Proceedings of the 4th International Conference on Networking, Information Systems & Security最新文献

筛选
英文 中文
SeqVectorizer: Sequence Representation in Vector Space SeqVectorizer:向量空间中的序列表示
Md. Kowsher, Avishek Das, Md. Murad Hossain Sarker, A. Tahabilder, Md. Zahidul Islam Sanjid
{"title":"SeqVectorizer: Sequence Representation in Vector Space","authors":"Md. Kowsher, Avishek Das, Md. Murad Hossain Sarker, A. Tahabilder, Md. Zahidul Islam Sanjid","doi":"10.1145/3454127.3456602","DOIUrl":"https://doi.org/10.1145/3454127.3456602","url":null,"abstract":"The latest strategies for learning vector space portrayals of words have prevailed with regard to catching fine-grained semantic and syntactic consistencies utilizing vector arithmetic. However, the sequence representation is not present in these methods. As a result, to consider the sequence, we are utilizing the sequence neural networks like RNN or statistical techniques like HMM. To represent the sequence through every state vector, we propose a new term or word representation technique called SeqVectorizer, which stands for sequence vectorizer. In SeqVectorizer every state represents a combined vector of two separate joined states, and these are the previous sequence state and the current state probability. Comparing with other representation systems, it shows a state-of-the-art performance on some testing data-sets.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124241047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New 2x2MIMO Trapezoidal Shaped Antenna with High Gain and Wide Bandwidth for 37-40GHz Millimeter Wave Applications 用于37-40GHz毫米波应用的新型2x2MIMO高增益宽频带梯形天线
Asma Khabba, Sanaa Errahili, S. Ibnyaich, A. Zeroual
{"title":"A New 2x2MIMO Trapezoidal Shaped Antenna with High Gain and Wide Bandwidth for 37-40GHz Millimeter Wave Applications","authors":"Asma Khabba, Sanaa Errahili, S. Ibnyaich, A. Zeroual","doi":"10.1145/3454127.3456584","DOIUrl":"https://doi.org/10.1145/3454127.3456584","url":null,"abstract":"In this manuscript a new miniaturized millimeter wave trapezoidal antenna is proposed to be used in 5G applications. The suggested antenna is designed, simulated and studied with the help of CST software. The antenna is printed on RTRogers5880 substrate with loss tangent of 0.0009 and dielectric constant of 2.2 with an overall size of 5x6x0.8mm3. The antenna is characterized with high gain of 6.92dB and high radiation efficiency up to 99%. The MIMO system is composed using two elements of the single antenna. The simulated results prove an excellent performance. Whereas, the proposed MIMO antenna is marked with high isolation (>26dB), low envelope correlation coefficient (ECC) (<0.0015), high diversity (DG) gain (>9.99dB), low channel capacity loss (CCL) (>0.4bit/s/Hz) and low total active reflection coefficient (TARC) over the operating bandwidth (>-10dB). Which qualifies it to be a strong candidate for 5G wireless devices.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
APPROACH OF DIGITAL DEVICES DIAGNOSTIC ON THE BASIS OF FUZZY LOGIC 基于模糊逻辑的数字设备诊断方法
D. Bystrov
{"title":"APPROACH OF DIGITAL DEVICES DIAGNOSTIC ON THE BASIS OF FUZZY LOGIC","authors":"D. Bystrov","doi":"10.1145/3454127.3456570","DOIUrl":"https://doi.org/10.1145/3454127.3456570","url":null,"abstract":"Due to high pace of development of manufacture and constantly growing complexity of computer aids, manual operations of the control of diagnostics, report and analysis of defect becomes more complex and ineffective. It requires wide introduction in manufacture computer aids of diagnostic expert systems (ES) with standard means of algorithmic technology of the solution of the user tasks: data manager (DM) of industrial purpose, ATE both diagnosing and advanced dialogue subsystem of debugging and editing of the programs of modern operating systems. Object of the control and diagnostics is the digital device (DD), executed on the printed-circuit-board and includes small, average, large, and super large integrated circuits. The achievement of modern integrated technology promotes a decrease of labor input of manufacturing of modules, but thus continuous functional complication occurs hence, procedures of the control and diagnosing DD becomes more labor-consuming and expensive. It requires perfection of methods of maintenance of the given degree of quality.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122101939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Build a malware detection software for IOT network Using Machine learning 利用机器学习为物联网网络构建恶意软件检测软件
Somaya Haiba, T. Mazri
