首页 > 最新文献

2022 5th Information Technology for Education and Development (ITED)最新文献

英文 中文
A Concept-Based Review on Generative Adversarial Network for Generating Super Resolution Medical Image Using SWOT Analysis 基于概念的生成对抗网络超分辨率医学图像的SWOT分析综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051633
Saba Ibrahim David, S. Bashir, Mohammed D. Abdulmalik
Several alarming health challenges are urging medical experts and practitioners to research and develop new approaches to diagnose, detect and control the early spread of deadly diseases. One of the most challenging is Coronavirus Infection (Covid-19). Models have been proposed to detect and diagnose early infection of the virus to attain proper precautions against the Covid-19 virus. However, some researchers adopt parameter optimization to attain better accuracy on the Chest X-ray images of covid-19 and other related diseases. Hence, this research work adopts a hybridized cascaded feature extraction technique (Local Binary Pattern LBP and Histogram of Oriented Gradients HOG) and Convolutional Neural Network CNN for the deep learning classification model. The merging of LBP and HOG feature extraction significantly improved the performance level of the deep-learning CNN classifier. As a result, 95% accuracy, 92% precision, and 93% recall are attained by the proposed model.
一些令人震惊的卫生挑战促使医学专家和从业人员研究和开发诊断、检测和控制致命疾病早期传播的新方法。其中最具挑战性的是冠状病毒感染(Covid-19)。已经提出了检测和诊断病毒早期感染的模型,以获得针对Covid-19病毒的适当预防措施。然而,一些研究人员通过参数优化来提高covid-19及其他相关疾病胸部x线图像的准确性。因此,本研究采用混合级联特征提取技术(局部二值模式LBP和定向梯度直方图HOG)和卷积神经网络CNN进行深度学习分类模型。LBP和HOG特征提取的融合显著提高了深度学习CNN分类器的性能水平。结果表明,该模型的准确率为95%,精密度为92%,召回率为93%。
{"title":"A Concept-Based Review on Generative Adversarial Network for Generating Super Resolution Medical Image Using SWOT Analysis","authors":"Saba Ibrahim David, S. Bashir, Mohammed D. Abdulmalik","doi":"10.1109/ITED56637.2022.10051633","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051633","url":null,"abstract":"Several alarming health challenges are urging medical experts and practitioners to research and develop new approaches to diagnose, detect and control the early spread of deadly diseases. One of the most challenging is Coronavirus Infection (Covid-19). Models have been proposed to detect and diagnose early infection of the virus to attain proper precautions against the Covid-19 virus. However, some researchers adopt parameter optimization to attain better accuracy on the Chest X-ray images of covid-19 and other related diseases. Hence, this research work adopts a hybridized cascaded feature extraction technique (Local Binary Pattern LBP and Histogram of Oriented Gradients HOG) and Convolutional Neural Network CNN for the deep learning classification model. The merging of LBP and HOG feature extraction significantly improved the performance level of the deep-learning CNN classifier. As a result, 95% accuracy, 92% precision, and 93% recall are attained by the proposed model.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126737829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ring Learning With Error-Based Encryption Scheme for the Privacy of Electronic Health Records Management 基于错误的环学习加密方案在电子病历隐私管理中的应用
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051260
Umar Abdulkadir, V. O. Waziri, J. Alhassan, I. Ismaila
The electronic health (e-health) systems support a range of electronic devices, wireless links, transmission and storage of data. E-health systems allows communication through a gateway (or central point) in the cloud. Health professionals and teams utilize e-health systems to perform virtual consultations to patients, remote treatment or diagnosis. The success story of e-health systems is often met with problems including: insecure channels of communication, eavesdropping of messages across channels by adversary, profound insider attacks on private information on servers, and healthcare services disruptions. Cryptography or encryption algorithms have been considered as capable of overcoming the privacy and security problems of electronic medical records management. However, certain issues persist with cryptographic-based schemes such as slow processing speed, weak security mechanisms, high computational overheads, and weak public-private keys. In this paper, a lattice-based cryptography, Ring Learning With Error (RLWE) encryption is used to propose a privacy scheme for EMR in cloud environment. The choice of RLWE is due to its provable hardness among conventional lattice problem. The outcomes revealed that, the proposed encryption scheme outperformed comparable asymmetric schemes in terms of elapsed time (0.04sec) against ECDSA (1.11sec), ECC (16.62sec), and RSA (37.95sec). Again, the public key size was better for RLWE (32-bits) only after ECDSA (10-bits), against ECC (97-bits), and RSA (191-bits). Similarly, the private key size for ECC (9-bits) was only better than RLWE(10-bits), against ECDSA (58-bits), and RSA (687-bits) respectively. The proposed encryption scheme is time and memory-efficient; and holds promise for EMRs privacy.
