首页 > 最新文献

2022 5th Information Technology for Education and Development (ITED)最新文献

英文 中文
Improving Optimization Prowess of Ant Colony Algorithm Using Bat Inspired Algorithm 利用蝙蝠启发算法提高蚁群算法的优化能力
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051478
Hakeem Babalola Akande, O. Abikoye, O. Akande, R. Jimoh
Metaheuristic algorithms such as Ant Colony Optimization (ACO) algorithm and Bat Optimization Algorithm (BOA) have been widely employed in solving different optimization problems in several fields. ACO is modelled based on the social behaviour of ants that look for appropriate answers to a given optimization issue by recasting it as the case of locating the least expensive path on a weighted graph. A set of parameters linked to graph components (either nodes or edges) whose values are changed by the ants during runtime constitute the pheromone model, which biases the stochastic solution generation process. However, the effectiveness of ACO declines as the quantity of packets rises, making them ineffective for reducing traffic congestion. As more packets are transmitted, their strength decreases, causing packet congestion, rendering them useless for reducing packet traffic congestion. On the contrary, BOA which was modelled after the behavior of bats has also been employed in fixing network routing issues by listening to every sound in a space and taking note of what is going on around it. In order to further improve ACO algorithm and decrease packet traffic congestion, packet loss, and the time it takes a packet to reach its destination in a network system, this study employs the strength of BOA. Results obtained revealed the prowess of BOA in improving the performance of ACO for network packet routing.
蚁群优化算法(Ant Colony Optimization, ACO)和蝙蝠优化算法(Bat Optimization algorithm, BOA)等元启发式算法已被广泛应用于解决不同领域的优化问题。蚁群算法是基于蚂蚁的社会行为建模的,蚂蚁通过将给定的优化问题重新映射为在加权图上定位最便宜路径的情况来寻找适当的答案。一组参数连接到图组件(节点或边),这些组件的值在运行期间被蚂蚁改变,构成信息素模型,该模型对随机解生成过程产生偏差。然而,蚁群算法的有效性随着数据包数量的增加而下降,对减少交通拥塞效果不佳。随着传输的数据包越来越多,它们的强度会降低,导致数据包拥塞,使它们无法减少数据包流量拥塞。相反,模仿蝙蝠行为的BOA也被用于通过倾听空间中的每一个声音并注意周围发生的事情来解决网络路由问题。为了进一步改进蚁群算法,减少网络系统中数据包的拥塞、丢包和到达目的地所需的时间,本研究采用了BOA的强度。结果表明,BOA在提高网络分组路由ACO性能方面具有强大的优势。
{"title":"Improving Optimization Prowess of Ant Colony Algorithm Using Bat Inspired Algorithm","authors":"Hakeem Babalola Akande, O. Abikoye, O. Akande, R. Jimoh","doi":"10.1109/ITED56637.2022.10051478","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051478","url":null,"abstract":"Metaheuristic algorithms such as Ant Colony Optimization (ACO) algorithm and Bat Optimization Algorithm (BOA) have been widely employed in solving different optimization problems in several fields. ACO is modelled based on the social behaviour of ants that look for appropriate answers to a given optimization issue by recasting it as the case of locating the least expensive path on a weighted graph. A set of parameters linked to graph components (either nodes or edges) whose values are changed by the ants during runtime constitute the pheromone model, which biases the stochastic solution generation process. However, the effectiveness of ACO declines as the quantity of packets rises, making them ineffective for reducing traffic congestion. As more packets are transmitted, their strength decreases, causing packet congestion, rendering them useless for reducing packet traffic congestion. On the contrary, BOA which was modelled after the behavior of bats has also been employed in fixing network routing issues by listening to every sound in a space and taking note of what is going on around it. In order to further improve ACO algorithm and decrease packet traffic congestion, packet loss, and the time it takes a packet to reach its destination in a network system, this study employs the strength of BOA. Results obtained revealed the prowess of BOA in improving the performance of ACO for network packet routing.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Brief Survey on the Experimental Application of MPQUIC Protocol in Data Communication MPQUIC协议在数据通信中的实验应用综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051479
