首页 > 最新文献

2020 11th International Conference on Information and Knowledge Technology (IKT)最新文献

英文 中文
Churn Prediction in Payment Terminals Using RFM model and Deep Neural Network 基于RFM模型和深度神经网络的支付终端流失预测
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345626
M. Dadfarnia, Ali Alemi Matinpour, M. Abdoos
In recent years, there is remarkable growing concern for marketing team to retain their customers. This can be achieved by predicting accurately ahead of time, whether a terminal for buying is valuable in the foreseeable future or not. This paper presents the application of Deep Neural Network in the issue of classifying the payment terminals in different branches of Parsian bank specifically. The paper uses real data for classifying various payment terminals in 6 classes of terminal by a 5 layer deep neural network and RFM model. The empirical results reveal that utilizing the deep network generate significantly better accuracy in comparison with other popular methods.
近年来,人们越来越关注营销团队如何留住客户。这可以通过提前准确预测购买终端在可预见的未来是否有价值来实现。本文具体介绍了深度神经网络在巴黎银行不同分支机构支付终端分类问题中的应用。本文利用真实数据,利用5层深度神经网络和RFM模型,将各类支付终端分为6类。实证结果表明,与其他流行的方法相比,使用深度网络可以显著提高准确率。
{"title":"Churn Prediction in Payment Terminals Using RFM model and Deep Neural Network","authors":"M. Dadfarnia, Ali Alemi Matinpour, M. Abdoos","doi":"10.1109/IKT51791.2020.9345626","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345626","url":null,"abstract":"In recent years, there is remarkable growing concern for marketing team to retain their customers. This can be achieved by predicting accurately ahead of time, whether a terminal for buying is valuable in the foreseeable future or not. This paper presents the application of Deep Neural Network in the issue of classifying the payment terminals in different branches of Parsian bank specifically. The paper uses real data for classifying various payment terminals in 6 classes of terminal by a 5 layer deep neural network and RFM model. The empirical results reveal that utilizing the deep network generate significantly better accuracy in comparison with other popular methods.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-Domain question classification and completion in conversational information search 会话信息搜索中的开放域问题分类和补全
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345613
Omid Mohammadi Kia, Mahmood Neshati, M. S. Alamdari
Searching for new information requires talking to the system. In this research, an Open-domain Conversational information search system has been developed. This system has been implemented using the TREC CAsT 2019 track, which is one of the first attempts to build a framework in this area. According to the user's previous questions, the system firstly completes the question (using the first and the previous question in each turn) and then classifies it (based on the question words). This system extracts the related answers according to the rules of each question. In this research, a simple yet effective method with high performance has been used, which on average, extracts 20% more relevant results than the baseline.
搜索新信息需要与系统对话。在本研究中,开发了一个开放域会话信息搜索系统。该系统已使用TREC CAsT 2019轨道实施,这是在该领域建立框架的首次尝试之一。根据用户之前的问题,系统首先完成问题(每轮使用第一个问题和前一个问题),然后进行分类(基于问题词)。该系统根据每个问题的规则抽取相关答案。在本研究中,我们使用了一种简单而有效的高性能方法,平均提取的相关结果比基线多20%。
{"title":"Open-Domain question classification and completion in conversational information search","authors":"Omid Mohammadi Kia, Mahmood Neshati, M. S. Alamdari","doi":"10.1109/IKT51791.2020.9345613","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345613","url":null,"abstract":"Searching for new information requires talking to the system. In this research, an Open-domain Conversational information search system has been developed. This system has been implemented using the TREC CAsT 2019 track, which is one of the first attempts to build a framework in this area. According to the user's previous questions, the system firstly completes the question (using the first and the previous question in each turn) and then classifies it (based on the question words). This system extracts the related answers according to the rules of each question. In this research, a simple yet effective method with high performance has been used, which on average, extracts 20% more relevant results than the baseline.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach to model the optimal service provisioning in vehicular cloud networks 车用云网络中最优服务供给建模方法
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345638
Farhoud Jafari Kaleibar, M. Abbaspour
In recent years, the development of the Internet of things has also extended to transportation networks, affecting smart transportation networks. There are many vehicles in the city that do not use their resources (storage, processing and bandwidth) and therefore there is a good potential to use these resources as a cloud. However, the mobility of vehicles poses a challenge in providing and receiving services available in the cloud. On the other hand, service requests are not predictable and require the use of dynamic approaches for service provisioning. In this paper, we try to reduce the effect of these challenges by modeling the existing problem with the customized mathematical model of maximum coverage, and by using the approximate heuristic algorithm in this field. The simulation performed by the heuristic algorithm shows an improvement in terms of service delivery rate and resource efficiency compared to the random allocation mode.
