{"title":"A new similarity measure for automatic text categorization based on vector space model","authors":"Said Bahassine, Abdellah Madani, M. Kissi","doi":"10.1145/3231830.3231833","DOIUrl":"https://doi.org/10.1145/3231830.3231833","url":null,"abstract":"Text classification is the process of assigning a predefine class or category to an anonymous text based on its content. It is an important task in text mining. Several Text classification algorithms were developed for natural languages, such as English, Chinese and Dutch. However, the number of related works for Arabic is limited. In this research, we will attempt to generalize the method to compute category representative vectorand propose a new similarity measure(referred to, hereafter, as origin-similarity) based on aVector Space Model to classify Arabic documents and compare proposed method with well-known similarity techniques.The measurement used a dataset that consists of 250 Arabictextsindependently classified into five classes: art and culture, economics, politics, society, and sport. The experimental findings show that Arabic text classification using VSMprovides the best results and could attribute the category of a text with an accuracy of 91 %.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Wireless Sensor Networks and Wearable Technologies for Educational Purposes: A Scoping Review","authors":"G. Iyawa, M. Herselman, A. Botha","doi":"10.1145/3231830.3231839","DOIUrl":"https://doi.org/10.1145/3231830.3231839","url":null,"abstract":"Past researches in wireless sensor networks (WSNs) and wearable technologies have mostly been conducted in the field of healthcare for the purpose of patients' health monitoring. However, recent studies in WSNs and wearable technologies suggest that WSNs and wearable technologies have also been used for educational purposes. Despite current research exploring WSNs and wearable technologies for educational purposes, it is less clear as to what has been studied on WSNs and wearable technologies for educational purposes and the research gaps which need to be addressed. The purpose of this study was therefore to conduct a scoping review on the use of WSNs and wearable technologies for educational purposes. The search was conducted through a scoping review which adopted four academic databases: ACM, IEEE Xplore, ScienceDirect and Springer Link. In total, seven publications were identified based on the inclusion and exclusion criteria. The scoping review identified the extent and range of studies which have been conducted on WSNs and wearable technologies for educational purposes. The findings identified the challenges, benefits, cost issues and technology types associated with the use of WSNs and wearable technologies for educational purposes as well as the research gaps. The findings will inform researchers and professionals that aim to improve learning through the use of WSNs and wearable technologies.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115077156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey: Routing Protocols in Vehicular Ad Hoc Networks","authors":"Oussama Senouci, Z. Aliouat, S. Harous","doi":"10.1145/3231830.3231838","DOIUrl":"https://doi.org/10.1145/3231830.3231838","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET) is wireless ad-hoc network including a set of vehicle nodes. It is a subclass of Mobile Ad-hoc Network (MANET). The high velocity of nodes constitutes the main difference between VANET and MANET. This distinguished specificity leads to an unpredictable topological change. Like any ad hoc network, routing is the very important step in VANET network. There are several routing protocols proposed for VANETs. The classification of these routing protocols is made based on some criteria. In this paper, we are interested in the type of diffusion of message issue in the network. There exist three types: unicast protocol, broadcast protocol and multicast protocol. The multicast protocol includes two subclasses: geocast and cluster-based protocols.. After analyzing the new routings protocols for VANETs, we observed the emergence of new technology carry-and-forwarding. This latter is the new axis for designing routing protocol in VANETs. Some of the problems, encountered during the development of routing protocol for VANETs, are the rapid change of topology and the frequent disconnection, which make the routing of packets a difficult task in VANETs.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123999947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Body Sensor Network Architecture with CP-ABE Based Fine-Grained Data Access Control","authors":"Mohamed Hassan, A. Katangur, Dulal C. Kar","doi":"10.1145/3231830.3231841","DOIUrl":"https://doi.org/10.1145/3231830.3231841","url":null,"abstract":"Body Sensor Network (BSN) is a network of wirelessly connected physiological sensors. BSNs offer promising innovative medical and non-medical applications. In such applications and networks, security is essential, critical, and challenging. In this context, data privacy and data security are major requirements. The ultimate goal of data privacy is to implement an efficient fine-grained data access control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes offer a vital option for achieving fine-grained data access control in BSNs. In this work, we propose a secure cluster-based BSN architecture optimized for an energy-efficient operation. The new architecture is designed to allow flexible operation by 1) implementing CP-ABE either on sensor nodes or on the BSN controller, and 2) targeting specific performance merits through proposed enhancement approaches. Three CP-ABE schemes are investigated, the original CP-ABE (BSW), an enhanced CP-ABE (ECP- ABE), and a CP-ABE scheme with constant ciphertext length (CCP-ABE). Thorough simulations are conducted on the MICAz sensor node platform. The performance evaluation, for typical BSN applications, shows that ECP-ABE outperforms BSW. Interestingly, CCP-ABE provides only a marginal advantage in cluster lifetime compared to ECP-ABE defeating the purpose of sacrificing flexible access structure for constant ciphertext length.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Kaloyanova, Tsvetomir Hristov, Ina Naydenova, Zlatinka Kovacheva
{"title":"Information Management Technologies for Big Data: A Case of Oracle","authors":"K. Kaloyanova, Tsvetomir Hristov, Ina Naydenova, Zlatinka Kovacheva","doi":"10.1145/3231830.3231840","DOIUrl":"https://doi.org/10.1145/3231830.3231840","url":null,"abstract":"During the last decade the volume, the rate of accumulation and the diversity of data in general have been steadily increasing, which leads to the rapid development of Big data and technological enhancements associated with it. Many leading companies in the area took the challenge and provided different solutions to manage Big data. New hardware and software technologies are introduced for information management. The paper analyzes the main Big data technologies provided by Oracle as well their implementation in several specific cases.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"90 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120879069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CLogVis: Crime Data Analysis and Visualization Tool","authors":"Hamdan Z. Alshammari, K. Alghathbar","doi":"10.1145/3231830.3231832","DOIUrl":"https://doi.org/10.1145/3231830.3231832","url":null,"abstract":"Recently, cell phone usage has increased incrementally to huge numbers. Statistics show that a total number of mobile phone users worldwide, from 2013 to 2019, is about 60 percent of the Earth's population. This reflects that the use of cell phones is the traditional way of communicating for most of the people in the world. Making calls and sending text messages are the main methods of communication used with cell phones. The purpose of this work is to present \"CLogVis,\" a crime data analysis and visualization system that helps police departments and security agencies connect criminals and suspects by using their cell phone data. Cell phones contain a huge amount of information that helps agencies and police departments in various ways find relationships and connections between criminals. Moreover, information in cell phones will expand in an incremental way when the suspect uses the Internet through their cell phone. In our system, we will be looking to build relationships and connecttions between criminals by using phonebooks and call history (inbound and outbound) to find the relationships between suspects. Regarding the nature of crime organizations, which are built on networks, graph techniques are used to build connections throughout datasets gathered from arrested suspects, criminals, and Telecommunications Service Provider (TSP) log files.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}