Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043189
Majdi M. Ababneh, O. Ugweje, A. Jaesim
Power Management Units (PMU) are rapidly being developed to provide a significant amount of power for sensors in Internet-of-Things (IoT) networks. This paper presents a novel optimized PMU design for IoT applications, which can be used as a part of energy harvesting system that can be composed of solar cells, wind turbine, thermal energy, and vibration. Hence the proposed design can be used as a feasible energy harvester, where notable power efficiency is achieved here over traditional PMU designs under the same circumstances. The optimized PMU is developed using a buck-boost DC-DC converter. The particle swarm optimization (PSO) is then applied to optimize the parameters of PMU, including buck-boost DC-DC converter, and control circuitry to achieve maximum power point and improve the overall efficiency.
{"title":"Optimized Power Management Unit for IoT Applications","authors":"Majdi M. Ababneh, O. Ugweje, A. Jaesim","doi":"10.1109/ICECCO48375.2019.9043189","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043189","url":null,"abstract":"Power Management Units (PMU) are rapidly being developed to provide a significant amount of power for sensors in Internet-of-Things (IoT) networks. This paper presents a novel optimized PMU design for IoT applications, which can be used as a part of energy harvesting system that can be composed of solar cells, wind turbine, thermal energy, and vibration. Hence the proposed design can be used as a feasible energy harvester, where notable power efficiency is achieved here over traditional PMU designs under the same circumstances. The optimized PMU is developed using a buck-boost DC-DC converter. The particle swarm optimization (PSO) is then applied to optimize the parameters of PMU, including buck-boost DC-DC converter, and control circuitry to achieve maximum power point and improve the overall efficiency.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114584156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043263
S. Yese, Abdulhakeem Abdulazeez, Aminu Mohammed
In this study, a dynamic weighted round robin call admission (DWRR-CAC) scheme is proposed as an improvement to the recently proposed weighted round robin call admission (WRR-CAC) which reduces new connection blocking rate but wastes network resources due to the fixed reservation and degradation mechanisms it deploys. The DWRR-CAC algorithm solves the problem of resource wastage by deploying three mechanism: a precheck, dynamic degradation, and weight computer mechanism. First it admits all connections based on their maximum sustained traffic rate (MSTR) when the network resources are underutilized. Next, when the available resources are not sufficient to admit new connections, it deploys a pre-check mechanism to determine whether degrading existing non-UGS connections will yield sufficient bandwidth to admit the new connection or not. If the check is passed, the scheme deploys a dynamic degradation mechanism which degrades only existing non-UGS connections to admit the new connections as the non-UGS connections have adaptive QoS requirements but the UGS connections do not. The dynamic degradation mechanism ensures that only the required bandwidth is degraded. If the check fails, the connections are queued according to their traffic classes and retried after some resources are adapted from completed calls. The queued connections are admitted based on the computed WRR weight. Several simulation experiments were conducted to evaluate the performance of the DWRR-CAC against QOGCAC and WRR-CAC using a discrete event simulator. The results show that DWRR-CAC out performs the benchmark schemes in terms of call blocking rate, average and per-flow throughput.
