首页 > 最新文献

2022 5th Information Technology for Education and Development (ITED)最新文献

英文 中文
Development of Alcohol Detection with Engine Locking and Short Messaging Service Tracking System 发动机锁定酒精检测及短信服务跟踪系统的研制
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051302
S. Owoeye, F. Durodola, Adedayo Akinade, Ahmad Alkali, Olaitan Olaonipekun
Road travelling is among the simplest modes of transportation. Accidents are frequently the consequence of a human error on the road, and they can occasionally be brought on by alcohol intake which alters the victim's way of thinking. Law enforcement agencies have made significant efforts to lower the risk of drunk driving, but none have been able to significantly diminish it. Due to this, the proposed system was developed to lessen the likelihood of accidents on our roads being brought on by intoxicated drivers. The device can prevent a drunk driver from operating the vehicle and, in the event of an accident, send a message to a pre-programmed number informing it of the location of the vehicle. The entire software is built around a microcontroller, an alcohol sensor, and a vibration sensor. The sensor is used to set an alcohol threshold at which an alarm will buzz, and when the set threshold is exceeded, the flow of fuel to the engine will cease, thereby bringing the car to a halt. In case of an auto crash, the microcontroller would receive input from the attached vibration sensor, and send the location of the vehicle to a pre-registered phone number on the subscriber identification module (SIM) of the project. This project is a prototype of what is proposed in a vehicle where the DC motor serves as the fuel pump.
公路旅行是最简单的交通方式之一。交通事故经常是人为失误的结果,偶尔也会因为饮酒改变了受害者的思维方式而引起。执法机构已经做出了重大努力来降低酒后驾驶的风险,但没有一个能够显著减少它。因此,开发该系统的目的是为了减少醉酒司机在道路上造成事故的可能性。该设备可以防止醉酒司机驾驶车辆,并在发生事故时,向预先编程的号码发送信息,告知车辆的位置。整个软件是围绕一个微控制器、一个酒精传感器和一个振动传感器构建的。该传感器用于设置酒精阈值,超过该阈值就会发出警报,当超过设定的阈值时,燃料流向发动机就会停止,从而使汽车停止行驶。在发生汽车碰撞的情况下,微控制器将接收来自附加振动传感器的输入,并将车辆的位置发送到项目用户识别模块(SIM)上预先注册的电话号码上。这个项目是一个原型,在车辆中提出的直流电机作为燃油泵。
{"title":"Development of Alcohol Detection with Engine Locking and Short Messaging Service Tracking System","authors":"S. Owoeye, F. Durodola, Adedayo Akinade, Ahmad Alkali, Olaitan Olaonipekun","doi":"10.1109/ITED56637.2022.10051302","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051302","url":null,"abstract":"Road travelling is among the simplest modes of transportation. Accidents are frequently the consequence of a human error on the road, and they can occasionally be brought on by alcohol intake which alters the victim's way of thinking. Law enforcement agencies have made significant efforts to lower the risk of drunk driving, but none have been able to significantly diminish it. Due to this, the proposed system was developed to lessen the likelihood of accidents on our roads being brought on by intoxicated drivers. The device can prevent a drunk driver from operating the vehicle and, in the event of an accident, send a message to a pre-programmed number informing it of the location of the vehicle. The entire software is built around a microcontroller, an alcohol sensor, and a vibration sensor. The sensor is used to set an alcohol threshold at which an alarm will buzz, and when the set threshold is exceeded, the flow of fuel to the engine will cease, thereby bringing the car to a halt. In case of an auto crash, the microcontroller would receive input from the attached vibration sensor, and send the location of the vehicle to a pre-registered phone number on the subscriber identification module (SIM) of the project. This project is a prototype of what is proposed in a vehicle where the DC motor serves as the fuel pump.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114518252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Consensus Based Bank Loan Prediction Model Using Aggregated Decision Making and Cross Fold Validation Techniques 基于共识的基于聚合决策和交叉验证技术的银行贷款预测模型
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051450
Ibrahim Hadiza Ndanusa, Solomon Adelowo Adepoju, Adeniyi Oluwaseun Ojerinde
Considering the growth of the credit businesses, machine learning models for granting loan permissions with the minimum amount of risk are becoming increasingly popular among banking sectors. Machine Learning based models has proven to be useful in resolving a variety of banking risk prediction issues. ML Predictions are sometimes unfair and biased because they are heavily dependent on randomly selected training data sample for every prediction made. However, this problem can be address by utilizing a cross-validation strategy. Prediction can be improved by combining decisions from different machine learning algorithms (ensemble decision making). The proposed consensus-based prediction model is evaluated using standard performance metrics, and the proposed model achieved an accuracy of 83 percent.
