首页 > 最新文献

2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
An Improved Agile Framework For Implementing Data Science Initiatives in the Government 在政府推行数据科学措施的改进敏捷框架
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00012
Wafa Qadadeh, Sherief Abdallah
Implementing data mining projects in governmental organizations is emerging in the Middle East. The literature has been showing that there is a significant gap between the problems defined by the research in data mining and the problems in real world projects. The gap is to the level of semantics between the data scientists and the business users. Trying to fill this gap, we have developed an improved Agile data mining framework to fulfill the government business objectives and needs. The previous works had been claiming that handling such project is not yet mature in the region. For this an Agile implementation framework is required. We are also proposing a systematic way for identifying business problems as part of the framework. The process is Agile, so it would start from investigating the data set dimensions to identify business problems. It also allows early Business people cooperation with data scientist. We've applied the proposed framework in one of the Middle East government organizations. The business team and the data scientists have been showing their satisfaction regarding the results of using the proposed framework. The proposed framework have helped both business and data scientist to implement their first initiative in data mining. The proposed framework also helped in efficiently mapping the project with the core business objectives and problems using real world dataset.
在中东,正在政府组织中实施数据挖掘项目。文献已经表明,在数据挖掘研究中定义的问题与现实世界项目中的问题之间存在着巨大的差距。这个差距是数据科学家和业务用户之间的语义水平。为了填补这一空白,我们开发了一个改进的敏捷数据挖掘框架,以满足政府业务目标和需求。之前的作品一直声称,在该地区处理这样的项目还不成熟。为此,需要一个敏捷实现框架。我们还提出了一种系统的方法,用于识别作为框架一部分的业务问题。这个过程是敏捷的,因此它将从调查数据集维度开始,以确定业务问题。它还允许早期的商业人士与数据科学家合作。我们已经在一个中东政府组织中应用了这个框架。业务团队和数据科学家对使用建议框架的结果表示满意。所提出的框架帮助业务和数据科学家实现了他们在数据挖掘方面的第一个倡议。所建议的框架还有助于使用真实世界的数据集有效地将项目与核心业务目标和问题进行映射。
{"title":"An Improved Agile Framework For Implementing Data Science Initiatives in the Government","authors":"Wafa Qadadeh, Sherief Abdallah","doi":"10.1109/ICICT50521.2020.00012","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00012","url":null,"abstract":"Implementing data mining projects in governmental organizations is emerging in the Middle East. The literature has been showing that there is a significant gap between the problems defined by the research in data mining and the problems in real world projects. The gap is to the level of semantics between the data scientists and the business users. Trying to fill this gap, we have developed an improved Agile data mining framework to fulfill the government business objectives and needs. The previous works had been claiming that handling such project is not yet mature in the region. For this an Agile implementation framework is required. We are also proposing a systematic way for identifying business problems as part of the framework. The process is Agile, so it would start from investigating the data set dimensions to identify business problems. It also allows early Business people cooperation with data scientist. We've applied the proposed framework in one of the Middle East government organizations. The business team and the data scientists have been showing their satisfaction regarding the results of using the proposed framework. The proposed framework have helped both business and data scientist to implement their first initiative in data mining. The proposed framework also helped in efficiently mapping the project with the core business objectives and problems using real world dataset.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Explainability of SMOTE Based Oversampling for Imbalanced Dataset Problems 基于SMOTE的非平衡数据集过采样的可解释性
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00015
Aum Patil, Aman Framewala, F. Kazi
Since the advent of Artificial Intelligence (AI), the problem of imbalanced datasets and the lack of interpretability of complex AI models has been a matter of concern for the research community. These datasets contain a very low proportion of one class (minority class) and very large proportion of another class (majority class). Even though the quantitative representation is less for minority class they have high qualitative importance as the cost associated in case of misclassification in these domains is very high. The paper presents a novel solution to deal with the issue of imbalanced dataset by using the proven method of resampling Synthetic Minority Oversampling Technique (SMOTE). Further, the interpretability of such an approach is demonstrated by some powerful eXplainable AI (XAI) techniques such as LRP, SHAP and LIME. In this paper state-of-art models like Deep Learning and Boosting classifiers were trained to classify fraud instances with high accuracy and proved to be reliable by producing explanations for their predicted instances. The results of confusion matrices and explanations showcase excellent performance and reliability of the models.
