首页 > 最新文献

2019 15th International Conference on Electronics, Computer and Computation (ICECCO)最新文献

英文 中文
Epilepsy Detection and Classification for Smart IoT Devices Using hybrid Technique 基于混合技术的智能物联网设备癫痫检测与分类
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043241
S. Saminu, Guizhi Xu, Shuai Zhang, A. E. K. Isselmou, R. S. Zakariyya, A. H. Jabire
Epilepsy is a type of neurological disorder which can happen without serious warning and affects people almost at any age. It is a brain disorder caused by sudden and unprovoked seizures as a result of excitation of a lot of brain cells simultaneously which may lead to physical symptoms abnormalities and deformation such as failure in concentration, memory, attention etc. therefore, proper and efficient method of continues monitoring and detection of these epileptic seizures is paramount. This work presents an effective and efficient technique suitable for smart, low cost, power and real time devices that can be easily integrated with recent 5G network IoT devices for mobile applications, home and health care centers for monitoring and alert the doctors and patients about its occurrence to prevent a sudden collapse and consciousness which may cause injury and death. We proposed a low computational cost features extraction method by utilizing the efficacy of time-frequency, statistical and non-linear features known as hybrid techniques. The efficiency and accuracy of these smart devices is highly depends on quality of feature extraction methods and classifier performance. Therefore, this work employed two machine learning classifiers, support vector machine (SVM) and feedforward neural network (FFNN) to detect and classify interictal (normal) and ictal (seizure) signals. Discrete wavelet transform (DWT) is employed to decomposes the signals into decomposition levels as sub-bands of the signals to capture the non-stationarity of the EEG signals. Mean, median, maximum, minimum etc. were calculated for each sub-band as statistical parameters, non-linear features such as sample entropy, approximate entropy and wavelet energy were also calculated. The combination of features is then fed to two classifiers for the classification. Based on the performance measures such as accuracy, sensitivity and specificity, our proposed approach reveals a promising result with highest accuracy of 99.6%.
癫痫是一种神经系统疾病,可以在没有严重预警的情况下发生,几乎影响任何年龄的人。它是一种由大量脑细胞同时兴奋引起的突然无端发作引起的脑部疾病,可能导致身体症状异常和变形,如注意力、记忆力、注意力等方面的失败,因此,适当有效的持续监测和检测这些癫痫发作的方法至关重要。这项工作提出了一种有效和高效的技术,适用于智能,低成本,功耗和实时设备,可以轻松地与最新的5G网络物联网设备集成,用于移动应用,家庭和医疗中心,以监测并提醒医生和患者发生事故,以防止可能导致伤害和死亡的突然崩溃和意识丧失。我们提出了一种低计算成本的特征提取方法,利用时频、统计和非线性特征的有效性,称为混合技术。这些智能设备的效率和准确性在很大程度上取决于特征提取方法的质量和分类器的性能。因此,本工作采用支持向量机(SVM)和前馈神经网络(FFNN)两种机器学习分类器对间隔(正常)和间隔(发作)信号进行检测和分类。采用离散小波变换(DWT)对信号进行分解,并作为信号的子带来捕捉脑电信号的非平稳性。计算各子带的均值、中位数、最大值、最小值等作为统计参数,并计算样本熵、近似熵、小波能量等非线性特征。然后将特征组合馈送给两个分类器进行分类。基于准确度、灵敏度和特异性等性能指标,我们提出的方法显示了一个有希望的结果,最高准确率为99.6%。
{"title":"Epilepsy Detection and Classification for Smart IoT Devices Using hybrid Technique","authors":"S. Saminu, Guizhi Xu, Shuai Zhang, A. E. K. Isselmou, R. S. Zakariyya, A. H. Jabire","doi":"10.1109/ICECCO48375.2019.9043241","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043241","url":null,"abstract":"Epilepsy is a type of neurological disorder which can happen without serious warning and affects people almost at any age. It is a brain disorder caused by sudden and unprovoked seizures as a result of excitation of a lot of brain cells simultaneously which may lead to physical symptoms abnormalities and deformation such as failure in concentration, memory, attention etc. therefore, proper and efficient method of continues monitoring and detection of these epileptic seizures is paramount. This work presents an effective and efficient technique suitable for smart, low cost, power and real time devices that can be easily integrated with recent 5G network IoT devices for mobile applications, home and health care centers for monitoring and alert the doctors and patients about its occurrence to prevent a sudden collapse and consciousness which may cause injury and death. We proposed a low computational cost features extraction method by utilizing the efficacy of time-frequency, statistical and non-linear features known as hybrid techniques. The efficiency and accuracy of these smart devices