首页 > 最新文献

2019 15th International Conference on Electronics, Computer and Computation (ICECCO)最新文献

英文 中文
Smart Energy Solutions in Power Sector: Overview of the Challenges in Nigeria Perspective 电力行业的智能能源解决方案:尼日利亚面临的挑战概述
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043296
Y. S. Mohammed, Dalhatu Ismail Inuwa, B. Saka, E. A. Aja, Sadiq Thomas, U. Umar
In the last few decades, power sectors are known to be growing faster worldwide with changing climatic condition meanwhile sustainable development is needed to confront some of the challenges. Sustainable energy technologies are one of the numerous requirements in the context of sustainable development. Increasing human population density and urban size requires a corresponding increase in technology-oriented energy development. Smart energy systems are technology-oriented information and communication technologies used in different parts of the world for improvement in access to energy to improve energy generation, transmission and distribution processes. The application of smart systems for energy harvest is a paradigm shift in the current global power sector. A smart application encompasses identifying, sensing and processing competences to utilize system networks to communicate among energy stakeholders using different internet networking devices. Smart energy systems enable ambiance communication intelligence to achieve some objectives. In the current state of researches with regards to the application of smart energy systems, there are lots of conspicuous challenges, especially in developing countries. Therefore, in this paper, the synopsis of the challenges threatening the diffusion of smart grid technologies in Nigeria is presented.
在过去的几十年里,随着气候条件的变化,电力行业在全球范围内的发展速度加快,同时需要可持续发展来应对一些挑战。可持续能源技术是可持续发展的众多要求之一。人口密度的增加和城市规模的扩大,要求相应加大以技术为导向的能源开发力度。智能能源系统是以技术为导向的信息和通信技术,用于世界不同地区,以改善能源获取,改善能源生产、传输和分配过程。智能系统在能源收集中的应用是当前全球电力部门的一个范式转变。智能应用包括识别、感知和处理能力,以利用系统网络在使用不同互联网网络设备的能源利益相关者之间进行通信。智能能源系统使环境通信智能能够实现某些目标。在智能能源系统应用的研究现状中,存在着许多突出的挑战,特别是在发展中国家。因此,本文简要介绍了威胁尼日利亚智能电网技术扩散的挑战。
{"title":"Smart Energy Solutions in Power Sector: Overview of the Challenges in Nigeria Perspective","authors":"Y. S. Mohammed, Dalhatu Ismail Inuwa, B. Saka, E. A. Aja, Sadiq Thomas, U. Umar","doi":"10.1109/ICECCO48375.2019.9043296","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043296","url":null,"abstract":"In the last few decades, power sectors are known to be growing faster worldwide with changing climatic condition meanwhile sustainable development is needed to confront some of the challenges. Sustainable energy technologies are one of the numerous requirements in the context of sustainable development. Increasing human population density and urban size requires a corresponding increase in technology-oriented energy development. Smart energy systems are technology-oriented information and communication technologies used in different parts of the world for improvement in access to energy to improve energy generation, transmission and distribution processes. The application of smart systems for energy harvest is a paradigm shift in the current global power sector. A smart application encompasses identifying, sensing and processing competences to utilize system networks to communicate among energy stakeholders using different internet networking devices. Smart energy systems enable ambiance communication intelligence to achieve some objectives. In the current state of researches with regards to the application of smart energy systems, there are lots of conspicuous challenges, especially in developing countries. Therefore, in this paper, the synopsis of the challenges threatening the diffusion of smart grid technologies in Nigeria is presented.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129436886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual Framework for the Assessment of the Degree of Dependency of Critical National Infrastructure on ICT in Nigeria 评估尼日利亚关键国家基础设施对信息通信技术依赖程度的概念框架
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043230
U. Mbanaso, V. Kulugh, Habiba Musa, G. Aimufua
Critical National Infrastructure (CNI) are assets that provide core functions to modern society, which failure or incapacitation can adversely affect national security, economic prosperity and wellbeing of citizens. In an evolving digital society, CNI rely heavily on Information and Communications Technology (ICT) infrastructure to improve productivity, and effectively deliver critical services in timely and cost-effective fashion. However, the underlying ICT infrastructure that drives CNI amplify cyber risks, threats and vulnerabilities exponentially. Consequently, a failure in ICT infrastructure has the potential to affect CNI in an unexpected manner. The risks associated with the use of ICT are dynamic, raising the need for continuous assessment of degree of ICT dependency. Presently however, there is rarely a framework nor a publicly available tool in Nigeria that can quantitatively gauge the degree of CNI dependency on ICT. The study addresses this gap by the development of a conceptual framework that can facilitate the assessment of the degree of CNI dependency on ICT. In this study, existing relevant documents on critical infrastructure, ICT frameworks and standards and critical process engineering principles were scanned, analysed and synthesised to conceptualise the framework, and the construction of the building blocks, metrics and indicators. The framework was tested using a hypothetical discrete dataset. The outcome further facilitated the framing of ICT Dependency Index (IDI), a predefined quadrant, of which the computation of Dependency must fall within one of the quadrants.
