首页 > 最新文献

2021 12th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
Forecasting Dengue Fever Using Machine Learning Regression Techniques 利用机器学习回归技术预测登革热
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464619
Qanita Bani Baker, Dalya Faraj, Alanoud Alguzo
With the increase in life-threatening viral diseases, the need for extensive research on its causes, recovery, and methods of prevention becomes crucial. Some of these diseases are dangerous and sometimes they might cause death. Dengue Fever remains one of the important public health issues expanded several areas all around the world. Dengue Fever spread could be affected by several factors such as climate conditions. In this paper, we analyze a weather-related dataset to predict the number of illness cases per week in the cities of San Juan and Iquitos by using several machine learning regression algorithms. To achieve this, we utilized and compared different machine learning regression techniques, the performance is evaluated using the Mean Absolute Error (MAE). As a result, the Poisson Regression Model achieved the best ratios and the lowest mean absolute error ratio of 25.6%.
随着危及生命的病毒性疾病的增加,对其病因、康复和预防方法进行广泛研究的必要性变得至关重要。其中一些疾病很危险,有时可能会导致死亡。登革热仍然是一个重要的公共卫生问题,在世界各地蔓延了几个地区。登革热的传播可能受到气候条件等几个因素的影响。在本文中,我们分析了一个与天气相关的数据集,通过使用几种机器学习回归算法来预测圣胡安和伊基托斯市每周的疾病病例数。为了实现这一点,我们利用并比较了不同的机器学习回归技术,使用平均绝对误差(MAE)来评估性能。结果表明,泊松回归模型的拟合率最佳,平均绝对错误率最低,为25.6%。
{"title":"Forecasting Dengue Fever Using Machine Learning Regression Techniques","authors":"Qanita Bani Baker, Dalya Faraj, Alanoud Alguzo","doi":"10.1109/ICICS52457.2021.9464619","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464619","url":null,"abstract":"With the increase in life-threatening viral diseases, the need for extensive research on its causes, recovery, and methods of prevention becomes crucial. Some of these diseases are dangerous and sometimes they might cause death. Dengue Fever remains one of the important public health issues expanded several areas all around the world. Dengue Fever spread could be affected by several factors such as climate conditions. In this paper, we analyze a weather-related dataset to predict the number of illness cases per week in the cities of San Juan and Iquitos by using several machine learning regression algorithms. To achieve this, we utilized and compared different machine learning regression techniques, the performance is evaluated using the Mean Absolute Error (MAE). As a result, the Poisson Regression Model achieved the best ratios and the lowest mean absolute error ratio of 25.6%.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Empirical Evaluation of Energy Consumption for Mobile Applications 移动应用能耗的实证评价
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464579
Shutong Song, Fadi Wedyan, Y. Jararweh
The study of software energy consumption is gaining more importance due to the wildly increasing use of resource limited portable devices that run on batteries, in addition to the economical and environmental concerns. Mobile hardware has been mostly well optimized on their energy consumption, but that cannot be said for mobile applications. Studying the energy consumption of applications requires investigating the amount of energy consumed at a granule level (e.g., method calls), and therefore, identifying the leaks which are responsible for peaks in energy consumed by an application. In this paper, we performed an empirical measurement of energy consumption for 10 Android applications using a software-based tool called PETRA. We reported and compared the energy consumed by method calls by the test cases. The study reveals that there are clear variations on the average energy consumption in the studied applications and are ranging from 0.25 Joule/second to 1.25 Joule/second. Moreover, the study revealed that the relative high average energy consumption in is associated with some frequently called methods by the test cases. These methods are identified and reported as energy hotspots. These findings could help practitioners to minimize the energy pattern by applying refactoring techniques during software maintenance.