电子卫生系统支持一系列电子设备、无线链路、数据传输和存储。电子医疗系统允许通过云中的网关(或中心点)进行通信。卫生专业人员和团队利用电子卫生系统对患者进行虚拟咨询、远程治疗或诊断。电子卫生系统的成功故事经常遇到一些问题,包括:不安全的通信渠道、攻击者跨渠道窃听消息、对服务器上的私人信息进行深刻的内部攻击以及医疗保健服务中断。密码学或加密算法被认为能够克服电子病历管理的隐私和安全问题。然而,基于密码学的方案仍然存在某些问题,例如处理速度慢、安全机制弱、计算开销高和公私密钥弱。本文提出了一种基于格的加密技术——带错误环学习(RLWE)加密技术,提出了一种云环境下EMR的保密方案。选择RLWE是由于它在常规晶格问题中具有可证明的硬度。结果表明,所提出的加密方案在运行时间(0.04秒)方面优于ECDSA(1.11秒)、ECC(16.62秒)和RSA(37.95秒)。同样,只有在ECDSA(10位)之后,RLWE(32位)的公钥大小才比ECC(97位)和RSA(191位)更好。同样,ECC的私钥大小(9位)只比RLWE(10位)好,ECDSA(58位)和RSA(687位)分别好。所提出的加密方案具有时间和内存效率;并保证电子病历的隐私。
{"title":"Ring Learning With Error-Based Encryption Scheme for the Privacy of Electronic Health Records Management","authors":"Umar Abdulkadir, V. O. Waziri, J. Alhassan, I. Ismaila","doi":"10.1109/ITED56637.2022.10051260","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051260","url":null,"abstract":"The electronic health (e-health) systems support a range of electronic devices, wireless links, transmission and storage of data. E-health systems allows communication through a gateway (or central point) in the cloud. Health professionals and teams utilize e-health systems to perform virtual consultations to patients, remote treatment or diagnosis. The success story of e-health systems is often met with problems including: insecure channels of communication, eavesdropping of messages across channels by adversary, profound insider attacks on private information on servers, and healthcare services disruptions. Cryptography or encryption algorithms have been considered as capable of overcoming the privacy and security problems of electronic medical records management. However, certain issues persist with cryptographic-based schemes such as slow processing speed, weak security mechanisms, high computational overheads, and weak public-private keys. In this paper, a lattice-based cryptography, Ring Learning With Error (RLWE) encryption is used to propose a privacy scheme for EMR in cloud environment. The choice of RLWE is due to its provable hardness among conventional lattice problem. The outcomes revealed that, the proposed encryption scheme outperformed comparable asymmetric schemes in terms of elapsed time (0.04sec) against ECDSA (1.11sec), ECC (16.62sec), and RSA (37.95sec). Again, the public key size was better for RLWE (32-bits) only after ECDSA (10-bits), against ECC (97-bits), and RSA (191-bits). Similarly, the private key size for ECC (9-bits) was only better than RLWE(10-bits), against ECDSA (58-bits), and RSA (687-bits) respectively. The proposed encryption scheme is time and memory-efficient; and holds promise for EMRs privacy.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121341149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drug Recommender Systems: A Review of State-of-the-Art Algorithms 药物推荐系统:最新算法综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051591
T. Omodunbi, G. E. Alilu, Rhoda Ikono
Drug Recommender Systems (DRSs) which are information systems that recommend drug(s) to users based on their symptoms and other factors, have been gaining a lot of research interest recently. These systems help both patients and medical personnel to determine and decide on the best drug prescription with combination to use. Different approaches ranging from machine learning, statistical methods, artificial intelligent, data mining Ontology, matrix factorization etc. have been applied to build a robust DRSs. This paper presents the review of the state-of-the-art algorithms applied to DRS and also gives a summary of a proposed DRS. Findings shows that most recent DRSs use Machine Learning based algorithms such as clustering, sentiment analysis, association rule mining, stacked Artificial Neural Networks, etc., for recommendations. Just a few use other approaches like the Ontology based approach. The DRS reviewed did not take into consideration the feedback from users and most did not consider the peculiarities of patients such as age and pre-existing medical conditions (like allergies and pregnancy) etc, Based on some of the limitations identified, we propose a DRS that will recommend appropriate drugs by considering patients peculiarities. It will also incorporate a feedback mechanism in order to strengthen the knowledge base of the system.
