• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.03 seconds

Neural Network Self-Organizing Maps Model for Partitioning PV Solar Power

  • Munshi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.1-4
    • /
    • 2022
  • The growth in global population and industrialization has led to an increasing demand for electricity. Accordingly, the electricity providers need to increase the electricity generation. Due to the economical and environmental concerns associated with the generation of electricity from fossil fuels. Alternative power recourses that can potentially mitigate the economical and environmental are of interest. Renewable energy resources are promising recourses that can participate in producing power. Among renewable power resources, solar energy is an abundant resource and is currently a field of research interest. Photovoltaic solar power is a promising renewable energy resource. The power output of PV systems is mainly affected by the solar irradiation and ambient temperature. this paper investigates the utilization of machine learning unsupervised neural network techniques that potentially improves the reliability of PV solar power systems during integration into the electrical grid.

Human Action Recognition Using Deep Data: A Fine-Grained Study

  • Rao, D. Surendra;Potturu, Sudharsana Rao;Bhagyaraju, V
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.97-108
    • /
    • 2022
  • The video-assisted human action recognition [1] field is one of the most active ones in computer vision research. Since the depth data [2] obtained by Kinect cameras has more benefits than traditional RGB data, research on human action detection has recently increased because of the Kinect camera. We conducted a systematic study of strategies for recognizing human activity based on deep data in this article. All methods are grouped into deep map tactics and skeleton tactics. A comparison of some of the more traditional strategies is also covered. We then examined the specifics of different depth behavior databases and provided a straightforward distinction between them. We address the advantages and disadvantages of depth and skeleton-based techniques in this discussion.

Fuzzy Partitioning of Photovoltaic Solar Power Patterns

  • Munshi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.5-10
    • /
    • 2022
  • Photovoltaic systems provide a reliable green energy solution. The sustainability and low-maintenance of Photovoltaic systems motivate the integration of Photovoltaic systems into the electrical grid and further contribute to a greener environment, as the system does not cause any pollution or emissions. Developing methodologies based on machine learning techniques to assist in reducing the burden of studies related to integrating Photovoltaic systems into the electric grid are of interest. This research aims to develop a methodology based on a unsupervised machine learning algorithm that can reduce the burden of extensive studies and simulations related to the integration of Photovoltaic systems into the electrical grid.

A Review of Extended Fraud with COVID-19 on the Online Services

  • Elhussein, Bahaeldein;Karrar, Abdelrahman Elsharif
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.163-171
    • /
    • 2022
  • Online services are widely spread, and their use increases day by day. As COVID-19 spread and people spent much time online, fraud scams have risen unexpectedly. Manipulation techniques have become more effective at swindling those lacking basic technological knowledge. Unfortunately, a user needs a quorum. The interest in preventing scammers from obtaining effective quality service has become the most significant obstacle, increasing the variety of daily Internet platforms. This paper is concerned with analyzing purchase data and extracting provided results. In addition, after examining relevant documents presenting research discussing them, the recommendation was made that future work avoids them; this would save a lot of effort, money, and time. This research highlights many problems a person may face in dealing with online institutions and possible solutions to the epidemic through theft operations on the Internet.

A Novel Feature Selection Approach to Classify Breast Cancer Drug using Optimized Grey Wolf Algorithm

  • Shobana, G.;Priya, N.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.258-270
    • /
    • 2022
  • Cancer has become a common disease for the past two decades throughout the globe and there is significant increase of cancer among women. Breast cancer and ovarian cancers are more prevalent among women. Majority of the patients approach the physicians only during their final stage of the disease. Early diagnosis of cancer remains a great challenge for the researchers. Although several drugs are being synthesized very often, their multi-benefits are less investigated. With millions of drugs synthesized and their data are accessible through open repositories. Drug repurposing can be done using machine learning techniques. We propose a feature selection technique in this paper, which is novel that generates multiple populations for the grey wolf algorithm and classifies breast cancer drugs efficiently. Leukemia drug dataset is also investigated and Multilayer perceptron achieved 96% prediction accuracy. Three supervised machine learning algorithms namely Random Forest classifier, Multilayer Perceptron and Support Vector Machine models were applied and Multilayer perceptron had higher accuracy rate of 97.7% for breast cancer drug classification.

