首页 > 最新文献

2019 15th International Conference on Electronics, Computer and Computation (ICECCO)最新文献

英文 中文
Visible Light Communication: A potential 5G and beyond Communication Technology 可见光通信:一种潜在的5G及以后的通信技术
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043201
S. Idris, Usman Mohammed, Jaafaru Sanusi, Sadiq Thomas
The fifth-generation (5G) mobile network is the next paradigm shift in the revolutionary era of the wireless communication technologies that will break the backward compatibility of today’s communication systems. Visible Light Communication (VLC) and Light Fidelity (LiFi) technologies are among the potential candidates that are expected to be utilized in the future 5G networks due to their indoor energy-efficient communications. Realized by Light Emitting Diodes (LEDs), VLC and LiFi possesses a number of prominent features to meet the highly demanding requirements of ultrahigh-speed, massive Multiple-Input Multiple-Output (MIMO) device connectivity, ultra-low-latency, ultra-high reliable and low energy consumption for 5G networks. This paper provides an overview contributions of VLC and LiFi towards 5G networks. Furthermore, we explain how VLC and LiFi can successfully provide effective solutions for the emerging 5G networks.
第五代(5G)移动网络是无线通信技术革命时代的下一个范式转变,将打破当今通信系统的向后兼容性。可见光通信(VLC)和光保真(LiFi)技术因其室内节能通信而有望在未来5G网络中使用。VLC和LiFi由发光二极管(led)实现,具有许多突出的特性,可以满足5G网络对超高速、大规模多输入多输出(MIMO)设备连接、超低延迟、超高可靠性和低能耗的高要求。本文概述了VLC和LiFi对5G网络的贡献。此外,我们解释了VLC和LiFi如何成功地为新兴的5G网络提供有效的解决方案。
{"title":"Visible Light Communication: A potential 5G and beyond Communication Technology","authors":"S. Idris, Usman Mohammed, Jaafaru Sanusi, Sadiq Thomas","doi":"10.1109/ICECCO48375.2019.9043201","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043201","url":null,"abstract":"The fifth-generation (5G) mobile network is the next paradigm shift in the revolutionary era of the wireless communication technologies that will break the backward compatibility of today’s communication systems. Visible Light Communication (VLC) and Light Fidelity (LiFi) technologies are among the potential candidates that are expected to be utilized in the future 5G networks due to their indoor energy-efficient communications. Realized by Light Emitting Diodes (LEDs), VLC and LiFi possesses a number of prominent features to meet the highly demanding requirements of ultrahigh-speed, massive Multiple-Input Multiple-Output (MIMO) device connectivity, ultra-low-latency, ultra-high reliable and low energy consumption for 5G networks. This paper provides an overview contributions of VLC and LiFi towards 5G networks. Furthermore, we explain how VLC and LiFi can successfully provide effective solutions for the emerging 5G networks.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Using Solar Photovoltaic Systems to Significantly Reduce Power Production Problems in Nigeria and Create a Greener Environment 利用太阳能光伏系统显著减少尼日利亚的电力生产问题,创造更绿色的环境
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043257
Onyedikachi Vincent Okereke, Fatima Aliyu, Jonathan Dangwaran, Sadiq Thomas, Biliyok Akawu Shekari, Hussein U. Suleiman
As the world develops it looks for a greener way to produce energy. Here we take a look at the present and previous ways in which Nigeria produces energy and we compare with a particular alternative renewable source, solar photovoltaic system. Solar photovoltaic system uses a method of photoelectric effect in order to convert the energy from the sun into electricity by absorbing and utilizing it. We go further in this project by reviewing some calculations to see how solar energy compares to other forms of electricity supply over a period of 20 years. Finally, reasons were given why it is preferable to use solar PV systems as compared to other forms.