近年来,物联网的发展也延伸到交通网络,影响智能交通网络。城市中有许多车辆没有使用它们的资源(存储、处理和带宽),因此有很好的潜力将这些资源用作云。然而,车辆的移动性在提供和接收云中的可用服务方面提出了挑战。另一方面,服务请求是不可预测的,需要使用动态方法来提供服务。在本文中,我们试图通过最大覆盖的定制数学模型对现有问题进行建模,并使用该领域的近似启发式算法来减少这些挑战的影响。启发式算法的仿真结果表明,与随机分配模式相比,启发式算法在服务交付率和资源效率方面都有提高。
{"title":"An approach to model the optimal service provisioning in vehicular cloud networks","authors":"Farhoud Jafari Kaleibar, M. Abbaspour","doi":"10.1109/IKT51791.2020.9345638","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345638","url":null,"abstract":"In recent years, the development of the Internet of things has also extended to transportation networks, affecting smart transportation networks. There are many vehicles in the city that do not use their resources (storage, processing and bandwidth) and therefore there is a good potential to use these resources as a cloud. However, the mobility of vehicles poses a challenge in providing and receiving services available in the cloud. On the other hand, service requests are not predictable and require the use of dynamic approaches for service provisioning. In this paper, we try to reduce the effect of these challenges by modeling the existing problem with the customized mathematical model of maximum coverage, and by using the approximate heuristic algorithm in this field. The simulation performed by the heuristic algorithm shows an improvement in terms of service delivery rate and resource efficiency compared to the random allocation mode.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133165084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Neural-Based Approach to Aid Early Parkinson's Disease Diagnosis 一种基于神经的方法来帮助早期帕金森病的诊断
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345635
Armin Salimi-Badr, Mohammadreza Hashemi
In this paper, a neural approach based on using Long-Short Term Memory (LSTM) neural networks is proposed to diagnose patients suffering from PD. In this study, it is shown that the temporal patterns of the gait cycle are different for healthy persons and patients. Therefore, by using a recurrent structure like LSTM, able to analyze the dynamic nature of the gait cycle, the proposed method extracts the temporal patterns to diagnose patients from healthy persons. Utilized data to extract the temporal shapes of the gait cycle are based on changing vertical Ground Reaction Force (vGRF), measured by 16 sensors placed in the soles of shoes worn by each subject. To reduce the number of data dimensions, the sequences of corresponding sensors placed in different feet are combined by subtraction. This method analyzes the temporal pattern of time-series collected from different sensors, without extracting special features representing statistics of different parts of the gait cycle. Finally, by recording and presenting data from 10 seconds of subject walking, the proposed approach can diagnose the patient from healthy persons with an average accuracy of 97.66%, and the total F1 score equal to 97.78%.