关键国家基础设施(CNI)是为现代社会提供核心功能的资产,其故障或丧失能力会对国家安全、经济繁荣和公民福祉产生不利影响。在不断发展的数字社会中,CNI高度依赖信息和通信技术(ICT)基础设施来提高生产力,并以及时和具有成本效益的方式有效地提供关键服务。然而,推动CNI的底层ICT基础设施成倍地放大了网络风险、威胁和漏洞。因此,ICT基础设施的故障有可能以意想不到的方式影响CNI。与使用信通技术相关的风险是动态的,因此需要持续评估信通技术的依赖程度。然而,目前在尼日利亚,很少有一个框架或一个公开可用的工具可以定量衡量国家信息通信技术的依赖程度。该研究通过开发一个概念框架来解决这一差距,该框架可以促进评估CNI对ICT的依赖程度。在本研究中,对关键基础设施、ICT框架和标准以及关键过程工程原理的现有相关文件进行了扫描、分析和综合,以概念化框架,以及构建模块、度量和指标的构建。使用假设的离散数据集对该框架进行了测试。该结果进一步促进了信息通信技术依赖指数(IDI)的制定,这是一个预定义的象限,其依赖的计算必须落在其中一个象限内。
{"title":"Conceptual Framework for the Assessment of the Degree of Dependency of Critical National Infrastructure on ICT in Nigeria","authors":"U. Mbanaso, V. Kulugh, Habiba Musa, G. Aimufua","doi":"10.1109/ICECCO48375.2019.9043230","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043230","url":null,"abstract":"Critical National Infrastructure (CNI) are assets that provide core functions to modern society, which failure or incapacitation can adversely affect national security, economic prosperity and wellbeing of citizens. In an evolving digital society, CNI rely heavily on Information and Communications Technology (ICT) infrastructure to improve productivity, and effectively deliver critical services in timely and cost-effective fashion. However, the underlying ICT infrastructure that drives CNI amplify cyber risks, threats and vulnerabilities exponentially. Consequently, a failure in ICT infrastructure has the potential to affect CNI in an unexpected manner. The risks associated with the use of ICT are dynamic, raising the need for continuous assessment of degree of ICT dependency. Presently however, there is rarely a framework nor a publicly available tool in Nigeria that can quantitatively gauge the degree of CNI dependency on ICT. The study addresses this gap by the development of a conceptual framework that can facilitate the assessment of the degree of CNI dependency on ICT. In this study, existing relevant documents on critical infrastructure, ICT frameworks and standards and critical process engineering principles were scanned, analysed and synthesised to conceptualise the framework, and the construction of the building blocks, metrics and indicators. The framework was tested using a hypothetical discrete dataset. The outcome further facilitated the framing of ICT Dependency Index (IDI), a predefined quadrant, of which the computation of Dependency must fall within one of the quadrants.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Age Classification of Prospective Voters Using Deep Convolutional Neural Network. 基于深度卷积神经网络的潜在选民年龄自动分类。
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043196
A. A. Adeniyi, Steve A. Adeshina
Age estimation from images of the face, has gained more attention in recent as it is favorable in some realworld applications. In this work, we address the problem of Under-Age registration/voting in Nigeria Electoral system, which has been a major menace, hindering a free and fair election in the country since the assumption of the Democratic system of Government. To this end, a pretrained VGG-16 Deep Convolutional Neural Network while comparing two optimization algorithms without image preprocessing is employed to both extract features from image(s) of prospective voters and classify same under the established age classification group, as eligible or not to exercise their civil right. In light of this, a classification accuracy of 77.67% is achieved with the model.
