首页 > 最新文献

2019 15th International Conference on Electronics, Computer and Computation (ICECCO)最新文献

英文 中文
Enhanced Decision Tree-J48 With SMOTE Machine Learning Algorithm for Effective Botnet Detection in Imbalance Dataset 基于SMOTE机器学习算法的增强决策树- j48在不平衡数据集中的有效僵尸网络检测
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043233
Ilyas Adeleke Jimoh, I. Ismaila, M. Olalere
Botnet is one of the major security threats in the field of information technology today (IT). The increase in the rate of attack on industrial IT infrastructures, theft of personal data and attacks on financial information is becoming critical. Majority of available dataset for botnet detection are very old and may not be able to stand the present reality in this research area. One of the latest dataset from Canadian Institute of Cyber Security labeled “CICIDS2017” was noted as an imbalance data distribution ratio of 99% to 1%. This distribution represents majority to minority class ratio. This may pose a challenge of over-fitting in majority class to the research and create a bias in the analysis of results. This research work has adopted J48 decision tree machine learning algorithm with application of SMOTE technique in solving the problem of imbalance dataset, thereby leading to an improved detection of botnets. The accuracy of the highest scenario was 99.95%. This is a significant improvement in detection rate compare to the previous research work.
僵尸网络是当今信息技术领域的主要安全威胁之一。针对工业IT基础设施的攻击、个人数据盗窃和金融信息攻击的增加正变得越来越重要。大多数可用的僵尸网络检测数据都非常陈旧,可能无法满足当前研究领域的实际情况。加拿大网络安全研究所的最新数据集“CICIDS2017”指出,数据分布比例不平衡,为99%:1%。这个分布代表了多数班级与少数班级的比例。这可能会对大多数班级的研究提出过度拟合的挑战,并在结果分析中产生偏差。本研究采用J48决策树机器学习算法,应用SMOTE技术解决数据集不平衡问题,从而提高了对僵尸网络的检测。最高情景的准确率为99.95%。这与以往的研究工作相比,在检出率上有了显著的提高。
{"title":"Enhanced Decision Tree-J48 With SMOTE Machine Learning Algorithm for Effective Botnet Detection in Imbalance Dataset","authors":"Ilyas Adeleke Jimoh, I. Ismaila, M. Olalere","doi":"10.1109/ICECCO48375.2019.9043233","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043233","url":null,"abstract":"Botnet is one of the major security threats in the field of information technology today (IT). The increase in the rate of attack on industrial IT infrastructures, theft of personal data and attacks on financial information is becoming critical. Majority of available dataset for botnet detection are very old and may not be able to stand the present reality in this research area. One of the latest dataset from Canadian Institute of Cyber Security labeled “CICIDS2017” was noted as an imbalance data distribution ratio of 99% to 1%. This distribution represents majority to minority class ratio. This may pose a challenge of over-fitting in majority class to the research and create a bias in the analysis of results. This research work has adopted J48 decision tree machine learning algorithm with application of SMOTE technique in solving the problem of imbalance dataset, thereby leading to an improved detection of botnets. The accuracy of the highest scenario was 99.95%. This is a significant improvement in detection rate compare to the previous research work.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Fuel Cell technology approach to generate electricity using air-conditioner water 一种利用空调水发电的燃料电池技术
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043268
E. A. Aja, Sadiq Thomas, Oluwatomisin E. Aina, I. D. Inuwa, B. Saka, Y. S. Mohammed
The fuel cell technology has wide range of applications, such as seen in the driving of electric cars and powering of electrical appliances. This paper describes how water an end product from air-conditioner is passed through different chambers which houses the machines that will harness the hydrogen gas into its tank and subsequently used to generate electricity for household appliances. The process involves three phases which are the air-conditioner phase, the chambers phase and the house phase. With the right connection as described by this paper, electricity would be generated for the household electrical appliances thereby reducing dependency on the nominal power from the grid. This technology is an alternative way of generating power for our everyday use, free from atmospheric toxics and ozone friendly.
