2020 6th International Conference on Web Research (ICWR)最新文献

筛选
英文 中文
A New Method for Intrusion Detection on RPL Routing Protocol Using Fuzzy Logic 基于模糊逻辑的RPL路由协议入侵检测新方法
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122278
Behnam Farzaneh, Mohammad Koosha, Elahe Boochanpour, Emad Alizadeh
{"title":"A New Method for Intrusion Detection on RPL Routing Protocol Using Fuzzy Logic","authors":"Behnam Farzaneh, Mohammad Koosha, Elahe Boochanpour, Emad Alizadeh","doi":"10.1109/ICWR49608.2020.9122278","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122278","url":null,"abstract":"The Internet of Things (IoT) is a new concept in the world of technology and communications for the description of the future in which physical objects or sensor nodes connect to the Internet using IPv6. One of the most prominent protocols used on the IoT for routing is RPL (IPv6 Routing Protocol for Low power and Lossy Networks) that could be exposed to specific attacks like the Local Repair attack. Hence, researchers focus on RPL security as the most important challenge at this protocol. In this paper, we proposed a new Fuzzy-based method for the detection of Local Repair Attack on the RPL routing protocol. The obtained results using the Cooja simulator in the Contiki OS show that the proposed method detects the Local Repair attack with a very high True Positive Rate (TPR) and very low False Positive Rate (FPR).","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A New Metric to Evaluate Network Robustness 一种评价网络鲁棒性的新指标
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122284
Maliheh Ghomsheh, A. Kamandi
{"title":"A New Metric to Evaluate Network Robustness","authors":"Maliheh Ghomsheh, A. Kamandi","doi":"10.1109/ICWR49608.2020.9122284","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122284","url":null,"abstract":"Robustness is one of the most important properties of network, because it represents the network tolerance against failures. Thus, this property is considered in many real-world networks, such as distribution networks and communication networks. In order to evaluate this property, many measurements have been proposed, most of which are based on the size of giant component. In this paper, we introduced a concept of coloring nodes, by which we can classify nodes into two groups, and based on this concept, we proposed a new metric to measure the network robustness. Then, we implemented our proposed metric on random network and scale-free network to compare their behaviors. Finally, we compare the efficiency of our proposed method with another state-of-the-are robustness metric.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"75 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coronavirus Spreading Analysis Using Dynamic Spreading Factor Epidemic Models 基于动态传播因子流行模型的冠状病毒传播分析
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122308
Zahra Farahi, A. Kamandi
{"title":"Coronavirus Spreading Analysis Using Dynamic Spreading Factor Epidemic Models","authors":"Zahra Farahi, A. Kamandi","doi":"10.1109/ICWR49608.2020.9122308","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122308","url":null,"abstract":"By the growing number of viruses and also epidemics, predicting and controlling the epidemics have high priority in today's human life. Network theory is a useful instrument for modelling the epidemics. As we can see, some predictions have been proposed for the disease like influenza (N1H1 virus). In this paper we aimed to compare the spreading model of coronavirus with proposed epidemic models. Also, we have shown that informing people using impressive ways such as social networks and also preventing attempts done by the governments affects the transmission rate. So models which are formed based on static transmission rate are not applicable for disease with dynamic transmission rate.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalization of E-Learning Environment Using the Kolb's Learning Style Model 基于Kolb学习风格模型的网络学习环境个性化
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122314
Tahereh Sanjabi, G. Montazer
{"title":"Personalization of E-Learning Environment Using the Kolb's Learning Style Model","authors":"Tahereh Sanjabi, G. Montazer","doi":"10.1109/ICWR49608.2020.9122314","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122314","url":null,"abstract":"The e-learning environment includes various types of learners who should take responsibility for their learning. Personalization of the e-learning environment is a significant contributing factor in the effective learning process which enhances learning satisfaction, speed learning, quality and efficiency of the learning process. The major goal of personalization in e-learning is providing appropriate education as well as adjusting the environmental conditions for each learner according to their specific characteristics. Various factors could be considered for designing a personalized learning environment; this study focused on the selective learning style. In this research, the e-learning environment was personalized based on Kolb's learning style and tailored learning strategies were developed for learners. Finally, in the designed learning environment, the learners' performance in an e-learning course for 19 students was evaluated. The results showed that personalization in the e-learning environment based on learning style influences students' academic success and satisfaction significantly.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Game Theory-based Mechanism to Optimize the Traffic Congestion in VANETs 基于博弈论的vanet交通拥堵优化机制
