首页 > 最新文献

2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)最新文献

英文 中文
Performance Evaluation of a Lightweight IoT Authentication Protocol 轻量级物联网认证协议的性能评估
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340146
D. Shehada, A. Gawanmeh, Claude Fachkha, H. A. Damis
Ensuring security to IoT devices is important in order to provide privacy and quality of services. Proposing a security solution is considered an important step towards achieving protection, however, proving the soundness of the solution is also crucial. In this paper, we propose a methodology for the performance evaluation of lightweight IoT-based authentication protocols based on execution time. Then, a formal verification test is conducted on a lightweight protocol proposed in the literature. The formal verification test conducted with Scyther tool proofs that the model provides mutual authentication, authorization, integrity, confidentiality, non-repudiation, and accountability. The protocol also was proven to provide protection from various attacks.
确保物联网设备的安全性对于提供隐私和服务质量非常重要。提出安全解决方案被认为是实现保护的重要一步,然而,证明解决方案的可靠性也至关重要。在本文中,我们提出了一种基于执行时间的轻量级基于物联网的认证协议的性能评估方法。然后,对文献中提出的轻量级协议进行了形式化的验证测试。使用Scyther工具执行的正式验证测试证明该模型提供了相互身份验证、授权、完整性、机密性、不可否认性和责任。该协议还被证明可以防止各种攻击。
{"title":"Performance Evaluation of a Lightweight IoT Authentication Protocol","authors":"D. Shehada, A. Gawanmeh, Claude Fachkha, H. A. Damis","doi":"10.1109/ICSPIS51252.2020.9340146","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340146","url":null,"abstract":"Ensuring security to IoT devices is important in order to provide privacy and quality of services. Proposing a security solution is considered an important step towards achieving protection, however, proving the soundness of the solution is also crucial. In this paper, we propose a methodology for the performance evaluation of lightweight IoT-based authentication protocols based on execution time. Then, a formal verification test is conducted on a lightweight protocol proposed in the literature. The formal verification test conducted with Scyther tool proofs that the model provides mutual authentication, authorization, integrity, confidentiality, non-repudiation, and accountability. The protocol also was proven to provide protection from various attacks.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Chaos-Based Cryptoystem for Voice Encryption 一种新的基于混沌的语音加密系统
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340132
W. A. Nassan, Talal Bonny, Dr. Abdullatif Baba
Since 1993, chaos-based cryptosystems were widely discussed in the literature for the encryption of different types of row data. In recent years, as the encryption methods have been considerably improved due to the notable development of communication equipment; a large amount of secure communication system-based researches has been published. In this paper, we present a new chaos-based secure communication system relying on three levels of cryptography that combines a conventional encryption algorithm and chaos masking technique. Furthermore, to enhance the security level, three different types of attractors that were generated from a unified hyperchaotic oscillator are used in the proposed communication system. This new chaotic secure communication scheme is implemented to transmit a voice signal. Finally, to demonstrate the efficiency of the suggested communication system, several testing methods are employed to prove the unpredictability of the signal carrier, by the attackers in both domains, time, and frequency.
