首页 > 最新文献

2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)最新文献

英文 中文
Numerical Solution of Initial Value Problems of Time-Fractional Order via a Novel Fractional 4-Stage Runge-Kutta Method 用一种新的分数阶四阶龙格-库塔法数值解时间-分数阶初值问题
A. Al-Shimmary
In this article, we present a derivation of a novel 4-stage fractional Runge-Kutta method (4sFRKM). Then we apply it to solve time-fractional initial values problems. This method is useful because it provides us with good numerical solutions. When compared with the exact solution, the stability of the proposed method is examined and the corresponding region of stability is depicted. Moreover, the efficiency and accuracy of the prospected method were achieved through illustrative numerical examples, and the results are supported by tables and figures. All the calculations were done using MATLAB.
在本文中,我们给出了一个新的四阶分数龙格-库塔方法(4sFRKM)的推导。然后将其应用于求解时间分数初值问题。这种方法很有用,因为它为我们提供了很好的数值解。通过与精确解的比较,验证了所提方法的稳定性,并给出了相应的稳定区域。通过数值算例验证了该方法的有效性和准确性,并给出了表格和图的支持。所有计算均在MATLAB中完成。
{"title":"Numerical Solution of Initial Value Problems of Time-Fractional Order via a Novel Fractional 4-Stage Runge-Kutta Method","authors":"A. Al-Shimmary","doi":"10.1109/ICCITM53167.2021.9677713","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677713","url":null,"abstract":"In this article, we present a derivation of a novel 4-stage fractional Runge-Kutta method (4sFRKM). Then we apply it to solve time-fractional initial values problems. This method is useful because it provides us with good numerical solutions. When compared with the exact solution, the stability of the proposed method is examined and the corresponding region of stability is depicted. Moreover, the efficiency and accuracy of the prospected method were achieved through illustrative numerical examples, and the results are supported by tables and figures. All the calculations were done using MATLAB.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit Card Fraud Detection in Financial Transactions Using Data Mining Techniques 利用数据挖掘技术检测金融交易中的信用卡欺诈
R. H. Alwan, Murtadha M. Hamad, O. Dawood
Every year, fraudulent credit card transactions result in the loss of billions of dollars. The development of effective fraud detection algorithms is critical for lowering this loss, and more algorithms are turning to advanced data mining approaches to help in fraud detection. Due to the unstable distribution of the data, the design of fraud detection algorithms is very difficult, and the distribution of the categories is highly unbalanced, yet there are many transactions that are categorized by fraud detection system. This paper proposes a system for detection fraud in financial transactions by using some types of data mining models which are logistic regression, random forest, naïve bayes and support vector machine. This is done through suggested basic steps: the first step is to use European cardholder dataset which contains 284.807 transactions that split into two groups. First one contains 199.3649 transactions which is used for training the models, while 85.4421 transactions remained for testing the models. This dataset is highly imbalanced, therefore by using SMOTE technique it will transform to a balanced one. The Second step is preparing the data and apply the Correlation function on training dataset, then implementing the used models on it. The results are compared by evaluation metrics to show which model is the best for detecting fraud. From these results, it is concluded that the Random Forest classifier is the best for fraud detection, which achieved accuracy with 99.15% in testing data.