除了经济和环境方面的考虑外,由于越来越多地使用使用电池的资源有限的便携式设备,对软件能耗的研究正变得越来越重要。移动硬件大多在能耗方面进行了很好的优化,但对于移动应用程序来说就不是这样了。研究应用程序的能量消耗需要在颗粒级别(例如,方法调用)调查消耗的能量量,因此,确定导致应用程序消耗的能量峰值的泄漏。在本文中,我们使用基于软件的工具PETRA对10个Android应用程序的能耗进行了实证测量。我们报告并比较了测试用例中方法调用所消耗的能量。研究表明,在研究的应用中,平均能量消耗有明显的变化,范围从0.25焦耳/秒到1.25焦耳/秒。此外,研究还揭示了相对较高的平均能耗与测试用例中经常调用的一些方法有关。这些方法被确定并报告为能源热点。这些发现可以帮助实践者通过在软件维护期间应用重构技术来最小化能量模式。
{"title":"Empirical Evaluation of Energy Consumption for Mobile Applications","authors":"Shutong Song, Fadi Wedyan, Y. Jararweh","doi":"10.1109/ICICS52457.2021.9464579","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464579","url":null,"abstract":"The study of software energy consumption is gaining more importance due to the wildly increasing use of resource limited portable devices that run on batteries, in addition to the economical and environmental concerns. Mobile hardware has been mostly well optimized on their energy consumption, but that cannot be said for mobile applications. Studying the energy consumption of applications requires investigating the amount of energy consumed at a granule level (e.g., method calls), and therefore, identifying the leaks which are responsible for peaks in energy consumed by an application. In this paper, we performed an empirical measurement of energy consumption for 10 Android applications using a software-based tool called PETRA. We reported and compared the energy consumed by method calls by the test cases. The study reveals that there are clear variations on the average energy consumption in the studied applications and are ranging from 0.25 Joule/second to 1.25 Joule/second. Moreover, the study revealed that the relative high average energy consumption in is associated with some frequently called methods by the test cases. These methods are identified and reported as energy hotspots. These findings could help practitioners to minimize the energy pattern by applying refactoring techniques during software maintenance.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing Cloud Native Applications Using Blockchain 使用区块链保护云原生应用程序
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464583
Pankaj Mendki
Cloud computing technologies have dominated more that a decade. Wider adoption of cloud based processing has given rise to different architectural patterns. Cloud native applications have emerged out ensuring application agility and scalability. But they have their own challenges in terms of security. In the last few years, blockchain technology has found its applicability in non-cryptocurrency areas as well. This paper illustrates how blockchain can be used to address security challenges for the cloud native applications. This work focuses challenges and possible blockchain based solution in the areas of network security, identity management, authentication, container security and audit log for forensics.
云计算技术已经主导了十多年。基于云的处理的广泛采用产生了不同的体系结构模式。云原生应用程序的出现确保了应用程序的敏捷性和可伸缩性。但他们在安全方面也有自己的挑战。在过去的几年里,区块链技术也在非加密货币领域发现了它的适用性。本文阐述了如何使用区块链来解决云原生应用程序的安全挑战。这项工作侧重于网络安全、身份管理、身份验证、容器安全和取证审计日志领域的挑战和可能的基于区块链的解决方案。
{"title":"Securing Cloud Native Applications Using Blockchain","authors":"Pankaj Mendki","doi":"10.1109/ICICS52457.2021.9464583","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464583","url":null,"abstract":"Cloud computing technologies have dominated more that a decade. Wider adoption of cloud based processing has given rise to different architectural patterns. Cloud native applications have emerged out ensuring application agility and scalability. But they have their own challenges in terms of security. In the last few years, blockchain technology has found its applicability in non-cryptocurrency areas as well. This paper illustrates how blockchain can be used to address security challenges for the cloud native applications. This work focuses challenges and possible blockchain based solution in the areas of network security, identity management, authentication, container security and audit log for forensics.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116863838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Novelty Detection over Contextual Data Streams at the Edge using One-class Classification 基于单类分类的边缘上下文数据流自适应新颖性检测
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464585
Olga Jodelka, C. Anagnostopoulos, Kostas Kolomvatsos
Online novelty detection is an emerging task in Edge Computing trying to identify novel concepts in contextual data streams which should be incorporated into predictive analytics and inferential models locally executed on edge computing nodes. We introduce an unsupervised adaptive mechanism for online novelty detection over multi-variate data streams at the network edge based on the One-class Support Vector Machine; an instance of One-class Classification paradigm. Due to the proposed adjustable periodic model retraining, our mechanism timely and effectively recognises novelties and resource-efficiently adapts to data streams. Our experimental evaluation and comparative assessment showcase the effectiveness and efficiency of the proposed mechanism over real data-streams in identifying novelty conditioned on the necessary model retraining epochs.