{"title":"A Dynamic Weighted Round Robin Call Admission (DWRR-CAC) Algorithm for Broadband Networks","authors":"S. Yese, Abdulhakeem Abdulazeez, Aminu Mohammed","doi":"10.1109/ICECCO48375.2019.9043263","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043263","url":null,"abstract":"In this study, a dynamic weighted round robin call admission (DWRR-CAC) scheme is proposed as an improvement to the recently proposed weighted round robin call admission (WRR-CAC) which reduces new connection blocking rate but wastes network resources due to the fixed reservation and degradation mechanisms it deploys. The DWRR-CAC algorithm solves the problem of resource wastage by deploying three mechanism: a precheck, dynamic degradation, and weight computer mechanism. First it admits all connections based on their maximum sustained traffic rate (MSTR) when the network resources are underutilized. Next, when the available resources are not sufficient to admit new connections, it deploys a pre-check mechanism to determine whether degrading existing non-UGS connections will yield sufficient bandwidth to admit the new connection or not. If the check is passed, the scheme deploys a dynamic degradation mechanism which degrades only existing non-UGS connections to admit the new connections as the non-UGS connections have adaptive QoS requirements but the UGS connections do not. The dynamic degradation mechanism ensures that only the required bandwidth is degraded. If the check fails, the connections are queued according to their traffic classes and retried after some resources are adapted from completed calls. The queued connections are admitted based on the computed WRR weight. Several simulation experiments were conducted to evaluate the performance of the DWRR-CAC against QOGCAC and WRR-CAC using a discrete event simulator. The results show that DWRR-CAC out performs the benchmark schemes in terms of call blocking rate, average and per-flow throughput.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043204
Muhammad Usman, Eromosele Ehimeme Oberafo, M. A. Abubakar, Tahir Aminu, A. Modibbo, Sadiq Thomas
Communication technology facilitates provision of such services as file transferring, print sharing, video streaming. Internet is a global system of interconnected networks. Computer communication networks are based on a technology that provides the technical infrastructure, where routing protocols are used to transmit packets across the internet. Routing protocols specify how routers communicate with each other by disseminating information. Routing protocols are broadly categorized into Interior and Exterior Gateway routing protocols. While Interior Gateway protocols disseminate packets within an Autonomous System (AS), Exterior Gateway protocols send packets from an AS to another. This work review the performance of Interior Gateway Protocols; EIGRP, OSPF, RIP and IS-IS. Considering so many performance metrics like convergence, scale of networks, HTTP page response and packets loss, comparative analysis of the protocols is done.
{"title":"Review of Interior Gateway Routing Protocols","authors":"Muhammad Usman, Eromosele Ehimeme Oberafo, M. A. Abubakar, Tahir Aminu, A. Modibbo, Sadiq Thomas","doi":"10.1109/ICECCO48375.2019.9043204","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043204","url":null,"abstract":"Communication technology facilitates provision of such services as file transferring, print sharing, video streaming. Internet is a global system of interconnected networks. Computer communication networks are based on a technology that provides the technical infrastructure, where routing protocols are used to transmit packets across the internet. Routing protocols specify how routers communicate with each other by disseminating information. Routing protocols are broadly categorized into Interior and Exterior Gateway routing protocols. While Interior Gateway protocols disseminate packets within an Autonomous System (AS), Exterior Gateway protocols send packets from an AS to another. This work review the performance of Interior Gateway Protocols; EIGRP, OSPF, RIP and IS-IS. Considering so many performance metrics like convergence, scale of networks, HTTP page response and packets loss, comparative analysis of the protocols is done.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127068581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043237
Amina Sani Adamu, S. Abdullahi, R. K. Aminu
Autism Spectrum Disorder (ASD) is neurodevelopmental condition characterized by social interaction and communication difficulties, along with narrow and repetitive behaviors and interest. Since autistic children suffers from learning disabilities and communication barriers, this research aim to survey mobile and computer applications that are developed to provide better learning environment and communication platform for autistic children. It also outline the type of techniques used for developing Applications used for children with Autism. We found out that several techniques have been implemented and tested on children living with autism and they serve the purpose for which the application was built for. Most of the applications have given Great improvements and usefulness for children living on the Spectrum. With more recent publication, there is need to update on the recent techniques for people to use.