is highly depends on quality of feature extraction methods and classifier performance. Therefore, this work employed two machine learning classifiers, support vector machine (SVM) and feedforward neural network (FFNN) to detect and classify interictal (normal) and ictal (seizure) signals. Discrete wavelet transform (DWT) is employed to decomposes the signals into decomposition levels as sub-bands of the signals to capture the non-stationarity of the EEG signals. Mean, median, maximum, minimum etc. were calculated for each sub-band as statistical parameters, non-linear features such as sample entropy, approximate entropy and wavelet energy were also calculated. The combination of features is then fed to two classifiers for the classification. Based on the performance measures such as accuracy, sensitivity and specificity, our proposed approach reveals a promising result with highest accuracy of 99.6%.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121262444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sentiment Analysis In Student Learning Experience 学生学习经验中的情感分析
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043293
Obinna Uchenna Obeleagu, Yusuf Aleshinloye Abass, Steve A. Adeshina
The task of predicting students’ performance has become more challenging due to the obscurity, volume, and irregularities of data. These factors compounded with the human element of mood and altitudes of the student and the perception of the lecturers by the students have brought about “SUBJECTIVITY” in the learning environment. This design seeks to eliminate “SUBJECTIVITY” in Student Learning Experience by leveraging on machine Learning algorithms & Methodology. This paper builds on existing techniques and aims to improve upon them. Success was achieved in this regard by combining academic and social variables in the attribute set. These variables will go a long way in improving student performance and success rates as well an explaining extensively the components of a student learning metric and its features.
由于数据的模糊性、数量和不规则性,预测学生成绩的任务变得更加具有挑战性。这些因素与学生的情绪、态度以及学生对讲师的感知等人为因素相结合,形成了学习环境中的“主体性”。该设计旨在通过利用机器学习算法和方法来消除学生学习体验中的“主观性”。本文建立在现有技术的基础上,旨在对其进行改进。通过将属性集中的学术变量和社会变量结合起来,在这方面取得了成功。这些变量将在很大程度上提高学生的表现和成功率,并广泛地解释学生学习指标的组成部分及其特征。
{"title":"Sentiment Analysis In Student Learning Experience","authors":"Obinna Uchenna Obeleagu, Yusuf Aleshinloye Abass, Steve A. Adeshina","doi":"10.1109/ICECCO48375.2019.9043293","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043293","url":null,"abstract":"The task of predicting students’ performance has become more challenging due to the obscurity, volume, and irregularities of data. These factors compounded with the human element of mood and altitudes of the student and the perception of the lecturers by the students have brought about “SUBJECTIVITY” in the learning environment. This design seeks to eliminate “SUBJECTIVITY” in Student Learning Experience by leveraging on machine Learning algorithms & Methodology. This paper builds on existing techniques and aims to improve upon them. Success was achieved in this regard by combining academic and social variables in the attribute set. These variables will go a long way in improving student performance and success rates as well an explaining extensively the components of a student learning metric and its features.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Systematic Review on Hidden Markov Models for Sentiment Analysis 情感分析中隐马尔可夫模型的系统综述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043297
Victor Odumuyiwa, Ukachi Osisiogu
This paper gives a review of the literature on the application of Hidden Markov Models in the field of sentiment analysis. This is done in relation to a research project on semantic representation and the use of probabilistic graphical models for the determination of sentiment in textual data. Relevant articles have been analyzed that correspond mainly to the certain variations of the implementation of HMM and a variety of use cases for the purpose of sentiment classification. Finally, this review presents the grounds for future works that seek to develop techniques for semantic text representations implemented with probabilistic graphical models (Hidden Markov Models) or that through a combination scheme allow for superior classification performance.
