2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)最新文献

筛选
英文 中文
Numerical Solution of Initial Value Problems of Time-Fractional Order via a Novel Fractional 4-Stage Runge-Kutta Method 用一种新的分数阶四阶龙格-库塔法数值解时间-分数阶初值问题
A. Al-Shimmary
{"title":"Numerical Solution of Initial Value Problems of Time-Fractional Order via a Novel Fractional 4-Stage Runge-Kutta Method","authors":"A. Al-Shimmary","doi":"10.1109/ICCITM53167.2021.9677713","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677713","url":null,"abstract":"In this article, we present a derivation of a novel 4-stage fractional Runge-Kutta method (4sFRKM). Then we apply it to solve time-fractional initial values problems. This method is useful because it provides us with good numerical solutions. When compared with the exact solution, the stability of the proposed method is examined and the corresponding region of stability is depicted. Moreover, the efficiency and accuracy of the prospected method were achieved through illustrative numerical examples, and the results are supported by tables and figures. All the calculations were done using MATLAB.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit Card Fraud Detection in Financial Transactions Using Data Mining Techniques 利用数据挖掘技术检测金融交易中的信用卡欺诈
R. H. Alwan, Murtadha M. Hamad, O. Dawood
{"title":"Credit Card Fraud Detection in Financial Transactions Using Data Mining Techniques","authors":"R. H. Alwan, Murtadha M. Hamad, O. Dawood","doi":"10.1109/ICCITM53167.2021.9677867","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677867","url":null,"abstract":"Every year, fraudulent credit card transactions result in the loss of billions of dollars. The development of effective fraud detection algorithms is critical for lowering this loss, and more algorithms are turning to advanced data mining approaches to help in fraud detection. Due to the unstable distribution of the data, the design of fraud detection algorithms is very difficult, and the distribution of the categories is highly unbalanced, yet there are many transactions that are categorized by fraud detection system. This paper proposes a system for detection fraud in financial transactions by using some types of data mining models which are logistic regression, random forest, naïve bayes and support vector machine. This is done through suggested basic steps: the first step is to use European cardholder dataset which contains 284.807 transactions that split into two groups. First one contains 199.3649 transactions which is used for training the models, while 85.4421 transactions remained for testing the models. This dataset is highly imbalanced, therefore by using SMOTE technique it will transform to a balanced one. The Second step is preparing the data and apply the Correlation function on training dataset, then implementing the used models on it. The results are compared by evaluation metrics to show which model is the best for detecting fraud. From these results, it is concluded that the Random Forest classifier is the best for fraud detection, which achieved accuracy with 99.15% in testing data.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122307823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating the Rate of Occurrence of Geometric Process With Exponential Distribution 指数分布几何过程发生率的估计
Noor Hani Idrees, M. Sulaiman
{"title":"Estimating the Rate of Occurrence of Geometric Process With Exponential Distribution","authors":"Noor Hani Idrees, M. Sulaiman","doi":"10.1109/ICCITM53167.2021.9677786","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677786","url":null,"abstract":"Geometric process (GP) is an important alternative to the Non homogeneous Poisson process (NHPP), in which arrival time is modeled with the trend, in this paper, we consider the problem of parameter estimation for geometric process, when the first arrival is distributed as an Exponential distribution (EXP). Parametric estimation methods including Maximum likelihood (ML), nonparametric estimation method including modified moments (MM), and a semi-parametric estimation method including modified least squares (MLS) chat were used in this paper, to achieve the goal of the paper, the model will be simulated and applied to one the important aspects of life, which is stopping of the gas power plant in Mosul.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116955560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning Model For IDS In the Internet of Things 物联网IDS的深度学习模型
M. Mohammed, K. Alheeti
