4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)最新文献

筛选
英文 中文
Backend as a Service Cloud Computing Integrated with Cross-platform Mobile Development Framework to Create an E-learning application that works in Mobile and Web with a single codebase 后端即服务云计算与跨平台移动开发框架集成,以创建一个使用单个代码库在移动和Web上工作的电子学习应用程序
Osama mohammed ahmed
{"title":"Backend as a Service Cloud Computing Integrated with Cross-platform Mobile Development Framework to Create an E-learning application that works in Mobile and Web with a single codebase","authors":"Osama mohammed ahmed","doi":"10.24086/cocos2022/paper.511","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.511","url":null,"abstract":"Many platforms are emerging recently and businesses need to work with all of them, therefore, creating applications that work on multiplatform like Android, IOS, Windows …etc. is necessary these days.Building a separate native application for each platform as well as working separately with both Frontend and Backend is costly in several respects, including time, effort and cost.using Cross-platform tools and frameworks is the best solution to the problem of multiple platforms and the need to deal with all of them. This paper discusses the most famous, modern, and widely used Cross-platform tools to introduce the best way to build an E-learning application that works natively in multiplatform using only one programming language, and even it doesn’t require work with the Backend side. Finally, we have created a sample E-learning application using Flutter with Firebase as a Backend. Due to the Corona pandemic, e-learning has become a mandatory requirement as a primary or secondary method of education, this application work on all platforms (Mobile and Desktop), and we tested it on Android and Web Browsers.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125183077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diagnosis of Parkinson's disease through EEG signals based on artificial neural network and cuckoo search algorithm 基于人工神经网络和布谷鸟搜索算法的脑电信号诊断帕金森病
Rzgar Sirwan Raza, Adil Hussein Mohammed
{"title":"Diagnosis of Parkinson's disease through EEG signals based on artificial neural network and cuckoo search algorithm","authors":"Rzgar Sirwan Raza, Adil Hussein Mohammed","doi":"10.24086/cocos2022/paper.698","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.698","url":null,"abstract":"Parkinson's disease is a degenerative nervous system condition that impairs mobility. If the condition is not detected early enough, it might have permanent effects for the sufferer. A novel approach for identifying Parkinson's disease is provided in this research, which employs machine optimization and learning techniques. The suggested method's diagnosis procedure may be broken down into three primary steps: \"preprocessing,\" \"feature extraction,\" and \"classification.\" Preprocessing the EEG data is the initial stage in the suggested technique. Database samples are treated using discrete wavelet analysis to remove the destructive influence of noise on the input signals using signal analysis for this aim. The suggested method's second phase will employ principal component analysis to remove duplicate features and minimize data dimensionality. The artificial neural network model is trained and the classification model is built using the retrieved features. The effectiveness of the suggested technique is examined in terms of criteria such as accuracy, sensitivity, and specificity during the experimentation phase, and the results are compared to existing learning models. The findings revealed that the suggested technique enhances illness diagnostic accuracy by at least 8.25% and may be utilized as a useful tool in disease diagnosis.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seismic low-frequency shadow detection based on the Levenberg-Marquardt reassignment operators using S-transforms 基于s变换Levenberg-Marquardt重分配算子的低频地震阴影检测
R. Anvari, Adil Hussein Mohammed, S. Rashidi
{"title":"Seismic low-frequency shadow detection based on the Levenberg-Marquardt reassignment operators using S-transforms","authors":"R. Anvari, Adil Hussein Mohammed, S. Rashidi","doi":"10.24086/cocos2022/paper.632","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.632","url":null,"abstract":"Based on the phenomenon of low-frequency shadow beneath the oil and gas reservoirs, there is much theoretical research and practical production data. Therefore, accurate detection of the low-frequency shadow in order to predict reservoir. The high-precision detection time-frequency transform in this paper is achieved by adding Levenberg-Marquardt reassignment operators using S-transforms to adjust the window width adaptively according to the characteristics of different signal components. Finally, it optimizes the time-frequency distribution. Simulation results show that this method has a better time-frequency concentration than conventional methods. Finally, an application of this method in detecting low-frequency shadow verifies the effectiveness and feasibility, which provides a high-precision tool and means for reservoir prediction.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132412060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Approaches to Enable Resource Forecasting Process of Road Tunnels Construction 公路隧道建设资源预测的机器学习方法
