2020 2nd International Conference on Computer and Information Sciences (ICCIS)最新文献

筛选
英文 中文
Melayu Grid: Sharing Language Service to Bridge Cultural Difference melayyu网格:共享语言服务,跨越文化差异
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257691
Arif Bramantoro, I. Syamsuddin
{"title":"Melayu Grid: Sharing Language Service to Bridge Cultural Difference","authors":"Arif Bramantoro, I. Syamsuddin","doi":"10.1109/ICCIS49240.2020.9257691","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257691","url":null,"abstract":"Today grid computing powered by web service technology has been a research interest for decades. Several grids of language services are available in Internet as part of daily activity. Melayu Grid is proposed to share Indonesian, Malay and regional language resources. To ease the sharing, each language is located as a distinctive concept in language service ontology and eventually measured its semantic closeness to other languages. By utilizing semantic closeness, it is expected that the endangered language resource that has less amount of its speaker can take advantage by replacing it with other language resource that has better resources and speakers. This project implements service grid architecture as a culture grid for Indonesia and Malaysia to balance cultural differences and conflicts in these two neighboring countries. Multicriteria optimization is utilized to adapt the multi culture feature of several language services. It substitutes several regional languages services that are coming from the same language families or having similar linguistic vocabularies, syntax, morphology and semantics.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122335146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-cost Electromechanical Bionic Model for Foot Drop Gait Disability 低成本足下垂步态残疾机电仿生模型
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257672
M. Aboamer, N. Mohamed, Bakheet Alrashide
{"title":"Low-cost Electromechanical Bionic Model for Foot Drop Gait Disability","authors":"M. Aboamer, N. Mohamed, Bakheet Alrashide","doi":"10.1109/ICCIS49240.2020.9257672","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257672","url":null,"abstract":"Based on reports of the World Health organization there are billion people around the world suffer from disability. Foot drop is a gait abnormality in which a dropping of the forefoot causes a difficulty in lifting the front part of the foot. Unfortunately, large number of existing mechanical models for gait are integrated with another machines, i.e. treadmills or other platforms, which make it impossible to get benefit of using them as portable systems. And as wearable rehabilitation robotic systems or bionic models for personal use - specially for gait rehabilitation and drop foot - are still rare, an electro-mechanical design is introduced here to be a simple and wearable bionic model to help patients with foot drop in walking. The proposed design contains low-cost stepper motor and controller to facilitate patient movement. Stress, strain and displacement analysis were performed on the model using the von Mises finite element analysis, and by applying a 20 kg load on the front area of the foot model the analysis produced a maximum yield strength of 2.0052×108N.m−2 and a maximum displacement of 1.00371 mm.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128873648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning for Real-time Data Reduction in Cloud of Things 物云中实时数据缩减的机器学习
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257645
Atheer Alahmed, A. Alrasheedi, Maha Alharbi, Norah Alrebdi, Marwan Aleasa, T. Moulahi
{"title":"Machine Learning for Real-time Data Reduction in Cloud of Things","authors":"Atheer Alahmed, A. Alrasheedi, Maha Alharbi, Norah Alrebdi, Marwan Aleasa, T. Moulahi","doi":"10.1109/ICCIS49240.2020.9257645","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257645","url":null,"abstract":"In the last few years, the number of Internet of Things devices (e.g., smart sensors) connected to the internet has increased significantly and is expected to exceed ten billion devices in the next few years. These devices generate massive amounts of data continuously that needs to be collected, stored, and analyzed for real-time monitoring and smarter decision making support in underlying systems. In this context, cloud computing provides significant potential to store and analyze data. However, several obstacles exist when applying cloud-based solutions to real-time data analysis, including network bandwidth size, energy consumption, cloud storage, and processing costs all due to overwhelming data generation. The paper aims to evaluate machine learning techniques (e.g., principal component analysis, independent component analysis, and singular value decomposition) to reduce unnecessary data in a network edge (e.g., Internet of Things gateways), minimizing bandwidth and energy consumption while avoiding high storage and processing costs through more efficient cloud analysis.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130055796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Implementation of a Hand Gesture Based Digital Lock Demonstrator 基于手势的数字锁演示器的设计与实现