在线新颖性检测是边缘计算中的一项新兴任务,它试图识别上下文数据流中的新概念,这些概念应该被纳入预测分析和在边缘计算节点上本地执行的推理模型中。提出了一种基于单类支持向量机的无监督自适应网络边缘多变量数据流在线新颖性检测机制;一类分类范式的一个实例。由于提出的可调周期模型再训练,我们的机制能够及时有效地识别新事物,并且资源高效地适应数据流。我们的实验评估和比较评估展示了所提出的机制在识别新颖性方面的有效性和效率,这些新颖性取决于必要的模型再训练时代。
{"title":"Adaptive Novelty Detection over Contextual Data Streams at the Edge using One-class Classification","authors":"Olga Jodelka, C. Anagnostopoulos, Kostas Kolomvatsos","doi":"10.1109/ICICS52457.2021.9464585","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464585","url":null,"abstract":"Online novelty detection is an emerging task in Edge Computing trying to identify novel concepts in contextual data streams which should be incorporated into predictive analytics and inferential models locally executed on edge computing nodes. We introduce an unsupervised adaptive mechanism for online novelty detection over multi-variate data streams at the network edge based on the One-class Support Vector Machine; an instance of One-class Classification paradigm. Due to the proposed adjustable periodic model retraining, our mechanism timely and effectively recognises novelties and resource-efficiently adapts to data streams. Our experimental evaluation and comparative assessment showcase the effectiveness and efficiency of the proposed mechanism over real data-streams in identifying novelty conditioned on the necessary model retraining epochs.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Histopathological Images Segmentation Techniques for Breast Cancer Detection 乳腺癌检测的组织病理学图像分割技术评价
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464594
Qanita Bani Baker, Ala’a Abu Qutaish
Breast cancer classification and detection using histopathological images is considered a difficult process due to the complexity of the characteristics of histopathology images. This paper presents an automated system for the classification and detection of breast cancer from microscopic histological images where the images are classified into benign, in situ, invasive, and normal. The proposed approach involves several steps which are image preprocessing (Enhancement), image segmentation, feature extraction, feature selection, and finally image classification. The proposed approach utilizes and compares two segmentation methods which are clustering and Global thresholding using Otsu’s method. Initially, images are segmented using K-means and Global thresholding methods. Then, features (morphological and texture) are extracted from the images for the two methods. Moreover, feature selection is done by using Principal Component Analysis (PCA). Finally, K-means and Global thresholding methods are compared in the classification process by using different classifiers. The results show better performance for the Global thresholding.
