Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00012
Wafa Qadadeh, Sherief Abdallah
Implementing data mining projects in governmental organizations is emerging in the Middle East. The literature has been showing that there is a significant gap between the problems defined by the research in data mining and the problems in real world projects. The gap is to the level of semantics between the data scientists and the business users. Trying to fill this gap, we have developed an improved Agile data mining framework to fulfill the government business objectives and needs. The previous works had been claiming that handling such project is not yet mature in the region. For this an Agile implementation framework is required. We are also proposing a systematic way for identifying business problems as part of the framework. The process is Agile, so it would start from investigating the data set dimensions to identify business problems. It also allows early Business people cooperation with data scientist. We've applied the proposed framework in one of the Middle East government organizations. The business team and the data scientists have been showing their satisfaction regarding the results of using the proposed framework. The proposed framework have helped both business and data scientist to implement their first initiative in data mining. The proposed framework also helped in efficiently mapping the project with the core business objectives and problems using real world dataset.
{"title":"An Improved Agile Framework For Implementing Data Science Initiatives in the Government","authors":"Wafa Qadadeh, Sherief Abdallah","doi":"10.1109/ICICT50521.2020.00012","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00012","url":null,"abstract":"Implementing data mining projects in governmental organizations is emerging in the Middle East. The literature has been showing that there is a significant gap between the problems defined by the research in data mining and the problems in real world projects. The gap is to the level of semantics between the data scientists and the business users. Trying to fill this gap, we have developed an improved Agile data mining framework to fulfill the government business objectives and needs. The previous works had been claiming that handling such project is not yet mature in the region. For this an Agile implementation framework is required. We are also proposing a systematic way for identifying business problems as part of the framework. The process is Agile, so it would start from investigating the data set dimensions to identify business problems. It also allows early Business people cooperation with data scientist. We've applied the proposed framework in one of the Middle East government organizations. The business team and the data scientists have been showing their satisfaction regarding the results of using the proposed framework. The proposed framework have helped both business and data scientist to implement their first initiative in data mining. The proposed framework also helped in efficiently mapping the project with the core business objectives and problems using real world dataset.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00015
Aum Patil, Aman Framewala, F. Kazi
Since the advent of Artificial Intelligence (AI), the problem of imbalanced datasets and the lack of interpretability of complex AI models has been a matter of concern for the research community. These datasets contain a very low proportion of one class (minority class) and very large proportion of another class (majority class). Even though the quantitative representation is less for minority class they have high qualitative importance as the cost associated in case of misclassification in these domains is very high. The paper presents a novel solution to deal with the issue of imbalanced dataset by using the proven method of resampling Synthetic Minority Oversampling Technique (SMOTE). Further, the interpretability of such an approach is demonstrated by some powerful eXplainable AI (XAI) techniques such as LRP, SHAP and LIME. In this paper state-of-art models like Deep Learning and Boosting classifiers were trained to classify fraud instances with high accuracy and proved to be reliable by producing explanations for their predicted instances. The results of confusion matrices and explanations showcase excellent performance and reliability of the models.
{"title":"Explainability of SMOTE Based Oversampling for Imbalanced Dataset Problems","authors":"Aum Patil, Aman Framewala, F. Kazi","doi":"10.1109/ICICT50521.2020.00015","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00015","url":null,"abstract":"Since the advent of Artificial Intelligence (AI), the problem of imbalanced datasets and the lack of interpretability of complex AI models has been a matter of concern for the research community. These datasets contain a very low proportion of one class (minority class) and very large proportion of another class (majority class). Even though the quantitative representation is less for minority class they have high qualitative importance as the cost associated in case of misclassification in these domains is very high. The paper presents a novel solution to deal with the issue of imbalanced dataset by using the proven method of resampling Synthetic Minority Oversampling Technique (SMOTE). Further, the interpretability of such an approach is demonstrated by some powerful eXplainable AI (XAI) techniques such as LRP, SHAP and LIME. In this paper state-of-art models like Deep Learning and Boosting classifiers were trained to classify fraud instances with high accuracy and proved to be reliable by producing explanations for their predicted instances. The results of confusion matrices and explanations showcase excellent performance and reliability of the models.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00061
S. F. Ahmed, M. H. Tanveer, Isho James Kiwarkis, Herish Badal Basy
Birth defects or several tragic events can result in the loss of a hand that can be physically and emotionally incredibly difficult to bear. In the study, a low-cost, prosthetic hand has been developed and managed, irrespective of geographical and financial conditions. It would be feasible and affordable to many people to create a prosthetic hand with basic materials, available in most areas and powered by servomotors, based on muscle motion detected by the use of Resistive Force Sensor (RFS). Due to its simplicity and low cost, the Arduino controller is used as a main control unit for the operation of this prosthesic. It is shown that throughout the experimental work it has been figured out that a developed low-cost prosthetic hand is working well and affordable. The findings of experiments indicate that the success rate for choosing big and light weight items is about 78%. But because of the simple lightweight materials used in constructing it, it cannot withstand large and small items very well.
