23 research outputs found

    AN AUTOMATED ENERGY BILL METERING SYSTEM BASED ON GSM TECHNOLOGY

    Get PDF
    The measurement of the energy consumed by residential and commercial buildings by utility provider is important in billing, control, and monitoring of the usage of energy. Traditional metering techniques used for the measurement of energy are not convenient and is prone to different forms of irregularities. These irregularities include meter failure, meter tampering, inaccuracies in billing due to human error, energy theft, and loss of revenue due to corruption, etc. This research study proposed the design and construction of a microcontroller-based electric energy metering system using the Global System for Mobile communication (GSM) network. This system provides a solution to the irregularities posed by the traditional metering technique by allowing the utility provider have access to remote monitoring capabilities, full control over consumer load, and remote power disconnection in the case of energy theft. Proteus simulation software was used to model the system hardware and the software was obtained by using embedded C programming and visual basic. It was observed that the system could remotely take accurate energy readings, provided full control over consumer loads and execute remote disconnection in case of energy theft. The system provides high performance and high accuracy in power monitoring and power management.   &nbsp

    Facial Image Verification and Quality Assessment System -FaceIVQA

    Get PDF
    Although several techniques have been proposed for predicting biometric system performance using quality values, many of the research works were based on no-reference assessment technique using a single quality attribute measured directly from the data. These techniques have proved to be inappropriate for facial verification scenarios and inefficient because no single quality attribute can sufficient measure the quality of a facial image. In this research work, a facial image verification and quality assessment framework (FaceIVQA) was developed. Different algorithms and methods were implemented in FaceIVQA to extract the faceness, pose, illumination, contrast and similarity quality attributes using an objective full-reference image quality assessment approach. Structured image verification experiments were conducted on the surveillance camera (SCface) database to collect individual quality scores and algorithm matching scores from FaceIVQA using three recognition algorithms namely principal component analysis (PCA), linear discriminant analysis (LDA) and a commercial recognition SDK. FaceIVQA produced accurate and consistent facial image assessment data. The Result shows that it accurately assigns quality scores to probe image samples. The resulting quality score can be assigned to images captured for enrolment or recognition and can be used as an input to quality-driven biometric fusion systems.DOI:http://dx.doi.org/10.11591/ijece.v3i6.503

    AN AUTOMATED ENERGY METER READING SYSTEM USING GSM TECHNOLOGY

    Get PDF
    The measurement of the energy consumed by residential and commercial buildings by utility provider is important in billing, control and monitoring of the usage of energy. Traditional metering techniques used for the measurement of energy are not convenient and is prone to different forms of irregularities. These irregularities include inaccuracies in billing due to human error, energy theft, loss of revenue due to corruption and so on. This research study proposed the design and construction of a microcontroller based electric energy metering system using the Global System for Mobile communication (GSM) network. This system provides solution to the irregularities posed by the traditional metering technique by allowing the utility provider have access to remote monitoring capabilities, full control over consumer load, and remote power disconnection in the case of energy theft. Proteus simulation software was used to model the system hardware and the software was obtained by using embedded C programming and visual basic. It was observed that the system could remotely take accurate energy readings, provided full control over consumer loads and execute remote disconnection in case of energy theft. The system provides high performance and high accuracy in power monitoring and power management. Keywords: GSM, Automati

    An Ensemble Learning Model for COVID-19 Detection from Blood Test Samples

    Get PDF
    Current research endeavors in the application of artificial intelligence (AI) methods in the diagnosis of the COVID-19 disease has proven indispensable with very promising results. Despite these promising results, there are still limitations in real-time detection of COVID-19 using reverse transcription polymerase chain reaction (RT-PCR) test data, such as limited datasets, imbalance classes, a high misclassification rate of models, and the need for specialized research in identifying the best features and thus improving prediction rates. This study aims to investigate and apply the ensemble learning approach to develop prediction models for effective detection of COVID-19 using routine laboratory blood test results. Hence, an ensemble machine learning-based COVID-19 detection system is presented, aiming to aid clinicians to diagnose this virus effectively. The experiment was conducted using custom convolutional neural network (CNN) models as a first-stage classifier and 15 supervised machine learning algorithms as a second-stage classifier: K-Nearest Neighbors, Support Vector Machine (Linear and RBF), Naive Bayes, Decision Tree, Random Forest, MultiLayer Perceptron, AdaBoost, ExtraTrees, Logistic Regression, Linear and Quadratic Discriminant Analysis (LDA/QDA), Passive, Ridge, and Stochastic Gradient Descent Classifier. Our findings show that an ensemble learning model based on DNN and ExtraTrees achieved a mean accuracy of 99.28% and area under curve (AUC) of 99.4%, while AdaBoost gave a mean accuracy of 99.28% and AUC of 98.8% on the San Raffaele Hospital dataset, respectively. The comparison of the proposed COVID-19 detection approach with other state-of-the-art approaches using the same dataset shows that the proposed method outperforms several other COVID-19 diagnostics methods.publishedVersio

    PREDICTING SOCIAL NETWORK ADDICTION USING VARIANT SIGMOID TRANSFER FEED-FORWARD NEURAL NETWORKS (FNN-SNA)