{"title":"Deep Learning Model For IDS In the Internet of Things","authors":"M. Mohammed, K. Alheeti","doi":"10.1109/ICCITM53167.2021.9677571","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677571","url":null,"abstract":"Emerging technology makes one's life more comfortable; however, in the Internet of Things, there are a lot of weaknesses like infrastructure, connectivity, network, etc, due to the presence of millions of networked devices that make it difficult to implement safety on each device. Security threats are one of the most important issues recently gaining popularity in IoT, attacks that can cause major disruptions and loss of information within the IoT network. Intrusion Detection System (IDS) has a substantial role in protecting and securing an IoT network through detecting and preventing malicious activities. To develop IDS for timely detection and categorization of cyber threats at the network level, classical machine learning techniques are commonly utilized. However, because malicious attacks are continuously evolving and occurring at extremely large sizes, various problems arise, necessitating a scalable solution. In this paper, a convolutional neural network (CNN) approach, which is a kind of deep learning model for IDS discovery, is developed that is flexible and efficient for detecting and classifying cyber-attacks in IoT networks. The well-applied CNN model on the UNSW-NB15 dataset obtained 100% precision results.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129373050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Big Data, IoT and Cloud Computing 大数据、物联网、云计算融合
Dhuha Albazaz
{"title":"Integration of Big Data, IoT and Cloud Computing","authors":"Dhuha Albazaz","doi":"10.1109/iccitm53167.2021.9677813","DOIUrl":"https://doi.org/10.1109/iccitm53167.2021.9677813","url":null,"abstract":"","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114287052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Routing for Internet of Things: A Survey on Techniques and Protocols 物联网实时路由:技术与协议综述
D. Abdullah, Mohammed Tariq Salih
{"title":"Real-Time Routing for Internet of Things: A Survey on Techniques and Protocols","authors":"D. Abdullah, Mohammed Tariq Salih","doi":"10.1109/ICCITM53167.2021.9677821","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677821","url":null,"abstract":"The Internet of Things (IoT) is a wireless network consisting of interconnected objects. Lately, IoT has become the inevitable future for most if not all technologies related to human life. In IoT, various heterogeneous devices are connected in a Wireless Sensor Network. For that energy-efficient routing, optimization plays a very important aspect for network performance in IoT. The technique and devices in IoT require routing protocols that fit in an environment like low power and lossy networks (LLNs), which rise great routing challenges. Most of the applications of the IoT are real-time applications with time constraints that work on sensing the environment, processing the data, and sending back the results sufficiently quickly to affect the environment before a deadline. Unfortunately, in many emergency cases, like in the case of large data traffic, which leads to network congestion and also causes delay and packet loss. That is why there is a vital need to analyze the routing protocols for IoT under real-time constraints. The purpose of this paper is to provide insight into the various state of the art work of the worldwide researchers about routing protocols for the Internet of Things (IoT) under real-time environment, and we explain extensively used routing protocols in real-time IoT, by first state the routing challenges in a real-time IoT, followed by a complete survey of the variant routing protocols and techniques.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115728805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modifications of Hestenes and Stiefel CG Method for Solving Unconstrained Optimization Problems 求解无约束优化问题的Hestenes和Stiefel CG方法的改进
Isam H. Halil, K. Abbo, Hassan H. Ebrahim
{"title":"Modifications of Hestenes and Stiefel CG Method for Solving Unconstrained Optimization Problems","authors":"Isam H. Halil, K. Abbo, Hassan H. Ebrahim","doi":"10.1109/ICCITM53167.2021.9677756","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677756","url":null,"abstract":"Nonlinear conjugate gradient methods have a very nice theory, with a lot of important results on their convergence. This is the main argument for which these methods are intensely used in solving practical unconstrained optimization applications. There are plenty of conjugate gradient methods and can be divided to the standard conjugate gradients, hybrid and parameterized and others. This paper concerned with parameterized type conjugate gradient methods, a new search direction for nonlinear conjugate gradient algorithms is presented in this study, which is based on the Hestenes-Stefel approach and conjugacy condition, the descent property and global convergence for convex functions is proved. Numerical experiments show that the proposed algorithm is promising.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employing the Social Group Optimization Algorithm to Find the Best Hyper parameters of Support Vector Machine 利用社会群体优化算法寻找支持向量机的最佳超参数
