses the coverage of Software Under Test (SUT), provided by different automatically generated test suites, to build machine learning models, determining the testability of programs based on many source code metrics. The resultant models can predict the code coverage provided by a given test data generation algorithm before running the algorithm, reducing the cost of additional testing. The predicted coverage is used as a concrete proxy to quantify source code testability. Experiments show an acceptable accuracy of 81.94% in measuring and predicting software testability.
{"title":"Learning to Predict Software Testability","authors":"Morteza Zakeri Nasrabadi, S. Parsa","doi":"10.1109/CSICC52343.2021.9420548","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420548","url":null,"abstract":"Software testability is the propensity of code to reveal its existing faults, particularly during automated testing. Testing success depends on the testability of the program under test. On the other hand, testing success relies on the coverage of the test data provided by a given test data generation algorithm. However, little empirical evidence has been shown to clarify whether and how software testability affects test coverage. In this article, we propose a method to shed light on this subject. Our proposed framework uses the coverage of Software Under Test (SUT), provided by different automatically generated test suites, to build machine learning models, determining the testability of programs based on many source code metrics. The resultant models can predict the code coverage provided by a given test data generation algorithm before running the algorithm, reducing the cost of additional testing. The predicted coverage is used as a concrete proxy to quantify source code testability. Experiments show an acceptable accuracy of 81.94% in measuring and predicting software testability.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420582
Narjes Farzi
today organizations encounter many issues such as newfound technologies, new business models, and rapid changes. That is, following the evolutions in the global context, caused by information and communication technology in the field of trade, industry, and specifically information technology, organizations, companies, and particularly banks have undergone changes and altered their reaction method to the market. In this way, the role of enterprise architecture and using standards and reference models are crucial to the organizations. Accordingly, organizations which want to be active in the digital transformation and move towards digital banking should be able to implement an agile enterprise architecture and use reference models such as BIAN. The objective of this article is to investigate the role of BIAN standard in moving towards digital banking.
{"title":"Investigation of the Place of BIAN Standard in Digital Banking Enterprise Architecture","authors":"Narjes Farzi","doi":"10.1109/CSICC52343.2021.9420582","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420582","url":null,"abstract":"today organizations encounter many issues such as newfound technologies, new business models, and rapid changes. That is, following the evolutions in the global context, caused by information and communication technology in the field of trade, industry, and specifically information technology, organizations, companies, and particularly banks have undergone changes and altered their reaction method to the market. In this way, the role of enterprise architecture and using standards and reference models are crucial to the organizations. Accordingly, organizations which want to be active in the digital transformation and move towards digital banking should be able to implement an agile enterprise architecture and use reference models such as BIAN. The objective of this article is to investigate the role of BIAN standard in moving towards digital banking.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420541
Faeze Rasouli, M. Taheri
In this paper, a novel fragile watermarking scheme is proposed for both tamper detection and tampered image recovery based on Hamming code. To serve this purpose, the authentication code (check bits) is computed using Hamming code from data bits. In this work, data bits were selected from the five Most Significant Bits (5_MSB) of the pixel values and authentication code is embedded into the three Least Significant Bits (3LSBs) to preserve image quality. Hamming (7,4) has been extended, in this paper, to (8,5) and is used for embedding, error detection and correction. Each instance of coding is applied on eight pixels (one bit per pixel) located in sufficient far parts of the image. Hence, for tampers smaller than a threshold, the recovery can be done perfectly. According to the experimental results, the proposed method achieves better performance in terms of recovering the tampered areas, compared to state-of-the-art.
