Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615054
Mohammed Gasmallah, F. Zulkernine
With the rise of video datasets and self-driving cars, many industries seek a way to perform quick object detection on video, as well as perform predictive tracking on these objects. We propose a predictive video object detector (POD net) integrating the You Only Look Once v2 (YOLOv2) framework with the convolutional 2-dimensional (2D) Long Short Term Memory (LSTM) model proposed by Shi et al. Our POD net performs object detection using YOLOv2 and object prediction using the LSTM model in an iterative manner with a view to improve object detection in video streams via object prediction. In this study we present two different approaches that we implemented to predict objects in subsequent video clips. The first approach, PODv1, applies a post-temporal pattern matching mechanism wherein the YOLOv2 detector is used to detect objects in multiple images and the LSTM layer is used to perform temporal feature mapping across the output tensors of the detectors. The second approach, PODv2, provides better results by applying the temporal feature mapping first across the images and then feeding the output into the YOLOv2 detector which is wrapped using a Time Distributed layer. We tested POD net on the Multi-Object Tracking (MOT) 2017 dataset and the network was able to perform predictive object detection and tracking, demonstrating that the LSTM layer is useful for a variety of video analysis problems.
随着视频数据集和自动驾驶汽车的兴起,许多行业都在寻找一种方法来对视频进行快速目标检测,并对这些目标进行预测跟踪。我们提出了一种预测视频对象检测器(POD net),将You Only Look Once v2 (YOLOv2)框架与Shi等人提出的卷积二维(2D)长短期记忆(LSTM)模型集成在一起。我们的POD网络使用YOLOv2进行对象检测,并使用LSTM模型以迭代的方式进行对象预测,以期通过对象预测来改进视频流中的对象检测。在这项研究中,我们提出了两种不同的方法来预测后续视频片段中的物体。第一种方法是PODv1,它应用了一种后时间模式匹配机制,其中YOLOv2检测器用于检测多个图像中的对象,LSTM层用于跨检测器的输出张量执行时间特征映射。第二种方法是PODv2,它通过首先在图像上应用时间特征映射,然后将输出输入使用时间分布层包装的YOLOv2检测器,从而提供更好的结果。我们在多目标跟踪(MOT) 2017数据集上对POD网络进行了测试,该网络能够执行预测目标检测和跟踪,这表明LSTM层对于各种视频分析问题都很有用。
{"title":"Video Predictive Object Detector","authors":"Mohammed Gasmallah, F. Zulkernine","doi":"10.1109/IEMCON.2018.8615054","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615054","url":null,"abstract":"With the rise of video datasets and self-driving cars, many industries seek a way to perform quick object detection on video, as well as perform predictive tracking on these objects. We propose a predictive video object detector (POD net) integrating the You Only Look Once v2 (YOLOv2) framework with the convolutional 2-dimensional (2D) Long Short Term Memory (LSTM) model proposed by Shi et al. Our POD net performs object detection using YOLOv2 and object prediction using the LSTM model in an iterative manner with a view to improve object detection in video streams via object prediction. In this study we present two different approaches that we implemented to predict objects in subsequent video clips. The first approach, PODv1, applies a post-temporal pattern matching mechanism wherein the YOLOv2 detector is used to detect objects in multiple images and the LSTM layer is used to perform temporal feature mapping across the output tensors of the detectors. The second approach, PODv2, provides better results by applying the temporal feature mapping first across the images and then feeding the output into the YOLOv2 detector which is wrapped using a Time Distributed layer. We tested POD net on the Multi-Object Tracking (MOT) 2017 dataset and the network was able to perform predictive object detection and tracking, demonstrating that the LSTM layer is useful for a variety of video analysis problems.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131647412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614773
Inkwinder Singh Bangi, J. S. Sivia
A small size multiband antenna immensely beneficial for wireless devices. Hybrid fractal technique gives an opportunity to design multiband and less weight antenna. In this article, two types of antennas are designed. Koch curved fractal antenna is superimposed on minkowski curve and minkowski curve is superimposed on Koch curve. Both proposed antennas are reciprocal to each other. FR4 material is used as a substrate and microstrip line feed is used to energized patch. The comparisons between proposed fractal antennas are conducted with single fractal geometry antenna and also analysis radiation pattern, gain, current distribution, VSWR and defected ground effects on return loss. The simulated and optimized results are observed on HFSS simulator. Thanks to KMHFA, huge impedance bandwidth is achieved and due to MKHFA, multiband behavior hybrid fractal antenna is designed. The maximum gain of MKHFA antenna is 6dB and maximum bandwidth of KMHFA is 1900MHz. Dimensions of KMHFA is 30x12mm2 and MKHFA is 28x19mm2. Thus, it is found that both proposed antennas are beneficial for different applications such as Wi-Fi (5GHz and 5.5GHz), WLAN(5.725-5.825GHz), satellite communication downlink (3.7-4.2GHz), satellite communication uplink (5.6-6.4GHz), GSMI800(1.7-1.8GHz), GSMI900(1.8-1.9GHz), 3G-WCDMA (1900MHz uplink-2100MHz downlink), Airborne and Naval Radars (8.6-9.3GHz), Amateur Radio (10.2-10.5GHz). Indian cellular SIM of Jio 4G operating at Band-3 with uplink 1.710-1.785GHz and downlink 1.805-1.880GHz frequencies which usher in revolution (provides digital voice calling, high speed internet and so on) in cellular mobile communication. In future, these types of hybrid fractal antennas are used for 5G which operates over 3000MHz.
