首页 > 最新文献

Computer Engineering and Applications最新文献

英文 中文
Power Line Communication Performance Channel Characteristics 电力线通信性能信道特性
Pub Date : 2014-02-06 DOI: 10.18495/COMENGAPP.V3I1.42
D. Duche
Power lines form the medium of transmission in PLC systems. The original purpose of these lines is the transportation of electric signals at 50 or 60 Hz .This paper proposes a new channel modeling method for power line communications networks based on the multipath profile in the time domain. The new channel model is developed to be applied in a range of Power line Communications (PLC) research topics such as impulse noise modeling, deployment and coverage studies, and communications theory analysis. The statistical multipath parameters such as path arrival time, magnitude and interval for each category are analyzed to build the model. Each generated channel based on the proposed Power line communication that a performance channel characteristic represents a different realization of a PLC network
电力线是PLC系统的传输介质。本文提出了一种基于时域多径剖面的电力线通信网络信道建模新方法。该新信道模型可用于电力线通信(PLC)的一系列研究课题,如脉冲噪声建模、部署和覆盖研究以及通信理论分析。对每一类的路径到达时间、大小和间隔等统计多径参数进行分析,建立模型。基于所提出的电力线通信所产生的每个信道的性能信道特征代表了PLC网络的不同实现
{"title":"Power Line Communication Performance Channel Characteristics","authors":"D. Duche","doi":"10.18495/COMENGAPP.V3I1.42","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V3I1.42","url":null,"abstract":"Power lines form the medium of transmission in PLC systems. The original purpose of these lines is the transportation of electric signals at 50 or 60 Hz .This paper proposes a new channel modeling method for power line communications networks based on the multipath profile in the time domain. The new channel model is developed to be applied in a range of Power line Communications (PLC) research topics such as impulse noise modeling, deployment and coverage studies, and communications theory analysis. The statistical multipath parameters such as path arrival time, magnitude and interval for each category are analyzed to build the model. Each generated channel based on the proposed Power line communication that a performance channel characteristic represents a different realization of a PLC network","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115885209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance evaluation of popular l1-minimization algorithms in the context of Compressed Sensing 在压缩感知环境下流行的11 -最小化算法的性能评价
Pub Date : 2014-02-06 DOI: 10.18495/COMENGAPP.V3I1.39
T. Bijeesh
Compressed sensing (CS) is a data acquisition technique that is gaining popularity because of the fact that the reconstruction of the original signal is possible even if it was sampled at a sub-Nyquist rate. In contrast to the traditional sampling method, in CS we take a few measurements from the signal and the original signal can then be reconstructed from these measurements by using an optimization technique called l1 -minimization. Computer engineers and mathematician have been equally fascinated by this latest trend in digital signal processing. In this work we perform an evaluation of different l1 -minimization algorithms for their performance in reconstructing the signal in the context of CS. The algorithms that have been evaluated are PALM (Primal Augmented Lagrangian Multiplier method), DALM (Dual Augmented Lagrangian Multiplier method) and ISTA (Iterative Soft Thresholding Algorithm). The evaluation is done based on three parameters which are execution time, PSNR and RMSE.