自1993年以来,基于混沌的密码系统在文献中被广泛讨论,用于加密不同类型的行数据。近年来,由于通信设备的显著发展,加密方法有了很大的改进;大量基于安全通信系统的研究已经发表。本文提出了一种基于三层密码学的基于混沌的安全通信系统,该系统结合了传统的加密算法和混沌掩蔽技术。此外,为了提高通信系统的安全性,在该通信系统中使用了由统一超混沌振荡器产生的三种不同类型的吸引子。实现了一种新的混沌保密通信方案来传输语音信号。最后,为了证明所提出的通信系统的有效性,采用了几种测试方法来证明攻击者在时域、时间和频率上对信号载波的不可预测性。
{"title":"A New Chaos-Based Cryptoystem for Voice Encryption","authors":"W. A. Nassan, Talal Bonny, Dr. Abdullatif Baba","doi":"10.1109/ICSPIS51252.2020.9340132","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340132","url":null,"abstract":"Since 1993, chaos-based cryptosystems were widely discussed in the literature for the encryption of different types of row data. In recent years, as the encryption methods have been considerably improved due to the notable development of communication equipment; a large amount of secure communication system-based researches has been published. In this paper, we present a new chaos-based secure communication system relying on three levels of cryptography that combines a conventional encryption algorithm and chaos masking technique. Furthermore, to enhance the security level, three different types of attractors that were generated from a unified hyperchaotic oscillator are used in the proposed communication system. This new chaotic secure communication scheme is implemented to transmit a voice signal. Finally, to demonstrate the efficiency of the suggested communication system, several testing methods are employed to prove the unpredictability of the signal carrier, by the attackers in both domains, time, and frequency.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"303 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114104367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Accurate Prediction of COVID-19 (+) Using AI Deep VGG16 Model 基于AI Deep VGG16模型的COVID-19(+)准确预测
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340145
A. Panthakkan, M. AnzarS., S. Al-Mansoori, Hussain Al-Ahmad
Current research aims at the efficient prediction of COVID-19 (+) by employing advanced machine intelligence techniques by means of lung X-rays. In this paper, we have presented the promising VGG16 transfer learning model for the accurate and faster diagnosis of COVID-19 (+). The system provides a binary classification of the lung X-ray image into COVID-19 (+) and Normal. The effectiveness of the system being proposed is appraised by means of the performance metrics such as accuracy, precision, recall, and f1 score. Experiments were performed with 2000 X-ray specimens. For the two-class classification of the reported sample size, the proposed VGG16 model provides an outstanding recognition accuracy of 99.5%, which is loftier to all the contemporary methods provided in the literature. The suggested approach is extremely efficient and precise, for that reason, it can be used to aid and support radiologists and healthcare professionals to identify COVID-19 (+) utilizing the lung X-rays.
目前的研究旨在利用先进的机器智能技术,通过肺部x射线有效预测COVID-19(+)。在本文中,我们提出了一种有前途的VGG16迁移学习模型,用于准确快速地诊断COVID-19(+)。该系统提供肺部x线图像的二进制分类,分为COVID-19(+)和正常。通过准确性、精密度、召回率和f1分数等性能指标来评价系统的有效性。实验用2000个x射线标本进行。对于报告样本量的两类分类,本文提出的VGG16模型的识别准确率达到99.5%,高于目前文献中提供的所有方法。建议的方法非常高效和精确,因此,它可用于帮助和支持放射科医生和医疗保健专业人员利用肺部x射线识别COVID-19(+)。
{"title":"Accurate Prediction of COVID-19 (+) Using AI Deep VGG16 Model","authors":"A. Panthakkan, M. AnzarS., S. Al-Mansoori, Hussain Al-Ahmad","doi":"10.1109/ICSPIS51252.2020.9340145","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340145","url":null,"abstract":"Current research aims at the efficient prediction of COVID-19 (+) by employing advanced machine intelligence techniques by means of lung X-rays. In this paper, we have presented the promising VGG16 transfer learning model for the accurate and faster diagnosis of COVID-19 (+). The system provides a binary classification of the lung X-ray image into COVID-19 (+) and Normal. The effectiveness of the system being proposed is appraised by means of the performance metrics such as accuracy, precision, recall, and f1 score. Experiments were performed with 2000 X-ray specimens. For the two-class classification of the reported sample size, the proposed VGG16 model provides an outstanding recognition accuracy of 99.5%, which is loftier to all the contemporary methods provided in the literature. The suggested approach is extremely efficient and precise, for that reason, it can be used to aid and support radiologists and healthcare professionals to identify COVID-19 (+) utilizing the lung X-rays.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133911785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Low-Overhead Channel Estimation for Diffusive Molecular Communication 扩散分子通信的低开销信道估计
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340139
A. Darya, S. Abdallah
In this work, we propose a low-overhead channel estimator for diffusive molecular communication systems. Since diffusive molecular communication systems rely on the random propagation of molecules as a means of communication, they may potentially suffer from inter-symbol-interference in addition to the noise introduced by the channel and external sources. Hence, acquiring an accurate estimate of the channel impulse response is essential for signal equalization and detection. The proposed low-overhead estimator utilizes a minimal number of pilot symbols, thus reducing the training overhead by up to 95%. The computational complexity of the proposed estimator is comparable to that of pilot-based least-squared estimators in related works. Consequently, the proposed low-overhead channel estimator is efficient in terms of throughput and complexity in a way that appeals to the majority of prospective diffusive molecular communication systems.