燃料电池技术具有广泛的应用,如在电动汽车的驱动和电器的动力。本文描述了空调的最终产品水如何通过不同的腔室,这些腔室容纳了机器,这些机器将利用氢气进入其水箱,随后用于为家用电器发电。这个过程包括三个阶段,即空调阶段,房间阶段和房屋阶段。通过本文所描述的正确连接,将为家用电器产生电力,从而减少对电网标称功率的依赖。这项技术是我们日常使用的另一种发电方式,没有大气有毒物质,对臭氧无害。
{"title":"A Fuel Cell technology approach to generate electricity using air-conditioner water","authors":"E. A. Aja, Sadiq Thomas, Oluwatomisin E. Aina, I. D. Inuwa, B. Saka, Y. S. Mohammed","doi":"10.1109/ICECCO48375.2019.9043268","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043268","url":null,"abstract":"The fuel cell technology has wide range of applications, such as seen in the driving of electric cars and powering of electrical appliances. This paper describes how water an end product from air-conditioner is passed through different chambers which houses the machines that will harness the hydrogen gas into its tank and subsequently used to generate electricity for household appliances. The process involves three phases which are the air-conditioner phase, the chambers phase and the house phase. With the right connection as described by this paper, electricity would be generated for the household electrical appliances thereby reducing dependency on the nominal power from the grid. This technology is an alternative way of generating power for our everyday use, free from atmospheric toxics and ozone friendly.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123516692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning for Image-based Cervical Cancer Detection and Diagnosis — A Survey 基于图像的深度学习宫颈癌检测与诊断研究综述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043220
Oluwatomisin E. Aina, Steve A. Adeshina, A. Aibinu
Cervical cancer is the fourth most common type of cancer found in females with a record of 570,000 incidences and 311,000 deaths in the year 2018 worldwide. It is caused by a virus known as Human Papilloma Virus (HPV). Screening if done early can reduce this prevalence. However, manual screening methods are not efficient in the detection of cervical cancer as a result of some factors. This, however, results in misdiagnosis and over-treatment. Therefore, researchers proposed screening cervical automatically by using traditional and deep learning techniques. This paper aims to review past work that has been done particularly in the deep learning domain and discusses future directions in the automated detection of cervical cancer. It is believed that this will ensure proper diagnosis and could potentially reduce the prevalence of cervical cancer.
宫颈癌是女性中第四大最常见的癌症类型,2018年全球有57万例发病率和31.1万例死亡。它是由一种叫做人类乳头瘤病毒(HPV)的病毒引起的。如果及早进行筛查,可以降低这种发病率。然而,由于某些因素的影响,人工筛查方法在检测子宫颈癌方面并不有效。然而,这导致误诊和过度治疗。因此,研究人员提出了结合传统和深度学习技术进行宫颈自动筛查。本文旨在回顾过去在深度学习领域所做的工作,并讨论宫颈癌自动检测的未来方向。据信,这将确保正确的诊断,并可能潜在地减少宫颈癌的患病率。
{"title":"Deep Learning for Image-based Cervical Cancer Detection and Diagnosis — A Survey","authors":"Oluwatomisin E. Aina, Steve A. Adeshina, A. Aibinu","doi":"10.1109/ICECCO48375.2019.9043220","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043220","url":null,"abstract":"Cervical cancer is the fourth most common type of cancer found in females with a record of 570,000 incidences and 311,000 deaths in the year 2018 worldwide. It is caused by a virus known as Human Papilloma Virus (HPV). Screening if done early can reduce this prevalence. However, manual screening methods are not efficient in the detection of cervical cancer as a result of some factors. This, however, results in misdiagnosis and over-treatment. Therefore, researchers proposed screening cervical automatically by using traditional and deep learning techniques. This paper aims to review past work that has been done particularly in the deep learning domain and discusses future directions in the automated detection of cervical cancer. It is believed that this will ensure proper diagnosis and could potentially reduce the prevalence of cervical cancer.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique 使用组合静态规则和基于机器学习的技术减轻高级持续性威胁
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043278
Oluwasegun Adelaiye, A. Ajibola
Advanced Persistent Threat is a targeted attack method used to maintain undetected unauthorized access over an extended period to exfiltrate valuable data. The inability of traditional methods in mitigating this attack is a major problem, which poses huge threats to organizations. This paper proposes the combined use of pattern recognition and machine learning based techniques in militating the attack. Using basic statistical test approach, a dataset containing 1,047,908 PCAP instances is analyzed and results show patterns exist in identifying between malicious data traffic and normal data traffic. The machine learning on the other hand, is evaluated using three algorithms successfully: KNN, Decision Tree and Random Forest. All algorithms showed very high accuracies in correctly classifying the data traffic. Using the algorithm with the highest accuracy, Random Forest is optimized for better effectiveness.