考虑到信贷业务的增长,以最小风险授予贷款许可的机器学习模型在银行业中越来越受欢迎。基于机器学习的模型已被证明在解决各种银行风险预测问题方面非常有用。机器学习预测有时是不公平和有偏见的,因为它们严重依赖于随机选择的训练数据样本。然而,这个问题可以通过使用交叉验证策略来解决。预测可以通过组合来自不同机器学习算法的决策(集成决策)来改进。建议的基于共识的预测模型使用标准性能指标进行评估,建议的模型达到83%的准确性。
{"title":"Consensus Based Bank Loan Prediction Model Using Aggregated Decision Making and Cross Fold Validation Techniques","authors":"Ibrahim Hadiza Ndanusa, Solomon Adelowo Adepoju, Adeniyi Oluwaseun Ojerinde","doi":"10.1109/ITED56637.2022.10051450","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051450","url":null,"abstract":"Considering the growth of the credit businesses, machine learning models for granting loan permissions with the minimum amount of risk are becoming increasingly popular among banking sectors. Machine Learning based models has proven to be useful in resolving a variety of banking risk prediction issues. ML Predictions are sometimes unfair and biased because they are heavily dependent on randomly selected training data sample for every prediction made. However, this problem can be address by utilizing a cross-validation strategy. Prediction can be improved by combining decisions from different machine learning algorithms (ensemble decision making). The proposed consensus-based prediction model is evaluated using standard performance metrics, and the proposed model achieved an accuracy of 83 percent.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Data-Driven Approaches with Emphasis on Machine Learning Base Intrusion Detection Algorithms 基于机器学习的数据驱动入侵检测算法综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051518
Maryam Abdullahi Musa, A. Gital, Kabiru Musa Ibrahim, H. Chiroma, M. Abdulrahman, Ibrahim Muhammad Umar
The importance of the internet across the globe cannot be over-emphasized as such network security is essential to curb future attack occurrences. Cyber-attacks like DDoS and Ransomware yielded a lot of damage to connected devices by endangering and accessing them, notwithstanding these damages are air marked to be on the rise. To overcome these issues, machine learning has been used in different computing aspects such as cyber–Intrusion Detection. Recently, deep learning, extreme learning, and deep extreme learning networks have superseded machine learning in this context due to their iterative hidden layers that can manipulate complex features of cyber intrusion data. Hence, this research surveys the application of data-driven intelligent algorithms for cyber security attack detection in comparison to conventional machine learning techniques. The review focuses on the performance evaluation of several state-of-the-art intelligent algorithms and provides research gaps and future 2trends in the context of Data Security Attacks and Cyber Intrusion Detection.
互联网在全球范围内的重要性怎么强调都不为过,因为网络安全对于遏制未来的攻击事件至关重要。像DDoS和勒索软件这样的网络攻击通过危及和访问连接的设备而对它们造成了很大的损害,尽管这些损害明显呈上升趋势。为了克服这些问题,机器学习已被用于不同的计算方面,如网络入侵检测。最近,深度学习、极限学习和深度极限学习网络在这方面已经取代了机器学习,因为它们的迭代隐藏层可以操纵网络入侵数据的复杂特征。因此,本研究调查了数据驱动智能算法在网络安全攻击检测中的应用,并与传统的机器学习技术进行了比较。该综述侧重于几种最先进的智能算法的性能评估,并提供了数据安全攻击和网络入侵检测背景下的研究空白和未来趋势。
{"title":"A Review of Data-Driven Approaches with Emphasis on Machine Learning Base Intrusion Detection Algorithms","authors":"Maryam Abdullahi Musa, A. Gital, Kabiru Musa Ibrahim, H. Chiroma, M. Abdulrahman, Ibrahim Muhammad Umar","doi":"10.1109/ITED56637.2022.10051518","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051518","url":null,"abstract":"The importance of the internet across the globe cannot be over-emphasized as such network security is essential to curb future attack occurrences. Cyber-attacks like DDoS and Ransomware yielded a lot of damage to connected devices by endangering and accessing them, notwithstanding these damages are air marked to be on the rise. To overcome these issues, machine learning has been used in different computing aspects such as cyber–Intrusion Detection. Recently, deep learning, extreme learning, and deep extreme learning networks have superseded machine learning in this context due to their iterative hidden layers that can manipulate complex features of cyber intrusion data. Hence, this research surveys the application of data-driven intelligent algorithms for cyber security attack detection in comparison to conventional machine learning techniques. The review focuses on the performance evaluation of several state-of-the-art intelligent algorithms and provides research gaps and future 2trends in the context of Data Security Attacks and Cyber Intrusion Detection.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121433151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Intelligent Surfaces Enabling 6G Wireless Communication Systems: Use Cases and Technical Considerations 支持6G无线通信系统的可重构智能表面:用例和技术考虑
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051543
A. Imoize, H. I. Obakhena, F. I. Anyasi, J. Isabona, Stephen Ojo, N. Faruk
Reconfigurable intelligent surfaces are rapidly emerging as candidate technology to support massive connectivity in the envisioned 6G wireless networks. By proactively reconfiguring the propagation space into a smart, programmable, and truly controllable entity via an array of inexpensive passive reflecting elements, a robust improvement in the spectrum and/or energy efficiency (EE) of wireless communication systems can be realized. This paper presents state-of-the-art solutions for some critical aspects of RIS-empowered wireless communication systems. In particular, an exposition on the fundamentals of RIS technology, including its structure and operation, competitive advantages over existing frameworks, system models, and potential use cases in wireless communication systems are broached. Last, a few open research issues and key takeaway lessons are highlighted.
