首页 > 最新文献

2022 5th Information Technology for Education and Development (ITED)最新文献

英文 中文
An Automatic Railway Level Crossing System with Crack Detection 带裂纹检测的铁路平交道口自动系统
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051357
A. Amusan, Yusuf Kolawole Adebakin
Railway system is a kind of transportation where passengers and goods are transported on wheeled vehicles running on rails located on tracks. This form of transportation is usually inexpensive, secure, and often the most convenient. In areas with frequent use of railway transport system, there is need to limit the accidents at the level crossing, mitigate the falling of trains on the rail due to cracks and create an excellent feedback system. The manual management of the system is inconvenient, time wasting and prone to sudden accidents. Hence in this work, an automatic railway system which includes automatic level crossing and crack detection system with an excellent feedback process is developed using ultrasonic sensors and microcontrollers for control. The system is unique because it uses ultrasonic sensors for maximum performance. The developed system detects cracks on the rail, automatically controls the level crossing to avoid collision and send all possible feedbacks to a remote station using the SIM module. The reliability assessment of the system gave 93.3%. The system is reliable, efficient, and convenient and it is recommended for areas where rail transport systems are demanding.
铁路系统是在轨道上运行的轮式车辆上运送乘客和货物的一种运输方式。这种交通方式通常便宜、安全,而且往往是最方便的。在经常使用铁路运输系统的地区,需要限制平交道口的事故,减少列车因裂缝而落在铁轨上的情况,并建立一个良好的反馈系统。人工管理系统不方便,浪费时间,容易发生突发事故。因此,本文采用超声波传感器和单片机控制,研制了一种包括自动平交和具有良好反馈过程的裂缝检测系统的自动铁路系统。该系统的独特之处在于它使用超声波传感器来实现最大性能。开发的系统检测轨道上的裂缝,自动控制平交道口以避免碰撞,并使用SIM模块将所有可能的反馈发送到远程站点。系统的可靠性评价为93.3%。该系统可靠、高效、方便,适用于对轨道交通系统要求较高的地区。
{"title":"An Automatic Railway Level Crossing System with Crack Detection","authors":"A. Amusan, Yusuf Kolawole Adebakin","doi":"10.1109/ITED56637.2022.10051357","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051357","url":null,"abstract":"Railway system is a kind of transportation where passengers and goods are transported on wheeled vehicles running on rails located on tracks. This form of transportation is usually inexpensive, secure, and often the most convenient. In areas with frequent use of railway transport system, there is need to limit the accidents at the level crossing, mitigate the falling of trains on the rail due to cracks and create an excellent feedback system. The manual management of the system is inconvenient, time wasting and prone to sudden accidents. Hence in this work, an automatic railway system which includes automatic level crossing and crack detection system with an excellent feedback process is developed using ultrasonic sensors and microcontrollers for control. The system is unique because it uses ultrasonic sensors for maximum performance. The developed system detects cracks on the rail, automatically controls the level crossing to avoid collision and send all possible feedbacks to a remote station using the SIM module. The reliability assessment of the system gave 93.3%. The system is reliable, efficient, and convenient and it is recommended for areas where rail transport systems are demanding.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127839014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced DFFNN for Location-Based Services of Indoor Device-Free Submissive Localization 基于位置服务的室内无设备服从定位的增强DFFNN
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051582
J. B. Awotunde, A. Imoize, Akash Kumar Bhoi, R. Jimoh, Stephen Ojo, R. Panigrahi, N. Faruk
With no associated devices, device-free localization (DFL) uses wireless sensor networks to find a target. DFL has created comprehensive applications, smart cities and the Internet of Things (IoT), among other things. This technique has attracted significant attention from various fields, increasing the demand for tracking indoor location-based services. The critical challenge in DFL is a way to retrieve essential characteristics to illustrate raw signals with various locations linked with diverse patterns. The complexity of an indoor environment with limited space has created low indoor positioning reliability and effectiveness problems. Therefore, this study proposes and formulated an image classification problem for the DFL problem by initially transforming the receiving signal strength (RSS) inputs into picture frames. The feature extraction from raw signals was performed using Deep Feed-Forward Neural Network (DFFNN) and deep auto-encoder (DAE) to fine-turning for classification. The DAE combined DFFNN were used for signal reconstruction and feature learning to present the DFL better. The findings revealed an accuracy of 100% using real-world data collected, and a signal-to-noise ratio over −5dB, 0dB, and 5dB was used to measure the react to noisy data. Moreover, in IoT applications, its time cost is very fast in single activity by 5ms for classification. The proposed method is better in noiseless and noisy situations, localization accuracy, and other related techniques.
