首页 > 最新文献

2021 12th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
Proactive Data Allocation in Distributed Datasets based on an Ensemble Model 基于集成模型的分布式数据集中的主动数据分配
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464621
T. Koukaras, Kostas Kolomvatsos
The evolution of the Internet of Things (IoT) drives the incorporation of numerous devices into a huge infrastructure where various services can be provided. Devices are located close to users being capable to interact with them and their environment to collect data. The collected data are transferred to the Cloud through the ‘intervention’ of the Edge Computing (EC) infrastructure. Multiple nodes are present at the EC that can undertake the responsibility of keeping some processing activities close to end users, thus, minimizing the latency in the provision of responses. In this paper, we elaborate on a model that supports an efficient data management mechanism to proactively decide the location where data should be stored. We aim at concluding a number of datasets exhibiting a high accuracy as exposed by their solidity. The proposed approach deals with the similarity of the collected data and the already formulated datasets before we decide the final allocation. Any decision is made upon the synopses of the discussed datasets avoiding the processing of huge volumes of data. Additionally, we elaborate on an ensemble scheme for matching the incoming observations and the available synopses. The performance of the proposed scheme is depicted by the relevant numerical outcomes.
物联网(IoT)的发展推动了将众多设备整合到一个可以提供各种服务的巨大基础设施中。设备位于靠近用户的位置,能够与用户及其环境进行交互以收集数据。收集到的数据通过边缘计算(EC)基础设施的“干预”传输到云端。EC中存在多个节点,这些节点可以承担保持一些处理活动接近最终用户的责任,从而最大限度地减少响应提供中的延迟。在本文中,我们详细介绍了一个模型,该模型支持有效的数据管理机制,以主动决定数据应该存储的位置。我们的目标是总结出一些数据集,显示出高准确性,因为它们的可靠性。在我们决定最终的分配之前,提出的方法处理收集到的数据和已经制定的数据集的相似性。任何决定都是在讨论数据集的概要上做出的,避免了处理大量数据。此外,我们还详细说明了将传入的观测和可用的概要相匹配的集合方案。通过相关的数值结果描述了所提方案的性能。
{"title":"Proactive Data Allocation in Distributed Datasets based on an Ensemble Model","authors":"T. Koukaras, Kostas Kolomvatsos","doi":"10.1109/ICICS52457.2021.9464621","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464621","url":null,"abstract":"The evolution of the Internet of Things (IoT) drives the incorporation of numerous devices into a huge infrastructure where various services can be provided. Devices are located close to users being capable to interact with them and their environment to collect data. The collected data are transferred to the Cloud through the ‘intervention’ of the Edge Computing (EC) infrastructure. Multiple nodes are present at the EC that can undertake the responsibility of keeping some processing activities close to end users, thus, minimizing the latency in the provision of responses. In this paper, we elaborate on a model that supports an efficient data management mechanism to proactively decide the location where data should be stored. We aim at concluding a number of datasets exhibiting a high accuracy as exposed by their solidity. The proposed approach deals with the similarity of the collected data and the already formulated datasets before we decide the final allocation. Any decision is made upon the synopses of the discussed datasets avoiding the processing of huge volumes of data. Additionally, we elaborate on an ensemble scheme for matching the incoming observations and the available synopses. The performance of the proposed scheme is depicted by the relevant numerical outcomes.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128714230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The influence of operating laser wavelengths on Doppler effect in LEO Optical satellite constellation 工作激光波长对低轨道光学卫星星座多普勒效应的影响
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464549
Kaouther Boumalek, M. Benslama, S. Aris
Nowadays, free space researches are focused on increasing the link’s data transfer rate capacity. For this purpose, optical wavelengths are preferred over radio-frequency (RF) wavelengths as signal carriers to satisfy the high data transfer rate over huge distances since optical frequencies are greater than RF ones and a greater frequency implies better carrier capacity. Low earth orbit (LEO) satellite constellations with laser links are well suited to display a global broadband network. Since both LEO communicating satellites are in a continuous movement, the relative distance between them changes periodically. Doppler effect is detected on the received signal onboard terminal of the receiver satellite which shifts the characteristics of the received signal. In this paper, we study the influence of the operating wavelength on the Doppler effect in LEO inter-satellite laser links for full-time accessing inter-satellite links. The choice of the operating wavelength is an important task because Doppler wavelength shift is directly proportional to the operating wavelength. Results show that the lower laser operating wavelength the minimum Doppler wavelength shift appearance.
