首页 > 最新文献

2019 International Conference on Advances in the Emerging Computing Technologies (AECT)最新文献

英文 中文
Progression towards an e-Management Centralized Blood Donation System in Saudi Arabia 沙特阿拉伯电子管理集中献血系统的进展
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194178
Fawaz D. Alharbi
Current healthcare systems rely on blood donation to save lives. Voluntary blood donation is the main source of blood supply in many countries. However, blood donors face barriers to donating such as time constraints and the long times required to complete registration and donor health questionnaires. Thus, this paper analyses the blood donor cycle and proposes information technology solutions. Based on the analysis, a Central Blood Donation Management System (CBDMS) is proposed with interconnected systems. The proposed system is among the first e-management systems for blood donation management in Saudi Arabia. Major components of CBDMS are explained to show the various functions of the system. The implementation of CBDMS can reduce the time required for blood donation by decreasing the information collected from the donors. The system can also improve the efficiency of the blood donation management system by linking various systems and importing information from different sites. It can also reduce blood donation errors and reduce the number of deferral blood donors.
目前的卫生保健系统依靠献血来挽救生命。在许多国家,自愿献血是血液供应的主要来源。然而,献血者面临着诸如时间限制和完成登记和献血者健康问卷所需的较长时间等捐献障碍。因此,本文分析了献血者周期,并提出了信息技术解决方案。在此基础上,提出了一个系统互联的中央献血管理系统(CBDMS)。该系统是沙特阿拉伯首批用于献血管理的电子管理系统之一。介绍了CBDMS的主要组成部分,展示了系统的各种功能。实施CBDMS可以减少从献血者那里收集的信息,从而减少献血所需的时间。该系统还可以通过连接各个系统和从不同站点导入信息来提高献血管理系统的效率。它还可以减少献血错误,减少延迟献血者的数量。
{"title":"Progression towards an e-Management Centralized Blood Donation System in Saudi Arabia","authors":"Fawaz D. Alharbi","doi":"10.1109/AECT47998.2020.9194178","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194178","url":null,"abstract":"Current healthcare systems rely on blood donation to save lives. Voluntary blood donation is the main source of blood supply in many countries. However, blood donors face barriers to donating such as time constraints and the long times required to complete registration and donor health questionnaires. Thus, this paper analyses the blood donor cycle and proposes information technology solutions. Based on the analysis, a Central Blood Donation Management System (CBDMS) is proposed with interconnected systems. The proposed system is among the first e-management systems for blood donation management in Saudi Arabia. Major components of CBDMS are explained to show the various functions of the system. The implementation of CBDMS can reduce the time required for blood donation by decreasing the information collected from the donors. The system can also improve the efficiency of the blood donation management system by linking various systems and importing information from different sites. It can also reduce blood donation errors and reduce the number of deferral blood donors.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sharing Mechanism of Intelligent Vehicles Trust Points based on Blockchain for Vehicular Networks 基于区块链的车联网智能车辆信任点共享机制
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194208
Sharqa Hameed, Sakeena Javaid, Sheeraz Ahmed, N. Javaid
Nowadays, there exists strong need to enable the Intelligent Vehicle (IV) communication for applications such as safety messaging, traffic monitoring and many other internet access purposes. In this work, we have introduced an Intelligent Vehicle Trust Points (IVTPs) sharing mechanism between vehicle to vehicle, vehicle to infrastructure and vehicle to roadside units. Existing models have already embeded Blockchain (BC), which is valuable for many purposes like security in different data transmission circumstances. However, our proposed scheme uses this BC feature along with IVTPs to ensure the trustworthiness in the communication environment. Performance of our proposed system is evaluated on the basis of IVs’ processing time, which are totally based on IVTPs. Our proposed system is efficient as compared to existing one which handles less number of vehicles at intersection point where IVTPs are shared between moving vehicles in a scalable architecture.
