首页 > 最新文献

2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)最新文献

英文 中文
Aquatic Iguana: A Floating Waste Collecting Robot with IoT Based Water Monitoring System 水生鬣蜥:带有物联网水监测系统的漂浮垃圾收集机器人
Mirza Turesinin, Abdullah Md Humayun Kabir, Tanzina Mollah, Sadvan Sarwar, M. S. Hosain
Water pollution is a major problem worldwide. In order to tackle the pollution and keeping the water resources clean, this paper presents an affordable and advanced floating garbage removing robot called “Aquatic Iguana”. The robot moves around the surface of the water and collects floating waste material such as plastic, packets, leaves, etc. Along with the waste-collecting system, the robot also includes water monitoring with pH, turbidity, temperature sensors, and a live streaming feature, increasing the capacity to a greater extent. We have developed this robot to ensure the cleaning of water resources and to create a strong data set of water quality for future predictions. The use of this technology will ensure the safety of all aquatic animals and plants.
水污染是一个世界性的大问题。为了解决污染问题,保持水资源清洁,本文提出了一种经济、先进的漂浮垃圾清除机器人“水鬣蜥”。机器人在水面上移动,收集漂浮的垃圾,如塑料、包裹、树叶等。除了垃圾收集系统,该机器人还包括pH值、浊度、温度传感器和实时流功能的水监测,在更大程度上提高了容量。我们开发这个机器人是为了确保水资源的清洁,并为未来的预测创建一个强大的水质数据集。这项技术的使用将确保所有水生动植物的安全。
{"title":"Aquatic Iguana: A Floating Waste Collecting Robot with IoT Based Water Monitoring System","authors":"Mirza Turesinin, Abdullah Md Humayun Kabir, Tanzina Mollah, Sadvan Sarwar, M. S. Hosain","doi":"10.23919/EECSI50503.2020.9251890","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251890","url":null,"abstract":"Water pollution is a major problem worldwide. In order to tackle the pollution and keeping the water resources clean, this paper presents an affordable and advanced floating garbage removing robot called “Aquatic Iguana”. The robot moves around the surface of the water and collects floating waste material such as plastic, packets, leaves, etc. Along with the waste-collecting system, the robot also includes water monitoring with pH, turbidity, temperature sensors, and a live streaming feature, increasing the capacity to a greater extent. We have developed this robot to ensure the cleaning of water resources and to create a strong data set of water quality for future predictions. The use of this technology will ensure the safety of all aquatic animals and plants.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"99 1","pages":"21-25"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73213852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving the Anomaly Detection by Combining PSO Search Methods and J48 Algorithm 结合粒子群搜索方法和J48算法改进异常检测
Kurniabudi, A. Harris, Albertus Edward Mintaria, Darmawijoyo, D. Stiawan, Mohd Yazid Bin Idris, R. Budiarto
The feature selection techniques are used to find the most important and relevant features in a dataset. Therefore, in this study feature selection technique was used to improve the performance of Anomaly Detection. Many feature selection techniques have been developed and implemented on the NSL-KDD dataset. However, with the rapid growth of traffic on a network where more applications, devices, and protocols participate, the traffic data is complex and heterogeneous contribute to security issues. This makes the NSL-KDD dataset no longer reliable for it. The detection model must also be able to recognize the type of novel attack on complex network datasets. So, a robust analysis technique for a more complex and larger dataset is required, to overcome the increase of security issues in a big data network. This study proposes particle swarm optimization (PSO) Search methods as a feature selection method. As contribute to feature analysis knowledge, In the experiment a combination of particle swarm optimization (PSO) Search methods with other search methods are examined. To overcome the limitation NSL-KDD dataset, in the experiments the CICIDS2017 dataset used. To validate the selected features from the proposed technique J48 classification algorithm used in this study. The detection performance of the combination PSO Search method with J48 examined and compare with other feature selection and previous study. The proposed technique successfully finds the important features of the dataset, which improve detection performance with 99.89% accuracy. Compared with the previous study the proposed technique has better accuracy, TPR, and FPR.
