首页 > 最新文献

2019 15th International Conference on Electronics, Computer and Computation (ICECCO)最新文献

英文 中文
Integrating Strategic Information Systems Planning into Nigerian Security Agencies 将战略信息系统规划整合到尼日利亚安全机构
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043227
N. A. Umar, Jamilu Awwalu
Strategic Information Systems Planning (SISP) as a means for technology optimization plays important role along with Information system as the key player. Security information as the major resource for Information Systems is produced from the massive data collected by security agencies on daily basis. While other countries continuously strive to be several steps ahead of crime and their perpetrators, map out crime pattern, and implement efficient security personnel allocation by mining the voluminous data from their Information Systems (IS) as a means of achieving their organization goals, the absence of both hard and soft working infrastructure that can serve the purpose of collecting adequate data further complicates matters for Nigerian security agencies. These different security challenges can be identified and linked with strategic planning, obsolete computing resources, Information Systems features, data collection and Information Systems adoption. This study targets the audience of the top decision makers and managers of Nigerian security agencies by provides a framework for integrating SISP into security agencies. This is in order to facilitate the achievement security agencies organizational goals and make them benefit from a functional IS and put them on track to catching up with their counterparts around the world within the shortest possible time.
战略信息系统规划(SISP)作为一种技术优化的手段,与信息系统一起发挥着重要的作用。安全信息是信息系统的主要资源,是由安全机构日常收集的海量数据产生的。虽然其他国家不断努力在犯罪及其肇事者之前走几步,绘制犯罪模式,并通过从其信息系统(IS)中挖掘大量数据来实现有效的安全人员分配,作为实现其组织目标的一种手段,但缺乏能够收集足够数据的硬件和软件工作基础设施,这使尼日利亚安全机构的问题进一步复杂化。这些不同的安全挑战可以通过战略规划、过时的计算资源、信息系统功能、数据收集和信息系统采用来识别和联系起来。本研究的目标受众是尼日利亚安全机构的高层决策者和管理者,为将SISP整合到安全机构提供了一个框架。这是为了促进实现安全机构的组织目标,使他们从一个功能性的信息系统中受益,并使他们在最短的时间内赶上世界各地的同行。
{"title":"Integrating Strategic Information Systems Planning into Nigerian Security Agencies","authors":"N. A. Umar, Jamilu Awwalu","doi":"10.1109/ICECCO48375.2019.9043227","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043227","url":null,"abstract":"Strategic Information Systems Planning (SISP) as a means for technology optimization plays important role along with Information system as the key player. Security information as the major resource for Information Systems is produced from the massive data collected by security agencies on daily basis. While other countries continuously strive to be several steps ahead of crime and their perpetrators, map out crime pattern, and implement efficient security personnel allocation by mining the voluminous data from their Information Systems (IS) as a means of achieving their organization goals, the absence of both hard and soft working infrastructure that can serve the purpose of collecting adequate data further complicates matters for Nigerian security agencies. These different security challenges can be identified and linked with strategic planning, obsolete computing resources, Information Systems features, data collection and Information Systems adoption. This study targets the audience of the top decision makers and managers of Nigerian security agencies by provides a framework for integrating SISP into security agencies. This is in order to facilitate the achievement security agencies organizational goals and make them benefit from a functional IS and put them on track to catching up with their counterparts around the world within the shortest possible time.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Digital Interactive Course Material on Automated Management System Moodle for Integral Equations Course “积分方程”课程自动化管理系统模型之数位互动教材开发
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043240
Isa Muslu, Moussa Mahamat Boukar, O. Gurbuz
Integral equations arises in many physical applications like potential theory and Dirichlet problems, electrostatics, mathematical problems of radiation equilibrium, the particle transport problems of astrophysics and radiation heat problems etc. Integral equations course is one of the main courses in engineering faculties. The aim of this work is to develop an interactive digital learning material, a question bank using Wildcards, on an automation management system Moodle. To create the digital material Wildcard technology of the Moodle is used.
