{"title":"EGlossy: An Energy-Efficient Glossy-Based Synchronization and Flooding Protocol in IoT","authors":"Samira Parvin Gilavan, G. Ekbatanifard","doi":"10.1109/ICCKE.2018.8566650","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566650","url":null,"abstract":"Network Flooding and synchronization are the foundation of a wide range of practical applications and network operations. A flooding service can implicitly synchronize all nodes of a network effectively. The integrated services should send packets as quickly as possible to reduce clock drift errors. In this study, we focus on Glossy protocol, which has a great performance in this regard. One of the disadvantages of this protocol is energy consumption increase with the expansion of the network. We propose EGlossy, which reduces the nodes radio on-time to 66 percent. To implement our contribution, LWB protocol has been used for network management. Implementation of EGlossy is tested on the Cooja simulator of Contiki operating system.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132527770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Violence Detection in Indoor Surveillance Cameras Using Motion Trajectory and Differential Histogram of Optical Flow","authors":"Tahereh Zarrat Ehsan, M. Nahvi","doi":"10.1109/ICCKE.2018.8566460","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566460","url":null,"abstract":"Intelligent surveillance systems and automatic detection of abnormal behaviors have become a major problem in recent years due to increased security concerns. Violence behaviors have a vast diversity so that distinction between them is the most challenging problem in video-surveillance systems. In recent works, introducing unique and discriminative feature for representing violence behaviors is needed strongly. In this paper, a novel violence detection method has been proposed which is based on combination of motion trajectory and spatio-temporal features. A dense sampling has been carried out on spatiotemporal volumes along target's path to extract Differential Histogram of Optical Flow (DHOF) and standard deviation of motion trajectory features. These novel features were employed to train a Support Vector Machine (SVM) to classify video volumes into two normal and violence categories. Experimental results demonstrate that the proposed method outperforms other state-of-the-art violence detection methods and achieves 91 % accuracy for detection result.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132662988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequent Itemsets as Meaningful Events in Graphs for Summarizing Biomedical Texts","authors":"M. Moradi","doi":"10.1109/ICCKE.2018.8566651","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566651","url":null,"abstract":"In this paper, we introduce a method using graph modeling for summarizing biomedical texts. We address the challenges of identifying meaningful topics of the input document, modeling the relations between the sentences, and selecting the most relevant sentences. Our summarizer utilizes an itemset mining method to discover the topics from the concepts extracted from the input document. It uses a meaningfulness measure to identify the meaningful events, i.e. the essential topics of the input document. Theses meaningful topics are used to construct a small-world network that models the relations between the sentences within the text. Those sentences identified as highly-informative and relevant are selected to generate the final summary. Conducting a set of evaluations, we assess the efficiency of the graph-based approach for summarization of biomedical documents. The evaluations demonstrate that our method can achieve a better performance in comparison with a number of available methods with respect to some widely-used metrics. The summaries produced by the graph-based summarizer contain more informative content compared to the summaries generated by the other methods. This shows that the combination of itemset mining on the concepts, the meaningfulness measure, and modeling the text as a small-world network can perform well in biomedical text summarization.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114487340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Demographic Factors on Persuasion Strategies in Personalized Recommender System","authors":"Fakhroddin Noorbehbahani, Zeinab Zarein","doi":"10.1109/ICCKE.2018.8566550","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566550","url":null,"abstract":"A recommender system is an information filtering tool that copes with the growing volume of information and helps the user to make faster decisions by providing products and services matched with their needs and interests. However, a large number of users are not satisfied with the provided recommendations and do not accept them. Based on the Elaboration Likelihood Model (ELM), If supplementary information about recommendations is provided, those users having the low motivation and capability to analyze the usefulness of the recommended item can be persuaded to accept it. This paper focuses on analyzing the impact of demographic factors on increasing the acceptance of recommendations. This study was conducted by a web-based online survey. The movie's recommender system has been developed along with the explanations based on Cialdini's persuasion strategies as the peripheral cues. The collected data are analyzed through statistical techniques using the SPSS software. The results show that the persuasiveness degree of the persuasion strategies differs related to individuals with the different demographic factors.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124854932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masoud Khosravi-Farmad, Ali Ahmadian Ramaki, A. G. Bafghi
{"title":"Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement","authors":"Masoud Khosravi-Farmad, Ali Ahmadian Ramaki, A. G. Bafghi","doi":"10.1109/ICCKE.2018.8566531","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566531","url":null,"abstract":"One of the main security concerns of enterprise-level organizations which provide network-based services is combating with complex cybersecurity attacks like advanced persistent threats (APTs). The main features of these attacks are being multilevel, multi-step, long-term and persistent. Also they use an intrusion kill chain (IKC) model to proceed the attack steps and reach their goals on targets. Traditional security solutions like firewalls and intrusion detection and prevention systems (IDPSs) are not able to prevent APT attack strategies and block them. Recently, deception techniques are proposed to defend network assets against malicious activities during IKC progression. One of the most promising approaches against APT attacks is Moving Target Defense (MTD). MTD techniques can be applied to attack steps of any abstraction levels in a networked infrastructure (application, host, and network) dynamically for disruption of successful execution of any on the fly IKCs. In this paper, after presentation and discussion on common introduced IKCs, one of them is selected and is used for further analysis. Also, after proposing a new and comprehensive taxonomy of MTD techniques in different levels, a mapping analysis is conducted between IKC models and existing MTD techniques. Finally, the effect of MTD is evaluated during a case study (specifically IP Randomization). The experimental results show that the MTD techniques provide better means to defend against IKC-based intrusion activities.