2018 International Conference on Innovations in Information Technology (IIT)最新文献

筛选
英文 中文
Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing 基于机器学习的移动广告点击欺诈检测方法
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/INNOVATIONS.2018.8605973
Riwa Mouawi, M. Awad, A. Chehab, I. Elhajj, A. Kayssi
{"title":"Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing","authors":"Riwa Mouawi, M. Awad, A. Chehab, I. Elhajj, A. Kayssi","doi":"10.1109/INNOVATIONS.2018.8605973","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605973","url":null,"abstract":"In recent years, mobile advertising has gained popularity as a mean for publishers to monetize their free applications. One of the main concerns in the in-app advertising industry is the popular attack known as “click fraud”, which is the act of clicking on an ad, not because of interest in this ad, but rather as a way to generate illegal revenues for the application publisher. Many studies evaluated click fraud attacks in the literature, and some proposed solutions to detect it. In this paper, we propose a click fraud detection model, hereafter CFC, to classify fraudulent clicks by adopting some features and then testing using KNN, ANN and SVM. In fact, based on our experimental results, the different featured classifiers reached an accuracy higher than 93%.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
IIT 2018 Keynote Speakers IIT 2018主题演讲嘉宾
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/innovations.2018.8606024
{"title":"IIT 2018 Keynote Speakers","authors":"","doi":"10.1109/innovations.2018.8606024","DOIUrl":"https://doi.org/10.1109/innovations.2018.8606024","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IIT 2018 Welcome IIT 2018欢迎
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/innovations.2018.8605961
{"title":"IIT 2018 Welcome","authors":"","doi":"10.1109/innovations.2018.8605961","DOIUrl":"https://doi.org/10.1109/innovations.2018.8605961","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preemptive Diagnosis of Chronic Kidney Disease Using Machine Learning Techniques 利用机器学习技术对慢性肾脏疾病进行预防性诊断
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/INNOVATIONS.2018.8606040
Reem A. Alassaf, Khawla A. Alsulaim, Noura Y. Alroomi, N. Alsharif, Mishael F. Aljubeir, S. Olatunji, Alaa Y. Alahmadi, Mohammed Imran, Rahmah Alzahrani, Nora S. Alturayeif
{"title":"Preemptive Diagnosis of Chronic Kidney Disease Using Machine Learning Techniques","authors":"Reem A. Alassaf, Khawla A. Alsulaim, Noura Y. Alroomi, N. Alsharif, Mishael F. Aljubeir, S. Olatunji, Alaa Y. Alahmadi, Mohammed Imran, Rahmah Alzahrani, Nora S. Alturayeif","doi":"10.1109/INNOVATIONS.2018.8606040","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606040","url":null,"abstract":"Chronic Kidney Disease (CKD) is a major public health concern with rising prevalence. In Saudi Arabia, approximately 2 Billion Riyals are solely allocated for renal replacement therapy which is required for patients with advanced stages of CKD. Therefore, this study aims to decrease the number of patients and the expenses needed for treatment by preemptively diagnosing chronic kidney disease accurately using data mining and machine learning techniques. Data have been collected from a region that has never been explored before in literature. This study uses Saudi data retrieved from King Fahd University Hospital(KFUH) in Khobar to carry out the experiment. Experimental Results show that ANN, SVM, Naïve Bayes achieved a testing accuracy of 98.0% while k-NN has achieved an accuracy of 93.9%.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122530858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
IIT 2018 Committees IIT 2018委员会
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/innovations.2018.8606023
{"title":"IIT 2018 Committees","authors":"","doi":"10.1109/innovations.2018.8606023","DOIUrl":"https://doi.org/10.1109/innovations.2018.8606023","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Terrorist Groups Use Social Networking Media to Attract and Recruit New Members 恐怖组织如何利用社交媒体吸引和招募新成员
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/INNOVATIONS.2018.8605942
Alsaleh Saad, Alwaleed Alhumaid
{"title":"How Terrorist Groups Use Social Networking Media to Attract and Recruit New Members","authors":"Alsaleh Saad, Alwaleed Alhumaid","doi":"10.1109/INNOVATIONS.2018.8605942","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605942","url":null,"abstract":"Social Networking Media (SNM) has a crucial role to play as a communication technology to disseminate terrorism across the world. This study has two aims which are to explore how terrorist groups use SNM to attract and recruit new members and how the Islamic religion confronts the terrorism dilemma. A qualitative study is designed to achieve both aims; primary data will be collected through three main methods which are: a systematic document review, observation, and interviews. The content analysis technique will be used to analyze the data. It is anticipated that the comprehensive analysis and results of the research will expand knowledge of a specific context of SNM; that is, its use for contemporary terrorism purposes, an area which is, as yet, insufficiently explored both theoretically and empirically.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125382687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building Scalable Mobile Edge Computing by Enhancing Quality of Services 通过提高服务质量构建可扩展的移动边缘计算
