2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)最新文献

筛选
英文 中文
A novel hybrid feature selection based on ReliefF and binary dragonfly for high dimensional datasets 基于ReliefF和二进制蜻蜓的高维数据混合特征选择
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965106
Atefe Asadi Karizaki, M. Tavassoli
{"title":"A novel hybrid feature selection based on ReliefF and binary dragonfly for high dimensional datasets","authors":"Atefe Asadi Karizaki, M. Tavassoli","doi":"10.1109/ICCKE48569.2019.8965106","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965106","url":null,"abstract":"High dimensionality is a common challenge in large datasets. Combination of the filter and wrapper methods is used to select the appropriate set of features in these datasets. The hybrid method is desirable, which uses the advantages of both the methods and covers the disadvantages. In this paper, a hybrid method for feature selection in high dimension data is presented. In proposed algorithm, the ReliefF algorithm is used as a filter method for ranking features. Next, the binary dragonfly algorithm (BDA) is applied as a wrapper method. The BDA algorithm uses the ranked features to find optimal set of features incrementally and iteratively. Minimizing the cross-validation loss and decreasing the number of features is considered to evaluate the solution, hierarchically. The proposed algorithm and other compared algorithms run over 5 datasets and the results indicated that the proposed algorithm not only reduce the dimension of dataset but also improve the performance of classifiers on the test data.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"34 1","pages":"300-304"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80106973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predicting Execution Time of CUDA Kernels with Unified Memory Capability 具有统一存储能力的CUDA内核的执行时间预测
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964952
Fatemeh Khorshahiyan, S. Shekofteh, Hamid Noori
{"title":"Predicting Execution Time of CUDA Kernels with Unified Memory Capability","authors":"Fatemeh Khorshahiyan, S. Shekofteh, Hamid Noori","doi":"10.1109/ICCKE48569.2019.8964952","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964952","url":null,"abstract":"Nowadays, GPUs are known as one of the most important, most remarkable, and perhaps most popular computing platforms. In recent years, GPUs have increasingly been considered as co-processors and accelerators. Along with growing technology, Graphics Processing Units (GPUs) with more advanced features and capabilities are manufactured and launched by the world's largest commercial companies. Unified memory is one of these new features introduced on the latest generations of Nvidia GPUs which allows programmers to write a program considering the uniform memory shared between CPU and GPU. This feature makes programming considerably easier. The present study introduces this new feature and its attributes. In addition, a model is proposed to predict the execution time of applications if using unified memory style programming based on the information of non-unified style implementation. The proposed model can predict the execution time of a kernel with an average accuracy of 87.60%.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"4 1","pages":"437-443"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89248456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
POI Recommendation Based on Heterogeneous Graph Embedding 基于异构图嵌入的POI推荐
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964762
Sima Naderi Mighan, M. Kahani, F. Pourgholamali
{"title":"POI Recommendation Based on Heterogeneous Graph Embedding","authors":"Sima Naderi Mighan, M. Kahani, F. Pourgholamali","doi":"10.1109/ICCKE48569.2019.8964762","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964762","url":null,"abstract":"With the development and popularity of social networks, many human beings prefer to share their experiences on these networks. There are various methods proposed by the researcher which utilized user-generated content in the location-based social networks (LBSN) and recommend locations to users. However, there is a high sparsity in the user check-in information makes it tough to recommend the appropriate and accurate location to the user. To fix this issue, we put forward a proposal as a framework which utilizes a wide range of information available in these networks, each of which has its own type and provides appropriate recommendation. For this purpose, we encode the information as a number of entities and its attributes in the form of a heterogeneous graph, then graph embedding methods are used to embed all nodes in unified semantic representation space. As a result, we are able to model relations between users and venues in an efficient way and ameliorate the accuracy of the proposed method that recommends a place to a user. Our method is implemented and evaluated using Foursquare dataset, and the evaluation results depict that our work, boost performance in terms of precision, recall, and f-measure compared to the baseline work.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"188-193"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83943320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resource Provisioning in IaaS Clouds; Auto-Scale RAM memory issue IaaS云中的资源配置自动缩放RAM内存问题
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964932
Zolfaghar Salmanian, Habib Izadkhah, A. Isazadeh