可重构智能表面正迅速成为支持6G无线网络大规模连接的候选技术。通过一系列廉价的无源反射元件,主动地将传播空间重新配置为智能、可编程和真正可控的实体,可以实现无线通信系统频谱和/或能源效率(EE)的强大改进。本文介绍了ris授权无线通信系统的一些关键方面的最先进的解决方案。特别地,对RIS技术的基本原理进行了阐述,包括其结构和操作,相对于现有框架的竞争优势,系统模型以及无线通信系统中的潜在用例。最后,重点介绍了本研究的几个开放性问题和重要的借鉴教训。
{"title":"Reconfigurable Intelligent Surfaces Enabling 6G Wireless Communication Systems: Use Cases and Technical Considerations","authors":"A. Imoize, H. I. Obakhena, F. I. Anyasi, J. Isabona, Stephen Ojo, N. Faruk","doi":"10.1109/ITED56637.2022.10051543","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051543","url":null,"abstract":"Reconfigurable intelligent surfaces are rapidly emerging as candidate technology to support massive connectivity in the envisioned 6G wireless networks. By proactively reconfiguring the propagation space into a smart, programmable, and truly controllable entity via an array of inexpensive passive reflecting elements, a robust improvement in the spectrum and/or energy efficiency (EE) of wireless communication systems can be realized. This paper presents state-of-the-art solutions for some critical aspects of RIS-empowered wireless communication systems. In particular, an exposition on the fundamentals of RIS technology, including its structure and operation, competitive advantages over existing frameworks, system models, and potential use cases in wireless communication systems are broached. Last, a few open research issues and key takeaway lessons are highlighted.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble-based Shill Bidding Prediction Model in Car *Auction System 汽车拍卖系统中基于集成的底价预测模型
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051523
Segun Akintunde, O. R. Vincent, Oreoluwa Tinubu
The electronic auction system has emerged as one of the leading electronic commerce platforms where auctioneers and bidders converge for transactions. With the Internet's proliferation, e-commerce systems' functionalities have greatly been enhanced. Unfortunately, fraudulent activities increasingly hamper the credibility of online auction systems. Shill Bidding is one of the prominent frauds in the e-auction. Due to its similarity with normal bidding behaviour, it is challenging to detect as legitimate bidders could be categorized as fraudulent and vice versa. Several authentic auctioneers have been cheated during online bidding systems because of the diverse ways shill bidding is being perpetrated. It is, therefore, essential to improve the credibility of online bidding systems. In this study, we proposed a machine learning-based prediction system that determines the likelihood of a customer/seller perpetrating shill bidding. Upon deployment, the proposed system would prevent shill bidders from participating in a car action system. A vote ensemble model is trained with public data of 12 attributes comprising Random Forest, Decision Tree, Multi-layer Perception (MLP), and Sequential Maximal Optimization (SMO) base learners. An object-oriented Python programming language is used to implement the shill bidding predictive system. Experimental results show the excellence of the proposed system using metrics such as Precision, Accuracy, Recall, F1-score, and Misclassification error.
