首页 > 最新文献

2022 5th Information Technology for Education and Development (ITED)最新文献

英文 中文
An Improved Password-authentication Model for Access Control in Connected Systems 一种用于互联系统访问控制的改进密码认证模型
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051179
C. Nwankwo, Wifred Adigwe, Wilson Nwankwo, Anazia E. Kizito, S. Konyeha, Francis Uwadia
Data breaches and information theft are among the major challenges confronting the legitimate information system user in the 21st century. In recent times, following the deepening of the digital space, mobile computing devices have become convenient resources to drive most day-to-day socioeconomic efforts. These devices are valuable as they host sensitive data, which if compromised may result to economic chaos. Consequently, strengthening access control measures becomes crucial. This study focuses on the strengths of the traditional password authentication mechanisms used on information systems. It identified the weaknesses and proposes a two-part improved password authentication model. The object-oriented methodology is adopted to analyse the components of the proposed password authentication cycle including the flow of activities, and the security relationships. Following a detailed analysis, we specify a simple algorithm to guide the implementation of the model.
数据泄露和信息盗窃是21世纪合法信息系统用户面临的主要挑战之一。近年来,随着数字空间的不断深化,移动计算设备已成为推动大多数日常社会经济努力的便利资源。这些设备很有价值,因为它们承载着敏感数据,如果这些数据被泄露,可能会导致经济混乱。因此,加强访问控制措施变得至关重要。本研究的重点是信息系统中使用的传统密码认证机制的优势。在此基础上,提出了两部分改进的密码认证模型。采用面向对象的方法分析了所提出的密码认证周期的组成部分,包括活动流程和安全关系。在详细分析之后,我们指定了一个简单的算法来指导模型的实现。
{"title":"An Improved Password-authentication Model for Access Control in Connected Systems","authors":"C. Nwankwo, Wifred Adigwe, Wilson Nwankwo, Anazia E. Kizito, S. Konyeha, Francis Uwadia","doi":"10.1109/ITED56637.2022.10051179","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051179","url":null,"abstract":"Data breaches and information theft are among the major challenges confronting the legitimate information system user in the 21st century. In recent times, following the deepening of the digital space, mobile computing devices have become convenient resources to drive most day-to-day socioeconomic efforts. These devices are valuable as they host sensitive data, which if compromised may result to economic chaos. Consequently, strengthening access control measures becomes crucial. This study focuses on the strengths of the traditional password authentication mechanisms used on information systems. It identified the weaknesses and proposes a two-part improved password authentication model. The object-oriented methodology is adopted to analyse the components of the proposed password authentication cycle including the flow of activities, and the security relationships. Following a detailed analysis, we specify a simple algorithm to guide the implementation of the model.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"10 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an Autonomous Vehicle for Smart Irrigation 智能灌溉自动驾驶车辆的研制
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051388
T. Oluwabunmi, O. Adenugba, I. A. Ayoade, J. Azeta, C. Bolu
Creating a reliable means of supplying water for irrigation in regions with little or no rainfall across a year is a form of precision agriculture. The compounding problem, however, is the inability to efficiently and conservatively manage the external water source to irrigate the soil. Most times, the amount of water supplied exceeds what crop roots need. To this end, An Autonomous Vehicle for Smart Irrigation System was developed to provide water, herbicide, pesticide, and water to agricultural cultivation to meet the demand for root crops crop roots. This project captures the design, simulation, development, and performance evaluation of the application of Autonomous Vehicles for Smart Irrigation using an Intelligent reprogrammable controller. The soil moisture sensors measure and transmit in real-time, the value of specific soil nutritional requirements to a receiver the autonomous vehicle dispense based on the requirement of soil nutrients to a specific location. With the use of transceivers, these moisture levels are then transmitted to an autonomous vehicle which is set in action when the moisture values are lower than what is required for the growth of the crops. The stress analysis of the Autonomous Vehicle was also carried out to optimize the working operation of the Autonomous Vehicle.