目前,自由空间研究的重点是提高链路的数据传输速率。为此,光波长比射频(RF)波长更适合作为信号载波,以满足远距离的高数据传输速率,因为光频率大于射频频率,并且更高的频率意味着更好的载波容量。具有激光链路的低地球轨道(LEO)卫星星座非常适合显示全球宽带网络。由于两颗低轨道通信卫星处于连续运动状态,它们之间的相对距离周期性地变化。接收卫星星载终端接收到的信号存在多普勒效应,多普勒效应使接收信号的特性发生偏移。本文研究了低轨卫星间激光链路工作波长对全时接入卫星间链路多普勒效应的影响。工作波长的选择是一项重要的任务,因为多普勒波长移位与工作波长成正比。结果表明,较低的激光工作波长出现最小的多普勒波长移。
{"title":"The influence of operating laser wavelengths on Doppler effect in LEO Optical satellite constellation","authors":"Kaouther Boumalek, M. Benslama, S. Aris","doi":"10.1109/ICICS52457.2021.9464549","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464549","url":null,"abstract":"Nowadays, free space researches are focused on increasing the link’s data transfer rate capacity. For this purpose, optical wavelengths are preferred over radio-frequency (RF) wavelengths as signal carriers to satisfy the high data transfer rate over huge distances since optical frequencies are greater than RF ones and a greater frequency implies better carrier capacity. Low earth orbit (LEO) satellite constellations with laser links are well suited to display a global broadband network. Since both LEO communicating satellites are in a continuous movement, the relative distance between them changes periodically. Doppler effect is detected on the received signal onboard terminal of the receiver satellite which shifts the characteristics of the received signal. In this paper, we study the influence of the operating wavelength on the Doppler effect in LEO inter-satellite laser links for full-time accessing inter-satellite links. The choice of the operating wavelength is an important task because Doppler wavelength shift is directly proportional to the operating wavelength. Results show that the lower laser operating wavelength the minimum Doppler wavelength shift appearance.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114169779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encoding Test Cases using Execution Traces 使用执行跟踪编码测试用例
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464569
Ziad Al-Sharif, Wafa F. Abdalrahman, C. Jeffery
Test case minimization can be critical to meeting the release date of a software product. Identifying redundant test cases can help improve the quality of the test suite and speed up the testing process. Thus, there is a need to uniquely characterize test cases. This identification can support the test engineer to remove redundancy in the test suite and prioritize test cases that are highly affected by the most recent modification in source code. This paper proposes a test case encoding approach that allows engineers to facilitate execution traces to classify and identify their test cases. It will empower test engineers and allow them to minimize the time and cost of testing by reducing the number of test cases, especially in regression testing. Furthermore, it enhances the documentation of the testing process by providing a one-to-one mapping between test cases and their corresponding execution traces, each of which is a sequence of execution events triggered during the execution of the test case. The one-to-one mapping allows the approach to uniquely represent the control-flow and data-flow within the source code. This trace can be used as a signature for the test case. Whenever a modification occurred in the source code, the newly captured signatures are compared against the previous ones; any mismatch indicates that the test case has been affected by the modification. Repeating this process will help classify the test suite into four groups of test cases. This provides the ability to put the testing efforts where it is needed. Additionally, keeping a hashed value for each of the captured sequences simplifies the comparison and unifies the mapping between test cases and captured traces. It also allows detection of minor modifications in the traced events, and reduces the lengthy traces to a set of fixed size hashed values.