积分方程出现在许多物理应用中,如势理论和狄利克雷问题、静电学、辐射平衡数学问题、天体物理学中的粒子输运问题和辐射热问题等。积分方程课程是工科院校的主干课程之一。这项工作的目的是在自动化管理系统Moodle上开发一个交互式数字学习材料,一个使用通配符的题库。为了创建数字材料,使用Moodle的通配符技术。
{"title":"Developing a Digital Interactive Course Material on Automated Management System Moodle for Integral Equations Course","authors":"Isa Muslu, Moussa Mahamat Boukar, O. Gurbuz","doi":"10.1109/ICECCO48375.2019.9043240","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043240","url":null,"abstract":"Integral equations arises in many physical applications like potential theory and Dirichlet problems, electrostatics, mathematical problems of radiation equilibrium, the particle transport problems of astrophysics and radiation heat problems etc. Integral equations course is one of the main courses in engineering faculties. The aim of this work is to develop an interactive digital learning material, a question bank using Wildcards, on an automation management system Moodle. To create the digital material Wildcard technology of the Moodle is used.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perspectives of Integration QR Codes and RFID readers in large-scale events controlled by HRM systems 在人力资源管理系统控制的大型事件中整合QR码和RFID阅读器的观点
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043285
N. Ibragimov, Alina Amangeldiyeva
There is an increasing trend in the application of integrated Quick Response(QR) and RFID technologies to large-scale events. QR codes and RFID readers containing logs data were introduced into an international computer project competition organized for students in the university. This paper aims to discover the perspectives of Integrated Technologies, which has been created and show how this integration affects to optimization and efficiency of the processes. The presented study is based on the application of the Human Resource Management System for the education sector(e-HRMS), a centralized platform that powers and manages the structure of international competitions. The study findings reveal that the integration of ICT technologies positively affects optimization and process management in the education sector. Moreover, the most important parameter that affects both technologies has been found and checked clearly.
综合快速响应(QR)和射频识别(RFID)技术在大型活动中的应用有越来越大的趋势。在大学为学生组织的国际计算机项目竞赛中引入了包含日志数据的QR码和RFID读取器。本文旨在发现集成技术的观点,它已经创建,并显示如何影响集成的优化和效率的过程。本研究基于教育部门人力资源管理系统(e-HRMS)的应用,这是一个集中的平台,为国际竞争的结构提供动力和管理。研究发现,ICT技术的整合对教育部门的优化和流程管理产生了积极的影响。此外,还找到了影响两种技术的最重要的参数,并对其进行了明确的检查。
{"title":"Perspectives of Integration QR Codes and RFID readers in large-scale events controlled by HRM systems","authors":"N. Ibragimov, Alina Amangeldiyeva","doi":"10.1109/ICECCO48375.2019.9043285","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043285","url":null,"abstract":"There is an increasing trend in the application of integrated Quick Response(QR) and RFID technologies to large-scale events. QR codes and RFID readers containing logs data were introduced into an international computer project competition organized for students in the university. This paper aims to discover the perspectives of Integrated Technologies, which has been created and show how this integration affects to optimization and efficiency of the processes. The presented study is based on the application of the Human Resource Management System for the education sector(e-HRMS), a centralized platform that powers and manages the structure of international competitions. The study findings reveal that the integration of ICT technologies positively affects optimization and process management in the education sector. Moreover, the most important parameter that affects both technologies has been found and checked clearly.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of a Plastic Waste Sorting System 塑料废物分类系统的设计及实施
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043197
Umaina Muhammad Ibrahim, Steve A. Adeshina, Sadiq Thomas, A. Obadiah, S. Hussein, Oluwatomisin E. Aina
Since its development in the 1950s, plastic has been in great demand and is used daily everywhere in the world. With its success came a lot of problems faced globally in the form of plastic pollution. This pollution stems from improper disposal of plastic wastes which can be solved via effective disposal, recycling and reuse of plastics [1]. Hence, the design and implementation of a plastic waste sorting system. The designed project will be used in plastic recycling and waste management industries. It consists of a rotating container which houses two sensors (color and weight sensor) for efficient sorting of the plastic wastes. The overall system’s efficiency is 73% and the system’s performance was satisfactory.
