2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)最新文献

筛选
英文 中文
A HES for Low Speed Processors A HES表示低速处理器
C. Chibaya, Viola Jubile Jowa, Taurayi Rupere
{"title":"A HES for Low Speed Processors","authors":"C. Chibaya, Viola Jubile Jowa, Taurayi Rupere","doi":"10.1109/IMITEC50163.2020.9334131","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334131","url":null,"abstract":"Adaptation of e-commerce in third world countries requires more secure computing facilities. Online data is vulnerable and susceptible to active attacks. Hundreds of security mechanisms and services have been proposed to curb this challenge. However, available security mechanisms, sufficiently strong, are heavy for the machines used. To secure online data where machines' processing power and memory are deficient, a Hybrid Encryption Standard (HES) is proposed. The HES is built on the Data Encryption Standard (DES) algorithm and its siblings. The component units of the DES are redesigned towards reduced demands for processing power and memory. Precisely, white box designs of IP tables, PC tables, Expansion tables, Rotation tables, S-boxes and P-boxes are proposed, all aimed at reducing the processing time and memory demands. Evaluation of the performance of the HES algorithm against the performance of the traditional DES algorithm reveal that the HES out-performs the DES with regards to speed, memory demands, and general acceptance by novice practitioners in the cryptography field. In addition, reproducibility and flexibility are attractive features of the HES over the DES.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ear Recognition based on Local Texture Descriptors 基于局部纹理描述符的人耳识别
Kershen Sivanarain, Serestina Viriri
{"title":"Ear Recognition based on Local Texture Descriptors","authors":"Kershen Sivanarain, Serestina Viriri","doi":"10.1109/IMITEC50163.2020.9334147","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334147","url":null,"abstract":"Automated personal identification using unique characteristics of the human ear is emerging as an appealing modality in forensic and biometric domains. This study investigates the use of local texture descriptors for ear recognition, and the effects of the fusions of these descriptors. The study presents an investigation of Local Binary Patterns (LBP) and provides extensions of various local descriptors, namely Local Ternary Patterns (LTP), Local Directional Pattern (LDP) and Directional Ternary Patterns (DTP) to ear recognition. A novel approach is proposed for the fusion of these descriptors, referred to as Fusions of Local Descriptors (FLD). Experiments were performed on the publicly available IIT Delhi databases (IITD-l and IITD-2), consisting of several subjects under varying conditions. The experiments show exceptional results, highly competitive with and in some cases beyond the state-of-the-art. Best recognition rates yielded from the FLD fusing DTP and multi-resolution LBP. This study achieved a recognition rate of 95.88% and 97.44% on IITD-l and IITD-2 respectively.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132898174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real Time Customer Churn Scoring Model for the Telecommunications Industry 电信行业的实时客户流失评分模型
Nyashadzashe Tamuka, K. Sibanda
{"title":"Real Time Customer Churn Scoring Model for the Telecommunications Industry","authors":"Nyashadzashe Tamuka, K. Sibanda","doi":"10.1109/IMITEC50163.2020.9334129","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334129","url":null,"abstract":"There are two types of customers in the telecommunication industry; the pre-paid and the contract customers. In South Africa it is the pre-paid customers that keep telcos constantly worried because such customers do not have anything binding them to the company, they can leave and join a competitor at any time. To retain such customers, telcos need to customise suitable solutions especially for those customers that are agitating and can churn at any time. This needs customer churn prediction models that would take advantage of big data analytics and provide the telco industry with a real time solution. The purpose of this study was to develop a real time customer churn prediction model. The study used the CRISP-DM methodology and the three machine learning algorithms for implementation. Watson Studio software was used for the model prototype deployment. The study used the confusion matrix to unpack a number of performance measures. The results showed that all the models had some degree of misclassification, however the misclassification rate of the Logistic Regression was very minimal (2.2%) as differentiated from the Random Forest and the Decision Tree, which had misclassification rates of 20.8% and 21.7% respectively. The results further showed that both Random Forest and the Decision Tree had good accuracy rates of 78.3% and 79.2% respectively, although they were still not better than that of the Logistic Regression. Despite the two having good accuracy rates, they had the highest rates of misclassification of class events. The conclusion we drew from this was that, accuracy is not a dependable measure for determining model performance.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123785719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Plant Species Recognition using Local Binary and Local Directional Patterns 基于局部二值和局部方向模式的植物物种识别
Divyan Hirasen, Serestina Viriri