测试用例最小化对于满足软件产品的发布日期是至关重要的。识别冗余的测试用例可以帮助提高测试套件的质量并加快测试过程。因此,有必要唯一地描述测试用例。这种识别可以支持测试工程师去除测试套件中的冗余,并优先考虑受源代码中最近修改影响很大的测试用例。本文提出了一种测试用例编码方法,允许工程师简化执行跟踪,以分类和识别他们的测试用例。它将授权测试工程师,并允许他们通过减少测试用例的数量来最小化测试的时间和成本,特别是在回归测试中。此外,它通过在测试用例和它们相应的执行跟踪之间提供一对一的映射来增强测试过程的文档,其中每个都是在测试用例执行期间触发的执行事件的序列。一对一映射允许该方法唯一地表示源代码中的控制流和数据流。该跟踪可以用作测试用例的签名。每当源代码中发生修改时,将新捕获的签名与以前的签名进行比较;任何不匹配都表明测试用例已经受到修改的影响。重复这个过程将有助于将测试套件分为四组测试用例。这提供了将测试工作放在需要的地方的能力。另外,为每个捕获的序列保持一个散列值简化了比较,并统一了测试用例和捕获的跟踪之间的映射。它还允许检测跟踪事件中的微小修改,并将冗长的跟踪减少为一组固定大小的散列值。
{"title":"Encoding Test Cases using Execution Traces","authors":"Ziad Al-Sharif, Wafa F. Abdalrahman, C. Jeffery","doi":"10.1109/ICICS52457.2021.9464569","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464569","url":null,"abstract":"Test case minimization can be critical to meeting the release date of a software product. Identifying redundant test cases can help improve the quality of the test suite and speed up the testing process. Thus, there is a need to uniquely characterize test cases. This identification can support the test engineer to remove redundancy in the test suite and prioritize test cases that are highly affected by the most recent modification in source code. This paper proposes a test case encoding approach that allows engineers to facilitate execution traces to classify and identify their test cases. It will empower test engineers and allow them to minimize the time and cost of testing by reducing the number of test cases, especially in regression testing. Furthermore, it enhances the documentation of the testing process by providing a one-to-one mapping between test cases and their corresponding execution traces, each of which is a sequence of execution events triggered during the execution of the test case. The one-to-one mapping allows the approach to uniquely represent the control-flow and data-flow within the source code. This trace can be used as a signature for the test case. Whenever a modification occurred in the source code, the newly captured signatures are compared against the previous ones; any mismatch indicates that the test case has been affected by the modification. Repeating this process will help classify the test suite into four groups of test cases. This provides the ability to put the testing efforts where it is needed. Additionally, keeping a hashed value for each of the captured sequences simplifies the comparison and unifies the mapping between test cases and captured traces. It also allows detection of minor modifications in the traced events, and reduces the lengthy traces to a set of fixed size hashed values.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"11 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122685709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Thresholding Lifting Dual Tree Complex Wavelet Transform with Wiener filter for quality assurance of medical image 基于维纳滤波的混合阈值提升对偶树复小波变换医学图像质量保证
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464625
Hilal Naimi, A. Adamou-Mitiche, L. Mitiche
The main problem in the area of medical imaging has been image denoising. The most defying for image denoising is to secure data carrying structures like surfaces and edges in order to achieve good visual quality. Different algorithms with different denoising performances have been proposed in previous decades. More recently, models focused on deep learning have shown a great promise to outperform all traditional approaches. However, these techniques are limited to the necessity of large sample size training and high computational costs. In this research, we propose a denoising approach basing on Lifting Dual Tree Complex Wavelet Transform (LDTCWT) using Hybrid Thresholding with Wiener filter to enhance the quality image. We describe the LDTCWT, a type of lifting wavelets remodeling that produce complex coefficients by employing a dual tree of lifting wavelets filters to get its real part and imaginary part. Permits the remodel to produce approximate shift invariance, directionally selective filters and reduces the computation time (properties lacking within the classical wavelets transform). To develop this approach, a hybrid thresholding function is modeled by integrating the Wiener filter into the thresholding function.
