首页 > 最新文献

2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)最新文献

英文 中文
On ici-Open Sets in Topological Spaces 论拓扑空间中的ici-开集
Beyda S. Abdullah, Barah M. Sulaiman, M. Al-Neima
A new concept in topological space called ici-open set is introduced, depended on the common adjective between i-open and int-open sets. Therefore, every ici-open set is i-open and int-open set. The ici-open sets inherits some properties from i-open and int-open sets, as every ici-open set is a semi-open set. The family of i-open sets forms a topological space if it generated from topology contains just three elements, the third element is set with one element but when contain more than one that is not true. This case has different behavior for the family of ici-open sets, which forms a topological space even if the mention set contains more than one element. In addition, some properties and theorems using ici-open sets have been proved.
基于i开集和i开集之间的共同形容词,在拓扑空间中引入了i开集的新概念。因此,每一个i开集既是i开集又是int开集。ci-开集继承了i-开集和int-开集的一些属性,因为每个ci-开集都是半开集。如果i开集族仅包含三个元素,则构成拓扑空间,第三个元素仅包含一个元素,但当包含多个元素时则不为真。这种情况对于ici开集族具有不同的行为,即使提及集包含多个元素,它们也会形成拓扑空间。此外,还证明了利用ici-开集的一些性质和定理。
{"title":"On ici-Open Sets in Topological Spaces","authors":"Beyda S. Abdullah, Barah M. Sulaiman, M. Al-Neima","doi":"10.1109/ICCITM53167.2021.9677817","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677817","url":null,"abstract":"A new concept in topological space called ici-open set is introduced, depended on the common adjective between i-open and int-open sets. Therefore, every ici-open set is i-open and int-open set. The ici-open sets inherits some properties from i-open and int-open sets, as every ici-open set is a semi-open set. The family of i-open sets forms a topological space if it generated from topology contains just three elements, the third element is set with one element but when contain more than one that is not true. This case has different behavior for the family of ici-open sets, which forms a topological space even if the mention set contains more than one element. In addition, some properties and theorems using ici-open sets have been proved.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of Intelligent Energy Management System based on Multi-Agent and Distributed IoT: DPU Case Study 基于多智能体和分布式物联网的智能能源管理系统设计与分析——以DPU为例
M. A. Sadeeq, Subhi R. M. Zeebaree
Population growth and the creation of new equipment are accompanied by a constant increase in energy use each day and have created significant consumer issues in energy management. Smart meters (SM) are simply instruments for measuring energy usage and are a significant resource of the evolving technological energy management system. Including precise billing data, information on usage at the user end, installation of two-way communication. SM is the critical component of an intelligent power grid. The Internet of Things (IoT) is a critical partner in the power business leading to intelligent resource management to ensure successful data collection and use. This paper proposes designing and analyzing intelligent energy management systems based on Multi-Agent (MA) and Distributed IoT (DIoT). An efficient approach is proposed to monitor and control power consumption levels of the proposed case study of Duhok Polytechnic University (DPU). DPU consists of Presidency, six colleges, and eight institutes. These fifteen campuses are distributed through a wide geographical area with long distances between each campus (i.e., more than 100 Km). A Node represents each campus, and Wi-Fi makes the connection inside each node. These nodes are connected via the Internet to the Main Control Unit (MCU) represented by Raspberry Pi connected to the cloud. Depending on the received data from the Nodes, the MCU will make the correct decision for each node using intelligent algorithms and the user's requirement. Then, control commands are initiated, and the node's appliances can be controlled automatically (or even manually) from the MCU.
