2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)最新文献

筛选
英文 中文
Deep And Machine Learning Towards Pneumonia And Asthma Detection 用于肺炎和哮喘检测的深度和机器学习
Amani Yahyaoui, N. Yumusak
{"title":"Deep And Machine Learning Towards Pneumonia And Asthma Detection","authors":"Amani Yahyaoui, N. Yumusak","doi":"10.1109/3ICT53449.2021.9581963","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581963","url":null,"abstract":"Machine Learning is a branch of artificial intelligence widely used in the medical field to analyze high-dimensional medical data and the early detection of certain dangerous diseases. Lung diseases continue to increase the mortality rate in the world. The early and accurate prediction of lung diseases has become a primary necessity to save patient's lives and facilitate doctor's works. This paper focuses on predicting certain chest diseases such as Pneumonia and Asthma using Deep Learning (DL) and Machine Learning (ML) techniques, respectively, the Deep Neural Network (DNN), and the K-nearest Neighbors (KNN) methods. These approaches are evaluated using a private data set from the pulmonary diseases department of Diyarbakir hospital, Turkey. It consists of 212 samples, 38 input characteristics characterize each one. The results obtained showed the effectiveness of these methods to detect pulmonary diseases, particularly the KNN, by giving a detection accuracy of 95% and 94.3% by using the DNN method.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Socio-technical Challenges in the Implementation of Smart City 智慧城市实施中的社会技术挑战
Hitesh Mohapatra
{"title":"Socio-technical Challenges in the Implementation of Smart City","authors":"Hitesh Mohapatra","doi":"10.1109/3ICT53449.2021.9581905","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581905","url":null,"abstract":"The smart city concept is a solution to many problems that we are facing in our day-to-day life. Many countries have been started adopting many prototypes to solve daily challenges. Still, the smart city term does not have any universally accepted definition. The smart city is a ubiquitous term whose definition varies from person to person, city to city, and country to country. The lack of a common definition remains the term smart city is in a chaotic state. This paper has presented the socio-technical challenges during the implementation of smart city plans. It has analyzed the smart city execution problems in the context of developed and underdeveloped countries.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133876544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Implementation of Access Control in Ethereum Blockchain 以太坊区块链中访问控制的实现
Insaf Achour, S. Ayed, H. Idoudi
{"title":"On the Implementation of Access Control in Ethereum Blockchain","authors":"Insaf Achour, S. Ayed, H. Idoudi","doi":"10.1109/3ICT53449.2021.9581591","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581591","url":null,"abstract":"Access control is a main component in Blockchain systems. It is usually implemented in smart contracts and defines the security policy, in other words, it determines who can access a protected resource in the network. In this paper, we present a review of the major implementations of access control in Ethereum platform. The latter is based on RBAC model (Role-Based Access Control). Implementations require to take into account the whole RBAC process, that is, user role assignment and permission assignment. Three implementations currently exist and are described and compared in this work according to several features: RBAC-SC, Smart policies and OpenZepplin contracts.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116133469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of COVID-19 mRNA Vaccine Degradation Prediction System 新型冠状病毒mRNA疫苗降解预测系统的研制
Soon Hwai Ing, A. Abdullah, Shigehiko Kanaya
{"title":"Development of COVID-19 mRNA Vaccine Degradation Prediction System","authors":"Soon Hwai Ing, A. Abdullah, Shigehiko Kanaya","doi":"10.1109/3ICT53449.2021.9582052","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9582052","url":null,"abstract":"The threatening Coronavirus which was assigned as the global pandemic concussed not only the public health but society, economy and every walks of life. Some measurements are taken to stifle the spread and one of the best ways is to carry out some precautions to prevent the contagion of SARS-CoV-2 virus to uninfected populaces. Injecting prevention vaccines is one of the precaution steps under the grandiose blueprint. Among all vaccines, it is found that mRNA vaccine which shows no side effect with marvelous effectiveness is the most preferable candidates to be considered. However, degradation had become its biggest drawback to be implemented. Hereby, this study is held with desideratum to develop prediction models specifically to predict the degradation rate of mRNA vaccine for COVID-19.3 machine learning algorithms, which are, Linear Regression (LR), Light Gradient Boosting Machine (LGBM) and Random Forest (RF) are proposed for 12 models development. Dataset comprises of thousands of RNA molecules that holds