药物推荐系统(drs)是一种基于患者症状和其他因素向其推荐药物的信息系统,近年来获得了很多研究兴趣。这些系统帮助患者和医务人员确定和决定最好的药物处方和组合使用。从机器学习、统计方法、人工智能、数据挖掘、本体、矩阵分解等不同的方法被应用于构建鲁棒的drs。本文介绍了应用于DRS的最新算法,并对一种拟议的DRS进行了总结。研究结果表明,大多数最新的drs使用基于机器学习的算法,如聚类、情感分析、关联规则挖掘、堆叠人工神经网络等来进行推荐。只有少数使用其他方法,如基于本体的方法。审查的DRS没有考虑到用户的反馈,大多数没有考虑到患者的特点,如年龄和既往医疗条件(如过敏和怀孕)等。基于已确定的一些限制,我们提出了一个DRS,将根据患者的特点推荐适当的药物。它还将纳入一个反馈机制,以加强该系统的知识基础。
{"title":"Drug Recommender Systems: A Review of State-of-the-Art Algorithms","authors":"T. Omodunbi, G. E. Alilu, Rhoda Ikono","doi":"10.1109/ITED56637.2022.10051591","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051591","url":null,"abstract":"Drug Recommender Systems (DRSs) which are information systems that recommend drug(s) to users based on their symptoms and other factors, have been gaining a lot of research interest recently. These systems help both patients and medical personnel to determine and decide on the best drug prescription with combination to use. Different approaches ranging from machine learning, statistical methods, artificial intelligent, data mining Ontology, matrix factorization etc. have been applied to build a robust DRSs. This paper presents the review of the state-of-the-art algorithms applied to DRS and also gives a summary of a proposed DRS. Findings shows that most recent DRSs use Machine Learning based algorithms such as clustering, sentiment analysis, association rule mining, stacked Artificial Neural Networks, etc., for recommendations. Just a few use other approaches like the Ontology based approach. The DRS reviewed did not take into consideration the feedback from users and most did not consider the peculiarities of patients such as age and pre-existing medical conditions (like allergies and pregnancy) etc, Based on some of the limitations identified, we propose a DRS that will recommend appropriate drugs by considering patients peculiarities. It will also incorporate a feedback mechanism in order to strengthen the knowledge base of the system.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"7 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113941679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble-based Shill Billing Prediction Model in Car Auction System 汽车拍卖系统中一种基于集成的费用预测模型
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051624
Segun Akintunde, O. R. Vincent, Oreoluwa Tinubu
The electronic auction system has emerged as one of the leading electronic commerce platforms where auctioneers and bidders converge for transactions. With the Internet's proliferation, e-commerce systems' functionalities have greatly been enhanced. Unfortunately, fraudulent activities increasingly hamper the credibility of online auction systems. Shill Bidding is one of the prominent frauds in the e-auction. Due to its similarity with normal bidding behaviors, it is challenging to detect as legitimate bidders could be categorized as fraudulent and vice versa. Several authentic auctioneers have been cheated during online bidding systems because of the diverse ways shill bidding is being perpetrated. It is, therefore, essential to improve the credibility of online bidding systems. In this study, we proposed a machine learning-based prediction system that determines the likelihood of a customer/seller perpetrating shill bidding. Upon deployment, the proposed system would prevent shill bidders from participating in a car action system. A vote ensemble model is trained with public data of 12 attributes comprising Random Forest, Decision Tree, Multi-layer Perceptron (MLP), and Sequential Maximal Optimization (SMO) base learners. An object-oriented Python programming language is used to implement the shill bidding predictive system. Experimental results show the excellence of the proposed system using metrics such as Precision, Accuracy, Recall, F1-score, and Misclassification error.
