Proceedings of the Fourth International Conference on Engineering & MIS 2018最新文献

筛选
英文 中文
Genetic Algorithm for finding shortest paths Problem 求解最短路径问题的遗传算法
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234725
Shaymaa Y. Al-Hayali, O. Ucan, O. Bayat
{"title":"Genetic Algorithm for finding shortest paths Problem","authors":"Shaymaa Y. Al-Hayali, O. Ucan, O. Bayat","doi":"10.1145/3234698.3234725","DOIUrl":"https://doi.org/10.1145/3234698.3234725","url":null,"abstract":"Genetic algorithm is used for analyzing business problems mostly applied to find solution for business challenges. Genetic algorithm generates many solutions to a single problem each one with different performance some are better than other in performance. Finding shortest path has many applications in different fields. The purpose of this paper is to find the business problem related to supermarkets and give the solution to this problem using genetic algorithm. In this paper we chose supermarkets in different location and we want to find the shortest path for the manager to visit among these supermarkets with shortest distance, therefore in genetic algorithm the evaluation function finds all the relevant variables of Geno type and then evaluates fitness function on these Geno variables using crossover and mutation techniques for sorting out relevant values. In GA the fitness function is the total time elapsed for the target to achieve their goal. We use the fitness function on population data with respect to crossover and mutation function for training datasets. The main problems in Business, science and engineering are to find the short path in different activities like visiting different places or transferring some data in minimum time. The genetic algorithm provides efficient method to provide optimizations of these problems. To solve the supermarket manger traveling problem we encode the datasets of our problem using GA and initialize all the variables. The estimation values of the locations are set as a parameter to genetic algorithm and find the best method by using the MDL technique (Minimum Description length). Genetic algorithms are very efficient for selection and genetics of natural values.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125643918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Bilinear Pairing Based Key Management Security Scheme to NEMO in Heterogeneous Networks 异构网络中基于双线性配对的NEMO密钥管理安全方案
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234738
Vikram Raju R, U. Rawat, K. Garg
{"title":"A Bilinear Pairing Based Key Management Security Scheme to NEMO in Heterogeneous Networks","authors":"Vikram Raju R, U. Rawat, K. Garg","doi":"10.1145/3234698.3234738","DOIUrl":"https://doi.org/10.1145/3234698.3234738","url":null,"abstract":"Network Mobility (NEMO) is invented for providing internet to group of nodes (smart phones, ipad and laptop).It is inherited from Mobile IPv6. There are security threats inside the NEMO during handoff while exchanging Binding Updates (BU) between the Mobile Network Node (MNN), Correspondent Node (CN) and Home Agent (HA). It may prone to several malicious attacks also during the network address exchange between nodes inside the NEMO. A proper end-to-end security mechanism is required to protect the Binding Update and Binding Acknowledgement. We have proposed a security architecture to provide authentication and confidentiality at each and every level of communication (MNN ↔ HA, MR ↔ HA, MNN ↔ CN)using a 3-Party Key Exchange called (3-PKE-NEMO) with the help of Bilinear Pairing Theorem. This architecture also provides security to Route Optimization (RO). We have minimized handoff delay and shown results using the NS2 simulator without compromising the security. Our security architecture is found to be more efficient when compared with related existing solutions.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methodology Preview on Predicting Students Professional Identity Using Data Mining Techniques 使用数据挖掘技术预测学生职业认同的方法论预览
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234754
S. Kurnaz, Raya Mohammed Mahmood
{"title":"Methodology Preview on Predicting Students Professional Identity Using Data Mining Techniques","authors":"S. Kurnaz, Raya Mohammed Mahmood","doi":"10.1145/3234698.3234754","DOIUrl":"https://doi.org/10.1145/3234698.3234754","url":null,"abstract":"This methodology aimed to predict Professional Identity Development (PID) of Altinbas University students using survey called Professional Identity Five Factor Scale(PIFFS) which will be applied to sample of the students and analyzing the results using data mining techniques and machine learning algorithms. The accuracy and speed comparison will be generated between single and distributed database of the corresponding survey data which is launched to a local web server(apache) in comparison to windows Azure (as cloud server) to clarify the effect of using different platforms and database techniques on prediction accuracy.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Existence of Solutions to the Elliptic Equations with Critical Sobolev-Hardy Exponent 具有临界Sobolev-Hardy指数的椭圆方程解的存在性
