Thursday, 03 June 2021 03:37

Syntactic Annotation in the I3rab Dependency

Treebank

Dana Halabi1, Arafat Awajan1,3, and Ebaa Fayyoumi2

1Department of Computer Science, Princess Sumaya University for Technology, Jordan

2Department of Computer Science, Hashemite University, Jordan

3Information Technology College, Computer Science Department, Mutah University, Jordan

Abstract: Arabic dependency parsers have a poor performance compared to parsers of other languages. Recently the impact of annotation at lexical level of dependency treebank on the overall performance of the dependency parses has been extensively investigated. This paper focuses on the impact of coarse-grained and fine-grained dependency relations on the performance of Arabic dependency parsers. Moreover, this paper introduces the annotation rules for I3rab dependency treebank. Experimentally, the obtained results showed that having an appropriate set of dependency relations improves the performance of an Arabic dependency parser up to 27.55%.

Keywords: Arabic language, dependency parsing, natural language processing, dependency structure, dependency relation, annotation rules.

Received February 20, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/1

Full text   

Thursday, 03 June 2021 03:34

Multi-Agents Collaboration in Open System

Zina Houhamdi1 and Belkacem Athamena2

1Software Engineering Department, College of Engineering, Al Ain University, UAE

2Business Administration Department, College of Business, Al Ain University, UAE

Abstract: Share constrained resources, accomplish complex tasks and achieve shared or individual goals are examples requiring collaboration between agents in multi-agent systems. The collaboration necessitates an effective team composed of a set of agents that do not have conflicting goals and express their willingness to cooperate. In such a team, the complex task is split into simple tasks, and each agent performs its assigned task to contribute to the fulfilment of the complex task. Nevertheless, team formation is challenging, especially in an open system that consists of self-interested agents performing tasks to achieve several simultaneous goals, usually clashing, by sharing constrained resources. The clashing goals obstruct the collaboration's success since the self-interested agent prefers its individual goals to the team’s shared goal. In open systems, the collaboration team construction process is impacted by the Multi-Agent System (MAS) model, the collaboration’s target, and dependencies between agents’ goals. This study investigates how to allow agents to build collaborative teams to realize a set of goals concurrently in open systems with constrained resources. This paper proposes a fully distributed approach to model the Collaborative Team Construction Model (CTCM). CTCM modifies the social reasoning model to allow agents to achieve their individual and shared goals concurrently by sharing resources in an open MAS by constructing collaborative teams. Each agent shares partial information (to preserve privacy) and models its goal relationships. The proposed team construction approach supports a distributed decision-making process. In CTCM, the agent adapts its self-interest level and adjusts its willingness to form an effective collaborative team.

Keywords: Multi-agents system; open system; collaboration, dependency relationships, decentralized decision making.

Received February 20, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/2 

Full text  

Thursday, 03 June 2021 03:33

Multi-Spectral Hybrid Invariant Moments Fusion Technique for Face Identification

Shaymaa Hamandi, Abdul Monem Rahma, and Rehab Hassan

Computer Science Department, University of Technology, Iraq

Abstract: For reliable face identification, the fusion process of multi-spectral vision features produces robust classification systems, this paper exploits the power of thermal facial image invariant moments features fused with the visible facial image invariant moments features to propose a new multi-spectral hybrid invariant moment fusion system for face identification. And employs Feed-forward neural network to train the moments' features and make decisions. The evaluation system uses databases of visible thermal pairs face images CARL and UTK-IRIS databases and gives an accuracy reaches 99%.

Keywords: Feed-forward neural network, affine moments, face recognition, invariant moments, shape descriptor, zernike moments.

Received February 21, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/3
Full text      
Thursday, 03 June 2021 03:31

Usability Study of Enhanced Salat Learning Approach using Motion Recognition System

Nor Azrini Jaafar, Nor Azman Ismail, and Yusman Azimi Yusoff

Faculty of Engineering, Universiti Teknologi Malaysia, Malaysia

Abstract: Salat learning is one of the most important processes for every Muslim. The current learning approach requires the teacher or expert to be present in the learning session, which is time and resource-consuming. Previous researchers use both wearable and non-wearable sensors to recognize salat movement. They focus on specific salat movement rather than complete salat movement cycle. This paper present a motion recognition system to enhance salat learning experience. The system helps users recognize the complete salat movements cycle based on salat law by using a multisensor setup for better tracking capability. Three evaluations are conducted to validate the system's performance and its contribution. The first evaluation is to measure success score in recognition accuracy and identify user error. The second evaluation is conducted to compare the proposed system with the traditional-based methodology, and the last evaluation focuses on the user experience and acceptance of the proposed system. The result from performance evaluation shows the system has high accuracy in recognizing salat movement. There is a significant difference in the error rate and success score when comparing the learning methodology. However, users provide positive feedback based on the survey conducted after using the proposed system.