A. Mahmoodzadeh, S. Rashidi, Adil Hussein Mohammed, Hunar Farid Hama, ,. H. Hashim Ibrahim
{"title":"Machine Learning Approaches to Enable Resource Forecasting Process of Road Tunnels Construction","authors":"A. Mahmoodzadeh, S. Rashidi, Adil Hussein Mohammed, Hunar Farid Hama, ,. H. Hashim Ibrahim","doi":"10.24086/cocos2022/paper.718","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.718","url":null,"abstract":"Increasing demand for tunneling projects, increases attention to time and cost required for their construction. Most of parameters which are affecting on the time and cost of tunnel construction are unknown. The purpose of this paper is to provide a method to predict the construction time and cost of a road tunnelusing linear regression (LR) method. In order to train the LR method, some datasets are obtained from the historical road tunnels. To verify the feasibility of the proposed method, it has been applied to a road tunnel. All of the forecasted results have been compared with the actual results obtained during the tunnel construction and the accuracy of the predictions has been investigated. According to three statistical evaluation criteria of root mean square error (RMSE), mean absolute percentage error (MAPE) and determination of the coefficient (R2), a very high accuracy has been obtained in the prediction results. The RMSE, MAPE and R2 indices have been calculated as 0.0005 days, 0.9380637% and 0.9874 for the construction time, respectively; and 7.1194 US$,0.78891593% and 0.9873 for the construction cost, respectively.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131406735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of IoT and Robotics application (Special case Study in Iraq and Kurdistan Region) 物联网与机器人应用综述(以伊拉克和库尔德斯坦地区为例)
Abdullah A. Nahi, Laith R. Flaih, K. Jasim, Rajan Hossian
{"title":"Review of IoT and Robotics application (Special case Study in Iraq and Kurdistan Region)","authors":"Abdullah A. Nahi, Laith R. Flaih, K. Jasim, Rajan Hossian","doi":"10.24086/cocos2022/paper.510","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.510","url":null,"abstract":"Currently, IoT (web of things) applications ending up being trending in all around the world and also yet also in the inadequate income nations there is some applications related to IoT at least in colleges to study, so a lot of the academic individuals and federal governments are aware of it is advantages to the area as well as teaching to create a generation that can handle modern technology systems as well as obtain benefits from it to decrease the use of power and also save the setting, this paper will certainly go over the trends application in Iraq as well as the feasible technologies and also possibilities in the near future.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Feature Selection Method based on Structural Particularity of Minimum Spanning Tree 基于最小生成树结构特殊性的无监督特征选择方法
Rojiar Pir Mohammadiani, Maryam Mozaffari, Soma Solaiman Zadeh
{"title":"Unsupervised Feature Selection Method based on Structural Particularity of Minimum Spanning Tree","authors":"Rojiar Pir Mohammadiani, Maryam Mozaffari, Soma Solaiman Zadeh","doi":"10.24086/cocos2022/paper.828","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.828","url":null,"abstract":"Unsupervised Feature Selection (UFS) methods try to extract features that can well keep the intrinsic structure of data. To make full use of such information in this paper we use one of the simplest graph sparsification strategies MST (Minimum Spanning Tree) for the task of UFS. A novel graph structural information method is proposed for unsupervised feature selection, we simplify and preserve correlation between features via MST through a structure that simultaneously captures the local and global structure of data, and then use graph structural information directly to achieve the subset representative features with minimum redundancy and more discriminative power. To show the effectiveness of our method, some of the most representative and referenced UFS methods are used for conducting experiments on some benchmark datasets. Experimental results verify that the proposed feature subset selection algorithm is effective, more specifically at the running time.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The relationships for some topological structures via fuzzy, soft ,and fuzzy soft sets 通过模糊集、软集和模糊软集确定某些拓扑结构的关系
S. Saleh, Mohammed Hussein Shukur, A. Al-Salemi