本文提出了一种基于长短期记忆(LSTM)神经网络的PD诊断方法。在这项研究中,它表明,步态周期的时间模式是不同的健康人和病人。因此,该方法利用LSTM等能够分析步态周期动态性质的循环结构,提取时间模式,从健康人中诊断患者。利用数据提取步态周期的时间形状是基于垂直地面反作用力(vGRF)的变化,由放置在每个受试者所穿的鞋底的16个传感器测量。为了减少数据维数,将放置在不同脚上的相应传感器序列进行减法组合。该方法分析从不同传感器收集的时间序列的时间模式,而不提取代表步态周期不同部分统计量的特殊特征。最后,通过记录并呈现受试者行走10秒的数据,所提出的方法可以从健康人中诊断出患者,平均准确率为97.66%,F1总分为97.78%。
{"title":"A Neural-Based Approach to Aid Early Parkinson's Disease Diagnosis","authors":"Armin Salimi-Badr, Mohammadreza Hashemi","doi":"10.1109/IKT51791.2020.9345635","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345635","url":null,"abstract":"In this paper, a neural approach based on using Long-Short Term Memory (LSTM) neural networks is proposed to diagnose patients suffering from PD. In this study, it is shown that the temporal patterns of the gait cycle are different for healthy persons and patients. Therefore, by using a recurrent structure like LSTM, able to analyze the dynamic nature of the gait cycle, the proposed method extracts the temporal patterns to diagnose patients from healthy persons. Utilized data to extract the temporal shapes of the gait cycle are based on changing vertical Ground Reaction Force (vGRF), measured by 16 sensors placed in the soles of shoes worn by each subject. To reduce the number of data dimensions, the sequences of corresponding sensors placed in different feet are combined by subtraction. This method analyzes the temporal pattern of time-series collected from different sensors, without extracting special features representing statistics of different parts of the gait cycle. Finally, by recording and presenting data from 10 seconds of subject walking, the proposed approach can diagnose the patient from healthy persons with an average accuracy of 97.66%, and the total F1 score equal to 97.78%.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods 基于机器学习方法的网络物理系统网络攻击检测与识别
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345627
Zohre Nasiri Zarandi, I. Sharifi
Cyber-physical systems(cps) have made significant progress in many dynamic applications due to the integration between physical processes, computational resources, and communication capabilities. However, cyber-attacks are a major threat to these systems. Unlike faults that occurs by accidents cyber-physical systems, cyber-attacks occur intelligently and stealthy. Some of these attacks which are called deception attacks, inject false data from sensors or controllers, and also by compromising with some cyber components, corrupt data, or enter misinformation into the system. If the system is unaware of the existence of these attacks, it won't be able to detect them, and performance may be disrupted or disabled altogether. Therefore, it is necessary to adapt algorithms to identify these types of attacks in these systems. It should be noted that the data generated in these systems is produced in very large number, with so much variety, and high speed, so it is important to use machine learning algorithms to facilitate the analysis and evaluation of data and to identify hidden patterns. In this research, the CPS is modeled as a network of agents that move in union with each other, and one agent is considered as a leader, and the other agents are commanded by the leader. The proposed method in this study is to use the structure of deep neural networks for the detection phase, which should inform the system of the existence of the attack in the initial moments of the attack. The use of resilient control algorithms in the network to isolate the misbehave agent in the leader-follower mechanism has been investigated. In the presented control method, after the attack detection phase with the use of a deep neural network, the control system uses the reputation algorithm to isolate the misbehave agent. Experimental analysis shows us that deep learning algorithms can detect attacks with higher performance that usual methods and can make cyber security simpler, more proactive, less expensive and far more effective.
由于物理过程、计算资源和通信能力的集成,网络物理系统(cps)在许多动态应用中取得了重大进展。然而,网络攻击是这些系统的主要威胁。与意外发生的网络物理系统故障不同,网络攻击是智能和隐蔽的。其中一些攻击被称为欺骗攻击,从传感器或控制器注入虚假数据,也通过妥协一些网络组件,破坏数据或向系统输入错误信息。如果系统不知道这些攻击的存在,它将无法检测到它们,并且性能可能会中断或完全禁用。因此,有必要调整算法来识别这些系统中的这些类型的攻击。需要注意的是,这些系统中产生的数据数量非常大,种类非常多,速度也非常快,因此使用机器学习算法来促进数据的分析和评估,并识别隐藏的模式是很重要的。在本研究中,CPS被建模为一个相互联合移动的智能体网络,其中一个智能体被认为是领导者,其他智能体由领导者指挥。本研究提出的方法是在检测阶段使用深度神经网络的结构,在攻击的初始时刻通知系统攻击的存在。研究了在网络中使用弹性控制算法来隔离leader-follower机制中行为不端的agent。在该控制方法中,在使用深度神经网络进行攻击检测阶段后,控制系统使用信誉算法隔离行为不端的代理。实验分析表明,深度学习算法能够以比通常方法更高的性能检测攻击,并且可以使网络安全更简单、更主动、更便宜、更有效。
{"title":"Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods","authors":"Zohre Nasiri Zarandi, I. Sharifi","doi":"10.1109/IKT51791.2020.9345627","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345627","url":null,"abstract":"Cyber-physical systems(cps) have made significant progress in many dynamic applications due to the integration between physical processes, computational resources, and communication capabilities. However, cyber-attacks are a major threat to these systems. Unlike faults that occurs by accidents cyber-physical systems, cyber-attacks occur intelligently and stealthy. Some of these attacks which are called deception attacks, inject false data from sensors or controllers, and also by compromising with some cyber components, corrupt data, or enter misinformation into the system. If the system is unaware of the existence of these attacks, it won't be able to detect them, and performance