Raad Ahmad Ayoob Al-Salami, Ghazwan Alsoufi
{"title":"Employing the Social Group Optimization Algorithm to Find the Best Hyper parameters of Support Vector Machine","authors":"Raad Ahmad Ayoob Al-Salami, Ghazwan Alsoufi","doi":"10.1109/ICCITM53167.2021.9677774","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677774","url":null,"abstract":"Support Vector Machine (SVM) is one of the most widely used algorithms for solving classification and regression problems. SVM parameters such as the kernel and the penalty (C) parameters greatly affect the classification accuracy. For the purpose of improving classification accuracy within a record implementation time, a Social Group Optimization (SGO) algorithm was proposed to find the best combination of SVM parameters through which to improve the performance and to obtain the highest classification accuracy and speed of execution. Five different types of datasets (Iris, Wine, Glass, Stat log and Car) were used that all of them were taken from the (UCI) repository. Moreover, a medical dataset, which is taken from (Dread, Alia, 2019), was used to verify the proposed algorithm. The results of the proposed algorithm were compared with the Grid Search algorithm (GS). The comparison results showed a preference for the (SGO) algorithm compared to the (GS) algorithm in terms of classification accuracy and speed of implementation for all the used datasets in this work.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128414361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Spatial Characteristics of Satellite Images 增强卫星图像的空间特征
Alhan Anwr Younis Al-Safar
{"title":"Enhancing Spatial Characteristics of Satellite Images","authors":"Alhan Anwr Younis Al-Safar","doi":"10.1109/ICCITM53167.2021.9677703","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677703","url":null,"abstract":"Several research disciplines rely on satellite imagery because it possesses high quality; nevertheless, it is possible to enhance satellite images using digital image enhancement techniques that facilitate better noise reduction, contrast, and brightness. Smooth, crisp, and focused images obtained after image processing are used for assessing and demonstrating image characteristics. The present study uses several low-contrast images recorded using the Landsat sensor; multi-step spatial domain image processing is conducted for image enhancement. Initially, the Wiener Filter is employed for noise reduction; subsequently, Gamma Correction is employed for varying γ values, i.e., (0.3, 0.7, 1.1) and constant C = 1. Logarithmic transformation using C = 0.3 is the other image enhancement method. Algorithmic performance was assessed using standard values of AMBE, MSE, and PSNR. to check the signal and brightness power respectively. This outcome is so because the gamma transformation expression considers only the present mean and standard deviation for the working pixel.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126486824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding the Fuzzy Critical Path with Octagonal Fuzzy Numbers using Linear Programming model 用线性规划模型求解八角模糊数模糊关键路径
Sanar Mazin Younis, A. Yousif
{"title":"Finding the Fuzzy Critical Path with Octagonal Fuzzy Numbers using Linear Programming model","authors":"Sanar Mazin Younis, A. Yousif","doi":"10.1109/ICCITM53167.2021.9677823","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677823","url":null,"abstract":"A Binary Integer Linear Programing (BILP) model was used to find the Fuzzy Critical Path (FCP) of a fuzzy project network, when the lengths of all activities are represented as Octagonal Fuzzy Numbers (OFN). Although there are many methods to solve the fuzzy network problems, this paper presents the simplest method for the purpose of estimating the CP, especially, when every path activity is expressed by an OFN in the fuzzy network problems. The OFN of each activity converted to the crisp one using a modified ranking approach. A numerical example of a fuzzy network problem is given to illustrated the steps of the method were the OFN of each activity represented the time needed to complete implementation of that activity. The same example is solved by using CP Method (CPM). This is considered to be one of the leading standard methods of solving such problems. This paper presents a comparison of results of the two methods.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信