Data最新文献

筛选
英文 中文
Detecting Overlapping Communities in Social Networks Using A Modified Segmentation by Weighted Aggregation Approach 基于加权聚合改进分割的社交网络重叠社区检测方法
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460632
R. Kashef
{"title":"Detecting Overlapping Communities in Social Networks Using A Modified Segmentation by Weighted Aggregation Approach","authors":"R. Kashef","doi":"10.1145/3460620.3460632","DOIUrl":"https://doi.org/10.1145/3460620.3460632","url":null,"abstract":"Detecting communities of common behaviors, interests, and interactions in social networks is essential to model a network's structure. Overlapping community detection is an NP-Hard problem. Several solutions have been proposed; however, most of these techniques are computationally expensive. We have developed a fast-hierarchical algorithm using the notion of segmentation by weighted aggregation. Experimental results on synthetic and real benchmark networks show that the proposed algorithm effectively finds communities (Clusters) with varied overlap and non-exhaustiveness structures. Our method outperforms the state-of-the-art hierarchical clustering algorithms measured by the F-measure and the computational time.","PeriodicalId":36824,"journal":{"name":"Data","volume":"40 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78689319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIEM Architecture for the Internet of Things and Smart City 面向物联网和智慧城市的SIEM架构
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460747
Abdalrahman Hwoij, As'har Khamaiseh, M. Ababneh
{"title":"SIEM Architecture for the Internet of Things and Smart City","authors":"Abdalrahman Hwoij, As'har Khamaiseh, M. Ababneh","doi":"10.1145/3460620.3460747","DOIUrl":"https://doi.org/10.1145/3460620.3460747","url":null,"abstract":"The Internet of things (IoT) is a new technology that shapes the future of a world that is rapidly being invaded by smart devices connected to the Internet. Such technology has a great role in developing the idea of a smart city. A smart city is a city that takes advantage of existing infrastructure and integrates it with the Internet of things technology to improve the quality of life. Internet of Things (IoT) sensors are distributed geographically around the city to collect data from the environment (i.e.: streets, cars, traffic lights...etc.), process, and manage it to provide intelligent actionable information to citizens. All data transferred through networks of a smart city may be threatened and susceptible to illegal actions such as violation, stealing, and inappropriate use. These security threats affect the privacy and security of users; where hackers can get access to user's data and gain control of their smart homes, cars, medical devices and might even gain control over city traffic lights. All the above enforce the need to have a security system that continuously monitors and tracks all data logs to detect any suspicious activity. In this paper, we propose a Security Information and Event Management (SIEM) approach for smart cities by forwarding event logs generated by smart devices to a security operation center that works around the clock to detect security incidents and handle them. Such an approach aims to create a safe smart living environment.","PeriodicalId":36824,"journal":{"name":"Data","volume":"29 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74942194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fuzzy Cross Recurrence Analysis and Tensor Decomposition of Major-Depression Time-Series Data 重大抑郁时间序列数据的模糊交叉递归分析与张量分解
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460626
T. Pham, F. Y. A. Anezi
{"title":"Fuzzy Cross Recurrence Analysis and Tensor Decomposition of Major-Depression Time-Series Data","authors":"T. Pham, F. Y. A. Anezi","doi":"10.1145/3460620.3460626","DOIUrl":"https://doi.org/10.1145/3460620.3460626","url":null,"abstract":"The mechanism underlying the complex behavior of major or clinical depression has been hypothesized as a dynamical system. This study presents an analysis of mood self-assessment in major depression using the method of fuzzy cross recurrence plots and tensor decomposition. The relationships between positive and negative mental states can be visualized and quantified using the proposed approach. The discovery of cross recurrences or dynamic correlations of the two opposite mental states can be helpful for targeted therapy in the management of personalized depression either under or without antidepressant drugs.","PeriodicalId":36824,"journal":{"name":"Data","volume":"81 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75654832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Regression analysis for network intrusion detection 网络入侵检测的回归分析
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460751
Arun Nagaraja, U. Boregowda, V. Radhakrishna
{"title":"Regression analysis for network intrusion detection","authors":"Arun Nagaraja, U. Boregowda, V. Radhakrishna","doi":"10.1145/3460620.3460751","DOIUrl":"https://doi.org/10.1145/3460620.3460751","url":null,"abstract":"Machine learning and statistics are categorized as part of data science. Regression is one of the techniques of machine learning. Most of the contributions in the literature in respect to intrusion detection are mainly based on dimensionality reduction using techniques such as PCA, SVD, feature selection, feature reduction techniques and application of classifier algorithms. Very less attention is paid on regression analysis for intrusion detection in the existing literature. There is a scope to apply regression-based analysis for intrusion detection. Regression analysis may be applied for dimensionality reduction, classification or prediction tasks. This paper throws light on the possibility of applying regression analysis for intrusion detection and outlines some of the contributions that addressed regression analysis to perform intrusion detection.","PeriodicalId":36824,"journal":{"name":"Data","volume":"15 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77914301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent learning systems for LLL courses: Intelligent learning systems for LLL courses 法学课程智能学习系统:法学课程智能学习系统
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460625
G. Bekmanova, Ye.A. Ongarbayev, Baubek Somzhurek, Nurlan Mukatayev
{"title":"Intelligent learning systems for LLL courses: Intelligent learning systems for LLL courses","authors":"G. Bekmanova, Ye.A. Ongarbayev, Baubek Somzhurek, Nurlan Mukatayev","doi":"10.1145/3460620.3460625","DOIUrl":"https://doi.org/10.1145/3460620.3460625","url":null,"abstract":"The proposed model for organizing blended and distance learning involves the creation of an individual learning path, which makes it flexible. The learning model is represented using an ontological model, and the decision rules for the model are logical rules. This training model is used to train teachers in digital literacy and distance learning in the context of Covid 19","PeriodicalId":36824,"journal":{"name":"Data","volume":"70 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73835613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk Assessment in Smartphones: Comprehensive Analysis 智能手机的风险评估:综合分析