压缩感知(CS)是一种越来越受欢迎的数据采集技术,因为即使以亚奈奎斯特速率采样,也可以重建原始信号。与传统的采样方法相反,在CS中,我们从信号中进行一些测量,然后通过使用称为l1 -最小化的优化技术,可以从这些测量中重建原始信号。计算机工程师和数学家同样对数字信号处理的这一最新趋势着迷。在这项工作中,我们对不同的l1 -最小化算法在CS背景下重建信号的性能进行了评估。已经评估的算法有PALM(原始增广拉格朗日乘子法)、DALM(对偶增广拉格朗日乘子法)和ISTA(迭代软阈值算法)。评估基于三个参数:执行时间、PSNR和RMSE。
{"title":"Performance evaluation of popular l1-minimization algorithms in the context of Compressed Sensing","authors":"T. Bijeesh","doi":"10.18495/COMENGAPP.V3I1.39","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V3I1.39","url":null,"abstract":"Compressed sensing (CS) is a data acquisition technique that is gaining popularity because of the fact that the reconstruction of the original signal is possible even if it was sampled at a sub-Nyquist rate. In contrast to the traditional sampling method, in CS we take a few measurements from the signal and the original signal can then be reconstructed from these measurements by using an optimization technique called l1 -minimization. Computer engineers and mathematician have been equally fascinated by this latest trend in digital signal processing. In this work we perform an evaluation of different l1 -minimization algorithms for their performance in reconstructing the signal in the context of CS. The algorithms that have been evaluated are PALM (Primal Augmented Lagrangian Multiplier method), DALM (Dual Augmented Lagrangian Multiplier method) and ISTA (Iterative Soft Thresholding Algorithm). The evaluation is done based on three parameters which are execution time, PSNR and RMSE.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Networking Empirically Influences the Types of Innovation?: Pardis Technology Park as a Case Study 网络对创新类型的实证影响?:以Pardis科技园为例
Pub Date : 2013-12-11 DOI: 10.18495/COMENGAPP.V2I3.36
Amir Mirzadeh Phirouzabadi, M. Mahmoudian, M. Asghari
Nowadays, Innovation can be named as one of the best practices as quality, speed, dependability, flexibility and cost which it helps organization enter to new markets, increase the existing market share and provide it with a competitive edge. In addition, organizations have moved forward from “hiding idea (Closed Innovation)” to “opening them (Open Innovation)”. Therefore, concepts such as “open innovation” and “innovation network” have become important and beneficial to both academic and market society. Therefore, this study tried to empirically study the effects of networking on innovations. In this regard, in order to empirically explore how networking influences innovations, this paper used types of innovations based on OCED definition as organizational, marketing, process and product and compared their changes before and after networking of 45 companies in the network Pardis Technology Park as a case study. The results and findings showed that all of the innovation types were increased after jointing the companies to the network. In fact, we arranged these changing proportions from the most to the least change as marketing, process, organizational and product innovation respectively. Although there were some negative growth in some measures of these innovations after jointing into the network.
如今,创新可以被称为质量,速度,可靠性,灵活性和成本的最佳实践之一,它帮助组织进入新的市场,增加现有的市场份额,并为其提供竞争优势。此外,组织已经从“隐藏创意(封闭式创新)”向“开放创意(开放式创新)”迈进。因此,“开放式创新”和“创新网络”等概念对学术和市场社会都变得重要和有益。因此,本研究试图对网络对创新的影响进行实证研究。为此,为了实证探讨网络化对创新的影响,本文将基于OCED定义的创新类型分为组织创新、营销创新、流程创新和产品创新,并以网络帕迪斯科技园的45家企业为研究对象,比较其网络化前后的变化。结果表明,企业加入网络后,各创新类型均有所增加。实际上,我们将这些变化的比例从变化最大到变化最小分别排列为营销、流程、组织和产品创新。虽然在加入网络后,这些创新的一些指标出现了负增长。
{"title":"How Networking Empirically Influences the Types of Innovation?: Pardis Technology Park as a Case Study","authors":"Amir Mirzadeh Phirouzabadi, M. Mahmoudian, M. Asghari","doi":"10.18495/COMENGAPP.V2I3.36","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I3.36","url":null,"abstract":"Nowadays, Innovation can be named as one of the best practices as quality, speed, dependability, flexibility and cost which it helps organization enter to new markets, increase the existing market share and provide it with a competitive edge. In addition, organizations have moved forward from “hiding idea (Closed Innovation)” to “opening them (Open Innovation)”. Therefore, concepts such as “open innovation” and “innovation network” have become important and beneficial to both academic and market society. Therefore, this study tried to empirically study the effects of networking on innovations. In this regard, in order to empirically explore how networking influences innovations, this paper used types of innovations based on OCED definition as organizational, marketing, process and product and compared their changes before and after networking of 45 companies in the network Pardis Technology Park as a case study. The results and findings showed that all of the innovation types were increased after jointing the companies to the network. In fact, we arranged these changing proportions from the most to the least change as marketing, process, organizational and product innovation respectively. Although there were some negative growth in some measures of these innovations after jointing into the network.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Two phase privacy preserving data mining 两阶段隐私保护数据挖掘
Pub Date : 2013-12-11 DOI: 10.18495/COMENGAPP.V2I3.30
Pooja Gupta, Ashish Kumar
The paper proposes a framework to improve the privacy preserving data mining. The approach adopted provides security at both the ends i.e. at the data transmission time as well as in the data mining process using two phases. The secure data transmission is handled using elliptic curve cryptography (ECC) and the privacy is preserved using k-anonymity. The proposed framework ensures highly secure environment. We observed that the framework outperforms other approaches [8] discussed in the literature at both ends i.e. at security and privacy of data. Since most of the approaches have considered either secure transmission or privacy preserving data mining but very few have considered both. We have used WEKA 3.6.9 for experimentation and analysis of our approach. We have also analyzed the case of k-anonymity when the numbers of records in a group are less than k (hiding factor) by inserting fake records. The obtained results have shown the pattern that the insertion of fake records leads to more accuracy as compared to full suppression of records. Since, full suppression may hide important information in cases where records are less than k, on the other hand in the process of fake records insertion; records are available even if number of records in a group is less than k.
