首页 > 最新文献

2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

英文 中文
A Framework for Securing EHR Management in the Era of Internet of Things 物联网时代电子病历管理安全框架
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096788
Waad Y. Bin Saleem, Hanan Ali, Nouf AlSalloom
Nowadays the internet of things (IoT) is one of the most arising obvious technologies which plays an important role in healthcare systems. Healthcare systems including stored Electronic healthcare records (EHR), which are vulnerable to intentional and unintentional security threats. therefore; the need for strong EHR security protection is essential. In this paper we display and analyze some of the proposed IoT-based security solutions for healthcare, and also outline a new platform that secures and enhances the process of accessing and managing EHR in hospitals databases.
如今,物联网(IoT)是最新兴的明显技术之一,在医疗保健系统中发挥着重要作用。医疗保健系统,包括存储的电子医疗记录(EHR),容易受到有意和无意的安全威胁。因此;需要强有力的电子病历安全保护是必不可少的。在本文中,我们展示和分析了一些拟议的基于物联网的医疗保健安全解决方案,并概述了一个新的平台,该平台可以保护和增强医院数据库中EHR的访问和管理过程。
{"title":"A Framework for Securing EHR Management in the Era of Internet of Things","authors":"Waad Y. Bin Saleem, Hanan Ali, Nouf AlSalloom","doi":"10.1109/ICCAIS48893.2020.9096788","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096788","url":null,"abstract":"Nowadays the internet of things (IoT) is one of the most arising obvious technologies which plays an important role in healthcare systems. Healthcare systems including stored Electronic healthcare records (EHR), which are vulnerable to intentional and unintentional security threats. therefore; the need for strong EHR security protection is essential. In this paper we display and analyze some of the proposed IoT-based security solutions for healthcare, and also outline a new platform that secures and enhances the process of accessing and managing EHR in hospitals databases.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126311961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network 认知无线电网络协同频谱感知与硬决策规则
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096740
Gerges M. Salama, Sarah A. Taha
Cognitive radio is development of wireless communication and mobile computing. Spectrum is a limited source. The licensed spectrum is proposed to be used only by the spectrum owners. Cognitive radio is a new view of the recycle licensed spectrum in an unlicensed manner. The main condition of the cognitive radio network is sensing the spectrum hole. Cognitive radio can be detect unused spectrum. It shares this with no interference to the licensed spectrum. It can be a sense signals. It makes viable communication in the middle of multiple users through co-operation in a self-organized manner. The energy detector method is unseen signal detector because it reject the data of the signal.In this paper, has implemented Simulink Energy Detection of spectrum sensing cognitive radio in a MATLAB Simulink to Exploit spectrum holes and avoid damaging interference to licensed spectrum and unlicensed spectrum. The hidden primary user problem will happened because fading or shadowing. Ithappens when cognitive radio could not be detected by primer users because of its location. Cooperative sensing spectrum sensing is the best-proposed method to solve the hidden problem.
