{"title":"A Transfer Learning Based Intrusion Detection System for Internet of Vehicles","authors":"Achref Haddaji, S. Ayed, L. Chaari","doi":"10.1109/DeSE58274.2023.10099623","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099623","url":null,"abstract":"With the fast expansion of the internet of vehicles (IoV) and the emergence of new types of threats, the traditional machine learning-based intrusion detection systems must be updated to meet the security requirements of the current environment. Recently, deep learning has shown exceptional performance in IoV intrusion detection. However, deep learning-based intrusion detection system (DL-IDS) models are more fixated and dependent on the training dataset. In addition, the behavior changes with the occurrence of attacks. They pose a real problem for the DL-IDS and make their detection more complicate. In this paper, we present a deep transfer learning based intrusion detection in-vehicle (TRLID) model for IoV using the CAN bus protocol. In our proposed model, a data preparation approach is proposed to clean up bus data and convert it to an image for usage as input to the deep learning model. Indeed, we used transfer learning characteristics because they enable us to transfer the source task's knowledge to the target task. Therefore, we trained our model using different dataset including different attacks. The experimental results show that our proposed TRLID achieved good results where the intelligence integration of transfer learning was efficient for attacks detection.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transformer Based Approach for Depression Detection","authors":"Anagha Anil Khaparde, Rik Das, Rupal Bhargava","doi":"10.1109/DeSE58274.2023.10099629","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099629","url":null,"abstract":"Mental health of a person plays equivalent significant role in ensuring their wellbeing as their physical health. A great deal of work and e ffort has gone into increasing awareness of this issue. One su ch effort is made by the discipline of computer science, whic h makes use of social media data to give more information in identifying these mental illnesses. People are increasingly usi ng internet platforms to voice our suicide ideas as technology advances quickly. The purpose of the study is to identify a person's indicators of depression based on their social media postings, where users express their feelings and emotions. The goal of this study is to develop three models-Naive Bayes, Pre-Trained Model BERT, and XLNET-and compare their performance in identifying depression from messages on Twitter. These models are pre-processed using the Tweet preprocessor and BERT embeddings, and then the pretrained models are fine-tuned. With an accuracy of 0.9942, it was found that Bert performed better than the other two models.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123506863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Sensor Placement Strategy for Structural Health Monitoring with Application of the Aqueduct El Hnaya of Carthage","authors":"Wael Doghri, A. Saddoud, L. Chaari","doi":"10.1109/DeSE58274.2023.10100124","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100124","url":null,"abstract":"The concept of structural health monitoring (SHM), which ensures maintenance and conservation of the built environment, is progressively growing in importance. SHM offers the building's historical and cultural value in addition to its safety. Nowadays days, Wireless Sensor Networks (WSN) are frequently employed for SHM and offer a strong contender to address a number of problems, including sensor location. A sensor placement approach is therefore needed considering fragility and significance of the historic structures. In this paper, we propose sensors placement methods applied on the historical monument Aqueduct of Carthage of Tunisia. Our method is based on the Finite Element Modeling (FEM) to carry out the mesh model of the structure arches and to identify two types of the arch zones; stressed and unstressed zones. Based on FEM results, we determine the optimal sensor positions to maximize the covered surface, given a limited number of sensor.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124292235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dezvent - Digitalizing Attendance System with 2FA and Face Recognition Implementation","authors":"Zoe Lim Mei Yi, Julia Juremi","doi":"10.1109/DeSE58274.2023.10100308","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100308","url":null,"abstract":"The traditional way of taking attendance has been said to be inefficient and had to take a longer time to mark every attendee's presence. With that in mind, the research aims to eliminate the issue brought by the manual attendance system by developing a web-based attendance system that can record attendance in a faster and more effective way with the implementation of a face recognition system. The attendance will be taken with just one scan of the face of the attendees, ensuring their presence at the event. Not only that but also with the implementation of two-factor authentication (2FA) to develop a secure web-based system, as well as to protect users against cyber-attack. This system not only solved the problems brought by the current attendance system but also protects the environment by eliminating the need of using paper to record attendance.