在没有关联设备的情况下,无设备定位(DFL)使用无线传感器网络来寻找目标。DFL创建了综合应用程序,智能城市和物联网(IoT)等。该技术引起了各个领域的广泛关注,增加了对室内定位跟踪服务的需求。DFL的关键挑战是如何检索基本特征来说明具有不同模式的不同位置的原始信号。室内环境的复杂性和空间的有限性造成了室内定位可靠性和有效性不高的问题。因此,本研究提出并制定了针对DFL问题的图像分类问题,将接收信号强度(RSS)输入初始转化为图像帧。利用深度前馈神经网络(DFFNN)和深度自编码器(DAE)对原始信号进行特征提取,进行微调分类。利用DAE联合DFFNN进行信号重构和特征学习,更好地呈现DFL。研究结果表明,使用收集到的真实数据,准确率达到100%,并且使用超过- 5dB, 0dB和5dB的信噪比来测量对噪声数据的反应。此外,在物联网应用中,其时间成本非常快,单个活动的分类时间成本为5ms。该方法在无噪声和有噪声情况下具有较好的定位精度和其他相关技术。
{"title":"An Enhanced DFFNN for Location-Based Services of Indoor Device-Free Submissive Localization","authors":"J. B. Awotunde, A. Imoize, Akash Kumar Bhoi, R. Jimoh, Stephen Ojo, R. Panigrahi, N. Faruk","doi":"10.1109/ITED56637.2022.10051582","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051582","url":null,"abstract":"With no associated devices, device-free localization (DFL) uses wireless sensor networks to find a target. DFL has created comprehensive applications, smart cities and the Internet of Things (IoT), among other things. This technique has attracted significant attention from various fields, increasing the demand for tracking indoor location-based services. The critical challenge in DFL is a way to retrieve essential characteristics to illustrate raw signals with various locations linked with diverse patterns. The complexity of an indoor environment with limited space has created low indoor positioning reliability and effectiveness problems. Therefore, this study proposes and formulated an image classification problem for the DFL problem by initially transforming the receiving signal strength (RSS) inputs into picture frames. The feature extraction from raw signals was performed using Deep Feed-Forward Neural Network (DFFNN) and deep auto-encoder (DAE) to fine-turning for classification. The DAE combined DFFNN were used for signal reconstruction and feature learning to present the DFL better. The findings revealed an accuracy of 100% using real-world data collected, and a signal-to-noise ratio over −5dB, 0dB, and 5dB was used to measure the react to noisy data. Moreover, in IoT applications, its time cost is very fast in single activity by 5ms for classification. The proposed method is better in noiseless and noisy situations, localization accuracy, and other related techniques.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127989780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Solar/Heat Pump System for Water Heating in Nigeria: Techno-economic assessment 尼日利亚用于水加热的混合太阳能/热泵系统:技术经济评估
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051586
O. A, Okandeji Alexander, Oshevire Patrick
Due to the pervasive use of fossil fuels-based technologies for meeting domestic energy needs such as water heating, space cooling, and lighting, household energy consumption is increasing rapidly. However, these technologies consume enormous energy with huge energy costs. The energy crisis in Nigeria has long been identified as one of the key major obstacles impeding the country's economic growth, resulting in the disproportionate use of biomass for domestic heating. Therefore, fossil fuels-based heating technologies need to be substituted with a clean, eco-friendly, in exhaustible renewable heating technology towards achieving a net-zero energy target in buildings. Water heating with a hybrid system is a promising alternative to reduce energy consumption and costs. This system can be used as an off-grid energy solution to generate hot water in remote areas. This paper examines the techno-economic suitability of using a hybrid solar/heat pump system to address the issue of energy conservation. The methodology considered the initial upfront cost, operating and maintenance costs, grid energy costs, salvage cost, and the inflation rate over the project's economic life as an economic comparative metric. When compared to a baseline heating system, the use of hybrid systems saves about NGN 865,668.80, resulting in a 46.8% cost savings.
