首页 > 最新文献

2022 5th Information Technology for Education and Development (ITED)最新文献

英文 中文
Opinion mining analytics of IoT ecosystem by Profile of Mood State with Logistic Regression 基于Logistic回归的情绪状态剖面物联网生态系统意见挖掘分析
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051519
T. Olaleye, Adeola Olaleye, Emmanuel Ofoegbunam, Gbenga Abodunrin, Temitope Abioye, W. Ahiara
Internet of Things continues to redefine modus operandi across diverse socioeconomic and professional domains thereby generating an un-abating global discuss on the adoption and functionalities of smart devices. Since emotions play a critical role in decision making according to the psychological domain of emotion science, the paramount importance of periodic delineation of stakeholders' mood is imperative for policy makers. Whereas opinion mining analytics of IoT discussions have returned state-of-the-arts, there is need to address germane factors seldom factored into existing literatures. This study therefore consolidates on current frameworks through a bi-modal descriptive and content-based analytics of IoT ecosystem for detecting key mood domain and the BlueCheckCredibility status of IoT tweeters using Profile of Mood State and Nomogram-based analytics. With a 99.5% precision rate by Logistic regression model, social characteristic attributes of acquired ethnographic data points turns mutually exclusive to the credibility status of IoT opinion molders while tweet properties contributes higher discriminative tendencies for identifying negative IoT emotions. The impact of Internet of Things on data science is likewise unraveled through bi-gram content analytics to identify topical discussions encapsulated in the acquired tweet corpus.
物联网继续在不同的社会经济和专业领域重新定义运作方式,从而引发了一场关于智能设备采用和功能的持续全球讨论。根据情绪科学的心理领域,情绪在决策中起着至关重要的作用,因此对利益相关者的情绪进行定期描述至关重要,这对政策制定者来说是势在必行的。虽然物联网讨论的意见挖掘分析已经回到了最先进的水平,但需要解决现有文献中很少考虑的相关因素。因此,本研究通过物联网生态系统的双模态描述性和基于内容的分析来巩固当前框架,用于检测关键情绪域和物联网推特者的BlueCheckCredibility状态,使用情绪状态概况和基于nomogram分析。通过Logistic回归模型,获得的民族志数据点的社会特征属性与物联网意见塑造者的可信度状态互斥,推特属性对物联网负面情绪的识别具有较高的判别倾向,准确率为99.5%。物联网对数据科学的影响同样是通过双图内容分析来揭示的,以确定所获得的推文语料库中包含的主题讨论。
{"title":"Opinion mining analytics of IoT ecosystem by Profile of Mood State with Logistic Regression","authors":"T. Olaleye, Adeola Olaleye, Emmanuel Ofoegbunam, Gbenga Abodunrin, Temitope Abioye, W. Ahiara","doi":"10.1109/ITED56637.2022.10051519","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051519","url":null,"abstract":"Internet of Things continues to redefine modus operandi across diverse socioeconomic and professional domains thereby generating an un-abating global discuss on the adoption and functionalities of smart devices. Since emotions play a critical role in decision making according to the psychological domain of emotion science, the paramount importance of periodic delineation of stakeholders' mood is imperative for policy makers. Whereas opinion mining analytics of IoT discussions have returned state-of-the-arts, there is need to address germane factors seldom factored into existing literatures. This study therefore consolidates on current frameworks through a bi-modal descriptive and content-based analytics of IoT ecosystem for detecting key mood domain and the BlueCheckCredibility status of IoT tweeters using Profile of Mood State and Nomogram-based analytics. With a 99.5% precision rate by Logistic regression model, social characteristic attributes of acquired ethnographic data points turns mutually exclusive to the credibility status of IoT opinion molders while tweet properties contributes higher discriminative tendencies for identifying negative IoT emotions. The impact of Internet of Things on data science is likewise unraveled through bi-gram content analytics to identify topical discussions encapsulated in the acquired tweet corpus.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131859370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-time Privacy System for Electric Vehicles using Blockchain Technology 基于区块链技术的电动汽车实时隐私系统
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051269
Samuel Omaji, Ijegwa David Acheme, A. Makinde, Blessing Akogwu, Adamu Sani Yahaya, H. Alhakami, Wajdi Alhakami
In a vehicular energy network (VEN), an efficient transfer of energy among vehicles is realized while increasing the mobility of vehicles in a large geographic location. However, the security and privacy of vehicle owners are not fully explored in the existing literature. Today, because of the exponential rise in the number of vehicle owners in VEN, the problems of traffic congestion, energy consumption, etc., are created. The issues can be alleviated if certain information about vehicles such as the speed, energy consumption price, and location, is efficiently collected. Besides, effective communication is required for ensuring proper and authentic dissemination of traffic information among vehicles while preserving their data privacy. As a consequence, our study suggests a blockchain-based system for privacy preservation. In the proposed system, trust among vehicles is achieved using the Nash bargaining optimization method. The method is employed to maximize the payoffs of vehicles. Additionally, an improved super-increasing weighted sequence is used to preserve the privacy of vehicles by considering two essential parameters: energy consumption and price. Furthermore, the Paillier encryption mechanism is employed to securely transmit vehicles' information across the network. The proposed system has undergone a security study, which reveals that it is resistant to privacy and security-related threats. The performance of the proposed system shows that the system is efficient and reliable.