每年,欺诈性信用卡交易导致数十亿美元的损失。开发有效的欺诈检测算法对于降低这种损失至关重要,越来越多的算法转向先进的数据挖掘方法来帮助欺诈检测。由于数据分布的不稳定,使得欺诈检测算法的设计非常困难,而且类别的分布高度不平衡,但仍有许多交易被欺诈检测系统分类。本文利用逻辑回归、随机森林、naïve贝叶斯和支持向量机等数据挖掘模型,提出了一个金融交易欺诈检测系统。这是通过建议的基本步骤完成的:第一步是使用欧洲持卡人数据集,其中包含分为两组的284.807笔交易。第一个包含199.3649个事务,用于训练模型,而85.4421个事务用于测试模型。该数据集高度不平衡,因此使用SMOTE技术将其转换为平衡数据集。第二步是准备数据并在训练数据集上应用相关函数,然后在其上实现使用的模型。通过评估指标对结果进行比较,以显示哪个模型最适合检测欺诈。从这些结果可以得出结论,随机森林分类器是最好的欺诈检测,在测试数据中达到99.15%的准确率。
{"title":"Credit Card Fraud Detection in Financial Transactions Using Data Mining Techniques","authors":"R. H. Alwan, Murtadha M. Hamad, O. Dawood","doi":"10.1109/ICCITM53167.2021.9677867","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677867","url":null,"abstract":"Every year, fraudulent credit card transactions result in the loss of billions of dollars. The development of effective fraud detection algorithms is critical for lowering this loss, and more algorithms are turning to advanced data mining approaches to help in fraud detection. Due to the unstable distribution of the data, the design of fraud detection algorithms is very difficult, and the distribution of the categories is highly unbalanced, yet there are many transactions that are categorized by fraud detection system. This paper proposes a system for detection fraud in financial transactions by using some types of data mining models which are logistic regression, random forest, naïve bayes and support vector machine. This is done through suggested basic steps: the first step is to use European cardholder dataset which contains 284.807 transactions that split into two groups. First one contains 199.3649 transactions which is used for training the models, while 85.4421 transactions remained for testing the models. This dataset is highly imbalanced, therefore by using SMOTE technique it will transform to a balanced one. The Second step is preparing the data and apply the Correlation function on training dataset, then implementing the used models on it. The results are compared by evaluation metrics to show which model is the best for detecting fraud. From these results, it is concluded that the Random Forest classifier is the best for fraud detection, which achieved accuracy with 99.15% in testing data.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122307823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating the Rate of Occurrence of Geometric Process With Exponential Distribution 指数分布几何过程发生率的估计
Noor Hani Idrees, M. Sulaiman
Geometric process (GP) is an important alternative to the Non homogeneous Poisson process (NHPP), in which arrival time is modeled with the trend, in this paper, we consider the problem of parameter estimation for geometric process, when the first arrival is distributed as an Exponential distribution (EXP). Parametric estimation methods including Maximum likelihood (ML), nonparametric estimation method including modified moments (MM), and a semi-parametric estimation method including modified least squares (MLS) chat were used in this paper, to achieve the goal of the paper, the model will be simulated and applied to one the important aspects of life, which is stopping of the gas power plant in Mosul.
几何过程(GP)是代替非齐次泊松过程(NHPP)的一种重要方法,在非齐次泊松过程(NHPP)中,到达时间是用趋势建模的,本文研究了当第一次到达是指数分布(EXP)时几何过程的参数估计问题。本文采用了极大似然(ML)等参数估计方法、修正矩(MM)等非参数估计方法和修正最小二乘(MLS)等半参数估计方法,并将该模型应用于摩苏尔燃气电厂停机这一生活中的重要方面,实现了本文的目标。
{"title":"Estimating the Rate of Occurrence of Geometric Process With Exponential Distribution","authors":"Noor Hani Idrees, M. Sulaiman","doi":"10.1109/ICCITM53167.2021.9677786","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677786","url":null,"abstract":"Geometric process (GP) is an important alternative to the Non homogeneous Poisson process (NHPP), in which arrival time is modeled with the trend, in this paper, we consider the problem of parameter estimation for geometric process, when the first arrival is distributed as an Exponential distribution (EXP). Parametric estimation methods including Maximum likelihood (ML), nonparametric estimation method including modified moments (MM), and a semi-parametric estimation method including modified least squares (MLS) chat were used in this paper, to achieve the goal of the paper, the model will be simulated and applied to one the important aspects of life, which is stopping of the gas power plant in Mosul.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116955560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning Model For IDS In the Internet of Things 物联网IDS的深度学习模型
M. Mohammed, K. Alheeti
Emerging technology makes one's life more comfortable; however, in the Internet of Things, there are a lot of weaknesses like infrastructure, connectivity, network, etc, due to the presence of millions of networked devices that make it difficult to implement safety on each device. Security threats are one of the most important issues recently gaining popularity in IoT, attacks that can cause major disruptions and loss of information within the IoT network. Intrusion Detection System (IDS) has a substantial role in protecting and securing an IoT network through detecting and preventing malicious activities. To develop IDS for timely detection and categorization of cyber threats at the network level, classical machine learning techniques are commonly utilized. However, because malicious attacks are continuously evolving and occurring at extremely large sizes, various problems arise, necessitating a scalable solution. In this paper, a convolutional neural network (CNN) approach, which is a kind of deep learning model for IDS discovery, is developed that is flexible and efficient for detecting and classifying cyber-attacks in IoT networks. The well-applied CNN model on the UNSW-NB15 dataset obtained 100% precision results.