由于普遍使用基于化石燃料的技术来满足家庭能源需求,如热水、空间冷却和照明,家庭能源消耗正在迅速增加。然而,这些技术消耗了巨大的能源,能源成本也很高。长期以来,尼日利亚的能源危机一直被认为是阻碍该国经济增长的主要障碍之一,导致过度使用生物质能用于家庭供暖。因此,以化石燃料为基础的供暖技术需要被清洁、环保、可再生的供暖技术所取代,以实现建筑的净零能耗目标。混合系统的水加热是一种很有前途的替代方案,可以减少能源消耗和成本。该系统可以作为离网能源解决方案,在偏远地区产生热水。本文考察了使用混合太阳能/热泵系统来解决节能问题的技术经济适用性。该方法考虑了初始前期成本、运营和维护成本、电网能源成本、回收成本和项目经济生命周期内的通货膨胀率作为经济比较指标。与基线加热系统相比,使用混合动力系统可节省约865,668.80挪威新台币,节省46.8%的成本。
{"title":"Hybrid Solar/Heat Pump System for Water Heating in Nigeria: Techno-economic assessment","authors":"O. A, Okandeji Alexander, Oshevire Patrick","doi":"10.1109/ITED56637.2022.10051586","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051586","url":null,"abstract":"Due to the pervasive use of fossil fuels-based technologies for meeting domestic energy needs such as water heating, space cooling, and lighting, household energy consumption is increasing rapidly. However, these technologies consume enormous energy with huge energy costs. The energy crisis in Nigeria has long been identified as one of the key major obstacles impeding the country's economic growth, resulting in the disproportionate use of biomass for domestic heating. Therefore, fossil fuels-based heating technologies need to be substituted with a clean, eco-friendly, in exhaustible renewable heating technology towards achieving a net-zero energy target in buildings. Water heating with a hybrid system is a promising alternative to reduce energy consumption and costs. This system can be used as an off-grid energy solution to generate hot water in remote areas. This paper examines the techno-economic suitability of using a hybrid solar/heat pump system to address the issue of energy conservation. The methodology considered the initial upfront cost, operating and maintenance costs, grid energy costs, salvage cost, and the inflation rate over the project's economic life as an economic comparative metric. When compared to a baseline heating system, the use of hybrid systems saves about NGN 865,668.80, resulting in a 46.8% cost savings.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121052014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transitive Grouping for Internet of Things Support IEEE 802.11ah using Integrated Approach 采用集成方法支持IEEE 802.11ah的物联网传递分组
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051221
Obioma Uchenna Nwogu, U. Nwawelu, C. Ani
With the adoption of IEEE 802.11ah standard, Internet of Things (IoT) and its performance has improved. However, registration time reduction, hidden node problem and efficient channel utilization are issues that have effect on the performance of the IEEE 802.11ah network standard. These issues can be attributed to the failure to allocate appropriate threshold for authentication control and to adjust Restricted Access Window (RAW). These are occasioned by inefficient clustering and station grouping schemes employed. In attempt to address these identified problems, Transitive Grouping (TG) scheme is proposed for the IoT support IEEE 802.11ah network. The TG scheme is a better way of clustering, grouping of stations, and allocation of RAW slot adaptively for an IoT support IEEE 802.11ah network. The TG scheme performance is evaluated in NS-3 environment on the basis of network delay, probability of successful transmission, throughput, channel utilization and registration time metrics. The proposed TG scheme is validated with four popular RAW slot allocation algorithms implemented in 802.11ah namely: RAW Association Identifier (RAd), Traffic Demand-based Stations Grouping (TSG), Hybrid Slotted CSMA/TDMA (HSCT), and M/G/I RAW Slot Allocation (MRA). Simulation results demonstrated that the proposed TG scheme achieved a substantial improvement over the other schemes.