随着世界的发展,人们正在寻找一种更环保的方式来生产能源。在这里,我们来看看尼日利亚目前和以前生产能源的方式,并与一种特殊的可替代可再生能源太阳能光伏系统进行比较。太阳能光伏系统是利用光电效应的方法,通过吸收和利用太阳的能量,将其转化为电能。在这个项目中,我们将进一步回顾一些计算,看看在20年的时间里,太阳能与其他形式的电力供应是如何比较的。最后,给出了与其他形式相比,为什么使用太阳能光伏系统更可取的原因。
{"title":"Using Solar Photovoltaic Systems to Significantly Reduce Power Production Problems in Nigeria and Create a Greener Environment","authors":"Onyedikachi Vincent Okereke, Fatima Aliyu, Jonathan Dangwaran, Sadiq Thomas, Biliyok Akawu Shekari, Hussein U. Suleiman","doi":"10.1109/ICECCO48375.2019.9043257","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043257","url":null,"abstract":"As the world develops it looks for a greener way to produce energy. Here we take a look at the present and previous ways in which Nigeria produces energy and we compare with a particular alternative renewable source, solar photovoltaic system. Solar photovoltaic system uses a method of photoelectric effect in order to convert the energy from the sun into electricity by absorbing and utilizing it. We go further in this project by reviewing some calculations to see how solar energy compares to other forms of electricity supply over a period of 20 years. Finally, reasons were given why it is preferable to use solar PV systems as compared to other forms.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133788562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Methods for Filter Extraction in Tomato fruits 番茄果实过滤提取的深度学习方法
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043283
F. I. Lawan, L. Ismaila, Steve A. Adeshina, H. I. Muhammed, L. Csató
In effort to productively utilize the exponential growth of image analysis and learning capability of Neural Networks (NN), we present our work which is dedicated to developing and training a deep neural network to extract meaningful patterns from a set of labeled data i.e. making generalizations. We show that Deep Neural Networks (DNNs) can learn feature representations that can be successfully applied in a wide spectrum of application domains. We showed how DNNs are applied to classification problems, grading of fresh tomato fruits based on their physical qualities using supervised learning approach. We achieved a result of about 60% accuracy using our local dataset which is quiet reasonable than using other standardized dataset as in the case of other researchers. Additionally, we are very sure of getting better result by fine-tuning some of our parameters because out network learns to generalize as the number iterations increases and so also the accuracy of predictions.
为了有效地利用神经网络(NN)的图像分析和学习能力的指数增长,我们介绍了我们的工作,致力于开发和训练一个深度神经网络,以从一组标记数据中提取有意义的模式,即进行泛化。我们表明,深度神经网络(dnn)可以学习特征表示,可以成功地应用于广泛的应用领域。我们展示了如何将dnn应用于分类问题,使用监督学习方法根据新鲜番茄果实的物理质量对其进行分级。在其他研究人员的情况下,我们使用本地数据集实现了大约60%的准确率,这比使用其他标准化数据集更加合理。此外,我们非常确信通过微调我们的一些参数可以得到更好的结果,因为我们的网络会随着迭代次数的增加而学习泛化,因此预测的准确性也会提高。
{"title":"Deep Learning Methods for Filter Extraction in Tomato fruits","authors":"F. I. Lawan, L. Ismaila, Steve A. Adeshina, H. I. Muhammed, L. Csató","doi":"10.1109/ICECCO48375.2019.9043283","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043283","url":null,"abstract":"In effort to productively utilize the exponential growth of image analysis and learning capability of Neural Networks (NN), we present our work which is dedicated to developing and training a deep neural network to extract meaningful patterns from a set of labeled data i.e. making generalizations. We show that Deep Neural Networks (DNNs) can learn feature representations that can be successfully applied in a wide spectrum of application domains. We showed how DNNs are applied to classification problems, grading of fresh tomato fruits based on their physical qualities using supervised learning approach. We achieved a result of about 60% accuracy using our local dataset which is quiet reasonable than using other standardized dataset as in the case of other researchers. Additionally, we are very sure of getting better result by fine-tuning some of our parameters because out network learns to generalize as the number iterations increases and so also the accuracy of predictions.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1645 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115832774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rain Induced Attenuation Prediction in the Ku Band of Nigerian Communication Satellite over Abuja Earth Station 阿布贾地面站上空尼日利亚通信卫星Ku波段雨致衰减预报
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043291
Abubakar Umar Turaki, Gokhan Koyunlu, Nyangwarimam Obadiah Ali, Abubakar Idrissa, G. Sani, Omotayo Oshiga
Atmospheric propagation faces signal degradation in satellite communication services operating in frequencies of Ku-band, Ka-band and above. This effect is caused by rain, storms, and other unfavorable atmospheric conditions that bring about losses along the entire link path from space to earth. This study examined the impact of rain and predicts its induced attenuation on broadband satellite links in Abuja Nigeria. The point rainfall data was collected for a period of four years, and 1-min rainfall rate extracted. Annual rainfall rate was quantified to fall within 120mm/h and the effect of rain on broadband satellite link operating on Ku band frequency was evaluated to an average induced attenuation of17 dB.
