首页 > 最新文献

2022 5th Information Technology for Education and Development (ITED)最新文献

英文 中文
Framework for Hausa Speech Recognition 豪萨语语音识别框架
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051610
U. Ibrahim, Moussa Boukar Mahatma, Muhammed Aliyu Suleiman
The idea of this paper is to present a framework for the development of the Hausa Speech recognition system. The framework comprises the creation of a dataset, and the development of acoustic, language, and speech models. The goal is to enhance speech recognition research for under-resourced languages such as the Hausa language. The paper presented work achieved so far by the researchers are creating and developing the Hausa dataset, acoustic model, language model and speech respectively. The dataset and models can be put together for the development of speech to text, text to speech, dictation application and speech to speech translator
本文的思想是为豪萨语语音识别系统的开发提供一个框架。该框架包括数据集的创建,以及声学、语言和语音模型的开发。目标是加强对资源不足的语言(如豪萨语)的语音识别研究。论文介绍了迄今为止研究人员分别创建和开发Hausa数据集、声学模型、语言模型和语音的工作。数据集和模型可以用于语音到文本、文本到语音、听写应用和语音到语音翻译的开发
{"title":"Framework for Hausa Speech Recognition","authors":"U. Ibrahim, Moussa Boukar Mahatma, Muhammed Aliyu Suleiman","doi":"10.1109/ITED56637.2022.10051610","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051610","url":null,"abstract":"The idea of this paper is to present a framework for the development of the Hausa Speech recognition system. The framework comprises the creation of a dataset, and the development of acoustic, language, and speech models. The goal is to enhance speech recognition research for under-resourced languages such as the Hausa language. The paper presented work achieved so far by the researchers are creating and developing the Hausa dataset, acoustic model, language model and speech respectively. The dataset and models can be put together for the development of speech to text, text to speech, dictation application and speech to speech translator","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"141 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Machine Learning Algorithms to Path Loss Modeling: A Review 机器学习算法在路径损失建模中的应用综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051448
A. Abdulkarim, N. Faruk, Emmanuel Alozie, O. Sowande, Imam-Fulani Yusuf Olayinka, A. D. Usman, K. Adewole, A. Oloyede, H. Chiroma, Salisu Garba, A. Imoize, A. Musa, L. S. Taura
The demand for high-speed internet services is increasing due to emerging needs such as e-commerce, e-health, education, and other high-technology applications. Wireless communication networks have now become a necessity, especially with the introduction of the 5G networks which have the potential to provide extraordinary data rates with extremely low latency. The deployment and operation of 5G and beyond networks in built-up environments would require a complex and reliable radio propagation model that guides network engineers to achieve effective coverage estimation and appropriate base station placements. The inefficiency, and sometimes inconsistencies of deterministic and empirical path loss models necessitated the need to integrate machine learning models. Recently, different machine learning-based pathloss models have been developed to overcome drawbacks associated with conventional pathloss models due to their significant learning and prediction abilities. This paper aims to review path loss models relative to machine learning-based algorithms with a focus on models developed in the last 21 years (2000 to 2021) to study their network parameters and architectures, designs, and applicability, and proffer further research directions.
