首页 > 最新文献

2023 15th International Conference on Developments in eSystems Engineering (DeSE)最新文献

英文 中文
A Transfer Learning Based Intrusion Detection System for Internet of Vehicles 基于迁移学习的车联网入侵检测系统
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10099623
Achref Haddaji, S. Ayed, L. Chaari
With the fast expansion of the internet of vehicles (IoV) and the emergence of new types of threats, the traditional machine learning-based intrusion detection systems must be updated to meet the security requirements of the current environment. Recently, deep learning has shown exceptional performance in IoV intrusion detection. However, deep learning-based intrusion detection system (DL-IDS) models are more fixated and dependent on the training dataset. In addition, the behavior changes with the occurrence of attacks. They pose a real problem for the DL-IDS and make their detection more complicate. In this paper, we present a deep transfer learning based intrusion detection in-vehicle (TRLID) model for IoV using the CAN bus protocol. In our proposed model, a data preparation approach is proposed to clean up bus data and convert it to an image for usage as input to the deep learning model. Indeed, we used transfer learning characteristics because they enable us to transfer the source task's knowledge to the target task. Therefore, we trained our model using different dataset including different attacks. The experimental results show that our proposed TRLID achieved good results where the intelligence integration of transfer learning was efficient for attacks detection.
随着车联网的快速发展和新型威胁的出现,传统的基于机器学习的入侵检测系统必须进行更新,以满足当前环境的安全要求。近年来,深度学习在车联网入侵检测中表现出了优异的性能。然而,基于深度学习的入侵检测系统(DL-IDS)模型更依赖于训练数据集。此外,随着攻击的发生,行为也会发生变化。它们给DL-IDS带来了真正的问题,并使其检测更加复杂。本文提出了一种基于CAN总线协议的基于深度迁移学习的车载入侵检测(TRLID)模型。在我们提出的模型中,提出了一种数据准备方法来清理总线数据并将其转换为图像以用作深度学习模型的输入。事实上,我们使用迁移学习特征是因为它们使我们能够将源任务的知识转移到目标任务中。因此,我们使用包含不同攻击的不同数据集来训练我们的模型。实验结果表明,我们提出的TRLID方法取得了良好的效果,其中迁移学习的智能集成对攻击检测是有效的。
{"title":"A Transfer Learning Based Intrusion Detection System for Internet of Vehicles","authors":"Achref Haddaji, S. Ayed, L. Chaari","doi":"10.1109/DeSE58274.2023.10099623","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099623","url":null,"abstract":"With the fast expansion of the internet of vehicles (IoV) and the emergence of new types of threats, the traditional machine learning-based intrusion detection systems must be updated to meet the security requirements of the current environment. Recently, deep learning has shown exceptional performance in IoV intrusion detection. However, deep learning-based intrusion detection system (DL-IDS) models are more fixated and dependent on the training dataset. In addition, the behavior changes with the occurrence of attacks. They pose a real problem for the DL-IDS and make their detection more complicate. In this paper, we present a deep transfer learning based intrusion detection in-vehicle (TRLID) model for IoV using the CAN bus protocol. In our proposed model, a data preparation approach is proposed to clean up bus data and convert it to an image for usage as input to the deep learning model. Indeed, we used transfer learning characteristics because they enable us to transfer the source task's knowledge to the target task. Therefore, we trained our model using different dataset including different attacks. The experimental results show that our proposed TRLID achieved good results where the intelligence integration of transfer learning was efficient for attacks detection.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transformer Based Approach for Depression Detection 基于变压器的凹陷检测方法
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10099629
Anagha Anil Khaparde, Rik Das, Rupal Bhargava
Mental health of a person plays equivalent significant role in ensuring their wellbeing as their physical health. A great deal of work and e ffort has gone into increasing awareness of this issue. One su ch effort is made by the discipline of computer science, whic h makes use of social media data to give more information in identifying these mental illnesses. People are increasingly usi ng internet platforms to voice our suicide ideas as technology advances quickly. The purpose of the study is to identify a person's indicators of depression based on their social media postings, where users express their feelings and emotions. The goal of this study is to develop three models-Naive Bayes, Pre-Trained Model BERT, and XLNET-and compare their performance in identifying depression from messages on Twitter. These models are pre-processed using the Tweet preprocessor and BERT embeddings, and then the pretrained models are fine-tuned. With an accuracy of 0.9942, it was found that Bert performed better than the other two models.
