首页 > 最新文献

2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)最新文献

英文 中文
HarX: Real-time harassment detection tool using machine learning HarX:使用机器学习的实时骚扰检测工具
Kainat Rizwan, Sehar Babar, Sania Nayab, M. Hanif
Cybersecurity has a great deal of importance over the digital market for organizations in this modern era. Nowadays all kinds of communications and connections are established by using the internet. Chatting is a main source of communication. The major problem faced by users is harassment. User starts to get harassed frequently as most of users does not know what to do and how to take action or how to stop this. In this work, we employ machine learning and natural language processing to tackle online harassment. This study proposed a real time machine learning based algorithm which detects harassment actively and alert user to take action against it. For detection mechanism, Naïve Bayes classification is used. The proposed approach attain approximately 77% accuracy. The result shows that the algorithm actively detects harassing keywords in chat messages.
在这个现代时代,网络安全对组织的数字市场非常重要。如今,各种各样的通信和连接都是通过使用互联网建立的。聊天是一种主要的交流方式。用户面临的主要问题是骚扰。用户开始经常受到骚扰,因为大多数用户不知道该做什么,如何采取行动或如何阻止这种情况。在这项工作中,我们使用机器学习和自然语言处理来解决在线骚扰。本研究提出了一种基于实时机器学习的算法,该算法主动检测骚扰并提醒用户采取行动。检测机制采用Naïve贝叶斯分类。该方法的准确率约为77%。结果表明,该算法能够主动检测聊天信息中的骚扰关键词。
{"title":"HarX: Real-time harassment detection tool using machine learning","authors":"Kainat Rizwan, Sehar Babar, Sania Nayab, M. Hanif","doi":"10.1109/MTICTI53925.2021.9664755","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664755","url":null,"abstract":"Cybersecurity has a great deal of importance over the digital market for organizations in this modern era. Nowadays all kinds of communications and connections are established by using the internet. Chatting is a main source of communication. The major problem faced by users is harassment. User starts to get harassed frequently as most of users does not know what to do and how to take action or how to stop this. In this work, we employ machine learning and natural language processing to tackle online harassment. This study proposed a real time machine learning based algorithm which detects harassment actively and alert user to take action against it. For detection mechanism, Naïve Bayes classification is used. The proposed approach attain approximately 77% accuracy. The result shows that the algorithm actively detects harassing keywords in chat messages.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Modern Analytical Methods for Detecting and Quantifying Adulteration in Honey 蜂蜜中掺假的现代检测与定量分析方法综述
Mokhtar A. Al-Awadhi, R. Deshmukh
Honey has been a target for adulteration with various inexpensive industrial sugars. Discriminating between authentic and adulterated honey is a challenging problem for consumers. Several studies have proposed different methods for detecting adulterated honey. Traditional methods, such as stable carbon isotope ratio analysis, chromatography, and physicochemical parameter analysis, provided good qualitative and quantitative detection. These technologies utilize different approaches, such as profiles of honey constituents, physical and chemical properties of honey, and specific marker traces for the sugar adulterants. Spectroscopy and hyperspectral imaging provided fast and nondestructive detection with no sample preparation. Sensory techniques, such as low-cost optic fiber sensors, demonstrated their effectiveness in quantifying honey adulteration. This paper discusses various technologies for detecting and quantifying honey adulteration. We also discuss the machine learning models and their performance in this research.