J. Wejin, J. Badejo, Oluranti Jonathan, F. Dahunsi
Since its inception, the Internet has experienced tremendous speed and functionality improvements. Among these developments are innovative approaches such as the design and deployment of Internet Protocol version six (IPv6) and the continuous modification of TCP. New transport protocols like Stream Communication Transport Protocol (SCTP) and Multipath TCP (MPTCP), which can use multiple data paths, have been developed to overcome the IP-coupled challenge in TCP. However, given the difficulties of packet modifiers over the Internet that prevent the deployment of newly proposed protocols, e.g., SCTP, a UDP innovative approach with QUIC (Quick UDP Internet Connection) has been put forward as an alternative. QUIC reduces the connection establishment complexity in TCP and its variants, high security, stream multiplexing, and pluggable congestion control. Motivated by the gains and acceptability of MPTCP, Multipath QUIC has been developed to enable multipath transmission in QUIC. While several researchers have reviewed the progress of improvement and application of MPTCP, the review on MPQUIC improvement is limited. To breach the gap, this paper provides a brief survey on the practical application and progress of MPQUIC in data communication. We first review the fundamentals of multipath transport protocols. We then provide details on the design of QUIC and MPQUIC. Based on the articles reviewed, we looked at the various applications of MPQUIC, identifying the application domain, tools used, and evaluation parameters. Finally, we highlighted the open research issues and directions for further investigations.
自诞生以来,互联网经历了巨大的速度和功能改进。这些发展包括创新的方法,如设计和部署互联网协议第六版(IPv6)以及对TCP的不断修改。新的传输协议,如流通信传输协议(SCTP)和多路径TCP (MPTCP),可以使用多个数据路径,已经被开发来克服TCP中ip耦合的挑战。然而,考虑到数据包修改器在互联网上的困难,这阻碍了新提出的协议(例如SCTP)的部署,一种具有QUIC(快速UDP互联网连接)的UDP创新方法已被提出作为替代方案。QUIC降低了TCP及其变体建立连接的复杂性,具有高安全性、流复用和可插拔拥塞控制等优点。在MPTCP的优点和可接受性的激励下,多路径QUIC已经被开发出来,以实现QUIC中的多路径传输。虽然许多研究者对MPTCP的改进和应用进展进行了综述,但对MPQUIC改进的综述却很有限。为了弥补这一空白,本文简要介绍了MPQUIC在数据通信中的实际应用和进展。我们首先回顾多路径传输协议的基本原理。然后详细介绍了QUIC和MPQUIC的设计。根据所回顾的文章,我们研究了MPQUIC的各种应用程序,确定了应用程序领域、使用的工具和评估参数。最后,提出了有待进一步研究的问题和方向。
{"title":"A Brief Survey on the Experimental Application of MPQUIC Protocol in Data Communication","authors":"J. Wejin, J. Badejo, Oluranti Jonathan, F. Dahunsi","doi":"10.1109/ITED56637.2022.10051479","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051479","url":null,"abstract":"Since its inception, the Internet has experienced tremendous speed and functionality improvements. Among these developments are innovative approaches such as the design and deployment of Internet Protocol version six (IPv6) and the continuous modification of TCP. New transport protocols like Stream Communication Transport Protocol (SCTP) and Multipath TCP (MPTCP), which can use multiple data paths, have been developed to overcome the IP-coupled challenge in TCP. However, given the difficulties of packet modifiers over the Internet that prevent the deployment of newly proposed protocols, e.g., SCTP, a UDP innovative approach with QUIC (Quick UDP Internet Connection) has been put forward as an alternative. QUIC reduces the connection establishment complexity in TCP and its variants, high security, stream multiplexing, and pluggable congestion control. Motivated by the gains and acceptability of MPTCP, Multipath QUIC has been developed to enable multipath transmission in QUIC. While several researchers have reviewed the progress of improvement and application of MPTCP, the review on MPQUIC improvement is limited. To breach the gap, this paper provides a brief survey on the practical application and progress of MPQUIC in data communication. We first review the fundamentals of multipath transport protocols. We then provide details on the design of QUIC and MPQUIC. Based on the articles reviewed, we looked at the various applications of MPQUIC, identifying the application domain, tools used, and evaluation parameters. Finally, we highlighted the open research issues and directions for further investigations.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1074 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132847853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of deep learning models for the detection and classification of Diabetes Retinopathy 深度学习模型在糖尿病视网膜病变检测与分类中的比较分析