在车辆能源网络(VEN)中,实现了车辆之间的有效能量传递,同时增加了车辆在大地理区域内的机动性。然而,现有文献对车主的安全与隐私问题的探讨并不充分。如今,由于VEN的车主数量呈指数级增长,导致了交通拥堵、能源消耗等问题。如果能有效地收集车辆的速度、能源消耗价格、位置等信息,就可以缓解这一问题。此外,需要有效的沟通,以确保车辆之间正确和真实地传播交通信息,同时保护其数据隐私。因此,我们的研究提出了一种基于区块链的隐私保护系统。该系统采用纳什议价优化方法实现了车辆间的信任。该方法是为了使车辆的收益最大化。此外,通过考虑能源消耗和价格两个基本参数,采用改进的超递增加权序列来保护车辆的隐私。此外,采用Paillier加密机制,在网络中安全地传输车辆信息。提出的系统经过了安全研究,表明它能够抵抗隐私和安全相关的威胁。系统的性能表明,该系统是高效可靠的。
{"title":"A Real-time Privacy System for Electric Vehicles using Blockchain Technology","authors":"Samuel Omaji, Ijegwa David Acheme, A. Makinde, Blessing Akogwu, Adamu Sani Yahaya, H. Alhakami, Wajdi Alhakami","doi":"10.1109/ITED56637.2022.10051269","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051269","url":null,"abstract":"In a vehicular energy network (VEN), an efficient transfer of energy among vehicles is realized while increasing the mobility of vehicles in a large geographic location. However, the security and privacy of vehicle owners are not fully explored in the existing literature. Today, because of the exponential rise in the number of vehicle owners in VEN, the problems of traffic congestion, energy consumption, etc., are created. The issues can be alleviated if certain information about vehicles such as the speed, energy consumption price, and location, is efficiently collected. Besides, effective communication is required for ensuring proper and authentic dissemination of traffic information among vehicles while preserving their data privacy. As a consequence, our study suggests a blockchain-based system for privacy preservation. In the proposed system, trust among vehicles is achieved using the Nash bargaining optimization method. The method is employed to maximize the payoffs of vehicles. Additionally, an improved super-increasing weighted sequence is used to preserve the privacy of vehicles by considering two essential parameters: energy consumption and price. Furthermore, the Paillier encryption mechanism is employed to securely transmit vehicles' information across the network. The proposed system has undergone a security study, which reveals that it is resistant to privacy and security-related threats. The performance of the proposed system shows that the system is efficient and reliable.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133048464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Interference Mitigation Technique for Low Power Wide Area Network 低功率广域网干扰抑制技术的发展
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051347
A. Musa, M. Adio, N. Faruk
Evolution of technology has been rapid in recent years and with the wide acceptance of 5G/6G networks, Internet of Things (IoT), Machine Learning (ML), blockchain technologies, there must be a methodology of interconnecting them across large proximity or regions to centralized servers. Existing mobile technologies are not suitable to ensure communications between these devices, and this has necessitated the need to create Low Power Wide Area Network (LPWAN). The LPWAN, assuming a set of networks, is considered to have subsets including Sigfox, LoRaWAN, NB-IoT and others. For any real system, there is always collision between packets upon arrival, thereby subtracting and extracting the weaker ones. In this work, a Repetitive Interference Mitigation algorithm is proposed, with focus on power differences between User Equipment (UE) and guard subcarriers. This process ensures decryption of the packets that arrive at the same time. Usage of just one guard subcarriers and multiple iterations of the developed technique is suitable to ensure a very good system performance and has a throughput of 36% as compared with other methods.