{"title":"A New Fragile Watermarking based on Distributed Hamming Code","authors":"Faeze Rasouli, M. Taheri","doi":"10.1109/CSICC52343.2021.9420541","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420541","url":null,"abstract":"In this paper, a novel fragile watermarking scheme is proposed for both tamper detection and tampered image recovery based on Hamming code. To serve this purpose, the authentication code (check bits) is computed using Hamming code from data bits. In this work, data bits were selected from the five Most Significant Bits (5_MSB) of the pixel values and authentication code is embedded into the three Least Significant Bits (3LSBs) to preserve image quality. Hamming (7,4) has been extended, in this paper, to (8,5) and is used for embedding, error detection and correction. Each instance of coding is applied on eight pixels (one bit per pixel) located in sufficient far parts of the image. Hence, for tampers smaller than a threshold, the recovery can be done perfectly. According to the experimental results, the proposed method achieves better performance in terms of recovering the tampered areas, compared to state-of-the-art.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420625
M. D. Khomami, Alireza Rezvanian, A. Saghiri, M. Meybodi
The dominating set (DS) problem has noticed the selecting a subset of vertices that every vertex in the graph is either is adjacent to one or more nodes of this subset. The DS with the minimum cardinality is called MDS (minimum dominating set). The MDS problem has several applications in different domains, such as network monitoring, routing, epidemic control and social network. The MDS is known as the NP-Hard problem. Nevertheless, the existing research has focused on the MDS problem to single networks. However, in many real structures, there exist a complex structure involving a set of components combined up by different connections and known as multiplex networks. In this paper, we introduce a learning automaton (LA) based algorithm for find the MDS problem in multiplex networks. In the proposed algorithm, each node of the multiplex network is considered an LA with two actions of a candidate or non-candidate corresponding to the dominating set and non-dominating set. By selecting candidate DS and evaluation mechanisms, the algorithm tries to find a dominating set with the smallest cardinality and as the algorithm proceeds, a candidate solution converges to the optimal solution of the MDS of multiplex networks. With the aid of learning and the behavior of learning automata for finding solution, this algorithm which is present in this paper reduces the number of dominating set, in multiplex networks iteratively. Experimental results demonstrate that in many well-known datasets, the proposed algorithm is efficient with respect to the evaluation measure.
{"title":"Solving Minimum Dominating Set in Multiplex Networks Using Learning Automata","authors":"M. D. Khomami, Alireza Rezvanian, A. Saghiri, M. Meybodi","doi":"10.1109/CSICC52343.2021.9420625","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420625","url":null,"abstract":"The dominating set (DS) problem has noticed the selecting a subset of vertices that every vertex in the graph is either is adjacent to one or more nodes of this subset. The DS with the minimum cardinality is called MDS (minimum dominating set). The MDS problem has several applications in different domains, such as network monitoring, routing, epidemic control and social network. The MDS is known as the NP-Hard problem. Nevertheless, the existing research has focused on the MDS problem to single networks. However, in many real structures, there exist a complex structure involving a set of components combined up by different connections and known as multiplex networks. In this paper, we introduce a learning automaton (LA) based algorithm for find the MDS problem in multiplex networks. In the proposed algorithm, each node of the multiplex network is considered an LA with two actions of a candidate or non-candidate corresponding to the dominating set and non-dominating set. By selecting candidate DS and evaluation mechanisms, the algorithm tries to find a dominating set with the smallest cardinality and as the algorithm proceeds, a candidate solution converges to the optimal solution of the MDS of multiplex networks. With the aid of learning and the behavior of learning automata for finding solution, this algorithm which is present in this paper reduces the number of dominating set, in multiplex networks iteratively. Experimental results demonstrate that in many well-known datasets, the proposed algorithm is efficient with respect to the evaluation measure.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129052472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420596
A. Foroutannia, Milad Shoryabi, Amirali Alizadeh Anaraki, A. Rowhanimanesh
Swarm robotics is an inspiration from nature and incorporates swarm intelligence to help collective robotics. This recent technology is usually characterized by a swarm of simple, low-cost, and small robots instead of a complicated and expensive robot. Designing optimal and reliable swarm intelligence algorithms require real-world test environments. As a practical solution, physical platforms can efficiently address this issue. In this paper, a programmable physical platform, called SIN, is introduced for swarm robotics. Different design parameters such as communication range, signaling pattern, types of sensors and actuators, cooperation rules, and degree of uncertainty and noise can be simply adjusted by user. The building blocks of each agent has been developed in a modular form to improve the hardware flexibility. To illustrate the efficiency of the proposed platform, a cooperative multi-robot target tracking problem is implemented on this platform as a case study, where the robots interact by artificial attraction-repulsion forces based on short-range and noisy optical communication. The results demonstrate how the details of swarm behaviors such as decentralized aggregation and collective target tracking can be successfully implemented on the proposed platform.
