首页 > 最新文献

2019 15th International Conference on Electronics, Computer and Computation (ICECCO)最新文献

英文 中文
Enhanced Two-Phase Virtual Machine Placement Scheme for Cloud Computing Datacenters 云计算数据中心增强的两阶段虚拟机布局方案
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043260
Rahimatu Hayatu Yahaya, Faruku Umar Ambursa
Over the years, Cloud Computing has offered many benefits such as providing services to end-users on demand. However, infrastructure as service providers is faced with the challenge of handling many end-users’ requests for virtual resources. In this regard, one of the key challenges of resource allocation is Virtual Machine Placement (VMP) problem. However, the dynamicity and uncertainty of Cloud platform and the unpredictable nature of the end-users’ requests have rendered the VMP problem more interesting. Recently, a two-phase Virtual Machine Placement scheme, combining the benefits of both online (dynamic) and offline (static) formulations were presented. The proposed scheme is based on a prediction-based triggering method used to determine when to trigger the VMP reconfiguration phase. However, the existing method leads to a less accurate prediction outcome, therefore, results in less optimal solution from the reconfiguration phase. This work proposes an enhanced two-phase Virtual Machine Placement strategy based on novel triggering method. The proposed triggering method considers Damped trend exponential smoothing method. An experimental evaluation is performed against the previous approach, considering 160 scenarios. The experimental results show that the proposed work achieved a minimum cost function when compared with the benchmark approach.
多年来,云计算提供了许多好处,例如按需向最终用户提供服务。然而,作为服务提供者的基础设施面临着处理许多最终用户对虚拟资源请求的挑战。在这方面,资源分配的主要挑战之一是虚拟机布局问题。然而,云平台的动态性和不确定性以及最终用户请求的不可预测性使得VMP问题变得更加有趣。最近,提出了一种结合在线(动态)和离线(静态)两种方式优点的两阶段虚拟机布局方案。该方案基于一种基于预测的触发方法,用于确定何时触发VMP重构阶段。然而,现有的方法导致预测结果的准确性较低,从而导致重构阶段的最优解较少。本文提出了一种基于新型触发方法的增强两阶段虚拟机布局策略。所提出的触发方法考虑了阻尼趋势指数平滑法。对之前的方法进行了实验评估,考虑了160个场景。实验结果表明,与基准方法相比,该方法实现了最小代价函数。
{"title":"Enhanced Two-Phase Virtual Machine Placement Scheme for Cloud Computing Datacenters","authors":"Rahimatu Hayatu Yahaya, Faruku Umar Ambursa","doi":"10.1109/ICECCO48375.2019.9043260","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043260","url":null,"abstract":"Over the years, Cloud Computing has offered many benefits such as providing services to end-users on demand. However, infrastructure as service providers is faced with the challenge of handling many end-users’ requests for virtual resources. In this regard, one of the key challenges of resource allocation is Virtual Machine Placement (VMP) problem. However, the dynamicity and uncertainty of Cloud platform and the unpredictable nature of the end-users’ requests have rendered the VMP problem more interesting. Recently, a two-phase Virtual Machine Placement scheme, combining the benefits of both online (dynamic) and offline (static) formulations were presented. The proposed scheme is based on a prediction-based triggering method used to determine when to trigger the VMP reconfiguration phase. However, the existing method leads to a less accurate prediction outcome, therefore, results in less optimal solution from the reconfiguration phase. This work proposes an enhanced two-phase Virtual Machine Placement strategy based on novel triggering method. The proposed triggering method considers Damped trend exponential smoothing method. An experimental evaluation is performed against the previous approach, considering 160 scenarios. The experimental results show that the proposed work achieved a minimum cost function when compared with the benchmark approach.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Four-Factors Authentication Algorithm For Preventing Fake Attendance 防止假出勤的四因素认证算法
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043287
Asim Balarabe Yazid, Moussa Mahamat Boukar, Salisu Ibrahim, Isa Muslu
Taking attendance is a day-to-day chore for every organization, human resources, and class teachers, traditionally people take attendance manually either by calling out names or allowing the user to sign the attendance sheets or clock in and out. The problem, however, people most likely sign the attendance on behalf of their colleagues that are absent. This makes the traditional method very vulnerable and may affect the integrity of the system. Researchers come up with different ideas and methods of minimizing fake attendance to improve efficiency in terms of integrity, time and cost. After reviewing the existing system’s strength and vulnerabilities, we are proposing a multi-factor authentication algorithm which makes use of QR code, GPS, and Facial recognition. The user will make use of their personal mobile phone. The research of this proposed is still ongoing, we are hoping the proposed technique can be applied to various attendance systems such as schools, universities, and organizations.