近年来技术发展迅速,随着5G/6G网络、物联网(IoT)、机器学习(ML)、区块链技术的广泛接受,必须有一种方法将它们跨大范围或区域连接到集中式服务器。现有的移动技术不适合确保这些设备之间的通信,这就需要创建低功率广域网(LPWAN)。假设一组网络,LPWAN被认为具有子集,包括Sigfox, LoRaWAN, NB-IoT等。对于任何一个真实的系统,在到达的数据包之间总是存在冲突,因此可以对较弱的数据包进行减法和提取。在这项工作中,提出了一种重复干扰缓解算法,重点关注用户设备(UE)和保护子载波之间的功率差异。此过程确保对同时到达的数据包进行解密。仅使用一个保护子载波和多次迭代所开发的技术适用于确保非常好的系统性能,与其他方法相比,吞吐量为36%。
{"title":"Development of Interference Mitigation Technique for Low Power Wide Area Network","authors":"A. Musa, M. Adio, N. Faruk","doi":"10.1109/ITED56637.2022.10051347","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051347","url":null,"abstract":"Evolution of technology has been rapid in recent years and with the wide acceptance of 5G/6G networks, Internet of Things (IoT), Machine Learning (ML), blockchain technologies, there must be a methodology of interconnecting them across large proximity or regions to centralized servers. Existing mobile technologies are not suitable to ensure communications between these devices, and this has necessitated the need to create Low Power Wide Area Network (LPWAN). The LPWAN, assuming a set of networks, is considered to have subsets including Sigfox, LoRaWAN, NB-IoT and others. For any real system, there is always collision between packets upon arrival, thereby subtracting and extracting the weaker ones. In this work, a Repetitive Interference Mitigation algorithm is proposed, with focus on power differences between User Equipment (UE) and guard subcarriers. This process ensures decryption of the packets that arrive at the same time. Usage of just one guard subcarriers and multiple iterations of the developed technique is suitable to ensure a very good system performance and has a throughput of 36% as compared with other methods.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Tree Model for Predicting Network Security Incidents 网络安全事件预测的快速树模型
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051219
Marcus Musa Magaji, Abayomi Jegede, Nentawe Gurumdimma, M. Onoja, G. Aimufua, A. Oloyede
Network security personnel are expected to provide uninterrupted services by handling attacks irrespective of the modus operandi. Multiple defensive approaches to prevent, curtail, or mitigate an attack are the primary responsibilities of a security personnel. Considering the fact that, predicting security attacks is an additional technique currently used by most organizations to accurately measure the security risks related to overall system performance, several approaches have been used to predict network security attacks. However, high predicting accuracy and difficulty in analyzing very large amount of dataset and getting a reliable dataset seem to be the major constraints. The uncertain behavior would be subjected to verification and validation by the network administrator. KDDD CUPP 99 dataset and NSL KDD dataset were both used in the research. NSL KDD provides 0.997 average micro and macro accuracy, having average LogLoss of 0.16 and average LogLossReduction of 0.976. Log-Loss Reduction ranges from infinity to 1, where 1 and 0 represent perfect prediction and mean prediction respectively. Log-Loss reduction should be as close to 1 as possible for a good model. Log-Loss in the classification is an evaluation metrics that characterized the accuracy of a classifier. Log-loss is a measure of the performance of a classifier where the prediction input is a probability value between “0.00 to 1.00”. It should be as close to zero as possible. This paper proposes a FastTree Model for predicting network security incidents. Therefore, ML.NET Framework and FastTree Regression Technique have a high prediction accuracy and ability to analyze large datasets of normal, abnormal and uncertain behaviors.