高级持续威胁是一种有针对性的攻击方法,用于在很长一段时间内保持未被发现的未经授权的访问,以泄露有价值的数据。传统方法无法减轻这种攻击是一个主要问题,这给组织带来了巨大的威胁。本文提出结合使用模式识别和基于机器学习的技术来防御攻击。使用基本的统计测试方法,对包含1,047,908个PCAP实例的数据集进行了分析,结果显示在识别恶意数据流量和正常数据流量之间存在模式。另一方面,机器学习成功地使用三种算法进行评估:KNN,决策树和随机森林。所有算法在正确分类数据流量方面都显示出很高的准确率。使用具有最高精度的算法,随机森林得到了更好的优化效果。
{"title":"Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique","authors":"Oluwasegun Adelaiye, A. Ajibola","doi":"10.1109/ICECCO48375.2019.9043278","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043278","url":null,"abstract":"Advanced Persistent Threat is a targeted attack method used to maintain undetected unauthorized access over an extended period to exfiltrate valuable data. The inability of traditional methods in mitigating this attack is a major problem, which poses huge threats to organizations. This paper proposes the combined use of pattern recognition and machine learning based techniques in militating the attack. Using basic statistical test approach, a dataset containing 1,047,908 PCAP instances is analyzed and results show patterns exist in identifying between malicious data traffic and normal data traffic. The machine learning on the other hand, is evaluated using three algorithms successfully: KNN, Decision Tree and Random Forest. All algorithms showed very high accuracies in correctly classifying the data traffic. Using the algorithm with the highest accuracy, Random Forest is optimized for better effectiveness.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of handwritten names of cities using various deep learning models 使用各种深度学习模型对手写城市名称进行分类
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043266
Nurseitov Daniyar, B. Kairat, Kanatov Maksat, Alimova Anel
The digitized text of handwriting would conduce to automate the business processes of many companies, simplifying the work of human being. For example, our state postal service does not have an automated mail processing system that recognizes handwritten addresses on an envelope. Each incoming correspondence is registered in the system by the operator. Automation of this business process on registering post mailing will significantly reduce expenses of postal service on mail delivery.There are two main approaches to handwriting recognition, namely hidden Markov models (HMM) and artificial neural networks (ANN). The methods proposed in this article are based on ANN. The first model is based on deep convolutional neural networks (DCNN) [1] for feature extraction and a fully connected multilayer perceptron (fully connected MLP) for word classification. The next model under consideration, called SimpleHTR, proposed by Harald Scheidl [2], has layers of a convolutional neural network (CNN) and layers of a recurrent neural network (RNN) for disseminating information through an image. Finally, the Connectionist Temporal Classification (CTC) decoding algorithm is executed, which adduces the text to the final version.Models were learned on the dataset of handwritten city names from Cyrillic words. 21,000 images were collected (42 classes of 500 handwriting samples). To increase the data set for training, 207,438 images from available samples were generated.As a result, two approaches for handwriting recognition were analyzed and the SimpleHTR model showed the best results over all.
数字化的手写文本将有助于许多公司的业务流程自动化,简化人类的工作。例如,我们国家的邮政服务没有一个自动邮件处理系统来识别信封上手写的地址。每个传入的通信都由接线员在系统中登记。自动登记邮寄业务,可大大减少邮政服务的邮件派递费用。手写识别主要有两种方法,隐马尔可夫模型(HMM)和人工神经网络(ANN)。本文提出的方法是基于人工神经网络的。第一个模型基于深度卷积神经网络(DCNN)[1]进行特征提取,并基于全连接多层感知器(fully connected MLP)进行词分类。下一个正在考虑的模型,称为SimpleHTR,由Harald Scheidl b[2]提出,具有卷积神经网络(CNN)层和递归神经网络(RNN)层,用于通过图像传播信息。最后,执行连接时态分类(CTC)解码算法,将文本引到最终版本。模型是在来自西里尔字母的手写城市名称数据集上学习的。收集了21,000张图像(42类500个笔迹样本)。为了增加训练数据集,从可用样本中生成了207,438张图像。结果,分析了两种手写识别方法,SimpleHTR模型总体上显示出最好的结果。
{"title":"Classification of handwritten names of cities using various deep learning models","authors":"Nurseitov Daniyar, B. Kairat, Kanatov Maksat, Alimova Anel","doi":"10.1109/ICECCO48375.2019.9043266","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043266","url":null,"abstract":"The digitized text of handwriting would conduce to automate the business processes of many companies, simplifying the work of human being. For example, our state postal service does not have an automated mail processing system that recognizes handwritten addresses on an envelope. Each incoming correspondence is registered in the system by the operator. Automation of this business process on registering post mailing will significantly reduce expenses of postal service on mail delivery.There are two main approaches to handwriting recognition, namely hidden Markov models (HMM) and artificial neural networks (ANN). The methods proposed in this article are based on ANN. The first model is based on deep convolutional neural networks (DCNN) [1] for feature extraction and a fully connected multilayer perceptron (fully connected MLP) for word classification. The next model under consideration, called SimpleHTR, proposed by Harald Scheidl [2], has layers of a convolutional neural network (CNN) and layers of a recurrent neural network (RNN) for disseminating information through an image. Finally, the Connectionist Temporal Classification (CTC) decoding algorithm is executed, which adduces the text to the final version.Models were learned on the dataset of handwritten city names from Cyrillic words. 