首页 > 最新文献

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)最新文献

英文 中文
The Avoidance And Detection Function Of Artificial Intelligence In Covid-19 人工智能在Covid-19中的规避和检测功能
Alaa Amjed Abdulateef, Alaa Hamid Mohammed, Ihsan Amjad Abdulateef
The whole planet today is having to fight COVID-19 with big obstacles. The COVID-19 influenced several countries around the world between December 2019 and the present day. Many organisations and scientists seek to find a vaccine and to minimize the spread of COVID-19. Artificial Intelligence is one technology that can successfully address this virus (AI). In the case of other pathogens, artificial intelligence performed very well and could help us cope with the virus COVID-19, too. It is the imagination and the information of the people who use it which will help to overcome this dilemma. In some previous instances AI played a major role in virus prevention and identification. We have an ability to detect certain aspects of the AI because of the COVID-19 crisis. Machine learning that an AI subclass is used to identify patterns and to plan valuable knowledge based on recorded data sets. At the point where used entirely, AI can exceed human efforts by speed and differentiate designs from knowledge previously ignored. However many correct and appropriate data are needed for effective implementation of AI systems. This paper discusses the AI's role in COVID-19 prevention and detection and examines numerous technological aspects of AI. This paper would also clarify where AI will contribute with likely solutions to stop the spread of COVID-19.
今天,整个地球都不得不在抗击COVID-19的过程中遇到巨大障碍。2019年12月至今,COVID-19影响了世界上几个国家。许多组织和科学家都在寻求疫苗,以尽量减少COVID-19的传播。人工智能是一种能够成功应对这种病毒(AI)的技术。在其他病原体的情况下,人工智能表现非常好,也可以帮助我们应对COVID-19病毒。使用它的人的想象力和信息将有助于克服这一困境。在以前的一些情况下,人工智能在病毒预防和识别方面发挥了重要作用。由于COVID-19危机,我们有能力检测人工智能的某些方面。机器学习,人工智能子类用于识别模式,并根据记录的数据集规划有价值的知识。在完全使用的情况下,人工智能可以在速度上超越人类的努力,并将设计与以前被忽视的知识区分开来。然而,为了有效地实施人工智能系统,需要许多正确和适当的数据。本文讨论了人工智能在COVID-19预防和检测中的作用,并探讨了人工智能的许多技术方面。本文还将阐明人工智能将在哪些方面为阻止COVID-19的传播做出贡献。
{"title":"The Avoidance And Detection Function Of Artificial Intelligence In Covid-19","authors":"Alaa Amjed Abdulateef, Alaa Hamid Mohammed, Ihsan Amjad Abdulateef","doi":"10.1109/HORA52670.2021.9461280","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461280","url":null,"abstract":"The whole planet today is having to fight COVID-19 with big obstacles. The COVID-19 influenced several countries around the world between December 2019 and the present day. Many organisations and scientists seek to find a vaccine and to minimize the spread of COVID-19. Artificial Intelligence is one technology that can successfully address this virus (AI). In the case of other pathogens, artificial intelligence performed very well and could help us cope with the virus COVID-19, too. It is the imagination and the information of the people who use it which will help to overcome this dilemma. In some previous instances AI played a major role in virus prevention and identification. We have an ability to detect certain aspects of the AI because of the COVID-19 crisis. Machine learning that an AI subclass is used to identify patterns and to plan valuable knowledge based on recorded data sets. At the point where used entirely, AI can exceed human efforts by speed and differentiate designs from knowledge previously ignored. However many correct and appropriate data are needed for effective implementation of AI systems. This paper discusses the AI's role in COVID-19 prevention and detection and examines numerous technological aspects of AI. This paper would also clarify where AI will contribute with likely solutions to stop the spread of COVID-19.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126801110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and Assembly of A Smart Recycling Bin 智能回收箱的设计与组装
M. Makhseed, F. Salam, S. El-Aswad, S. Esmaeili
Concentration of air pollutants exceeds levels associated with increased risk of health programs. In order to obtain a healthier quality of life with minimized health risks, a reduction of pollution is needed. A major factor of air pollution in urban cities is the burning of waste. Therefore, a reduction in pollution levels can be achieved by reducing waste. This paper discusses the design and implementation of a smart recycling bin (Enviro-Bin). The smart recycling bin filters the waste according to the following material types: metal, glass, and paper. Filtering waste according to material type will consequently lead to decreasing the amount of harmful gases produced from burning the waste and encourage recycling. The proposed prototype is an automated waste material filtering system that contains infrared sensors and two proximity sensors, an inductive sensor and a capacitive one, to determine the presence and type of material. Moreover, each compartment includes an IR sensor to detect the level of the waste in the container.
