首页 > 最新文献

2020 11th International Conference on Information and Knowledge Technology (IKT)最新文献

英文 中文
Business Process Improvement Challenges: A Systematic Literature Review 业务流程改进的挑战:系统的文献回顾
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345637
Hanieh Kashfi, F. S. Aliee
Business process is a set of activities that provides outputs to achieve a specific and predefined goal. Accordingly, Business Process Improvement is one of the most important factors in achieving the goals of enterprises. Unfortunately, despite the exorbitant costs in enterprises to improve business processes, activities in this area often fail. The reason for this, is the existence of numerous challenges on the path to improvement, which are often overlooked by researchers and practitioners in the field. Following this issue, this paper tries to identify the main challenges in this direction. While creating a comprehensive set of business process improvement challenges, a high-level abstraction cycle is presented for business process improvement activities. Finally, the identified challenges are categorized according to the steps in the proposed cycle.
业务流程是一组提供输出以实现特定和预定义目标的活动。因此,业务流程改进是实现企业目标的最重要因素之一。不幸的是,尽管企业为改进业务流程付出了高昂的成本,但这方面的活动经常失败。其原因是,在改进的道路上存在着许多挑战,而这些挑战往往被该领域的研究人员和从业者所忽视。根据这一问题,本文试图找出这一方向的主要挑战。在创建一组全面的业务流程改进挑战时,为业务流程改进活动提供了一个高级抽象周期。最后,根据建议周期中的步骤对已确定的挑战进行分类。
{"title":"Business Process Improvement Challenges: A Systematic Literature Review","authors":"Hanieh Kashfi, F. S. Aliee","doi":"10.1109/IKT51791.2020.9345637","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345637","url":null,"abstract":"Business process is a set of activities that provides outputs to achieve a specific and predefined goal. Accordingly, Business Process Improvement is one of the most important factors in achieving the goals of enterprises. Unfortunately, despite the exorbitant costs in enterprises to improve business processes, activities in this area often fail. The reason for this, is the existence of numerous challenges on the path to improvement, which are often overlooked by researchers and practitioners in the field. Following this issue, this paper tries to identify the main challenges in this direction. While creating a comprehensive set of business process improvement challenges, a high-level abstraction cycle is presented for business process improvement activities. Finally, the identified challenges are categorized according to the steps in the proposed cycle.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115143342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge gap extraction based on the learner click behavior in interaction with videos using the association rule algorithm 基于关联规则算法的学习者视频交互点击行为知识缺口提取
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345616
Yosra Bahrani, O. Fatemi
Learner's Knowledge gap detection is one of the important issues in learner's knowledge assessment. The knowledge gap is the gap between actual knowledge of the educational concepts and that received by the learner from them. This paper presents a new method to calculate the knowledge gap of each concept of instructional videos based on the learner click behavior. Many studies have analyzed learner behavior based on click behavior., but one of the main issues in event analysis is to identify the amount of knowledge learned by the learner and communicated between the actual concept and that perceived by the learner. One of the main goals of knowledge gap extraction is to detect students at risk and help them to be on the right path of the learning process. In this paper., rules are proposed based on click behavior of learners using Apriori Algorithm. Furthermore., the knowledge gap for each group of learners is calculated based on the behavioral classification. The test project is done on 52 students in the microprocessor course at the e-learning center., University of Tehran. The proposed method is evaluated and then a number of rules are extracted in this study.