本文对隐马尔可夫模型在情感分析领域的应用进行了综述。这与一个关于语义表示和使用概率图形模型来确定文本数据中的情感的研究项目有关。已经分析了相关文章,这些文章主要对应于HMM实现的某些变化以及用于情感分类的各种用例。最后,这篇综述为未来的工作提供了基础,这些工作旨在开发使用概率图形模型(隐马尔可夫模型)实现的语义文本表示技术,或者通过组合方案实现更好的分类性能。
{"title":"A Systematic Review on Hidden Markov Models for Sentiment Analysis","authors":"Victor Odumuyiwa, Ukachi Osisiogu","doi":"10.1109/ICECCO48375.2019.9043297","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043297","url":null,"abstract":"This paper gives a review of the literature on the application of Hidden Markov Models in the field of sentiment analysis. This is done in relation to a research project on semantic representation and the use of probabilistic graphical models for the determination of sentiment in textual data. Relevant articles have been analyzed that correspond mainly to the certain variations of the implementation of HMM and a variety of use cases for the purpose of sentiment classification. Finally, this review presents the grounds for future works that seek to develop techniques for semantic text representations implemented with probabilistic graphical models (Hidden Markov Models) or that through a combination scheme allow for superior classification performance.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"49 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115340550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligence Security Check System Using Face Recognition Algorithm: A Review 基于人脸识别算法的智能安全检查系统综述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043267
Lateefah Abdul-azeez, A. Aibinu, Sodiq Olanrewaju Akanmu, T. A. Folorunso, M. Salami
One of the famous biometric in use is the facial recognition, which uses statistical measurement of an individual face features to discover or determine his/her identity. Human are prone to errors or mistakes, therefore, using only security personnel cannot give us a perfect security mechanism. This paper explains the importance of biometric and also present various methods which biometric application can applied in solving various problem. It focuses on face recognition and face detection techniques which include Principle Components Analysis (PCA), Hidden Markov Model (HMM), and the Discrete Wavelet Transform (DWT). It briefly explains how the use of symmetry of the face can be used for recognition, the combination of audio and video in face recognition and also show that a face can be detected in a video. It also shows the various strengths and weaknesses from each method used.
最著名的生物识别技术之一是面部识别,它通过对个人面部特征的统计测量来发现或确定他/她的身份。人是容易犯错或出错的,因此,只使用保安人员并不能给我们一个完善的安全机制。本文阐述了生物识别技术的重要性,并介绍了生物识别技术应用于解决各种问题的各种方法。重点介绍了人脸识别和人脸检测技术,包括主成分分析(PCA)、隐马尔可夫模型(HMM)和离散小波变换(DWT)。它简要地解释了如何利用面部的对称性来进行识别,人脸识别中音频和视频的结合,并展示了在视频中可以检测到人脸。它还显示了所使用的每种方法的优点和缺点。
{"title":"Intelligence Security Check System Using Face Recognition Algorithm: A Review","authors":"Lateefah Abdul-azeez, A. Aibinu, Sodiq Olanrewaju Akanmu, T. A. Folorunso, M. Salami","doi":"10.1109/ICECCO48375.2019.9043267","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043267","url":null,"abstract":"One of the famous biometric in use is the facial recognition, which uses statistical measurement of an individual face features to discover or determine his/her identity. Human are prone to errors or mistakes, therefore, using only security personnel cannot give us a perfect security mechanism. This paper explains the importance of biometric and also present various methods which biometric application can applied in solving various problem. It focuses on face recognition and face detection techniques which include Principle Components Analysis (PCA), Hidden Markov Model (HMM), and the Discrete Wavelet Transform (DWT). It briefly explains how the use of symmetry of the face can be used for recognition, the combination of audio and video in face recognition and also show that a face can be detected in a video. It also shows the various strengths and weaknesses from each method used.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122411442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Three Tuning Techniques of PID Control for a Bioreactor Process Plant 生物反应器工艺装置PID控制的三种整定技术评价
