首页 > 最新文献

International Journal of Engineering and Computer Science最新文献

英文 中文
A Review on Resource Allocation in IoT Network using Machine Learning 利用机器学习对物联网网络进行资源分配综述
Pub Date : 2024-07-02 DOI: 10.18535/ijecs/v13i07.4849
Nandu Kumar, Amar Nayak
In the fields of data analytics and industrial automation, the Internet of Things (IoT) has become a game-changer. In IoT contexts, there is a growing demand for effective use of resources due to the interconnection of devices and systems. The constantly changing character of IoT systems, where resource availability and demand alter continually, presents one of the main obstacles in resource allocation management. The capacity of machine learning approaches to manage intricate and changing structures has garnered substantial interest in recent times. In the framework of the Industrial Internet of Things, this work gives a detailed comparison of various resource allocation in IoT network using machine learning algorithms.
在数据分析和工业自动化领域,物联网(IoT)已经改变了游戏规则。在物联网背景下,由于设备和系统之间的相互连接,对有效利用资源的需求日益增长。物联网系统具有不断变化的特点,资源的可用性和需求不断变化,这成为资源分配管理的主要障碍之一。近来,机器学习方法管理复杂多变结构的能力引起了广泛关注。在工业物联网框架下,本作品详细比较了物联网网络中使用机器学习算法进行的各种资源分配。
{"title":"A Review on Resource Allocation in IoT Network using Machine Learning","authors":"Nandu Kumar, Amar Nayak","doi":"10.18535/ijecs/v13i07.4849","DOIUrl":"https://doi.org/10.18535/ijecs/v13i07.4849","url":null,"abstract":"In the fields of data analytics and industrial automation, the Internet of Things (IoT) has become a game-changer. In IoT contexts, there is a growing demand for effective use of resources due to the interconnection of devices and systems. The constantly changing character of IoT systems, where resource availability and demand alter continually, presents one of the main obstacles in resource allocation management. The capacity of machine learning approaches to manage intricate and changing structures has garnered substantial interest in recent times. In the framework of the Industrial Internet of Things, this work gives a detailed comparison of various resource allocation in IoT network using machine learning algorithms.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"6 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141684317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient algorithm for text encryption on android devices 安卓设备上文本加密的高效算法
Pub Date : 2024-07-02 DOI: 10.18535/ijecs/v13i07.4843
Williams, J., B. E. O., Anireh V.I.E
In the era of digital communication, ensuring the confidentiality and integrity of sensitive information is paramount. This dissertation introduces a robust text encryption system that combines the strengths of Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms to create a hybrid encryption approach. Object Oriented Design (OOD) was used for the design methodology. The proposed system leverages the efficiency of AES for symmetric key encryption and the security benefits of RSA for key exchange and digital signatures. The encryption process begins with the generation of a random symmetric key for each communication session, which is then used for the AES encryption of the plaintext. The symmetric key is subsequently encrypted using the recipient's RSA public key, ensuring secure key exchange. This hybrid approach harnesses the speed of AES for bulk data encryption while utilizing RSA's asymmetric encryption for the secure sharing of secret keys. The system incorporates digital signatures generated using RSA to authenticate the sender and verify the integrity of the encrypted message. This dual-layered encryption strategy not only safeguards the confidentiality of the message but also provides assurance of the message origin and integrity. The implementation of this hybrid AES-RSA encryption system using Python programming language offers a versatile solution suitable for diverse communication channels, including email, messaging platforms, and file transfers. Its robustness against common cryptographic attacks makes it an ideal choice for securing sensitive information in various applications, such as financial transactions, healthcare communication, and government data exchange. The experimental results demonstrate the efficacy of the proposed system, with significantly reduced encryption and decryption times—0.5005 seconds and 0.5003 seconds, respectively—when compared to existing systems. This noteworthy improvement in processing speed enhances the system's practical applicability for real-time communication scenarios.