空气污染物的浓度超过了与健康项目风险增加相关的水平。为了在尽量减少健康风险的情况下获得更健康的生活质量,需要减少污染。城市空气污染的一个主要因素是焚烧垃圾。因此,可以通过减少浪费来减少污染水平。本文讨论了智能回收箱(environment - bin)的设计与实现。智能回收箱根据以下材料类型进行过滤:金属、玻璃和纸张。根据材料类型对废物进行过滤将减少燃烧废物产生的有害气体的数量,并鼓励回收利用。提出的原型是一个自动废物过滤系统,包含红外传感器和两个接近传感器,一个电感传感器和一个电容传感器,以确定材料的存在和类型。此外,每个隔间包括一个红外传感器,以检测容器中的废物水平。
{"title":"Design and Assembly of A Smart Recycling Bin","authors":"M. Makhseed, F. Salam, S. El-Aswad, S. Esmaeili","doi":"10.1109/HORA52670.2021.9461315","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461315","url":null,"abstract":"Concentration of air pollutants exceeds levels associated with increased risk of health programs. In order to obtain a healthier quality of life with minimized health risks, a reduction of pollution is needed. A major factor of air pollution in urban cities is the burning of waste. Therefore, a reduction in pollution levels can be achieved by reducing waste. This paper discusses the design and implementation of a smart recycling bin (Enviro-Bin). The smart recycling bin filters the waste according to the following material types: metal, glass, and paper. Filtering waste according to material type will consequently lead to decreasing the amount of harmful gases produced from burning the waste and encourage recycling. The proposed prototype is an automated waste material filtering system that contains infrared sensors and two proximity sensors, an inductive sensor and a capacitive one, to determine the presence and type of material. Moreover, each compartment includes an IR sensor to detect the level of the waste in the container.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122285886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of a Mobile Application for Teaching and Analyzing RLC Circuits RLC电路教学与分析移动应用的实现
A. Duru, K. Ileri
RLC circuits are fundamental topics for engineering undergraduate students especially in electrical and electronics majors, and they have numerous applications to design electrical circuits. Medical devices, mobile phones, computers, FM radios, and TVs are just a few examples that use different forms of RLC circuits. Although the circuits are very useful for an intended application, step-by-step calculations must be done to analyze the behavior of each component in the circuitry. In this study, a mobile application was developed to catch the difference between two types of RLC circuits, series and parallel, and understand the effects of each components’ value change by checking simulation results.