在全年降雨量很少或没有降雨的地区,创造一种可靠的灌溉供水方式是精准农业的一种形式。然而,更复杂的问题是无法有效和保守地管理外部水源来灌溉土壤。大多数时候,供给的水量超过了作物根系的需要量。为此,开发了智能灌溉系统自动驾驶车辆,为农业种植提供水、除草剂、农药和水,以满足根茎作物的需求。该项目采用智能可编程控制器,实现了智能灌溉自动驾驶车辆的设计、仿真、开发和性能评估。土壤湿度传感器实时测量特定土壤营养需求的值,并将其传输到自动驾驶汽车根据特定位置的土壤养分需求分配的接收器上。通过使用收发器,这些水分水平随后被传输到自动驾驶车辆,当水分值低于作物生长所需的水分值时,自动驾驶车辆就会启动。对自动驾驶汽车进行了应力分析,优化了自动驾驶汽车的工作运行。
{"title":"Development of an Autonomous Vehicle for Smart Irrigation","authors":"T. Oluwabunmi, O. Adenugba, I. A. Ayoade, J. Azeta, C. Bolu","doi":"10.1109/ITED56637.2022.10051388","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051388","url":null,"abstract":"Creating a reliable means of supplying water for irrigation in regions with little or no rainfall across a year is a form of precision agriculture. The compounding problem, however, is the inability to efficiently and conservatively manage the external water source to irrigate the soil. Most times, the amount of water supplied exceeds what crop roots need. To this end, An Autonomous Vehicle for Smart Irrigation System was developed to provide water, herbicide, pesticide, and water to agricultural cultivation to meet the demand for root crops crop roots. This project captures the design, simulation, development, and performance evaluation of the application of Autonomous Vehicles for Smart Irrigation using an Intelligent reprogrammable controller. The soil moisture sensors measure and transmit in real-time, the value of specific soil nutritional requirements to a receiver the autonomous vehicle dispense based on the requirement of soil nutrients to a specific location. With the use of transceivers, these moisture levels are then transmitted to an autonomous vehicle which is set in action when the moisture values are lower than what is required for the growth of the crops. The stress analysis of the Autonomous Vehicle was also carried out to optimize the working operation of the Autonomous Vehicle.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134534987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biocryptosystems for Template Protection: A Survey of Fuzzy Vault 模板保护的生物加密系统:模糊保险库综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051185
M. B. Akanbi, R. Jimoh, J. B. Awotunde
Biometric recognition systems provide security to systems by preventing unauthorized access. In recent times, research proved that unprotected biometric systems can be invaded by hackers. A spoofed biometric security can be a great risk as a compromised biometric template can be lost forever. It can also be used to gain unauthorized access into systems. There is the need to protect biometric template from hackers and possible misuse. This study presents various template protection schemes in literature. In addition, this paper reviewed fuzzy vault biocryptosystem template protection scheme by comparing some fuzzy vault schemes in literature based on their False acceptance rates (FAR) and Genuine acceptance rates (GAR) with different degrees of polynomial. The study also reported past studies with the lowest and the highest FAR as 0.00% and 0.87% respectively while the lowest and the highest GAR stand at 72% and 99% respectively.
生物识别系统通过防止未经授权的访问为系统提供安全性。最近,研究证明,不受保护的生物识别系统可能被黑客入侵。被欺骗的生物识别安全性可能是一个巨大的风险,因为受损的生物识别模板可能永远丢失。它还可以用来获得对系统的未经授权的访问。有必要保护生物识别模板免受黑客攻击和可能的滥用。本研究介绍了文献中各种模板保护方案。此外,本文还对模糊保险库生物密码系统模板保护方案进行了综述,比较了文献中几种不同多项式度的模糊保险库方案的假接受率(FAR)和真接受率(GAR)。本研究还报道了以往的研究,FAR最低和最高分别为0.00%和0.87%,GAR最低和最高分别为72%和99%。
{"title":"Biocryptosystems for Template Protection: A Survey of Fuzzy Vault","authors":"M. B. Akanbi, R. Jimoh, J. B. Awotunde","doi":"10.1109/ITED56637.2022.10051185","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051185","url":null,"abstract":"Biometric recognition systems provide security to systems by preventing unauthorized access. In recent times, research proved that unprotected biometric systems can be invaded by hackers. A spoofed biometric security can be a great risk as a compromised biometric template can be lost forever. It can also be used to gain unauthorized access into systems. There is the need to protect biometric template from hackers and possible misuse. This study presents various template protection schemes in literature. In addition, this paper reviewed fuzzy vault biocryptosystem template protection scheme by comparing some fuzzy vault schemes in literature based on their False acceptance rates (FAR) and Genuine acceptance rates (GAR) with different degrees of polynomial. The study also reported past studies with the lowest and the highest FAR as 0.00% and 0.87% respectively while the lowest and the highest GAR stand at 72% and 99% respectively.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134285747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved XM-18 Controller using Petroleum Liquid Gas-Based Automatic Heating Alternative for Egg Incubation in Developing Countries 在发展中国家使用石油液化气自动加热的改进型xm18控制器用于鸡蛋孵化
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051438
M. J. Musa, Y. Salihu, Moshood A. Yusuf, Z. Usman