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051208
Temitayo Balogun, Rilwan Saliu, S. Faluyi, Kofoworola Fapohunda
In recent years, diabetic retinopathy (DR), particularly in the elderly, has gained widespread recognition as a cause of blindness. The DR, which comes in a variety of forms and also has a variety of causes, is easily curable with early detection. Early detection of DR is challenging when manual medical approaches are used, and results are frequently inaccurate despite how long they take to complete. Therefore, a better approach to DR detection and prediction is required. Therefore, the purpose of this paper is to detect and classify diabetic retinopathy in patients using deep learning and compare different machine learning models to determine the one that performs best. The models employed are Convolutional Neural Network (CNN) that uses a four-layer VGG net plus an additional neural network to make it a custom five-layer network, K Nearest Neighbour (KNN) and Support Vector Machine (SVM). The IDRID which is the Indian Diabetic Retinopathy Image Dataset is where the dataset was acquired. When compared to other deep learning systems like KNN and SVM, which had an accuracy of 86% and 66% respectively, CNN attained an accuracy of 92%.
近年来,糖尿病视网膜病变(DR),特别是在老年人中,已被广泛认为是失明的原因之一。DR的形式多种多样,病因也多种多样,但只要及早发现,就很容易治愈。当使用人工医疗方法时,早期发现DR是具有挑战性的,尽管需要很长时间才能完成,但结果往往不准确。因此,需要一种更好的DR检测和预测方法。因此,本文的目的是使用深度学习对患者的糖尿病视网膜病变进行检测和分类,并比较不同的机器学习模型,以确定表现最好的模型。使用的模型是卷积神经网络(CNN),它使用一个四层VGG网络加上一个额外的神经网络,使其成为一个定制的五层网络,K近邻(KNN)和支持向量机(SVM)。IDRID即印度糖尿病视网膜病变图像数据集是数据集获得的地方。与KNN和SVM等其他深度学习系统相比,CNN的准确率分别为86%和66%,而CNN的准确率为92%。
{"title":"Comparative analysis of deep learning models for the detection and classification of Diabetes Retinopathy","authors":"Temitayo Balogun, Rilwan Saliu, S. Faluyi, Kofoworola Fapohunda","doi":"10.1109/ITED56637.2022.10051208","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051208","url":null,"abstract":"In recent years, diabetic retinopathy (DR), particularly in the elderly, has gained widespread recognition as a cause of blindness. The DR, which comes in a variety of forms and also has a variety of causes, is easily curable with early detection. Early detection of DR is challenging when manual medical approaches are used, and results are frequently inaccurate despite how long they take to complete. Therefore, a better approach to DR detection and prediction is required. Therefore, the purpose of this paper is to detect and classify diabetic retinopathy in patients using deep learning and compare different machine learning models to determine the one that performs best. The models employed are Convolutional Neural Network (CNN) that uses a four-layer VGG net plus an additional neural network to make it a custom five-layer network, K Nearest Neighbour (KNN) and Support Vector Machine (SVM). The IDRID which is the Indian Diabetic Retinopathy Image Dataset is where the dataset was acquired. When compared to other deep learning systems like KNN and SVM, which had an accuracy of 86% and 66% respectively, CNN attained an accuracy of 92%.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129514959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An ensemble statistical evaluation of medical image embedding with SqueezeNet neural network 基于SqueezeNet神经网络的医学图像嵌入集成统计评价
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051407
