2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)最新文献

筛选
英文 中文
Weapon detection system for surveillance and security 用于监视和安全的武器探测系统
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099733
S. Khalid, Abdullah Waqar, Hoor Ul Ain Tahir, Onome Christopher Edo, I. Tenebe
{"title":"Weapon detection system for surveillance and security","authors":"S. Khalid, Abdullah Waqar, Hoor Ul Ain Tahir, Onome Christopher Edo, I. Tenebe","doi":"10.1109/ITIKD56332.2023.10099733","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099733","url":null,"abstract":"Weapon detection is a critical and serious topic in terms of public security and safety, however, it's a difficult and time-consuming operation. Due to the increase in demand for security, safety, and personal property protection, the requirement for deploying video surveillance systems capable of recognizing and interpreting scenes and anomalous occurrences plays an important role in intelligence monitoring. In certain regions of the globe, mass shootings and gun violence are on the increase. Timely detection of the presence of a gun is critical to prevent loss of life and property. Several object detection models are available, which struggle to recognize firearms due to their unique size and form, as well as the varied colors of the background. In this study, we proposed a state-of-the-art system based on a deep learning model YOLO V5 for weapon detection that will be sufficiently resilient in terms of affine, rotation, occlusion, and size. We evaluated the performance of our system on a publicly available dataset and achieved the F1-score of 95.43%. For the detection and segmentation of firearms, we implemented Instance segmentation or Pixel level segmentation which employed Mask-RCNN. The system achieved the detection accuracy (DC) of 90.66% and 88.74% Mean intersection over union (mIoU). The purposed methodology combined different data augmentation and preprocessing methods to improve the accuracy of the proposed weapon detection system.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arabic Sign Language Recognition Using EfficientnetB1 and Transfer Learning Technique 基于EfficientnetB1和迁移学习技术的阿拉伯手语识别
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099710
Basel A. Dabwan, M. Jadhav, Yahya A. Ali, Fekry Olayah
{"title":"Arabic Sign Language Recognition Using EfficientnetB1 and Transfer Learning Technique","authors":"Basel A. Dabwan, M. Jadhav, Yahya A. Ali, Fekry Olayah","doi":"10.1109/ITIKD56332.2023.10099710","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099710","url":null,"abstract":"Deaf and mute people rely on signing as a means of communication with others and with themselves. The value of sign language, which is the sole way for the deaf and mute communities to communicate, is often overlooked by regular people. Because of these limitations or impairments, these people are experiencing considerable setbacks in their life, including joblessness, serious depression, and a variety of other symptoms. Sign language interpreters are one of the communication services they use. However, paying these interpreters is prohibitively expensive, necessitating a low-cost solution to the problem. As a result, a system has been built that would interpret the Arabic Sign Language-based visual hand dataset into written information. The dataset used for this model Arabic Alphabets Sign Language dataset consists of 32 classes, each category has 506 images, resulting in a total of 506 * 32 = 16192 images. On the provided dataset, the tests have been run using a variety of pre-trained models. Most of them carried out their duties rather normally, and in the end, we constructed the Convolutional Neural Networks model with EfficientnetB1 scaling loaded with weights pre-trained on the ImageNet model, Based on this observation. Using a simple but highly effective compound coefficient, it equally scales all width/depth/resolution dimensions. Based on the model's results, we demonstrated the efficacy of this strategy. The percentage of accuracy that we obtained from this model is 99% accuracy and 97.9% validation accuracy","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129333166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Schemes for Leak Detection in IoT-enabled Water Transmission System 物联网输水系统泄漏检测的机器学习方案
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10100175
Fahed Ebisi, I. Nikolakakos, Jayakumar Vandavasi Karunamurthi, Ahmed Nasir Ahmed Binahmed Alnuaimi, Eisa Al Buraimi, Saeed Alblooshi
{"title":"Machine Learning Schemes for Leak Detection in IoT-enabled Water Transmission System","authors":"Fahed Ebisi, I. Nikolakakos, Jayakumar Vandavasi Karunamurthi, Ahmed Nasir Ahmed Binahmed Alnuaimi, Eisa Al Buraimi, Saeed Alblooshi","doi":"10.1109/ITIKD56332.2023.10100175","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10100175","url":null,"abstract":"Reducing Non-Revenue Water (NRW) losses in water transmission and distribution networks is a critical challenge for water utility companies. The combination of unobtrusive Internet of Things (IoT) monitoring devices and Artificial Intelligence (AI) technology is one of the most promising directions in water leak detection techniques for industrial scale infrastructure and smart cities. Currently, the complicated network topology and underground nature of transmission and distribution water pipelines pose serious limitations for the effective elimination of associated water leaks. In this paper, a realistically dimensioned IoT-enabled water transmission system provides the basis for a series of simulated leak experiments and the subsequent application of three different anomaly detection schemes. Having full control over the mechanical valve behind the simulated leaks, this test rig addresses the issue of accurate labelling in leak data and serves as testbed for the evaluation of each anomaly detection method and the comparison between them. The first anomaly detection method is the unsupervised multi-variate classification known as Isolation Forest (iForest). Second, the Support Vector Classification (SVC) approach is implemented representing supervised classification methods in the Support Vector Machine (SVM) family. Finally, a deep learning RNN-LSTM (Recurrent Neural Networks-Long Short-Term Memory) model is used in conjunction with a single threshold to signify anomalies due to high deviations between actual and forecasted values of key infield sensors. These models can detect water leaks and the results provide insights regarding both the effective applicability of sensors and Machine Learning (ML) algorithms in this context.