首页 > 最新文献

2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

英文 中文
Text document annotation methods: Stat of art 文本文档注释方法:Stat of art
I. Ismail, Walaa K. Gad, M. Hamdy, Khaled Bahnsy
A huge number of documents are available that may cause information overload problems. Text document annotation provides a solution to such type of problems. Text annotation is the process of attaching comments, notes, or explanations to text documents. From a technical point of view, annotations are usually seen as metadata, as they give additional information about an existing piece of data. Annotations facilitate the task of finding the document topic and assist the reader to quickly overview and understand document. In this paper, we study different methods of text document annotation and comparisons among different methods are shown indicating advantages and disadvantages of each method used in annotation.
大量的可用文档可能会导致信息过载问题。文本文档注释为这类问题提供了解决方案。文本注释是向文本文档附加注释、注释或解释的过程。从技术角度来看,注释通常被视为元数据,因为它们提供了关于现有数据块的附加信息。注释有助于查找文档主题,并帮助读者快速概述和理解文档。本文研究了文本文档标注的不同方法,并对不同方法进行了比较,指出了每种标注方法的优缺点。
{"title":"Text document annotation methods: Stat of art","authors":"I. Ismail, Walaa K. Gad, M. Hamdy, Khaled Bahnsy","doi":"10.1109/INTELCIS.2015.7397289","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397289","url":null,"abstract":"A huge number of documents are available that may cause information overload problems. Text document annotation provides a solution to such type of problems. Text annotation is the process of attaching comments, notes, or explanations to text documents. From a technical point of view, annotations are usually seen as metadata, as they give additional information about an existing piece of data. Annotations facilitate the task of finding the document topic and assist the reader to quickly overview and understand document. In this paper, we study different methods of text document annotation and comparisons among different methods are shown indicating advantages and disadvantages of each method used in annotation.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"12 1","pages":"634-640"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91027048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prospective, knowledge based clinical risk analysis: The OPT-model 前瞻性的、基于知识的临床风险分析:opt模型
T. Schrader, K. Loewe, Lutz Pelchen, Eberhard Beck
5%-10% of all medical procedures are erroneous. It is estimated that about 10.000 persons in Germany die due to errors in medical interventions. The clinical risk management analyses the reasons for errors and avoidable events, in most cases retrospectively. Approaches such as Hazards & Operability Study (HAZOP) are applied routinely in technical environments. In a quite small number of rather medical specific procedures especially in laboratories the risk management demands HAZOP. In the clinical domain this approach is not used due to the difficulties to describe medical processes and task with all different kinds of properties.
5%-10%的医疗程序是错误的。据估计,德国约有1万人因医疗干预中的错误而死亡。临床风险管理分析错误和可避免事件的原因,在大多数情况下是回顾性的。危险与可操作性研究(HAZOP)等方法通常应用于技术环境。在相当少数的医疗特定程序中,特别是在实验室中,风险管理要求HAZOP。在临床领域,由于难以描述具有各种不同性质的医疗过程和任务,因此不使用这种方法。
{"title":"Prospective, knowledge based clinical risk analysis: The OPT-model","authors":"T. Schrader, K. Loewe, Lutz Pelchen, Eberhard Beck","doi":"10.1109/INTELCIS.2015.7397204","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397204","url":null,"abstract":"5%-10% of all medical procedures are erroneous. It is estimated that about 10.000 persons in Germany die due to errors in medical interventions. The clinical risk management analyses the reasons for errors and avoidable events, in most cases retrospectively. Approaches such as Hazards & Operability Study (HAZOP) are applied routinely in technical environments. In a quite small number of rather medical specific procedures especially in laboratories the risk management demands HAZOP. In the clinical domain this approach is not used due to the difficulties to describe medical processes and task with all different kinds of properties.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"89 3","pages":"94-99"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72617552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Large-scale ontology storage and query using graph database-oriented approach: The case of Freebase 面向图数据库的大规模本体存储与查询:以Freebase为例
Mahmoud Elbattah, Mohamed Roushdy, M. Aref, Abdel-badeeh M. Salem
Ontology has been increasingly recognised as an instrumental artifact to help make sense of large amounts of data. However, the challenges of Big Data significantly overburden the process of ontology storage and query particularly. In this respect, the paper aims to convey considerations in relation to improving the practice of storing or querying large-scale ontologies. Initially, a systematic literature review is conducted with the aim of thoroughly inspecting the state-of-the-art in literature. Subsequently, a graph database-oriented approach is proposed, considering ontology as a large graph. The approach endeavours to address the limitations encountered within traditional relational models. Furthermore, scalability and query efficiency of the approach are verified based on empirical experiments using a subset of Freebase data. The Freebase subset is utilised to build a large-scale ontology graph composed of more than 500K nodes, and 2M edges.
