{"title":"Genetic Algorithm for finding shortest paths Problem","authors":"Shaymaa Y. Al-Hayali, O. Ucan, O. Bayat","doi":"10.1145/3234698.3234725","DOIUrl":"https://doi.org/10.1145/3234698.3234725","url":null,"abstract":"Genetic algorithm is used for analyzing business problems mostly applied to find solution for business challenges. Genetic algorithm generates many solutions to a single problem each one with different performance some are better than other in performance. Finding shortest path has many applications in different fields. The purpose of this paper is to find the business problem related to supermarkets and give the solution to this problem using genetic algorithm. In this paper we chose supermarkets in different location and we want to find the shortest path for the manager to visit among these supermarkets with shortest distance, therefore in genetic algorithm the evaluation function finds all the relevant variables of Geno type and then evaluates fitness function on these Geno variables using crossover and mutation techniques for sorting out relevant values. In GA the fitness function is the total time elapsed for the target to achieve their goal. We use the fitness function on population data with respect to crossover and mutation function for training datasets. The main problems in Business, science and engineering are to find the short path in different activities like visiting different places or transferring some data in minimum time. The genetic algorithm provides efficient method to provide optimizations of these problems. To solve the supermarket manger traveling problem we encode the datasets of our problem using GA and initialize all the variables. The estimation values of the locations are set as a parameter to genetic algorithm and find the best method by using the MDL technique (Minimum Description length). Genetic algorithms are very efficient for selection and genetics of natural values.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125643918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bilinear Pairing Based Key Management Security Scheme to NEMO in Heterogeneous Networks","authors":"Vikram Raju R, U. Rawat, K. Garg","doi":"10.1145/3234698.3234738","DOIUrl":"https://doi.org/10.1145/3234698.3234738","url":null,"abstract":"Network Mobility (NEMO) is invented for providing internet to group of nodes (smart phones, ipad and laptop).It is inherited from Mobile IPv6. There are security threats inside the NEMO during handoff while exchanging Binding Updates (BU) between the Mobile Network Node (MNN), Correspondent Node (CN) and Home Agent (HA). It may prone to several malicious attacks also during the network address exchange between nodes inside the NEMO. A proper end-to-end security mechanism is required to protect the Binding Update and Binding Acknowledgement. We have proposed a security architecture to provide authentication and confidentiality at each and every level of communication (MNN ↔ HA, MR ↔ HA, MNN ↔ CN)using a 3-Party Key Exchange called (3-PKE-NEMO) with the help of Bilinear Pairing Theorem. This architecture also provides security to Route Optimization (RO). We have minimized handoff delay and shown results using the NS2 simulator without compromising the security. Our security architecture is found to be more efficient when compared with related existing solutions.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology Preview on Predicting Students Professional Identity Using Data Mining Techniques","authors":"S. Kurnaz, Raya Mohammed Mahmood","doi":"10.1145/3234698.3234754","DOIUrl":"https://doi.org/10.1145/3234698.3234754","url":null,"abstract":"This methodology aimed to predict Professional Identity Development (PID) of Altinbas University students using survey called Professional Identity Five Factor Scale(PIFFS) which will be applied to sample of the students and analyzing the results using data mining techniques and machine learning algorithms. The accuracy and speed comparison will be generated between single and distributed database of the corresponding survey data which is launched to a local web server(apache) in comparison to windows Azure (as cloud server) to clarify the effect of using different platforms and database techniques on prediction accuracy.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Existence of Solutions to the Elliptic Equations with Critical Sobolev-Hardy Exponent","authors":"A. Matallah, S. Litimein","doi":"10.1145/3234698.3234748","DOIUrl":"https://doi.org/10.1145/3234698.3234748","url":null,"abstract":"In this paper, we use variational methods to study the existence of solutions for a nonhomogeneous with critical Sobolev-Hardy exponent.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"165 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilateration-based Event Identification in a Wireless Sensor Network","authors":"M. Mahmood, I. Welch, M. K. Kasi","doi":"10.1145/3234698.3234759","DOIUrl":"https://doi.org/10.1145/3234698.3234759","url":null,"abstract":"Accurately identifying the event detected by the nodes is one of the important characteristics of event-driven applications in Wireless Sensor Networks (WSNs). In a resource-constrained WSN, event identification plays a significant role in identifying similar events reported by the sensor nodes placed in close proximity to each other. This improves the event reliability and also helps in suppressing the dissemination of similar event's information to the sink node. In this paper, we propose to use multilateration-based technique for event identification in a WSN. We performed simulations and provide results for estimation error in identifying the events location.