首页 > 最新文献

2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

英文 中文
Power consumption of a chaos-based stream cipher algorithm 基于混沌的流密码算法的功耗
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096730
Basil Atawneh, Layla AL-Hammoury, Mohammed AbuTaha
With the huge usage of the Internet of Things (IoT), lots of sensitive data are being transferred between devices. This raises the need for security so that unauthorized parties can’t access the data. IoT devices are known to have limited resources; they have limited battery life, limited memory size and their response time should be minimized. With these speed and memory constraints, classical encryption systems and methods don’t work efficiently with the IoT devices, because they can be too slow, huge or very power consuming. Here comes the need to develop a Lightweight cryptosystem that meets the requirements of the Lightweight device. In this paper, a practical lightweight stream cipher based on stream cipher is proposed, then the power consumption is calculated to show the suitability for limited resources devices. Furthermore, some lightweight measurement tools will be used in order to achieve the research objectives.
随着物联网(IoT)的广泛使用,大量敏感数据正在设备之间传输。这提高了对安全性的需求,使未经授权的各方无法访问数据。众所周知,物联网设备的资源有限;它们的电池寿命有限,内存大小有限,响应时间应该最小化。由于这些速度和内存的限制,传统的加密系统和方法不能有效地与物联网设备一起工作,因为它们可能太慢、太大或非常耗电。因此,需要开发一种满足轻量级设备要求的轻量级密码系统。本文提出了一种实用的基于流密码的轻量级流密码,并对其功耗进行了计算,以证明其在有限资源设备上的适用性。此外,为了实现研究目标,将使用一些轻量级的测量工具。
{"title":"Power consumption of a chaos-based stream cipher algorithm","authors":"Basil Atawneh, Layla AL-Hammoury, Mohammed AbuTaha","doi":"10.1109/ICCAIS48893.2020.9096730","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096730","url":null,"abstract":"With the huge usage of the Internet of Things (IoT), lots of sensitive data are being transferred between devices. This raises the need for security so that unauthorized parties can’t access the data. IoT devices are known to have limited resources; they have limited battery life, limited memory size and their response time should be minimized. With these speed and memory constraints, classical encryption systems and methods don’t work efficiently with the IoT devices, because they can be too slow, huge or very power consuming. Here comes the need to develop a Lightweight cryptosystem that meets the requirements of the Lightweight device. In this paper, a practical lightweight stream cipher based on stream cipher is proposed, then the power consumption is calculated to show the suitability for limited resources devices. Furthermore, some lightweight measurement tools will be used in order to achieve the research objectives.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated Smart Locker for College 大学自动智能储物柜
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096868
Hanan F. Alqahtani, Jeehan A. Albuainain, Badriayh G. Almutiri, Shahad Alansari, Ghaliah B. AL-awwad, Nada Alqahtani, Samia M. Masaad, Rania A. Tabeidi
Recently, the use of Internet of Things (IOT) technology in all aspects of life has increased, and the most important areas that have been affected by this development are locks, security systems, and remote-control technologies. In this study, the proposed Smart Locker based on the Bluetooth technique can be controlled remotely using a mobile phone application to design the interfaces that help to enhance security and convenience. In addition to that, an alternative technique will be provided to open the lock by using a Keypad 4x4 when the mobile phone is not available.