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257688
L. Yaseen, O. Mousa, R. Alawani, S. Qaisar
{"title":"Design and Implementation of a Hand Gesture Based Digital Lock Demonstrator","authors":"L. Yaseen, O. Mousa, R. Alawani, S. Qaisar","doi":"10.1109/ICCIS49240.2020.9257688","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257688","url":null,"abstract":"The security is a vital apprehension. An omnipresent part of all security systems is a key protected admittance control. It allows only the authorized people to enter into a restricted zone. This paper focuses on designing and implementing hand gesture recognition based digital lock system. The objective is to design a functional lock system using Human-Computer Interaction (HCI) with display for theeducation purpose. Keeping in mind the demonstration purpose, the system modules are kept easily accessible. The solution is based on a web camera, which is used as the main component to captures a live-stream video with the help of a specifically designed algorithm in the MATLAB. The system is able to identify the hand-gesture. This algorithm is designed to enhance a specific frame from the video to get better results. Later, this frame is converted into a binary image so it can be easily subtracted from a background image that has been provided in the database. A system prototype is implemented and its functionality is tested. The results are presented.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel feature selection technique based on Roach Infestation Optimization for Internet Traffic Classification 基于蟑螂入侵优化的网络流量分类特征选择方法
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257694
D. Boughaci, Fatma Belaidi, Imene Kerkouche
{"title":"A novel feature selection technique based on Roach Infestation Optimization for Internet Traffic Classification","authors":"D. Boughaci, Fatma Belaidi, Imene Kerkouche","doi":"10.1109/ICCIS49240.2020.9257694","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257694","url":null,"abstract":"In this paper, we propose a novel feature selection technique based on the Roach Infestation Optimization (RIO) meta heuristic for Internet traffic classification. The RIO based feature selection technique is a pre-processing step before launching the classification task where the aim is to identify the set of significant features to be used in the classification task. The proposed technique is combined with both random forest and Bayes network classifiers and evaluated on the well known NIMS dataset. The numerical results show the effectiveness of the proposed technique for Internet traffic classification.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exam Questions Classification Based on Bloom's Taxonomy: Approaches and Techniques 基于Bloom分类法的试题分类:方法与技术
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257698
K. Makhlouf, L. Amouri, Nada Chaabane, Nahla El-Haggar
{"title":"Exam Questions Classification Based on Bloom's Taxonomy: Approaches and Techniques","authors":"K. Makhlouf, L. Amouri, Nada Chaabane, Nahla El-Haggar","doi":"10.1109/ICCIS49240.2020.9257698","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257698","url":null,"abstract":"One of the most popular guidelines used to write and evaluate the exam questions is Bloom's Taxonomy (BT). Since the past recent years, many researchers have worked on the automation of exam question classification into BT. This paper gives a through overview of the standard approaches and techniques used in question classification (QC) into BT cognitive levels including the preprocessing, the dimensionality reduction, the classification and the evaluation stages. A comparison of some recent works related to the subject is also presented in this study.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative Review of Pipelines Monitoring and Leakage Detection Techniques 管道监测与泄漏检测技术的比较综述
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257602
Khalid Ghanim Aljuaid, Mohammad Abdulwahab Albuoderman, Emad Abdullah AlAhmadi, J. Iqbal
{"title":"Comparative Review of Pipelines Monitoring and Leakage Detection Techniques","authors":"Khalid Ghanim Aljuaid, Mohammad Abdulwahab Albuoderman, Emad Abdullah AlAhmadi, J. Iqbal","doi":"10.1109/ICCIS49240.2020.9257602","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257602","url":null,"abstract":"The oil and gas industry owns expensive and widely-spread assets. Any fault in this complex transportation network may result in accidents and/or huge losses thereby triggering various environmental and economic issues. Thus, real-time monitoring and preemptive measures based on fault propagation analysis limit some of these consequences. This paper presents a comprehensive review of the techniques used for monitoring and fault detection of oil pipelines. The pros and cons of the most common techniques are mentioned along with a review of the recently reported literature. It is anticipated that wider dissemination of the recent developments in pipelines monitoring and inspection will reform the oil sector from the perspectives of surveillance, security, inspection and emergency response.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a Semantic Web Solution Based on a JSON-LD Mapping Mechanism for an Adaptive Learning System with Experience API 基于JSON-LD映射机制的具有经验API的自适应学习系统语义Web解决方案