如今,我们迫切需要实现智能车辆(IV)通信,用于安全信息、交通监控和许多其他互联网接入目的。在这项工作中,我们引入了车辆与车辆、车辆与基础设施以及车辆与路边单元之间的智能车辆信任点(IVTPs)共享机制。现有的模型已经嵌入了b区块链(BC),它在许多方面都很有价值,比如在不同的数据传输环境中实现安全性。然而,我们提出的方案使用这种BC特征和ivtp来确保通信环境中的可信度。我们提出的系统的性能是根据IVs的处理时间来评估的,而IVs的处理时间完全基于ivtp。与现有系统相比,我们提出的系统效率更高,现有系统在交叉口处理的车辆数量较少,在可扩展的架构中,移动车辆之间共享ivtp。
{"title":"Sharing Mechanism of Intelligent Vehicles Trust Points based on Blockchain for Vehicular Networks","authors":"Sharqa Hameed, Sakeena Javaid, Sheeraz Ahmed, N. Javaid","doi":"10.1109/AECT47998.2020.9194208","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194208","url":null,"abstract":"Nowadays, there exists strong need to enable the Intelligent Vehicle (IV) communication for applications such as safety messaging, traffic monitoring and many other internet access purposes. In this work, we have introduced an Intelligent Vehicle Trust Points (IVTPs) sharing mechanism between vehicle to vehicle, vehicle to infrastructure and vehicle to roadside units. Existing models have already embeded Blockchain (BC), which is valuable for many purposes like security in different data transmission circumstances. However, our proposed scheme uses this BC feature along with IVTPs to ensure the trustworthiness in the communication environment. Performance of our proposed system is evaluated on the basis of IVs’ processing time, which are totally based on IVTPs. Our proposed system is efficient as compared to existing one which handles less number of vehicles at intersection point where IVTPs are shared between moving vehicles in a scalable architecture.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"754 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute Rule performance in Data Mining for Software Deformity Prophecy Datasets Models 软件畸形预测数据集模型数据挖掘中的属性规则性能
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194187
Salahuddin Shaikh, Liu Changan, Maaz Rasheed Malik
In recently, all the developers, programmer and software engineers, they are working specially on software component and software testing to compete the software technology in the world. For this competition, they are using different kind of sources to analysis the software reliability and importance. Nowadays Data mining is one of source, which is used in software for overcome the problem of software fault which occur during the software test and its analysis. This kind of problem leads software deformity prophecy in software. In this research paper, we are also trying to overcome the software deformity prophecy problem with the help of our proposed solution called ONER rule attribute. We have used REPOSITORY datasets models, these datasets models are defected and non-defected datasets models. Our analysis class of interest is defected models. In our research, we have analyzed the efficiency of our proposed solution methods. The experiments results showed that using of ONER with discretize, have improved the efficiency of correctly classified instances in all. Using percentage split and training datasets with ONER discretize rule attribute have improved correctly classified in all datasets models. The analysis of positive accuracy f-measure is also increased in percentage split during the use of ONER with discretize but in some datasets models, the training data and cross validation is better with use of ONER rule attribute. The area under curve (ROC) in both scenarios using ONER rule attribute and discretize with ONER rule attribute is almost same or equal with each other.
近年来,所有的开发人员、程序员和软件工程师都致力于软件组件和软件测试,以与世界上的软件技术竞争。在本次竞赛中,他们利用不同的资源来分析软件的可靠性和重要性。目前,数据挖掘是软件测试和分析过程中出现的软件故障的解决方法之一。这类问题导致软件畸形预言。在本研究中,我们还试图通过我们提出的解决方案ONER规则属性来克服软件畸形预测问题。我们已经使用了REPOSITORY数据集模型,这些数据集模型分为有缺陷的和无缺陷的数据集模型。我们感兴趣的分析类是有缺陷的模型。在我们的研究中,我们分析了我们提出的解决方法的效率。实验结果表明,利用离散化方法对实例进行正确分类,总体上提高了分类效率。使用百分比分割和带有ONER离散规则属性的训练数据集提高了所有数据集模型的正确分类。在使用离散化的ONER时,正精度f-测度的分析在百分比分割上也有所提高,但在某些数据集模型中,使用ONER规则属性对训练数据和交叉验证效果更好。在使用ONER规则属性和用ONER规则属性离散的两种情况下,曲线下面积(ROC)几乎相同或相等。
{"title":"Attribute Rule performance in Data Mining for Software Deformity Prophecy Datasets Models","authors":"Salahuddin Shaikh, Liu Changan, Maaz Rasheed Malik","doi":"10.1109/AECT47998.2020.9194187","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194187","url":null,"abstract":"In recently, all the developers, programmer and software engineers, they are working specially on software component and software testing to compete the software technology in the world. For this competition, they are using different kind of sources to analysis the software reliability and importance. Nowadays Data mining is one of source, which is used in software for overcome the problem of software fault which occur during the software test and its analysis. This kind of problem leads software deformity prophecy in software. In this research paper, we are also trying to overcome the software deformity prophecy problem with the help of our proposed solution called ONER rule attribute. We have used REPOSITORY datasets models, these datasets models are defected and non-defected datasets models. Our analysis class of interest is defected models. In our research, we have analyzed the efficiency of our proposed solution methods. The experiments results showed that using of ONER with discretize, have improved the efficiency of correctly classified instances in all. Using percentage split and training datasets with ONER discretize rule attribute have improved correctly classified in all datasets models. The analysis of positive accuracy f-measure is also increased in percentage split during the use of ONER with discretize but in some datasets models, the training data and cross validation is better with use of ONER rule attribute. The area under curve (ROC) in both scenarios using ONER rule attribute and discretize with ONER rule attribute is almost same or equal with each other.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125447294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Analysis on Imbalanced Multi-class Classification for Malware Samples using CNN 基于CNN的恶意软件样本不平衡多类分类比较分析