may be disrupted or disabled altogether. Therefore, it is necessary to adapt algorithms to identify these types of attacks in these systems. It should be noted that the data generated in these systems is produced in very large number, with so much variety, and high speed, so it is important to use machine learning algorithms to facilitate the analysis and evaluation of data and to identify hidden patterns. In this research, the CPS is modeled as a network of agents that move in union with each other, and one agent is considered as a leader, and the other agents are commanded by the leader. The proposed method in this study is to use the structure of deep neural networks for the detection phase, which should inform the system of the existence of the attack in the initial moments of the attack. The use of resilient control algorithms in the network to isolate the misbehave agent in the leader-follower mechanism has been investigated. In the presented control method, after the attack detection phase with the use of a deep neural network, the control system uses the reputation algorithm to isolate the misbehave agent. Experimental analysis shows us that deep learning algorithms can detect attacks with higher performance that usual methods and can make cyber security simpler, more proactive, less expensive and far more effective.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fast Duplicate Bug Reports Detector Training using Sampling for Dimension Reduction: Using Instance-based Learning for Continous Query in Real-World 使用采样降维的快速重复Bug报告检测器训练:在现实世界中使用基于实例的学习进行连续查询
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345611
Behzad Soleimani Neysiani, S. Doostali, S. M. Babamir, Zahra Aminoroaya
Duplicate bug report detection (DBRD) is a famous problem in software triage systems like Bugzilla. It is vital to update the internal machine learning (ML) models of DBRD for real-world usage and continuous query of new bug reports. The training phase of ML algorithms is time-consumable and dependent on the training dataset volume. Instance-based learning (IbL) is an ML technique that reduces the number of samples in the training dataset to achieve fast learning for the incremental database. This research introduces a hybrid approach using clustering and straight forward sampling to improve the runtime and validation performance of DBRD. Two bug report datasets of Android and Mozilla Firefox are used to evaluate the proposed approach. The experimental evaluation shows acceptable results and improvement in both runtime and validation performance of DBRD versus the traditional approach without IbL.
重复错误报告检测(DBRD)是Bugzilla等软件分类系统中一个著名的问题。更新DBRD的内部机器学习(ML)模型以适应现实世界的使用和持续查询新的错误报告是至关重要的。机器学习算法的训练阶段非常耗时,并且依赖于训练数据集的数量。基于实例的学习(IbL)是一种机器学习技术,它通过减少训练数据集中的样本数量来实现增量数据库的快速学习。本研究引入了一种使用聚类和直接抽样的混合方法来提高DBRD的运行时和验证性能。使用Android和Mozilla Firefox的两个bug报告数据集来评估建议的方法。实验评估结果表明,与没有IbL的传统方法相比,DBRD的运行时间和验证性能都得到了改善。
{"title":"Fast Duplicate Bug Reports Detector Training using Sampling for Dimension Reduction: Using Instance-based Learning for Continous Query in Real-World","authors":"Behzad Soleimani Neysiani, S. Doostali, S. M. Babamir, Zahra Aminoroaya","doi":"10.1109/IKT51791.2020.9345611","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345611","url":null,"abstract":"Duplicate bug report detection (DBRD) is a famous problem in software triage systems like Bugzilla. It is vital to update the internal machine learning (ML) models of DBRD for real-world usage and continuous query of new bug reports. The training phase of ML algorithms is time-consumable and dependent on the training dataset volume. Instance-based learning (IbL) is an ML technique that reduces the number of samples in the training dataset to achieve fast learning for the incremental database. This research introduces a hybrid approach using clustering and straight forward sampling to improve the runtime and validation performance of DBRD. Two bug report datasets of Android and Mozilla Firefox are used to evaluate the proposed approach. The experimental evaluation shows acceptable results and improvement in both runtime and validation performance of DBRD versus the traditional approach without IbL.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The risk prediction of heart disease by using neuro-fuzzy and improved GOA 基于神经模糊和改进GOA的心脏病风险预测
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345630
V. Dehnavi, M. Shafiee
In recent years, artificial intelligent has been widely used as expert systems. In this paper, an intelligent system is provided for determining the risk of cardiovascular diseases. At first, a neuro-fuzzy network is used for risk prediction which the input of this network includes patient's data such as blood pressure, blood sugar, heart rate, number of cigarettes per day, and age, and the output of this network indicates the risk of cardiovascular disease for patients over the next 10 years. In this article, by using genetic algorithm (GA), the features for determining the patient's condition were reduced from 16 to 6 and least-squares algorithm is used to determine the linear network's parameters and, the improved grasshopper optimization algorithm is used to optimize the nonlinear parameters of fuzzy sets. Finally, the proposed network and algorithm are validated by using patient's data which was obtained from patients in Framingham. The results show that the network and algorithm are acceptable.