{"title":"Plant Species Recognition using Local Binary and Local Directional Patterns","authors":"Divyan Hirasen, Serestina Viriri","doi":"10.1109/IMITEC50163.2020.9334091","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334091","url":null,"abstract":"Automatic plant species recognition is an intriguing and challenging problem which has vital applications in important real-world areas such as determining plant health, identifying new species and conserving biodiversity. Therefore, deriving an effective plant species representation from images is vital for successful species recognition. In this article the robustness of computer vision texture-based recognition techniques, such as Local Binary and Local Directional Pattern implementations, are evaluated for capturing discriminant textural features of leaf images. Furthermore, classification is done using both K-Nearest Neighbour and Support Vector Machine classifiers on the Swedish and Flavia leaf datasets. The results show that both these local patterns are successful at encoding dominant textural characteristics of leaf images to uniquely identify different plant species. The highest result obtained with the proposed methodology on the Flavia and Swedish leaf datasets are 96.94 % and 98.22 % identification accuracy respectively.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127180303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Users' perspective on the assessment of Botswana Fibre Backbone Network Infrastructure 用户对博茨瓦纳光纤骨干网基础设施评估的看法
Malebogo Mokeresete, B. M. Esiefarienrhe
{"title":"Users' perspective on the assessment of Botswana Fibre Backbone Network Infrastructure","authors":"Malebogo Mokeresete, B. M. Esiefarienrhe","doi":"10.1109/IMITEC50163.2020.9334128","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334128","url":null,"abstract":"Botswana Fibre Backbone Network Infrastructure has come under heavy criticism from users due to the inability to deliver on the promises to provide seamless communications to citizens. Over the years, the cost of data and voice services has skyrocketed, and the quality of service has dropped significantly. The general public perceives fibre backbone as a complete waste of government funds and an example of a mismanaged project. Is this a fair assessment of the multimillion Pula project? –The survey research methodology consisted of both quantitative and descriptive methods used. The study collected data from 11 geo-locations made up of cities, towns and villages along the fibre backbone path and online users, all 1202 randomly selected respondents. The data were preprocessed and used for analysis. Simple frequency and percentages used to analyse the data. The results indicate that majority of the people do not benefit from the backbone infrastructure and use of broadband communications in any economically profiting or beneficial ways/means in Botswana. A large number of people experiences a high price/rate on broadband data and voice services with an inferior quality of service. There was a strong suggestion of a review of the national broadband strategy so that it looks into regulation, learning and training with adequate curriculum, ways to manage public funds, corruption and ways to improve the relationship between government and the private sector.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emotional Speaker Recognition based on Machine and Deep Learning 基于机器和深度学习的情感说话人识别
T. Sefara, T. Mokgonyane
{"title":"Emotional Speaker Recognition based on Machine and Deep Learning","authors":"T. Sefara, T. Mokgonyane","doi":"10.1109/IMITEC50163.2020.9334138","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334138","url":null,"abstract":"Speaker recognition is a method which recognise a speaker from characteristics of a voice. Speaker recognition technologies have been widely used in many domains. Most speaker recognition systems have been trained on normal clean recordings, however the performance of these speaker recognition systems tends to degrade when recognising speech which has emotions. This paper presents an emotional speaker recognition system trained using machine and deep learning algorithms using time, frequency and spectral features on emotional speech database acquired from the Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS). We trained and compared the performance of five machine learning models (Logistic Regression, Support Vector Machine, Random Forest, XGBoost, and k-Nearest Neighbor), and three deep learning models (Long Short-Term Memory network, Multilayer Perceptron, and Convolutional Neural Network). After the evaluation of the models, the deep neural networks showed good performance compared to machine learning models by attaining the highest accuracy of 92% outperforming the state-of-the-art models in emotional speaker detection from speech signals.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application of Machine Learning Techniques In Forecasting Groundwater Levels in the Grootfontein Aquifer 机器学习技术在Grootfontein含水层地下水位预测中的应用
Yolanda Kanyama, Ritesh Ajoodha, H. Seyler, Ndivhuwo Makondo, H. Tutu
{"title":"Application of Machine Learning Techniques In Forecasting Groundwater Levels in the Grootfontein Aquifer","authors":"Yolanda Kanyama, Ritesh Ajoodha, H. Seyler, Ndivhuwo Makondo, H. Tutu","doi":"10.1109/IMITEC50163.2020.9334142","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334142","url":null,"abstract":"In this paper, we attempt to provide a data driven solution to model groundwater levels in the Grootfontein Aquifer in the North West Province of South Africa by testing several predictive models. Groundwater plays a crucial role in supplying water to a significant part of the population for agricultural, industrial, environmental and/or domestic use. Recent advancements in data analytics, and the analysis of large data sets has allowed the production of powerful predictive models. Five different data driven techniques namely, support vector regression, gradient boosting trees, decision trees, random forest regression and multilayer feed-forward neural network techniques were applied to predict groundwater levels. Modelling was carried out for four boreholes located in the Grootfontein dolomite aquifer considering discharge, rainfall and temperature as model inputs. Five site specific models were developed for each borehole. Model performance was evaluated using coefficient of determination and root mean squared error. Comparison of goodness of fit revealed that data driven methods can indeed capture the trend of water level fluctuations in the aquifer sufficiently with the GB algorithm performing better than other algorithms in both the training and verification stages. Whilst the models performed adequately when predicting groundwater level on a monthly basis for 36 months, further investigation is needed towards determining their efficacy in longer term projections to assist in the decision making process of sustainable groundwater use. This paper provides the following contributions: (a) a ranking of the attributes according to their mutual information (MI); (b) a reference for model selection; and (c) a predictive model to forecast groundwater levels in the Grootfontein aquifer.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Survey of LoRaWAN Adaptive Data Rate Algorithms for Possible Optimization LoRaWAN自适应数据速率算法研究综述
