The International Arab Journal of Information Technology最新文献

筛选
英文 中文
Persian Handwritten Digit Recognition Using Combination of Convolutional Neural Network and Support Vector Machine Methods 结合卷积神经网络和支持向量机方法的波斯语手写数字识别
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/16
M. Parseh, M. Rahmanimanesh, P. Keshavarzi
{"title":"Persian Handwritten Digit Recognition Using Combination of Convolutional Neural Network and Support Vector Machine Methods","authors":"M. Parseh, M. Rahmanimanesh, P. Keshavarzi","doi":"10.34028/iajit/17/4/16","DOIUrl":"https://doi.org/10.34028/iajit/17/4/16","url":null,"abstract":"Persian handwritten digit recognition is one of the important topics of image processing which significantly considered by researchers due to its many applications. The most important challenges in Persian handwritten digit recognition is the existence of various patterns in Persian digit writing that makes the feature extraction step to be more complicated. Since the handcraft feature extraction methods are complicated processes and their performance level are not stable, most of the recent studies have concentrated on proposing a suitable method for automatic feature extraction. In this paper, an automatic method based on machine learning is proposed for high-level feature extraction from Persian digit images by using convolutional neural network (CNN). After that, a non-linear multi-class SVM classifier is used for data classification instead of fully connected layer in final layer of CNN. The proposed method has been applied to HODA dataset and obtained 99.56% of recognition rate. Experimental results are comparable with previous state-of-the-art methods.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125789057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Intelligent Association Classification Technique for Phishing Website Detection 网络钓鱼网站检测的智能关联分类技术
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/7
Mustafa A. Al-Fayoumi, J. Alwidian, Mohammad Abusaif
{"title":"Intelligent Association Classification Technique for Phishing Website Detection","authors":"Mustafa A. Al-Fayoumi, J. Alwidian, Mohammad Abusaif","doi":"10.34028/iajit/17/4/7","DOIUrl":"https://doi.org/10.34028/iajit/17/4/7","url":null,"abstract":"Many critical applications need more accuracy and speed in the decision making process. Data mining scholars developed set of artificial automated tools to enhance the entire decisions based on type of application. Phishing is one of the most critical application needs for high accuracy and speed in decision making when a malicious webpage impersonates as legitimate webpage to acquire secret information from the user. In this paper, we proposed a new Association Classification (AC) algorithm as an artificial automated tool to increase the accuracy level of the classification process that aims to discover any malicious webpage. An Intelligent Association Classification (IAC) algorithm developed in this article by employing the Harmonic Mean measure instead of the support and confidence measure to solve the estimation problem in these measures and discovering hidden pattern not generated by the existing AC algorithms. Our algorithm compared with four well-known AC algorithm in terms of accuracy, F1, Precision, Recall and execution time. The experiments and the visualization process show that the IAC algorithm outperformed the others in all cases and emphasize on the importance of the general and specific rules in the classification process.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Design and Implementation of Inter-operable and Secure Agent Migration Protocol 可互操作的安全代理迁移协议的设计与实现
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/4
S. Shah, Jamil Ahmad, N. Rehman
{"title":"Design and Implementation of Inter-operable and Secure Agent Migration Protocol","authors":"S. Shah, Jamil Ahmad, N. Rehman","doi":"10.34028/iajit/17/4/4","DOIUrl":"https://doi.org/10.34028/iajit/17/4/4","url":null,"abstract":"Mobile agent technology is an active research topic and has found its uses in various diverse areas ranging from simple personal assistance to complex distributed big data systems. Its usage permits offline and autonomous execution as compared to classical distributed systems. The free roaming nature of agents makes it prone to several security threats during its transit state, with an added overhead in its interoperability among different types of platforms. To address these problems, both software and hardware based approaches have been proposed to ensure protection at various transit points. However, these approaches do not ensure interoperability and protection to agents during transit over a channel, simultaneously. In this regard, an agent requires a trustworthy, interoperable, and adaptive protocol for secure migration. In this paper, to answer these research issues, we first analyse security flaws in existing agent protection frameworks. Second, we implemented a novel migration architecture which is: (i) fully inter-operable compliance to the foundation for intelligent physical agents (FIPA) and (ii) trustworthy based on Computing Trusted Platform Module (TPM). The proposed approach is validated by testing on software TPM of IBM, JSR321, and jTPMTools as TPM and Trusted Computing Software Stack (TSS) interfaces, JADE-agent framework and JADE Inter-Platform Mobility Service (JIPMS). Validation is also performed on systems bearing physical TPM-chips. Moreover, some packages of JIPMS are also modified by embedding our proposed approach into their functions. Our performance results show that our approach merely adds an execution overhead during the binding and unbinding phases.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132143135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
