2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)最新文献

筛选
英文 中文
Federated Patient Similarity Network for Data-Driven Diagnosis of COVID-19 Patients 联邦患者相似网络在COVID-19患者数据驱动诊断中的应用
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686875
Hadeel T. El Kassabi, M. Serhani, A. Navaz, S. Ouhbi
{"title":"Federated Patient Similarity Network for Data-Driven Diagnosis of COVID-19 Patients","authors":"Hadeel T. El Kassabi, M. Serhani, A. Navaz, S. Ouhbi","doi":"10.1109/AICCSA53542.2021.9686875","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686875","url":null,"abstract":"Sensitive patient data is generated from a variety of sources and then transferred to a cloud for processing. Therefore, it is exposed to security and privacy and may lead to an increase in communication costs. Edge computing will ease computing pressure through distributed computational capabilities while improving security and privacy. In this paper, we propose a Federated PSN (FPSN) model where the model is moved directly to the edge to minimize computation and communication costs. PSN has been applied as a successful approach in categorizing and diagnosing patients based on similarities against some clinical and non-clinical features. Our proposed model distributes processing at each edge node, then fuses the constructed PSN matrices at the cloud premises, which significantly reduce the model’s training and inference time and ensures quick model updates with the local client/nodes. In this paper, we propose: (i) an algorithm to evaluate patient’s data similarity at the edge; and (ii) an algorithm to implement the federated similarity network fusion at the Cloud. We conducted a set of experiments to evaluate our FPSN model against other machine learning algorithms using a COVID-19 dataset. The results obtained prove that the FPSN model accuracy is higher than the distributed PSNs at various edges and higher than the accuracies of other classification models.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133239299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancement of Alaryngeal Speech using Generative Adversarial Network (GAN) 基于生成对抗网络(GAN)的咽喉语音增强
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686759
M. Huq
{"title":"Enhancement of Alaryngeal Speech using Generative Adversarial Network (GAN)","authors":"M. Huq","doi":"10.1109/AICCSA53542.2021.9686759","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686759","url":null,"abstract":"Whispered speech is defined as a type of spoken communication in which the vocal cords do not vibrate and as a result no periodic glottal excitement occurs in the vocal cord. As a result of absence of pitch the voice of a person loses expressiveness and naturalness.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trajectory-based Modeling for Fraud Detection and Analytics: Foundation and Design 基于轨迹的欺诈检测与分析建模:基础与设计
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686920
L. Karim, A. Boulmakoul
{"title":"Trajectory-based Modeling for Fraud Detection and Analytics: Foundation and Design","authors":"L. Karim, A. Boulmakoul","doi":"10.1109/AICCSA53542.2021.9686920","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686920","url":null,"abstract":"The trajectory concept is immersed in various socio-technical systems. Certainly, moving object data intended for location-based services is predominant, due to availability of spatiotemporal location data provided by current devices such as mobile devices, GPS devices, RFID and various sensors. This work examines the use of our trajectories meta-model given in previous works to detect and monitor frauds, from the point of view of trajectories semantic aspects. Modeling of frauds by trajectories gives meaning to the sequence of events that made it possible to detect them and to recognize the situations of their occurrence. The semantic dimension qualifies a fraud trajectory as a story that has both meaning and intention, described by episodes of semantic events related to the creation of the fraud, to its dynamic and to its ending. Fraud analytics will benefit from trajectory analytics for both big data ecosystems and spatiotemporal data mining algorithms and practices. Finally, we propose the architecture and structure of the software components that make up the proposed software system. The software design is based on the reactive manifesto and federates graph-oriented NoSQL databases and graph-based data science processing.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Change detection in optical remote sensing images using shearlet transform and convolutional neural networks 基于shearlet变换和卷积神经网络的光学遥感图像变化检测
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686924
Emna Brahim, S. Bouzidi, W. Barhoumi
{"title":"Change detection in optical remote sensing images using shearlet transform and convolutional neural networks","authors":"Emna Brahim, S. Bouzidi, W. Barhoumi","doi":"10.1109/AICCSA53542.2021.9686924","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686924","url":null,"abstract":"In this study, an effective method used to examine the changes of two optical images captured by Landsat satellite is presented. The proposed method is based on two main parts: A preprocessing step where Shearlet Transform is applied to get a smoother rendering followed by a classification process using Convolutional Neural Network (CNN) to change detection.The proposed method out performed the state-of-the-art methods with an accuracy out of 99,32%.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orgsanisation Committee Orgsanisation委员会
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/aiccsa53542.2021.9686906
