首页 > 最新文献

2022 4th International Conference on Advanced Science and Engineering (ICOASE)最新文献

英文 中文
PV System Based Speed Control of Induction Motor by Space Vector Pulse Width Modulation 基于空间矢量脉宽调制的光伏系统异步电机速度控制
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075608
L. Mohammed, Salsabeel H. Taha
This work uses green energy to solve the problem of lacking electrical energy in agricultural areas. Thus, it suggests using photovoltaic systems to supply the engines used in irrigation in these areas where the load is variable. In addition, this work uses a three-phase inverter to achieve the lowest possible total harmonic distortion. Furthermore, the motor's torque is fixed at all speeds, while the volt-to-hertz ratio speed control of the induction motor is discussed in this paper. By varying the modulation index of the space-vector-pulse-width, the stator voltage of the induction motor can differ correspondingly. The time duration of gate pulses is changed to maintain the constant voltage-to-hertz ratio. Space-vector-pulse-width-modulation technique delivers the simulation and theoretical analysis. Moreover, PV cells drive the induction motors with a wide speed range. Simulation results were validated with practical outcomes.
这项工作利用绿色能源来解决农业地区缺乏电力的问题。因此,它建议在这些地区使用光伏系统来提供用于灌溉的发动机,这些地区的负荷是可变的。此外,这项工作使用三相逆变器来实现尽可能低的总谐波失真。此外,在所有转速下,电机的转矩是固定的,同时本文还讨论了感应电机的电压-赫兹比速度控制。通过改变空间矢量脉宽的调制指数,感应电动机的定子电压也会发生相应的变化。改变门脉冲的持续时间以保持恒定的电压-赫兹比。空间矢量脉宽调制技术进行了仿真和理论分析。此外,光伏电池驱动感应电机具有宽的速度范围。仿真结果与实际结果相吻合。
{"title":"PV System Based Speed Control of Induction Motor by Space Vector Pulse Width Modulation","authors":"L. Mohammed, Salsabeel H. Taha","doi":"10.1109/ICOASE56293.2022.10075608","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075608","url":null,"abstract":"This work uses green energy to solve the problem of lacking electrical energy in agricultural areas. Thus, it suggests using photovoltaic systems to supply the engines used in irrigation in these areas where the load is variable. In addition, this work uses a three-phase inverter to achieve the lowest possible total harmonic distortion. Furthermore, the motor's torque is fixed at all speeds, while the volt-to-hertz ratio speed control of the induction motor is discussed in this paper. By varying the modulation index of the space-vector-pulse-width, the stator voltage of the induction motor can differ correspondingly. The time duration of gate pulses is changed to maintain the constant voltage-to-hertz ratio. Space-vector-pulse-width-modulation technique delivers the simulation and theoretical analysis. Moreover, PV cells drive the induction motors with a wide speed range. Simulation results were validated with practical outcomes.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS Detection Using Active and Idle Features of Revised CICFlowMeter and Statistical Approaches 利用修正cicmeter的主动和空闲特性和统计方法进行DDoS检测
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075591
B. H. Ali, N. Sulaiman, S.A.R. Al-Haddad, R. Atan, S. L. Hassan
Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down targeted victim. CICFlowMeter tool generates bi-directional flows from packets. Each flow generates 83 of different features. The research focuses on 8 features which are active min (f1), active mean (f2), active max (f3), active std (f4), idle min (f5), idle mean (f6), idle max (f7), and idle std (f8). CICFlowMeter tool has several problems that affected on the detection accuracy of DDoS attacks. The idle and active based feature of Shannon entropy and sequential probability ratio test (SE-SPRT) approach was implemented in this research. The problems of original CICFlowMeter were presented, and the differences between original and revised version of CICFlowMeter tool were explored. The DARPA database and confusion matrix were used to evaluate the detection technique and present the comparison between two versions of CICFlowMeter. The detection method detected neptune and smurf attacks and had higher accuracy, f1-score, sensitivity, specificity, and precision when revised version of CICFlowMeter used to generate flows. However, the detection method failed to detect neptune attack and had higher miss-rate, lower accuracy, lower f1-score, and lower specificity, and lower precision when original version used in generating flows.