一个人的心理健康与身体健康在确保其福祉方面具有同等重要的作用。为了提高人们对这个问题的认识,我们做了大量的工作和努力。计算机科学学科就做出了这样的努力,它利用社交媒体数据来提供更多信息,以识别这些精神疾病。随着科技的快速发展,人们越来越多地使用互联网平台来表达自己的自杀想法。这项研究的目的是根据用户在社交媒体上表达自己的感受和情绪的帖子来确定一个人的抑郁指标。本研究的目标是开发三种模型——朴素贝叶斯、预训练模型BERT和xlnet——并比较它们在从Twitter信息中识别抑郁症方面的表现。使用Tweet预处理器和BERT嵌入对这些模型进行预处理,然后对预训练的模型进行微调。准确率为0.9942,发现Bert的表现优于其他两个模型。
{"title":"Transformer Based Approach for Depression Detection","authors":"Anagha Anil Khaparde, Rik Das, Rupal Bhargava","doi":"10.1109/DeSE58274.2023.10099629","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099629","url":null,"abstract":"Mental health of a person plays equivalent significant role in ensuring their wellbeing as their physical health. A great deal of work and e ffort has gone into increasing awareness of this issue. One su ch effort is made by the discipline of computer science, whic h makes use of social media data to give more information in identifying these mental illnesses. People are increasingly usi ng internet platforms to voice our suicide ideas as technology advances quickly. The purpose of the study is to identify a person's indicators of depression based on their social media postings, where users express their feelings and emotions. The goal of this study is to develop three models-Naive Bayes, Pre-Trained Model BERT, and XLNET-and compare their performance in identifying depression from messages on Twitter. These models are pre-processed using the Tweet preprocessor and BERT embeddings, and then the pretrained models are fine-tuned. With an accuracy of 0.9942, it was found that Bert performed better than the other two models.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123506863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Sensor Placement Strategy for Structural Health Monitoring with Application of the Aqueduct El Hnaya of Carthage 结构健康监测传感器优化布置策略&以迦太基El Hnaya渡槽为例
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10100124
Wael Doghri, A. Saddoud, L. Chaari
The concept of structural health monitoring (SHM), which ensures maintenance and conservation of the built environment, is progressively growing in importance. SHM offers the building's historical and cultural value in addition to its safety. Nowadays days, Wireless Sensor Networks (WSN) are frequently employed for SHM and offer a strong contender to address a number of problems, including sensor location. A sensor placement approach is therefore needed considering fragility and significance of the historic structures. In this paper, we propose sensors placement methods applied on the historical monument Aqueduct of Carthage of Tunisia. Our method is based on the Finite Element Modeling (FEM) to carry out the mesh model of the structure arches and to identify two types of the arch zones; stressed and unstressed zones. Based on FEM results, we determine the optimal sensor positions to maximize the covered surface, given a limited number of sensor.
