{"title":"Using Support Vector Regression in multi-target prediction of drug toxicity","authors":"F. Adilova, Alisher Ikramov","doi":"10.1109/AICT50176.2020.9368837","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368837","url":null,"abstract":"We consider the task of drug activity prediction, specifically we predict the toxicity of fullerene-based nanoparticles in interaction with 1117 proteins. We use a multi-target Support Vector Regression model with a greedy feature selection technique to achieve RMSE of 362.9 on a test set. We also demonstrate the impact of hyperparameter tuning on model performance.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sybil Attack Detection In Wireless Sensor Networks","authors":"Zhukabayeva T. K, Mardenov E. M, Abdildaeva A.A","doi":"10.1109/AICT50176.2020.9368790","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368790","url":null,"abstract":"There are many vulnerabilities to attack in wireless sensor networks. Among them, the sybil attack is especially malicious to generate many false nodes and enter false information on the network. They are detrimental to many functions of the FSU, such as data pooling, fair distribution of resources, etc. Therefore, it is crucial to protect and detect Sybil attacks. The Sybil attack has a significant impact on network performance, and once it was detected, network performance will be obviously improving.In this article, we consider a new method of detecting Sybil attacks using random keys. In the proposed method, signs are used that there is a weak connection between the group of normal nodes and the group of false nodes. Experiment results show that the proposed method detects a false node with a probability of more than 90% with a small energy consumption.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132516621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based open infrastructure for URL filtering in an Internet browser","authors":"Obadah Hammoud, I. Tarkhanov","doi":"10.1109/AICT50176.2020.9368678","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368678","url":null,"abstract":"this research is dedicated to the development of a prototype of open infrastructure for users’ internet traffic filtering on a browser level. We described the advantages of a distributed approach in comparison with current centralized solutions. Besides, we suggested a solution to define the optimum size for a URL storage block in Ethereum network. This solution may be used for the development of infrastructure of DApps applications on Ethereum network in future. The efficiency of the suggested approach is supported by several experiments.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114663966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm for the Abnormal Ventricular Electrical Excitation Detection","authors":"Z. Yuldashev, A. Nemirko, D. Ripka","doi":"10.1109/AICT50176.2020.9368866","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368866","url":null,"abstract":"Detection algorithm of the ventricular late potentials using surface ECG signal for the diagnostics of abnormal electrical excitation of ventricular myocardium is developed, ventricular late potentials indicators reflecting the area size and degree of the ventricular excitation abnormality, verification method of abnormality detection using intracardial electrograms are suggested.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Business Projects in the Agent Model of the Russian Federation Spatial Development","authors":"A. Mashkova, E. Novikova, O. Savina","doi":"10.1109/AICT50176.2020.9368665","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368665","url":null,"abstract":"In this paper we present the agent-based model of the Russian Federation spatial development as a tool for simulation of business projects in key industries and their impact on the regional economy. The model interface is used to define the region and industries for each project, as well as structure of its co-financing by organizations, federal and regional budget. Within the algorithm of the project realization the plan of investment supplies is determined, supplementary processes of the organization are simulated and reflected in the accounting. Within the computational experiment results of business projects realization in various regions were studied. The experimental program includes four regions from different federal districts. In each region, three key industries were selected according to perspective economic specializations defined in the Strategy of the Russian Federation spatial development. The results show significant increase in the output, property and equipment of the organizations, and also in employment and income of population in the selected regions.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-level lecture video classification using text content","authors":"Veysel Sercan Ağzıyağlı, H. Oğul","doi":"10.1109/AICT50176.2020.9368692","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368692","url":null,"abstract":"Recent interest in e-learning and distance education services has significantly increased the amount of lecture video data in public and institutional repositories. In their current forms, users can browse in these collections using meta-data-based search queries such as course name, description, instructor and syllabus. However, lecture video entries have rich contents, including image, text and speech, which can not be easily represented by meta-data annotations. Therefore, there is an emerging need to develop tools that will automatically annotate lecture videos to facilitate more targeted search. A simple way to realize this is to classify lectures into known categories. With this objective, this paper presents a method for classifying videos based on extracted text content in several semantic levels. The method is based on Bidirectional Long-Short Term Memory (Bi-LSTM) applied on word embedding vectors of text content extracted by Optical Character Recognition (OCR). This approach can outperform conventional machine learning models and provide a useful solution for automatic lecture video annotation to support online education.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116802963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sobiya Arsheen, A. Wahid, Khaleel Ahmad, Khujamatov Khalim