考勤是每个组织、人力资源和班主任的日常琐事,传统上人们要么通过点名,要么允许用户在考勤表上签名或打卡考勤。然而,问题是,人们很可能代表缺席的同事签到。这使得传统的方法非常脆弱,可能会影响系统的完整性。研究人员提出了不同的想法和方法来减少假出勤,以提高诚信,时间和成本方面的效率。在回顾了现有系统的优势和漏洞后,我们提出了一种利用二维码、GPS和面部识别的多因素认证算法。用户将使用他们的个人移动电话。本建议的研究仍在进行中,我们希望所提出的技术可以应用于各种考勤系统,如学校,大学和组织。
{"title":"Four-Factors Authentication Algorithm For Preventing Fake Attendance","authors":"Asim Balarabe Yazid, Moussa Mahamat Boukar, Salisu Ibrahim, Isa Muslu","doi":"10.1109/ICECCO48375.2019.9043287","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043287","url":null,"abstract":"Taking attendance is a day-to-day chore for every organization, human resources, and class teachers, traditionally people take attendance manually either by calling out names or allowing the user to sign the attendance sheets or clock in and out. The problem, however, people most likely sign the attendance on behalf of their colleagues that are absent. This makes the traditional method very vulnerable and may affect the integrity of the system. Researchers come up with different ideas and methods of minimizing fake attendance to improve efficiency in terms of integrity, time and cost. After reviewing the existing system’s strength and vulnerabilities, we are proposing a multi-factor authentication algorithm which makes use of QR code, GPS, and Facial recognition. The user will make use of their personal mobile phone. The research of this proposed is still ongoing, we are hoping the proposed technique can be applied to various attendance systems such as schools, universities, and organizations.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122232740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparison of the development of 3D printing in Kazakhstan relative to the world level 哈萨克斯坦3D打印发展与世界水平的比较
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043212
Madina U.Alimanova, Nazym R.Akhmetova, Bek Bazatbekov, S. Yurchenko
Additive technology is a fast-growing industry that is currently available to everyone. While in developed countries they enjoy the full benefits of 3D printing, in Kazakhstan, not many people know about the charm of its use. 3D printing in the world has developed in various fields of use, from furniture in your home to a heart made of biomaterials. Interest in 3D printing in Kazakhstan is also growing, and based on the development scenario in the world, you can make an assumption of how it will develop. Reading this analysis will help to make a summarize what stage relative to other countries is a developing country like Kazakhstan is located.
增材技术是一个快速发展的行业,目前每个人都可以使用。虽然在发达国家,人们享受着3D打印的全部好处,但在哈萨克斯坦,并没有多少人知道其使用的魅力。3D打印在世界范围内已经发展到各个使用领域,从家里的家具到生物材料制成的心脏。哈萨克斯坦对3D打印的兴趣也在增长,根据世界的发展情况,你可以假设它将如何发展。阅读这篇分析将有助于总结像哈萨克斯坦这样的发展中国家相对于其他国家所处的阶段。
{"title":"Comparison of the development of 3D printing in Kazakhstan relative to the world level","authors":"Madina U.Alimanova, Nazym R.Akhmetova, Bek Bazatbekov, S. Yurchenko","doi":"10.1109/ICECCO48375.2019.9043212","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043212","url":null,"abstract":"Additive technology is a fast-growing industry that is currently available to everyone. While in developed countries they enjoy the full benefits of 3D printing, in Kazakhstan, not many people know about the charm of its use. 3D printing in the world has developed in various fields of use, from furniture in your home to a heart made of biomaterials. Interest in 3D printing in Kazakhstan is also growing, and based on the development scenario in the world, you can make an assumption of how it will develop. Reading this analysis will help to make a summarize what stage relative to other countries is a developing country like Kazakhstan is located.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Azimuth Position Control for Deep Space Antenna using Fuzzy Logic Controller 基于模糊控制器的深空天线方位位置控制
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043208
Halima S. Yakubu, Sadiq Thomas, S. Hussein, V. Anye, Gokhan Koyunlu, Omotayo Oshiga
The Deep Space Antennas are essential in achieving communication over very large distances. However, the pointing accuracy of this antenna needs to be as precise as possible to enable effective communication with the satellite. Therefore, in this research, the pointing accuracy for a Deep Space Antenna using Fuzzy logic control technique is addressed. In this work, a fuzzy logic controller for the azimuth position control for deep space antenna was designed and simulated using Simulink and MATLAB. Furthermore, the result was compared to that of a PID controller for the same system and it shows that the fuzzy controller has a relatively better performance with 0 percent overshoot, a settling time of 7. 4146s, and a steady-state error of 0.004358. Therefore, the antenna will be able to track the satellite with ±0.004358 pointing accuracy.