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124762845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving The Security of E-Exam Systems 提高电子考试系统的安全性
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10100104
Fatema Alnasser, A. Elrashidi
{"title":"Improving The Security of E-Exam Systems","authors":"Fatema Alnasser, A. Elrashidi","doi":"10.1109/ITIKD56332.2023.10100104","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10100104","url":null,"abstract":"Though e-exams have their advantages like accuracy and speed reduced human intervention, there are some flaws as well. These flaws are security threats, the same way as traditional exams are exposed to them such as cheating or unauthorized access. Furthermore, e-exams are also exposed to threats like impersonation and tampering or accessing exam related data and information on servers. As a result, there is a need to establish a strong security framework within the e-exam system that universities adopt, such that smooth and timely conduction of exams can take place. The present study deals with such security threats of e-exam systems and provides a solution by proposing a new security framework, to deal with these threats. Based on the primary data, a security framework of e-exam system was proposed at university levels. This security model aimed to mitigate the threats determined during the survey, along with the strategies and system requirements suggested by the survey respondents. The proposed framework provides security at two levels. Firstly, at the university level using biometric authentication and user login authentication. The second level was the cloud level, where four security methods (encryption, anti-X, security system access and SQL injection) were added to secure the data in the cloud (application server side). Further it is suggested in the model to use Infrastructure as a service (IaaS) for cloud computing because of its various advantages and security options which have been discussed in the model.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Negative Impact of Social Media Advertisements on Branding in Digital Marketing 社交媒体广告对数字营销品牌的负面影响
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099505
Osasumwen Pamela Oriakhi, Aamir Amin, Sohail Safdar
{"title":"Negative Impact of Social Media Advertisements on Branding in Digital Marketing","authors":"Osasumwen Pamela Oriakhi, Aamir Amin, Sohail Safdar","doi":"10.1109/ITIKD56332.2023.10099505","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099505","url":null,"abstract":"Due to the thriving nature of social media platforms and their continuous evolution over the internet, social media has become a place where people buy, sell and advertise their products. This forms the basis of digital marketing that thrives the business community with revolutionary business gains. Social media advertisements may sometimes yield different outcomes and resonances since there are some essential fundamentals that people need to be aware of while marketing over it. Considering a proper approach regarding content and audience, the presentation of the advertisement is crucial to deliver the targeted message. This research analyzes the social media advertisement factors such as negative comments/opinions, fake news, and controversial brand posts that negatively impact brand image and purchase intention. The study is based on a questionnaire with participants comprised of 100 students currently enrolled at the University of Bristol. The research model and hypotheses formed for the study are tested with structural analysis. Results of the analysis concluded that negative comments/opinions and fake news have a positive impact on brand image, brand image has a positive impact on purchase intention, controversial brand image has a negative impact on brand image and purchase intention has a positive impact on brand image.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVID-19 Contact-Tracing Networks Datasets COVID-19接触者追踪网络数据集
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099670
Jenan Moosa, W. Awad, Tatiana Kalganova
{"title":"COVID-19 Contact-Tracing Networks Datasets","authors":"Jenan Moosa, W. Awad, Tatiana Kalganova","doi":"10.1109/ITIKD56332.2023.10099670","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099670","url":null,"abstract":"In this research paper, COVID-19 tracing data are utilized to form two dataset networks, one is based on the virus transition between the world countries, as the dataset consists of 36 countries and 75 relationships between them. Whereas the other dataset is an attributed network based on the virus transition among the contact tracing in the Kingdom of Bahrain. This type of networks that is concerned in tracking a disease or virus was not formed based on COVID-19 virus transmission.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fake News Detection: A Graph Mining Approach 假新闻检测:一种图挖掘方法
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099626
Hasan Hameed Hasan Ahmed Abdulla, Husain Hameed Abdulla