学习者知识缺口检测是学习者知识评估的重要内容之一。知识差距是指学习者对教育概念的实际知识与从教育概念中获得的知识之间的差距。本文提出了一种基于学习者点击行为计算教学视频各概念知识缺口的新方法。许多研究都是基于点击行为来分析学习者行为的。但是,事件分析的一个主要问题是确定学习者学到的知识的数量,并在实际概念和学习者感知到的概念之间进行沟通。知识差距提取的主要目标之一是发现有风险的学生,并帮助他们走上正确的学习道路。在本文中。,使用Apriori算法根据学习者的点击行为提出规则。此外。,根据行为分类计算每组学习者的知识差距。该测试项目是在电子学习中心的微处理器课程的52名学生身上完成的。他是德黑兰大学的教授。本文对所提出的方法进行了评估,并从中提取了一些规则。
{"title":"Knowledge gap extraction based on the learner click behavior in interaction with videos using the association rule algorithm","authors":"Yosra Bahrani, O. Fatemi","doi":"10.1109/IKT51791.2020.9345616","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345616","url":null,"abstract":"Learner's Knowledge gap detection is one of the important issues in learner's knowledge assessment. The knowledge gap is the gap between actual knowledge of the educational concepts and that received by the learner from them. This paper presents a new method to calculate the knowledge gap of each concept of instructional videos based on the learner click behavior. Many studies have analyzed learner behavior based on click behavior., but one of the main issues in event analysis is to identify the amount of knowledge learned by the learner and communicated between the actual concept and that perceived by the learner. One of the main goals of knowledge gap extraction is to detect students at risk and help them to be on the right path of the learning process. In this paper., rules are proposed based on click behavior of learners using Apriori Algorithm. Furthermore., the knowledge gap for each group of learners is calculated based on the behavioral classification. The test project is done on 52 students in the microprocessor course at the e-learning center., University of Tehran. The proposed method is evaluated and then a number of rules are extracted in this study.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116642772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-Based Model in Smart Urban Traffic Control: Graph theory and Genetic Algorithm 基于物联网的智慧城市交通控制模型:图论与遗传算法
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345623
S. Doostali, S. M. Babamir, Mohammad Shiralizadeh Dezfoli, Behzad Soleimani Neysiani
Environmental pollution and urban dissatisfaction with traffic are the biggest challenges in metropolitan cities. Nevertheless, the inevitability of allocating roads for temporary and sometimes long periods to specific issues such as meetings, conferences, accidents, etc. could cause traffic on the surrounding roads. One of the solutions to reduce traffic on these roads is to make some roads one-way or two-way depending on their properties, where urban communication is not disrupted. In this paper, we presented an approach to employ the Internet of Things (IoT) to detect traffic information and create weighted dependency graphs to minimize the amount of free road traffic. To model the urban roads, we consider a directed graph in which each edge represents the stream. Then the optimal directed graph obtained using the genetic algorithm represented the traffic model of the vehicles. According to the car's location and destination, the optimal path was announced to the driver via the car internet. This method improved the average waiting time and queue length.
环境污染和城市对交通的不满是大城市面临的最大挑战。然而,不可避免地为会议、会议、事故等具体问题分配临时的、有时是长时间的道路,可能会导致周围道路的交通堵塞。减少这些道路交通的解决方案之一是根据其性质将一些道路改为单向或双向,这样城市交通就不会中断。在本文中,我们提出了一种利用物联网(IoT)来检测交通信息并创建加权依赖图的方法,以最大限度地减少自由道路交通量。为了对城市道路建模,我们考虑一个有向图,其中每条边表示流。然后用遗传算法得到的最优有向图表示车辆的交通模型。根据车辆的位置和目的地,通过汽车互联网向驾驶员宣布最优路径。该方法改善了平均等待时间和队列长度。
{"title":"IoT-Based Model in Smart Urban Traffic Control: Graph theory and Genetic Algorithm","authors":"S. Doostali, S. M. Babamir, Mohammad Shiralizadeh Dezfoli, Behzad Soleimani Neysiani","doi":"10.1109/IKT51791.2020.9345623","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345623","url":null,"abstract":"Environmental pollution and urban dissatisfaction with traffic are the biggest challenges in metropolitan cities. Nevertheless, the inevitability of allocating roads for temporary and sometimes long periods to specific issues such as meetings, conferences, accidents, etc. could cause traffic on the surrounding roads. One of the solutions to reduce traffic on these roads is to make some roads one-way or two-way depending on their properties, where urban communication is not disrupted. In this paper, we presented an approach to employ the Internet of Things (IoT) to detect traffic information and create weighted dependency graphs to minimize the amount of free road traffic. To model the urban roads, we consider a directed graph in which each edge represents the stream. Then the optimal directed graph obtained using the genetic algorithm represented the traffic model of the vehicles. According to the car's location and destination, the optimal path was announced to the driver via the car internet. This method improved the average waiting time and queue length.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126002651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving Hypergraph Attention and Hypergraph Convolution Networks 改进超图注意和超图卷积网络
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345609
Mustafa Mohammadi Garasuie, M. Shabankhah, A. Kamandi
Graph Neural Networks (GNNs) are models that use the structure of graphs to better exploit the bilateral relationship between neighboring nodes. Some problems, however, require that we consider a more general relationship which involve not only two nodes but rather a group of nodes. This is the approach adopted in Hypergraph Convolution and Hypergraph Attention Networks (HGAT) [1]. In this paper, we first propose to incorporate a weight matrix into these networks which, as our experimentations show, can improve the performance of the models in question. The other novelty in our work is the introduction of self-loops in the graphs which again leads to slight improvements in the accuracy of our architecture(named iHGAN).