3D Radon Transform for Shape Retrieval Using Bag-of-Visual-Features 基于视觉特征袋的三维Radon变换形状检索
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/5
Jinlin Ma, Ziping Ma
{"title":"3D Radon Transform for Shape Retrieval Using Bag-of-Visual-Features","authors":"Jinlin Ma, Ziping Ma","doi":"10.34028/iajit/17/4/5","DOIUrl":"https://doi.org/10.34028/iajit/17/4/5","url":null,"abstract":"In order to improve the accuracy and efficiency of extracting features for 3D models retrieval, a novel approach using 3D radon transform and Bag-of-Visual-Features is proposed in this paper. Firstly the 3D radon transform is employed to obtain a view image using the different features in different angels. Then a set of local descriptor vectors are extracted by the SURF algorithm from the local features of the view. The similarity distance between geometrical transformed models is evaluated by using K-means algorithm to verify the geometric invariance of the proposed method. The numerical experiments are conducted to evaluate the retrieval efficiency compared to other typical methods. The experimental results show that the change of parameters has small effect on the retrieval performance of the proposed method","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning 增强Bagging (eBagging):一种集成学习的新方法
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/10
Goksu Tuysuzoglu, Derya Birant
{"title":"Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning","authors":"Goksu Tuysuzoglu, Derya Birant","doi":"10.34028/iajit/17/4/10","DOIUrl":"https://doi.org/10.34028/iajit/17/4/10","url":null,"abstract":"Bagging is one of the well-known ensemble learning methods, which combines several classifiers trained on different subsamples of the dataset. However, a drawback of bagging is its random selection, where the classification performance depends on chance to choose a suitable subset of training objects. This paper proposes a novel modified version of bagging, named enhanced Bagging (eBagging), which uses a new mechanism (error-based bootstrapping) when constructing training sets in order to cope with this problem. In the experimental setting, the proposed eBagging technique was tested on 33 well-known benchmark datasets and compared with both bagging, random forest and boosting techniques using well-known classification algorithms: Support Vector Machines (SVM), decision trees (C4.5), k-Nearest Neighbour (kNN) and Naive Bayes (NB). The results show that eBagging outperforms its counterparts by classifying the data points more accurately while reducing the training error.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Conceptual Persian Text Summarizer: A New Model in Continuous Vector Space 概念波斯语文本摘要器:连续向量空间中的新模型
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/IAJIT/17/4/11
M. Khademi, M. Fakhredanesh, S. Hoseini
{"title":"Conceptual Persian Text Summarizer: A New Model in Continuous Vector Space","authors":"M. Khademi, M. Fakhredanesh, S. Hoseini","doi":"10.34028/IAJIT/17/4/11","DOIUrl":"https://doi.org/10.34028/IAJIT/17/4/11","url":null,"abstract":"Traditional methods of summarization are not cost-effective and possible today. Extractive summarization is a process that helps to extract the most important sentences from a text automatically, and generates a short informative summary. In this work, we propose a novel unsupervised method to summarize Persian texts. The proposed method adopt a hybrid approach that clusters the concepts of the text using deep learning and traditional statistical methods. First we produce a word embedding based on Hamshahri2 corpus and a dictionary of word frequencies. Then the proposed algorithm extracts the keywords of the document, clusters its concepts, and finally ranks the sentences to produce the summary. We evaluated the proposed method on Pasokh single-document corpus using the ROUGE evaluation measure. Without using any hand-crafted features, our proposed method achieves better results than the state-of-the-art related work results. We compared our unsupervised method with the best supervised Persian methods and we achieved an overall improvement of ROUGE-2 recall","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128765967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Swarm Intelligence Approach to QRS Detection QRS检测的群体智能方法
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/6
M. Belkadi, A. Daamouche
{"title":"Swarm Intelligence Approach to QRS Detection","authors":"M. Belkadi, A. Daamouche","doi":"10.34028/iajit/17/4/6","DOIUrl":"https://doi.org/10.34028/iajit/17/4/6","url":null,"abstract":"The QRS detection is a crucial step in ECG signal analysis; it has a great impact on the beats segmentation and in the final classification of the ECG signal. The Pan-Tompkins is one of the first and best-performing algorithms for QRS detection. It performs filtering for noise suppression, differentiation for slope dominance, and thresholding for decision making. All of the parameters of the Pan-Tompkins algorithm are selected empirically. However, we think that the Pan-Tompkins method can achieve better performance if the parameters were optimized. Therefore, we propose an adaptive algorithm that looks for the best set of parameters that improves the Pan-Tompkins algorithm performance. For this purpose, we formulate the parameter design as an optimization problem within a particle swarm optimization framework. Experiments conducted on the 24 hours recording of the MIT/BIH arrhythmia benchmark dataset achieved an overall accuracy of 99.83% which outperforms the stateof-the-art time-domain algorithms.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration 基于多用户协作的移动服务数据聚合框架