分布式拒绝服务(DDoS)攻击是针对服务器的最危险的攻击之一。这种攻击的主要后果是通过击倒目标受害者来阻止用户获得合法服务。CICFlowMeter工具根据报文生成双向流。每个流生成83个不同的特性。研究重点为8个特征,分别为活动min (f1)、活动mean (f2)、活动max (f3)、活动std (f4)、空闲min (f5)、空闲mean (f6)、空闲max (f7)、空闲std (f8)。CICFlowMeter工具存在几个影响DDoS攻击检测精度的问题。本研究实现了基于空闲和主动特征的香农熵和序列概率比检验(SE-SPRT)方法。介绍了原CICFlowMeter工具存在的问题,并探讨了原CICFlowMeter工具与修订版CICFlowMeter工具的差异。利用DARPA数据库和混淆矩阵对检测技术进行了评价,并对两个版本的CICFlowMeter进行了比较。该检测方法检测海王星和蓝精灵攻击,与使用修订版CICFlowMeter生成流量相比,具有更高的准确度、f1评分、灵敏度、特异性和精密度。但是,该检测方法无法检测到海王星攻击,在使用原始版本生成流时,缺失率较高,准确率较低,f1评分较低,特异性较低,精度较低。
{"title":"DDoS Detection Using Active and Idle Features of Revised CICFlowMeter and Statistical Approaches","authors":"B. H. Ali, N. Sulaiman, S.A.R. Al-Haddad, R. Atan, S. L. Hassan","doi":"10.1109/ICOASE56293.2022.10075591","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075591","url":null,"abstract":"Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down targeted victim. CICFlowMeter tool generates bi-directional flows from packets. Each flow generates 83 of different features. The research focuses on 8 features which are active min (f1), active mean (f2), active max (f3), active std (f4), idle min (f5), idle mean (f6), idle max (f7), and idle std (f8). CICFlowMeter tool has several problems that affected on the detection accuracy of DDoS attacks. The idle and active based feature of Shannon entropy and sequential probability ratio test (SE-SPRT) approach was implemented in this research. The problems of original CICFlowMeter were presented, and the differences between original and revised version of CICFlowMeter tool were explored. The DARPA database and confusion matrix were used to evaluate the detection technique and present the comparison between two versions of CICFlowMeter. The detection method detected neptune and smurf attacks and had higher accuracy, f1-score, sensitivity, specificity, and precision when revised version of CICFlowMeter used to generate flows. However, the detection method failed to detect neptune attack and had higher miss-rate, lower accuracy, lower f1-score, and lower specificity, and lower precision when original version used in generating flows.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121438597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating The Optimal Cluster Number For Vehicular Network Using Scott's Formula 用斯科特公式估计车辆网络的最优聚类数
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075588
F. E. Samann, Shavan K. Askar
Selecting the correct cluster number for K-Clustering algorithms such as K-Medoids is essential for optimal output. The Elbow and Silhouette methods are usually used to select the optimal K number for clustering. However, the high computational complexity makes these methods inefficient in Vehicular Network (VN) environment. Therefore, an efficient K estimating technique is essential for an effective VN clustering scheme. K-medoids algorithm is a Machine Learning clustering algorithm usually implemented by the road infrastructure in the VN. The algorithm selects cluster medoids that minimize the sum of dissimilarities between cluster members and their respective medoids. This paper proposes using Scott's histogram formula for bin numbers to calculate the optimal K number. Estimating the underlying probability density function of the data can give a good approximation of the K number for the K-Medoids algorithm. The clustering algorithm is simulated using OMNET++ and Veins simulators in a VN environment. Using Scott's formula, picking the optimal K number is evaluated against the Elbow method in different traffic density and vehicular speed scenarios. Scott's formula gave a close estimate of the K number when implemented using vehicle coordinates.