网络安全人员应提供不间断的服务,处理各种攻击行为。预防、限制或减轻攻击的多种防御方法是安全人员的主要职责。考虑到预测安全攻击是目前大多数组织用来准确度量与整体系统性能相关的安全风险的一项附加技术,已经使用了几种方法来预测网络安全攻击。然而,高预测精度和难以分析大量数据集并获得可靠数据集似乎是主要的制约因素。不确定行为将受到网络管理员的验证和确认。本研究采用KDDD cupp99数据集和NSL KDD数据集。NSL KDD提供了0.997的平均微观和宏观精度,平均LogLoss为0.16,平均LogLoss reduction为0.976。Log-Loss Reduction的取值范围是无穷大到1,其中1和0分别代表完美预测和平均预测。对于一个好的模型,Log-Loss减少应该尽可能接近1。分类中的Log-Loss是一种评价分类器准确性的指标。Log-loss是对分类器性能的度量,其中预测输入是介于“0.00到1.00”之间的概率值。它应该尽可能接近于零。本文提出了一种快速树模型来预测网络安全事件。因此,ML.NET框架和FastTree回归技术具有较高的预测精度和分析正常、异常和不确定行为的大数据集的能力。
{"title":"Fast Tree Model for Predicting Network Security Incidents","authors":"Marcus Musa Magaji, Abayomi Jegede, Nentawe Gurumdimma, M. Onoja, G. Aimufua, A. Oloyede","doi":"10.1109/ITED56637.2022.10051219","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051219","url":null,"abstract":"Network security personnel are expected to provide uninterrupted services by handling attacks irrespective of the modus operandi. Multiple defensive approaches to prevent, curtail, or mitigate an attack are the primary responsibilities of a security personnel. Considering the fact that, predicting security attacks is an additional technique currently used by most organizations to accurately measure the security risks related to overall system performance, several approaches have been used to predict network security attacks. However, high predicting accuracy and difficulty in analyzing very large amount of dataset and getting a reliable dataset seem to be the major constraints. The uncertain behavior would be subjected to verification and validation by the network administrator. KDDD CUPP 99 dataset and NSL KDD dataset were both used in the research. NSL KDD provides 0.997 average micro and macro accuracy, having average LogLoss of 0.16 and average LogLossReduction of 0.976. Log-Loss Reduction ranges from infinity to 1, where 1 and 0 represent perfect prediction and mean prediction respectively. Log-Loss reduction should be as close to 1 as possible for a good model. Log-Loss in the classification is an evaluation metrics that characterized the accuracy of a classifier. Log-loss is a measure of the performance of a classifier where the prediction input is a probability value between “0.00 to 1.00”. It should be as close to zero as possible. This paper proposes a FastTree Model for predicting network security incidents. Therefore, ML.NET Framework and FastTree Regression Technique have a high prediction accuracy and ability to analyze large datasets of normal, abnormal and uncertain behaviors.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Application for Human Respiratory System Diagnosis: A Systematic Review Android应用于人类呼吸系统诊断:系统综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051603
Adaora Obayi, Obinna Onyedeke, I. Uzo, Azuka Ijeomah
This paper presents a systematic review of android app respiratory system on smartphone. For some diseases, doctors have succeeded in inventing the necessary treatments that lasts for a short period, but in several cases, the treatment can stay for a lifetime. The goal of this system is to detect if a patient has any respiratory disease(s) by specifying the symptoms the patient encounters, schedules an appointement in the hospital for patient through the system to the linked specialist doctors to avoid contact in the case of Covid-19 patient. This research will help raise patient's awareness of the high risk of late discovery of having respiratory diseases (like Lung Cancer. corona virus etc), and also to develop a model that will help detect this disease early through mobile application. The focus of this review is to encourage medical institutions to adopt the health android app that can help patients in self-managing behavioral activities such as physical activities, using symptoms to determine the stage(early or critical) of the disease and drug suggestions with research evaluation using the app, this could help patients monitor and manage their health conditions.
