首页 > 最新文献

2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)最新文献

英文 中文
Nonlinear Temporal Analysis of Uterine EMG for Preterm Birth Classification 子宫肌电图对早产分类的非线性时间分析
Irtiza Hasan, A. Das, Mohammed Imamul, Hassan Bhuiyan
Premature birth, one of the root causes of maternal mortality and childhood morbidity, is growing at an increased rate worldwide. Several screening tests used in clinical settings to predict preterm births do not show satisfactory results. Electrohysterography, a noninvasive automated method of monitoring uterine contractions during labor, has shown to be effective in the classification task. In this work, we explored the potential use of several temporal nonlinear parameters for carrying out classification process. A publicly available TPEHG DB (Term Preterm Electrohysterogram Database) containing 262 term records and 38 preterm records was used to conduct the study. To execute effective classification tasks, Synthetic Minority Over-Sampling Technique (SMOTE) was applied on unbalanced dataset to generate equal number of training dataset by oversampling the minority class. New suitable nonlinear features have been addresed in this study other than the features used in the previous works to compare the performance of the classifiers. The analysis showed that extremely randomized trees or extra trees classifier shows significant improvement by using these features in the classification process of term and preterm records with cross validation accuracy 91.4%, specificity 90.2% and sensitivity 95.5%. The proposed approach could be combined with other methods to excel in the existing classification performance.
早产是孕产妇死亡和儿童发病率的根本原因之一,在世界范围内正以越来越快的速度增长。在临床环境中用于预测早产的几种筛选试验没有显示出令人满意的结果。子宫电图是一种监测分娩过程中子宫收缩的无创自动方法,已被证明在分类任务中是有效的。在这项工作中,我们探索了几个时间非线性参数在进行分类过程中的潜在用途。一个公开的TPEHG DB(足月早产电宫图数据库)包含262个足月记录和38个早产记录,用于进行研究。为了执行有效的分类任务,在非平衡数据集上应用合成少数派过采样技术(SMOTE),通过对少数派类进行过采样,生成相等数量的训练数据集。除了在以前的工作中使用的特征来比较分类器的性能之外,本研究还解决了新的合适的非线性特征。分析表明,利用这些特征,极随机树或额外树分类器在足月和早产记录的分类过程中表现出显著的改善,交叉验证准确率为91.4%,特异性为90.2%,灵敏度为95.5%。该方法可以与其他方法相结合,以提高现有的分类性能。
{"title":"Nonlinear Temporal Analysis of Uterine EMG for Preterm Birth Classification","authors":"Irtiza Hasan, A. Das, Mohammed Imamul, Hassan Bhuiyan","doi":"10.1109/IC4ME247184.2019.9036595","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036595","url":null,"abstract":"Premature birth, one of the root causes of maternal mortality and childhood morbidity, is growing at an increased rate worldwide. Several screening tests used in clinical settings to predict preterm births do not show satisfactory results. Electrohysterography, a noninvasive automated method of monitoring uterine contractions during labor, has shown to be effective in the classification task. In this work, we explored the potential use of several temporal nonlinear parameters for carrying out classification process. A publicly available TPEHG DB (Term Preterm Electrohysterogram Database) containing 262 term records and 38 preterm records was used to conduct the study. To execute effective classification tasks, Synthetic Minority Over-Sampling Technique (SMOTE) was applied on unbalanced dataset to generate equal number of training dataset by oversampling the minority class. New suitable nonlinear features have been addresed in this study other than the features used in the previous works to compare the performance of the classifiers. The analysis showed that extremely randomized trees or extra trees classifier shows significant improvement by using these features in the classification process of term and preterm records with cross validation accuracy 91.4%, specificity 90.2% and sensitivity 95.5%. The proposed approach could be combined with other methods to excel in the existing classification performance.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128084269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IC4ME2 2019 Table of Contents IC4ME2 2019目录表
{"title":"IC4ME2 2019 Table of Contents","authors":"","doi":"10.1109/ic4me247184.2019.9036688","DOIUrl":"https://doi.org/10.1109/ic4me247184.2019.9036688","url":null,"abstract":"","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115825912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media User’s Safety Level Detection through Classification via Clustering Approach 基于聚类方法的社交媒体用户安全等级检测
Md. Kalim Amzad Chy, Sheikh Arif Ahmed, Ali Haider Doha, Abdul Kadar Muhammad Masum, S. I. Khan
Social media has a significant impact on our daily life, and the popularity is increasing rapidly because of the ability to be attached to people around the world and share feelings, photos, videos, etc. So, it bears a high-security concern. However, most of the social media user does not know the security level of their account, including what features of social media should consider if the account is in a risk situation. The posting, friendship, etc. sometimes brings unfortunate events like identity theft, sexual harassment, cyber-crime, etc. To overcome such kind of unexpected issues, this research proposes a classification via clustering algorithm based predictive model by which one can know his safety level in the social media. A dataset is formed through a closed-ended questionnaire. Essential features are selected via gain ration method as high dimensional data is costly to train a model. An unsupervised algorithm, hierarchical clustering, cluster the users into three groups that are labeled for further analysis. The various classification algorithm is chosen to train the predictive model. From the model evaluation result, “Logistic Regression” predicts the safety level of a social media user with high accuracy. So, this model will bring an extra dimension in social media user account safety.