21,000 images were collected (42 classes of 500 handwriting samples). To increase the data set for training, 207,438 images from available samples were generated.As a result, two approaches for handwriting recognition were analyzed and the SimpleHTR model showed the best results over all.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123893400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Perspectives of Integration QR Codes and RFID readers in large-scale events controlled by HRM systems 在人力资源管理系统控制的大型事件中整合QR码和RFID阅读器的观点
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043285
N. Ibragimov, Alina Amangeldiyeva
There is an increasing trend in the application of integrated Quick Response(QR) and RFID technologies to large-scale events. QR codes and RFID readers containing logs data were introduced into an international computer project competition organized for students in the university. This paper aims to discover the perspectives of Integrated Technologies, which has been created and show how this integration affects to optimization and efficiency of the processes. The presented study is based on the application of the Human Resource Management System for the education sector(e-HRMS), a centralized platform that powers and manages the structure of international competitions. The study findings reveal that the integration of ICT technologies positively affects optimization and process management in the education sector. Moreover, the most important parameter that affects both technologies has been found and checked clearly.
综合快速响应(QR)和射频识别(RFID)技术在大型活动中的应用有越来越大的趋势。在大学为学生组织的国际计算机项目竞赛中引入了包含日志数据的QR码和RFID读取器。本文旨在发现集成技术的观点,它已经创建,并显示如何影响集成的优化和效率的过程。本研究基于教育部门人力资源管理系统(e-HRMS)的应用,这是一个集中的平台,为国际竞争的结构提供动力和管理。研究发现,ICT技术的整合对教育部门的优化和流程管理产生了积极的影响。此外,还找到了影响两种技术的最重要的参数,并对其进行了明确的检查。
{"title":"Perspectives of Integration QR Codes and RFID readers in large-scale events controlled by HRM systems","authors":"N. Ibragimov, Alina Amangeldiyeva","doi":"10.1109/ICECCO48375.2019.9043285","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043285","url":null,"abstract":"There is an increasing trend in the application of integrated Quick Response(QR) and RFID technologies to large-scale events. QR codes and RFID readers containing logs data were introduced into an international computer project competition organized for students in the university. This paper aims to discover the perspectives of Integrated Technologies, which has been created and show how this integration affects to optimization and efficiency of the processes. The presented study is based on the application of the Human Resource Management System for the education sector(e-HRMS), a centralized platform that powers and manages the structure of international competitions. The study findings reveal that the integration of ICT technologies positively affects optimization and process management in the education sector. Moreover, the most important parameter that affects both technologies has been found and checked clearly.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ANDROID APPLICATIONS MALWARE DETECTION: A Comparative Analysis of some Classification Algorithms ANDROID应用恶意软件检测:几种分类算法的比较分析
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043284
Oluwaseyi Olorunshola, Ayanfeoluwa Oluyomi
The usage of the Android Operating System (OS) has surpassed all other operating systems and as a result, it has become the primary target of attackers. Many attacks can be geared towards Android phones mainly using application installation. These third-party applications first seek permission from the user before installation. Some of the permissions can be elusive evading the users’ attention. With the type of harm that can be done which include illegal extraction and transfer of the users’ data, spying on the users and so on there is a need to have a heuristic approach in the detection of malware. In this research work, some classification algorithms were tested to determine the best performing algorithm when it comes to the detection of android malware detection. An android application dataset was obtained from figshare and used in the Waikato Environment for Knowledge Analysis (WEKA) for training and testing, it was measured under accuracy, false-positive rate, precision, recall, f-measure, Receiver Operating Curve (ROC) and Root Mean Square Error (RMSE). It was discovered that multi-layer perceptron performs best with an accuracy of 99.4%.