电子拍卖系统已经成为拍卖商和竞标者进行交易的主要电子商务平台之一。随着互联网的普及,电子商务系统的功能得到了极大的增强。不幸的是,欺诈活动日益妨碍在线拍卖系统的信誉。虚投是电子拍卖中较为突出的欺诈行为之一。由于其与正常投标行为相似,因此很难检测到合法投标人可能被归类为欺诈行为,反之亦然。一些真正的拍卖师在网上竞标系统中被欺骗,因为各种各样的投标方式正在实施。因此,提高网上招标系统的可信度至关重要。在这项研究中,我们提出了一个基于机器学习的预测系统,该系统可以确定客户/卖家进行欺诈投标的可能性。一旦部署,提议的系统将阻止托票竞标者参与汽车行动系统。使用包含随机森林、决策树、多层感知(MLP)和顺序最大优化(SMO)基础学习器的12个属性的公共数据训练投票集成模型。采用面向对象的Python编程语言实现了竞价预测系统。实验结果表明,该系统在精密度、准确度、召回率、f1分数和误分类误差等指标上表现优异。
{"title":"An Ensemble-based Shill Bidding Prediction Model in Car *Auction System","authors":"Segun Akintunde, O. R. Vincent, Oreoluwa Tinubu","doi":"10.1109/ITED56637.2022.10051523","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051523","url":null,"abstract":"The electronic auction system has emerged as one of the leading electronic commerce platforms where auctioneers and bidders converge for transactions. With the Internet's proliferation, e-commerce systems' functionalities have greatly been enhanced. Unfortunately, fraudulent activities increasingly hamper the credibility of online auction systems. Shill Bidding is one of the prominent frauds in the e-auction. Due to its similarity with normal bidding behaviour, it is challenging to detect as legitimate bidders could be categorized as fraudulent and vice versa. Several authentic auctioneers have been cheated during online bidding systems because of the diverse ways shill bidding is being perpetrated. It is, therefore, essential to improve the credibility of online bidding systems. In this study, we proposed a machine learning-based prediction system that determines the likelihood of a customer/seller perpetrating shill bidding. Upon deployment, the proposed system would prevent shill bidders from participating in a car action system. A vote ensemble model is trained with public data of 12 attributes comprising Random Forest, Decision Tree, Multi-layer Perception (MLP), and Sequential Maximal Optimization (SMO) base learners. An object-oriented Python programming language is used to implement the shill bidding predictive system. Experimental results show the excellence of the proposed system using metrics such as Precision, Accuracy, Recall, F1-score, and Misclassification error.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129413157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework For Critical Infrastructure Monitoring Based On Deep Reinforcement Learning Approach 基于深度强化学习方法的关键基础设施监测框架
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051520
Kefas Yunana, I. O. Oyefolahan, S. Bashir
Critical Infrastructure (CI) are nowadays linked with IOT devices that communicate data through networks to achieve significant collaboration. With the progress in internet connectivity, IOT has disrupt numerous aspects of CI comprising communication systems, power plants, power grid, gas pipeline, and transportation systems. As a disruptive paradigm, the IOT and Cloud computing utilizing Smart IOT devices equipped with numerous sensors and actuating capabilities play significant roles when deployed in CI surroundings with the aim of monitoring vital observable figures consisting of flow rate, temperature, pressure, and lighting situations. Over the years, oil pipeline infrastructure have been the main economic means for conveying refined oil to assembly and distribution outlets. Though damages to the pipelines in this area by exclusion have influence the normal transport of refined oil to the outlets across the country like Nigeria which has influence the stream of income and damages to the environment. Reinforcement Learning (RL) approach for infrastructure reliability monitoring have receive numerous consideration by researchers denoting that RL centered policy reveals superior operation than regular traditional control systems strategies. Many of the studies utilised mainly algorithms for environment with discrete action and observation spaces unlike others with infinite state space. This study proposed a framework for critical infrastructure monitoring based on Deep Reinforcement Learning (DRL) for oil pipeline network and also developed a pipeline network monitoring (PNM) architecture with expression of the environment dynamics as Markov Decision Process. The sample observation space data and strategy for evaluation of the framework was also presented.