结构健康监测(SHM)的概念确保了建筑环境的维护和保护,其重要性日益增加。除了安全之外,SHM还提供了建筑的历史和文化价值。如今,无线传感器网络(WSN)经常被用于SHM,并为解决包括传感器定位在内的许多问题提供了强有力的竞争者。因此,考虑到历史建筑的脆弱性和重要性,需要一种传感器放置方法。本文提出了一种应用于突尼斯迦太基历史遗迹渡槽的传感器布置方法。该方法基于有限元建模(FEM)对结构拱进行网格化建模,并识别出两种类型的拱区;压力区和非压力区。基于有限元分析结果,在有限的传感器数量下,我们确定了传感器的最佳位置,以最大化覆盖表面。
{"title":"Optimal Sensor Placement Strategy for Structural Health Monitoring with Application of the Aqueduct El Hnaya of Carthage","authors":"Wael Doghri, A. Saddoud, L. Chaari","doi":"10.1109/DeSE58274.2023.10100124","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100124","url":null,"abstract":"The concept of structural health monitoring (SHM), which ensures maintenance and conservation of the built environment, is progressively growing in importance. SHM offers the building's historical and cultural value in addition to its safety. Nowadays days, Wireless Sensor Networks (WSN) are frequently employed for SHM and offer a strong contender to address a number of problems, including sensor location. A sensor placement approach is therefore needed considering fragility and significance of the historic structures. In this paper, we propose sensors placement methods applied on the historical monument Aqueduct of Carthage of Tunisia. Our method is based on the Finite Element Modeling (FEM) to carry out the mesh model of the structure arches and to identify two types of the arch zones; stressed and unstressed zones. Based on FEM results, we determine the optimal sensor positions to maximize the covered surface, given a limited number of sensor.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124292235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dezvent - Digitalizing Attendance System with 2FA and Face Recognition Implementation 数字化考勤系统与2FA和人脸识别的实现
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10100308
Zoe Lim Mei Yi, Julia Juremi
The traditional way of taking attendance has been said to be inefficient and had to take a longer time to mark every attendee's presence. With that in mind, the research aims to eliminate the issue brought by the manual attendance system by developing a web-based attendance system that can record attendance in a faster and more effective way with the implementation of a face recognition system. The attendance will be taken with just one scan of the face of the attendees, ensuring their presence at the event. Not only that but also with the implementation of two-factor authentication (2FA) to develop a secure web-based system, as well as to protect users against cyber-attack. This system not only solved the problems brought by the current attendance system but also protects the environment by eliminating the need of using paper to record attendance.
据说,传统的考勤方式效率低下,而且需要花更长的时间来标记每位与会者的出席情况。基于此,本研究旨在通过开发一种基于网络的考勤系统,通过人脸识别系统的实现,可以更快、更有效地记录考勤,从而消除人工考勤系统带来的问题。只需扫一眼与会者的脸,就能确保他们出席活动。不仅如此,还可以通过实施双因素认证(2FA)来开发一个安全的基于web的系统,并保护用户免受网络攻击。该系统既解决了现有考勤系统带来的问题,又避免了使用纸质考勤,保护了环境。
{"title":"Dezvent - Digitalizing Attendance System with 2FA and Face Recognition Implementation","authors":"Zoe Lim Mei Yi, Julia Juremi","doi":"10.1109/DeSE58274.2023.10100308","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100308","url":null,"abstract":"The traditional way of taking attendance has been said to be inefficient and had to take a longer time to mark every attendee's presence. With that in mind, the research aims to eliminate the issue brought by the manual attendance system by developing a web-based attendance system that can record attendance in a faster and more effective way with the implementation of a face recognition system. The attendance will be taken with just one scan of the face of the attendees, ensuring their presence at the event. Not only that but also with the implementation of two-factor authentication (2FA) to develop a secure web-based system, as well as to protect users against cyber-attack. This system not only solved the problems brought by the current attendance system but also protects the environment by eliminating the need of using paper to record attendance.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sign Language Recognition using Deep Learning 使用深度学习的手语识别
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10100055
M. Mahyoub, F. Natalia, S. Sudirman, J. Mustafina
Sign Language Recognition is a form of action recognition problem. The purpose of such a system is to automatically translate sign words from one language to another. While much work has been done in the SLR domain, it is a broad area of study and numerous areas still need research attention. The work that we present in this paper aims to investigate the suitability of deep learning approaches in recognizing and classifying words from video frames in different sign languages. We consider three sign languages, namely Indian Sign Language, American Sign Language, and Turkish Sign Language. Our methodology employs five different deep learning models with increasing complexities. They are a shallow four-layer Convolutional Neural Network, a basic VGG16 model, a VGG16 model with Attention Mechanism, a VGG16 model with Transformer Encoder and Gated Recurrent Units-based Decoder, and an Inflated 3D model with the same. We trained and tested the models to recognize and classify words from videos in three different sign language datasets. From our experiment, we found that the performance of the models relates quite closely to the model's complexity with the Inflated 3D model performing the best. Furthermore, we also found that all models find it more difficult to recognize words in the American Sign Language dataset than the others.