新兴科技让人们的生活更舒适;然而,在物联网中,由于数百万联网设备的存在,存在许多弱点,如基础设施,连接,网络等,这使得很难在每个设备上实现安全。安全威胁是最近在物联网中越来越受欢迎的最重要问题之一,这种攻击可能导致物联网网络中的重大中断和信息丢失。入侵检测系统(IDS)通过检测和防止恶意活动,在保护和保护物联网网络方面发挥着重要作用。为了开发能够在网络层面及时检测和分类网络威胁的IDS,通常使用经典的机器学习技术。然而,由于恶意攻击不断发展并以极大的规模发生,因此出现了各种问题,需要可扩展的解决方案。本文提出了一种卷积神经网络(CNN)方法,该方法是一种用于IDS发现的深度学习模型,可以灵活高效地检测和分类物联网网络中的网络攻击。在UNSW-NB15数据集上应用良好的CNN模型获得了100%的精度结果。
{"title":"Deep Learning Model For IDS In the Internet of Things","authors":"M. Mohammed, K. Alheeti","doi":"10.1109/ICCITM53167.2021.9677571","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677571","url":null,"abstract":"Emerging technology makes one's life more comfortable; however, in the Internet of Things, there are a lot of weaknesses like infrastructure, connectivity, network, etc, due to the presence of millions of networked devices that make it difficult to implement safety on each device. Security threats are one of the most important issues recently gaining popularity in IoT, attacks that can cause major disruptions and loss of information within the IoT network. Intrusion Detection System (IDS) has a substantial role in protecting and securing an IoT network through detecting and preventing malicious activities. To develop IDS for timely detection and categorization of cyber threats at the network level, classical machine learning techniques are commonly utilized. However, because malicious attacks are continuously evolving and occurring at extremely large sizes, various problems arise, necessitating a scalable solution. In this paper, a convolutional neural network (CNN) approach, which is a kind of deep learning model for IDS discovery, is developed that is flexible and efficient for detecting and classifying cyber-attacks in IoT networks. The well-applied CNN model on the UNSW-NB15 dataset obtained 100% precision results.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129373050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Big Data, IoT and Cloud Computing 大数据、物联网、云计算融合
Dhuha Albazaz
{"title":"Integration of Big Data, IoT and Cloud Computing","authors":"Dhuha Albazaz","doi":"10.1109/iccitm53167.2021.9677813","DOIUrl":"https://doi.org/10.1109/iccitm53167.2021.9677813","url":null,"abstract":"","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114287052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Routing for Internet of Things: A Survey on Techniques and Protocols 物联网实时路由:技术与协议综述
D. Abdullah, Mohammed Tariq Salih
The Internet of Things (IoT) is a wireless network consisting of interconnected objects. Lately, IoT has become the inevitable future for most if not all technologies related to human life. In IoT, various heterogeneous devices are connected in a Wireless Sensor Network. For that energy-efficient routing, optimization plays a very important aspect for network performance in IoT. The technique and devices in IoT require routing protocols that fit in an environment like low power and lossy networks (LLNs), which rise great routing challenges. Most of the applications of the IoT are real-time applications with time constraints that work on sensing the environment, processing the data, and sending back the results sufficiently quickly to affect the environment before a deadline. Unfortunately, in many emergency cases, like in the case of large data traffic, which leads to network congestion and also causes delay and packet loss. That is why there is a vital need to analyze the routing protocols for IoT under real-time constraints. The purpose of this paper is to provide insight into the various state of the art work of the worldwide researchers about routing protocols for the Internet of Things (IoT) under real-time environment, and we explain extensively used routing protocols in real-time IoT, by first state the routing challenges in a real-time IoT, followed by a complete survey of the variant routing protocols and techniques.