如今,关键基础设施(CI)与通过网络通信数据以实现重要协作的物联网设备相关联。随着互联网连接的进步,物联网已经颠覆了CI的许多方面,包括通信系统、发电厂、电网、天然气管道和运输系统。作为一种颠覆性范例,物联网和云计算利用配备了众多传感器和驱动功能的智能物联网设备,在部署在CI环境中发挥重要作用,目的是监测流量、温度、压力和照明情况等重要可观察数据。多年来,石油管道基础设施一直是将成品油输送到组装和分销网点的主要经济手段。尽管排除对该地区管道的破坏影响了成品油正常运输到尼日利亚等全国各地的网点,从而影响了收入流和对环境的破坏。基于强化学习(RL)的基础设施可靠性监测方法得到了研究人员的广泛关注,表明以强化学习为中心的策略比常规的传统控制系统策略具有更好的运行效果。与其他具有无限状态空间的研究不同,许多研究主要使用具有离散动作和观察空间的环境算法。提出了一种基于深度强化学习(DRL)的石油管网关键基础设施监测框架,并开发了一种将环境动态表达为马尔可夫决策过程的管网监测(PNM)架构。给出了该框架的样本观测空间数据和评估策略。
{"title":"A Framework For Critical Infrastructure Monitoring Based On Deep Reinforcement Learning Approach","authors":"Kefas Yunana, I. O. Oyefolahan, S. Bashir","doi":"10.1109/ITED56637.2022.10051520","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051520","url":null,"abstract":"Critical Infrastructure (CI) are nowadays linked with IOT devices that communicate data through networks to achieve significant collaboration. With the progress in internet connectivity, IOT has disrupt numerous aspects of CI comprising communication systems, power plants, power grid, gas pipeline, and transportation systems. As a disruptive paradigm, the IOT and Cloud computing utilizing Smart IOT devices equipped with numerous sensors and actuating capabilities play significant roles when deployed in CI surroundings with the aim of monitoring vital observable figures consisting of flow rate, temperature, pressure, and lighting situations. Over the years, oil pipeline infrastructure have been the main economic means for conveying refined oil to assembly and distribution outlets. Though damages to the pipelines in this area by exclusion have influence the normal transport of refined oil to the outlets across the country like Nigeria which has influence the stream of income and damages to the environment. Reinforcement Learning (RL) approach for infrastructure reliability monitoring have receive numerous consideration by researchers denoting that RL centered policy reveals superior operation than regular traditional control systems strategies. Many of the studies utilised mainly algorithms for environment with discrete action and observation spaces unlike others with infinite state space. This study proposed a framework for critical infrastructure monitoring based on Deep Reinforcement Learning (DRL) for oil pipeline network and also developed a pipeline network monitoring (PNM) architecture with expression of the environment dynamics as Markov Decision Process. The sample observation space data and strategy for evaluation of the framework was also presented.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Mosquito Prevalence in a Warm Semi-Arid Climate using Artificial Neural Network (ANN) 基于人工神经网络(ANN)的温暖半干旱气候下蚊虫流行预测
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051442
Felicia Cletus, B. Y. Baha, O. Sarjiyus
Mosquito is a disease-causing organism that causes harm to humans and animals alike. Over the years, vector control measures such as the use of insecticides, treated mosquito net, and the prediction of mosquito prevalence using statistical tools and Artificial Neural Network models in different weather terrain have not completely eradicated the problems associated with prevalence of mosquito. More so, there is no research available in literature to predict the prevalence of mosquito using artificial neural network in a warm semi-arid climate such as that of Yola, Northeastern Nigeria. This research endeavored to achieve this aim. This study built a prototype artificial neural network model that is capable of predicting mosquito prevalence. The model is a feed forward multi-layer perceptron that was implemented using the supervised learning method and optimized using the back propagation algorithm. The model has four (4) input features, which are weather data (maximum temperature, minimum temperature, relative humidity and rainfall) which were adopted for the research. After compilation, the new model was trained and validated using sourced data by the researcher. To train the model, 80% of the data was used while 20% was used for the validation. The proposed model is a keras sequential classification model that was built in anaconda using the python programming language. The optimal model has three hidden layers of 40 30 and 20 neurons with Sigmoid and ReLu activation function respectively. The simulation of the prototype model recorded 96.67% accuracy with good fit. This research shows that the artificial neural network model is an effective tool in predicting mosquito prevalence in a warm semi-arid climatic region and thus recommends the use of more data and training epochs to increase accuracy and subsequent implementation of the model in real life for prediction of mosquito prevalence.