{"title":"A Survey on Software Applications use in Therapy for Autistic Children","authors":"Amina Sani Adamu, S. Abdullahi, R. K. Aminu","doi":"10.1109/ICECCO48375.2019.9043237","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043237","url":null,"abstract":"Autism Spectrum Disorder (ASD) is neurodevelopmental condition characterized by social interaction and communication difficulties, along with narrow and repetitive behaviors and interest. Since autistic children suffers from learning disabilities and communication barriers, this research aim to survey mobile and computer applications that are developed to provide better learning environment and communication platform for autistic children. It also outline the type of techniques used for developing Applications used for children with Autism. We found out that several techniques have been implemented and tested on children living with autism and they serve the purpose for which the application was built for. Most of the applications have given Great improvements and usefulness for children living on the Spectrum. With more recent publication, there is need to update on the recent techniques for people to use.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127426391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043292
S. N. Odaudu, U. Imeh, U. Abubakar
Vote theft and fraud is a deliberate activity which is predominantly perpetrated at every level of electoral process by misrepresenting the actual value of vote count either manually or electronically. The emergence of technology within voting system remains a welcome development because of the comfort and speed it offer, however remains vulnerable to cyber-attack and has failed to deliver a trusted and reliable system. Therefore, blockchain technology in this paper is proposed at election result collation stages to ensure that result counted remains unchanged from the lower collation edge to the final stage of collation and announcement. In this paper, we examine the influence of technology on electoral system, e-voting system its pros and cons, which forms the basis for undertaking this work and the blockchain technology and its application of election result collation.
{"title":"BIDS: Blockchain Based Intrusion Detection System for Electoral Process","authors":"S. N. Odaudu, U. Imeh, U. Abubakar","doi":"10.1109/ICECCO48375.2019.9043292","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043292","url":null,"abstract":"Vote theft and fraud is a deliberate activity which is predominantly perpetrated at every level of electoral process by misrepresenting the actual value of vote count either manually or electronically. The emergence of technology within voting system remains a welcome development because of the comfort and speed it offer, however remains vulnerable to cyber-attack and has failed to deliver a trusted and reliable system. Therefore, blockchain technology in this paper is proposed at election result collation stages to ensure that result counted remains unchanged from the lower collation edge to the final stage of collation and announcement. In this paper, we examine the influence of technology on electoral system, e-voting system its pros and cons, which forms the basis for undertaking this work and the blockchain technology and its application of election result collation.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"3204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127480471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043184
Opanweze Chioma, Sadiq Thomas, S. Hussein, Godwin Aboi, Omotayo Oshiga, A. A. Ahmed
Hydro generation is the second contributor to the power generation in Nigeria. Nigeria is endowed with abundance of water resources, which over the years has been under harnessed. Hydroelectricity contributes about 30% of the total installed grid in the country. The country has a total installed capacity of 1975MW hydro generated electricity, which will improve immensely over the years, with the proposed construction of new plants. The number of hydropower plants that can be built is finite, but only a third of the sites classified worldwide as economically feasible are tapped. Hydro generation has had so many impacts on the society and environment over the years. These impacts are both positive and negative. This paper looks on the generation of hydropower in Nigeria, its social and environmental impact.
{"title":"Hydro Power Generation 1n Nigeria: Impacts And Mitigation","authors":"Opanweze Chioma, Sadiq Thomas, S. Hussein, Godwin Aboi, Omotayo Oshiga, A. A. Ahmed","doi":"10.1109/ICECCO48375.2019.9043184","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043184","url":null,"abstract":"Hydro generation is the second contributor to the power generation in Nigeria. Nigeria is endowed with abundance of water resources, which over the years has been under harnessed. Hydroelectricity contributes about 30% of the total installed grid in the country. The country has a total installed capacity of 1975MW hydro generated electricity, which will improve immensely over the years, with the proposed construction of new plants. The number of hydropower plants that can be built is finite, but only a third of the sites classified worldwide as economically feasible are tapped. Hydro generation has had so many impacts on the society and environment over the years. These impacts are both positive and negative. This paper looks on the generation of hydropower in Nigeria, its social and environmental impact.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127504070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043242
A. Mambo, O. Mogbo, Osezele Rotimi Patrick, A. Amuda, Abubakar Dayyabu, Abdulganiyu Sanusi
Walling materials are essential element of sustainable housing delivery. It influences a wide range of social, economic and environmental factors in any structure. Nigeria has suffered several building collapse with traumatic outcomes and among the major causes is poor building materials. This work studied the performance of Compressed Laterite Blocks (CLB) and compares it with cement block produced under laboratory conditions as well as those sold by block making industries in Abuja. The objective of this study was to determine the geotechnical properties of the laterite soil types for block making and investigate the performance of the block types. Geotechnical tests were conducted on the laterite samples and they were stabilized at different cement contents (0-8%) and compacted. The performance factors; wet and dry compressive strength, density, water absorption were then determined. A cement content of 6.5% for the stabilized laterite blocks yielded the compressed earth blocks with the most desired characteristics. These characteristic surpasses the ones observed for the standard cement blocks as well as those sold commercially in Abuja. Already computer simulation and modelling is being considered as a faster and cost effective way to determine suitability of laterite soil for block making.