最近,物联网(IOT)技术在生活各个方面的应用越来越多,而受到这一发展影响的最重要领域是锁、安全系统和远程控制技术。本研究提出的基于蓝牙技术的智能储物柜可以通过手机应用程序进行远程控制,从而设计出有助于提高安全性和便利性的接口。除此之外,当手机不在时,还将提供另一种技术,即使用4x4键盘打开锁。
{"title":"Automated Smart Locker for College","authors":"Hanan F. Alqahtani, Jeehan A. Albuainain, Badriayh G. Almutiri, Shahad Alansari, Ghaliah B. AL-awwad, Nada Alqahtani, Samia M. Masaad, Rania A. Tabeidi","doi":"10.1109/ICCAIS48893.2020.9096868","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096868","url":null,"abstract":"Recently, the use of Internet of Things (IOT) technology in all aspects of life has increased, and the most important areas that have been affected by this development are locks, security systems, and remote-control technologies. In this study, the proposed Smart Locker based on the Bluetooth technique can be controlled remotely using a mobile phone application to design the interfaces that help to enhance security and convenience. In addition to that, an alternative technique will be provided to open the lock by using a Keypad 4x4 when the mobile phone is not available.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ICCAIS 2020 ECF Report ICCAIS 2020 ECF报告
Pub Date : 2020-03-01 DOI: 10.1109/iccais48893.2020.9096713
{"title":"ICCAIS 2020 ECF Report","authors":"","doi":"10.1109/iccais48893.2020.9096713","DOIUrl":"https://doi.org/10.1109/iccais48893.2020.9096713","url":null,"abstract":"","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hurricane Tracking Using Multi-GNSS-R and Deep Learning 基于多gnss - r和深度学习的飓风跟踪
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096717
Meshal Alshaye, Faisal Alawwad, I. Elshafiey
Hurricane Monitoring using GNSS-R is an emerging application in earth remote sensing. Practically, the hurricane is categorized by its maximum win speed which can be measured from the reflected GNSS signals. In order to track the hurricane movement efficiently, a large number of measurements is required. Alternatively, by using deep learning algorithms, useful information from much fewer measurements can be inferred. In this paper, a deep learning-based technique is proposed to track the core of a moving hurricane using limited measurements of a reflected GNSS signals. The proposed technique has achieved a very high accuracy of 96.6% using a CNN model.
基于GNSS-R的飓风监测是地球遥感领域的一项新兴应用。实际上,飓风是根据其最大风速来分类的,最大风速可以从反射的GNSS信号中测量出来。为了有效地跟踪飓风的运动,需要进行大量的测量。或者,通过使用深度学习算法,可以从更少的测量中推断出有用的信息。在本文中,提出了一种基于深度学习的技术,利用反射GNSS信号的有限测量来跟踪移动飓风的核心。使用CNN模型,该技术的准确率达到了96.6%。
{"title":"Hurricane Tracking Using Multi-GNSS-R and Deep Learning","authors":"Meshal Alshaye, Faisal Alawwad, I. Elshafiey","doi":"10.1109/ICCAIS48893.2020.9096717","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096717","url":null,"abstract":"Hurricane Monitoring using GNSS-R is an emerging application in earth remote sensing. Practically, the hurricane is categorized by its maximum win speed which can be measured from the reflected GNSS signals. In order to track the hurricane movement efficiently, a large number of measurements is required. Alternatively, by using deep learning algorithms, useful information from much fewer measurements can be inferred. In this paper, a deep learning-based technique is proposed to track the core of a moving hurricane using limited measurements of a reflected GNSS signals. The proposed technique has achieved a very high accuracy of 96.6% using a CNN model.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Survey On Image Filtring Algorithms 图像滤波算法综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096792
Reem Alshammari, Fatimah. H Almuhsin, Fatima. A Albuainain, Salma N. Elsadek, Noura. A Alqhtani, Sarah. A Alkhaldi, Sara K Alghamdi, Wedyan S. Alghamdi
Image processing, especially filtering has become important because there are many factors that affect the quality and purity of the images. For example, the change in pixel density or illumination will negatively affect the images; therefore noise should be removed using filtering. Image filtering is useful for many applications including smoothing, sharping, removing noise and edges enhancement. This paper analyses the various algorithms used for image filtering which improves image quality and clarity. The first section introduces different algorithms that are used in image filtering and how each algorithm processes the image. Then, a discussion and analysis of the literature review has been done to classify and compare between the algorithms studied.