随着人口的增长和新设备的创造,每天的能源使用量不断增加,并在能源管理方面造成了重大的消费者问题。智能电表(SM)是测量能源使用情况的简单工具,是不断发展的技术能源管理系统的重要资源。包括精确的计费数据,用户端的使用信息,安装双向通信。智能电网是智能电网的重要组成部分。物联网(IoT)是电力业务的重要合作伙伴,可实现智能资源管理,确保成功的数据收集和使用。本文提出了基于多智能体(Multi-Agent, MA)和分布式物联网(Distributed IoT, DIoT)的智能能源管理系统的设计与分析。提出了一种有效的方法来监测和控制杜霍克理工大学(DPU)的电力消耗水平。学校由校长、六个学院和八个研究所组成。这15个校区分布在广阔的地理区域,每个校区之间的距离都很长(即超过100公里)。一个节点代表每个校园,Wi-Fi在每个节点内部进行连接。这些节点通过互联网连接到以树莓派为代表的主控单元(MCU), MCU连接到云。根据从节点接收到的数据,MCU将根据用户的要求,通过智能算法对每个节点做出正确的决策。然后,控制命令被启动,节点的设备可以从MCU自动(甚至手动)控制。
{"title":"Design and Analysis of Intelligent Energy Management System based on Multi-Agent and Distributed IoT: DPU Case Study","authors":"M. A. Sadeeq, Subhi R. M. Zeebaree","doi":"10.1109/ICCITM53167.2021.9677679","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677679","url":null,"abstract":"Population growth and the creation of new equipment are accompanied by a constant increase in energy use each day and have created significant consumer issues in energy management. Smart meters (SM) are simply instruments for measuring energy usage and are a significant resource of the evolving technological energy management system. Including precise billing data, information on usage at the user end, installation of two-way communication. SM is the critical component of an intelligent power grid. The Internet of Things (IoT) is a critical partner in the power business leading to intelligent resource management to ensure successful data collection and use. This paper proposes designing and analyzing intelligent energy management systems based on Multi-Agent (MA) and Distributed IoT (DIoT). An efficient approach is proposed to monitor and control power consumption levels of the proposed case study of Duhok Polytechnic University (DPU). DPU consists of Presidency, six colleges, and eight institutes. These fifteen campuses are distributed through a wide geographical area with long distances between each campus (i.e., more than 100 Km). A Node represents each campus, and Wi-Fi makes the connection inside each node. These nodes are connected via the Internet to the Main Control Unit (MCU) represented by Raspberry Pi connected to the cloud. Depending on the received data from the Nodes, the MCU will make the correct decision for each node using intelligent algorithms and the user's requirement. Then, control commands are initiated, and the node's appliances can be controlled automatically (or even manually) from the MCU.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130128469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face Identification Under Disguise and Makeup Based on Hybrid Deep Learning 基于混合深度学习的伪装化妆人脸识别
Farah Jawad Al-ghanim, A. M. Al-juboori
Facial recognition has been broadly used in advanced intelligent systems (i.e: smart video surveillance, intelligent access control system, and online payment). The performance of existing algorithms for automatic facial recognition is hampered by various covariates like pose variations, face aging, disguises, and makeup. Disguises and makeup are especially used to intentional or unintentional changes facial appearance to either hide one's personal identity or impersonate someone's different identity. While new algorithms continue to improve performance, most face recognition systems are liable to failure when disguised or makeup altered, which is one of the most challenging factors to overcome. With enormous capability and promising results, deep learning technology becomes attracted to the greatest attention to the research in a diversity of computer vision tasks. In order to overcome this problem, the database of disguised and makeup faces (DMFD) is used. In this paper, face features are extracted by Linear Discriminant Analysis (LDA). Facial recognition is done by using proposed hybrid-deep learning Classifier for more precise feature learning. Also, we compared the proposed method with two pre-trained models (AlexNet and VGG16). The Experimental results taking after implementation and testing showed the effectiveness of the proposed system provided better precision by (94%)
人脸识别已广泛应用于先进的智能系统(如智能视频监控、智能门禁系统、在线支付等)。现有的自动面部识别算法的性能受到各种协变量的影响,如姿势变化、面部老化、伪装和化妆。化装和化妆特别用于有意或无意地改变面部外观,以隐藏个人身份或冒充他人的不同身份。虽然新算法不断提高性能,但大多数人脸识别系统在伪装或化妆时容易失败,这是最难克服的因素之一。深度学习技术以其巨大的能力和良好的效果,成为计算机视觉领域研究的热点。为了克服这一问题,使用了伪装和化妆人脸数据库(DMFD)。本文采用线性判别分析(LDA)方法提取人脸特征。人脸识别采用混合深度学习分类器进行更精确的特征学习。此外,我们将所提出的方法与两个预训练模型(AlexNet和VGG16)进行了比较。实验结果表明,所提出的系统具有较好的精度(94%)。