{"title":"Build a malware detection software for IOT network Using Machine learning","authors":"Somaya Haiba, T. Mazri","doi":"10.1145/3454127.3458773","DOIUrl":"https://doi.org/10.1145/3454127.3458773","url":null,"abstract":"Any system based on IOT devices must provide a reliable and secure network to transmit and manipulate the data from the smallest technologies to the final server. They are the devices of nowadays, and our future for sure, it will convert all domains of our live starting from the smart home, industry, to e-healthcare systems. To achieve the quality of performances we should have an assurance of security and trustworthiness beginning by the small device used to capture information to the final terminal of the network system, using all the exist possibilities that we can implement to ensure a secure employment. Until now, machine learning become the most powerful application, which provides for any systems the capacity of auto-learning, and improving itself taking a help from the old experiences and without any human intervention or being explicit programmed. Furthermore, the usage of IOT networks, as we know is growing and evaluate enormously so the menaces keep up to date exploiting the weakness of these tools. For that, we propose to make a look about, What machine learning is coming with, to perform more security and analyses the threats, and how can it be used to detect any endanger before it can gain control. Knowing that the reproducible use of resource-constrained IOT devices, the number of IOT Malwares has exploded variously with many ways of breakthrough and then the requirement, to have an efficient malware detection adequate with this grown-up is on immense increasing importance. In this paper, we discuss the usability of machine learning applications in malwares detection software for IOT networks to elicitation the standards, which can us, use to build a powerful model to improve the network security of this small technologies answering to pervious questions.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data-based automatic Covid-19 rumors detection in social networks 基于数据的社交网络Covid-19谣言自动检测
B. Bamiro, I. Assayad
{"title":"Data-based automatic Covid-19 rumors detection in social networks","authors":"B. Bamiro, I. Assayad","doi":"10.1145/3454127.3456622","DOIUrl":"https://doi.org/10.1145/3454127.3456622","url":null,"abstract":"Social media is one of the largest sources of propagating information, however, it is also a home ground for rumors and misinformation. The recent extraordinary event in 2019, the COVID-19 global pandemic, has spurred a web of misinformation due to its sudden rise and global widespread. False rumors can be very dangerous, therefore, there is a need to tackle the problem of detecting and mitigating false rumors. In this paper, we propose a framework to automatically detect rumor on the individual and network level. We analyzed a large dataset to evaluate different machine learning models. We discovered how all our methods used contributed positively to the precision score but at the expense of higher runtime. The results contributed greatly to the classification of individual tweets as the dataset for the classification task was updated continuously, thereby increasing the number of training examples hourly.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132521680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Lossy-Encryption System for Still-Image Data Based on the Quaternion Multiplication and Robust Chaos 基于四元数乘法和鲁棒混沌的改进静态图像数据有损加密系统
Imad El Hanouti, Hakim El Fadili, Mohamed Boussif
{"title":"An Improved Lossy-Encryption System for Still-Image Data Based on the Quaternion Multiplication and Robust Chaos","authors":"Imad El Hanouti, Hakim El Fadili, Mohamed Boussif","doi":"10.1145/3454127.3456572","DOIUrl":"https://doi.org/10.1145/3454127.3456572","url":null,"abstract":"In this paper, we propose an improved lossy-encryption system based on a previously vulnerable one. The original system is first analyzed for potential drawbacks, and then a new system with enhanced security level is proposed. The main strength points of our proposed system reside in the key generation which is based on robust chaos and a fast hashing scheme, and the lossy property of the scheme which contributes to make a good diffusion and confusion. Security analysis shows that the system possesses good statistical properties and it can resist the discussed attacks.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127950395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative study of data preparation methods in quantum clustering algorithms 量子聚类算法中数据准备方法的比较研究
Oumayma Ouedrhiri, Oumayma Banouar, S. Raghay, S. E. Hadaj
{"title":"Comparative study of data preparation methods in quantum clustering algorithms","authors":"Oumayma Ouedrhiri, Oumayma Banouar, S. Raghay, S. E. Hadaj","doi":"10.1145/3454127.3456607","DOIUrl":"https://doi.org/10.1145/3454127.3456607","url":null,"abstract":"More powerful and better performing, quantum algorithms offer a noticeable speedup in comparison with classical algorithms. This is due to the superposition property of quantum information. It helps to obtain algorithms that are better in terms of speed and performance. Machine learning benefits from quantum computing advantages to help time consuming algorithms run faster in the best conditions (without having to lose information). In the clustering algorithms case, the distance calculation between data points is the most resource consuming step. Thus, the use of a quantum distance is very helpful. In this paper, we test a number of quantum clustering algorithms with different data preparation methods. Experiments were done for different datasets (Iris, Wine, Breast cancer) and the comparison is based on the Clustering quality and the accuracy score.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cloud computing based intelligent traffic control system for vehicular networks 基于云计算的车联网智能交通控制系统