社交媒体对我们的日常生活产生了重大影响,并且由于能够与世界各地的人建立联系并分享感受,照片,视频等,因此受欢迎程度正在迅速增加。因此,这是一个高度安全问题。然而,大多数社交媒体用户并不知道他们的账户的安全级别,包括如果账户处于风险情况下,社交媒体的哪些功能应该考虑。发帖、交友等有时会带来不幸的事件,如身份盗窃、性骚扰、网络犯罪等。为了克服这种意想不到的问题,本研究提出了一种基于聚类算法的分类预测模型,通过该模型可以知道自己在社交媒体中的安全水平。数据集是通过封闭式问卷形成的。由于高维数据训练成本高,采用增益比法选择基本特征。一种无监督的算法,分层聚类,将用户聚为三组,这些组被标记为进一步分析。选择各种分类算法来训练预测模型。从模型评价结果来看,“Logistic回归”预测社交媒体用户的安全等级具有较高的准确性。因此,这种模式将为社交媒体用户的账户安全带来额外的维度。
{"title":"Social Media User’s Safety Level Detection through Classification via Clustering Approach","authors":"Md. Kalim Amzad Chy, Sheikh Arif Ahmed, Ali Haider Doha, Abdul Kadar Muhammad Masum, S. I. Khan","doi":"10.1109/IC4ME247184.2019.9036489","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036489","url":null,"abstract":"Social media has a significant impact on our daily life, and the popularity is increasing rapidly because of the ability to be attached to people around the world and share feelings, photos, videos, etc. So, it bears a high-security concern. However, most of the social media user does not know the security level of their account, including what features of social media should consider if the account is in a risk situation. The posting, friendship, etc. sometimes brings unfortunate events like identity theft, sexual harassment, cyber-crime, etc. To overcome such kind of unexpected issues, this research proposes a classification via clustering algorithm based predictive model by which one can know his safety level in the social media. A dataset is formed through a closed-ended questionnaire. Essential features are selected via gain ration method as high dimensional data is costly to train a model. An unsupervised algorithm, hierarchical clustering, cluster the users into three groups that are labeled for further analysis. The various classification algorithm is chosen to train the predictive model. From the model evaluation result, “Logistic Regression” predicts the safety level of a social media user with high accuracy. So, this model will bring an extra dimension in social media user account safety.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132146987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Synthesis and Microscopic Study of Zinc Sulfide Nanoparticles 硫化锌纳米颗粒的合成及显微研究
Amrit Regmi, B. R. Bhattarai, S. K. Gautam
The ZnS semiconductor nanoparticles were synthesized by wet chemical synthesis routes from zinc acetate [Zn(CH3 COO$)_{2}]$ as source of zinc and sodium sulfide (Na2S) as source of sulfur, where ascorbic acid were used as capping agents. The structural, morphological, and optical properties of synthesized nanoparticles had been characterized by X-ray diffraction (XRD), transmission electron microscope (TEM) and UV-visible spectra (UV-Vis). XRD analysis shows that as synthesized samples were cubic structure and the average sizes of crystal were estimated 2.3 nm and 2.1 nm at $20^{circ}C$ and $45^{circ}C$, respectively using Debye Scherer’s equation. The band gap energy of ZnS nanoparticles determined from the UV-Vis spectra are 3.9 eV and 4.19 eV synthesized at $20^{circ}C$ and $45^{circ}C$, respectively. The size estimated from XRD pattern was further verified from TEM image and UV-Vis spectra.