蚊子是一种致病生物,对人类和动物都造成伤害。多年来,媒介控制措施,如使用杀虫剂、处理过的蚊帐,以及利用统计工具和人工神经网络模型在不同天气地形下预测蚊子流行情况,并没有完全根除与蚊子流行有关的问题。更重要的是,文献中没有研究可以利用人工神经网络预测在尼日利亚东北部约拉等温暖的半干旱气候中蚊子的流行情况。本研究努力实现这一目标。本研究建立了一个能够预测蚊虫流行的原型人工神经网络模型。该模型是一个前馈多层感知器,使用监督学习方法实现,并使用反向传播算法进行优化。模型有4个输入特征,分别是研究中采用的天气数据(最高温度、最低温度、相对湿度和降雨量)。编译完成后,研究人员使用原始数据对新模型进行训练和验证。为了训练模型,使用了80%的数据,而使用了20%的数据进行验证。提出的模型是使用python编程语言在anaconda中构建的keras顺序分类模型。最优模型有3个隐藏层,分别包含40、30和20个神经元,分别具有Sigmoid和ReLu激活函数。原型模型的仿真准确率为96.67%,拟合良好。本研究表明,人工神经网络模型是预测温暖半干旱气候地区蚊虫流行的有效工具,因此建议使用更多的数据和训练时间来提高模型在现实生活中预测蚊虫流行的准确性和后续实施。
{"title":"Prediction of Mosquito Prevalence in a Warm Semi-Arid Climate using Artificial Neural Network (ANN)","authors":"Felicia Cletus, B. Y. Baha, O. Sarjiyus","doi":"10.1109/ITED56637.2022.10051442","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051442","url":null,"abstract":"Mosquito is a disease-causing organism that causes harm to humans and animals alike. Over the years, vector control measures such as the use of insecticides, treated mosquito net, and the prediction of mosquito prevalence using statistical tools and Artificial Neural Network models in different weather terrain have not completely eradicated the problems associated with prevalence of mosquito. More so, there is no research available in literature to predict the prevalence of mosquito using artificial neural network in a warm semi-arid climate such as that of Yola, Northeastern Nigeria. This research endeavored to achieve this aim. This study built a prototype artificial neural network model that is capable of predicting mosquito prevalence. The model is a feed forward multi-layer perceptron that was implemented using the supervised learning method and optimized using the back propagation algorithm. The model has four (4) input features, which are weather data (maximum temperature, minimum temperature, relative humidity and rainfall) which were adopted for the research. After compilation, the new model was trained and validated using sourced data by the researcher. To train the model, 80% of the data was used while 20% was used for the validation. The proposed model is a keras sequential classification model that was built in anaconda using the python programming language. The optimal model has three hidden layers of 40 30 and 20 neurons with Sigmoid and ReLu activation function respectively. The simulation of the prototype model recorded 96.67% accuracy with good fit. This research shows that the artificial neural network model is an effective tool in predicting mosquito prevalence in a warm semi-arid climatic region and thus recommends the use of more data and training epochs to increase accuracy and subsequent implementation of the model in real life for prediction of mosquito prevalence.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability Assessment of Omu-Aran 132/33kV Transmission Substation feeders Omu-Aran 132/33kV变电站馈线可靠性评估
Pub Date : 2022-11-01 DOI: 10.1109/ited56637.2022.10051618
Alabi Ayodele John, Olulope Paul Kehinde, F. Ibikunle, Kareem Sunday Babatunde
The reliability of Omu-Aran 132/33kV Transmission Station, Omu-Aran Kwara State, and its associated 33kV feeders was investigated in this study. A situation awareness model was developed by considering customer-based and system-based reliability indices for the transmission station feeders between January 2015 - December 2020. Customer-based indices like System average Interruption frequency index (SAIFI), System average interruption duration index (SAIDI), Customer average interruption duration index (CAIDI), and Average service availability index (ASAI) were calculated for the station's outgoing 33kV feeders. System-based indices like failure rate, mean time between failure (MTBF), and Mean down Time (MDT) were also determined for the 33kV feeders. Results of the analysis showed that Otun 33kV feeder has the least mean SAIFI and SAIDI values of 0.0963interuption/customer and 0.2291hours/customer respectively. Customers on this feeder experience the least number of interruptions and the least duration of the sustained interruption. Omu-Aran 33kV feeder has the least CAIDI of 1.7809 interruptions/customer. Customers on this feeder experience the least number of continuous interruptions. Omu-Aran 33kV feeder also has the highest mean ASAI of 0.8359 and Isanlu-Isin 33kV feeder has the least mean ASAI of 0.5943 and requires special attention to improve supply availability to the customers on this feeder.