{"title":"Face Identification Under Disguise and Makeup Based on Hybrid Deep Learning","authors":"Farah Jawad Al-ghanim, A. M. Al-juboori","doi":"10.1109/ICCITM53167.2021.9677752","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677752","url":null,"abstract":"Facial recognition has been broadly used in advanced intelligent systems (i.e: smart video surveillance, intelligent access control system, and online payment). The performance of existing algorithms for automatic facial recognition is hampered by various covariates like pose variations, face aging, disguises, and makeup. Disguises and makeup are especially used to intentional or unintentional changes facial appearance to either hide one's personal identity or impersonate someone's different identity. While new algorithms continue to improve performance, most face recognition systems are liable to failure when disguised or makeup altered, which is one of the most challenging factors to overcome. With enormous capability and promising results, deep learning technology becomes attracted to the greatest attention to the research in a diversity of computer vision tasks. In order to overcome this problem, the database of disguised and makeup faces (DMFD) is used. In this paper, face features are extracted by Linear Discriminant Analysis (LDA). Facial recognition is done by using proposed hybrid-deep learning Classifier for more precise feature learning. Also, we compared the proposed method with two pre-trained models (AlexNet and VGG16). The Experimental results taking after implementation and testing showed the effectiveness of the proposed system provided better precision by (94%)","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126149876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation and Implementation of Malware Classification Using Random Forest Machine Learning Algorithm 基于随机森林机器学习算法的恶意软件分类评估与实现
Saifaldeen Alabadee, Karam Thanon
Malware classification is one of the most important issues in Information security, because of the huge new numbers of these malwares. Therefore, more classification methods have been proposed. Random forest (RF) is one of the extremely method in many studies or deferent feature extraction methods. It has been considered as one of the efficient methods of malware classification due to it is accurate results. In this paper, machine learning based RF classifier had been proposed to evaluate the performance of the Random Forest implementation. The RF classifier showed high performance as a detector. It has a good capability of classifying huge number of features with unimportant features. Both training and classifying accuracy have increased by reduction of the number of training feature in dataset. The RF classifier have achieved 95.3% of accuracy.
恶意软件分类是信息安全领域最重要的问题之一,因为这些恶意软件数量庞大。因此,人们提出了更多的分类方法。随机森林(Random forest, RF)是目前研究较多的特征提取方法之一。由于其结果准确,被认为是一种有效的恶意软件分类方法。本文提出了基于机器学习的射频分类器来评估随机森林实现的性能。射频分类器作为检测器表现出较高的性能。它具有将大量特征与不重要的特征进行分类的良好能力。通过减少数据集中训练特征的数量,提高了训练精度和分类精度。射频分类器的准确率达到95.3%。
{"title":"Evaluation and Implementation of Malware Classification Using Random Forest Machine Learning Algorithm","authors":"Saifaldeen Alabadee, Karam Thanon","doi":"10.1109/ICCITM53167.2021.9677693","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677693","url":null,"abstract":"Malware classification is one of the most important issues in Information security, because of the huge new numbers of these malwares. Therefore, more classification methods have been proposed. Random forest (RF) is one of the extremely method in many studies or deferent feature extraction methods. It has been considered as one of the efficient methods of malware classification due to it is accurate results. In this paper, machine learning based RF classifier had been proposed to evaluate the performance of the Random Forest implementation. The RF classifier showed high performance as a detector. It has a good capability of classifying huge number of features with unimportant features. Both training and classifying accuracy have increased by reduction of the number of training feature in dataset. The RF classifier have achieved 95.3% of accuracy.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126952903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Assessment of HPA by Using Volterra Series and FIR Filter 利用Volterra系列和FIR滤波器改进HPA评价
Mohanned A.M. Al-Ja'afari, Firas Abedi, L. F. Al-Rammahi
Nonlinearity and memory effects are huge challenges for traditional High-Power Amplifier (HPA), since they cause a noisy transmitted signal and accumulated error, which eventually reduce the efficiency of the HPA. This paper proposes a new approach to handle these challenges, we utilized a standard Volterra Filter to deals with the nonlinearity and memory effect, in addition, we included FIR filter to further improve the reduction of memory distortion. The simulation results of the proposed method overcome the other methods in terms of accuracy and accumulated error. These results suggest that our method is quite appropriate for traditional HPA for practical applications that suffer from such distortions.