基于人脸图像的年龄估计,由于其在一些现实世界中的应用,近年来得到了越来越多的关注。在这项工作中,我们解决了尼日利亚选举制度中未成年人登记/投票的问题,这是一个主要的威胁,自民主政府制度成立以来,阻碍了该国自由公正的选举。为此,采用预训练的VGG-16深度卷积神经网络,在比较两种未进行图像预处理的优化算法的同时,从潜在选民的图像中提取特征,并将其划分为符合或不符合公民权利的年龄分类组。因此,该模型的分类准确率达到了77.67%。
{"title":"Automatic Age Classification of Prospective Voters Using Deep Convolutional Neural Network.","authors":"A. A. Adeniyi, Steve A. Adeshina","doi":"10.1109/ICECCO48375.2019.9043196","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043196","url":null,"abstract":"Age estimation from images of the face, has gained more attention in recent as it is favorable in some realworld applications. In this work, we address the problem of Under-Age registration/voting in Nigeria Electoral system, which has been a major menace, hindering a free and fair election in the country since the assumption of the Democratic system of Government. To this end, a pretrained VGG-16 Deep Convolutional Neural Network while comparing two optimization algorithms without image preprocessing is employed to both extract features from image(s) of prospective voters and classify same under the established age classification group, as eligible or not to exercise their civil right. In light of this, a classification accuracy of 77.67% is achieved with the model.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126721295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Framework of Configuring and Evaluating ModSecurity WAF on Tomcat and Apache Web Servers 基于Tomcat和Apache Web服务器的ModSecurity WAF配置与评估框架
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043209
Imrana Abdullahi Yari, Babangida Abdullahi, Steve A. Adeshina
Open-source software has slowly infiltrated the enterprise space because the products tend to be cheaper, flexible, and secure in comparison to propriety products. However, open-source software incurs the cost of beavering to acquire professionals to, customize the product in meeting expectations, support fixes and in extending the product to a wide range of capabilities. ModSecurity is an open-source web application firewall (WAF) developed explicitly for Apache, and technically only listens to HTTP port 80. This study utilized the agility and flexibility property of open-source software to design a framework of configuring Apache module ModSecurity WAF to communicate with Tomcat server (which runs explicitly on HTTP port 8080). Furthermore, using suitable penetration testing methodology, this study investigates and compares the effectiveness of ModSecurity WAF in both Apache and Tomcat environments. ModSecurity WAF limitations were also investigated. In addition to providing a framework for configuring ModSecurity on tomcat server, this study provides an understanding of web application vulnerabilities, the techniques used to exploit them and the mitigation mechanisms to address them.
