2019 15th International Conference on Electronics, Computer and Computation (ICECCO)最新文献

筛选
英文 中文
Enhanced Decision Tree-J48 With SMOTE Machine Learning Algorithm for Effective Botnet Detection in Imbalance Dataset 基于SMOTE机器学习算法的增强决策树- j48在不平衡数据集中的有效僵尸网络检测
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043233
Ilyas Adeleke Jimoh, I. Ismaila, M. Olalere
{"title":"Enhanced Decision Tree-J48 With SMOTE Machine Learning Algorithm for Effective Botnet Detection in Imbalance Dataset","authors":"Ilyas Adeleke Jimoh, I. Ismaila, M. Olalere","doi":"10.1109/ICECCO48375.2019.9043233","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043233","url":null,"abstract":"Botnet is one of the major security threats in the field of information technology today (IT). The increase in the rate of attack on industrial IT infrastructures, theft of personal data and attacks on financial information is becoming critical. Majority of available dataset for botnet detection are very old and may not be able to stand the present reality in this research area. One of the latest dataset from Canadian Institute of Cyber Security labeled “CICIDS2017” was noted as an imbalance data distribution ratio of 99% to 1%. This distribution represents majority to minority class ratio. This may pose a challenge of over-fitting in majority class to the research and create a bias in the analysis of results. This research work has adopted J48 decision tree machine learning algorithm with application of SMOTE technique in solving the problem of imbalance dataset, thereby leading to an improved detection of botnets. The accuracy of the highest scenario was 99.95%. This is a significant improvement in detection rate compare to the previous research work.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Fuel Cell technology approach to generate electricity using air-conditioner water 一种利用空调水发电的燃料电池技术
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043268
E. A. Aja, Sadiq Thomas, Oluwatomisin E. Aina, I. D. Inuwa, B. Saka, Y. S. Mohammed
{"title":"A Fuel Cell technology approach to generate electricity using air-conditioner water","authors":"E. A. Aja, Sadiq Thomas, Oluwatomisin E. Aina, I. D. Inuwa, B. Saka, Y. S. Mohammed","doi":"10.1109/ICECCO48375.2019.9043268","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043268","url":null,"abstract":"The fuel cell technology has wide range of applications, such as seen in the driving of electric cars and powering of electrical appliances. This paper describes how water an end product from air-conditioner is passed through different chambers which houses the machines that will harness the hydrogen gas into its tank and subsequently used to generate electricity for household appliances. The process involves three phases which are the air-conditioner phase, the chambers phase and the house phase. With the right connection as described by this paper, electricity would be generated for the household electrical appliances thereby reducing dependency on the nominal power from the grid. This technology is an alternative way of generating power for our everyday use, free from atmospheric toxics and ozone friendly.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123516692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning for Image-based Cervical Cancer Detection and Diagnosis — A Survey 基于图像的深度学习宫颈癌检测与诊断研究综述
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043220
Oluwatomisin E. Aina, Steve A. Adeshina, A. Aibinu
{"title":"Deep Learning for Image-based Cervical Cancer Detection and Diagnosis — A Survey","authors":"Oluwatomisin E. Aina, Steve A. Adeshina, A. Aibinu","doi":"10.1109/ICECCO48375.2019.9043220","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043220","url":null,"abstract":"Cervical cancer is the fourth most common type of cancer found in females with a record of 570,000 incidences and 311,000 deaths in the year 2018 worldwide. It is caused by a virus known as Human Papilloma Virus (HPV). Screening if done early can reduce this prevalence. However, manual screening methods are not efficient in the detection of cervical cancer as a result of some factors. This, however, results in misdiagnosis and over-treatment. Therefore, researchers proposed screening cervical automatically by using traditional and deep learning techniques. This paper aims to review past work that has been done particularly in the deep learning domain and discusses future directions in the automated detection of cervical cancer. It is believed that this will ensure proper diagnosis and could potentially reduce the prevalence of cervical cancer.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique 使用组合静态规则和基于机器学习的技术减轻高级持续性威胁
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043278
Oluwasegun Adelaiye, A. Ajibola