非线性和记忆效应是传统大功率放大器面临的巨大挑战,因为它们会导致传输信号的噪声和累积误差,最终降低了大功率放大器的效率。本文提出了一种新的方法来应对这些挑战,我们使用标准的Volterra滤波器来处理非线性和记忆效应,此外,我们还加入了FIR滤波器来进一步提高对记忆失真的降低。仿真结果表明,该方法在精度和累积误差方面均优于其他方法。这些结果表明,我们的方法非常适合于传统的HPA在实际应用中遭受这种扭曲。
{"title":"Improved Assessment of HPA by Using Volterra Series and FIR Filter","authors":"Mohanned A.M. Al-Ja'afari, Firas Abedi, L. F. Al-Rammahi","doi":"10.1109/ICCITM53167.2021.9677834","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677834","url":null,"abstract":"Nonlinearity and memory effects are huge challenges for traditional High-Power Amplifier (HPA), since they cause a noisy transmitted signal and accumulated error, which eventually reduce the efficiency of the HPA. This paper proposes a new approach to handle these challenges, we utilized a standard Volterra Filter to deals with the nonlinearity and memory effect, in addition, we included FIR filter to further improve the reduction of memory distortion. The simulation results of the proposed method overcome the other methods in terms of accuracy and accumulated error. These results suggest that our method is quite appropriate for traditional HPA for practical applications that suffer from such distortions.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115498827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Software Defined Network (SDN) Controllers to Enhance Communication between Two Vehicles in Vehicular AD HOC Network (VANET) 利用软件定义网络(SDN)控制器增强车载自组网(VANET)中两车之间的通信
Hiba Dhivaa Ali, A. Abdulqader
Traditional Vehicular Ad-hoc Networks (VANETs) can efficiently be supplemented with the software-defined networking (SDN) paradigm which uses independent planes for data transmission and control. Integrating the SDN with the VANETs is a part of the development of intelligent VANETs. This integration technology has collected the attentions of researchers. In this paper, a new simulation model called the IoT-VANET is suggested with the SDN controller to enhance the communication between vehicles. This model uses the mininet-IoT simulator. For the purpose of comparison with previous work, a simulation model called the WiFi-VANET is built. It uses the mininet-WiFi software in two ways. Firstly, utilizing the Vehicle to Vehicle (V2V) communication performance evaluation based on the Road Side Units (RSU) and SDN controller. Three controllers of the Ryu (a Japanese word means flow), Python-based OpenFlow (POX) and centralized controller are exploited. Secondly, using the V2V communication performance evaluation based on the Global Positioning System (GPS). In terms of average delay and throughput, the performance evaluations of these two models show that the IoT-VANET is more efficient than the WiFi-VANET.