{"title":"Design and Controlling of Low-Cost Prosthetic Hand Using Force Sensor","authors":"S. F. Ahmed, M. H. Tanveer, Isho James Kiwarkis, Herish Badal Basy","doi":"10.1109/ICICT50521.2020.00061","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00061","url":null,"abstract":"Birth defects or several tragic events can result in the loss of a hand that can be physically and emotionally incredibly difficult to bear. In the study, a low-cost, prosthetic hand has been developed and managed, irrespective of geographical and financial conditions. It would be feasible and affordable to many people to create a prosthetic hand with basic materials, available in most areas and powered by servomotors, based on muscle motion detected by the use of Resistive Force Sensor (RFS). Due to its simplicity and low cost, the Arduino controller is used as a main control unit for the operation of this prosthesic. It is shown that throughout the experimental work it has been figured out that a developed low-cost prosthetic hand is working well and affordable. The findings of experiments indicate that the success rate for choosing big and light weight items is about 78%. But because of the simple lightweight materials used in constructing it, it cannot withstand large and small items very well.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129550292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Whale optimization algorithm (WOA) is a typical swarm intelligence algorithm. It has been applied to many different optimization problems due to its advantages of simple structure, few parameters and strong optimization ability. However, it has not been used in the optimization of LQR controller. In this paper, we apply the mproved WOA to this problem. It is compared with the traditional optimization algorithm (Particle swarm optimization, genetic algorithm, Grey Wolf optimization algorithm). Experimental results show that the improved WOA performs well in the optimization of LQR controller.
{"title":"Optimization Design of LQR Controller Based on Improved Whale Optimization Algorithm","authors":"Qianhao Zhai, Xiaoyu Xia, Siling Feng, Mengxing Huang","doi":"10.1109/ICICT50521.2020.00067","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00067","url":null,"abstract":"Whale optimization algorithm (WOA) is a typical swarm intelligence algorithm. It has been applied to many different optimization problems due to its advantages of simple structure, few parameters and strong optimization ability. However, it has not been used in the optimization of LQR controller. In this paper, we apply the mproved WOA to this problem. It is compared with the traditional optimization algorithm (Particle swarm optimization, genetic algorithm, Grey Wolf optimization algorithm). Experimental results show that the improved WOA performs well in the optimization of LQR controller.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00064
Bharath Reddy, Richard Fields
Sequence alignment is common nowadays as it is used in computational biology or Bioinformatics to determine how closely two sequences are similar. There are many computational algorithms developed over the course of time to not only align two sequences. The first algorithms developed were based on a technique called Dynamic Programming which rendered them slow but produce optimal alignment. Today, however heuristic approach algorithms are popular as they are faster and yet produce near optimal alignment. In this paper, we are going to improve on a heuristic algorithm called MASAA (Multiple Anchor Staged Local Sequence Alignment Algorithm) - which we published previously. This new algorithm appropriately called MASAA - S stands for MASAA Sensitive. The algorithm is based on suffix tree data structure to identify anchors first, but to improve sensitivity, we employ adaptive seeds, and shorter perfect match seeds in between the already identified anchors. When the Anchors are separated by a greater distance than a threshold 'd', we exclude such anchors. We tested this algorithm on a randomly generated sequences, and Rosetta dataset where the sequence length ranged up to 500 thousand.