认知无线电是无线通信和移动计算的发展。频谱是有限的资源。建议授权频谱只供频谱拥有者使用。认知无线电是一种以非许可方式回收许可频谱的新观点。认知无线网络的主要条件是感知频谱空洞。认知无线电可以检测到未使用的频谱。它共享这一点,而不会对许可频谱产生干扰。它可以是一种感官信号。它通过以自组织的方式进行合作,在多个用户之间进行可行的通信。能量检测器方法对信号的数据进行拒绝处理,是一种隐性信号检测器。本文在MATLAB Simulink中实现了频谱感知认知无线电的Simulink能量检测,利用频谱漏洞,避免对授权频谱和非授权频谱的破坏性干扰。隐藏的主用户问题会因为衰落或阴影而发生。当认知无线电由于其位置而无法被初级使用者检测到时,就会发生这种情况。协同感知频谱感知是解决隐性问题的最佳方法。
{"title":"Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network","authors":"Gerges M. Salama, Sarah A. Taha","doi":"10.1109/ICCAIS48893.2020.9096740","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096740","url":null,"abstract":"Cognitive radio is development of wireless communication and mobile computing. Spectrum is a limited source. The licensed spectrum is proposed to be used only by the spectrum owners. Cognitive radio is a new view of the recycle licensed spectrum in an unlicensed manner. The main condition of the cognitive radio network is sensing the spectrum hole. Cognitive radio can be detect unused spectrum. It shares this with no interference to the licensed spectrum. It can be a sense signals. It makes viable communication in the middle of multiple users through co-operation in a self-organized manner. The energy detector method is unseen signal detector because it reject the data of the signal.In this paper, has implemented Simulink Energy Detection of spectrum sensing cognitive radio in a MATLAB Simulink to Exploit spectrum holes and avoid damaging interference to licensed spectrum and unlicensed spectrum. The hidden primary user problem will happened because fading or shadowing. Ithappens when cognitive radio could not be detected by primer users because of its location. Cooperative sensing spectrum sensing is the best-proposed method to solve the hidden problem.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Validation of Jaya Algorithm to The Most Well-known Testbench Problem Jaya算法对最著名的测试台问题的性能验证
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096739
Mostafa A. Elhosseini
Soft computing algorithms are population-based, probabilistic, that have the same common controlling parameters such as population size, number of generations, elite size. In addition to the regular control parameters, the different algorithms need specific control parameters for their algorithm. A good tuning of different algorithm parameters is an integral factor that affects the efficacy of the algorithm. The inappropriate tuning of the algorithm parameters increases the computational effort or adheres to local limits. Teaching Learning-based Optimization (TLBO) algorithms are algorithms that need no algorithm-specific parameter. Jaya is a kind of TLBO algorithm but has only one-step and is user-friendly. The main aims of this paper are to present the Jaya algorithm and its application to the most prominent engineering problem. The validation and monitoring of existing technology in the presented Jaya include case studies, ranging from the recent CEC 2016 workbench to the common engineering challenges for the gear train, welded beam, three-bar truss system. The results achieved reflect the significance of the algorithms in comparison with most popular modern algorithms.
软计算算法是基于群体的、概率的,它们具有相同的共同控制参数,如群体规模、代数、精英规模。除了常规的控制参数外,不同的算法还需要特定的控制参数。不同算法参数的合理调优是影响算法有效性的重要因素。算法参数的不适当调优会增加计算量或受局部限制。TLBO (Teaching - Learning-based Optimization)算法是一种不需要特定算法参数的算法。Jaya是TLBO算法的一种,但只有一步,并且用户友好。本文的主要目的是介绍Jaya算法及其在最突出的工程问题中的应用。在Jaya中,现有技术的验证和监测包括案例研究,从最近的CEC 2016工作台到轮系、焊接梁、三杆桁架系统的常见工程挑战。与大多数流行的现代算法相比,所获得的结果反映了该算法的意义。
{"title":"Performance Validation of Jaya Algorithm to The Most Well-known Testbench Problem","authors":"Mostafa A. Elhosseini","doi":"10.1109/ICCAIS48893.2020.9096739","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096739","url":null,"abstract":"Soft computing algorithms are population-based, probabilistic, that have the same common controlling parameters such as population size, number of generations, elite size. In addition to the regular control parameters, the different algorithms need specific control parameters for their algorithm. A good tuning of different algorithm parameters is an integral factor that affects the efficacy of the algorithm. The inappropriate tuning of the algorithm parameters increases the computational effort or adheres to local limits. Teaching Learning-based Optimization (TLBO) algorithms are algorithms that need no algorithm-specific parameter. Jaya is a kind of TLBO algorithm but has only one-step and is user-friendly. The main aims of this paper are to present the Jaya algorithm and its application to the most prominent engineering problem. The validation and monitoring of existing technology in the presented Jaya include case studies, ranging from the recent CEC 2016 workbench to the common engineering challenges for the gear train, welded beam, three-bar truss system. The results achieved reflect the significance of the algorithms in comparison with most popular modern algorithms.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autismworld: an Arabic Application for Autism Spectrum Disorder 自闭症世界:自闭症谱系障碍的阿拉伯语应用
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096811
N. Alnaghaimshi, A. Alhazmi, S. A. Alqanwah, M. Aldablan, M. A. Almossa
Autism Spectrum Disorder (ASD) is one of the most-prevalent neurodevelopmental disorder. ASD is defined by impaired social communication along with unusual restricted and repetitive behaviours. However, each child diagnosed with ASD presents with a unique range of behavioural, communication and social skills problems. As result, the burden on parents who are raising a child with ASD is too high, especially in countries that suffer from a lack or shortages of skilled specialists, supportive services and special centres that deal with such conditions. Extensive research has proven the efficiency of technologies as support tools for ASD children and their families. Since technologies and telehealth services have recently been introduced in KSA, we proposed with this application (app) to provide an innovative opportunity for assisting and supporting children with ASD and their parents in our context. The proposed application aims to extend and enhance care delivery in numerous ways: it will provide parents with a handy tool to help to detect signs of autism in their child and give them updated resources for education and training on how to care for their ASD child. Moreover, this application aims to improve access to specialists for parents and help to establish a space in which to share information and experiences among parents of children with ASD. Moreover, the app employs an innovative feature to simplify ASD data collection through conducting short and simple surveys and conduct interviews via text messaging.
