2020 2nd International Conference on Computer and Information Sciences (ICCIS)最新文献

筛选
英文 中文
Real Time Implementation of Neuro-Fuzzy MPPT Control of PV Systems 光伏系统神经模糊MPPT控制的实时实现
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257706
A. Mansouri, F. Krim
{"title":"Real Time Implementation of Neuro-Fuzzy MPPT Control of PV Systems","authors":"A. Mansouri, F. Krim","doi":"10.1109/ICCIS49240.2020.9257706","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257706","url":null,"abstract":"This paper considers comparison of dynamic performance of incremental conductance technique, fuzzy logic and neuro-fuzzy controllers to track maximum power point of photovoltaic systems. To deliver maximum power, buck-boost maximum power point tracking converter is inserted between photovoltaic generator and load for power adaptation. It is shown that neuro-fuzzy control is superior to fuzzy control and classical incremental conductance method in terms of convergence speed, tracking accuracy and stability under different operating conditions. Experimental results confirm superiority of neuro-fuzzy MPPT over conventional methods.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"1 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving Optimization Problems using Hybrid Metaheuristics: Genetic Algorithm and Black Hole Algorithm 用混合元启发式算法求解优化问题:遗传算法和黑洞算法
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257717
Omar Sabah Mohammed, A. Sewisy, A. Taloba
{"title":"Solving Optimization Problems using Hybrid Metaheuristics: Genetic Algorithm and Black Hole Algorithm","authors":"Omar Sabah Mohammed, A. Sewisy, A. Taloba","doi":"10.1109/ICCIS49240.2020.9257717","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257717","url":null,"abstract":"During the last two decades, many optimization algorithms have been developed for solving optimization problems. These algorithms have inspired from an intelligent behaviour of a living species, or a natural phenomenon. Black Hole (BH) algorithm has been developed recently, it as a metaheuristic that is based on population imitates the black hole event in the universe, whereby circulating solution in the search space represents an individual star. Although the original BH has shown better performance on benchmark datasets, it does not possess exploration capabilities but performs a good local search. In this paper, a new hybrid metaheuristic based on the combination of BH algorithm and Genetic Algorithm (GA) is proposed. The type of the proposed hybrid algorithm is High level hybridization, when GA represent the initialization phase (Global Search), while BH represents the searching Phase (Local Search). The proposed GA-BH is examined based on several optimization problems. The results obtained showed that the proposed algorithm is better than the original BH and GA algorithm.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128247656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selective Data Augmentation Approach for Remote Sensing Scene Classification 遥感场景分类的选择性数据增强方法
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257710
Rowida Alharbi, H. Alhichri, Y. Bazi
{"title":"Selective Data Augmentation Approach for Remote Sensing Scene Classification","authors":"Rowida Alharbi, H. Alhichri, Y. Bazi","doi":"10.1109/ICCIS49240.2020.9257710","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257710","url":null,"abstract":"Scene classification in remote sensing (RS) images is an issue that attracted a lot of researchers' attention recently. Using CNN for scene classification has been investigated in depth. One difficulty in using CNN models in remote sensing is the limited amount of data. Data augmentation techniques have been shown to provide one solution to this problem, yet, few works have investigated these techniques in their methods. In this work, our main contribution is presenting a novel method for selective data augmentation in remote sensing. The proposed selective augmentation method tries to optimize the way we augment the training set. We do that by being selective in the new scenes that we generate and add to the training set. This will help us achieve the best results with the least amount of training data added. The method selects scenes based on a “quality” criterion. To that end we investigate two criteria for evaluating the quality of new scenes namely, one based on entropy and another one known as the breaking-ties criterion. The initial results present promising capabilities of this solution for four RS scene datasets in enhancing the accuracy of classification.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131190501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unmanned Aerial Vehicle for Human Surveillance by Using Face and Upperbody Classifiers 基于人脸和上半身分类器的人类监视无人机
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257659
M. Alharbi, E. Alghamdi, S. Alzaid, S. Qaisar
{"title":"Unmanned Aerial Vehicle for Human Surveillance by Using Face and Upperbody Classifiers","authors":"M. Alharbi, E. Alghamdi, S. Alzaid, S. Qaisar","doi":"10.1109/ICCIS49240.2020.9257659","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257659","url":null,"abstract":"The security and surveillance system frameworks are becoming essential part of our life. In thus framework an unmanned aerial vehicle based surveillance mechanism is proposed. The designed framework passes through several stages which are the modular design, system integration and calibration. The system optimization is realized by adjusting the flight board parameters and defining an effective flight plan. The designed system embeds a camera along with the face and the upper body classifiers in order to find out the human population in the concerned zone of aerial surveillance. A system prototype is successfully implemented and Validated.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134167468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review of Detection Methodologies for Quick Response code Phishing Attacks 快速响应代码网络钓鱼攻击检测方法综述