{"title":"The relationships for some topological structures via fuzzy, soft ,and fuzzy soft sets","authors":"S. Saleh, Mohammed Hussein Shukur, A. Al-Salemi","doi":"10.24086/cocos2022/paper.713","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.713","url":null,"abstract":"It is known that there are some mathematical tools for dealing with many uncertain problems some of them are fuzzy set[31], soft set[22], and fuzzy soft set theories which have been applied in many real-life fields such as decision making, data analysis, simulation, rule mining, evaluation of sound quality, and medical diagnosis (see [5,8,11,12,13,15,16,19,25,29,33] ).","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127180384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of Source Code Plagiarism Detection System 源代码抄袭检测系统的性能评价
{"title":"Performance Evaluation of Source Code Plagiarism Detection System","authors":"","doi":"10.24086/cocos2022/paper.732","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.732","url":null,"abstract":"Plagiarism Detection Systems are particularly useful in identifying plagiarism in the educational sector, where scientific publications and articles are common. Plagiarism occurs when someone replicates a piece of work without permission or citation from the original creator. Because of the advancement of communication and information technologies (ICT) and the accessibility of scientific materials on the internet, plagiarism detection has become a top priority and due to the broad availability of freeware text editors, detecting source code plagiarism has become a big difficulty. There have already been several research on the many forms of plagiarism detection algorithms used in identification systems, as well as source code plagiarism detection. This work suggests a strategy that combines TF-IDF transformations with a Random Forest Classifier to achieve a 93.5 percent accuracy rate, which is high when compared to previous strategies. The suggested system is implemented using the Python programming language.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122602001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YOLO-V3 Based Real-time Drone Detection Algorithm 基于YOLO-V3的无人机实时检测算法
Hamid R. Alsanad, Amin Z sadik
{"title":"YOLO-V3 Based Real-time Drone Detection Algorithm","authors":"Hamid R. Alsanad, Amin Z sadik","doi":"10.24086/cocos2022/paper.502","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.502","url":null,"abstract":"Drones are currently being used in a wide range of useful tasks that are too dangerous or/and expensive to be performed by humans. However, this is increasingly developing security breaching issues due to the possibility of misuse of unmanned aircraft in illegal activities such as drug smuggling, terrorism etc. Thus,thedetection and tracking of dronesare becoming a crucial topic. Unfortunately, due to the drone’s small size, its’ detection methods are generally unreliable: high false alarm rate, low accuracy rate and low detection speed are well-known aspects of this detection. The newemerging real-time algorithm based on the improved “You Only Look Once - version 3” (YOLO-V3) algorithm is proposed here for drone detection. This newly designed algorithm is consisting of three phases and has shown the potential to outperform the traditional detection approaches. The newly designed algorithm is trained and evaluated on the designed drone dataset. The evaluation results of our algorithm obtain 96% on average precision and 95.6% on accuracy.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face spoofing detection and Authentication Using Linear Binary Patterns, Gabor Features and Support Vector Machine 基于线性二值模式、Gabor特征和支持向量机的人脸欺骗检测与认证
Ahmed Mamoon Alkababji, Mustafa Haitham Alhabib, Mustafa Zuhaer Al-Dabagh
{"title":"Face spoofing detection and Authentication Using Linear Binary Patterns, Gabor Features and Support Vector Machine","authors":"Ahmed Mamoon Alkababji, Mustafa Haitham Alhabib, Mustafa Zuhaer Al-Dabagh","doi":"10.24086/cocos2022/paper.819","DOIUrl":"https://doi.org/10.24086/cocos2022/paper.819","url":null,"abstract":"Face detection and authentication have become an active field of research material in recent years duo to the increased use of face dependent access control systems, which can be considered as a good alternative to other biometric features such as fingerprint duo to its easily accessible, non- intrusive nature that makes it very important during the ongoing pandemic years. However, this method doesn’t come without security risks related to adversaries seeking to gain unauthorized access to the system. Face spoofing is a security breach attempt occurs when the attacker tries to deceive the face-enabled access control system by displaying a photo, video or wearing a mask of an authorized person to gain access. The paper in hand suggests a method for face anti-spoofing by utilizing some of the well-known feature extraction techniques usually associated with face detection and recognition, namely the LBP and Gabor features, in addition to the commonly used SVM classifier for identifying real and spoofed feces. The algorithm is implemented successfully on multiple individuals, achieving performance levels comparable to other accredited methods in terms of FAR, FRR and HTER verification criteria, aspiring for more advancedand effective methods.","PeriodicalId":137930,"journal":{"name":"4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信