由于电子商务、电子保健、教育和其他高科技应用等新出现的需求,对高速互联网服务的需求正在增加。无线通信网络现在已经成为一种必需品,特别是随着5G网络的引入,5G网络有可能以极低的延迟提供非凡的数据速率。在建筑环境中部署和运行5G及以上网络将需要一个复杂而可靠的无线电传播模型,以指导网络工程师实现有效的覆盖估计和适当的基站放置。确定性和经验路径损失模型的低效率和有时的不一致性使得整合机器学习模型成为必要。最近,不同的基于机器学习的路径损失模型已经被开发出来,以克服传统路径损失模型的缺点,因为它们具有显著的学习和预测能力。本文旨在回顾与基于机器学习的算法相关的路径损失模型,重点研究近21年(2000年至2021年)发展的模型,研究其网络参数和架构、设计和适用性,并提出进一步的研究方向。
{"title":"Application of Machine Learning Algorithms to Path Loss Modeling: A Review","authors":"A. Abdulkarim, N. Faruk, Emmanuel Alozie, O. Sowande, Imam-Fulani Yusuf Olayinka, A. D. Usman, K. Adewole, A. Oloyede, H. Chiroma, Salisu Garba, A. Imoize, A. Musa, L. S. Taura","doi":"10.1109/ITED56637.2022.10051448","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051448","url":null,"abstract":"The demand for high-speed internet services is increasing due to emerging needs such as e-commerce, e-health, education, and other high-technology applications. Wireless communication networks have now become a necessity, especially with the introduction of the 5G networks which have the potential to provide extraordinary data rates with extremely low latency. The deployment and operation of 5G and beyond networks in built-up environments would require a complex and reliable radio propagation model that guides network engineers to achieve effective coverage estimation and appropriate base station placements. The inefficiency, and sometimes inconsistencies of deterministic and empirical path loss models necessitated the need to integrate machine learning models. Recently, different machine learning-based pathloss models have been developed to overcome drawbacks associated with conventional pathloss models due to their significant learning and prediction abilities. This paper aims to review path loss models relative to machine learning-based algorithms with a focus on models developed in the last 21 years (2000 to 2021) to study their network parameters and architectures, designs, and applicability, and proffer further research directions.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116415025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilingual Cyberbullying Detector (CD) Application for Nigerian Pidgin and Igbo Language Corpus 多语种网络欺凌检测器(CD)尼日利亚皮钦语和伊博语语料库应用程序
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051345
Christiana Amaka Okoloegbo, U. F. Eze, G. Chukwudebe, O. Nwokonkwo
In recent years, difficulties related to cyberbullying have emerged as a result of the expansion of social media platforms and community interaction. Naive Bayes classifiers and other well-known models have been used successfully by several academics to create sentiment analysis systems for various use cases. Recent advances in the detection and management of multilingual cyberbullying actions on forums and social networking sites have built on the success of these sentiment analysis efforts. In order to reduce cybercrime in Nigeria, the study's goal is to create an improved Cyberbullying Detector (CD) that is interactive, affordable, and helps identify, monitor, and regulate cyberbullying. The application is the first of its kind in Nigeria to monitor and regulate cyberbullying on Twitter in Pidgin English and Igbo Language. A custom pidgin library was developed with comprehensive translations. The TextBlob library is appropriate for the study, which focuses on cyberbullying, in terms of sentiment prediction. From the sentiment analysis of Twitter data collected using SNScrape, the results show language-specific models that worked perfectly in flagging cyberbullying at manageable runs.
近年来,由于社交媒体平台和社区互动的扩大,出现了与网络欺凌相关的困难。朴素贝叶斯分类器和其他知名模型已经被一些学者成功地用于创建各种用例的情感分析系统。最近在论坛和社交网站上多语言网络欺凌行为的检测和管理方面取得的进展是建立在这些情感分析工作的成功基础上的。为了减少尼日利亚的网络犯罪,该研究的目标是创建一个改进的网络欺凌探测器(CD),它是交互式的,价格合理的,并有助于识别、监测和规范网络欺凌。这款应用程序是尼日利亚首个用洋泾浜英语和伊博语监控和管理推特上网络欺凌的应用程序。开发了一个定制的洋泾浜库,提供全面的翻译。在情绪预测方面,TextBlob库非常适合研究网络欺凌。从snscraper收集的Twitter数据的情绪分析来看,结果显示,特定语言的模型可以在可控范围内完美地标记网络欺凌。
{"title":"Multilingual Cyberbullying Detector (CD) Application for Nigerian Pidgin and Igbo Language Corpus","authors":"Christiana Amaka Okoloegbo, U. F. Eze, G. Chukwudebe, O. Nwokonkwo","doi":"10.1109/ITED56637.2022.10051345","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051345","url":null,"abstract":"In recent years, difficulties related to cyberbullying have emerged as a result of the expansion of social media platforms and community interaction. Naive Bayes classifiers and other well-known models have been used successfully by several academics to create sentiment analysis systems for various use cases. Recent advances in the detection and management of multilingual cyberbullying actions on forums and social networking sites have built on the success