本体越来越被认为是帮助理解大量数据的工具。然而,大数据带来的挑战给本体的存储和查询过程带来了极大的负担。在这方面,本文旨在传达与改进存储或查询大规模本体的实践有关的考虑。首先,进行系统的文献综述,目的是彻底检查文献的最新进展。随后,提出了一种面向图数据库的方法,将本体视为一个大的图。该方法努力解决传统关系模型中遇到的限制。通过Freebase数据子集的实验验证了该方法的可扩展性和查询效率。利用Freebase子集构建了一个由超过500K个节点和2M条边组成的大规模本体图。
{"title":"Large-scale ontology storage and query using graph database-oriented approach: The case of Freebase","authors":"Mahmoud Elbattah, Mohamed Roushdy, M. Aref, Abdel-badeeh M. Salem","doi":"10.1109/INTELCIS.2015.7397191","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397191","url":null,"abstract":"Ontology has been increasingly recognised as an instrumental artifact to help make sense of large amounts of data. However, the challenges of Big Data significantly overburden the process of ontology storage and query particularly. In this respect, the paper aims to convey considerations in relation to improving the practice of storing or querying large-scale ontologies. Initially, a systematic literature review is conducted with the aim of thoroughly inspecting the state-of-the-art in literature. Subsequently, a graph database-oriented approach is proposed, considering ontology as a large graph. The approach endeavours to address the limitations encountered within traditional relational models. Furthermore, scalability and query efficiency of the approach are verified based on empirical experiments using a subset of Freebase data. The Freebase subset is utilised to build a large-scale ontology graph composed of more than 500K nodes, and 2M edges.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"21 1","pages":"39-43"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75588828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Strategy to establish an e-library for university theses in the central library of the University of Mustansiriya (experimental study) 穆斯坦西里亚大学中央图书馆建立大学论文电子图书馆的策略(实验研究)
Zainab Abdel Wahed El-Waily
The enormous acceleration in using information technology beside the Changing and complexity of the Beneficiaries tasks although that the researchers have no much time, for one side, From another side The emergence of the Internet network the strong contender for digital libraries, all of that led to the need to make our libraries keep pace with the current reality through opening the digital libraries as a part of its traditional libraries or independently from it. But unfortunately most of the digital libraries establishment experiments have failed in doing its job for many reasons, from the most important reasons is that there is no the needed strategy for establish the digital library, and from that the researchers start focus on how important is the establishment strategy and it is needed to go throw each stage in the Strategy in order to have a successful experiment achieving the tasks which it has been built for.
信息技术的飞速发展,受益人任务的变化和复杂性,虽然研究人员没有太多的时间,但从一方面来说,从另一方面来说,互联网网络的出现是数字图书馆的有力竞争者,这一切都导致了我们需要通过将数字图书馆作为传统图书馆的一部分或独立于传统图书馆开放,使我们的图书馆跟上当前的现实。但不幸的是,大多数数字图书馆建设实验都失败了,原因有很多,最重要的原因是没有建立数字图书馆所需的战略,从这一点开始,研究者们开始关注建立战略的重要性,以及需要把战略的每个阶段都扔掉,才能有一个成功的实验来实现它所建立的任务。
{"title":"Strategy to establish an e-library for university theses in the central library of the University of Mustansiriya (experimental study)","authors":"Zainab Abdel Wahed El-Waily","doi":"10.1109/INTELCIS.2015.7397217","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397217","url":null,"abstract":"The enormous acceleration in using information technology beside the Changing and complexity of the Beneficiaries tasks although that the researchers have no much time, for one side, From another side The emergence of the Internet network the strong contender for digital libraries, all of that led to the need to make our libraries keep pace with the current reality through opening the digital libraries as a part of its traditional libraries or independently from it. But unfortunately most of the digital libraries establishment experiments have failed in doing its job for many reasons, from the most important reasons is that there is no the needed strategy for establish the digital library, and from that the researchers start focus on how important is the establishment strategy and it is needed to go throw each stage in the Strategy in order to have a successful experiment achieving the tasks which it has been built for.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"38 1","pages":"172-178"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78141073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dimensions-based classifier for strategy classification of opponent models in real-time strategy games 基于维数的实时策略博弈对手模型策略分类器
M. Aly, M. Aref, M.I. Hassan
Real-time strategy games are strategic war games where two or more players operate on a virtual battlefield, controlling resources, buildings, units and technologies to achieve victory by destroying others. Achieving victory depends on selecting a suitable plan (set of actions), selecting a suitable plan depends on building an imagination (building a model) of the opponent to know how to deal with. This imagination is the opponent model, the stronger the opponent modelling process is, the more accurate the selected suitable plan is and consequently the higher probability achieving the victory is. One of the environment's challenges in real-time strategy games is that classifying the opponent model is game specific. This paper introduces a new methodology through which we can classify the observed opponent model in a way that is not game specific. Our methodology includes two paths, only one of them is executed per real-time strategy game type (per opponent models trained), which means that different type of real-time strategy games will execute different paths of the two paths of our methodology.
