2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)最新文献

筛选
英文 中文
Analyzing Credit Card Fraud Detection based on Machine Learning Models 基于机器学习模型的信用卡欺诈检测分析
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795737
Raghad Almutairi, Abhishek Godavarthi, Arthi Reddy Kotha, Ebrima N. Ceesay
{"title":"Analyzing Credit Card Fraud Detection based on Machine Learning Models","authors":"Raghad Almutairi, Abhishek Godavarthi, Arthi Reddy Kotha, Ebrima N. Ceesay","doi":"10.1109/iemtronics55184.2022.9795737","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795737","url":null,"abstract":"Credit card use is not always the best way to use for payments, but the most demonstrable payment mode is through the credit card for both offline as well as for online payments, which can result in deficit of funds. As the online shopping is booming it helps in rendering the cashless payment modes. It can be used at shopping’s, paying rent, paying utilities bill, internet bill, travel and transportation, entertainment, food. Using for all these things there is a chance of fraud transactions for a credit card, hence there is more risk. There are many types of fraudulent detections most of the banks and institutions are preferring fraud detection applications.it has become very hard to find out the fraud detections, After the transaction is done there is a chance of detecting fraudulent transactions in the manual business processing system. In real time the bunco transactions are done with real transactions, but it seems not to be sufficient for detecting [1]. Machine learning and data science both are playing a very important role in identifying the fraud detections. This study uses data science and machine learning for detecting the fraud detection to demonstrate various modellings. The problem enables the transactions of the previously done transaction data.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125171888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knee and Ankle Exoskeletons for Motor Rehabilitation: A Technology Review 膝关节和踝关节外骨骼用于运动康复:技术综述
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795725
Deyby Huamanchahua, Cesar Luciano Otarola-Ruiz, Ana Quispe-Pina, Elvis J. De La Torre-Velarde
{"title":"Knee and Ankle Exoskeletons for Motor Rehabilitation: A Technology Review","authors":"Deyby Huamanchahua, Cesar Luciano Otarola-Ruiz, Ana Quispe-Pina, Elvis J. De La Torre-Velarde","doi":"10.1109/iemtronics55184.2022.9795725","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795725","url":null,"abstract":"Exoskeletons have been around since 1890 when a passive device was developed to assist movement. Although the exoskeleton initially focused on the whole body, it has become increasingly focused on a more specific area, which makes rehabilitation work more feasible and, consequently, less costly. Therefore, the purpose of the article is to present a systematic review of trends in the technical area of knee and ankle exoskeletons for rehabilitation purposes. The objective is to provide the interested researcher with a structured matrix that integrates essential components and mechanisms in the development of knee and ankle exoskeletons. As a methodology, specialized databases in biomechanics were used that aided in the collection of research conducted between 2019 and 2022. The filtering process resulted in the selection of 37 investigations. Finally, it was concluded that innovations in exoskeletons contribute to patient rehabilitation and that there is still room for further improvement in the implementation of projects on a commercial scale and the development of new exoskeletons based on previous research.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126962018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Monitoring System for Respiratory Diagnosis 呼吸诊断监测系统的设计
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795832
Kamran Hameed, Sana Ijlal Shahrukh, I. S. Ateeq
{"title":"Design of Monitoring System for Respiratory Diagnosis","authors":"Kamran Hameed, Sana Ijlal Shahrukh, I. S. Ateeq","doi":"10.1109/iemtronics55184.2022.9795832","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795832","url":null,"abstract":"Respiration is an important vital sign which can help in the indication of human’s health status. Sleep apnea, which is defined as a cessation of breathing while sleeping, is recognized as a common and critical popular health problem. By monitoring the patient’s respiration rate, sleep apnea can be diagnosed. The received signal from the patient, which is a variation in temperature, is converted into a variation in voltage and then the respiration rate can be calculated. A portable device is proposed that can continuously monitor the breathing rhythm in a manner which is fast, safe and costly effective. The system consists of a nasal-oral thermistor that is mounted inside a nebulizer mask for detecting the irregular respiratory interruption and providing audible and visual alarms when this interrupt indicates an apnea event. Otherwise, if an out-of-range value occurred the alarm also will be initiated. Thus, the device will contribute to reducing the death associated with sleep apnea.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133807239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Cognitive Dynamic Systems and Its Overarching Functions 认知动力系统及其总体功能综述
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795764