在数字通信时代,确保敏感信息的机密性和完整性至关重要。本论文介绍了一种强大的文本加密系统,该系统结合了高级加密标准(AES)和 Rivest-Shamir-Adleman (RSA)算法的优势,创建了一种混合加密方法。设计方法采用了面向对象设计(OOD)。提议的系统利用 AES 的效率进行对称密钥加密,并利用 RSA 的安全优势进行密钥交换和数字签名。加密过程首先是为每个通信会话生成一个随机对称密钥,然后用它对明文进行 AES 加密。对称密钥随后使用接收方的 RSA 公钥进行加密,确保密钥交换安全。这种混合方法利用 AES 的速度进行批量数据加密,同时利用 RSA 的非对称加密技术安全共享密钥。该系统结合使用 RSA 生成的数字签名来验证发送者的身份和加密信息的完整性。这种双层加密策略不仅能保护信息的机密性,还能保证信息的来源和完整性。使用 Python 编程语言实现这种混合 AES-RSA 加密系统提供了一种多功能解决方案,适用于各种通信渠道,包括电子邮件、信息平台和文件传输。该系统对常见加密攻击的鲁棒性使其成为金融交易、医疗保健通信和政府数据交换等各种应用中保护敏感信息安全的理想选择。实验结果证明了所提系统的功效,与现有系统相比,加密和解密时间分别大幅缩短了 0.5005 秒和 0.5003 秒。处理速度的显著提高增强了系统在实时通信场景中的实用性。
{"title":"An efficient algorithm for text encryption on android devices","authors":"Williams, J., B. E. O., Anireh V.I.E","doi":"10.18535/ijecs/v13i07.4843","DOIUrl":"https://doi.org/10.18535/ijecs/v13i07.4843","url":null,"abstract":"In the era of digital communication, ensuring the confidentiality and integrity of sensitive information is paramount. This dissertation introduces a robust text encryption system that combines the strengths of Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms to create a hybrid encryption approach. Object Oriented Design (OOD) was used for the design methodology. The proposed system leverages the efficiency of AES for symmetric key encryption and the security benefits of RSA for key exchange and digital signatures. The encryption process begins with the generation of a random symmetric key for each communication session, which is then used for the AES encryption of the plaintext. The symmetric key is subsequently encrypted using the recipient's RSA public key, ensuring secure key exchange. This hybrid approach harnesses the speed of AES for bulk data encryption while utilizing RSA's asymmetric encryption for the secure sharing of secret keys. The system incorporates digital signatures generated using RSA to authenticate the sender and verify the integrity of the encrypted message. This dual-layered encryption strategy not only safeguards the confidentiality of the message but also provides assurance of the message origin and integrity. The implementation of this hybrid AES-RSA encryption system using Python programming language offers a versatile solution suitable for diverse communication channels, including email, messaging platforms, and file transfers. Its robustness against common cryptographic attacks makes it an ideal choice for securing sensitive information in various applications, such as financial transactions, healthcare communication, and government data exchange. The experimental results demonstrate the efficacy of the proposed system, with significantly reduced encryption and decryption times—0.5005 seconds and 0.5003 seconds, respectively—when compared to existing systems. This noteworthy improvement in processing speed enhances the system's practical applicability for real-time communication scenarios.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"39 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141687844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modernizing Procurement in Supply Chain with AI and Machine Learning Techniques 利用人工智能和机器学习技术实现供应链采购现代化
Pub Date : 2024-06-09 DOI: 10.18535/ijecs/v11i08.4692
Goli Mallesham
Public procurement in Europe represents, on average, 16.9% of the GDP and is the cornerstone of the European Single Market. Simplifying public procurement and reducing procurement administrative costs for the public and private sectors can deliver substantial benefits at the national and European levels. However, the complexity and diversity of public procurement processes, as well as the huge expenditure at hand, implement automatic systems tailored to specific procurement needs necessary. This paper shows how artificial intelligence, and in particular machine learning techniques, can be used to modernize public procurement. It presents implemented systems and showcases pilot projects. The results of an extensive evaluation are also reported.The paper also argues that public procurement should be used more strategically by public administrations. This means aligning procurement actions with overall business objectives and using procurement to leverage supplier innovation and create a competitive advantage. Such advanced objectives are seldom achieved through the lowest price model. The paper also contains several recommendations for both the supply and demand sides to help realize the full potential of public procurement. On the supply side, recommendations relate to a better understanding of how artificial intelligence can be used in procurement activities, working with AI systems, and creating AI systems. On the demand side, recommendations involve the careful planning of how and when to use AI in procurement activities.