手语识别是动作识别问题的一种形式。这种系统的目的是自动将手语从一种语言翻译成另一种语言。虽然在单反领域已经做了很多工作,但它是一个广泛的研究领域,还有许多领域需要关注。我们在本文中提出的工作旨在研究深度学习方法在识别和分类不同手语视频帧中的单词方面的适用性。我们考虑三种手语,即印度手语,美国手语和土耳其手语。我们的方法采用了五种不同的深度学习模型,其复杂性不断增加。它们是浅四层卷积神经网络,基本VGG16模型,带注意机制的VGG16模型,带变压器编码器和基于门控循环单元的解码器的VGG16模型,以及具有相同功能的充气3D模型。我们训练并测试了这些模型,以识别和分类三种不同的手语数据集中的视频中的单词。从实验中,我们发现模型的性能与模型的复杂性密切相关,其中充气3D模型表现最好。此外,我们还发现所有模型都发现在美国手语数据集中识别单词比其他模型更难。
{"title":"Sign Language Recognition using Deep Learning","authors":"M. Mahyoub, F. Natalia, S. Sudirman, J. Mustafina","doi":"10.1109/DeSE58274.2023.10100055","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100055","url":null,"abstract":"Sign Language Recognition is a form of action recognition problem. The purpose of such a system is to automatically translate sign words from one language to another. While much work has been done in the SLR domain, it is a broad area of study and numerous areas still need research attention. The work that we present in this paper aims to investigate the suitability of deep learning approaches in recognizing and classifying words from video frames in different sign languages. We consider three sign languages, namely Indian Sign Language, American Sign Language, and Turkish Sign Language. Our methodology employs five different deep learning models with increasing complexities. They are a shallow four-layer Convolutional Neural Network, a basic VGG16 model, a VGG16 model with Attention Mechanism, a VGG16 model with Transformer Encoder and Gated Recurrent Units-based Decoder, and an Inflated 3D model with the same. We trained and tested the models to recognize and classify words from videos in three different sign language datasets. From our experiment, we found that the performance of the models relates quite closely to the model's complexity with the Inflated 3D model performing the best. Furthermore, we also found that all models find it more difficult to recognize words in the American Sign Language dataset than the others.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Approach for Resilience and Reliability Against Cascading Failure 针对级联故障的弹性和可靠性的有效方法
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10100283
D. M. Vistro, A. Rehman, Zufishan Hameed
Cloud computing becoming popular now day as, the world is moving towards vitalization and it provide resource to the users depending on their needs by using different resource allocation technique. Resilience and reliability is one of the major issue while dealing with cloud computing. Mitigation failure and migration failure are the issues in cloud resilience and reliability services which cause many service level objective violation. Many work have been done to improve the quality of resilience and reliability. The aim of this paper is to provide a better technique to avoid and recover from mitigation failure and a reliable resource allocation approach at minimum possible cost, for this purpose we used Cascading Failure Resilience System (CSFR) technique. Comparative analyses done to validate our approach and the results shows that our approach handle mitigation failure in an efficient way as well as it provide reliability while providing resources to the users at a comparative low cost.
随着世界走向生机勃勃的今天,云计算开始流行起来,它通过使用不同的资源分配技术,根据用户的需要为用户提供资源。弹性和可靠性是处理云计算时的主要问题之一。缓解失败和迁移失败是云弹性和可靠性服务中存在的问题,会导致许多服务水平目标的违背。为了提高弹性和可靠性的质量,已经做了许多工作。本文的目的是提供一种更好的技术来避免和恢复缓解故障和可靠的资源分配方法,以尽可能低的成本,为此我们使用了级联故障恢复系统(CSFR)技术。为验证我们的方法而进行的比较分析结果表明,我们的方法以有效的方式处理缓解故障,并在以相对较低的成本向用户提供资源的同时提供可靠性。
{"title":"An Efficient Approach for Resilience and Reliability Against Cascading Failure","authors":"D. M. Vistro, A. Rehman, Zufishan Hameed","doi":"10.1109/DeSE58274.2023.10100283","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100283","url":null,"abstract":"Cloud computing becoming popular now day as, the world is moving towards vitalization and it provide resource to the users depending on their needs by using different resource allocation technique. Resilience and reliability is one of the major issue while dealing with cloud computing. Mitigation failure and migration failure are the issues in cloud resilience and reliability services which cause many service level objective violation. Many work have been done to improve the quality of resilience and reliability. The aim of this paper is to provide a better technique to avoid and recover from mitigation failure and a reliable resource allocation approach at minimum possible cost, for this purpose we used Cascading Failure Resilience System (CSFR) technique. Comparative analyses done to validate our approach and the results shows that our approach handle mitigation failure in an efficient way as well as it provide reliability while providing resources to the users at a comparative low cost.