    Get PDF
    Researchers have reflected on personal traits that may predict Social Networking Sites (SNS) addiction. However, most of the researchers involved in the findings of personality traits predictor for social networking addiction either postulate or based their conclusions on analytical tools. Moreso, a review of the literature reveals that the prediction of social networking addiction using classifiers have not been well researched. We examined the prediction of SNS addiction from a well-structured questionnaire consisting of sixteen (16) personality traits. The questionnaire was administered on the google form with a response rate of 95% out of the 102-sample size. Additionally, a three (3) variant sigmoid transfer feed- forward neural networks was developed for the prediction of SNS addiction. Result indicated that pertinence (β = 0.251, p  0.01) was the most powerful predictor of social networking addiction in general and less obscurity addiction (β = 0.244, p  0.01). Experimental results also showed that the developed classifier correctly predict SNS addiction with 98% accuracy compared to similar classifiers.     &nbsp

    Predictive Analytics and Software Defect Severity: A Systematic Review and Future Directions

    Get PDF
    Software testing identifies defects in software products with varying multiplying effects based on their severity levels and sequel to instant rectifications, hence the rate of a research study in the software engineering domain. In this paper, a systematic literature review (SLR) on machine learning-based software defect severity prediction was conducted in the last decade. The SLR was aimed at detecting germane areas central to efficient predictive analytics, which are seldom captured in existing software defect severity prediction reviews. The germane areas include the analysis of techniques or approaches which have a significant influence on the threats to the validity of proposed models, and the bias-variance tradeoff considerations techniques in data science-based approaches. A population, intervention, and outcome model is adopted for better search terms during the literature selection process, and subsequent quality assurance scrutiny yielded fifty-two primary studies. A subsequent thoroughbred systematic review was conducted on the final selected studies to answer eleven main research questions, which uncovers approaches that speak to the aforementioned germane areas of interest. The results indicate that while the machine learning approach is ubiquitous for predicting software defect severity, germane techniques central to better predictive analytics are infrequent in literature. This study is concluded by summarizing prominent study trends in a mind map to stimulate future research in the software engineering industry.publishedVersio

    IMPLEMENTATION OF A BIMODAL BIOMETRIC ACCESS CONTROL SYSTEM FOR DATA CENTER

    Get PDF
    The use of biometrics has become one of the only sure ways to provide secure access control to rooms where vital asset are stored, such as data centers where valuable information are stored. This paper aim at designing and implementing a bimodal biometric access control system for data center using fingerprint and Iris trait of the same person, it is called bimodal biometric system. The system was implemented by integrating hardware components such as PIC18F452 microcontroller, fingerprint and iris sensors and so no with the software programs as such C language and MYSQL interface. On testing, it is found to improve the security and reliability in the access control systems management of the data cente

    An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)

    Get PDF
    The recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ensuring data and network security. In cryptography, randomization of encrypted data increases the security level as well as the Computational Complexity of cryptographic algorithms involved. This research study provides encryption algorithms that bring confidentiality and integrity based on two algorithms. The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. The security classical RSA has depreciated irrespective of the size of the key length due to the development in computing technology and hacking system. Due to these lapses, we have tried to improve on the contribution of the paper by enhancing the security of RSA against different attacks and also increasing diffusion degree without increasing the key length. The security analysis of the study was compared with classical RSA of 1024 key length using mathematical evaluation proofs, the experimental results generated were compared with classical RSA of 1024 key length using avalanche effect in (%) and computational complexity as performance evaluation metrics. The results show that RBMRSA is better than classical RSA in terms of security but at the cost of execution time.publishedVersio

    BLACKFACE SURVEILLANCE CAMERA DATABASE FOR EVALUATING FACE RECOGNITION IN LOW QUALITY SCENARIOS

    Get PDF
    Many face recognition algorithms perform poorly in real life surveillance scenarios because they were tested with datasets that are already biased with high quality images and certain ethnic or racial types. In this paper a black face surveillance camera (BFSC) database was described, which was collected from four low quality cameras and a professional camera. There were fifty (50) random volunteers and 2,850 images were collected for the frontal mugshot, surveillance (visible light), surveillance (IR night vision), and pose variations datasets, respectively. Images were taken at distance 3.4, 2.4, and 1.4 metres from the camera, while the pose variation images were taken at nine distinct pose angles with an increment of 22.5 degrees to the left and right of the subject. Three Face Recognition Algorithms (FRA), a commercially available Luxand SDK, Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) were evaluated for performance comparison in low quality scenarios. Results obtained show that camera quality (resolution), face-to-camera distance, average recognition time, lighting conditions and pose variations all affect the performance of FRAs. Luxand SDK, PCA and LDA returned an overall accuracy of 97.5%, 93.8% and 92.9% after categorizing the BFSC images into excellent, good and acceptable quality scales.

    A BIMODAL BIOMETRIC BANK VAULT ACCESS CONTROL SYSTEM

    Get PDF
    The bank vault system has security as its most important aim. Banks could go bankrupt if the vault’s security system becomes compromised. In this paper, the use of bimodal biometrics (fingerprint and iris) is proposed as a means of ensuring the full integrity of the bank’s vault system, thus, further reducing the rate of compromise and theft within the bank’s vault system. A scanner captures the fingerprint and the iris of authorized users. The images of the fingerprint and iris captured by the scanner are segmented, normalized and made into templates that are stored in a database along with the particulars of the users. The accuracy of the system is measured in terms of sample acquisition error and recognition performance using False Accept Rate (FAR), False Identification Rate (FIR) and False Reject Rate (FRR). The result shows that the proposed system is very effective
    corecore