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/INNOVATIONS.2018.8605955
Mayank Tiwary, Shanya Sharma, Pritish Mishra, H. El-Sayed, M. Prasad, Deepak Puthal
{"title":"Building Scalable Mobile Edge Computing by Enhancing Quality of Services","authors":"Mayank Tiwary, Shanya Sharma, Pritish Mishra, H. El-Sayed, M. Prasad, Deepak Puthal","doi":"10.1109/INNOVATIONS.2018.8605955","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605955","url":null,"abstract":"With the new computing archutecture supported by Mobile Edge Computing (MEC) brings services to the physical proximity of end users, resource rich mobile devices such as smartphones can now offer computational services to another smartphones. Leveraging the computational resources from mobile cloudlet clusters the availability of mobile nodes is the most important attribute. The effect of movement of mobile devices in real life scenarios has not been captured reliably. This work focuses on improving the Quality of Service (QoS) by considering the effect of mobility deviation. This paper presents an dynamic pricing model which calculates the deviation of the contributors and optimises the price depending on the demand-supply curve. Finally, the proposed scheme is simulated in NS3 environment and is compared with existing schemes to validate the performance of proposed scheme. We observe that there is a proposed steep increase in overall utility in terms of response time and resource utilization with the proposed scheme.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IIT 2018 Cover Page IIT 2018封面
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/innovations.2018.8606013
{"title":"IIT 2018 Cover Page","authors":"","doi":"10.1109/innovations.2018.8606013","DOIUrl":"https://doi.org/10.1109/innovations.2018.8606013","url":null,"abstract":"","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Affordable System for Remotely Monitoring Water Quality in Residential Water Tanks 一种经济实惠的住宅水箱水质远程监测系统
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/INNOVATIONS.2018.8605978
Asma Al Khaili, A. A. Mamari, H. Amer, W. Ibrahim
{"title":"An Affordable System for Remotely Monitoring Water Quality in Residential Water Tanks","authors":"Asma Al Khaili, A. A. Mamari, H. Amer, W. Ibrahim","doi":"10.1109/INNOVATIONS.2018.8605978","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605978","url":null,"abstract":"Water is an essential human need. In July 2010, the United Nations General Assembly explicitly recognized the human right to water and sanitation and acknowledged that clean drinking water and sanitation are essential to the realization of all human rights. Contaminated water does not only taste bad, it could be deadly. Water-related diseases affect more than 1.5 billion people every year. Unfortunately, there is limited awareness of the possibility of contamination in the residential water tanks, and more should be done to educate consumers on the importance of maintaining a hygienic water tank. In this paper a system is proposed to remotely sense, record, and report the quality of drinking water stored in residential tanks. The system sends alert messages to the landlord and the local authorities (if required) when one of the quality parameter is lower than the standard values.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of Offensive Messages in Arabic Social Media Communications 阿拉伯社交媒体通信中冒犯性信息的检测
2018 International Conference on Innovations in Information Technology (IIT) Pub Date : 2018-11-01 DOI: 10.1109/INNOVATIONS.2018.8606030
D. Mouheb, Rutana Ismail, S. A. Qaraghuli, Z. Aghbari, I. Kamel
{"title":"Detection of Offensive Messages in Arabic Social Media Communications","authors":"D. Mouheb, Rutana Ismail, S. A. Qaraghuli, Z. Aghbari, I. Kamel","doi":"10.1109/INNOVATIONS.2018.8606030","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606030","url":null,"abstract":"The popularity of social networks, such as Facebook, Twitter and Instagram, has dramatically increased during the last years, especially with the exponential growth in smartphones and mobile devices. This has, in turn, opened the door to numerous cyber threats specifically targeting social media users. Cyberbullying is an example of such threat impacting children, teenagers and young adults. Recently, this threat has also become a significant issue in the Arab world, especially with the wide adoption of social media by the young generation. Unfortunately, most existing research contributions detect cyberbullying in English language. These contributions are not relevant in our context due to the differences in the culture and the environment surrounding the users. This paper proposes a scheme for the detection of cyberbullying in Arabic social media streams. The proposed scheme detects cyberbullying comments based on a corpus of bullying and aggressive keywords. In addition, the bullying comments are classified according to their strength into three classes, namely mild, medium, and strong, using a weighted function. We evaluate the proposed scheme using real dataset, collected from Youtube and Twitter. The experiments show that the proposed scheme can accurately identify most of the bullying comments.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121723704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信