本研究调查了Omu-Aran Kwara州Omu-Aran 132/33kV输电站及其相关33kV馈线的可靠性。在2015年1月至2020年12月期间,考虑基于客户和基于系统的馈线可靠性指标,建立了输变电站馈线的态势感知模型。基于用户的指数,如系统平均中断频率指数(SAIFI)、系统平均中断持续时间指数(SAIDI)、用户平均中断持续时间指数(CAIDI)和平均服务可用性指数(ASAI),计算了该站出线33kV馈线。还确定了33kV馈线的故障率、平均故障间隔时间(MTBF)和平均停机时间(MDT)等基于系统的指标。分析结果表明,Otun 33kV馈线的平均SAIFI和SAIDI值最小,分别为0.0963中断/用户和0.2291小时/用户。此馈线上的客户经历的中断次数最少,持续中断的时间最短。Omu-Aran 33kV馈线的CAIDI最小,为1.7809中断/用户。在此馈线上的客户经历的连续中断次数最少。Omu-Aran 33kV馈线的平均ASAI也最高,为0.8359,isanru - isin 33kV馈线的平均ASAI最低,为0.5943,需要特别注意提高该馈线对客户的供应可用性。
{"title":"Reliability Assessment of Omu-Aran 132/33kV Transmission Substation feeders","authors":"Alabi Ayodele John, Olulope Paul Kehinde, F. Ibikunle, Kareem Sunday Babatunde","doi":"10.1109/ited56637.2022.10051618","DOIUrl":"https://doi.org/10.1109/ited56637.2022.10051618","url":null,"abstract":"The reliability of Omu-Aran 132/33kV Transmission Station, Omu-Aran Kwara State, and its associated 33kV feeders was investigated in this study. A situation awareness model was developed by considering customer-based and system-based reliability indices for the transmission station feeders between January 2015 - December 2020. Customer-based indices like System average Interruption frequency index (SAIFI), System average interruption duration index (SAIDI), Customer average interruption duration index (CAIDI), and Average service availability index (ASAI) were calculated for the station's outgoing 33kV feeders. System-based indices like failure rate, mean time between failure (MTBF), and Mean down Time (MDT) were also determined for the 33kV feeders. Results of the analysis showed that Otun 33kV feeder has the least mean SAIFI and SAIDI values of 0.0963interuption/customer and 0.2291hours/customer respectively. Customers on this feeder experience the least number of interruptions and the least duration of the sustained interruption. Omu-Aran 33kV feeder has the least CAIDI of 1.7809 interruptions/customer. Customers on this feeder experience the least number of continuous interruptions. Omu-Aran 33kV feeder also has the highest mean ASAI of 0.8359 and Isanlu-Isin 33kV feeder has the least mean ASAI of 0.5943 and requires special attention to improve supply availability to the customers on this feeder.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132930167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Deep Neural Network Enabled with Cuckoo Search Algorithm for Intrusion Detection in Wide Area Networks 基于布谷鸟搜索算法的增强深度神经网络广域网入侵检测
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051526
R. Jimoh, A. Imoize, J. B. Awotunde, Stephen Ojo, M. B. Akanbi, Jesufemi Ayotomide Bamigbaye, N. Faruk
A diversity of harmful software has been created as a result of the dramatic increase in internet usage, posing major risks to computer security. There is a great probability that the numerous computing operations performed through the network will be interfered with or altered, and as a result, effective intrusion detection systems are imperative. In addition, the attacks on the network are unpredictable, something that emphasizes the value of creating effective classification and prediction models. Machine learning (ML) and Deep Learning techniques have been used to evaluate datasets for intrusion detection systems (IDS). The employment of the DL-based approach enabled by feature selection helps to address challenges with data quality, handling high-dimensional data, and other related issues. Therefore, due to the large nature and volume of the IDS datasets, and the ability of DL-based models to learn categories incrementally through their hidden layer architecture to produce more accurate results in big data, this study proposes a Long-Short-Term-Memory (LSTM) model, and to further enhance the classification capacity of the projected DL method, the cuckoo search algorithm was introduced to select optimal features from the wireframe. The accuracy and subsequent detection of the suggested model positive and negative rates were evaluated. The experimental results show that the LSTM outperformed some other existing models with the highest classification accuracy of 99.7% and an error rate of 0.006.