自20世纪50年代发展以来,塑料的需求量很大,在世界各地每天都在使用。它的成功带来了许多全球面临的塑料污染问题。这种污染源于塑料垃圾的处理不当,可以通过对塑料进行有效的处理、回收和再利用来解决[1]。因此,设计和实施塑料废物分类系统。设计的项目将用于塑料回收和废物管理行业。它由一个旋转容器组成,其中装有两个传感器(颜色和重量传感器),用于有效分类塑料废物。系统总体效率为73%,系统性能令人满意。
{"title":"Design and Implementation of a Plastic Waste Sorting System","authors":"Umaina Muhammad Ibrahim, Steve A. Adeshina, Sadiq Thomas, A. Obadiah, S. Hussein, Oluwatomisin E. Aina","doi":"10.1109/ICECCO48375.2019.9043197","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043197","url":null,"abstract":"Since its development in the 1950s, plastic has been in great demand and is used daily everywhere in the world. With its success came a lot of problems faced globally in the form of plastic pollution. This pollution stems from improper disposal of plastic wastes which can be solved via effective disposal, recycling and reuse of plastics [1]. Hence, the design and implementation of a plastic waste sorting system. The designed project will be used in plastic recycling and waste management industries. It consists of a rotating container which houses two sensors (color and weight sensor) for efficient sorting of the plastic wastes. The overall system’s efficiency is 73% and the system’s performance was satisfactory.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129988819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement Of Gravity Light Generation Modeling Using Bond Graph Method 基于键合图法的重力光生成建模改进
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043217
Sadiq M. Bammami, E. Okafor, S. Hussein, M. Bammami, Sadiq Thomas, Omotayo Oshiga
this research is aimed at modeling and performing structural analysis on Gravity light system using bond graph method in order to improve its performance. To achieve the bond graph model of the gravity light system, the various subsystems, storage elements, junction structures, transformer elements with appropriate causality assignments and energy exchange that make up the gravity light system were identified and modeled. In the developed model, the effect of friction was considered. 20-Sim software was used to validate the developed bond graph model. The structural design and analysis of the system carried out shows that, it is not just another renewable energy generating source but one that improves greatly, the exiting gravity light system by extended operational time of 40 minutes and higher efficiency of over 80%. Hence, it meets all requirements for the application of renewable energy sources, and technically viable for construction and further developments.
本研究旨在利用键合图方法对重力光系统进行建模和结构分析,以提高其性能。为实现重力灯系统的键图模型,对构成重力灯系统的各个子系统、存储元件、结结构、具有适当因果关系分配的变压器元件和能量交换进行了识别和建模。在所建立的模型中,考虑了摩擦的影响。利用20-Sim软件对建立的键合图模型进行验证。系统的结构设计和分析表明,它不仅是另一种可再生能源发电,而且大大改进了现有的重力灯系统,延长了40分钟的运行时间,提高了80%以上的效率。因此,它符合可再生能源应用的所有要求,在技术上是可行的,可用于建设和进一步开发。
{"title":"Improvement Of Gravity Light Generation Modeling Using Bond Graph Method","authors":"Sadiq M. Bammami, E. Okafor, S. Hussein, M. Bammami, Sadiq Thomas, Omotayo Oshiga","doi":"10.1109/ICECCO48375.2019.9043217","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043217","url":null,"abstract":"this research is aimed at modeling and performing structural analysis on Gravity light system using bond graph method in order to improve its performance. To achieve the bond graph model of the gravity light system, the various subsystems, storage elements, junction structures, transformer elements with appropriate causality assignments and energy exchange that make up the gravity light system were identified and modeled. In the developed model, the effect of friction was considered. 20-Sim software was used to validate the developed bond graph model. The structural design and analysis of the system carried out shows that, it is not just another renewable energy generating source but one that improves greatly, the exiting gravity light system by extended operational time of 40 minutes and higher efficiency of over 80%. Hence, it meets all requirements for the application of renewable energy sources, and technically viable for construction and further developments.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Multipulse Amplitude and Position Modulation for Optical Wireless Communication System 光无线通信系统的混合多脉冲幅度和位置调制
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043213
S. Idris, Jaafaru Sanusi, H. Selmy, A. Aibinu
This paper presents a Hybrid Multipulse Amplitude and Position Modulation (H-MPAPM) scheme for Optical Wireless Communication (OWC) system. H-MPAPM is a combined version of the Pulse Amplitude Modulation (PAM) and Gradual Multipulse Pulse Position Modulation (Gradual MPPM) where the transmitted information is encoded in the amplitude and position of multiple optical pulses. The performance measures in terms of the number of bits-symbols per frame, power requirements and bandwidth-utilization efficiency for the proposed scheme are derived and compared with MPPM, Gradual MPPM and Multiple Pulse Amplitude and Position Modulation (MPAPM) schemes. It is shown that the proposed scheme allows more symbols and bits transmission per frame and achieves higher bandwidth-utilization efficiency than MPPM, Gradual MPPM and MPAPM. However, in terms of the power requirements, the MPPM and Gradual MPPM outperforms the proposed modulation scheme. Thus, the proposed scheme displays a significant improvement in terms of the transmitted symbols and the bandwidth-utilization efficiency.