由于组织病理图像特征的复杂性,使用组织病理图像进行乳腺癌的分类和检测被认为是一个困难的过程。本文介绍了一种用于从显微组织学图像中分类和检测乳腺癌的自动化系统,其中图像分为良性,原位,浸润性和正常。该方法包括图像预处理(增强)、图像分割、特征提取、特征选择和最后的图像分类。该方法利用了Otsu方法的聚类和全局阈值分割两种分割方法,并对其进行了比较。首先,使用k均值和全局阈值方法对图像进行分割。然后,从图像中提取特征(形态学和纹理)用于两种方法。此外,利用主成分分析(PCA)进行特征选择。最后,通过使用不同的分类器,比较了K-means和Global阈值方法的分类过程。结果表明,全局阈值法具有较好的性能。
{"title":"Evaluation of Histopathological Images Segmentation Techniques for Breast Cancer Detection","authors":"Qanita Bani Baker, Ala’a Abu Qutaish","doi":"10.1109/ICICS52457.2021.9464594","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464594","url":null,"abstract":"Breast cancer classification and detection using histopathological images is considered a difficult process due to the complexity of the characteristics of histopathology images. This paper presents an automated system for the classification and detection of breast cancer from microscopic histological images where the images are classified into benign, in situ, invasive, and normal. The proposed approach involves several steps which are image preprocessing (Enhancement), image segmentation, feature extraction, feature selection, and finally image classification. The proposed approach utilizes and compares two segmentation methods which are clustering and Global thresholding using Otsu’s method. Initially, images are segmented using K-means and Global thresholding methods. Then, features (morphological and texture) are extracted from the images for the two methods. Moreover, feature selection is done by using Principal Component Analysis (PCA). Finally, K-means and Global thresholding methods are compared in the classification process by using different classifiers. The results show better performance for the Global thresholding.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121804583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Heuristic for license-aware, performant and energy efficient deployment of multiple software in Cloud architecture 启发式的许可证意识,性能和能源效率的部署在云架构中的多个软件
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464578
E. Caron, Arthur Chevalier, Noelle Baillon-Bachoc, Anne-Lucie Vion
In the Cloud Era, we want to be able to quickly deploy any software anywhere in the world to provide high availability and fast services while maintaining acceptable levels of performance, low energy consumption and ensuring the compliance with every software level agreements contracted. To answer some of these needs, different tools exist in parallel to a big variety of Cloud architectures. Several interesting problems arise like deployment, networking, storage, security, and many others. In this paper, we will focus on the deployment issue with a Software Asset Management point of view. Most Cloud providers use proprietary software to ensure different kinds of services, and with them comes the licensing problem. We will tackle and propose a heuristic to solve the problem of deploying software in a Cloud architecture while considering license compliance, license price, and other important criteria. We will prove the NP-completeness of this problem and compare our heuristic with others to evaluate the enhancement we propose.
在云时代,我们希望能够在世界任何地方快速部署任何软件,以提供高可用性和快速服务,同时保持可接受的性能水平、低能耗并确保遵守每个软件级别协议。为了满足这些需求,不同的工具与各种各样的云架构并行存在。出现了一些有趣的问题,如部署、网络、存储、安全性和许多其他问题。在本文中,我们将从软件资产管理的角度关注部署问题。大多数云提供商使用专有软件来确保不同类型的服务,随之而来的是许可问题。我们将处理并提出一种启发式方法来解决在云架构中部署软件的问题,同时考虑许可证遵从性、许可证价格和其他重要标准。我们将证明这个问题的np完备性,并将我们的启发式方法与其他启发式方法进行比较,以评估我们提出的增强方法。
{"title":"Heuristic for license-aware, performant and energy efficient deployment of multiple software in Cloud architecture","authors":"E. Caron, Arthur Chevalier, Noelle Baillon-Bachoc, Anne-Lucie Vion","doi":"10.1109/ICICS52457.2021.9464578","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464578","url":null,"abstract":"In the Cloud Era, we want to be able to quickly deploy any software anywhere in the world to provide high availability and fast services while maintaining acceptable levels of performance, low energy consumption and ensuring the compliance with every software level agreements contracted. To answer some of these needs, different tools exist in parallel to a big variety of Cloud architectures. Several interesting problems arise like deployment, networking, storage, security, and many others. In this paper, we will focus on the deployment issue with a Software Asset Management point of view. Most Cloud providers use proprietary software to ensure different kinds of services, and with them comes the licensing problem. We will tackle and propose a heuristic to solve the problem of deploying software in a Cloud architecture while considering license compliance, license price, and other important criteria. We will prove the NP-completeness of this problem and compare our heuristic with others to evaluate the enhancement we propose.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128005326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Lung Cancer Survival Time Using Deep Learning Techniques 使用深度学习技术预测肺癌生存时间