欧洲的公共采购平均占国内生产总值的 16.9%,是欧洲单一市场的基石。简化公共采购,降低公共和私营部门的采购管理成本,可以在国家和欧洲层面带来巨大效益。然而,由于公共采购流程的复杂性和多样性,以及手头的巨额开支,有必要针对具体的采购需求量身定制自动系统。本文介绍了如何利用人工智能,特别是机器学习技术来实现公共采购的现代化。它介绍了已实施的系统并展示了试点项目。本文还认为,公共行政部门应更具战略性地使用公共采购。本文还认为,公共行政部门应更具战略性地使用公共采购,这意味着使采购行动与总体业务目标相一致,并利用采购来利用供应商的创新,创造竞争优势。这种先进的目标很少能通过最低价格模式来实现。本文还为供需双方提出了若干建议,以帮助充分发挥公共采购的潜力。在供应方面,建议涉及更好地了解如何在采购活动中使用人工智能、与人工智能系统合作以及创建人工智能系统。在需求方面,建议涉及仔细规划如何以及何时在采购活动中使用人工智能。
{"title":"Modernizing Procurement in Supply Chain with AI and Machine Learning Techniques","authors":"Goli Mallesham","doi":"10.18535/ijecs/v11i08.4692","DOIUrl":"https://doi.org/10.18535/ijecs/v11i08.4692","url":null,"abstract":"Public procurement in Europe represents, on average, 16.9% of the GDP and is the cornerstone of the European Single Market. Simplifying public procurement and reducing procurement administrative costs for the public and private sectors can deliver substantial benefits at the national and European levels. However, the complexity and diversity of public procurement processes, as well as the huge expenditure at hand, implement automatic systems tailored to specific procurement needs necessary. This paper shows how artificial intelligence, and in particular machine learning techniques, can be used to modernize public procurement. It presents implemented systems and showcases pilot projects. The results of an extensive evaluation are also reported.\u0000The paper also argues that public procurement should be used more strategically by public administrations. This means aligning procurement actions with overall business objectives and using procurement to leverage supplier innovation and create a competitive advantage. Such advanced objectives are seldom achieved through the lowest price model. The paper also contains several recommendations for both the supply and demand sides to help realize the full potential of public procurement. On the supply side, recommendations relate to a better understanding of how artificial intelligence can be used in procurement activities, working with AI systems, and creating AI systems. On the demand side, recommendations involve the careful planning of how and when to use AI in procurement activities.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":" 72","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141367495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Techniques for Optimizing Supply Chain Operations 优化供应链运作的创新技术
Pub Date : 2024-06-09 DOI: 10.18535/ijecs/v11i08.4691
Goli Mallesham
Supply chain management is an approach used by firms to ensure that their business can be highly effective, and profitable and that operations run smoothly. This involves managing the movement of raw materials inwards and finished goods outwards. Logistics is a key component of this. It also involves managing the flow of products between companies, which can involve the movement of products between a manufacturer, a wholesaler, and a retailer. Supply chain management is therefore the integration of these flows between companies. Several innovative techniques can be used to optimize supply chain operations, particularly given recent advances in information technology. The function of logistics is known as activities that are related to the flow of products between companies, such as the transportation and warehousing of goods. Activities that take place within companies, such as inventory management and materials handling, are not considered to be logistical activities but part of the supply chain. The level of interest in supply chain management has risen quite dramatically over the last few years. This is partly due to advances in information technology, which have enabled closer integration of the supply chain. As well as increasing competition between companies, on both a national and an international level, has led to an increasing emphasis on the need for companies to concentrate on their core competencies, and to look to outside suppliers to provide other goods and services. This has led to the increased use of external suppliers.
供应链管理是企业为确保业务高效、盈利和运营顺利而采用的一种方法。这包括管理原材料的进货和成品的出货。物流是其中的关键组成部分。它还涉及管理公司之间的产品流动,包括制造商、批发商和零售商之间的产品流动。因此,供应链管理就是整合公司之间的这些流动。有几种创新技术可用于优化供应链运作,尤其是在信息技术不断进步的今天。众所周知,物流的功能是与公司之间产品流动有关的活动,如货物运输和仓储。公司内部的活动,如库存管理和材料处理,不属于物流活动,而是供应链的一部分。在过去几年中,人们对供应链管理的兴趣急剧上升。其部分原因是信息技术的进步使供应链的整合更加紧密。此外,国内和国际公司之间的竞争日趋激烈,导致人们越来越强调公司需要集中精力发展自己的核心竞争力,并寻求外部供应商提供其他商品和服务。这导致了对外部供应商的更多使用。