医学成像领域的主要问题是图像去噪。为了获得良好的视觉质量,最具挑战性的图像去噪是确保表面和边缘等数据承载结构的安全。在过去的几十年里,人们提出了具有不同降噪性能的不同算法。最近,专注于深度学习的模型表现出了超越所有传统方法的巨大希望。然而,这些技术局限于需要大样本量的训练和高计算成本。在本研究中,我们提出了一种基于提升对偶树复小波变换(LDTCWT)的方法,利用混合阈值法和维纳滤波来提高图像质量。我们描述了LDTCWT,一种产生复系数的提升小波重构,采用提升小波滤波器的对偶树来得到它的实部和虚部。允许重构产生近似移位不变性,方向选择性滤波器并减少计算时间(经典小波变换所缺乏的特性)。为了开发这种方法,通过将维纳滤波器集成到阈值函数中来建模混合阈值函数。
{"title":"Hybrid Thresholding Lifting Dual Tree Complex Wavelet Transform with Wiener filter for quality assurance of medical image","authors":"Hilal Naimi, A. Adamou-Mitiche, L. Mitiche","doi":"10.1109/ICICS52457.2021.9464625","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464625","url":null,"abstract":"The main problem in the area of medical imaging has been image denoising. The most defying for image denoising is to secure data carrying structures like surfaces and edges in order to achieve good visual quality. Different algorithms with different denoising performances have been proposed in previous decades. More recently, models focused on deep learning have shown a great promise to outperform all traditional approaches. However, these techniques are limited to the necessity of large sample size training and high computational costs. In this research, we propose a denoising approach basing on Lifting Dual Tree Complex Wavelet Transform (LDTCWT) using Hybrid Thresholding with Wiener filter to enhance the quality image. We describe the LDTCWT, a type of lifting wavelets remodeling that produce complex coefficients by employing a dual tree of lifting wavelets filters to get its real part and imaginary part. Permits the remodel to produce approximate shift invariance, directionally selective filters and reduces the computation time (properties lacking within the classical wavelets transform). To develop this approach, a hybrid thresholding function is modeled by integrating the Wiener filter into the thresholding function.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128627246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Taxonomy of Web Security Vulnerabilities Web安全漏洞分类
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464576
Wafaa Al-Kahla, Ahmed S. Shatnawi, E. Taqieddin
the rapid evolution in web applications and software development has not witnessed a similar pace in development opposite what has taken place in the security and cybersecurity arenas. Web applications security has become a significant issue since insecure applications and software undermine various areas including finance, health care, defense, and other mission critical infrastructures. Web application vulnerability results from misconfiguration, flaws in the design, implementation, operation, or management at the different levels of a web application (input side, output side, or both sides). This taxonomy paper studies web vulnerabilities, their impact on users’ infrastructures, and their detection tools (static, dynamic, or hybrid) and mitigation mechanisms at different software architecture levels.