{"title":"A Compact Hybrid Fractal Antenna using Koch and Minkowski Curves","authors":"Inkwinder Singh Bangi, J. S. Sivia","doi":"10.1109/IEMCON.2018.8614773","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614773","url":null,"abstract":"A small size multiband antenna immensely beneficial for wireless devices. Hybrid fractal technique gives an opportunity to design multiband and less weight antenna. In this article, two types of antennas are designed. Koch curved fractal antenna is superimposed on minkowski curve and minkowski curve is superimposed on Koch curve. Both proposed antennas are reciprocal to each other. FR4 material is used as a substrate and microstrip line feed is used to energized patch. The comparisons between proposed fractal antennas are conducted with single fractal geometry antenna and also analysis radiation pattern, gain, current distribution, VSWR and defected ground effects on return loss. The simulated and optimized results are observed on HFSS simulator. Thanks to KMHFA, huge impedance bandwidth is achieved and due to MKHFA, multiband behavior hybrid fractal antenna is designed. The maximum gain of MKHFA antenna is 6dB and maximum bandwidth of KMHFA is 1900MHz. Dimensions of KMHFA is 30x12mm2 and MKHFA is 28x19mm2. Thus, it is found that both proposed antennas are beneficial for different applications such as Wi-Fi (5GHz and 5.5GHz), WLAN(5.725-5.825GHz), satellite communication downlink (3.7-4.2GHz), satellite communication uplink (5.6-6.4GHz), GSMI800(1.7-1.8GHz), GSMI900(1.8-1.9GHz), 3G-WCDMA (1900MHz uplink-2100MHz downlink), Airborne and Naval Radars (8.6-9.3GHz), Amateur Radio (10.2-10.5GHz). Indian cellular SIM of Jio 4G operating at Band-3 with uplink 1.710-1.785GHz and downlink 1.805-1.880GHz frequencies which usher in revolution (provides digital voice calling, high speed internet and so on) in cellular mobile communication. In future, these types of hybrid fractal antennas are used for 5G which operates over 3000MHz.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A question answering system (QAS) merely built on a predefined medical knowledge base experiences difficulties in providing suitable answers for expert users to make medical and healthcare decisions. This study proposes a comprehensive method of extracting meaningful correlations among heterogeneous datasets using a semantic analysis with domain knowledge and accordingly provide flexible answers to decision support (ATDS) in a medical QAS (MQAS). First, the potential value of the heterogeneous datasets from medical information systems is examined for building ATDS. Second, an extraction algorithm for constructing a term relational network from the questions is proposed. Then, a correlation construction method for integrating the datasets into the MQAS using domain knowledge is proposed. Finally, a novel algorithm for constructing ATDS on the basis of questions and datasets is established. Experimental results indicate that utilizing external medical domain knowledge in analyzing correlations among the datasets outperforms existing algorithms that only involved with the datasets.
