2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

筛选
英文 中文
WFEC: Wind farms economic classifier using big data analytics WFEC:使用大数据分析的风电场经济分类
D. Fawzy, Sherin M. Moussa, N. Badr
{"title":"WFEC: Wind farms economic classifier using big data analytics","authors":"D. Fawzy, Sherin M. Moussa, N. Badr","doi":"10.1109/INTELCIS.2017.8260046","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260046","url":null,"abstract":"Wind energy projects have recently been associated with huge investments. This led researchers to dig more into managing the costs of wind farms. The operation and maintenance (O&M) costs have a big effect on the success of wind farm projects. Thus, monitoring wind turbines and predicting the O&M costs become of a crucial demand. O&M costs are related to some main parts in wind turbines, like the spare parts and rotor blades that are exposed to damage because of the surrounding environmental factors. Hence, they can be monitored via deployed sensors that generate massive quantities of incomplete, and heterogeneous data. Therefore, a big data analytical system is required to analyze these data. In this paper, we propose the Wind Farms Economic Classifier (WFEC) System that uses big data analytics to manage the data volume, variety and veracity to predict the O&M costs. WFEC proposes an enhanced Flexible Naïve Bayes Classifier (FNBC) to classify wind farms profitability according to the predicted O&M costs. Experiments show that WFEC achieves high classification accuracy with less processing time.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126605848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparative analysis of Cross Site Scripting (XSS) detecting and defensive techniques 跨站脚本(XSS)检测和防御技术的比较分析
Shaimaa Mahmoud, Marco Alfonse, Mohamed Roushdy, Abdel-badeeh M. Salem
{"title":"A comparative analysis of Cross Site Scripting (XSS) detecting and defensive techniques","authors":"Shaimaa Mahmoud, Marco Alfonse, Mohamed Roushdy, Abdel-badeeh M. Salem","doi":"10.1109/INTELCIS.2017.8260024","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260024","url":null,"abstract":"Now the web applications are highly useful and powerful for usage in most fields such as finance, e-commerce, healthcare and more, so it must be well secured. The web applications may contain vulnerabilities, which are exploited by attackers to steal the user's credential. The Cross Site Scripting (XSS) attack is a critical vulnerability that affects on the web applications security. XSS attack is an injection of malicious script code into the web application by the attacker in the client-side within user's browser or in the server-side within the database, this malicious script is written in JavaScript code and injected within untrusted input data on the web application. This study discusses the XSS attack, its taxonomy, and its incidence. In addition, the paper presents the XSS mechanisms used to detect and prevent the XSS attacks.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design and implementation of multicore support for a highly reliable self-repairing μ-kernel OS 多核支持的高可靠自修复μ内核操作系统的设计与实现
Hatem A. El-Azab, M. Girgis, Essam-Eldean F. Elfakharany, M. E. Shehab
{"title":"Design and implementation of multicore support for a highly reliable self-repairing μ-kernel OS","authors":"Hatem A. El-Azab, M. Girgis, Essam-Eldean F. Elfakharany, M. E. Shehab","doi":"10.1109/INTELCIS.2017.8260021","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260021","url":null,"abstract":"As computers basically have adopted multicore processors, operating systems (OSs) support for these systems have to follow up. Since the impact of the consequences of multi-core failures affect software systems, most schedulers instead of exploiting the on-chip-based communications between cores on one die, they distribute tasks over multiple dies to reduce recovery time in case of single die failure. The full exploitation of multicore features within a die is best met by developing a highly reliable, fault-tolerant OS. MINIX3 is a highly reliable, self-repairing multiserver microkernel OS, but it doesn't support multicore architectures. This paper presents a proposed design and implementation of modifications to MINIX3 to support multicore architectures. Also, the paper presents the results of the experiments that have been conducted to evaluate the modified MINIX3 considering three issues: reliability, the performance of the multicore port, and contention on the locking scheme.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive group sparse representation for image compressive sensing 图像压缩感知的自适应群稀疏表示
Tianyu Geng, Guiling Sun, Yi Xu, Bowen Zheng