蜂蜜一直是掺入各种廉价工业糖的目标。辨别真假蜂蜜对消费者来说是一个具有挑战性的问题。几项研究提出了检测掺假蜂蜜的不同方法。传统的方法,如稳定碳同位素比分析、色谱分析和理化参数分析,提供了良好的定性和定量检测。这些技术利用不同的方法,如蜂蜜成分的概况,蜂蜜的物理和化学性质,以及糖掺杂物的特定标记痕迹。光谱学和高光谱成像提供了快速、无损的检测,无需制备样品。感官技术,如低成本的光纤传感器,证明了它们在量化蜂蜜掺假方面的有效性。本文讨论了蜂蜜掺假检测和定量的各种技术。我们还讨论了机器学习模型及其在本研究中的性能。
{"title":"A Review on Modern Analytical Methods for Detecting and Quantifying Adulteration in Honey","authors":"Mokhtar A. Al-Awadhi, R. Deshmukh","doi":"10.1109/MTICTI53925.2021.9664767","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664767","url":null,"abstract":"Honey has been a target for adulteration with various inexpensive industrial sugars. Discriminating between authentic and adulterated honey is a challenging problem for consumers. Several studies have proposed different methods for detecting adulterated honey. Traditional methods, such as stable carbon isotope ratio analysis, chromatography, and physicochemical parameter analysis, provided good qualitative and quantitative detection. These technologies utilize different approaches, such as profiles of honey constituents, physical and chemical properties of honey, and specific marker traces for the sugar adulterants. Spectroscopy and hyperspectral imaging provided fast and nondestructive detection with no sample preparation. Sensory techniques, such as low-cost optic fiber sensors, demonstrated their effectiveness in quantifying honey adulteration. This paper discusses various technologies for detecting and quantifying honey adulteration. We also discuss the machine learning models and their performance in this research.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of a Learning Analytics extension in Open edX Open edX中学习分析扩展的开发
Youness Chaabi, Yahya Al-Ashmoery
Persistence in online courses remains a concern for various institutions. The case of (Massive Open Online Courses) MOOCs represents a particular situation of online courses with an even higher dropout rate. This type of training highlights problems that have already been identified such as sociological isolation of the learner, loss of motivation, empowerment of the learner, acquisition of identity within a group and appreciation of the group pedagogical progress. In this context, the importance of a follow-up by a human tutor is unanimously recognized by the different a ctors. Despite the numerous services offered by open and distance learning platforms, one of the main difficulties encountered by tutors in this task is to have a sufficient understanding of what the distant learners are doing. One way that seems particularly promising to solve this problem is the exploitation of interaction traces left by learners within MOOCs, and the elaboration of indicators that can help the tutor in monitoring learners’ activities. This is why it seems imperative to me to propose a tool to visualize the work accomplished by each learner. The system must provide indicators that help the tutor to appreciate the work of the learners.
在线课程的持久性仍然是许多机构关注的问题。大规模开放网络课程(MOOCs)的案例代表了网络课程辍学率更高的一种特殊情况。这种类型的培训突出了已经确定的问题,如学习者在社会学上的孤立、动机的丧失、赋予学习者权力、在群体中获得身份以及对群体教学进步的欣赏。在这种情况下,人类导师跟进的重要性得到了不同参与者的一致认可。尽管开放和远程学习平台提供了许多服务,但导师在这项任务中遇到的主要困难之一是充分了解远程学习者在做什么。一种似乎特别有希望解决这个问题的方法是利用mooc中学习者留下的互动痕迹,并详细说明可以帮助导师监控学习者活动的指标。这就是为什么我认为有必要提出一种工具来可视化每个学习者完成的工作。该系统必须提供指标,帮助导师欣赏学习者的工作。
{"title":"Development of a Learning Analytics extension in Open edX","authors":"Youness Chaabi, Yahya Al-Ashmoery","doi":"10.1109/MTICTI53925.2021.9664754","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664754","url":null,"abstract":"Persistence in online courses remains a concern for various institutions. The case of (Massive Open Online Courses) MOOCs represents a particular situation of online courses with an even higher dropout rate. This type of training highlights problems that have already been identified such as sociological isolation of the learner, loss of motivation, empowerment of the learner, acquisition of identity within a group and appreciation of the group pedagogical progress. In this context, the importance of a follow-up by a human tutor is unanimously recognized by the different a ctors. Despite the numerous services offered by open and distance learning platforms, one of the main difficulties encountered by tutors in this task is to have a sufficient understanding of what the distant learners are doing. One way that seems particularly promising to solve this problem is the exploitation of interaction traces left by learners within MOOCs, and the elaboration of indicators that can help the tutor in monitoring learners’ activities. This is why it seems imperative to me to propose a tool to visualize the work accomplished by each learner. The system must provide indicators that help the tutor to appreciate the work of the learners.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"777 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133005113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Utilizing Multi-Agent Systems Approach in Firefly Algorithm 多智能体系统方法在萤火虫算法中的应用
Arian Yousefiankalareh, Taraneh Kamyab, Ali Mojarrad Ghahfarokhi, Fatemehalsadat Beheshtinejad, Hossein Mirzanejad, Shahaboddin Seddighi
Generally, using collective intelligence is one of the interesting topics is researchers of recent years, which its purpose is modeling creatures’ simple behaviors and their interaction with the environment and neighbor creatures to obtain more complex behaviors. We could utilize algorithms based on collective intelligence to solve complicated problems like optimization problems. So far, various algorithms have been purposed in this field which firefly algorithm is a variant of these. In this algorithm, each member acts as a better response concerning itself. However, this algorithm has some drawbacks like the consistency of parameters value, lack of balance between local search and global search, and others. On one hand, multi-agent systems are software systems that contain sets of agents. These agents perform their tasks together to solve a problem and reach the desired purpose. In this paper, we have tried to utilize a multi-agent system, in addition to meta-heuristic optimization algorithms, to improve the performance of the firefly algorithm to better cooperate warms populations with each other. The results of the experiment show the acceptable performance of the proposed algorithm.