开源软件已经慢慢渗透到企业领域,因为与专有产品相比,开源软件更便宜、更灵活、更安全。但是,开源软件需要花费大量的精力来聘请专业人员,定制产品以满足期望,支持修复,并将产品扩展到更广泛的功能范围。ModSecurity是为Apache明确开发的开源web应用防火墙(WAF),技术上只监听HTTP端口80。本研究利用开源软件的敏捷性和灵活性,设计了一个配置Apache模块ModSecurity WAF与Tomcat服务器通信的框架(Tomcat服务器显式运行在HTTP端口8080上)。此外,使用合适的渗透测试方法,本研究调查并比较了ModSecurity WAF在Apache和Tomcat环境中的有效性。还研究了ModSecurity WAF的限制。除了提供在tomcat服务器上配置ModSecurity的框架之外,本研究还提供了对web应用程序漏洞的理解,用于利用它们的技术以及解决它们的缓解机制。
{"title":"Towards a Framework of Configuring and Evaluating ModSecurity WAF on Tomcat and Apache Web Servers","authors":"Imrana Abdullahi Yari, Babangida Abdullahi, Steve A. Adeshina","doi":"10.1109/ICECCO48375.2019.9043209","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043209","url":null,"abstract":"Open-source software has slowly infiltrated the enterprise space because the products tend to be cheaper, flexible, and secure in comparison to propriety products. However, open-source software incurs the cost of beavering to acquire professionals to, customize the product in meeting expectations, support fixes and in extending the product to a wide range of capabilities. ModSecurity is an open-source web application firewall (WAF) developed explicitly for Apache, and technically only listens to HTTP port 80. This study utilized the agility and flexibility property of open-source software to design a framework of configuring Apache module ModSecurity WAF to communicate with Tomcat server (which runs explicitly on HTTP port 8080). Furthermore, using suitable penetration testing methodology, this study investigates and compares the effectiveness of ModSecurity WAF in both Apache and Tomcat environments. ModSecurity WAF limitations were also investigated. In addition to providing a framework for configuring ModSecurity on tomcat server, this study provides an understanding of web application vulnerabilities, the techniques used to exploit them and the mitigation mechanisms to address them.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Implementation of Regulated DC Variable Power Supply Using Solar PV with Storage (0-15V, 5A) 带储能(0-15V, 5A)太阳能光伏稳压直流可变电源的设计与实现
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043215
Usman Mohammed, M. Aminu, Steve A. Adeshina, Omotayo Oshiga, Gokhan Koyunlu, Sadiq Thomas
In Nigeria, due to the epileptic nature of power supply, most institutions, individuals, and industries resort to self-generation of power via petrol and diesel generators, which does not only cause environmental and sound pollution but very expensive. As a result, the prices of domestic goods are on the rise. The threat of noise pollution and greenhouse gas emission associated with these generators cannot be over-emphasized. A renewable energy resource will provide a better alternative. This paper therefore designs and implements a regulated DC variable power supply of rating (0-15)V, 5A using solar PV with storage. The gap found from the literature review was; lack of digitally displayed output of the system. The paper designed and implemented DC variable power supply using a voltage regulator (LM33S), resistors, LED, capacitors, a solar PV of200 W, a 12V/24V20 A charge controller and two 12 V, l8Ah batteries. During the design stage, the voltage regulator capacity, solar PV, charge controller, battery ratings were designed. Tests were carried out with the aid of a digital multimeter to determine the response of the system. Results obtained showed that the system is capable of powering DC loads not greater than 75 W. It was also established that implemented system output voltage ranges from 1.21 V to 15.2 V. It was evident that basic experiments and other needs of DC power that are within the design range can be met.
在尼日利亚,由于电力供应的癫痫病性质,大多数机构、个人和工业都通过汽油和柴油发电机自行发电,这不仅造成环境和声音污染,而且非常昂贵。因此,国内商品的价格在上涨。与这些发电机有关的噪音污染和温室气体排放的威胁怎么强调也不过分。可再生能源将提供一个更好的选择。因此,本文设计并实现了一种额定(0-15)V, 5A的带储能太阳能光伏稳压直流可变电源。从文献综述中发现的差距是;缺少系统的数字显示输出。本文采用稳压器LM33S、电阻器、LED、电容、200w太阳能光伏、12V/24V20 a充电控制器和2节12V, 18ah电池设计并实现了直流可变电源。在设计阶段,对稳压容量、太阳能光伏、充电控制器、电池额定值进行了设计。在数字万用表的帮助下进行了测试,以确定系统的响应。结果表明,该系统能够为不大于75w的直流负载供电。并确定实现的系统输出电压范围为1.21 V ~ 15.2 V。可以看出,在设计范围内,直流电源的基本实验和其他需求是可以满足的。
{"title":"Design and Implementation of Regulated DC Variable Power Supply Using Solar PV with Storage (0-15V, 5A)","authors":"Usman Mohammed, M. Aminu, Steve A. Adeshina, Omotayo Oshiga, Gokhan Koyunlu, Sadiq Thomas","doi":"10.1109/ICECCO48375.2019.9043215","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043215","url":null,"abstract":"In Nigeria, due to the epileptic nature of power supply, most institutions, individuals, and industries resort to self-generation of power via petrol and diesel generators, which does not only cause environmental and sound pollution but very expensive. As a result, the prices of domestic goods are on the rise. The threat of noise pollution and greenhouse gas emission associated with these generators cannot be over-emphasized. A renewable energy resource will provide a better alternative. This paper therefore designs and implements a regulated DC variable power supply of rating (0-15)V, 5A using solar PV with storage. The gap found from the literature review was; lack of digitally displayed output of the system. The paper designed and implemented DC variable power supply using a voltage regulator (LM33S), resistors, LED, capacitors, a solar PV of200 W, a 12V/24V20 A charge controller and two 12 V, l8Ah batteries. During the design stage, the voltage regulator capacity, solar PV, charge controller, battery ratings were designed. Tests were carried out with the aid of a digital multimeter to determine the response of the system. Results obtained showed that the system is capable of powering DC loads not greater than 75 W. It was also established that implemented system output voltage ranges from 1.21 V to 15.2 V. It was evident that basic experiments and other needs of DC power that are within the design range can be met.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115331966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrating Strategic Information Systems Planning into Nigerian Security Agencies 将战略信息系统规划整合到尼日利亚安全机构