{"title":"Extracting Meaningful Correlations among Heterogeneous Datasets for Medical Question Answering with Domain Knowledge","authors":"Jiayi Feng, Runtong Zhang, Donghua Chen, Wei Zhang","doi":"10.1109/IEMCON.2018.8615045","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615045","url":null,"abstract":"A question answering system (QAS) merely built on a predefined medical knowledge base experiences difficulties in providing suitable answers for expert users to make medical and healthcare decisions. This study proposes a comprehensive method of extracting meaningful correlations among heterogeneous datasets using a semantic analysis with domain knowledge and accordingly provide flexible answers to decision support (ATDS) in a medical QAS (MQAS). First, the potential value of the heterogeneous datasets from medical information systems is examined for building ATDS. Second, an extraction algorithm for constructing a term relational network from the questions is proposed. Then, a correlation construction method for integrating the datasets into the MQAS using domain knowledge is proposed. Finally, a novel algorithm for constructing ATDS on the basis of questions and datasets is established. Experimental results indicate that utilizing external medical domain knowledge in analyzing correlations among the datasets outperforms existing algorithms that only involved with the datasets.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614895
Nana Kwarne Gyamfi, E. Owusu
The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better.
{"title":"Survey of Mobile Malware Analysis, Detection Techniques and Tool","authors":"Nana Kwarne Gyamfi, E. Owusu","doi":"10.1109/IEMCON.2018.8614895","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614895","url":null,"abstract":"The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130844003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614961
Xing Liu
This paper introduces a small Java application named ChainTutor for learning basic Blockchain concepts. Although the term Blockchain is widely known and Blockchain technologies are finding applications in various areas such as banking, health care and Internet of Things, some concepts of Blockchain are not easy for beginners to understand. Fully text-based tutorials are often difficult to follow. General picture of Blockchain operations gets lost in lengthy textual descriptions. With the Java application introduced in this paper, users can experiment with key Blockchain concepts through a graphical user interface. They can generate keys, hashes, transactions, blocks and wallets. They can see the low level details of a blockchain such as encryption keys and hashes. They can see how mining works and how blocks are added to a blockchain. Parameters of a blockchain can also be varied in order to observe their impact on performance or even to make a blockchain invalid. The Java application is intended to be used in classroom environment by instructors when they teach introductory Blockchain courses.
{"title":"A Small Java Application for Learning Blockchain","authors":"Xing Liu","doi":"10.1109/IEMCON.2018.8614961","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614961","url":null,"abstract":"This paper introduces a small Java application named ChainTutor for learning basic Blockchain concepts. Although the term Blockchain is widely known and Blockchain technologies are finding applications in various areas such as banking, health care and Internet of Things, some concepts of Blockchain are not easy for beginners to understand. Fully text-based tutorials are often difficult to follow. General picture of Blockchain operations gets lost in lengthy textual descriptions. With the Java application introduced in this paper, users can experiment with key Blockchain concepts through a graphical user interface. They can generate keys, hashes, transactions, blocks and wallets. They can see the low level details of a blockchain such as encryption keys and hashes. They can see how mining works and how blocks are added to a blockchain. Parameters of a blockchain can also be varied in order to observe their impact on performance or even to make a blockchain invalid. The Java application is intended to be used in classroom environment by instructors when they teach introductory Blockchain courses.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614860
H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Abel Ogunzbile, Richard I. Nneji
This paper proposes a fast and efficient technique for constructing an equivalent model of patch antenna for predicting its radiation pattern. The equivalent model of the antenna is constructed based on its radiation properties. First, the initial model of the antenna is developed and then the arrangement of the initial model is optimized using FEKO optimization tool. The electric field of the magnetic dipole is determined based on numerical Green function derivation. The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its radiation pattern. Only two design parameters needed to be optimized making it more computational efficient. The derived radiation pattern from the equivalent model is validated with that of the original antenna model on FEKO to evaluate its efficiency. The simulation results show that the proposed equivalent model based on a magnetic dipole is fast and efficient and do not require the antenna's detailed material information.