Keywords: Salat Learning, motion recognition, salat law, learning methodology.

Received February 20, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/4

Full text     

Thursday, 03 June 2021 03:29

An Ensemble-based Supervised Machine Learning Framework for Android Ransomware Detection

Shweta Sharma1, Rama Krishna Challa1, and Rakesh Kumar2

1Department of Computer Science and Engineering, National Institute of Technical Teachers Training and Research Chandigarh, India

2Department of Computer Science and Engineering, Central University of Haryana, India


Abstract: With latest development in technology, the usage of smartphones to fulfill day-to-day requirements has been increased. The Android-based smartphones occupy the largest market share among other mobile operating systems. The hackers are continuously keeping an eye on Android-based smartphones by creating malicious apps housed with ransomware functionality for monetary purposes. Hackers lock the screen and/or encrypt the documents of the victim’s Android based smartphones after performing ransomware attacks. Thus, in this paper, a framework has been proposed in which we (1) utilize novel features of Android ransomware, (2) reduce the dimensionality of the features, (3) employ an ensemble learning model to detect Android ransomware, and (4) perform a comparative analysis to calculate the computational time required by machine learning models to detect Android ransomware. Our proposed framework can efficiently detect both locker and crypto ransomware. The experimental results reveal that the proposed framework detects Android ransomware by achieving an accuracy of 99.67% with Random Forest ensemble model. After reducing the dimensionality of the features with principal component analysis technique; the Logistic Regression model took least time to execute on the Graphics Processing Unit (GPU) and Central Processing Unit (CPU) in 41 milliseconds and 50 milliseconds respectively.

Keywords: Smartphone security, android, ensemble learning, ransomware, and dimensionality reduction.

Received February 20, 2021; accepted March 7, 2021

 Full text       

https://doi.org/10.34028/iajit/18/3A/5
Thursday, 03 June 2021 03:28

An Anonymous Identity-based With

Bilateral Protocol for Smart Grid


Jennifer Batamuliza1 and Damien Hanyurwimfura2

1College of Business and Economics, University of Rwanda, Rwanda

2College of Science and Technology, University of Rwanda, Rwanda

Abstract: Smart Grid (SG) is a modern digital metering system that was introduced by researchers to take over the traditional electricity infrastructure that existed before by gathering and putting in use the data generated by smart meters and ensure efficiency and reliability in the two directional flow of electricity and data for both the service providers and smart meters. Leakage of customers’ identity causes inconvenience to the customer because he is exposed to theft in his household. Secure anonymous key distribution scheme for SG has been proposed as solution to secure data transfer between service provider and customer. Existing secure anonymous key distribution scheme for SG brings challenge such as being inefficient, having traceability issues and do not stop replay attack hence vulnerable to DoS attacks. In this paper a Secure efficient anonymous identity-based with bilateral protocol is proposed to address the weakness in existing anonymous key distribution schemes. , With this protocol, both smart meter and service provider in (SG) identify each other anonymously in efficient way achieving un-traceability and restisting Replay and DoS attack.

Keywords: Identity-based, anonymous, bilateral protocol, smart grid, smart meters.

Received February 20, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/6

 Full text      

Thursday, 03 June 2021 03:24

A Personalized Recommendation for Web API Discovery in Social Web of Things

Marwa Meissa1, Saber Benharzallah2, Laid Kahloul1, and Okba Kazar1

1LINFI Laboratory, Biskra University, Algeria

2Department of Computer Science, LAMIE Laboratory Batna 2 University, Algeria

Abstract: With the explosive growth of Web of Things (WoT) and social web, it is becoming hard for device owners and users to find suitable web Application Programming Interface (API) that meet their needs among a large amount of web APIs. Social-aware and collaborative filtering-based recommender systems are widely applied to recommend personalized web APIs to users and to face the problem of information overload. However, most of the current solutions suffer from the dilemma of accuracy- diversity where the prediction accuracy gains are typically accompanied by losses in the diversity of the recommended APIs due to the influence of popularity factor on the final score of APIs (e.g., high rated or high-invoked APIs). To address this problem, the purpose of this paper is developing an improved recommendation model called (Personalized Web API Recommendation) PWR, which enables to discover APIs and provide personalized suggestions for users without sacrificing the recommendation accuracy. To validate the performance of our model, seven variant algorithms of different approaches (popularity-based, user-based and item-based) are compared using MovieLens 20M dataset. The experiments show that our model improves the recommendation accuracy by 12% increase with the highest score among compared methods. Additionally it outperforms the compared models in diversity over all lengths of recommendation lists. It is envisaged that the proposed model is useful to accurately recommend personalized web API for users.

