2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Transformation, Analysis and Visualization of Distributed Temperature Sensing Data generated by Oil Wells 油井分布式温度传感数据的转换、分析与可视化
I. Karimov, S. Jafarova, M. Zeynalli, S. Rustamov, A. Adamov, Aslan Babakhanov
{"title":"Transformation, Analysis and Visualization of Distributed Temperature Sensing Data generated by Oil Wells","authors":"I. Karimov, S. Jafarova, M. Zeynalli, S. Rustamov, A. Adamov, Aslan Babakhanov","doi":"10.1109/AICT50176.2020.9368862","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368862","url":null,"abstract":"This research paper examines the full lifecycle of the case of turning the gas and oil industry to a data-driven operation model. The study presents the approach of re-engineering production data, building a predictive model for temperature forecast, statistical analysis, and visualization of Distributed Temperature Sensing (DTS) data provided by the oil-gas industry. For better analysis, the raw data have been pre-processed and organized according to the proper model. Furthermore, after the data organization, we proceed with observing relationships among three features (Date, Depth and Temperature), analyze vague upheavals and similarities utilizing plot histograms, scatterplots, box plots, heatmaps, violin plots for better visualization. Since the drastic temperature change indicates the anomaly, several alternative Outlier Detection Techniques are offered to predict early equipment failure and prevent production outage. Our results indicated a high correlation between depth and temperature, presence of trend in temperature distribution, and temperature drops in specific ranges. Proper analysis of the data allows the specialist to understand reservoir performance and prolong the production file of the wells.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm for the Abnormal Ventricular Electrical Excitation Detection 异常心室电兴奋检测算法
Z. Yuldashev, A. Nemirko, D. Ripka
{"title":"Algorithm for the Abnormal Ventricular Electrical Excitation Detection","authors":"Z. Yuldashev, A. Nemirko, D. Ripka","doi":"10.1109/AICT50176.2020.9368866","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368866","url":null,"abstract":"Detection algorithm of the ventricular late potentials using surface ECG signal for the diagnostics of abnormal electrical excitation of ventricular myocardium is developed, ventricular late potentials indicators reflecting the area size and degree of the ventricular excitation abnormality, verification method of abnormality detection using intracardial electrograms are suggested.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flying Ad hoc Network Expedited by DTN Scenario: Reliable and Cost-effective MAC Protocols Perspective 由DTN场景加速的飞行自组织网络:可靠和经济的MAC协议的观点
Sobiya Arsheen, A. Wahid, Khaleel Ahmad, Khujamatov Khalim
{"title":"Flying Ad hoc Network Expedited by DTN Scenario: Reliable and Cost-effective MAC Protocols Perspective","authors":"Sobiya Arsheen, A. Wahid, Khaleel Ahmad, Khujamatov Khalim","doi":"10.1109/AICT50176.2020.9368575","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368575","url":null,"abstract":"Flying Adhoc Network (FANET) is an emerging topic of research in the wireless network area, FANET has several common features with its predecessor e.g. Mobile Adhoc Network (MANET) and Vehicle Adhoc Network (VANET), but the network has several unique features also which make it different from other networks. The sparseness of nodes, coupled with frequent changing of topology significantly affects the data transmission rate of the network. To overcome this problem, FANET can be assisted with Delay Tolerant Network (DTN) approach to exploit its mobility and routing features. The main aim of this work is to make Flying Adhoc Network reliable by deploying two MAC protocols i.e. IEEE 802.11 and IEEE 802.15 and realize the functionality of Delay Tolerant Network (DTN) in a FANET.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Web-based Sound and Speech Training Software to Help Hearing-impaired People 帮助听障人士的基于网络的声音和语言训练软件
M. Farkhadov, N. Petukhova, Mukhabbat Farkhadova
{"title":"Web-based Sound and Speech Training Software to Help Hearing-impaired People","authors":"M. Farkhadov, N. Petukhova, Mukhabbat Farkhadova","doi":"10.1109/AICT50176.2020.9368675","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368675","url":null,"abstract":"This paper proposes a computerized audio simulator to teach how to correctly pronounce sounds, syllables, and words of the Russian language; the simulator is based on automatic speech recognition systems. The sound and speech simulator is designed to help hearing-impaired people to learn how to correctly pronounce sounds. If we deploy such a service on the Internet and provide high-speed online access to the service, we significantly increase the number of people who can learn how to pronounce sounds.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threats Classification Method for the Transport Infrastructure of a Smart City 智慧城市交通基础设施威胁分类方法
K. Izrailov, A. Chechulin, L. Vitkova
{"title":"Threats Classification Method for the Transport Infrastructure of a Smart City","authors":"K. Izrailov, A. Chechulin, L. Vitkova","doi":"10.1109/AICT50176.2020.9368828","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368828","url":null,"abstract":"The concept of a Smart City is the forefront in the development of our near future. One of the most important parts of such cities is the transport infrastructure. Threats implementation for such infrastructure can have critical consequences for a city. To prevent such threats in the future we should investigate and counteraction them in the present. The first step in this way can be the creation of a threats classification for the transport infrastructure of a Smart City. The paper describes a set of methods that can be used for this. As a result, a scheme for categorical and cluster classifications creation is proposed. The categorical classification relies on the division of categories for elements grouping. The cluster one uses machine learning methods for elements grouping. Examples of classifications applying for the top-10 threats from the official state database are given.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement the schemes and models of detecting network traffic anomalies on computer systems 改进计算机系统网络流量异常检测的方案和模型
Yusupov Sabirjan Yusupdjanovich, Gulomov Sherzod Rajaboevich
