2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)最新文献

筛选
英文 中文
On ici-Open Sets in Topological Spaces 论拓扑空间中的ici-开集
Beyda S. Abdullah, Barah M. Sulaiman, M. Al-Neima
{"title":"On ici-Open Sets in Topological Spaces","authors":"Beyda S. Abdullah, Barah M. Sulaiman, M. Al-Neima","doi":"10.1109/ICCITM53167.2021.9677817","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677817","url":null,"abstract":"A new concept in topological space called ici-open set is introduced, depended on the common adjective between i-open and int-open sets. Therefore, every ici-open set is i-open and int-open set. The ici-open sets inherits some properties from i-open and int-open sets, as every ici-open set is a semi-open set. The family of i-open sets forms a topological space if it generated from topology contains just three elements, the third element is set with one element but when contain more than one that is not true. This case has different behavior for the family of ici-open sets, which forms a topological space even if the mention set contains more than one element. In addition, some properties and theorems using ici-open sets have been proved.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of Intelligent Energy Management System based on Multi-Agent and Distributed IoT: DPU Case Study 基于多智能体和分布式物联网的智能能源管理系统设计与分析——以DPU为例
M. A. Sadeeq, Subhi R. M. Zeebaree
{"title":"Design and Analysis of Intelligent Energy Management System based on Multi-Agent and Distributed IoT: DPU Case Study","authors":"M. A. Sadeeq, Subhi R. M. Zeebaree","doi":"10.1109/ICCITM53167.2021.9677679","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677679","url":null,"abstract":"Population growth and the creation of new equipment are accompanied by a constant increase in energy use each day and have created significant consumer issues in energy management. Smart meters (SM) are simply instruments for measuring energy usage and are a significant resource of the evolving technological energy management system. Including precise billing data, information on usage at the user end, installation of two-way communication. SM is the critical component of an intelligent power grid. The Internet of Things (IoT) is a critical partner in the power business leading to intelligent resource management to ensure successful data collection and use. This paper proposes designing and analyzing intelligent energy management systems based on Multi-Agent (MA) and Distributed IoT (DIoT). An efficient approach is proposed to monitor and control power consumption levels of the proposed case study of Duhok Polytechnic University (DPU). DPU consists of Presidency, six colleges, and eight institutes. These fifteen campuses are distributed through a wide geographical area with long distances between each campus (i.e., more than 100 Km). A Node represents each campus, and Wi-Fi makes the connection inside each node. These nodes are connected via the Internet to the Main Control Unit (MCU) represented by Raspberry Pi connected to the cloud. Depending on the received data from the Nodes, the MCU will make the correct decision for each node using intelligent algorithms and the user's requirement. Then, control commands are initiated, and the node's appliances can be controlled automatically (or even manually) from the MCU.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130128469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face Identification Under Disguise and Makeup Based on Hybrid Deep Learning 基于混合深度学习的伪装化妆人脸识别
Farah Jawad Al-ghanim, A. M. Al-juboori
{"title":"Face Identification Under Disguise and Makeup Based on Hybrid Deep Learning","authors":"Farah Jawad Al-ghanim, A. M. Al-juboori","doi":"10.1109/ICCITM53167.2021.9677752","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677752","url":null,"abstract":"Facial recognition has been broadly used in advanced intelligent systems (i.e: smart video surveillance, intelligent access control system, and online payment). The performance of existing algorithms for automatic facial recognition is hampered by various covariates like pose variations, face aging, disguises, and makeup. Disguises and makeup are especially used to intentional or unintentional changes facial appearance to either hide one's personal identity or impersonate someone's different identity. While new algorithms continue to improve performance, most face recognition systems are liable to failure when disguised or makeup altered, which is one of the most challenging factors to overcome. With enormous capability and promising results, deep learning technology becomes attracted to the greatest attention to the research in a diversity of computer vision tasks. In order to overcome this problem, the database of disguised and makeup faces (DMFD) is used. In this paper, face features are extracted by Linear Discriminant Analysis (LDA). Facial recognition is done by using proposed hybrid-deep learning Classifier for more precise feature learning. Also, we compared the proposed method with two pre-trained models (AlexNet and VGG16). The Experimental results taking after implementation and testing showed the effectiveness of the proposed system provided better precision by (94%)","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126149876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation and Implementation of Malware Classification Using Random Forest Machine Learning Algorithm 基于随机森林机器学习算法的恶意软件分类评估与实现