深空天线对于实现远距离通信至关重要。然而,该天线的指向精度需要尽可能精确,以实现与卫星的有效通信。因此,本文研究了利用模糊逻辑控制技术实现深空天线的指向精度问题。本文设计了一种用于深空天线方位位置控制的模糊控制器,并利用Simulink和MATLAB对其进行了仿真。此外,将结果与同一系统的PID控制器进行了比较,结果表明模糊控制器具有相对较好的性能,超调量为0%,稳定时间为7。稳态误差为0.004358。因此,天线将能够以±0.004358的指向精度跟踪卫星。
{"title":"Azimuth Position Control for Deep Space Antenna using Fuzzy Logic Controller","authors":"Halima S. Yakubu, Sadiq Thomas, S. Hussein, V. Anye, Gokhan Koyunlu, Omotayo Oshiga","doi":"10.1109/ICECCO48375.2019.9043208","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043208","url":null,"abstract":"The Deep Space Antennas are essential in achieving communication over very large distances. However, the pointing accuracy of this antenna needs to be as precise as possible to enable effective communication with the satellite. Therefore, in this research, the pointing accuracy for a Deep Space Antenna using Fuzzy logic control technique is addressed. In this work, a fuzzy logic controller for the azimuth position control for deep space antenna was designed and simulated using Simulink and MATLAB. Furthermore, the result was compared to that of a PID controller for the same system and it shows that the fuzzy controller has a relatively better performance with 0 percent overshoot, a settling time of 7. 4146s, and a steady-state error of 0.004358. Therefore, the antenna will be able to track the satellite with ±0.004358 pointing accuracy.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handover in Hybrid LiFi and WiFi Networks 混合LiFi和WiFi网络的切换
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043251
Jaafaru Sanusi, S. Idris, A. Aibinu, Steve A. Adeshina, A. Obadiah
Light Fidelity (LiFi) is a form of Visible Light Communication (VLC) that provides high-speed, bidirectional and fully networked wireless communication systems using low power Light Emitting Diodes (LEDs) light bulbs. As a reliable, license-free, high-speed and fully bi-directional wireless networked, LiFi is a potential technology to the Radio Frequency (RF) based systems and beyond mobile networks. As the spectrum utilized by Li-Fi does not overlap with that of used by the RF, a hybrid LiFi and wireless fidelity (WiFi) networks can provide high-speed data transmission that will improve the Quality of Service (QoS) and Quality Experience (Qoe) of the internet users. However, in such hybrid network systems, intermittent light-path blockages and user mobility may degrade the system throughput due to frequent handover among the networks. Different mechanisms to mitigate the frequent handover issue in hybrid LiFi and WiFi networks have been proposed in the literature. This paper provides an overview concept of hybrid handover in LiFi/WiFi networks. Furthermore, related works done in this field are also discussed. Finally, comparison between LiFi and WiFi technologies is also provided.