电子拍卖系统已经成为拍卖商和竞标者进行交易的主要电子商务平台之一。随着互联网的普及,电子商务系统的功能得到了极大的增强。不幸的是,欺诈活动日益妨碍在线拍卖系统的信誉。虚投是电子拍卖中较为突出的欺诈行为之一。由于其与正常投标行为相似,因此很难检测,因为合法投标人可能被归类为欺诈性投标人,反之亦然。一些真正的拍卖师在网上竞标系统中被欺骗,因为各种各样的投标方式正在实施。因此,提高网上招标系统的可信度至关重要。在这项研究中,我们提出了一个基于机器学习的预测系统,该系统可以确定客户/卖家进行欺诈投标的可能性。一旦部署,提议的系统将阻止托票竞标者参与汽车行动系统。使用包含随机森林、决策树、多层感知器(MLP)和顺序最大优化(SMO)基础学习器的12个属性的公共数据训练投票集成模型。采用面向对象的Python编程语言实现了竞价预测系统。实验结果表明,该系统在精密度、准确度、召回率、f1分数和误分类误差等指标上表现优异。
{"title":"An Ensemble-based Shill Billing Prediction Model in Car Auction System","authors":"Segun Akintunde, O. R. Vincent, Oreoluwa Tinubu","doi":"10.1109/ITED56637.2022.10051624","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051624","url":null,"abstract":"The electronic auction system has emerged as one of the leading electronic commerce platforms where auctioneers and bidders converge for transactions. With the Internet's proliferation, e-commerce systems' functionalities have greatly been enhanced. Unfortunately, fraudulent activities increasingly hamper the credibility of online auction systems. Shill Bidding is one of the prominent frauds in the e-auction. Due to its similarity with normal bidding behaviors, it is challenging to detect as legitimate bidders could be categorized as fraudulent and vice versa. Several authentic auctioneers have been cheated during online bidding systems because of the diverse ways shill bidding is being perpetrated. It is, therefore, essential to improve the credibility of online bidding systems. In this study, we proposed a machine learning-based prediction system that determines the likelihood of a customer/seller perpetrating shill bidding. Upon deployment, the proposed system would prevent shill bidders from participating in a car action system. A vote ensemble model is trained with public data of 12 attributes comprising Random Forest, Decision Tree, Multi-layer Perceptron (MLP), and Sequential Maximal Optimization (SMO) base learners. An object-oriented Python programming language is used to implement the shill bidding predictive system. Experimental results show the excellence of the proposed system using metrics such as Precision, Accuracy, Recall, F1-score, and Misclassification error.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sound Parameter Analysis for Early Detection and Prevention of Home Fire Outbreak 家庭火灾早期发现与预防的合理参数分析
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051449
Maudlyn I. Victor-Ikoh, B. R. Japheth
Due to tragic losses caused by preventable home fires, it is imperative to have technological advancement toward more fire safety measures. Cooking fires are one of the most prevalent types of house fires, accounting for more of all residential fires; and cooking left unattended, is by far the most common cause of home fires. This paper proposes an early detection of home fire outbreaks by sound parameter analysis. The sounds produced by cooking - boiling, frying, simmering is a result of the dynamics of the cooking components. By automatically detecting the state of cooking liquids by their sounds, such changes as occurring can be used to diagnose the condition of the cooking item before a possible onset of fire. This work made use of water, a common cooking liquid, for an empirical study. Python programming with google colab was the software tool used to display and analyze key parameters obtained from sound signals of boiling water; and sound signals of water that have boiled but still heated until the water dried out completely (heated water-dried-out). The analysis made in the time-domain view showed a marked difference in sound signal between boiling water and a heated water-dried-out. Relatively, the signal levels (amplitude) of boiling water are higher than that of a heated water-dried-out. Hence, we conclude that sounds made from cooking, if collected by embedded systems and analysed in real-time, is one safety measure to averting the incidences of home fire outbreak.