Saifaldeen Alabadee, Karam Thanon
{"title":"Evaluation and Implementation of Malware Classification Using Random Forest Machine Learning Algorithm","authors":"Saifaldeen Alabadee, Karam Thanon","doi":"10.1109/ICCITM53167.2021.9677693","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677693","url":null,"abstract":"Malware classification is one of the most important issues in Information security, because of the huge new numbers of these malwares. Therefore, more classification methods have been proposed. Random forest (RF) is one of the extremely method in many studies or deferent feature extraction methods. It has been considered as one of the efficient methods of malware classification due to it is accurate results. In this paper, machine learning based RF classifier had been proposed to evaluate the performance of the Random Forest implementation. The RF classifier showed high performance as a detector. It has a good capability of classifying huge number of features with unimportant features. Both training and classifying accuracy have increased by reduction of the number of training feature in dataset. The RF classifier have achieved 95.3% of accuracy.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126952903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Assessment of HPA by Using Volterra Series and FIR Filter 利用Volterra系列和FIR滤波器改进HPA评价
Mohanned A.M. Al-Ja'afari, Firas Abedi, L. F. Al-Rammahi
{"title":"Improved Assessment of HPA by Using Volterra Series and FIR Filter","authors":"Mohanned A.M. Al-Ja'afari, Firas Abedi, L. F. Al-Rammahi","doi":"10.1109/ICCITM53167.2021.9677834","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677834","url":null,"abstract":"Nonlinearity and memory effects are huge challenges for traditional High-Power Amplifier (HPA), since they cause a noisy transmitted signal and accumulated error, which eventually reduce the efficiency of the HPA. This paper proposes a new approach to handle these challenges, we utilized a standard Volterra Filter to deals with the nonlinearity and memory effect, in addition, we included FIR filter to further improve the reduction of memory distortion. The simulation results of the proposed method overcome the other methods in terms of accuracy and accumulated error. These results suggest that our method is quite appropriate for traditional HPA for practical applications that suffer from such distortions.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115498827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Software Defined Network (SDN) Controllers to Enhance Communication between Two Vehicles in Vehicular AD HOC Network (VANET) 利用软件定义网络(SDN)控制器增强车载自组网(VANET)中两车之间的通信
Hiba Dhivaa Ali, A. Abdulqader
{"title":"Using Software Defined Network (SDN) Controllers to Enhance Communication between Two Vehicles in Vehicular AD HOC Network (VANET)","authors":"Hiba Dhivaa Ali, A. Abdulqader","doi":"10.1109/ICCITM53167.2021.9677720","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677720","url":null,"abstract":"Traditional Vehicular Ad-hoc Networks (VANETs) can efficiently be supplemented with the software-defined networking (SDN) paradigm which uses independent planes for data transmission and control. Integrating the SDN with the VANETs is a part of the development of intelligent VANETs. This integration technology has collected the attentions of researchers. In this paper, a new simulation model called the IoT-VANET is suggested with the SDN controller to enhance the communication between vehicles. This model uses the mininet-IoT simulator. For the purpose of comparison with previous work, a simulation model called the WiFi-VANET is built. It uses the mininet-WiFi software in two ways. Firstly, utilizing the Vehicle to Vehicle (V2V) communication performance evaluation based on the Road Side Units (RSU) and SDN controller. Three controllers of the Ryu (a Japanese word means flow), Python-based OpenFlow (POX) and centralized controller are exploited. Secondly, using the V2V communication performance evaluation based on the Global Positioning System (GPS). In terms of average delay and throughput, the performance evaluations of these two models show that the IoT-VANET is more efficient than the WiFi-VANET.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberwarfare Techniques: Status, Challenges and Future trends 网络战争技术:现状、挑战和未来趋势
Qusai AL-Durrah, S. Sadkhan
{"title":"Cyberwarfare Techniques: Status, Challenges and Future trends","authors":"Qusai AL-Durrah, S. Sadkhan","doi":"10.1109/ICCITM53167.2021.9677861","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677861","url":null,"abstract":"The area of cyber warfare is vast, with several subtopics attracting interest from researchers. We start with the obvious fundamental question that is: what is cyberwarfare? We compare definitions that already exist to see where there is agreement or disagreement. We notice that there is no commonly recognized definition and that the terms “cyberwar” and “cyberwarfare” are not properly distinguished. In order to address these challenges, we present a defining model to help describe both cyber warfare and cyber war. Following that, the paper identifies nine cyber warfare research challenges and reviews current research in each. Finally, we make recommendations for how future initiatives in the field might best advance the subject.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exact Recovery of Two-Latent Variable Stochastic Block Model with Side Information 带侧信息的双潜变量随机块模型的精确恢复