提出了一种用于光无线通信(OWC)系统的混合多脉冲幅度和位置调制(H-MPAPM)方案。H-MPAPM是脉冲幅度调制(PAM)和渐进多脉冲脉冲位置调制(渐进MPPM)的组合版本,其中传输的信息被编码为多个光脉冲的幅度和位置。推导了该方案在每帧位符号数、功率要求和带宽利用效率方面的性能指标,并与MPPM、渐进MPPM和多脉冲幅度和位置调制(MPAPM)方案进行了比较。结果表明,与MPPM、渐进式MPPM和mapm相比,该方案每帧可传输更多的符号和比特,具有更高的带宽利用率。然而,就功率要求而言,MPPM和渐进式MPPM优于所提出的调制方案。因此,该方案在传输符号数和带宽利用效率方面都有显著提高。
{"title":"Hybrid Multipulse Amplitude and Position Modulation for Optical Wireless Communication System","authors":"S. Idris, Jaafaru Sanusi, H. Selmy, A. Aibinu","doi":"10.1109/ICECCO48375.2019.9043213","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043213","url":null,"abstract":"This paper presents a Hybrid Multipulse Amplitude and Position Modulation (H-MPAPM) scheme for Optical Wireless Communication (OWC) system. H-MPAPM is a combined version of the Pulse Amplitude Modulation (PAM) and Gradual Multipulse Pulse Position Modulation (Gradual MPPM) where the transmitted information is encoded in the amplitude and position of multiple optical pulses. The performance measures in terms of the number of bits-symbols per frame, power requirements and bandwidth-utilization efficiency for the proposed scheme are derived and compared with MPPM, Gradual MPPM and Multiple Pulse Amplitude and Position Modulation (MPAPM) schemes. It is shown that the proposed scheme allows more symbols and bits transmission per frame and achieves higher bandwidth-utilization efficiency than MPPM, Gradual MPPM and MPAPM. However, in terms of the power requirements, the MPPM and Gradual MPPM outperforms the proposed modulation scheme. Thus, the proposed scheme displays a significant improvement in terms of the transmitted symbols and the bandwidth-utilization efficiency.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Investigation into Peer-to-Peer Network Security Using Wireshark 基于Wireshark的点对点网络安全研究
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043236
A. Musa, A. Abubakar, Usman Abdul Gimba, Rasheed Abubakar Rasheed
Peer-to-peer networks’ ability to be used as the primary vector of delivery in a highly sensitive environment poses many dangers. The impacts of the hazards on security can be measured when using peer-to-peer networks in a standard computing environment. The transfer of data across multiple network data-centers exposes the system to a potential insider threat, remote control, and the possible leak of private and confidential information. In this paper, we present an analysis of peer-to-peer network security. This follows a description of existing techniques to prevent potential threats to peer-to-peer networks and finally the paper presents a proposed technique to enhance the security of peer-to-peer networks using simulation based experimental study.