degradation rates at each position from Eterna platform is extracted, pre-processed and encoded with label encoding before loaded into algorithms. The results show that the LGBM-based model which is trained along with auxiliary bpps features and encoded with method 1 label encoding performs the best (RMSE = 0.24466), followed by the same criteria LGBM-based model but encoded with label encoding method 2, with a difference in 0.00003 in tow the topnotch model. The RF-based model with applaudable performance (RMSE = 0.25302) even without the ubieties of the riddled bpps features in contradistinction to the training and encoding criteria of the superb mellowed LGBM-based model is worth being further cultivated for the prediction study on COVID-19 mRNA vaccines' degradation rate.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123502102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COCOSO-based Network Interface Selection Algorithm for Heterogeneous Wireless Networks 基于cocoso的异构无线网络接口选择算法
Brahim Mefgouda, H. Idoudi
{"title":"COCOSO-based Network Interface Selection Algorithm for Heterogeneous Wireless Networks","authors":"Brahim Mefgouda, H. Idoudi","doi":"10.1109/3ICT53449.2021.9581462","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581462","url":null,"abstract":"Network Interface Selection (NIS) aims to connect the user equipment to the best available network in the context of heterogeneous wireless networks environments (HWN). NIS is one of the main current issues in HWNs that raised great scientific interest in the last few years. Multi-attribute decision-making (MADM) are the most common approaches applied to solve the NIS problem as they are easy to understand, they can be used in real scenarios, and they perform fast networks' ranking. In this paper, we apply, for the first time, the Combined Compromise Solution (COCOSO) to model and solve the network interface selection problem. Simulation results showed that our proposed approach outperforms the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Simple Additive Weighting (SAW) in terms of reducing the rank reversal problem and meeting QoS requirements.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defeating the Credit Card Scams Through Machine Learning Algorithms 通过机器学习算法击败信用卡诈骗
Kameron Bains, Adebamigbe Fasanmade, J. Morden, A. Al-Bayatti, M. S. Sharif, A. S. Alfakeeh
{"title":"Defeating the Credit Card Scams Through Machine Learning Algorithms","authors":"Kameron Bains, Adebamigbe Fasanmade, J. Morden, A. Al-Bayatti, M. S. Sharif, A. S. Alfakeeh","doi":"10.1109/3ICT53449.2021.9582060","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9582060","url":null,"abstract":"Credit card fraud is a significant problem that is not going to go away. It is a growing problem and surged during the Covid-19 pandemic since more transactions are done without cash in hand now. Credit card frauds are complicated to distinguish as the characteristics of legitimate and fraudulent transactions are very similar. The performance evaluation of various Machine Learning (ML)-based credit card fraud recognition schemes are significantly pretentious due to data processing, including collecting variables and corresponding ML mechanism being used. One possible way to counter this problem is to apply ML algorithms such as Support Vector Machine (SVM), K nearest neighbor (KNN), Naive Bayes, and logistic regression. This research work aims to compare the ML as mentioned earlier models and its impact on credit card scam detection, especially in situations with imbalanced datasets. Moreover, we have proposed state of the art data balancing algorithm to solve data unbalancing problems in such situations. Our experiments show that the logistic regression has an accuracy of 99.91%, and naive bays have an accuracy of 97.65%. K nearest neighbor has an accuracy is 99.92%, support vector machine has an accuracy of 99.95%. The precision and accuracy comparison of our proposed approach shows that our model is state of the art.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123060860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Support Vector Machine and Decision Tree-Based Elective Course Suggestion System: A Case Study 基于支持向量机与决策树的选修课建议系统案例研究
M. F. Adak, S. Ercan
{"title":"Support Vector Machine and Decision Tree-Based Elective Course Suggestion System: A Case Study","authors":"M. F. Adak, S. Ercan","doi":"10.1109/3ICT53449.2021.9581846","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581846","url":null,"abstract":"Nowadays, online education has become widespread, and the search for new techniques has begun to increase. The high number of quotas in university education in Turkey increases the number of students per instructor. It is not at the desired level for the student to receive a good education in the presence of an advisor and choose the appropriate course for his / her field due to a large number of students. In this study, a suggestion system is proposed by analyzing the previous courses taken by university students in directing the elective course. In this study, which courses would be beneficial to choose and which would be useless are presented with a web interface in which Support Vector Machine and decision trees are used. In the pilot study that the model developed conducted in the Computer Engineering department, an average of 76% success was achieved in test data sets. This success shows that the student can examine the compulsory courses and suggest elective courses suitable for his/her field and that he/she will like.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach for Labelling XML Data 标记XML数据的新方法