为K-Clustering算法(如K-Medoids)选择正确的聚类数对于获得最佳输出至关重要。通常采用肘部法和廓形法选择最优K数进行聚类。然而,这些方法的高计算复杂度使其在车联网环境下效率低下。因此,有效的K估计技术对于有效的VN聚类方案至关重要。K-medoids算法是一种机器学习聚类算法,通常由虚拟网络中的道路基础设施实现。该算法选择的簇介质值与簇成员的簇介质值之间的不相似度之和最小。本文提出使用斯科特的箱数直方图公式来计算最优K数。估计数据的潜在概率密度函数可以很好地近似K- medoids算法的K数。在虚拟网络环境下,使用omnet++和vein模拟器对聚类算法进行了仿真。利用Scott的公式,在不同的交通密度和车速情况下,用肘部法评估选择最优K数。斯科特的公式在使用车辆坐标时给出了K数的近似估计。
{"title":"Estimating The Optimal Cluster Number For Vehicular Network Using Scott's Formula","authors":"F. E. Samann, Shavan K. Askar","doi":"10.1109/ICOASE56293.2022.10075588","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075588","url":null,"abstract":"Selecting the correct cluster number for K-Clustering algorithms such as K-Medoids is essential for optimal output. The Elbow and Silhouette methods are usually used to select the optimal K number for clustering. However, the high computational complexity makes these methods inefficient in Vehicular Network (VN) environment. Therefore, an efficient K estimating technique is essential for an effective VN clustering scheme. K-medoids algorithm is a Machine Learning clustering algorithm usually implemented by the road infrastructure in the VN. The algorithm selects cluster medoids that minimize the sum of dissimilarities between cluster members and their respective medoids. This paper proposes using Scott's histogram formula for bin numbers to calculate the optimal K number. Estimating the underlying probability density function of the data can give a good approximation of the K number for the K-Medoids algorithm. The clustering algorithm is simulated using OMNET++ and Veins simulators in a VN environment. Using Scott's formula, picking the optimal K number is evaluated against the Elbow method in different traffic density and vehicular speed scenarios. Scott's formula gave a close estimate of the K number when implemented using vehicle coordinates.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127190646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2D Facial Images Attractiveness Assessment Based on Transfer Learning of Deep Convolutional Neural Networks 基于深度卷积神经网络迁移学习的二维面部图像吸引力评价
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075585
J. Saeed, A. Abdulazeez, D. Ibrahim
While beauty is subjective, it is not easy to quantify. Assessing facial beauty based on a computer perspective is an emerging research area with various applications. Different trainable models have been proposed to identify the attractiveness of facial beauty utilizing different types of features, machine learning techniques and lately, convolutional neural networks (CNNs) have proven their efficiency in image classification. The main objective of recent previous work is to enhance the performance of the existing trainable methods and make them suitable for beauty attractiveness identification. In this study, the accuracy and effectiveness of four affective pre-trained CNNs models (AlexNet, GoogleNet, ResNet-50, and VGG16) in assessing the attractiveness of human facial images using the CelebA dataset have been explored, evaluated, and analyzed. The results demonstrate that GoogleNet surpassed the investigated pre-trained networks with a performance accuracy of 82.8%.
虽然美是主观的,但它不容易量化。基于计算机视角的面部美评估是一个具有多种应用的新兴研究领域。人们提出了不同的可训练模型,利用不同类型的特征、机器学习技术和最近的卷积神经网络(cnn)来识别面部美女的吸引力,这些都证明了它们在图像分类方面的效率。最近前期工作的主要目标是提高现有可训练方法的性能,使其适用于美女吸引力识别。在这项研究中,四种情感预训练cnn模型(AlexNet、GoogleNet、ResNet-50和VGG16)在使用CelebA数据集评估人类面部图像吸引力方面的准确性和有效性进行了探索、评估和分析。结果表明,GoogleNet的性能准确率达到82.8%,超过了所研究的预训练网络。
{"title":"2D Facial Images Attractiveness Assessment Based on Transfer Learning of Deep Convolutional Neural Networks","authors":"J. Saeed, A. Abdulazeez, D. Ibrahim","doi":"10.1109/ICOASE56293.2022.10075585","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075585","url":null,"abstract":"While beauty is subjective, it is not easy to quantify. Assessing facial beauty based on a computer perspective is an emerging research area with various applications. Different trainable models have been proposed to identify the attractiveness of facial beauty utilizing different types of features, machine learning techniques and lately, convolutional neural networks (CNNs) have proven their efficiency in image classification. The main objective of recent previous work is to enhance the performance of the existing trainable methods and make them suitable for beauty attractiveness identification. In this study, the accuracy and effectiveness of four affective pre-trained CNNs models (AlexNet, GoogleNet, ResNet-50, and VGG16) in assessing the attractiveness of human facial images using the CelebA dataset have been explored, evaluated, and analyzed. The results demonstrate that GoogleNet surpassed the investigated pre-trained networks with a performance accuracy of 82.8%.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122267977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact Reconfigurable Band-Reject/All-Pass Microstrip Filter Using U-Shaped Slot 紧凑可重构带阻/全通微带滤波器使用u形槽