以醋酸锌[Zn(CH3 COO$)_{2}]$为锌源,硫化钠(Na2S)为硫源,以抗坏血酸为封盖剂,采用湿法合成ZnS半导体纳米颗粒。利用x射线衍射(XRD)、透射电子显微镜(TEM)和紫外可见光谱(UV-Vis)对合成的纳米粒子的结构、形态和光学性质进行了表征。XRD分析表明,合成的样品为立方结构,在$20^{circ}C$和$45^{circ}C$处的晶体平均尺寸分别为2.3 nm和2.1 nm。在$20^{circ}C$和$45^{circ}C$下合成的ZnS纳米粒子带隙能分别为3.9 eV和4.19 eV。通过TEM和UV-Vis光谱进一步验证了XRD谱图估计的尺寸。
{"title":"Synthesis and Microscopic Study of Zinc Sulfide Nanoparticles","authors":"Amrit Regmi, B. R. Bhattarai, S. K. Gautam","doi":"10.1109/IC4ME247184.2019.9036683","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036683","url":null,"abstract":"The ZnS semiconductor nanoparticles were synthesized by wet chemical synthesis routes from zinc acetate [Zn(CH3 COO$)_{2}]$ as source of zinc and sodium sulfide (Na2S) as source of sulfur, where ascorbic acid were used as capping agents. The structural, morphological, and optical properties of synthesized nanoparticles had been characterized by X-ray diffraction (XRD), transmission electron microscope (TEM) and UV-visible spectra (UV-Vis). XRD analysis shows that as synthesized samples were cubic structure and the average sizes of crystal were estimated 2.3 nm and 2.1 nm at $20^{circ}C$ and $45^{circ}C$, respectively using Debye Scherer’s equation. The band gap energy of ZnS nanoparticles determined from the UV-Vis spectra are 3.9 eV and 4.19 eV synthesized at $20^{circ}C$ and $45^{circ}C$, respectively. The size estimated from XRD pattern was further verified from TEM image and UV-Vis spectra.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117310994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Saliency Detection using the Combination of Boundary Aware Color-map and Seam-map 结合边界感知颜色图和接缝图的显著性检测
A. Islam, S. M. M. Ahsan, J. Tan
Salient region of an image is usually detected by using contrast and boundary priors. Along with those cues the use of seam importance map has shown promising output previously. In this study, better result is found by further exploiting the seam-map using spatial distance and color information in combination with boundary prior. Color and seam maps are also down-weighted using average spatial distance to other regions. Moreover, passing the superpixelized version of the input image into seam and color map generation procedure has improved the output. Experimental results based on MSRA 1k dataset are presented with ten state of the art methods. F-beta measures are presented along with precision recall curves to better understand the outcome. The performance comparison with compared researches proofs superiority of the proposed method.
