2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

筛选
英文 中文
An Improved Agile Framework For Implementing Data Science Initiatives in the Government 在政府推行数据科学措施的改进敏捷框架
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00012
Wafa Qadadeh, Sherief Abdallah
{"title":"An Improved Agile Framework For Implementing Data Science Initiatives in the Government","authors":"Wafa Qadadeh, Sherief Abdallah","doi":"10.1109/ICICT50521.2020.00012","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00012","url":null,"abstract":"Implementing data mining projects in governmental organizations is emerging in the Middle East. The literature has been showing that there is a significant gap between the problems defined by the research in data mining and the problems in real world projects. The gap is to the level of semantics between the data scientists and the business users. Trying to fill this gap, we have developed an improved Agile data mining framework to fulfill the government business objectives and needs. The previous works had been claiming that handling such project is not yet mature in the region. For this an Agile implementation framework is required. We are also proposing a systematic way for identifying business problems as part of the framework. The process is Agile, so it would start from investigating the data set dimensions to identify business problems. It also allows early Business people cooperation with data scientist. We've applied the proposed framework in one of the Middle East government organizations. The business team and the data scientists have been showing their satisfaction regarding the results of using the proposed framework. The proposed framework have helped both business and data scientist to implement their first initiative in data mining. The proposed framework also helped in efficiently mapping the project with the core business objectives and problems using real world dataset.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Explainability of SMOTE Based Oversampling for Imbalanced Dataset Problems 基于SMOTE的非平衡数据集过采样的可解释性
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00015
Aum Patil, Aman Framewala, F. Kazi
{"title":"Explainability of SMOTE Based Oversampling for Imbalanced Dataset Problems","authors":"Aum Patil, Aman Framewala, F. Kazi","doi":"10.1109/ICICT50521.2020.00015","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00015","url":null,"abstract":"Since the advent of Artificial Intelligence (AI), the problem of imbalanced datasets and the lack of interpretability of complex AI models has been a matter of concern for the research community. These datasets contain a very low proportion of one class (minority class) and very large proportion of another class (majority class). Even though the quantitative representation is less for minority class they have high qualitative importance as the cost associated in case of misclassification in these domains is very high. The paper presents a novel solution to deal with the issue of imbalanced dataset by using the proven method of resampling Synthetic Minority Oversampling Technique (SMOTE). Further, the interpretability of such an approach is demonstrated by some powerful eXplainable AI (XAI) techniques such as LRP, SHAP and LIME. In this paper state-of-art models like Deep Learning and Boosting classifiers were trained to classify fraud instances with high accuracy and proved to be reliable by producing explanations for their predicted instances. The results of confusion matrices and explanations showcase excellent performance and reliability of the models.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Controlling of Low-Cost Prosthetic Hand Using Force Sensor 基于力传感器的低成本假手设计与控制
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00061
S. F. Ahmed, M. H. Tanveer, Isho James Kiwarkis, Herish Badal Basy
{"title":"Design and Controlling of Low-Cost Prosthetic Hand Using Force Sensor","authors":"S. F. Ahmed, M. H. Tanveer, Isho James Kiwarkis, Herish Badal Basy","doi":"10.1109/ICICT50521.2020.00061","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00061","url":null,"abstract":"Birth defects or several tragic events can result in the loss of a hand that can be physically and emotionally incredibly difficult to bear. In the study, a low-cost, prosthetic hand has been developed and managed, irrespective of geographical and financial conditions. It would be feasible and affordable to many people to create a prosthetic hand with basic materials, available in most areas and powered by servomotors, based on muscle motion detected by the use of Resistive Force Sensor (RFS). Due to its simplicity and low cost, the Arduino controller is used as a main control unit for the operation of this prosthesic. It is shown that throughout the experimental work it has been figured out that a developed low-cost prosthetic hand is working well and affordable. The findings of experiments indicate that the success rate for choosing big and light weight items is about 78%. But because of the simple lightweight materials used in constructing it, it cannot withstand large and small items very well.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129550292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Design of LQR Controller Based on Improved Whale Optimization Algorithm 基于改进鲸鱼优化算法的LQR控制器优化设计