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sign Language Recognition using Deep Learning","authors":"M. Mahyoub, F. Natalia, S. Sudirman, J. Mustafina","doi":"10.1109/DeSE58274.2023.10100055","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100055","url":null,"abstract":"Sign Language Recognition is a form of action recognition problem. The purpose of such a system is to automatically translate sign words from one language to another. While much work has been done in the SLR domain, it is a broad area of study and numerous areas still need research attention. The work that we present in this paper aims to investigate the suitability of deep learning approaches in recognizing and classifying words from video frames in different sign languages. We consider three sign languages, namely Indian Sign Language, American Sign Language, and Turkish Sign Language. Our methodology employs five different deep learning models with increasing complexities. They are a shallow four-layer Convolutional Neural Network, a basic VGG16 model, a VGG16 model with Attention Mechanism, a VGG16 model with Transformer Encoder and Gated Recurrent Units-based Decoder, and an Inflated 3D model with the same. We trained and tested the models to recognize and classify words from videos in three different sign language datasets. From our experiment, we found that the performance of the models relates quite closely to the model's complexity with the Inflated 3D model performing the best. Furthermore, we also found that all models find it more difficult to recognize words in the American Sign Language dataset than the others.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Approach for Resilience and Reliability Against Cascading Failure","authors":"D. M. Vistro, A. Rehman, Zufishan Hameed","doi":"10.1109/DeSE58274.2023.10100283","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100283","url":null,"abstract":"Cloud computing becoming popular now day as, the world is moving towards vitalization and it provide resource to the users depending on their needs by using different resource allocation technique. Resilience and reliability is one of the major issue while dealing with cloud computing. Mitigation failure and migration failure are the issues in cloud resilience and reliability services which cause many service level objective violation. Many work have been done to improve the quality of resilience and reliability. The aim of this paper is to provide a better technique to avoid and recover from mitigation failure and a reliable resource allocation approach at minimum possible cost, for this purpose we used Cascading Failure Resilience System (CSFR) technique. Comparative analyses done to validate our approach and the results shows that our approach handle mitigation failure in an efficient way as well as it provide reliability while providing resources to the users at a comparative low cost.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad A. Abdul Majeed, Omar Munthir Al Okashi, Azmi Tawfeq Alrawi
{"title":"Intracranial hemorrhage detection and classification from CT images based on multiple features and machine learning approaches","authors":"Mohammad A. Abdul Majeed, Omar Munthir Al Okashi, Azmi Tawfeq Alrawi","doi":"10.1109/DeSE58274.2023.10099988","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099988","url":null,"abstract":"The regulating organ of the body is the brain. Early diagnosis of brain disorders can have a significant impact on efforts to treat them. A brain hemorrhage is a form of stroke caused by a bursting artery in the brain, resulting in bleeding in the surrounding tissues. Through a brain Computed Tomography (CT) scan, brain hemorrhage can be identified. CT is the most extensively used diagnostic imaging technology for identifying brain illnesses due to its speed, low cost, and wide variety of uses. During a CT scan, a small X-ray beam revolves around the body to capture a sequence of images from different angles. The computer then produces a cross-sectional representation of the body. Intracranial hemorrhage (ICH) is a medical condition that requires prompt identification and treatment. Since ICH early detection and therapy can improve health outcomes, there is a need for a triage system that can immediately identify and speed up the treatment process. In this paper, we will use standard machine learning (Support Vector Machine, Random Forest and Decision Tree) methodologies to present a method for automatically detecting the ICH in a two-dimensional reduced form of a CT scan of the brain. Four main steps make up the method. First, a preprocessing pipeline that can successfully remove the bone from the skull is put into place. The following step is applying a feature extraction method. Then, a suitable feature-selection (PCA) model is proposed, which will enhance the model's performance by minimizing any redundancy produced by the selected feature extraction. The data set from the CT scans is classified into normal and abnormal in the last stage, which involves training and testing a machine learning model. The accuracy for our proposed model using Random Forest (RF), is 92.5%. RF achieves higher performance than other used ML methods.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115639621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. A. Mashhadany, A. Alrawi, Zeyid T. Ibraheem, Sameer Algburi