特征选择技术用于在数据集中找到最重要和最相关的特征。因此,本研究采用特征选择技术来提高异常检测的性能。在NSL-KDD数据集上已经开发和实现了许多特征选择技术。但是,随着网络中应用、设备和协议的增多,流量的快速增长,流量数据的复杂性和异构性导致了安全问题。这使得NSL-KDD数据集不再可靠。检测模型还必须能够识别复杂网络数据集上的新型攻击类型。因此,需要一种针对更复杂、更大数据集的强大分析技术,以克服大数据网络中日益增加的安全问题。本研究提出粒子群优化(PSO)搜索方法作为特征选择方法。为了增加特征分析知识,在实验中研究了粒子群优化(PSO)搜索方法与其他搜索方法的结合。为了克服NSL-KDD数据集的局限性,在实验中使用了CICIDS2017数据集。为了验证本研究中使用的J48分类算法所选择的特征。结合J48对PSO搜索方法的检测性能进行了检验,并与其他特征选择和前人的研究进行了比较。该方法成功地发现了数据集的重要特征,提高了检测性能,准确率达到99.89%。与以往的研究相比,该方法具有更高的精度、TPR和FPR。
{"title":"Improving the Anomaly Detection by Combining PSO Search Methods and J48 Algorithm","authors":"Kurniabudi, A. Harris, Albertus Edward Mintaria, Darmawijoyo, D. Stiawan, Mohd Yazid Bin Idris, R. Budiarto","doi":"10.23919/EECSI50503.2020.9251872","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251872","url":null,"abstract":"The feature selection techniques are used to find the most important and relevant features in a dataset. Therefore, in this study feature selection technique was used to improve the performance of Anomaly Detection. Many feature selection techniques have been developed and implemented on the NSL-KDD dataset. However, with the rapid growth of traffic on a network where more applications, devices, and protocols participate, the traffic data is complex and heterogeneous contribute to security issues. This makes the NSL-KDD dataset no longer reliable for it. The detection model must also be able to recognize the type of novel attack on complex network datasets. So, a robust analysis technique for a more complex and larger dataset is required, to overcome the increase of security issues in a big data network. This study proposes particle swarm optimization (PSO) Search methods as a feature selection method. As contribute to feature analysis knowledge, In the experiment a combination of particle swarm optimization (PSO) Search methods with other search methods are examined. To overcome the limitation NSL-KDD dataset, in the experiments the CICIDS2017 dataset used. To validate the selected features from the proposed technique J48 classification algorithm used in this study. The detection performance of the combination PSO Search method with J48 examined and compare with other feature selection and previous study. The proposed technique successfully finds the important features of the dataset, which improve detection performance with 99.89% accuracy. Compared with the previous study the proposed technique has better accuracy, TPR, and FPR.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"44 1","pages":"119-126"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73389994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Machine Learning Model on Virtual University of Senegal's Educational Data Based On Lambda Architecture 基于Lambda架构的塞内加尔虚拟大学教育数据机器学习模型
S. M. Gueye, A. Diop, Amadou Dahirou Gueye
Nowadays, a new form of learning has emerged in higher education. This is e-Learning. Lessons are taught on a Learning Content Management Systems (LCMS). These platforms generate a large variety of data at very high speed. This massive data comes from the interactions between the system and the users and between the users themselves (Learners, Tutors, Teachers, administrative Agents). Since 2013, UVS (Virtual University of Senegal), a digital university that offers distance learning through Moodle and Blackboard Collaborate platforms, has emerged. In terms of statistics, it has 29340 students, more than 400 active Tutors and 1000 courses. As a result, a large volume of data is generated on its learning platforms. In this article, we have set up an architecture allowing us to execute all types of queries on all data from platforms (historical data and real-time data) in order to set up intelligent systems capable of improving learning in this university. We then set up a machine learning model as a use case which is based on multiple regression in order to predict the most influential learning objects on the learners' final mark according to his learning activities.