Egg incubation is significant to modern agriculture; hence in this paper the design, implementation and integration of the Petroleum Liquid Gas (PLG) control into the existing XM-18 incubator controller will be presented. XM-18 controller is an automatic egg incubator controller, which has a reputable history of high % of hatchability and very low chick's mortality if operated on an uninterrupted AC power supply. However, the high rate of fluctuation of power supply in developing countries has resulted to the poor performance of the XM-18 controller. This hence makes it necessary to improve the XM-18 controller to suit the unique requirements of developing countries. The XM-18 circuit was improved using PIC12F683, ignition coil, spark plug, DC gas valve, and camp gas stove to accommodate the PLG and to automatically control the PLG as a heating source in the absence of the AC source. In so doing, the problem of power failure has been taking care by the standby PLG. With this improvement, the huge cost of running standby generator or setting of a power inverter plan is substituted with the low cost of the PLG control design. Furthermore, the huge labor associated with the use of kerosene source is now substituted with the autonomous control of the PLG. The improved LPG control incubator of 120 eggs capacity was compared with the Kerosene source incubator and incubator running on AC source and the hatchability of 65.3% and 72.22% respectively was obtained, while the hybrid of XM-18 & PLG gave a hatchability of 94.8%.
鸡蛋孵化对现代农业具有重要意义;因此,本文将介绍石油液化气(PLG)控制的设计、实现和集成到现有的XM-18培养箱控制器中。XM-18控制器是一种自动孵卵器控制器,如果在不间断的交流电源上运行,它具有高孵化率和极低小鸡死亡率的良好历史。然而,由于发展中国家的电力供应波动率高,导致XM-18控制器性能不佳。因此,有必要改进XM-18控制器,以适应发展中国家的独特要求。XM-18电路使用PIC12F683、点火线圈、火花塞、直流气阀和营地煤气炉进行改进,以容纳PLG,并在没有交流源的情况下自动控制PLG作为加热源。这样,电源故障的问题就由备用PLG来处理了。通过这种改进,运行备用发电机或设置电源逆变器方案的巨大成本被PLG控制设计的低成本所取代。此外,与使用煤油源相关的巨大劳动力现在被PLG的自主控制所取代。将120个卵量的LPG控制孵化箱与煤油源孵化箱和交流源孵化箱进行比较,孵化率分别为65.3%和72.22%,XM-18与PLG杂交孵化箱孵化率为94.8%。
{"title":"Improved XM-18 Controller using Petroleum Liquid Gas-Based Automatic Heating Alternative for Egg Incubation in Developing Countries","authors":"M. J. Musa, Y. Salihu, Moshood A. Yusuf, Z. Usman","doi":"10.1109/ITED56637.2022.10051438","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051438","url":null,"abstract":"Egg incubation is significant to modern agriculture; hence in this paper the design, implementation and integration of the Petroleum Liquid Gas (PLG) control into the existing XM-18 incubator controller will be presented. XM-18 controller is an automatic egg incubator controller, which has a reputable history of high % of hatchability and very low chick's mortality if operated on an uninterrupted AC power supply. However, the high rate of fluctuation of power supply in developing countries has resulted to the poor performance of the XM-18 controller. This hence makes it necessary to improve the XM-18 controller to suit the unique requirements of developing countries. The XM-18 circuit was improved using PIC12F683, ignition coil, spark plug, DC gas valve, and camp gas stove to accommodate the PLG and to automatically control the PLG as a heating source in the absence of the AC source. In so doing, the problem of power failure has been taking care by the standby PLG. With this improvement, the huge cost of running standby generator or setting of a power inverter plan is substituted with the low cost of the PLG control design. Furthermore, the huge labor associated with the use of kerosene source is now substituted with the autonomous control of the PLG. The improved LPG control incubator of 120 eggs capacity was compared with the Kerosene source incubator and incubator running on AC source and the hatchability of 65.3% and 72.22% respectively was obtained, while the hybrid of XM-18 & PLG gave a hatchability of 94.8%.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125722856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Heuristic Evaluation of the State of Groundwater Using Electromagnetic Method 电磁法对地下水状态的启发式评价
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051310
Olagoke Victoria Oluwadamilola, Adekitan Adetoun Abimbola, B. Hassan Tolulope, Vincent Olufunke Rebecca
The Electromagnetic (EM) geophysical method was used to assess the groundwater condition of the Oloruntedo community in Obantoko, Odeda Local Government of Ogun State, to delineate the most prolific aquifer unit within the study area. This study presents a heuristic evaluation of ground water yield. Six (6) EM transverses or profiles were established across the survey area. The survey was run close to existing boreholes and hand-dug wells to vividly imprint the fracture and the weathered zone using PQWT-TC150 geophysical water detector equipment. The hydrogeologic significance of the surveyed area delineates the groundwater architecture within the traverses. The results obtained from this study produced curve graphs and subsurface profile maps of each transverse location. It was observed from the result that EM profile 1, 3, and 6 has a high groundwater potential with varying aquifer depth, while EM profile 4 and 5 imprint a low groundwater potential zone.