自闭症谱系障碍(ASD)是最常见的神经发育障碍之一。ASD的定义是社会沟通障碍以及不寻常的限制和重复行为。然而,每个被诊断患有自闭症谱系障碍的孩子都表现出一系列独特的行为、沟通和社交技能问题。因此,抚养自闭症儿童的父母负担过重,特别是在缺乏或短缺熟练专家、支持性服务和处理这类情况的特殊中心的国家。广泛的研究已经证明了技术作为ASD儿童及其家庭支持工具的有效性。由于KSA最近引入了技术和远程医疗服务,我们提出了这个应用程序(app),以提供一个创新的机会,帮助和支持我们背景下的ASD儿童及其父母。该应用程序旨在以多种方式扩展和加强护理服务:它将为父母提供一个方便的工具,帮助他们检测孩子的自闭症迹象,并为他们提供有关如何照顾自闭症儿童的最新教育和培训资源。此外,该应用程序旨在改善父母与专家的联系,并帮助建立一个空间,在这个空间中,自闭症儿童的父母可以分享信息和经验。此外,该应用程序还采用了一项创新功能,通过进行简短的调查和通过短信进行访谈来简化ASD数据收集。
{"title":"Autismworld: an Arabic Application for Autism Spectrum Disorder","authors":"N. Alnaghaimshi, A. Alhazmi, S. A. Alqanwah, M. Aldablan, M. A. Almossa","doi":"10.1109/ICCAIS48893.2020.9096811","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096811","url":null,"abstract":"Autism Spectrum Disorder (ASD) is one of the most-prevalent neurodevelopmental disorder. ASD is defined by impaired social communication along with unusual restricted and repetitive behaviours. However, each child diagnosed with ASD presents with a unique range of behavioural, communication and social skills problems. As result, the burden on parents who are raising a child with ASD is too high, especially in countries that suffer from a lack or shortages of skilled specialists, supportive services and special centres that deal with such conditions. Extensive research has proven the efficiency of technologies as support tools for ASD children and their families. Since technologies and telehealth services have recently been introduced in KSA, we proposed with this application (app) to provide an innovative opportunity for assisting and supporting children with ASD and their parents in our context. The proposed application aims to extend and enhance care delivery in numerous ways: it will provide parents with a handy tool to help to detect signs of autism in their child and give them updated resources for education and training on how to care for their ASD child. Moreover, this application aims to improve access to specialists for parents and help to establish a space in which to share information and experiences among parents of children with ASD. Moreover, the app employs an innovative feature to simplify ASD data collection through conducting short and simple surveys and conduct interviews via text messaging.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Recommender System for Linear Satellite TV: Is It Possible? 线性卫星电视推荐系统:可行吗?
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096718
A. Gazdar, M. Kefi
A little attention has been made to Recommender Systems (RS) for TV services broadcast through satellites due to the one-way data flow nature of the linear satellite TV. Nevertheless, the emergence of new Internet enabled TV Set-Top-Box (STB) with an embedded open source operating system has partially overcame this shortage and has encouraged implementing new kinds of applications for those STBs. In this context, we discuss in this paper the feasability of a Recommender System for the linear satellite based TV which suggests a dynamic list of services that may interest the TV viewer based on his profile (age, gender, etc) with regards to the ongoing audience rate of users having the same profile as him.