{"title":"Investigating the performance of stabilized laterite block as an alternative walling units for Abuja","authors":"A. Mambo, O. Mogbo, Osezele Rotimi Patrick, A. Amuda, Abubakar Dayyabu, Abdulganiyu Sanusi","doi":"10.1109/ICECCO48375.2019.9043242","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043242","url":null,"abstract":"Walling materials are essential element of sustainable housing delivery. It influences a wide range of social, economic and environmental factors in any structure. Nigeria has suffered several building collapse with traumatic outcomes and among the major causes is poor building materials. This work studied the performance of Compressed Laterite Blocks (CLB) and compares it with cement block produced under laboratory conditions as well as those sold by block making industries in Abuja. The objective of this study was to determine the geotechnical properties of the laterite soil types for block making and investigate the performance of the block types. Geotechnical tests were conducted on the laterite samples and they were stabilized at different cement contents (0-8%) and compacted. The performance factors; wet and dry compressive strength, density, water absorption were then determined. A cement content of 6.5% for the stabilized laterite blocks yielded the compressed earth blocks with the most desired characteristics. These characteristic surpasses the ones observed for the standard cement blocks as well as those sold commercially in Abuja. Already computer simulation and modelling is being considered as a faster and cost effective way to determine suitability of laterite soil for block making.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131017346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043223
G. Iwasokun, O. C. Akinyokun, Taiwo Gabriel Omomule
Computer-Based Examination (CBE) is an emerging paradigm for the assessment and measurement of knowledge and capabilities. It relies on computer and its associated technologies to provide solution to some of the problems inherent to human-based approaches to conduct of examinations and invigilation. Such problems include connivance, impersonation, external sourcing and peeking. This paper presents the design of a fingerprint, iris and voicebased framework for promoting the security and reliability of CBE. The proposed framework comprises of modules for CBE, e-invigilation and control. The CBE module module comprises of a network backbone, a server and several workstations. The e-invigilation module is designed to use high definition and resolution iris scanners such as IrisShield-USB MK and CMITech BMT series to capture the iris image of the candidates for processing as well as voice recording and processing devices. The control module is designed to handle fingerprint-based authentication of examinees, process monitoring and relaying of situation reports.