近年来,人工智能作为专家系统得到了广泛的应用。本文提供了一种用于确定心血管疾病风险的智能系统。首先,使用神经模糊网络进行风险预测,该网络的输入包括患者的血压、血糖、心率、每天吸烟的数量、年龄等数据,该网络的输出表示患者未来10年患心血管疾病的风险。本文利用遗传算法(GA)将判断患者病情的特征从16个减少到6个,利用最小二乘算法确定线性网络的参数,利用改进的蚱蜢优化算法对模糊集的非线性参数进行优化。最后,利用Framingham的患者数据对所提出的网络和算法进行了验证。结果表明,该网络和算法是可以接受的。
{"title":"The risk prediction of heart disease by using neuro-fuzzy and improved GOA","authors":"V. Dehnavi, M. Shafiee","doi":"10.1109/IKT51791.2020.9345630","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345630","url":null,"abstract":"In recent years, artificial intelligent has been widely used as expert systems. In this paper, an intelligent system is provided for determining the risk of cardiovascular diseases. At first, a neuro-fuzzy network is used for risk prediction which the input of this network includes patient's data such as blood pressure, blood sugar, heart rate, number of cigarettes per day, and age, and the output of this network indicates the risk of cardiovascular disease for patients over the next 10 years. In this article, by using genetic algorithm (GA), the features for determining the patient's condition were reduced from 16 to 6 and least-squares algorithm is used to determine the linear network's parameters and, the improved grasshopper optimization algorithm is used to optimize the nonlinear parameters of fuzzy sets. Finally, the proposed network and algorithm are validated by using patient's data which was obtained from patients in Framingham. The results show that the network and algorithm are acceptable.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116165949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Targeted Vaccination for COVID-19 Using Mobile Communication Networks 利用移动通信网络有针对性地接种COVID-19疫苗
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345633
MohammadMohsen Jadidi, Pegah Moslemi, Saeed Jamshidiha, Iman Masroori, A. Mohammadi, V. Pourahmadi
Vaccination is an effective method for prevention of infectious diseases, but when the number of available vaccines is limited, it is not possible to vaccinate everyone in a society. In this paper, a two-step model is proposed to distribute a limited number of vaccines among the people of a society, in a way that would disrupt the transmission chain of the infectious disease most efficiently. In the first step, the vaccines are allocated to different communities in the society (e.g. cities in a country), and in the second step, the individuals whose vaccination removes the greatest number of transmission routes for the infection are identified in concordance with the regulations of international health organizations. In the second step, contact data is obtained from cellular networks and Bluetooth signals, and a graph-based modeling scheme is utilized in conjunction with a combined susceptibility metric specifically designed for selection of these individuals. The simulations indicate that a 30 % drop in infection rate compared to random vaccination could be achieved.