本文对智能手机上的安卓应用呼吸系统进行了系统的综述。对于某些疾病,医生已经成功地发明了短期有效的必要治疗方法,但在某些情况下,这种治疗可以持续一生。该系统的目标是通过指定患者遇到的症状来检测患者是否患有任何呼吸道疾病,通过系统为患者安排与相关专科医生的医院预约,以避免在Covid-19患者的情况下接触。这项研究将有助于提高患者对晚期发现呼吸系统疾病(如肺癌)的高风险的认识。冠状病毒等),并开发一种模型,通过移动应用程序帮助早期发现这种疾病。本综述的重点是鼓励医疗机构采用健康安卓app,帮助患者进行自我管理行为活动,如身体活动,通过症状来确定疾病的阶段(早期或危重),并使用app进行研究评估,提出药物建议,帮助患者监测和管理自己的健康状况。
{"title":"Android Application for Human Respiratory System Diagnosis: A Systematic Review","authors":"Adaora Obayi, Obinna Onyedeke, I. Uzo, Azuka Ijeomah","doi":"10.1109/ITED56637.2022.10051603","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051603","url":null,"abstract":"This paper presents a systematic review of android app respiratory system on smartphone. For some diseases, doctors have succeeded in inventing the necessary treatments that lasts for a short period, but in several cases, the treatment can stay for a lifetime. The goal of this system is to detect if a patient has any respiratory disease(s) by specifying the symptoms the patient encounters, schedules an appointement in the hospital for patient through the system to the linked specialist doctors to avoid contact in the case of Covid-19 patient. This research will help raise patient's awareness of the high risk of late discovery of having respiratory diseases (like Lung Cancer. corona virus etc), and also to develop a model that will help detect this disease early through mobile application. The focus of this review is to encourage medical institutions to adopt the health android app that can help patients in self-managing behavioral activities such as physical activities, using symptoms to determine the stage(early or critical) of the disease and drug suggestions with research evaluation using the app, this could help patients monitor and manage their health conditions.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122014703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Security of Content: A Study of User-resilience and Pre-checks on Social Media 内容的隐私和安全:社交媒体用户弹性和预检研究
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051589
C. Nwankwo, Francis Uwadia, W. Nwankwo, Wifred Adigwe, P. Chinedu, Emmanuel Ojei
In recent times, cybercrimes, kidnapping, and ritual killings are being enabled through the use and abuse of social media technologies and students are becoming cheap targets. Consequently, this study seeks to investigate the imperative of electronic communication styles among students via social media channels vis-a-vis the users' resilience before and during communication on social media to ensure that the message is routed to the intended recipient. In this study, we adopted the case study approach and 3500 students were drawn from different academic programmes in a known tertiary institution in Southern Nigeria. Validly completed questionnaires from 1000 students were analyzed. Findings revealed that 96% of the students who use social media are not concerned with any form of security screening before sending messages on social media networks via their smartphones.
近年来,网络犯罪、绑架和仪式杀人通过使用和滥用社交媒体技术得以实现,学生正成为廉价的目标。因此,本研究旨在调查学生通过社交媒体渠道进行电子沟通的必要性,以及用户在社交媒体上沟通之前和期间的弹性,以确保信息被路由到预期的收件人。在这项研究中,我们采用了案例研究方法,从尼日利亚南部一所知名高等教育机构的不同学术课程中抽取了3500名学生。对1000名学生有效填写的问卷进行分析。调查结果显示,96%使用社交媒体的学生在通过智能手机在社交媒体网络上发送信息之前,并不担心任何形式的安全检查。
{"title":"Privacy and Security of Content: A Study of User-resilience and Pre-checks on Social Media","authors":"C. Nwankwo, Francis Uwadia, W. Nwankwo, Wifred Adigwe, P. Chinedu, Emmanuel Ojei","doi":"10.1109/ITED56637.2022.10051589","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051589","url":null,"abstract":"In recent times, cybercrimes, kidnapping, and ritual killings are being enabled through the use and abuse of social media technologies and students are becoming cheap targets. Consequently, this study seeks to investigate the imperative of electronic communication styles among students via social media channels vis-a-vis the users' resilience before and during communication on social media to ensure that the message is routed to the intended recipient. In this study, we adopted the case study approach and 3500 students were drawn from different academic programmes in a known tertiary institution in Southern Nigeria. Validly completed questionnaires from 1000 students were analyzed. Findings revealed that 96% of the students who use social media are not concerned with any form of security screening before sending messages on social media networks via their smartphones.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116972017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Transmission Performance of Step Index Plastic Optical Fiber 提高阶跃折射率塑料光纤的传输性能
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051295
I. Yau, S. Sani, A. D. Usman, A. Tekanyi, A. M. Abba, D. Gambo
The use of Plastic Optical Fiber (POF) cable has the potential to enhance broadband transmission, particularly in the indoor access network. The POF cable offers a cost-effective solution because it is much easier to install and less expensive than glass optical fiber. The biggest drawback of the POF cable is intermodal dispersion, which reduces the link bandwidth of a 100 m length of cable to approximately 40 MHz. Numerous studies are being conducted to enhance the bandwidth-length product of POF. This work seeks to minimize the intermodal dispersion of the cable by finding optimal materials for the core and cladding of the cable with the improved bandwidth-length product. The results obtained indicate that the optimal core and cladding materials have refractive indices of 1.4865 and 1.4756, respectively. The intermodal dispersion per unit length is found to be 36.169 ps/m. The bandwidth of 100 m of the improved POF cable is therefore 121.65 MHz. A RoF communication system based on the developed POF is designed using the Optisystem16 software tool. The Bit Error Rate (BER) performance of the system in terms of quality factor is evaluated. A maximum achievable POF cable length of 117 m is obtained for a transmission data rate of 1 Gbps with an acceptable quality factor of 7.0.
