2020 International Conference on Computational Intelligence (ICCI)最新文献

筛选
英文 中文
IIoT Digital Forensics and Major Security issues 工业物联网数字取证和主要安全问题
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247685
Venkata Venugopal Rao Gudlur Saigopal, Valliappan Raju
{"title":"IIoT Digital Forensics and Major Security issues","authors":"Venkata Venugopal Rao Gudlur Saigopal, Valliappan Raju","doi":"10.1109/ICCI51257.2020.9247685","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247685","url":null,"abstract":"the significant area in the growing field of internet security and IIoT connectivity is the way that forensic investigators will conduct investigation process with devices connected to industrial sensors. This part of process is known as IIoT digital forensics and investigation. The main research on IIoT digital forensic investigation has been done, but the current investigation process has revealed and identified major security issues need to be addressed. In parallel, major security issues faced by traditional forensic investigators dealing with IIoT connectivity and data security. This paper address the issues of the challenges and major security issues identified by review conducted in the prospective and emphasizes on the aforementioned security and challenges.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131338321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PITEH: Providing Financial Identities to Those Without Credit Score 皮特:为没有信用评分的人提供金融身份
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247779
Ayu Shahirah Salem, Saipunidzam Mahamad
{"title":"PITEH: Providing Financial Identities to Those Without Credit Score","authors":"Ayu Shahirah Salem, Saipunidzam Mahamad","doi":"10.1109/ICCI51257.2020.9247779","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247779","url":null,"abstract":"Faced with growing competition in the microfinancing market and higher operational risk, it is ever more important for a Microfinancing Institution (MFI) to be able to leverage less conventional customer data to improve the efficiency of their lending models. Most MFIs are active in Malaysia where financial history is generally non-existent on their user base which increases the difficulty in assessing the credit worthiness of individuals. Instead, an alternative source of data such as mobile phone call and SMS logs can be utilised to assist with this problem. In this project, call and SMS logs from the loan applicants are featured and used to train various classification models. PITEH is an Android mobile lending application that offers microfinance ranging from RM500 – RM5,000 by validating the creditworthiness of a loan applicant through the creation of credit scores using machine learning to classify data existing in the call and SMS logs. With users’ explicit permission, the application will collect key pieces of data from users’ Android devices solely for the purposes of underwriting loan applicants who do not have documented financial history. It will select these data sources for the purposes of understanding a user’s potential financial capacity, his or her behavioural attributes, and to validate his identity. With something as simple as a credit score, we are giving people the power to build their own futures.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"6 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Privacy Preserving-Contact Tracing on Digital Platforms 数字平台上隐私保护-联系追踪的比较研究
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247782
Forum Bhavesh Patel, Nilakshi Jain, Ramesh Menon, Srikanth Kodeboyina
{"title":"Comparative Study of Privacy Preserving-Contact Tracing on Digital Platforms","authors":"Forum Bhavesh Patel, Nilakshi Jain, Ramesh Menon, Srikanth Kodeboyina","doi":"10.1109/ICCI51257.2020.9247782","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247782","url":null,"abstract":"The rapid development in digital infrastructure such as computing power and less expensive mobile devices and explosive growth of the internet has made an impact on digital processing. This revolution has bought many new applications and new technologies, now aiming at replacement with improving effectiveness and efficiency of manual contact tracing with new approaches with maintaining user privacy. The successful containment of the Coronavirus pandemic (COVID-19) depends on the ability to identify quickly and reliably those who have been in close proximity to a contagious positive-tested individual. This can be made possible with contact tracing method. The information about interaction which happens between two users should be revealed only to themselves to maintain privacy of individuals. Users which are detected positive should not share any of their contact details or personal information or history with the authority or any other party but pass the anonymous IDs and help in tracing out the contacted people. This paper presents the most popular contact tracing data privacy techniques.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132474187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance comparison of CNN and LSTM algorithms for arrhythmia classification CNN与LSTM算法在心律失常分类中的性能比较
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247636
Shahab Ul Hassan, M. Zahid, Khaleel Husain