Alhadi A. Klaib, A. Milad, Mustafa Almahdi Algaet
{"title":"A New Approach for Labelling XML Data","authors":"Alhadi A. Klaib, A. Milad, Mustafa Almahdi Algaet","doi":"10.1109/3ICT53449.2021.9581352","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581352","url":null,"abstract":"Extensible Markup Language (XML) has become a key technique for transferring data through the internet. Updating and retrieving a large amount of XML data is a very active research field. The XML labelling schemes play an important role in handling XML data efficiently and robustly. Thus, many labelling schemes have been proposed. Nevertheless, these labelling schemes have limitations. Therefore, in this paper, a new method for labelling XML documents is developed. In addition, this approach used the idea of clustering-based XML data and dividing the nodes of an XML document into groups and labelling them accordingly. Two existing labelling schemes were chosen to label the clusters and their nodes as well. The level-based labelling scheme (LLS) and Dewey labelling scheme were used to label the nodes and clusters. The data model of this scheme has been developed. The mechanism of the proposed scheme also has been developed. Finally, this proposed scheme and the other two labelling schemes that used to build the proposed scheme have been implemented.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Future Micro Hydro Power: Generation of Hydroelectricity and IoT based Monitoring System 未来微型水电:水力发电和基于物联网的监测系统
A. Akib, S. Mahmud, M. Mridha
{"title":"Future Micro Hydro Power: Generation of Hydroelectricity and IoT based Monitoring System","authors":"A. Akib, S. Mahmud, M. Mridha","doi":"10.1109/3ICT53449.2021.9581590","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581590","url":null,"abstract":"The paper focuses on the Future Micro Hydro Power: generation of hydroelectricity and its monitoring system. The world is moving towards technological advancement day by day. For this reason, the energy need will surge further in the coming days. But we could not yet ensure the proper electricity needs in the poor or developing country. Now it's an essential needy thing to survive this 4.0 industry's time. This ‘Future Micro Hydro Power’ device will generate energy by exploiting the small water sources (i.e., Washroom, Kitchen, Etc.) in the multi steroid buildings. A massive amount of water is used in the house every day. Water taps are used not only in homes but in all modern buildings. We have demonstrated how hydropower will generate from these tiny water sources and how this power can run a house. Here the user will be able to monitor the amount of energy produced and use it if desired. The cost of the devices will be much lower, and their performance will be much higher. After the experimental installation, we got some data that proves its outstanding efficiency.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new approach to detect next generation of malware based on machine learning 基于机器学习的下一代恶意软件检测新方法
Ikram Ben abdel ouahab, Lotfi Elaachak, Yasser A. Alluhaidan, M. Bouhorma
{"title":"A new approach to detect next generation of malware based on machine learning","authors":"Ikram Ben abdel ouahab, Lotfi Elaachak, Yasser A. Alluhaidan, M. Bouhorma","doi":"10.1109/3ICT53449.2021.9581625","DOIUrl":"https://doi.org/10.1109/3ICT53449.2021.9581625","url":null,"abstract":"In these days, malware attacks target different kinds of devices as IoT, mobiles, servers even the cloud. It causes several hardware damages and financial losses especially for big companies. Malware attacks represent a serious issue to cybersecurity specialists. In this paper, we propose a new approach to detect unknown malware families based on machine learning classification and visualization technique. A malware binary is converted to grayscale image, then for each image a GIST descriptor is used as input to the machine learning model. For the malware classification part we use 3 machine learning algorithms. These classifiers are so efficient where the highest precision reach 98%. Once we train, test and evaluate models we move to simulate 2 new malware families. We do not expect a good prediction since the model did not know the family; however our goal is to analyze the behavior of our classifiers in the case of new family. Finally, we propose an approach using a filter to know either the classification is normal or it's a zero-day malware.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130642630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信