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122324
Khalilollah Raeisi Lejjy, Esmaeil Amiri, Emad Alizadeh, Mohammad Hossein Rezvani
{"title":"A Game Theory-based Mechanism to Optimize the Traffic Congestion in VANETs","authors":"Khalilollah Raeisi Lejjy, Esmaeil Amiri, Emad Alizadeh, Mohammad Hossein Rezvani","doi":"10.1109/ICWR49608.2020.9122324","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122324","url":null,"abstract":"One of the key issues in Vehicular Ad-hoc networks (VANETs) is to optimize the traffic congestion. Cooperation in these networks is a challenging issue due to their specific characteristics. In this paper, a non-cooperative game theory-based approach is introduced for packet forwarding. Through extensive mathematical analyses and also experimental validation, we prove that the proposed non-cooperative game mechanism attains the Nash equilibrium point. Our designed mechanism encourages all vehicles to collaborate with each other in packet forwarding operations. This, in turn, results in decreasing the payments by nodes to the network side and also results in optimizing traffic congestion. The simulation results established the robustness of the proposed mechanism in terms of cost-related criteria.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130162799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical Three-module Method of Text Classification in Web Big Data Web大数据文本分类的分层三模块方法
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122326
Zahra Rezaei, B. Eslami, M. Amini, Mohammad Eslami
{"title":"Hierarchical Three-module Method of Text Classification in Web Big Data","authors":"Zahra Rezaei, B. Eslami, M. Amini, Mohammad Eslami","doi":"10.1109/ICWR49608.2020.9122326","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122326","url":null,"abstract":"Text analysis is a method for extracting knowledge from text. Memory and time limitations in processing big data is crucial due to data sources distributed in web, search engines and socials network sites. In addition, due to automatizing search process, summarizing and finding the interests of users, immediate classification of various texts in a streaming manner has gained attention in industrial and scientific fields. Hierarchical classification of text is among common issues which is simply possible in traditional methods using bag of words; however, while talking about big data and when there are a lot of labels of classes, employing traditional methods will not meet the needs of societies. With the improvement of data in internet and social networks, more powerful methods are needed which can classify the data closely and immediately. Through abstraction in textual data, deep learning can deal with these challenges. In this paper a deep learning method will be introduced which is based on hierarchical classification (HAN) named HAN-MODI and which can classify texts from social networks and web sites with an accuracy of 98.81% at the real time bilingually in English and Farsi. This paper also shows that this complex network with three modules word, sentence and document can work better at word level and there is no need to know syntactic or semantics structure of language. The novelty of the proposed method is adding a third level to the hierarchical structure for general detection and for more exact detection of the class. In addition, classification using this method will be multi-level classification and finally with a change in HAN, this method can be used with Farsi texts. Model improvement is done by adding a new layer above the architecture HAN. We called it as segmentation of sentences into expressions Bag of Sentences and added a dynamicity window in any stage that applied attention mechanism simultaneously.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"61 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113977568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SW-DBSCAN: A Grid-based DBSCAN Algorithm for Large Datasets SW-DBSCAN:基于网格的大数据集DBSCAN算法
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122313
Negar Ohadi, A. Kamandi, M. Shabankhah, Seyed Mohsen Fatemi, S. Hosseini, Alireza Mahmoudi
{"title":"SW-DBSCAN: A Grid-based DBSCAN Algorithm for Large Datasets","authors":"Negar Ohadi, A. Kamandi, M. Shabankhah, Seyed Mohsen Fatemi, S. Hosseini, Alireza Mahmoudi","doi":"10.1109/ICWR49608.2020.9122313","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122313","url":null,"abstract":"Data clustering aims to discover the underlying structure of data. it has many applications in data analysis and it is one of the most widely used tools in data mining. DBSCAN is one of the most famous clustering algorithms. its advantages are to identify clusters of various shapes and define the number of clusters. Since DBSCAN is sensitive to its parameters which are ε and MinPts, it may perform poorly when the dataset is unbalanced. To solve this problem, this paper proposes a sliding window DBSCAN clustering algorithm that uses Gridding and local parameters for unbalanced data which we will refer to as SW-DBSCAN. The algorithm divides the dataset into several grids. The size and shape of each gird depends on the specimen density specification. Then, for each grid, the parameters are adjusted for local clustering and eventually merging data zones. Experimental results show that this algorithm can help to improve the performance of the DBSCAN algorithm and can deal with arbitrary data and asymmetric data.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115900301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An Efficient Ensemble of Convolutional Deep Steganalysis Based on Clustering 基于聚类的卷积深度隐写分析的高效集成