利用电磁地球物理方法对奥贡州Odeda地方政府Obantoko的Oloruntedo社区的地下水状况进行了评估,以划定研究区内最丰富的含水层单元。本文提出了一种启发式的地下水产量评价方法。在整个测量区域建立了六(6)条电磁横向或剖面。利用PQWT-TC150型地球物理探水设备,在现有钻孔和手挖井附近进行调查,对裂缝和风化带进行了生动的刻印。调查区域的水文地质意义描绘了横断面内的地下水结构。研究结果生成了每个横向位置的曲线图和地下剖面图。结果表明,随着含水层深度的变化,EM剖面1、3、6具有较高的地下水势区,而EM剖面4、5具有较低的地下水势区。
{"title":"A Heuristic Evaluation of the State of Groundwater Using Electromagnetic Method","authors":"Olagoke Victoria Oluwadamilola, Adekitan Adetoun Abimbola, B. Hassan Tolulope, Vincent Olufunke Rebecca","doi":"10.1109/ITED56637.2022.10051310","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051310","url":null,"abstract":"The Electromagnetic (EM) geophysical method was used to assess the groundwater condition of the Oloruntedo community in Obantoko, Odeda Local Government of Ogun State, to delineate the most prolific aquifer unit within the study area. This study presents a heuristic evaluation of ground water yield. Six (6) EM transverses or profiles were established across the survey area. The survey was run close to existing boreholes and hand-dug wells to vividly imprint the fracture and the weathered zone using PQWT-TC150 geophysical water detector equipment. The hydrogeologic significance of the surveyed area delineates the groundwater architecture within the traverses. The results obtained from this study produced curve graphs and subsurface profile maps of each transverse location. It was observed from the result that EM profile 1, 3, and 6 has a high groundwater potential with varying aquifer depth, while EM profile 4 and 5 imprint a low groundwater potential zone.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128977325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Chest X-Ray Classification Model for Covid-19 Patients Using HOG and LBP 基于HOG和LBP的新型冠状病毒肺炎胸片分级模型
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051501
H. O. Salau, O.A. Abisoye, I. O. Oyefolahan, Solomon Adelowo Adepoju
Several alarming health challenges are urging medical experts and practitioners to research and develop new approaches to diagnose, detect and control the early spread of deadly diseases. One of the most challenging is Coronavirus Infection (Covid-19). Models have been proposed to detect and diagnose early infection of the virus to attain proper precautions against the Covid-19 virus. However, some researchers adopt parameter optimization to attain better accuracy on the Chest X-ray images of covid-19 and other related diseases. Hence, this research work adopts a hybridized cascaded feature extraction technique (Local Binary Pattern LBP and Histogram of Oriented Gradients HOG) and Convolutional Neural Network (CNN) for the deep learning classification model. The merging of LBP and HOG feature extraction significantly improved the performance level of the deep-learning CNN classifier. As a result, 95% accuracy, 92% precision, and 93% recall are attained by the proposed model.