图神经网络(gnn)是利用图的结构来更好地利用相邻节点之间的双边关系的模型。然而,有些问题要求我们考虑一种更一般的关系,这种关系不仅涉及两个节点,而且涉及一组节点。这就是超图卷积和超图注意网络(Hypergraph Convolution and Hypergraph Attention Networks, HGAT)[1]所采用的方法。在本文中,我们首先提出在这些网络中加入一个权重矩阵,正如我们的实验所表明的那样,可以提高所讨论模型的性能。我们工作中的另一个新颖之处是在图中引入了自循环,这再次导致我们的架构(名为iHGAN)的准确性略有提高。
{"title":"Improving Hypergraph Attention and Hypergraph Convolution Networks","authors":"Mustafa Mohammadi Garasuie, M. Shabankhah, A. Kamandi","doi":"10.1109/IKT51791.2020.9345609","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345609","url":null,"abstract":"Graph Neural Networks (GNNs) are models that use the structure of graphs to better exploit the bilateral relationship between neighboring nodes. Some problems, however, require that we consider a more general relationship which involve not only two nodes but rather a group of nodes. This is the approach adopted in Hypergraph Convolution and Hypergraph Attention Networks (HGAT) [1]. In this paper, we first propose to incorporate a weight matrix into these networks which, as our experimentations show, can improve the performance of the models in question. The other novelty in our work is the introduction of self-loops in the graphs which again leads to slight improvements in the accuracy of our architecture(named iHGAN).","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127868734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Persian Language Understanding in Task-Oriented Dialogue System for Online Shopping 面向任务的网上购物对话系统中的波斯语理解
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345639
Zeinab Borhanifard, Hossein Basafa, S. Z. Razavi, Heshaam Faili
Natural language understanding is a critical module in task-oriented dialogue systems. Recently, state-of-the-art approaches use deep learning methods and transformers to improve the performance of dialogue systems. In this work, we propose a natural language understanding model with a specific-shopping named entity recognizer using a joint learning-based BERT transformer for task-oriented dialogue systems in the Persian Language. Since there is no published available dataset for Persian online shopping dialogue systems, to tackle the lack of data, we propose two methods for generating training data: fully-simulated and semi-simulated method. We created a simulated dataset with a hybrid of rule-based and template-based generation methods and a semi-simulated dataset where the language generation part is done by a human to increase the quality of the dataset. Our experiments with the natural language understanding module show that a combination of the datasets can improve results. These dataset generation methods can apply in other domains for low-resource languages in task-oriented dialogue systems too to solve the cold start problem of datasets.