由于线性卫星电视的单向数据流性质,对通过卫星广播的电视服务的推荐系统(RS)给予了很少的注意。然而,带有嵌入式开源操作系统的新型Internet电视机顶盒(STB)的出现在一定程度上克服了这一不足,并鼓励为这些机顶盒实现新型应用程序。在这种背景下,我们在本文中讨论了基于线性卫星电视的推荐系统的可行性,该系统根据电视观众的个人资料(年龄、性别等)以及与他具有相同个人资料的用户的持续收视率,提出了一个可能感兴趣的动态服务列表。
{"title":"A Recommender System for Linear Satellite TV: Is It Possible?","authors":"A. Gazdar, M. Kefi","doi":"10.1109/ICCAIS48893.2020.9096718","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096718","url":null,"abstract":"A little attention has been made to Recommender Systems (RS) for TV services broadcast through satellites due to the one-way data flow nature of the linear satellite TV. Nevertheless, the emergence of new Internet enabled TV Set-Top-Box (STB) with an embedded open source operating system has partially overcame this shortage and has encouraged implementing new kinds of applications for those STBs. In this context, we discuss in this paper the feasability of a Recommender System for the linear satellite based TV which suggests a dynamic list of services that may interest the TV viewer based on his profile (age, gender, etc) with regards to the ongoing audience rate of users having the same profile as him.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114342811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data and Location Privacy Issues in IoT Applications 物联网应用中的数据和位置隐私问题
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096837
Amani Abuladel, O. Bamasag
The Internet of Things (IoT) is an innovative interconnected framework where all objects can interact with each other and with other people. It enhances the quality of life, business growth and efficiency in multiple domains. However, the heterogeneity of the "Things" that can be associated in such conditions makes interoperability among them a difficult issue. Moreover, the data exchanged between IoT system components are normally not protected. This leads to users losing their privacy, hence, making it difficult to share and reuse data for purposes other than what they were originally set up for. In this paper, we address these challenges in the context of IoT applications considering user’s data and location privacy as not to be shared between these ‘Things’. We first describe two use case scenarios of IoT users in healthcare applications. The first scenario describes an attacker capturing the data traveling from/to the server. The second scenario describes the case of a server acting as a malicious party (i.e., an attacker). The two scenarios highlight data and location privacy issues of IoT users. Based on the use-case scenarios, the paper presents a generic framework for IoT data and location privacy, including a description of entities and interactions among them. The paper then analyzes potential privacy threats in this framework, in order to identify a set of general privacy requirements, with an emphasis on data and location privacy. These requirements will provide guidance to future solutions for secure IoT communication and/or risk assessment.
物联网(IoT)是一个创新的互联框架,所有物体都可以相互作用,也可以与其他人互动。它提高了多个领域的生活质量、业务增长和效率。然而,在这种情况下可以关联的“事物”的异质性使得它们之间的互操作性成为一个困难的问题。此外,物联网系统组件之间交换的数据通常不受保护。这将导致用户失去他们的隐私,因此,很难共享和重用数据,而不是他们最初设置的目的。在本文中,我们在物联网应用的背景下解决了这些挑战,考虑到用户的数据和位置隐私不能在这些“事物”之间共享。我们首先描述了医疗保健应用中物联网用户的两个用例场景。第一个场景描述攻击者捕获从服务器传入/传入服务器的数据。第二个场景描述了服务器充当恶意方(即攻击者)的情况。这两个场景突出了物联网用户的数据和位置隐私问题。基于用例场景,本文提出了物联网数据和位置隐私的通用框架,包括实体和它们之间的交互描述。然后,本文分析了该框架中潜在的隐私威胁,以确定一套通用的隐私要求,重点是数据和位置隐私。这些要求将为安全物联网通信和/或风险评估的未来解决方案提供指导。
{"title":"Data and Location Privacy Issues in IoT Applications","authors":"Amani Abuladel, O. Bamasag","doi":"10.1109/ICCAIS48893.2020.9096837","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096837","url":null,"abstract":"The Internet of Things (IoT) is an innovative interconnected framework where all objects can interact with each other and with other people. It enhances the quality of life, business growth and efficiency in multiple domains. However, the heterogeneity of the \"Things\" that can be associated in such conditions makes interoperability among them a difficult issue. Moreover, the data exchanged between IoT system components are normally not protected. This leads to users losing their privacy, hence, making it difficult to share and reuse data for purposes other than what they were originally set up for. In this paper, we address these challenges in the context of IoT applications considering user’s data and location privacy as not to be shared between these ‘Things’. We first describe two use case scenarios of IoT users in healthcare applications. The first scenario describes an attacker capturing the data traveling from/to the server. The second scenario describes the case of a server acting as a malicious party (i.e., an attacker). The two scenarios highlight data and location privacy issues of IoT users. Based on the use-case scenarios, the paper presents a generic framework for IoT data and location privacy, including a description of entities and interactions among them. The paper then analyzes potential privacy threats in this framework, in order to identify a set of general privacy requirements, with an emphasis on data and location privacy. These requirements will provide guidance to future solutions for secure IoT communication and/or risk assessment.