由于可预防的家庭火灾所造成的巨大损失,技术进步对消防安全措施的要求势在必行。烹饪火灾是最常见的房屋火灾类型之一,占所有住宅火灾的更多;无人看管的烹饪是目前为止最常见的家庭火灾原因。本文提出了一种利用声参数分析对家庭火灾进行早期检测的方法。烹饪过程中产生的声音——沸腾、煎炸、煨煮——是烹饪过程中各组成部分动态运动的结果。通过声音自动检测烹饪液体的状态,这种发生的变化可以用来在可能发生火灾之前诊断烹饪物品的状况。这项工作利用水,一种常见的烹饪液体,进行实证研究。使用google colab进行Python编程,软件工具用于显示和分析从沸水声音信号中获得的关键参数;水已经沸腾,但仍在加热,直到水完全干涸的声音信号(加热水干涸)。时域分析表明,沸水和加热后干涸的水在声音信号上有显著差异。相对而言,沸水的信号电平(振幅)高于加热水干涸时的信号电平(振幅)。因此,我们得出结论,如果由嵌入式系统收集并实时分析烹饪发出的声音,是避免家庭火灾发生的一项安全措施。
{"title":"Sound Parameter Analysis for Early Detection and Prevention of Home Fire Outbreak","authors":"Maudlyn I. Victor-Ikoh, B. R. Japheth","doi":"10.1109/ITED56637.2022.10051449","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051449","url":null,"abstract":"Due to tragic losses caused by preventable home fires, it is imperative to have technological advancement toward more fire safety measures. Cooking fires are one of the most prevalent types of house fires, accounting for more of all residential fires; and cooking left unattended, is by far the most common cause of home fires. This paper proposes an early detection of home fire outbreaks by sound parameter analysis. The sounds produced by cooking - boiling, frying, simmering is a result of the dynamics of the cooking components. By automatically detecting the state of cooking liquids by their sounds, such changes as occurring can be used to diagnose the condition of the cooking item before a possible onset of fire. This work made use of water, a common cooking liquid, for an empirical study. Python programming with google colab was the software tool used to display and analyze key parameters obtained from sound signals of boiling water; and sound signals of water that have boiled but still heated until the water dried out completely (heated water-dried-out). The analysis made in the time-domain view showed a marked difference in sound signal between boiling water and a heated water-dried-out. Relatively, the signal levels (amplitude) of boiling water are higher than that of a heated water-dried-out. Hence, we conclude that sounds made from cooking, if collected by embedded systems and analysed in real-time, is one safety measure to averting the incidences of home fire outbreak.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122534267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification and recommendation of food intake in West Africa for healthy diet using Deep Learning 使用深度学习对西非健康饮食的食物摄入进行分类和推荐
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051387
Chigoziem Andrew Iheanacho, O. R. Vincent
A fascinating area with many applications is that of food item recognition from images. Food recognition is becoming more important in our daily lives because it plays a major part in health-related issues. In this study, a method for categorizing food-related photos using convolutional neural networks has been provided. Convolutional neural networks, in contrast to conventional artificial neural networks, are able to estimate the score function directly from picture pixels. A tensor of outputs is generated by a 2D convolution layer's em ployment of a convolution kernel, which is convolved with the l ayer's input. There are numerous such layers, and the results are concatenated in portions to achieve the final tensor of outputs. The data is also processed using the Max-Pooling function, and the features that result from that processing are employed to train the network. The accuracy of the suggested technique again for classes with in FOOD-101 dataset is 85.78 percent.
从图像中识别食物是一个有许多应用的迷人领域。食物识别在我们的日常生活中变得越来越重要,因为它在健康问题中起着重要作用。本文提出了一种利用卷积神经网络对食物相关照片进行分类的方法。与传统的人工神经网络相比,卷积神经网络能够直接从图像像素估计分数函数。输出张量是由二维卷积层对卷积核的部署生成的,卷积核与第1层的输入进行卷积。有许多这样的层,并且结果按部分连接起来以实现最终的输出张量。数据也使用Max-Pooling函数进行处理,并使用该处理产生的特征来训练网络。对于FOOD-101数据集中的类,建议的技术的准确率为85.78%。
{"title":"Classification and recommendation of food intake in West Africa for healthy diet using Deep Learning","authors":"Chigoziem Andrew Iheanacho, O. R. Vincent","doi":"10.1109/ITED56637.2022.10051387","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051387","url":null,"abstract":"A fascinating area with many applications is that of food item recognition from images. Food recognition is becoming more important in our daily lives because it plays a major part in health-related issues. In this study, a method for categorizing food-related photos using convolutional neural networks has been provided. Convolutional neural networks, in contrast to conventional artificial neural networks, are able to estimate the score function directly from picture pixels. A tensor of outputs is generated by a 2D convolution layer's em ployment of a convolution kernel, which is convolved with the l ayer's input. There are numerous such layers, and the results are concatenated in portions to achieve the final tensor of outputs. The data is also processed using the Max-Pooling function, and the features that result from that processing are employed to train the network. The accuracy of the suggested technique again for classes with in FOOD-101 dataset is 85.78 percent.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmartCall: A Real-time, Sign Language Medical Emergency Communicator 智能呼叫:实时,手语医疗紧急通信
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051420
Mustapha Deji Dere, Roshidat Oluwabukola Dere, Adewale Adesina, A. Yauri
Communication is essential for individuals to convey feelings and emotions. Persons with speech impairment, on the other hand, find it challenging to share their thoughts, especially during medical emergencies. In this study, we propose a low-cost embedded device that allows individuals with a speech impairment to communicate during medical emergencies. A 1D-convolution neural network (CNN) model extracting features from an onboard inertial measurement unit (IMU) for the classification of selected American sign language (ASL) medical emergencies word. The model was trained offline before deployment to a resource-constrained embedded device for real-time ASL word classification. A pilot test on two volunteers resulted in an offline accuracy of 91.2% and an average online accuracy of 92% for the 8-bit optimized model. The results demonstrate the feasibility to aid individuals with a speech impairment to communicate during medical emergencies. Furthermore, an extended application of the proposed design is for the intuitive learning of sign languages using artificial intelligence.