of these sentiment analysis efforts. In order to reduce cybercrime in Nigeria, the study's goal is to create an improved Cyberbullying Detector (CD) that is interactive, affordable, and helps identify, monitor, and regulate cyberbullying. The application is the first of its kind in Nigeria to monitor and regulate cyberbullying on Twitter in Pidgin English and Igbo Language. A custom pidgin library was developed with comprehensive translations. The TextBlob library is appropriate for the study, which focuses on cyberbullying, in terms of sentiment prediction. From the sentiment analysis of Twitter data collected using SNScrape, the results show language-specific models that worked perfectly in flagging cyberbullying at manageable runs.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126755292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Motion Detector Using Raspberry Pi Gadgetry 基于物联网的运动检测器使用树莓派小工具
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051334
Bartholomew Idoko, John Bush Idoko, Yusuf Zubair Mahmud Kazaure, Yahanasu Mohammed Ibrahim, Fatai A. Akinsola, Adereti Rasak Raji
In this paper, we designed a sophisticated security system that monitors a particular region (home or office) or a distinguished substance, evaluating occurrences within the scene. The system is implemented using gadgetry such as raspberry pi 2 model B, HC-SR501 sensor, Pi camera, mobile phone and a machine learning based python source code integrating the operations of these gadgets with those of SMS and image service clients (Nexmo and IMGUR) respectively. The unified function of these gadgets and services is basically to capture detected image within the scene and send it to a registered mobile phone in form of text message. The accuracy and response time of the proposed integrated system are very high and very low respectively.
在本文中,我们设计了一个复杂的安全系统,可以监控特定区域(家庭或办公室)或特殊物质,评估场景中的事件。该系统使用树莓派2 B型、HC-SR501传感器、派相机、手机等小工具和基于机器学习的python源代码来实现,这些小工具的操作分别与短信和图像服务客户端(Nexmo和IMGUR)的操作相结合。这些小工具和服务的统一功能基本上是在场景中捕捉检测到的图像,并以短信的形式发送到注册的手机上。所提出的集成系统的精度很高,响应时间很低。
{"title":"IoT Based Motion Detector Using Raspberry Pi Gadgetry","authors":"Bartholomew Idoko, John Bush Idoko, Yusuf Zubair Mahmud Kazaure, Yahanasu Mohammed Ibrahim, Fatai A. Akinsola, Adereti Rasak Raji","doi":"10.1109/ITED56637.2022.10051334","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051334","url":null,"abstract":"In this paper, we designed a sophisticated security system that monitors a particular region (home or office) or a distinguished substance, evaluating occurrences within the scene. The system is implemented using gadgetry such as raspberry pi 2 model B, HC-SR501 sensor, Pi camera, mobile phone and a machine learning based python source code integrating the operations of these gadgets with those of SMS and image service clients (Nexmo and IMGUR) respectively. The unified function of these gadgets and services is basically to capture detected image within the scene and send it to a registered mobile phone in form of text message. The accuracy and response time of the proposed integrated system are very high and very low respectively.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126810309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Malaria Parasite Detection and Species Classification Using Dilated Convolutional Neural Network 基于扩展卷积神经网络的疟疾寄生虫检测与分类
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051510
S. Garba, M. Abdullahi, S. Bashir, O.A. Abisoye
Malaria is an infectious disease caused by a bite of an Anopheles Mosquito which has caused a lot of death. Diagnosis of malaria is made by examining a red blood cell of an infected patient using a microscope, which takes time and requires a qualified laboratory expert to examine, read and interpret the results obtained. Convolutional Neural Network (CNN) has played important role in image classification; however, it has exhibited some problems in consuming computing resources which is one of the limitations of CNN. To reduce this problem, this paper presented a Dilated Convolution Neural Network for malaria parasites detection and species classification using blood smear images. A direct classification was carried out to detect infected and uninfected malaria parasites. Subsequently, species classification was carried out using 3 convolutional layers and Convolution2D for convolution operation while a dilation rate of 2 was used for the convolution layers. The model was trained with a publicly available dataset of 27699 images with a performance accuracy of 99.9% for parasite detection and species classification of 99.9% for falciparum, 64.6% for Malarie, 39.1% for Ovale and 37.3% for Vivax.