{"title":"Innovative Techniques for Optimizing Supply Chain Operations","authors":"Goli Mallesham","doi":"10.18535/ijecs/v11i08.4691","DOIUrl":"https://doi.org/10.18535/ijecs/v11i08.4691","url":null,"abstract":"Supply chain management is an approach used by firms to ensure that their business can be highly effective, and profitable and that operations run smoothly. This involves managing the movement of raw materials inwards and finished goods outwards. Logistics is a key component of this. It also involves managing the flow of products between companies, which can involve the movement of products between a manufacturer, a wholesaler, and a retailer. Supply chain management is therefore the integration of these flows between companies. Several innovative techniques can be used to optimize supply chain operations, particularly given recent advances in information technology. The function of logistics is known as activities that are related to the flow of products between companies, such as the transportation and warehousing of goods. Activities that take place within companies, such as inventory management and materials handling, are not considered to be logistical activities but part of the supply chain. The level of interest in supply chain management has risen quite dramatically over the last few years. This is partly due to advances in information technology, which have enabled closer integration of the supply chain. As well as increasing competition between companies, on both a national and an international level, has led to an increasing emphasis on the need for companies to concentrate on their core competencies, and to look to outside suppliers to provide other goods and services. This has led to the increased use of external suppliers.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":" 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141367649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Paper on Exploring the Landscape of Recommendation Systems: A Comparative Analysis of Techniques and Approaches 研究论文:探索推荐系统的前景:技术与方法的比较分析
Pub Date : 2024-06-06 DOI: 10.18535/ijecs/v13i06.4827
Garvit Sharma, Karthik Pragada, Poushali Deb Purkayastha, Yukta Vajpayee
The field of recommendation systems has witnessed a profound evolution since its inception with Grundy, the first computer-based librarian, in 1979. From its humble beginnings, recommendation systems have become integral to various facets of daily life, particularly in e-commerce, thanks to breakthroughs like Amazon’s Collaborative Filtering in the late 1990s. This led to widespread adoption across diverse sectors, prompting significant research interest and investment, exemplified by Netflix’s renowned recommendation system contest in 2006. Today, recommendation systems employ various techniques such as Hybrid Filtering, Content-Based Filtering, Demographic Filtering, and Collaborative Filtering catering to personalized information needs across industries like entertainment, education, and healthcare. Moreover, emerging types of recommendation systems, including Knowledge-Based, RiskAware, Social-Networking, and Context-Aware, further broaden their applicability, addressing specific user needs and preferences. Leveraging machine learning and AI algorithms on big data, recommendation systems have become a quintessential application of big data analytics, enhancing user experience and engagement in domains like e-learning, tourism, and news dissemination. However, scaling recommendation systems present challenges due to the exponential growth of input data, necessitating strategies like Dimensionality Reduction and cluster-based methods. Integrating multiple recommendation algorithms enhances system complexity, requiring careful consideration of algorithm selection, performance monitoring, and maintenance. Transparency and explanation mechanisms become crucial in complex systems to foster user trust and understanding. Despite challenges, recommendation systems continue to drive innovation, delivering personalized recommendations and enriching user experiences across various domains.
自 1979 年第一位基于计算机的图书管理员 Grundy 诞生以来,推荐系统领域经历了深刻的演变。推荐系统从最初的不起眼到如今已与日常生活的方方面面密不可分,尤其是在电子商务领域,这要归功于亚马逊在 20 世纪 90 年代末推出的协同过滤技术。这促使推荐系统被广泛应用于各个领域,并引发了大量的研究兴趣和投资,Netflix 在 2006 年举办的著名推荐系统竞赛就是一个很好的例子。如今,推荐系统采用了多种技术,如混合过滤、基于内容的过滤、人口统计过滤和协作过滤,以满足娱乐、教育和医疗保健等行业的个性化信息需求。此外,基于知识、风险意识、社交网络和情境意识等新兴类型的推荐系统进一步拓宽了其适用范围,满足了特定用户的需求和偏好。利用大数据上的机器学习和人工智能算法,推荐系统已成为大数据分析的典型应用,在电子学习、旅游和新闻传播等领域增强了用户体验和参与度。然而,由于输入数据呈指数级增长,扩展推荐系统面临着挑战,因此需要采用降维和基于集群的方法等策略。整合多种推荐算法增加了系统的复杂性,需要仔细考虑算法选择、性能监控和维护。在复杂的系统中,透明度和解释机制对促进用户信任和理解至关重要。尽管面临挑战,推荐系统仍在继续推动创新,提供个性化推荐,丰富各领域的用户体验。