安卓操作系统(Android Operating System, OS)的使用率已经超过了其他所有操作系统,因此成为了攻击者的首要目标。许多针对Android手机的攻击主要是利用应用程序安装。这些第三方应用程序在安装前首先需要获得用户的许可。有些权限可能是难以捉摸的,逃避了用户的注意。由于可能造成的危害类型包括非法提取和传输用户数据,监视用户等,因此需要采用启发式方法来检测恶意软件。在本研究工作中,对一些分类算法进行了测试,以确定在检测android恶意软件时表现最好的算法。从figshare获取android应用程序数据集,在Waikato Environment for Knowledge Analysis (WEKA)中进行训练和测试,测量准确率、假阳性率、准确率、召回率、f-measure、受试者工作曲线(ROC)和均方根误差(RMSE)。结果表明,多层感知器的准确率最高,达到99.4%。
{"title":"ANDROID APPLICATIONS MALWARE DETECTION: A Comparative Analysis of some Classification Algorithms","authors":"Oluwaseyi Olorunshola, Ayanfeoluwa Oluyomi","doi":"10.1109/ICECCO48375.2019.9043284","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043284","url":null,"abstract":"The usage of the Android Operating System (OS) has surpassed all other operating systems and as a result, it has become the primary target of attackers. Many attacks can be geared towards Android phones mainly using application installation. These third-party applications first seek permission from the user before installation. Some of the permissions can be elusive evading the users’ attention. With the type of harm that can be done which include illegal extraction and transfer of the users’ data, spying on the users and so on there is a need to have a heuristic approach in the detection of malware. In this research work, some classification algorithms were tested to determine the best performing algorithm when it comes to the detection of android malware detection. An android application dataset was obtained from figshare and used in the Waikato Environment for Knowledge Analysis (WEKA) for training and testing, it was measured under accuracy, false-positive rate, precision, recall, f-measure, Receiver Operating Curve (ROC) and Root Mean Square Error (RMSE). It was discovered that multi-layer perceptron performs best with an accuracy of 99.4%.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121343085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improvement Of Gravity Light Generation Modeling Using Bond Graph Method 基于键合图法的重力光生成建模改进
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043217
Sadiq M. Bammami, E. Okafor, S. Hussein, M. Bammami, Sadiq Thomas, Omotayo Oshiga
this research is aimed at modeling and performing structural analysis on Gravity light system using bond graph method in order to improve its performance. To achieve the bond graph model of the gravity light system, the various subsystems, storage elements, junction structures, transformer elements with appropriate causality assignments and energy exchange that make up the gravity light system were identified and modeled. In the developed model, the effect of friction was considered. 20-Sim software was used to validate the developed bond graph model. The structural design and analysis of the system carried out shows that, it is not just another renewable energy generating source but one that improves greatly, the exiting gravity light system by extended operational time of 40 minutes and higher efficiency of over 80%. Hence, it meets all requirements for the application of renewable energy sources, and technically viable for construction and further developments.
本研究旨在利用键合图方法对重力光系统进行建模和结构分析,以提高其性能。为实现重力灯系统的键图模型,对构成重力灯系统的各个子系统、存储元件、结结构、具有适当因果关系分配的变压器元件和能量交换进行了识别和建模。在所建立的模型中,考虑了摩擦的影响。利用20-Sim软件对建立的键合图模型进行验证。系统的结构设计和分析表明,它不仅是另一种可再生能源发电,而且大大改进了现有的重力灯系统,延长了40分钟的运行时间,提高了80%以上的效率。因此,它符合可再生能源应用的所有要求,在技术上是可行的,可用于建设和进一步开发。
{"title":"Improvement Of Gravity Light Generation Modeling Using Bond Graph Method","authors":"Sadiq M. Bammami, E. Okafor, S. Hussein, M. Bammami, Sadiq Thomas, Omotayo Oshiga","doi":"10.1109/ICECCO48375.2019.9043217","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043217","url":null,"abstract":"this research is aimed at modeling and performing structural analysis on Gravity light system using bond graph method in order to improve its performance. To achieve the bond graph model of the gravity light system, the various subsystems, storage elements, junction structures, transformer elements with appropriate causality assignments and energy exchange that make up the gravity light system were identified and modeled. In the developed model, the effect of friction was considered. 20-Sim software was used to validate the developed bond graph model. The structural design and analysis of the system carried out shows that, it is not just another renewable energy generating source but one that improves greatly, the exiting gravity light system by extended operational time of 40 minutes and higher efficiency of over 80%. Hence, it meets all requirements for the application of renewable energy sources, and technically viable for construction and further developments.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Digital Interactive Course Material on Automated Management System Moodle for Integral Equations Course “积分方程”课程自动化管理系统模型之数位互动教材开发
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043240
Isa Muslu, Moussa Mahamat Boukar, O. Gurbuz
Integral equations arises in many physical applications like potential theory and Dirichlet problems, electrostatics, mathematical problems of radiation equilibrium, the particle transport problems of astrophysics and radiation heat problems etc. Integral equations course is one of the main courses in engineering faculties. The aim of this work is to develop an interactive digital learning material, a question bank using Wildcards, on an automation management system Moodle. To create the digital material Wildcard technology of the Moodle is used.