即时战略游戏是指两名或多名玩家在虚拟战场上操作,控制资源、建筑、单位和技术,通过摧毁他人来取得胜利的战略战争游戏。取得胜利取决于选择一个合适的计划(一套行动),选择一个合适的计划取决于对对手建立一个想象(建立一个模型)来知道如何应对。这种想象就是对手模型,对手建模过程越强,选择合适的方案就越准确,从而获得胜利的可能性就越高。即时策略游戏的环境挑战之一是,对手模型的分类是特定于游戏的。本文介绍了一种新的方法,通过这种方法,我们可以以一种非特定于游戏的方式对观察到的对手模型进行分类。我们的方法包含两条路径,每一种实时战略游戏类型(每一种训练过的对手模型)只执行一条路径,这意味着不同类型的实时战略游戏将执行我们方法的两条路径中的不同路径。
{"title":"Dimensions-based classifier for strategy classification of opponent models in real-time strategy games","authors":"M. Aly, M. Aref, M.I. Hassan","doi":"10.1109/INTELCIS.2015.7397258","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397258","url":null,"abstract":"Real-time strategy games are strategic war games where two or more players operate on a virtual battlefield, controlling resources, buildings, units and technologies to achieve victory by destroying others. Achieving victory depends on selecting a suitable plan (set of actions), selecting a suitable plan depends on building an imagination (building a model) of the opponent to know how to deal with. This imagination is the opponent model, the stronger the opponent modelling process is, the more accurate the selected suitable plan is and consequently the higher probability achieving the victory is. One of the environment's challenges in real-time strategy games is that classifying the opponent model is game specific. This paper introduces a new methodology through which we can classify the observed opponent model in a way that is not game specific. Our methodology includes two paths, only one of them is executed per real-time strategy game type (per opponent models trained), which means that different type of real-time strategy games will execute different paths of the two paths of our methodology.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"442-446"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89971134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of feature selection on human activity recognition 特征选择在人体活动识别中的评价
Hussein Mazaar, E. Emary, H. Onsi
The paper presents an approach for feature selection in human activity recognition. Features are extracted based on spatiotemporal orientation energy and activity template, while feature reduction has been studied thoroughly using various techniques. Due to high dimensional data from extraction phase, a model with less features which are important and significant can build attractive, interpretative and accurate model. Finally, activity classification is done using SVM. With experiments to classify six activities of the KTH Dataset, significant feature reductions were reported with optimal embedded selection recorded for Gradient Boosting and R-Square techniques. The results show a reduction in time and improvement in accuracy. The Comparison to related work were given.
提出了一种人体活动识别中的特征选择方法。特征提取主要基于时空方向能和活动模板,而特征约简则采用多种技术进行了深入研究。由于提取阶段的数据是高维的,用较少的重要和有意义的特征来构建具有吸引力、可解释性和准确性的模型。最后,利用支持向量机对活动进行分类。通过对KTH数据集的六个活动进行分类的实验,报告了显著的特征减少,并记录了梯度增强和r平方技术的最佳嵌入选择。结果表明,该方法缩短了时间,提高了精度。并与相关工作进行了比较。
{"title":"Evaluation of feature selection on human activity recognition","authors":"Hussein Mazaar, E. Emary, H. Onsi","doi":"10.1109/INTELCIS.2015.7397283","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397283","url":null,"abstract":"The paper presents an approach for feature selection in human activity recognition. Features are extracted based on spatiotemporal orientation energy and activity template, while feature reduction has been studied thoroughly using various techniques. Due to high dimensional data from extraction phase, a model with less features which are important and significant can build attractive, interpretative and accurate model. Finally, activity classification is done using SVM. With experiments to classify six activities of the KTH Dataset, significant feature reductions were reported with optimal embedded selection recorded for Gradient Boosting and R-Square techniques. The results show a reduction in time and improvement in accuracy. The Comparison to related work were given.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"213 1","pages":"591-599"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89086057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Deep analysis of knowledge in one's writings 对著作中知识的深刻分析
E. Elsayed, Eman M. Elgamal, K. Eldahshan
Reading the opinion behind the text is a big challenge. In another way, we need to automatically read opinions and moods as a natural language. Ontology -based plays a main role to solve the problems in this field. That is from the features of the ontology based as covering the semantics of the concepts. So, in this paper, we propose a flexible classification opinion mining tool. This proposed method based on ontology- based. The proposed method uses NLTK (Natural Language Processing Toolkit) with Python as a useful knowledge to get more representative word occurrences in the corpus. Also, we not only use a WordNet and SentiWordNet ontologies to assign the word as POS (part of speech), but we also create a specific purpose ontology by OWL editor as Protégé. Then we create a more general opinion mining tool where the specific purpose ontology file was selected to use for classification the text. We apply our proposed method on lists of long texts for different writers, and then we can classify these writers depending on their writings.