Charles Lehong, Bassey Isong, Francis Lugayizi, A. Abu-Mahfouz
{"title":"A Survey of LoRaWAN Adaptive Data Rate Algorithms for Possible Optimization","authors":"Charles Lehong, Bassey Isong, Francis Lugayizi, A. Abu-Mahfouz","doi":"10.1109/IMITEC50163.2020.9334144","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334144","url":null,"abstract":"The Adaptive Data Rate (ADR) is used in LoRa WAnto ensure optimized data rates and transmission powers for static end devices. However, its implementation is still new, and therefore, its functionalities are limited. Multiple proposals have been made to help improve the ADR but an optimum solution is yet to be found. Therefore, this paper surveyed nine most relevant papers with the goal of identifying the ADR challenges and critically analyzing the solutions put forward to solve them. The critique of the solutions was based on the problems they solve, how they solve them, and the improvements they achieved. Findings show that the poorly designed ADR algorithm results in increased collisions and unfairness in collision probabilities amongst network traffic in LoRaWAN. Furthermore, the findings show that the studies surveyed had limitations in terms of the data rates investigated, the transmission parameters considered, and the region in which they were conducted. To help mitigate some of these challenges, few suggestions are presented in this paper.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121691019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Generation of Invertible High Order Matrix Keys for the Hill Cipher Hill密码中可逆高阶矩阵密钥的生成
Rotondwa Munzhelele, C. Chibaya
{"title":"Generation of Invertible High Order Matrix Keys for the Hill Cipher","authors":"Rotondwa Munzhelele, C. Chibaya","doi":"10.1109/IMITEC50163.2020.9334140","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334140","url":null,"abstract":"Developers are often limited to the use of low order matrix keys when the Hill cipher is embraced. This is due to the complexity of determining matrix inverses when high order matrices are involved. Matrix inverses are required during decryption. This paper proposes an approach for generating invertible high order matrix keys for the Hill cipher. The Hill cipher uses a matrix key of order n x n for encryption, and its inverse is required for decryption. Increasing the order of the matrices used as keys in the Hill cipher undoubtedly strengthen the Hill encryption algorithm. When we increase the order of the matrices, the Hill cipher is more complex to decode as it would be hard to find the inverse matrices, hence hard to break. The proposed approach generates invertible high order matrix keys sequentially within a chosen order. However, the choice of an order is flexible. The actual key to be used is dynamically selected from a pool of candidate matrix keys. Our system for generating high order matrix keys was repeatedly run for several times, generating invertible high order matrices that are successfully pooled. The system also successfully randomly selected one matrix key from the pool. This approach eliminates repeated use of the same matrix key over and over. It strengthens the Hill cipher algorithm by complicating obvious brute force attacks. The algorithm's performances are anticipated to outclass those of the original Hill model.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124793118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effects of Runtime Generated S-Boxes to the DES Model 运行时生成的s框对DES模型的影响
Nyaradzo Alice Tsedura, C. Chibaya
{"title":"Effects of Runtime Generated S-Boxes to the DES Model","authors":"Nyaradzo Alice Tsedura, C. Chibaya","doi":"10.1109/IMITEC50163.2020.9334146","DOIUrl":"https://doi.org/10.1109/IMITEC50163.2020.9334146","url":null,"abstract":"The Data Encryption Standard (DES) is a cryptographic algorithm designed using various static tables. Among these static tables are substitution boxes, generally called S-Boxes. S-Boxes are viewed as an important aspect in block ciphers because cryptographically strong S-Boxes imply stronger security. This paper investigates the effects of introducing dynamic S-Boxes in the DES cipher which are generated at run time without following any specific order. These S-Boxes would alter the entries of the original S-Boxes, and would be used in any dynamic sequence. We present a method of populating S-Boxes based on the concept of logistic maps in chaos theory. That way, great qualities of dynamism are attained. Additionally, we exploit in-built functions in Java to randomize number generation before encryption and decryption. It will also be labeled in order to prevent it from being picked again. We tested and analyzed the performance of the new algorithm against the benchmark original DES. We tested and analyzed the performance of the new algorithm against the benchmark original DES. The results yielded were categorized into four, namely; CPU usage, memory usage, number of classes, and number of threads. Generally, the new DES out-performed the old DES. Initially we present the background and statement of the problem, then our findings from literature followed by our proposed methodology and finally the results and analysis which showed encryption and decryption will still be successful despite having dynamic S-Boxes instead of the static ones. Our work makes a computational contribution to the DES design, introducing dynamic runtime generated S-Boxes whose sequence and entries are also dynamic.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124994203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信