软件定义网络(SDN)使用独立的平面进行数据传输和控制,可以有效地补充传统的车载自组织网络(vanet)。SDN与vanet的融合是智能vanet发展的一部分。这种集成技术引起了研究人员的广泛关注。本文提出了一种基于SDN控制器的IoT-VANET仿真模型,以增强车辆间的通信能力。该模型使用微型物联网模拟器。为了与以往的工作进行比较,本文建立了WiFi-VANET的仿真模型。它以两种方式使用迷你wifi软件。首先,利用基于路旁单元(RSU)和SDN控制器的车对车(V2V)通信性能评估。他们利用了Ryu(日语中意为流)、基于python的OpenFlow (POX)和集中式控制器三种控制器。其次,采用基于全球定位系统(GPS)的V2V通信性能评估。在平均延迟和吞吐量方面,这两种模型的性能评估表明IoT-VANET比wi - fi - vanet更高效。
{"title":"Using Software Defined Network (SDN) Controllers to Enhance Communication between Two Vehicles in Vehicular AD HOC Network (VANET)","authors":"Hiba Dhivaa Ali, A. Abdulqader","doi":"10.1109/ICCITM53167.2021.9677720","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677720","url":null,"abstract":"Traditional Vehicular Ad-hoc Networks (VANETs) can efficiently be supplemented with the software-defined networking (SDN) paradigm which uses independent planes for data transmission and control. Integrating the SDN with the VANETs is a part of the development of intelligent VANETs. This integration technology has collected the attentions of researchers. In this paper, a new simulation model called the IoT-VANET is suggested with the SDN controller to enhance the communication between vehicles. This model uses the mininet-IoT simulator. For the purpose of comparison with previous work, a simulation model called the WiFi-VANET is built. It uses the mininet-WiFi software in two ways. Firstly, utilizing the Vehicle to Vehicle (V2V) communication performance evaluation based on the Road Side Units (RSU) and SDN controller. Three controllers of the Ryu (a Japanese word means flow), Python-based OpenFlow (POX) and centralized controller are exploited. Secondly, using the V2V communication performance evaluation based on the Global Positioning System (GPS). In terms of average delay and throughput, the performance evaluations of these two models show that the IoT-VANET is more efficient than the WiFi-VANET.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberwarfare Techniques: Status, Challenges and Future trends 网络战争技术:现状、挑战和未来趋势
Qusai AL-Durrah, S. Sadkhan
The area of cyber warfare is vast, with several subtopics attracting interest from researchers. We start with the obvious fundamental question that is: what is cyberwarfare? We compare definitions that already exist to see where there is agreement or disagreement. We notice that there is no commonly recognized definition and that the terms “cyberwar” and “cyberwarfare” are not properly distinguished. In order to address these challenges, we present a defining model to help describe both cyber warfare and cyber war. Following that, the paper identifies nine cyber warfare research challenges and reviews current research in each. Finally, we make recommendations for how future initiatives in the field might best advance the subject.
网络战的领域是广阔的,有几个子主题吸引了研究人员的兴趣。我们从一个显而易见的基本问题开始:什么是网络战?我们比较已经存在的定义,看看哪里有一致或不一致。我们注意到,没有一个公认的定义,“网络战”和“网络战”这两个术语没有得到适当区分。为了应对这些挑战,我们提出了一个定义模型来帮助描述网络战和网络战。接下来,本文确定了九个网络战争研究挑战,并对每个挑战的当前研究进行了回顾。最后,我们就该领域的未来倡议如何最好地推进该主题提出建议。
{"title":"Cyberwarfare Techniques: Status, Challenges and Future trends","authors":"Qusai AL-Durrah, S. Sadkhan","doi":"10.1109/ICCITM53167.2021.9677861","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677861","url":null,"abstract":"The area of cyber warfare is vast, with several subtopics attracting interest from researchers. We start with the obvious fundamental question that is: what is cyberwarfare? We compare definitions that already exist to see where there is agreement or disagreement. We notice that there is no commonly recognized definition and that the terms “cyberwar” and “cyberwarfare” are not properly distinguished. In order to address these challenges, we present a defining model to help describe both cyber warfare and cyber war. Following that, the paper identifies nine cyber warfare research challenges and reviews current research in each. Finally, we make recommendations for how future initiatives in the field might best advance the subject.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exact Recovery of Two-Latent Variable Stochastic Block Model with Side Information 带侧信息的双潜变量随机块模型的精确恢复
M. Shahiri, Mahdi Eskandari
The two-latent variable stochastic block model is a new graph synthetic model making a connection between the conventional stochastic block model and real-world networks. In this model, each node contains two latent variables such that at least one of these two latent variables is unknown. Still, this model lonely is not able to model a real-world network. Side information is another component that sometimes exists beside a real-world network. In this paper, we will investigate the asymptotic behavior of the two-latent variable stochastic block model in the presence of side information. Two different types of side information are considered in this paper: noisy labels and partially revealed labels side information. For each case, the necessary and sufficient conditions for the exact recovery of the desired latent variable are obtained via semidefinite programming optimization. It is shown that these conditions are tight and create a phase transition for the exact recovery.