在这项工作中,我们提出了一种用于扩散分子通信系统的低开销信道估计器。由于扩散分子通信系统依赖于分子的随机传播作为通信手段,除了信道和外部源引入的噪声外,它们还可能遭受符号间干扰。因此,获取信道脉冲响应的准确估计对于信号均衡和检测至关重要。所提出的低开销估计器使用最少数量的导频符号,从而减少了高达95%的训练开销。该估计量的计算复杂度与相关文献中基于导频的最小二乘估计量相当。因此,所提出的低开销信道估计器在吞吐量和复杂性方面是有效的,在某种程度上吸引了大多数有前途的扩散分子通信系统。
{"title":"Low-Overhead Channel Estimation for Diffusive Molecular Communication","authors":"A. Darya, S. Abdallah","doi":"10.1109/ICSPIS51252.2020.9340139","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340139","url":null,"abstract":"In this work, we propose a low-overhead channel estimator for diffusive molecular communication systems. Since diffusive molecular communication systems rely on the random propagation of molecules as a means of communication, they may potentially suffer from inter-symbol-interference in addition to the noise introduced by the channel and external sources. Hence, acquiring an accurate estimate of the channel impulse response is essential for signal equalization and detection. The proposed low-overhead estimator utilizes a minimal number of pilot symbols, thus reducing the training overhead by up to 95%. The computational complexity of the proposed estimator is comparable to that of pilot-based least-squared estimators in related works. Consequently, the proposed low-overhead channel estimator is efficient in terms of throughput and complexity in a way that appeals to the majority of prospective diffusive molecular communication systems.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126977065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Forensics and Investigations of the Internet of Things: A Short Survey 物联网的数字取证和调查:一个简短的调查
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340150
Shehanaz Amiroon, Claude Fachkha
The Internet of Things (IoT) has become an indispensable technology fragment diurnal that has consolidated all the discrete systems and data into a coherent and interconnected process. With the advent of cutting-edge technologies providing meticulous solutions, the digital world still lacks the existence of propitious capabilities for IoT digital forensics. As such, an exceptional increase in the number of electronic devices, enormous collection and consumption of data has necessitated the need for IoT forensics when it comes to cybercrimes. In this paper, we provide a summary of the difference between IoT and conventional digital forensic processes. In addition, we list three categories of IoT-related computer crimes. Furthermore, we group several contributions and case studies that are IoT-specific when it comes to digital investigations. Our results reveal the gap and pinpoint initiatives towards smart equipment forensics such as smartwatches, smart TVs, among others.