自然语言理解是面向任务的对话系统的关键模块。最近,最先进的方法使用深度学习方法和转换器来提高对话系统的性能。在这项工作中,我们提出了一个带有特定购物命名实体识别器的自然语言理解模型,该模型使用基于联合学习的BERT转换器用于波斯语的面向任务的对话系统。由于没有发布的波斯语在线购物对话系统可用数据集,为了解决数据缺乏的问题,我们提出了两种生成训练数据的方法:完全模拟和半模拟方法。我们创建了一个模拟数据集,混合了基于规则和基于模板的生成方法,以及一个半模拟数据集,其中语言生成部分由人工完成,以提高数据集的质量。我们对自然语言理解模块的实验表明,数据集的组合可以提高结果。这些数据集生成方法也可以应用于面向任务的对话系统中低资源语言的其他领域,以解决数据集冷启动问题。
{"title":"Persian Language Understanding in Task-Oriented Dialogue System for Online Shopping","authors":"Zeinab Borhanifard, Hossein Basafa, S. Z. Razavi, Heshaam Faili","doi":"10.1109/IKT51791.2020.9345639","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345639","url":null,"abstract":"Natural language understanding is a critical module in task-oriented dialogue systems. Recently, state-of-the-art approaches use deep learning methods and transformers to improve the performance of dialogue systems. In this work, we propose a natural language understanding model with a specific-shopping named entity recognizer using a joint learning-based BERT transformer for task-oriented dialogue systems in the Persian Language. Since there is no published available dataset for Persian online shopping dialogue systems, to tackle the lack of data, we propose two methods for generating training data: fully-simulated and semi-simulated method. We created a simulated dataset with a hybrid of rule-based and template-based generation methods and a semi-simulated dataset where the language generation part is done by a human to increase the quality of the dataset. Our experiments with the natural language understanding module show that a combination of the datasets can improve results. These dataset generation methods can apply in other domains for low-resource languages in task-oriented dialogue systems too to solve the cold start problem of datasets.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"6 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120995195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Sentence Ordering Method using BERT Pretrained Model 基于BERT预训练模型的句子排序新方法
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345618
Melika Golestani, S. Z. Razavi, Heshaam Faili
Building systems with capability of natural language understanding (NLU) has been one of the oldest areas of AI. An essential component of NLU is to detect logical succession of events contained in a text. The task of sentence ordering is proposed to learn succession of events with applications in AI tasks. The performance of previous works employing statistical methods is poor, while the neural networks-based approaches are in serious need of large corpora for model learning. In this paper, we propose a method for sentence ordering which does not need a training phase and consequently a large corpus for learning. To this end, we generate sentence embedding using BERT pre-trained model and measure sentence similarity using cosine similarity score. We suggest this score as an indicator of sequential events' level of coherence. We finally sort the sentences through brute-force search to maximize overall similarities of the sequenced sentences. Our proposed method outperformed other baselines on ROCStories, a corpus of 5-sentence human-made stories. The method is specifically more efficient than neural network-based methods when no huge corpus is available. Among other advantages of this method are its interpretability and needlessness to linguistic knowledge.
构建具有自然语言理解能力的系统是人工智能最古老的领域之一。NLU的一个重要组成部分是检测文本中包含的事件的逻辑序列。在人工智能任务中,提出了句子排序任务来学习事件的连续性。以往使用统计方法的工作性能较差,而基于神经网络的方法迫切需要大型语料库进行模型学习。在本文中,我们提出了一种不需要训练阶段的句子排序方法,因此不需要大量的语料库进行学习。为此,我们使用BERT预训练模型生成句子嵌入,并使用余弦相似度评分来度量句子的相似度。我们建议这个分数作为连续事件连贯性水平的一个指标。最后,我们通过暴力搜索对句子进行排序,以最大限度地提高排序句子的整体相似性。我们提出的方法在ROCStories(一个包含5句人工故事的语料库)上的表现优于其他基线。在没有大量语料库的情况下,该方法比基于神经网络的方法更有效。这种方法的其他优点是其可解释性和不需要语言知识。
{"title":"A New Sentence Ordering Method using BERT Pretrained Model","authors":"Melika Golestani, S. Z. Razavi, Heshaam Faili","doi":"10.1109/IKT51791.2020.9345618","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345618","url":null,"abstract":"Building systems with capability of natural language understanding (NLU) has been one of the oldest areas of AI. An essential component of NLU is to detect logical succession of events contained in a text. The task of sentence ordering is proposed to learn succession of events with applications in AI tasks. The performance of previous works employing statistical methods is poor, while the neural networks-based approaches are in serious need of large corpora for model learning. In this paper, we propose a method for sentence ordering which does not need a training phase and consequently a large corpus for learning. To this end, we generate sentence embedding using BERT pre-trained model and measure sentence similarity using cosine similarity score. We suggest this score as an indicator of sequential events' level of coherence. We finally sort the sentences through brute-force search to maximize overall similarities of the sequenced sentences. Our proposed method outperformed other baselines on ROCStories, a corpus of 5-sentence human-made stories. The method is specifically more efficient than neural network-based methods when no huge corpus is available. Among other advantages of this method are its interpretability and needlessness to linguistic knowledge.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ParaKavosh: A Parallel Algorithm for Finding Biological Network Motifs ParaKavosh:寻找生物网络基序的并行算法
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345641
Z. Kashani, A. Masoudi-Nejad, A. Nowzari-Dalini
Biological networks have recently gathered much attraction in finding their motifs. Motifs can be considered as subgraphs that occur in a particular network at significantly higher frequencies than random networks. The importance of this problem causes attention of improving the existing algorithms. As the runtime of an algorithm is an important aspect, applying parallel techniques is appropriate for better improvement. In this paper a parallel algorithm (ParaKavosh) for finding network motifs is presented. Our algorithm is tested on E. coli, S. cerevisiae, Homo sapiens and Rattus norvegicus networks. The cost optimality of the algorithm is also shown by analyzing the obtained results with an efficient sequential algorithm. The results show that the algorithm performs much better in terms of runtime.