本文提出了一个改进隐私保护数据挖掘的框架。采用的方法在数据传输时间和数据挖掘过程中使用两个阶段提供了两端的安全性。数据传输采用椭圆曲线加密(ECC),隐私保护采用k-匿名。所提出的框架确保了高度安全的环境。我们观察到,该框架在数据安全和隐私方面都优于文献中讨论的其他方法[8]。由于大多数方法都考虑了安全传输或保护隐私的数据挖掘,但很少同时考虑两者。我们已经使用WEKA 3.6.9对我们的方法进行了实验和分析。我们还分析了在组中记录数小于k(隐藏因子)时插入虚假记录的k匿名情况。所获得的结果表明,与完全抑制记录相比,插入假记录会导致更高的准确性。因为,在记录小于k的情况下,完全抑制可能会隐藏重要信息,另一方面,在假记录插入的过程中;即使组中的记录数少于k,记录也可用。
{"title":"Two phase privacy preserving data mining","authors":"Pooja Gupta, Ashish Kumar","doi":"10.18495/COMENGAPP.V2I3.30","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I3.30","url":null,"abstract":"The paper proposes a framework to improve the privacy preserving data mining. The approach adopted provides security at both the ends i.e. at the data transmission time as well as in the data mining process using two phases. The secure data transmission is handled using elliptic curve cryptography (ECC) and the privacy is preserved using k-anonymity. The proposed framework ensures highly secure environment. We observed that the framework outperforms other approaches [8] discussed in the literature at both ends i.e. at security and privacy of data. Since most of the approaches have considered either secure transmission or privacy preserving data mining but very few have considered both. We have used WEKA 3.6.9 for experimentation and analysis of our approach. We have also analyzed the case of k-anonymity when the numbers of records in a group are less than k (hiding factor) by inserting fake records. The obtained results have shown the pattern that the insertion of fake records leads to more accuracy as compared to full suppression of records. Since, full suppression may hide important information in cases where records are less than k, on the other hand in the process of fake records insertion; records are available even if number of records in a group is less than k.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122228245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement and Comparison of Mean Shift Tracker using Convex Kernel Function and Motion Information 基于凸核函数和运动信息的均值漂移跟踪器改进与比较
Pub Date : 2013-12-11 DOI: 10.18495/COMENGAPP.V2I3.35
S. Wakode
Any tracking algorithm must be able to detect interested moving objects in its field of view and then track it from frame to frame. The tracking algorithms based on mean shift are robust and efficient. But they have limitations like inaccuracy of target localization, object being tracked must not pass by another object with similar features i.e. occlusion and fast object motion. This paper proposes and compares an improved adaptive mean shift algorithm and adaptive mean shift using a convex kernel function through motion information. Experimental results show that both methods track the object without tracking errors. Adaptive method gives less computation cost and proper target localization and Mean shift using convex kernel function shows good results for the tracking challenges like partial occlusion and fast object motion faced by basic Mean shift algorithm.