{"title":"Research Paper on Exploring the Landscape of Recommendation Systems: A Comparative Analysis of Techniques and Approaches","authors":"Garvit Sharma, Karthik Pragada, Poushali Deb Purkayastha, Yukta Vajpayee","doi":"10.18535/ijecs/v13i06.4827","DOIUrl":"https://doi.org/10.18535/ijecs/v13i06.4827","url":null,"abstract":"The field of recommendation systems has witnessed a profound evolution since its inception with Grundy, the first computer-based librarian, in 1979. From its humble beginnings, recommendation systems have become integral to various facets of daily life, particularly in e-commerce, thanks to breakthroughs like Amazon’s Collaborative Filtering in the late 1990s. This led to widespread adoption across diverse sectors, prompting significant research interest and investment, exemplified by Netflix’s renowned recommendation system contest in 2006. Today, recommendation systems employ various techniques such as Hybrid Filtering, Content-Based Filtering, Demographic Filtering, and Collaborative Filtering catering to personalized information needs across industries like entertainment, education, and healthcare. Moreover, emerging types of recommendation systems, including Knowledge-Based, RiskAware, Social-Networking, and Context-Aware, further broaden their applicability, addressing specific user needs and preferences. Leveraging machine learning and AI algorithms on big data, recommendation systems have become a quintessential application of big data analytics, enhancing user experience and engagement in domains like e-learning, tourism, and news dissemination. However, scaling recommendation systems present challenges due to the exponential growth of input data, necessitating strategies like Dimensionality Reduction and cluster-based methods. Integrating multiple recommendation algorithms enhances system complexity, requiring careful consideration of algorithm selection, performance monitoring, and maintenance. Transparency and explanation mechanisms become crucial in complex systems to foster user trust and understanding. Despite challenges, recommendation systems continue to drive innovation, delivering personalized recommendations and enriching user experiences across various domains.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"10 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing Neural Networks for Early Prediction of Pneumococcal Disease: A Case Study in Bonny Island, Nigeria 利用神经网络早期预测肺炎球菌疾病:尼日利亚邦尼岛案例研究
Pub Date : 2024-06-06 DOI: 10.18535/ijecs/v13i06.4828
Fiberesima Alalibo Ralph, Ogunnusi, Samuel.O, Pronen Innocent
Pneumococcal disease, caused by Streptococcus pneumoniae, poses a significant health challenge, particularly in resource-limited settings like Bonny Island, Nigeria. This study employs neural networks and artificial intelligence to predict pneumococcal disease, addressing the critical need for early diagnosis and intervention. Methodologically, the research encompasses data collection, cleaning, correlation analysis, and model development, ensuring a robust system for early disease prediction. By analyzing demographic, clinical, and environmental factors, the study identifies significant predictors of pneumococcal disease risk. In comparison with Random Forest and Support Vector Machines trained on the same data, the neural network achieved 100 percent accuracy, recall, precision, and f1 scores. The integration of the neural network model into a web application facilitates real-time predictions, enabling healthcare providers to input symptoms and receive immediate diagnostic insights. This approach enhances timely interventions, potentially reducing morbidity and mortality associated with pneumococcal disease. Despite challenges like data quality and integration, the findings demonstrate the efficacy of AI-driven models in improving public health outcomes. The deployment of such models in Bonny Island underscores their practicality and scalability, paving the way for broader applications in similar contexts. Ultimately, this study not only advances understanding of pneumococcal disease epidemiology in Bonny Island but also contributes to global efforts in enhancing healthcare delivery through innovative technological solutions. Future research should focus on continuous model refinement and validation with larger datasets to further improve accuracy and reliability.