物联网(IoT)已经成为一个不可或缺的技术碎片日,它将所有离散的系统和数据整合成一个连贯和相互关联的过程。随着尖端技术的出现,提供了细致的解决方案,数字世界仍然缺乏物联网数字取证的有利能力。因此,电子设备数量的急剧增加、数据的大量收集和消耗,使得在网络犯罪方面需要物联网取证。在本文中,我们总结了物联网与传统数字取证过程之间的差异。此外,我们列出了三类与物联网相关的计算机犯罪。此外,当涉及到数字调查时,我们对物联网特定的几个贡献和案例研究进行了分组。我们的研究结果揭示了这一差距,并指出了智能设备取证(如智能手表、智能电视等)的举措。
{"title":"Digital Forensics and Investigations of the Internet of Things: A Short Survey","authors":"Shehanaz Amiroon, Claude Fachkha","doi":"10.1109/ICSPIS51252.2020.9340150","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340150","url":null,"abstract":"The Internet of Things (IoT) has become an indispensable technology fragment diurnal that has consolidated all the discrete systems and data into a coherent and interconnected process. With the advent of cutting-edge technologies providing meticulous solutions, the digital world still lacks the existence of propitious capabilities for IoT digital forensics. As such, an exceptional increase in the number of electronic devices, enormous collection and consumption of data has necessitated the need for IoT forensics when it comes to cybercrimes. In this paper, we provide a summary of the difference between IoT and conventional digital forensic processes. In addition, we list three categories of IoT-related computer crimes. Furthermore, we group several contributions and case studies that are IoT-specific when it comes to digital investigations. Our results reveal the gap and pinpoint initiatives towards smart equipment forensics such as smartwatches, smart TVs, among others.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124974335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Microservices Architecture for ADS-B Data Security Using Blockchain 基于区块链的ADS-B数据安全微服务架构
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340152
H. A. Damis, D. Shehada, Claude Fachkha, A. Gawanmeh, J. Al-Karaki
The use of Automatic Dependent Surveillance - Broadcast (ADS-B) for aircraft tracking and flight management operations is widely used today. However, ADS-B is prone to several cyber-security threats due to the lack of data authentication and encryption. Recently, Blockchain has emerged as new paradigm that can provide promising solutions in decentralized systems. Furthermore, software containers and Microservices facilitate the scaling of Blockchain implementations within cloud computing environment. When fused together, these technologies could help improve Air Traffic Control (ATC) processing of ADS-B data. In this paper, a Blockchain implementation within a Microservices framework for ADS-B data verification is proposed. The aim of this work is to enable data feeds coming from third-party receivers to be processed and correlated with that of the ATC ground station receivers. The proposed framework could mitigate ADS- B security issues of message spoofing and anomalous traffic data. and hence minimize the cost of ATC infrastructure by throughout third-party support.
使用自动相关监视广播(ADS-B)进行飞机跟踪和飞行管理操作是当今广泛使用的。然而,由于缺乏数据认证和加密,ADS-B容易受到多种网络安全威胁。最近,区块链已经成为一种新的范例,可以在分散的系统中提供有前途的解决方案。此外,软件容器和微服务促进了云计算环境下区块链实现的扩展。当这些技术融合在一起时,可以帮助改善空中交通管制(ATC)对ADS-B数据的处理。本文提出了一种在微服务框架内实现ADS-B数据验证的区块链方法。这项工作的目的是使来自第三方接收器的数据馈送能够被处理,并与ATC地面站接收器的数据相关联。该框架可以缓解ADS- B报文欺骗和异常流量数据的安全问题。从而通过整个第三方支持将ATC基础设施的成本降至最低。
{"title":"A Microservices Architecture for ADS-B Data Security Using Blockchain","authors":"H. A. Damis, D. Shehada, Claude Fachkha, A. Gawanmeh, J. Al-Karaki","doi":"10.1109/ICSPIS51252.2020.9340152","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340152","url":null,"abstract":"The use of Automatic Dependent Surveillance - Broadcast (ADS-B) for aircraft tracking and flight management operations is widely used today. However, ADS-B is prone to several cyber-security threats due to the lack of data authentication and encryption. Recently, Blockchain has emerged as new paradigm that can provide promising solutions in decentralized systems. Furthermore, software containers and Microservices facilitate the scaling of Blockchain implementations within cloud computing environment. When fused together, these technologies could help improve Air Traffic Control (ATC) processing of ADS-B data. In this paper, a Blockchain implementation within a Microservices framework for ADS-B data verification is proposed. The aim of this work is to enable data feeds coming from third-party receivers to be processed and correlated with that of the ATC ground station receivers. The proposed framework could mitigate ADS- B security issues of message spoofing and anomalous traffic data. and hence minimize the cost of ATC infrastructure by throughout third-party support.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122477843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Detection of Sleep Apnea Using Sub-Band Features from EEG Signals 基于脑电信号子带特征的睡眠呼吸暂停自动检测