S. Ilesanmi, Agbaegbu JonhBosco, W. Ahiara, Janet Akiode, Uchenna H. Udeani, T. Olaleye, Olalekan A. Okewale
The trio of data, technology, and man constitutes a formidable tripartite synergy towards enhancing health informatics through data science. This avails state-of-the-arts which employ tools like the interquartile range, probability density function, predictive analytics etc. the opportunity of medical data evaluation for pathology and medical diagnosis purposes. However, such evaluations are seldom carried out on medical image embedding acquired through transfer learning. This study therefore employs the SqueezeNet deep embedder on computerized tomography scan signals for feature extraction of pneumonia attributes. An ensemble statistical tool is used for the evaluation after the feature selection of significant attributes by analysis of variance. To answer research question that seeks to discover most significant data feature, experimental result returns an external data attribute as one with the most discriminative information for pneumonia detection. An interquartile range of 40000 to 240000 with a dispersed probability density function in the second quartile also indicates a positive case of pneumonia medical condition
数据、技术和人这三个方面构成了通过数据科学加强卫生信息学的强大三方协同作用。这利用了采用四分位数范围、概率密度函数、预测分析等工具的最先进技术,为病理学和医学诊断目的提供了医疗数据评估的机会。然而,对于通过迁移学习获得的医学图像嵌入,很少进行这样的评价。因此,本研究采用SqueezeNet深度嵌入器对计算机断层扫描信号进行肺炎属性的特征提取。通过方差分析对显著性属性进行特征选择后,使用集成统计工具进行评价。为了回答寻求发现最重要数据特征的研究问题,实验结果返回一个外部数据属性,作为肺炎检测中最具判别性的信息。在4万至24万的四分位数范围内,第二个四分位数具有分散的概率密度函数,也表明存在肺炎医学状况的阳性病例
{"title":"An ensemble statistical evaluation of medical image embedding with SqueezeNet neural network","authors":"S. Ilesanmi, Agbaegbu JonhBosco, W. Ahiara, Janet Akiode, Uchenna H. Udeani, T. Olaleye, Olalekan A. Okewale","doi":"10.1109/ITED56637.2022.10051407","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051407","url":null,"abstract":"The trio of data, technology, and man constitutes a formidable tripartite synergy towards enhancing health informatics through data science. This avails state-of-the-arts which employ tools like the interquartile range, probability density function, predictive analytics etc. the opportunity of medical data evaluation for pathology and medical diagnosis purposes. However, such evaluations are seldom carried out on medical image embedding acquired through transfer learning. This study therefore employs the SqueezeNet deep embedder on computerized tomography scan signals for feature extraction of pneumonia attributes. An ensemble statistical tool is used for the evaluation after the feature selection of significant attributes by analysis of variance. To answer research question that seeks to discover most significant data feature, experimental result returns an external data attribute as one with the most discriminative information for pneumonia detection. An interquartile range of 40000 to 240000 with a dispersed probability density function in the second quartile also indicates a positive case of pneumonia medical condition","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131016883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Fuzzy Sliding Mode Control for an Aerial Manipulator as a Payload on a Quadcopter 四轴飞行器空中机械臂载荷的自适应模糊滑模控制
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051598
J. Eneh, S. Nwafor, E. C. Nnadozie, O. Ani
An aerial manipulator is a highly coupled and unstable complicated system. The movement of the robot manipulator will influence the stability of the quadcopter. This paper presents adaptive fuzzy sliding mode control (AFSMC) to improve the stability of the aerial manipulator. The proposed control strategy employs fuzzy compensation with regards to friction to improve tracking performance with fuzzy set rules. Simulation results indicate that the proposed AFSMC has minimum tracking error compared to sliding mode control (SMC) and PID controllers.