由于影响图像质量和纯度的因素很多,因此图像处理,特别是滤波变得非常重要。例如,像素密度或照度的变化会对图像产生负面影响;因此,应该使用滤波去除噪声。图像滤波在许多应用中都很有用,包括平滑、锐化、去除噪声和增强边缘。本文分析了用于图像滤波的各种算法,以提高图像质量和清晰度。第一部分介绍了用于图像过滤的不同算法,以及每种算法如何处理图像。然后,对文献综述进行讨论和分析,对所研究的算法进行分类和比较。
{"title":"A Survey On Image Filtring Algorithms","authors":"Reem Alshammari, Fatimah. H Almuhsin, Fatima. A Albuainain, Salma N. Elsadek, Noura. A Alqhtani, Sarah. A Alkhaldi, Sara K Alghamdi, Wedyan S. Alghamdi","doi":"10.1109/ICCAIS48893.2020.9096792","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096792","url":null,"abstract":"Image processing, especially filtering has become important because there are many factors that affect the quality and purity of the images. For example, the change in pixel density or illumination will negatively affect the images; therefore noise should be removed using filtering. Image filtering is useful for many applications including smoothing, sharping, removing noise and edges enhancement. This paper analyses the various algorithms used for image filtering which improves image quality and clarity. The first section introduces different algorithms that are used in image filtering and how each algorithm processes the image. Then, a discussion and analysis of the literature review has been done to classify and compare between the algorithms studied.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IAS’2019 Cryptographic Protocol Allowing to Protect the Key in the Open Communication Channel IAS 2019加密协议允许在开放通信通道中保护密钥
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096729
I. Smirnov, O. Safaryan, P. Razumov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, P. A. Chub
The proposed work considers the development of the cryptographic protocol IAS2019, which allows you to protect the public key in an open communication channel. The advantage of this protocol is that it can be integrated with other cryptographic protocols, thereby increasing their security properties, and also has a higher level of security compared to foreign counterparts.
拟议的工作考虑了加密协议IAS2019的开发,该协议允许您在开放的通信通道中保护公钥。该协议的优点是可以与其他加密协议集成,从而增加其安全属性,并且与国外同类协议相比具有更高的安全性。
{"title":"IAS’2019 Cryptographic Protocol Allowing to Protect the Key in the Open Communication Channel","authors":"I. Smirnov, O. Safaryan, P. Razumov, V. Porksheyan, N. Boldyrikhin, D. Korochentsev, L. Cherckesova, P. A. Chub","doi":"10.1109/ICCAIS48893.2020.9096729","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096729","url":null,"abstract":"The proposed work considers the development of the cryptographic protocol IAS2019, which allows you to protect the public key in an open communication channel. The advantage of this protocol is that it can be integrated with other cryptographic protocols, thereby increasing their security properties, and also has a higher level of security compared to foreign counterparts.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effectiveness and Efficiency of Course Outcomes Based Assessment Models 基于课程成果的评估模型的有效性和效率
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096773
Salah Hammami
Outcome Based Assessment (OBA) is one of the recent educational phenomenon that is being increased use especially in high education. This approach applied to improve the learning, increase student mobility and achieve lifelong learning either in traditional learning or in e-learning systems. This study will describe the effectiveness and efficiency of the various outcome based assessment models and will conduct a detailed and comparative analysis of them from different criteria to identify the strengths and limitations of every model. Different factors and criteria will be discussed to evaluate and compare between existing models.
基于结果的评估(OBA)是最近一种教育现象,特别是在高等教育中得到越来越多的使用。这种方法适用于改善学习,增加学生的流动性,实现终身学习,无论是在传统学习还是在电子学习系统。本研究将描述各种基于结果的评估模型的有效性和效率,并将从不同的标准对它们进行详细的比较分析,以确定每种模型的优势和局限性。将讨论不同的因素和标准来评估和比较现有的模型。
{"title":"Effectiveness and Efficiency of Course Outcomes Based Assessment Models","authors":"Salah Hammami","doi":"10.1109/ICCAIS48893.2020.9096773","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096773","url":null,"abstract":"Outcome Based Assessment (OBA) is one of the recent educational phenomenon that is being increased use especially in high education. This approach applied to improve the learning, increase student mobility and achieve lifelong learning either in traditional learning or in e-learning systems. This study will describe the effectiveness and efficiency of the various outcome based assessment models and will conduct a detailed and comparative analysis of them from different criteria to identify the strengths and limitations of every model. Different factors and criteria will be discussed to evaluate and compare between existing models.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TS2FA: Trilateration System Two Factor Authentication TS2FA:三边系统双因素认证
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096825
A. A. AlQahtani, Hosam Alamleh, J. Gourd, Hend Alnuhait
Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor is something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), something a user does (keystroke), or somewhere a user is (location). In the existing 2FA system, a user is required to act in order to implement the second layer of authentication which is not very user-friendly. Smart devices (phones, laptops, tablets, etc.) can receive signals from different radio frequency technologies within range. As these devices move among networks (Wi-Fi access points, cellphone towers, etc.), they receive broadcast messages, some of which can be used to collect information. This information can be utilized in a variety of ways, such as establishing a connection, sharing information, locating devices, and, most appropriately, identifying users in range. The principal benefit of broadcast messages is that the devices can read and process the embedded information without being connected to the broadcaster. Moreover, the broadcast messages can be received only within range of the wireless access point sending the broadcast, thus inherently limiting access to those devices in close physical proximity and facilitating many applications dependent on that proximity. In the proposed research, a new factor is used - something that is in the user’s environment with minimal user involvement. Data from these broadcast messages is utilized to implement a 2FA scheme by determining whether two devices are proximate or not to ensure that they belong to the same user.
