{"title":"Adverse Drug Reaction Detection Using Data Mining Techniques: A Review Article","authors":"Behnaz Pourebrahim, M. Keyvanpour","doi":"10.1109/ICCKE50421.2020.9303709","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303709","url":null,"abstract":"Adverse drug reactions (ADRs) are side effects that occur when taking the drug in natural doses. ADRs are a public health issue because they hospitalize millions of patients worldwide each year. Early detection of ADRs reduces economic costs and prevents fatality.Diagnosis of ADRs usually depended on voluntary reporting or medical information. But in recent years, the data sent by the user on social media has become a significant source for detecting ADR. Twitter is a social media where people use short messages as a way to communicate. Limit the number of words on Twitter allows users to use words purposefully and focused. The information provided by users about drugs and their adverse reactions on Twitter is an important resource for post-marketing drug monitoring.In recent years, machine learning and data mining methods have been considered in the field of data science for ADR detection. Important challenges in this area are divided into three parts: data pre-processing, extracting meaningful features, and selecting the best model for classification.The aim of this study is to study, review and challenge the methods of ADR diagnosis by data mining on social media, especially Twitter.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Algorithm for Evaluating Trust in Online Social Networks","authors":"Nina Fatehi, H. Shahhoseini","doi":"10.1109/ICCKE50421.2020.9303641","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303641","url":null,"abstract":"The acceleration of extending popularity of Online Social Networks (OSNs) thanks to various services with which they provide people, is inevitable. This is why in OSNs security as a way to protect private data of users to be abused by unauthoritative people has a vital role to play. Trust evaluation is the security approach that has been utilized since the advent of OSNs. Graph-based approaches are among the most popular methods for trust evaluation. However, graph-based models need to employ limitations in the search process of finding trusted paths. This contributes to a reduction in trust accuracy. In this investigation, a learning-based model which with no limitation is able to find reliable users of any target user, is proposed. Experimental results depict 12% improvement in trust accuracy compares to models based on the graph-based approach.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mojtaba Azimifar, Babak Nadjar Araabi, Hadi Moradi
{"title":"Forecasting stock market trends using support vector regression and perceptually important points","authors":"Mojtaba Azimifar, Babak Nadjar Araabi, Hadi Moradi","doi":"10.1109/ICCKE50421.2020.9303667","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303667","url":null,"abstract":"Intelligent stock trading systems use soft computing techniques in order to make trading decisions in the stock market. However, the fluctuations of the stock price make it difficult for the trading system to discover the underlying trends. In order to enable the trading system for trend prediction, this paper suggests using perceptually important points as a turning point prediction framework. Perceptually important points are utilized as a high-level representation for the stock price time series to decompose the price into several segments of uptrends and downtrends and define a trading signal which is an indicator of the current trend. A support vector regression model is trained on this high-level data to make trading decisions based on predicted trading signal. The performance of the proposed trading system is compared with three other trading systems on five of the top performing stocks in Tehran Stock Exchange, and obtained results show a significant improvement.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Effect of Compression Settings in the Classification of Image File Formats","authors":"Z. Seyedghorban, M. Teimouri","doi":"10.1109/ICCKE50421.2020.9303655","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303655","url":null,"abstract":"The classification of file fragments of various file formats is an important task in many applications such as intrusion detection systems, web content filtering, and digital forensics. To date, many research works have presented various feature sets and methods for the task of file fragments classification. Despite this variety, no research work has mainly focused on image file formats in particular. In this paper, the classification of the image file formats is studied. Moreover, we examine the effect of different compression settings on the accuracy of a trained model. It is shown that when during the training phase only specific compression settings are considered, the trained machine performs poorly for unseen compression settings. Considering this fact, we propose our method, in which, fragments with different compression settings but the same file format are merged to form a more general class label. We compare our approach with three other methods proposed in the literature. Results indicate that the proposed feature set leads to a more accurate classifier.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Multi-party Sorting Protocol Based on Distributed Oblivious Transfer","authors":"Motahareh Dehghan, B. Sadeghiyan","doi":"10.1109/ICCKE50421.2020.9303630","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303630","url":null,"abstract":"In the present paper, a secure multi-party protocol for sorting the private values, without disclosing them, is presented. We extend the Yao’s millionaire problem to n parties. Secure comparison and sorting the wealth of n parties using the Yao’s protocol requires running it $frac{{n times (n - 2)}}{2}$ times. For a wealth interval of N, the complexity the Yao’s protocol execution for these n parties has an order of N × n2.The Secure Multi-party Computation method is utilized to develop the protocol of secure multi-party sorting. We also employ an easy knapsack problem to distinguish the corresponding indices of different participants. Moreover, a modified version of the distributed oblivious transfer protocol is proposed to improve our proposed protocol and reduce its overall compexity. The computational and communication complexities of our protocol for secure multi-party sorting based on the distributed oblivious transfer, are both equal to n. Finally, the security of the proposed protocol against adversaries of semi-honest type is proved.