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043227
N. A. Umar, Jamilu Awwalu
Strategic Information Systems Planning (SISP) as a means for technology optimization plays important role along with Information system as the key player. Security information as the major resource for Information Systems is produced from the massive data collected by security agencies on daily basis. While other countries continuously strive to be several steps ahead of crime and their perpetrators, map out crime pattern, and implement efficient security personnel allocation by mining the voluminous data from their Information Systems (IS) as a means of achieving their organization goals, the absence of both hard and soft working infrastructure that can serve the purpose of collecting adequate data further complicates matters for Nigerian security agencies. These different security challenges can be identified and linked with strategic planning, obsolete computing resources, Information Systems features, data collection and Information Systems adoption. This study targets the audience of the top decision makers and managers of Nigerian security agencies by provides a framework for integrating SISP into security agencies. This is in order to facilitate the achievement security agencies organizational goals and make them benefit from a functional IS and put them on track to catching up with their counterparts around the world within the shortest possible time.
战略信息系统规划(SISP)作为一种技术优化的手段,与信息系统一起发挥着重要的作用。安全信息是信息系统的主要资源,是由安全机构日常收集的海量数据产生的。虽然其他国家不断努力在犯罪及其肇事者之前走几步,绘制犯罪模式,并通过从其信息系统(IS)中挖掘大量数据来实现有效的安全人员分配,作为实现其组织目标的一种手段,但缺乏能够收集足够数据的硬件和软件工作基础设施,这使尼日利亚安全机构的问题进一步复杂化。这些不同的安全挑战可以通过战略规划、过时的计算资源、信息系统功能、数据收集和信息系统采用来识别和联系起来。本研究的目标受众是尼日利亚安全机构的高层决策者和管理者,为将SISP整合到安全机构提供了一个框架。这是为了促进实现安全机构的组织目标,使他们从一个功能性的信息系统中受益,并使他们在最短的时间内赶上世界各地的同行。
{"title":"Integrating Strategic Information Systems Planning into Nigerian Security Agencies","authors":"N. A. Umar, Jamilu Awwalu","doi":"10.1109/ICECCO48375.2019.9043227","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043227","url":null,"abstract":"Strategic Information Systems Planning (SISP) as a means for technology optimization plays important role along with Information system as the key player. Security information as the major resource for Information Systems is produced from the massive data collected by security agencies on daily basis. While other countries continuously strive to be several steps ahead of crime and their perpetrators, map out crime pattern, and implement efficient security personnel allocation by mining the voluminous data from their Information Systems (IS) as a means of achieving their organization goals, the absence of both hard and soft working infrastructure that can serve the purpose of collecting adequate data further complicates matters for Nigerian security agencies. These different security challenges can be identified and linked with strategic planning, obsolete computing resources, Information Systems features, data collection and Information Systems adoption. This study targets the audience of the top decision makers and managers of Nigerian security agencies by provides a framework for integrating SISP into security agencies. This is in order to facilitate the achievement security agencies organizational goals and make them benefit from a functional IS and put them on track to catching up with their counterparts around the world within the shortest possible time.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Mobile Phone for Community Based Crowd Sourcing 手机在社区众包中的应用
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043239
Ochilbek Rakhmanov, U. Ibrahim
the increasing prevalence of mobile applications in modern age has made them an important tool that can be used to solve community based problems. In Nigeria especially, open air defecation due to lack of toilets and improper waste disposal (caused by the lack of garbage disposal containers) are two major problems plaguing the country that can be resolved with mobile applications. Therefore, in this paper, we designed a mobile application which records input from one type of user (coordinates of toilets and waste disposal containers) and provide this information to other users. We tested the reaction of the community for given opportunity to solve this problem, as well as how likely are users to use toilets around, if they learn the exact place. The simulation, overall, was successful and the results showed that community sourcing can solve a huge part of community problems once the opportunity is presented.