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464589
Qanita Bani Baker, Maram Gharaibeh, Yara Al-Harahsheh
Lung cancer is one of the most commonly diagnosed cancer. Most studies found that lung cancer patients have a survival time up to 5 years after the cancer is found. An accurate prognosis is the most critical aspect of a clinical decision-making process for patients. predicting patients’ survival time helps healthcare professionals to make treatment recommendations based on the prediction. In this paper, we used various deep learning methods to predict the survival time of Non-Small Cell Lung Cancer (NSCLC) patients in days which has been evaluated on clinical and radiomics dataset. The dataset was extracted from computerized tomography (CT) images that contain data for 300 patients. The concordance index (C-index) was used to evaluate the models. We applied several deep learning approaches and the best accuracy gained is 70.05% on the OWKIN task using Multilayer Perceptron (MLP) which outperforms the baseline model provided by the OWKIN task organizers
肺癌是最常见的癌症之一。大多数研究发现,肺癌患者在发现癌症后的生存时间长达5年。准确的预后是患者临床决策过程中最关键的方面。预测患者的生存时间有助于医疗保健专业人员根据预测提出治疗建议。在本文中,我们使用各种深度学习方法来预测非小细胞肺癌(NSCLC)患者的生存时间(以天为单位),并在临床和放射组学数据集上进行了评估。该数据集是从包含300名患者数据的计算机断层扫描(CT)图像中提取的。采用一致性指数(C-index)对模型进行评价。我们应用了几种深度学习方法,使用多层感知器(MLP)在OWKIN任务上获得的最佳准确率为70.05%,优于OWKIN任务组织者提供的基线模型
{"title":"Predicting Lung Cancer Survival Time Using Deep Learning Techniques","authors":"Qanita Bani Baker, Maram Gharaibeh, Yara Al-Harahsheh","doi":"10.1109/ICICS52457.2021.9464589","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464589","url":null,"abstract":"Lung cancer is one of the most commonly diagnosed cancer. Most studies found that lung cancer patients have a survival time up to 5 years after the cancer is found. An accurate prognosis is the most critical aspect of a clinical decision-making process for patients. predicting patients’ survival time helps healthcare professionals to make treatment recommendations based on the prediction. In this paper, we used various deep learning methods to predict the survival time of Non-Small Cell Lung Cancer (NSCLC) patients in days which has been evaluated on clinical and radiomics dataset. The dataset was extracted from computerized tomography (CT) images that contain data for 300 patients. The concordance index (C-index) was used to evaluate the models. We applied several deep learning approaches and the best accuracy gained is 70.05% on the OWKIN task using Multilayer Perceptron (MLP) which outperforms the baseline model provided by the OWKIN task organizers","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Regional Arabic Dialect based on Recurrent Neural Network 基于递归神经网络的阿拉伯语方言区域检测
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464605
Dalia Alzu'bi, R. Duwairi
In recent times, Arabic text analysis has attracted great interest, due to the widespread and use of the Arabic language by social media platforms, applications, and communities, and others. Each Arabian country has a special dialect that distinguishes it from others. Accordingly, the work on classifying these dialects is an interesting area of research, as it has implications for other areas, such as; sentiment analysis and machine translation. In this paper, we build a multi-task classification model for dialects based on utilizing Recurrent Neural Networks, where the dialects are classified into four categories, namely; Maghreb, Levantine, Gulf (in addition to Iraqi), and the Nile. The used dataset is taken from the MADAR corpus, which contained 110,000 sentences, these belong to dialects of different countries in the four regions. Based on experimentations, the results revealed that the classifiers are able to distinguish between the four dialects with an accuracy of up to 84.76%, which in turn is considered a promising result in this field.