航空机械臂是一个高度耦合、不稳定的复杂系统。机器人机械手的运动将影响四轴飞行器的稳定性。为了提高航空机械臂的稳定性,提出了自适应模糊滑模控制(AFSMC)。该控制策略采用了摩擦的模糊补偿,提高了模糊集规则的跟踪性能。仿真结果表明,与滑模控制和PID控制相比,该方法具有最小的跟踪误差。
{"title":"Adaptive Fuzzy Sliding Mode Control for an Aerial Manipulator as a Payload on a Quadcopter","authors":"J. Eneh, S. Nwafor, E. C. Nnadozie, O. Ani","doi":"10.1109/ITED56637.2022.10051598","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051598","url":null,"abstract":"An aerial manipulator is a highly coupled and unstable complicated system. The movement of the robot manipulator will influence the stability of the quadcopter. This paper presents adaptive fuzzy sliding mode control (AFSMC) to improve the stability of the aerial manipulator. The proposed control strategy employs fuzzy compensation with regards to friction to improve tracking performance with fuzzy set rules. Simulation results indicate that the proposed AFSMC has minimum tracking error compared to sliding mode control (SMC) and PID controllers.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134458818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personal Data and Privacy Protection Regulations: State of compliance with Nigeria Data Protection Regulations (NDPR) in Ministries, Departments, and Agencies (MDAs) 个人数据和隐私保护法规:各部委、部门和机构(mda)对尼日利亚数据保护法规(NDPR)的遵守情况
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051182
M. M. Abubakar, A. Z. Umar, M. Abubakar
Personal data and privacy protection has been a hot topic of discussion due to the increasing impact of computing technologies in everyday life. In recent years, there have been reports of breaches of personal data either from organizations that collected it or from mischievous third parties. The global responses against the breaches have been the enactment of various policies and regulations to protect personal data against all forms of potential abuses. Nigeria Data Protection Regulation was also issued as the regulatory framework for personal data and privacy protection on Nigerian soil. This paper, aimed at analysing the state of compliance of Ministries, Departments, and Agencies with the regulatory framework. An online questionnaire was designed and hosted on Google Forms. The link to the questionnaire was sent to 110 staff, selected based on convenience, and representing various Ministries, Departments, and Agencies. The results have shown that about 70% of the organizations were aware of the provision of Nigeria Data Protection Regulation but only 34% indicated that they started the implementation. Nonetheless, about 45% Ministries, Departments, and Agencies completed the preparatory stage of compliance as they indicated that they have conducted detailed audits on their organizational operations to determine the changes and the new practices required to comply with the Nigeria Data Protection Regulation. The surveyed organizations indicated 37% to 60% compliance with other components of Nigeria Data Protection Regulation. The paper concluded that more advocacy and enforcement are required to speed up compliance with regulations.
由于计算机技术对日常生活的影响越来越大,个人数据和隐私保护已经成为讨论的热门话题。近年来,有一些关于个人数据泄露的报道,要么来自收集数据的组织,要么来自恶意的第三方。全球对这些违规行为的反应是颁布各种政策和法规,以保护个人数据免受各种形式的潜在滥用。尼日利亚数据保护条例还作为尼日利亚境内个人数据和隐私保护的监管框架发布。本文旨在分析各部委、部门和机构遵守监管框架的情况。在Google Forms上设计并托管了一份在线问卷。调查问卷的链接发给了110名工作人员,他们是根据方便程度选出的,代表了各个部委、部门和机构。结果显示,大约70%的组织意识到尼日利亚数据保护条例的规定,但只有34%的组织表示他们已经开始实施。尽管如此,约有45%的部委、部门和机构完成了合规的准备阶段,因为他们表示,他们已经对其组织运营进行了详细的审计,以确定遵守尼日利亚数据保护条例所需的变化和新做法。接受调查的组织表示,37%至60%的组织遵守了尼日利亚数据保护条例的其他组成部分。该报告的结论是,需要更多的宣传和执法来加快对法规的遵守。
{"title":"Personal Data and Privacy Protection Regulations: State of compliance with Nigeria Data Protection Regulations (NDPR) in Ministries, Departments, and Agencies (MDAs)","authors":"M. M. Abubakar, A. Z. Umar, M. Abubakar","doi":"10.1109/ITED56637.2022.10051182","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051182","url":null,"abstract":"Personal data and privacy protection has been a hot topic of discussion due to the increasing impact of computing technologies in everyday life. In recent years, there have been reports of breaches of personal data either from organizations that collected it or from mischievous third parties. The global responses against the breaches have been the enactment of various policies and regulations to protect personal data against all forms of potential abuses. Nigeria Data Protection Regulation was also issued as the regulatory framework for personal data and privacy protection on Nigerian soil. This paper, aimed at analysing the state of compliance of Ministries, Departments, and Agencies with the regulatory framework. An online questionnaire was designed and hosted on Google Forms. The link to the questionnaire was sent to 110 staff, selected based on convenience, and representing