沟通对于个人传达感觉和情绪是必不可少的。另一方面,有语言障碍的人很难分享他们的想法,尤其是在医疗紧急情况下。在这项研究中,我们提出了一种低成本的嵌入式设备,可以让有语言障碍的人在医疗紧急情况下进行交流。一种从机载惯性测量单元(IMU)提取特征的一维卷积神经网络(CNN)模型,用于对选定的美国手语(ASL)医疗紧急情况单词进行分类。该模型在部署到资源受限的嵌入式设备上进行实时ASL词分类之前进行离线训练。对两名志愿者进行的初步测试结果显示,8位优化模型的离线准确率为91.2%,在线平均准确率为92%。结果表明,在医疗紧急情况下,帮助有语言障碍的人进行沟通是可行的。此外,所提出的设计的扩展应用是使用人工智能进行手语的直观学习。
{"title":"SmartCall: A Real-time, Sign Language Medical Emergency Communicator","authors":"Mustapha Deji Dere, Roshidat Oluwabukola Dere, Adewale Adesina, A. Yauri","doi":"10.1109/ITED56637.2022.10051420","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051420","url":null,"abstract":"Communication is essential for individuals to convey feelings and emotions. Persons with speech impairment, on the other hand, find it challenging to share their thoughts, especially during medical emergencies. In this study, we propose a low-cost embedded device that allows individuals with a speech impairment to communicate during medical emergencies. A 1D-convolution neural network (CNN) model extracting features from an onboard inertial measurement unit (IMU) for the classification of selected American sign language (ASL) medical emergencies word. The model was trained offline before deployment to a resource-constrained embedded device for real-time ASL word classification. A pilot test on two volunteers resulted in an offline accuracy of 91.2% and an average online accuracy of 92% for the 8-bit optimized model. The results demonstrate the feasibility to aid individuals with a speech impairment to communicate during medical emergencies. Furthermore, an extended application of the proposed design is for the intuitive learning of sign languages using artificial intelligence.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132919038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Overview of Interference Management Techniques in 5G Cellular Networks 5G蜂窝网络干扰管理技术综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051504
E. A. Jiya, F. Ibikunle, Ilesanmi Banjo Oluwafemi, Aaron Banji Adedayo, Akorede Kola-Junior, Kareem Sunday Babatunde
Communications technologies are becoming the driving force behind social, economic, and political advancements in recent times. Fifth-generation (5G) cellular networks are a revolutionary idea that connects a wide range of machines and devices in a different way than earlier technologies. The design and implementation of the many technical models, on the other hand, have resulted in intolerable signal interference. The total network performance has been considerably harmed by these vulnerable interferences. Communications system interference is an unwelcome annoyance. A number of these interferences have grown to be a significant source of barriers to increased cell throughput. The development of effective interference control strategies is a major enabler given the rise in interference in cellular networks. Additionally, as networks get denser, interference mitigation becomes more difficult. Despite this, interference management has the potential to increase the efficiency of the spectrum used by present and future wireless devices. To combat interference in a broad category of wireless networks, new paradigms for interference control have recently arisen. This review paper looks at the concerns of interferences that have been discovered and researched in various network topologies and techniques. It also pays attention to recent advances in its management: Advanced receiver, Joint Scheduling, and network information theory among others. Potential advantages of each interference management technique are illustrated, and it is proven that if 5G cellular networks use intricate joint scheduling, the advantages of sophisticated receivers can be effectively utilized.