Marketing Technologies In Educational Management: Current Problems

  • Zhytomyrska, Tetiana;Zrybnieva, Iryna;Romaniuk, Nadiia;Havrysh, Iryna;Gorditsa, Tetyana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.298-302
    • /
    • 2022
  • The article considers in detail the possibilities and significance of marketing technologies for additional education programs as the most flexible and adaptive component of the educational process. Moreover, additional education programs are the most market-defined. Also at this stage, we have developed the structure of the e-mail message about ongoing additional educational programs in order to promote them, and on its basis, we have prepared an example of a letter for e-mail.informational and educational mailing using techniques to attract the attention of the addressee in order to promote additional educational programs.The content of the letter was also formed for students of the electronic course "Education Marketing", sent out in order to monitor the educational process.

Increasing the Effectiveness of Educational Historical and Cultural Video Content on YouTube with the Help of Built-in Analytical Tools

  • Bratus, Ivan;Boiko, Vita;Zaharchuk, Oleh;Zaitseva, Veronika;Gunka, Anna;Sachok, Viktor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.137-140
    • /
    • 2022
  • The article deals with increasing the effectiveness of educational content on the YouTube channel with the help of built-in analytics tools. Particular attention is paid to the creation of quality video, taking into account the reaction of end users of video materials. Ways to increase the video audience are considered. Techniques for improving video content apply to individual videos, as well as playlists and channels in general. In this case YouTube is both an independent educational platform and an auxiliary platform in a set of various educational solutions.

Viewpoint Model Manipulating Inconsistencies Management

  • Ahmad Dalalah;Jalawi AlShudukhi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.96-100
    • /
    • 2023
  • In this paper, each inconsistency management process activities was addressed. In addition, a guideline to deal with inconsistency by viewpoints method are introduced. At the end of the paper you should have clear idea to support inconsistency management in future research and having good knowledge of inconsistency management process activities and research issues. Moreover, it gives the researcher ability to design new framework by using powerful concept in inconsistency management and viewpoint techniques. The paper is organized as follows: an introduction is presented in section one, section two contains process viewpoint, while section three includes the proposed model and conclusions are in section four.

Image Hashing Techniques Utilizing User-Defined Image Invariant Features (사용자에 의한 영상 불변 특징을 이용한 이미지 해쉬 기술)

  • Choi, YongSoo;Kim, HyoungJoong
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.514-517
    • /
    • 2010
  • 이미지 해쉬는 기술자(Descriptor) 또는 구분자(Identifier)로서 영상의 유사성을 측정하는데 사용될 수 있다. 수많은 이미지 해쉬 기술들이 있지만, 그 중에서도 히스토그램 기반의 방법들이 일반적인 영상처리나 다양한 기하학적 공격들에 강인함을 보여준다. 이 논문에서는 강인한 히스토그램 기반 이미지 해쉬를 생성하기 위하여 영상의 양자화, 사용자 지정 윈도우를 적용하여 영상의 특성화 과정을 적용하며 해쉬 값 결정 알고리즘도 오류에 강하도록 설계하였다. 이러한 기술은 기존의 논문들이 보여주었던 성능을 향상시킨다. 특히, 통계적인 오류측정을 통해 수행결과를 설명함으로서 수행성능의 향상을 객관적으로 평가하였다.

Speech Emotion Recognition with SVM, KNN and DSVM

  • Hadhami Aouani ;Yassine Ben Ayed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.40-48
    • /
    • 2023
  • Speech Emotions recognition has become the active research theme in speech processing and in applications based on human-machine interaction. In this work, our system is a two-stage approach, namely feature extraction and classification engine. Firstly, two sets of feature are investigated which are: the first one is extracting only 13 Mel-frequency Cepstral Coefficient (MFCC) from emotional speech samples and the second one is applying features fusions between the three features: Zero Crossing Rate (ZCR), Teager Energy Operator (TEO), and Harmonic to Noise Rate (HNR) and MFCC features. Secondly, we use two types of classification techniques which are: the Support Vector Machines (SVM) and the k-Nearest Neighbor (k-NN) to show the performance between them. Besides that, we investigate the importance of the recent advances in machine learning including the deep kernel learning. A large set of experiments are conducted on Surrey Audio-Visual Expressed Emotion (SAVEE) dataset for seven emotions. The results of our experiments showed given good accuracy compared with the previous studies.