双潜变量随机块模型是将传统的随机块模型与现实网络联系起来的一种新的图合成模型。在该模型中,每个节点包含两个潜在变量,使得这两个潜在变量中至少有一个是未知的。不过,这个模型还不能模拟真实世界的网络。副信息是另一个组件,有时存在于现实世界的网络旁边。在本文中,我们将研究双潜变量随机块模型在侧信息存在下的渐近行为。本文考虑了两种不同类型的侧信息:噪声标签和部分揭示标签侧信息。对于每种情况,通过半定规划优化得到了期望潜变量精确恢复的充分必要条件。结果表明,这些条件是严格的,并为精确的恢复创造了一个相变。
{"title":"Exact Recovery of Two-Latent Variable Stochastic Block Model with Side Information","authors":"M. Shahiri, Mahdi Eskandari","doi":"10.1109/ICCITM53167.2021.9677645","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677645","url":null,"abstract":"The two-latent variable stochastic block model is a new graph synthetic model making a connection between the conventional stochastic block model and real-world networks. In this model, each node contains two latent variables such that at least one of these two latent variables is unknown. Still, this model lonely is not able to model a real-world network. Side information is another component that sometimes exists beside a real-world network. In this paper, we will investigate the asymptotic behavior of the two-latent variable stochastic block model in the presence of side information. Two different types of side information are considered in this paper: noisy labels and partially revealed labels side information. For each case, the necessary and sufficient conditions for the exact recovery of the desired latent variable are obtained via semidefinite programming optimization. It is shown that these conditions are tight and create a phase transition for the exact recovery.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130967578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use Crowdsourcing in Software Engineering for The Development of The Website 利用软件工程中的众包技术开发网站
Muataz Abd Al-Mohsen, A. S. Abbas
The significance of the study lies in the crowdsourcing tool that supports software engineering tasks externally by different, unidentified groups of people who send ideas and opinions over the Internet. Software engineering Crowdsourcing global online work scheduling software engineering tasks such as requirements extraction, requirements analysis, design, testing, and coding is the basic principle or idea of requirements engineering. The impact of software engineering crowdsourcing has increased in recent years due to the clear and visible impact that has touched and worked on multiple aspects of software engineering. In this study, a search was conducted to obtain crowdsourcing opinions about one of the important and commonly used Iraqi sites from different groups, ages, and specialties, in which about (151) people participated to express their opinion by answering (9) questions with the word yes or no, because the questions are of an answering style Easy, simple and fast, for the purpose of extracting the required and useful information for engineering requirements, which serves as the basis for project planning. These methods are used in the thesis concept for data mining using classification techniques to discover unknown categories of data. This includes decision trees, Logistic Regression, random forests Classifier, and k-nearest neighbor algorithm, with an evaluation of each method showing the best result using classification techniques that were the best result using the 98% decision trees and random forests Classifier technique while is more than adequate. Work on the same data set.
这项研究的意义在于众包工具,它支持软件工程任务,由不同的、身份不明的人群通过互联网发送想法和意见。众包全球在线工作调度软件工程任务,如需求提取、需求分析、设计、测试和编码,是需求工程的基本原则或思想。近年来,软件工程众包的影响越来越大,因为它对软件工程的多个方面产生了清晰可见的影响。在这项研究中,进行了一项搜索,以获得来自不同群体,年龄和专业的关于伊拉克重要和常用站点之一的众包意见,其中约有151人参与,通过回答(9)个单词“是”或“否”来表达他们的意见,因为这些问题的回答风格简单,简单和快速,目的是提取工程需求所需的有用信息。作为项目规划的依据。这些方法在论文中用于数据挖掘的概念,使用分类技术来发现未知的数据类别。这包括决策树、逻辑回归、随机森林分类器和k近邻算法,对每种方法进行评估,显示使用分类技术的最佳结果,使用98%决策树和随机森林分类器技术的最佳结果,而这已经足够了。处理相同的数据集。