{"title":"Multiple Anchor Staged Alignment Algorithm – Sensitive (MASAA – S)","authors":"Bharath Reddy, Richard Fields","doi":"10.1109/ICICT50521.2020.00064","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00064","url":null,"abstract":"Sequence alignment is common nowadays as it is used in computational biology or Bioinformatics to determine how closely two sequences are similar. There are many computational algorithms developed over the course of time to not only align two sequences. The first algorithms developed were based on a technique called Dynamic Programming which rendered them slow but produce optimal alignment. Today, however heuristic approach algorithms are popular as they are faster and yet produce near optimal alignment. In this paper, we are going to improve on a heuristic algorithm called MASAA (Multiple Anchor Staged Local Sequence Alignment Algorithm) - which we published previously. This new algorithm appropriately called MASAA - S stands for MASAA Sensitive. The algorithm is based on suffix tree data structure to identify anchors first, but to improve sensitivity, we employ adaptive seeds, and shorter perfect match seeds in between the already identified anchors. When the Anchors are separated by a greater distance than a threshold 'd', we exclude such anchors. We tested this algorithm on a randomly generated sequences, and Rosetta dataset where the sequence length ranged up to 500 thousand.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00086
Kuo Yang
A multi-band 8×8 MIMO antenna array operating in the Sub-6 GHz band is designed and studied in this paper. Eight T-slot antenna elements with excitable dual-resonant mode are integrated on the ground surface of the substrate, and eight F-shaped feeding belts are set on the surface of the substrate for coupling feeding. The operating bandwidth of the antenna covers LTE42and LTE46 according to the simulated results. It basically meets the acceptable standard of 5G MIMO antenna array in mobile phones (return loss is greater than 6dB, isolation is greater than 10dB). It can be used in large-scale MIMO applications of 5G smart phones.
{"title":"Research and Design of a High Isolation 5G Antenna for Smart Phone","authors":"Kuo Yang","doi":"10.1109/ICICT50521.2020.00086","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00086","url":null,"abstract":"A multi-band 8×8 MIMO antenna array operating in the Sub-6 GHz band is designed and studied in this paper. Eight T-slot antenna elements with excitable dual-resonant mode are integrated on the ground surface of the substrate, and eight F-shaped feeding belts are set on the surface of the substrate for coupling feeding. The operating bandwidth of the antenna covers LTE42and LTE46 according to the simulated results. It basically meets the acceptable standard of 5G MIMO antenna array in mobile phones (return loss is greater than 6dB, isolation is greater than 10dB). It can be used in large-scale MIMO applications of 5G smart phones.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"38 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120901714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00042
Duc Son Nguyen, Quynh Mai Le
In order to enhance the efficiency of the Human-Computer Interaction (HCI) process, users' understanding research is the fundamental element for determining the success of the design. Proper user understanding and identifying information about their hobbies, habits, psychology, feelings, etc. will help designers convey the right ideas and create positive experiences to the user through the HCI process. This article uses an interdisciplinary approach, through research in analyzing arts, psychology, cultures. Its main output is to propose a number of "hacking-user" solutions to enhance the user experience, thus results in high efficiency of the HCI design process.
{"title":"Hacking User in Human-Computer Interaction Design (HCI)","authors":"Duc Son Nguyen, Quynh Mai Le","doi":"10.1109/ICICT50521.2020.00042","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00042","url":null,"abstract":"In order to enhance the efficiency of the Human-Computer Interaction (HCI) process, users' understanding research is the fundamental element for determining the success of the design. Proper user understanding and identifying information about their hobbies, habits, psychology, feelings, etc. will help designers convey the right ideas and create positive experiences to the user through the HCI process. This article uses an interdisciplinary approach, through research in analyzing arts, psychology, cultures. Its main output is to propose a number of \"hacking-user\" solutions to enhance the user experience, thus results in high efficiency of the HCI design process.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00081
M. Guizani, A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the increase in transmission power or the implementation of complex coordination schemes which are not feasible in limited resources Internet of Things (IoT) devices. Therefore, in this paper, a defending strategy against jamming attacks is designed for health monitoring IoT networks with multiple Orthogonal frequency-division multiplexing (OFDM) slow fading channels. In particular, minimizing the worst case jamming effect on the IoT sensors communications is modeled as a Colonel Blotto game. By analyzing the Nash Equilibrium (NE) of the game, an anti-jamming power allocating strategy is proposed and is shown to be effective in combating jamming attacks without the need for extra power and resources.