web应用程序和软件开发的快速发展并没有看到与安全和网络安全领域的发展速度相反的发展速度。Web应用程序安全性已经成为一个重要问题,因为不安全的应用程序和软件会破坏各个领域,包括金融、医疗保健、国防和其他关键任务基础设施。Web应用程序漏洞是由于Web应用程序的不同层次(输入端、输出端或双方)在设计、实现、操作或管理上的错误配置、缺陷造成的。这篇分类论文研究了不同软件架构级别的web漏洞、它们对用户基础设施的影响、它们的检测工具(静态、动态或混合)和缓解机制。
{"title":"A Taxonomy of Web Security Vulnerabilities","authors":"Wafaa Al-Kahla, Ahmed S. Shatnawi, E. Taqieddin","doi":"10.1109/ICICS52457.2021.9464576","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464576","url":null,"abstract":"the rapid evolution in web applications and software development has not witnessed a similar pace in development opposite what has taken place in the security and cybersecurity arenas. Web applications security has become a significant issue since insecure applications and software undermine various areas including finance, health care, defense, and other mission critical infrastructures. Web application vulnerability results from misconfiguration, flaws in the design, implementation, operation, or management at the different levels of a web application (input side, output side, or both sides). This taxonomy paper studies web vulnerabilities, their impact on users’ infrastructures, and their detection tools (static, dynamic, or hybrid) and mitigation mechanisms at different software architecture levels.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126371664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Freshness and System Performance Trading-off 信息新鲜度和系统性能权衡
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464535
Fatima Khattab Abu-Akleek, A. Alma'aitah
In real time service’s applications that have to process user’s queries and information updates have a challenge in balancing the system performance and the information freshness where these properties are related by the response time and Age-of-Information (AOI) respectively. Such applications are fed with periodic incoming of updates and queries and have to decide to which process first. In this paper we are discussing this challenge and provide a simple algorithm for trading-off the response time and AOI. We first discuss the Query-k, Update-k and Joint(M,N) policies that already proposed in previous work then we introduce a simple algorithm for the Joint(M,N)-policy. The algorithm is working based on the output of Query-k and Update-k policies in addition to predefined threshold. Results presents the efficient balancing between response time and AOI.
在必须处理用户查询和信息更新的实时服务应用程序中,在平衡系统性能和信息新鲜度方面存在挑战,其中这些属性分别与响应时间和信息年龄(Age-of-Information, AOI)相关。这样的应用程序需要定期接收更新和查询,必须决定先处理哪个进程。在本文中,我们将讨论这一挑战,并提供一个简单的算法来权衡响应时间和AOI。本文首先讨论了前人提出的Query-k、Update-k和Joint(M,N)策略,然后介绍了Joint(M,N)策略的一种简单算法。除了预定义的阈值之外,该算法还基于Query-k和Update-k策略的输出进行工作。结果表明响应时间和AOI之间的平衡是有效的。
{"title":"Information Freshness and System Performance Trading-off","authors":"Fatima Khattab Abu-Akleek, A. Alma'aitah","doi":"10.1109/ICICS52457.2021.9464535","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464535","url":null,"abstract":"In real time service’s applications that have to process user’s queries and information updates have a challenge in balancing the system performance and the information freshness where these properties are related by the response time and Age-of-Information (AOI) respectively. Such applications are fed with periodic incoming of updates and queries and have to decide to which process first. In this paper we are discussing this challenge and provide a simple algorithm for trading-off the response time and AOI. We first discuss the Query-k, Update-k and Joint(M,N) policies that already proposed in previous work then we introduce a simple algorithm for the Joint(M,N)-policy. The algorithm is working based on the output of Query-k and Update-k policies in addition to predefined threshold. Results presents the efficient balancing between response time and AOI.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classifying Olive Fruits Based on Produced Oil Quality: A Benchmark Dataset and Strong Baselines 基于油品质量的橄榄果分类:一个基准数据集和强基线
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464577
Mahmoud Ghandour, Raffi Al-Qurran, M. Al-Ayyoub, A. Shatnawi, M. Alsmirat, F. Costen
Obtaining the highest quality olive oil (OO) during the milling process is greatly desirable. Since the quality of the produced oil depends mainly on the olive fruits (OF), it is important to manually check each batch of OF before milling them in addition to performing lab tests to verify the quality of the produced OO. The goal of this work is to automate the process of classifying OF based on whether they produce extra virgin OO (EVOO) or not. We collect a large dataset of more than 11K OF images and label them as positive/negative based on whether they produced EVOO or not. We then fine-tune several state-of-the-art deep learning models on this dataset. The results show that most pretrained models are very accurate for this dataset leading the suggestion that we use the most efficient one.