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122294
Tayebe Abazar, Peyman Masjedi, M. Taheri
{"title":"An Efficient Ensemble of Convolutional Deep Steganalysis Based on Clustering","authors":"Tayebe Abazar, Peyman Masjedi, M. Taheri","doi":"10.1109/ICWR49608.2020.9122294","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122294","url":null,"abstract":"Steganography is the task of hiding information in some media normally images. Steganalysis is the process of discriminating such instances and clean ones. In recent years, steganalysis has tended to use deep learning for feature extraction and classification. Convolutional Neural Networks (CNN) have improved the steganalysis performance but at the cost of computational complexity and memory space due to huge amount of training data. In this paper, a new framework is proposed to reduce the learning cost by a divide and conquer strategy. In the first phase, data is divided into disjoint clusters by use of k-means. Each cluster is then fed to a separate CNN to be customized on a specific region of data space. In the final phase, the networks are merged leveraging a fast alternate-weighting process. The proposed weighting can, to some extent, compensate for reducing the size of training data per model. The experimental results show that the proposed scalable framework reduces memory and time complexity with preserving accuracy.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122687187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Efficient Deep Learning Method for Encrypted Traffic Classification on the Web 一种高效的Web加密流量分类深度学习方法
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122299
Shiva Soleymanpour, H. Sadr, H. Beheshti
{"title":"An Efficient Deep Learning Method for Encrypted Traffic Classification on the Web","authors":"Shiva Soleymanpour, H. Sadr, H. Beheshti","doi":"10.1109/ICWR49608.2020.9122299","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122299","url":null,"abstract":"Traffic classification plays an important role in network management and cyber-security. With the development of the Internet, online applications and in the following encrypted techniques, encrypted traffic has changed to a major challenge for traffic classification. In fact, unbalanced data, in which the unbalanced distribution of samples across classes lead to the classification performance reduction, is considered as one of the prominent challenges in encrypted traffic classification. Although previous studies tried to deal with the class imbalance problem in the pre-processing step using machine learning and particularly deep learning models, they are still confronting with some limitations. In this regard, a new classification method is proposed in this paper that tries to deal with the problem of unbalanced data during the training process. The proposed method employs a cost-sensitive convolution neural network and considers a cost for each classification according to the distribution of classes. These costs are then applied to the network along the training process to enhance the overall accuracy. Based on the empirical results, the proposed model obtained higher classification performance (about 2% on average) compared to the Deep Packet method.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Machine Translation Using Improved Attention-based Transformer with Hybrid Input 基于混合输入的改进注意力转换器的机器翻译
2020 6th International Conference on Web Research (ICWR) Pub Date : 2020-04-01 DOI: 10.1109/ICWR49608.2020.9122317
M. Abrishami, Mohammad J. Rashti, M. Naderan
{"title":"Machine Translation Using Improved Attention-based Transformer with Hybrid Input","authors":"M. Abrishami, Mohammad J. Rashti, M. Naderan","doi":"10.1109/ICWR49608.2020.9122317","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122317","url":null,"abstract":"Machine Translation (MT) refers to the automated software-based translation of natural language text. The embedded complexities and incompatibilities of natural languages have made MT a daunting task facing numerous challenges, especially when it is to be compared to a manual translation. With the emergence of deep-learning AI approaches, the Neural Machine Translation (NMT) has pushed MT results closer to human expectations. One of the newest deep learning approaches is the sequence-to-sequence approach based on Recurrent Neural Networks (RNN), complex convolutions, and transformers, and employing encoders/decoder pairs. In this study, an attention-based deep learning architecture is proposed for MT, with all layers focused exclusively on multi-head attention and based on a transformer that includes multi-layer encoders/decoders. The main contributions of the proposed model lie in the weighted combination of layers' primary input and output of the previous layers, feeding into the next layer. This mechanism results in a more accurate transformation compared to non-hybrid inputs. The model is evaluated using two datasets for German/English translation, the WMT'14 dataset for training, and the newstest'2012 dataset for testing. The experiments are run on GPD-equipped Google Colab instances and the results show an accuracy of 36.7 BLEU, a 5% improvement over the previous work without the hybrid-input technique.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131618524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信