在高度敏感的环境中,点对点网络作为主要传递媒介的能力带来了许多危险。当在标准计算环境中使用对等网络时,可以测量危害对安全性的影响。跨多个网络数据中心传输数据会使系统暴露于潜在的内部威胁、远程控制以及可能泄露的私人和机密信息。在本文中,我们对点对点网络的安全性进行了分析。接下来是对现有技术的描述,以防止潜在的威胁点对点网络,最后提出了一种建议的技术,以提高点对点网络的安全性,使用基于仿真的实验研究。
{"title":"An Investigation into Peer-to-Peer Network Security Using Wireshark","authors":"A. Musa, A. Abubakar, Usman Abdul Gimba, Rasheed Abubakar Rasheed","doi":"10.1109/ICECCO48375.2019.9043236","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043236","url":null,"abstract":"Peer-to-peer networks’ ability to be used as the primary vector of delivery in a highly sensitive environment poses many dangers. The impacts of the hazards on security can be measured when using peer-to-peer networks in a standard computing environment. The transfer of data across multiple network data-centers exposes the system to a potential insider threat, remote control, and the possible leak of private and confidential information. In this paper, we present an analysis of peer-to-peer network security. This follows a description of existing techniques to prevent potential threats to peer-to-peer networks and finally the paper presents a proposed technique to enhance the security of peer-to-peer networks using simulation based experimental study.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique 使用组合静态规则和基于机器学习的技术减轻高级持续性威胁
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043278
Oluwasegun Adelaiye, A. Ajibola
Advanced Persistent Threat is a targeted attack method used to maintain undetected unauthorized access over an extended period to exfiltrate valuable data. The inability of traditional methods in mitigating this attack is a major problem, which poses huge threats to organizations. This paper proposes the combined use of pattern recognition and machine learning based techniques in militating the attack. Using basic statistical test approach, a dataset containing 1,047,908 PCAP instances is analyzed and results show patterns exist in identifying between malicious data traffic and normal data traffic. The machine learning on the other hand, is evaluated using three algorithms successfully: KNN, Decision Tree and Random Forest. All algorithms showed very high accuracies in correctly classifying the data traffic. Using the algorithm with the highest accuracy, Random Forest is optimized for better effectiveness.
高级持续威胁是一种有针对性的攻击方法,用于在很长一段时间内保持未被发现的未经授权的访问,以泄露有价值的数据。传统方法无法减轻这种攻击是一个主要问题,这给组织带来了巨大的威胁。本文提出结合使用模式识别和基于机器学习的技术来防御攻击。使用基本的统计测试方法,对包含1,047,908个PCAP实例的数据集进行了分析,结果显示在识别恶意数据流量和正常数据流量之间存在模式。另一方面,机器学习成功地使用三种算法进行评估:KNN,决策树和随机森林。所有算法在正确分类数据流量方面都显示出很高的准确率。使用具有最高精度的算法,随机森林得到了更好的优化效果。
{"title":"Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique","authors":"Oluwasegun Adelaiye, A. Ajibola","doi":"10.1109/ICECCO48375.2019.9043278","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043278","url":null,"abstract":"Advanced Persistent Threat is a targeted attack method used to maintain undetected unauthorized access over an extended period to exfiltrate valuable data. The inability of traditional methods in mitigating this attack is a major problem, which poses huge threats to organizations. This paper proposes the combined use of pattern recognition and machine learning based techniques in militating the attack. Using basic statistical test approach, a dataset containing 1,047,908 PCAP instances is analyzed and results show patterns exist in identifying between malicious data traffic and normal data traffic. The machine learning on the other hand, is evaluated using three algorithms successfully: KNN, Decision Tree and Random Forest. All algorithms showed very high accuracies in correctly classifying the data traffic. Using the algorithm with the highest accuracy, Random Forest is optimized for better effectiveness.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fuel Cell technology approach to generate electricity using air-conditioner water 一种利用空调水发电的燃料电池技术
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043268
E. A. Aja, Sadiq Thomas, Oluwatomisin E. Aina, I. D. Inuwa, B. Saka, Y. S. Mohammed
The fuel cell technology has wide range of applications, such as seen in the driving of electric cars and powering of electrical appliances. This paper describes how water an end product from air-conditioner is passed through different chambers which houses the machines that will harness the hydrogen gas into its tank and subsequently used to generate electricity for household appliances. The process involves three phases which are the air-conditioner phase, the chambers phase and the house phase. With the right connection as described by this paper, electricity would be generated for the household electrical appliances thereby reducing dependency on the nominal power from the grid. This technology is an alternative way of generating power for our everyday use, free from atmospheric toxics and ozone friendly.