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/3
Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu
{"title":"Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration","authors":"Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu","doi":"10.34028/iajit/17/4/3","DOIUrl":"https://doi.org/10.34028/iajit/17/4/3","url":null,"abstract":"Considering the untrusted server, differential privacy and local differential privacy has been used for privacy-preserving in data aggregation. Through our analysis, differential privacy and local differential privacy cannot achieve Nash equilibrium between privacy and utility for mobile service based multiuser collaboration, which is multiuser negotiating a desired privacy budget in a collaborative manner for privacy-preserving. To this end, we proposed a Privacy-Preserving Data Aggregation Framework (PPDAF) that reached Nash equilibrium between privacy and utility. Firstly, we presented an adaptive Gaussian mechanism satisfying Nash equilibrium between privacy and utility by multiplying expected utility factor with conditional filtering noise under expected privacy budget. Secondly, we constructed PPDAF using adaptive Gaussian mechanism based on negotiating privacy budget with heuristic obfuscation. Finally, our theoretical analysis and experimental evaluation showed that the PPDAF could achieve Nash equilibrium between privacy and utility. Furthermore, this framework can be extended to engineering instances in a data aggregation setting","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128156331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Framework for Modelling Data Warehouse Systems Using UML Profile 使用UML概要文件对数据仓库系统建模的改进框架
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/15
M. Babar, Akmal Saeed Khattak, F. Arif, M. Tariq
{"title":"An Improved Framework for Modelling Data Warehouse Systems Using UML Profile","authors":"M. Babar, Akmal Saeed Khattak, F. Arif, M. Tariq","doi":"10.34028/iajit/17/4/15","DOIUrl":"https://doi.org/10.34028/iajit/17/4/15","url":null,"abstract":"Data Warehouse (DW) applications provide past detail for judgment process for the companies. It is acknowledged that these systems depend on Multidimensional (MD) modelling different from traditional database modelling. MD modelling keeps data in the form of facts and dimensions. Some proposals have been presented to achieve the modelling of these systems, but none of them covers the MD modelling completely. There is no any approach which considers all the major components of MD systems. Some proposals provide their proprietary visual notations, which force the architects to gain knowledge of new precise model. This paper describes a framework which is in the form of an extension to Unified Modelling Language (UML). UML is worldwide known to design a variety of perspectives of software systems. Therefore, any method using the UML reduces the endeavour of designers in understanding the novel notations. Another exceptional characteristic of the UML is that it can be extended to bring in novel elements for different domains. In addition, the proposed UML profile focuses on the accurate representations of the properties of the MD systems based on domain specific information. The proposed framework is validated using a specific case study. Moreover, an evaluation and comparative analysis of the proposed framework is also provided to show the efficiency of the proposed work.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117071491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finger Knuckle Print Recognition using MMDA with Fuzzy Vault 基于模糊Vault的MMDA指关节指纹识别
The International Arab Journal of Information Technology Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/14
MuthuKumar Arunachalamand, Kavipriya Amuthan
{"title":"Finger Knuckle Print Recognition using MMDA with Fuzzy Vault","authors":"MuthuKumar Arunachalamand, Kavipriya Amuthan","doi":"10.34028/iajit/17/4/14","DOIUrl":"https://doi.org/10.34028/iajit/17/4/14","url":null,"abstract":"Currently frequent biometric scientific research such as with biometric applications like face, iris, voice, hand-based biometrics traits like palm print and fingerprint technique are utilized for spotting out the persons. These specific biometrics habits have their own improvement and weakness so that no particular biometrics can adequately opt for all terms like the accuracy and cost of all applications. In recent times, in addition, to distinct with the hand-based biometrics technique, Finger Knuckle Print (FKP) has been appealed to boom the attention among biometric researchers. The image template pattern formation of FKP embraces the report that is suitable for spotting the uniqueness of individuality. This FKP trait observes a person based on the knuckle print and the framework in the outer finger surface. This FKP feature determines the line anatomy and finger structures which are well established and persistent throughout the life of an individual. In this paper, a novel method for personal identification will be introduced, along with that data to be stored in a secure way has also been proposed. The authentication process includes the transformation of features using 2D Log Gabor filter and Eigen value representation of Multi-Manifold Discriminant Analysis (MMDA) of FKP. Finally, these features are grouped using k-means clustering for both identification and verification process. This proposed system is initialized based on the FKP framework without a template based on the fuzzy vault. The key idea of fuzzy vault storing is utilized to safeguard the secret key in the existence of random numbers as chaff pints.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信