{"title":"Orgsanisation Committee","authors":"","doi":"10.1109/aiccsa53542.2021.9686906","DOIUrl":"https://doi.org/10.1109/aiccsa53542.2021.9686906","url":null,"abstract":"","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124517225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the AICCSA 2021 Program Chairs 来自AICCSA 2021项目主席的信息
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/aiccsa53542.2021.9686845
{"title":"Message from the AICCSA 2021 Program Chairs","authors":"","doi":"10.1109/aiccsa53542.2021.9686845","DOIUrl":"https://doi.org/10.1109/aiccsa53542.2021.9686845","url":null,"abstract":"","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SUBLμME: Secure Blockchain as a Service and Microservices-based Framework for IoT Environments sub μ me:安全区块链即服务和基于微服务的物联网环境框架
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686757
D. Hasan, Maha Driss
{"title":"SUBLμME: Secure Blockchain as a Service and Microservices-based Framework for IoT Environments","authors":"D. Hasan, Maha Driss","doi":"10.1109/AICCSA53542.2021.9686757","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686757","url":null,"abstract":"IoT applications have extended new concepts to smart technologies in different vital sectors such as healthcare, education, agriculture, energy management and control, etc. IoT aims to interconnect several intelligent devices over the Internet to control, store, exchange, and analyze collected data. However, the main problem in IoT environments is that they present numerous potential vulnerabilities that can be the origin of security attacks. In this context, this paper proposes a novel framework, named SUBLμME, which stands for SecUre BLockchain as a service and μservices-based fraMework for IoT Environments. This framework integrates BaaS and microservices technologies that have the predominant characteristic of offering reusable and reconfigurable security features implemented as independent services that can be reused for multiple IoT applications. SUBLμME is implemented and validated by a simulated smart home environment. The results of the simulation experiments showed that SUBLμME brings several security improvements in terms of performance, data integrity, data packages’ validation, access control, and efficient and secure data transmission and storage.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Exact Algorithm for A Multi-Period Inventory Routing Problem with Lateral Transshipment 横向转运多周期库存调度问题的精确算法
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686909
M. Sakhri, Mounir Tlili, O. Korbaa
{"title":"An Exact Algorithm for A Multi-Period Inventory Routing Problem with Lateral Transshipment","authors":"M. Sakhri, Mounir Tlili, O. Korbaa","doi":"10.1109/AICCSA53542.2021.9686909","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686909","url":null,"abstract":"For better supply chain management, it is necessary to think about better managing its cost sources. Inventory is considered the most important element of the supply chain that generates the different logistics costs, mainly the inventory holding cost and the transportation cost. One of the most widely used models to jointly solve these two problems is the Inventory Routing Problem (IRP), which will be the focus of this study. The proposed model in this work deals with a two-tier supply network. The first level contains the supplier with a single vehicle to serve a set of customers with a deterministic and periodic demand that are located at the second level. Our work consists in studying the effect of the increase of the replenishment lead time on the different logistic costs. In addition, we introduced the Lateral Transshipment (LT) technique as an option for inventory transfer if it is economical. New mathematical models corresponding to the above-mentioned problems have been developed and solved by an exact method. The obtained results show that the variation of the replenishment lead time leads to an increase of the different logistics costs and that LT can improve the total network cost and balance the customers' inventory level.","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122775512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability and Threat Analysis of UAVs 无人机的脆弱性与威胁分析
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/AICCSA53542.2021.9686826
Burak Tufekci, Cihan Tunc
{"title":"Vulnerability and Threat Analysis of UAVs","authors":"Burak Tufekci, Cihan Tunc","doi":"10.1109/AICCSA53542.2021.9686826","DOIUrl":"https://doi.org/10.1109/AICCSA53542.2021.9686826","url":null,"abstract":"The usage and application areas of Unmanned Aerial Vehicles (UAVs) are increasing such as military services, live streaming events, aerial photography, agriculture, firefighting, product delivery, asset inspections, and so on owing to bringing along the many benefits with it. According to Federal Aviation Administration (FAA), 865,660 drones (or UAVs) are registered and of these, 340,247 are commercial drones, 521,819 are recreational drones, 3,594 are paper registrations [1] .","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128630873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Service Engineering in Next Generation Networks 下一代网络中的服务工程
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA) Pub Date : 2021-11-01 DOI: 10.1109/aiccsa53542.2021.9686771
{"title":"Service Engineering in Next Generation Networks","authors":"","doi":"10.1109/aiccsa53542.2021.9686771","DOIUrl":"https://doi.org/10.1109/aiccsa53542.2021.9686771","url":null,"abstract":"","PeriodicalId":423896,"journal":{"name":"2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129923498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书