Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043227
N. A. Umar, Jamilu Awwalu
Strategic Information Systems Planning (SISP) as a means for technology optimization plays important role along with Information system as the key player. Security information as the major resource for Information Systems is produced from the massive data collected by security agencies on daily basis. While other countries continuously strive to be several steps ahead of crime and their perpetrators, map out crime pattern, and implement efficient security personnel allocation by mining the voluminous data from their Information Systems (IS) as a means of achieving their organization goals, the absence of both hard and soft working infrastructure that can serve the purpose of collecting adequate data further complicates matters for Nigerian security agencies. These different security challenges can be identified and linked with strategic planning, obsolete computing resources, Information Systems features, data collection and Information Systems adoption. This study targets the audience of the top decision makers and managers of Nigerian security agencies by provides a framework for integrating SISP into security agencies. This is in order to facilitate the achievement security agencies organizational goals and make them benefit from a functional IS and put them on track to catching up with their counterparts around the world within the shortest possible time.
{"title":"Integrating Strategic Information Systems Planning into Nigerian Security Agencies","authors":"N. A. Umar, Jamilu Awwalu","doi":"10.1109/ICECCO48375.2019.9043227","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043227","url":null,"abstract":"Strategic Information Systems Planning (SISP) as a means for technology optimization plays important role along with Information system as the key player. Security information as the major resource for Information Systems is produced from the massive data collected by security agencies on daily basis. While other countries continuously strive to be several steps ahead of crime and their perpetrators, map out crime pattern, and implement efficient security personnel allocation by mining the voluminous data from their Information Systems (IS) as a means of achieving their organization goals, the absence of both hard and soft working infrastructure that can serve the purpose of collecting adequate data further complicates matters for Nigerian security agencies. These different security challenges can be identified and linked with strategic planning, obsolete computing resources, Information Systems features, data collection and Information Systems adoption. This study targets the audience of the top decision makers and managers of Nigerian security agencies by provides a framework for integrating SISP into security agencies. This is in order to facilitate the achievement security agencies organizational goals and make them benefit from a functional IS and put them on track to catching up with their counterparts around the world within the shortest possible time.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043240
Isa Muslu, Moussa Mahamat Boukar, O. Gurbuz
Integral equations arises in many physical applications like potential theory and Dirichlet problems, electrostatics, mathematical problems of radiation equilibrium, the particle transport problems of astrophysics and radiation heat problems etc. Integral equations course is one of the main courses in engineering faculties. The aim of this work is to develop an interactive digital learning material, a question bank using Wildcards, on an automation management system Moodle. To create the digital material Wildcard technology of the Moodle is used.
{"title":"Developing a Digital Interactive Course Material on Automated Management System Moodle for Integral Equations Course","authors":"Isa Muslu, Moussa Mahamat Boukar, O. Gurbuz","doi":"10.1109/ICECCO48375.2019.9043240","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043240","url":null,"abstract":"Integral equations arises in many physical applications like potential theory and Dirichlet problems, electrostatics, mathematical problems of radiation equilibrium, the particle transport problems of astrophysics and radiation heat problems etc. Integral equations course is one of the main courses in engineering faculties. The aim of this work is to develop an interactive digital learning material, a question bank using Wildcards, on an automation management system Moodle. To create the digital material Wildcard technology of the Moodle is used.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043285
N. Ibragimov, Alina Amangeldiyeva
There is an increasing trend in the application of integrated Quick Response(QR) and RFID technologies to large-scale events. QR codes and RFID readers containing logs data were introduced into an international computer project competition organized for students in the university. This paper aims to discover the perspectives of Integrated Technologies, which has been created and show how this integration affects to optimization and efficiency of the processes. The presented study is based on the application of the Human Resource Management System for the education sector(e-HRMS), a centralized platform that powers and manages the structure of international competitions. The study findings reveal that the integration of ICT technologies positively affects optimization and process management in the education sector. Moreover, the most important parameter that affects both technologies has been found and checked clearly.