{"title":"Flying Ad hoc Network Expedited by DTN Scenario: Reliable and Cost-effective MAC Protocols Perspective","authors":"Sobiya Arsheen, A. Wahid, Khaleel Ahmad, Khujamatov Khalim","doi":"10.1109/AICT50176.2020.9368575","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368575","url":null,"abstract":"Flying Adhoc Network (FANET) is an emerging topic of research in the wireless network area, FANET has several common features with its predecessor e.g. Mobile Adhoc Network (MANET) and Vehicle Adhoc Network (VANET), but the network has several unique features also which make it different from other networks. The sparseness of nodes, coupled with frequent changing of topology significantly affects the data transmission rate of the network. To overcome this problem, FANET can be assisted with Delay Tolerant Network (DTN) approach to exploit its mobility and routing features. The main aim of this work is to make Flying Adhoc Network reliable by deploying two MAC protocols i.e. IEEE 802.11 and IEEE 802.15 and realize the functionality of Delay Tolerant Network (DTN) in a FANET.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Donabedian Approach for Simulation Modeling to Evaluate the Quality of Emergency Medical Services in a Large Metropolitan Area: A Case Study","authors":"S. V. Begicheva","doi":"10.1109/AICT50176.2020.9368653","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368653","url":null,"abstract":"This study was carried out in order to develop a simulation model for a complex assessment of the quality of emergency medical services in a large metropolitan area. The study methods are based on the Donabedian model, a conceptual model that provides a framework for evaluating the quality of health care and emergency medical services. According to the Donabedian model, information about the quality of care can be drawn from three categories: the quality of structure, the quality of the process, and the quality of outcomes. The fourth category — environmental quality — is proposed to be added to the model in order to consider the specifics of emergency medical services in a large metropolitan area. The proposed conceptual model for the quality of emergency medical services defines the approach to emergency medical services modeling, i.e. creating a set of submodels that would allow assessing all the quality categories for emergency medical services. The paper includes a case study for such a model that combines methods from system dynamics and agent-based modeling. The study results can be used for health care institution modeling in order to lay down recommendations regarding how the health care institution management strategy can be improved.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of the N-gram Model for Azerbaijani Language","authors":"Aliya Bannayeva, Mustafa Aslanov","doi":"10.1109/AICT50176.2020.9368645","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368645","url":null,"abstract":"This research focuses on a text prediction model for the Azerbaijani language. Parsed and cleaned Azerbaijani Wikipedia is used as corpus for the language model. In total, there are more than a million distinct words and sentences, and over seven hundred million characters.For the language model itself, a statistical model with n-grams is implemented. N-grams are contiguous sequences of n strings or characters from a given sample of text or speech. The Markov Chain is used as the model to predict the next word.The Markov Chain focuses on the probabilities of the sequence of words in the n-grams, rather than the probabilities of the entire corpus. This simplifies the task at hand and yields in less computational overhead, while still maintaining sensible results. Logically, the higher the N in the n-grams, the more sensible the resulting prediction.Concretely, bigrams, trigrams, quadgrams and fivegrams are implemented. For the evaluation of the model, intrinsic type of evaluation is used, which computes the perplexity rate.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hadith Authenticity Prediction using Sentiment Analysis and Machine Learning","authors":"F. Haque, Anika Hossain Orthy, Shahnewaz Siddique","doi":"10.1109/AICT50176.2020.9368569","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368569","url":null,"abstract":"Starting around 815AD/200AH scholars have put immense effort towards gathering and sifting authentic hadiths, which are prophetic traditions of the Muslim community. The authenticity of a hadith solely depends on the reliability of its reporters and narrators. Till now scholars have had to do this task manually by precisely anatomizing each hadith’s chain of narrators or the list of people related to the transmission of a particular hadith. The evolution of modern computer science techniques has enabled new methods and introduced a potential paradigm shift in the science of hadith authentication. Focusing on the chain of narrators (also known as \"Isnad\") of a hadith, we have used a technique called ‘Sentiment Analysis’ from Natural Language Processing (NLP) to build a text classifier which tries to predict the authenticity of a hadith. It learns from our custom-made dataset of Isnads and predicts an unknown hadith to be either authentic or fabricated based upon its Isnad. Our classifier was 86% accurate when tested on the test hadith dataset.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}