{"title":"Performance comparison of CNN and LSTM algorithms for arrhythmia classification","authors":"Shahab Ul Hassan, M. Zahid, Khaleel Husain","doi":"10.1109/ICCI51257.2020.9247636","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247636","url":null,"abstract":"One of the critical CVDs is cardiac arrhythmia and has caused significant fatalities. Recently, deep learning models are utilized for the classification of arrhythmia disease through electrocardiogram (ECG) signal analysis. Among the existing deep learning model, convolutional neural network (CNN) and long short-term memory (LSTM) algorithms are extensively used for arrhythmia classification. However, there is a lack of study that analyzes the performance comparison of CNN and LSTM algorithms for arrhythmia classification. In this paper, the performance of CNN and LSTM algorithms for arrhythmia classification is compared for a publicly available dataset. Specifically, the MIT-BIH arrhythmia dataset is used and the performance is measured in terms of area under the curve (AUC) and receiver operating characteristic (ROC) curve. Analyzing the performance of these algorithms will further assist in the development of an enhanced deep learning model that offers improved performance.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128274607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Aedes Larvae Classification and Detection (ALCD) System by Using Deep Learning 基于深度学习的伊蚊幼虫分类检测系统
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247647
Muhammad Izzul Azri Bin Zainol Azman, A. Sarlan
{"title":"Aedes Larvae Classification and Detection (ALCD) System by Using Deep Learning","authors":"Muhammad Izzul Azri Bin Zainol Azman, A. Sarlan","doi":"10.1109/ICCI51257.2020.9247647","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247647","url":null,"abstract":"Nowadays, the presence of the latest technologies like Artificial Intelligence and lenses that can capture the micro-living being like larva have been used in our surrounding environment. Deep Learning technologies which are a subset of Artificial Intelligence have been implemented in used for processing the image. As before this, there is a study to detect the possible place of Aedes mosquito breeding place with the use of Internet of Things (IoT) technologies to detect the humidity of certain places and relate it to the possibility of Aedes mosquito breeding present. To support the study and have verification of the place is the breeding place of Aedes mosquito, a study to classify the larva and detect it has been proposed. The Aedes Larvae Classification and Detection (ALCD) System by using Deep learning is a system that uses deep learning technologies to detect the pattern of the larva and classify it according to its type. The proposed developed system ALCD because Malaysia is having a rapid increase in dengue cases throughout the year. While there are many approaches from the government and non-government organizations (NGOs) to help combat the dengue virus outbreak, this study is focusing on preventing the virus from spreading in the early stages. The life cycle of an Aedes mosquito is starting from the egg to larva to pupa and lastly became an adult mosquito. The early stages of Aedes mosquito that can be used to differentiate between Aedes and Non-Aedes were at the larva stages. This study is meant to do a background study on using the latest technology of deep learning subset of Artificial Intelligence technology to find the pattern of the Aedes and Non-Aedes on the larva. After the pattern of the larva type is recognized, the process to classify it between the Aedes larvae and Non-Aedes larvae can be continued for classification. Real-time classification testing will be conducted to test the accuracy and efficiency of the ALCD system.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assessing Suitable Word Embedding Model for Malay Language through Intrinsic Evaluation 马来语词嵌入模型的内在评价
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247707
Yeong-Tsann Phua, K. Yew, O. Foong, M. Teow
{"title":"Assessing Suitable Word Embedding Model for Malay Language through Intrinsic Evaluation","authors":"Yeong-Tsann Phua, K. Yew, O. Foong, M. Teow","doi":"10.1109/ICCI51257.2020.9247707","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247707","url":null,"abstract":"Word embeddings were created to form meaningful representation for words in an efficient manner. This is an essential step in most of the Natural Language Processing tasks. In this paper, different Malay language word embedding models were trained on Malay text corpus. These models were trained using Word2Vec and fastText using both CBOW and Skip-gram architectures, and GloVe. These trained models were tested on intrinsic evaluation for semantic similarity and word analogies. In the experiment, the custom-trained fastText Skip-gram model achieved 0.5509 for Pearson correlation coefficient at word similarity evaluation, and 36.80% for accuracy at word analogies evaluation. The result outperformed the fastText pre-trained models which only achieved 0.477 and 22.96% for word similarity evaluation and word analogies evaluation, respectively. The result shows that there is still room for improvement in both pre-processing tasks and datasets for evaluation.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123001295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Virtual Reality Training and Skill Enhancement for Offshore Workers 海上作业人员虚拟现实培训与技能提升
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247819
S. Sulaiman, S. Ali, Syed Hasan Adil, Mansoor Ebrahim, Kamran Raza