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194155
Arwa Alzammam, H. Binsalleeh, Basil AsSadhan, K. Kyriakopoulos, S. Lambotharan
Malware is considered as one of the main actors in cyber attacks. The number of unique malware samples is constantly on the rise; however, the ratio of benign software still greatly outnumbers malware samples. In machine learning, such datasets are known as imbalanced, where the majority class label greatly dominates over others. In this paper, we present a comparative analysis and evaluation of some of the proposed techniques in the literature in order to address the problem of classifying imbalanced multi-class malware datasets. More specifically, we use Convolutional Neural Network (CNN) as a classification algorithm to study the effect of imbalanced datasets on deep learning approaches. These experiments are conducted on three publicly available imbalanced datasets. Our performance analysis demonstrates that methods such as cost sensitive learning, oversampling and cross validation have positive effects on the model classification performance, albeit in varying degrees. Meanwhile others like using pre-trained models require more special parameter settings. However, best practices may change in accordance with the problem domain.
恶意软件被认为是网络攻击的主要参与者之一。独特的恶意软件样本数量不断上升;然而,良性软件的比例仍然大大超过恶意软件样本。在机器学习中,这样的数据集被称为不平衡的,其中大多数类标签大大超过其他类标签。在本文中,我们对文献中提出的一些技术进行了比较分析和评估,以解决分类不平衡多类恶意软件数据集的问题。更具体地说,我们使用卷积神经网络(CNN)作为分类算法来研究不平衡数据集对深度学习方法的影响。这些实验是在三个公开的不平衡数据集上进行的。我们的性能分析表明,成本敏感学习、过采样和交叉验证等方法对模型分类性能有积极影响,尽管程度不同。同时,其他喜欢使用预训练模型的人需要更特殊的参数设置。然而,最佳实践可能会随着问题领域的变化而变化。
{"title":"Comparative Analysis on Imbalanced Multi-class Classification for Malware Samples using CNN","authors":"Arwa Alzammam, H. Binsalleeh, Basil AsSadhan, K. Kyriakopoulos, S. Lambotharan","doi":"10.1109/AECT47998.2020.9194155","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194155","url":null,"abstract":"Malware is considered as one of the main actors in cyber attacks. The number of unique malware samples is constantly on the rise; however, the ratio of benign software still greatly outnumbers malware samples. In machine learning, such datasets are known as imbalanced, where the majority class label greatly dominates over others. In this paper, we present a comparative analysis and evaluation of some of the proposed techniques in the literature in order to address the problem of classifying imbalanced multi-class malware datasets. More specifically, we use Convolutional Neural Network (CNN) as a classification algorithm to study the effect of imbalanced datasets on deep learning approaches. These experiments are conducted on three publicly available imbalanced datasets. Our performance analysis demonstrates that methods such as cost sensitive learning, oversampling and cross validation have positive effects on the model classification performance, albeit in varying degrees. Meanwhile others like using pre-trained models require more special parameter settings. However, best practices may change in accordance with the problem domain.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130527726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Online Banking With Biometrics 利用生物识别技术保护网上银行
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194214
A. T. Kiyani, A. Lasebae, Kamran Ali, Masood Ur-Rehman
Online banking is a substantial part of daily routine of large enterprise businesses and individual users for making transactions. However, security in online banking is a major dilemma owing to the vulnerable authentication schemes. Online banking employs conventional methods of Username and Passwords for authenticating the user. However, these techniques only verify the passwords and not the end user who requests the services for which only legitimate person is privileged to use. Using these vulnerabilities of online banking, intruders tend to masquerade legitimate user for unauthorized access to the system. This paper presents three-factor authentication scheme, which includes username/password, familiar random images and fingerprint data of user in order to make user-authentication more secure. Subsequently, Match on Card technique is proposed to ensure the confidentiality and integrity of biometric data of user since the reference feature set of user once store in credit card would not be permitted to move out and matching is performed on the credit card itself. In addition, the concept of familiar random images is used in order to enhance the security, as humans are believed to have remarkable visual remembering capability in comparison to words. The results show that the incorporation of three-factor authentication in online banking application resists the intruder to illicitly use banking services of any authorized user. The proposed biometric online banking system tends to assist in lessening the cybercrime rate of online banking and tends to escalate the user confidence in using banking services online.