疟疾是一种由按蚊叮咬引起的传染病,已经造成很多人死亡。疟疾的诊断是通过使用显微镜检查受感染病人的红细胞来进行的,这需要时间,并且需要合格的实验室专家来检查、阅读和解释所获得的结果。卷积神经网络(CNN)在图像分类中发挥了重要作用;然而,它在消耗计算资源方面表现出一些问题,这是CNN的局限性之一。为了解决这一问题,本文提出了一种基于血液涂片图像的疟疾寄生虫检测和种类分类的扩展卷积神经网络。对感染和未感染的疟疾寄生虫进行了直接分类。随后,使用3个卷积层进行物种分类,并使用Convolution2D进行卷积运算,卷积层的膨胀率为2。该模型使用27699张公开数据集进行训练,在寄生虫检测和物种分类方面的准确率为99.9%,其中恶性疟原虫为99.9%,疟疾为64.6%,卵形疟原虫为39.1%,间日疟原虫为37.3%。
{"title":"Implementation of Malaria Parasite Detection and Species Classification Using Dilated Convolutional Neural Network","authors":"S. Garba, M. Abdullahi, S. Bashir, O.A. Abisoye","doi":"10.1109/ITED56637.2022.10051510","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051510","url":null,"abstract":"Malaria is an infectious disease caused by a bite of an Anopheles Mosquito which has caused a lot of death. Diagnosis of malaria is made by examining a red blood cell of an infected patient using a microscope, which takes time and requires a qualified laboratory expert to examine, read and interpret the results obtained. Convolutional Neural Network (CNN) has played important role in image classification; however, it has exhibited some problems in consuming computing resources which is one of the limitations of CNN. To reduce this problem, this paper presented a Dilated Convolution Neural Network for malaria parasites detection and species classification using blood smear images. A direct classification was carried out to detect infected and uninfected malaria parasites. Subsequently, species classification was carried out using 3 convolutional layers and Convolution2D for convolution operation while a dilation rate of 2 was used for the convolution layers. The model was trained with a publicly available dataset of 27699 images with a performance accuracy of 99.9% for parasite detection and species classification of 99.9% for falciparum, 64.6% for Malarie, 39.1% for Ovale and 37.3% for Vivax.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time Series: Predicting Nigerian Food Prices using ARIMA Model and R-Programming 时间序列:利用ARIMA模型和r编程预测尼日利亚食品价格
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051516
J. Ndunagu, Eyiyemi.Helen Aderemi, R. Jimoh, J. B. Awotunde
The majority of food commodities in Nigeria have seen persistent price instability. this is brought by elements like insecurity/insurgency, poor storage facilities, seasonal price changes, inconsistent government policies, COVID-19 containment measures, poor access to credit, technical inputs, lack of modern farm tools and implements. This study focused on comparing the prices of four different food items - beans, onion, tomato, and yam using the ARIMA model to forecast future prices. Two out of the six geopolitical zones of Nigeria were used for the study; the North-Central and North-West. The National Bureau of Statistics (NBS) provided the raw data between 2017 and 2018, and the items were weighed in kilograms (Kg). The data was extrapolated into a time series data by executing in R Studio. The stationarity of the series data was obtained by a Unit root Test using the KPSS test (If p<0.05 means the time series is stationary). Results from the forecasted values indicated that food commodities' prices increase with time, making ARIMA a good model for forecasting prices. It was recommended that necessary measures should be put in place to ameliorate the high cost of food prices being experienced in the country of Nigeria.