{"title":"Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique","authors":"Oluwasegun Adelaiye, A. Ajibola","doi":"10.1109/ICECCO48375.2019.9043278","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043278","url":null,"abstract":"Advanced Persistent Threat is a targeted attack method used to maintain undetected unauthorized access over an extended period to exfiltrate valuable data. The inability of traditional methods in mitigating this attack is a major problem, which poses huge threats to organizations. This paper proposes the combined use of pattern recognition and machine learning based techniques in militating the attack. Using basic statistical test approach, a dataset containing 1,047,908 PCAP instances is analyzed and results show patterns exist in identifying between malicious data traffic and normal data traffic. The machine learning on the other hand, is evaluated using three algorithms successfully: KNN, Decision Tree and Random Forest. All algorithms showed very high accuracies in correctly classifying the data traffic. Using the algorithm with the highest accuracy, Random Forest is optimized for better effectiveness.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of handwritten names of cities using various deep learning models 使用各种深度学习模型对手写城市名称进行分类
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043266
Nurseitov Daniyar, B. Kairat, Kanatov Maksat, Alimova Anel
{"title":"Classification of handwritten names of cities using various deep learning models","authors":"Nurseitov Daniyar, B. Kairat, Kanatov Maksat, Alimova Anel","doi":"10.1109/ICECCO48375.2019.9043266","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043266","url":null,"abstract":"The digitized text of handwriting would conduce to automate the business processes of many companies, simplifying the work of human being. For example, our state postal service does not have an automated mail processing system that recognizes handwritten addresses on an envelope. Each incoming correspondence is registered in the system by the operator. Automation of this business process on registering post mailing will significantly reduce expenses of postal service on mail delivery.There are two main approaches to handwriting recognition, namely hidden Markov models (HMM) and artificial neural networks (ANN). The methods proposed in this article are based on ANN. The first model is based on deep convolutional neural networks (DCNN) [1] for feature extraction and a fully connected multilayer perceptron (fully connected MLP) for word classification. The next model under consideration, called SimpleHTR, proposed by Harald Scheidl [2], has layers of a convolutional neural network (CNN) and layers of a recurrent neural network (RNN) for disseminating information through an image. Finally, the Connectionist Temporal Classification (CTC) decoding algorithm is executed, which adduces the text to the final version.Models were learned on the dataset of handwritten city names from Cyrillic words. 21,000 images were collected (42 classes of 500 handwriting samples). To increase the data set for training, 207,438 images from available samples were generated.As a result, two approaches for handwriting recognition were analyzed and the SimpleHTR model showed the best results over all.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123893400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Perspectives of Integration QR Codes and RFID readers in large-scale events controlled by HRM systems 在人力资源管理系统控制的大型事件中整合QR码和RFID阅读器的观点
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043285
N. Ibragimov, Alina Amangeldiyeva
{"title":"Perspectives of Integration QR Codes and RFID readers in large-scale events controlled by HRM systems","authors":"N. Ibragimov, Alina Amangeldiyeva","doi":"10.1109/ICECCO48375.2019.9043285","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043285","url":null,"abstract":"There is an increasing trend in the application of integrated Quick Response(QR) and RFID technologies to large-scale events. QR codes and RFID readers containing logs data were introduced into an international computer project competition organized for students in the university. This paper aims to discover the perspectives of Integrated Technologies, which has been created and show how this integration affects to optimization and efficiency of the processes. The presented study is based on the application of the Human Resource Management System for the education sector(e-HRMS), a centralized platform that powers and manages the structure of international competitions. The study findings reveal that the integration of ICT technologies positively affects optimization and process management in the education sector. Moreover, the most important parameter that affects both technologies has been found and checked clearly.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ANDROID APPLICATIONS MALWARE DETECTION: A Comparative Analysis of some Classification Algorithms ANDROID应用恶意软件检测:几种分类算法的比较分析
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043284
Oluwaseyi Olorunshola, Ayanfeoluwa Oluyomi