网上银行是大型企业业务和个人用户日常交易的重要组成部分。然而,由于易受攻击的认证方案,网上银行的安全性是一个主要的难题。网上银行采用传统的用户名和密码方法对用户进行身份验证。然而,这些技术只验证密码,而不是验证请求服务的最终用户,只有合法的人才有权使用这些服务。利用网上银行的这些漏洞,入侵者往往会伪装成合法用户对系统进行未经授权的访问。为了提高用户认证的安全性,本文提出了包含用户名/密码、熟悉的随机图像和用户指纹数据的三因素认证方案。随后,为了保证用户生物特征数据的保密性和完整性,提出了匹配卡技术,因为用户的参考特征集一旦存储在信用卡中就不允许移出,匹配是在信用卡本身进行的。此外,为了提高安全性,使用了熟悉的随机图像的概念,因为与文字相比,人类被认为具有卓越的视觉记忆能力。结果表明,在网上银行应用程序中引入三因素认证可以防止入侵者非法使用任何授权用户的银行服务。建议的生物识别网上银行系统有助于减少网上银行的网络犯罪率,并有助于提高用户使用网上银行服务的信心。
{"title":"Secure Online Banking With Biometrics","authors":"A. T. Kiyani, A. Lasebae, Kamran Ali, Masood Ur-Rehman","doi":"10.1109/AECT47998.2020.9194214","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194214","url":null,"abstract":"Online banking is a substantial part of daily routine of large enterprise businesses and individual users for making transactions. However, security in online banking is a major dilemma owing to the vulnerable authentication schemes. Online banking employs conventional methods of Username and Passwords for authenticating the user. However, these techniques only verify the passwords and not the end user who requests the services for which only legitimate person is privileged to use. Using these vulnerabilities of online banking, intruders tend to masquerade legitimate user for unauthorized access to the system. This paper presents three-factor authentication scheme, which includes username/password, familiar random images and fingerprint data of user in order to make user-authentication more secure. Subsequently, Match on Card technique is proposed to ensure the confidentiality and integrity of biometric data of user since the reference feature set of user once store in credit card would not be permitted to move out and matching is performed on the credit card itself. In addition, the concept of familiar random images is used in order to enhance the security, as humans are believed to have remarkable visual remembering capability in comparison to words. The results show that the incorporation of three-factor authentication in online banking application resists the intruder to illicitly use banking services of any authorized user. The proposed biometric online banking system tends to assist in lessening the cybercrime rate of online banking and tends to escalate the user confidence in using banking services online.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Deep Learning Framework for Intrusion Detection System 用于入侵检测系统的新型深度学习框架
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194224
Mahwish Amjad, Hira Zahid, S. Zafar, Tariq Mahmood
Rapid increase of network devices have brought several complexities in today’s network data. Deep learning algorithms provides better solution for analyzing complex network data. Several deep learning algorithms have been proposed by researchers for identifying either known or unknown intrusions present in network traffic. But, in real time, incoming network traffic might encounter with known or unknown intrusions. Presence of unknown intrusions in network traffic arises a need to bring a framework that can identify both known and unknown network traffic intrusions. This paper is an attempt to bring a novel deep learning framework that can identify both known or unknown attacks with maximum 82% accuracy. Also, the particular category of known attack will be revealed via proposed framework. Proposed framework is a novel integration of two well known deep learning algorithms autoencoder and LSTM that brings an effective intrusion detection system. We believe that deployment of proposed framework in real time network will bring improvement in the security of future internet.