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131355707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fusion Beacon and Machine Vision Based on Extended Kalman Filter for Indoor Localization","authors":"Nafise Dehghan Salmasi, R. Azmi","doi":"10.1109/ICCKE50421.2020.9303644","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303644","url":null,"abstract":"The advancements and evaluations of wireless devices, telecommunications infrastructure for wireless communications, as well as satellite networks have led to the development of many positioning systems for moving users, especially in an open environment. Unfortunately, many of these systems do not perform well indoors, and other solutions are needed for these environments. This study examines a sample of techniques and rules of indoor localization using radio signals and machine vision and attempts to use a combination method of positions obtained by a new technology called low-power Bluetooth, as well as video taken by the camera set in the environment to improve the results of this type of localization. The development of this technology depends on how much it is supported by today's smart devices such as smartphones, tablets, etc. Then, by analyzing the collected information, including signal and video from indoor environments, and also via the implementation of Kalman filter developed on this information, a better estimate of the user's localization has been reached.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133108817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A convolutional neural network and stacked autoencoders approach for motor imagery based brain-computer interface","authors":"Roya Arabshahi, M. Rouhani","doi":"10.1109/ICCKE50421.2020.9303717","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303717","url":null,"abstract":"In this research, we are investigating Convolutional Neural Networks (CNN) and Stacked Auto Encoders (SAE) to classify EEG Motor Imagery signals. Also, we use Cohen Class Distribution (CCD) to calculate time and frequency features derived from EEG signals to feed to our network. Using this combination of CNN and SAE decrease the data dimensions. the best accuracy percentage according to our method, in an average manner, is 82%. The proposed approach was applied to the dataset IVa from BCI Competition III, a multichannel 2-class motor-imagery dataset obtained from 5 healthy subjects","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Persian Text Based Traffic sign Detection with Convolutional Neural Network: A New Dataset","authors":"Saba Kheirinejad, Noushin Riaihi, R. Azmi","doi":"10.1109/ICCKE50421.2020.9303646","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303646","url":null,"abstract":"Recently, traffic panel detection has attracted both academic and industrial attention. However, there are a few works that studied text based traffic panels. This is because there are many challenges in this kind of traffic panels. To obtain an appropriate accuracy in text recognition in the text based traffic panels, we need to detect the panel. Since there is no public text based traffic panels dataset, we collected a new dataset included the Persian text based traffic panels in the streets of Tehran-Iran for the first time. Our dataset contains two sets of figures. The first set has 9294 pictures and the second set has 3305 pictures. The second dataset is more uniform than the first dataset. Therefore, we exploit the first set as an additional dataset and use the second one as the main dataset. Accordingly, we pretrain the network by the additional dataset and train it by the main dataset. We use the tiny YOLOv3 (You Only Look Once version three) algorithm to pretrain, train, and test the dataset. The algorithm is fast and has low complexity. We use K-fold cross validation method to appraise efficiency of the algorithm. From the results section we could see that Precision is 0.973, Recall is 0.945, and Fmeasure is 0.955.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129492913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Feature Selection Method for Sentiments Analysis in Social Networks","authors":"F. Akbarian, F. Z. Boroujeni","doi":"10.1109/ICCKE50421.2020.9303710","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303710","url":null,"abstract":"The increasing growth of user oriented media and users’ preferences in using social networks for communication, causes these virtual communities to become a valuable source of data. These communities provide users with the possibility of being aware of useful and reliable opinions. Many organizations employ efficient classifiers for determining the polarity of users’ opinions in order to make valid decisions in different business domains. However, most of the existing approaches suffer from low accuracy results due to performing classification task in a high-dimensional feature space. To this end, an efficient feature selection method based on a modified version of firefly algorithm is presented in this article. The main contribution of the proposed method is employing a weighted combination of classification performance measures in constructing a fitness function for the firefly algorithm. The proposed model for the fitness function leads to establishing a trade-off between the performance measures while trying to reduce the number of dimensions. The results obtained from experiments conducted on 11000 tweets show that the proposed method outperforms the existing counterparts in terms of polarity classification performance.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Architecture for Car-following Behaviour Observing Lane-changer: Modeling and Control","authors":"Farzam Tajdari, Naeim Ebrahimi Toulkani, Maral Nourimand","doi":"10.1109/ICCKE50421.2020.9303652","DOIUrl":"https://doi.org/10.1109/ICCKE50421.2020.9303652","url":null,"abstract":"During motorway driving behaviour, the car-following behaviour is the most popular among the rest of behaviours e.g., lane-changing and overtaking. However, a few research has been done on the effect of lane change behaviour on car-following behaviour. The effect is a highly complex transient state among the car-following models and makes the car follower exit the previous ones, which are known as conventional models, for a limited time. Accordingly, in this paper, an intelligent model includes anticipation of interaction behaviour regarding the micro-structure of drivers is proposed, when Lane Changer (LC) exits the lane is studied. Continuously, a fuzzy controller is designed based on the criteria of detecting the complex behaviour in the model. Both the model and the controller aim to regulate the Follower Vehicle (FV) acceleration which simulates the behaviour of a real driver. Afterward, its performance is compared with the database of human drivers. The results assert that the model is capable to estimate the behaviour of the real drivers perfectly. Also, the controller provides a safer and smoother drive comparing to a real driver, in addition to less traveling time.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128379406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}