{"title":"Machine learning approaches for extracting genetic medical data information","authors":"A. Hussain","doi":"10.1145/3018896.3066906","DOIUrl":"https://doi.org/10.1145/3018896.3066906","url":null,"abstract":"Bioinformatics is the development and application of computational tools for the field of biological and biomedical research data, including public health informatics and population informatics, in addition to clinical informatics. Bioinformatics represents a promising toolset to move from the standard therapies to tailor medical care to each individual genome, therefore instead of using certain therapy to group of patients suffering of certain disease, they tailor this therapy to each individual genome. Machine learning algorithms and techniques have been used in bioinformatics. There are many methods available to deal with data including DNA sequence, complex gene-gene interactions data, and clinical data. To assess these complex data, there are several approaches such as multifactor dimensionality reduction, generalized multifactor dimensionality reduction, artificial neural networks for example multilayer feedforward neural networks, and feature selection approaches. These approaches provide capabilities to deal with very big data that include an excessive number of features. In this talk, two case studies will be discussed for the use of machine learning for extracting genetic information which includes obesity and diabetes.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for evaluating continuous microservice delivery strategies","authors":"Martin Lehmann, F. Sandnes","doi":"10.1145/3018896.3018961","DOIUrl":"https://doi.org/10.1145/3018896.3018961","url":null,"abstract":"The emergence of service-oriented computing, and in particular microservice architecture, has introduced a new layer of complexity to the already challenging task of continuously delivering changes to the end users. Cloud computing has turned scalable hardware into a commodity, but also imposes some requirements on the software development process. Yet, the literature mainly focuses on quantifiable metrics such as number of manual steps and lines of code required to make a change. The industry, on the other hand, appears to focus more on qualitative metrics such as increasing the productivity of their developers. These are common goals, but must be measured using different approaches. Therefore, based on interviews of industry stakeholders a framework for evaluating and comparing approaches to continuous microservice delivery is proposed. We show that it is possible to efficiently evaluate and compare strategies for continuously delivering microservices.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116692101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-governance (G2C) in the public sector: citizens acceptance to E-government systems - Dubai's case","authors":"Sami Marzooqi, Eiman Al Nuaimi, N. Al-Qirim","doi":"10.1145/3018896.3025160","DOIUrl":"https://doi.org/10.1145/3018896.3025160","url":null,"abstract":"At this day and age, it is considered to be the era of technological advancement, where countries strive for technological development and becoming a smart government not only for power but also to providing a safer, smarter and sustainable environment for their people, businesses, industries and governmental authorities. Therefore, seminars and conferences are held internationally every year where companies offer solutions on the transformation of cities to smart ones such as GITEX, IEEE seminars, Smart Government conferences and etc. Frameworks are always at the doorsteps of the governments being proposed to take upon the initiative of creating E-Governments. Many cities have become smart governments and are at the verge of becoming fully mature, cities like Amsterdam[1], New York[2], Songdo[3], Dublin [4] and even Dubai [5]. But there is one aspect that governments find challenging to achieving success when e-Government projects are implemented, that aspect is the citizens' behavior and attitude towards the e-Government systems [6]. This means that one of the major challenges of the governments are the citizens' acceptance to the e-Government systems and having interest in using the services, because people do not have the strong bond of trust when it comes to online technologies because of fear of security breaches [6]. Even Dubai, which is considered as a multicultural city, finds this enigma challenging [7]. Hence, this paper discusses about the E-Government Frameworks proposed by authors which is more citizen centric and touch upon the issues as well as the success factors about E-Governance (Government2Citizen) aspects. Also a tailored framework is derived from the discovered factors which will be discussed over Dubai's case as being a smart government. Finally, some G2C industry solutions will be displayed and compared in a table for the various features each vendor offers in the today's market.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126085713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kenneth Hoelscher, Lucas Allgood, Changyong Jung, Suk-Jin Lee
{"title":"Direct autolink","authors":"Kenneth Hoelscher, Lucas Allgood, Changyong Jung, Suk-Jin Lee","doi":"10.1145/3018896.3018956","DOIUrl":"https://doi.org/10.1145/3018896.3018956","url":null,"abstract":"Direct Autolink is an interconnected system of programs that establish both hardware and software connections between an ARM-based computer and handhold devices designed with ease of modularization. These programs are capable of sending and receiving commands and files over this connection. Similar systems exist using the internet, which presents both speed and safety concerns. The proposed system establishes a direct communication channel without Internet enabled, so that it can release the concerns raised from the Internet-based connection.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Growing green with improved profit through reduced power consumption in LTE networks","authors":"Kapil Kanwal, G. A. Safdar","doi":"10.1145/3018896.3018910","DOIUrl":"https://doi.org/10.1145/3018896.3018910","url":null,"abstract":"Long Term Evolution (LTE) is well known 4G technology which promises higher data rates. Due to advancements in smart phones and new applications, the user's data requirements have significantly increased. The data hungry users engage radio resources over long periods of time thus resulting into higher energy consumption by Base stations (BSs). Increased energy consumption due to higher data rates directly increases Operational Expenditure (OPEX) thereby ensuing economic and environmental benefits, i.e. profitability and Global Warming. This paper presents detailed performance analysis of our novel joint resources block switching off and bandwidth expansion based energy saving scheme. Our proposed scheme offers 29% energy saving thus results in to decreased CO2 emissions (approximately 1.12 tonnes/ BS) and reduced OPEX thereby enabling mobile vendors to have high profile in Growing Green and help them to improve both environmental and economic aspects. Vendors could enjoy increased profit and stay Green through usage of our energy saving scheme.