光保真度(LiFi)是可见光通信(VLC)的一种形式,它使用低功率发光二极管(led)灯泡提供高速、双向和完全联网的无线通信系统。作为一种可靠的、免许可的、高速的、完全双向的无线网络,LiFi是基于射频(RF)系统和移动网络之外的一种潜在技术。由于Li-Fi使用的频谱与RF使用的频谱不重叠,因此混合Li-Fi和无线保真度(WiFi)网络可以提供高速数据传输,从而提高互联网用户的服务质量(QoS)和质量体验(Qoe)。然而,在这种混合网络系统中,由于网络之间的频繁切换,间歇性光路阻塞和用户移动性可能会降低系统吞吐量。文献中提出了不同的机制来缓解混合LiFi和WiFi网络中的频繁切换问题。本文概述了LiFi/WiFi网络中混合切换的概念。并对该领域的相关工作进行了讨论。最后,对LiFi和WiFi技术进行了比较。
{"title":"Handover in Hybrid LiFi and WiFi Networks","authors":"Jaafaru Sanusi, S. Idris, A. Aibinu, Steve A. Adeshina, A. Obadiah","doi":"10.1109/ICECCO48375.2019.9043251","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043251","url":null,"abstract":"Light Fidelity (LiFi) is a form of Visible Light Communication (VLC) that provides high-speed, bidirectional and fully networked wireless communication systems using low power Light Emitting Diodes (LEDs) light bulbs. As a reliable, license-free, high-speed and fully bi-directional wireless networked, LiFi is a potential technology to the Radio Frequency (RF) based systems and beyond mobile networks. As the spectrum utilized by Li-Fi does not overlap with that of used by the RF, a hybrid LiFi and wireless fidelity (WiFi) networks can provide high-speed data transmission that will improve the Quality of Service (QoS) and Quality Experience (Qoe) of the internet users. However, in such hybrid network systems, intermittent light-path blockages and user mobility may degrade the system throughput due to frequent handover among the networks. Different mechanisms to mitigate the frequent handover issue in hybrid LiFi and WiFi networks have been proposed in the literature. This paper provides an overview concept of hybrid handover in LiFi/WiFi networks. Furthermore, related works done in this field are also discussed. Finally, comparison between LiFi and WiFi technologies is also provided.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116583512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Efficient Energy Management in Buildings Using IoT – A Survey 使用物联网的高效建筑能源管理-一项调查
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043231
Mustapha Hafiz Bola, E. N. Onwuka, S. Zubair
Despite so many efforts made to forestall energy crisis in the past, the present-day energy problem is getting worse by day particularly in Africa. To overcome this situation, researchers are developing various energy efficient methods, among these methods, efficient power consumption is imperative. With the rise in power consumption in every part of the world and the subsequent amount of power theft, over usage of power, and unnecessary power wastage, it becomes obvious that electric power consumption in buildings need to be monitored and controlled. Efficient energy management will go a long way to help both the consumers and the power utility company and will positively impact the looming global energy crisis. The advent of Internet of Things (IoT) technology is advancing automation of systems by infusing intelligence into many processes. In this paper, a critical survey of IoT based automated energy management in buildings is presented. The paper reviewed various IoT applications in the area of building energy management and the recording of energy consumption data, which we consider very important in system planning and rehabilitation.
尽管过去为防止能源危机作出了许多努力,但当今的能源问题日益严重,特别是在非洲。为了克服这种情况,研究人员正在开发各种节能方法,在这些方法中,节能是必不可少的。随着世界各地用电量的增加,以及随之而来的大量窃电、过度用电和不必要的电力浪费,很明显,需要对建筑物的电力消耗进行监测和控制。高效的能源管理将大大帮助消费者和电力公司,并将积极影响迫在眉睫的全球能源危机。物联网(IoT)技术的出现通过将智能注入许多过程来推进系统的自动化。本文介绍了基于物联网的建筑物自动化能源管理的关键调查。本文回顾了物联网在建筑能源管理和能源消耗数据记录领域的各种应用,我们认为这在系统规划和修复中非常重要。
{"title":"An Efficient Energy Management in Buildings Using IoT – A Survey","authors":"Mustapha Hafiz Bola, E. N. Onwuka, S. Zubair","doi":"10.1109/ICECCO48375.2019.9043231","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043231","url":null,"abstract":"Despite so many efforts made to forestall energy crisis in the past, the present-day energy problem is getting worse by day particularly in Africa. To overcome this situation, researchers are developing various energy efficient methods, among these methods, efficient power consumption is imperative. With the rise in power consumption in every part of the world and the subsequent amount of power theft, over usage of power, and unnecessary power wastage, it becomes obvious that electric power consumption in buildings need to be monitored and controlled. Efficient energy management will go a long way to help both the consumers and the power utility company and will positively impact the looming global energy crisis. The advent of Internet of Things (IoT) technology is advancing automation of systems by infusing intelligence into many processes. In this paper, a critical survey of IoT based automated energy management in buildings is presented. The paper reviewed various IoT applications in the area of building energy management and the recording of energy consumption data, which we consider very important in system planning and rehabilitation.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123620803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid Cryptography Algorithms in Cloud Computing: A Review 云计算中的混合密码算法综述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043254
Sadiq Ahmad, A. Garko
it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.