如今,高等教育中出现了一种新的学习形式。这就是电子学习。课程是在学习内容管理系统(LCMS)上讲授的。这些平台以非常高的速度生成各种各样的数据。这些海量数据来自系统与用户之间以及用户自身(学习者、导师、教师、管理代理)之间的交互。自2013年以来,通过Moodle和Blackboard协作平台提供远程教育的数字大学UVS(塞内加尔虚拟大学)出现了。据统计,现有在校生29340人,在职导师400余人,课程1000余门。因此,在其学习平台上产生了大量的数据。在本文中,我们建立了一个架构,允许我们对来自平台的所有数据(历史数据和实时数据)执行所有类型的查询,以建立能够改善这所大学学习的智能系统。然后,我们建立了一个基于多元回归的机器学习模型作为用例,以便根据学习者的学习活动预测对学习者最终分数影响最大的学习对象。
{"title":"A Machine Learning Model on Virtual University of Senegal's Educational Data Based On Lambda Architecture","authors":"S. M. Gueye, A. Diop, Amadou Dahirou Gueye","doi":"10.23919/EECSI50503.2020.9251903","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251903","url":null,"abstract":"Nowadays, a new form of learning has emerged in higher education. This is e-Learning. Lessons are taught on a Learning Content Management Systems (LCMS). These platforms generate a large variety of data at very high speed. This massive data comes from the interactions between the system and the users and between the users themselves (Learners, Tutors, Teachers, administrative Agents). Since 2013, UVS (Virtual University of Senegal), a digital university that offers distance learning through Moodle and Blackboard Collaborate platforms, has emerged. In terms of statistics, it has 29340 students, more than 400 active Tutors and 1000 courses. As a result, a large volume of data is generated on its learning platforms. In this article, we have set up an architecture allowing us to execute all types of queries on all data from platforms (historical data and real-time data) in order to set up intelligent systems capable of improving learning in this university. We then set up a machine learning model as a use case which is based on multiple regression in order to predict the most influential learning objects on the learners' final mark according to his learning activities.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"88 1","pages":"270-275"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80291753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Reduction Approach Based on Fog Computing in IoT Environment 物联网环境下基于雾计算的数据约简方法
Rawaa Majid Obaise, M. A. Salman, H. A. Lafta
This paper investigates a data processing model for a real experimental environment in which data is collected from several IoT devices on an edge server where a clustering-based data reduction model is implemented. Then, only representative data is transmitted to a cloud-hosted service to avoid high bandwidth consumption and the storage space at the cloud. In our model, the subtractive clustering algorithm is employed for the first time for streamed IoT data with high efficiency. Developed services show the real impact of data reduction technique at the fog node on enhancing overall system performance. High accuracy and reduction rate have been obtained through visualizing data before and after reduction.
本文研究了一个真实实验环境的数据处理模型,其中数据从边缘服务器上的多个物联网设备收集,其中实现了基于集群的数据约简模型。然后,只有代表性的数据被传输到云托管服务,以避免高带宽消耗和云上的存储空间。在我们的模型中,首次对流物联网数据采用了高效的减法聚类算法。开发的服务显示了雾节点数据约简技术对提高系统整体性能的实际影响。通过还原前后数据的可视化,获得了较高的还原精度和还原率。
{"title":"Data Reduction Approach Based on Fog Computing in IoT Environment","authors":"Rawaa Majid Obaise, M. A. Salman, H. A. Lafta","doi":"10.23919/EECSI50503.2020.9251894","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251894","url":null,"abstract":"This paper investigates a data processing model for a real experimental environment in which data is collected from several IoT devices on an edge server where a clustering-based data reduction model is implemented. Then, only representative data is transmitted to a cloud-hosted service to avoid high bandwidth consumption and the storage space at the cloud. In our model, the subtractive clustering algorithm is employed for the first time for streamed IoT data with high efficiency. Developed services show the real impact of data reduction technique at the fog node on enhancing overall system performance. High accuracy and reduction rate have been obtained through visualizing data before and after reduction.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"19 1","pages":"65-70"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85121921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Method Using IOT Low Earth Orbit Satellite to Monitor Forest Temperature in Indonesia 方法利用物联网低地球轨道卫星监测印度尼西亚森林温度
Ariesta Satryoko, A. Runturambi
The ultimate goal of this paper is to ensure the proper functioning of the Monitoring Forest Temperature program in Indonesia using the IoT Narrow-Band Low earth orbit Satellite. As a new technology for monitoring the temperature continue to expand, its implementation in developing countries particularly in Indonesia requires strategic guidance of how the whole process will be executed. Nevertheless, due to this, cross-sectoral partnership in technology, policy, budget, industry is essential to be addressed. The World Bank has recorded the loss from forest fire where 28 million people directly affected including 19 people who died and over 500 thousand people suffered from respiratory problems. Smokes from forest and land fires have also struck Malaysia, Singapore, and Brunei Darussalam respectively. To respond to this, the IoT (Internet of Things) now comes with an extensive feature, using the capability of satellite reach. The Narrow Band Low Earth Orbit Satellite has released a feature for IoT connect to Low Orbit Satellite and transmit the data from the sensor directly. Therefore, we argue that this technology is crucial and needs to be functioned immediately to monitor forest temperature in Indonesia.