{"title":"Fake News Detection: A Graph Mining Approach","authors":"Hasan Hameed Hasan Ahmed Abdulla, Husain Hameed Abdulla","doi":"10.1109/ITIKD56332.2023.10099626","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099626","url":null,"abstract":"The proliferation of the internet and social media has dramatically expanded the reach of information, but it has also made it easier for false information to be disseminated. Automating the classification of misinformation and disinformation is a difficult task, as experts must consider multiple factors when determining the accuracy of an article. This study employs a graph mining technique to identify fake news stories. The linguistic features examined differentiate fake content from credible information. The proposed method was tested using a dataset from the real world, and our experiments demonstrate that it performs similarly to existing fake news detection algorithms on this dataset.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"691 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of the Data Warehouse on Decision Making Quality and Speed in Higher Education 数据仓库对高等教育决策质量和速度的影响
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099501
Amirah Bahaaudeen
{"title":"The Impact of the Data Warehouse on Decision Making Quality and Speed in Higher Education","authors":"Amirah Bahaaudeen","doi":"10.1109/ITIKD56332.2023.10099501","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099501","url":null,"abstract":"This paper studies the impact of implementing a data warehouse technology on decision making quality and speed in the context of higher education institutions. The model of this study uses the decision-making process phases of rational decision-making theory. The results of the survey among high level decision makers (deans, provosts, etc.) in USA higher education institutions revealed that the decision-making quality and speed are considerably improved by the presence of the data warehouse technology. This relationship is mediated by multiple mediators operating in serial, namely, system quality, information quality, intelligence phase quality, design phase quality and choice phase quality.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130913894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Based An Optimized Predictive Academic Performance Approach 基于深度学习的优化预测学习成绩方法
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099652
Abdulla A. Almahdi, B. Sharef
{"title":"Deep Learning Based An Optimized Predictive Academic Performance Approach","authors":"Abdulla A. Almahdi, B. Sharef","doi":"10.1109/ITIKD56332.2023.10099652","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099652","url":null,"abstract":"An early warning system is used to collect, process and analyze present data to predict possibilities that may occur in the future. This tool can be implemented in education to process relevant data to predict academic performance and threats. Several studies have been conducted in the past several decades on the use of early warning systems in education. Moreover, there are limited open datasets available in these areas of research. A remarkable dataset is the Open University Learning Analytics Dataset (OULAD). This paper proposes a deep learning-based predictive analytics model with an effective specificity score that helps predict student academic performance. Moreover, the paper analyzes the implementation timing of the model within the first two months of the academic semester. The model attains a higher success prediction accuracy rate within multicategories and a large input dataset. The best significant result achieved in the study was the 98.94 accuracy score and 93.10 specificity score in the first week of Science Technology Engineering Mathematics (STEM) domain courses of the academic term, compared to Artificial Neural Network, Naive Bayes and Support vector machine, which were applied as validators.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115557168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sterilization Robotic Approach in Hospitals: Case Study at King Hamad Hospital Bahrain 医院中的机器人绝育方法:巴林哈马德国王医院的案例研究
2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD) Pub Date : 2023-03-08 DOI: 10.1109/ITIKD56332.2023.10099561
A. Al-Mofleh, Leena Albalooshi, Osama Najam, Budoor AlMannaei, M. Alseddiqi
{"title":"Sterilization Robotic Approach in Hospitals: Case Study at King Hamad Hospital Bahrain","authors":"A. Al-Mofleh, Leena Albalooshi, Osama Najam, Budoor AlMannaei, M. Alseddiqi","doi":"10.1109/ITIKD56332.2023.10099561","DOIUrl":"https://doi.org/10.1109/ITIKD56332.2023.10099561","url":null,"abstract":"Environmental cleaning in healthcare settings is increasingly valued as a critical element of treatments to reduce the spread of viruses connected to the industry. Through unbiased monitoring and environmental hygiene improvement, this significance is recognized. After setting the parameters “surface distance” and “exposure time” for each area as given by the manufacturer, the robot moved autonomously and emitted UVD irradiation in the medical equipment workshop and in the operating theater at King Hamad University Hospital. All the swabs that were taken at the beginning without exposing that surface to UV lights show a dirty level of cleanliness. After 2 minutes of exposing the surface to UV, the dirty level decreased to an approximately similar ratio, then after 4 minutes of exposing the values decreased to more than 80%. The UVD Robot disinfection test results demonstrate that longer UVC exposure times applied at a constant distance or slower UVD robot operation speeds resulted in more efficient sterilization. UVD Robot shows high maneuverability in navigation to the goal positions autonomously with a high performance, avoiding obstacles.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123005186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信