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043279
Oladele.A. Daniel, F. Shaibu, Isreal Olu. Megbowon
This paper evaluates the performance of the developed bioreactor model with the following tuning techniques: Artificial Neural Network method, Fuzzy Logic method and Ziegler Nichols method. A model of the bioreactor was developed and an input of the stirrer speed and oxygen consumption was used as the input to control the temperature of the bioreactor. The stability of the bioreactor’s temperature was compared and recommendations were made. The Ziegler Nichols and fuzzy logic models were the most stable with a fuzzy logic technique having the least settling time. This paper has effectively shown how important tuning techniques are when using a PID controller to stable a chaotic system (in this case, bioreactor process plant). It has also shown that for the set conditions used in this paper, the fuzzy logic and the Ziegler Nichols tuning technique are the most stable and suitable.
本文采用人工神经网络法、模糊逻辑法和齐格勒尼科尔斯法对所建立的生物反应器模型进行了性能评价。建立了生物反应器模型,并以搅拌速度和耗氧量作为控制生物反应器温度的输入。对生物反应器温度的稳定性进行了比较,并提出了建议。Ziegler Nichols模型和模糊逻辑模型最稳定,模糊逻辑技术的稳定时间最短。本文有效地展示了在使用PID控制器稳定混沌系统(在这种情况下,生物反应器工艺装置)时,调谐技术的重要性。结果还表明,对于本文所使用的设定条件,模糊逻辑和齐格勒-尼科尔斯调谐技术是最稳定和最合适的。
{"title":"Evaluation of Three Tuning Techniques of PID Control for a Bioreactor Process Plant","authors":"Oladele.A. Daniel, F. Shaibu, Isreal Olu. Megbowon","doi":"10.1109/ICECCO48375.2019.9043279","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043279","url":null,"abstract":"This paper evaluates the performance of the developed bioreactor model with the following tuning techniques: Artificial Neural Network method, Fuzzy Logic method and Ziegler Nichols method. A model of the bioreactor was developed and an input of the stirrer speed and oxygen consumption was used as the input to control the temperature of the bioreactor. The stability of the bioreactor’s temperature was compared and recommendations were made. The Ziegler Nichols and fuzzy logic models were the most stable with a fuzzy logic technique having the least settling time. This paper has effectively shown how important tuning techniques are when using a PID controller to stable a chaotic system (in this case, bioreactor process plant). It has also shown that for the set conditions used in this paper, the fuzzy logic and the Ziegler Nichols tuning technique are the most stable and suitable.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of LTE Networks LTE网络的性能评估
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043271
A. Miyim, Abubakar Wakili
The explosion of mobile data usage due to the increase of mobile subscribers and emergence of new applications such as mobile TV and online gaming, which requires high quality of service is the driving force for developing Long-Term Evolution (LTE) mobile networks by 3GPP. Service providers are migrating to this network due to its promising quality of service to assist them meet the growing end-user demand for more bandwidth, high security and faster connectivity. Service providers in Nigeria claimed to have rolled out 4G (LTE) nationwide, yet mobile subscribers are still unhappy with network operators over slow network connection and poor quality of service. Base on this motive, OMNeT++ simulator was used to evaluate performance of LTE networks by varying number of user equipment (UE) connected to evolved Node Base station (eNB), distance of UE from eNB and mobility speed of UE. Performance metrics used are throughput, end-to-end delay and packet loss. We observed that the LTE network is capable of providing good quality voice call. Though, its quality is affected with increasing distances between UE and eNodeB, number of connected users, and mobility speed of user.