生物网络最近在寻找它们的基序方面受到了极大的关注。motif可以被认为是出现在特定网络中的子图,其频率明显高于随机网络。这一问题的重要性引起了人们对现有算法改进的关注。由于算法的运行时间是一个重要的方面,因此应用并行技术可以更好地改进算法。本文提出了一种寻找网络基元的并行算法(ParaKavosh)。我们的算法在大肠杆菌、酿酒葡萄球菌、智人和褐家鼠网络上进行了测试。用一种高效的顺序算法对得到的结果进行分析,证明了该算法的代价最优性。结果表明,该算法在运行时间上有较好的表现。
{"title":"ParaKavosh: A Parallel Algorithm for Finding Biological Network Motifs","authors":"Z. Kashani, A. Masoudi-Nejad, A. Nowzari-Dalini","doi":"10.1109/IKT51791.2020.9345641","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345641","url":null,"abstract":"Biological networks have recently gathered much attraction in finding their motifs. Motifs can be considered as subgraphs that occur in a particular network at significantly higher frequencies than random networks. The importance of this problem causes attention of improving the existing algorithms. As the runtime of an algorithm is an important aspect, applying parallel techniques is appropriate for better improvement. In this paper a parallel algorithm (ParaKavosh) for finding network motifs is presented. Our algorithm is tested on E. coli, S. cerevisiae, Homo sapiens and Rattus norvegicus networks. The cost optimality of the algorithm is also shown by analyzing the obtained results with an efficient sequential algorithm. The results show that the algorithm performs much better in terms of runtime.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network? 恢复传播:谁负责扩散网络中的传染初始化?
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345640
Arman Sepehr, H. Beigy, Mohammadzaman Zamani, Shabnam Behzad
Millions of stories are transferred in a social network and some of them are malicious. Can we identify the source node(s) that are responsible to initiate the propagation originally? If so, when did they initiated the propagation? The problem of identifying the source of propagation based on limited observations has been studied significantly in recent years, as it can help to reduce the damage caused by unwanted infections with early detection. In this paper, we present an efficient algorithm for finding a node initiating a piece of information into the network and also inferring the time when it is initiated. We propose Source Location Estimation method, SoLE, that estimate the source probability for each node and then choose the source set which are maximize the probability using a well-known greedy method with a theoretical guarantees. The Observed nodes are detected nodes which are known clearly that spread specified malicious information in the network but small fraction of nodes are detected. The Hidden infected nodes are hidden, which spread the information in the network, however, they're not identified yet. In this problem, we first estimate the shortest path between other nodes to observed ones for each propagation trace, SoLE. Afterward, we find the best nodes as the source set among the hidden nodes by optimizing a loss function. Our experiments on real-world propagation through networks show the superiority of our approach in detecting true sources and promote the top ten accuracy from less than 10% for the state-of-the-art methods to approximately 30%.