RLC电路是工科本科生特别是电气电子专业的基础课程,在电路设计中有着广泛的应用。医疗设备、移动电话、计算机、调频收音机和电视只是使用不同形式的RLC电路的几个例子。虽然电路对预期的应用非常有用,但必须一步一步地进行计算来分析电路中每个组件的行为。在本研究中,我们开发了一个移动应用程序来捕捉串联和并联两种RLC电路的差异,并通过检查仿真结果来了解每种元件值变化的影响。
{"title":"Implementation of a Mobile Application for Teaching and Analyzing RLC Circuits","authors":"A. Duru, K. Ileri","doi":"10.1109/HORA52670.2021.9461384","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461384","url":null,"abstract":"RLC circuits are fundamental topics for engineering undergraduate students especially in electrical and electronics majors, and they have numerous applications to design electrical circuits. Medical devices, mobile phones, computers, FM radios, and TVs are just a few examples that use different forms of RLC circuits. Although the circuits are very useful for an intended application, step-by-step calculations must be done to analyze the behavior of each component in the circuitry. In this study, a mobile application was developed to catch the difference between two types of RLC circuits, series and parallel, and understand the effects of each components’ value change by checking simulation results.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Anomaly Detection Approaches Performed Through Deep Learning Methods in SCADA Systems 基于深度学习的SCADA系统异常检测方法分析
H. Altunay, Zafer Albayrak, A. Özalp, Muhammet Çakmak
Supervisory control and data acquisition (SCADA) systems are used with monitoring and control purposes for the process not to fail in industrial control systems. Today, the increase in the use of standard protocols, hardware, and software in the SCADA systems that can connect to the internet and institutional networks causes these systems to become a target for more cyber-attacks. Intrusion detection systems are used to reduce or minimize cyber-attack threats. The use of deep learning-based intrusion detection systems also increases in parallel with the increase in the amount of data in the SCADA systems. The unsupervised feature learning present in the deep learning approaches enables the learning of important features within the large datasets. The features learned in an unsupervised way by using deep learning techniques are used in order to classify the data as normal or abnormal. Architectures such as convolutional neural network (CNN), Autoencoder (AE), deep belief network (DBN), and long short-term memory network (LSTM) are used to learn the features of SCADA data. These architectures use softmax function, extreme learning machine (ELM), deep belief networks, and multilayer perceptron (MLP) in the classification process. In this study, anomaly-based intrusion detection systems consisting of convolutional neural network, autoencoder, deep belief network, long short-term memory network, or various combinations of these methods on the SCADA networks in the literature were analyzed and the positive and negative aspects of these approaches were explained through their attack detection performances.
在工业控制系统中,监控和数据采集(SCADA)系统用于监控和控制目的,以确保过程不会失败。如今,SCADA系统中可以连接到互联网和机构网络的标准协议、硬件和软件的使用越来越多,导致这些系统成为更多网络攻击的目标。入侵检测系统用于减少或最小化网络攻击威胁。基于深度学习的入侵检测系统的使用也随着SCADA系统中数据量的增加而增加。深度学习方法中的无监督特征学习可以学习大型数据集中的重要特征。使用深度学习技术以无监督的方式学习的特征用于将数据分类为正常或异常。采用卷积神经网络(CNN)、自动编码器(AE)、深度信念网络(DBN)和长短期记忆网络(LSTM)等架构学习SCADA数据的特征。这些架构在分类过程中使用了softmax函数、极限学习机(ELM)、深度信念网络和多层感知器(MLP)。本研究分析了基于异常的入侵检测系统,包括卷积神经网络、自编码器、深度信念网络、长短期记忆网络或这些方法在SCADA网络上的各种组合,并通过这些方法的攻击检测性能来解释这些方法的优缺点。
{"title":"Analysis of Anomaly Detection Approaches Performed Through Deep Learning Methods in SCADA Systems","authors":"H. Altunay, Zafer Albayrak, A. Özalp, Muhammet Çakmak","doi":"10.1109/HORA52670.2021.9461273","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461273","url":null,"abstract":"Supervisory control and data acquisition (SCADA) systems are used with monitoring and control purposes for the process not to fail in industrial control systems. Today, the increase in the use of standard protocols, hardware, and software in the SCADA systems that can connect to the internet and institutional networks causes these systems to become a target for more cyber-attacks. Intrusion detection systems are used to reduce or minimize cyber-attack threats. The use of deep learning-based intrusion detection systems also increases in parallel with the increase in the amount of data in the SCADA systems. The unsupervised feature learning present in the deep learning approaches enables the learning of important features within the large datasets. The features learned in an unsupervised way by using deep learning techniques are used in order to classify the data as normal or abnormal. Architectures such as convolutional neural network (CNN), Autoencoder (AE), deep belief network (DBN), and long short-term memory network (LSTM) are used to learn the features of SCADA data. These architectures use softmax function, extreme learning machine (ELM), deep belief networks, and multilayer perceptron (MLP) in the classification process. In this study, anomaly-based intrusion detection systems consisting of convolutional neural network, autoencoder, deep belief network, long short-term memory network, or various combinations of these methods on the SCADA networks in the literature were analyzed and the positive and negative aspects of these approaches were explained through their attack detection performances.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Development of single-Axis Wheel Speed Sensor HiL Test Bench for Vehicle Velocity Control 车辆速度控制单轴轮速传感器HiL试验台的研制