本文的最终目标是确保使用物联网窄带低地球轨道卫星监测印度尼西亚森林温度计划的正常运行。随着一种监测温度的新技术的不断发展,在发展中国家,特别是在印度尼西亚,它的实施需要对如何执行整个过程进行战略指导。然而,由于这一点,在技术、政策、预算和工业方面的跨部门伙伴关系是至关重要的。世界银行记录了森林火灾造成的损失,有2800万人直接受到影响,其中19人死亡,50多万人患有呼吸系统疾病。马来西亚、新加坡和文莱达鲁萨兰国也分别受到森林和陆地火灾的烟雾袭击。为了应对这种情况,物联网(IoT)现在具有广泛的功能,利用卫星覆盖的能力。窄带低地球轨道卫星已经发布了物联网连接到低轨道卫星并直接从传感器传输数据的功能。因此,我们认为这项技术是至关重要的,需要立即用于监测印度尼西亚的森林温度。
{"title":"Method Using IOT Low Earth Orbit Satellite to Monitor Forest Temperature in Indonesia","authors":"Ariesta Satryoko, A. Runturambi","doi":"10.23919/EECSI50503.2020.9251873","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251873","url":null,"abstract":"The ultimate goal of this paper is to ensure the proper functioning of the Monitoring Forest Temperature program in Indonesia using the IoT Narrow-Band Low earth orbit Satellite. As a new technology for monitoring the temperature continue to expand, its implementation in developing countries particularly in Indonesia requires strategic guidance of how the whole process will be executed. Nevertheless, due to this, cross-sectoral partnership in technology, policy, budget, industry is essential to be addressed. The World Bank has recorded the loss from forest fire where 28 million people directly affected including 19 people who died and over 500 thousand people suffered from respiratory problems. Smokes from forest and land fires have also struck Malaysia, Singapore, and Brunei Darussalam respectively. To respond to this, the IoT (Internet of Things) now comes with an extensive feature, using the capability of satellite reach. The Narrow Band Low Earth Orbit Satellite has released a feature for IoT connect to Low Orbit Satellite and transmit the data from the sensor directly. Therefore, we argue that this technology is crucial and needs to be functioned immediately to monitor forest temperature in Indonesia.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"6 1","pages":"240-243"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91015065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Organizing Committee EECSI 2020 组委会EECSI 2020
{"title":"Organizing Committee EECSI 2020","authors":"","doi":"10.23919/eecsi50503.2020.9251879","DOIUrl":"https://doi.org/10.23919/eecsi50503.2020.9251879","url":null,"abstract":"","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89525061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Defect Prediction Using Neural Network Based SMOTE 基于SMOTE的神经网络软件缺陷预测
Rizal Broer Bahaweres, Fajar Agustian, I. Hermadi, A. Suroso, Y. Arkeman
Software defect prediction is a practical approach to improve the quality and efficiency of time and costs for software testing by focusing on defect modules. The dataset of software defect prediction naturally has a class imbalance problem with very few defective modules compared to non-defective modules. This situation has a negative impact on the Neural Network, which can lead to overfitting and poor accuracy. Synthetic Minority Over-sampling Technique (SMOTE) is one of the popular techniques that can solve the problem of class imbalance. However, Neural Network and SMOTE both have hyperparameters which must be determined by the user before the modelling process. In this study, we applied the Neural Networks Based SMOTE, a combination of Neural Network and SMOTE with each hyperparameter of SMOTE and Neural Network that are optimized using random search to solve the class imbalance problem in the six NASA datasets. The results use a 5*5 cross-validation show that increases Bal by 25.48% and Recall by 45.99% compared to the original Neural Network. We also compare the performance of Neural Network-based SMOTE with “Traditional” Machine Learning-based SMOTE. The Neural Network-based SMOTE takes first place in the average rank.