自人工智能(AI)出现以来,数据集不平衡和复杂AI模型缺乏可解释性的问题一直是研究界关注的问题。这些数据集包含非常低比例的一个类(少数类)和非常大比例的另一个类(多数类)。尽管少数类别的定量表征较少,但由于在这些领域中错误分类的相关成本非常高,因此它们具有很高的定性重要性。本文提出了一种新的方法来处理数据不平衡问题,该方法是利用已被证明的重采样方法合成少数派过采样技术(SMOTE)。此外,这种方法的可解释性通过一些强大的可解释AI (XAI)技术(如LRP、SHAP和LIME)得到了证明。在本文中,像深度学习和增强分类器这样的最先进的模型被训练以高精度地对欺诈实例进行分类,并通过为其预测的实例提供解释来证明其可靠性。混淆矩阵和解释的结果表明模型具有良好的性能和可靠性。
{"title":"Explainability of SMOTE Based Oversampling for Imbalanced Dataset Problems","authors":"Aum Patil, Aman Framewala, F. Kazi","doi":"10.1109/ICICT50521.2020.00015","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00015","url":null,"abstract":"Since the advent of Artificial Intelligence (AI), the problem of imbalanced datasets and the lack of interpretability of complex AI models has been a matter of concern for the research community. These datasets contain a very low proportion of one class (minority class) and very large proportion of another class (majority class). Even though the quantitative representation is less for minority class they have high qualitative importance as the cost associated in case of misclassification in these domains is very high. The paper presents a novel solution to deal with the issue of imbalanced dataset by using the proven method of resampling Synthetic Minority Oversampling Technique (SMOTE). Further, the interpretability of such an approach is demonstrated by some powerful eXplainable AI (XAI) techniques such as LRP, SHAP and LIME. In this paper state-of-art models like Deep Learning and Boosting classifiers were trained to classify fraud instances with high accuracy and proved to be reliable by producing explanations for their predicted instances. The results of confusion matrices and explanations showcase excellent performance and reliability of the models.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Controlling of Low-Cost Prosthetic Hand Using Force Sensor 基于力传感器的低成本假手设计与控制
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00061
S. F. Ahmed, M. H. Tanveer, Isho James Kiwarkis, Herish Badal Basy
Birth defects or several tragic events can result in the loss of a hand that can be physically and emotionally incredibly difficult to bear. In the study, a low-cost, prosthetic hand has been developed and managed, irrespective of geographical and financial conditions. It would be feasible and affordable to many people to create a prosthetic hand with basic materials, available in most areas and powered by servomotors, based on muscle motion detected by the use of Resistive Force Sensor (RFS). Due to its simplicity and low cost, the Arduino controller is used as a main control unit for the operation of this prosthesic. It is shown that throughout the experimental work it has been figured out that a developed low-cost prosthetic hand is working well and affordable. The findings of experiments indicate that the success rate for choosing big and light weight items is about 78%. But because of the simple lightweight materials used in constructing it, it cannot withstand large and small items very well.
出生缺陷或一些悲剧性事件可能导致失去一只手,这在身体和情感上都是难以忍受的。在这项研究中,已经开发和管理了一种低成本的假手,而不考虑地理和财务条件。对于许多人来说,使用基本材料制造假手是可行且负担得起的,在大多数地区都可以使用,并由伺服马达驱动,基于使用电阻力传感器(RFS)检测到的肌肉运动。由于其简单和低成本,Arduino控制器被用作该假肢操作的主要控制单元。结果表明,在整个实验过程中,已经发现开发的低成本假手工作良好且价格合理。实验结果表明,选择大而轻的物品的成功率约为78%。但是由于建造时使用了简单的轻质材料,它不能很好地承受大小物品。
{"title":"Design and Controlling of Low-Cost Prosthetic Hand Using Force Sensor","authors":"S. F. Ahmed, M. H. Tanveer, Isho James Kiwarkis, Herish Badal Basy","doi":"10.1109/ICICT50521.2020.00061","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00061","url":null,"abstract":"Birth defects or several tragic events can result in the loss of a hand that can be physically and emotionally incredibly difficult to bear. In the study, a low-cost, prosthetic hand has been developed and managed, irrespective of geographical and financial conditions. It would be feasible and affordable to many people to create a prosthetic hand with basic materials, available in most areas and powered by servomotors, based on muscle motion detected by the use of Resistive Force Sensor (RFS). Due to its simplicity and low cost, the Arduino controller is used as a main control unit for the operation of this prosthesic. It is shown that throughout the experimental work it has been figured out that a developed low-cost prosthetic hand is working well and affordable. The findings of experiments indicate that the success rate for choosing big and light weight items is about 78%. But because of the simple lightweight materials used in constructing it, it cannot withstand large and small items very well.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129550292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Design of LQR Controller Based on Improved Whale Optimization Algorithm 基于改进鲸鱼优化算法的LQR控制器优化设计
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00067
Qianhao Zhai, Xiaoyu Xia, Siling Feng, Mengxing Huang
Whale optimization algorithm (WOA) is a typical swarm intelligence algorithm. It has been applied to many different optimization problems due to its advantages of simple structure, few parameters and strong optimization ability. However, it has not been used in the optimization of LQR controller. In this paper, we apply the mproved WOA to this problem. It is compared with the traditional optimization algorithm (Particle swarm optimization, genetic algorithm, Grey Wolf optimization algorithm). Experimental results show that the improved WOA performs well in the optimization of LQR controller.