在ku波段、ka波段及以上频率的卫星通信业务中,大气传播面临信号衰减。这种效应是由降雨、风暴和其他不利的大气条件造成的,这些条件会导致从太空到地球的整个链路路径上的损耗。这项研究检查了降雨的影响,并预测了其对尼日利亚阿布贾宽带卫星链路的衰减。采集4年的点雨量数据,提取1 min降雨率。年降雨量被量化为120mm/h以内,降雨对Ku波段宽带卫星链路的影响被评估为平均诱导衰减17db。
{"title":"Rain Induced Attenuation Prediction in the Ku Band of Nigerian Communication Satellite over Abuja Earth Station","authors":"Abubakar Umar Turaki, Gokhan Koyunlu, Nyangwarimam Obadiah Ali, Abubakar Idrissa, G. Sani, Omotayo Oshiga","doi":"10.1109/ICECCO48375.2019.9043291","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043291","url":null,"abstract":"Atmospheric propagation faces signal degradation in satellite communication services operating in frequencies of Ku-band, Ka-band and above. This effect is caused by rain, storms, and other unfavorable atmospheric conditions that bring about losses along the entire link path from space to earth. This study examined the impact of rain and predicts its induced attenuation on broadband satellite links in Abuja Nigeria. The point rainfall data was collected for a period of four years, and 1-min rainfall rate extracted. Annual rainfall rate was quantified to fall within 120mm/h and the effect of rain on broadband satellite link operating on Ku band frequency was evaluated to an average induced attenuation of17 dB.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132929017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DyRED: An Enhanced Random Early Detection Based on a new Adaptive Congestion Control 基于一种新的自适应拥塞控制的增强随机早期检测
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043276
Sunday Barde Danladi, Faruku Umar Ambursa
Over the years congestion has been a major issue affecting the internet leading to an increase in packet loss and delay. Researchers have proposed different algorithms to address the issue of congestion from Drop Tail, Early Random Drop to Active Queue Management (AQM). Random Early Detection (RED) is the first Active Queue Management (AQM) technique that was developed to support transport-layer congestion and decrease the impacts of network congestion on the router buffer. The idea behind RED is to sense and detect incipient congestion early and notify connections of congestion either by dropping packets arriving or by reducing its sending rate. Although various other AQM techniques have been proposed by researchers, RED is still the most commonly used algorithm for congestion avoidance and researches is still ongoing to enhance the performance of RED. In this paper, we have developed an extension to RED to address the limitation of RED and the algorithm is then compared with RED under various network scenarios. The results of the evaluation shows that the new method has outperformed RED.
多年来,拥塞一直是影响互联网的主要问题,导致数据包丢失和延迟增加。研究人员提出了不同的算法来解决拥塞问题,从丢尾、早期随机丢丢到主动队列管理(AQM)。随机早期检测(RED)是第一个主动队列管理(AQM)技术,它是为了支持传输层拥塞和减少网络拥塞对路由器缓冲区的影响而开发的。RED背后的思想是早期感知和检测早期拥塞,并通过丢弃到达的数据包或降低其发送速率来通知连接拥塞。尽管研究者们已经提出了各种各样的其他AQM技术,但RED仍然是最常用的拥塞避免算法,并且研究仍在继续提高RED的性能。在本文中,我们开发了RED的扩展以解决RED的局限性,然后在各种网络场景下将该算法与RED进行比较。评价结果表明,新方法优于RED方法。
{"title":"DyRED: An Enhanced Random Early Detection Based on a new Adaptive Congestion Control","authors":"Sunday Barde Danladi, Faruku Umar Ambursa","doi":"10.1109/ICECCO48375.2019.9043276","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043276","url":null,"abstract":"Over the years congestion has been a major issue affecting the internet leading to an increase in packet loss and delay. Researchers have proposed different algorithms to address the issue of congestion from Drop Tail, Early Random Drop to Active Queue Management (AQM). Random Early Detection (RED) is the first Active Queue Management (AQM) technique that was developed to support transport-layer congestion and decrease the impacts of network congestion on the router buffer. The idea behind RED is to sense and detect incipient congestion early and notify connections of congestion either by dropping packets arriving or by reducing its sending rate. Although various other AQM techniques have been proposed by researchers, RED is still the most commonly used algorithm for congestion avoidance and researches is still ongoing to enhance the performance of RED. In this paper, we have developed an extension to RED to address the limitation of RED and the algorithm is then compared with RED under various network scenarios. The results of the evaluation shows that the new method has outperformed RED.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117302565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Machine Learning Classification Algorithms for Adware in Android Devices: A Comparative Evaluation and Analysis Android设备中广告软件的机器学习分类算法:比较评价与分析
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043288
Joseph Yisa Ndagi, J. Alhassan