various Ministries, Departments, and Agencies. The results have shown that about 70% of the organizations were aware of the provision of Nigeria Data Protection Regulation but only 34% indicated that they started the implementation. Nonetheless, about 45% Ministries, Departments, and Agencies completed the preparatory stage of compliance as they indicated that they have conducted detailed audits on their organizational operations to determine the changes and the new practices required to comply with the Nigeria Data Protection Regulation. The surveyed organizations indicated 37% to 60% compliance with other components of Nigeria Data Protection Regulation. The paper concluded that more advocacy and enforcement are required to speed up compliance with regulations.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134573943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Technique for Detection of Diabetes Mellitus 糖尿病检测的机器学习技术
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051439
O. Awoniran, M. Oyelami, Rhoda Ikono, R. Famutimi, T. Famutimi
The need for early detection of diabetes mellitus has led to the development of various intelligent systems using machine learning and artificial intelligence for the recognition of the presence of the disease. However, most of the techniques have yielded a comparatively lower accuracy. This research applied data science techniques to a dataset of diabetes mellitus to improve the accuracy of the prediction of the disease. This was achieved by pre-processing the data with dummy categories and applying principal components analysis for reduced dimensionality. Support vector machine, random forest classifier, and deep neural networks were then used to train the system. Support vector machine, random forest classifier, and deep neural networks yielded accuracies of 0.76, 0.77, and 0.89 respectively. Correspondingly, deep neural networks yielded the highest accuracy. The study concluded that better pre-processing will improve the accuracy of machine learning algorithms in the prediction of diabetes mellitus.
早期发现糖尿病的需要导致了各种智能系统的发展,使用机器学习和人工智能来识别疾病的存在。然而,大多数技术的准确度相对较低。本研究将数据科学技术应用于糖尿病数据集,以提高疾病预测的准确性。这是通过使用虚拟类别预处理数据并应用主成分分析来实现降维的。然后使用支持向量机、随机森林分类器和深度神经网络对系统进行训练。支持向量机、随机森林分类器和深度神经网络的准确率分别为0.76、0.77和0.89。相应地,深度神经网络产生了最高的准确性。该研究得出结论,更好的预处理将提高机器学习算法预测糖尿病的准确性。
{"title":"A Machine Learning Technique for Detection of Diabetes Mellitus","authors":"O. Awoniran, M. Oyelami, Rhoda Ikono, R. Famutimi, T. Famutimi","doi":"10.1109/ITED56637.2022.10051439","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051439","url":null,"abstract":"The need for early detection of diabetes mellitus has led to the development of various intelligent systems using machine learning and artificial intelligence for the recognition of the presence of the disease. However, most of the techniques have yielded a comparatively lower accuracy. This research applied data science techniques to a dataset of diabetes mellitus to improve the accuracy of the prediction of the disease. This was achieved by pre-processing the data with dummy categories and applying principal components analysis for reduced dimensionality. Support vector machine, random forest classifier, and deep neural networks were then used to train the system. Support vector machine, random forest classifier, and deep neural networks yielded accuracies of 0.76, 0.77, and 0.89 respectively. Correspondingly, deep neural networks yielded the highest accuracy. The study concluded that better pre-processing will improve the accuracy of machine learning algorithms in the prediction of diabetes mellitus.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Digital Watermarking Techniques for Data Protection in Cloud Computing 云计算中数据保护的数字水印技术综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051180
Abbas Nna Halima, Mohammed D. Abdulmalik, Solomon Adelowo Adepoju, E. F. Aminu
Recently digital watermarking techniques played an essential role in protecting and authenticating the copyright of multimedia content in a cloud. Based on the literature, there are several digital watermarking techniques used for data protection in cloud computing. However, each of these techniques has its own limitations such as high levels of piracy, theft, and unauthorized distribution of multimedia content. This Survey employs a content-based analysis approach to investigate the watermarking techniques that are more secure, imperceptible, and robust against various kinds of multimedia attacks. The survey shows that the hybridization of watermarking techniques and feature descriptors is more efficient in comparison to a single watermarking technique. This research work concludes that the hybridization technique and use of descriptors are more secure.