数以百万计的故事在社交网络上传播,其中一些是恶意的。我们能否确定最初负责发起传播的源节点?如果有,他们是什么时候开始传播的?近年来,基于有限的观察来确定传播源的问题已经得到了重要的研究,因为它可以帮助减少早期发现不必要的感染所造成的损害。在本文中,我们提出了一种有效的算法来寻找一个节点发起一条信息进入网络,并推断它被发起的时间。我们提出了源位置估计方法(Source Location Estimation method, SoLE),该方法估计每个节点的源概率,然后使用一种著名的贪婪方法选择概率最大的源集,并有理论上的保证。观察到的节点是已知在网络中传播特定恶意信息的被检测节点,但检测到的节点很少。隐藏的感染节点是隐藏的,它们在网络中传播信息,但尚未被识别。在这个问题中,我们首先估计每个传播路径中其他节点到观测节点之间的最短路径,即SoLE。然后,通过优化损失函数,在隐藏节点中找到最优节点作为源集。我们通过网络进行的真实世界传播实验表明,我们的方法在检测真实源方面具有优势,并将最先进方法的前十大准确率从不足10%提高到约30%。
{"title":"Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?","authors":"Arman Sepehr, H. Beigy, Mohammadzaman Zamani, Shabnam Behzad","doi":"10.1109/IKT51791.2020.9345640","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345640","url":null,"abstract":"Millions of stories are transferred in a social network and some of them are malicious. Can we identify the source node(s) that are responsible to initiate the propagation originally? If so, when did they initiated the propagation? The problem of identifying the source of propagation based on limited observations has been studied significantly in recent years, as it can help to reduce the damage caused by unwanted infections with early detection. In this paper, we present an efficient algorithm for finding a node initiating a piece of information into the network and also inferring the time when it is initiated. We propose Source Location Estimation method, SoLE, that estimate the source probability for each node and then choose the source set which are maximize the probability using a well-known greedy method with a theoretical guarantees. The Observed nodes are detected nodes which are known clearly that spread specified malicious information in the network but small fraction of nodes are detected. The Hidden infected nodes are hidden, which spread the information in the network, however, they're not identified yet. In this problem, we first estimate the shortest path between other nodes to observed ones for each propagation trace, SoLE. Afterward, we find the best nodes as the source set among the hidden nodes by optimizing a loss function. Our experiments on real-world propagation through networks show the superiority of our approach in detecting true sources and promote the top ten accuracy from less than 10% for the state-of-the-art methods to approximately 30%.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125628473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of Specification Mining-Based Test Oracle for Cyber-Physical Systems 基于规范挖掘的网络物理系统测试Oracle的挑战
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345615
M. Aliabadi, H. Haghighi, M. V. Asl, R. Meybodi
Test oracle problem is considered as a major challenge in software testing. Specification mining techniques are shown to be effective to tackle test oracle problem in software systems. In addition, modern systems such as Cyber-Physical Systems (CPSes) have special constraints that should be satisfied when deriving the test oracles for these systems. However, comparing different specification mining techniques for CPS applications is challenging, because no common ground to assess the effectiveness of such techniques has been established yet. In this survey, our contribution is two folded: First, we analyze the CPS constraints from the test oracle point of view, and present a framework of requirements representing six essential criteria for evaluating to which extent specification miners satisfy CPS constraints. Secondly, we review the literature for the specification mining techniques, and use our framework to compare the effectiveness of various static and dynamic analysis-based specification mining techniques, and to discuss their respective advantages and disadvantages,
测试oracle问题被认为是软件测试中的一个主要挑战。规范挖掘技术是解决软件系统中测试oracle问题的有效方法。此外,现代系统,如信息物理系统(Cyber-Physical systems, CPSes),在为这些系统导出测试预言机时,需要满足特殊的约束条件。然而,比较用于CPS应用程序的不同规范挖掘技术是具有挑战性的,因为尚未建立评估此类技术有效性的共同基础。在这项调查中,我们的贡献有两个方面:首先,我们从测试oracle的角度分析了CPS约束,并提出了一个需求框架,该框架代表了六个基本标准,用于评估规范挖掘器在多大程度上满足CPS约束。其次,我们回顾了规范挖掘技术的文献,并使用我们的框架比较了各种基于静态和动态分析的规范挖掘技术的有效性,并讨论了它们各自的优缺点;