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257687
S. Subairu, J. Alhassan, S. Abdulhamid, J. Ojeniyi
{"title":"A Review of Detection Methodologies for Quick Response code Phishing Attacks","authors":"S. Subairu, J. Alhassan, S. Abdulhamid, J. Ojeniyi","doi":"10.1109/ICCIS49240.2020.9257687","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257687","url":null,"abstract":"Recently, phishing attacks have taking a new dimension with the addition of quick response code to phishing attacks vectors. Quick response code phishing attack is when an attacker lures its victims to voluntarily divulge personal information such as password, personal identification number, username and other information such as online banking details through the use of quick response code. This attack is on the rise as more and more people have adopted mobile phone usage not just for communication only but to perform transaction seamlessly. The ease of creation and use of quick response code has made it easily acceptable to both provider of goods and services and consumers. This attack is semantic as it exploits human vulnerabilities; as users can hardly know what is hidden in the quick response code before usage. This study reviewed various methodologies that earlier researcher have used to detect this semantic-based attack of phishing. The strength of each methodology, its weakness and general research gaps identified.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134367723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of the impact of Clinical Decision Support Systems: Descriptive Analytics 评估临床决策支持系统的影响:描述性分析
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257686
Mohammed Suliman Albahly, M. Seliaman
{"title":"Evaluation of the impact of Clinical Decision Support Systems: Descriptive Analytics","authors":"Mohammed Suliman Albahly, M. Seliaman","doi":"10.1109/ICCIS49240.2020.9257686","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257686","url":null,"abstract":"Due to the importance and criticality of the healthcare sector and the huge increase in the number of patients and hospitals, it becomes essential to implement Clinical Decision Support Systems. The integration between Clinical Decision Support Systems and Electronic Medical Records facilitates health practitioners' job and minimizes their clinical mistakes to enhance patients' outcomes. The increase of electronic systems adoption in Saudi Arabia, a high number of clinical mistakes, the utilization of health practitioners' tacit knowledge, and enhancing the overall performance of the medication prescribing process are the main motivators to conduct this research. This research aims to evaluate the currently implemented CDSS as a part of HIS BESTCare 2.0 at the Saudi Ministry of National Guard Health Affairs. The extracted data from DW show that more than 5% of medication prescriptions contain harm's errors, and the override rate was 21.46%. The level of experience positively affected the physicians' performance since consultants had the lowest error rate.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Quantitative Investigation of the Correlation Between Academic Program Majors and Educational Objectives: A Data-Driven Approach 学术专业与教育目标相关性的定量研究:数据驱动的方法
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257707
A. Yahya, Ibrahim Alyami
{"title":"A Quantitative Investigation of the Correlation Between Academic Program Majors and Educational Objectives: A Data-Driven Approach","authors":"A. Yahya, Ibrahim Alyami","doi":"10.1109/ICCIS49240.2020.9257707","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257707","url":null,"abstract":"In tertiary education, program education objects (PEDs) are a core component around which all program's activities revolve. This paper presents a data-driven approach to uncover an important aspect of this component that is its correlation to program majors (PMs). It does so by applying three well-known data correlation metrics, namely Pointwise Mutual Information, Correlation Coefficient, and Odds Ratio, to a dataset extracted from self-study reports of a set of Engineering programs. The collected dataset has undergone a preprocessing step to transform it into a suitable representation. This involves data cleaning, data annotation using a set of PEDs labels, and data projection to break down each multi-PEDs label data instances into a number of single PEDs data instances. The results obtained from the application of the three correlation metrics show a remarkable consistency among the three metrics in their evaluation of the correlation between PMs and PEDs. In a subsequent step, a ranking procedure of the PEDs within each PM, based on the obtained PMs-PEDs correlation strength, is applied and then a majority vote among the ranks of the three metrics is performed to obtain an overall rank of the PEDs within each PM. The obtained results show that each PM has a unique pattern of PEDs ranks, which suggests that PM nature plays a key role in determining the PM-PEDs correlation pattern. As a general conclusion, although the obtained results need further investigation on their causality correlation, the obtained quantitative correlations are very beneficial to the academicians particularly when designing new programs or reviewing existing ones.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132143636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emotion Specific Human Face Authentication Based on Infrared Thermal Image 基于红外热图像的情感特异性人脸认证