Exponential growth experienced in Internet usage has paved the way to exploit users of the Internet, a phishing attack is one of the means that can be used to obtained victim confidential details unwittingly across the Internet. A high false-positive rate and low accuracy have been a setback in phishing detection. In this research 17 different supervised learning techniques such as RandomForest, Systematically Developed Forest (SysFor), Spectral Areas and Ratios Classifier (SPAARC), Reduces Error Pruning Tree (RepTree), RandomTree, Logic Model Tree (LMT), Forest by Penalizing Attributes (ForestPA), JRip, PART, Nearest Neighbor with Generalization (NNge), One Rule (OneR), AdaBoostM1, RotationForest, LogitBoost, RseslibKnn, Library for Support Vector Machine (LibSVM), and BayesNet were employed to achieve the comparative analysis of machine classifier. The performance of the classifier algorithms was rated using Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operation Characteristics Area, Root Relative Squared Error False Positive Rate and True Positive Rate using WEKA data mining tool. The research revealed that quite several classifiers also exist which if properly explored will yield more accurate results for phishing detection. RandomForest was found to be an excellent classifier that gives the best accuracy of 0.9838 and a false positive rate of 0.017. The comparative analysis result indicates the achievement of low false-positive rate for phishing classification which suggests that anti-phishing application developer can implement the machine learning classification algorithm that was discovered to be the best in this study to enhance the feature of phishing attack detection and classification.
互联网使用的指数级增长为利用互联网用户铺平了道路,网络钓鱼攻击是可以用来在互联网上不知不觉地获取受害者机密信息的手段之一。假阳性率高、准确率低一直是网络钓鱼检测的瓶颈。在这项研究中,17种不同的监督学习技术,如随机森林、系统开发森林(SysFor)、光谱区域和比率分类器(SPAARC)、减少错误修剪树(RepTree)、随机树、逻辑模型树(LMT)、惩罚属性森林(ForestPA)、JRip、PART、最近邻泛化(NNge)、一规则(OneR)、AdaBoostM1、RotationForest、LogitBoost、RseslibKnn、支持向量机库(LibSVM)、和BayesNet来实现机器分类器的对比分析。采用WEKA数据挖掘工具对分类器算法的准确率、精密度、召回率、F-Measure、均方根误差、接收者操作特征面积、均方根误差假阳性率和真阳性率进行评分。研究表明,还有相当多的分类器存在,如果对它们进行适当的探索,将为网络钓鱼检测产生更准确的结果。随机森林被发现是一个优秀的分类器,它给出了0.9838的最佳准确率和0.017的假阳性率。对比分析结果表明,网络钓鱼分类的误报率较低,这表明反网络钓鱼应用开发者可以实现本研究中发现的最好的机器学习分类算法,以增强网络钓鱼攻击检测和分类的特性。
{"title":"Machine Learning Classification Algorithms for Adware in Android Devices: A Comparative Evaluation and Analysis","authors":"Joseph Yisa Ndagi, J. Alhassan","doi":"10.1109/ICECCO48375.2019.9043288","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043288","url":null,"abstract":"Exponential growth experienced in Internet usage has paved the way to exploit users of the Internet, a phishing attack is one of the means that can be used to obtained victim confidential details unwittingly across the Internet. A high false-positive rate and low accuracy have been a setback in phishing detection. In this research 17 different supervised learning techniques such as RandomForest, Systematically Developed Forest (SysFor), Spectral Areas and Ratios Classifier (SPAARC), Reduces Error Pruning Tree (RepTree), RandomTree, Logic Model Tree (LMT), Forest by Penalizing Attributes (ForestPA), JRip, PART, Nearest Neighbor with Generalization (NNge), One Rule (OneR), AdaBoostM1, RotationForest, LogitBoost, RseslibKnn, Library for Support Vector Machine (LibSVM), and BayesNet were employed to achieve the comparative analysis of machine classifier. The performance of the classifier algorithms was rated using Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operation Characteristics Area, Root Relative Squared Error False Positive Rate and True Positive Rate using WEKA data mining tool. The research revealed that quite several classifiers also exist which if properly explored will yield more accurate results for phishing detection. RandomForest was found to be an excellent classifier that gives the best accuracy of 0.9838 and a false positive rate of 0.017. The comparative analysis result indicates the achievement of low false-positive rate for phishing classification which suggests that anti-phishing application developer can implement the machine learning classification algorithm that was discovered to be the best in this study to enhance the feature of phishing attack detection and classification.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116316654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Analytics in Healthcare: A Review 医疗保健中的大数据分析:综述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043183
N. C. Onyemachi, O. Nonyelum
The amount of data being generated in the healthcare industry is growing at a very fast rate. This has generated immense interest in leveraging the availability of healthcare data to improve health outcomes and reduce costs. Big data analytics has earned a remarkable interest in the health sector as it could be used in the diagnosis and prediction of diseases. This paper is a review of current big data analytics techniques in healthcare, their applications, challenges and solutions to those challenges.