Jan-Philipp Kress, A. Morgado-Estevez, F. Perez-Peña, K. Schmidt, Hektor Hebert
The precise measurement and processing of dynamic vehicle data lays the foundation for modern active safety systems and driver assistance systems for automobiles and two-wheelers. For the determination of the longitudinal vehicle dynamics, sensing the wheel speed is one elementary measured quantity. This paper proposes a Hardware in the Loop (HiL) test bench that is used for the development and evaluation of a velocity measurement, consisting of two redundant magneto-resistive sensor elements and an encoder disk. This is intended to precisely determine the vehicle velocity on the rear axle (single axis) of scooters with an engine displacement of 50 cubic centimeters. Therefore, a stepper motor powers the encoder disk on which two sensors are placed. An Electronic Control Unit (ECU) manages the measurement, the motor control, the Human Machine Interface (HMI) and the real-time communication through a serial interface to the computer, running the simulation. To represent the virtual test vehicle, the mathematical model is integrated into Matlab Simulink. The test bench was developed under the criteria of low cost, small size and different operating modes.
车辆动态数据的精确测量和处理是现代汽车和两轮车主动安全系统和驾驶员辅助系统的基础。为了确定车辆的纵向动力学特性,车轮速度的感知是一个基本的测量量。本文提出了一种由两个冗余磁阻传感器元件和一个编码器盘组成的硬件在环(HiL)测试台,用于速度测量的开发和评估。这是为了精确地确定发动机排量为50立方厘米的摩托车后轴(单轴)上的车辆速度。因此,一个步进电机为放置两个传感器的编码器磁盘提供动力。电子控制单元(ECU)管理测量、电机控制、人机界面(HMI)以及通过串行接口与计算机的实时通信,运行仿真。为了表示虚拟试验车辆,将数学模型集成到Matlab Simulink中。该试验台是按照低成本、小体积、多工况的原则研制的。
{"title":"Development of single-Axis Wheel Speed Sensor HiL Test Bench for Vehicle Velocity Control","authors":"Jan-Philipp Kress, A. Morgado-Estevez, F. Perez-Peña, K. Schmidt, Hektor Hebert","doi":"10.1109/HORA52670.2021.9461305","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461305","url":null,"abstract":"The precise measurement and processing of dynamic vehicle data lays the foundation for modern active safety systems and driver assistance systems for automobiles and two-wheelers. For the determination of the longitudinal vehicle dynamics, sensing the wheel speed is one elementary measured quantity. This paper proposes a Hardware in the Loop (HiL) test bench that is used for the development and evaluation of a velocity measurement, consisting of two redundant magneto-resistive sensor elements and an encoder disk. This is intended to precisely determine the vehicle velocity on the rear axle (single axis) of scooters with an engine displacement of 50 cubic centimeters. Therefore, a stepper motor powers the encoder disk on which two sensors are placed. An Electronic Control Unit (ECU) manages the measurement, the motor control, the Human Machine Interface (HMI) and the real-time communication through a serial interface to the computer, running the simulation. To represent the virtual test vehicle, the mathematical model is integrated into Matlab Simulink. The test bench was developed under the criteria of low cost, small size and different operating modes.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131642752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of the sustainability of communication networks built on the basis of computer networks 基于计算机网络的通信网络可持续性评估
V. Gasimov, Adil Nastakalov
The article is devoted to the problem of quantitative assessment of the sustainability of communication channels or, more precisely, the sustainability of communication between two neighboring network nodes built on the basis of computer technology. Here, in order to achieve more accurate results, the process of assessing the quality of communication is carried out by determining the probability of its break within one segment. To carry out the calculations, network segments that are popular in practice are considered, where a different number of devices and communication lines are used. For this purpose, the article analyzes various models of network segments and examines the assessment of their stability. In particular, the “ 1x1” model is considered, built on one network device on each side and a plurality of communication lines between them; a “lx2” model built using one network device on one side and two network devices on the other side with two communication lines; and a 2x2” model built using two network devices on each side and four communication lines. It also compares the ring topology of the network- the”lxlxl” network model consisting of three elements, with these segment models. Finally, the optimal structure of complex networks located over a large geographical area is proposed in terms of sustainability and efficiency.