鲸鱼优化算法(WOA)是一种典型的群体智能算法。由于其结构简单、参数少、优化能力强等优点,已被应用于许多不同的优化问题。然而,该方法尚未应用于LQR控制器的优化。在本文中,我们将改进的WOA应用于该问题。并与传统的优化算法(粒子群算法、遗传算法、灰狼优化算法)进行了比较。实验结果表明,改进的WOA算法对LQR控制器的优化效果良好。
{"title":"Optimization Design of LQR Controller Based on Improved Whale Optimization Algorithm","authors":"Qianhao Zhai, Xiaoyu Xia, Siling Feng, Mengxing Huang","doi":"10.1109/ICICT50521.2020.00067","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00067","url":null,"abstract":"Whale optimization algorithm (WOA) is a typical swarm intelligence algorithm. It has been applied to many different optimization problems due to its advantages of simple structure, few parameters and strong optimization ability. However, it has not been used in the optimization of LQR controller. In this paper, we apply the mproved WOA to this problem. It is compared with the traditional optimization algorithm (Particle swarm optimization, genetic algorithm, Grey Wolf optimization algorithm). Experimental results show that the improved WOA performs well in the optimization of LQR controller.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple Anchor Staged Alignment Algorithm – Sensitive (MASAA – S) 多锚分段对齐算法-敏感(MASAA - S)
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00064
Bharath Reddy, Richard Fields
Sequence alignment is common nowadays as it is used in computational biology or Bioinformatics to determine how closely two sequences are similar. There are many computational algorithms developed over the course of time to not only align two sequences. The first algorithms developed were based on a technique called Dynamic Programming which rendered them slow but produce optimal alignment. Today, however heuristic approach algorithms are popular as they are faster and yet produce near optimal alignment. In this paper, we are going to improve on a heuristic algorithm called MASAA (Multiple Anchor Staged Local Sequence Alignment Algorithm) - which we published previously. This new algorithm appropriately called MASAA - S stands for MASAA Sensitive. The algorithm is based on suffix tree data structure to identify anchors first, but to improve sensitivity, we employ adaptive seeds, and shorter perfect match seeds in between the already identified anchors. When the Anchors are separated by a greater distance than a threshold 'd', we exclude such anchors. We tested this algorithm on a randomly generated sequences, and Rosetta dataset where the sequence length ranged up to 500 thousand.