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234748
A. Matallah, S. Litimein
{"title":"Existence of Solutions to the Elliptic Equations with Critical Sobolev-Hardy Exponent","authors":"A. Matallah, S. Litimein","doi":"10.1145/3234698.3234748","DOIUrl":"https://doi.org/10.1145/3234698.3234748","url":null,"abstract":"In this paper, we use variational methods to study the existence of solutions for a nonhomogeneous with critical Sobolev-Hardy exponent.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"165 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilateration-based Event Identification in a Wireless Sensor Network 基于多边的无线传感器网络事件识别
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234759
M. Mahmood, I. Welch, M. K. Kasi
{"title":"Multilateration-based Event Identification in a Wireless Sensor Network","authors":"M. Mahmood, I. Welch, M. K. Kasi","doi":"10.1145/3234698.3234759","DOIUrl":"https://doi.org/10.1145/3234698.3234759","url":null,"abstract":"Accurately identifying the event detected by the nodes is one of the important characteristics of event-driven applications in Wireless Sensor Networks (WSNs). In a resource-constrained WSN, event identification plays a significant role in identifying similar events reported by the sensor nodes placed in close proximity to each other. This improves the event reliability and also helps in suppressing the dissemination of similar event's information to the sink node. In this paper, we propose to use multilateration-based technique for event identification in a WSN. We performed simulations and provide results for estimation error in identifying the events location.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bacterial infection in Tunisian patients admitted to the emergency room for exacerbation of chronic obstructive pulmonary disease: role of acute Chlamydophila pneumoniae infection 因慢性阻塞性肺病加重而入住急诊室的突尼斯病人的细菌感染:急性肺炎衣原体感染的作用
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234750
S. Messous, M. Grissa, Malek Mzali
{"title":"Bacterial infection in Tunisian patients admitted to the emergency room for exacerbation of chronic obstructive pulmonary disease: role of acute Chlamydophila pneumoniae infection","authors":"S. Messous, M. Grissa, Malek Mzali","doi":"10.1145/3234698.3234750","DOIUrl":"https://doi.org/10.1145/3234698.3234750","url":null,"abstract":"To investigate the frequency of respiratory bacterial infections included the role of atypical bacteria such as Chlamydophila pneumoniae and Mycoplasma pneumonia in hospitalized patients admitted to the emergency room for an acute episode of chronic obstructive pulmonary disease (COPD). Prospective observational study conducted on 50 consecutive patients. Serum specimens were collected at days 0 and 15. C. pneumoniae and M pneumoniae antibodies (IgM and IgG) were tested by commercial ELISA and immunofluorescence assay, respectively. At least one sample of spontaneously expectorated sputum for microbiologic evaluation was obtained in all patients during admission. No acute M. pneumoniae infection was recorded; by contrast 7 patients (14%) showed a profile compatible with a recent C. pneumoniae infection. Demographic and clinical parameters did not differ between patients with and without stigmata of recent C. pneumoniae infection. Eleven patients (22%) had positive sputum cultures, indicating the presence of bacterial infection. Pathogens most frequently isolated were: Pseudomonas aeruginosa (n=4), Haemophilus influenzae (n=2), and Klebsiella pneumoniae (n=2).","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114626012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using a Robot Trader for Automatic Trading 使用机器人交易员进行自动交易
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234701
Khalid Abouloula, S. Krit
{"title":"Using a Robot Trader for Automatic Trading","authors":"Khalid Abouloula, S. Krit","doi":"10.1145/3234698.3234701","DOIUrl":"https://doi.org/10.1145/3234698.3234701","url":null,"abstract":"The main goal of this paper is the study of the robot trader approaches in order to use them in automatic trading, and we propose some technical indicators and modules to uses it in a robot trader for an automate trading; we can signalize trading in two main groups, Discretionary trading and Algorithmic trading. The first based on market knowledge, some news, of the trader's intuition. The second consists of two activities: Stock exchange transactions assisted by algorithms that anticipate and promote opportunities for arbitrage, and automated trading that uses algorithms and strategies that are set up as autonomous agent that perform transactions.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128882807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effect of temperature on the photocatalytic degradation of a residue of an antibiotic in urban wastewater 温度对光催化降解城市废水中抗生素残留的影响