最近,由于阿拉伯语在社交媒体平台、应用程序和社区等方面的广泛使用,阿拉伯语文本分析引起了极大的兴趣。每个阿拉伯国家都有不同于其他国家的特殊方言。因此,对这些方言进行分类的工作是一个有趣的研究领域,因为它对其他领域也有影响,比如;情感分析和机器翻译。本文利用递归神经网络建立了方言多任务分类模型,将方言分为四类,即;马格里布,黎凡特,海湾(除了伊拉克)和尼罗河。使用的数据集取自MADAR语料库,其中包含11万个句子,这些句子属于四个地区不同国家的方言。实验结果表明,该分类器能够区分四种方言,准确率高达84.76%,这也被认为是该领域的一个有希望的结果。
{"title":"Detecting Regional Arabic Dialect based on Recurrent Neural Network","authors":"Dalia Alzu'bi, R. Duwairi","doi":"10.1109/ICICS52457.2021.9464605","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464605","url":null,"abstract":"In recent times, Arabic text analysis has attracted great interest, due to the widespread and use of the Arabic language by social media platforms, applications, and communities, and others. Each Arabian country has a special dialect that distinguishes it from others. Accordingly, the work on classifying these dialects is an interesting area of research, as it has implications for other areas, such as; sentiment analysis and machine translation. In this paper, we build a multi-task classification model for dialects based on utilizing Recurrent Neural Networks, where the dialects are classified into four categories, namely; Maghreb, Levantine, Gulf (in addition to Iraqi), and the Nile. The used dataset is taken from the MADAR corpus, which contained 110,000 sentences, these belong to dialects of different countries in the four regions. Based on experimentations, the results revealed that the classifiers are able to distinguish between the four dialects with an accuracy of up to 84.76%, which in turn is considered a promising result in this field.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forensics Analysis of Private Web Browsing Using Android Memory Acquisition 基于Android内存获取的私人网页浏览取证分析
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464591
Lojin Bani Younis, Safa Sweda, A. Alzu’bi
Modern smartphones can perform and display nearly as much of the internet as personal computers, including web browsing and video streaming. Nowadays, all users rely on web browsers to access, display, and manipulate information from Internet on their mobile devices. However, almost all of user browsing activities flow through a web browser, thereby threatening the privacy preservation by third-party trackers or browsers’ providers. Therefore, there is a demand to make web browsers private for users with the most intensive concentrate on keeping their data safe. In this paper, we perform a thorough digital forensics analysis on the smartphone’s volatile memory with the aim at investigating the data privacy on various web browsers. Memory acquisitions is methodically applied in private and non-private modes on Android platforms to examine which of the user artifacts are being protected or exposed from web history or email communications. Comprehensive experiments are conducted on the four popular browsers Google Chrome, Mozilla Firefox, Dolphin and Opera under various scenarios. The experimental results show that the Chrome web browser was the lowest secure browser in which all the inspected data have been retrieved even with a private mode enabled. The other browsers have shown a partial privacy preservation. Such findings emphasize the importance of conducting such forensics analysis and warning users to keep their browsing practices safe from prying eyes.
现代智能手机可以执行和显示几乎和个人电脑一样多的互联网功能,包括网页浏览和视频流。如今,所有用户都依赖网络浏览器在他们的移动设备上访问、显示和操作来自互联网的信息。然而,几乎所有的用户浏览活动都是通过网络浏览器进行的,从而威胁到第三方跟踪器或浏览器提供商的隐私保护。因此,有一种需求是让网络浏览器为那些最专注于保护数据安全的用户提供隐私。在本文中,我们对智能手机的易失性内存进行了彻底的数字取证分析,目的是调查各种web浏览器上的数据隐私。内存获取系统地应用于Android平台上的私有和非私有模式,以检查哪些用户工件受到保护或暴露于web历史或电子邮件通信。在各种场景下,对四种流行的浏览器谷歌Chrome、Mozilla Firefox、Dolphin和Opera进行了全面的实验。实验结果表明,Chrome浏览器是安全性最低的浏览器,即使启用了私有模式,也可以检索到所有被检查的数据。其他浏览器已经显示出部分隐私保护。这些发现强调了进行此类取证分析的重要性,并警告用户保护自己的浏览行为免受窥探。