序列比对现在很常见,因为它用于计算生物学或生物信息学,以确定两个序列的相似程度。随着时间的推移,开发了许多计算算法,不仅可以对齐两个序列。最初开发的算法是基于一种称为动态规划的技术,这种技术使它们速度慢,但产生最佳对齐。然而,今天,启发式算法很受欢迎,因为它们更快,但产生接近最优的对齐。在本文中,我们将改进一种启发式算法,称为MASAA(多锚分阶段局部序列对齐算法),该算法我们之前发布过。这个新算法被恰当地称为MASAA - S,代表MASAA敏感。该算法基于后缀树数据结构首先识别锚点,但为了提高灵敏度,我们使用了自适应种子,并在已识别的锚点之间使用了更短的完美匹配种子。当锚点之间的距离大于阈值“d”时,我们将排除此类锚点。我们在随机生成的序列和Rosetta数据集上测试了该算法,其中序列长度范围为50万。
{"title":"Multiple Anchor Staged Alignment Algorithm – Sensitive (MASAA – S)","authors":"Bharath Reddy, Richard Fields","doi":"10.1109/ICICT50521.2020.00064","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00064","url":null,"abstract":"Sequence alignment is common nowadays as it is used in computational biology or Bioinformatics to determine how closely two sequences are similar. There are many computational algorithms developed over the course of time to not only align two sequences. The first algorithms developed were based on a technique called Dynamic Programming which rendered them slow but produce optimal alignment. Today, however heuristic approach algorithms are popular as they are faster and yet produce near optimal alignment. In this paper, we are going to improve on a heuristic algorithm called MASAA (Multiple Anchor Staged Local Sequence Alignment Algorithm) - which we published previously. This new algorithm appropriately called MASAA - S stands for MASAA Sensitive. The algorithm is based on suffix tree data structure to identify anchors first, but to improve sensitivity, we employ adaptive seeds, and shorter perfect match seeds in between the already identified anchors. When the Anchors are separated by a greater distance than a threshold 'd', we exclude such anchors. We tested this algorithm on a randomly generated sequences, and Rosetta dataset where the sequence length ranged up to 500 thousand.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Design of a High Isolation 5G Antenna for Smart Phone 智能手机高隔离5G天线的研究与设计
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00086
Kuo Yang
A multi-band 8×8 MIMO antenna array operating in the Sub-6 GHz band is designed and studied in this paper. Eight T-slot antenna elements with excitable dual-resonant mode are integrated on the ground surface of the substrate, and eight F-shaped feeding belts are set on the surface of the substrate for coupling feeding. The operating bandwidth of the antenna covers LTE42and LTE46 according to the simulated results. It basically meets the acceptable standard of 5G MIMO antenna array in mobile phones (return loss is greater than 6dB, isolation is greater than 10dB). It can be used in large-scale MIMO applications of 5G smart phones.
本文设计并研究了一种工作在sub - 6ghz频段的多频段8×8 MIMO天线阵列。基板接地面上集成了8个可激双谐振模式的t槽天线单元,基板表面设置了8条f形馈电带进行耦合馈电。根据仿真结果,天线的工作带宽覆盖lte42和LTE46。基本满足手机中5G MIMO天线阵列可接受的标准(回波损耗大于6dB,隔离度大于10dB)。可用于5G智能手机的大规模MIMO应用。
{"title":"Research and Design of a High Isolation 5G Antenna for Smart Phone","authors":"Kuo Yang","doi":"10.1109/ICICT50521.2020.00086","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00086","url":null,"abstract":"A multi-band 8×8 MIMO antenna array operating in the Sub-6 GHz band is designed and studied in this paper. Eight T-slot antenna elements with excitable dual-resonant mode are integrated on the ground surface of the substrate, and eight F-shaped feeding belts are set on the surface of the substrate for coupling feeding. The operating bandwidth of the antenna covers LTE42and LTE46 according to the simulated results. It basically meets the acceptable standard of 5G MIMO antenna array in mobile phones (return loss is greater than 6dB, isolation is greater than 10dB). It can be used in large-scale MIMO applications of 5G smart phones.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"38 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120901714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hacking User in Human-Computer Interaction Design (HCI) 人机交互设计(HCI)中的黑客用户
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00042
Duc Son Nguyen, Quynh Mai Le
In order to enhance the efficiency of the Human-Computer Interaction (HCI) process, users' understanding research is the fundamental element for determining the success of the design. Proper user understanding and identifying information about their hobbies, habits, psychology, feelings, etc. will help designers convey the right ideas and create positive experiences to the user through the HCI process. This article uses an interdisciplinary approach, through research in analyzing arts, psychology, cultures. Its main output is to propose a number of "hacking-user" solutions to enhance the user experience, thus results in high efficiency of the HCI design process.