本文致力于通信通道可持续性的定量评估问题,或者更准确地说,基于计算机技术的两个相邻网络节点之间的通信可持续性。在这里,为了获得更准确的结果,通过确定其在一个片段内中断的概率来进行通信质量评估的过程。为了进行计算,考虑了在实践中流行的网段,其中使用了不同数量的设备和通信线路。为此,本文分析了各种网段模型,并对其稳定性进行了评估。特别考虑“1x1”模型,在每侧建立一个网络设备,它们之间有多条通信线路;在一侧使用一个网络设备,另一侧使用两个网络设备,使用两条通信线路构建的“lx2”模型;还有一个2x2英寸的模型,两边各有两个网络设备和四条通信线路。它还比较了网络的环形拓扑(由三个元素组成的“lxlxl”网络模型)与这些分段模型。最后,从可持续性和效率两方面提出了大地理区域复杂网络的最优结构。
{"title":"Assessment of the sustainability of communication networks built on the basis of computer networks","authors":"V. Gasimov, Adil Nastakalov","doi":"10.1109/HORA52670.2021.9461348","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461348","url":null,"abstract":"The article is devoted to the problem of quantitative assessment of the sustainability of communication channels or, more precisely, the sustainability of communication between two neighboring network nodes built on the basis of computer technology. Here, in order to achieve more accurate results, the process of assessing the quality of communication is carried out by determining the probability of its break within one segment. To carry out the calculations, network segments that are popular in practice are considered, where a different number of devices and communication lines are used. For this purpose, the article analyzes various models of network segments and examines the assessment of their stability. In particular, the “ 1x1” model is considered, built on one network device on each side and a plurality of communication lines between them; a “lx2” model built using one network device on one side and two network devices on the other side with two communication lines; and a 2x2” model built using two network devices on each side and four communication lines. It also compares the ring topology of the network- the”lxlxl” network model consisting of three elements, with these segment models. Finally, the optimal structure of complex networks located over a large geographical area is proposed in terms of sustainability and efficiency.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132951757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wrist Vein Recognition by Fusion of Multiple Handcrafted Methods 多手工方法融合的腕部静脉识别
F. O. Babalola, Önsen Toygar, Y. Bi̇ti̇ri̇m
A wrist vein recognition system is proposed in this paper. The system combines three texture-based feature descriptors, namely, multiple filters of Binarized Statistical Image Features (M-BSIF), 2D Gabor filter, and Histogram of Gradient orientation by Decision-Level Fusion. The method was tested on two publicly available datasets obtained from FYO and PUT databases. The proposed method outperforms the individual descriptors and achieves 95.63% and 93.92% accuracies on FYO and PUT databases, respectively.