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340133
Ria Gupta, Tehreem Fatima Zaidi, O. Farooq
Sleep Apnea is a major sleep disorder which leads to a partial or complete stopping in breathing for a short duration of time during sleep. The out-turn of this is extreme daytime drowsiness. Among different polysomnographic signals, Electroencephalogram (EEG) signal reflects the electrical activity of the brain by sensing and recording the brain's activities. Thus, EEG serves as a valuable information source for detecting the sleep apnea events. In this research, an efficient automatic method is proposed for differentiating apnea and non-apnea events of an apnea patient which is a very burdensome task if performed manually. The features energy, entropy, mean absolute deviation and kurtosis, extracted from five sub-bands, provide better accuracy, sensitivity and specificity as compared to other recently published studies. The performance evaluation of the proposed technique is carried out using the publicly available Physionet dataset. The highest classification accuracy of 95.10%, sensitivity of 93.20% and specificity of 96.80% is achieved by using Ensemble decision tree methods using the bagging technique. The novel method proposed in this research offers superior results in terms of accuracy, sensitivity and specificity as compared to the recently published work on the same database.
睡眠呼吸暂停是一种主要的睡眠障碍,它会导致睡眠期间部分或完全停止呼吸。结果就是白天极度困倦。在不同的多导睡眠图信号中,脑电图(EEG)信号通过感知和记录大脑的活动来反映大脑的电活动。因此,脑电图是检测睡眠呼吸暂停事件的有价值的信息源。本研究提出了一种高效的自动识别呼吸暂停患者呼吸暂停与非呼吸暂停事件的方法。从五个子带中提取的特征能量、熵、平均绝对偏差和峰度,与其他最近发表的研究相比,具有更好的准确性、灵敏度和特异性。该技术的性能评估是使用公开可用的Physionet数据集进行的。综合决策树方法的分类准确率为95.10%,灵敏度为93.20%,特异度为96.80%。与最近在同一数据库上发表的工作相比,本研究提出的新方法在准确性、灵敏度和特异性方面提供了优越的结果。
{"title":"Automatic Detection of Sleep Apnea Using Sub-Band Features from EEG Signals","authors":"Ria Gupta, Tehreem Fatima Zaidi, O. Farooq","doi":"10.1109/ICSPIS51252.2020.9340133","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340133","url":null,"abstract":"Sleep Apnea is a major sleep disorder which leads to a partial or complete stopping in breathing for a short duration of time during sleep. The out-turn of this is extreme daytime drowsiness. Among different polysomnographic signals, Electroencephalogram (EEG) signal reflects the electrical activity of the brain by sensing and recording the brain's activities. Thus, EEG serves as a valuable information source for detecting the sleep apnea events. In this research, an efficient automatic method is proposed for differentiating apnea and non-apnea events of an apnea patient which is a very burdensome task if performed manually. The features energy, entropy, mean absolute deviation and kurtosis, extracted from five sub-bands, provide better accuracy, sensitivity and specificity as compared to other recently published studies. The performance evaluation of the proposed technique is carried out using the publicly available Physionet dataset. The highest classification accuracy of 95.10%, sensitivity of 93.20% and specificity of 96.80% is achieved by using Ensemble decision tree methods using the bagging technique. The novel method proposed in this research offers superior results in terms of accuracy, sensitivity and specificity as compared to the recently published work on the same database.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122326119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Skin Cancer Classification Model Based on VGG 19 and Transfer Learning 基于VGG - 19和迁移学习的皮肤癌分类模型
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340143
N. Aburaed, A. Panthakkan, M. Al-Saad, S. Amin, W. Mansoor
Skin cancer is a concerning health issue with yearly increasing numbers. Detecting and classifying cancer type is problematic, especially since patients have to undergo several diagnosis over lengthy periods of time, which hinders early treatment and survival chances. With the aid of digital image processing, features can be extracted to identify skin cancer and its different types. Convolutional Neural Networks (CNNs) recently emerged as powerful autonomous feature extractors, and they have high potential to achieve high accuracy with skin cancer diagnosis. In this paper, two cancer types in addition to one non-cancer type taken from Human Against Machine (HAM10000) dataset are classified using CNN model based on VGG 19 and Transfer Learning technique. The training strategy is explained, tested, and evaluated by calculating the network's overall accuracy and loss.