{"title":"Construction of Equivalent Model of Patch Antenna Using Magnetic Dipole","authors":"H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Abel Ogunzbile, Richard I. Nneji","doi":"10.1109/IEMCON.2018.8614860","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614860","url":null,"abstract":"This paper proposes a fast and efficient technique for constructing an equivalent model of patch antenna for predicting its radiation pattern. The equivalent model of the antenna is constructed based on its radiation properties. First, the initial model of the antenna is developed and then the arrangement of the initial model is optimized using FEKO optimization tool. The electric field of the magnetic dipole is determined based on numerical Green function derivation. The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its radiation pattern. Only two design parameters needed to be optimized making it more computational efficient. The derived radiation pattern from the equivalent model is validated with that of the original antenna model on FEKO to evaluate its efficiency. The simulation results show that the proposed equivalent model based on a magnetic dipole is fast and efficient and do not require the antenna's detailed material information.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133039633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614859
Yang Cao, Yunfei Si, Zhi Cai, Zhiming Ding
Group identification refers to discovering groups with similar behaviors or preferences. The daily trajectories record the activities of moving objects, which reflect their behaviors. These mobile data provide us with a new data analysis approach for groups identification. Therefore, we can identify users or groups based on similar trajectory patterns by mining implicit behaviors patterns. In this paper, we propose a novel trajectory semantics calculation method to identify groups that have similar behaviors. In our model, we first propose a fast and efficient two-phase discovering stay regions method (TPD) from daily trajectories, then generate semantic trajectories by enriching the stay regions with semantic labels based on POI information and LDA topic model. To measure the similarity between semantic trajectories, we design a semantic similarity measure model based on geographic and semantic similarity factor. We have conducted extensive experiments on real trajectory dataset of Geolife project, and the experimental results show our proposed method is both effective and efficient.
{"title":"Mining Spatio-Temporal Semantic Trajectory for Groups Identification","authors":"Yang Cao, Yunfei Si, Zhi Cai, Zhiming Ding","doi":"10.1109/IEMCON.2018.8614859","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614859","url":null,"abstract":"Group identification refers to discovering groups with similar behaviors or preferences. The daily trajectories record the activities of moving objects, which reflect their behaviors. These mobile data provide us with a new data analysis approach for groups identification. Therefore, we can identify users or groups based on similar trajectory patterns by mining implicit behaviors patterns. In this paper, we propose a novel trajectory semantics calculation method to identify groups that have similar behaviors. In our model, we first propose a fast and efficient two-phase discovering stay regions method (TPD) from daily trajectories, then generate semantic trajectories by enriching the stay regions with semantic labels based on POI information and LDA topic model. To measure the similarity between semantic trajectories, we design a semantic similarity measure model based on geographic and semantic similarity factor. We have conducted extensive experiments on real trajectory dataset of Geolife project, and the experimental results show our proposed method is both effective and efficient.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614796
B. Parhami
The average internode distance for a network is fairly difficult to derive. There is often no closed-form formula for this parameter, leading to the need for simulation-based derivation methods. Network diameter, by contrast, is relatively easier to determine and, for many networks of common interest, we have closed-form formulas for it. The bounds established in this paper show that the two parameters are usually not totally independent and that, from a practical standpoint, network diameter can be used in lieu of average internode distance for the evaluation of message-routing algorithms and assessment or comparison of communication performance, particularly for symmetric networks that are prevalent in many parallel systems.
{"title":"Tight Bounds on the Ratio of Network Diameter to Average Internode Distance","authors":"B. Parhami","doi":"10.1109/IEMCON.2018.8614796","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614796","url":null,"abstract":"The average internode distance for a network is fairly difficult to derive. There is often no closed-form formula for this parameter, leading to the need for simulation-based derivation methods. Network diameter, by contrast, is relatively easier to determine and, for many networks of common interest, we have closed-form formulas for it. The bounds established in this paper show that the two parameters are usually not totally independent and that, from a practical standpoint, network diameter can be used in lieu of average internode distance for the evaluation of message-routing algorithms and assessment or comparison of communication performance, particularly for symmetric networks that are prevalent in many parallel systems.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115522988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615066
H. Monday, C. Ukwuoma, J. Li, David Agomuo, G. Nneji, Richard I. Nneji
this paper proposes a new system of ensuring data governance and enhancing data security in private cloud environment. Security and Privacy concerns have been the major drawbacks in cloud computing environments. Security, reliability and privacy enhance users' flexibility in file accessibility. As easy-to-use cloud services penetrate personal computing, users expect to enjoy the same conveniences they have at home in the office. This paper proposes a workable security technique in a cloud computing environment that delivers Infrastructure as a Service (SaaS), and deployed in a Private Cloud to protect data and information stored and shared from potential intrusion, threats, theft, virus, and agents. This paper proposes a system that focuses on data encryption and CAPTCHA methods as regards to security solutions. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the development, and implementation of the new system. Java play framework is adopted for the implementation of the web based system. The database structure is handled be employing MySQL. The system was implemented and tested using the various test cases which were successful. The test result shows that the proposed method is efficient in data confidentiality, integrity and availability.