{"title":"Perspectives of Integration QR Codes and RFID readers in large-scale events controlled by HRM systems","authors":"N. Ibragimov, Alina Amangeldiyeva","doi":"10.1109/ICECCO48375.2019.9043285","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043285","url":null,"abstract":"There is an increasing trend in the application of integrated Quick Response(QR) and RFID technologies to large-scale events. QR codes and RFID readers containing logs data were introduced into an international computer project competition organized for students in the university. This paper aims to discover the perspectives of Integrated Technologies, which has been created and show how this integration affects to optimization and efficiency of the processes. The presented study is based on the application of the Human Resource Management System for the education sector(e-HRMS), a centralized platform that powers and manages the structure of international competitions. The study findings reveal that the integration of ICT technologies positively affects optimization and process management in the education sector. Moreover, the most important parameter that affects both technologies has been found and checked clearly.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043197
Umaina Muhammad Ibrahim, Steve A. Adeshina, Sadiq Thomas, A. Obadiah, S. Hussein, Oluwatomisin E. Aina
Since its development in the 1950s, plastic has been in great demand and is used daily everywhere in the world. With its success came a lot of problems faced globally in the form of plastic pollution. This pollution stems from improper disposal of plastic wastes which can be solved via effective disposal, recycling and reuse of plastics [1]. Hence, the design and implementation of a plastic waste sorting system. The designed project will be used in plastic recycling and waste management industries. It consists of a rotating container which houses two sensors (color and weight sensor) for efficient sorting of the plastic wastes. The overall system’s efficiency is 73% and the system’s performance was satisfactory.
{"title":"Design and Implementation of a Plastic Waste Sorting System","authors":"Umaina Muhammad Ibrahim, Steve A. Adeshina, Sadiq Thomas, A. Obadiah, S. Hussein, Oluwatomisin E. Aina","doi":"10.1109/ICECCO48375.2019.9043197","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043197","url":null,"abstract":"Since its development in the 1950s, plastic has been in great demand and is used daily everywhere in the world. With its success came a lot of problems faced globally in the form of plastic pollution. This pollution stems from improper disposal of plastic wastes which can be solved via effective disposal, recycling and reuse of plastics [1]. Hence, the design and implementation of a plastic waste sorting system. The designed project will be used in plastic recycling and waste management industries. It consists of a rotating container which houses two sensors (color and weight sensor) for efficient sorting of the plastic wastes. The overall system’s efficiency is 73% and the system’s performance was satisfactory.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129988819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043217
Sadiq M. Bammami, E. Okafor, S. Hussein, M. Bammami, Sadiq Thomas, Omotayo Oshiga
this research is aimed at modeling and performing structural analysis on Gravity light system using bond graph method in order to improve its performance. To achieve the bond graph model of the gravity light system, the various subsystems, storage elements, junction structures, transformer elements with appropriate causality assignments and energy exchange that make up the gravity light system were identified and modeled. In the developed model, the effect of friction was considered. 20-Sim software was used to validate the developed bond graph model. The structural design and analysis of the system carried out shows that, it is not just another renewable energy generating source but one that improves greatly, the exiting gravity light system by extended operational time of 40 minutes and higher efficiency of over 80%. Hence, it meets all requirements for the application of renewable energy sources, and technically viable for construction and further developments.
{"title":"Improvement Of Gravity Light Generation Modeling Using Bond Graph Method","authors":"Sadiq M. Bammami, E. Okafor, S. Hussein, M. Bammami, Sadiq Thomas, Omotayo Oshiga","doi":"10.1109/ICECCO48375.2019.9043217","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043217","url":null,"abstract":"this research is aimed at modeling and performing structural analysis on Gravity light system using bond graph method in order to improve its performance. To achieve the bond graph model of the gravity light system, the various subsystems, storage elements, junction structures, transformer elements with appropriate causality assignments and energy exchange that make up the gravity light system were identified and modeled. In the developed model, the effect of friction was considered. 20-Sim software was used to validate the developed bond graph model. The structural design and analysis of the system carried out shows that, it is not just another renewable energy generating source but one that improves greatly, the exiting gravity light system by extended operational time of 40 minutes and higher efficiency of over 80%. Hence, it meets all requirements for the application of renewable energy sources, and technically viable for construction and further developments.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043213
S. Idris, Jaafaru Sanusi, H. Selmy, A. Aibinu
This paper presents a Hybrid Multipulse Amplitude and Position Modulation (H-MPAPM) scheme for Optical Wireless Communication (OWC) system. H-MPAPM is a combined version of the Pulse Amplitude Modulation (PAM) and Gradual Multipulse Pulse Position Modulation (Gradual MPPM) where the transmitted information is encoded in the amplitude and position of multiple optical pulses. The performance measures in terms of the number of bits-symbols per frame, power requirements and bandwidth-utilization efficiency for the proposed scheme are derived and compared with MPPM, Gradual MPPM and Multiple Pulse Amplitude and Position Modulation (MPAPM) schemes. It is shown that the proposed scheme allows more symbols and bits transmission per frame and achieves higher bandwidth-utilization efficiency than MPPM, Gradual MPPM and MPAPM. However, in terms of the power requirements, the MPPM and Gradual MPPM outperforms the proposed modulation scheme. Thus, the proposed scheme displays a significant improvement in terms of the transmitted symbols and the bandwidth-utilization efficiency.