尼日利亚大多数粮食商品的价格持续不稳定。这是由不安全/叛乱、储存设施差、季节性价格变化、政府政策不一致、COVID-19防控措施、难以获得信贷、技术投入、缺乏现代农具和农具等因素造成的。这项研究的重点是比较四种不同食物的价格——豆类、洋葱、西红柿和山药,使用ARIMA模型来预测未来的价格。尼日利亚六个地缘政治区域中的两个被用于研究;中北部和西北部。国家统计局(NBS)提供了2017年至2018年的原始数据,这些物品的重量以公斤为单位。通过在R Studio中执行,数据被推断为时间序列数据。序列数据的平稳性通过使用KPSS检验的单位根检验获得(p<0.05表示时间序列平稳)。预测结果表明,粮食商品价格随时间的推移而增加,ARIMA是一个很好的价格预测模型。会议建议,应采取必要措施,以改善尼日利亚正在经历的粮食价格高企的情况。
{"title":"Time Series: Predicting Nigerian Food Prices using ARIMA Model and R-Programming","authors":"J. Ndunagu, Eyiyemi.Helen Aderemi, R. Jimoh, J. B. Awotunde","doi":"10.1109/ITED56637.2022.10051516","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051516","url":null,"abstract":"The majority of food commodities in Nigeria have seen persistent price instability. this is brought by elements like insecurity/insurgency, poor storage facilities, seasonal price changes, inconsistent government policies, COVID-19 containment measures, poor access to credit, technical inputs, lack of modern farm tools and implements. This study focused on comparing the prices of four different food items - beans, onion, tomato, and yam using the ARIMA model to forecast future prices. Two out of the six geopolitical zones of Nigeria were used for the study; the North-Central and North-West. The National Bureau of Statistics (NBS) provided the raw data between 2017 and 2018, and the items were weighed in kilograms (Kg). The data was extrapolated into a time series data by executing in R Studio. The stationarity of the series data was obtained by a Unit root Test using the KPSS test (If p<0.05 means the time series is stationary). Results from the forecasted values indicated that food commodities' prices increase with time, making ARIMA a good model for forecasting prices. It was recommended that necessary measures should be put in place to ameliorate the high cost of food prices being experienced in the country of Nigeria.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128515667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation of Electricity Theft at Low Distribution Voltage End Using Matrix Converter 利用矩阵变换器缓解配电低压端窃电
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051599
Sunday Abel, J. Tsado, O. Tola
This study demonstrates the use of a matrix converter to reduce electricity theft at the low distribution voltage end. Residential users' meter bypassing energy theft causes electric power distribution businesses in poor nations like Nigeria to lose a considerable amount of money. Direct tapping on distribution lines remains a persistent problem that needs to be utterly eliminated, even though smart metering systems have solved concerns linked to power theft at the meter. Because there is no need for a large, bulky de link electrolytic capacitor that increases system complexity, an indirect matrix converter is utilized because it ensures compactness and reliability. Design and simulation of the proposed system are based on the low voltage distribution network's frequency variation (10 Hz to 20 Hz). For the converter's design, a frequency of 10 Hz was used to produce a worst-case Total Harmonic Distortion (THD) of 204.99 %.