在现代,移动应用程序的日益普及使它们成为解决社区问题的重要工具。特别是在尼日利亚,由于缺乏厕所和不适当的废物处理(由于缺乏垃圾处理容器)而导致的露天排便是困扰该国的两个主要问题,可以通过移动应用程序解决。因此,在本文中,我们设计了一个移动应用程序,它记录一种用户的输入(厕所和废物处理容器的坐标),并将这些信息提供给其他用户。我们测试了社区对解决这个问题的反应,以及如果用户知道了确切的位置,他们使用周围厕所的可能性有多大。总的来说,模拟是成功的,结果表明,一旦机会出现,社区采购可以解决很大一部分社区问题。
{"title":"Use of Mobile Phone for Community Based Crowd Sourcing","authors":"Ochilbek Rakhmanov, U. Ibrahim","doi":"10.1109/ICECCO48375.2019.9043239","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043239","url":null,"abstract":"the increasing prevalence of mobile applications in modern age has made them an important tool that can be used to solve community based problems. In Nigeria especially, open air defecation due to lack of toilets and improper waste disposal (caused by the lack of garbage disposal containers) are two major problems plaguing the country that can be resolved with mobile applications. Therefore, in this paper, we designed a mobile application which records input from one type of user (coordinates of toilets and waste disposal containers) and provide this information to other users. We tested the reaction of the community for given opportunity to solve this problem, as well as how likely are users to use toilets around, if they learn the exact place. The simulation, overall, was successful and the results showed that community sourcing can solve a huge part of community problems once the opportunity is presented.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129378199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation Of Three-Wheeler Passenger Unit (Pcu) Using Headway Method Case Study Of Abuja Nigeria 基于车头距法的三轮客车乘员单位估算——以尼日利亚阿布贾为例
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043232
Abubakar Dayyabu, Aisha Abdullahi lawal, A. Amuda, A. Mambo, Ado Mohammed
Traffic stream in many countries including Nigeria is made of different vehicles having different static and dynamic characteristic. The ban of two wheelers vehicles in Abuja city center has resulted in upsurge in the use of three wheelers. There is therefore the need to estimate the passenger car unit for this city due to the change in means of transportation for effective transport planning, designing and operation analysis. In this study, the headway method was used to develop a PCU value for trucks and three-wheelers at signalized intersections in Abuja, Nigeria. The intersections were selected based on stratified random method of sampling. Data was collected using manual method. The PCU obtained from this research is 0.92 and 1.82 for three-wheeler at Apo intersection; followed PCU of 0.92 and 2.34 at Gwarimpa intersection and lastly a PCU of 0.96 and 2.09 at Games village Intersection. The research concluded on a state average PCU value of 2.08 and 0.93 for Trucks and three wheelers for planning, designing and operation analysis in Abuja. The research recommends adapting the passenger car unit values obtained for local use and design of intersections in Abuja for efficient operation of highway facilities in the city.