{"title":"Virtual Reality Training and Skill Enhancement for Offshore Workers","authors":"S. Sulaiman, S. Ali, Syed Hasan Adil, Mansoor Ebrahim, Kamran Raza","doi":"10.1109/ICCI51257.2020.9247819","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247819","url":null,"abstract":"This project studies the application of virtual training environment for offshore workers. Working in the oil and gas industry where the technology is rapidly evolving results in the employee to perform tasks to current and new equipment. Many offshore workers require years of experience to obtain the relevant skills in handling with hazardous equipment. Due to the laid off experience workers, many companies are facing difficulty in training their new employee as most of them do not have enough training experience and are facing difficulty with adapting with the offshore environment. This virtual reality (VR) offshore training would provide a convenient training experience to the offshore workers in obtaining relevant machinery crane operating skills and operation in pipeline training. A simulator-based training using the Virtual Reality (VR) technology provides a more immersive training experience in a non-hazardous environment and can be perform in any closed room environment such in the office or at home. The training is programmed to monitor the workers performance based on the criteria evaluated will be recorded. The VR offshore training was conducted to a total of five users and the training was repeated for five times. A fifteen minutes rest was given in between each completed training. The percentage of user’s achievement was recorded, and the results were tabulated.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language 用C语言GMP库对模块化求幂算法的有效性进行基准测试
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247766
Tran Quy Ban, Tran Thi Thuy Nguyen, Vu Thanh Long, Pham Dang Dung, Bui Thanh Tung
{"title":"A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language","authors":"Tran Quy Ban, Tran Thi Thuy Nguyen, Vu Thanh Long, Pham Dang Dung, Bui Thanh Tung","doi":"10.1109/ICCI51257.2020.9247766","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247766","url":null,"abstract":"This research aims to implement different modular exponentiation algorithms and evaluate the average complexity and compare it to the theoretical value. We use the library GMP to implement seven modular exponentiation algorithms. They are Left-to-right Square and Multiply, Right-to-left Square and Multiply, Left-to-right Signed Digit Square, and Multiply Left-to-right Square and Multiply Always Right-to-left Square and Multiply Always, Montgomery Ladder and Joye Ladder. For some exponent bit length, we choose 1024 bits and execute each algorithm on many exponent values and count the average numbers of squares and the average number of multiplications. Whenever relevant, our programs will check the consistency relations between the registers at the end of the exponentiation.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131397353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wave Height and Peak Wave Period Prediction Using Recurrent Neural Networks 用递归神经网络预测波高和波峰周期
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247805
Kazuki Osawa, Hiroki Yamaguchi, Muhammad Umair, M. Hashmani, K. Horio
{"title":"Wave Height and Peak Wave Period Prediction Using Recurrent Neural Networks","authors":"Kazuki Osawa, Hiroki Yamaguchi, Muhammad Umair, M. Hashmani, K. Horio","doi":"10.1109/ICCI51257.2020.9247805","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247805","url":null,"abstract":"In this paper, we applied a recurrent neural network to predict a wave height and a peak wave period for next 24 hours from only those last 24 hours. We adopted LSTM as the network structure and used statistic gradient decent method and adaptive moment estimation method as the learning methods. It was difficult to estimate short-time fluctuations because only the wave height and period data were used as inputs, but it was shown that the wave height and peak wave period within the next 2 hours can be predicted with an accuracy within 20 percent in error.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face Recognition for Smart Door Lock System using Hierarchical Network 基于层次网络的智能门锁系统人脸识别
2020 International Conference on Computational Intelligence (ICCI) Pub Date : 2020-10-08 DOI: 10.1109/ICCI51257.2020.9247836
M. Waseem, Sundar Ali Khowaja, R. Ayyasamy, Farhan Bashir
{"title":"Face Recognition for Smart Door Lock System using Hierarchical Network","authors":"M. Waseem, Sundar Ali Khowaja, R. Ayyasamy, Farhan Bashir","doi":"10.1109/ICCI51257.2020.9247836","DOIUrl":"https://doi.org/10.1109/ICCI51257.2020.9247836","url":null,"abstract":"Face recognition system is broadly used for human identification because of its capacity to measure the facial points and recognize the identity in an unobtrusive way. The application of face recognition systems can be applied to surveillance at home, workplaces, and campuses, accordingly. The problem with existing face recognition systems is that they either rely on the facial key points and landmarks or the face embeddings from FaceNet for the recognition process. In this paper, we propose a hierarchical network (HN) framework which uses pre-trained architecture for recognizing faces followed by the validation from face embeddings using FaceNet. We also designed a real-time face recognition security door lock system connected with raspberry pi as an implication of the proposed method. The evaluation of the proposed work has been conducted on the dataset collected from 12 students from Faculty of Engineering and Technology, University of Sindh. The experimental results show that the proposed method achieves better results over existing works. We also carried out a comparison on random faces acquired from the Internet to perform face recognition and results shows that the proposed HN framework is resilient to the randomly acquired faces.","PeriodicalId":194158,"journal":{"name":"2020 International Conference on Computational Intelligence (ICCI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132413440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信