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114772489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Best-Worst Method for Resource Allocation and Task Scheduling in Cloud Computing 云计算中资源分配和任务调度的最佳-最差方法
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096877
Abdulaziz Alhubaishy, Abdulmajeed Aljuhani
In cloud computing, service providers and service consumers often pursue conflicting benefits. The task-scheduling problem in particular requires the consideration of all characteristics affecting the scheduling process that are related to the two parties involved. The literature proposes that scheduling tasks and resource allocation problems can be structured and mathematically represented by adopting Multi-Criteria Decision-Making (MCDM) methods. This paper introduces a model to effectively prioritize tasks in a cloud environment based on consumer preferences and pre-defined criteria. The model adopts the Best-Worst Method (BWM) as a light MCDM method for structuring task-scheduling problems, accommodating consumer preferences, and providing reliable and scientific results for prioritizing tasks in the cloud. Furthermore, the model gives consumers the flexibility to change their preferences and offers a dynamic way to deal with the task-scheduling problem. The paper also provides a step-by-step example to guide consumers on the benefits of the proposed model.
在云计算中,服务提供者和服务消费者经常追求相互冲突的利益。任务调度问题尤其需要考虑影响调度过程的所有特征,这些特征与所涉及的双方有关。文献提出采用多准则决策(Multi-Criteria Decision-Making, MCDM)方法对任务调度和资源分配问题进行结构化和数学表示。本文介绍了一个基于消费者偏好和预定义标准的模型,可以在云环境中有效地对任务进行优先级排序。该模型采用Best-Worst Method (BWM)作为一种轻量级的MCDM方法,用于结构化任务调度问题,适应消费者偏好,并为云中的任务优先级排序提供可靠和科学的结果。此外,该模型使消费者能够灵活地改变他们的偏好,并提供了一种动态的方法来处理任务调度问题。本文还提供了一个循序渐进的例子,以指导消费者对拟议模式的好处。
{"title":"The Best-Worst Method for Resource Allocation and Task Scheduling in Cloud Computing","authors":"Abdulaziz Alhubaishy, Abdulmajeed Aljuhani","doi":"10.1109/ICCAIS48893.2020.9096877","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096877","url":null,"abstract":"In cloud computing, service providers and service consumers often pursue conflicting benefits. The task-scheduling problem in particular requires the consideration of all characteristics affecting the scheduling process that are related to the two parties involved. The literature proposes that scheduling tasks and resource allocation problems can be structured and mathematically represented by adopting Multi-Criteria Decision-Making (MCDM) methods. This paper introduces a model to effectively prioritize tasks in a cloud environment based on consumer preferences and pre-defined criteria. The model adopts the Best-Worst Method (BWM) as a light MCDM method for structuring task-scheduling problems, accommodating consumer preferences, and providing reliable and scientific results for prioritizing tasks in the cloud. Furthermore, the model gives consumers the flexibility to change their preferences and offers a dynamic way to deal with the task-scheduling problem. The paper also provides a step-by-step example to guide consumers on the benefits of the proposed model.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Ontological Model to Predict Dropout Students Using Machine Learning Techniques 利用机器学习技术预测辍学学生的本体论模型
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096743
Alla Abd El-Rady
E-learning systems become more popular than it has ever been. However the popularity of e-learning systems, they still suffer from some problems related to the completion rate of online courses and the learners’ failures. Nowadays, a lot of educational institutions are concentrating on how to solve those problems in order to improve the quality of learning process. This paper presents an ontological model based on machine learning techniques to predict learners coming performance using data produced by learners through their interaction with Learning Management System and Facebook groups. It also presents two different approaches to evaluate ontology model in terms of completeness and correctness.