包括尼日利亚在内的许多国家的交通流是由具有不同静态和动态特性的不同车辆组成的。阿布贾市中心禁止两轮车的禁令导致三轮车的使用激增。因此,有必要对该城市由于交通工具的变化而产生的乘用车单位进行估算,以便进行有效的交通规划、设计和运行分析。在本研究中,车头时距法被用来开发一个PCU值的卡车和三轮车在尼日利亚阿布贾的信号交叉口。采用分层随机抽样的方法选择路口。数据采集采用手工方法。本研究得到的三轮车在Apo交叉口的PCU分别为0.92和1.82;其次是Gwarimpa路口的PCU为0.92和2.34,最后是奥运村路口的PCU为0.96和2.09。该研究得出结论,阿布贾的卡车和三轮车的规划、设计和运营分析的州平均PCU值为2.08和0.93。该研究建议将获得的乘用车单位值调整为阿布贾当地使用和十字路口的设计,以有效地运营该市的高速公路设施。
{"title":"Estimation Of Three-Wheeler Passenger Unit (Pcu) Using Headway Method Case Study Of Abuja Nigeria","authors":"Abubakar Dayyabu, Aisha Abdullahi lawal, A. Amuda, A. Mambo, Ado Mohammed","doi":"10.1109/ICECCO48375.2019.9043232","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043232","url":null,"abstract":"Traffic stream in many countries including Nigeria is made of different vehicles having different static and dynamic characteristic. The ban of two wheelers vehicles in Abuja city center has resulted in upsurge in the use of three wheelers. There is therefore the need to estimate the passenger car unit for this city due to the change in means of transportation for effective transport planning, designing and operation analysis. In this study, the headway method was used to develop a PCU value for trucks and three-wheelers at signalized intersections in Abuja, Nigeria. The intersections were selected based on stratified random method of sampling. Data was collected using manual method. The PCU obtained from this research is 0.92 and 1.82 for three-wheeler at Apo intersection; followed PCU of 0.92 and 2.34 at Gwarimpa intersection and lastly a PCU of 0.96 and 2.09 at Games village Intersection. The research concluded on a state average PCU value of 2.08 and 0.93 for Trucks and three wheelers for planning, designing and operation analysis in Abuja. The research recommends adapting the passenger car unit values obtained for local use and design of intersections in Abuja for efficient operation of highway facilities in the city.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and Implementation of an Internet of Things (IOT) Based Remote Patient Monitoring System 基于物联网(IOT)的远程患者监护系统的开发与实现
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043200
Y. Mohammed, A. S. Mohammed, H. Abdulkarim, Clement Danladi, Aduh Victor, Romanus Edoka
Web-based solutions that employs the use of Internet of Things (IoT), is continuously creating new application areas, including healthcare. This shows that, iHealth, real-time monitoring as well as remote patients monitoring, are expected to revolutionize the healthcare sector. IoT is nothing but communication between devices that contain embedded technology with existing internet infrastructure. This research work employs a smart data gathering method using a fuzzy logic assisted approach. The fuzzy scheme employed, helps make the system smart by helping the device make decisions on when and what data is to be sent depending on the inference made on various inputs from the physiological sensors. Performance analysis was carried out on the energy consumption pattern of the nodes which indicate that throughout the monitoring period of Ten (10) hours each day, for three days. The average energy consumed by the device when fuzzy assisted logic is used is 90.78 milli Watt (mW), while the average energy consumed when the conventional method is used is 128.5 mW. From the results, it was observed that power consumption is substantially reduced by about 37.72 mW (29.35%), when using the fuzzy assisted method as compared to when using the normal/conventional method.. It was equally observed that while using the fuzzy assisted logic, energy consumption only increased whenever there is an anomaly in the sensor reading.