阅读文章背后的观点是一个很大的挑战。换句话说,我们需要自动地将观点和情绪视为一种自然语言。基于本体的方法在解决这一领域的问题中起着重要的作用。即从本体的特征出发,作为覆盖语义的概念。因此,本文提出了一种灵活的分类意见挖掘工具。提出了一种基于本体的方法。该方法使用NLTK(自然语言处理工具包)和Python作为有用的知识,以在语料库中获得更多有代表性的单词出现。同样,我们不仅使用WordNet和SentiWordNet本体来将单词指定为词性(词性),而且我们还通过OWL编辑器创建了一个特定用途的本体,作为prot。然后,我们创建了一个更通用的意见挖掘工具,其中选择了特定目的本体文件用于文本分类。我们将我们提出的方法应用于不同作家的长文本列表,然后我们可以根据这些作家的作品对他们进行分类。
{"title":"Deep analysis of knowledge in one's writings","authors":"E. Elsayed, Eman M. Elgamal, K. Eldahshan","doi":"10.1109/INTELCIS.2015.7397239","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397239","url":null,"abstract":"Reading the opinion behind the text is a big challenge. In another way, we need to automatically read opinions and moods as a natural language. Ontology -based plays a main role to solve the problems in this field. That is from the features of the ontology based as covering the semantics of the concepts. So, in this paper, we propose a flexible classification opinion mining tool. This proposed method based on ontology- based. The proposed method uses NLTK (Natural Language Processing Toolkit) with Python as a useful knowledge to get more representative word occurrences in the corpus. Also, we not only use a WordNet and SentiWordNet ontologies to assign the word as POS (part of speech), but we also create a specific purpose ontology by OWL editor as Protégé. Then we create a more general opinion mining tool where the specific purpose ontology file was selected to use for classification the text. We apply our proposed method on lists of long texts for different writers, and then we can classify these writers depending on their writings.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"174 1","pages":"306-312"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88442436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards of intelligence education and learning 走向智能教育与学习
A. M. Salem
Researchers have been used the artificial intelligence (AI) area of research in education to develop a new generation of intelligent tutoring and learning systems. AI concepts, theories and approaches receive increasing attention within the educational technology community. This paper discusses the AI approaches, methodologies and techniques for developing the intelligent e-Learning and tutoring systems. In addition, the paper presents some examples of the developed systems by the author and his colleagues at Artificial intelligence and Knowledge Engineering Research Labs, Ain Shams University, Cairo, Egypt.
研究人员已经将人工智能(AI)领域的研究应用于教育领域,以开发新一代智能辅导和学习系统。人工智能的概念、理论和方法在教育技术界受到越来越多的关注。本文讨论了开发智能电子学习和辅导系统的人工智能方法、方法和技术。此外,本文还介绍了作者和他的同事在埃及开罗艾因沙姆斯大学人工智能和知识工程研究实验室开发的系统的一些例子。
{"title":"Towards of intelligence education and learning","authors":"A. M. Salem","doi":"10.1109/INTELCIS.2015.7397221","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397221","url":null,"abstract":"Researchers have been used the artificial intelligence (AI) area of research in education to develop a new generation of intelligent tutoring and learning systems. AI concepts, theories and approaches receive increasing attention within the educational technology community. This paper discusses the AI approaches, methodologies and techniques for developing the intelligent e-Learning and tutoring systems. In addition, the paper presents some examples of the developed systems by the author and his colleagues at Artificial intelligence and Knowledge Engineering Research Labs, Ain Shams University, Cairo, Egypt.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"108 1","pages":"196-202"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83290648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A proposed security service set for VANET SOA 为VANET SOA提议的安全服务集
Safi Ibrahim, M. Hamdy, E. Shaaban
In Vehicular Ad Hoc Networks (VANETs), nodes are represented by Vehicles. Communication in VANETs can take place either between vehicles Vehicle-to-Vehicle (V2V), or between Vehicle and Infrastructure (V2I). Securing exchanged messages between Vehicles is of great importance, especially when they are life critical messages. Some of the Previous security researches discussed how to enable secure communication depending on the support of Infrastructure. In this work, security supported by infrastructure is defined by Services Oriented. Service Oriented Architecture (SOA) can be a novel alternative to satisfy all security requirements. We show the completeness of the proposed system by comparing it with previous security researches.