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075590
Arqam M. Shareef, Khalil H. Sayidmarie
This paper proposes a compact reconfigurable filter that uses a resonant element in the form of a folded slot. The U-shaped slot is embedded into the 50 Ohm microstrip line. Due to folding, the slot length is reduced to 1/4 the effective wavelength leading to considerable miniaturization compared with the filters that use resonant elements like rings or coupled open-circuited or short-circuited stubs. The presented design example at the WLAN frequency of 2.45 GHz can be configured between a band-reject and all-pass states, by placing a PIN diode at the centre of the slot. The proposed filter was investigated using the CST Studio Suite Software - 3D Electromagnetic Simulation. The obtained results showed low insertion loss in the band-pass state and high rejection in the stopband state. The tests of the fabricated prototype showed comparable results to the simulation one thus verifying the design.
本文提出了一种紧凑的可重构滤波器,该滤波器采用折叠槽形式的谐振元件。u型槽嵌入50欧姆微带线中。由于折叠,狭缝长度减少到有效波长的1/4,与使用环形或耦合开路或短路插脚等谐振元件的滤波器相比,具有相当的小型化。通过在插槽中心放置PIN二极管,可以将WLAN频率为2.45 GHz的设计示例配置为带阻和全通状态。利用CST Studio Suite软件- 3D电磁仿真对所提出的滤波器进行了研究。结果表明,带通状态下插入损耗低,阻带状态下抑制效果好。制造样机的试验结果与仿真结果相当,从而验证了设计的正确性。
{"title":"Compact Reconfigurable Band-Reject/All-Pass Microstrip Filter Using U-Shaped Slot","authors":"Arqam M. Shareef, Khalil H. Sayidmarie","doi":"10.1109/ICOASE56293.2022.10075590","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075590","url":null,"abstract":"This paper proposes a compact reconfigurable filter that uses a resonant element in the form of a folded slot. The U-shaped slot is embedded into the 50 Ohm microstrip line. Due to folding, the slot length is reduced to 1/4 the effective wavelength leading to considerable miniaturization compared with the filters that use resonant elements like rings or coupled open-circuited or short-circuited stubs. The presented design example at the WLAN frequency of 2.45 GHz can be configured between a band-reject and all-pass states, by placing a PIN diode at the centre of the slot. The proposed filter was investigated using the CST Studio Suite Software - 3D Electromagnetic Simulation. The obtained results showed low insertion loss in the band-pass state and high rejection in the stopband state. The tests of the fabricated prototype showed comparable results to the simulation one thus verifying the design.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison and Assessment of PV Module Power Prediction Based on ANN for Iraq Weather 基于人工神经网络的伊拉克天气光伏组件功率预测的比较与评价
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075594
Hussain Hamdi Khalaf, A. Mohammad, A. Hussain, Z. S. Al-sagar
An artificial neural network (ANN) with backward-propagation technique was used to predict the power generation of PV module in sunny and cloudy weathers of Baghdad city-Iraq. Experiment tests were investigated in winter and summer days to get the best sunny and cloudy days. Three weather parameters were measured including: solar irradiance, ambient temperature and wind speed. In addition, the output electrical characteristics of PV module (voltage, current, power) and module temperature were measured. Therefore, the dataset of ANN system consists of four input and one output. Furthermore, the structure of ANN includes single and double hidden layers with backward propagation technique. Besides, number of neurons were optimized in training process. The evaluation of the ANN model was depended on determination coefficient (R) and Mean Squared Error (MSE). The obtained results show that the architecture of ANNs is appropriated for predicting the power generated from PV module. The two developed ANN models have good accuracy and the sunny model is relatively more accurate than the cloudy model. Where, the MSE is 0.002062 at epoch 6 in sunny model and 0.0087085 at epoch 9 in cloudy model. Furthermore, the R is recorded 0.993 and 0.982 in validation process for sunny and cloudy model respectively. In addition, the optimization number of neurons in hidden layer gave sufficient accuracy without referring to choose the neurons by trial and error.
