2020 2nd Annual International Conference on Information and Sciences (AiCIS)最新文献

筛选
英文 中文
Proposed Recommender System For Solving Cold Start Issue Using k-means Clustering and Reinforcement Learning Agent 基于k-均值聚类和强化学习代理的冷启动问题推荐系统
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00013
A. B. A. Alwahhab
{"title":"Proposed Recommender System For Solving Cold Start Issue Using k-means Clustering and Reinforcement Learning Agent","authors":"A. B. A. Alwahhab","doi":"10.1109/AiCIS51645.2020.00013","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00013","url":null,"abstract":"The cold start problem for new users is making a real challenge in the recommender system's operation to provide suggestions for a new user. This paper suggests a reinforcement learning recommender system that provides the automatic systems of multi-armed bandits which are learning and improving its efficiency from experience without being explicitly programmed. So, a movie recommender system is built using the K-Means Clustering to cluster the dataset and epsilon greedy reinforcement learning agent to manage multi-armed bandits recommendation process. The recommender system consists of multi-armed bandits that connect to five clustered datasets represents five movie genres and that was the first contribution. The second contribution is checking whether the NDCG is sufficient in measuring the quality of services in multi-armed bandits' recommender systems. The proposed recommender system has been tested using a movie lens 100-K dataset. The system measured using accumulative gain, RMSE, and NDCG. The results are showing efficiency to learn new user preferences.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122989295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient and Effective Scheme for ECG Compression 一种高效的心电压缩方法
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00024
Alaa Maieed Ali, A. F. Ahmed, A. Najim
{"title":"Efficient and Effective Scheme for ECG Compression","authors":"Alaa Maieed Ali, A. F. Ahmed, A. Najim","doi":"10.1109/AiCIS51645.2020.00024","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00024","url":null,"abstract":"In this study, a performance analysis of several ECG compression schemes is introduced to discover the best algorithm for compressing the ECG signals. The main target of compressing these signals is to minimize their volume and thus to decrease the expense of their saving and sending. Different ECG records from MIT-BIH are used in this work for testing purposes, and various methods are offered for compression task: Discrete Cosine Transform (DCT), Fast Fourier Transform (FFT), Discrete Wavelet Transforms (DWT), Discrete Wavelet Packet Transform (DWPT) and Discrete Wave Atom Transform (DWAT). The achievement of the aforementioned techniques is quantified mathematically based on “Compression Rate” (CR) and “Percentage Root Mean Square Difference” (PRD). The results demonstrated that the DWAT framework is the best in terms of the previously mentioned metrics.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133230430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dragonfly Algorithm for Enhancing PEGASIS Protocols in Wireless Sensor Networks 无线传感器网络中增强PEGASIS协议的蜻蜓算法
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00027
Shifaa I. Abdulhameed, S. Aliesawi
{"title":"Dragonfly Algorithm for Enhancing PEGASIS Protocols in Wireless Sensor Networks","authors":"Shifaa I. Abdulhameed, S. Aliesawi","doi":"10.1109/AiCIS51645.2020.00027","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00027","url":null,"abstract":"Wireless sensor networks (WSNs) and their various applications become more remarkable recently. Due to the energy resource impediments, the energy efficiency is an effective factor in such networks. Therefore, the researches have been directed to improve and extend network lifetime. This paper proposes a routing protocol for the applications of WSN. The proposed protocol based on the Power-Efficient Gathering in Sensor Information Systems (PEGASIS) protocol by using improved methods. The proposed protocol called PEG-DA. PEG-DA indicates to PEGASIS protocol consolidated with Dragonfly Algorithm (DA) that improves the energy consumption of WSN by selecting the optimal chain to the base station. At the nodes distribution phase, the study adopted three methods such as Random, Firefly Algorithm and Control considering that the base station is static to attain the best efficiency of consumption energy. The network area is divided into five regions according to the applied method to mitigate the load of transmitting data and reducing the communication cost from nodes to the base station. The simulation based on Matlab 2019 simulator to conduct the experiment and the results show the proposed approach perfection in the state of remaining energy along with significant enhancement in relating to network lifespan, and an effective delay reduction in a comparison with the original PEGASIS protocol.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114417189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Mediating Role of Organizational Ambidexterity in the Relationship between Business Intelligence Systems and the Learning Organization Exploratory study at the Ramadi's Hospitals 组织双元性在商业智能系统与学习型组织关系中的中介作用:拉马迪医院的探索性研究
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00041
Wesam ali Husien, Saad Noori Alhamdany, Iftikhar AbdHussein Kataa