本文提出了一种腕部静脉识别系统。该系统结合了三种基于纹理的特征描述符,即二值化统计图像特征多滤波器(M-BSIF)、二维Gabor滤波器和Decision-Level Fusion梯度方向直方图。该方法在FYO和PUT数据库中获得的两个公开可用数据集上进行了测试。该方法优于单个描述符,在FYO和PUT数据库上分别达到95.63%和93.92%的准确率。
{"title":"Wrist Vein Recognition by Fusion of Multiple Handcrafted Methods","authors":"F. O. Babalola, Önsen Toygar, Y. Bi̇ti̇ri̇m","doi":"10.1109/HORA52670.2021.9461367","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461367","url":null,"abstract":"A wrist vein recognition system is proposed in this paper. The system combines three texture-based feature descriptors, namely, multiple filters of Binarized Statistical Image Features (M-BSIF), 2D Gabor filter, and Histogram of Gradient orientation by Decision-Level Fusion. The method was tested on two publicly available datasets obtained from FYO and PUT databases. The proposed method outperforms the individual descriptors and achieves 95.63% and 93.92% accuracies on FYO and PUT databases, respectively.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124835207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[HORA 2021 Copyright notice] [HORA 2021版权声明]
{"title":"[HORA 2021 Copyright notice]","authors":"","doi":"10.1109/hora52670.2021.9461375","DOIUrl":"https://doi.org/10.1109/hora52670.2021.9461375","url":null,"abstract":"","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128020809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Web Page Detection Using N-gram Features Extracted From URLs 基于N-gram特征提取url的网络钓鱼网页检测
Mehmet Korkmaz, Emre Kocyigit, O. K. Sahingoz, B. Diri
Recently, cyber-attacks have increased worldwide, especially during the pandemic period. The number of connected devices in the world and the anonymous structure of the internet enable this security deficit for not only computer networks but also single computing devices. With the connected use of computing device in anytime and anywhere conditions, lots of real-world activities are transferred to the digital world by adapting them to new lifestyles. Thus, the concept of cybersecurity has become more focused not only for security admins but also for academicians/researchers. Phishing attacks, which hackers mostly prefer to use in the last decade, have become even more harmful because its focuses on the weakest part of the security chain: computer user. Therefore, it is extremely important to prevent these cyber-attacks before they reach users. Based on this idea, we aimed to implement a phishing detection system by using a Convolutional Neural Network with n-gram features that are extracted from URLs. There are different n-gram feature extraction techniques, and in this work, it is aimed to determine which of them is more effective for our proposals. As a second goal, it is aimed to discover what parameters of the n-gram work best. In experiments, it is discovered that unigram has the highest accuracy rate. It was observed that, instead of all the characters that are obtained in unigram, the specified 70 characters (regardless of case sensitivity) give the highest accuracy rate of 88.90% with a High-Risk URL dataset. Experimental results also showed that a URL can be classified (either as legitimate or phishing) in about 0.008 seconds. These metrics can be accepted at a very good rate both in accuracy and run-time efficiency.
最近,全球范围内的网络攻击有所增加,特别是在大流行期间。世界上连接设备的数量和互联网的匿名结构使得这种安全缺陷不仅存在于计算机网络,也存在于单个计算设备。随着计算设备在任何时间和任何地点的连接使用,许多现实世界的活动通过适应新的生活方式被转移到数字世界。因此,网络安全的概念不仅受到安全管理员的关注,也受到学者/研究人员的关注。网络钓鱼攻击是黑客在过去十年中最喜欢使用的一种攻击方式,它的危害甚至更大,因为它针对的是安全链中最薄弱的环节:计算机用户。因此,在这些网络攻击到达用户之前阻止它们是极其重要的。基于这个想法,我们的目标是通过使用从url中提取的n-gram特征的卷积神经网络来实现一个网络钓鱼检测系统。有不同的n-gram特征提取技术,在这项工作中,它的目的是确定哪一种对我们的建议更有效。作为第二个目标,它旨在发现n-gram的哪些参数最有效。在实验中,发现单格图具有最高的准确率。观察到,在高风险URL数据集中,指定的70个字符(不考虑大小写敏感性)的准确率最高,为88.90%,而不是以unigram形式获得的所有字符。实验结果还表明,一个URL可以在大约0.008秒内被分类(无论是合法的还是钓鱼的)。这些指标在准确性和运行时效率方面都能以非常高的速度被接受。