采用反向传播人工神经网络(ANN)对伊拉克巴格达晴天和多云天气下光伏组件的发电量进行了预测。在冬季和夏季进行了试验试验,以获得最佳的晴天和阴天。测量了三个天气参数:太阳辐照度、环境温度和风速。此外,还测量了光伏组件的输出电特性(电压、电流、功率)和组件温度。因此,人工神经网络系统的数据集由四个输入和一个输出组成。此外,人工神经网络的结构包括单隐层和双隐层,并采用反向传播技术。此外,在训练过程中对神经元数量进行了优化。对人工神经网络模型的评价取决于决定系数(R)和均方误差(MSE)。结果表明,人工神经网络的结构适合于预测光伏组件的发电功率。所建立的两种人工神经网络模型均具有较好的精度,晴天模型相对优于阴天模型。其中,晴天模式第6 epoch的MSE为0.002062,多云模式第9 epoch的MSE为0.0087085。在晴天和多云模型的验证过程中,R分别为0.993和0.982。此外,隐层神经元的优化数量可以提供足够的精度,而不需要通过试错法来选择神经元。
{"title":"Comparison and Assessment of PV Module Power Prediction Based on ANN for Iraq Weather","authors":"Hussain Hamdi Khalaf, A. Mohammad, A. Hussain, Z. S. Al-sagar","doi":"10.1109/ICOASE56293.2022.10075594","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075594","url":null,"abstract":"An artificial neural network (ANN) with backward-propagation technique was used to predict the power generation of PV module in sunny and cloudy weathers of Baghdad city-Iraq. Experiment tests were investigated in winter and summer days to get the best sunny and cloudy days. Three weather parameters were measured including: solar irradiance, ambient temperature and wind speed. In addition, the output electrical characteristics of PV module (voltage, current, power) and module temperature were measured. Therefore, the dataset of ANN system consists of four input and one output. Furthermore, the structure of ANN includes single and double hidden layers with backward propagation technique. Besides, number of neurons were optimized in training process. The evaluation of the ANN model was depended on determination coefficient (R) and Mean Squared Error (MSE). The obtained results show that the architecture of ANNs is appropriated for predicting the power generated from PV module. The two developed ANN models have good accuracy and the sunny model is relatively more accurate than the cloudy model. Where, the MSE is 0.002062 at epoch 6 in sunny model and 0.0087085 at epoch 9 in cloudy model. Furthermore, the R is recorded 0.993 and 0.982 in validation process for sunny and cloudy model respectively. In addition, the optimization number of neurons in hidden layer gave sufficient accuracy without referring to choose the neurons by trial and error.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handwritten Signature Forgery Detection Using PCA and Boruta Feature Selection 基于PCA和Boruta特征选择的手写签名伪造检测
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075606
Omar M. Malallah
Despite the development of identity detection using biometrics in the field of financial transactions, the handwritten signature remains the most commonly used to this day. The main challenge is that each person's signature may be distinctive, on the other hand, many difficulties aroused because two signatures created by the same individual may appear to be extremely identical. This similarity allows the imposters to claim a forged identity. In this paper, an off-line handwritten forgery detection method is introduced using traditional machine learning rather than deep learning methods to fulfill the need for a simpler model for saving both computation time and computation resources. The proposed method uses Histogram of Gradients (HOG) as a feature extraction method and Principal Component Analysis (PCA) to reduce the large extracted features number and Support Vector Machine (SVM) as a classifier. Another approach has been used by using Boruta feature selection for further reduction of feature numbers. CEDAR dataset has been used in this paper and the results were 99.24 % and 98.79 % in terms of accuracy for the two proposed methods respectively.