物联网(IoT)是由相互连接的物体组成的无线网络。最近,物联网已经成为大多数与人类生活相关的技术的必然未来。在物联网中,各种异构设备连接在无线传感器网络中。对于节能路由,优化对物联网中的网络性能起着非常重要的作用。物联网中的技术和设备需要适合低功耗和有损网络(lln)等环境的路由协议,这带来了巨大的路由挑战。物联网的大多数应用都是具有时间限制的实时应用,它们致力于感知环境,处理数据,并在截止日期之前足够快地返回结果以影响环境。不幸的是,在许多紧急情况下,比如在大数据流量的情况下,这会导致网络拥塞,也会导致延迟和丢包。这就是为什么在实时限制下分析物联网路由协议至关重要的原因。本文的目的是深入了解实时环境下物联网(IoT)路由协议的各种最新研究成果,并通过首先陈述实时物联网中的路由挑战,然后对各种路由协议和技术进行全面调查,解释实时物联网中广泛使用的路由协议。
{"title":"Real-Time Routing for Internet of Things: A Survey on Techniques and Protocols","authors":"D. Abdullah, Mohammed Tariq Salih","doi":"10.1109/ICCITM53167.2021.9677821","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677821","url":null,"abstract":"The Internet of Things (IoT) is a wireless network consisting of interconnected objects. Lately, IoT has become the inevitable future for most if not all technologies related to human life. In IoT, various heterogeneous devices are connected in a Wireless Sensor Network. For that energy-efficient routing, optimization plays a very important aspect for network performance in IoT. The technique and devices in IoT require routing protocols that fit in an environment like low power and lossy networks (LLNs), which rise great routing challenges. Most of the applications of the IoT are real-time applications with time constraints that work on sensing the environment, processing the data, and sending back the results sufficiently quickly to affect the environment before a deadline. Unfortunately, in many emergency cases, like in the case of large data traffic, which leads to network congestion and also causes delay and packet loss. That is why there is a vital need to analyze the routing protocols for IoT under real-time constraints. The purpose of this paper is to provide insight into the various state of the art work of the worldwide researchers about routing protocols for the Internet of Things (IoT) under real-time environment, and we explain extensively used routing protocols in real-time IoT, by first state the routing challenges in a real-time IoT, followed by a complete survey of the variant routing protocols and techniques.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115728805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modifications of Hestenes and Stiefel CG Method for Solving Unconstrained Optimization Problems 求解无约束优化问题的Hestenes和Stiefel CG方法的改进
Isam H. Halil, K. Abbo, Hassan H. Ebrahim
Nonlinear conjugate gradient methods have a very nice theory, with a lot of important results on their convergence. This is the main argument for which these methods are intensely used in solving practical unconstrained optimization applications. There are plenty of conjugate gradient methods and can be divided to the standard conjugate gradients, hybrid and parameterized and others. This paper concerned with parameterized type conjugate gradient methods, a new search direction for nonlinear conjugate gradient algorithms is presented in this study, which is based on the Hestenes-Stefel approach and conjugacy condition, the descent property and global convergence for convex functions is proved. Numerical experiments show that the proposed algorithm is promising.
非线性共轭梯度法有一个很好的理论,有许多关于其收敛性的重要结果。这是这些方法在解决实际的无约束优化应用中被广泛使用的主要原因。共轭梯度法有很多,可分为标准共轭梯度法、混合梯度法和参数化梯度法等。本文研究了参数化型共轭梯度方法,提出了非线性共轭梯度算法的一个新的搜索方向,即基于Hestenes-Stefel方法和共轭条件,证明了凸函数的下降性和全局收敛性。数值实验表明,该算法是可行的。
{"title":"Modifications of Hestenes and Stiefel CG Method for Solving Unconstrained Optimization Problems","authors":"Isam H. Halil, K. Abbo, Hassan H. Ebrahim","doi":"10.1109/ICCITM53167.2021.9677756","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677756","url":null,"abstract":"Nonlinear conjugate gradient methods have a very nice theory, with a lot of important results on their convergence. This is the main argument for which these methods are intensely used in solving practical unconstrained optimization applications. There are plenty of conjugate gradient methods and can be divided to the standard conjugate gradients, hybrid and parameterized and others. This paper concerned with parameterized type conjugate gradient methods, a new search direction for nonlinear conjugate gradient algorithms is presented in this study, which is based on the Hestenes-Stefel approach and conjugacy condition, the descent property and global convergence for convex functions is proved. Numerical experiments show that the proposed algorithm is promising.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employing the Social Group Optimization Algorithm to Find the Best Hyper parameters of Support Vector Machine 利用社会群体优化算法寻找支持向量机的最佳超参数
Raad Ahmad Ayoob Al-Salami, Ghazwan Alsoufi
Support Vector Machine (SVM) is one of the most widely used algorithms for solving classification and regression problems. SVM parameters such as the kernel and the penalty (C) parameters greatly affect the classification accuracy. For the purpose of improving classification accuracy within a record implementation time, a Social Group Optimization (SGO) algorithm was proposed to find the best combination of SVM parameters through which to improve the performance and to obtain the highest classification accuracy and speed of execution. Five different types of datasets (Iris, Wine, Glass, Stat log and Car) were used that all of them were taken from the (UCI) repository. Moreover, a medical dataset, which is taken from (Dread, Alia, 2019), was used to verify the proposed algorithm. The results of the proposed algorithm were compared with the Grid Search algorithm (GS). The comparison results showed a preference for the (SGO) algorithm compared to the (GS) algorithm in terms of classification accuracy and speed of implementation for all the used datasets in this work.