接种疫苗是预防传染病的有效方法,但当可用疫苗数量有限时,不可能为社会中的每个人接种疫苗。本文提出了一个两步模型,以一种最有效地破坏传染病传播链的方式,在一个社会的人们中分配有限数量的疫苗。在第一步中,将疫苗分配给社会中的不同社区(例如,一个国家的城市);在第二步中,根据国际卫生组织的条例确定接种疫苗可最大限度地消除感染传播途径的个人。在第二步中,从蜂窝网络和蓝牙信号中获得接触数据,并使用基于图的建模方案与专门为选择这些个体而设计的组合敏感性度量相结合。模拟表明,与随机接种疫苗相比,感染率可以降低30%。
{"title":"Targeted Vaccination for COVID-19 Using Mobile Communication Networks","authors":"MohammadMohsen Jadidi, Pegah Moslemi, Saeed Jamshidiha, Iman Masroori, A. Mohammadi, V. Pourahmadi","doi":"10.1109/IKT51791.2020.9345633","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345633","url":null,"abstract":"Vaccination is an effective method for prevention of infectious diseases, but when the number of available vaccines is limited, it is not possible to vaccinate everyone in a society. In this paper, a two-step model is proposed to distribute a limited number of vaccines among the people of a society, in a way that would disrupt the transmission chain of the infectious disease most efficiently. In the first step, the vaccines are allocated to different communities in the society (e.g. cities in a country), and in the second step, the individuals whose vaccination removes the greatest number of transmission routes for the infection are identified in concordance with the regulations of international health organizations. In the second step, contact data is obtained from cellular networks and Bluetooth signals, and a graph-based modeling scheme is utilized in conjunction with a combined susceptibility metric specifically designed for selection of these individuals. The simulations indicate that a 30 % drop in infection rate compared to random vaccination could be achieved.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration 通过企业应用程序集成实现身份验证即服务的基于esb的体系结构
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345636
Masoumeh Hashemi, Mehdi Sakhaei-nia, Morteza Yousef Sanati
AUTHaaS is a solution for various problems in an enterprise involving different software systems, each of which have a different authentication mechanism. Multiple usernames and passwords for a user, different security vulnerabilities for each software, and possible changes to the authentication mechanism are some of these problems. The solutions proposed for AUTHaaS are based on SOA. As communication in SOA is synchronous, the authentication process can confront problems if the authentication service is delayed for any reason. It is the purpose of this paper to answer these problems. In this paper, a security architecture is proposed for AUTHaaS through enterprise application integration. The core of the integration solution is the Enterprise Service Bus (ESB) technology. Proposed ESB-based architecture allows the user to authenticate only once for using different systems. Once the user is successfully authenticated for an application, other applications receive events through the ESB that indicate the user has successfully authenticated. So they do not need to be authenticated again by the authentication service for further access. The results show that after the 500th request, i.e. the second request of each user, the response time is reduced by 50% and the number of visits to the authentication server for subsequent requests of users will be zero.
AUTHaaS是针对企业中涉及不同软件系统的各种问题的解决方案,每个软件系统都有不同的身份验证机制。这些问题包括一个用户的多个用户名和密码、每个软件的不同安全漏洞以及身份验证机制可能发生的变化。针对AUTHaaS提出的解决方案是基于SOA的。由于SOA中的通信是同步的,如果身份验证服务由于任何原因延迟,身份验证过程可能会遇到问题。本文的目的就是要回答这些问题。本文提出了一种基于企业应用集成的AUTHaaS安全体系结构。集成解决方案的核心是企业服务总线(ESB)技术。建议的基于esb的体系结构允许用户在使用不同的系统时只进行一次身份验证。一旦用户成功通过了应用程序的身份验证,其他应用程序将通过ESB接收表明用户已成功通过身份验证的事件。因此,为了进一步访问,它们不需要再次通过身份验证服务进行身份验证。结果表明,在第500次请求后,即每个用户的第二次请求,响应时间减少50%,用户后续请求访问认证服务器的次数为零。
{"title":"An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration","authors":"Masoumeh Hashemi, Mehdi Sakhaei-nia, Morteza Yousef Sanati","doi":"10.1109/IKT51791.2020.9345636","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345636","url":null,"abstract":"AUTHaaS is a solution for various problems in an enterprise involving different software systems, each of which have a different authentication mechanism. Multiple usernames and passwords for a user, different security vulnerabilities for each software, and possible changes to the authentication mechanism are some of these problems. The solutions proposed for AUTHaaS are based on SOA. As communication in SOA is synchronous, the authentication process can confront problems if the authentication service is delayed for any reason. It is the purpose of this paper to answer these problems. In this paper, a security architecture is proposed