本研究演示了在低配电电压端使用矩阵变换器来减少窃电。在像尼日利亚这样的贫穷国家,居民用户的电表绕过能源盗窃导致配电企业损失相当大的一笔钱。直接窃听配电线路仍然是一个需要彻底消除的长期问题,尽管智能计量系统已经解决了与电表盗窃有关的担忧。由于不需要增加系统复杂性的大而笨重的脱链电解电容器,因此使用间接矩阵变换器,因为它确保了紧凑性和可靠性。该系统的设计和仿真是基于低压配电网的频率变化(10hz到20hz)。对于转换器的设计,使用10 Hz的频率产生204.99%的最坏情况总谐波失真(THD)。
{"title":"Mitigation of Electricity Theft at Low Distribution Voltage End Using Matrix Converter","authors":"Sunday Abel, J. Tsado, O. Tola","doi":"10.1109/ITED56637.2022.10051599","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051599","url":null,"abstract":"This study demonstrates the use of a matrix converter to reduce electricity theft at the low distribution voltage end. Residential users' meter bypassing energy theft causes electric power distribution businesses in poor nations like Nigeria to lose a considerable amount of money. Direct tapping on distribution lines remains a persistent problem that needs to be utterly eliminated, even though smart metering systems have solved concerns linked to power theft at the meter. Because there is no need for a large, bulky de link electrolytic capacitor that increases system complexity, an indirect matrix converter is utilized because it ensures compactness and reliability. Design and simulation of the proposed system are based on the low voltage distribution network's frequency variation (10 Hz to 20 Hz). For the converter's design, a frequency of 10 Hz was used to produce a worst-case Total Harmonic Distortion (THD) of 204.99 %.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Descriptive Evaluation of Unmanned Aerial Vehicles and Internet of Things for Agricultural Production: A Review 农业生产中无人机与物联网的描述性评价综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051473
Saheed Idowu, O. R. Vincent, Gboyega Festus Akinboro
The Internet of Things has greatly transformed Agriculture production, termed precision or smart farming, in the last few years, causing increased food production. The continuous increase in population has made sustainable food security an issue of concern beyond what regular agricultural practices can handle in today's economy. To tackle the problem of food insecurity and further increase yield in agricultural production, Information Technology tools began to find their application in both crop and animal production. This paper evaluates the use of the Internet of Things (IoT) and Unmanned Aerial Vehicles (UAV) on the farm. In this paper, other research into IoT and UAV usage is reviewed and analyzed to present the importance of Information Technology in Agriculture.
在过去的几年里,物联网极大地改变了农业生产,被称为精准农业或智能农业,导致粮食产量增加。人口的持续增长使可持续粮食安全成为一个令人关注的问题,超出了当今经济中常规农业实践所能处理的范围。为了解决粮食不安全问题并进一步提高农业生产的产量,信息技术工具开始在作物和动物生产中得到应用。本文评估了物联网(IoT)和无人机(UAV)在农场的使用情况。本文对物联网和无人机使用的其他研究进行了回顾和分析,以展示信息技术在农业中的重要性。
{"title":"A Descriptive Evaluation of Unmanned Aerial Vehicles and Internet of Things for Agricultural Production: A Review","authors":"Saheed Idowu, O. R. Vincent, Gboyega Festus Akinboro","doi":"10.1109/ITED56637.2022.10051473","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051473","url":null,"abstract":"The Internet of Things has greatly transformed Agriculture production, termed precision or smart farming, in the last few years, causing increased food production. The continuous increase in population has made sustainable food security an issue of concern beyond what regular agricultural practices can handle in today's economy. To tackle the problem of food insecurity and further increase yield in agricultural production, Information Technology tools began to find their application in both crop and animal production. This paper evaluates the use of the Internet of Things (IoT) and Unmanned Aerial Vehicles (UAV) on the farm. In this paper, other research into IoT and UAV usage is reviewed and analyzed to present the importance of Information Technology in Agriculture.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129682660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Exploratory Data Analysis of the Covid-19 Pandemic in Nigeria: Two Years after the Outbreak 尼日利亚Covid-19大流行的可视化探索性数据分析:疫情爆发两年后
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051529
U. Orji, M. Ezema, Elochukwu A. Ukwandu, C. Ugwuishiwu, O. Ezugwu, Malachi. C. Egbugha
The outbreak of the coronavirus disease in Nigeria and all over the world in 2019/2020 caused havoc on the world's economy and put a strain on global healthcare facilities and personnel. It also threw up many opportunities to improve processes using artificial intelligence techniques like big data analytics and business intelligence. The need to speedily make decisions that could have far-reaching effects is prompting the boom in data analytics which is achieved via exploratory data analysis (EDA) to see trends, patterns, and relationships in the data. Today, big data analytics is revolutionizing processes and helping improve productivity and decision-making capabilities in all aspects of life. The large amount of heterogeneous and, in most cases, opaque data now available has made it possible for researchers and businesses of all sizes to effectively deploy data analytics to gain action-oriented insights into various problems in real time. In this paper, we deployed Microsoft Excel and Python to perform EDA of the covid-19 pandemic data in Nigeria and presented our results via visualizations and a dashboard using Tableau. The dataset is from the Nigeria Centre for Disease Control (NCDC) recorded between February 28th, 2020, and July 19th, 2022. This paper aims to follow the data and visually show the trends over the past 2 years and also show the powerful capabilities of these data analytics tools and techniques. Furthermore, our findings contribute to the current literature on Covid-19 research by showcasing how the virus has progressed in Nigeria over time and the insights thus far.