W. Hilal, Alessandro Giuliano, S. Gadsden, J. Yawney
{"title":"A Review of Cognitive Dynamic Systems and Its Overarching Functions","authors":"W. Hilal, Alessandro Giuliano, S. Gadsden, J. Yawney","doi":"10.1109/iemtronics55184.2022.9795764","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795764","url":null,"abstract":"Cognitive dynamic systems are a new field of physical systems inspired by several areas of study such as neuroscience, cognitive science, computer science, mathematics, physics and engineering. Building on Fuster’s paradigm, a system is considered cognitive when it is capable of five fundamental processes to human cognition: the perception-action cycle, memory, attention, intelligence and language. With these capabilities, a cognitive dynamic system can sense its environment, interact with it, and learn from it through continued interactions. The goal of this paper is to provide a thorough review of the cognitive dynamic system framework, along with its theory, applications, and its two special functions: cognitive control and cognitive risk control.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and analysis types of DDoS attack DDoS攻击类型检测与分析
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795729
E. Navruzov, A. Kabulov
{"title":"Detection and analysis types of DDoS attack","authors":"E. Navruzov, A. Kabulov","doi":"10.1109/iemtronics55184.2022.9795729","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795729","url":null,"abstract":"The problem of detecting types of DDOS attacks in large-scale networks is considered. The complexity of detection is explained by the presence of a large number of connected and diverse devices, the high volume of incoming traffic, the need to introduce special restrictions when searching for anomalies. The technology of developing information security models using data mining (DM) methods is proposed. The features of machine learning of DM algorithms are related to the choice of methods for preprocessing big data (Big Data). A technique for analyzing the structure of relations between types of DDOS attacks has been developed. Within the framework of this technique, a procedure for pairwise comparison of data by types of attacks with normal traffic is implemented. The result of the comparison is the stability of features, the values of which are invariant to the measurement scales. The analysis of the structure of relations by grouping algorithms was carried out according to the stability values on the determined sets of features. When forming the sets, the stability ranking was used. For classification, various existing methods of machine learning are analyzed.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115280435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Iso-RSA Cryptographic Scheme Iso-RSA加密方案
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795732
Mamadou I. Wade
{"title":"The Iso-RSA Cryptographic Scheme","authors":"Mamadou I. Wade","doi":"10.1109/iemtronics55184.2022.9795732","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795732","url":null,"abstract":"This paper shows one way that can be used to strengthen the RSA cryptographic scheme which was published in 1978 by Ron Rivest, Adi Shamir, and Len Adleman. We use the isonumber theory of the first kind which was developed by Santilli where the unit one of normal arithmetic is replaced with a new unit called an isounit. The proposed cryptosystem possesses both characteristics of symmetric and asymmetric encryption and therefore can be seen as a hybrid public-key and private-key cryptographic system that benefits from both types of the cryptographic method with a substantial increase in security of the associated ciphers. Additionally, applications and implementations of the Iso-RSA cryptosystem for the encryption and decryption of information encoded into positive integers or binary digits of 0s or 1s are implemented, and simulation results show that our proposed cryptographic system produces highly secure encrypted information. A wide range of other applications in security mechanisms and security services which include data confidentiality, authentications, data integrity, digital signature, key exchange, and others can be implemented using our proposed Iso-RSA cryptographic scheme.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122607947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bangla Handwritten Character Recognition Method 孟加拉手写体字符识别方法
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795820
L. Nahar
{"title":"Bangla Handwritten Character Recognition Method","authors":"L. Nahar","doi":"10.1109/iemtronics55184.2022.9795820","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795820","url":null,"abstract":"Recognizing and extracting handwritten character information is still a challenge in the scanning process. This research describes a method for OCR applications where Bengali handwritten characters can be recognized effectively. This method mainly focuses on post processing steps like feature extraction and building classification model to find a favorable accuracy rate. For feature extraction LBP method is used. Local Binary Pattern is a coming of age feature extracting method which is applied very few times in Bengali Language. This work is also an experimental approach of confirming what occurs when LBP is used in Bengali Characters. To classify Random Forest algorithm is applied, which is also a unique classification method. The datasets are gathered by collecting Bengali characters written in various fashions. Initially, scanned images of Bengali characters are given as input and by applying LBP required features are extracted. Principal Component Analysis (PCA) is applied on the collected feature vectors to reduce the dimension. Finally, RF algorithm is implied on the output to generate a recognition rate. Support vector machine (SVM) is also used as a classifier to evaluate and compare.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126444535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Devices Proximity Authentication In Ad Hoc Network Environment Ad Hoc网络环境下的物联网设备近距离认证