双因素身份验证(2FA)系统通过验证至少两个因素来实现。一个因素是用户知道的东西(密码或短语),用户拥有的东西(智能卡或智能手机),用户是什么(指纹或虹膜),用户做了什么(击键),或者用户在什么地方(位置)。在现有的2FA系统中,用户需要采取行动来实现第二层身份验证,这不是很友好。智能设备(手机、笔记本电脑、平板电脑等)可以在一定范围内接收来自不同射频技术的信号。当这些设备在网络(Wi-Fi接入点、手机信号塔等)之间移动时,它们接收广播信息,其中一些可用于收集信息。可以以各种方式利用该信息,例如建立连接、共享信息、定位设备,以及(最适当的)识别范围内的用户。广播消息的主要好处是设备可以在不连接到广播器的情况下读取和处理嵌入的信息。此外,广播消息只能在发送广播的无线接入点的范围内接收,从而固有地限制了对物理上接近的那些设备的访问,并促进依赖于该接近的许多应用。在拟议的研究中,使用了一个新的因素-用户环境中用户参与最小的因素。利用来自这些广播消息的数据来实现2FA方案,方法是确定两个设备是否接近,以确保它们属于同一用户。
{"title":"TS2FA: Trilateration System Two Factor Authentication","authors":"A. A. AlQahtani, Hosam Alamleh, J. Gourd, Hend Alnuhait","doi":"10.1109/ICCAIS48893.2020.9096825","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096825","url":null,"abstract":"Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor is something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), something a user does (keystroke), or somewhere a user is (location). In the existing 2FA system, a user is required to act in order to implement the second layer of authentication which is not very user-friendly. Smart devices (phones, laptops, tablets, etc.) can receive signals from different radio frequency technologies within range. As these devices move among networks (Wi-Fi access points, cellphone towers, etc.), they receive broadcast messages, some of which can be used to collect information. This information can be utilized in a variety of ways, such as establishing a connection, sharing information, locating devices, and, most appropriately, identifying users in range. The principal benefit of broadcast messages is that the devices can read and process the embedded information without being connected to the broadcaster. Moreover, the broadcast messages can be received only within range of the wireless access point sending the broadcast, thus inherently limiting access to those devices in close physical proximity and facilitating many applications dependent on that proximity. In the proposed research, a new factor is used - something that is in the user’s environment with minimal user involvement. Data from these broadcast messages is utilized to implement a 2FA scheme by determining whether two devices are proximate or not to ensure that they belong to the same user.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multiple Sequence Alignment using a Multiobjective Artificial Bee Colony Algorithm 基于多目标人工蜂群算法的多序列比对
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096734
Najwa Altwaijry, Malak Almasoud, Areej Almalki, Isra M. Al-Turaiki
Multiple sequences alignment is an essential task in many bioinformatics analyses. However, it is a challenging problem due to its exponential complexity. Although many approaches have been proposed for solving the MSA problem, finding the best alignment of the MSA remains an open problem. In this work, we propose a new multiobjective optimization approach based on the Artificial Bee Colony (ABC) algorithm to solve the MSA problem. The ABC algorithm is inspired by the intelligent behavior of honey bee swarms. Our proposed approach optimizes two objective functions; the sum-of-pairs (SP) function and entropy. Optimizing these objective functions represents a trade off between maximizing the SP function and minimizing the entropy to choose the most suitable alignment. Experiments are conducted on 12 datasets from BAliBASE 3.0. The experimental results show that our proposed approach achieves better alignments than Clustal in four of the tested datasets. In general, the proposed approach performs better on RV12 datasets.