{"title":"Combating Jamming Attacks in Multi-channel IoT Networks Using Game Theory","authors":"M. Guizani, A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab","doi":"10.1109/ICICT50521.2020.00081","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00081","url":null,"abstract":"Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the increase in transmission power or the implementation of complex coordination schemes which are not feasible in limited resources Internet of Things (IoT) devices. Therefore, in this paper, a defending strategy against jamming attacks is designed for health monitoring IoT networks with multiple Orthogonal frequency-division multiplexing (OFDM) slow fading channels. In particular, minimizing the worst case jamming effect on the IoT sensors communications is modeled as a Colonel Blotto game. By analyzing the Nash Equilibrium (NE) of the game, an anti-jamming power allocating strategy is proposed and is shown to be effective in combating jamming attacks without the need for extra power and resources.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116046847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00072
Matthew McNulty, H. Kettani
In this paper the topic of cybersecurity education for individuals who are not in a technical learning environment will be explored. There are currently several organizations that can certify an education program that is focused on cybersecurity or similar areas. However, for individuals who are not within the cybersecurity field, such as those who are not yet finished with their high school education, those who are within another discipline at the University or College level, or those who are outside of the education system entirely, then there is no such entities or guidelines for programs to inform them about cybersecurity and privacy related issues and topics. This does not mean though, that these individuals have any less of a need for some training in the basics of cybersecurity and privacy protection that will affect everyone's daily life. Since these individuals are not exposed to the curriculums that might enable them to recognize or gain an understanding of the reasons behind practices that are common place for everyone, such as password requirements, then there could be an even greater need for them to be exposed to it in a controlled and consistent manner. The need to understand the security and privacy concerns associated with using various services and devices will continue to increase as more devices become internet and network connected, more jobs increasingly rely on technology, and more of these connected devices are brought into homes.
{"title":"On Cybersecurity Education for Non-technical Learners","authors":"Matthew McNulty, H. Kettani","doi":"10.1109/ICICT50521.2020.00072","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00072","url":null,"abstract":"In this paper the topic of cybersecurity education for individuals who are not in a technical learning environment will be explored. There are currently several organizations that can certify an education program that is focused on cybersecurity or similar areas. However, for individuals who are not within the cybersecurity field, such as those who are not yet finished with their high school education, those who are within another discipline at the University or College level, or those who are outside of the education system entirely, then there is no such entities or guidelines for programs to inform them about cybersecurity and privacy related issues and topics. This does not mean though, that these individuals have any less of a need for some training in the basics of cybersecurity and privacy protection that will affect everyone's daily life. Since these individuals are not exposed to the curriculums that might enable them to recognize or gain an understanding of the reasons behind practices that are common place for everyone, such as password requirements, then there could be an even greater need for them to be exposed to it in a controlled and consistent manner. The need to understand the security and privacy concerns associated with using various services and devices will continue to increase as more devices become internet and network connected, more jobs increasingly rely on technology, and more of these connected devices are brought into homes.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121715121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent advances in the technology has led to an exponential growth in the e-commerce business. Users today prefer Online Shopping to legacy shopping methods in order to save their effort and time. With the aim of attracting a greater number of customers, the online shopping portals offer products at cheaper rate than offline retailers. The increase in the number of online shopping portals are making it more difficult for the users to purchase a list of products at minimum cost. This can be attributed to the fact that different shopping portals offer different prices for the same product. This problem of obtaining a sequence of products to be procured from different shopping portals with the aim of minimizing the total cost has been termed as the Internet Shopping Optimization Problem. Owing to the NP-hardness of the problem, this paper proposes the application of Genetic Algorithm to solve the Internet Shopping Optimization Problem. Results obtained clearly indicates the efficiency of the proposed work in achieving the optimal solutions in polynomial time.
{"title":"Optimizing Online Shopping using Genetic Algorithm","authors":"Sahil Verma, Akash Sinha, Prabhat Kumar, Ajay Maitin","doi":"10.1109/ICICT50521.2020.00048","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00048","url":null,"abstract":"Recent advances in the technology has led to an exponential growth in the e-commerce business. Users today prefer Online Shopping to legacy shopping methods in order to save their effort and time. With the aim of attracting a greater number of customers, the online shopping portals offer products at cheaper rate than offline retailers. The increase in the number of online shopping portals are making it more difficult for the users to purchase a list of products at minimum cost. This can be attributed to the fact that different shopping portals offer different prices for the same product. This problem of obtaining a sequence of products to be procured from different shopping portals with the aim of minimizing the total cost has been termed as the Internet Shopping Optimization Problem. Owing to the NP-hardness of the problem, this paper proposes the application of Genetic Algorithm to solve the Internet Shopping Optimization Problem. Results obtained clearly indicates the efficiency of the proposed work in achieving the optimal solutions in polynomial time.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123358986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}