{"title":"Hybrid Multipulse Amplitude and Position Modulation for Optical Wireless Communication System","authors":"S. Idris, Jaafaru Sanusi, H. Selmy, A. Aibinu","doi":"10.1109/ICECCO48375.2019.9043213","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043213","url":null,"abstract":"This paper presents a Hybrid Multipulse Amplitude and Position Modulation (H-MPAPM) scheme for Optical Wireless Communication (OWC) system. H-MPAPM is a combined version of the Pulse Amplitude Modulation (PAM) and Gradual Multipulse Pulse Position Modulation (Gradual MPPM) where the transmitted information is encoded in the amplitude and position of multiple optical pulses. The performance measures in terms of the number of bits-symbols per frame, power requirements and bandwidth-utilization efficiency for the proposed scheme are derived and compared with MPPM, Gradual MPPM and Multiple Pulse Amplitude and Position Modulation (MPAPM) schemes. It is shown that the proposed scheme allows more symbols and bits transmission per frame and achieves higher bandwidth-utilization efficiency than MPPM, Gradual MPPM and MPAPM. However, in terms of the power requirements, the MPPM and Gradual MPPM outperforms the proposed modulation scheme. Thus, the proposed scheme displays a significant improvement in terms of the transmitted symbols and the bandwidth-utilization efficiency.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043236
A. Musa, A. Abubakar, Usman Abdul Gimba, Rasheed Abubakar Rasheed
Peer-to-peer networks’ ability to be used as the primary vector of delivery in a highly sensitive environment poses many dangers. The impacts of the hazards on security can be measured when using peer-to-peer networks in a standard computing environment. The transfer of data across multiple network data-centers exposes the system to a potential insider threat, remote control, and the possible leak of private and confidential information. In this paper, we present an analysis of peer-to-peer network security. This follows a description of existing techniques to prevent potential threats to peer-to-peer networks and finally the paper presents a proposed technique to enhance the security of peer-to-peer networks using simulation based experimental study.
{"title":"An Investigation into Peer-to-Peer Network Security Using Wireshark","authors":"A. Musa, A. Abubakar, Usman Abdul Gimba, Rasheed Abubakar Rasheed","doi":"10.1109/ICECCO48375.2019.9043236","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043236","url":null,"abstract":"Peer-to-peer networks’ ability to be used as the primary vector of delivery in a highly sensitive environment poses many dangers. The impacts of the hazards on security can be measured when using peer-to-peer networks in a standard computing environment. The transfer of data across multiple network data-centers exposes the system to a potential insider threat, remote control, and the possible leak of private and confidential information. In this paper, we present an analysis of peer-to-peer network security. This follows a description of existing techniques to prevent potential threats to peer-to-peer networks and finally the paper presents a proposed technique to enhance the security of peer-to-peer networks using simulation based experimental study.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043278
Oluwasegun Adelaiye, A. Ajibola
Advanced Persistent Threat is a targeted attack method used to maintain undetected unauthorized access over an extended period to exfiltrate valuable data. The inability of traditional methods in mitigating this attack is a major problem, which poses huge threats to organizations. This paper proposes the combined use of pattern recognition and machine learning based techniques in militating the attack. Using basic statistical test approach, a dataset containing 1,047,908 PCAP instances is analyzed and results show patterns exist in identifying between malicious data traffic and normal data traffic. The machine learning on the other hand, is evaluated using three algorithms successfully: KNN, Decision Tree and Random Forest. All algorithms showed very high accuracies in correctly classifying the data traffic. Using the algorithm with the highest accuracy, Random Forest is optimized for better effectiveness.