一些令人震惊的卫生挑战促使医学专家和从业人员研究和开发诊断、检测和控制致命疾病早期传播的新方法。其中最具挑战性的是冠状病毒感染(Covid-19)。已经提出了检测和诊断病毒早期感染的模型,以获得针对Covid-19病毒的适当预防措施。然而,一些研究人员通过参数优化来提高covid-19及其他相关疾病胸部x线图像的准确性。因此,本研究采用混合级联特征提取技术(局部二值模式LBP和定向梯度直方图HOG)和卷积神经网络(CNN)进行深度学习分类模型。LBP和HOG特征提取的融合显著提高了深度学习CNN分类器的性能水平。结果表明,该模型的准确率为95%,精密度为92%,召回率为93%。
{"title":"Enhanced Chest X-Ray Classification Model for Covid-19 Patients Using HOG and LBP","authors":"H. O. Salau, O.A. Abisoye, I. O. Oyefolahan, Solomon Adelowo Adepoju","doi":"10.1109/ITED56637.2022.10051501","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051501","url":null,"abstract":"Several alarming health challenges are urging medical experts and practitioners to research and develop new approaches to diagnose, detect and control the early spread of deadly diseases. One of the most challenging is Coronavirus Infection (Covid-19). Models have been proposed to detect and diagnose early infection of the virus to attain proper precautions against the Covid-19 virus. However, some researchers adopt parameter optimization to attain better accuracy on the Chest X-ray images of covid-19 and other related diseases. Hence, this research work adopts a hybridized cascaded feature extraction technique (Local Binary Pattern LBP and Histogram of Oriented Gradients HOG) and Convolutional Neural Network (CNN) for the deep learning classification model. The merging of LBP and HOG feature extraction significantly improved the performance level of the deep-learning CNN classifier. As a result, 95% accuracy, 92% precision, and 93% recall are attained by the proposed model.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"11 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120861291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cascade of Deep Neural Network And Support Vector Machine for Credit Risk Prediction 信用风险预测的深度神经网络级联与支持向量机
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051312
O. Awodele, Sheriff Alimi, O. Ogunyolu, O. Solanke, Seyi Iyawe, Foladoyin Adegbie
One of the core financial services that banks render to their customers is granting of loans with interest over a period. To minimize the risk of loan default which eventually may lead to bad debt; the banks use statistical models to determine the customer loan eligibility. There is a transition from the statistical models for predicting eligibility for bank loans to the use of machine learning models and several pieces of research have been carried out in this direction, but the accuracy is still a challenge. In our research work, we adopted a cascade of a pre-trained Deep Neural Network (DNN) and a Support Vector Machine (SVM) to realize a loan eligibility model. An 11-layer DNN with a sigmoid output layer was trained with a loan credit dataset obtained from Kaggle and the output layer was removed which then makes SoftMax with 64 outputs a new output layer. The DNN is then used to transform the original 11-feature dataset into a 64-feature high dimension dataset. An SVM with a polynomial kernel was trained on the original dataset and achieved an accuracy of 87% but the same SVM achieved an accuracy of 97.05% when trained with the transformed high dimension dataset obtained from the pre-trained DNN. In our study, our proposed prediction model has the best performance with regards to related reviewed works having accuracy of 97%. Our proposed prediction model has the best performance with regards to related reviewed works and it can be concluded that our machine learning mix-strategy is effective and can be adapted for a similar task.