塑料光纤(POF)电缆的使用具有增强宽带传输的潜力,特别是在室内接入网中。POF电缆提供了一种经济有效的解决方案,因为它比玻璃光纤更容易安装,更便宜。POF电缆最大的缺点是多式频散,它将100米长的电缆的链路带宽减少到大约40兆赫兹。人们正在进行大量的研究来提高POF的带宽-长度乘积。这项工作旨在通过寻找具有改进带宽长度产品的电缆芯和包层的最佳材料来最大限度地减少电缆的多式联运色散。结果表明,最优芯和包层材料的折射率分别为1.4865和1.4756。单位长度的多式联运色散为36.169 ps/m。因此,改进后的POF电缆100m带宽为121.65 MHz。利用Optisystem16软件工具设计了基于所开发的POF的RoF通信系统。从质量因子的角度对系统的误码率性能进行了评价。在传输数据速率为1gbps的情况下,可实现的最大POF电缆长度为117米,可接受的质量系数为7.0。
{"title":"Enhancing the Transmission Performance of Step Index Plastic Optical Fiber","authors":"I. Yau, S. Sani, A. D. Usman, A. Tekanyi, A. M. Abba, D. Gambo","doi":"10.1109/ITED56637.2022.10051295","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051295","url":null,"abstract":"The use of Plastic Optical Fiber (POF) cable has the potential to enhance broadband transmission, particularly in the indoor access network. The POF cable offers a cost-effective solution because it is much easier to install and less expensive than glass optical fiber. The biggest drawback of the POF cable is intermodal dispersion, which reduces the link bandwidth of a 100 m length of cable to approximately 40 MHz. Numerous studies are being conducted to enhance the bandwidth-length product of POF. This work seeks to minimize the intermodal dispersion of the cable by finding optimal materials for the core and cladding of the cable with the improved bandwidth-length product. The results obtained indicate that the optimal core and cladding materials have refractive indices of 1.4865 and 1.4756, respectively. The intermodal dispersion per unit length is found to be 36.169 ps/m. The bandwidth of 100 m of the improved POF cable is therefore 121.65 MHz. A RoF communication system based on the developed POF is designed using the Optisystem16 software tool. The Bit Error Rate (BER) performance of the system in terms of quality factor is evaluated. A maximum achievable POF cable length of 117 m is obtained for a transmission data rate of 1 Gbps with an acceptable quality factor of 7.0.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Skin Disease Classification using Deep Learning Methods 基于深度学习方法的皮肤病分类
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051236
Kehinde Adebola Olatunji, A. Oguntimilehin, O. Adeyemo, O. Aweh, Adeola Ibukun Abiodun, O. Bello
One of the major illnesses combating human races is Skin disease. Some skin diseases if not detected and treated early can result into cancer - a killer disease or disfigure the bearer. Discovery of these diseases frequently relies on the expertise of the medical professionals and skin biopsy results, in which sometimes the accuracy and prediction is deficient and as well is time consuming. Misdiagnosis is very rampart because these diseases always look alike, and could possibly be mistaken for each other. Therefore, there is need for a computer-based system for skin disease identification and classification through images to improve the diagnostic accuracy as well as to handle the scarcity of human experts. The current research sought to classify three selected skin diseases (Benign keratosis, Actinic keratosis and Dermatofibroma) that could disfigure or lead to cancer if proper diagnosis is not given. A convolutional neural network method designed upon tensor flow framework was used for the classification of the diseases. At the end of the implementation, results from the proposed system exhibits disease identification accuracy of 72% for Benign keratosis, 77% for Actinic keratosis and 69% for Dermatofibroma.