{"title":"Design of E-Invigilation Framework Using Multi-Modal Biometrics","authors":"G. Iwasokun, O. C. Akinyokun, Taiwo Gabriel Omomule","doi":"10.1109/ICECCO48375.2019.9043223","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043223","url":null,"abstract":"Computer-Based Examination (CBE) is an emerging paradigm for the assessment and measurement of knowledge and capabilities. It relies on computer and its associated technologies to provide solution to some of the problems inherent to human-based approaches to conduct of examinations and invigilation. Such problems include connivance, impersonation, external sourcing and peeking. This paper presents the design of a fingerprint, iris and voicebased framework for promoting the security and reliability of CBE. The proposed framework comprises of modules for CBE, e-invigilation and control. The CBE module module comprises of a network backbone, a server and several workstations. The e-invigilation module is designed to use high definition and resolution iris scanners such as IrisShield-USB MK and CMITech BMT series to capture the iris image of the candidates for processing as well as voice recording and processing devices. The control module is designed to handle fingerprint-based authentication of examinees, process monitoring and relaying of situation reports.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043295
Shuaibu Yau Auna, Faruku Umar Ambursa, Abdulhakeem Ibrahim
In cloud computing, Service rendering is achieved through virtualization and the use of very large scalable resources where users access services by paying for the share of resources used by them. Several workflow scheduling techniques have been proposed for efficient scheduling. Max-min approach is prominent among them, its features includes efficiency and the ability to guarantee optimal or near optimal solution because of its heuristic nature. Several enhancement to its functionalities have been proposed in the literature and works are still ongoing for improving it. This paper proposed a solution by minimizing total execution time where workflow tasks length are invariably considered before proper scheduling. Our proposed work is compared with standard Max-Min scheduling scheme. The proposed scheme outperforms the standard scheme; two realistic scientific workflows were used as test data for the simulation.
{"title":"A New Modified Max-min Workflow Scheduling Algorithm for Cloud Environment","authors":"Shuaibu Yau Auna, Faruku Umar Ambursa, Abdulhakeem Ibrahim","doi":"10.1109/ICECCO48375.2019.9043295","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043295","url":null,"abstract":"In cloud computing, Service rendering is achieved through virtualization and the use of very large scalable resources where users access services by paying for the share of resources used by them. Several workflow scheduling techniques have been proposed for efficient scheduling. Max-min approach is prominent among them, its features includes efficiency and the ability to guarantee optimal or near optimal solution because of its heuristic nature. Several enhancement to its functionalities have been proposed in the literature and works are still ongoing for improving it. This paper proposed a solution by minimizing total execution time where workflow tasks length are invariably considered before proper scheduling. Our proposed work is compared with standard Max-Min scheduling scheme. The proposed scheme outperforms the standard scheme; two realistic scientific workflows were used as test data for the simulation.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123058459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043255
Suleiman Mustafa, Mohammed Dauda
In this study, Convolution Neural Network (CNN)-based learning method, which is well-used in deep learning is applied to evaluate optimization algorithms for improved accuracy in cervix cancer detection. The convolutional layer in this study is made up of numerous convolution kernels which are used to compute different feature maps for representations of the inputs. As a result, the architecture of the model consisting of convolutional layers, pooling layers, and fully-connected layers is designed by stacking the network layers. The model is evaluated firstly by increasing the amount of image data through image augmentation. Furthermore, the hyper parameters for optimum performance are chosen. Finally, analysis is performed for Stochastic gradient descent (SGD), Root Mean Square Propagation (RMSprop) and Adaptive Moment Estimation (Adam) optimizers to determine which improves the networks performance for the classification of cervix cancer.
{"title":"Evaluating Convolution Neural Network optimization Algorithms for Classification of Cervical Cancer Macro Images","authors":"Suleiman Mustafa, Mohammed Dauda","doi":"10.1109/ICECCO48375.2019.9043255","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043255","url":null,"abstract":"In this study, Convolution Neural Network (CNN)-based learning method, which is well-used in deep learning is applied to evaluate optimization algorithms for improved accuracy in cervix cancer detection. The convolutional layer in this study is made up of numerous convolution kernels which are used to compute different feature maps for representations of the inputs. As a result, the architecture of the model consisting of convolutional layers, pooling layers, and fully-connected layers is designed by stacking the network layers. The model is evaluated firstly by increasing the amount of image data through image augmentation. Furthermore, the hyper parameters for optimum performance are chosen. Finally, analysis is performed for Stochastic gradient descent (SGD), Root Mean Square Propagation (RMSprop) and Adaptive Moment Estimation (Adam) optimizers to determine which improves the networks performance for the classification of cervix cancer.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}