Keywords: Web of Things, recommender system, web API, collaborative filtering, rating prediction, social networks, IoT.

Received February 20, 2021; accepted March 7, 2021

 https://doi.org/10.34028/iajit/18/3A/7

Full text      

 

Thursday, 03 June 2021 03:21

Generating Sense Inventories for

Ambiguous Arabic Words

Marwah Alian1 and Arafat Awajan1,2

1King Hussein School of Computing Sciences, Princess Sumaya University for Technology, Jordan

2Information Technology College, Computer Science Department, Mutah University, Jordan

Abstract: The process of selecting the appropriate meaning of an ambigous word according to its context is known as word sense disambiguation. In this research, we generate a number of Arabic sense inventories based on an unsupervised approach and different pre-trained embeddings, such as Aravec, Fasttext, and Arabic-News embeddings. The resulted inventories from the pre-trained embeddings are evaluated to investigate their efficiency in Arabic word sense disambiguation and sentence similarity. The sense inventories are generated using an unsupervised approach that is based on a graph-based word sense inductionalgorithm. Results show that the Aravec-Twitter inventory achieves the best accuracy of 0.47 for 50 neighbors and a close accuracy to the Fasttext inventory for 200 neighbors while it provides similar accuracy to the Arabic-News inventory for 100neighbors. The experiment of replacing ambiguous words with their sense vectors is tested for sentence similarity using all sense inventories and the results show that using Aravec-Twitter sense inventoryprovides a better correlation value.

Keywords: Word sense induction, word sense disambiguation, arabic text, sense inventory.

Received February 25, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/8
Full text     
Thursday, 03 June 2021 03:16

Supervised Fuzzy C-Means Techniques

to Solve the

Capacitated Vehicle Routing Problem

Mohamed Shalaby1,2, Ayman Mohammed1, and Sally Kassem1,2

1Smart Engineering Systems Research Center, Nile University, Egypt

2Faculty of computers and Artificial Intelligence, Cairo University, Egypt

Abstract: Fuzzy C-Means (FCM) clustering technique is among the most effective partitional clustering algorithms available in the literature. The Capacitated Vehicle Routing Problem (CVRP) is an important industrial logistics and managerial NP-hard problem. Cluster-First Route-Second Method (CFRS) is one of the efficient techniques used to solve CVRP. In CFRS technique, customers are first divided into clusters in the first phase, then each cluster is solved independently as a Traveling Salesman Problem (TSP) in the second phase. This research is concerned with the clustering phase of CFRS, and TSP is then solved using a traditional optimization method. Three supervised FCM based techniques are proposed to solve the clustering phase at reduced cost via centroids (pre-FCM) initialization phase. The proposed pre-FCM initialization techniques are developed to be problem dependent. Hence, three initialization techniques are first developed using K-means technique, spatially equally distributed, and demand weighted center of mass. Then, a modified demand weighted fuzzy c-means objective function is employed to assign customers to clusters. To compare the performance of the proposed supervised FCM techniques, forty-two CVRP benchmark problems are solved using the traditional fuzzy C-means algorithm and the developed algorithms. Extensive comparisons are conducted between the traditional fuzzy C-means algorithm, the three proposed initialization techniques, and other fuzzy C-means techniques available in the literature. Results show that the proposed three initialization techniques are efficient in terms of solution quality and computational cost.

Keywords: Capacitated vehicle routing problem, supervised fuzzy c-means, fuzzy clustering.

Received February 20, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/9

Full text    

 

Thursday, 03 June 2021 03:14

A Multi-Population Genetic Algorithm for Adaptive QoS-Aware Service Composition in Fog-IoT Healthcare Environment