图像的显著区域通常通过对比度和边界先验来检测。除了这些提示外,接缝重要性图的使用在前面已经显示出有希望的输出。在本研究中,结合边界先验,进一步利用空间距离和颜色信息对接缝图进行挖掘,得到了更好的结果。颜色和接缝图也使用到其他区域的平均空间距离进行加权。此外,将输入图像的超像素化版本传递到接缝和颜色贴图生成程序中,提高了输出。给出了基于MSRA 1k数据集的十种最新方法的实验结果。F-beta测量与精确召回曲线一起呈现,以更好地理解结果。通过与已有研究的性能比较,证明了该方法的优越性。
{"title":"Saliency Detection using the Combination of Boundary Aware Color-map and Seam-map","authors":"A. Islam, S. M. M. Ahsan, J. Tan","doi":"10.1109/IC4ME247184.2019.9036637","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036637","url":null,"abstract":"Salient region of an image is usually detected by using contrast and boundary priors. Along with those cues the use of seam importance map has shown promising output previously. In this study, better result is found by further exploiting the seam-map using spatial distance and color information in combination with boundary prior. Color and seam maps are also down-weighted using average spatial distance to other regions. Moreover, passing the superpixelized version of the input image into seam and color map generation procedure has improved the output. Experimental results based on MSRA 1k dataset are presented with ten state of the art methods. F-beta measures are presented along with precision recall curves to better understand the outcome. The performance comparison with compared researches proofs superiority of the proposed method.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121609775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effect of Smoking in EEG Pattern and Time-Frequency Domain Analysis for Smoker and Non-Smoker 吸烟对吸烟者和非吸烟者脑电图的影响及时频域分析
Md Mahmudul Hasan, Nafiul Hasan, Azizur Rahman, Md. Mustafizur Rahman
As addiction is said to be a mental health condition which can be derived from Electroencephalogram, this study focuses on changes in EEG pattern due to smoking. A methodology is proposed here to identify smoker and nonsmoker by EEG domain analysis. In this research, three ANNs were built for domain analysis to differentiate smokers from non-smokers. It was found that the neural network built with the attributes of both time and frequency domain provided best quality with MSE of $6.238 times 10^{-08}$ than the neural networks using either time or frequency domain features. On the other hand, frequency domain based ANN solely gives better performance than time domain properties based neural network. It is concluded in this paper that values of PSD and FFT is much higher in EEG of smokers than the non-smokers.
由于成瘾被认为是一种可以从脑电图中得出的精神健康状况,因此本研究的重点是吸烟引起的脑电图模式的变化。本文提出了一种通过脑电域分析来识别吸烟者和非吸烟者的方法。在本研究中,构建了三个神经网络进行区域分析,以区分吸烟者和非吸烟者。结果表明,同时使用时域和频域特征构建的神经网络比单独使用时域和频域特征构建的神经网络具有更好的质量,其MSE为6.238 × 10^{-08}$。另一方面,单纯基于频域的人工神经网络比基于时域特性的神经网络具有更好的性能。结果表明,吸烟者脑电图中PSD和FFT值明显高于非吸烟者。
{"title":"Effect of Smoking in EEG Pattern and Time-Frequency Domain Analysis for Smoker and Non-Smoker","authors":"Md Mahmudul Hasan, Nafiul Hasan, Azizur Rahman, Md. Mustafizur Rahman","doi":"10.1109/IC4ME247184.2019.9036492","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036492","url":null,"abstract":"As addiction is said to be a mental health condition which can be derived from Electroencephalogram, this study focuses on changes in EEG pattern due to smoking. A methodology is proposed here to identify smoker and nonsmoker by EEG domain analysis. In this research, three ANNs were built for domain analysis to differentiate smokers from non-smokers. It was found that the neural network built with the attributes of both time and frequency domain provided best quality with MSE of $6.238 times 10^{-08}$ than the neural networks using either time or frequency domain features. On the other hand, frequency domain based ANN solely gives better performance than time domain properties based neural network. It is concluded in this paper that values of PSD and FFT is much higher in EEG of smokers than the non-smokers.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism 基于HCF (Hop Count Filtering)机制的云计算IP欺骗和LAND攻击检测与防范
Subrina Sultana, Sumaiya Nasrin, Farhana Kabir Lipi, Md. Afzal Hossain, Zinia Sultana, Fatima Jannat
In today’s world the number of consumers of cloud computing is increasing day by day. So, security is a big concern for cloud computing environment to keep user’s data safe and secure. Among different types of attacks in cloud one of the harmful and frequently occurred attack is Distributed Denial of Service (DDoS) attack. DDoS is one type of flooding attack which is initiated by sending a large number of invalid packets to limit the services of the victim server. As a result, server can not serve the legitimate requests. DDoS attack can be done by a lot of strategies like malformed packets, IP spoofing, smurf attack, teardrop attack, syn flood attack, local area network denial (LAND) attack etc. This paper focuses on IP spoofing and LAND based DDoS attack. The objective of this paper is to propose an algorithm to detect and prevent IP spoofing and LAND attack. To achieve this objective a new approach is proposed combining two existing solutions of DDoS attack caused by IP spoofing and ill-formed packets. The proposed approach will provide a transparent solution, filter out the spoofed packets and minimize memory exhaustion through minimizing the number of insertions and updates required in the datatable. Finally, the approach is implemented and simulated using CloudSim 3.0 toolkit (a virtual cloud environment) followed by result analysis and comparison with existing algorithms.