在碾磨过程中获得最高质量的橄榄油(OO)是非常理想的。由于所生产的油的质量主要取决于橄榄果(of),因此除了进行实验室测试以验证所生产的OO的质量外,在研磨之前手动检查每批橄榄果也很重要。这项工作的目标是基于是否生产特级初榨OO (EVOO)来自动化分类的过程。我们收集了一个超过11K的大型图像数据集,并根据它们是否产生evo将它们标记为正/负。然后,我们在这个数据集上微调了几个最先进的深度学习模型。结果表明,对于这个数据集,大多数预训练模型都是非常准确的,因此建议我们使用最有效的模型。
{"title":"Classifying Olive Fruits Based on Produced Oil Quality: A Benchmark Dataset and Strong Baselines","authors":"Mahmoud Ghandour, Raffi Al-Qurran, M. Al-Ayyoub, A. Shatnawi, M. Alsmirat, F. Costen","doi":"10.1109/ICICS52457.2021.9464577","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464577","url":null,"abstract":"Obtaining the highest quality olive oil (OO) during the milling process is greatly desirable. Since the quality of the produced oil depends mainly on the olive fruits (OF), it is important to manually check each batch of OF before milling them in addition to performing lab tests to verify the quality of the produced OO. The goal of this work is to automate the process of classifying OF based on whether they produce extra virgin OO (EVOO) or not. We collect a large dataset of more than 11K OF images and label them as positive/negative based on whether they produced EVOO or not. We then fine-tune several state-of-the-art deep learning models on this dataset. The results show that most pretrained models are very accurate for this dataset leading the suggestion that we use the most efficient one.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Usable QR Codes for Healthcare Systems: The Case of Covid-19 Pandemic 医疗保健系统的安全和可用的QR码:Covid-19大流行的案例
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464565
H. Wahsheh, Mohammed S. Al-zahrani
Recently, especially during the COVID-19 pandemic, there is a growing interest in employing secure technology in health care systems, enhancing workflow, reducing costs, and developing the flexibility of providing healthcare services to users. QR codes are accessible, free, easy to use, and can be scanned through several free apps on smartphones. QR codes can help healthcare systems as an effective alternative to using paper-based documents for a patient identity system. Sensitive information can be stored in the QR codes of patients and medical staff as offline data or stored in a particular URL. Besides, QR codes can hold prescriptions and electronic permits used during the lockdown period. As there is no standard structure or authentication phase in QR code generation, such codes are vulnerable to fake content. This study’s main objective is to protect healthcare information embedded inside QR codes by employing cryptographic mechanisms. Several experiments were conducted to determine how different features and users deal with barcode scanning. We introduce an authentication and integrity phase during QR code generation. We integrated digital signature, encryption, and access control techniques into a secure, real-time barcode generator and scanner implementation to protect QR code content against unauthorized users. The results demonstrate that the proposed system enables generating secure and usable QR codes for healthcare information protection among several scenarios.