近年来,数字水印技术在云多媒体内容的版权保护和认证中发挥了重要作用。在文献的基础上,有几种数字水印技术用于云计算中的数据保护。然而,每种技术都有其自身的局限性,例如盗版、盗窃和未经授权的多媒体内容分发。本调查采用基于内容的分析方法来研究更安全、不易察觉和健壮的水印技术,以抵御各种多媒体攻击。研究表明,与单一的水印技术相比,混合水印技术和特征描述符的效率更高。研究结果表明,杂交技术和描述符的使用更安全。
{"title":"A Survey of Digital Watermarking Techniques for Data Protection in Cloud Computing","authors":"Abbas Nna Halima, Mohammed D. Abdulmalik, Solomon Adelowo Adepoju, E. F. Aminu","doi":"10.1109/ITED56637.2022.10051180","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051180","url":null,"abstract":"Recently digital watermarking techniques played an essential role in protecting and authenticating the copyright of multimedia content in a cloud. Based on the literature, there are several digital watermarking techniques used for data protection in cloud computing. However, each of these techniques has its own limitations such as high levels of piracy, theft, and unauthorized distribution of multimedia content. This Survey employs a content-based analysis approach to investigate the watermarking techniques that are more secure, imperceptible, and robust against various kinds of multimedia attacks. The survey shows that the hybridization of watermarking techniques and feature descriptors is more efficient in comparison to a single watermarking technique. This research work concludes that the hybridization technique and use of descriptors are more secure.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122816605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Community Cloud-Based Store for Forensic Operations in Cybercrime Control 网络犯罪控制中取证操作的社区云存储
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051615
Wilson Nwankwo, Anazia E. Kizito, Wifred Adigwe, C. Nwankwo, Francis Uwadia, Samaila Mande
Digital forensics is intended to unearth evidence from concluded activities in the cyberspace and such workflow is data-intensive. A typical workflow would include gathering, analysis, preservation, authentication, and presentation. Generally, building a cyber-forensic system that supports digital evidence, forensic analysis, investigation, and collaborative engagements among anti-cybercrime agencies, and stakeholders is a complex task. In this paper, we present a practical model that could support the management of forensic workflows and collaborations among agencies such as the Economic and Financial Crimes Commission (EFCC), and the Police. We adopt a modified object-oriented methodology in the investigation, analysis, and design of components required to implement a cloud store for forensic operations. The model was validated against the forensic procedures of an anti-crime agency as well as a cloud database service provider using the MongoDB NoSQL platform, to ascertain the level of assurance on its implementability.