据观察,大多数人和公司都在向云迁移,因为云更便宜、更方便。对于一些电脑用户来说,找到足够的存储空间来容纳他们获得的所有数据是一个真正的挑战。正因为如此,人们往往会购买大量的数据或更大的空间的硬盘驱动器,仍然面临着存储空间的挑战。有了这种新的云计算技术,人们发现在云上购买大量空间变得更加容易,这种云是指将数据保存到由第三方维护的异地存储系统中。由于所有这些,云用户开始考虑存储在这些由第三方管理的服务器上的数据的安全性,担心数据泄露。为了减少这种数据泄露和许多数据威胁,信息安全是必要的。密码学在信息安全中起着重要的作用。为了向云存储提供安全性,用户使用混合加密而不是单一加密算法。本文从2015年到2019年初对混合密码学进行了研究。本研究检索了与该问题相关的论文,在过滤的基础上考虑了大约20篇。其中,8个是基于用户友好的表格调查,12个是深度调查。本文的主要目的是为密码学领域的新研究者、学生和没有经验的人提供更多的信息。发现的研究不足是忽略用户认证和混合算法实现不当。
{"title":"Hybrid Cryptography Algorithms in Cloud Computing: A Review","authors":"Sadiq Ahmad, A. Garko","doi":"10.1109/ICECCO48375.2019.9043254","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043254","url":null,"abstract":"it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126406846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Epileptic Seizure Prediction in EEG Signals using EMD and DWT 基于EMD和DWT的脑电信号癫痫发作预测
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043270
Marzhan Bekbalanova, Aliya Zhunis, Zhasdauren Duisebekov
In this study, normal (healthy), pre-seizure and seizure states were analyzed using EEG data from BONN database. In this paper, we propose a new method of using SVM, KNN and Decision Tree for classification analysis in order to improve the detection accuracy of seizure. First, due to the presence of significant noise in the EEG signals, for signal pre-processing we performed noise removal. Second, two methods of frequency space transformation were used such as Discrete Wavelet Transform (DWT), separating signal into sub-bands and Empirical Mode Decomposition (EMD) technique to decompose signal into the Intrinsic Mode Functions (IMFs). Before the classification, the statistical moments of the signals in the frequency domain were obtained for feature extraction. Using these features, the performances of Support Vector Machines (SVM), Decision Tree, K-nearest Neighborhood (KNN) classifiers were analyzed. The experiment results show that the most accurate detection of epilepsy was obtained by applying EMD method with classifiers SVM, KNN and Decision Tree, and such algorithm with EMD can achieve accuracy for normal, pre-seizure, and seizure equal to 100%, 100% and 96.67%, respectively.
本研究使用BONN数据库的脑电图数据分析正常(健康)、癫痫发作前和癫痫发作状态。本文提出了一种利用支持向量机、KNN和决策树进行分类分析的新方法,以提高癫痫的检测精度。首先,由于脑电图信号中存在明显的噪声,在信号预处理中我们进行了去噪处理。其次,采用离散小波变换(DWT)和经验模态分解(EMD)两种频率空间变换方法将信号分解为固有模态函数(IMFs)。在分类之前,先获取信号在频域的统计矩进行特征提取。利用这些特征,分析了支持向量机(SVM)、决策树(Decision Tree)和k近邻(KNN)分类器的性能。实验结果表明,结合SVM、KNN和Decision Tree分类器的EMD方法对癫痫的检测准确率最高,其中EMD算法对正常、癫痫发作前和癫痫发作的检测准确率分别达到100%、100%和96.67%。
{"title":"Epileptic Seizure Prediction in EEG Signals using EMD and DWT","authors":"Marzhan Bekbalanova, Aliya Zhunis, Zhasdauren Duisebekov","doi":"10.1109/ICECCO48375.2019.9043270","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043270","url":null,"abstract":"In this study, normal (healthy), pre-seizure and seizure states were analyzed using EEG data from BONN database. In this paper, we propose a new method of using SVM, KNN and Decision Tree for classification analysis in order to improve the detection accuracy of seizure. First, due to the presence of significant noise in the EEG signals, for signal pre-processing we performed noise removal. Second, two methods of frequency space transformation were used such as Discrete Wavelet Transform (DWT), separating signal into sub-bands and Empirical Mode Decomposition (EMD) technique to decompose signal into the Intrinsic Mode Functions (IMFs). Before the classification, the statistical moments of the signals in the frequency domain were obtained for feature extraction. Using these features, the performances of Support Vector Machines (SVM), Decision Tree, K-nearest Neighborhood (KNN) classifiers were analyzed. The experiment results show that the most accurate detection of epilepsy was obtained by applying EMD method with classifiers SVM, KNN and Decision Tree, and such algorithm with EMD can achieve accuracy for normal, pre-seizure, and seizure equal to 100%, 100% and 96.67%, respectively.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126841951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Contingency Analysis of Abuja Transmission Network 阿布贾输电网的应急分析
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043269
B. Saka, Sadiq Thomas, Y. S. Mohammed, I. D. Inuwa, E. A. Aja, S. Hussein
This paper presents the contingency analysis for the Abuja transmission network using DIgSILENT Power Factory software. The contingency analysis showed the results for the worst loading violations from the most severe to the least severe case for both the base case and the case study contingencies. For the base case condition, the most severe continuous loading condition was 200.2% while the least severe continuous loading condition was 93.7%. After the reinforcement of the identified weak section of the network, the security and the stability of the network improved greatly with the most severe continuous loading condition of 138.9% and the least severe continuous loading condition of 80.4%. Contingency analysis for Abuja transmission network was conducted to identify the weakest part of the network and then take measures to ensure the stability of the network.