电子学习系统比以往任何时候都更受欢迎。然而,随着电子学习系统的普及,它们仍然存在一些与在线课程完成率和学习者失败相关的问题。如何解决这些问题,提高学生的学习质量,是当前许多教育机构关注的问题。本文提出了一个基于机器学习技术的本体论模型,该模型使用学习者通过与学习管理系统和Facebook组的交互产生的数据来预测学习者的表现。本文还从完整性和正确性两方面提出了两种不同的本体模型评价方法。
{"title":"An Ontological Model to Predict Dropout Students Using Machine Learning Techniques","authors":"Alla Abd El-Rady","doi":"10.1109/ICCAIS48893.2020.9096743","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096743","url":null,"abstract":"E-learning systems become more popular than it has ever been. However the popularity of e-learning systems, they still suffer from some problems related to the completion rate of online courses and the learners’ failures. Nowadays, a lot of educational institutions are concentrating on how to solve those problems in order to improve the quality of learning process. This paper presents an ontological model based on machine learning techniques to predict learners coming performance using data produced by learners through their interaction with Learning Management System and Facebook groups. It also presents two different approaches to evaluate ontology model in terms of completeness and correctness.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking 命名数据网络的随机最少使用缓存替换策略
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096733
Najla Alzakari, Alanoud Bin Dris, Saad Al-Ahmadi
To accommodate the rapidly changing Internet requirements, Information-Centric Networking (ICN) was recently introduced as a promising architecture for the future Internet. One of the ICN primary features is ‘in-network caching’; due to its ability to minimize network traffic and respond faster to users’ requests. Therefore, various caching algorithms have been presented that aim to enhance the network performance using different measures, such as cache hit ratio and cache hit distance. Choosing a caching strategy is critical, and an adequate replacement strategy is also required to decide which content should be dropped. Thus, in this paper, we propose a content replacement scheme for ICN, called Randomized LFU that is implemented with respect to content popularity taking the time complexity into account. We use Abilene and Tree network topologies in our simulation models. The proposed replacement achieves encouraging results in terms of the cache hit ratio, inner hit, and hit distance and it outperforms FIFO, LRU, and Random replacement strategies.
为了适应快速变化的Internet需求,最近引入了以信息为中心的网络(ICN),作为未来Internet的一种很有前途的体系结构。ICN的主要功能之一是“网络内缓存”;由于它能够最大限度地减少网络流量并更快地响应用户的请求。因此,各种缓存算法被提出,目的是通过不同的度量来提高网络性能,例如缓存命中率和缓存命中距离。选择缓存策略非常关键,还需要适当的替换策略来决定应该删除哪些内容。因此,在本文中,我们提出了一种ICN的内容替换方案,称为随机LFU,该方案在考虑时间复杂性的情况下,根据内容受欢迎程度实现。我们在仿真模型中使用了Abilene和Tree网络拓扑。所提出的替换在缓存命中率、内部命中和命中距离方面取得了令人鼓舞的结果,并且优于FIFO、LRU和Random替换策略。
{"title":"Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking","authors":"Najla Alzakari, Alanoud Bin Dris, Saad Al-Ahmadi","doi":"10.1109/ICCAIS48893.2020.9096733","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096733","url":null,"abstract":"To accommodate the rapidly changing Internet requirements, Information-Centric Networking (ICN) was recently introduced as a promising architecture for the future Internet. One of the ICN primary features is ‘in-network caching’; due to its ability to minimize network traffic and respond faster to users’ requests. Therefore, various caching algorithms have been presented that aim to enhance the network performance using different measures, such as cache hit ratio and cache hit distance. Choosing a caching strategy is critical, and an adequate replacement strategy is also required to decide which content should be dropped. Thus, in this paper, we propose a content replacement scheme for ICN, called Randomized LFU that is implemented with respect to content popularity taking the time complexity into account. We use Abilene and Tree network topologies in our simulation models. The proposed replacement achieves encouraging results in terms of the cache hit ratio, inner hit, and hit distance and it outperforms FIFO, LRU, and Random replacement strategies.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Autoencoder-based Dimensionality Reduction for QSAR Modeling 基于自编码器的QSAR建模降维