{"title":"Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique","authors":"Oluwasegun Adelaiye, A. Ajibola","doi":"10.1109/ICECCO48375.2019.9043278","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043278","url":null,"abstract":"Advanced Persistent Threat is a targeted attack method used to maintain undetected unauthorized access over an extended period to exfiltrate valuable data. The inability of traditional methods in mitigating this attack is a major problem, which poses huge threats to organizations. This paper proposes the combined use of pattern recognition and machine learning based techniques in militating the attack. Using basic statistical test approach, a dataset containing 1,047,908 PCAP instances is analyzed and results show patterns exist in identifying between malicious data traffic and normal data traffic. The machine learning on the other hand, is evaluated using three algorithms successfully: KNN, Decision Tree and Random Forest. All algorithms showed very high accuracies in correctly classifying the data traffic. Using the algorithm with the highest accuracy, Random Forest is optimized for better effectiveness.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043268
E. A. Aja, Sadiq Thomas, Oluwatomisin E. Aina, I. D. Inuwa, B. Saka, Y. S. Mohammed
The fuel cell technology has wide range of applications, such as seen in the driving of electric cars and powering of electrical appliances. This paper describes how water an end product from air-conditioner is passed through different chambers which houses the machines that will harness the hydrogen gas into its tank and subsequently used to generate electricity for household appliances. The process involves three phases which are the air-conditioner phase, the chambers phase and the house phase. With the right connection as described by this paper, electricity would be generated for the household electrical appliances thereby reducing dependency on the nominal power from the grid. This technology is an alternative way of generating power for our everyday use, free from atmospheric toxics and ozone friendly.
{"title":"A Fuel Cell technology approach to generate electricity using air-conditioner water","authors":"E. A. Aja, Sadiq Thomas, Oluwatomisin E. Aina, I. D. Inuwa, B. Saka, Y. S. Mohammed","doi":"10.1109/ICECCO48375.2019.9043268","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043268","url":null,"abstract":"The fuel cell technology has wide range of applications, such as seen in the driving of electric cars and powering of electrical appliances. This paper describes how water an end product from air-conditioner is passed through different chambers which houses the machines that will harness the hydrogen gas into its tank and subsequently used to generate electricity for household appliances. The process involves three phases which are the air-conditioner phase, the chambers phase and the house phase. With the right connection as described by this paper, electricity would be generated for the household electrical appliances thereby reducing dependency on the nominal power from the grid. This technology is an alternative way of generating power for our everyday use, free from atmospheric toxics and ozone friendly.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123516692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043220
Oluwatomisin E. Aina, Steve A. Adeshina, A. Aibinu
Cervical cancer is the fourth most common type of cancer found in females with a record of 570,000 incidences and 311,000 deaths in the year 2018 worldwide. It is caused by a virus known as Human Papilloma Virus (HPV). Screening if done early can reduce this prevalence. However, manual screening methods are not efficient in the detection of cervical cancer as a result of some factors. This, however, results in misdiagnosis and over-treatment. Therefore, researchers proposed screening cervical automatically by using traditional and deep learning techniques. This paper aims to review past work that has been done particularly in the deep learning domain and discusses future directions in the automated detection of cervical cancer. It is believed that this will ensure proper diagnosis and could potentially reduce the prevalence of cervical cancer.
{"title":"Deep Learning for Image-based Cervical Cancer Detection and Diagnosis — A Survey","authors":"Oluwatomisin E. Aina, Steve A. Adeshina, A. Aibinu","doi":"10.1109/ICECCO48375.2019.9043220","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043220","url":null,"abstract":"Cervical cancer is the fourth most common type of cancer found in females with a record of 570,000 incidences and 311,000 deaths in the year 2018 worldwide. It is caused by a virus known as Human Papilloma Virus (HPV). Screening if done early can reduce this prevalence. However, manual screening methods are not efficient in the detection of cervical cancer as a result of some factors. This, however, results in misdiagnosis and over-treatment. Therefore, researchers proposed screening cervical automatically by using traditional and deep learning techniques. This paper aims to review past work that has been done particularly in the deep learning domain and discusses future directions in the automated detection of cervical cancer. It is believed that this will ensure proper diagnosis and could potentially reduce the prevalence of cervical cancer.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}