{"title":"The Mediating Role of Organizational Ambidexterity in the Relationship between Business Intelligence Systems and the Learning Organization Exploratory study at the Ramadi's Hospitals","authors":"Wesam ali Husien, Saad Noori Alhamdany, Iftikhar AbdHussein Kataa","doi":"10.1109/AiCIS51645.2020.00041","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00041","url":null,"abstract":"This study aims to identifying the relationship and impact between business intelligence systems strategies and organizational ambidexterity within the learning organization in the hospitals operating in the center of Anbar province, namely: (Ramadi Teaching Hospital, Women's and Children's Hospital, Al Razi private hospital). The study adopted the purposive sample method since it represents (50%) of the entire community of the research. Other suitable statistical methods were also sued with the help of the SPSS software and the construction of a questionnaire that covered (82) individuals, making the actual total of the selected hospitals in Anbar. However, the number of retrieved questionnaire answers were (76), thus making (92%) of the total number of the original study sample. That percentage included directors and heads of departments, employees and administrators working in hospitals in the center of Anbar province. The study indicated that the skills of business intelligence and organizational ambidexterity combined morally affect the learning organization with its components (leadership, learning, strategy, change), which in turn shows the important role played by business intelligence systems and organizational ambidexterity within the learning organization as one of the pillars of the organization. Based on these findings a set of recommendations and proposals were presented for the future.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126161876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Cardano's method for solving cubic equation in the cryptosystem to protect data security against Cyber attack 利用卡尔达诺算法求解密码系统中的三次方程,保护数据安全免受网络攻击
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00030
Basim najim al-din abed, Bayda Z. Kamil, M. A. Hameed, Jenan N. Abdullah
{"title":"Using Cardano's method for solving cubic equation in the cryptosystem to protect data security against Cyber attack","authors":"Basim najim al-din abed, Bayda Z. Kamil, M. A. Hameed, Jenan N. Abdullah","doi":"10.1109/AiCIS51645.2020.00030","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00030","url":null,"abstract":"With the development taking place these days in information technology and protecting data security of data transmitted over the internet, there is an urgent and necessary need in order to protect data from falling into the hands of unauthorized persons. The difficulty of breaking the cipher text representing by using multiple keys instead of one key in the process of encryption and decryption, so it found that the mathematics represent a basic in many sciences because of the wide using for the concepts of the equations and functions, so one of the important using of the mathematics is in the cryptography science because all the cryptosystems in the world dells with the arithmetic operations, in this paper a new cryptosystem presented through using the 3ed order equation (cubic equation) for one variables and using Cardano's method for solving cubic equation, in order to add more security and complexity to the proposed cryptosystem since there is four different symmetric keys and changeable formula of the equation, many cryptanalysis applied on the proposed cryptosystem to ensure the validity and secrecy of the proposed algorithm, all results show the strength of the cryptosystem against the attacks as shown in the result section.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128585813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Innovation work Behaviors as a mediator of the relationship between Reliable leadership and Knowledge Sharing Exploratory study at the Baghdad's Ministry of Labor and Social Affairs 创新工作行为在可靠领导与知识共享关系中的中介作用:巴格达劳动与社会事务部的探索性研究
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00042
Hadeel Kadhim Saaed, Saba Noori Alhamdany, Ahmed. Q. Dawood
{"title":"Innovation work Behaviors as a mediator of the relationship between Reliable leadership and Knowledge Sharing Exploratory study at the Baghdad's Ministry of Labor and Social Affairs","authors":"Hadeel Kadhim Saaed, Saba Noori Alhamdany, Ahmed. Q. Dawood","doi":"10.1109/AiCIS51645.2020.00042","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00042","url":null,"abstract":"This research aims to measure the impact of reliable leadership in knowledge sharing through the application of Innovation work behaviors at the Ministry of Labor and Social Affairs in Baghdad. Based on the leader-member exchange theory(LMX) so that to test the hypotheses of the study. The Non-probabilistic sample was used on (84%) employees - out of the total participants number of (275) of the senior and middle administration (directors, heads) of the Ministry of Social Affairs operating in Baghdad, The data collected along with the AMOS and SPSS V.23 statistical analyses software. The results showed a positive relation between the reliable leadership and the knowledge sharing. The results also showed that the Innovation work behavior played a partial mediation between reliable leadership and knowledge sharing, so based on these results, theoretical and applicable contents were presented in order to have the results of the study future.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127311290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/aicis51645.2020.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/aicis51645.2020.00003","DOIUrl":"https://doi.org/10.1109/aicis51645.2020.00003","url":null,"abstract":"","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130269830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Digitalization in Developing Internal Audit Practices in an IT Environment 数字化在IT环境下发展内部审计实践中的作用
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00043
Younis Ahmed Al-Mohammedi