总的来说,利用集体智能是近年来研究人员感兴趣的话题之一,其目的是对生物的简单行为及其与环境和邻近生物的相互作用进行建模,以获得更复杂的行为。我们可以利用基于集体智慧的算法来解决复杂的问题,比如最优化问题。到目前为止,已经有各种各样的算法用于这一领域,萤火虫算法是其中的一种变体。在该算法中,每个成员都作为与自己有关的更好的响应。但该算法存在参数值不一致、局部搜索与全局搜索不平衡等缺点。一方面,多代理系统是包含代理集的软件系统。这些代理一起执行它们的任务来解决问题并达到预期的目的。在本文中,我们尝试利用多智能体系统,除了元启发式优化算法之外,提高萤火虫算法的性能,以更好地相互合作。实验结果表明,该算法具有良好的性能。
{"title":"Utilizing Multi-Agent Systems Approach in Firefly Algorithm","authors":"Arian Yousefiankalareh, Taraneh Kamyab, Ali Mojarrad Ghahfarokhi, Fatemehalsadat Beheshtinejad, Hossein Mirzanejad, Shahaboddin Seddighi","doi":"10.1109/MTICTI53925.2021.9664757","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664757","url":null,"abstract":"Generally, using collective intelligence is one of the interesting topics is researchers of recent years, which its purpose is modeling creatures’ simple behaviors and their interaction with the environment and neighbor creatures to obtain more complex behaviors. We could utilize algorithms based on collective intelligence to solve complicated problems like optimization problems. So far, various algorithms have been purposed in this field which firefly algorithm is a variant of these. In this algorithm, each member acts as a better response concerning itself. However, this algorithm has some drawbacks like the consistency of parameters value, lack of balance between local search and global search, and others. On one hand, multi-agent systems are software systems that contain sets of agents. These agents perform their tasks together to solve a problem and reach the desired purpose. In this paper, we have tried to utilize a multi-agent system, in addition to meta-heuristic optimization algorithms, to improve the performance of the firefly algorithm to better cooperate warms populations with each other. The results of the experiment show the acceptable performance of the proposed algorithm.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT Threats and Solutions with Blockchain and Context-Aware Security Design: A Review 物联网威胁和解决方案与区块链和上下文感知安全设计:回顾
Dana F. Doghramachi, S. Ameen
Nowadays, the Internet of Things (IoT) applications will increase rapidly, such as smart cities, smart transportation, smart healthcare, and smart things are all composed of the IoT, which connects a wide range of heterogeneous devices. This review paper provides a comprehensive overview of blockchain architectures designed for IoT networks. The IoT has emerged as a sector with enormous impact, potential, and growth, with billions of devices expected to connect to the Internet in the coming years. The first big challenge we will be faced with this big network is security; it must be taken into account. In contrast to other endpoint devices such as smartphones, laptops, and PCs, most IoT devices are more sensitive to assaults. Because of the various specifications and heterogeneity problems, traditional protection primitives cannot be explicitly applied to IoT technologies. This paper investigates these critical and essential issues regarding IoT threats, security requirements, and challenges with particular emphasis on and relation to IoT layered architecture. Next, the paper addresses various existing IoT security technologies to achieve high security for IoT applications. It also addresses how two methods, Blockchain, and context-aware, can help solve many IoT security issues. Finally, the paper assesses and suggests some recommendations for future research in the field of IoT security.