最近,特别是在2019冠状病毒病大流行期间,人们对在卫生保健系统中采用安全技术、加强工作流程、降低成本和提高向用户提供卫生保健服务的灵活性越来越感兴趣。二维码是可以获得的,免费的,易于使用,并且可以通过智能手机上的几个免费应用程序扫描。QR码可以帮助医疗保健系统作为一个有效的替代使用纸质文件的病人身份系统。敏感信息可以作为离线数据存储在患者和医护人员的二维码中,也可以存储在特定的URL中。此外,二维码还可以存放封锁期间使用的处方和电子许可证。由于QR码的生成没有标准的结构和认证阶段,因此QR码容易受到虚假内容的影响。本研究的主要目的是通过采用加密机制来保护嵌入QR码中的医疗保健信息。进行了几个实验来确定不同的特征和用户如何处理条形码扫描。我们在QR码生成过程中引入认证和完整性阶段。我们将数字签名、加密和访问控制技术集成到一个安全、实时的条形码生成器和扫描仪中,以保护QR码内容不受未经授权的用户的侵害。结果表明,所提出的系统能够在多个场景中生成安全可用的QR码,用于医疗信息保护。
{"title":"Secure and Usable QR Codes for Healthcare Systems: The Case of Covid-19 Pandemic","authors":"H. Wahsheh, Mohammed S. Al-zahrani","doi":"10.1109/ICICS52457.2021.9464565","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464565","url":null,"abstract":"Recently, especially during the COVID-19 pandemic, there is a growing interest in employing secure technology in health care systems, enhancing workflow, reducing costs, and developing the flexibility of providing healthcare services to users. QR codes are accessible, free, easy to use, and can be scanned through several free apps on smartphones. QR codes can help healthcare systems as an effective alternative to using paper-based documents for a patient identity system. Sensitive information can be stored in the QR codes of patients and medical staff as offline data or stored in a particular URL. Besides, QR codes can hold prescriptions and electronic permits used during the lockdown period. As there is no standard structure or authentication phase in QR code generation, such codes are vulnerable to fake content. This study’s main objective is to protect healthcare information embedded inside QR codes by employing cryptographic mechanisms. Several experiments were conducted to determine how different features and users deal with barcode scanning. We introduce an authentication and integrity phase during QR code generation. We integrated digital signature, encryption, and access control techniques into a secure, real-time barcode generator and scanner implementation to protect QR code content against unauthorized users. The results demonstrate that the proposed system enables generating secure and usable QR codes for healthcare information protection among several scenarios.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124214334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sentiment Analysis of Arabic Tweets about Violence Against Women using Machine Learning 使用机器学习对关于暴力侵害妇女的阿拉伯语推文进行情感分析
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464600
Moath Alzyout, Emran Al Bashabsheh, Hassan M. Najadat, Ahmad Alaiad
Social Media platforms, such as Twitter became a significant pulse in smart societies that are shaping our communities by sensitizing people’s information and perceptions across living areas over space and time. Social media sentiment analysis helps in recognizing people’s emotions and attitudes and helps in assessing various public issues, such as, women’s rights and violence against women. In this paper, we used the sentence based sentiment analysis to study the notion of women’s rights. We collected Arabic dialect tweets from the whole Arab world as data via a Twitter API, then we cleaned the data to use it in the classification step. We have examined different types of traditional classification algorithms namely, Support Vector Machine, K-Nearest-Neighbour, Decision Trees, and Naive Bayes. Then, we compared these results with deep learning results. Finally, we compared the classification results using the precision, recall and accuracy measurements. We found that the Support Vector Machine algorithm gained the best results, while the Naive Bayes was the worst. We also noticed that there is an increasing attention to women’s rights in the Arab world.