{"title":"Use Crowdsourcing in Software Engineering for The Development of The Website","authors":"Muataz Abd Al-Mohsen, A. S. Abbas","doi":"10.1109/ICCITM53167.2021.9677860","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677860","url":null,"abstract":"The significance of the study lies in the crowdsourcing tool that supports software engineering tasks externally by different, unidentified groups of people who send ideas and opinions over the Internet. Software engineering Crowdsourcing global online work scheduling software engineering tasks such as requirements extraction, requirements analysis, design, testing, and coding is the basic principle or idea of requirements engineering. The impact of software engineering crowdsourcing has increased in recent years due to the clear and visible impact that has touched and worked on multiple aspects of software engineering. In this study, a search was conducted to obtain crowdsourcing opinions about one of the important and commonly used Iraqi sites from different groups, ages, and specialties, in which about (151) people participated to express their opinion by answering (9) questions with the word yes or no, because the questions are of an answering style Easy, simple and fast, for the purpose of extracting the required and useful information for engineering requirements, which serves as the basis for project planning. These methods are used in the thesis concept for data mining using classification techniques to discover unknown categories of data. This includes decision trees, Logistic Regression, random forests Classifier, and k-nearest neighbor algorithm, with an evaluation of each method showing the best result using classification techniques that were the best result using the 98% decision trees and random forests Classifier technique while is more than adequate. Work on the same data set.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123032881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ECG data Compression by Discrete Wavelet Transform and Huffman Encoding 离散小波变换与霍夫曼编码的心电数据压缩
Rawaa K. Hamza, K. Rijab, Mohammed A. Hussien
The Electrocardiogram (ECG) data has been used to diagnose and analyze heart issues. For that The ECG data compression is one of the most important studies in biomedical engineering. The ECG signal compression benefits storage data, data transmission rate decrease, and communication bandwidth reduction. The proposed work deal with the ECG signal compression method of ECG signals using Discrete Wavelet Transform (DWT). The DWT compressed the signal energy in a smaller change in data and has perfect localization assets in frequency & time. The DWT threshold has been selected to perform for the DWT coefficients depending on the signal's Energy Packing Efficiency (EPE). The Huffman encoder has been used to encoding the selected DWT coefficient. The results of the proposed method show better performance with higher compression ratios and good quality reconstructed signals. For Example the Compression ratio (CR) =16.33, 10.57,and 7.75 with percent root mean square difference (PRD)=1.5%, 1.3%, and 1.02% for using different DWT(Harr transform, Bior1.1, and Db2), respectively.
心电图(ECG)数据已被用于诊断和分析心脏问题。因此,心电数据压缩是生物医学工程中最重要的研究课题之一。心电信号压缩有利于数据存储,降低数据传输速率,减少通信带宽。本文研究了利用离散小波变换(DWT)对心电信号进行压缩的方法。小波变换在数据变化较小的情况下压缩了信号能量,在频率和时间上都有很好的局部化资产。根据信号的能量打包效率(EPE),选择了DWT阈值来执行DWT系数。霍夫曼编码器已被用来编码选定的DWT系数。结果表明,该方法具有较高的压缩比和高质量的重构信号。例如,使用不同的DWT(Harr变换、Bior1.1和Db2),压缩比(CR)分别为16.33、10.57和7.75,其中百分之百的均方根差(PRD)分别为1.5%、1.3%和1.02%。
{"title":"The ECG data Compression by Discrete Wavelet Transform and Huffman Encoding","authors":"Rawaa K. Hamza, K. Rijab, Mohammed A. Hussien","doi":"10.1109/ICCITM53167.2021.9677704","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677704","url":null,"abstract":"The Electrocardiogram (ECG) data has been used to diagnose and analyze heart issues. For that The ECG data compression is one of the most important studies in biomedical engineering. The ECG signal compression benefits storage data, data transmission rate decrease, and communication bandwidth reduction. The proposed work deal with the ECG signal compression method of ECG signals using Discrete Wavelet Transform (DWT). The DWT compressed the signal energy in a smaller change in data and has perfect localization assets in frequency & time. The DWT threshold has been selected to perform for the DWT coefficients depending on the signal's Energy Packing Efficiency (EPE). The Huffman encoder has been used to encoding the selected DWT coefficient. The results of the proposed method show better performance with higher compression ratios and good quality reconstructed signals. For Example the Compression ratio (CR) =16.33, 10.57,and 7.75 with percent root mean square difference (PRD)=1.5%, 1.3%, and 1.02% for using different DWT(Harr transform, Bior1.1, and Db2), respectively.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125596982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1