在当今世界,云计算的消费者数量日益增加。因此,如何保证用户数据的安全是云计算环境的一大关注点。在不同类型的云攻击中,分布式拒绝服务(DDoS)攻击是一种危害较大且频繁发生的攻击。DDoS是一种洪水式攻击,通过发送大量无效报文来限制受害服务器的服务。因此,服务器无法为合法请求提供服务。DDoS攻击可以通过许多策略来实现,如畸形数据包,IP欺骗,smurf攻击,泪滴攻击,syn flood攻击,局域网拒绝(LAND)攻击等。本文主要研究了IP欺骗和基于LAND的DDoS攻击。本文的目的是提出一种检测和防止IP欺骗和LAND攻击的算法。为了实现这一目标,本文提出了一种新的解决方案,结合现有的两种IP欺骗和恶意数据包引起的DDoS攻击的解决方案。所提出的方法将提供一个透明的解决方案,过滤掉欺骗数据包,并通过最小化数据表中所需的插入和更新数量来最小化内存耗尽。最后,使用CloudSim 3.0工具包(虚拟云环境)对该方法进行了实现和仿真,然后对结果进行了分析并与现有算法进行了比较。
{"title":"Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism","authors":"Subrina Sultana, Sumaiya Nasrin, Farhana Kabir Lipi, Md. Afzal Hossain, Zinia Sultana, Fatima Jannat","doi":"10.1109/IC4ME247184.2019.9036507","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036507","url":null,"abstract":"In today’s world the number of consumers of cloud computing is increasing day by day. So, security is a big concern for cloud computing environment to keep user’s data safe and secure. Among different types of attacks in cloud one of the harmful and frequently occurred attack is Distributed Denial of Service (DDoS) attack. DDoS is one type of flooding attack which is initiated by sending a large number of invalid packets to limit the services of the victim server. As a result, server can not serve the legitimate requests. DDoS attack can be done by a lot of strategies like malformed packets, IP spoofing, smurf attack, teardrop attack, syn flood attack, local area network denial (LAND) attack etc. This paper focuses on IP spoofing and LAND based DDoS attack. The objective of this paper is to propose an algorithm to detect and prevent IP spoofing and LAND attack. To achieve this objective a new approach is proposed combining two existing solutions of DDoS attack caused by IP spoofing and ill-formed packets. The proposed approach will provide a transparent solution, filter out the spoofed packets and minimize memory exhaustion through minimizing the number of insertions and updates required in the datatable. Finally, the approach is implemented and simulated using CloudSim 3.0 toolkit (a virtual cloud environment) followed by result analysis and comparison with existing algorithms.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of Gas Bubble in A Doppler Ultrasound Signal Using Synchrosqueezing Transform 利用同步压缩变换对多普勒超声信号中的气泡进行分类
Mst. Rehena Khatun, Md. Ekramul Hamid, Md. Iqbal Aziz Khan
This paper presents classification of gas bubble in a Doppler ultrasound signal using Synchrosqueezing Transform (SST). The SST decomposes the signal into a number of scales. In this research work, initially two statistical parameters, the peak value and variance are estimated to Figure out the scales that contains gas bubbles. Then the signal is reconstructed from the coefficient values within the selected scale. Some parameters are defined and calculated from the reconstructed signal. These parameters are used to classify gas bubble signal using naïve Bayes classifier. However, two classes “bubble” and “not bubble” are identified by training data sets. Therefore, on the basis of posterior probability, the class of the signal is defined. Finally, performance of gas bubble detection is evaluated in terms of sensitivity and positive predictivity tests. Our proposed method is applied on grade 0, I, II, and III signals. It is observed that, good classification result is achieved in grade I and grade II. In grade 0, no gas bubble is found. In the experiment, 92% gas bubble is classified in grade I, 84% gas bubble is classified in grade II and 80% gas bubble is classified in grade III. Experimental result shows that the proposed method achieves better accuracy than the conventional method in the literature.