像Twitter这样的社交媒体平台成为智能社会的一个重要脉搏,通过使人们的信息和感知跨越空间和时间的生活区来塑造我们的社区。社交媒体情绪分析有助于识别人们的情绪和态度,有助于评估各种公共问题,如妇女权利和对妇女的暴力行为。在本文中,我们使用基于句子的情感分析来研究妇女权利观念。我们通过Twitter API收集了来自整个阿拉伯世界的阿拉伯语方言推文作为数据,然后我们对数据进行清理,以便在分类步骤中使用它。我们研究了不同类型的传统分类算法,即支持向量机、k -近邻、决策树和朴素贝叶斯。然后,我们将这些结果与深度学习结果进行比较。最后,对分类结果进行了精密度、召回率和准确率的比较。我们发现支持向量机算法获得了最好的结果,而朴素贝叶斯算法是最差的。我们还注意到,阿拉伯世界对妇女权利的关注日益增加。
{"title":"Sentiment Analysis of Arabic Tweets about Violence Against Women using Machine Learning","authors":"Moath Alzyout, Emran Al Bashabsheh, Hassan M. Najadat, Ahmad Alaiad","doi":"10.1109/ICICS52457.2021.9464600","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464600","url":null,"abstract":"Social Media platforms, such as Twitter became a significant pulse in smart societies that are shaping our communities by sensitizing people’s information and perceptions across living areas over space and time. Social media sentiment analysis helps in recognizing people’s emotions and attitudes and helps in assessing various public issues, such as, women’s rights and violence against women. In this paper, we used the sentence based sentiment analysis to study the notion of women’s rights. We collected Arabic dialect tweets from the whole Arab world as data via a Twitter API, then we cleaned the data to use it in the classification step. We have examined different types of traditional classification algorithms namely, Support Vector Machine, K-Nearest-Neighbour, Decision Trees, and Naive Bayes. Then, we compared these results with deep learning results. Finally, we compared the classification results using the precision, recall and accuracy measurements. We found that the Support Vector Machine algorithm gained the best results, while the Naive Bayes was the worst. We also noticed that there is an increasing attention to women’s rights in the Arab world.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"78 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance of Different Machine Learning Methods for Sinus Diseases Classification 不同机器学习方法在鼻窦疾病分类中的表现
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464624
Aya Nuseir, A. Nuseir, M. Alsmirat, M. Al-Ayyoub, Mohammed Mahdi, H. Al-Balas
In this project, a sinonasal diseases dataset is created with the help of Ear, Nose, and Throat (ENT) specialists at King Abdullah University Hospital (KAUH), Jordan. This dataset is then used to experiment with different features extraction and selection methods and different machine learning classification methods. The work can be summarized as follows. We start by selecting the participating patients according to their history information that is acquired from the patients using a questionnaire. Then, we construct a tool that employs image processing techniques to process the selected patients’ CT scan images to extract useful information from them. After that, different filters and wrapper selection methods with various machine learning techniques are utilized to classify the cases in the dataset. The results show that the performance of wrapper feature selection (using PART classifier with best first search) with all used classifiers produces better results compared with the other feature selection methods.
在这个项目中,在约旦阿卜杜拉国王大学医院(KAUH)的耳鼻喉科专家的帮助下,创建了一个鼻腔疾病数据集。然后使用该数据集实验不同的特征提取和选择方法以及不同的机器学习分类方法。工作可以总结如下。我们首先根据患者的病史信息选择参与的患者,这些信息是通过问卷调查从患者那里获得的。然后,我们构建了一个工具,利用图像处理技术对所选患者的CT扫描图像进行处理,从中提取有用的信息。然后,使用不同的过滤器和包装器选择方法以及各种机器学习技术对数据集中的案例进行分类。结果表明,与其他特征选择方法相比,使用所有分类器的包装器特征选择(使用PART分类器进行最佳优先搜索)的性能更好。
{"title":"Performance of Different Machine Learning Methods for Sinus Diseases Classification","authors":"Aya Nuseir, A. Nuseir, M. Alsmirat, M. Al-Ayyoub, Mohammed Mahdi, H. Al-Balas","doi":"10.1109/ICICS52457.2021.9464624","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464624","url":null,"abstract":"In this project, a sinonasal diseases dataset is created with the help of Ear, Nose, and Throat (ENT) specialists at King Abdullah University Hospital (KAUH), Jordan. This dataset is then used to experiment with different features extraction and selection methods and different machine learning classification methods. The work can be summarized as follows. We start by selecting the participating patients according to their history information that is acquired from the patients using a questionnaire. Then, we construct a tool that employs image processing techniques to process the selected patients’ CT scan images to extract useful information from them. After that, different filters and wrapper selection methods with various machine learning techniques are utilized to classify the cases in the dataset. The results show that the performance of wrapper feature selection (using PART classifier with best first search) with all used classifiers produces better results compared with the other feature selection methods.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 12th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1