为了提高人机交互(HCI)过程的效率,用户理解研究是决定设计成功与否的基本要素。正确的用户理解和识别他们的爱好、习惯、心理、感受等信息将有助于设计师通过HCI过程向用户传达正确的想法并创造积极的体验。本文采用跨学科的方法,通过研究分析艺术、心理学、文化。它的主要输出是提出了一些“黑客用户”的解决方案,以增强用户体验,从而提高了HCI设计过程的效率。
{"title":"Hacking User in Human-Computer Interaction Design (HCI)","authors":"Duc Son Nguyen, Quynh Mai Le","doi":"10.1109/ICICT50521.2020.00042","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00042","url":null,"abstract":"In order to enhance the efficiency of the Human-Computer Interaction (HCI) process, users' understanding research is the fundamental element for determining the success of the design. Proper user understanding and identifying information about their hobbies, habits, psychology, feelings, etc. will help designers convey the right ideas and create positive experiences to the user through the HCI process. This article uses an interdisciplinary approach, through research in analyzing arts, psychology, cultures. Its main output is to propose a number of \"hacking-user\" solutions to enhance the user experience, thus results in high efficiency of the HCI design process.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combating Jamming Attacks in Multi-channel IoT Networks Using Game Theory 利用博弈论对抗多通道物联网网络中的干扰攻击
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00081
M. Guizani, A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the increase in transmission power or the implementation of complex coordination schemes which are not feasible in limited resources Internet of Things (IoT) devices. Therefore, in this paper, a defending strategy against jamming attacks is designed for health monitoring IoT networks with multiple Orthogonal frequency-division multiplexing (OFDM) slow fading channels. In particular, minimizing the worst case jamming effect on the IoT sensors communications is modeled as a Colonel Blotto game. By analyzing the Nash Equilibrium (NE) of the game, an anti-jamming power allocating strategy is proposed and is shown to be effective in combating jamming attacks without the need for extra power and resources.
干扰攻击是阻止和干扰合法通信的最广泛使用的技术之一。文献中使用了几种技术来对抗这些攻击。然而,其中大多数要么需要增加传输功率,要么需要实施复杂的协调方案,这在资源有限的物联网设备中是不可行的。因此,本文针对具有多个正交频分复用(OFDM)慢衰落信道的健康监测物联网网络设计了一种抗干扰策略。特别是,为了最大限度地减少对物联网传感器通信的最坏干扰效果,模拟了“上校布托”游戏。通过对博弈纳什均衡的分析,提出了一种抗干扰功率分配策略,该策略在不需要额外功率和资源的情况下可以有效地对抗干扰攻击。
{"title":"Combating Jamming Attacks in Multi-channel IoT Networks Using Game Theory","authors":"M. Guizani, A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab","doi":"10.1109/ICICT50521.2020.00081","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00081","url":null,"abstract":"Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the increase in transmission power or the implementation of complex coordination schemes which are not feasible in limited resources Internet of Things (IoT) devices. Therefore, in this paper, a defending strategy against jamming attacks is designed for health monitoring IoT networks with multiple Orthogonal frequency-division multiplexing (OFDM) slow fading channels. In particular, minimizing the worst case jamming effect on the IoT sensors communications is modeled as a Colonel Blotto game. By analyzing the Nash Equilibrium (NE) of the game, an anti-jamming power allocating strategy is proposed and is shown to be effective in combating jamming attacks without the need for extra power and resources.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116046847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Cybersecurity Education for Non-technical Learners 论非技术学习者的网络安全教育
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00072
Matthew McNulty, H. Kettani
In this paper the topic of cybersecurity education for individuals who are not in a technical learning environment will be explored. There are currently several organizations that can certify an education program that is focused on cybersecurity or similar areas. However, for individuals who are not within the cybersecurity field, such as those who are not yet finished with their high school education, those who are within another discipline at the University or College level, or those who are outside of the education system entirely, then there is no such entities or guidelines for programs to inform them about cybersecurity and privacy related issues and topics. This does not mean though, that these individuals have any less of a need for some training in the basics of cybersecurity and privacy protection that will affect everyone's daily life. Since these individuals are not exposed to the curriculums that might enable them to recognize or gain an understanding of the reasons behind practices that are common place for everyone, such as password requirements, then there could be an even greater need for them to be exposed to it in a controlled and consistent manner. The need to understand the security and privacy concerns associated with using various services and devices will continue to increase as more devices become internet and network connected, more jobs increasingly rely on technology, and more of these connected devices are brought into homes.