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intracranial hemorrhage detection and classification from CT images based on multiple features and machine learning approaches 基于多特征和机器学习方法的CT图像颅内出血检测与分类
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10099988
Mohammad A. Abdul Majeed, Omar Munthir Al Okashi, Azmi Tawfeq Alrawi
The regulating organ of the body is the brain. Early diagnosis of brain disorders can have a significant impact on efforts to treat them. A brain hemorrhage is a form of stroke caused by a bursting artery in the brain, resulting in bleeding in the surrounding tissues. Through a brain Computed Tomography (CT) scan, brain hemorrhage can be identified. CT is the most extensively used diagnostic imaging technology for identifying brain illnesses due to its speed, low cost, and wide variety of uses. During a CT scan, a small X-ray beam revolves around the body to capture a sequence of images from different angles. The computer then produces a cross-sectional representation of the body. Intracranial hemorrhage (ICH) is a medical condition that requires prompt identification and treatment. Since ICH early detection and therapy can improve health outcomes, there is a need for a triage system that can immediately identify and speed up the treatment process. In this paper, we will use standard machine learning (Support Vector Machine, Random Forest and Decision Tree) methodologies to present a method for automatically detecting the ICH in a two-dimensional reduced form of a CT scan of the brain. Four main steps make up the method. First, a preprocessing pipeline that can successfully remove the bone from the skull is put into place. The following step is applying a feature extraction method. Then, a suitable feature-selection (PCA) model is proposed, which will enhance the model's performance by minimizing any redundancy produced by the selected feature extraction. The data set from the CT scans is classified into normal and abnormal in the last stage, which involves training and testing a machine learning model. The accuracy for our proposed model using Random Forest (RF), is 92.5%. RF achieves higher performance than other used ML methods.
身体的调节器官是大脑。脑部疾病的早期诊断对治疗有重大影响。脑出血是一种中风,由大脑动脉破裂引起,导致周围组织出血。通过脑部计算机断层扫描(CT),可以识别脑出血。CT因其速度快、成本低、用途广泛,是目前应用最广泛的脑部疾病诊断成像技术。在CT扫描过程中,一个小的x射线束围绕身体旋转,从不同的角度捕捉一系列图像。然后,计算机生成人体的横截面图。颅内出血(ICH)是一种需要及时识别和治疗的疾病。由于脑出血的早期发现和治疗可以改善健康结果,因此需要一种能够立即识别和加快治疗过程的分诊系统。在本文中,我们将使用标准的机器学习(支持向量机,随机森林和决策树)方法来提出一种以二维简化形式的大脑CT扫描自动检测ICH的方法。该方法由四个主要步骤组成。首先,一个可以成功地从颅骨中移除骨头的预处理管道被放置到位。接下来的步骤是应用特征提取方法。然后,提出了一个合适的特征选择(PCA)模型,该模型通过最小化所选特征提取产生的冗余来提高模型的性能。CT扫描的数据集在最后阶段被分为正常和异常,这涉及到机器学习模型的训练和测试。我们使用随机森林(RF)提出的模型的准确率为92.5%。RF实现了比其他ML方法更高的性能。
{"title":"Intracranial hemorrhage detection and classification from CT images based on multiple features and machine learning approaches","authors":"Mohammad A. Abdul Majeed, Omar Munthir Al Okashi, Azmi Tawfeq Alrawi","doi":"10.1109/DeSE58274.2023.10099988","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099988","url":null,"abstract":"The regulating organ of the body is the brain. Early diagnosis of brain disorders can have a significant impact on efforts to treat them. A brain hemorrhage is a form of stroke caused by a bursting artery in the brain, resulting in bleeding in the surrounding tissues. Through a brain Computed Tomography (CT) scan, brain hemorrhage can be identified. CT is the most extensively used diagnostic imaging technology for identifying brain illnesses due to its speed, low cost, and wide variety of uses. During a CT scan, a small X-ray beam revolves around the body to capture a sequence of images from different angles. The computer then produces a cross-sectional representation of the body. Intracranial