在车辆自组织网络(vanet)中,节点由车辆表示。vanet中的通信既可以在车辆之间(V2V)进行,也可以在车辆与基础设施(V2I)之间进行。确保车辆之间交换的信息是非常重要的,特别是当它们是生命关键信息时。以前的一些安全研究讨论了如何依靠基础设施的支持来实现安全通信。在这项工作中,基础设施支持的安全性由面向服务定义。面向服务的体系结构(Service Oriented Architecture, SOA)可以成为满足所有安全需求的新颖替代方案。通过与以往安全研究的比较,证明了该系统的完备性。
{"title":"A proposed security service set for VANET SOA","authors":"Safi Ibrahim, M. Hamdy, E. Shaaban","doi":"10.1109/INTELCIS.2015.7397192","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397192","url":null,"abstract":"In Vehicular Ad Hoc Networks (VANETs), nodes are represented by Vehicles. Communication in VANETs can take place either between vehicles Vehicle-to-Vehicle (V2V), or between Vehicle and Infrastructure (V2I). Securing exchanged messages between Vehicles is of great importance, especially when they are life critical messages. Some of the Previous security researches discussed how to enable secure communication depending on the support of Infrastructure. In this work, security supported by infrastructure is defined by Services Oriented. Service Oriented Architecture (SOA) can be a novel alternative to satisfy all security requirements. We show the completeness of the proposed system by comparing it with previous security researches.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"649-653"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83070932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of thrombosis collagen diseases based on C4.5 algorithm 基于C4.5算法的血栓性胶原蛋白疾病分类
S. Soliman, Safia Abbas, A. M. Salem
Recently, collagen diseases propagated due to many factors such as pressure and pollution. Thrombosis is one of the most famous collagen diseases that obstruct the blood flow causing vital complications for crucial parts of the circulatory system. Such diseases cause a high risk for the doctors due to the huge number of the laboratory examinations and the efforts to diagnosis. Accordingly, this paper implements C4.5 algorithm, as one of the most famous data mining techniques, on real thrombosis dataset. The dataset was collected from Chiba University as a challenging dataset for thrombosis diagnosis. The results show that the C4.5 could diagnose the thrombosis degree with accuracy 98.4%.
近年来,由于压力、污染等多种因素,胶原蛋白疾病不断蔓延。血栓形成是最著名的胶原蛋白疾病之一,它会阻碍血液流动,导致循环系统关键部位的严重并发症。由于大量的实验室检查和诊断工作,这类疾病对医生来说风险很高。因此,本文在真实血栓形成数据集上实现了C4.5算法这一最著名的数据挖掘技术。该数据集来自千叶大学,是血栓诊断的一个具有挑战性的数据集。结果表明,C4.5对血栓形成程度的诊断准确率为98.4%。
{"title":"Classification of thrombosis collagen diseases based on C4.5 algorithm","authors":"S. Soliman, Safia Abbas, A. M. Salem","doi":"10.1109/INTELCIS.2015.7397209","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397209","url":null,"abstract":"Recently, collagen diseases propagated due to many factors such as pressure and pollution. Thrombosis is one of the most famous collagen diseases that obstruct the blood flow causing vital complications for crucial parts of the circulatory system. Such diseases cause a high risk for the doctors due to the huge number of the laboratory examinations and the efforts to diagnosis. Accordingly, this paper implements C4.5 algorithm, as one of the most famous data mining techniques, on real thrombosis dataset. The dataset was collected from Chiba University as a challenging dataset for thrombosis diagnosis. The results show that the C4.5 could diagnose the thrombosis degree with accuracy 98.4%.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"40 1","pages":"131-136"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80418066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1