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096747
Shrooq A. Alsenan, Isra M. Al-Turaiki, Alaaeldin M. Hafez
The recent advances in Machine Learning tools and algorithms have influenced fields including drug discovery. Nowadays, research conducted via trial- and-error experiments have been replaced by computational approaches. This growth prompted an undeniable development in synthesizing chemical data to support chemoinformatics research. One of the widely used tools to model chemoinformatics problems is Quantitative Structure-Activity Relationships (QSAR). Previous QSAR models were dealing with small datasets and limited number of features. Current QSAR datasets suffer from the problem of high dimensionality, where the number of features exceeds the number of records. Over the years, the curse of high dimensionality posed a major shortcoming in QSAR classification models. Linear Principle Component Analysis is a popular feature extraction method used to reduce the high dimensioanlity of QSAR datasets. However, QSAR datasets are highly complex and require deep understanding of features representation. Autoencoder is a type of neural networks that is not fully explored in QSAR modeling for dimensionality reduction purposes. In this research, we investigate the impact of autoencoder on a high dimensional QSAR dataset. The autoencoder performance is compared with PCA on the over all accuracy measure. Our preliminary analysis demonstrated that the proposed technique outperforms PCA.
机器学习工具和算法的最新进展影响了包括药物发现在内的领域。如今,通过试错实验进行的研究已经被计算方法所取代。这种增长促进了合成化学数据以支持化学信息学研究的不可否认的发展。其中一个广泛使用的工具来模拟化学信息学问题是定量结构-活性关系(QSAR)。以前的QSAR模型处理的是小数据集和有限数量的特征。当前的QSAR数据集存在高维问题,特征数量超过记录数量。多年来,高维度的诅咒是QSAR分类模型的一个主要缺点。线性主成分分析是一种常用的特征提取方法,用于降低QSAR数据集的高维数。然而,QSAR数据集非常复杂,需要对特征表示有深入的理解。自编码器是一种神经网络类型,在QSAR建模中尚未充分探讨降维目的。在本研究中,我们研究了自编码器对高维QSAR数据集的影响。在总体精度指标上比较了自编码器与PCA的性能。我们的初步分析表明,所提出的技术优于PCA。
{"title":"Autoencoder-based Dimensionality Reduction for QSAR Modeling","authors":"Shrooq A. Alsenan, Isra M. Al-Turaiki, Alaaeldin M. Hafez","doi":"10.1109/ICCAIS48893.2020.9096747","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096747","url":null,"abstract":"The recent advances in Machine Learning tools and algorithms have influenced fields including drug discovery. Nowadays, research conducted via trial- and-error experiments have been replaced by computational approaches. This growth prompted an undeniable development in synthesizing chemical data to support chemoinformatics research. One of the widely used tools to model chemoinformatics problems is Quantitative Structure-Activity Relationships (QSAR). Previous QSAR models were dealing with small datasets and limited number of features. Current QSAR datasets suffer from the problem of high dimensionality, where the number of features exceeds the number of records. Over the years, the curse of high dimensionality posed a major shortcoming in QSAR classification models. Linear Principle Component Analysis is a popular feature extraction method used to reduce the high dimensioanlity of QSAR datasets. However, QSAR datasets are highly complex and require deep understanding of features representation. Autoencoder is a type of neural networks that is not fully explored in QSAR modeling for dimensionality reduction purposes. In this research, we investigate the impact of autoencoder on a high dimensional QSAR dataset. The autoencoder performance is compared with PCA on the over all accuracy measure. Our preliminary analysis demonstrated that the proposed technique outperforms PCA.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129333713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1