2019/2020年在尼日利亚和世界各地爆发的冠状病毒病给世界经济造成了严重破坏,给全球医疗设施和人员带来了压力。它还提供了许多利用大数据分析和商业智能等人工智能技术改进流程的机会。快速做出可能产生深远影响的决策的需求推动了数据分析的繁荣,这是通过探索性数据分析(EDA)来实现的,以查看数据中的趋势、模式和关系。如今,大数据分析正在彻底改变流程,并帮助提高生活各个方面的生产力和决策能力。现在大量的异构数据,在大多数情况下,不透明的数据使得各种规模的研究人员和企业都可以有效地部署数据分析,以实时获得针对各种问题的面向行动的见解。在本文中,我们部署了Microsoft Excel和Python对尼日利亚的covid-19大流行数据执行EDA,并使用Tableau通过可视化和仪表板展示了我们的结果。该数据集来自尼日利亚疾病控制中心(NCDC),记录于2020年2月28日至2022年7月19日。本文旨在跟踪数据,直观地展示过去2年的趋势,并展示这些数据分析工具和技术的强大功能。此外,我们的研究结果通过展示病毒如何随着时间的推移在尼日利亚发展以及迄今为止的见解,为当前关于Covid-19研究的文献做出了贡献。
{"title":"Visual Exploratory Data Analysis of the Covid-19 Pandemic in Nigeria: Two Years after the Outbreak","authors":"U. Orji, M. Ezema, Elochukwu A. Ukwandu, C. Ugwuishiwu, O. Ezugwu, Malachi. C. Egbugha","doi":"10.1109/ITED56637.2022.10051529","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051529","url":null,"abstract":"The outbreak of the coronavirus disease in Nigeria and all over the world in 2019/2020 caused havoc on the world's economy and put a strain on global healthcare facilities and personnel. It also threw up many opportunities to improve processes using artificial intelligence techniques like big data analytics and business intelligence. The need to speedily make decisions that could have far-reaching effects is prompting the boom in data analytics which is achieved via exploratory data analysis (EDA) to see trends, patterns, and relationships in the data. Today, big data analytics is revolutionizing processes and helping improve productivity and decision-making capabilities in all aspects of life. The large amount of heterogeneous and, in most cases, opaque data now available has made it possible for researchers and businesses of all sizes to effectively deploy data analytics to gain action-oriented insights into various problems in real time. In this paper, we deployed Microsoft Excel and Python to perform EDA of the covid-19 pandemic data in Nigeria and presented our results via visualizations and a dashboard using Tableau. The dataset is from the Nigeria Centre for Disease Control (NCDC) recorded between February 28th, 2020, and July 19th, 2022. This paper aims to follow the data and visually show the trends over the past 2 years and also show the powerful capabilities of these data analytics tools and techniques. Furthermore, our findings contribute to the current literature on Covid-19 research by showcasing how the virus has progressed in Nigeria over time and the insights thus far.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116899756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Real-time Privacy System for Electric Vehicles using Blockchain Technology 基于区块链技术的电动汽车实时隐私系统
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051269
Samuel Omaji, Ijegwa David Acheme, A. Makinde, Blessing Akogwu, Adamu Sani Yahaya, H. Alhakami, Wajdi Alhakami
In a vehicular energy network (VEN), an efficient transfer of energy among vehicles is realized while increasing the mobility of vehicles in a large geographic location. However, the security and privacy of vehicle owners are not fully explored in the existing literature. Today, because of the exponential rise in the number of vehicle owners in VEN, the problems of traffic congestion, energy consumption, etc., are created. The issues can be alleviated if certain information about vehicles such as the speed, energy consumption price, and location, is efficiently