由肺炎链球菌引起的肺炎球菌疾病是一项重大的健康挑战,尤其是在尼日利亚邦尼岛等资源有限的地区。本研究利用神经网络和人工智能预测肺炎球菌疾病,以满足早期诊断和干预的迫切需要。在方法上,研究包括数据收集、清理、相关性分析和模型开发,以确保建立一个强大的早期疾病预测系统。通过分析人口、临床和环境因素,该研究确定了肺炎球菌疾病风险的重要预测因素。与在相同数据上训练的随机森林和支持向量机相比,神经网络的准确率、召回率、精确度和 f1 分数均达到了 100%。将神经网络模型集成到网络应用程序中有助于进行实时预测,使医疗服务提供者能够输入症状并立即获得诊断意见。这种方法可以加强及时干预,从而降低与肺炎球菌疾病相关的发病率和死亡率。尽管存在数据质量和整合等挑战,但研究结果证明了人工智能驱动的模型在改善公共卫生成果方面的功效。在邦尼岛部署此类模型凸显了其实用性和可扩展性,为在类似环境中更广泛的应用铺平了道路。最终,这项研究不仅加深了人们对邦尼岛肺炎球菌疾病流行病学的了解,还有助于全球通过创新技术解决方案来改善医疗保健服务的努力。未来的研究应侧重于利用更大的数据集不断完善和验证模型,以进一步提高准确性和可靠性。
{"title":"Utilizing Neural Networks for Early Prediction of Pneumococcal Disease: A Case Study in Bonny Island, Nigeria","authors":"Fiberesima Alalibo Ralph, Ogunnusi, Samuel.O, Pronen Innocent","doi":"10.18535/ijecs/v13i06.4828","DOIUrl":"https://doi.org/10.18535/ijecs/v13i06.4828","url":null,"abstract":"Pneumococcal disease, caused by Streptococcus pneumoniae, poses a significant health challenge, particularly in resource-limited settings like Bonny Island, Nigeria. This study employs neural networks and artificial intelligence to predict pneumococcal disease, addressing the critical need for early diagnosis and intervention. Methodologically, the research encompasses data collection, cleaning, correlation analysis, and model development, ensuring a robust system for early disease prediction. By analyzing demographic, clinical, and environmental factors, the study identifies significant predictors of pneumococcal disease risk. In comparison with Random Forest and Support Vector Machines trained on the same data, the neural network achieved 100 percent accuracy, recall, precision, and f1 scores. The integration of the neural network model into a web application facilitates real-time predictions, enabling healthcare providers to input symptoms and receive immediate diagnostic insights. This approach enhances timely interventions, potentially reducing morbidity and mortality associated with pneumococcal disease. Despite challenges like data quality and integration, the findings demonstrate the efficacy of AI-driven models in improving public health outcomes. The deployment of such models in Bonny Island underscores their practicality and scalability, paving the way for broader applications in similar contexts. Ultimately, this study not only advances understanding of pneumococcal disease epidemiology in Bonny Island but also contributes to global efforts in enhancing healthcare delivery through innovative technological solutions. Future research should focus on continuous model refinement and validation with larger datasets to further improve accuracy and reliability.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"30 2‐3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence-Based Approach on Cybersecurity Challenges and Opportunities in The Internet of Things & Edge Computing Devices 物联网与边缘计算设备中基于人工智能的网络安全挑战与机遇
Pub Date : 2023-07-12 DOI: 10.18535/ijecs/v12i07.4744
Dr Mansoor Farooq
The Internet of Things (IoT) presents a wide range of issues and challenges. Security is a major concern for IoT technologies, applications, and networks. IoT's research progress is discussed in this paper, which focuses on this primary feature of IoT and describes various security issues and concerns. The Internet of Things and the concept of edge computing have enabled many new IoT applications, including smart homes, intelligent transportation, pioneering health, smart grids, and smart energy. It also introduces a slew of unanticipated challenges to data security. Cybersecurity, edge computing, the Internet of Things, and artificial intelligence all present exciting new research and development prospects. There are many new threats and opportunities and this paper will focus on them.
物联网(IoT)提出了广泛的问题和挑战。安全性是物联网技术、应用和网络的主要关注点。本文讨论了物联网的研究进展,重点介绍了物联网的这一主要特征,并描述了各种安全问题和关注点。物联网和边缘计算概念使许多新的物联网应用成为可能,包括智能家居、智能交通、先锋健康、智能电网和智能能源。它还给数据安全带来了一系列意想不到的挑战。网络安全、边缘计算、物联网和人工智能都呈现出令人兴奋的新研究和发展前景。有许多新的威胁和机会,这篇文章将重点关注他们。
{"title":"Artificial Intelligence-Based Approach on Cybersecurity Challenges and Opportunities in The Internet of Things & Edge Computing Devices","authors":"Dr Mansoor Farooq","doi":"10.18535/ijecs/v12i07.4744","DOIUrl":"https://doi.org/10.18535/ijecs/v12i07.4744","url":null,"abstract":"The Internet of Things (IoT) presents a wide range of issues and challenges. Security is a major concern for IoT technologies, applications, and networks. IoT's research progress is discussed in this paper, which focuses on this primary feature of IoT and describes various security issues and concerns. The Internet of Things and the concept of edge computing have enabled many new IoT applications, including smart homes, intelligent transportation, pioneering health, smart grids, and smart energy. It also introduces a slew of unanticipated challenges to data security. Cybersecurity, edge computing, the Internet of Things, and artificial intelligence all present exciting new research and development prospects. There are many new threats and opportunities and this paper will focus on them.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134301106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for Modified Firefly Algorithm in Multimodal Biometric Authentication System 多模态生物认证系统中改进的萤火虫算法框架
Pub Date : 2023-07-07 DOI: 10.18535/ijecs/v12i07.4741
MR. Bukola
Many end users are turning to multimodal biometric systems as a result of the limitations of conventional authentication techniques and unimodal biometric systems for offering a high level of accurate authentication. When high accuracy and security are required, multimodal biometrics are the best choice because to the utilization of numerous identification modalities. It is difficult to identify the best features that contribute to the recognition rate/accuracy and have a high redundancy of features since different features are acquired at the feature level fusion from a variety of physiological or behavioral variables. At the feature selection level, the utilization of meta-heuristic algorithms will reduce the number of redundant features while keeping critical feature sets that are important to biometric performance, accuracy, and efficiency. The study demonstrated a multimodal biometric authentication system that used the features of the face and both irises. In order to avoid being stuck at the local optimum and hasten convergence, the Firefly Algorithm (FFA) was modified by including a chaotic sinusoidal map function and a roulette wheel selection mechanism as deterministic processes. The results of the study demonstrated that in terms of sensitivity, precision, recognition accuracy, and time, the proposed MFFA with multimodal outperformed the MFFA for unimodal, bi-modal, and bi-instance. In addition to being computationally faster, more accurate, and suitable for real-time applications, the modified method, known as MFFA, proved effective in integrating multimodal data sets.