利用物联网(IoT)的基于web的解决方案正在不断创造新的应用领域,包括医疗保健领域。这表明,iHealth,实时监控和远程患者监控,有望彻底改变医疗保健行业。物联网只不过是包含嵌入式技术的设备与现有互联网基础设施之间的通信。本研究工作采用模糊逻辑辅助的智能数据收集方法。所采用的模糊方案通过帮助设备根据对生理传感器的各种输入所做的推断来决定何时以及发送哪些数据,从而使系统变得智能。对节点的能耗模式进行性能分析,在整个监测期内,每天10小时,连续3天。采用模糊辅助逻辑时,器件平均能耗为90.78毫瓦(mW),而采用常规方法时,器件平均能耗为128.5毫瓦。从结果中可以观察到,与使用正常/传统方法相比,使用模糊辅助方法时,功耗大大降低了约37.72 mW(29.35%)。同样可以观察到,当使用模糊辅助逻辑时,只有当传感器读数出现异常时,能量消耗才会增加。
{"title":"Development and Implementation of an Internet of Things (IOT) Based Remote Patient Monitoring System","authors":"Y. Mohammed, A. S. Mohammed, H. Abdulkarim, Clement Danladi, Aduh Victor, Romanus Edoka","doi":"10.1109/ICECCO48375.2019.9043200","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043200","url":null,"abstract":"Web-based solutions that employs the use of Internet of Things (IoT), is continuously creating new application areas, including healthcare. This shows that, iHealth, real-time monitoring as well as remote patients monitoring, are expected to revolutionize the healthcare sector. IoT is nothing but communication between devices that contain embedded technology with existing internet infrastructure. This research work employs a smart data gathering method using a fuzzy logic assisted approach. The fuzzy scheme employed, helps make the system smart by helping the device make decisions on when and what data is to be sent depending on the inference made on various inputs from the physiological sensors. Performance analysis was carried out on the energy consumption pattern of the nodes which indicate that throughout the monitoring period of Ten (10) hours each day, for three days. The average energy consumed by the device when fuzzy assisted logic is used is 90.78 milli Watt (mW), while the average energy consumed when the conventional method is used is 128.5 mW. From the results, it was observed that power consumption is substantially reduced by about 37.72 mW (29.35%), when using the fuzzy assisted method as compared to when using the normal/conventional method.. It was equally observed that while using the fuzzy assisted logic, energy consumption only increased whenever there is an anomaly in the sensor reading.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy Concems. 完全同态加密:云数据安全和隐私问题的解毒剂。
Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043280
Abdulahi Monday Jubrin, Ikechukwu Izegbu, O. S. Adebayo
Cloud Computing has witnessed tremendous growth in the last decades. Security and privacy of cloud data are two major concerns that have limited the growth and researches witnessed in the area of cloud computing. With Artificial Intelligence and Deep Learning taking prominent role in the decade, individuals and organizations are becoming more uneasy to the issues of security and privacy of cloud data. This article aims to provide an introduction to Fully Homomorphic Encryption as an antidote to the challenges of security and privacy of cloud data computation. The milestones and review of works in the area of Homomorphic Encryption was discussed. An insight into future research direction in the field of Fully Homomorphic Encryption was specified.
在过去的几十年里,云计算经历了巨大的发展。云数据的安全性和隐私性是限制云计算领域发展和研究的两个主要问题。随着人工智能和深度学习在这十年中的突出作用,个人和组织对云数据的安全和隐私问题变得越来越不安。本文旨在介绍完全同态加密,以解决云数据计算的安全性和隐私性挑战。讨论了同态加密领域的里程碑和研究进展。最后对今后全同态加密领域的研究方向进行了展望。
{"title":"Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy Concems.","authors":"Abdulahi Monday Jubrin, Ikechukwu Izegbu, O. S. Adebayo","doi":"10.1109/ICECCO48375.2019.9043280","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043280","url":null,"abstract":"Cloud Computing has witnessed tremendous growth in the last decades. Security and privacy of cloud data are two major concerns that have limited the growth and researches witnessed in the area of cloud computing. With Artificial Intelligence and Deep Learning taking prominent role in the decade, individuals and organizations are becoming more uneasy to the issues of security and privacy of cloud data. This article aims to provide an introduction to Fully Homomorphic Encryption as an antidote to the challenges of security and privacy of cloud data computation. The milestones and review of works in the area of Homomorphic Encryption was discussed. An insight into future research direction in the field of Fully Homomorphic Encryption was specified.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124785231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 15th International Conference on Electronics, Computer and Computation (ICECCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1