Idir Aoudia1, Saber Benharzallah2, Laid Kahloul1, and Okba Kazar1

1LINFI Laboratory, Biskra University, Algeria

2 LAMIE Laboratory, Computer Sciences department, Batna 2 University, Algeria

Abstract: The growth of Internet of Thing (IoT) implies the availability of a very large number of services which may be similar or the same, managing the Quality of Service (QoS) helps to differentiate one service from another. The service composition provides the ability to perform complex activities by combining the functionality of several services within a single process. Very few works have presented an adaptive service composition solution managing QoS attributes, moreover in the field of healthcare, which is one of the most difficult and delicate as it concerns the precious human life.In this paper, we will present an adaptive QoS-Aware Service Composition Approach (P-MPGA) based on multi-population genetic algorithm in Fog-IoT healthcare environment. To enhance Cloud-IoT architecture, we introduce a Fog-IoT 5-layared architecture. Secondly, we implement a QoS-Aware Multi-Population Genetic Algorithm (P-MPGA), we considered 12 QoS dimensions, i.e., Availability (A), Cost (C), Documentation (D), Location (L), Memory Resources (M), Precision (P), Reliability (R), Response time (Rt), Reputation (Rp), Security (S), Service Classification (Sc), Success rate (Sr), Throughput (T). Our P-MPGA algorithm implements a smart selection method which allows us to select the right service. Also, P-MPGA implements a monitoring system that monitors services to manage dynamic change of IoT environments. Experimental results show the excellent results of P-MPGA in terms of execution time, average fitness values and execution time / best fitness value ratio despite the increase in population. P-MPGA can quickly achieve a composite service satisfying user’s QoS needs, which makes it suitable for a large scale IoT environment.

Keywords: IoT, service composition, adaptability, context; QoS, Fog-IoT computing, Healthcare.

Received February 20, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/10

Full text   

Thursday, 03 June 2021 03:12

LoRaWAN Energy Optimization with Security

Consideration

Ala Khalifeh1, Khaled Aldahdouh1 and Sahel Alouneh1,2

1School of Electrical Engineering and Information Technology, German Jordanian University, Jordan

2College of Engineering, Al Ain University, UAE

Abstract: Long Range Wide Area Network (LoRaWAN) is an emerging wireless technology that is expected to be widely deployed and implemented in several applications, especially with the promising widespread use of the Internet of Things (IoT) and its potential applications within the Fifth Generation (5G) communication technology. LoRaWAN consists of a number of nodes that monitors and senses the environment to collect specific data, and then sends the collected data to a remote monitoring device for further processing and decision-making. Energy consumption and security assurance are two vital factors needed to be optimized to ensure an efficient and reliable network operation and performance. To achieve that, each of LoRaWAN nodes can be configured by five transmission parameters, which are the spreading factor, carrier frequency, bandwidth, coding rate and transmission power. Choosing the best values of these parameters leads to enhancing the network deployment. In this paper, we shed the light to the security aspect in LoRaWAN network. Then, we introduced an algorithm that depends on the reinforcement learning approach to enable each node in the network to choose the best values of spreading factor and transmission power such that it leads to a lower energy consumption and higher packets’ delivery rate. The results of the simulation experiments of our proposed technique showed a valuable increase in the packet reception rate at the gateway and a significant decrease in the total consumed energy at the end nodes compared with the most related work in literature.

Keywords: LoRaWAN, transmission parameters, reinforcement learning, power consumption, Security, Confidentiality, Authentication.

Received February 28, 2021; accepted March 7, 2021

 https://doi.org/10.34028/iajit/18/3A/11

Full text  

Thursday, 03 June 2021 03:01

Computer Vision in Contactless Biometric

Systems

Farukh Hashmi1, Kiran Ashish2, Satyarth Katiyar3, and Avinash Keskar4

1Department of Electronics and Communication Engineering, National Institute of Technology, India

2Computer Vision Engineer, Viume, India

3Department of Electronics and Communication Engineering, Harcourt Butler Technical University, India

4Department of Electronics and Communication Engineering, Visvesvaraya National Institute of Technology, India

Abstract: Contactless biometric systems have increased ever since the corona pandemic outbreak. The two main contactless biometric systems are facial recognition and gait patterns recognition. The authors in the previous work [11] have built hybrid architecture AccessNet. It involves combination of three systems: facial recognition, facial anti-spoofing, and gait recognition. This work involves deploying the hybrid architecture and deploying two individual systems such as facial recognition with facial anti-spoofing and gait recognition individually and comparing the individual results in real-time with the AccessNet hybrid architecture results. This work even involves in identifying the main crucial features from each system that are responsible for predicting a subject. It includes extracting few crucial parameters from gait recognition architecture, facial recognition and facial anti-spoof architectures by visualizing the hidden layers. Each individual method is trained and tested in real-time, which is deployed on both edge device NvidiaJetsonNano, and high-end GPU. A conclusion is also adapted in terms of commercial and research usage for each single method after analysing the real-time test results.

Keywords: AccessNet, gait patterns, facial recognition, contactless biometric systems, crucial features, NvidiaJetsonNano.

Received February 21, 2021; accepted March 7, 2021

https://doi.org/10.34028/iajit/18/3A/12

Full text 

Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…