{"title":"Resource Provisioning in IaaS Clouds; Auto-Scale RAM memory issue","authors":"Zolfaghar Salmanian, Habib Izadkhah, A. Isazadeh","doi":"10.1109/ICCKE48569.2019.8964932","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964932","url":null,"abstract":"In the Infrastructure-as-a-Service model of the cloud computing paradigm, virtual machines are deployed on bare-metal servers called hosts. The host is responsible for the allocation of required resources such as CPU, RAM memory, and network bandwidth for the virtual machine. Thus, the problem of resource allocation reduces to how to place the virtual machines on physical hosts. In this paper, we propose CTMC modeling based on the birth-death process of the queueing systems for the performance of the data center. We will focus on RAM allocation for virtual machines. In this architecture, a job is defined as RAM assignment for a virtual machine. Job arrivals and their service times are assumed to be based on the Poisson process and exponential distribution, respectively. The purpose of this modeling is to keep the number of running hosts minimal in a scalable datacenter while the quality of service in terms of response time is acceptable due to system utilization.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"48 1","pages":"455-460"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81795000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering Causal Networks based on Windowed Granger Analysis in Multivariate Time Series 基于多变量时间序列窗口格兰杰分析的因果网络恢复
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965099
Ali Gorji Sefidmazgi, M. G. Sefidmazgi
{"title":"Recovering Causal Networks based on Windowed Granger Analysis in Multivariate Time Series","authors":"Ali Gorji Sefidmazgi, M. G. Sefidmazgi","doi":"10.1109/ICCKE48569.2019.8965099","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965099","url":null,"abstract":"Reconstruction of causal network from multivariate time series is an important problem in data science. Regular causality analysis based on Granger method does not consider multiple delays between elements of a causal network. In contrast, the Windowed Granger method not only considers the effect of mutiple delays, but also provides a flexible framework to utilize various linear and nonlinear regression methods within Granger causality analysis. In this work, we have used four methods with Windowed Granger method including hypothesis tests of linear regression, LASSO and random forest. Then, their performance on two simulated and real-world time series are compared with ground truth networks and other causality recovering methods.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"103 1","pages":"170-175"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80927255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Persian Classical Music Instrument Recognition (PCMIR) Using a Novel Persian Music Database 波斯古典乐器识别(PCMIR)使用一个新颖的波斯音乐数据库
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965166
Seyed Muhammad Hossein Mousavi, V. B. Surya Prasath
{"title":"Persian Classical Music Instrument Recognition (PCMIR) Using a Novel Persian Music Database","authors":"Seyed Muhammad Hossein Mousavi, V. B. Surya Prasath","doi":"10.1109/ICCKE48569.2019.8965166","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965166","url":null,"abstract":"Audio signal classification is an important field in pattern recognition and signal processing. Classification of musical instruments is a branch of audio signal classification and poses unique challenges due to the diversity of available instruments. Automatic expert systems could assist or be used as a replacement for humans. The aim of this work is to classify Persian musical instruments using combination of extracted features from audio signal. We believe such an automatic system to recognize Persian musical instruments could be very useful in an educational context as well as art universities. Features like Mel-Frequency Cepstrum Coefficients (MFCCs), Spectral Roll-off, Spectral Centroid, Zero Crossing Rate and Entropy Energy are employed and work well for this purpose. These features are extracted from audio signals out of our novel database. This database contains audio samples for 7 Persian musical instrument classes: Ney, Tar, Santur, Kamancheh, Tonbak, Ud and Setar. In feature selection part, Fuzzy entropy measure is employed and classification task takes place by Multi-Layer Neural Network (MLNN). It should be mentioned that this research is one of the first researches on Persian musical instrument classification. Validation confusion matrix made of true positive and false negative rates along with true and false observations numbers. Acquired results are so promising and satisfactory.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"47 1","pages":"122-130"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84949928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems 一种新的可证明安全的基于ecc的远程医疗信息系统认证与密钥管理协议
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965036
H. Amintoosi, Mahdi Nikooghadam
{"title":"A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems","authors":"H. Amintoosi, Mahdi Nikooghadam","doi":"10.1109/ICCKE48569.2019.8965036","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965036","url":null,"abstract":"Telecare medical information systems are becoming more and more popular due to the provision of delivering health services, including remote access to health profiles for doctors, staff, and patients. Since these systems are installed entirely on the Internet, they are faced with different security and privacy threats. So, a significant challenge is the establishment of a secure key agreement and authentication procedure between the medical servers and patients. Recently, an ECC-based authentication and key agreement scheme for telecare medical systems in the smart city has been proposed by Khatoon et.al. In this paper, at first, we descriptively analyze Khatoon et al.’s protocol and demonstrate that it is vulnerable against known-session-specific temporary information attacks and cannot satisfy perfect forward secrecy. Next, we propose a provably secure and efficient authentication and key agreement protocol using Elliptic Curve Cryptography (ECC). We informally analyze the security of the proposed protocol, and prove that it can satisfy perfect forward secrecy and resist known attacks such as user/server impersonation attack. We also simulate and formally analyze the security of the protocol using the Scyther tool. The results show its robustness against different types of attacks.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"5 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88703120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Levy Flight-based Decomposition Multi-objective Optimization Based on Grey Wolf Optimizer 基于灰狼优化器的Levy飞行分解多目标优化