随着IEEE 802.11ah标准的采用,物联网(IoT)及其性能得到了提高。然而,注册时间减少、隐藏节点问题和有效的信道利用率是影响IEEE 802.11ah网络标准性能的问题。这些问题可归因于未能为身份验证控制分配适当的阈值和调整受限访问窗口(RAW)。这是由于采用低效的集群和站点分组方案造成的。为了解决这些问题,针对支持IEEE 802.11ah的物联网网络,提出了传递分组(TG)方案。对于支持ieee802.11 ah的物联网网络,TG方案是一种较好的自适应分组、分组和分配RAW插槽的方法。基于网络延迟、成功传输概率、吞吐量、信道利用率和注册时间等指标,对NS-3环境下的TG方案进行了性能评估。提出的TG方案通过802.11ah中实现的四种流行的RAW插槽分配算法进行验证,即:RAW关联标识符(RAd)、基于流量需求的站点分组(TSG)、混合槽CSMA/TDMA (HSCT)和M/G/I RAW插槽分配(MRA)。仿真结果表明,该方案比其他方案有较大的改进。
{"title":"Transitive Grouping for Internet of Things Support IEEE 802.11ah using Integrated Approach","authors":"Obioma Uchenna Nwogu, U. Nwawelu, C. Ani","doi":"10.1109/ITED56637.2022.10051221","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051221","url":null,"abstract":"With the adoption of IEEE 802.11ah standard, Internet of Things (IoT) and its performance has improved. However, registration time reduction, hidden node problem and efficient channel utilization are issues that have effect on the performance of the IEEE 802.11ah network standard. These issues can be attributed to the failure to allocate appropriate threshold for authentication control and to adjust Restricted Access Window (RAW). These are occasioned by inefficient clustering and station grouping schemes employed. In attempt to address these identified problems, Transitive Grouping (TG) scheme is proposed for the IoT support IEEE 802.11ah network. The TG scheme is a better way of clustering, grouping of stations, and allocation of RAW slot adaptively for an IoT support IEEE 802.11ah network. The TG scheme performance is evaluated in NS-3 environment on the basis of network delay, probability of successful transmission, throughput, channel utilization and registration time metrics. The proposed TG scheme is validated with four popular RAW slot allocation algorithms implemented in 802.11ah namely: RAW Association Identifier (RAd), Traffic Demand-based Stations Grouping (TSG), Hybrid Slotted CSMA/TDMA (HSCT), and M/G/I RAW Slot Allocation (MRA). Simulation results demonstrated that the proposed TG scheme achieved a substantial improvement over the other schemes.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129006562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Strict Fractional Frequency Reuse and Frequency Reuse Factor-3 in 5G Networks 5G网络中严格分数频率复用和频率复用因子-3的性能评估
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051468
A. Musa, Faruk Obasanjo Adekola, N. Faruk
The need for high speed data traffic on mobile devices has risen because of the permeating use of gadgets, such as mobile smart phones, notepads and tablets that are constantly running on data. In order to meet these requirements, mobile network providers must set up both tiny cells, high-capacity and very dense, base stations (BSs). This is to cover not only a vast area but also including hotspots with quick, adaptable, and robust supply. The overall spectral efficiency of 5G networks must be improved, and the operations and deployment costs must be decreased. This paper evaluates and compares the performance of Strict Fractional Frequency Reuse (FFR) and Frequency Reuse Factor-3 (FRF-3) according to the cell throughput and cell spectral efficiency with the theoretical peak throughput and peak spectral efficiency as specified in NR 3GPP specifications. The results from the simulation revealed that the FFR performs much better than the FRF-3, however, it is still not efficient in relation to the peak values.
由于移动智能手机、记事本和平板电脑等小工具的广泛使用,移动设备对高速数据流量的需求不断上升。为了满足这些要求,移动网络提供商必须建立小单元、高容量和非常密集的基站(BSs)。这不仅要覆盖广阔的区域,而且要包括快速、适应性强、供应强劲的热点。提高5G网络的整体频谱效率,降低运营和部署成本。本文根据小区吞吐量和小区频谱效率与NR 3GPP规范中规定的理论峰值吞吐量和峰值频谱效率,对严格分数频率复用(FFR)和频率复用因子-3 (FRF-3)的性能进行了评价和比较。仿真结果表明,FFR的性能比FRF-3要好得多,但相对于峰值而言仍然不够有效。
{"title":"Performance Evaluation of Strict Fractional Frequency Reuse and Frequency Reuse Factor-3 in 5G Networks","authors":"A. Musa, Faruk Obasanjo Adekola, N. Faruk","doi":"10.1109/ITED56637.2022.10051468","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051468","url":null,"abstract":"The need for high speed data traffic on mobile devices has risen because of the permeating use of gadgets, such as mobile smart phones, notepads and tablets that are constantly running on data. In order to meet these requirements, mobile network providers must set up both tiny cells, high-capacity and very dense, base stations (BSs). This is to cover not only a vast area but also including hotspots with quick, adaptable, and robust supply. The overall spectral efficiency of 5G networks must be improved, and the operations and deployment costs must be decreased. This paper evaluates and compares the performance of Strict Fractional Frequency Reuse (FFR) and Frequency Reuse Factor-3 (FRF-3) according to the cell throughput and cell spectral efficiency with the theoretical peak throughput and peak spectral efficiency as specified in NR 3GPP specifications. The results from the simulation revealed that the FFR performs much better than the FRF-3, however, it is still not efficient in relation to the peak values.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"41 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116640189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of the Performance of Various Support Vector Machine kernels 不同支持向量机核性能的比较分析
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051564
A. Kuyoro, Sheriff Alimi, O. Awodele