如今,物联网(Internet of Things, IoT)的应用将迅速增加,智慧城市、智慧交通、智慧医疗、智能物联网等都是由物联网组成的,物联网连接了各种各样的异构设备。这篇综述文章提供了为物联网网络设计的区块链架构的全面概述。物联网已经成为一个具有巨大影响、潜力和增长的领域,预计未来几年将有数十亿设备连接到互联网。面对这个庞大的网络,我们面临的第一个重大挑战是安全;这一点必须加以考虑。与智能手机、笔记本电脑和个人电脑等其他端点设备相比,大多数物联网设备对攻击更敏感。由于各种规格和异构问题,传统的保护原语不能明确地应用于物联网技术。本文研究了关于物联网威胁、安全要求和挑战的这些关键和基本问题,特别强调了物联网分层架构及其关系。接下来,本文介绍了现有的各种物联网安全技术,以实现物联网应用的高安全性。它还解决了区块链和上下文感知两种方法如何帮助解决许多物联网安全问题。最后,本文对物联网安全领域的未来研究进行了评估和建议。
{"title":"IoT Threats and Solutions with Blockchain and Context-Aware Security Design: A Review","authors":"Dana F. Doghramachi, S. Ameen","doi":"10.1109/MTICTI53925.2021.9664784","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664784","url":null,"abstract":"Nowadays, the Internet of Things (IoT) applications will increase rapidly, such as smart cities, smart transportation, smart healthcare, and smart things are all composed of the IoT, which connects a wide range of heterogeneous devices. This review paper provides a comprehensive overview of blockchain architectures designed for IoT networks. The IoT has emerged as a sector with enormous impact, potential, and growth, with billions of devices expected to connect to the Internet in the coming years. The first big challenge we will be faced with this big network is security; it must be taken into account. In contrast to other endpoint devices such as smartphones, laptops, and PCs, most IoT devices are more sensitive to assaults. Because of the various specifications and heterogeneity problems, traditional protection primitives cannot be explicitly applied to IoT technologies. This paper investigates these critical and essential issues regarding IoT threats, security requirements, and challenges with particular emphasis on and relation to IoT layered architecture. Next, the paper addresses various existing IoT security technologies to achieve high security for IoT applications. It also addresses how two methods, Blockchain, and context-aware, can help solve many IoT security issues. Finally, the paper assesses and suggests some recommendations for future research in the field of IoT security.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Conservation Strategies in Wireless Sensor Networks: A Review 无线传感器网络中的节能策略综述
Sarah Amjad Inad, Khattab M. Ali Alheeti, S. S. Al-Rawi
Wireless Sensor Networks (WSNs) consist of small devices that sense environmental and physical phenomena. WSNs have proven their high capabilities in various fields, but there are some challenges facing sensor nodes, such as limited battery power and their communication and storage capabilities. This review of recent literature on energy improvement strategies is compressed in this review paper. The concepts of WSNs, power sources, WSNs node component, Energy Saving Techniques, power consumption were extracted and clarified. Finally, the results of previous studies regarding energy improvement were extracted, discussed, and compared at the end of the paper.
无线传感器网络由感知环境和物理现象的小型设备组成。无线传感器网络已经在各个领域证明了其高性能,但传感器节点面临着一些挑战,如有限的电池电量及其通信和存储能力。这篇关于能源改善策略的最新文献综述被压缩在这篇综述论文中。提取并阐明了传感器网络、电源、传感器网络节点组件、节能技术、功耗等概念。最后,在文章的最后,对以往关于能源改善的研究结果进行了提取、讨论和比较。
{"title":"Energy Conservation Strategies in Wireless Sensor Networks: A Review","authors":"Sarah Amjad Inad, Khattab M. Ali Alheeti, S. S. Al-Rawi","doi":"10.1109/MTICTI53925.2021.9664777","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664777","url":null,"abstract":"Wireless Sensor Networks (WSNs) consist of small devices that sense environmental and physical phenomena. WSNs have proven their high capabilities in various fields, but there are some challenges facing sensor nodes, such as limited battery power and their communication and storage capabilities. This review of recent literature on energy improvement strategies is compressed in this review paper. The concepts of WSNs, power sources, WSNs node component, Energy Saving Techniques, power consumption were extracted and clarified. Finally, the results of previous studies regarding energy improvement were extracted, discussed, and compared at the end of the paper.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[MTICTI 2021 Front cover] [MTICTI 2021封面]
{"title":"[MTICTI 2021 Front cover]","authors":"","doi":"10.1109/mticti53925.2021.9664768","DOIUrl":"https://doi.org/10.1109/mticti53925.2021.9664768","url":null,"abstract":"","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques 基于机器学习技术的新型MANET入侵检测系统
Marwa Mohammed Khalifa, O. Ucan, Khattab M. Ali Alheeti
The Intrusion Detection System (IDS) is one of the technologies available to protect mobile ad hoc networks. The system monitors the network and detects intrusion from malicious nodes, aiming at passive (eavesdropping) or positive attack to disrupt the network. This paper proposes a new Intrusion detection system using three Machine Learning (ML) techniques. The ML techniques were Random Forest (RF), support vector machines (SVM), and Naïve Bayes(NB) were used to classify nodes in MANET. The data set was generated by the simulator network simulator-2 (NS-2). The routing protocol was used is Dynamic Source Routing (DSR). The type of IDS used is a Network Intrusion Detection System (NIDS). The dataset was pre-processed, then split into two subsets, 67% for training and 33% for testing employing Python Version 3.8.8. Obtaining good results for RF, SVM and NB when applied randomly selected features in the trial and error method from the dataset to improve the performance of the IDS and reduce time spent for training and testing. The system showed promising results, especially with RF, where the accuracy rate reached 100%.