银行向客户提供的核心金融服务之一是在一段时间内发放有利息的贷款。将贷款违约的风险降至最低,以免最终导致坏账;银行使用统计模型来确定客户的贷款资格。从预测银行贷款资格的统计模型到机器学习模型的使用已经过渡,并且在这个方向上已经进行了几项研究,但准确性仍然是一个挑战。在我们的研究工作中,我们采用了预训练的深度神经网络(DNN)和支持向量机(SVM)的级联来实现贷款资格模型。使用从Kaggle获得的贷款信用数据集训练具有sigmoid输出层的11层DNN,并删除输出层,然后使具有64个输出的SoftMax成为新的输出层。然后使用深度神经网络将原始的11个特征数据集转换为64个特征的高维数据集。在原始数据集上训练具有多项式核的支持向量机,准确率为87%,而在从预训练的DNN中得到的转换后的高维数据集上训练时,SVM的准确率为97.05%。在我们的研究中,我们提出的预测模型对于相关的审阅作品具有最佳的性能,准确率为97%。我们提出的预测模型在相关的审查工作中表现最好,可以得出结论,我们的机器学习混合策略是有效的,可以适用于类似的任务。
{"title":"Cascade of Deep Neural Network And Support Vector Machine for Credit Risk Prediction","authors":"O. Awodele, Sheriff Alimi, O. Ogunyolu, O. Solanke, Seyi Iyawe, Foladoyin Adegbie","doi":"10.1109/ITED56637.2022.10051312","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051312","url":null,"abstract":"One of the core financial services that banks render to their customers is granting of loans with interest over a period. To minimize the risk of loan default which eventually may lead to bad debt; the banks use statistical models to determine the customer loan eligibility. There is a transition from the statistical models for predicting eligibility for bank loans to the use of machine learning models and several pieces of research have been carried out in this direction, but the accuracy is still a challenge. In our research work, we adopted a cascade of a pre-trained Deep Neural Network (DNN) and a Support Vector Machine (SVM) to realize a loan eligibility model. An 11-layer DNN with a sigmoid output layer was trained with a loan credit dataset obtained from Kaggle and the output layer was removed which then makes SoftMax with 64 outputs a new output layer. The DNN is then used to transform the original 11-feature dataset into a 64-feature high dimension dataset. An SVM with a polynomial kernel was trained on the original dataset and achieved an accuracy of 87% but the same SVM achieved an accuracy of 97.05% when trained with the transformed high dimension dataset obtained from the pre-trained DNN. In our study, our proposed prediction model has the best performance with regards to related reviewed works having accuracy of 97%. Our proposed prediction model has the best performance with regards to related reviewed works and it can be concluded that our machine learning mix-strategy is effective and can be adapted for a similar task.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"11 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Optical Double Phase Image Encryption Using Random Gaussian Noise 基于随机高斯噪声的增强光学双相位图像加密
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051261
K. Okokpujie, Damola Gideon Akinola, Innocent Nwokolo, Olisaemeka Isife, Oghorchukwuyem Obiazi, Oghenetega Owivri
The advent of digitalization makes image security inevitable as a result of that, an asymmetric cryptography algorithm which is based on the improvement of double random phase encoding is proposed. This algorithm makes use of Gaussian random noise to boost the security of the existing method and was implemented on the MATLAB 2020a software application. The results obtained from the simulations show a slight decrease in the peak-to-signal ratio of 0.3304 and an increase in the mean square error when comparing the existing method with the enhanced method. An image encrypted using Enhanced Double Random Phase Encoding (EDRPE) has strong protection against intruders due to the introduction of the random Gaussian noise as one of the components of the masks in the encryption process. However, a slight noisy effect is produced on the recovered image which is not obvious to the receiver. The simulation result validates the algorithm's potential against security attacks but does not eliminate the presence of noise.
数字化时代的到来使得图像安全成为必然,为此,提出了一种基于双随机相位编码改进的非对称加密算法。该算法利用高斯随机噪声来提高现有方法的安全性,并在MATLAB 2020a软件上实现。仿真结果表明,与改进后的方法相比,现有方法的峰信比(0.3304)略有降低,均方误差(均方误差)有所增加。采用增强型双随机相位编码(EDRPE)加密的图像,由于在加密过程中引入了随机高斯噪声作为掩模的组成部分之一,因此具有很强的防入侵能力。但是,恢复后的图像会产生轻微的噪声影响,对接收机来说不明显。仿真结果验证了该算法抗安全攻击的潜力,但不能消除噪声的存在。
{"title":"Enhanced Optical Double Phase Image Encryption Using Random Gaussian Noise","authors":"K. Okokpujie, Damola Gideon Akinola, Innocent Nwokolo, Olisaemeka Isife, Oghorchukwuyem Obiazi, Oghenetega Owivri","doi":"10.1109/ITED56637.2022.10051261","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051261","url":null,"abstract":"The advent of digitalization makes image security inevitable as a result of that, an asymmetric cryptography algorithm which is based on the improvement of double random phase encoding is proposed. This algorithm makes use of Gaussian random noise to boost the security of the existing method and was implemented on the MATLAB 2020a software application. The results obtained from the simulations show a slight decrease in the peak-to-signal ratio of 0.3304 and an increase in the mean square error when comparing the existing method with the enhanced method. An image encrypted using Enhanced Double Random Phase Encoding (EDRPE) has strong protection against intruders due to the introduction of the random Gaussian noise as one of the components of the masks in the encryption process. However, a slight noisy effect is produced on the recovered image which is not obvious to the receiver. The simulation result validates the algorithm's potential against security attacks but does not eliminate the presence of noise.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"67 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124101927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of an IoT Based Home Energy Monitoring System 基于物联网的家庭能源监测系统的设计与实现
