2017 9th International Conference on Information and Knowledge Technology (IKT)最新文献

筛选
英文 中文
A deep super-vector based representation for clustering 基于深度超向量的聚类表示
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258629
Amir Namavar Jahromi, S. Hashemi
{"title":"A deep super-vector based representation for clustering","authors":"Amir Namavar Jahromi, S. Hashemi","doi":"10.1109/IKT.2017.8258629","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258629","url":null,"abstract":"Deep learning is a powerful method that has achieved huge success in numerous supervised applications. Nonetheless, the performance of deep learning in unsupervised learning has been far from being explored. Inspired by this observation, we proposed a deep autoencoder based representation learning for clustering. For this purpose, we devised a stacked autoencoder without the fine-tuning step and concatenated all layers' representations together to make a super vector that is a more powerful representation for clustering. We use k-means as our clustering algorithm and compare its results with the k-means clustering results on original representations. Our method was evaluated on six datasets and the results are promising.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115969432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach to WF-nets generation using graph transformation system 一种利用图变换系统生成wf网络的方法
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258621
M. Norouzi, V. Rafe
{"title":"An approach to WF-nets generation using graph transformation system","authors":"M. Norouzi, V. Rafe","doi":"10.1109/IKT.2017.8258621","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258621","url":null,"abstract":"Modern information systems produce enormous amounts of event log. The area of process mining deals with taking out knowledge from this data. Process mining provides mature theoretical and practical foundations for discovering processes from different kinds of event log. The main idea of process mining is to start from real event log and use these data to infer process models. The most important problem is lack of event log because many industries deny to publish their private data. This causes a serious obstacle for the reconstruction and developing more effective process mining algorithms. The main contribution of this research is generation of a variety of “Process Models” that could be used as a base for making event logs. The solution is based on GROOVE a graph transformation tool set, which allows creating and applying graph grammars.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimation of exercise tolerance in low dose sulphur mustard exposed cases with dyspnea using a novel estimation framework 用新的估计框架估计低剂量硫芥暴露呼吸困难患者的运动耐量
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258633
Aida Khiabani, A. Sabbaghi, Rasool Aliannejad
{"title":"Estimation of exercise tolerance in low dose sulphur mustard exposed cases with dyspnea using a novel estimation framework","authors":"Aida Khiabani, A. Sabbaghi, Rasool Aliannejad","doi":"10.1109/IKT.2017.8258633","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258633","url":null,"abstract":"In chemical injured patients with pulmonary complications, asthma and continuous coughs are occurred regularly which are influenced on their daily activities. In order to evaluate their pulmonary functionality in fulfilling daily activities, two popular tests are done. The first one, CPET (Cardiopulmonary Exercise Test), checks the functionality of heart and lung during his/her activity. The second test, spirometry, evaluates lung's functionality during his/her rest time. However, CPET is more expensive than the spirometry test. On the other hand, it is too hard for most of the patients to fulfil the CPET. Therefore, we present a novel framework to estimate the CPET's parameters based on spirometry test's parameters. By using such a model, it is possible for all of the chemical injured patients to evaluate their pulmonary functionality easily and economically just by fulfilling spirometry test. In addition to estimation, the model can rank the most important spirometry parameters for estimation of the CPET's parameters.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131495629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHGA: Proposed hybrid genetic algorithm for feature selection in binary classification PHGA:提出了一种用于二值分类特征选择的混合遗传算法
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258632
Aida Khiabani, A. Sabbaghi
{"title":"PHGA: Proposed hybrid genetic algorithm for feature selection in binary classification","authors":"Aida Khiabani, A. Sabbaghi","doi":"10.1109/IKT.2017.8258632","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258632","url":null,"abstract":"In data pre-processing, feature selection has particular importance. Selection of appropriate features in classification leads to accuracy enhancement, reduction of execution time and increment of model interpretability. In this paper, an innovative algorithm for feature selection is proposed which combines filter and wrapper techniques and uses benefits of evolutionary computation and assembly of independent measures. Experimental results show the superiority of the proposed hybrid genetic algorithm for feature selection in binary classification (PHGA). In comparison with other existing methods PHGA can select the smaller set of features in a shorter execution time with higher classification accuracy.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115951494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fall detection for elderly in assisted environments: Video surveillance systems and challenges 辅助环境中老年人跌倒检测:视频监控系统和挑战