for AUTHaaS through enterprise application integration. The core of the integration solution is the Enterprise Service Bus (ESB) technology. Proposed ESB-based architecture allows the user to authenticate only once for using different systems. Once the user is successfully authenticated for an application, other applications receive events through the ESB that indicate the user has successfully authenticated. So they do not need to be authenticated again by the authentication service for further access. The results show that after the 500th request, i.e. the second request of each user, the response time is reduced by 50% and the number of visits to the authentication server for subsequent requests of users will be zero.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi Objective & Trust-Based Workflow Scheduling Method in Cloud Computing based on the MVO Algorithm 基于MVO算法的云计算多目标、基于信任的工作流调度方法
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345621
F. Ebadifard, S. M. Babamir, Fatemeh Labafiyan
The problem of task scheduling on VMs is selecting appropriate resources for a task so that its associated tasks have already been executed. Since the workflow contains a set of tasks, the likelihood of failure increases with the failure of a task throughout the workflow. The allocation of tasks on virtual machines with higher reliability improves workflow-scheduling efficiency. Therefore, Trust relationship is an important factor of resource allocation and job scheduling, and in this paper, we have presented a good method to estimate the trust of virtual machines on which the workflow is run. In addition to the trust, which is an important factor in the workflow scheduling, there are other criteria for the satisfaction of service providers and customers. By increasing the number of requests and the diversity of virtual machines as well as the contradiction between objectives, finding the optimal Pareto front is more challenging. Therefore, multi-objective evolutionary algorithms face a large space of permutations to find an optimal tradeoff of objectives. In this paper, we present a multi-objective workflow-scheduling algorithm using MVO algorithm with the aim of increasing diversity and convergence, so that the proposed method can consider QoS requirements for service providers and customers simultaneously.
虚拟机上的任务调度问题是为任务选择合适的资源,使其关联的任务已经执行。由于工作流包含一组任务,因此失败的可能性随着整个工作流中任务的失败而增加。将任务分配到可靠性更高的虚拟机上,可以提高工作流调度效率。因此,信任关系是资源分配和作业调度的一个重要因素,本文提出了一种估算工作流程所在虚拟机信任的好方法。除了信任是工作流调度的一个重要因素之外,还有其他衡量服务提供者和客户满意度的标准。通过增加请求数、虚拟机的多样性以及目标之间的矛盾,使得寻找最优Pareto front更具挑战性。因此,多目标进化算法需要面对较大的排列空间来寻找目标的最优权衡。本文提出了一种基于MVO算法的多目标工作流调度算法,以提高算法的多样性和收敛性,使该算法能够同时考虑服务提供商和客户的QoS需求。
{"title":"A Multi Objective & Trust-Based Workflow Scheduling Method in Cloud Computing based on the MVO Algorithm","authors":"F. Ebadifard, S. M. Babamir, Fatemeh Labafiyan","doi":"10.1109/IKT51791.2020.9345621","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345621","url":null,"abstract":"The problem of task scheduling on VMs is selecting appropriate resources for a task so that its associated tasks have already been executed. Since the workflow contains a set of tasks, the likelihood of failure increases with the failure of a task throughout the workflow. The allocation of tasks on virtual machines with higher reliability improves workflow-scheduling efficiency. Therefore, Trust relationship is an important factor of resource allocation and job scheduling, and in this paper, we have presented a good method to estimate the trust of virtual machines on which the workflow is run. In addition to the trust, which is an important factor in the workflow scheduling, there are other criteria for the satisfaction of service providers and customers. By increasing the number of requests and the diversity of virtual machines as well as the contradiction between objectives, finding the optimal Pareto front is more challenging. Therefore, multi-objective evolutionary algorithms face a large space of permutations to find an optimal tradeoff of objectives. In this paper, we present a multi-objective workflow-scheduling algorithm using MVO algorithm with the aim of increasing diversity and convergence, so that the proposed method can consider QoS requirements for service providers and customers simultaneously.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130078295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 11th International Conference on Information and Knowledge Technology (IKT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1