近年来,通信技术正在成为社会、经济和政治进步的推动力。第五代(5G)蜂窝网络是一个革命性的想法,它以不同于早期技术的方式连接各种机器和设备。另一方面,许多技术模型的设计和实现导致了无法忍受的信号干扰。这些脆弱的干扰极大地损害了网络的总体性能。通信系统的干扰是令人讨厌的烦恼。许多这些干扰已经成长为增加细胞吞吐量的障碍的重要来源。考虑到蜂窝网络中干扰的增加,有效干扰控制策略的发展是一个主要的推动因素。此外,随着网络变得更加密集,干扰的缓解变得更加困难。尽管如此,干扰管理仍有可能提高当前和未来无线设备使用频谱的效率。为了对抗广泛种类的无线网络中的干扰,最近出现了新的干扰控制范例。这篇综述文章着眼于在各种网络拓扑和技术中已经发现和研究的干扰问题。它还关注了其管理的最新进展:先进的接收器,联合调度和网络信息理论等。说明了每种干扰管理技术的潜在优势,并证明如果5G蜂窝网络使用复杂的联合调度,则可以有效地利用复杂接收器的优势。
{"title":"Overview of Interference Management Techniques in 5G Cellular Networks","authors":"E. A. Jiya, F. Ibikunle, Ilesanmi Banjo Oluwafemi, Aaron Banji Adedayo, Akorede Kola-Junior, Kareem Sunday Babatunde","doi":"10.1109/ITED56637.2022.10051504","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051504","url":null,"abstract":"Communications technologies are becoming the driving force behind social, economic, and political advancements in recent times. Fifth-generation (5G) cellular networks are a revolutionary idea that connects a wide range of machines and devices in a different way than earlier technologies. The design and implementation of the many technical models, on the other hand, have resulted in intolerable signal interference. The total network performance has been considerably harmed by these vulnerable interferences. Communications system interference is an unwelcome annoyance. A number of these interferences have grown to be a significant source of barriers to increased cell throughput. The development of effective interference control strategies is a major enabler given the rise in interference in cellular networks. Additionally, as networks get denser, interference mitigation becomes more difficult. Despite this, interference management has the potential to increase the efficiency of the spectrum used by present and future wireless devices. To combat interference in a broad category of wireless networks, new paradigms for interference control have recently arisen. This review paper looks at the concerns of interferences that have been discovered and researched in various network topologies and techniques. It also pays attention to recent advances in its management: Advanced receiver, Joint Scheduling, and network information theory among others. Potential advantages of each interference management technique are illustrated, and it is proven that if 5G cellular networks use intricate joint scheduling, the advantages of sophisticated receivers can be effectively utilized.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133424824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Machine Learning-based Energy Loss Detection and Monitoring System for Advanced Metering Infrastructure 基于机器学习的先进计量基础设施电能损耗检测与监测系统建模
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051398
A. Aniedu, Sandra C. Nwokoye, Chukwunenye S. Okafor, Kingley U. Anyanwu
Non-technical losses (NTL) have rightly been identified as losses arising from energy generated but unaccounted for. They basically occur because of theft and other fraudulent activities surrounding illegal consumption of energy. This loss accounts for massive loss in revenue to utility companies and government and there has been concerted efforts to mitigate such abnormalities thereby saving cost. Although advanced metering infrastructure (AMI) incorporating smart meters have provided some basic organization around management of smart grids and monitoring usage information, it still fails to accurately detect NTL. In this paper therefore a solution to NTL is presented involving the deployment of support vector machines (SVM) as an underlying classifier and integrated with a real-time application interface termed Electricity Usage Classifier interface (ELUCI) for monitoring and pre-processing instantaneous electricity usage time-series data. With this configuration, a classification accuracy of 98.48% was achieved which was a 17.02% improvement over the initial classification models and with a root mean squared error (RMSE) of 0.0894 and an f-measure of 0.979. The developed system can assist governments and utilities to actively monitor and track down energy theft thereby improving revenue and avoiding economic wastages accruing from these activities.