{"title":"Adaptive group sparse representation for image compressive sensing","authors":"Tianyu Geng, Guiling Sun, Yi Xu, Bowen Zheng","doi":"10.1109/INTELCIS.2017.8260026","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260026","url":null,"abstract":"Group sparse representation has raised lots of powerful signal recovery techniques in various compressive sensing studies, which can be considered as a low rank matrix approximation problem. Recent advances have suggested the adaptive singular value thresholding for low rank recovery under affine constraints. In this paper, we propose an adaptive group sparse representation for image compressive sensing recovery. A framework based on alternating direction method of multipliers is presented, where the adaptive singular value thresholding is introduced to solve the group sparse representation problem. In this method, the threshold adaptively decreases during iterations, instead of the traditional methods where the threshold level is independent of the iteration number. The simulation results reveal that the proposed method achieves a good convergence performance and improves the compressive sensing recovery quality significantly compared with the state-of-the-art methods.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporal sentiment analysis and time tags for opinions 时间情感分析和时间标签的意见
G. Hafez, R. Ismail, O. Karam
{"title":"Temporal sentiment analysis and time tags for opinions","authors":"G. Hafez, R. Ismail, O. Karam","doi":"10.1109/INTELCIS.2017.8260065","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260065","url":null,"abstract":"Nowadays, opinion mining becomes one of the most important fields and it attracts the interest of many researchers. The ‘electronic Word of Mouth’ (eWOM) statements that are expressed on the web, are important for business and service industry to enable customers share their point of view. In the last one and half decades, research communities, academia, public and service industries are working rigorously on opinion mining — which is also called, sentiment analysis to identify and categorize opinions from a piece of text. One key use of sentiment analysis is to extract and analyze public moods and views. Researches used sentiment analysis in different ways. For example, to determine market strategy, to improve customer service. One of the key challenges of sentiment analysis is how to extract temporal synsets from text. Temporal synsets may be events, dates, times, or even Explicit lyrics. Tempowordnet is one of the attempts to building a lexicon that may help in finding temporal synsets. In this paper, we propose a framework for discovering temporal verb references (future, past and present) from opinions and using them to build accurate prediction models. The proposed method improved the percentage of discovering the(past, present and future verbs)over the tempowordnet.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Swarming behaviour of salps algorithm for predicting chemical compound activities 一种预测海鞘化合物活性的群集行为算法
A. Hussien, A. Hassanien, E. H. Houssein
{"title":"Swarming behaviour of salps algorithm for predicting chemical compound activities","authors":"A. Hussien, A. Hassanien, E. H. Houssein","doi":"10.1109/INTELCIS.2017.8260072","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260072","url":null,"abstract":"The increasing size of chemical search space of chemical compound databases and importance of similarity measurements to drug discovery are main factors in chem.-informatics research. This paper introduces a swarming behavior of salps algorithm for predicting chemical compound activities. The salp optimization algorithm is proposed for chemical descriptor selection with three initialization (small, mixed and large). The K-nearest neighbor (KNN) was utilized for the fitness function of salps swarm optimization algorithm (SSOA) to choose a small number of features and achieve high classification accuracy. Experimental results reveal the capability of SSA to find an optimal feature subset which maximizes the classification performance and minimizes the number of selected features. A set of assessment indicators are used to evaluate and compared with different algorithms inclduing particle swarm optimization (PSO), Grasshopper Optimization Algorithm (GOA), Grey Wolf Optimizer(GWO), Sine Cosine Algorithm (SCA), Whale Optimization algorithm (WOA) using three initialization method and a superior accuracy was obtained with our proposed approach. Also, in comparison with other algorithms that used the same data, our approach has a higher performance using less number of features. The previous algorithms (GOA, GWO, PSO, SSA, SCA, WOA) are compared and three different methods are used to initialize the different optimization algorithms to ensure capability of the different optimizers to converge from different initial positions namely mixed initialization, small initialization, and large initialization.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122819440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
An evaluation of software requirements tools 对软件需求工具的评估
Atif Shah, M. A. Alasow, Faisal Sajjad, Jawad Javed Akbar Baig