{"title":"Improvement the schemes and models of detecting network traffic anomalies on computer systems","authors":"Yusupov Sabirjan Yusupdjanovich, Gulomov Sherzod Rajaboevich","doi":"10.1109/AICT50176.2020.9368781","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368781","url":null,"abstract":"This paper proposes an approach to the classification of network anomalies and provides a description of the relationship of anomalies classified due to the occurrence and nature of changes in network traffic. A scheme for detecting network anomalies and abuses based on network traffic indicators also models for identifying and detecting network anomalies are presented.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Experimental Design Approach to Analyse the Performance of Island-Based Parallel Artificial Bee Colony Algorithm 基于孤岛的并行人工蜂群算法性能分析的实验设计方法
Thaer Thaher, Badie Sartawi
{"title":"An Experimental Design Approach to Analyse the Performance of Island-Based Parallel Artificial Bee Colony Algorithm","authors":"Thaer Thaher, Badie Sartawi","doi":"10.1109/AICT50176.2020.9368747","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368747","url":null,"abstract":"The Artificial Bee Colony (ABC) is a novel nature-inspired metaheuristic optimization algorithm that mimics the behavior of honey bees searching for food sources. The main drawback of ABC, similar to the most of metaheuristics, is the premature convergence (i.e., the earlier stuck into local optima). Recently, the structured population approach, in which the individuals are distributed into multiple sub-populations (called islands), has been widely exploited to maintain the required diversity during the search process and thus reducing the prematurity problem. In this paper, the island model, which is a common structured population approach, is incorporated with the ABC to introduce a parallel variant called (iABC). Besides, an experimental design approach is proposed to analyze the sensitivity of iABC to the parameters of the island model as well as the main specific parameters. The linear regression model and the Analysis of variance (ANOVA) are utilized to estimate the effect of parameters and identify the importance of them. Two well-known benchmark functions are used for evaluation purposes. Experimental results revealed that most parameters and their low-order interactions have a significant influence on the performance of the iABC. Furthermore, the proposed iABC proved its superiority compared to other state-of-the-art algorithms.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114779960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reliable Priority Based QoS Real-Time Traffic Routing in VANET: Open Issues & Parameter VANET中基于可靠优先级的QoS实时流量路由:开放问题与参数
K. Nisar, A. Mu'azu, Ibrahim A. Lawal, Sohrab Khan, Shuaib K. Memon
{"title":"Reliable Priority Based QoS Real-Time Traffic Routing in VANET: Open Issues & Parameter","authors":"K. Nisar, A. Mu'azu, Ibrahim A. Lawal, Sohrab Khan, Shuaib K. Memon","doi":"10.1109/AICT50176.2020.9368689","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368689","url":null,"abstract":"It has proven that to provide priority to different traffic types in wireless vehicular networking (VANET) is attracting wide attention for guaranteeing high quality real-time traffic routing. Choosing a reliable and stable route with Quality of Service (QoS) constraints is always a challenging task because of the high mobility in VANET. This paper proposes an approach that prioritizes the transmission of traffic data packet according to the transmission distance and urgency metrics of messages before making a selection of routes. The approach utilizes a priority classifying a mechanism to differentiate traffic information into various priorities imposed in the VANET communications. The performance of the proposed approach was simulated extensively using NCTUns simulator in terms of throughput, packet loss and delay. The results obtained show efficient solutions on the impact of mobility for the prioritized flows in enhancing safety messaging. This approach makes safety messages to be transmitted with high reliability and low delay as compared to non-prioritized traffic flows.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Explained Artificial Intelligence Helps to Integrate Artificial and Human Intelligence Into Medical Diagnostic Systems: Analytical Review of Publications 解释人工智能有助于将人工智能和人类智能集成到医疗诊断系统中:出版物的分析评论
M. Farkhadov, Aleksander Eliseev, N. Petukhova
{"title":"Explained Artificial Intelligence Helps to Integrate Artificial and Human Intelligence Into Medical Diagnostic Systems: Analytical Review of Publications","authors":"M. Farkhadov, Aleksander Eliseev, N. Petukhova","doi":"10.1109/AICT50176.2020.9368576","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368576","url":null,"abstract":"Artificial intelligence-based medical systems can by now diagnose various disorders highly accurately. However, we should stress that despite encouraging and ever improving results, people still distrust such systems. We review relevant publications over the past five years, to identify the main causes of such mistrust and ways to overcome it. Our study showes that the main reasons to distrust these systems are opaque models, blackbox algorithms, and potentially unrepresentful training samples. We demonstrate that explainable artificial intelligence, aimed to create more user-friendly and understandable systems, has become a noticeable new topic in theoretical research and practical development. Another notable trend is to develop approaches to build hybrid systems, where artificial and human intelligence interact according to the teamwork model.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133692436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Secured Service Provisioning for the Internet of Healthcare Things 面向医疗物联网的安全服务配置
Fahiba Farhin, M. S. Kaiser, M. Mahmud
{"title":"Towards Secured Service Provisioning for the Internet of Healthcare Things","authors":"Fahiba Farhin, M. S. Kaiser, M. Mahmud","doi":"10.1109/AICT50176.2020.9368580","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368580","url":null,"abstract":"The Internet of Healthcare Things (IoHT) is an emerging intelligent pervasive framework that interconnects smart healthcare devices, stakeholders (e.g., doctors, patients, researchers, healthcare professionals, etc.), and infrastructure using smart sensors. Emergence of novel tools and techniques for data sensing and analysis during the last decade have allowed many researchers to develop and deliver services tailored for the IoHT. This resulted in a considerable number of research outcomes addressing the applications, challenges, and probable solutions targeting secured communication within the IoHT framework. Despite considerable efforts dedicated to it, secured service provisioning still remains as a major challenge. This work provides a detailed account on the current challenges and solutions towards providing secured service provisioning focusing on the IoHT attacks and countermeasures with an aim to facilitate more investigation in this area.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117314004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信