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00067
Qianhao Zhai, Xiaoyu Xia, Siling Feng, Mengxing Huang
{"title":"Optimization Design of LQR Controller Based on Improved Whale Optimization Algorithm","authors":"Qianhao Zhai, Xiaoyu Xia, Siling Feng, Mengxing Huang","doi":"10.1109/ICICT50521.2020.00067","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00067","url":null,"abstract":"Whale optimization algorithm (WOA) is a typical swarm intelligence algorithm. It has been applied to many different optimization problems due to its advantages of simple structure, few parameters and strong optimization ability. However, it has not been used in the optimization of LQR controller. In this paper, we apply the mproved WOA to this problem. It is compared with the traditional optimization algorithm (Particle swarm optimization, genetic algorithm, Grey Wolf optimization algorithm). Experimental results show that the improved WOA performs well in the optimization of LQR controller.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple Anchor Staged Alignment Algorithm – Sensitive (MASAA – S) 多锚分段对齐算法-敏感(MASAA - S)
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00064
Bharath Reddy, Richard Fields
{"title":"Multiple Anchor Staged Alignment Algorithm – Sensitive (MASAA – S)","authors":"Bharath Reddy, Richard Fields","doi":"10.1109/ICICT50521.2020.00064","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00064","url":null,"abstract":"Sequence alignment is common nowadays as it is used in computational biology or Bioinformatics to determine how closely two sequences are similar. There are many computational algorithms developed over the course of time to not only align two sequences. The first algorithms developed were based on a technique called Dynamic Programming which rendered them slow but produce optimal alignment. Today, however heuristic approach algorithms are popular as they are faster and yet produce near optimal alignment. In this paper, we are going to improve on a heuristic algorithm called MASAA (Multiple Anchor Staged Local Sequence Alignment Algorithm) - which we published previously. This new algorithm appropriately called MASAA - S stands for MASAA Sensitive. The algorithm is based on suffix tree data structure to identify anchors first, but to improve sensitivity, we employ adaptive seeds, and shorter perfect match seeds in between the already identified anchors. When the Anchors are separated by a greater distance than a threshold 'd', we exclude such anchors. We tested this algorithm on a randomly generated sequences, and Rosetta dataset where the sequence length ranged up to 500 thousand.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Design of a High Isolation 5G Antenna for Smart Phone 智能手机高隔离5G天线的研究与设计
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00086
Kuo Yang
{"title":"Research and Design of a High Isolation 5G Antenna for Smart Phone","authors":"Kuo Yang","doi":"10.1109/ICICT50521.2020.00086","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00086","url":null,"abstract":"A multi-band 8×8 MIMO antenna array operating in the Sub-6 GHz band is designed and studied in this paper. Eight T-slot antenna elements with excitable dual-resonant mode are integrated on the ground surface of the substrate, and eight F-shaped feeding belts are set on the surface of the substrate for coupling feeding. The operating bandwidth of the antenna covers LTE42and LTE46 according to the simulated results. It basically meets the acceptable standard of 5G MIMO antenna array in mobile phones (return loss is greater than 6dB, isolation is greater than 10dB). It can be used in large-scale MIMO applications of 5G smart phones.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"38 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120901714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hacking User in Human-Computer Interaction Design (HCI) 人机交互设计(HCI)中的黑客用户
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00042
Duc Son Nguyen, Quynh Mai Le
{"title":"Hacking User in Human-Computer Interaction Design (HCI)","authors":"Duc Son Nguyen, Quynh Mai Le","doi":"10.1109/ICICT50521.2020.00042","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00042","url":null,"abstract":"In order to enhance the efficiency of the Human-Computer Interaction (HCI) process, users' understanding research is the fundamental element for determining the success of the design. Proper user understanding and identifying information about their hobbies, habits, psychology, feelings, etc. will help designers convey the right ideas and create positive experiences to the user through the HCI process. This article uses an interdisciplinary approach, through research in analyzing arts, psychology, cultures. Its main output is to propose a number of \"hacking-user\" solutions to enhance the user experience, thus results in high efficiency of the HCI design process.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combating Jamming Attacks in Multi-channel IoT Networks Using Game Theory 利用博弈论对抗多通道物联网网络中的干扰攻击