尽管在金融交易领域使用生物识别技术进行身份检测,但手写签名至今仍是最常用的。主要的挑战是每个人的签名可能是不同的,另一方面,由于同一个人创建的两个签名可能看起来非常相同,因此引起了许多困难。这种相似性使得冒名顶替者可以申请伪造的身份。本文提出了一种离线手写伪造检测方法,采用传统的机器学习方法代替深度学习方法,以满足简化模型以节省计算时间和计算资源的需要。该方法采用梯度直方图(Histogram of Gradients, HOG)作为特征提取方法,主成分分析(Principal Component Analysis, PCA)减少提取的特征数量,支持向量机(Support Vector Machine, SVM)作为分类器。另一种方法是使用Boruta特征选择来进一步减少特征数。本文使用CEDAR数据集,两种方法的准确率分别为99.24%和98.79%。
{"title":"Handwritten Signature Forgery Detection Using PCA and Boruta Feature Selection","authors":"Omar M. Malallah","doi":"10.1109/ICOASE56293.2022.10075606","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075606","url":null,"abstract":"Despite the development of identity detection using biometrics in the field of financial transactions, the handwritten signature remains the most commonly used to this day. The main challenge is that each person's signature may be distinctive, on the other hand, many difficulties aroused because two signatures created by the same individual may appear to be extremely identical. This similarity allows the imposters to claim a forged identity. In this paper, an off-line handwritten forgery detection method is introduced using traditional machine learning rather than deep learning methods to fulfill the need for a simpler model for saving both computation time and computation resources. The proposed method uses Histogram of Gradients (HOG) as a feature extraction method and Principal Component Analysis (PCA) to reduce the large extracted features number and Support Vector Machine (SVM) as a classifier. Another approach has been used by using Boruta feature selection for further reduction of feature numbers. CEDAR dataset has been used in this paper and the results were 99.24 % and 98.79 % in terms of accuracy for the two proposed methods respectively.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122520255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of Quantum Computing on IoT Using Modern Algorithms 使用现代算法的量子计算对物联网的影响
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075583
Z. Ageed, Subhi R. M. Zeebaree, R. Saeed
Even while the Internet of Things (IoT) already affects our day-to-day activities, its future relevance and potential for transformation remain untapped. Security issues with present communications technology must be solved before secure end-to-end connection between services can be achieved. Internet of Things (IoT) is here to stay. In the next years, it will become an integral part of our everyday life. There is a good chance that sensor-based networks can recognize it as a direct service provider in our surroundings. Even if it's just in the form of a value-added service delivered through cellular networks, it's going to be helpful nevertheless. It is, nevertheless, subject to a wide range of security threats. The current level of security is insufficient for IoT applications in the future. A secure cryptosystem is needed for the Internet of Things. quantum-based security has seen a surge of attention recently. Additional quantum key distribution systems and network services are now supported by this solution. As a result of the quantum computing's unrivaled security level, it has become more popular in recent years. Because every measurement must affect the state of the quantum bit being sent, quantum physics dictates that this must be the case. Regardless of whether the sender or recipient is aware of the change, it is clear. It is thus no longer possible to listen passively. Polarized photons may encode a string of bits using protocols like BB84. Secure cryptographic keys may be generated over an unsafe channel utilizing various key distillation procedures.