Support Vector Machine (SVM) in dealing with a classification problem, separates classes using decision boundaries with the primary objective of establishing a large margin between support vectors of the respective class groups; it utilizes kernels to achieve non-linear decision boundaries. This current work examines the performance of four SVM kernels (Sigmoid, Linear, Radial Basis Function (RBF) and Polynomial kernel functions) in addressing classification problems using two datasets from two domains. The two datasets are the Knowledge Discovery in Dataset (KDD) and a set of features extracted from voiced and unvoiced frames. The Polynomial kernel function had the best classification performance on the KDD dataset with accuracy and precision of 99.77% and 99.8% respectively but recorded the worst performance against the voice-feature dataset with an accuracy of 74.96%. Inductively, the polynomial kernel can be best suited for some classification datasets but can return the worst classification performance on another classification dataset. The RBF shows consistent high performance across the two data domains with accuracies of 96.04% and 99.77% and can be considered a general-purpose kernel guaranteed to yield satisfactory classification performance regardless of the dataset type or data domains. The performance of polynomial kernels over the two separate datasets supports the “No Free Launch Theorem”, which when applied to machine learning, means that if an algorithm performs well over a class of problem, it may have worse performance on other class of problem. This implies that there might not be one specific machine learning algorithm that gives the best possible performance for a set of problems, it is therefore important for researchers to try out various algorithms before concluding on the best possible result on any dataset.
支持向量机(SVM)在处理分类问题时,使用决策边界来划分类别,其主要目标是在各自类别组的支持向量之间建立较大的余量;它利用核函数来实现非线性决策边界。目前的工作考察了四个支持向量机核(Sigmoid、线性、径向基函数(RBF)和多项式核函数)在使用来自两个领域的两个数据集解决分类问题方面的性能。这两个数据集是知识发现数据集(KDD)和一组从浊音和非浊音帧中提取的特征。多项式核函数在KDD数据集上的分类性能最好,准确率和精密度分别为99.77%和99.8%,但在语音特征数据集上的分类性能最差,准确率为74.96%。归纳起来,多项式核可能最适合某些分类数据集,但在另一个分类数据集上可能返回最差的分类性能。RBF在两个数据域上表现出一致的高性能,准确率分别为96.04%和99.77%,无论数据集类型或数据域如何,RBF都可以被认为是保证产生满意分类性能的通用内核。多项式核在两个独立数据集上的性能支持“无自由启动定理”,当应用于机器学习时,这意味着如果一个算法在一类问题上表现良好,那么它在其他类问题上的性能可能会更差。这意味着可能没有一种特定的机器学习算法可以为一组问题提供最佳性能,因此研究人员在对任何数据集得出最佳结果之前尝试各种算法是很重要的。
{"title":"Comparative Analysis of the Performance of Various Support Vector Machine kernels","authors":"A. Kuyoro, Sheriff Alimi, O. Awodele","doi":"10.1109/ITED56637.2022.10051564","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051564","url":null,"abstract":"Support Vector Machine (SVM) in dealing with a classification problem, separates classes using decision boundaries with the primary objective of establishing a large margin between support vectors of the respective class groups; it utilizes kernels to achieve non-linear decision boundaries. This current work examines the performance of four SVM kernels (Sigmoid, Linear, Radial Basis Function (RBF) and Polynomial kernel functions) in addressing classification problems using two datasets from two domains. The two datasets are the Knowledge Discovery in Dataset (KDD) and a set of features extracted from voiced and unvoiced frames. The Polynomial kernel function had the best classification performance on the KDD dataset with accuracy and precision of 99.77% and 99.8% respectively but recorded the worst performance against the voice-feature dataset with an accuracy of 74.96%. Inductively, the polynomial kernel can be best suited for some classification datasets but can return the worst classification performance on another classification dataset. The RBF shows consistent high performance across the two data domains with accuracies of 96.04% and 99.77% and can be considered a general-purpose kernel guaranteed to yield satisfactory classification performance regardless of the dataset type or data domains. The performance of polynomial kernels over the two separate datasets supports the “No Free Launch Theorem”, which when applied to machine learning, means that if an algorithm performs well over a class of problem, it may have worse performance on other class of problem. This implies that there might not be one specific machine learning algorithm that gives the best possible performance for a set of problems, it is therefore important for researchers to try out various algorithms before concluding on the best possible result on any dataset.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125632612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing an Interoperable Crime Management System 开发一个可互操作的犯罪管理系统
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051383
B. A. Ajayi, J. Nweke, Muhammad Usman Ogah
Enhancing the interagency collaborative approach to crime management in developing nations cannot be overemphasized. This study presents a computerized system posed to enhance interagency collaboration in combating crime in Nigeria. Interagency Crime Management System (ICMS) is a web-based application that accepts input through an Application Program Interface (API) provided to the individual applications being used by different security agencies under the Federal Government of Nigeria. The system is based on a relational database with schemas very close to those of law enforcement agencies. The system was designed to accept data in the same input format from each of these agencies. These are the criminal code, name of criminal, nationality, state of origin, the local government of origin, age, nature of the crime committed, location of the crime, a section of the penal code violated, current status as at when reporting, officer-in-charge, and reporting agency. To achieve this, the study adopted the Structured System Analysis and Design Methodology (SSADM). The process starts with designing a framework for ICMS, then furthered by developing an algorithm for ICMS, and Laravel was employed for the implementation of the algorithm developed. The database management software employed for the application, PostgreSQL, stores every detail of the crime using a unique reference number for every record stored in the database to facilitate easy retrieval. This system also provides a search facility to query the database about information relating to the various categories of crime, criminals, and crimes that are common in particular geographical location and provide analytics tools such as charts for research and analysis purposes.