皮肤病是人类面临的主要疾病之一。有些皮肤病如果不及早发现和治疗,可能会导致癌症——一种致命的疾病,或者使患者毁容。这些疾病的发现往往依赖于医疗专业人员的专业知识和皮肤活检结果,有时准确性和预测不足,而且耗时。误诊是非常困难的,因为这些疾病总是看起来很相似,并且可能被误认为是彼此。因此,需要一个基于计算机的系统,通过图像来识别和分类皮肤病,以提高诊断的准确性,并解决人类专家的稀缺问题。目前的研究试图对三种选定的皮肤病(良性角化病、光化性角化病和皮肤纤维瘤)进行分类,如果不给予适当的诊断,这些疾病可能会毁损或导致癌症。采用基于张量流框架的卷积神经网络方法对疾病进行分类。在实施结束时,该系统的结果显示良性角化病的疾病识别准确率为72%,光化性角化病为77%,皮肤纤维瘤为69%。
{"title":"Skin Disease Classification using Deep Learning Methods","authors":"Kehinde Adebola Olatunji, A. Oguntimilehin, O. Adeyemo, O. Aweh, Adeola Ibukun Abiodun, O. Bello","doi":"10.1109/ITED56637.2022.10051236","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051236","url":null,"abstract":"One of the major illnesses combating human races is Skin disease. Some skin diseases if not detected and treated early can result into cancer - a killer disease or disfigure the bearer. Discovery of these diseases frequently relies on the expertise of the medical professionals and skin biopsy results, in which sometimes the accuracy and prediction is deficient and as well is time consuming. Misdiagnosis is very rampart because these diseases always look alike, and could possibly be mistaken for each other. Therefore, there is need for a computer-based system for skin disease identification and classification through images to improve the diagnostic accuracy as well as to handle the scarcity of human experts. The current research sought to classify three selected skin diseases (Benign keratosis, Actinic keratosis and Dermatofibroma) that could disfigure or lead to cancer if proper diagnosis is not given. A convolutional neural network method designed upon tensor flow framework was used for the classification of the diseases. At the end of the implementation, results from the proposed system exhibits disease identification accuracy of 72% for Benign keratosis, 77% for Actinic keratosis and 69% for Dermatofibroma.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127302744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cognitive Analysis of Covid-19 on the Africa Economy Using Linear Regression 基于线性回归的新冠肺炎对非洲经济的认知分析
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051365
Jesufunbi Damilola Bolarinwa, O. R. Vincent, O. Ojo, M. Omeike, Abayomi Victor Opakunle, Olawale David Oyedeji
The coronavirus outbreak in 2020 has made it difficult to implement macroeconomic initiatives and has affected the economy in all countries in Africa. There has been a lot of concern regarding how to stabilize the economy at least to where it was before the coronavirus outbreak. There was increased governmental allocation to combat the spread and reduce COVID-19's impacts. This study evaluates the economic impacts of the COVID-19 pandemic on some African countries and examines the cognitive analysis as it affects the economy considering layoffs and other revenue losses, as well as a consistent recession and deterioration in the banking and economic sectors. A linear regression method was used in the analysis of this work. Although the pandemic affects every aspect of life and society at large, this study examines how it affects the nation's economy. It was recognized that numerous policy instruments, including those connected to health and social protection, fiscal policy, and financial, industrial, and trade policies, needed to be implemented for the economy to recover properly from the financial loss. The analysis of the data, shows that there was a reduction in the GDP of each country during the Covid-19 pandemic. It is predicted that adopting these technologies may minimize suffering among people and aid in the economy's recovery from recession and bankruptcy.
2020年的冠状病毒疫情给宏观经济举措的实施带来了困难,并影响了非洲所有国家的经济。对于如何将经济稳定到至少是冠状病毒爆发前的水平,人们有很多担忧。政府加大了抗击疫情传播和减少疫情影响的拨款。本研究评估了COVID-19大流行对一些非洲国家的经济影响,并考察了认知分析,因为考虑到裁员和其他收入损失,以及银行和经济部门的持续衰退和恶化,它会影响经济。本文采用线性回归方法进行分析。尽管大流行影响着生活和社会的方方面面,但本研究考察了它对国家经济的影响。人们认识到,为了使经济从财政损失中适当恢复,需要执行许多政策工具,包括与保健和社会保护、财政政策以及金融、工业和贸易政策有关的政策工具。对数据的分析表明,在2019冠状病毒病大流行期间,每个国家的GDP都有所下降。据预测,采用这些技术可以最大限度地减少人们的痛苦,并有助于经济从衰退和破产中复苏。