collected. Besides, effective communication is required for ensuring proper and authentic dissemination of traffic information among vehicles while preserving their data privacy. As a consequence, our study suggests a blockchain-based system for privacy preservation. In the proposed system, trust among vehicles is achieved using the Nash bargaining optimization method. The method is employed to maximize the payoffs of vehicles. Additionally, an improved super-increasing weighted sequence is used to preserve the privacy of vehicles by considering two essential parameters: energy consumption and price. Furthermore, the Paillier encryption mechanism is employed to securely transmit vehicles' information across the network. The proposed system has undergone a security study, which reveals that it is resistant to privacy and security-related threats. The performance of the proposed system shows that the system is efficient and reliable.
在车辆能源网络(VEN)中,实现了车辆之间的有效能量传递,同时增加了车辆在大地理区域内的机动性。然而,现有文献对车主的安全与隐私问题的探讨并不充分。如今,由于VEN的车主数量呈指数级增长,导致了交通拥堵、能源消耗等问题。如果能有效地收集车辆的速度、能源消耗价格、位置等信息,就可以缓解这一问题。此外,需要有效的沟通,以确保车辆之间正确和真实地传播交通信息,同时保护其数据隐私。因此,我们的研究提出了一种基于区块链的隐私保护系统。该系统采用纳什议价优化方法实现了车辆间的信任。该方法是为了使车辆的收益最大化。此外,通过考虑能源消耗和价格两个基本参数,采用改进的超递增加权序列来保护车辆的隐私。此外,采用Paillier加密机制,在网络中安全地传输车辆信息。提出的系统经过了安全研究,表明它能够抵抗隐私和安全相关的威胁。系统的性能表明,该系统是高效可靠的。
{"title":"A Real-time Privacy System for Electric Vehicles using Blockchain Technology","authors":"Samuel Omaji, Ijegwa David Acheme, A. Makinde, Blessing Akogwu, Adamu Sani Yahaya, H. Alhakami, Wajdi Alhakami","doi":"10.1109/ITED56637.2022.10051269","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051269","url":null,"abstract":"In a vehicular energy network (VEN), an efficient transfer of energy among vehicles is realized while increasing the mobility of vehicles in a large geographic location. However, the security and privacy of vehicle owners are not fully explored in the existing literature. Today, because of the exponential rise in the number of vehicle owners in VEN, the problems of traffic congestion, energy consumption, etc., are created. The issues can be alleviated if certain information about vehicles such as the speed, energy consumption price, and location, is efficiently collected. Besides, effective communication is required for ensuring proper and authentic dissemination of traffic information among vehicles while preserving their data privacy. As a consequence, our study suggests a blockchain-based system for privacy preservation. In the proposed system, trust among vehicles is achieved using the Nash bargaining optimization method. The method is employed to maximize the payoffs of vehicles. Additionally, an improved super-increasing weighted sequence is used to preserve the privacy of vehicles by considering two essential parameters: energy consumption and price. Furthermore, the Paillier encryption mechanism is employed to securely transmit vehicles' information across the network. The proposed system has undergone a security study, which reveals that it is resistant to privacy and security-related threats. The performance of the proposed system shows that the system is efficient and reliable.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133048464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th Information Technology for Education and Development (ITED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1