网络设备的快速增长给当今的网络数据带来了一些复杂性。深度学习算法为复杂网络数据的分析提供了更好的解决方案。研究人员提出了几种深度学习算法,用于识别网络流量中存在的已知或未知入侵。但是,在实时情况下,传入的网络流量可能会遇到已知或未知的入侵。在网络流量中存在未知入侵时,需要引入一个能够识别已知和未知网络流量入侵的框架。本文试图引入一种新的深度学习框架,该框架可以识别已知或未知的攻击,准确率最高可达82%。此外,已知攻击的特定类别将通过所提出的框架揭示。该框架将两种著名的深度学习算法(自动编码器和LSTM)进行了新颖的集成,从而实现了有效的入侵检测系统。我们相信,在实时网络中部署所提出的框架将会提高未来互联网的安全性。
{"title":"A Novel Deep Learning Framework for Intrusion Detection System","authors":"Mahwish Amjad, Hira Zahid, S. Zafar, Tariq Mahmood","doi":"10.1109/AECT47998.2020.9194224","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194224","url":null,"abstract":"Rapid increase of network devices have brought several complexities in today’s network data. Deep learning algorithms provides better solution for analyzing complex network data. Several deep learning algorithms have been proposed by researchers for identifying either known or unknown intrusions present in network traffic. But, in real time, incoming network traffic might encounter with known or unknown intrusions. Presence of unknown intrusions in network traffic arises a need to bring a framework that can identify both known and unknown network traffic intrusions. This paper is an attempt to bring a novel deep learning framework that can identify both known or unknown attacks with maximum 82% accuracy. Also, the particular category of known attack will be revealed via proposed framework. Proposed framework is a novel integration of two well known deep learning algorithms autoencoder and LSTM that brings an effective intrusion detection system. We believe that deployment of proposed framework in real time network will bring improvement in the security of future internet.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126609954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Breast Cancer Classification from Histopathological Images 基于组织病理学图像的乳腺癌自动分类
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194194
Fatma Anwar, Omneya Attallah, Nagia M. Ghanem, M. Ismail
Breast cancer (BC) is a common health problem of major significance, as it is the most widely kind of cancer among women which leads to morbidity and mortality. Pathological diagnosis is considered as the golden standard of BC detection. However, the investigation of histopathology images is a challenging task. Automatic diagnosis of BC could lower the death rate by constructing a computer aided diagnosis (CAD) system capable of accurately diagnosing BC and reducing the time consumed by pathologists during examinations. This paper presents a CAD system to classify BC to benign and malignant. The proposed CAD method consists of 4 stages; image pre-processing, feature extraction and fusion, feature reduction, and classification. The CAD is based on fusion features extracted with ResNet Deep Convolution Neural Network (DCNN) with features of wavelets packet decomposition (WPD) and histograms of oriented gradient (HOG). Next, the feature data were reduced by utilizing principle component analysis (PCA). Finally, the reduced features are used to train different individual classifiers. Results show that the highest accuracy of 97.1% is achieved. The results were compared with recent related CAD systems. The comparison showed that the proposed CAD system is capable of accurately classifying BC to benign and malignant compared to other work. Thus, it can be used to help medical experiments in investigation procedures.