多序列比对是生物信息学分析中的一项重要任务。然而,由于其指数复杂度,这是一个具有挑战性的问题。尽管已经提出了许多解决MSA问题的方法,但找到MSA的最佳对齐仍然是一个开放的问题。本文提出了一种新的基于人工蜂群(ABC)算法的多目标优化方法来解决MSA问题。ABC算法的灵感来自于蜂群的智能行为。我们提出的方法优化了两个目标函数;对和函数(SP)和熵。优化这些目标函数代表了最大化SP函数和最小化熵之间的权衡,以选择最合适的对齐方式。在BAliBASE 3.0的12个数据集上进行了实验。实验结果表明,我们的方法在四个测试数据集上取得了比Clustal更好的对齐效果。总的来说,该方法在RV12数据集上表现更好。
{"title":"Multiple Sequence Alignment using a Multiobjective Artificial Bee Colony Algorithm","authors":"Najwa Altwaijry, Malak Almasoud, Areej Almalki, Isra M. Al-Turaiki","doi":"10.1109/ICCAIS48893.2020.9096734","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096734","url":null,"abstract":"Multiple sequences alignment is an essential task in many bioinformatics analyses. However, it is a challenging problem due to its exponential complexity. Although many approaches have been proposed for solving the MSA problem, finding the best alignment of the MSA remains an open problem. In this work, we propose a new multiobjective optimization approach based on the Artificial Bee Colony (ABC) algorithm to solve the MSA problem. The ABC algorithm is inspired by the intelligent behavior of honey bee swarms. Our proposed approach optimizes two objective functions; the sum-of-pairs (SP) function and entropy. Optimizing these objective functions represents a trade off between maximizing the SP function and minimizing the entropy to choose the most suitable alignment. Experiments are conducted on 12 datasets from BAliBASE 3.0. The experimental results show that our proposed approach achieves better alignments than Clustal in four of the tested datasets. In general, the proposed approach performs better on RV12 datasets.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Review of Methods for Adaptive Gamified Learning Environments 自适应游戏化学习环境方法综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096871
Yasmeen Alomair, Salah Hammami
Most of E-learning environments have designed over a "one-size-fits-all" approach. Therefore, they are swiftly abandoned by learners in spite of their effectiveness. Providing a more user-centered gamified framework is a critical solution to attract various types of learners and meet their goals, needs, and preferences. It can motivate learners to use learning environments and increase their popularity. In learning environments, the adaptivity concept handles the problem of meeting different types of learners. Gamification aims to increase learners' motivation and engagement inside the adaptive environment by integrating several game features (e.g., badges, leaderboard, level). This paper reviews methods that have applied to incorporate adaptivity and gamification into learning environments. It might serve as a basis for researchers concerning the improvement of learning environments via adaptivity and gamification. Besides, it scales the horizon of opportunities in finding new methods to develop adaptive gamified E-learning environments.
大多数电子学习环境都采用了“一刀切”的设计方法。因此,尽管它们很有效,但很快就被学习者抛弃了。提供一个更加以用户为中心的游戏化框架是吸引不同类型学习者并满足他们的目标、需求和偏好的关键解决方案。它可以激励学习者使用学习环境,增加他们的受欢迎程度。在学习环境中,适应性概念处理了满足不同类型学习者的问题。游戏化旨在通过整合多个游戏功能(如徽章、排行榜、关卡)来提高学习者在适应性环境中的动机和参与度。本文回顾了将适应性和游戏化纳入学习环境的方法。这可以作为研究通过适应性和游戏化来改善学习环境的基础。此外,它扩大了寻找开发自适应游戏化电子学习环境的新方法的机会范围。
{"title":"A Review of Methods for Adaptive Gamified Learning Environments","authors":"Yasmeen Alomair, Salah Hammami","doi":"10.1109/ICCAIS48893.2020.9096871","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096871","url":null,"abstract":"Most of E-learning environments have designed over a \"one-size-fits-all\" approach. Therefore, they are swiftly abandoned by learners in spite of their effectiveness. Providing a more user-centered gamified framework is a critical solution to attract various types of learners and meet their goals, needs, and preferences. It can motivate learners to use learning environments and increase their popularity. In learning environments, the adaptivity concept handles the problem of meeting different types of learners. Gamification aims to increase learners' motivation and engagement inside the adaptive environment by integrating several game features (e.g., badges, leaderboard, level). This paper reviews methods that have applied to incorporate adaptivity and gamification into learning environments. It might serve as a basis for researchers concerning the improvement of learning environments via adaptivity and gamification. Besides, it scales the horizon of opportunities in finding new methods to develop adaptive gamified E-learning environments.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131982785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1