尽管物联网(IoT)已经影响了我们的日常活动,但其未来的相关性和转型潜力仍未得到开发。在实现服务之间的端到端安全连接之前,必须解决现有通信技术的安全问题。物联网(IoT)将继续存在。在接下来的几年里,它将成为我们日常生活中不可或缺的一部分。基于传感器的网络很有可能将其识别为我们周围环境中的直接服务提供商。即使它只是通过蜂窝网络提供增值服务的形式,它也会有所帮助。然而,它受到广泛的安全威胁。目前的安全水平不足以满足未来物联网应用的需求。物联网需要安全的密码系统。最近,以量子为基础的安全受到了极大的关注。该解决方案现在支持额外的量子密钥分发系统和网络服务。由于量子计算具有无与伦比的安全级别,近年来越来越受欢迎。因为每一次测量都必须影响被发送的量子比特的状态,量子物理学规定这必须是事实。不管发送方或接收方是否意识到这个变化,都是清楚的。因此,被动地倾听是不可能的。偏振光子可以使用BB84这样的协议对一串比特进行编码。可以利用各种密钥蒸馏过程在不安全通道上生成安全加密密钥。
{"title":"Influence of Quantum Computing on IoT Using Modern Algorithms","authors":"Z. Ageed, Subhi R. M. Zeebaree, R. Saeed","doi":"10.1109/ICOASE56293.2022.10075583","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075583","url":null,"abstract":"Even while the Internet of Things (IoT) already affects our day-to-day activities, its future relevance and potential for transformation remain untapped. Security issues with present communications technology must be solved before secure end-to-end connection between services can be achieved. Internet of Things (IoT) is here to stay. In the next years, it will become an integral part of our everyday life. There is a good chance that sensor-based networks can recognize it as a direct service provider in our surroundings. Even if it's just in the form of a value-added service delivered through cellular networks, it's going to be helpful nevertheless. It is, nevertheless, subject to a wide range of security threats. The current level of security is insufficient for IoT applications in the future. A secure cryptosystem is needed for the Internet of Things. quantum-based security has seen a surge of attention recently. Additional quantum key distribution systems and network services are now supported by this solution. As a result of the quantum computing's unrivaled security level, it has become more popular in recent years. Because every measurement must affect the state of the quantum bit being sent, quantum physics dictates that this must be the case. Regardless of whether the sender or recipient is aware of the change, it is clear. It is thus no longer possible to listen passively. Polarized photons may encode a string of bits using protocols like BB84. Secure cryptographic keys may be generated over an unsafe channel utilizing various key distillation procedures.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122542159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of Network Data with Machine Learning Methods for Intelligent Intrusion Detection Systems 基于机器学习方法的智能入侵检测系统网络数据分类
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075593
M. Baykara, Awf Abdulrahman, Ali Shakir Alahmed
In information systems, it has become very important to store personal and institutional information and access it safely and quickly when necessary. To ensure the confidentiality of information against unauthorized access, institutions or organizations must protect their important data securely and take various precautions. Intrusion detection systems (IDS) are among these measures. One of the issues that should be carefully considered while creating an IDS is the dataset to be used. In terms of IDS, a dataset is the data obtained from network packets or log records that contain attack data and are necessary to identify attack patterns during the training and testing stages of the system. In this article, widely used machine learning techniques (decision tree, K-nearest neighbor, and support vector machine algorithms) are used to increase the performance of IDSs. The studies were tested on the NSL-KDD dataset, one of the most used datasets in evaluating IDSs. As a result of the tests, it was seen that the highest accuracy rate was 99.7%, and the lowest accuracy rate was 98.7%. The obtained results have shown that the proposed machine learning methods can be used with high sensitivity and accuracy to develop smart IDSs.
在信息系统中,存储个人和机构信息并在必要时安全快速地访问这些信息已变得非常重要。为了确保信息的机密性,机构或组织必须对其重要数据进行安全保护,并采取各种预防措施。入侵检测系统(IDS)就是这些措施之一。在创建IDS时应该仔细考虑的问题之一是要使用的数据集。在IDS方面,数据集是从包含攻击数据的网络数据包或日志记录中获得的数据,这些数据是在系统的训练和测试阶段识别攻击模式所必需的。在本文中,使用了广泛使用的机器学习技术(决策树、k近邻和支持向量机算法)来提高ids的性能。这些研究在NSL-KDD数据集上进行了测试,NSL-KDD数据集是评估IDSs最常用的数据集之一。测试结果显示,最高准确率为99.7%,最低准确率为98.7%。结果表明,所提出的机器学习方法能够以较高的灵敏度和精度开发智能入侵防御系统。