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258624
Shabnam Ezatzadeh, M. Keyvanpour
{"title":"Fall detection for elderly in assisted environments: Video surveillance systems and challenges","authors":"Shabnam Ezatzadeh, M. Keyvanpour","doi":"10.1109/IKT.2017.8258624","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258624","url":null,"abstract":"Fall Detection is an important challenge in the field of healthcare. Especially for elderly people who live alone. Therefore, reliable surveillance to reduce the effects of falls is an essential requirement. Video surveillance systems provide important areas for detecting unusual events such as falls, with the growing use of cameras in assisted environments. In this paper first, the fall detection techniques are expressed in video sequences. Then, the available challenges are introduced in a proposed classification. Finally, the presented techniques are evaluated and analyzed in terms of addressing the challenges. Understanding the challenges and ways to handle them can lead to a comparison and assessment of the presented approaches. It will also direct researchers to the accurate recognition and improvement of existing approaches in the future.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A novel image steganography method based on DCT and LSB 一种基于DCT和LSB的图像隐写新方法
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258628
A. Sheidaee, Leili Farzinvash
{"title":"A novel image steganography method based on DCT and LSB","authors":"A. Sheidaee, Leili Farzinvash","doi":"10.1109/IKT.2017.8258628","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258628","url":null,"abstract":"Image steganography is the study of embedding sensitive information in images without distorting their visual quality. In this paper, we have proposed an efficient image steganography algorithm to embed the secret image in the cover image. In this scheme, the secret image is encrypted that refers to the transformation of the secret data with Discrete Cosine Transform (DCT) compound with its hash file that is secured by a secret key. By this means, the embedded image is transformed into a noise-like cipher image called random noise in steganography methods with its HMAC file. The randomness property of the resultant image reduces the possibility of its detection by the human visual system (HVS) and steganalysis techniques. Next, LSB substitution method is employed to embed the transformed image in the cover image. To authenticate the image at the receiver side, the HMAC of the secret image is embedded in the cover image using LSB method. Simulation results have verified the effectiveness of the proposed algorithm.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
RoadMap for building recommender system conducting requirements engineering 构建推荐系统进行需求工程的路线图
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258616
Hengame Abbasi Mesrabadi, A. Barforoush
{"title":"RoadMap for building recommender system conducting requirements engineering","authors":"Hengame Abbasi Mesrabadi, A. Barforoush","doi":"10.1109/IKT.2017.8258616","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258616","url":null,"abstract":"Due to the fact that the incorrect definition of requirements results in unexpected cost, system unreliability and not granting users expectations, so the question that “which requirements should be taken into consideration in that domain?” is raised when building recommender systems. Furthermore, because recommender systems are used in various domains, there are very challenges when building them. So we are obliged to conduct requirements engineering which through it, better understanding of the system and requirements control to be achieved. So in this paper the process of determination of recommender system requirements in various domains has been analyzed and engineered, and in the end, a methodology for requirements engineering in recommender systems has been offered. To do this, we implemented one of the existent recommender systems, and at the next step, we built the same recommender system based on requirements engineering. In the end, we evaluated and compared the results of two recommender systems, one of them was built with and the other one without conducting requirements engineering by the use of “Precision”, “Recall” and “Response Time” metrics. While doing this study, a “RoadMap” and “Methodology” have been achieved, which we used them in another recommender system that the results of its evaluation has been presented too.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114248462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging trends in open research data 开放研究数据的新趋势
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258631
Nadim Akhtar Khan, Humma Ahangar