{"title":"Implement of Intelligent Controller for 6DOF Robot Based on a Virtual Reality Model","authors":"Y. A. Mashhadany, A. Alrawi, Zeyid T. Ibraheem, Sameer Algburi","doi":"10.1109/DeSE58274.2023.10099597","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099597","url":null,"abstract":"Every designer aspires to produce designs that are superior to those of their rivals in terms of quality, speed, or efficiency. Using an ANFIS (Adaptive Neural Inference System) controller and a proportional, integrated, derived (2DO-PID) 2-degree of freedom controller, this study suggests a high-performance design for a 6-DOF manipulator. Finding the best value for the controller settings that smoothly regulate the robot's movements to the desired aim is the primary objective of this exercise. The first step in the design process is to naturally determine the best values for the parameters of a traditional PID controller. The creation of a high-resolution 2DOF-PID controller is the next phase. It performs better than the conventional correct order using a mysterious physics control technique. The parameters of the 2DOF-PID controller are estimated based on the undeniably significant nature of the control effect. The final stage in achieving the high performance of the control system under consideration is the hybrid 2DOF-PID and ANFIS controller, which uses the prior output as a predictive point. The use of both modern and vintage consoles. Six-degree-of-freedom elbow curves are supported. Because the manipulator's trajectory exceeded the settling time and affected the movement, it was possible to minimize. MATLAB 2021b and Robotics Toolbox 9 were used to design and simulate the entire remote-control system. The controller's optimal design is built using a 3-dimensional model of a 6-DOF manipulator created with MATLAB/virtual Simulink's reality (VR) technology. MATLAB generates the manipulator instructions, which are then used to generate a real trajectory with a virtual reality model.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faiz Maruf Al Kautsaf, Mohammad Namazee Bin Mohd Nizam, Khalida Shajaratuddur Harun
{"title":"A System Implementation: Point-of-Sales (POS) System Integrated with Business Intelligence (BI) Capability Focused on SME in Indonesia","authors":"Faiz Maruf Al Kautsaf, Mohammad Namazee Bin Mohd Nizam, Khalida Shajaratuddur Harun","doi":"10.1109/DeSE58274.2023.10099802","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099802","url":null,"abstract":"This paper is about a project to implement a model of point-of-sale (POS) system equipped with Business Intelligence (BI) capabilities that suits the nature of business organisations in the scope of Small and Medium Enterprise (SME) in Indonesia). The project was developed based on proposed framework integrating Point-Of-Sales System, Databases, Visualization Tools namely Microsoft Power BI and its other relevant libraries. Overtime, SMEs in Indonesia have generated large volumes of data from their business operations. The SMEs need to be able to efficiently manage and analyze large volumes of data to provide better business decision making. Effective decision making shall help SMEs achieve competitive advantage. This is where Business Intelligence (BI) comes to light to provide insightful information to facilitate the business decision making process.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"66 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122835543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of authentic and counterfeit Viagra tablets using near-infrared spectroscopic methods and machine learning algorithms","authors":"Sarah Rowlands, D. Al-Jumeily, S. Assi","doi":"10.1109/DeSE58274.2023.10100015","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100015","url":null,"abstract":"Counterfeit medicinal and lifestyles products are a global issue that impacts public health. Counterfeit products are often made in unsafe and unsanitary conditions before their release to the public without testing by regulatory bodies. One product that is particularly susceptible to online counterfeiting is Viagra, which is one of the highest selling medicines worldwide. A total of 57 Viagra tablets were used for the study; this included 27 authentic and 30 counterfeit tablets which were measured using near-infrared spectroscopy (NIRS). Spectra obtained using the NIR spectrometer non-destructively were exported into a multi-paradigm numerical computing environment where machine learning algorithms (MLAs) were applied using Matlab 2007a. Four algorithms were used related to correlation in wavelength space (CWS), K-nearest neighbour (KNN), principal component analysis (PCA) and PCA combined with fuzzy C-mean clustering (PCA-FCM). The algorithms were applied unsupervised to the authentic and counterfeit tables with no prior labelling to any of the tablets. The results showed two clear groups/clusters between the authentic and counterfeit tablets. In particular, PCA and PCA-FCM showed further subgroups among the counterfeit tablets that corresponded to their varying manufacturing sources. In summary, the use of NIRS and MLAs proved an effective method for identifying counterfeit Viagra medicines rapidly and non-destructively.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127394632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}