{"title":"A Novel Correlation-Based CUR Matrix Decomposition Method","authors":"Arash Hemmati, H. Nasiri, M. Haeri, M. Ebadzadeh","doi":"10.1109/ICWR49608.2020.9122286","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122286","url":null,"abstract":"Web data such as documents, images, and videos are examples of large matrices. To deal with such matrices, one may use matrix decomposition techniques. As such, CUR matrix decomposition is an important approximation technique for high-dimensional data. It approximates a data matrix by selecting a few of its rows and columns. However, a problem faced by most CUR decomposition matrix methods is that they ignore the correlation among columns (rows), which gives them lesser chance to be selected; even though, they might be appropriate candidates for basis vectors. In this paper, a novel CUR matrix decomposition method is proposed, in which calculation of the correlation, boosts the chance of selecting such columns (rows). Experimental results indicate that in comparison with other methods, this one has had higher accuracy in matrix approximation.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121182908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Tourism Misunderstood","authors":"Ali Hassani, Mehrnoosh Bastenegar","doi":"10.1109/ICWR49608.2020.9122311","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122311","url":null,"abstract":"Today, the increasingly knowledgeable tourism system is one of the most diverse and largest industries in the world, with undeniable social and economic consequences and one of the most important sources of income for countries. Entering the digital age and the increasing growth of information and communication technologies, like all businesses and activities, has revolutionized the tourism industry. In the face of these rapid changes, “virtual tourism” is a common misconception that some non-tourism experts use as a type of tourism, and, surprisingly, even tourism students and graduates sometimes do so and they do phlegm. Due to the necessity of sound conceptualization that leads to better thought and practice, this study firstly explores the philosophy and concept of tourism through an analytical-descriptive method and conducts library studies and then addresses the aspects of tourism development in the digital space, and it has shown that demand-driven virtual or electronic tourism is confused with demand-side virtual tourism. Since it is necessary to take into account the supply, demand and demand side of tourism, the use of the word virtual tourism is an obvious error and in conflict with the fundamental principles and philosophy of tourism. And the most important reason is that touring in cyberspace not only does not accompany detachment from daily life, which is a prerequisite of tourism, but in today's world, it is the same as the routineness of life.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116643327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Approach For Malware Detection Using PE Header Specifications","authors":"Tina Rezaei, Ali K. Hamze","doi":"10.1109/ICWR49608.2020.9122312","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122312","url":null,"abstract":"Following the dramatic growth of malware and the essential role of computer systems in our daily lives, the security of computer systems and the existence of malware detection systems become critical. In recent years, many machine learning methods have been used to learn the behavioral or structural patterns of malware. Because of their high generalization capability, they have achieved great success in detecting malware. In this paper, to identify malware programs, features extracted based on the header and PE file structure are used to train several machine learning models. The proposed method identifies malware programs with 95.59% accuracy using only nine features, the values of which have a significant difference between malware and benign files. Due to the high speed of the proposed model in feature extraction and the low number of extracted features, which lead to faster model training, the proposed method can be used in real-time malware detection systems.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introducing a New Linear Regression Based Method for Early DDoS Attack Detection in SDN","authors":"Reza Bakhtiari Shohani, S. Mostafavi","doi":"10.1109/ICWR49608.2020.9122310","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122310","url":null,"abstract":"The software Defined Networks, by separating the data plane and control plane of the network, have made a drastic change to the scope of computer networks. Although this separation has accelerated and simplified the management, configuration and error detection, it has also caused some new security problems. One of these problems is the Vulnerability of the software defined networks' architecture to distributed denial of service attacks on the network's controllers. One of the most recent distributed denial of service attacks which entropy-based methods are incapable of detecting, is to send fake packets with different source to random addresses in a software defined network. In this paper, given the SDN structure and tra □ ic analysis, a statistical trapezoid model is introduced to estimate number of table misses for each switch. Then, using the linear regression method and EWMA estimation, the threshold of the table misses in specified time intervals, is estimated. The evaluation results imply that using this method, one can detect DDoS attacks in early stage in software defined networks, regardless of the sort of DDoS attack.