本文利用DIgSILENT Power Factory软件对阿布贾输电网进行了事故分析。偶然性分析显示了在基本情况和案例研究的偶然性中,从最严重到最不严重的最严重加载违反情况的结果。在基准工况下,最严重连续加载工况为200.2%,最不严重连续加载工况为93.7%。对识别出的网络薄弱段进行加固后,网络的安全性和稳定性有了较大的提高,最严重连续加载条件为138.9%,最轻微连续加载条件为80.4%。对阿布贾输电网进行了权变分析,找出电网的最薄弱环节,采取措施保证电网的稳定运行。
{"title":"Contingency Analysis of Abuja Transmission Network","authors":"B. Saka, Sadiq Thomas, Y. S. Mohammed, I. D. Inuwa, E. A. Aja, S. Hussein","doi":"10.1109/ICECCO48375.2019.9043269","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043269","url":null,"abstract":"This paper presents the contingency analysis for the Abuja transmission network using DIgSILENT Power Factory software. The contingency analysis showed the results for the worst loading violations from the most severe to the least severe case for both the base case and the case study contingencies. For the base case condition, the most severe continuous loading condition was 200.2% while the least severe continuous loading condition was 93.7%. After the reinforcement of the identified weak section of the network, the security and the stability of the network improved greatly with the most severe continuous loading condition of 138.9% and the least severe continuous loading condition of 80.4%. Contingency analysis for Abuja transmission network was conducted to identify the weakest part of the network and then take measures to ensure the stability of the network.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introduction of a System Developed for Increasing the Use of Solar Energy in the Residential Areas "A Rotating Roof Gazebo System" 介绍为增加住宅区内太阳能的使用而开发的系统“旋转屋顶凉亭系统”
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9247074
V. Kiray
In this study, within the scope of the more efficient use of solar energy in settlement areas, the benefits and potential barriers to be generated in the place where electricity is consumed are discussed and a system developed to overcome some of these barriers is introduced. In this system, which is called as Rotating Roof Gazebo System (RRGS), PV panels are placed on the roof of the Gazebo and it is ensured that this roof turns and follows the Sun. In this study, electro-mechanical structure of RRGS was introduced, efficiency and cost were discussed and also the different benefits and aesthetic factor of the system in addition to energy production were mentioned.
在本研究中,在定居地区更有效地利用太阳能的范围内,讨论了在用电地点产生的好处和潜在障碍,并介绍了一种克服其中一些障碍的系统。在这个被称为旋转屋顶凉亭系统(RRGS)的系统中,光伏电池板被放置在凉亭的屋顶上,确保屋顶随着太阳旋转。本文介绍了该系统的机电结构,讨论了该系统的效率和成本,并讨论了该系统的不同效益和美学因素。
{"title":"Introduction of a System Developed for Increasing the Use of Solar Energy in the Residential Areas \"A Rotating Roof Gazebo System\"","authors":"V. Kiray","doi":"10.1109/ICECCO48375.2019.9247074","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9247074","url":null,"abstract":"In this study, within the scope of the more efficient use of solar energy in settlement areas, the benefits and potential barriers to be generated in the place where electricity is consumed are discussed and a system developed to overcome some of these barriers is introduced. In this system, which is called as Rotating Roof Gazebo System (RRGS), PV panels are placed on the roof of the Gazebo and it is ensured that this roof turns and follows the Sun. In this study, electro-mechanical structure of RRGS was introduced, efficiency and cost were discussed and also the different benefits and aesthetic factor of the system in addition to energy production were mentioned.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127915310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 15th International Conference on Electronics, Computer and Computation (ICECCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1