在本文中,网络安全教育的个人谁不是在一个技术学习环境将探讨的主题。目前有几个组织可以认证专注于网络安全或类似领域的教育项目。然而,对于不属于网络安全领域的个人,例如那些尚未完成高中教育的人,那些在大学或学院级别的另一个学科内的人,或者那些完全不在教育系统之外的人,那么就没有这样的实体或指导方针来告知他们有关网络安全和隐私相关的问题和主题。但这并不意味着,这些人不需要接受一些影响每个人日常生活的网络安全和隐私保护基础知识的培训。由于这些人没有接触到课程,这些课程可能使他们认识到或获得对每个人都常见的实践背后的原因的理解,例如密码要求,因此可能更需要他们以受控和一致的方式接触到它。随着越来越多的设备成为互联网和网络连接,越来越多的工作越来越依赖于技术,越来越多的连接设备被带入家庭,人们需要了解与使用各种服务和设备相关的安全和隐私问题。
{"title":"On Cybersecurity Education for Non-technical Learners","authors":"Matthew McNulty, H. Kettani","doi":"10.1109/ICICT50521.2020.00072","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00072","url":null,"abstract":"In this paper the topic of cybersecurity education for individuals who are not in a technical learning environment will be explored. There are currently several organizations that can certify an education program that is focused on cybersecurity or similar areas. However, for individuals who are not within the cybersecurity field, such as those who are not yet finished with their high school education, those who are within another discipline at the University or College level, or those who are outside of the education system entirely, then there is no such entities or guidelines for programs to inform them about cybersecurity and privacy related issues and topics. This does not mean though, that these individuals have any less of a need for some training in the basics of cybersecurity and privacy protection that will affect everyone's daily life. Since these individuals are not exposed to the curriculums that might enable them to recognize or gain an understanding of the reasons behind practices that are common place for everyone, such as password requirements, then there could be an even greater need for them to be exposed to it in a controlled and consistent manner. The need to understand the security and privacy concerns associated with using various services and devices will continue to increase as more devices become internet and network connected, more jobs increasingly rely on technology, and more of these connected devices are brought into homes.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121715121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Online Shopping using Genetic Algorithm 利用遗传算法优化网上购物
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00048
Sahil Verma, Akash Sinha, Prabhat Kumar, Ajay Maitin
Recent advances in the technology has led to an exponential growth in the e-commerce business. Users today prefer Online Shopping to legacy shopping methods in order to save their effort and time. With the aim of attracting a greater number of customers, the online shopping portals offer products at cheaper rate than offline retailers. The increase in the number of online shopping portals are making it more difficult for the users to purchase a list of products at minimum cost. This can be attributed to the fact that different shopping portals offer different prices for the same product. This problem of obtaining a sequence of products to be procured from different shopping portals with the aim of minimizing the total cost has been termed as the Internet Shopping Optimization Problem. Owing to the NP-hardness of the problem, this paper proposes the application of Genetic Algorithm to solve the Internet Shopping Optimization Problem. Results obtained clearly indicates the efficiency of the proposed work in achieving the optimal solutions in polynomial time.
最近技术的进步导致了电子商务业务的指数级增长。今天的用户更喜欢网上购物,而不是传统的购物方式,以节省他们的精力和时间。为了吸引更多的顾客,在线购物门户网站以比线下零售商更便宜的价格提供产品。随着网上购物门户网站数量的增加,用户很难以最低的成本购买到一系列产品。这可以归因于不同的购物门户网站对同一产品提供不同的价格。从不同的购物门户网站获取一系列产品的问题,其目的是使总成本最小化,这被称为网络购物优化问题。由于问题的np -硬度,本文提出应用遗传算法解决网络购物优化问题。得到的结果清楚地表明,所提出的工作在多项式时间内获得最优解的效率。
{"title":"Optimizing Online Shopping using Genetic Algorithm","authors":"Sahil Verma, Akash Sinha, Prabhat Kumar, Ajay Maitin","doi":"10.1109/ICICT50521.2020.00048","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00048","url":null,"abstract":"Recent advances in the technology has led to an exponential growth in the e-commerce business. Users today prefer Online Shopping to legacy shopping methods in order to save their effort and time. With the aim of attracting a greater number of customers, the online shopping portals offer products at cheaper rate than offline retailers. The increase in the number of online shopping portals are making it more difficult for the users to purchase a list of products at minimum cost. This can be attributed to the fact that different shopping portals offer different prices for the same product. This problem of obtaining a sequence of products to be procured from different shopping portals with the aim of minimizing the total cost has been termed as the Internet Shopping Optimization Problem. Owing to the NP-hardness of the problem, this paper proposes the application of Genetic Algorithm to solve the Internet Shopping Optimization Problem. Results obtained clearly indicates the efficiency of the proposed work in achieving the optimal solutions in polynomial time.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123358986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 3rd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1