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965178
Masoumeh Khubroo, S. J. Mousavirad
{"title":"A Levy Flight-based Decomposition Multi-objective Optimization Based on Grey Wolf Optimizer","authors":"Masoumeh Khubroo, S. J. Mousavirad","doi":"10.1109/ICCKE48569.2019.8965178","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965178","url":null,"abstract":"The goal of an optimization technique is to find the best solution to an optimization problem. In a single-objective problem, the best solution is the optimal value for the objective function, while in a multi-objective problem, the selection of solutions is not a straightforward task because there are several objective functions which are in conflict. There are many diverse applications such as image processing and data mining, which can be formulated as a multi-objective problem. This paper presents a new decomposition-based multi-objective optimization method using the grey wolf optimizer, which transforms the problem into several sub-problems and examines all the sub-problems simultaneously. Our proposed algorithm obtains the Pareto front using a neighborhood relation among the sub-problems. The levy flight distribution has also been used which increases the exploration and exploitation features in the algorithm in order to improve the search ability. The performance of our proposed algorithm is evaluated on UF family of benchmark functions in terms of different metric such as inverted generational distance (IGD), generational distance (GD), hyper-volume (HV), and spacing (SP). The experimental results indicate the superior performance of the proposed method.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"74 1","pages":"155-161"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88346784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated Mood Based Music Playlist Generation By Clustering The Audio Features 通过聚类音频功能自动生成基于情绪的音乐播放列表
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965190
Mahta Bakhshizadeh, A. Moeini, Mina Latifi, M. Mahmoudi
{"title":"Automated Mood Based Music Playlist Generation By Clustering The Audio Features","authors":"Mahta Bakhshizadeh, A. Moeini, Mina Latifi, M. Mahmoudi","doi":"10.1109/ICCKE48569.2019.8965190","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965190","url":null,"abstract":"The increase of receiving attention to music recommendation and playlist generation in today’s music industry is undeniable. One of the main goals is to generate personalized playlists automatically for each user. Beyond that, an appropriate switching among these playlists to play the tracks based on the current mood of the user would certainly lead to the development of more advanced and personalized music player apps. In this paper, a data scientific approach is provided to model the music moods which are created by clustering the tracks extracted from users’ listening. Each Cluster consists of music tracks with similar audio features existing in the user’s listening history. Knowing which music track is currently being listened by users, their mood would be specified by determining the cluster of that music. It is presumed that playing the other music tracks contained in the same cluster as the next tracks will enhance their satisfaction. A suggestion for making the results visually interpretable which could help the corresponding music players with GUI design is provided as well. Experimental results of a case study from real datasets collected from Users’ listening history on Last.fm benefiting from Spotify API clarifies the framework along with supporting the mentioned presumption.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"316 1","pages":"231-237"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76143802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Prediction-Based Approach for Computing Robust Rating Scores 一种基于预测的鲁棒评分计算方法
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964992
Mohammad Allahbakhsh, R. Rafat, Fariba Layegh Rafat
{"title":"A Prediction-Based Approach for Computing Robust Rating Scores","authors":"Mohammad Allahbakhsh, R. Rafat, Fariba Layegh Rafat","doi":"10.1109/ICCKE48569.2019.8964992","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964992","url":null,"abstract":"Assessing quality of products, especially when purchased online, is always a challenge. One of the widely used approaches for addressing this challenge is to rely on the scores computed by online rating systems, based on the feedback received from other users. For several reasons, like gaining benefits, personal interests or collusion, rating systems have always been facing with challenge of dishonest feedback. Although many techniques have been proposed for collusion detection, there are still issues that need more investigations. One of these issues is dealing with the sparsity problem, i.e., small number of votes per product, which makes it easier to manipulate scores. In this paper we propose a novel technique for calculating robust rank scores which relies on feedback prediction. In our model, we improve quality of computed scores by predicting feedback, for the people who have not assessed a product. This will result in decreasing sparsity. Then, we propose an iterative technique to calculate product rating scores based on the real and predicted feedbacks. We have implemented our method and compared its performance with three well-known related works. The result of comparison shows the superiority of our model.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"96 1","pages":"116-121"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76986951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信