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128262458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Word Embedding in Small Corpora: A Case Study in Quran","authors":"Zeinab Aghahadi, A. Talebpour","doi":"10.1109/ICCKE.2018.8566605","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566605","url":null,"abstract":"Text is a complex set of words to carry the meaning and representations of words is the first step to perform linguistic processing and text comprehension. So far, many researches have been done on the semantic representations of words using neural networks in various areas of natural language processing using large text corpus from general domain. In the meantime, some efforts have been done to apply deep learning methods to represent the words of small corpus supporting the hypothesis that the bigger corpora doesn't necessarily provide better results in words representation. In this research the capability of word2vec for learning semantic representation of words in small corpus is investigated. Here, we consider Skip-gram and CBOW learning models with different values of hyper parameters. Two new data sets have been created to evaluate the model's performance on the small domain-specific Quranic corpus. First and second datasets are used to test the words categorization and word pairwise similarity respectively. Our results demonstrate that the best performance for skip-gram occurs with 30 numbers of iterations when the dimension is set to 7.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129141089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Steganography Based on PVD Idea","authors":"V. Sabeti, Minoo Shoaei","doi":"10.1109/ICCKE.2018.8566629","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566629","url":null,"abstract":"Network steganography based on the packet length, is a branch of network steganographic methods that transfers intended message by modifying the length of the packets in the network. In this paper, a new network steganographic method based on the packets length is presented using the idea of embedding the message in the lengths differences of the consecutive packet pairs. Modifying reference packets length is being done in a way that the receiver could entirely extract data by computing differences in the lengths of the consecutive packet pairs. The number of the embedded message bits in the length of the consecutive packet pairs is variable but the receiver could simply detect it. The tests of the proposed methods against existing attack have been done for network random traffic type and for different cases of distributing the message over the entire reference traffic. In all cases, the proposed method has greater resistance in comparison to the existing methods. In another words, by using this embedding method, the characteristics of the normal traffic are preserved, so that its generated traffic would be indiscernible from normal traffic.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"102 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134063387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain Tumor Classification via Convolutional Neural Network and Extreme Learning Machines","authors":"A. Pashaei, H. Sajedi, N. Jazayeri","doi":"10.1109/ICCKE.2018.8566571","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566571","url":null,"abstract":"Tumor identification is one of the main and most influential factors in the identification of the type of treatment, the treatment process, the success rate of treatment and the follow-up of the disease. Convolution neural networks are one of the most important and practical classes in the field of deep learning and feed-forward neural networks that is highly applicable for analyzing visual imagery. CNNs learn the features extracted by the convolution and maxpooling layers. Extreme Learning Machines (ELM) are a kind of learning algorithm that consists of one or more layers of hidden nodes. These networks are used in various fields such as classification and regression. By using a CNN, this paper tries to extract hidden features from images. Then a kernel ELM (KELM) classifies the images based on these extracted features. In this work, we will use a dataset to evaluate the effectiveness of our proposed method, which consists of three types of brain tumors including meningioma, glioma and pituitary tumor in T1-weighted contrast-enhanced MRI (CE-MRI) images. The results of this ensemble of CNN and KELM (KE-CNN) are compared with different classifiers such as Support Vector Machine, Radial Base Function, and some other classifiers. These comparisons show that the KE-CNN has promising results for brain tumor classification.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124539193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Salient Object Detection with Segment Features Using Mean Shift Algorithm","authors":"Narges Fatemi, H. Sajedi, M. Shiri","doi":"10.1109/ICCKE.2018.8566483","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566483","url":null,"abstract":"The object recognition has attracted high attention for its diverse applications in everyday life. Due to its importance in this field, academics proposed different algorithms to recognize the desired object in the shortest possible time. This paper introduce a new fast method for saliency object detection in images. This method has four steps: regional feature extraction, segment clustering, saliency score computation and post-processing. This dataset has a diverse set of images including single, multiple and complex object images. The main aim of this paper is the detection of objects in complex images. Introduced method has better performance compared to other methods which were evaluated based on ECSSD dataset. This procedure had shown better performance in compared to RRFC, RFC, DRFI, CHC, and RC. As indicated in the presented results, F-measure of our method was better as 0.03-0.1 compared to other methods.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121270041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saba Fotouhi, M. H. Shirali-Shahreza, A. Mohammadpour
{"title":"A Sensitivity Analysis on the Air Quality Index Based on the Pollutants Concentrations in Tehran","authors":"Saba Fotouhi, M. H. Shirali-Shahreza, A. Mohammadpour","doi":"10.1109/ICCKE.2018.8566657","DOIUrl":"https://doi.org/10.1109/ICCKE.2018.8566657","url":null,"abstract":"As air pollution is one of the most serious global problems nowadays, this project tries to be a part of the studies in this field. Tehran as the capital city of Iran is one of the most polluted cities. This paper includes a sensitivity analysis on the calculation method of the Air Quality Index (AQI) for the whole city. The necessity to be able to analyze the air quality of the city needs a unique AQI for the whole city. Thus, three statistical indicators mean, median and maximum are compared in this paper to find out which of these indicators reports the number of days in each level of the AQI category more precisely in Tehran in the year 1395 (March/20/2016 - March/20/2017). Maximum is expected to be the best indicator but the results show that it is better to consider each pollutant separately for choosing the best indicator. However, maximum reports the air quality worse than what it really is, which leads to more caution. Simulation of the concentration of the pollutants was done by a hybrid model. The observed data of the concentration of the criteria pollutants were denoised by the wavelet transformation, then a neuro-fuzzy system using fuzzy clustering was used for modeling. The value of R2 for the models is almost 0.9 that is a sign of their accuracy.","PeriodicalId":283700,"journal":{"name":"2018 8th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}