皮肤癌是一个令人担忧的健康问题,其人数每年都在增加。诊断和分类癌症是一个问题,特别是因为患者必须在很长一段时间内接受多次诊断,这阻碍了早期治疗和生存机会。在数字图像处理的帮助下,可以提取特征来识别皮肤癌及其不同类型。卷积神经网络(cnn)作为一种功能强大的自主特征提取工具,在皮肤癌诊断方面具有很高的潜力。本文采用基于VGG - 19和迁移学习技术的CNN模型,对人类对抗机器(HAM10000)数据集中的两种癌症类型和一种非癌症类型进行分类。通过计算网络的整体准确性和损失,对训练策略进行了解释、测试和评估。
{"title":"Skin Cancer Classification Model Based on VGG 19 and Transfer Learning","authors":"N. Aburaed, A. Panthakkan, M. Al-Saad, S. Amin, W. Mansoor","doi":"10.1109/ICSPIS51252.2020.9340143","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340143","url":null,"abstract":"Skin cancer is a concerning health issue with yearly increasing numbers. Detecting and classifying cancer type is problematic, especially since patients have to undergo several diagnosis over lengthy periods of time, which hinders early treatment and survival chances. With the aid of digital image processing, features can be extracted to identify skin cancer and its different types. Convolutional Neural Networks (CNNs) recently emerged as powerful autonomous feature extractors, and they have high potential to achieve high accuracy with skin cancer diagnosis. In this paper, two cancer types in addition to one non-cancer type taken from Human Against Machine (HAM10000) dataset are classified using CNN model based on VGG 19 and Transfer Learning technique. The training strategy is explained, tested, and evaluated by calculating the network's overall accuracy and loss.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Reading Political Sentiment and Mood of the Electorate Through Twitter Data 通过推特数据解读政治情绪和选民情绪
Pub Date : 2020-11-25 DOI: 10.1109/icspis51252.2020.9340147
Abhirup Khanna, Ananya Bansal, A. Agarwal, P. Maheshwari
In this day and age of social media, Twitter plays an important role when it comes to election campaigning. Twitter has been seemingly popular among leaders of the western world, but the advent of accessible and affordable internet connectivity had led to its inroads in the India electoral ecosystem. Major political parties have their twitter accounts with millions of active followers. Government departments and respective ministers are now using Twitter as a means of publicizing public interest schemes among their followers. Twitter is being used as a tool for addressing current followers and appealing to potential future voters. In this paper, we present a popularity analysis between two national parties, i.e. BJP and INC. The work discusses the extent of positive popularity each party enjoys in various cities in India. Twitter data is harvested for analysis from seventeen different cities spread across four different zones in India. We examine the growth of BJP and its prominence in certain social groups. The paper talks about the rise of Prime Minister Narendra Modi and his emergence as a nationwide leader. Finally, we present positive takeaways from our analysis that may interest any political pundit of Indian democracy.