{"title":"Emerging trends in open research data","authors":"Nadim Akhtar Khan, Humma Ahangar","doi":"10.1109/IKT.2017.8258631","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258631","url":null,"abstract":"Open Data is gaining much importance among different stakeholders and is being widely accepted as vital component for decision making and result oriented research activities at global level. The collaborative research activities have greatly been benefited by the availability of Open Research Data. The open data encourages transparency and democratic control by encouraging participation, facilitating selfempowerment and providing provisions for improved efficiency and effectiveness of government services and creation of new knowledge from existing data sets. The availability of Open Research data in different subject areas enhances research quality by encouraging broader visibility and sharing provisions among globally distributed community members. This scenario greatly encourages the economic re-usage of existing open research datasets in local research environments for timely and more precise comparative results. The paper thus attempts to analyse the open research data repositories in different setups available at re3 data registry and to ascertain various aspects like content type, access privileges, growth in terms of subject areas and countries, uploading and downloading facilities, data harvesting and retrieval provisions etc.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125547633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How the control over smart meters is lost in the Yan et al. lightweight AKA scheme for smart grids 在Yan等人的智能电网轻量级AKA方案中,对智能电表的控制是如何丢失的
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258622
Mahyar Shariat, M. Safkhani
{"title":"How the control over smart meters is lost in the Yan et al. lightweight AKA scheme for smart grids","authors":"Mahyar Shariat, M. Safkhani","doi":"10.1109/IKT.2017.8258622","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258622","url":null,"abstract":"The emerging Internet of Things (IoT) offers major improvements to many applications such as Smart Grid. The discovery of security threats are becoming a challenge to fulfill the purpose of the IoT ecosystem. Designing lightweight Authentication and Key Agreement (AKA) protocols are critical to establish mutual authentication while reducing overloads on particular constrained devices including Smart Meters. The Yan et al. lightweight AKA scheme was proposed to provide mutual authentication along with multicast mechanism and other features for Smart Grids which facilitates power management while maintaining it's security and privacy. However, in this paper we show that the Yan et al. lightweight AKA scheme is vulnerable to replay attack in the multicast key generation phase in which the control over Smart Meters could be lost. Specifically, in this scheme, the attacker is able to interrupt the multicast messages without revealing the interruption to the Building Area Network (BAN) gateway. So, the desired Smart Meters do not receive any emergency multicast messages during power outages for a while. So there is a disturbance in the Smart Grid that could result in a Denial of Service (DoS) attack.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130447268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Introducing a method for improving the performance of routing algorithms in unmanned aeronautical ad-hoc networks 介绍了一种改进无人航空自组织网络中路由算法性能的方法
2017 9th International Conference on Information and Knowledge Technology (IKT) Pub Date : 2017-10-01 DOI: 10.1109/IKT.2017.8258623
Morteza Kardoust, M. Khayyambashi, Ali Bohlooli
{"title":"Introducing a method for improving the performance of routing algorithms in unmanned aeronautical ad-hoc networks","authors":"Morteza Kardoust, M. Khayyambashi, Ali Bohlooli","doi":"10.1109/IKT.2017.8258623","DOIUrl":"https://doi.org/10.1109/IKT.2017.8258623","url":null,"abstract":"One of the most widely used applications of wireless networks is in unmanned aeronautical ad-hoc networks. In these networks, the flying nodes in the mission must send their information to the ground base. If a UAV is outside the coverage of the ground base, it loses its connection. The solution is to send the information to the neighboring nodes. These neighboring nodes redirect the information to the ground base. Due to high node dynamics and rapid changes in network topology, one of the biggest concerns in these networks is routing between nodes. Previous routing methods, although making improvement in the overall performance in these networks led to routing overhead and network delay. In the present study a new routing method is introduced. In this new method a routing algorithm is presented with a focus on improving the packet delivery ratio and throughput therefore reducing the end to end delay and network overhead. In the proposed method instead of using only one route between nodes, all discovered routes in the network are kept in the nodes routing table. Then the best route is used as the first proposed route between the source and destination nodes and after failing this route, the second route is utilized immediately. This decreases the broadcasting of route discovery packets through the network. According the simulation results, the proposed method has proved more efficient. There has been an increase in packet delivery ratio by 4% in average, in end to end delay approximately by 30% and in the throughput ratio of the network by 9% in comparison with other methods in different scenarios.","PeriodicalId":338914,"journal":{"name":"2017 9th International Conference on Information and Knowledge Technology (IKT)","volume":"457 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121110785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信