由于传统身份验证技术和单模态生物识别系统在提供高水平准确身份验证方面的局限性,许多最终用户正在转向多模态生物识别系统。在对准确性和安全性要求较高的情况下,多模态生物识别技术是最好的选择,因为它可以利用多种识别模式。由于在特征级融合中,从各种生理或行为变量中获得不同的特征,因此很难识别出对识别率/准确性有贡献且具有高冗余度的最佳特征。在特征选择层面,元启发式算法的使用将减少冗余特征的数量,同时保留对生物识别性能、准确性和效率至关重要的关键特征集。该研究展示了一种利用面部特征和双虹膜的多模式生物识别认证系统。为了避免陷入局部最优,加速收敛,对萤火虫算法(FFA)进行了改进,将混沌正弦映射函数和轮盘赌选择机制作为确定性过程。研究结果表明,在灵敏度、精度、识别准确度和时间方面,多模态MFFA优于单模态、双模态和双实例的MFFA。除了计算速度更快、更准确、适合于实时应用之外,改进后的MFFA方法在集成多模态数据集方面被证明是有效的。
{"title":"A framework for Modified Firefly Algorithm in Multimodal Biometric Authentication System","authors":"MR. Bukola","doi":"10.18535/ijecs/v12i07.4741","DOIUrl":"https://doi.org/10.18535/ijecs/v12i07.4741","url":null,"abstract":"Many end users are turning to multimodal biometric systems as a result of the limitations of conventional authentication techniques and unimodal biometric systems for offering a high level of accurate authentication. When high accuracy and security are required, multimodal biometrics are the best choice because to the utilization of numerous identification modalities. It is difficult to identify the best features that contribute to the recognition rate/accuracy and have a high redundancy of features since different features are acquired at the feature level fusion from a variety of physiological or behavioral variables. At the feature selection level, the utilization of meta-heuristic algorithms will reduce the number of redundant features while keeping critical feature sets that are important to biometric performance, accuracy, and efficiency. The study demonstrated a multimodal biometric authentication system that used the features of the face and both irises. In order to avoid being stuck at the local optimum and hasten convergence, the Firefly Algorithm (FFA) was modified by including a chaotic sinusoidal map function and a roulette wheel selection mechanism as deterministic processes. The results of the study demonstrated that in terms of sensitivity, precision, recognition accuracy, and time, the proposed MFFA with multimodal outperformed the MFFA for unimodal, bi-modal, and bi-instance. In addition to being computationally faster, more accurate, and suitable for real-time applications, the modified method, known as MFFA, proved effective in integrating multimodal data sets.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125080843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Object Detection Using SSD MobileNet Model of Machine Learning 基于机器学习的SSD MobileNet模型的实时目标检测
Pub Date : 2023-05-27 DOI: 10.18535/ijecs/v12i05.4735
Anurag Gupta, Darshan Yadav, Akash Raj, Ayushman Pathak
This research paper focuses on the application of computer vision techniques using Python and OpenCV for image analysis and interpretation. The main objective is to develop a system capable of performing various tasks such as object detection, recognition, and image processing. The project employs a combination of traditional computer vision algorithms and deep learning models to achieve accurate and efficient results. The research paper begins with essential preprocessing steps, including image acquisition, resizing, and noise reduction. Feature extraction techniques are utilized to capture relevant information from images, followed by object detection using methods like Haar cascades or deep learning-based approaches such as YOLO. Object recognition is achieved through feature matching or deep learning-based classification models. Furthermore, image processing techniques, including image enhancement, segmentation, and filtering, are applied to improve image quality and extract meaningful information. The system is implemented using Python programming language, leveraging the powerful OpenCV library for various computer vision tasks.