非技术损失(NTL)被正确地确定为由于产生的能源而造成的损失,但没有计算在内。它们基本上是由于盗窃和其他围绕非法消耗能源的欺诈活动而发生的。这一损失给公用事业公司和政府带来了巨大的收入损失,人们一致努力减轻这种异常情况,从而节省成本。虽然包含智能电表的先进计量基础设施(AMI)已经围绕智能电网的管理和使用信息的监控提供了一些基本的组织,但它仍然不能准确地检测NTL。因此,本文提出了一种NTL的解决方案,包括部署支持向量机(SVM)作为底层分类器,并集成称为用电量分类器接口(ELUCI)的实时应用接口,用于监控和预处理瞬时用电量时间序列数据。在此配置下,分类准确率达到98.48%,比初始分类模型提高了17.02%,均方根误差(RMSE)为0.0894,f-measure为0.979。开发的系统可以帮助政府和公用事业公司积极监控和追踪能源盗窃,从而提高收入,避免这些活动造成的经济浪费。
{"title":"Modelling Machine Learning-based Energy Loss Detection and Monitoring System for Advanced Metering Infrastructure","authors":"A. Aniedu, Sandra C. Nwokoye, Chukwunenye S. Okafor, Kingley U. Anyanwu","doi":"10.1109/ITED56637.2022.10051398","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051398","url":null,"abstract":"Non-technical losses (NTL) have rightly been identified as losses arising from energy generated but unaccounted for. They basically occur because of theft and other fraudulent activities surrounding illegal consumption of energy. This loss accounts for massive loss in revenue to utility companies and government and there has been concerted efforts to mitigate such abnormalities thereby saving cost. Although advanced metering infrastructure (AMI) incorporating smart meters have provided some basic organization around management of smart grids and monitoring usage information, it still fails to accurately detect NTL. In this paper therefore a solution to NTL is presented involving the deployment of support vector machines (SVM) as an underlying classifier and integrated with a real-time application interface termed Electricity Usage Classifier interface (ELUCI) for monitoring and pre-processing instantaneous electricity usage time-series data. With this configuration, a classification accuracy of 98.48% was achieved which was a 17.02% improvement over the initial classification models and with a root mean squared error (RMSE) of 0.0894 and an f-measure of 0.979. The developed system can assist governments and utilities to actively monitor and track down energy theft thereby improving revenue and avoiding economic wastages accruing from these activities.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115177387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Social Engineering Attack: A Focus on the Weak Human Link 减轻社会工程攻击:关注薄弱的人类环节
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051202
R. O. Oveh, G. Aziken
Social engineering is a security concern that can be mitigated most efficiently from the most neglected aspect in the security ecosystem which is humans. Technological advancement focused at devices cannot prevent psychological human manipulation. This paper sort to determine the security practices and disposition of humans in a situation of vulnerability to social engineering attacks. Interview was used for data collection. 70 persons were interviewed using structured questions. The result showed that being a former victim of social engineering activity is not enough to prevent being another victim which is a consequence of security practices by the human. It is recommended that security practices against social engineering should be institutionalised in everyday human living.
社会工程是一个安全问题,可以最有效地从安全生态系统中最被忽视的方面减轻,即人类。专注于设备的技术进步无法阻止人类的心理操纵。本文试图确定人类在易受社会工程攻击的情况下的安全实践和处置。数据收集采用访谈法。使用结构化问题对70人进行了访谈。结果表明,成为社会工程活动的前受害者不足以防止成为另一个受害者,这是人类安全实践的结果。建议将反对社会工程的安全实践制度化,融入人类的日常生活。
{"title":"Mitigating Social Engineering Attack: A Focus on the Weak Human Link","authors":"R. O. Oveh, G. Aziken","doi":"10.1109/ITED56637.2022.10051202","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051202","url":null,"abstract":"Social engineering is a security concern that can be mitigated most efficiently from the most neglected aspect in the security ecosystem which is humans. Technological advancement focused at devices cannot prevent psychological human manipulation. This paper sort to determine the security practices and disposition of humans in a situation of vulnerability to social engineering attacks. Interview was used for data collection. 70 persons were interviewed using structured questions. The result showed that being a former victim of social engineering activity is not enough to prevent being another victim which is a consequence of security practices by the human. It is recommended that security practices against social engineering should be institutionalised in everyday human living.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th Information Technology for Education and Development (ITED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1