支持向量机(SVM)是解决分类和回归问题最广泛使用的算法之一。支持向量机的核参数和惩罚(C)参数等参数对分类精度影响很大。为了在记录实现时间内提高分类精度,提出了一种社会群体优化(Social Group Optimization, SGO)算法,通过SVM参数的最佳组合来提高性能,获得最高的分类精度和执行速度。使用了五种不同类型的数据集(Iris, Wine, Glass, Stat log和Car),它们都来自(UCI)存储库。此外,使用取自(Dread, Alia, 2019)的医疗数据集来验证所提出的算法。将该算法的结果与网格搜索算法(GS)进行了比较。对比结果表明,在本研究使用的所有数据集上,(SGO)算法在分类精度和实现速度方面优于(GS)算法。
{"title":"Employing the Social Group Optimization Algorithm to Find the Best Hyper parameters of Support Vector Machine","authors":"Raad Ahmad Ayoob Al-Salami, Ghazwan Alsoufi","doi":"10.1109/ICCITM53167.2021.9677774","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677774","url":null,"abstract":"Support Vector Machine (SVM) is one of the most widely used algorithms for solving classification and regression problems. SVM parameters such as the kernel and the penalty (C) parameters greatly affect the classification accuracy. For the purpose of improving classification accuracy within a record implementation time, a Social Group Optimization (SGO) algorithm was proposed to find the best combination of SVM parameters through which to improve the performance and to obtain the highest classification accuracy and speed of execution. Five different types of datasets (Iris, Wine, Glass, Stat log and Car) were used that all of them were taken from the (UCI) repository. Moreover, a medical dataset, which is taken from (Dread, Alia, 2019), was used to verify the proposed algorithm. The results of the proposed algorithm were compared with the Grid Search algorithm (GS). The comparison results showed a preference for the (SGO) algorithm compared to the (GS) algorithm in terms of classification accuracy and speed of implementation for all the used datasets in this work.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128414361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Spatial Characteristics of Satellite Images 增强卫星图像的空间特征
Alhan Anwr Younis Al-Safar
Several research disciplines rely on satellite imagery because it possesses high quality; nevertheless, it is possible to enhance satellite images using digital image enhancement techniques that facilitate better noise reduction, contrast, and brightness. Smooth, crisp, and focused images obtained after image processing are used for assessing and demonstrating image characteristics. The present study uses several low-contrast images recorded using the Landsat sensor; multi-step spatial domain image processing is conducted for image enhancement. Initially, the Wiener Filter is employed for noise reduction; subsequently, Gamma Correction is employed for varying γ values, i.e., (0.3, 0.7, 1.1) and constant C = 1. Logarithmic transformation using C = 0.3 is the other image enhancement method. Algorithmic performance was assessed using standard values of AMBE, MSE, and PSNR. to check the signal and brightness power respectively. This outcome is so because the gamma transformation expression considers only the present mean and standard deviation for the working pixel.