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795787
A. A. AlQahtani, Hosam Alamleh, Baker Al Smadi
{"title":"IoT Devices Proximity Authentication In Ad Hoc Network Environment","authors":"A. A. AlQahtani, Hosam Alamleh, Baker Al Smadi","doi":"10.1109/iemtronics55184.2022.9795787","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795787","url":null,"abstract":"Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g., vehicles, home appliances sensors, actuators, etc.), known as Things, to connect and exchange data, more importantly, without human interaction. Since IoT plays a significant role in our daily lives, we must secure the IoT environment to work effectively. Among the various security requirements, authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers. Using the current IEEE 802.11 infrastructure, this paper implements an IoT devices authentication scheme based on something that is in the IoT device’s environment (i.e., ambient access points). Data from the broadcast messages (i.e., beacon frame characteristics) are utilized to implement the authentication factor that confirms proximity between two devices in an ad hoc IoT network.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simulating Software Support Delays in a 24/7 Environment Using Discrete Event Simulation 使用离散事件模拟在24/7环境中模拟软件支持延迟
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795776
R. Kashef, Shabbir Mirza
{"title":"Simulating Software Support Delays in a 24/7 Environment Using Discrete Event Simulation","authors":"R. Kashef, Shabbir Mirza","doi":"10.1109/iemtronics55184.2022.9795776","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795776","url":null,"abstract":"Since there is a cost associated with providing 24/7 support, it is also common to divide user support into tiers where a group focused on usability and training of the software provides tier 1 support and another group, consisting of mainly developers, is focused on feature development, software bug fixing, and related issues work separately in a different tier. This paper focuses on software organizations where the developer tier operates from just one part of the world under a single time zone. This group is not available on a 24/7 basis, but the Tier 1 group works in different regions – and hence time zones - throughout the world to deal with user problems and questions. Users can be internal or external, depending on the purpose of the software. This paper discusses only internal users (developers, users and help desk employees who work for the same company) and the delays in support when dealing with these users who may be working in different regions and/or time zones. Tier 1 support is available around the clock due to hiring help desk resources in different locations under different time zones. If an issue cannot be resolved, the Tier 1 workers escalate the issue to the next tier (the developers), who work regular hours in one region under one time zone. This paper uses discrete event simulation modelling to provide insights for a company with a similar structure to better understand possible software support delays. These delays can be reduced, and better overall support can be provided in the future.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125094170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provision of Information and Detection Systems on Two-Wheeled Motorcycle Accidents 提供两轮电单车意外资料及侦测系统
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795807
Andi Nur Faisal, Amil Ahmad Ilham, Syafaruddin
{"title":"Provision of Information and Detection Systems on Two-Wheeled Motorcycle Accidents","authors":"Andi Nur Faisal, Amil Ahmad Ilham, Syafaruddin","doi":"10.1109/iemtronics55184.2022.9795807","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795807","url":null,"abstract":"This current work proposed the system of detection and information delivery on accident locations to related parties in order to get medical aids punctually. This system was based on three major components as the data source inputs, namely the censors of tilt/slope, vibration, acceleration, and coordinate locations. The data was then processed through Arduino microcontroller by applying a fuzzy logic algorithm using Tsukamoto method as a supporting system for accident status decision. The results of the decision were then transmitted to the data center in real time using the Wi-Fi module, and then send notifications to related parties. The test results revealed that the slope censor accuracy was about 96.1%. Additionally, the use of fuzzy logic via Tsukamoto method was successfully implemented to determine the accident status by an accuracy value of 85.18%.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信