数字取证旨在从网络空间中已结束的活动中挖掘证据,这种工作流程是数据密集型的。典型的工作流包括收集、分析、保存、身份验证和表示。一般来说,建立一个支持数字证据、取证分析、调查以及反网络犯罪机构和利益相关者之间协作的网络取证系统是一项复杂的任务。在本文中,我们提出了一个实用的模型,可以支持法医工作流程的管理以及经济和金融犯罪委员会(EFCC)和警方等机构之间的合作。我们在调查、分析和设计为取证操作实现云存储所需的组件时采用了一种改进的面向对象方法。该模型针对反犯罪机构的法医程序以及使用MongoDB NoSQL平台的云数据库服务提供商进行了验证,以确定其可实现性的保证水平。
{"title":"A Community Cloud-Based Store for Forensic Operations in Cybercrime Control","authors":"Wilson Nwankwo, Anazia E. Kizito, Wifred Adigwe, C. Nwankwo, Francis Uwadia, Samaila Mande","doi":"10.1109/ITED56637.2022.10051615","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051615","url":null,"abstract":"Digital forensics is intended to unearth evidence from concluded activities in the cyberspace and such workflow is data-intensive. A typical workflow would include gathering, analysis, preservation, authentication, and presentation. Generally, building a cyber-forensic system that supports digital evidence, forensic analysis, investigation, and collaborative engagements among anti-cybercrime agencies, and stakeholders is a complex task. In this paper, we present a practical model that could support the management of forensic workflows and collaborations among agencies such as the Economic and Financial Crimes Commission (EFCC), and the Police. We adopt a modified object-oriented methodology in the investigation, analysis, and design of components required to implement a cloud store for forensic operations. The model was validated against the forensic procedures of an anti-crime agency as well as a cloud database service provider using the MongoDB NoSQL platform, to ascertain the level of assurance on its implementability.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Comparative Analysis of 4G LTE Network and 5G New Radio 4G LTE网络与5G新无线电的实证比较分析
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051243
J. Isabona, Christian Chizoba Ugochukwu, A. Imoize, N. Faruk
The rapid deployment of wireless cellular communication technologies has witnessed a progressive trend globally, particularly in the last two decades. The need to constantly conduct a regular and proper empirical network performance of these cellular communication technologies towards managing and optimizing service quality is imperative. Previous research has primarily relied on the existing system simulations. Only a few works of literature conducted experimental measurements to evaluate the QoS delivered by these networks. However, an empirical comparative analysis of the different wireless networks remains. This study presents an empirical-based comparative analysis of 5G NR and 4G LTE networks. The analysis is based on available measurements extracted from the Verizon network in the united states. The quality of service (QoS) of the tested wireless network was evaluated. In terms of signal coverage, the 4G network proved superior while the 5G network took the lead in terms of signal quality. The limited coverage of the investigated 5G network could be attributed to the fewer numbers of 5G antennas recently deployed in the environment of study.
无线蜂窝通信技术的快速部署在全球范围内见证了一个进步的趋势,特别是在过去的二十年中。必须不断地对这些蜂窝通信技术进行定期和适当的经验网络性能,以管理和优化服务质量。以前的研究主要依赖于现有的系统模拟。只有少数文献进行了实验测量来评估这些网络所提供的QoS。然而,对不同无线网络的实证比较分析仍然存在。本研究对5G NR和4G LTE网络进行了基于实证的比较分析。该分析是基于从美国Verizon网络中提取的可用测量数据。对所测无线网络的服务质量(QoS)进行了评价。在信号覆盖方面,4G网络具有优势,而5G网络在信号质量方面处于领先地位。被调查的5G网络的覆盖范围有限,可能是由于最近在研究环境中部署的5G天线数量较少。
{"title":"An Empirical Comparative Analysis of 4G LTE Network and 5G New Radio","authors":"J. Isabona, Christian Chizoba Ugochukwu, A. Imoize, N. Faruk","doi":"10.1109/ITED56637.2022.10051243","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051243","url":null,"abstract":"The rapid deployment of wireless cellular communication technologies has witnessed a progressive trend globally, particularly in the last two decades. The need to constantly conduct a regular and proper empirical network performance of these cellular communication technologies towards managing and optimizing service quality is imperative. Previous research has primarily relied on the existing system simulations. Only a few works of literature conducted experimental measurements to evaluate the QoS delivered by these networks. However, an empirical comparative analysis of the different wireless networks remains. This study presents an empirical-based comparative analysis of 5G NR and 4G LTE networks. The analysis is based on available measurements extracted from the Verizon network in the united states. The quality of service (QoS) of the tested wireless network was evaluated. In terms of signal coverage, the 4G network proved superior while the 5G network took the lead in terms of signal quality. The limited coverage of the investigated 5G network could be attributed to the fewer numbers of 5G antennas recently deployed in the environment of study.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 5th Information Technology for Education and Development (ITED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1