本研究论文着重于使用Python和OpenCV进行图像分析和解释的计算机视觉技术的应用。主要目标是开发一个能够执行各种任务的系统,如物体检测、识别和图像处理。该项目将传统的计算机视觉算法与深度学习模型相结合,以实现准确高效的结果。研究论文从基本的预处理步骤开始,包括图像采集,调整大小和降噪。利用特征提取技术从图像中捕获相关信息,然后使用Haar级联或基于深度学习的方法(如YOLO)进行对象检测。目标识别是通过特征匹配或基于深度学习的分类模型来实现的。此外,图像处理技术,包括图像增强,分割和滤波,用于提高图像质量和提取有意义的信息。该系统使用Python编程语言实现,利用强大的OpenCV库实现各种计算机视觉任务。
{"title":"Real-Time Object Detection Using SSD MobileNet Model of Machine Learning","authors":"Anurag Gupta, Darshan Yadav, Akash Raj, Ayushman Pathak","doi":"10.18535/ijecs/v12i05.4735","DOIUrl":"https://doi.org/10.18535/ijecs/v12i05.4735","url":null,"abstract":"This research paper focuses on the application of computer vision techniques using Python and OpenCV for image analysis and interpretation. The main objective is to develop a system capable of performing various tasks such as object detection, recognition, and image processing. The project employs a combination of traditional computer vision algorithms and deep learning models to achieve accurate and efficient results. The research paper begins with essential preprocessing steps, including image acquisition, resizing, and noise reduction. Feature extraction techniques are utilized to capture relevant information from images, followed by object detection using methods like Haar cascades or deep learning-based approaches such as YOLO. Object recognition is achieved through feature matching or deep learning-based classification models. Furthermore, image processing techniques, including image enhancement, segmentation, and filtering, are applied to improve image quality and extract meaningful information. The system is implemented using Python programming language, leveraging the powerful OpenCV library for various computer vision tasks.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130738539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Blockchain technology 区块链技术的实现
Pub Date : 2023-05-24 DOI: 10.18535/ijecs/v12i05.4734
Manju Sharma
Transaction volumes throughout the world are growing very fastly and that result in the complexities, vulnerabilities, inefficiencies, and higher costs of current transaction systems. The growth of ecommerce, online banking, and in-app purchases, is increasing and is more popular among the people around the world. And transaction volumes are increasing with the advent of the Internet of Things (IoT). Objects, such as laptop, washing machines and groceries are running low and cars that deliver themselves to your door. To meet these challenges and others we need faster payment methods that are trustworthy and require no specialized equipment with no chargebacks or monthly fees and offer a good bookkeeping solution for ensuring transparency.  
世界各地的交易量增长非常迅速,这导致了当前交易系统的复杂性、脆弱性、低效率和更高的成本。电子商务、网上银行和应用内购买的增长正在增加,并在世界各地的人们中越来越受欢迎。随着物联网(IoT)的出现,交易量也在不断增加。笔记本电脑、洗衣机和杂货等物品的电量越来越少,汽车也会自动送货上门。为了应对这些挑战和其他挑战,我们需要更快的付款方式,值得信赖,不需要专门的设备,不需要退款或月费,并提供良好的记账解决方案,以确保透明度。
{"title":"Implementation of Blockchain technology","authors":"Manju Sharma","doi":"10.18535/ijecs/v12i05.4734","DOIUrl":"https://doi.org/10.18535/ijecs/v12i05.4734","url":null,"abstract":"Transaction volumes throughout the world are growing very fastly and that result in the complexities, vulnerabilities, inefficiencies, and higher costs of current transaction systems. The growth of ecommerce, online banking, and in-app purchases, is increasing and is more popular among the people around the world. And transaction volumes are increasing with the advent of the Internet of Things (IoT). Objects, such as laptop, washing machines and groceries are running low and cars that deliver themselves to your door. To meet these challenges and others we need faster payment methods that are trustworthy and require no specialized equipment with no chargebacks or monthly fees and offer a good bookkeeping solution for ensuring transparency. \u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Engineering and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1