M. Shahiri, Mahdi Eskandari
{"title":"Exact Recovery of Two-Latent Variable Stochastic Block Model with Side Information","authors":"M. Shahiri, Mahdi Eskandari","doi":"10.1109/ICCITM53167.2021.9677645","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677645","url":null,"abstract":"The two-latent variable stochastic block model is a new graph synthetic model making a connection between the conventional stochastic block model and real-world networks. In this model, each node contains two latent variables such that at least one of these two latent variables is unknown. Still, this model lonely is not able to model a real-world network. Side information is another component that sometimes exists beside a real-world network. In this paper, we will investigate the asymptotic behavior of the two-latent variable stochastic block model in the presence of side information. Two different types of side information are considered in this paper: noisy labels and partially revealed labels side information. For each case, the necessary and sufficient conditions for the exact recovery of the desired latent variable are obtained via semidefinite programming optimization. It is shown that these conditions are tight and create a phase transition for the exact recovery.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130967578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use Crowdsourcing in Software Engineering for The Development of The Website 利用软件工程中的众包技术开发网站
Muataz Abd Al-Mohsen, A. S. Abbas
{"title":"Use Crowdsourcing in Software Engineering for The Development of The Website","authors":"Muataz Abd Al-Mohsen, A. S. Abbas","doi":"10.1109/ICCITM53167.2021.9677860","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677860","url":null,"abstract":"The significance of the study lies in the crowdsourcing tool that supports software engineering tasks externally by different, unidentified groups of people who send ideas and opinions over the Internet. Software engineering Crowdsourcing global online work scheduling software engineering tasks such as requirements extraction, requirements analysis, design, testing, and coding is the basic principle or idea of requirements engineering. The impact of software engineering crowdsourcing has increased in recent years due to the clear and visible impact that has touched and worked on multiple aspects of software engineering. In this study, a search was conducted to obtain crowdsourcing opinions about one of the important and commonly used Iraqi sites from different groups, ages, and specialties, in which about (151) people participated to express their opinion by answering (9) questions with the word yes or no, because the questions are of an answering style Easy, simple and fast, for the purpose of extracting the required and useful information for engineering requirements, which serves as the basis for project planning. These methods are used in the thesis concept for data mining using classification techniques to discover unknown categories of data. This includes decision trees, Logistic Regression, random forests Classifier, and k-nearest neighbor algorithm, with an evaluation of each method showing the best result using classification techniques that were the best result using the 98% decision trees and random forests Classifier technique while is more than adequate. Work on the same data set.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123032881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ECG data Compression by Discrete Wavelet Transform and Huffman Encoding 离散小波变换与霍夫曼编码的心电数据压缩
Rawaa K. Hamza, K. Rijab, Mohammed A. Hussien
{"title":"The ECG data Compression by Discrete Wavelet Transform and Huffman Encoding","authors":"Rawaa K. Hamza, K. Rijab, Mohammed A. Hussien","doi":"10.1109/ICCITM53167.2021.9677704","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677704","url":null,"abstract":"The Electrocardiogram (ECG) data has been used to diagnose and analyze heart issues. For that The ECG data compression is one of the most important studies in biomedical engineering. The ECG signal compression benefits storage data, data transmission rate decrease, and communication bandwidth reduction. The proposed work deal with the ECG signal compression method of ECG signals using Discrete Wavelet Transform (DWT). The DWT compressed the signal energy in a smaller change in data and has perfect localization assets in frequency & time. The DWT threshold has been selected to perform for the DWT coefficients depending on the signal's Energy Packing Efficiency (EPE). The Huffman encoder has been used to encoding the selected DWT coefficient. The results of the proposed method show better performance with higher compression ratios and good quality reconstructed signals. For Example the Compression ratio (CR) =16.33, 10.57,and 7.75 with percent root mean square difference (PRD)=1.5%, 1.3%, and 1.02% for using different DWT(Harr transform, Bior1.1, and Db2), respectively.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125596982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信