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051192
Abdul-Waliyi O. Muhammed, V. Oisamoje, H. E. Amhenrior, E. M. J. Evbogbai, V. K. Abanihi, Lawal O. Bello, C. Obasi
This paper presents “The Design and Implementation of an IoT Based Monitoring System for Home Energy consumption”. The system monitors appliances by providing real-time, energy usage, and other data and has the capability of wireless disconnection and connection of loads. The methodology consists of PZEM-004T meter module for consumption pulse measurement, which the ESP8266EX Microcontroller records. This microcontroller requests updates every second and manages unit consumption and other meter activities. This information is transmitted to the ThingSpeak cloud platform and later visualised with High-chart. The software aspect of this work is in two-fold namely the programming of the microcontroller in C++ to achieve the monitoring functionality of the system and the development of communication command using C++ and HTML. The result of the test carried out shows a range of 1 to 5seconds taken by the system in switching appliances depending on the network mode. The results show that the system is good for monitoring energy consumption in a home especially in dual mode - wireless and offline, as such, it allows users to use energy judiciously by providing real-time consumption data. The prototype of the IoT-based home energy monitoring system worked satisfactorily and it is dependable and efficient for use in homes.
本文介绍了“基于物联网的家庭能耗监测系统的设计与实现”。该系统通过提供实时、能源使用和其他数据来监控设备,并具有无线断开和连接负载的能力。该方法包括用于消耗脉冲测量的pzm - 004t仪表模块,该模块由ESP8266EX微控制器记录。该微控制器每秒请求更新并管理单位消耗和其他仪表活动。这些信息被传送到ThingSpeak云平台,然后用High-chart可视化。本工作的软件部分分为两个部分:用c++语言对单片机进行编程,实现系统的监控功能;用c++语言和HTML语言编写通信命令。所进行的测试结果显示,根据网络模式,系统在开关设备中所花费的时间范围为1至5秒。结果表明,该系统很好地监测了家庭的能源消耗,特别是在无线和离线双模式下,因此,它允许用户通过提供实时消耗数据来明智地使用能源。基于物联网的家庭能源监测系统样机工作良好,在家庭中使用可靠、高效。
{"title":"Design and Implementation of an IoT Based Home Energy Monitoring System","authors":"Abdul-Waliyi O. Muhammed, V. Oisamoje, H. E. Amhenrior, E. M. J. Evbogbai, V. K. Abanihi, Lawal O. Bello, C. Obasi","doi":"10.1109/ITED56637.2022.10051192","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051192","url":null,"abstract":"This paper presents “The Design and Implementation of an IoT Based Monitoring System for Home Energy consumption”. The system monitors appliances by providing real-time, energy usage, and other data and has the capability of wireless disconnection and connection of loads. The methodology consists of PZEM-004T meter module for consumption pulse measurement, which the ESP8266EX Microcontroller records. This microcontroller requests updates every second and manages unit consumption and other meter activities. This information is transmitted to the ThingSpeak cloud platform and later visualised with High-chart. The software aspect of this work is in two-fold namely the programming of the microcontroller in C++ to achieve the monitoring functionality of the system and the development of communication command using C++ and HTML. The result of the test carried out shows a range of 1 to 5seconds taken by the system in switching appliances depending on the network mode. The results show that the system is good for monitoring energy consumption in a home especially in dual mode - wireless and offline, as such, it allows users to use energy judiciously by providing real-time consumption data. The prototype of the IoT-based home energy monitoring system worked satisfactorily and it is dependable and efficient for use in homes.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Evaluation of Ensemble Learning-Based Models for Twitter Spam Classification 基于集成学习的Twitter垃圾邮件分类模型实验评价
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051587
R. Jimoh, A. Oyelakin, I. S. Olatinwo, K. Y. Obiwusi, S. Muhammad-Thani, T. S. Ogundele, A. Giwa-Raheem, O. F. Ayepeku
People with malicious intent keep launching attacks in the internet through various means. These attackers are shifting their attacks to social sites such as twitter, facebook Instagram and the likes. One of attack methods is the use of spam in the social media platforms. Social network spam involves using unwanted content that appear on social networking sites such as facebook, twitter, instagram and related ones. Since attackers have shifted attention to using social media platforms for carrying out their nefarious activities there is a need to keep devising security measures to characterise social media based spam attacks. Thisstudy involves experimental evaluation of two ensemble learning models for twitter spam classification. The dataset employed in this study is a publicly available dataset on twitter spam studies. The dataset files are in four different groups, contain different twitter spam evidence. In each of the experimentation, each file in the whole dataset was used. Exploratory analysis of the datasets was carried out, one at a time. Thereafter, label encoding technique was used to handle the categorical feature. Then, two tree-based ensemble learning algorithms namely: Random Forest and Extra Trees algorithms were chosen to build the twitter spam detection models. Each of the set of dataset files was used for the training and testing of machine learning-based twitter spam detection models. The performances of the models built were evaluated and compared. The study revealed that the performances of the twitter spam detection models were promising. In all, the RF-based model recorded better performances in accuracy, precision, recall and f1-score compared to the results in the Extra Trees-based model.