{"title":"The Role of Digitalization in Developing Internal Audit Practices in an IT Environment","authors":"Younis Ahmed Al-Mohammedi","doi":"10.1109/AiCIS51645.2020.00043","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00043","url":null,"abstract":"While the role of internal audit has expanded steadily in the digital era to become an organizational strategic pillar, auditors have to bear the responsibility of proactively responding to this expanded role in the current business environment. Thus, The study aims to demonstrate the role of digitalization through numerous strategies and methods in developing internal audit practices in an information technology IT environment. Design/methodology/approach- Based on the nature of the problem and the objectives of the research, a descriptive analytical approach was adopted to determine the role of digitalization in developing internal audit practices, as well as analyzing data and information related to the development of internal audit practices in the local environment theoretically and in the field through a questionnaire designed for this purpose. Findings - The study concluded that digitalization contributes to the development of internal audit practices in an IT environment while acquiring knowledge and skills compatible with the use of modern digital technologies contributes to digitalization of the audit profession. Research limitations/implications- The limitation of the study stems from its application in a local research context. Practical implications- The researcher recommended developing digital platforms and programs for the purpose of developing internal audit practices in the local business environment noting that activating the digitalization mechanisms in an IT environment requires paying attention to strategic risks. Originality/value- The study addresses the deficiencies that the internal audit function faces in the local business environment resulting from organizational, legislative, administrative and personal factors, which undoubtedly hinder the achievement of the strategic goals and visions of the internal audit units and departments.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114198604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Role of Information and Communication Technology on Knowledge Sharing among the Academic Staff during COVID-19 Pandemic COVID-19大流行期间信息通信技术在学术人员知识共享中的作用
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00032
Alaa S Jameel, A. Ahmad
{"title":"The Role of Information and Communication Technology on Knowledge Sharing among the Academic Staff during COVID-19 Pandemic","authors":"Alaa S Jameel, A. Ahmad","doi":"10.1109/AiCIS51645.2020.00032","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00032","url":null,"abstract":"Knowledge Sharing and Information and Communication Technology (ICT) has attracted the attention of researchers during the COVID 19 pandemic and there were two factors considered as essential elements for universities during the COVID 19 situation. This is because most of the universities postponed the physical attendance at universities and used technology tools to keep the communication among the academic staff and students. ICT allows for the rapid search, access, and retrieval of information and collaboration between employees, while ICT infrastructure refers to the equipment, software, communication systems, and the human component such as experience, skills, command, principles. The purpose of this study was to investigate the impact of ICT and ICT infrastructure on Knowledge Sharing among academic staff. The study was conducted at nine Iraqi public universities located in Baghdad and the sample was the academic staff at these universities. The study employed the stratified sample method to ensure equal distribution among the nine universities, and the data was collected using the questionnaire. Structural equation modelling was utilized to analyze 267 valid questionnaires. After testing the measurement model and ensuring the model fit, the study examined the structural model to find the results. The result showed that ICT and ICT infrastructure had positive and significant impact on Knowledge Sharing among the academic staff at Iraqi public universities. However, the result indicated the Knowledge Sharing was highly impacted by ICT infrastructure. The government and universities should enhance and improve the ICT infrastructure that would provide a great benefit to the Iraqi universities' reputation as well as the universities' rank.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A semantic model of morphological information retrieval: A comparative accumulative analysis 形态信息检索的语义模型:比较累积分析
2020 2nd Annual International Conference on Information and Sciences (AiCIS) Pub Date : 2020-11-01 DOI: 10.1109/AiCIS51645.2020.00011
N. Z. Tawfeeq, W. S. Abed, Omar Ghazal
{"title":"A semantic model of morphological information retrieval: A comparative accumulative analysis","authors":"N. Z. Tawfeeq, W. S. Abed, Omar Ghazal","doi":"10.1109/AiCIS51645.2020.00011","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00011","url":null,"abstract":"The main function of information retrieval (IR) system is to obtain efficient and exactly a minimum subset of document that is related to user concern. Synonymy and polysemy act as a barrier for natural language processing algorithms due to overestimation and misrepresentation. The proposed model uses the implicit of higher rank structure in combing terms with document to optimize the identification of relevant document based on terms used in queries with an enhanced automatic indexing approach has been suggested. The study benefited from the use of Term Frequency Inverse Document Frequency (TF-IDF) method to assign weight for each term in the document. Each document is presented as a vector of weight in the space. Also, the user query is represented as vector of weight. Finally, a Singular Value Decomposition (SVD) approach has been used in which a huge weight of term-document matrix is factorized into collection of vectors for approximation of the original matrix. The cosine similarity is also used to determine the closed vector of document to the user query. In regard to English information retrieval, It was observed that TF-IDF showed higher performance before term percentage 0.3 while Latent Semantic Indexing (LSI) was more stable than TF-IDF, especially in terms of the use of word association.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信