乳腺癌是一种具有重大意义的常见健康问题,因为它是妇女中发病率和死亡率最高的一种癌症。病理诊断被认为是BC检测的金标准。然而,组织病理学图像的研究是一项具有挑战性的任务。通过构建能够准确诊断BC的计算机辅助诊断(CAD)系统,减少病理学家在检查过程中所消耗的时间,BC的自动诊断可以降低死亡率。本文介绍了一种用于BC良恶性分类的CAD系统。所提出的CAD方法包括4个阶段;图像预处理,特征提取与融合,特征约简,分类。该CAD基于ResNet深度卷积神经网络(DCNN)提取的具有小波包分解(WPD)和定向梯度直方图(HOG)特征的融合特征。其次,利用主成分分析(PCA)对特征数据进行约简。最后,利用约简特征训练不同的分类器。结果表明,该方法的最高准确率为97.1%。结果与最近的相关CAD系统进行了比较。对比表明,与其他工作相比,所提出的CAD系统能够准确地对BC进行良恶性分类。因此,它可以用来帮助医学实验的调查程序。
{"title":"Automatic Breast Cancer Classification from Histopathological Images","authors":"Fatma Anwar, Omneya Attallah, Nagia M. Ghanem, M. Ismail","doi":"10.1109/AECT47998.2020.9194194","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194194","url":null,"abstract":"Breast cancer (BC) is a common health problem of major significance, as it is the most widely kind of cancer among women which leads to morbidity and mortality. Pathological diagnosis is considered as the golden standard of BC detection. However, the investigation of histopathology images is a challenging task. Automatic diagnosis of BC could lower the death rate by constructing a computer aided diagnosis (CAD) system capable of accurately diagnosing BC and reducing the time consumed by pathologists during examinations. This paper presents a CAD system to classify BC to benign and malignant. The proposed CAD method consists of 4 stages; image pre-processing, feature extraction and fusion, feature reduction, and classification. The CAD is based on fusion features extracted with ResNet Deep Convolution Neural Network (DCNN) with features of wavelets packet decomposition (WPD) and histograms of oriented gradient (HOG). Next, the feature data were reduced by utilizing principle component analysis (PCA). Finally, the reduced features are used to train different individual classifiers. Results show that the highest accuracy of 97.1% is achieved. The results were compared with recent related CAD systems. The comparison showed that the proposed CAD system is capable of accurately classifying BC to benign and malignant compared to other work. Thus, it can be used to help medical experiments in investigation procedures.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Smart Detection and Acquisition Design Of Ultrasonic Scanner For Inservice Inspection On Research Reactor 研究堆在役超声扫描仪智能检测与采集设计
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194167
K. Handono, Indarzah Masbatim Putra, Ikhsan Shobari, Ismet Isnaini, K. Kurnianto
A risk analysis and smart detection of the ultrasonic scanner for inservice inspection on Research Reactor has been conducted. The hardware ultrasonic scanner has been installed and tested. This paper consists of the risk analysis design and the smart acquisition system. Risk assessment of tool installation and operation has been carried out as part of the system. The results indicate moderate and low risk, which means the tool can be operated. The results of the test in the reactor tank that the ultrasonic scanner system can work well and safely for inservice inspection.
对研究堆在役超声扫描仪进行了风险分析和智能检测。硬件超声扫描器已经安装和测试。本文主要包括风险分析设计和智能采集系统两部分。工具安装和操作的风险评估已作为系统的一部分进行。结果表明,该工具具有中等和较低的风险,可以进行操作。在反应器槽内的试验结果表明,超声波扫描系统能够良好、安全地进行在役检测。
{"title":"Smart Detection and Acquisition Design Of Ultrasonic Scanner For Inservice Inspection On Research Reactor","authors":"K. Handono, Indarzah Masbatim Putra, Ikhsan Shobari, Ismet Isnaini, K. Kurnianto","doi":"10.1109/AECT47998.2020.9194167","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194167","url":null,"abstract":"A risk analysis and smart detection of the ultrasonic scanner for inservice inspection on Research Reactor has been conducted. The hardware ultrasonic scanner has been installed and tested. This paper consists of the risk analysis design and the smart acquisition system. Risk assessment of tool installation and operation has been carried out as part of the system. The results indicate moderate and low risk, which means the tool can be operated. The results of the test in the reactor tank that the ultrasonic scanner system can work well and safely for inservice inspection.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Futuristic Blockchain based Vehicular Network Architecture and Trust Management System 未来基于区块链的车辆网络架构与信任管理系统
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194160
Usama Arshad, Sakeena Javaid, Sheeraz Ahmed, Beenish Seemab, N. Javaid
In a complex network of smart vehicles, some issues arise related to security, privacy, selfishness of nodes and node failures. We have proposed an architecture of vehicular network in a smart city based on blockchain. Some scenarios and design principles are also provided. Contrary to prior architectures of vehicular networks, our proposed model provides robustness, scalability, adaptability, trust management as well as privacy and security. It eliminates the issue of selfish nodes and malicious nodes. Unlike other vehicular architectures, it also takes into account the passengers’ medical facilities and fault tolerance. In case of any failure of sensors or nodes, system will effectively tackle it. Both big data storage and fast computation are not possible on vehicles end. This can be handled by moving these processes to static nodes and data center. Malicious behaviour of nodes is handled using trust values and incentives mechanism in order to motivate nodes to work effectively while assigning penalty for selfish nodes.