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133274782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Network Analysis of Passes and Communication Graph in Football by mining Frequent Subgraphs","authors":"Amir Hossein Ahmadi, A. Noori, B. Teimourpour","doi":"10.1109/ICWR49608.2020.9122303","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122303","url":null,"abstract":"Sport is regarded as an inseparable part of human life. Currently, a growing trend is observed in people's interest in football teams. In general, a successful procedure in players' communication is one of the main factors required for the victory of that team. The present study aimed to perform analyzes based on the perspective of social and communication networks (such as player passes and in-game transactions) to improve team performance. The analysis was performed on data collected from three matches of the Persepolis club in the first half-season of the Iranian Premier League 2019–20. This research seeks to review this issue from two integral perspectives as follows: 1) evaluating the performance of individuals as a part of a social network, 2) investigating the communication network between players. To this aim, we used the innovative method of recognizing and classifying frequent subgroups in this analysis. It is worth noting that 20 persen of these routes were in the defensive line while 31 persen were in the defensive midfielder. However, there were no routes in the attacker line or offensive midfielder, which indicated a form of weakness. On the other hand, various types of node degrees, points, and n-pass cycles were calculated in other sections. The results revealed the weak performance of the connection bridge between the team's playmakers and the end-players for shooting the ball. Although these topics were discussed at a minor level and only three matches of a team, the results can be generalized to other issues.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131135041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Foad Ghasemi, Behzad Soleimani Neysiani, N. Nematbakhsh
{"title":"Feature Selection in Pre-Diagnosis Heart Coronary Artery Disease Detection: A heuristic approach for feature selection based on Information Gain Ratio and Gini Index","authors":"Foad Ghasemi, Behzad Soleimani Neysiani, N. Nematbakhsh","doi":"10.1109/ICWR49608.2020.9122285","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122285","url":null,"abstract":"Cardiovascular disease is one of the most common causes of mortality in the world. Among the different types of this disease, the coronary artery is the most important, which the correct and timely diagnosis of which is vital. Diagnostic and treatment methods of this disease have many side effects and costs. The best and most accurate diagnostic method here is angiography. Researchers seek to find economical and high-accuracy methods for this purpose. The disease-related features and different data mining techniques are described to increase the accuracy of the diagnosis through one dataset of essential and useful features. Data are collected from 303 suspected cardiovascular patients in Shahid Rajaee Hospital, Tehran. Among the samples, 87 are healthy, and 216 are sick. The features are selected through their optimal subsets of performance, speed of diagnosis, and precision in the first step to determine the severity of coronary artery disease (CAD). This feature selection can predict and promote a learning model. Then the optimal machine learning models are applied to analyze and predict CAD. The accuracy of 99.67% is found in this diagnosis, indicating the highest obtained accuracy in this field. The left anterior descending (LAD), the left circumflex (LCX), and the right coronary artery (RCA) features are diagnosed with high accuracy by using those models. It seems these three features define the CAD and are dependent on angiography. If they are eliminated for the prediagnosis situation, the accuracy of CAD will be between 83% to 86% for the new reduced subset of features proposed concerning legible performance reduction.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127694506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahra Aghaee, Hamid Ahmadi Beni, S. Kianian, M. Vahidipour
{"title":"A Heuristic Algorithm Focusing on the Rich-Club Phenomenon for the Influence Maximization Problem in Social Networks","authors":"Zahra Aghaee, Hamid Ahmadi Beni, S. Kianian, M. Vahidipour","doi":"10.1109/ICWR49608.2020.9122321","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122321","url":null,"abstract":"The strength of information diffusion on social networks depends on many factors, including the selected influential nodes. The problem of finding such nodes in the network is modeled by influence maximization problem, which faces two essential challenges: (1) inadequate selection of the seed nodes due to the lack of focus on the rich-club phenomenon and (2) high running time due to the lack of focus on pruning the graph nodes and localization. To solve these challenges, a computational localization-based RLIM algorithm is presented here to prevent the rich-club phenomenon. In this algorithm, the graph nodes are pruned based on the eigenvector centrality to reduce the computational overhead, and then the computations are performed locally using localization criteria. After that, influential nodes are selected by avoiding the rich-club phenomenon. In the RLIM algorithm, the seed nodes provided a better influence spread than the other algorithms. Experimental results on the synthetic and real-world datasets shows that the RLIM algorithm can verify the high effectiveness and efficiency than the comparable algorithms for an influence maximization problem.