一些研究学科依赖卫星图像,因为它具有高质量;然而,使用数字图像增强技术增强卫星图像是可能的,这种技术有助于更好地降低噪声、对比度和亮度。图像处理后获得的平滑、清晰和聚焦图像用于评估和演示图像特性。本研究使用陆地卫星传感器记录的几个低对比度图像;对图像进行多步空间域处理,增强图像。最初,采用维纳滤波器进行降噪;随后,伽马校正用于变化的γ值,即(0.3,0.7,1.1)和常数C = 1。另一种图像增强方法是C = 0.3的对数变换。使用AMBE、MSE和PSNR的标准值评估算法性能。分别检查信号和亮度功率。这个结果之所以如此,是因为伽马变换表达式只考虑工作像素的当前平均值和标准偏差。
{"title":"Enhancing Spatial Characteristics of Satellite Images","authors":"Alhan Anwr Younis Al-Safar","doi":"10.1109/ICCITM53167.2021.9677703","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677703","url":null,"abstract":"Several research disciplines rely on satellite imagery because it possesses high quality; nevertheless, it is possible to enhance satellite images using digital image enhancement techniques that facilitate better noise reduction, contrast, and brightness. Smooth, crisp, and focused images obtained after image processing are used for assessing and demonstrating image characteristics. The present study uses several low-contrast images recorded using the Landsat sensor; multi-step spatial domain image processing is conducted for image enhancement. Initially, the Wiener Filter is employed for noise reduction; subsequently, Gamma Correction is employed for varying γ values, i.e., (0.3, 0.7, 1.1) and constant C = 1. Logarithmic transformation using C = 0.3 is the other image enhancement method. Algorithmic performance was assessed using standard values of AMBE, MSE, and PSNR. to check the signal and brightness power respectively. This outcome is so because the gamma transformation expression considers only the present mean and standard deviation for the working pixel.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126486824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding the Fuzzy Critical Path with Octagonal Fuzzy Numbers using Linear Programming model 用线性规划模型求解八角模糊数模糊关键路径
Sanar Mazin Younis, A. Yousif
A Binary Integer Linear Programing (BILP) model was used to find the Fuzzy Critical Path (FCP) of a fuzzy project network, when the lengths of all activities are represented as Octagonal Fuzzy Numbers (OFN). Although there are many methods to solve the fuzzy network problems, this paper presents the simplest method for the purpose of estimating the CP, especially, when every path activity is expressed by an OFN in the fuzzy network problems. The OFN of each activity converted to the crisp one using a modified ranking approach. A numerical example of a fuzzy network problem is given to illustrated the steps of the method were the OFN of each activity represented the time needed to complete implementation of that activity. The same example is solved by using CP Method (CPM). This is considered to be one of the leading standard methods of solving such problems. This paper presents a comparison of results of the two methods.
采用二进制整数线性规划(BILP)模型,将所有活动的长度表示为八角模糊数(OFN),求解模糊项目网络的模糊关键路径(FCP)。虽然解决模糊网络问题的方法有很多,但本文提出了一种最简单的估计CP的方法,特别是当模糊网络问题中的每个路径活动都用OFN表示时。每个活动的OFN使用改进的排名方法转换为清晰的OFN。给出了一个模糊网络问题的数值示例,说明了该方法的步骤,其中每个活动的OFN表示完成该活动所需的时间。用CP法(CPM)对同一实例进行了求解。这被认为是解决这类问题的主要标准方法之一。本文对两种方法的结果进行了比较。
{"title":"Finding the Fuzzy Critical Path with Octagonal Fuzzy Numbers using Linear Programming model","authors":"Sanar Mazin Younis, A. Yousif","doi":"10.1109/ICCITM53167.2021.9677823","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677823","url":null,"abstract":"A Binary Integer Linear Programing (BILP) model was used to find the Fuzzy Critical Path (FCP) of a fuzzy project network, when the lengths of all activities are represented as Octagonal Fuzzy Numbers (OFN). Although there are many methods to solve the fuzzy network problems, this paper presents the simplest method for the purpose of estimating the CP, especially, when every path activity is expressed by an OFN in the fuzzy network problems. The OFN of each activity converted to the crisp one using a modified ranking approach. A numerical example of a fuzzy network problem is given to illustrated the steps of the method were the OFN of each activity represented the time needed to complete implementation of that activity. The same example is solved by using CP Method (CPM). This is considered to be one of the leading standard methods of solving such problems. This paper presents a comparison of results of the two methods.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1