恶意分子不断通过各种手段在互联网上发动攻击。这些攻击者正将攻击目标转向twitter、facebook、Instagram等社交网站。其中一种攻击方法是在社交媒体平台上使用垃圾邮件。社交网络垃圾邮件是指在facebook、twitter、instagram等社交网站上使用不需要的内容。由于攻击者已经将注意力转移到使用社交媒体平台来执行他们的邪恶活动,因此有必要不断设计安全措施来描述基于社交媒体的垃圾邮件攻击。本研究涉及两种集成学习模型在twitter垃圾邮件分类中的实验评估。本研究使用的数据集是twitter垃圾邮件研究的公开数据集。数据集文件分为四个不同的组,包含不同的twitter垃圾邮件证据。在每个实验中,使用了整个数据集中的每个文件。对数据集进行探索性分析,一次一个。然后,采用标签编码技术对分类特征进行处理。然后,选择随机森林(Random Forest)和额外树(Extra Trees)两种基于树的集成学习算法构建twitter垃圾邮件检测模型。每个数据集文件都用于基于机器学习的twitter垃圾邮件检测模型的训练和测试。对所建模型的性能进行了评价和比较。研究表明,twitter垃圾邮件检测模型的性能是有希望的。总的来说,与Extra trees模型相比,基于rf的模型在准确性、精密度、召回率和f1-score方面都有更好的表现。
{"title":"Experimental Evaluation of Ensemble Learning-Based Models for Twitter Spam Classification","authors":"R. Jimoh, A. Oyelakin, I. S. Olatinwo, K. Y. Obiwusi, S. Muhammad-Thani, T. S. Ogundele, A. Giwa-Raheem, O. F. Ayepeku","doi":"10.1109/ITED56637.2022.10051587","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051587","url":null,"abstract":"People with malicious intent keep launching attacks in the internet through various means. These attackers are shifting their attacks to social sites such as twitter, facebook Instagram and the likes. One of attack methods is the use of spam in the social media platforms. Social network spam involves using unwanted content that appear on social networking sites such as facebook, twitter, instagram and related ones. Since attackers have shifted attention to using social media platforms for carrying out their nefarious activities there is a need to keep devising security measures to characterise social media based spam attacks. Thisstudy involves experimental evaluation of two ensemble learning models for twitter spam classification. The dataset employed in this study is a publicly available dataset on twitter spam studies. The dataset files are in four different groups, contain different twitter spam evidence. In each of the experimentation, each file in the whole dataset was used. Exploratory analysis of the datasets was carried out, one at a time. Thereafter, label encoding technique was used to handle the categorical feature. Then, two tree-based ensemble learning algorithms namely: Random Forest and Extra Trees algorithms were chosen to build the twitter spam detection models. Each of the set of dataset files was used for the training and testing of machine learning-based twitter spam detection models. The performances of the models built were evaluated and compared. The study revealed that the performances of the twitter spam detection models were promising. In all, the RF-based model recorded better performances in accuracy, precision, recall and f1-score compared to the results in the Extra Trees-based model.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123455557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 5th Information Technology for Education and Development (ITED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1