入侵检测系统(IDS)是保护移动自组织网络的有效技术之一。系统对网络进行监控,检测恶意节点的入侵,针对被动(窃听)攻击或主动攻击,破坏网络。本文提出了一种利用三种机器学习技术的入侵检测系统。机器学习技术是随机森林(RF)、支持向量机(SVM)和Naïve贝叶斯(NB)对MANET中的节点进行分类。数据集由模拟器网络模拟器-2 (NS-2)生成。使用的路由协议为动态源路由(DSR)。使用的IDS类型是网络入侵检测系统(NIDS)。数据集经过预处理,然后分成两个子集,67%用于训练,33%用于使用Python版本3.8.8进行测试。采用试错法从数据集中随机选择特征,提高IDS性能,减少训练和测试时间,RF、SVM和NB均获得良好的结果。该系统显示出良好的效果,特别是在射频方面,准确率达到100%。
{"title":"New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques","authors":"Marwa Mohammed Khalifa, O. Ucan, Khattab M. Ali Alheeti","doi":"10.1109/MTICTI53925.2021.9664782","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664782","url":null,"abstract":"The Intrusion Detection System (IDS) is one of the technologies available to protect mobile ad hoc networks. The system monitors the network and detects intrusion from malicious nodes, aiming at passive (eavesdropping) or positive attack to disrupt the network. This paper proposes a new Intrusion detection system using three Machine Learning (ML) techniques. The ML techniques were Random Forest (RF), support vector machines (SVM), and Naïve Bayes(NB) were used to classify nodes in MANET. The data set was generated by the simulator network simulator-2 (NS-2). The routing protocol was used is Dynamic Source Routing (DSR). The type of IDS used is a Network Intrusion Detection System (NIDS). The dataset was pre-processed, then split into two subsets, 67% for training and 33% for testing employing Python Version 3.8.8. Obtaining good results for RF, SVM and NB when applied randomly selected features in the trial and error method from the dataset to improve the performance of the IDS and reduce time spent for training and testing. The system showed promising results, especially with RF, where the accuracy rate reached 100%.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Adulteration in Coconut Milk using Infrared Spectroscopy and Machine Learning 利用红外光谱和机器学习技术检测椰奶中的掺假成分
Mokhtar A. Al-Awadhi, R. Deshmukh
In this paper, we propose a system for detecting adulteration in coconut milk, utilizing infrared spectroscopy. The machine learning-based proposed system comprises three phases: preprocessing, feature extraction, and classification. The first phase involves removing irrelevant data from coconut milk spectral signals. In the second phase, we employ the Linear Discriminant Analysis (LDA) algorithm for extracting the most discriminating features. In the third phase, we use the K-Nearest Neighbor (KNN) model to classify coconut milk samples into authentic or adulterated. We evaluate the performance of the proposed system using a public dataset comprising Fourier Transform Infrared (FTIR) spectral information of pure and contaminated coconut milk samples. Findings show that the proposed method successfully detects adulteration with a cross-validation accuracy of 93.33%.