由于移动用户的增加以及移动电视和在线游戏等新应用的出现,移动数据使用量的爆炸式增长需要高质量的服务,这是3GPP发展长期演进(LTE)移动网络的动力。服务提供商正在迁移到该网络,因为它具有良好的服务质量,可以帮助他们满足终端用户对更多带宽、高安全性和更快连接的日益增长的需求。尼日利亚的服务提供商声称已经在全国范围内推出了4G (LTE),但移动用户仍然对网络运营商的网络连接缓慢和服务质量不佳感到不满。基于这一动机,利用omnet++模拟器通过改变接入演进节点基站(eNB)的用户设备(UE)数量、UE与eNB之间的距离以及UE的移动速度来评估LTE网络的性能。使用的性能指标是吞吐量、端到端延迟和数据包丢失。我们观察到LTE网络能够提供高质量的语音通话。但是,其质量会随着UE与eNodeB之间的距离、连接用户数量和用户移动速度的增加而受到影响。
{"title":"Performance Evaluation of LTE Networks","authors":"A. Miyim, Abubakar Wakili","doi":"10.1109/ICECCO48375.2019.9043271","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043271","url":null,"abstract":"The explosion of mobile data usage due to the increase of mobile subscribers and emergence of new applications such as mobile TV and online gaming, which requires high quality of service is the driving force for developing Long-Term Evolution (LTE) mobile networks by 3GPP. Service providers are migrating to this network due to its promising quality of service to assist them meet the growing end-user demand for more bandwidth, high security and faster connectivity. Service providers in Nigeria claimed to have rolled out 4G (LTE) nationwide, yet mobile subscribers are still unhappy with network operators over slow network connection and poor quality of service. Base on this motive, OMNeT++ simulator was used to evaluate performance of LTE networks by varying number of user equipment (UE) connected to evolved Node Base station (eNB), distance of UE from eNB and mobility speed of UE. Performance metrics used are throughput, end-to-end delay and packet loss. We observed that the LTE network is capable of providing good quality voice call. Though, its quality is affected with increasing distances between UE and eNodeB, number of connected users, and mobility speed of user.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129883160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Review on Cyber -Physical Security of Smart Buildings and Infrastructure 智能建筑与基础设施的网络物理安全研究综述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043207
Ukachi Osisiogu
The adequate implementation of Cyber-Physical Security Systems of Smart Buildings and Infrastructure is vital. Threats when exploited cause negative impacts on the beneficial effects of SB; however, mitigation and defense techniques have been devised but there is a need for further research to produce smarter, robust and efficient systems.
智能建筑和基础设施的网络物理安全系统的充分实施至关重要。威胁一旦被利用,就会对生物合成的有益效果产生负面影响;然而,已经设计了缓解和防御技术,但需要进一步研究以生产更智能、更强大和更有效的系统。
{"title":"A Review on Cyber -Physical Security of Smart Buildings and Infrastructure","authors":"Ukachi Osisiogu","doi":"10.1109/ICECCO48375.2019.9043207","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043207","url":null,"abstract":"The adequate implementation of Cyber-Physical Security Systems of Smart Buildings and Infrastructure is vital. Threats when exploited cause negative impacts on the beneficial effects of SB; however, mitigation and defense techniques have been devised but there is a need for further research to produce smarter, robust and efficient systems.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127827795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Systematic Literature Review On Digital Evidence Admissibility: Methodologies, Challenges and Research Directions 数字证据可采性:方法论、挑战与研究方向
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043250
E. O. Edward, J. Ojeniyi
Admissibility of Evidence is the eligibility of particular pieces of evidence for inception as part of the evidence in a case. Admissibility means the character or quality to be accepted and allowed to be presented or introduced as evidence in court. To be admissible means capable of being legally admitted or allowable or permissible as evidence or worthy of gaining entry or being admitted. This study focus on carrying out a systematic literature review and meta-analysis on Digital Evidence Admissibility. The methodology employed in this study was the querying of four academic database resources systematically and fundamentally identifying kinds of literature related to digital evidence admissibility through identification, screening, eligibility and inclusion criteria. The advantage of this study is revealing the gap and trends in digital evidence admissibility as the article published between the period of 2015 through 2018 are relative with the following variation 64%, 21% 7%, for the following respectively, IEEE, Science Direct, ACM Digital library, as well as Research Gate. While at the period under review, 2019 is yet to record publication in the field of research in Digital Evidence Admissibility. The period under review witnessed a low academic publication in the field of Digital Evidence admissibility. This research will aid in projecting future research in the aforementioned research field.