{"title":"Classification of Network Data with Machine Learning Methods for Intelligent Intrusion Detection Systems","authors":"M. Baykara, Awf Abdulrahman, Ali Shakir Alahmed","doi":"10.1109/ICOASE56293.2022.10075593","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075593","url":null,"abstract":"In information systems, it has become very important to store personal and institutional information and access it safely and quickly when necessary. To ensure the confidentiality of information against unauthorized access, institutions or organizations must protect their important data securely and take various precautions. Intrusion detection systems (IDS) are among these measures. One of the issues that should be carefully considered while creating an IDS is the dataset to be used. In terms of IDS, a dataset is the data obtained from network packets or log records that contain attack data and are necessary to identify attack patterns during the training and testing stages of the system. In this article, widely used machine learning techniques (decision tree, K-nearest neighbor, and support vector machine algorithms) are used to increase the performance of IDSs. The studies were tested on the NSL-KDD dataset, one of the most used datasets in evaluating IDSs. As a result of the tests, it was seen that the highest accuracy rate was 99.7%, and the lowest accuracy rate was 98.7%. The obtained results have shown that the proposed machine learning methods can be used with high sensitivity and accuracy to develop smart IDSs.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Northern Goshawk Optimization Algorithm for Global Optimization 改进的北苍鹰全局优化算法
Pub Date : 2022-09-21 DOI: 10.1109/ICOASE56293.2022.10075576
H. Sadeeq, A. Abdulazeez
Global optimization has been used in many real-world problems. Nature-inspired meta-heuristic algorithms, such as the Northern Goshawk Optimization NGO algorithm that has just been proposed, are often used to solve these kinds of optimization problems. An NGO provides satisfactory results. In this algorithm, the proposed exploration model may not provide sufficient coverage of the problem space, trapping the system in a local optimal solution. To improve the performance of NGO, a novel and efficient improved northern goshawk optimization technique named INGO is proposed in this paper. In INGO, a new concept of switching between exploration and exploitation has been developed to improve overall algorithm performance to avoid being stuck in local optima. Also, to increase search capabilities, Levy Flight is used. Twenty-three known benchmark functions were used to test the performance of the proposed INGO. The results were compared to those of an NGO and some well-known robust algorithms. Experimental data indicates that the INGO suggested in this study consistently outperforms the traditional NGO and alternative methods in a significant number of test functions.
全局优化已经在许多现实问题中得到了应用。自然启发的元启发式算法,如刚刚提出的北苍鹰优化NGO算法,通常用于解决这类优化问题。非政府组织提供了令人满意的结果。在该算法中,所提出的探索模型可能无法提供足够的问题空间覆盖,使系统陷入局部最优解。为了提高非政府组织的性能,本文提出了一种新的、高效的改进北苍鹰优化技术——非政府组织。在INGO中,为了提高算法的整体性能,避免陷入局部最优,提出了在探索和利用之间切换的新概念。此外,为了增加搜索能力,利维飞行被使用。使用23个已知的基准函数来测试所提出的INGO的性能。结果与非政府组织和一些知名的鲁棒算法进行了比较。实验数据表明,本研究提出的非政府组织在许多测试功能上始终优于传统非政府组织和替代方法。
{"title":"Improved Northern Goshawk Optimization Algorithm for Global Optimization","authors":"H. Sadeeq, A. Abdulazeez","doi":"10.1109/ICOASE56293.2022.10075576","DOIUrl":"https://doi.org/10.1109/ICOASE56293.2022.10075576","url":null,"abstract":"Global optimization has been used in many real-world problems. Nature-inspired meta-heuristic algorithms, such as the Northern Goshawk Optimization NGO algorithm that has just been proposed, are often used to solve these kinds of optimization problems. An NGO provides satisfactory results. In this algorithm, the proposed exploration model may not provide sufficient coverage of the problem space, trapping the system in a local optimal solution. To improve the performance of NGO, a novel and efficient improved northern goshawk optimization technique named INGO is proposed in this paper. In INGO, a new concept of switching between exploration and exploitation has been developed to improve overall algorithm performance to avoid being stuck in local optima. Also, to increase search capabilities, Levy Flight is used. Twenty-three known benchmark functions were used to test the performance of the proposed INGO. The results were compared to those of an NGO and some well-known robust algorithms. Experimental data indicates that the INGO suggested in this study consistently outperforms the traditional NGO and alternative methods in a significant number of test functions.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132243586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 4th International Conference on Advanced Science and Engineering (ICOASE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1