{"title":"Phishing Web Page Detection Using N-gram Features Extracted From URLs","authors":"Mehmet Korkmaz, Emre Kocyigit, O. K. Sahingoz, B. Diri","doi":"10.1109/HORA52670.2021.9461378","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461378","url":null,"abstract":"Recently, cyber-attacks have increased worldwide, especially during the pandemic period. The number of connected devices in the world and the anonymous structure of the internet enable this security deficit for not only computer networks but also single computing devices. With the connected use of computing device in anytime and anywhere conditions, lots of real-world activities are transferred to the digital world by adapting them to new lifestyles. Thus, the concept of cybersecurity has become more focused not only for security admins but also for academicians/researchers. Phishing attacks, which hackers mostly prefer to use in the last decade, have become even more harmful because its focuses on the weakest part of the security chain: computer user. Therefore, it is extremely important to prevent these cyber-attacks before they reach users. Based on this idea, we aimed to implement a phishing detection system by using a Convolutional Neural Network with n-gram features that are extracted from URLs. There are different n-gram feature extraction techniques, and in this work, it is aimed to determine which of them is more effective for our proposals. As a second goal, it is aimed to discover what parameters of the n-gram work best. In experiments, it is discovered that unigram has the highest accuracy rate. It was observed that, instead of all the characters that are obtained in unigram, the specified 70 characters (regardless of case sensitivity) give the highest accuracy rate of 88.90% with a High-Risk URL dataset. Experimental results also showed that a URL can be classified (either as legitimate or phishing) in about 0.008 seconds. These metrics can be accepted at a very good rate both in accuracy and run-time efficiency.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115426864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Conceptual Design of a Cargo UAV That Can Take-off and Land Vertically 垂直起降货运无人机概念设计
Sezgin Yolcu, M. Akdağ
Fixed-wing vertical take-off and landing (VTOL) unmanned aerial vehicle (UAV)s are designed to combine the advantages of multi-rotor UAVs and fixed-wing UAVs in different flight phases in a single UAV. Fixed-wing VTOL UAVs can achieve the mobility of multi-rotor UAVs in hovering, vertical take-off and landing flight phases. Since fixed-wing UAVs are known for their efficiency in power consumption, fixed-wing VTOL UAVs were created to efficiently perform the cruise phase of the flight for a similar reason. In this paper, we made the conceptual design of a fixed-wing VTOL UAV which is called “DOGA”. The mission of DOGA is to carry 0.5 kg. payload. Firstly, maximum take-off weight was calculated, and then the airfoil profile, wings geometry, and the propulsion systems were determined. Also, design and performance parameters of DOGA were calculated. As a result, conceptual design of DOGA was completed and all the needed parameters for the detail design of the fixed-wing VTOL UAV were derived.
固定翼垂直起降(VTOL)无人机是将多旋翼无人机和固定翼无人机在不同飞行阶段的优势结合在一架无人机上而设计的。固定翼垂直起降无人机可以实现多旋翼无人机在悬停、垂直起飞和降落飞行阶段的机动性。由于固定翼无人机以其功率消耗效率而闻名,固定翼垂直起降无人机的创建是为了有效地执行飞行的巡航阶段,原因类似。本文对一种固定翼垂直起降无人机“DOGA”进行了概念设计。DOGA的任务是携带0.5公斤。有效载荷。首先计算了最大起飞重量,然后确定了翼型轮廓、机翼几何形状和推进系统。同时,计算了DOGA的设计参数和性能参数。在此基础上,完成了垂直起降无人机的概念设计,并推导出了固定翼垂直起降无人机详细设计所需的参数。
{"title":"Conceptual Design of a Cargo UAV That Can Take-off and Land Vertically","authors":"Sezgin Yolcu, M. Akdağ","doi":"10.1109/HORA52670.2021.9461393","DOIUrl":"https://doi.org/10.1109/HORA52670.2021.9461393","url":null,"abstract":"Fixed-wing vertical take-off and landing (VTOL) unmanned aerial vehicle (UAV)s are designed to combine the advantages of multi-rotor UAVs and fixed-wing UAVs in different flight phases in a single UAV. Fixed-wing VTOL UAVs can achieve the mobility of multi-rotor UAVs in hovering, vertical take-off and landing flight phases. Since fixed-wing UAVs are known for their efficiency in power consumption, fixed-wing VTOL UAVs were created to efficiently perform the cruise phase of the flight for a similar reason. In this paper, we made the conceptual design of a fixed-wing VTOL UAV which is called “DOGA”. The mission of DOGA is to carry 0.5 kg. payload. Firstly, maximum take-off weight was calculated, and then the airfoil profile, wings geometry, and the propulsion systems were determined. Also, design and performance parameters of DOGA were calculated. As a result, conceptual design of DOGA was completed and all the needed parameters for the detail design of the fixed-wing VTOL UAV were derived.","PeriodicalId":270469,"journal":{"name":"2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1