软件缺陷预测是一种实用的方法,通过关注缺陷模块来提高软件测试的质量和效率以及时间和成本。软件缺陷预测数据集自然存在类不平衡问题,缺陷模块与非缺陷模块相比少得多。这种情况对神经网络有负面影响,可能导致过拟合和精度差。合成少数派过采样技术(SMOTE)是解决类不平衡问题的常用技术之一。然而,神经网络和SMOTE都有超参数,这些参数必须在建模过程之前由用户确定。在本研究中,我们应用基于神经网络的SMOTE,即神经网络和SMOTE的组合,SMOTE和神经网络的每个超参数都使用随机搜索进行优化,以解决6个NASA数据集的类不平衡问题。使用5*5交叉验证的结果表明,与原始神经网络相比,Bal提高了25.48%,Recall提高了45.99%。我们还比较了基于神经网络的SMOTE与“传统的”基于机器学习的SMOTE的性能。基于神经网络的SMOTE在平均排名中名列第一。
{"title":"Software Defect Prediction Using Neural Network Based SMOTE","authors":"Rizal Broer Bahaweres, Fajar Agustian, I. Hermadi, A. Suroso, Y. Arkeman","doi":"10.23919/EECSI50503.2020.9251874","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251874","url":null,"abstract":"Software defect prediction is a practical approach to improve the quality and efficiency of time and costs for software testing by focusing on defect modules. The dataset of software defect prediction naturally has a class imbalance problem with very few defective modules compared to non-defective modules. This situation has a negative impact on the Neural Network, which can lead to overfitting and poor accuracy. Synthetic Minority Over-sampling Technique (SMOTE) is one of the popular techniques that can solve the problem of class imbalance. However, Neural Network and SMOTE both have hyperparameters which must be determined by the user before the modelling process. In this study, we applied the Neural Networks Based SMOTE, a combination of Neural Network and SMOTE with each hyperparameter of SMOTE and Neural Network that are optimized using random search to solve the class imbalance problem in the six NASA datasets. The results use a 5*5 cross-validation show that increases Bal by 25.48% and Recall by 45.99% compared to the original Neural Network. We also compare the performance of Neural Network-based SMOTE with “Traditional” Machine Learning-based SMOTE. The Neural Network-based SMOTE takes first place in the average rank.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"5 1","pages":"71-76"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82662590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Practical application of IOT and its implications on the existing software 物联网的实际应用及其对现有软件的影响
I. Al-Barazanchi, Zahraa A. Jaaz, H. Abbas, Haider Rasheed Abdulshaheed
The data management from end-to-end level is done by cloud-assisted IOT for its users and they keep a goal in increasing their number of users with the course of time. From saving the infiltration of data from both internal and external threats to the system, IOT is the best-proposed method used for securing the database. Connecting objects/individuals with the Internet via safe interaction is the main objective of IOT. It can assemble all the hardware devices that are designed to store data for an individual or an organization. The associated applications and the way in which it can be deployed in the present organization in order to optimize the current working system. This paper focuses on providing an overall systematic secured data sharing portal that is devoid of threats from internal as well as external entities. By using CIBPRE data encryption a major security reform is introduced by IOT in storing and sharing of data on a regular basis.
从端到端的数据管理是由云辅助物联网为其用户完成的,他们的目标是随着时间的推移增加用户数量。从保护内部和外部威胁对系统的数据渗透来看,物联网是用于保护数据库的最佳方法。通过安全交互将物体/个人与互联网连接起来是物联网的主要目标。它可以组装所有设计用于为个人或组织存储数据的硬件设备。相关的应用程序以及在当前组织中部署这些应用程序以优化当前工作系统的方式。本文的重点是提供一个整体系统的安全数据共享门户,该门户没有来自内部和外部实体的威胁。通过使用CIBPRE数据加密,物联网在定期存储和共享数据方面引入了重大的安全改革。
{"title":"Practical application of IOT and its implications on the existing software","authors":"I. Al-Barazanchi, Zahraa A. Jaaz, H. Abbas, Haider Rasheed Abdulshaheed","doi":"10.23919/EECSI50503.2020.9251302","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251302","url":null,"abstract":"The data management from end-to-end level is done by cloud-assisted IOT for its users and they keep a goal in increasing their number of users with the course of time. From saving the infiltration of data from both internal and external threats to the system, IOT is the best-proposed method used for securing the database. Connecting objects/individuals with the Internet via safe interaction is the main objective of IOT. It can assemble all the hardware devices that are designed to store data for an individual or an organization. The associated applications and the way in which it can be deployed in the present organization in order to optimize the current working system. This paper focuses on providing an overall systematic secured data sharing portal that is devoid of threats from internal as well as external entities. By using CIBPRE data encryption a major security reform is introduced by IOT in storing and sharing of data on a regular basis.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"17 1","pages":"10-14"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76824372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Designing Shiyam Application: An Android-based Fasting Reminder 设计Shiyam应用程序:基于android的禁食提醒
D. Nurnaningsih, A. Permana, Salsabila Ramadhina, A. Rodoni
Indonesia is a country with Muslim majority. Muslims implement fasting as one of the essential Islamic pillars. Information regarding fasting is substantial for Muslims, especially warnings of imsak, sahur and iftar times. The integration of information related to fasting schedules and provisions in mobile devices with Android is a promising solution for Muslims. Designing the Shiyam application as the fasting reminder is great to perform. This application had been developed using the Waterfall model, emphasizing on the development of systematic and sequential information systems. The implementation of the Shiyam application that focuses on the aspect of fasting can provide detailed fasting-related information and provides warnings at the time of imsak, iftar, and sahur, which can help Muslims in carrying out their worship.