利用同步压缩变换(SST)对多普勒超声信号中的气泡进行分类。海温将信号分解成若干尺度。在本研究工作中,首先通过估计峰值和方差两个统计参数来确定含有气泡的尺度。然后从所选尺度内的系数值重构信号。根据重构信号定义并计算了一些参数。利用这些参数,利用naïve贝叶斯分类器对气泡信号进行分类。然而,通过训练数据集可以识别出“冒泡”和“非冒泡”两个类。因此,在后验概率的基础上,定义了信号的类别。最后,从灵敏度和正预测性两方面对气泡检测的性能进行了评价。我们提出的方法适用于0、I、II和III级信号。观察到,一级和二级分级均取得了较好的分类效果。0级无气泡。实验中,92%的气泡为一级气泡,84%的气泡为二级气泡,80%的气泡为三级气泡。实验结果表明,该方法比传统的文献方法具有更高的精度。
{"title":"Classification of Gas Bubble in A Doppler Ultrasound Signal Using Synchrosqueezing Transform","authors":"Mst. Rehena Khatun, Md. Ekramul Hamid, Md. Iqbal Aziz Khan","doi":"10.1109/IC4ME247184.2019.9036594","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036594","url":null,"abstract":"This paper presents classification of gas bubble in a Doppler ultrasound signal using Synchrosqueezing Transform (SST). The SST decomposes the signal into a number of scales. In this research work, initially two statistical parameters, the peak value and variance are estimated to Figure out the scales that contains gas bubbles. Then the signal is reconstructed from the coefficient values within the selected scale. Some parameters are defined and calculated from the reconstructed signal. These parameters are used to classify gas bubble signal using naïve Bayes classifier. However, two classes “bubble” and “not bubble” are identified by training data sets. Therefore, on the basis of posterior probability, the class of the signal is defined. Finally, performance of gas bubble detection is evaluated in terms of sensitivity and positive predictivity tests. Our proposed method is applied on grade 0, I, II, and III signals. It is observed that, good classification result is achieved in grade I and grade II. In grade 0, no gas bubble is found. In the experiment, 92% gas bubble is classified in grade I, 84% gas bubble is classified in grade II and 80% gas bubble is classified in grade III. Experimental result shows that the proposed method achieves better accuracy than the conventional method in the literature.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130825827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Prediction of Phishing Websites Using Deep Convolutional Neural Network 基于深度卷积神经网络的钓鱼网站自动预测
K. M. Zubair Hasan, Md. Zahid Hasan, N. Zahan
Phishing is one of the ruinous issues encountered by the World Wide Web (WWW) and steers to the financial catastrophes for individuals and businesses. It has been perpetually a perplexing issue to identify phishing attacks with high exactness. The tremendous outcomes in the area of classification have been succeeded by the state-of-the-art invention of the deep convolutional neural networks (DCNNs). This paper is concerned with an accurate identifying approach for web phishing attacks based on deep convolutional neural networks. Our developed model has the ability to classify the attacked phishing websites from legitimate sites. However, due to the limitation of samples in the dataset, other machine learning algorithms (SVM, AdaBoost, Decision Tree, KNN) cannot perform proficiently for analyzing the data. In this respect, our proposed Deep Convolution Neural Network (DCNN) model has an automated approach to predict the phishing sites within the earlier stage. The empirical results show that the overall accuracy of 99% is achieved by the recommended methodology.