{"title":"Forensics Analysis of Private Web Browsing Using Android Memory Acquisition","authors":"Lojin Bani Younis, Safa Sweda, A. Alzu’bi","doi":"10.1109/ICICS52457.2021.9464591","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464591","url":null,"abstract":"Modern smartphones can perform and display nearly as much of the internet as personal computers, including web browsing and video streaming. Nowadays, all users rely on web browsers to access, display, and manipulate information from Internet on their mobile devices. However, almost all of user browsing activities flow through a web browser, thereby threatening the privacy preservation by third-party trackers or browsers’ providers. Therefore, there is a demand to make web browsers private for users with the most intensive concentrate on keeping their data safe. In this paper, we perform a thorough digital forensics analysis on the smartphone’s volatile memory with the aim at investigating the data privacy on various web browsers. Memory acquisitions is methodically applied in private and non-private modes on Android platforms to examine which of the user artifacts are being protected or exposed from web history or email communications. Comprehensive experiments are conducted on the four popular browsers Google Chrome, Mozilla Firefox, Dolphin and Opera under various scenarios. The experimental results show that the Chrome web browser was the lowest secure browser in which all the inspected data have been retrieved even with a private mode enabled. The other browsers have shown a partial privacy preservation. Such findings emphasize the importance of conducting such forensics analysis and warning users to keep their browsing practices safe from prying eyes.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A BERT-based system for multi-topic labeling of Arabic content 基于bert的阿拉伯语内容多主题标注系统
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464540
Abdallah Ghourabi
Text classification (or categorization) is one of the most common natural language processing (NLP) tasks. It is very useful to simplify the management of a large volume of textual data by assigning each text to one or more categories. This operation is challenging when it is a multi-label classification. For Arabic text, this task becomes more challenging due to the complex morphology and structure of Arabic language. In this paper, we address this issue by proposing a classification system for the Mowjaz Multi-Topic Labelling Task. The objective of this task is to classify Arabic articles according to the 10 topics predefined in Mowjaz. The proposed system is based on AraBERT, a pre-trained BERT model for the Arabic language. The first step of this system consists in tokenizing and representing the input articles using the AraBERT model. Then, a fully connected neural network is applied on the output of the AraBERT model to classify the articles according to their topics. The experimental tests conducted on the Mowjaz dataset showed an accuracy of 0.865 for the development set and an accuracy of 0.851 for the test set.
文本分类是最常见的自然语言处理(NLP)任务之一。通过将每个文本分配到一个或多个类别,简化大量文本数据的管理非常有用。当它是一个多标签分类时,这个操作是具有挑战性的。对于阿拉伯语文本,由于阿拉伯语复杂的形态和结构,这项任务变得更具挑战性。在本文中,我们通过为Mowjaz多主题标签任务提出一个分类系统来解决这个问题。这项任务的目标是根据Mowjaz中预定义的10个主题对阿拉伯语文章进行分类。提出的系统基于AraBERT,一种针对阿拉伯语的预训练BERT模型。该系统的第一步是使用AraBERT模型对输入条目进行标记和表示。然后,在AraBERT模型的输出上应用全连接神经网络,根据主题对文章进行分类。在Mowjaz数据集上进行的实验测试显示,开发集的精度为0.865,测试集的精度为0.851。
{"title":"A BERT-based system for multi-topic labeling of Arabic content","authors":"Abdallah Ghourabi","doi":"10.1109/ICICS52457.2021.9464540","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464540","url":null,"abstract":"Text classification (or categorization) is one of the most common natural language processing (NLP) tasks. It is very useful to simplify the management of a large volume of textual data by assigning each text to one or more categories. This operation is challenging when it is a multi-label classification. For Arabic text, this task becomes more challenging due to the complex morphology and structure of Arabic language. In this paper, we address this issue by proposing a classification system for the Mowjaz Multi-Topic Labelling Task. The objective of this task is to classify Arabic articles according to the 10 topics predefined in Mowjaz. The proposed system is based on AraBERT, a pre-trained BERT model for the Arabic language. The first step of this system consists in tokenizing and representing the input articles using the AraBERT model. Then, a fully connected neural network is applied on the output of the AraBERT model to classify the articles according to their topics. The experimental tests conducted on the Mowjaz dataset showed an accuracy of 0.865 for the development set and an accuracy of 0.851 for the test set.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134038933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 12th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1