证据的可采性是指特定证据是否有资格成为案件证据的一部分。可采性是指可以接受并允许作为证据在法庭上提出或引入的性质或性质。被允许的意思是能够被合法承认或允许或允许作为证据或值得进入或被允许。本研究的重点是对数字证据可采性进行系统的文献综述和元分析。本研究采用的方法是对四种学术数据库资源进行系统查询,通过识别、筛选、资格和纳入标准,从根本上识别出与数字证据可采性相关的文献种类。本研究的优势在于揭示了数字证据可采性的差距和趋势,因为2015年至2018年期间发表的文章与以下变化相关,分别为IEEE, Science Direct, ACM数字图书馆和Research Gate。在本报告所述期间,2019年还没有在数字证据可采性研究领域发表论文。在本报告所述期间,数字证据可采性领域的学术出版物很少。这项研究将有助于预测上述研究领域的未来研究。
{"title":"A Systematic Literature Review On Digital Evidence Admissibility: Methodologies, Challenges and Research Directions","authors":"E. O. Edward, J. Ojeniyi","doi":"10.1109/ICECCO48375.2019.9043250","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043250","url":null,"abstract":"Admissibility of Evidence is the eligibility of particular pieces of evidence for inception as part of the evidence in a case. Admissibility means the character or quality to be accepted and allowed to be presented or introduced as evidence in court. To be admissible means capable of being legally admitted or allowable or permissible as evidence or worthy of gaining entry or being admitted. This study focus on carrying out a systematic literature review and meta-analysis on Digital Evidence Admissibility. The methodology employed in this study was the querying of four academic database resources systematically and fundamentally identifying kinds of literature related to digital evidence admissibility through identification, screening, eligibility and inclusion criteria. The advantage of this study is revealing the gap and trends in digital evidence admissibility as the article published between the period of 2015 through 2018 are relative with the following variation 64%, 21% 7%, for the following respectively, IEEE, Science Direct, ACM Digital library, as well as Research Gate. While at the period under review, 2019 is yet to record publication in the field of research in Digital Evidence Admissibility. The period under review witnessed a low academic publication in the field of Digital Evidence admissibility. This research will aid in projecting future research in the aforementioned research field.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127860639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stemming algorithm for Kazakh Language using rule-based approach 基于规则的哈萨克语词干提取算法
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043253
Nazerke Sultanova, K. Kozhakhmet, R. Jantayev, Azhar Botbayeva
This paper considers construction of Kazakh language words. Kazakh language is the type of Turkic languages or alternatively called – agglutinative language where words are formed by attaching the finite sequence of suffixes. Kazakh morphology investigation was the main work done in construction of rule-based stemming algorithm. Stemmer algorithm will be useful in development of sentiment analysis for Kazakh language, because of its rareness and competency. Stemming algorithm works with aim to cut ending combinations. The results checked by using Machine Learning algorithms using annotated dataset, which were retrieved from KazCorpus dataset [7].