hemorrhage (ICH) is a medical condition that requires prompt identification and treatment. Since ICH early detection and therapy can improve health outcomes, there is a need for a triage system that can immediately identify and speed up the treatment process. In this paper, we will use standard machine learning (Support Vector Machine, Random Forest and Decision Tree) methodologies to present a method for automatically detecting the ICH in a two-dimensional reduced form of a CT scan of the brain. Four main steps make up the method. First, a preprocessing pipeline that can successfully remove the bone from the skull is put into place. The following step is applying a feature extraction method. Then, a suitable feature-selection (PCA) model is proposed, which will enhance the model's performance by minimizing any redundancy produced by the selected feature extraction. The data set from the CT scans is classified into normal and abnormal in the last stage, which involves training and testing a machine learning model. The accuracy for our proposed model using Random Forest (RF), is 92.5%. RF achieves higher performance than other used ML methods.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115639621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implement of Intelligent Controller for 6DOF Robot Based on a Virtual Reality Model 基于虚拟现实模型的六自由度机器人智能控制器的实现
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10099597
Y. A. Mashhadany, A. Alrawi, Zeyid T. Ibraheem, Sameer Algburi
Every designer aspires to produce designs that are superior to those of their rivals in terms of quality, speed, or efficiency. Using an ANFIS (Adaptive Neural Inference System) controller and a proportional, integrated, derived (2DO-PID) 2-degree of freedom controller, this study suggests a high-performance design for a 6-DOF manipulator. Finding the best value for the controller settings that smoothly regulate the robot's movements to the desired aim is the primary objective of this exercise. The first step in the design process is to naturally determine the best values for the parameters of a traditional PID controller. The creation of a high-resolution 2DOF-PID controller is the next phase. It performs better than the conventional correct order using a mysterious physics control technique. The parameters of the 2DOF-PID controller are estimated based on the undeniably significant nature of the control effect. The final stage in achieving the high performance of the control system under consideration is the hybrid 2DOF-PID and ANFIS controller, which uses the prior output as a predictive point. The use of both modern and vintage consoles. Six-degree-of-freedom elbow curves are supported. Because the manipulator's trajectory exceeded the settling time and affected the movement, it was possible to minimize. MATLAB 2021b and Robotics Toolbox 9 were used to design and simulate the entire remote-control system. The controller's optimal design is built using a 3-dimensional model of a 6-DOF manipulator created with MATLAB/virtual Simulink's reality (VR) technology. MATLAB generates the manipulator instructions, which are then used to generate a real trajectory with a virtual reality model.
每个设计师都渴望生产出在质量、速度或效率方面优于竞争对手的设计。采用ANFIS(自适应神经推理系统)控制器和比例、集成、衍生(2DO-PID) 2自由度控制器,提出了一种高性能的6自由度机械臂设计方案。找到控制器设置的最佳值,使机器人的运动平稳地调节到期望的目标是本练习的主要目标。设计过程的第一步自然是确定传统PID控制器参数的最佳值。下一阶段是创建高分辨率2DOF-PID控制器。使用一种神秘的物理控制技术,它比传统的正确顺序表现得更好。基于控制效果不可否认的显著性,估计了2DOF-PID控制器的参数。在考虑实现高性能控制系统的最后阶段是混合2DOF-PID和ANFIS控制器,它使用先验输出作为预测点。同时使用现代和老式主机。支持六自由度弯头曲线。由于机械手的运动轨迹超过了沉降时间,影响了机械手的运动,因此可以实现最小。利用MATLAB 2021b和Robotics Toolbox 9对整个遥控系统进行了设计和仿真。利用MATLAB/virtual Simulink的现实(VR)技术建立了六自由度机械臂的三维模型,建立了控制器的优化设计。MATLAB生成机械手指令,然后使用虚拟现实模型生成真实轨迹。