Nihal Gaouar, M. Lehsaini
{"title":"A cloud computing based intelligent traffic control system for vehicular networks","authors":"Nihal Gaouar, M. Lehsaini","doi":"10.1145/3454127.3456600","DOIUrl":"https://doi.org/10.1145/3454127.3456600","url":null,"abstract":"The number of vehicles on the road increases permanently causing more and more traffic jam and congestion which results in a lot of delay in arriving at destination. Intelligent transport systems (ITS) have merged as an efficient way to overcome particularly this kind of problem in vehicular networks (VANETs) and improve performance of transportation systems. One of the solutions is to put intelligent traffic lights at each intersection of high vehicle density. In this paper, we propose a cloud computing based intelligent traffic light control algorithm, called CITLA. This algorithm aims to schedule the traffic by switching the phases of the traffic lights dynamically according to the state of the road in real time based on the conventional cloud. The Cloud has a global view on the road network since it is responsible for collecting road information via the RSUs placed on each street corner. It commutes thereafter, based on the information collected, the density of each road so as to minimize the waiting time and congestion on the roads. The results of these calculations are transmitted in real time to the RSUs which are responsible for controlling the traffic lights by changing the phases. The feasibility of CITLA was demonstrated through simulations using the discrete event simulator OMNeT++ with Simulation of Urban Mobility (SUMO).","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116741829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A holistic nonlinear framework for developing a national eHealth vision based on Moroccan experience 基于摩洛哥经验制定国家电子卫生愿景的整体非线性框架
Houda Fakhkhari, B. Bounabat, Zineb Gaizi, Soumaya Fatemi, M. Bennani, R. Bekkali
{"title":"A holistic nonlinear framework for developing a national eHealth vision based on Moroccan experience","authors":"Houda Fakhkhari, B. Bounabat, Zineb Gaizi, Soumaya Fatemi, M. Bennani, R. Bekkali","doi":"10.1145/3454127.3457635","DOIUrl":"https://doi.org/10.1145/3454127.3457635","url":null,"abstract":"The implementation of the eHealth solution is a key issue for improving access, safety, quality, and the performance of healthcare delivery. Furthermore, in the face of the Covid-19 outbreak, healthcare services have recognized the importance of Information and Communication Technologies (ICT) for improving healthcare delivery. Hence, the development of an integrative national eHealth system becomes a challenge for healthcare systems and organizations to well benefit from the advantages and opportunities offered by eHealth solutions and provide healthcare services more efficiently and cost-effectively. This paper proposes a new framework for implementing a national eHealth vision based on a review of existing frameworks and the analysis of relevant national and international eHealth experiences. The proposed framework incorporates components required to develop, implement and sustain a national eHealth vision.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
X-ray image classification using Deep Learning method for Covid-19 diagnostic 基于深度学习方法的新冠肺炎诊断x射线图像分类
Samira Achki, A. Gourari, Layla Aziz
{"title":"X-ray image classification using Deep Learning method for Covid-19 diagnostic","authors":"Samira Achki, A. Gourari, Layla Aziz","doi":"10.1145/3454127.3460796","DOIUrl":"https://doi.org/10.1145/3454127.3460796","url":null,"abstract":"Recently, the World Health Organization (WHO) was identified Coronavirus COVID 19 as a worldwide epidemic, usage the techniques for early diagnosis of disease gives fast and correct results, the machine Learning considered the current state-of-the-art image classification technique as a new research subject in an extensive variety of academic and industrial IT, particularly in healthcare. The Deep learning classification revolution is reshaping modern healthcare systems by integrating technological. This paper presents an integrated Deep learning using Dataset of X-ray image for classification of COVID-19, In order to have an early diagnosis, nursing patients, and practicing distinct protocols after patient recovery.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128942388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信