在复杂的智能汽车网络中,会出现一些与安全、隐私、节点自私和节点故障相关的问题。我们提出了一种基于区块链的智慧城市车联网架构。给出了一些场景和设计原则。与先前的车辆网络架构相反,我们提出的模型具有鲁棒性、可扩展性、适应性、信任管理以及隐私和安全性。它消除了自私节点和恶意节点的问题。与其他车辆架构不同,它还考虑了乘客的医疗设施和容错能力。当传感器或节点出现故障时,系统将有效处理。大数据存储和快速计算在车辆端是不可能实现的。这可以通过将这些流程移动到静态节点和数据中心来解决。利用信任值和激励机制来处理节点的恶意行为,以激励节点有效工作,同时对自私节点进行惩罚。
{"title":"A Futuristic Blockchain based Vehicular Network Architecture and Trust Management System","authors":"Usama Arshad, Sakeena Javaid, Sheeraz Ahmed, Beenish Seemab, N. Javaid","doi":"10.1109/AECT47998.2020.9194160","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194160","url":null,"abstract":"In a complex network of smart vehicles, some issues arise related to security, privacy, selfishness of nodes and node failures. We have proposed an architecture of vehicular network in a smart city based on blockchain. Some scenarios and design principles are also provided. Contrary to prior architectures of vehicular networks, our proposed model provides robustness, scalability, adaptability, trust management as well as privacy and security. It eliminates the issue of selfish nodes and malicious nodes. Unlike other vehicular architectures, it also takes into account the passengers’ medical facilities and fault tolerance. In case of any failure of sensors or nodes, system will effectively tackle it. Both big data storage and fast computation are not possible on vehicles end. This can be handled by moving these processes to static nodes and data center. Malicious behaviour of nodes is handled using trust values and incentives mechanism in order to motivate nodes to work effectively while assigning penalty for selfish nodes.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drive-By Road Condition Assessment Using Internet of Things Technology 基于物联网技术的行车路况评估
Pub Date : 2020-02-01 DOI: 10.1109/aect47998.2020.9194190
M. A. Raheem, M. El-Melegy
In this paper, we present a fully automated road assessment methods using cellular based internet of things platforms. The vibration data recorded from accelerometer sensor attached to a moving car is transmitted over the internet via cellular network to the monitoring server. At the monitoring server side, the vibration signal is used to calculate the international roughness index as a measure of the road surface roughness and its values are visualized on the road map for different road segments. Also, the possibility of using smartphone with built in accelerometer is investigated and its performance is compared with other proposed platforms.
在本文中,我们提出了一种基于蜂窝物联网平台的全自动道路评估方法。从连接在行驶中的汽车上的加速度计传感器记录的振动数据通过蜂窝网络通过互联网传输到监控服务器。在监控服务器端,利用振动信号计算国际粗糙度指数,作为衡量路面粗糙度的指标,并将其数值可视化显示在不同路段的路线图上。此外,研究了使用内置加速度计的智能手机的可能性,并将其性能与其他提出的平台进行了比较。
{"title":"Drive-By Road Condition Assessment Using Internet of Things Technology","authors":"M. A. Raheem, M. El-Melegy","doi":"10.1109/aect47998.2020.9194190","DOIUrl":"https://doi.org/10.1109/aect47998.2020.9194190","url":null,"abstract":"In this paper, we present a fully automated road assessment methods using cellular based internet of things platforms. The vibration data recorded from accelerometer sensor attached to a moving car is transmitted over the internet via cellular network to the monitoring server. At the monitoring server side, the vibration signal is used to calculate the international roughness index as a measure of the road surface roughness and its values are visualized on the road map for different road segments. Also, the possibility of using smartphone with built in accelerometer is investigated and its performance is compared with other proposed platforms.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 International Conference on Advances in the Emerging Computing Technologies (AECT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1