积分方程出现在许多物理应用中,如势理论和狄利克雷问题、静电学、辐射平衡数学问题、天体物理学中的粒子输运问题和辐射热问题等。积分方程课程是工科院校的主干课程之一。这项工作的目的是在自动化管理系统Moodle上开发一个交互式数字学习材料,一个使用通配符的题库。为了创建数字材料,使用Moodle的通配符技术。
{"title":"Developing a Digital Interactive Course Material on Automated Management System Moodle for Integral Equations Course","authors":"Isa Muslu, Moussa Mahamat Boukar, O. Gurbuz","doi":"10.1109/ICECCO48375.2019.9043240","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043240","url":null,"abstract":"Integral equations arises in many physical applications like potential theory and Dirichlet problems, electrostatics, mathematical problems of radiation equilibrium, the particle transport problems of astrophysics and radiation heat problems etc. Integral equations course is one of the main courses in engineering faculties. The aim of this work is to develop an interactive digital learning material, a question bank using Wildcards, on an automation management system Moodle. To create the digital material Wildcard technology of the Moodle is used.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation into Peer-to-Peer Network Security Using Wireshark 基于Wireshark的点对点网络安全研究
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043236
A. Musa, A. Abubakar, Usman Abdul Gimba, Rasheed Abubakar Rasheed
Peer-to-peer networks’ ability to be used as the primary vector of delivery in a highly sensitive environment poses many dangers. The impacts of the hazards on security can be measured when using peer-to-peer networks in a standard computing environment. The transfer of data across multiple network data-centers exposes the system to a potential insider threat, remote control, and the possible leak of private and confidential information. In this paper, we present an analysis of peer-to-peer network security. This follows a description of existing techniques to prevent potential threats to peer-to-peer networks and finally the paper presents a proposed technique to enhance the security of peer-to-peer networks using simulation based experimental study.
在高度敏感的环境中,点对点网络作为主要传递媒介的能力带来了许多危险。当在标准计算环境中使用对等网络时,可以测量危害对安全性的影响。跨多个网络数据中心传输数据会使系统暴露于潜在的内部威胁、远程控制以及可能泄露的私人和机密信息。在本文中,我们对点对点网络的安全性进行了分析。接下来是对现有技术的描述,以防止潜在的威胁点对点网络,最后提出了一种建议的技术,以提高点对点网络的安全性,使用基于仿真的实验研究。
{"title":"An Investigation into Peer-to-Peer Network Security Using Wireshark","authors":"A. Musa, A. Abubakar, Usman Abdul Gimba, Rasheed Abubakar Rasheed","doi":"10.1109/ICECCO48375.2019.9043236","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043236","url":null,"abstract":"Peer-to-peer networks’ ability to be used as the primary vector of delivery in a highly sensitive environment poses many dangers. The impacts of the hazards on security can be measured when using peer-to-peer networks in a standard computing environment. The transfer of data across multiple network data-centers exposes the system to a potential insider threat, remote control, and the possible leak of private and confidential information. In this paper, we present an analysis of peer-to-peer network security. This follows a description of existing techniques to prevent potential threats to peer-to-peer networks and finally the paper presents a proposed technique to enhance the security of peer-to-peer networks using simulation based experimental study.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 15th International Conference on Electronics, Computer and Computation (ICECCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1