{"title":"An evaluation of software requirements tools","authors":"Atif Shah, M. A. Alasow, Faisal Sajjad, Jawad Javed Akbar Baig","doi":"10.1109/INTELCIS.2017.8260075","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260075","url":null,"abstract":"Software requirements gathering from users, customers, and stakeholders is the very first and critical step in software development. Requirements are volatile due to change in needs, processes and technology. This makes manual requirement management a challenging task. To overcome such problems, practitioners developed various tools to collect and manage software requirements. Use of these tools can safe efforts and time and remove inconsistencies. In this study, we evaluated different tools which are used to manage and gather requirements during the whole life-cycle of software development or in a particular phase, which includes requirements elicitation, analysis, specification, verification, traceability, document support, graphical representation, and tool integration. Tools are analyzed according to functionality, scope, performance and availability.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
EEG based epilepsy detection using approximation entropy and different classification strategies 基于近似熵和不同分类策略的脑电图癫痫检测
Aya Naser, M. Tantawi, Howida A. Shedeed, M. Tolba
{"title":"EEG based epilepsy detection using approximation entropy and different classification strategies","authors":"Aya Naser, M. Tantawi, Howida A. Shedeed, M. Tolba","doi":"10.1109/INTELCIS.2017.8260038","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260038","url":null,"abstract":"Epilepsy is the 4th prevalent neurological disorder, which distinguishes itself by frequent seizures. These seizures are unprovoked and can be detected by investigating the electroencephalogram (EEG) of the subject. In this paper, an automatic method is proposed to discriminate between normal and epileptic (interictal& ictal) classes. Approximation entropy (APEN) has been utilized as a single informative feature. Multiple classifiers such as: support vector machine (SVM), Probabilistic Neural Network (PNN) and Soft-max regression along with different strategies for classification have been examined. Experiments were carried out by the most popular dataset used in this domain. 96.875%, 53.75% and 65% are the best results achieved by soft-max regression classifier using multi-class strategy for normal, interictal and ictal classes respectively.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Schema engineering for enterprise knowledge graphs: A reflecting survey and case study 企业知识图谱的模式工程:反映调查和案例研究
Jonas Jetschni, Vera G. Meister
{"title":"Schema engineering for enterprise knowledge graphs: A reflecting survey and case study","authors":"Jonas Jetschni, Vera G. Meister","doi":"10.1109/INTELCIS.2017.8260074","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260074","url":null,"abstract":"Knowledge graphs for the support of knowledge-intensive tasks and processes, or as a backbone of an organizational digitalization strategy are intensively discussed in recent scientific literature. What is largely missing, are aspects of the organizational management and even the major change of intermediary roles between business domain experts and IT specialists. Based on a literature review this paper introduces a comprehensive definition together with an abstract model of a knowledge graph in companies, a so-called Enterprise Knowledge Graph (EKG). Considering one of its core elements, the development of an EKG schema, i.e. the formal knowledge structure of the business domains to model, was analyzed in detail and reflected in the course of a case study. The new role of a knowledge engineer and its responsibilities as well as necessary competencies were outlined and discussed from real world perspective. The findings of the paper constitute an initial building block of a comprehensive framework for the implementation and the assessment of the maturity of knowledge graphs in organizations.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Development of rheumatoid ontology 类风湿本体的发展
M. Gawich, Marco Alfonse, M. Aref, Abdel-badeeh M. Salem
{"title":"Development of rheumatoid ontology","authors":"M. Gawich, Marco Alfonse, M. Aref, Abdel-badeeh M. Salem","doi":"10.1109/INTELCIS.2017.8260082","DOIUrl":"https://doi.org/10.1109/INTELCIS.2017.8260082","url":null,"abstract":"The semantic representation of different medical information enables the medical information system to understand the meaning of medical terms. Ontology is used as a semantic representation technique that organizes and represents the semantic relations between the medical terms. Rheumatoid disease is one of the common autoimmune diseases; it has several clinical findings and several treatments to control its activity. This paper presents a new ontology building methodology that enables the ontology engineer to represent all types of knowledge and the intervention of experts from earlier stages. In addition, the paper presents the development of rheumatoid ontology that covers the major clinical aspects of the disease.","PeriodicalId":321315,"journal":{"name":"2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信