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257678
Abdellah Bakhouyi, Amine Dehbi, R. Dehbi, M. Banane, M. Talea
{"title":"Towards a Semantic Web Solution Based on a JSON-LD Mapping Mechanism for an Adaptive Learning System with Experience API","authors":"Abdellah Bakhouyi, Amine Dehbi, R. Dehbi, M. Banane, M. Talea","doi":"10.1109/ICCIS49240.2020.9257678","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257678","url":null,"abstract":"New technologies represent a major opportunity for massive development of access to knowledge for everyone at any time of their life. The progressive expansion of mobile learning has changed the manner of learning. With the spreading reputation of using mobile equipment, mobile learning has grown into important in learning and teaching in higher education. LMS provide most m-learning services. On the other hand, Semantic Web Technologies offers standards as RDF allows describing Web resources with their metadata, this need to push the e-Learning community to seek new approaches to enhance this interoperability of online learning system. We propose in this work a semantic web solution aimed at transforming JSON format declarations into RDF format using the JSON-LD mapping mechanism on LRS System to resolve the problem of the heterogeneity of e-learning content.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115070955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Approach to Classify Electrocardiogram Signals Using Deep Neural Networks 一种基于深度神经网络的心电图信号分类新方法
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257700
Tasnim Ahmed, A. Rahman, Tareque Mohmud Chowdhury, Rafsanjany Kushol, Md. Nishat Raihan
{"title":"A Novel Approach to Classify Electrocardiogram Signals Using Deep Neural Networks","authors":"Tasnim Ahmed, A. Rahman, Tareque Mohmud Chowdhury, Rafsanjany Kushol, Md. Nishat Raihan","doi":"10.1109/ICCIS49240.2020.9257700","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257700","url":null,"abstract":"Atrial fibrillation (AF) is an unusual heart rhythm condition which is caused by sporadic firing of electrical impulses from multiple places in the atria. AF is considered to be one of the leading cause of stroke in the world. AF is usually screened manually with the help of Electrocardiodiagram (ECG) reading. The manual process of reading ECG is a tedious and time-consuming task which is laden with human errors. Therefore, an automated process is quintessential. However, discerning anomaly in heart function using an efficient automated process has been a challenging task for quite some time. In this paper, the authors propose an intricate Neural Network architecture, CNN+LSTM, for the classification amongst four types of heart condition-Normal, Atrial Fibrillation, Noisy Sinus Rhythm and Alternative Rhythms using a dataset from PhysioNet/2017challenge. Volunteers in PhysioNet/2017 challenge dataset came from diverse backgrounds and had a wide window of variation in their physical attributes, making the dataset sufficiently reliable. In addition, the number of samples in this dataset exceeded any other before it on this topic, which further adds to the comprehensiveness of this dataset. The authors' method reached a summit accuracy of 91.19% using the proposed model.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ransomware: A Framework for Security Challenges in Internet of Things 勒索软件:物联网安全挑战的框架
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257660
S. Saeed, Noor Zaman Jhanjhi, M. Naqvi, M. Humayun, Shakeel Ahmed
{"title":"Ransomware: A Framework for Security Challenges in Internet of Things","authors":"S. Saeed, Noor Zaman Jhanjhi, M. Naqvi, M. Humayun, Shakeel Ahmed","doi":"10.1109/ICCIS49240.2020.9257660","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257660","url":null,"abstract":"With the increasing volume of smartphones, computers, and sensors in the Internet of Things (IoT) model, enhancing security and preventing ransom attacks have become a major concern. Traditional security mechanisms are no longer applicable due to the involvement of devices with limited resources, which require more computing power and resources. Ransomware is comparatively a new and cruel malware in cyberspace with higher rates of attacks around the world. Ransomware could encrypt entire data to make users unable to access their files and important information. In some cases, the system has been hostage completely by the hackers, and the user may receive a demand for ransom money using different resources o access of his/her own data/system. One of the problems associated with the Internet of Things is how to keep your smartphones secure and keep your data safe as most of the antivirus solutions are not useful in this case. This research concludes the impact of ransomware on the IoT, malware processes, and work on detecting and monitoring smartphone infections. The paper also discusses ransomware awareness to end-user with strategy to defeat it.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125851389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信