加强发展中国家犯罪管理的机构间合作办法再怎么强调也不为过。这项研究提出了一个计算机系统,旨在加强尼日利亚打击犯罪的机构间合作。机构间犯罪管理系统(ICMS)是一个基于网络的应用程序,它通过应用程序接口(API)接受输入,该接口提供给尼日利亚联邦政府下不同安全机构使用的个人应用程序。该系统基于关系数据库,其模式与执法机构的模式非常接近。该系统的设计目的是接受来自这些机构的相同输入格式的数据。这些是刑法典、罪犯的姓名、国籍、原籍国、原籍地、年龄、犯罪性质、犯罪地点、违反的刑法典部分、报告时的现状、负责人、报告机构。为此,研究采用结构化系统分析及设计方法(SSADM)。该过程从设计ICMS的框架开始,然后进一步开发ICMS的算法,并使用Laravel实现所开发的算法。该应用程序使用的数据库管理软件PostgreSQL对数据库中存储的每条记录使用唯一的参考号来存储犯罪的每个细节,以便于检索。该系统亦提供查询功能,以查询与不同类别的罪行、罪犯和在特定地理位置常见的罪行有关的资料,并提供分析工具,例如图表,以供研究和分析之用。
{"title":"Developing an Interoperable Crime Management System","authors":"B. A. Ajayi, J. Nweke, Muhammad Usman Ogah","doi":"10.1109/ITED56637.2022.10051383","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051383","url":null,"abstract":"Enhancing the interagency collaborative approach to crime management in developing nations cannot be overemphasized. This study presents a computerized system posed to enhance interagency collaboration in combating crime in Nigeria. Interagency Crime Management System (ICMS) is a web-based application that accepts input through an Application Program Interface (API) provided to the individual applications being used by different security agencies under the Federal Government of Nigeria. The system is based on a relational database with schemas very close to those of law enforcement agencies. The system was designed to accept data in the same input format from each of these agencies. These are the criminal code, name of criminal, nationality, state of origin, the local government of origin, age, nature of the crime committed, location of the crime, a section of the penal code violated, current status as at when reporting, officer-in-charge, and reporting agency. To achieve this, the study adopted the Structured System Analysis and Design Methodology (SSADM). The process starts with designing a framework for ICMS, then furthered by developing an algorithm for ICMS, and Laravel was employed for the implementation of the algorithm developed. The database management software employed for the application, PostgreSQL, stores every detail of the crime using a unique reference number for every record stored in the database to facilitate easy retrieval. This system also provides a search facility to query the database about information relating to the various categories of crime, criminals, and crimes that are common in particular geographical location and provide analytics tools such as charts for research and analysis purposes.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"39 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121003813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the Effectiveness and Efficiency of LightGBM Algorithm for Windows Malware Detection 探索LightGBM算法在Windows恶意软件检测中的有效性和效率
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051488
M. Onoja, Abayomi Jegede, Jesse Mazadu, G. Aimufua, Ayodele Oyedele, Kolawole Olibodum
Malware has posed a serious problem in today's world of cyber security. Effective malware detection approaches minimize damages caused by malware attack, while efficient detection strategies reduce the amount of resources required to detect malware. A previous application of LightGBM model to malware detection shows that the technique is suitable for Windows malware detection. However, the study did not compute the training time, detection time and classification accuracy of the model. There is need to evaluate the accuracy of LightGBM algorithm and determine the time required for training it. This is because quality training produces highly reliable model. It is also necessary to compute the classification accuracy and prediction time, to enhance better decision making. This paper applied the generic LightGBM algorithm on Windows malware to determine its efficiency and effectiveness in terms of training time, prediction time and classification accuracy. Performance evaluation based on the Malimg dataset shows a 99.80% training accuracy for binary class, while the accuracy for multi-class is 96.87%. The training time of the generic LightGBM is 179.51s for binary class and 2224.77s for multi-class. The classification accuracy showed a True Positive Rate (TPR) of 99% and False Positive Rate (FPR) of 0.99% for the binary classification, while the prediction time of the model are 0.08s and 0.40s for binary and multi class respectively. The results obtained for training time, detection time and classification accuracy show that LightGBM algorithm is suitable for detecting Windows malware.