本文研究了哈萨克语词汇的结构问题。哈萨克语是突厥语的一种,或者被称为-黏着语言,其中单词是通过附加有限序列的后缀形成的。哈萨克语形态学研究是构建基于规则的词干提取算法的主要工作。Stemmer算法的稀缺性和胜任性将有助于哈萨克语情感分析的发展。词干提取算法的目标是截断词尾组合。使用机器学习算法使用标注数据集检查结果,该数据集来自KazCorpus数据集[7]。
{"title":"Stemming algorithm for Kazakh Language using rule-based approach","authors":"Nazerke Sultanova, K. Kozhakhmet, R. Jantayev, Azhar Botbayeva","doi":"10.1109/ICECCO48375.2019.9043253","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043253","url":null,"abstract":"This paper considers construction of Kazakh language words. Kazakh language is the type of Turkic languages or alternatively called – agglutinative language where words are formed by attaching the finite sequence of suffixes. Kazakh morphology investigation was the main work done in construction of rule-based stemming algorithm. Stemmer algorithm will be useful in development of sentiment analysis for Kazakh language, because of its rareness and competency. Stemming algorithm works with aim to cut ending combinations. The results checked by using Machine Learning algorithms using annotated dataset, which were retrieved from KazCorpus dataset [7].","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"49 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Literature Review of Energy Efficient Transmission in Wireless LANs by Using Low-Power Wake-Up Radio 低功率唤醒无线电在无线局域网中节能传输的文献综述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043221
M. T. Dare, S. Zubair, Bala Alhaji Salihu, M. David, M. Abazeed
Power consumption is a key consideration in every WLAN MAC protocol design for wireless devices and extending battery life requires more efficient power management scheme considering that Carrier sensing by WLAN modules consumes enormous amount of power. Researchers over the years have proposed and implemented various schemes using a low-power Wake-up Radio for carrier sense which has proven to be effective. In this paper, a comprehensive literature review of the research progress in WuR-based energy saving is presented. This paper compares the various protocols already proposed for mitigating latency and energy consumption in WLAN networks and provides synthesis of wake-up radio (WUR) based carrier sensing approaches with analysis and discussions of merits and limitations of each technique. The operation principles of duty-cycle and wake-up radio bases MAC protocols were looked into in relation to how they affect energy efficiency and latency reduction.
功耗是每个无线设备的WLAN MAC协议设计的关键考虑因素,考虑到WLAN模块的载波传感消耗大量的功率,延长电池寿命需要更高效的电源管理方案。多年来,研究人员已经提出并实施了各种方案,使用低功耗唤醒无线电进行载波检测,这些方案已被证明是有效的。本文对基于wur的节能研究进展进行了综述。本文比较了已经提出的用于减少WLAN网络延迟和能耗的各种协议,并综合了基于唤醒无线电(WUR)的载波传感方法,分析和讨论了每种技术的优点和局限性。研究了占空比和唤醒无线电基MAC协议的工作原理,以及它们如何影响能源效率和降低延迟。
{"title":"Literature Review of Energy Efficient Transmission in Wireless LANs by Using Low-Power Wake-Up Radio","authors":"M. T. Dare, S. Zubair, Bala Alhaji Salihu, M. David, M. Abazeed","doi":"10.1109/ICECCO48375.2019.9043221","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043221","url":null,"abstract":"Power consumption is a key consideration in every WLAN MAC protocol design for wireless devices and extending battery life requires more efficient power management scheme considering that Carrier sensing by WLAN modules consumes enormous amount of power. Researchers over the years have proposed and implemented various schemes using a low-power Wake-up Radio for carrier sense which has proven to be effective. In this paper, a comprehensive literature review of the research progress in WuR-based energy saving is presented. This paper compares the various protocols already proposed for mitigating latency and energy consumption in WLAN networks and provides synthesis of wake-up radio (WUR) based carrier sensing approaches with analysis and discussions of merits and limitations of each technique. The operation principles of duty-cycle and wake-up radio bases MAC protocols were looked into in relation to how they affect energy efficiency and latency reduction.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127415647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 15th International Conference on Electronics, Computer and Computation (ICECCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1