{"title":"Ensuring Data Governace and Enhancing Data Security in a Private Cloud Environment","authors":"H. Monday, C. Ukwuoma, J. Li, David Agomuo, G. Nneji, Richard I. Nneji","doi":"10.1109/IEMCON.2018.8615066","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615066","url":null,"abstract":"this paper proposes a new system of ensuring data governance and enhancing data security in private cloud environment. Security and Privacy concerns have been the major drawbacks in cloud computing environments. Security, reliability and privacy enhance users' flexibility in file accessibility. As easy-to-use cloud services penetrate personal computing, users expect to enjoy the same conveniences they have at home in the office. This paper proposes a workable security technique in a cloud computing environment that delivers Infrastructure as a Service (SaaS), and deployed in a Private Cloud to protect data and information stored and shared from potential intrusion, threats, theft, virus, and agents. This paper proposes a system that focuses on data encryption and CAPTCHA methods as regards to security solutions. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the development, and implementation of the new system. Java play framework is adopted for the implementation of the web based system. The database structure is handled be employing MySQL. The system was implemented and tested using the various test cases which were successful. The test result shows that the proposed method is efficient in data confidentiality, integrity and availability.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615031
Adeela Arshad, A. Kashif, Muhammad Wasim, N. Mazhar, S. M. H. Zaidi
In modern technological era research in Mechanical Ventilators (MV) has drastically increased in designing model based MV treatment. In model based MV treatment mathematical model of lung is used to detect lungs diseases. In proposed work, inspiration and expiration mechanism of lungs has been modelled using Bond Graphs. Lung segments are assigned Hydraulic analogies using cylinders and accumulators. Upper airway from nostrils to trachea is modelled as single cylinder having resistance and associated compliance effect. Trachea to lower lung segment consists of 23 generations of airways. In this study, 4 generations are considered with their respective resistance and compliance, whereas resistance and compliance effect, of 5th to 17th generations are lumped. These are modelled with cylinders of decreasing size. Generation 17 to 23 are considered as respiratory zone that are modelled as accumulator having compliance and resistance associated. Grey-Box model estimation is used to estimate model parameters of 4 generations and controller is designed. 20 sim software is used to determine the relationship between Pressure (P) and Volume (V) and evaluate the model performance. Model is capable of predicting the true PV curves and thus leading to screening of lungs diseases. Model can be used for clinical trials with any existing MV.
{"title":"Modelling Inspiration and Expiration Mechanism of Lungs using Bond Graph","authors":"Adeela Arshad, A. Kashif, Muhammad Wasim, N. Mazhar, S. M. H. Zaidi","doi":"10.1109/IEMCON.2018.8615031","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615031","url":null,"abstract":"In modern technological era research in Mechanical Ventilators (MV) has drastically increased in designing model based MV treatment. In model based MV treatment mathematical model of lung is used to detect lungs diseases. In proposed work, inspiration and expiration mechanism of lungs has been modelled using Bond Graphs. Lung segments are assigned Hydraulic analogies using cylinders and accumulators. Upper airway from nostrils to trachea is modelled as single cylinder having resistance and associated compliance effect. Trachea to lower lung segment consists of 23 generations of airways. In this study, 4 generations are considered with their respective resistance and compliance, whereas resistance and compliance effect, of 5th to 17th generations are lumped. These are modelled with cylinders of decreasing size. Generation 17 to 23 are considered as respiratory zone that are modelled as accumulator having compliance and resistance associated. Grey-Box model estimation is used to estimate model parameters of 4 generations and controller is designed. 20 sim software is used to determine the relationship between Pressure (P) and Volume (V) and evaluate the model performance. Model is capable of predicting the true PV curves and thus leading to screening of lungs diseases. Model can be used for clinical trials with any existing MV.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}