恶意软件已经成为当今世界网络安全的一个严重问题。有效的恶意软件检测方法可以最大限度地减少恶意软件攻击造成的损失,而高效的检测策略可以减少检测恶意软件所需的资源。LightGBM模型在恶意软件检测中的应用表明,该技术适用于Windows恶意软件检测。但是,本研究没有计算模型的训练时间、检测时间和分类准确率。需要评估LightGBM算法的准确性,并确定训练所需的时间。这是因为高质量的训练产生了高度可靠的模型。还需要计算分类精度和预测时间,以提高更好的决策。本文将通用的LightGBM算法应用于Windows恶意软件,从训练时间、预测时间和分类准确率三个方面来确定其效率和有效性。基于Malimg数据集的性能评估表明,二分类训练准确率为99.80%,多分类训练准确率为96.87%。通用LightGBM的二元类训练时间为179.51s,多类训练时间为2224.77s。分类准确率显示,二分类的真阳性率(TPR)为99%,假阳性率(FPR)为0.99%,二分类和多分类的预测时间分别为0.08s和0.40s。在训练时间、检测时间和分类精度方面的结果表明,LightGBM算法适用于检测Windows恶意软件。
{"title":"Exploring the Effectiveness and Efficiency of LightGBM Algorithm for Windows Malware Detection","authors":"M. Onoja, Abayomi Jegede, Jesse Mazadu, G. Aimufua, Ayodele Oyedele, Kolawole Olibodum","doi":"10.1109/ITED56637.2022.10051488","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051488","url":null,"abstract":"Malware has posed a serious problem in today's world of cyber security. Effective malware detection approaches minimize damages caused by malware attack, while efficient detection strategies reduce the amount of resources required to detect malware. A previous application of LightGBM model to malware detection shows that the technique is suitable for Windows malware detection. However, the study did not compute the training time, detection time and classification accuracy of the model. There is need to evaluate the accuracy of LightGBM algorithm and determine the time required for training it. This is because quality training produces highly reliable model. It is also necessary to compute the classification accuracy and prediction time, to enhance better decision making. This paper applied the generic LightGBM algorithm on Windows malware to determine its efficiency and effectiveness in terms of training time, prediction time and classification accuracy. Performance evaluation based on the Malimg dataset shows a 99.80% training accuracy for binary class, while the accuracy for multi-class is 96.87%. The training time of the generic LightGBM is 179.51s for binary class and 2224.77s for multi-class. The classification accuracy showed a True Positive Rate (TPR) of 99% and False Positive Rate (FPR) of 0.99% for the binary classification, while the prediction time of the model are 0.08s and 0.40s for binary and multi class respectively. The results obtained for training time, detection time and classification accuracy show that LightGBM algorithm is suitable for detecting Windows malware.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126928006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prognosticate Trending Days of Youtube Videos Tags Using K-Nearest Neighbor Algorithm 使用k -最近邻算法预测Youtube视频标签的趋势日
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051460
S. O. Olukumoro, Cecilia Ajowho Adenusi, Emmanuel Ofoegbunam, Oguns Yetunde Josephine, Opakunle Victor Abayomi
YouTube is a video-sharing website where users may publish, watch, share, and comment on videos and other media. The proliferation of technological gadgets, combined with rapid advancements in technology, has resulted in an increase in trending videos on the platform, where videos and content receive hundreds of thousands, if not millions, of views within minutes of being uploaded and continue to trend throughout the day. This study uses the US YouTube Trending dataset, which includes 130591 occurrences and was acquired from the kaggle repository between August 11, 2020 to May 14, 2022. This study used qualitative and quantitative methods to analyze the YouTube videos dataset, and then performed a predictive analysis on the trending video tags, predicting how a particular video on YouTube might trend in the next two to eight days by predicting the trending of such videos for the next two to eight days and showing their accuracy results using the K-nearest neighbor algorithm (KNN). The model that was utilized to perform the prediction analysis has an accuracy of around 98 percent.