{"title":"SIN: A Programmable Platform for Swarm Robotics","authors":"A. Foroutannia, Milad Shoryabi, Amirali Alizadeh Anaraki, A. Rowhanimanesh","doi":"10.1109/CSICC52343.2021.9420596","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420596","url":null,"abstract":"Swarm robotics is an inspiration from nature and incorporates swarm intelligence to help collective robotics. This recent technology is usually characterized by a swarm of simple, low-cost, and small robots instead of a complicated and expensive robot. Designing optimal and reliable swarm intelligence algorithms require real-world test environments. As a practical solution, physical platforms can efficiently address this issue. In this paper, a programmable physical platform, called SIN, is introduced for swarm robotics. Different design parameters such as communication range, signaling pattern, types of sensors and actuators, cooperation rules, and degree of uncertainty and noise can be simply adjusted by user. The building blocks of each agent has been developed in a modular form to improve the hardware flexibility. To illustrate the efficiency of the proposed platform, a cooperative multi-robot target tracking problem is implemented on this platform as a case study, where the robots interact by artificial attraction-repulsion forces based on short-range and noisy optical communication. The results demonstrate how the details of swarm behaviors such as decentralized aggregation and collective target tracking can be successfully implemented on the proposed platform.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420598
M. Zaree, Mohsen Raji
Linear Feedback Shift Registers (LFSR) are extensively used in variety of applications such as Built-In-Self-Test circuits or Pseudo Random Number Generators. Hence, fault tolerant design of LFSR is essential for the applications with high reliability demands. Traditional fault tolerant LFSRs include large number of Single-Point-of-Failures (SPoFs) in which any fault results in the whole system failure. In this paper, a new fault tolerant architecture for LFSR (named as FT-LFSR) is proposed in which the number of SPoFs are significantly reduced compared to the previous ones. To this end, a modified version of Triple Modular Redundancy (TMR) empowered with some extra controlling units for identifying the operational module is used. In addition, a novel metric called Reliability-Area-Factor (RAF) is introduced to evaluate the efficacy of the redundancy-based fault tolerant techniques (such as FT-LFSR) in terms of number of SPoFs and the area overhead. Experimental results show that, the FT-LFSR is resilient to all single transient and permanent faults except in its limited SPoFs and many patterns of multiple faults.
{"title":"FT-LFSR: A Fault Tolerant Architecture for Linear Feedback Shift Registers","authors":"M. Zaree, Mohsen Raji","doi":"10.1109/CSICC52343.2021.9420598","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420598","url":null,"abstract":"Linear Feedback Shift Registers (LFSR) are extensively used in variety of applications such as Built-In-Self-Test circuits or Pseudo Random Number Generators. Hence, fault tolerant design of LFSR is essential for the applications with high reliability demands. Traditional fault tolerant LFSRs include large number of Single-Point-of-Failures (SPoFs) in which any fault results in the whole system failure. In this paper, a new fault tolerant architecture for LFSR (named as FT-LFSR) is proposed in which the number of SPoFs are significantly reduced compared to the previous ones. To this end, a modified version of Triple Modular Redundancy (TMR) empowered with some extra controlling units for identifying the operational module is used. In addition, a novel metric called Reliability-Area-Factor (RAF) is introduced to evaluate the efficacy of the redundancy-based fault tolerant techniques (such as FT-LFSR) in terms of number of SPoFs and the area overhead. Experimental results show that, the FT-LFSR is resilient to all single transient and permanent faults except in its limited SPoFs and many patterns of multiple faults.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"687 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420612
M. Shabestari, A. Ahmadi
There exist a lot of data associated with psychology, nowadays. Using data mining science, the relation between different subjects including self-esteem, general health, depression, etc. can be detected. Self-esteem is considered a subject of great importance in psychology, since it is one of the most significant factors in favorable human growth which shows how one feels about his worthiness and self-confirmation. Depression is a psychic state which is identified by the person’s unhappiness over time. Mental health, which is a significant moderator in the process of stress, plays a vital role in mitigating stress, increasing health, and improving the quality of life in the society. In order that the level of self-esteem would be measured, special questionnaires are used. Proper and accurate analysis of the questionnaires is one of the challenges of psychology. Several efforts have been made to improve the quality of processing psychological data by using through artificial intelligence. In the present paper, the relation between self-esteem and general health has been analyzed using Coopersmith’s self-esteem questionnaire, Goldberg’s general health questionnaire, clustering algorithms, and semantic data mining techniques. The results have shown that low self-esteem has a weak relationship with three out of four general health subscales; however, there has been a strong relationship with three subscales in high self-esteem levels.