{"title":"A Cognitive Analysis of Covid-19 on the Africa Economy Using Linear Regression","authors":"Jesufunbi Damilola Bolarinwa, O. R. Vincent, O. Ojo, M. Omeike, Abayomi Victor Opakunle, Olawale David Oyedeji","doi":"10.1109/ITED56637.2022.10051365","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051365","url":null,"abstract":"The coronavirus outbreak in 2020 has made it difficult to implement macroeconomic initiatives and has affected the economy in all countries in Africa. There has been a lot of concern regarding how to stabilize the economy at least to where it was before the coronavirus outbreak. There was increased governmental allocation to combat the spread and reduce COVID-19's impacts. This study evaluates the economic impacts of the COVID-19 pandemic on some African countries and examines the cognitive analysis as it affects the economy considering layoffs and other revenue losses, as well as a consistent recession and deterioration in the banking and economic sectors. A linear regression method was used in the analysis of this work. Although the pandemic affects every aspect of life and society at large, this study examines how it affects the nation's economy. It was recognized that numerous policy instruments, including those connected to health and social protection, fiscal policy, and financial, industrial, and trade policies, needed to be implemented for the economy to recover properly from the financial loss. The analysis of the data, shows that there was a reduction in the GDP of each country during the Covid-19 pandemic. It is predicted that adopting these technologies may minimize suffering among people and aid in the economy's recovery from recession and bankruptcy.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud Detection System for Effective Healthcare Administration in Nigeria using Apache Hive and Big Data Analytics: Reflection on the National Health Insurance Scheme 尼日利亚使用Apache Hive和大数据分析的有效医疗管理欺诈检测系统:对国家医疗保险计划的反思
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051541
Justin Onyarin Ogala, E. S. Mughele, S. Chiemeke
Nigerian researchers have shown that the lack of adequate mechanisms for fraud detection has impaired both providers and beneficiaries of this scheme. This work develops a fraud detection program for Nigeria's National Health Insurance Scheme (NHIS). Nigeria's National Health Insurance Scheme (NHIS) and Health Maintenance Organizations (HMOs) are the subjects of this study. The study was conducted using available data from NHIS-registered healthcare facilities and HMOs. Unified Modeling Language (UML) tools were used to create the framework. The framework was built with Apache Derby DB, Hadoop Distributed File System (HDFS), and Apache MapReduce as the big data processing platform. Using Apache Hive and Big Data Analytics, a system for detecting healthcare fraud is developed. This system used data from the Nigerian National Health Insurance Scheme (NHIS), which was broken down into three categories: enrolment, referral, and claim data. The analysis of current healthcare investigative methods is conducted, and a new framework is proposed.
尼日利亚的研究人员已经表明,缺乏足够的欺诈检测机制损害了该计划的提供者和受益者。这项工作为尼日利亚国家健康保险计划(NHIS)制定了欺诈检测方案。尼日利亚的国家健康保险计划(NHIS)和健康维护组织(HMOs)是本研究的主题。该研究使用了国家卫生保健系统注册的医疗机构和hmo的现有数据。使用统一建模语言(UML)工具来创建框架。该框架采用Apache Derby DB、Hadoop HDFS、Apache MapReduce作为大数据处理平台。利用Apache Hive和大数据分析技术,开发了一个医疗保健欺诈检测系统。该系统使用来自尼日利亚国家健康保险计划(NHIS)的数据,该数据分为三类:登记、转诊和索赔数据。分析了当前的医疗保健调查方法,并提出了一个新的框架。
{"title":"Fraud Detection System for Effective Healthcare Administration in Nigeria using Apache Hive and Big Data Analytics: Reflection on the National Health Insurance Scheme","authors":"Justin Onyarin Ogala, E. S. Mughele, S. Chiemeke","doi":"10.1109/ITED56637.2022.10051541","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051541","url":null,"abstract":"Nigerian researchers have shown that the lack of adequate mechanisms for fraud detection has impaired both providers and beneficiaries of this scheme. This work develops a fraud detection program for Nigeria's National Health Insurance Scheme (NHIS). Nigeria's National Health Insurance Scheme (NHIS) and Health Maintenance Organizations (HMOs) are the subjects of this study. The study was conducted using available data from NHIS-registered healthcare facilities and HMOs. Unified Modeling Language (UML) tools were used to create the framework. The framework was built with Apache Derby DB, Hadoop Distributed File System (HDFS), and Apache MapReduce as the big data processing platform. Using Apache Hive and Big Data Analytics, a system for detecting healthcare fraud is developed. This system used data from the Nigerian National Health Insurance Scheme (NHIS), which was broken down into three categories: enrolment, referral, and claim data. The analysis of current healthcare investigative methods is conducted, and a new framework is proposed.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132192070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th Information Technology for Education and Development (ITED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1