由于互联网使用的急剧增加,产生了各种各样的有害软件,对计算机安全构成了重大威胁。通过网络执行的大量计算操作极有可能受到干扰或改变,因此,有效的入侵检测系统势在必行。此外,对网络的攻击是不可预测的,这强调了创建有效分类和预测模型的价值。机器学习(ML)和深度学习技术已被用于评估入侵检测系统(IDS)的数据集。使用基于特性选择的基于dl的方法有助于解决数据质量、处理高维数据和其他相关问题方面的挑战。因此,由于IDS数据集的庞大性质和体积,以及基于DL的模型能够通过其隐藏层架构逐步学习类别以在大数据中产生更准确的结果,本研究提出了一种长短期记忆(LSTM)模型,并为了进一步增强投影DL方法的分类能力,引入布谷鸟搜索算法从线框中选择最优特征。评估了所建议模型阳性率和阴性率的准确性和后续检测。实验结果表明,LSTM的分类准确率为99.7%,错误率为0.006,优于现有的一些模型。
{"title":"An Enhanced Deep Neural Network Enabled with Cuckoo Search Algorithm for Intrusion Detection in Wide Area Networks","authors":"R. Jimoh, A. Imoize, J. B. Awotunde, Stephen Ojo, M. B. Akanbi, Jesufemi Ayotomide Bamigbaye, N. Faruk","doi":"10.1109/ITED56637.2022.10051526","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051526","url":null,"abstract":"A diversity of harmful software has been created as a result of the dramatic increase in internet usage, posing major risks to computer security. There is a great probability that the numerous computing operations performed through the network will be interfered with or altered, and as a result, effective intrusion detection systems are imperative. In addition, the attacks on the network are unpredictable, something that emphasizes the value of creating effective classification and prediction models. Machine learning (ML) and Deep Learning techniques have been used to evaluate datasets for intrusion detection systems (IDS). The employment of the DL-based approach enabled by feature selection helps to address challenges with data quality, handling high-dimensional data, and other related issues. Therefore, due to the large nature and volume of the IDS datasets, and the ability of DL-based models to learn categories incrementally through their hidden layer architecture to produce more accurate results in big data, this study proposes a Long-Short-Term-Memory (LSTM) model, and to further enhance the classification capacity of the projected DL method, the cuckoo search algorithm was introduced to select optimal features from the wireframe. The accuracy and subsequent detection of the suggested model positive and negative rates were evaluated. The experimental results show that the LSTM outperformed some other existing models with the highest classification accuracy of 99.7% and an error rate of 0.006.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133319162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Higher Order Sectorization for Antenna Gain, Signal Quality and Erlang Capacity Maximization 天线增益、信号质量和Erlang容量最大化的高阶分割
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051444
J. Isabona, A. Imoize, Odesanya Ituabhor, Lanlege David Ibitome, N. Faruk, Ikechi Irisi
The widespread use of smartphones and mobile internet triggers a strong daily traffic growth in telecom networks. Due to this proliferating surge in mobile network usage, network providers need to employ cost-effective means to manage the escalating data traffic. Currently, Cell sectorization, a distinctive technique that explores directional antennas to splits large macrocells into smaller cells (sectors), is receiving significant attention as a cost-resourceful technique for boosting cellular network quality and capacity. In this work, analytical models in the orthogonal frequency division multiplexing (OFDM) framework are employed to computationally evaluate and quantify the performance of higher-order sectorization with 6-sectors and 12-sectors over the standard 3-sectored cellular networks. The approach effectively investigates OFDM systems regarding signal quality, antenna gain and user Erlang capacity. The results indicate higher signal quality, improved antenna gain and user Erlang capacity. The employed approach can serve as a fast and effective method to conduct cellular network performance analysis during radio network design, deployment and management.
智能手机和移动互联网的广泛使用引发了电信网络每日流量的强劲增长。由于移动网络使用的激增,网络提供商需要采用经济有效的方法来管理不断升级的数据流量。目前,小区扇区化是一种独特的技术,它探索定向天线将大的宏小区分成较小的小区(扇区),作为一种提高蜂窝网络质量和容量的成本合理的技术,正受到广泛关注。在这项工作中,采用正交频分复用(OFDM)框架中的分析模型,对标准3扇区蜂窝网络上6扇区和12扇区的高阶扇区性能进行了计算评估和量化。该方法有效地研究了OFDM系统的信号质量、天线增益和用户Erlang容量。结果表明,该方法提高了信号质量,提高了天线增益和用户Erlang容量。该方法可作为无线网络设计、部署和管理过程中蜂窝网络性能分析的一种快速有效的方法。
{"title":"Higher Order Sectorization for Antenna Gain, Signal Quality and Erlang Capacity Maximization","authors":"J. Isabona, A. Imoize, Odesanya Ituabhor, Lanlege David Ibitome, N. Faruk, Ikechi Irisi","doi":"10.1109/ITED56637.2022.10051444","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051444","url":null,"abstract":"The widespread use of smartphones and mobile internet triggers a strong daily traffic growth in telecom networks. Due to this proliferating surge in mobile network usage, network providers need to employ cost-effective means to manage the escalating data traffic. Currently, Cell sectorization, a distinctive technique that explores directional antennas to splits large macrocells into smaller cells (sectors), is receiving significant attention as a cost-resourceful technique for boosting cellular network quality and capacity. In this work, analytical models in the orthogonal frequency division multiplexing (OFDM) framework are employed to computationally evaluate and quantify the performance of higher-order sectorization with 6-sectors and 12-sectors over the standard 3-sectored cellular networks. The approach effectively investigates OFDM systems regarding signal quality, antenna gain and user Erlang capacity. The results indicate higher signal quality, improved antenna gain and user Erlang capacity. The employed approach can serve as a fast and effective method to conduct cellular network performance analysis during radio network design, deployment and management.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131607929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th Information Technology for Education and Development (ITED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1