医疗保健行业产生的数据量正在以非常快的速度增长。这引起了人们对利用医疗保健数据的可用性来改善健康结果和降低成本的极大兴趣。大数据分析在卫生领域引起了极大的兴趣,因为它可以用于疾病的诊断和预测。本文回顾了当前医疗保健领域的大数据分析技术、它们的应用、挑战和解决这些挑战的方法。
{"title":"Big Data Analytics in Healthcare: A Review","authors":"N. C. Onyemachi, O. Nonyelum","doi":"10.1109/ICECCO48375.2019.9043183","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043183","url":null,"abstract":"The amount of data being generated in the healthcare industry is growing at a very fast rate. This has generated immense interest in leveraging the availability of healthcare data to improve health outcomes and reduce costs. Big data analytics has earned a remarkable interest in the health sector as it could be used in the diagnosis and prediction of diseases. This paper is a review of current big data analytics techniques in healthcare, their applications, challenges and solutions to those challenges.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116985334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Enhanced Face Recognition Method for Lighting Problem 一种针对光照问题的增强人脸识别方法
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043199
Cemil Turan, A. Aitimov, B. Kynabay, Aimoldir Aldabergen
One of the most popular tool implemented in face recognition issues is Principal Component Analysis (PCA) which is successfully used in machine learning and data analysis. However, if the images are not regular with some factors that affect the image recognition accuracy such as variation of facial expressions, different poses or lighting problems, this technique may show some deficiencies. In this work, different kinds of methods were implemented by combining different preprocessing techniques to evaluate and compare them under different lighting conditions of images. In order to have the same lighting conditions for every image, the methods were applied to them after PCA processing. As a result, the face recognition accuracy was improved by means of implementing the techniques separately or in combination.
在人脸识别问题中实现的最流行的工具之一是主成分分析(PCA),它成功地应用于机器学习和数据分析。但是,如果图像不规律,并且存在一些影响图像识别精度的因素,例如面部表情的变化,姿势的不同或光线的问题,则该技术可能会出现一些不足。在本工作中,通过结合不同的预处理技术实现不同的方法,在不同的图像光照条件下对它们进行评估和比较。为了使每幅图像具有相同的光照条件,将该方法应用于经过PCA处理的图像。结果表明,通过单独或组合实现这些技术,可以提高人脸识别的准确性。
{"title":"An Enhanced Face Recognition Method for Lighting Problem","authors":"Cemil Turan, A. Aitimov, B. Kynabay, Aimoldir Aldabergen","doi":"10.1109/ICECCO48375.2019.9043199","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043199","url":null,"abstract":"One of the most popular tool implemented in face recognition issues is Principal Component Analysis (PCA) which is successfully used in machine learning and data analysis. However, if the images are not regular with some factors that affect the image recognition accuracy such as variation of facial expressions, different poses or lighting problems, this technique may show some deficiencies. In this work, different kinds of methods were implemented by combining different preprocessing techniques to evaluate and compare them under different lighting conditions of images. In order to have the same lighting conditions for every image, the methods were applied to them after PCA processing. As a result, the face recognition accuracy was improved by means of implementing the techniques separately or in combination.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123467664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Handwritten Digit Recognition method using Deep Learning Algorithm 改进的基于深度学习算法的手写数字识别方法
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043235
R. Jantayev, Y. Amirgaliyev
One of the essential problems in Computer Vision is identification and classification of important objects. While exhaustive work done on image processing for computation and accuracy performance it is still limited by ambiguity. In current work we compared traditional machine learning method versus Deep Learning model, namely Convolutional Neural Network(CNN), on Handwritten Digit Recognition using MNIST dataset. We showed that CNN algorithm reaches higher recognition accuracy than Support Vector Machine(SVM).