燃料电池技术具有广泛的应用,如在电动汽车的驱动和电器的动力。本文描述了空调的最终产品水如何通过不同的腔室,这些腔室容纳了机器,这些机器将利用氢气进入其水箱,随后用于为家用电器发电。这个过程包括三个阶段,即空调阶段,房间阶段和房屋阶段。通过本文所描述的正确连接,将为家用电器产生电力,从而减少对电网标称功率的依赖。这项技术是我们日常使用的另一种发电方式,没有大气有毒物质,对臭氧无害。
{"title":"A Fuel Cell technology approach to generate electricity using air-conditioner water","authors":"E. A. Aja, Sadiq Thomas, Oluwatomisin E. Aina, I. D. Inuwa, B. Saka, Y. S. Mohammed","doi":"10.1109/ICECCO48375.2019.9043268","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043268","url":null,"abstract":"The fuel cell technology has wide range of applications, such as seen in the driving of electric cars and powering of electrical appliances. This paper describes how water an end product from air-conditioner is passed through different chambers which houses the machines that will harness the hydrogen gas into its tank and subsequently used to generate electricity for household appliances. The process involves three phases which are the air-conditioner phase, the chambers phase and the house phase. With the right connection as described by this paper, electricity would be generated for the household electrical appliances thereby reducing dependency on the nominal power from the grid. This technology is an alternative way of generating power for our everyday use, free from atmospheric toxics and ozone friendly.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123516692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning for Image-based Cervical Cancer Detection and Diagnosis — A Survey 基于图像的深度学习宫颈癌检测与诊断研究综述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043220
Oluwatomisin E. Aina, Steve A. Adeshina, A. Aibinu
Cervical cancer is the fourth most common type of cancer found in females with a record of 570,000 incidences and 311,000 deaths in the year 2018 worldwide. It is caused by a virus known as Human Papilloma Virus (HPV). Screening if done early can reduce this prevalence. However, manual screening methods are not efficient in the detection of cervical cancer as a result of some factors. This, however, results in misdiagnosis and over-treatment. Therefore, researchers proposed screening cervical automatically by using traditional and deep learning techniques. This paper aims to review past work that has been done particularly in the deep learning domain and discusses future directions in the automated detection of cervical cancer. It is believed that this will ensure proper diagnosis and could potentially reduce the prevalence of cervical cancer.
宫颈癌是女性中第四大最常见的癌症类型,2018年全球有57万例发病率和31.1万例死亡。它是由一种叫做人类乳头瘤病毒(HPV)的病毒引起的。如果及早进行筛查,可以降低这种发病率。然而,由于某些因素的影响,人工筛查方法在检测子宫颈癌方面并不有效。然而,这导致误诊和过度治疗。因此,研究人员提出了结合传统和深度学习技术进行宫颈自动筛查。本文旨在回顾过去在深度学习领域所做的工作,并讨论宫颈癌自动检测的未来方向。据信,这将确保正确的诊断,并可能潜在地减少宫颈癌的患病率。
{"title":"Deep Learning for Image-based Cervical Cancer Detection and Diagnosis — A Survey","authors":"Oluwatomisin E. Aina, Steve A. Adeshina, A. Aibinu","doi":"10.1109/ICECCO48375.2019.9043220","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043220","url":null,"abstract":"Cervical cancer is the fourth most common type of cancer found in females with a record of 570,000 incidences and 311,000 deaths in the year 2018 worldwide. It is caused by a virus known as Human Papilloma Virus (HPV). Screening if done early can reduce this prevalence. However, manual screening methods are not efficient in the detection of cervical cancer as a result of some factors. This, however, results in misdiagnosis and over-treatment. Therefore, researchers proposed screening cervical automatically by using traditional and deep learning techniques. This paper aims to review past work that has been done particularly in the deep learning domain and discusses future directions in the automated detection of cervical cancer. It is believed that this will ensure proper diagnosis and could potentially reduce the prevalence of cervical cancer.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 15th International Conference on Electronics, Computer and Computation (ICECCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1