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bacterial infection in Tunisian patients admitted to the emergency room for exacerbation of chronic obstructive pulmonary disease: role of acute Chlamydophila pneumoniae infection","authors":"S. Messous, M. Grissa, Malek Mzali","doi":"10.1145/3234698.3234750","DOIUrl":"https://doi.org/10.1145/3234698.3234750","url":null,"abstract":"To investigate the frequency of respiratory bacterial infections included the role of atypical bacteria such as Chlamydophila pneumoniae and Mycoplasma pneumonia in hospitalized patients admitted to the emergency room for an acute episode of chronic obstructive pulmonary disease (COPD). Prospective observational study conducted on 50 consecutive patients. Serum specimens were collected at days 0 and 15. C. pneumoniae and M pneumoniae antibodies (IgM and IgG) were tested by commercial ELISA and immunofluorescence assay, respectively. At least one sample of spontaneously expectorated sputum for microbiologic evaluation was obtained in all patients during admission. No acute M. pneumoniae infection was recorded; by contrast 7 patients (14%) showed a profile compatible with a recent C. pneumoniae infection. Demographic and clinical parameters did not differ between patients with and without stigmata of recent C. pneumoniae infection. Eleven patients (22%) had positive sputum cultures, indicating the presence of bacterial infection. Pathogens most frequently isolated were: Pseudomonas aeruginosa (n=4), Haemophilus influenzae (n=2), and Klebsiella pneumoniae (n=2).","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114626012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using a Robot Trader for Automatic Trading","authors":"Khalid Abouloula, S. Krit","doi":"10.1145/3234698.3234701","DOIUrl":"https://doi.org/10.1145/3234698.3234701","url":null,"abstract":"The main goal of this paper is the study of the robot trader approaches in order to use them in automatic trading, and we propose some technical indicators and modules to uses it in a robot trader for an automate trading; we can signalize trading in two main groups, Discretionary trading and Algorithmic trading. The first based on market knowledge, some news, of the trader's intuition. The second consists of two activities: Stock exchange transactions assisted by algorithms that anticipate and promote opportunities for arbitrage, and automated trading that uses algorithms and strategies that are set up as autonomous agent that perform transactions.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128882807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of temperature on the photocatalytic degradation of a residue of an antibiotic in urban wastewater","authors":"H. Ghoualem, Naitali Fateh","doi":"10.1145/3234698.3234728","DOIUrl":"https://doi.org/10.1145/3234698.3234728","url":null,"abstract":"Several studies showed that pharmaceutical waste is added to treatment plants or their decontamination by the activated sludge proves ineffective in some cases. The presence of drugs residues in water is related to issued releases throughout their life cycle (manufacturing of active ingredients, their use in human and veterinary medicine, the collection and destruction of drugs not used). Advanced oxidation techniques are methods of effluent treatment both liquid and gas that have evolved rapidly. The aim of this work is to study the effect of temperature on the photocatalytic degradation of of an antibiotic contained in waste water by zinc oxide in a spiral reactor. The results showed that the temperature has a favorable effect on the physicochemical parameters studied (pH, turbidity, surface tension and COD).","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"151 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134162890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android Forensics Tools and Security Mechanism: Survey Paper","authors":"Nisreen Amer, Yahia Al-Halabi","doi":"10.1145/3234698.3234710","DOIUrl":"https://doi.org/10.1145/3234698.3234710","url":null,"abstract":"the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Krit, M. El Asikri, B. El Habil, H. Chaib, M. Benaddy, Mourad Elouali
{"title":"Development of Semantic Web applications: state of art and critical review","authors":"S. Krit, M. El Asikri, B. El Habil, H. Chaib, M. Benaddy, Mourad Elouali","doi":"10.1145/3234698.3234753","DOIUrl":"https://doi.org/10.1145/3234698.3234753","url":null,"abstract":"Ontologies have recently received popularity in the area of knowledge management and knowledge sharing, especially after the evolution of the Semantic Web and its supporting technologies. An ontology defines the terms and concepts (meaning) used to describe and represent an area of knowledge. The aim of this paper is to identify the basics notions of ontologies and ontology management tools specially protégé that are freely available and the process development of semantic web notions. The Semantic Web vision have lead to a number of standards such as OWL and Web Semantic Mining. While these standards provide a technical infrastructure, developers have little guidance on how to build real-world Semantic Web applications. We will start by some definitions of Semantic Web and the common points with Web Mining. We will illustrate how these notions can be put into practice using the modern Semantic Web development tool Protege, and indicate future possibilities;","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}