{"title":"Implement of Intelligent Controller for 6DOF Robot Based on a Virtual Reality Model","authors":"Y. A. Mashhadany, A. Alrawi, Zeyid T. Ibraheem, Sameer Algburi","doi":"10.1109/DeSE58274.2023.10099597","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099597","url":null,"abstract":"Every designer aspires to produce designs that are superior to those of their rivals in terms of quality, speed, or efficiency. Using an ANFIS (Adaptive Neural Inference System) controller and a proportional, integrated, derived (2DO-PID) 2-degree of freedom controller, this study suggests a high-performance design for a 6-DOF manipulator. Finding the best value for the controller settings that smoothly regulate the robot's movements to the desired aim is the primary objective of this exercise. The first step in the design process is to naturally determine the best values for the parameters of a traditional PID controller. The creation of a high-resolution 2DOF-PID controller is the next phase. It performs better than the conventional correct order using a mysterious physics control technique. The parameters of the 2DOF-PID controller are estimated based on the undeniably significant nature of the control effect. The final stage in achieving the high performance of the control system under consideration is the hybrid 2DOF-PID and ANFIS controller, which uses the prior output as a predictive point. The use of both modern and vintage consoles. Six-degree-of-freedom elbow curves are supported. Because the manipulator's trajectory exceeded the settling time and affected the movement, it was possible to minimize. MATLAB 2021b and Robotics Toolbox 9 were used to design and simulate the entire remote-control system. The controller's optimal design is built using a 3-dimensional model of a 6-DOF manipulator created with MATLAB/virtual Simulink's reality (VR) technology. MATLAB generates the manipulator instructions, which are then used to generate a real trajectory with a virtual reality model.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A System Implementation: Point-of-Sales (POS) System Integrated with Business Intelligence (BI) Capability Focused on SME in Indonesia 一个系统实现:与商业智能(BI)能力集成的销售点(POS)系统,专注于印尼的中小企业
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10099802
Faiz Maruf Al Kautsaf, Mohammad Namazee Bin Mohd Nizam, Khalida Shajaratuddur Harun
This paper is about a project to implement a model of point-of-sale (POS) system equipped with Business Intelligence (BI) capabilities that suits the nature of business organisations in the scope of Small and Medium Enterprise (SME) in Indonesia). The project was developed based on proposed framework integrating Point-Of-Sales System, Databases, Visualization Tools namely Microsoft Power BI and its other relevant libraries. Overtime, SMEs in Indonesia have generated large volumes of data from their business operations. The SMEs need to be able to efficiently manage and analyze large volumes of data to provide better business decision making. Effective decision making shall help SMEs achieve competitive advantage. This is where Business Intelligence (BI) comes to light to provide insightful information to facilitate the business decision making process.
本文是关于一个项目,以实现销售点(POS)系统的模型配备商业智能(BI)功能,适合业务组织的性质在印度尼西亚的中小型企业(SME)的范围内)。该项目是基于集成销售点系统、数据库、可视化工具(即Microsoft Power BI)及其其他相关库的拟议框架开发的。随着时间的推移,印尼的中小企业从其业务运营中产生了大量数据。中小企业需要能够有效地管理和分析大量数据,以提供更好的业务决策。有效的决策有助于中小企业获得竞争优势。这就是商业智能(BI)发挥作用的地方,它提供有洞察力的信息,以促进业务决策过程。
{"title":"A System Implementation: Point-of-Sales (POS) System Integrated with Business Intelligence (BI) Capability Focused on SME in Indonesia","authors":"Faiz Maruf Al Kautsaf, Mohammad Namazee Bin Mohd Nizam, Khalida Shajaratuddur Harun","doi":"10.1109/DeSE58274.2023.10099802","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099802","url":null,"abstract":"This paper is about a project to implement a model of point-of-sale (POS) system equipped with Business Intelligence (BI) capabilities that suits the nature of business organisations in the scope of Small and Medium Enterprise (SME) in Indonesia). The project was developed based on proposed framework integrating Point-Of-Sales System, Databases, Visualization Tools namely Microsoft Power BI and its other relevant libraries. Overtime, SMEs in Indonesia have generated large volumes of data from their business operations. The SMEs need to be able to efficiently manage and analyze large volumes of data to provide better business decision making. Effective decision making shall help SMEs achieve competitive advantage. This is where Business Intelligence (BI) comes to light to provide insightful information to facilitate the business decision making process.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"66 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122835543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of authentic and counterfeit Viagra tablets using near-infrared spectroscopic methods and machine learning algorithms 使用近红外光谱方法和机器学习算法识别真假伟哥片剂