重要目标的识别与分类是计算机视觉的核心问题之一。虽然在图像处理的计算和精度性能方面做了大量的工作,但仍然受到模糊性的限制。在目前的工作中,我们比较了传统的机器学习方法和深度学习模型,即卷积神经网络(CNN),在使用MNIST数据集的手写数字识别上。我们发现CNN算法比支持向量机(SVM)的识别精度更高。
{"title":"Improved Handwritten Digit Recognition method using Deep Learning Algorithm","authors":"R. Jantayev, Y. Amirgaliyev","doi":"10.1109/ICECCO48375.2019.9043235","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043235","url":null,"abstract":"One of the essential problems in Computer Vision is identification and classification of important objects. While exhaustive work done on image processing for computation and accuracy performance it is still limited by ambiguity. In current work we compared traditional machine learning method versus Deep Learning model, namely Convolutional Neural Network(CNN), on Handwritten Digit Recognition using MNIST dataset. We showed that CNN algorithm reaches higher recognition accuracy than Support Vector Machine(SVM).","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection 机器学习算法在超文本传输协议分布式拒绝服务入侵检测中的性能评估
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043262
Rukayya Umar, M. Olalere, I. Idris, Raji Abdullahi Egigogo, G. Bolarin
As this paper has expounded, the techniques against DDoS attacks borrow greatly from the already tested traditional techniques. However, no technique has proven to be perfect towards the full detection and prevention of DDoS attacks. Intrusion detection system (IDS) using machine learning approach is one of the implemented solutions against harmful attacks. However, achieving high detection accuracy with minimum false positive rate remains issue that still need to be addressed. Consequently, this study carried out an experimental evaluation on various machine learning algorithms such as Random forest J48, Naïve Bayes, IBK and Multilayer perception on HTTP DDoS attack dataset. The dataset has a total number of 17512 instances which constituted normal (10256) and HTTP DDoS (7256) attack with 21 features. The implemented Performance evaluation revealed that Random Forest algorithm performed best with an accuracy of 99.94% and minimum false positive rate of 0.001%.
正如本文所阐述的那样,针对DDoS攻击的技术在很大程度上借鉴了已经经过测试的传统技术。然而,没有任何技术被证明是完美的全面检测和预防DDoS攻击。采用机器学习方法的入侵检测系统(IDS)是对抗有害攻击的实现方案之一。然而,如何以最小的假阳性率实现高检测精度仍然是一个需要解决的问题。因此,本研究在HTTP DDoS攻击数据集上对Random forest J48、Naïve Bayes、IBK和Multilayer perception等多种机器学习算法进行了实验评估。该数据集共有17512个实例,分别构成正常攻击(10256)和HTTP DDoS攻击(7256),共有21个特征。实现的性能评估表明,随机森林算法的准确率为99.94%,假阳性率最低为0.001%。
{"title":"Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection","authors":"Rukayya Umar, M. Olalere, I. Idris, Raji Abdullahi Egigogo, G. Bolarin","doi":"10.1109/ICECCO48375.2019.9043262","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043262","url":null,"abstract":"As this paper has expounded, the techniques against DDoS attacks borrow greatly from the already tested traditional techniques. However, no technique has proven to be perfect towards the full detection and prevention of DDoS attacks. Intrusion detection system (IDS) using machine learning approach is one of the implemented solutions against harmful attacks. However, achieving high detection accuracy with minimum false positive rate remains issue that still need to be addressed. Consequently, this study carried out an experimental evaluation on various machine learning algorithms such as Random forest J48, Naïve Bayes, IBK and Multilayer perception on HTTP DDoS attack dataset. The dataset has a total number of 17512 instances which constituted normal (10256) and HTTP DDoS (7256) attack with 21 features. The implemented Performance evaluation revealed that Random Forest algorithm performed best with an accuracy of 99.94% and minimum false positive rate of 0.001%.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 15th International Conference on Electronics, Computer and Computation (ICECCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1