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130782655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-Based Location Recommender System Using Geotagged Photos On Instagram","authors":"Maryam Memarzadeh, A. Kamandi","doi":"10.1109/ICWR49608.2020.9122274","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122274","url":null,"abstract":"Instagram is one of the popular social media services used by a variety of people around the world. It has a huge number of active users. The more users, the larger and the more different Instagram data are available. In this paper, we propose a Model-based location recommender system (MLRS), which creates a profile for each location and uses it to recommend locations, based on user interests. Since our analysis does not have an appropriate dataset to check, we use both Foursquare and Instagram to create our dataset. Next, we propose the Term-Frequency and Inverse Document Frequency(TF-IDF) method to rank extracted hashtags of selected Instagram locations based on Instagram image captions. This gives us the main idea of locations, based on 30 recent image captions hashtag posted. Then, we used FastText to classify hashtags of each location post. We evaluated our system with a large-scale real dataset collected from Instagram concerning precision, recall and the F-measure. Finally, the experimental results show that the highest result achieved when the FastText model tested with n=1 with an F-measure of 77.8%.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133856855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correlation of Segregation and Social Networks' Majority Opinion in the Social Impact Model","authors":"A. Mansouri, F. Taghiyareh","doi":"10.1109/ICWR49608.2020.9122279","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122279","url":null,"abstract":"Everyone may influence others to change or persist in their current opinions via face-to-face or online communications. Predicting a society's majority opinion about a specific topic is an interesting challenge with many applications, e.g., predicting social movements, political votings, economical marketing. Among the various opinion formation models, the social impact model of opinion formation is very suitable for online social networks and online communities. In this model, three main factors affect a society's overall opinion: (1) the initial population of opinion groups, (2) the noise of the individuals to be persuaded or persist on their opinions, and (3) the topology of the network of interactions among individuals. In this research, to analyze the effect of segregation on the dynamics of opinion in the model, we assumed a noise-free model. Furthermore, the network of individuals is a scale-free network, and the initial population size of both opinion groups are the same with randomly assigned opinions. Using an agent-based modeling approach, we studied how the segregation of opinion groups may affect the dynamics of opinion formation. The results reveal that there is a strong correlation between segregation and the trend of society's opinion. It could be concluded from the results that if starting from the same population size in both opinion groups, it is expected that the more segregated opinion group dominates the less one and determines the majority opinion of the society.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges Classification in Search-Based Refactoring","authors":"Narjes Shafiei, M. Keyvanpour","doi":"10.1109/ICWR49608.2020.9122271","DOIUrl":"https://doi.org/10.1109/ICWR49608.2020.9122271","url":null,"abstract":"A common task in software maintenance is refactoring. The essential refactoring goal is improving software quality. The refactoring has extended for a wide range of software artifacts in different domains, such as web, database, and desktop applications. The difficulty of the manual artifacts inspecting is an impetus for automatic refactoring. Search-based software engineering (SBSE) has been used to solve many software engineering problems as optimization problems. Automating problem-solving is the goal of applying it to reduce human efforts. Many researchers have used the search-based approach in the field of refactoring that has known as search-based refactoring (SBR). There are many challenges in SBR. Identifying refactoring challenges help to understand refactoring problem and allow researchers to present new ideas for eliminating or reducing challenges. In this paper, we studied the researches in SBR and extracted researches challenges. We intend to categorize the challenges in this area from a new and more comprehensive perspective.","PeriodicalId":231982,"journal":{"name":"2020 6th International Conference on Web Research (ICWR)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115975268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}