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00081
M. Guizani, A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab
{"title":"Combating Jamming Attacks in Multi-channel IoT Networks Using Game Theory","authors":"M. Guizani, A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab","doi":"10.1109/ICICT50521.2020.00081","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00081","url":null,"abstract":"Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the increase in transmission power or the implementation of complex coordination schemes which are not feasible in limited resources Internet of Things (IoT) devices. Therefore, in this paper, a defending strategy against jamming attacks is designed for health monitoring IoT networks with multiple Orthogonal frequency-division multiplexing (OFDM) slow fading channels. In particular, minimizing the worst case jamming effect on the IoT sensors communications is modeled as a Colonel Blotto game. By analyzing the Nash Equilibrium (NE) of the game, an anti-jamming power allocating strategy is proposed and is shown to be effective in combating jamming attacks without the need for extra power and resources.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116046847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Cybersecurity Education for Non-technical Learners 论非技术学习者的网络安全教育
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00072
Matthew McNulty, H. Kettani
{"title":"On Cybersecurity Education for Non-technical Learners","authors":"Matthew McNulty, H. Kettani","doi":"10.1109/ICICT50521.2020.00072","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00072","url":null,"abstract":"In this paper the topic of cybersecurity education for individuals who are not in a technical learning environment will be explored. There are currently several organizations that can certify an education program that is focused on cybersecurity or similar areas. However, for individuals who are not within the cybersecurity field, such as those who are not yet finished with their high school education, those who are within another discipline at the University or College level, or those who are outside of the education system entirely, then there is no such entities or guidelines for programs to inform them about cybersecurity and privacy related issues and topics. This does not mean though, that these individuals have any less of a need for some training in the basics of cybersecurity and privacy protection that will affect everyone's daily life. Since these individuals are not exposed to the curriculums that might enable them to recognize or gain an understanding of the reasons behind practices that are common place for everyone, such as password requirements, then there could be an even greater need for them to be exposed to it in a controlled and consistent manner. The need to understand the security and privacy concerns associated with using various services and devices will continue to increase as more devices become internet and network connected, more jobs increasingly rely on technology, and more of these connected devices are brought into homes.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121715121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Online Shopping using Genetic Algorithm 利用遗传算法优化网上购物
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00048
Sahil Verma, Akash Sinha, Prabhat Kumar, Ajay Maitin
{"title":"Optimizing Online Shopping using Genetic Algorithm","authors":"Sahil Verma, Akash Sinha, Prabhat Kumar, Ajay Maitin","doi":"10.1109/ICICT50521.2020.00048","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00048","url":null,"abstract":"Recent advances in the technology has led to an exponential growth in the e-commerce business. Users today prefer Online Shopping to legacy shopping methods in order to save their effort and time. With the aim of attracting a greater number of customers, the online shopping portals offer products at cheaper rate than offline retailers. The increase in the number of online shopping portals are making it more difficult for the users to purchase a list of products at minimum cost. This can be attributed to the fact that different shopping portals offer different prices for the same product. This problem of obtaining a sequence of products to be procured from different shopping portals with the aim of minimizing the total cost has been termed as the Internet Shopping Optimization Problem. Owing to the NP-hardness of the problem, this paper proposes the application of Genetic Algorithm to solve the Internet Shopping Optimization Problem. Results obtained clearly indicates the efficiency of the proposed work in achieving the optimal solutions in polynomial time.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123358986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信