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined WSD algorithms with LSA to identify semantic similarity in unstructured textual data","authors":"Mohammed Ahmed Taiye, S. S. Kamaruddin, F. Ahmad","doi":"10.1145/3018896.3056785","DOIUrl":"https://doi.org/10.1145/3018896.3056785","url":null,"abstract":"Semantically related sentence may not have any word in common. However, identifying the semantic similarity between words at sentence level possess difficult challenges such as polysemy, synonyms, heterogeneity and sparsity of unstructured textual datasets. It is assumed that sentences with similar text or words in common are semantically related. It means that the standard Information Retrieval (IR) measure based on word co-occurrence are not appropriate to tackle the aforementioned challenges of identifying semantics in unstructured text documents. Many semantic similarity measures have been proposed to resolve this non-trivial issues, but many existing studies did not properly utilize the combination of Corpus and Knowledge-based approach to solve the syntactic construct and the roles of Part Of Speech in identifying semantic similarities in sentences. In this research, we aim at proposing a method for measuring sentence semantic similarity identification that combines two algorithms from the knowledge-based Word Sense Disambiguation algorithms with Latent Semantic Analysis to identify the semantic similarity of sentences and to compare results with human evaluation.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An event-based access control for IoT","authors":"Nurul Huda Nik Zulkipli, G. Wills","doi":"10.1145/3018896.3025170","DOIUrl":"https://doi.org/10.1145/3018896.3025170","url":null,"abstract":"The Internet of Things (IoT) comes together with the connection between sensors and devices. These smart devices have been upgraded from a standalone device which can only handle a specific task at one time to an interactive device that can handle multiple tasks in time. However, this technology has been exposed to many vulnerabilities especially on the malicious attacks of the devices. With the IoT constraints and low-security mechanisms applied, the malicious attacks could exploit the sensor vulnerability to provide wrong data where it can lead to wrong interpretation and actuation to the users. Due to this problems, this short paper presents an event-based access control framework that considers integrity, privacy and the authenticity in the IoT devices.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115246931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust and efficient approach for image denoising and brain region extraction to aid neurology system of patient","authors":"Vandna Shah","doi":"10.1145/3018896.3056770","DOIUrl":"https://doi.org/10.1145/3018896.3056770","url":null,"abstract":"Neurologist often tends to regard diseases of the nervous system as a difficult area. For patient presenting with symptoms of tumor should be diagnosed properly. Since treatment may not cure at the later stage, researchers must aim to produce maximal benefit to the patient with minimal burden, taking quality of survival into account as well as the duration. The computed tomography scan images are limited by the resolution of the imaging. In the field of Medical Resonance Image processing the image segmentation and denoising are very important and challenging problems in an image analysis. In this research paper the framelet transform for image denoising is implemented. Furthermore, the main purpose of segmentation in MRI images is to diagnose the problems in the normal brain anatomy and to find the location of tumor. This paper proposes a novel algorithm for segmentation of MRI images to extract the exact area of the brain as preprocessing steps for tumor location with image denoising. As a part of performance evaluation, 1000 images of patients are captured from different MRI centers under different conditions. Neuroradiological research consists of several brain extraction algorithms which are useful for several post- automatic image processing operations like segmentation, registration and compression. The result of proposed algorithm is validated by comparing proposed algorithm with the results of the existing segmentation and Denoising algorithms.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing service discovery framework for IaaS and PaaS models","authors":"Farzad Firozbakht, Waeal J. Obidallah, B. Raahemi","doi":"10.1145/3018896.3025130","DOIUrl":"https://doi.org/10.1145/3018896.3025130","url":null,"abstract":"Cloud service discovery is a new challenge which regular methods that are being used for web service discovery cannot properly address it. Hence; a dedicated framework is required to solve this problem. We designed and implemented a cloud service discovery framework which is using a syntax-based query engine. This framework is optimized for Infrastructure as a Service and Platform as a Service computing models. We use Extensible Markup Language (XML) for storing cloud service information. Windows, Apache, MySQL and PHP server is implemented to demonstrate the framework. The syntax-based query engine is using Asynchronous JavaScript and XML to perform the search, PHP is also employed as the server-side scripting language to allow the search functions to read the XML. The query engine is written in a way that every time the user enters a query, it searches through all tags to find the exact match or similarities. We present some of the experimental results and compare our method with the existing ones and point out the advantages over the currently used frameworks. This syntax-based framework is good enough for discovering IaaS and PaaS cloud services without the overhead of semantic-based frameworks and inaccuracy of the Filter by Attribute method.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117099291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of ensemble learning methods applied to network intrusion detection","authors":"Mustapha Belouch, S. E. Hadaj","doi":"10.1145/3018896.3065830","DOIUrl":"https://doi.org/10.1145/3018896.3065830","url":null,"abstract":"This paper investigates the possibility of using ensemble learning methods to improve the performance of intrusion detection systems. We compare an ensemble of three ensemble learning methods, boosting, bagging and stacking in order to improve the detection rate and to reduce the false alarm rate. These ensemble methods use well-known and different base classification algorithms, J48 (decision tree), NB (Naïve Bayes), MLP (Neural Network) and REPTree. The comparison experiments are applied on UNSW-NB15 data set a recent public data set for network intrusion detection systems. Results show that using boosting, bagging can achieve higher accuracy than single classifier but stacking performs better than other ensemble learning methods.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123995312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}