YouTube是一个视频分享网站,用户可以在这里发布、观看、分享和评论视频和其他媒体。科技产品的激增,加上技术的快速进步,导致了平台上热门视频的增加,视频和内容在上传后的几分钟内就能获得数十万甚至数百万的观看量,并且全天都在继续。本研究使用了美国YouTube趋势数据集,该数据集包括130591次出现,并从kaggle存储库中获得,时间为2020年8月11日至2022年5月14日。本研究采用定性和定量方法分析YouTube视频数据集,然后对趋势视频标签进行预测分析,通过预测未来两到八天YouTube上特定视频的趋势,并使用k -最近邻算法(KNN)显示其准确性结果,预测未来两到八天YouTube上特定视频的趋势。用于进行预测分析的模型的准确率约为98%。
{"title":"Prognosticate Trending Days of Youtube Videos Tags Using K-Nearest Neighbor Algorithm","authors":"S. O. Olukumoro, Cecilia Ajowho Adenusi, Emmanuel Ofoegbunam, Oguns Yetunde Josephine, Opakunle Victor Abayomi","doi":"10.1109/ITED56637.2022.10051460","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051460","url":null,"abstract":"YouTube is a video-sharing website where users may publish, watch, share, and comment on videos and other media. The proliferation of technological gadgets, combined with rapid advancements in technology, has resulted in an increase in trending videos on the platform, where videos and content receive hundreds of thousands, if not millions, of views within minutes of being uploaded and continue to trend throughout the day. This study uses the US YouTube Trending dataset, which includes 130591 occurrences and was acquired from the kaggle repository between August 11, 2020 to May 14, 2022. This study used qualitative and quantitative methods to analyze the YouTube videos dataset, and then performed a predictive analysis on the trending video tags, predicting how a particular video on YouTube might trend in the next two to eight days by predicting the trending of such videos for the next two to eight days and showing their accuracy results using the K-nearest neighbor algorithm (KNN). The model that was utilized to perform the prediction analysis has an accuracy of around 98 percent.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124251220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Key Schedule of Lightweight Block Cipher 轻量级分组密码的密钥调度
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051257
Sani Galadima Garba, A. Obiniyi, Musa Adeku Ibrahim, B. I. Ahmad
The key schedule, an essential part of the cipher(cryptography), is often neglected during the cipher algorithm design. However, a compromised key schedule leads to the entire cipher's successful attack. In this article, we reviewed the elements to consider when creating an excellent key schedule, proposed a methodology to achieve it, designed a key schedule with the proposed method, implemented the design, and analyzed the result to confirm that it meets the specifications. Our proposed key schedule is specially designed for devices with limited memory size, processing ability, and storage. So, this article's suggested method and design were done to achieve a secure key schedule using minimal resources, especially in hardware implementation.
密钥调度是密码(密码学)的重要组成部分,但在密码算法设计中往往被忽略。然而,泄露的密钥调度会导致整个密码的成功攻击。在本文中,我们回顾了在创建一个优秀的密钥进度表时要考虑的因素,提出了实现它的方法,用所提出的方法设计了一个密钥进度表,实现了设计,并分析了结果以确认它符合规范。我们提出的密钥调度是专门为内存大小、处理能力和存储有限的设备设计的。因此,本文建议的方法和设计是为了使用最少的资源(特别是在硬件实现中)实现安全的密钥调度。
{"title":"On the Key Schedule of Lightweight Block Cipher","authors":"Sani Galadima Garba, A. Obiniyi, Musa Adeku Ibrahim, B. I. Ahmad","doi":"10.1109/ITED56637.2022.10051257","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051257","url":null,"abstract":"The key schedule, an essential part of the cipher(cryptography), is often neglected during the cipher algorithm design. However, a compromised key schedule leads to the entire cipher's successful attack. In this article, we reviewed the elements to consider when creating an excellent key schedule, proposed a methodology to achieve it, designed a key schedule with the proposed method, implemented the design, and analyzed the result to confirm that it meets the specifications. Our proposed key schedule is specially designed for devices with limited memory size, processing ability, and storage. So, this article's suggested method and design were done to achieve a secure key schedule using minimal resources, especially in hardware implementation.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122816562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th Information Technology for Education and Development (ITED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1