{"title":"ANDROID APPLICATIONS MALWARE DETECTION: A Comparative Analysis of some Classification Algorithms","authors":"Oluwaseyi Olorunshola, Ayanfeoluwa Oluyomi","doi":"10.1109/ICECCO48375.2019.9043284","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043284","url":null,"abstract":"The usage of the Android Operating System (OS) has surpassed all other operating systems and as a result, it has become the primary target of attackers. Many attacks can be geared towards Android phones mainly using application installation. These third-party applications first seek permission from the user before installation. Some of the permissions can be elusive evading the users’ attention. With the type of harm that can be done which include illegal extraction and transfer of the users’ data, spying on the users and so on there is a need to have a heuristic approach in the detection of malware. In this research work, some classification algorithms were tested to determine the best performing algorithm when it comes to the detection of android malware detection. An android application dataset was obtained from figshare and used in the Waikato Environment for Knowledge Analysis (WEKA) for training and testing, it was measured under accuracy, false-positive rate, precision, recall, f-measure, Receiver Operating Curve (ROC) and Root Mean Square Error (RMSE). It was discovered that multi-layer perceptron performs best with an accuracy of 99.4%.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121343085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improvement Of Gravity Light Generation Modeling Using Bond Graph Method 基于键合图法的重力光生成建模改进
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043217
Sadiq M. Bammami, E. Okafor, S. Hussein, M. Bammami, Sadiq Thomas, Omotayo Oshiga
{"title":"Improvement Of Gravity Light Generation Modeling Using Bond Graph Method","authors":"Sadiq M. Bammami, E. Okafor, S. Hussein, M. Bammami, Sadiq Thomas, Omotayo Oshiga","doi":"10.1109/ICECCO48375.2019.9043217","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043217","url":null,"abstract":"this research is aimed at modeling and performing structural analysis on Gravity light system using bond graph method in order to improve its performance. To achieve the bond graph model of the gravity light system, the various subsystems, storage elements, junction structures, transformer elements with appropriate causality assignments and energy exchange that make up the gravity light system were identified and modeled. In the developed model, the effect of friction was considered. 20-Sim software was used to validate the developed bond graph model. The structural design and analysis of the system carried out shows that, it is not just another renewable energy generating source but one that improves greatly, the exiting gravity light system by extended operational time of 40 minutes and higher efficiency of over 80%. Hence, it meets all requirements for the application of renewable energy sources, and technically viable for construction and further developments.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Digital Interactive Course Material on Automated Management System Moodle for Integral Equations Course “积分方程”课程自动化管理系统模型之数位互动教材开发
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043240
Isa Muslu, Moussa Mahamat Boukar, O. Gurbuz
{"title":"Developing a Digital Interactive Course Material on Automated Management System Moodle for Integral Equations Course","authors":"Isa Muslu, Moussa Mahamat Boukar, O. Gurbuz","doi":"10.1109/ICECCO48375.2019.9043240","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043240","url":null,"abstract":"Integral equations arises in many physical applications like potential theory and Dirichlet problems, electrostatics, mathematical problems of radiation equilibrium, the particle transport problems of astrophysics and radiation heat problems etc. Integral equations course is one of the main courses in engineering faculties. The aim of this work is to develop an interactive digital learning material, a question bank using Wildcards, on an automation management system Moodle. To create the digital material Wildcard technology of the Moodle is used.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation into Peer-to-Peer Network Security Using Wireshark 基于Wireshark的点对点网络安全研究
2019 15th International Conference on Electronics, Computer and Computation (ICECCO) Pub Date : 2019-12-01 DOI: 10.1109/ICECCO48375.2019.9043236
A. Musa, A. Abubakar, Usman Abdul Gimba, Rasheed Abubakar Rasheed
{"title":"An Investigation into Peer-to-Peer Network Security Using Wireshark","authors":"A. Musa, A. Abubakar, Usman Abdul Gimba, Rasheed Abubakar Rasheed","doi":"10.1109/ICECCO48375.2019.9043236","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043236","url":null,"abstract":"Peer-to-peer networks’ ability to be used as the primary vector of delivery in a highly sensitive environment poses many dangers. The impacts of the hazards on security can be measured when using peer-to-peer networks in a standard computing environment. The transfer of data across multiple network data-centers exposes the system to a potential insider threat, remote control, and the possible leak of private and confidential information. In this paper, we present an analysis of peer-to-peer network security. This follows a description of existing techniques to prevent potential threats to peer-to-peer networks and finally the paper presents a proposed technique to enhance the security of peer-to-peer networks using simulation based experimental study.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信