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234728
H. Ghoualem, Naitali Fateh
{"title":"Effect of temperature on the photocatalytic degradation of a residue of an antibiotic in urban wastewater","authors":"H. Ghoualem, Naitali Fateh","doi":"10.1145/3234698.3234728","DOIUrl":"https://doi.org/10.1145/3234698.3234728","url":null,"abstract":"Several studies showed that pharmaceutical waste is added to treatment plants or their decontamination by the activated sludge proves ineffective in some cases. The presence of drugs residues in water is related to issued releases throughout their life cycle (manufacturing of active ingredients, their use in human and veterinary medicine, the collection and destruction of drugs not used). Advanced oxidation techniques are methods of effluent treatment both liquid and gas that have evolved rapidly. The aim of this work is to study the effect of temperature on the photocatalytic degradation of of an antibiotic contained in waste water by zinc oxide in a spiral reactor. The results showed that the temperature has a favorable effect on the physicochemical parameters studied (pH, turbidity, surface tension and COD).","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"151 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134162890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Forensics Tools and Security Mechanism: Survey Paper Android取证工具和安全机制:调查报告
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234710
Nisreen Amer, Yahia Al-Halabi
{"title":"Android Forensics Tools and Security Mechanism: Survey Paper","authors":"Nisreen Amer, Yahia Al-Halabi","doi":"10.1145/3234698.3234710","DOIUrl":"https://doi.org/10.1145/3234698.3234710","url":null,"abstract":"the smarphones technology and capability have been developed dramatically for the past few decades alongside to the areas it is used in. They may have lots of personal and business critical data that are phone to all kind of attackers and for different kind of reasons. Android is one of the most popular operating system (OS) in the mobile field as it is an open source OS which has an accessible code that could be viewed by anyone. This in turn creates a huge hole in the security system and connect the privacy of users together which could have different consequence. This paper will present Android structure and general information about its security mechanisms and the important threats it faces as well as the main artifacts. Additionally, it shows how they will be retrieved by presenting simple comparison between some forensics tools in order to build a study on the nature of Android and how to retrieve data that might be an important evidences and leads for certain case so that it will benefit anyone interested in the field.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of Semantic Web applications: state of art and critical review 语义Web应用程序的开发:现状与评论
Proceedings of the Fourth International Conference on Engineering & MIS 2018 Pub Date : 2018-06-19 DOI: 10.1145/3234698.3234753
S. Krit, M. El Asikri, B. El Habil, H. Chaib, M. Benaddy, Mourad Elouali
{"title":"Development of Semantic Web applications: state of art and critical review","authors":"S. Krit, M. El Asikri, B. El Habil, H. Chaib, M. Benaddy, Mourad Elouali","doi":"10.1145/3234698.3234753","DOIUrl":"https://doi.org/10.1145/3234698.3234753","url":null,"abstract":"Ontologies have recently received popularity in the area of knowledge management and knowledge sharing, especially after the evolution of the Semantic Web and its supporting technologies. An ontology defines the terms and concepts (meaning) used to describe and represent an area of knowledge. The aim of this paper is to identify the basics notions of ontologies and ontology management tools specially protégé that are freely available and the process development of semantic web notions. The Semantic Web vision have lead to a number of standards such as OWL and Web Semantic Mining. While these standards provide a technical infrastructure, developers have little guidance on how to build real-world Semantic Web applications. We will start by some definitions of Semantic Web and the common points with Web Mining. We will illustrate how these notions can be put into practice using the modern Semantic Web development tool Protege, and indicate future possibilities;","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信