在这个社交媒体的时代,推特在竞选活动中扮演着重要的角色。Twitter似乎在西方世界的领导人中很受欢迎,但随着可访问且价格合理的互联网连接的出现,它已经进入了印度的选举生态系统。主要政党的推特账户拥有数百万活跃粉丝。政府部门和各自的部长现在使用Twitter作为在其追随者中宣传公共利益计划的手段。Twitter被用作吸引现有粉丝和吸引潜在未来选民的工具。在本文中,我们提出了两个国家政党,即印度人民党和印度人民党之间的民意分析。这项工作讨论了每个政党在印度各个城市享有的积极人气程度。Twitter的数据是从印度四个不同地区的17个不同城市收集来分析的。我们考察了印度人民党的发展及其在某些社会群体中的突出地位。这篇文章谈到了印度总理纳伦德拉·莫迪的崛起,以及他作为全国领导人的崛起。最后,我们从我们的分析中提出了积极的结论,可能会引起任何印度民主政治专家的兴趣。
{"title":"Reading Political Sentiment and Mood of the Electorate Through Twitter Data","authors":"Abhirup Khanna, Ananya Bansal, A. Agarwal, P. Maheshwari","doi":"10.1109/icspis51252.2020.9340147","DOIUrl":"https://doi.org/10.1109/icspis51252.2020.9340147","url":null,"abstract":"In this day and age of social media, Twitter plays an important role when it comes to election campaigning. Twitter has been seemingly popular among leaders of the western world, but the advent of accessible and affordable internet connectivity had led to its inroads in the India electoral ecosystem. Major political parties have their twitter accounts with millions of active followers. Government departments and respective ministers are now using Twitter as a means of publicizing public interest schemes among their followers. Twitter is being used as a tool for addressing current followers and appealing to potential future voters. In this paper, we present a popularity analysis between two national parties, i.e. BJP and INC. The work discusses the extent of positive popularity each party enjoys in various cities in India. Twitter data is harvested for analysis from seventeen different cities spread across four different zones in India. We examine the growth of BJP and its prominence in certain social groups. The paper talks about the rise of Prime Minister Narendra Modi and his emergence as a nationwide leader. Finally, we present positive takeaways from our analysis that may interest any political pundit of Indian democracy.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133739078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Channel Estimation Error on the Performance of Time-Domain Interleaved OFDM Systems 信道估计误差对时域交错OFDM系统性能的影响
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340148
T. Nazzal, Husameldin Mukhtar
In this paper, we study the impact of channel estimation errors on the performance of time-domain interleaved orthogonal frequency division multiplexing (OFDM) systems. The time domain interleaving (TDI) is known to enhance the error performance of OFDM significantly. Nevertheless, previous work analyzed TDI assuming perfect channel estimation. In practical communication systems, channel coefficients may be inaccurately estimated. Hence, the performance of TDI systems is evaluated in this work in the presence of channel estimation errors. The obtained results show that TDI with large interleaver length provides better performance than OFDM in the presence of imperfect channel estimation. However, when the channel estimation error is large enough, TDI performance significantly deteriorates as well, particularly at high SNR values.
本文研究了信道估计误差对时域交错正交频分复用(OFDM)系统性能的影响。时域交织(TDI)可以显著提高OFDM的误码性能。然而,以前的工作分析了假设完美信道估计的TDI。在实际的通信系统中,信道系数的估计可能不准确。因此,本文在存在信道估计误差的情况下对TDI系统的性能进行了评估。结果表明,在信道估计不完全的情况下,大交织器长度的TDI比OFDM具有更好的性能。然而,当信道估计误差足够大时,TDI性能也会显著下降,特别是在高信噪比值时。
{"title":"Impact of Channel Estimation Error on the Performance of Time-Domain Interleaved OFDM Systems","authors":"T. Nazzal, Husameldin Mukhtar","doi":"10.1109/ICSPIS51252.2020.9340148","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340148","url":null,"abstract":"In this paper, we study the impact of channel estimation errors on the performance of time-domain interleaved orthogonal frequency division multiplexing (OFDM) systems. The time domain interleaving (TDI) is known to enhance the error performance of OFDM significantly. Nevertheless, previous work analyzed TDI assuming perfect channel estimation. In practical communication systems, channel coefficients may be inaccurately estimated. Hence, the performance of TDI systems is evaluated in this work in the presence of channel estimation errors. The obtained results show that TDI with large interleaver length provides better performance than OFDM in the presence of imperfect channel estimation. However, when the channel estimation error is large enough, TDI performance significantly deteriorates as well, particularly at high SNR values.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1