印度尼西亚是一个穆斯林占多数的国家。穆斯林将斋戒作为伊斯兰教的重要支柱之一。对于穆斯林来说,关于斋戒的信息是大量的,特别是关于imsak, sahurr和iftar时间的警告。在移动设备上集成有关斋戒时间表和规定的信息与Android是一个很有前途的解决方案。设计Shiyam应用程序作为禁食提醒是很好的做法。该应用程序是使用瀑布模型开发的,强调系统和顺序信息系统的开发。希亚姆应用程序的实施侧重于斋戒方面,可以提供详细的斋戒相关信息,并在imsak, iftar和sahurr时提供警告,这可以帮助穆斯林进行他们的礼拜。
{"title":"Designing Shiyam Application: An Android-based Fasting Reminder","authors":"D. Nurnaningsih, A. Permana, Salsabila Ramadhina, A. Rodoni","doi":"10.23919/EECSI50503.2020.9251891","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251891","url":null,"abstract":"Indonesia is a country with Muslim majority. Muslims implement fasting as one of the essential Islamic pillars. Information regarding fasting is substantial for Muslims, especially warnings of imsak, sahur and iftar times. The integration of information related to fasting schedules and provisions in mobile devices with Android is a promising solution for Muslims. Designing the Shiyam application as the fasting reminder is great to perform. This application had been developed using the Waterfall model, emphasizing on the development of systematic and sequential information systems. The implementation of the Shiyam application that focuses on the aspect of fasting can provide detailed fasting-related information and provides warnings at the time of imsak, iftar, and sahur, which can help Muslims in carrying out their worship.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"19 1","pages":"60-64"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83573094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Improvement Impact Performance of Face Detection Using YOLO Algorithm 使用YOLO算法改进人脸检测的影响性能
Rakha Asyrofi, Yoni Azhar Winata
Image data augmentation is a way that makes it possible to increase the diversity of available data without actually collecting new data. In this study, researchers have evaluated the application of image manipulation with the Thatcher effect, double illusion, and inversion on the performance of face detection for data augmentation needs where the data obtained has a weakness that is the limited amount of data to create a training model. The purpose of this research is to increase the diversity of the data so that it can make predictions correctly if given other similar datasets. To perform face detection on images, it is done using YOLOv3 then comparing the accuracy results from the dataset after and before adding data augmentation.
图像数据增强是一种在不实际收集新数据的情况下增加可用数据多样性的方法。在本研究中,研究人员评估了撒切尔效应、双重错觉和反演等图像处理在人脸检测性能方面的应用,以满足数据增强需求,其中获得的数据有一个缺点,即用于创建训练模型的数据量有限。本研究的目的是增加数据的多样性,以便在给定其他类似数据集的情况下做出正确的预测。为了对图像进行人脸检测,使用YOLOv3完成,然后比较添加数据增强后和之前数据集的准确性结果。
{"title":"The Improvement Impact Performance of Face Detection Using YOLO Algorithm","authors":"Rakha Asyrofi, Yoni Azhar Winata","doi":"10.23919/EECSI50503.2020.9251905","DOIUrl":"https://doi.org/10.23919/EECSI50503.2020.9251905","url":null,"abstract":"Image data augmentation is a way that makes it possible to increase the diversity of available data without actually collecting new data. In this study, researchers have evaluated the application of image manipulation with the Thatcher effect, double illusion, and inversion on the performance of face detection for data augmentation needs where the data obtained has a weakness that is the limited amount of data to create a training model. The purpose of this research is to increase the diversity of the data so that it can make predictions correctly if given other similar datasets. To perform face detection on images, it is done using YOLOv3 then comparing the accuracy results from the dataset after and before adding data augmentation.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"67 1","pages":"177-180"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80919077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1