本文提出了一种利用红外光谱技术检测椰奶中掺假成分的方法。基于机器学习的系统包括预处理、特征提取和分类三个阶段。第一阶段包括从椰奶光谱信号中去除无关数据。在第二阶段,我们使用线性判别分析(LDA)算法来提取最具判别性的特征。在第三阶段,我们使用k -最近邻(KNN)模型将椰奶样本分为正品或掺假。我们使用包含纯椰奶和受污染椰奶样品的傅里叶变换红外(FTIR)光谱信息的公共数据集来评估所提出系统的性能。结果表明,该方法可成功检测掺假,交叉验证准确率为93.33%。
{"title":"Detection of Adulteration in Coconut Milk using Infrared Spectroscopy and Machine Learning","authors":"Mokhtar A. Al-Awadhi, R. Deshmukh","doi":"10.1109/MTICTI53925.2021.9664764","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664764","url":null,"abstract":"In this paper, we propose a system for detecting adulteration in coconut milk, utilizing infrared spectroscopy. The machine learning-based proposed system comprises three phases: preprocessing, feature extraction, and classification. The first phase involves removing irrelevant data from coconut milk spectral signals. In the second phase, we employ the Linear Discriminant Analysis (LDA) algorithm for extracting the most discriminating features. In the third phase, we use the K-Nearest Neighbor (KNN) model to classify coconut milk samples into authentic or adulterated. We evaluate the performance of the proposed system using a public dataset comprising Fourier Transform Infrared (FTIR) spectral information of pure and contaminated coconut milk samples. Findings show that the proposed method successfully detects adulteration with a cross-validation accuracy of 93.33%.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Role of Virtual Reality in Improving Students’ LMS Experiences: Structural Equation Modelling Based Study 虚拟现实在提高学生LMS体验中的作用:基于结构方程模型的研究
Saadia Anwar Pasha, E. Youssef, Humaira Sharif
This study focuses on examining the role of Virtual Reality in improving the students’ educational experiences through Learning Management System in Pakistan. The researchers adopted a cross-sectional design and analyzed the gathered data by using survey questionnaires. By using the SEM, findings indicated a strong, significant relationship between Virtual Reality, Expectation Confirmation (p < 0.000), Attitude (p < 0.000), and Knowledge Acquisition (p < 0.000. However, the relationship between Behavioral Intention, Expectation Confirmation (p < 0.451) and Attitude (p < 0.161) remained insignificant. On the other hand, the proposed relationship between Knowledge Acquisition and Behavioral was strongly significant, with the p-value at 0.000. Finally, results revealed a strong, significant relationship between Behavioral Intention and Improved Learning Management System Experiences with the t-value at 10.474 and p-value at 0.000. Thus, this article concluded that it is important to develop and incorporate Virtual and Augmented Reality in education. Especially when the students depend on digital learning platforms, Virtual Reality adoption improves their learning experiences.
本研究的重点是研究虚拟现实在巴基斯坦学习管理系统中改善学生教育体验的作用。研究人员采用了横断面设计,并通过调查问卷对收集到的数据进行了分析。通过使用扫描电镜,研究结果表明虚拟现实、期望确认(p < 0.000)、态度(p < 0.000)和知识获取(p < 0.000)之间存在强烈而显著的关系。而行为意向、期望确认(p < 0.451)和态度(p < 0.161)之间的关系不显著。另一方面,提出的知识获取与行为之间的关系是强显著的,p值为0.000。最后,研究结果显示,行为意向与改进学习管理系统体验之间存在显著的关系,t值为10.474,p值为0.000。因此,本文得出结论,在教育中开发和整合虚拟现实和增强现实是非常重要的。特别是当学生依赖数字学习平台时,虚拟现实的采用改善了他们的学习体验。
{"title":"Role of Virtual Reality in Improving Students’ LMS Experiences: Structural Equation Modelling Based Study","authors":"Saadia Anwar Pasha, E. Youssef, Humaira Sharif","doi":"10.1109/MTICTI53925.2021.9664769","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664769","url":null,"abstract":"This study focuses on examining the role of Virtual Reality in improving the students’ educational experiences through Learning Management System in Pakistan. The researchers adopted a cross-sectional design and analyzed the gathered data by using survey questionnaires. By using the SEM, findings indicated a strong, significant relationship between Virtual Reality, Expectation Confirmation (p < 0.000), Attitude (p < 0.000), and Knowledge Acquisition (p < 0.000. However, the relationship between Behavioral Intention, Expectation Confirmation (p < 0.451) and Attitude (p < 0.161) remained insignificant. On the other hand, the proposed relationship between Knowledge Acquisition and Behavioral was strongly significant, with the p-value at 0.000. Finally, results revealed a strong, significant relationship between Behavioral Intention and Improved Learning Management System Experiences with the t-value at 10.474 and p-value at 0.000. Thus, this article concluded that it is important to develop and incorporate Virtual and Augmented Reality in education. Especially when the students depend on digital learning platforms, Virtual Reality adoption improves their learning experiences.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125532325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1