Pub Date : 2023-01-09 DOI: 10.1109/DeSE58274.2023.10100015
Sarah Rowlands, D. Al-Jumeily, S. Assi
Counterfeit medicinal and lifestyles products are a global issue that impacts public health. Counterfeit products are often made in unsafe and unsanitary conditions before their release to the public without testing by regulatory bodies. One product that is particularly susceptible to online counterfeiting is Viagra, which is one of the highest selling medicines worldwide. A total of 57 Viagra tablets were used for the study; this included 27 authentic and 30 counterfeit tablets which were measured using near-infrared spectroscopy (NIRS). Spectra obtained using the NIR spectrometer non-destructively were exported into a multi-paradigm numerical computing environment where machine learning algorithms (MLAs) were applied using Matlab 2007a. Four algorithms were used related to correlation in wavelength space (CWS), K-nearest neighbour (KNN), principal component analysis (PCA) and PCA combined with fuzzy C-mean clustering (PCA-FCM). The algorithms were applied unsupervised to the authentic and counterfeit tables with no prior labelling to any of the tablets. The results showed two clear groups/clusters between the authentic and counterfeit tablets. In particular, PCA and PCA-FCM showed further subgroups among the counterfeit tablets that corresponded to their varying manufacturing sources. In summary, the use of NIRS and MLAs proved an effective method for identifying counterfeit Viagra medicines rapidly and non-destructively.
假冒药品和生活用品是一个影响公共卫生的全球性问题。假冒产品往往是在不安全和不卫生的条件下制造的,然后才向公众发布,没有经过监管机构的检测。伟哥是一种特别容易被网上假冒的产品,它是世界上销量最高的药品之一。这项研究共使用了57片伟哥;其中包括使用近红外光谱(NIRS)测量的27片正品和30片假药。利用近红外光谱仪获得的非破坏性光谱导出到多范式数值计算环境中,并在Matlab 2007a中应用机器学习算法(MLAs)。采用了波长空间(CWS)、k近邻(KNN)、主成分分析(PCA)和主成分分析结合模糊c均值聚类(PCA- fcm) 4种相关算法。这些算法在没有监督的情况下应用于正品和假冒的桌子,任何药片都没有事先标签。结果表明,正品和假品之间存在明显的两组/簇。特别是,PCA和PCA- fcm在假药片剂中显示了与不同生产来源相对应的进一步亚群。综上所述,近红外光谱(NIRS)和多光谱红外光谱(mla)被证明是快速、无损地识别假冒伟哥药品的有效方法。
{"title":"Identification of authentic and counterfeit Viagra tablets using near-infrared spectroscopic methods and machine learning algorithms","authors":"Sarah Rowlands, D. Al-Jumeily, S. Assi","doi":"10.1109/DeSE58274.2023.10100015","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100015","url":null,"abstract":"Counterfeit medicinal and lifestyles products are a global issue that impacts public health. Counterfeit products are often made in unsafe and unsanitary conditions before their release to the public without testing by regulatory bodies. One product that is particularly susceptible to online counterfeiting is Viagra, which is one of the highest selling medicines worldwide. A total of 57 Viagra tablets were used for the study; this included 27 authentic and 30 counterfeit tablets which were measured using near-infrared spectroscopy (NIRS). Spectra obtained using the NIR spectrometer non-destructively were exported into a multi-paradigm numerical computing environment where machine learning algorithms (MLAs) were applied using Matlab 2007a. Four algorithms were used related to correlation in wavelength space (CWS), K-nearest neighbour (KNN), principal component analysis (PCA) and PCA combined with fuzzy C-mean clustering (PCA-FCM). The algorithms were applied unsupervised to the authentic and counterfeit tables with no prior labelling to any of the tablets. The results showed two clear groups/clusters between the authentic and counterfeit tablets. In particular, PCA and PCA-FCM showed further subgroups among the counterfeit tablets that corresponded to their varying manufacturing sources. In summary, the use of NIRS and MLAs proved an effective method for identifying counterfeit Viagra medicines rapidly and non-destructively.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127394632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 15th International Conference on Developments in eSystems Engineering (DeSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1