{"title":"Identifying the relationship between human self-esteem and general health using data mining","authors":"M. Shabestari, A. Ahmadi","doi":"10.1109/CSICC52343.2021.9420612","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420612","url":null,"abstract":"There exist a lot of data associated with psychology, nowadays. Using data mining science, the relation between different subjects including self-esteem, general health, depression, etc. can be detected. Self-esteem is considered a subject of great importance in psychology, since it is one of the most significant factors in favorable human growth which shows how one feels about his worthiness and self-confirmation. Depression is a psychic state which is identified by the person’s unhappiness over time. Mental health, which is a significant moderator in the process of stress, plays a vital role in mitigating stress, increasing health, and improving the quality of life in the society. In order that the level of self-esteem would be measured, special questionnaires are used. Proper and accurate analysis of the questionnaires is one of the challenges of psychology. Several efforts have been made to improve the quality of processing psychological data by using through artificial intelligence. In the present paper, the relation between self-esteem and general health has been analyzed using Coopersmith’s self-esteem questionnaire, Goldberg’s general health questionnaire, clustering algorithms, and semantic data mining techniques. The results have shown that low self-esteem has a weak relationship with three out of four general health subscales; however, there has been a strong relationship with three subscales in high self-esteem levels.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130871283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420553
Fatemeh Rezaimehr, Chitra Dadkhah
Recommender systems help people in finding a particular item based on their preference from a wide range of products in online shopping rapidly. One of the most popular models of recommendation systems is the Collaborative Filtering Recommendation System (CFRS) that recommend the top-K items to active user based on peer grouping user ratings. The implementation of CFRS is easy and it can easily be attacked by fake users and affect the recommendation. Fake users create a fake profile to attack the RS and change the output of it. Different attack types with different features and attacking methods exist in which decrease the accuracy. It is important to detect fake users, remove their rating from rating matrix and recognize the items has been attacked. In the recent years, many algorithms have been proposed to detect the attackers but first, researchers have to inject the attack type into their dataset and then evaluate their proposed approach. The purpose of this article is to develop a tool to inject the different attack types to datasets. Proposed tool constructs a new dataset containing the fake users therefore researchers can use it for evaluating their proposed attack detection methods. Researchers could choose the attack type and the size of attack with a user interface of our proposed tool easily.
{"title":"Injection Shilling Attack Tool for Recommender Systems","authors":"Fatemeh Rezaimehr, Chitra Dadkhah","doi":"10.1109/CSICC52343.2021.9420553","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420553","url":null,"abstract":"Recommender systems help people in finding a particular item based on their preference from a wide range of products in online shopping rapidly. One of the most popular models of recommendation systems is the Collaborative Filtering Recommendation System (CFRS) that recommend the top-K items to active user based on peer grouping user ratings. The implementation of CFRS is easy and it can easily be attacked by fake users and affect the recommendation. Fake users create a fake profile to attack the RS and change the output of it. Different attack types with different features and attacking methods exist in which decrease the accuracy. It is important to detect fake users, remove their rating from rating matrix and recognize the items has been attacked. In the recent years, many algorithms have been proposed to detect the attackers but first, researchers have to inject the attack type into their dataset and then evaluate their proposed approach. The purpose of this article is to develop a tool to inject the different attack types to datasets. Proposed tool constructs a new dataset containing the fake users therefore researchers can use it for evaluating their proposed attack detection methods. Researchers could choose the attack type and the size of attack with a user interface of our proposed tool easily.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"444 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-03DOI: 10.1109/CSICC52343.2021.9420572
M. Mohammadi, R. Mokhtari
This paper proposes an equation based on a nonlinear filter for speckle noise removal by introducing a region indicator. The use of Gaussian convolution in the proposed region indicator makes the quality of the edges of the image better than other models. The proposed equation also removes noise well due to having a nonlinear filter while preserving important image details such as edges. Experimental results show that the proposed model can handle speckle noise removal quite well.
{"title":"A Model-Based on Filtration Technique for Speckle Noise Removal from Ultrasound Images","authors":"M. Mohammadi, R. Mokhtari","doi":"10.1109/CSICC52343.2021.9420572","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420572","url":null,"abstract":"This paper proposes an equation based on a nonlinear filter for speckle noise removal by introducing a region indicator. The use of Gaussian convolution in the proposed region indicator makes the quality of the edges of the image better than other models. The proposed equation also removes noise well due to having a nonlinear filter while preserving important image details such as edges. Experimental results show that the proposed model can handle speckle noise removal quite well.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"36 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}