网络钓鱼是万维网(WWW)遇到的破坏性问题之一,并导致个人和企业的金融灾难。如何准确地识别网络钓鱼攻击一直是一个令人困惑的问题。深度卷积神经网络(deep convolutional neural networks, DCNNs)的发明,在分类领域取得了巨大的成果。本文研究了一种基于深度卷积神经网络的网络钓鱼攻击的准确识别方法。我们开发的模型具有将受攻击的钓鱼网站与合法网站进行分类的能力。然而,由于数据集中样本的限制,其他机器学习算法(SVM, AdaBoost, Decision Tree, KNN)无法熟练地进行数据分析。在这方面,我们提出的深度卷积神经网络(DCNN)模型具有在早期阶段自动预测网络钓鱼站点的方法。实证结果表明,所推荐的方法总体准确率达到99%。
{"title":"Automated Prediction of Phishing Websites Using Deep Convolutional Neural Network","authors":"K. M. Zubair Hasan, Md. Zahid Hasan, N. Zahan","doi":"10.1109/IC4ME247184.2019.9036647","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036647","url":null,"abstract":"Phishing is one of the ruinous issues encountered by the World Wide Web (WWW) and steers to the financial catastrophes for individuals and businesses. It has been perpetually a perplexing issue to identify phishing attacks with high exactness. The tremendous outcomes in the area of classification have been succeeded by the state-of-the-art invention of the deep convolutional neural networks (DCNNs). This paper is concerned with an accurate identifying approach for web phishing attacks based on deep convolutional neural networks. Our developed model has the ability to classify the attacked phishing websites from legitimate sites. However, due to the limitation of samples in the dataset, other machine learning algorithms (SVM, AdaBoost, Decision Tree, KNN) cannot perform proficiently for analyzing the data. In this respect, our proposed Deep Convolution Neural Network (DCNN) model has an automated approach to predict the phishing sites within the earlier stage. The empirical results show that the overall accuracy of 99% is achieved by the recommended methodology.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126139746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Numerical Modeling to evaluate the performance of FBG-based Strain Sensors 基于fbg的应变传感器性能的数值模拟
Ahsan Yaqub Rabbi, M. R. Kaysir, Md Jahirul Islam
Fiber Bragg Gratings (FBGs) result in an optical fiber due to the variation of the refractive index in the core material. Sensors based on FBG accumulate the advantages of optical fiber such as immunity to electromagnetic interference, compact size and lightweight, suitability for remote monitoring, flexibility, and multiplexing capabilities. Recently, FBG based strain sensors attain intense research interest due to their high sensitivity and comparatively lower cost. These sensors work with simple principle; Bragg wavelength shifts when strain is induced on the fiber. In this paper, we aim to design a FBG based strain sensor and then numerically modeled it in COMSOL environment to investigate the sensor performance. To design the system, we incorporate a solid mechanical model to the FBG model in Radio Frequency module to apply external force to produce stain in the FBG. Finally the results from the numerical model is compared with the existing analytical model, which shows good agreement.
光纤布拉格光栅(fbg)是由于芯材折射率的变化而形成光纤的。基于光纤光栅的传感器积累了光纤的优点,如抗电磁干扰,体积小,重量轻,适合远程监控,灵活性和多路复用能力。近年来,基于光纤光栅的应变传感器以其高灵敏度和相对较低的成本引起了人们的广泛关注。这些传感器工作原理简单;当光纤上产生应变时,布拉格波长发生位移。本文设计了一种基于光纤光栅的应变传感器,并在COMSOL环境中对其进行了数值模拟,研究了传感器的性能。为了设计该系统,我们在射频模块的FBG模型中加入了一个实体力学模型,以施加外力在FBG中产生染色。最后,将数值模型的计算结果与已有的解析模型进行了比较,两者吻合较好。
{"title":"Numerical Modeling to evaluate the performance of FBG-based Strain Sensors","authors":"Ahsan Yaqub Rabbi, M. R. Kaysir, Md Jahirul Islam","doi":"10.1109/IC4ME247184.2019.9036623","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036623","url":null,"abstract":"Fiber Bragg Gratings (FBGs) result in an optical fiber due to the variation of the refractive index in the core material. Sensors based on FBG accumulate the advantages of optical fiber such as immunity to electromagnetic interference, compact size and lightweight, suitability for remote monitoring, flexibility, and multiplexing capabilities. Recently, FBG based strain sensors attain intense research interest due to their high sensitivity and comparatively lower cost. These sensors work with simple principle; Bragg wavelength shifts when strain is induced on the fiber. In this paper, we aim to design a FBG based strain sensor and then numerically modeled it in COMSOL environment to investigate the sensor performance. To design the system, we incorporate a solid mechanical model to the FBG model in Radio Frequency module to apply external force to produce stain in the FBG. Finally the results from the numerical model is compared with the existing analytical model, which shows good agreement.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122579952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1