{"title":"Challenges of Specification Mining-Based Test Oracle for Cyber-Physical Systems","authors":"M. Aliabadi, H. Haghighi, M. V. Asl, R. Meybodi","doi":"10.1109/IKT51791.2020.9345615","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345615","url":null,"abstract":"Test oracle problem is considered as a major challenge in software testing. Specification mining techniques are shown to be effective to tackle test oracle problem in software systems. In addition, modern systems such as Cyber-Physical Systems (CPSes) have special constraints that should be satisfied when deriving the test oracles for these systems. However, comparing different specification mining techniques for CPS applications is challenging, because no common ground to assess the effectiveness of such techniques has been established yet. In this survey, our contribution is two folded: First, we analyze the CPS constraints from the test oracle point of view, and present a framework of requirements representing six essential criteria for evaluating to which extent specification miners satisfy CPS constraints. Secondly, we review the literature for the specification mining techniques, and use our framework to compare the effectiveness of various static and dynamic analysis-based specification mining techniques, and to discuss their respective advantages and disadvantages,","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129194274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed coordination protocol for event data exchange in IoT monitoring applications 物联网监控应用中事件数据交换的分布式协调协议
Pub Date : 2020-12-22 DOI: 10.1109/IKT51791.2020.9345607
Behnam Khazael, H. Malazi
Publish-subscribe architecture is one of the dominating architectural styles in designing the Internet of things (IoT) monitoring applications. Establishment of a brokerless publish-subscribe system leads to exchanging a high number of control messages including advertise, subscribe and update messages. Additionally, the in-efficiency in forwarding publish messages in a resource-constrained IoT environment results in network congestion, communication delay, and energy loss. The recent approaches in brokerless publish-subscribe systems for IoT domain introduced new communication protocols, maintaining routing tables of IoT nodes, and clustering the network. However, the efficiency in exchanging control messages does not receive much attention. In this paper, we propose an enhanced communication protocol to establish a brokerless publish-subscribe IoT system. The protocol is based on beaconing for packet dissemination. We applied a new structure that provides metadata in the packet header that facilitates the receivers regarding their next possible actions. The simulation results demonstrate that the proposed method reduces the network traffic by 28% on average and decreases the energy consumption of nodes up to 33%. The results also reveal that the number of publish messages is reduced by 10% in comparison to the baseline method.
发布-订阅架构是物联网(IoT)监控应用设计的主要架构风格之一。无代理发布-订阅系统的建立导致了大量控制消息的交换,包括广告消息、订阅消息和更新消息。此外,在资源受限的物联网环境中,转发发布消息的效率低下会导致网络拥塞、通信延迟和能量损失。最近在物联网领域的无代理发布-订阅系统中引入了新的通信协议、维护物联网节点路由表和网络集群。然而,控制消息的交换效率并没有受到太多的关注。在本文中,我们提出了一种增强的通信协议来建立无代理的发布-订阅物联网系统。该协议基于信标进行分组分发。我们应用了一种新的结构,在包头中提供元数据,方便接收者了解他们下一步可能的操作。仿真结果表明,该方法可使网络流量平均减少28%,节点能耗降低33%。结果还显示,与基线方法相比,发布消息的数量减少了10%。
{"title":"Distributed coordination protocol for event data exchange in IoT monitoring applications","authors":"Behnam Khazael, H. Malazi","doi":"10.1109/IKT51791.2020.9345607","DOIUrl":"https://doi.org/10.1109/IKT51791.2020.9345607","url":null,"abstract":"Publish-subscribe architecture is one of the dominating architectural styles in designing the Internet of things (IoT) monitoring applications. Establishment of a brokerless publish-subscribe system leads to exchanging a high number of control messages including advertise, subscribe and update messages. Additionally, the in-efficiency in forwarding publish messages in a resource-constrained IoT environment results in network congestion, communication delay, and energy loss. The recent approaches in brokerless publish-subscribe systems for IoT domain introduced new communication protocols, maintaining routing tables of IoT nodes, and clustering the network. However, the efficiency in exchanging control messages does not receive much attention. In this paper, we propose an enhanced communication protocol to establish a brokerless publish-subscribe IoT system. The protocol is based on beaconing for packet dissemination. We applied a new structure that provides metadata in the packet header that facilitates the receivers regarding their next possible actions. The simulation results demonstrate that the proposed method reduces the network traffic by 28% on average and decreases the energy consumption of nodes up to 33%. The results also reveal that the number of publish messages is reduced by 10% in comparison to the baseline method.","PeriodicalId":382725,"journal":{"name":"2020 11th International Conference on Information and Knowledge Technology (IKT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 11th International Conference on Information and Knowledge Technology (IKT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1