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257683
Mohammad Alamgir Hossain, Basem Assiri
{"title":"Emotion Specific Human Face Authentication Based on Infrared Thermal Image","authors":"Mohammad Alamgir Hossain, Basem Assiri","doi":"10.1109/ICCIS49240.2020.9257683","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257683","url":null,"abstract":"Facial emotion authentication is an emergent topic during the last few decades. It depicts a human's mood and reflects his activity that he is doing, going to do and thinking to do. Activity-mapping is possible to establish by analyzing emotions' sequence from the classification of facial expressions. To identify and recognize emotion the whole face is divided into four classes and into eight regions namely forehead (left, right), eyes (left, right), lips (left, right), and chin (left, right). However, the importance is being given to the region of interest (ROI). Based on the ROI four regions are been chosen (Nose-tip, Left-eye, Right-eye and Lip). Once classification and recognition are completed a database termed as image-data-mask is maintained. The correlation between variances and standard deviations is established based on one identified image. In the process of classification and recognition, and Optimized Probability Density Function (OPDF) is proposed. The centralized database (image-data-mask) is being checked before registration of a new image into the system to avoid redundancy. Nose-tip is taken as the central-point and rest regions are being detected based on it. In this investigation, the emotions (normal, fear, and smiley) are considered and the infrared thermal images are also recorded concurrently. A calibration technique is implemented to establish a matching between vectors of face-ROI and its features. The investigational result illustrates the supremacy of the proposed method as compared to other investigators.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132164889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Edge IoT-cloud Framework based on Blockchain 基于区块链的边缘物联网云框架
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257647
S. Ismail, R. Almayouf, Shaden Chehab, Shatha J. Alghamdi, Albandari Almutairi, Bshair Alasmari, Rawan Altherwy
{"title":"Edge IoT-cloud Framework based on Blockchain","authors":"S. Ismail, R. Almayouf, Shaden Chehab, Shatha J. Alghamdi, Albandari Almutairi, Bshair Alasmari, Rawan Altherwy","doi":"10.1109/ICCIS49240.2020.9257647","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257647","url":null,"abstract":"The Internet of things (IoT) can be used to exchange information and data, but there are many concerns of users in terms of privacy and theft of confidential information to the patient or change the data only seen by the doctor. Through blockchain technology, many hospitals have been able to store data and provide the concept of trust. This project aims to improve data exchange through the use of blockchain techniques and data operations to keep them from changing. IoT can be used to monitor the patient's condition remotely and follow up and send his information to the health authority, thus warning them of possible dangerous situations. In order to exchange reliable and reliable information between the caregivers and the patient, the data is taken from the patient and processed in operations and then stored.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133042657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection And Classification Of Apple Diseases using Convolutional Neural Networks 基于卷积神经网络的苹果病害检测与分类
2020 2nd International Conference on Computer and Information Sciences (ICCIS) Pub Date : 2020-10-13 DOI: 10.1109/ICCIS49240.2020.9257640
Asmaa Ghazi Alharbi, Muhammad Arif
{"title":"Detection And Classification Of Apple Diseases using Convolutional Neural Networks","authors":"Asmaa Ghazi Alharbi, Muhammad Arif","doi":"10.1109/ICCIS49240.2020.9257640","DOIUrl":"https://doi.org/10.1109/ICCIS49240.2020.9257640","url":null,"abstract":"In agricultural products, fruit diseases could lead to economic loss. In this paper, we focus on an important fruit-apples. Disease classification could be done by a human expert, which is the old way, costs a lot of money, and is also time-consuming. Computer vision (CV) and deep learning techniques show promising results with good accuracy and less time. In this paper, we have considered apple diseases like apple scab, apple blotch, and apple rot; these are fungal diseases. The dataset of the apples were collected from the local market; from that sample, we picked the apples which were already infected. Different models based on convolutional neural network are used for the classification of healthy apples and identifies the diseases apple. All the models showed good classification accuracy on more than 90% on testing images. The best accuracy was achieved by model-5; it gave 99.17%.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信