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460737
Mohammed Nasereddin, A. Qusef
{"title":"Risk Assessment in Smartphones: Comprehensive Analysis","authors":"Mohammed Nasereddin, A. Qusef","doi":"10.1145/3460620.3460737","DOIUrl":"https://doi.org/10.1145/3460620.3460737","url":null,"abstract":"Smartphones are multi-purpose and widely used devices in various fields, in terms of personal use, and companies and governments. Increasing dependence on them opened the way for increased violations on its users, as it became a fat substance for criminals, for their illegal practices, so it encountered serious and targeted security threats. This paper presents a set of rules and controls that will reduce the risks that threaten smartphone users. Furthermore, this work provides the methods of risk assessment that are related to smartphones. It identifies the assets and lists several different threats that are relevant. Each risk has its impact on the assets, this is described by mapping it with the likelihood of each threat.","PeriodicalId":36824,"journal":{"name":"Data","volume":"81 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76269303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Electronic Health Records in Polyclinics: Barriers & Benefits 电子健康记录在综合诊所的应用:障碍与益处
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460628
Salma F. Elharish, I. Denna, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi
{"title":"Application of Electronic Health Records in Polyclinics: Barriers & Benefits","authors":"Salma F. Elharish, I. Denna, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi","doi":"10.1145/3460620.3460628","DOIUrl":"https://doi.org/10.1145/3460620.3460628","url":null,"abstract":"Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these systems. Such barriers can be technical, financial, organizational, individual, or even legal. This study aims to identify the important barriers associated with the implementation of EHR in polyclinics and to measure the perception of healthcare staff and their knowledge about this system. A self-prepared modified questionnaire and 100 participants were involved in this study. The questionnaire was composed of three sections: section (A) was concerned with demographic data, Section (B) was related to the knowledge/attitude and the candidates' perception towards EHR, and whereas Section (C) was focused on the practical implementation of the e-health record such as what volunteer's perception about the benefits and concerns of the implementation of the system. There were different opinions, views, and perceptions among the health care staff who participated in the study. However, there is a general agreement among all participants to the factors that delay the implementation of the EHRs system in Libya. The results show a high cost of adopting EHRs, lack of experience with the use of computers, security concerns regarding the use of EHR systems, resistance to change and adopt new technology to be significant barriers when it comes to EHRs implementation and adoption.","PeriodicalId":36824,"journal":{"name":"Data","volume":"143 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Energy Saving Techniques in CoAP of Internet of Things 物联网CoAP中的节能技术
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460743
M. B. Yassein, Ismail Hmeidi, Fatimah Alghazo, Bayan Odat, Ayat Smairat
{"title":"Energy Saving Techniques in CoAP of Internet of Things","authors":"M. B. Yassein, Ismail Hmeidi, Fatimah Alghazo, Bayan Odat, Ayat Smairat","doi":"10.1145/3460620.3460743","DOIUrl":"https://doi.org/10.1145/3460620.3460743","url":null,"abstract":"Internet of Things is a connection of associated objects wherein theseobjects can gather information and interchange them utilizing sensors. IoT allowsconnecting objects and property as one unit, enables us to control everything we want,and tells us of the state of things, whether it is replacing or no. In the coming times,the world is adapting to apply the Internet of things in several major fields, among themost important domains that can integrate into it are industries, companies, healthcare, and communications. The inserted sensors of associated gadgets play out asignificant job and it has restricted energy abilities, many techniques studied theproblem of restricted energy. This works center around Application Layer methodsand explicitly on one of the main conventions, the Constrained Application Protocol(CoAP). We examine the most reasonable energy-effective procedures to actualizethe CoAP, and finally, we compare these techniques on different levels.","PeriodicalId":36824,"journal":{"name":"Data","volume":"15 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85931267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault 使用第三方日志库的物联网(IoT)取证模型
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460746
Ahmed Hambouz, Yousef Shaheen, M. Ababneh
{"title":"An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault","authors":"Ahmed Hambouz, Yousef Shaheen, M. Ababneh","doi":"10.1145/3460620.3460746","DOIUrl":"https://doi.org/10.1145/3460620.3460746","url":null,"abstract":"Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.","PeriodicalId":36824,"journal":{"name":"Data","volume":"13 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85615102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital transformation in Morocco by 2025: How ADD is catalysing this transformation? 到2025年摩洛哥的数字化转型:ADD如何促进这一转型?
IF 2.6
Data Pub Date : 2021-04-05 DOI: 10.1145/3460620.3460762
Ismail Mhamdi, Hafid Barka
{"title":"Digital transformation in Morocco by 2025: How ADD is catalysing this transformation?","authors":"Ismail Mhamdi, Hafid Barka","doi":"10.1145/3460620.3460762","DOIUrl":"https://doi.org/10.1145/3460620.3460762","url":null,"abstract":"The Agency of Digital Development (ADD) is a strategic public entity placed under the supervision of the Ministry in charge of the Digital Economy. It has legal personality and financial autonomy and was created under Law No 61-16 published in the official bulletin dated August 30, 2017. ADD is an institutional actor responsible for implementing the State’s strategy for digital development and promoting the dissemination of digital tools and the development of their use among citizens. Indeed, ADD has a note of general guidelines for the digital development in Morocco by 2025; this note refers to three strategic axes.","PeriodicalId":36824,"journal":{"name":"Data","volume":"14 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78428163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信