任何跟踪算法都必须能够在其视野中检测到感兴趣的运动物体,然后从一帧到另一帧进行跟踪。基于均值漂移的跟踪算法鲁棒性好,效率高。但它们也有局限性,如目标定位不准确,被跟踪的物体不能经过具有相似特征的物体,如遮挡和快速运动。本文提出并比较了一种改进的自适应均值移位算法和基于运动信息的凸核函数自适应均值移位算法。实验结果表明,两种方法都没有产生跟踪误差。自适应方法计算量小,目标定位合理,采用凸核函数的Mean shift方法对基本Mean shift算法所面临的局部遮挡和目标快速运动等跟踪挑战具有较好的效果。
{"title":"Improvement and Comparison of Mean Shift Tracker using Convex Kernel Function and Motion Information","authors":"S. Wakode","doi":"10.18495/COMENGAPP.V2I3.35","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I3.35","url":null,"abstract":"Any tracking algorithm must be able to detect interested moving objects in its field of view and then track it from frame to frame. The tracking algorithms based on mean shift are robust and efficient. But they have limitations like inaccuracy of target localization, object being tracked must not pass by another object with similar features i.e. occlusion and fast object motion. This paper proposes and compares an improved adaptive mean shift algorithm and adaptive mean shift using a convex kernel function through motion information. Experimental results show that both methods track the object without tracking errors. Adaptive method gives less computation cost and proper target localization and Mean shift using convex kernel function shows good results for the tracking challenges like partial occlusion and fast object motion faced by basic Mean shift algorithm.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130574677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Concept of Convexity Defect Method on Hand Gestures as Password Door Lock 手势密码门锁的凸性缺陷法设计思想
Pub Date : 2013-12-11 DOI: 10.18495/COMENGAPP.V2I3.32
Rossi Passarella, Muhammad Fadli, S. Sutarno
In this paper we purpose a several steps to implement security for locking door by using hand gestures as password. The methods considered as preprocessing image, skin detection and Convexity Defection. The main components of the system are Camera, Personal Computer (PC), Microcontroller and Motor (Lock). Bluetooth communication are applied to communicate between PC and microcontroller to open and lock door used commands character such as “O” and “C”. The results of this system show that the hand gestures can be measured, identified and quantified consistently.
在本文中,我们使用手势作为密码来实现锁门的安全性。方法包括图像预处理、皮肤检测和凸性缺陷检测。该系统主要由摄像头、个人电脑(PC)、单片机和电机(锁)组成。采用蓝牙通信技术在PC机和单片机之间进行通信,使用“O”、“C”等命令字符实现开门、锁门。该系统的结果表明,手势可以被一致地测量、识别和量化。
{"title":"Design Concept of Convexity Defect Method on Hand Gestures as Password Door Lock","authors":"Rossi Passarella, Muhammad Fadli, S. Sutarno","doi":"10.18495/COMENGAPP.V2I3.32","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I3.32","url":null,"abstract":"In this paper we purpose a several steps to implement security for locking door by using hand gestures as password. The methods considered as preprocessing image, skin detection and Convexity Defection. The main components of the system are Camera, Personal Computer (PC), Microcontroller and Motor (Lock). Bluetooth communication are applied to communicate between PC and microcontroller to open and lock door used commands character such as “O” and “C”. The results of this system show that the hand gestures can be measured, identified and quantified consistently.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-mail spam filtering by a new hybrid feature selection method using IG and CNB wrapper 基于IG和CNB包装的混合特征选择方法过滤垃圾邮件
Pub Date : 2013-12-11 DOI: 10.18495/COMENGAPP.V2I3.29
Seyed Mostafa Pourhashemi
The growing volume of spam emails has resulted in the necessity for more accurate and efficient email classification system. The purpose of this research is presenting an machine learning approach for enhancing the accuracy of automatic spam detecting and filtering and separating them from legitimate messages. In this regard, for reducing the error rate and increasing the efficiency, the hybrid architecture on feature selection has been used. Features used in these systems, are the body of text messages. Proposed system of this research has used the combination of two filtering models, Filter and Wrapper, with Information Gain (IG) filter and Complement Naive Bayes (CNB) wrapper as feature selectors. In addition, Multinomial Naive Bayes (MNB) classifier, Discriminative Multinomial Naive Bayes (DMNB) classifier, Support Vector Machine (SVM) classifier and Random Forest classifier are used for classification. Finally, the output results of this classifiers and feature selection methods are examined and the best design is selected and it is compared with another similar works by considering different parameters. The optimal accuracy of the proposed system is evaluated equal to 99%.
随着垃圾邮件数量的不断增加,需要更准确、更高效的邮件分类系统。本研究的目的是提出一种机器学习方法来提高自动垃圾邮件检测和过滤的准确性,并将它们与合法消息分离。为此,为了降低错误率和提高效率,在特征选择上采用了混合结构。在这些系统中使用的功能是文本消息的主体。本研究提出的系统采用了Filter和Wrapper两种过滤模型的结合,以Information Gain (IG) Filter和Complement Naive Bayes (CNB) Wrapper作为特征选择器。此外,还使用多项朴素贝叶斯(MNB)分类器、判别多项朴素贝叶斯(DMNB)分类器、支持向量机(SVM)分类器和随机森林分类器进行分类。最后,对该分类器和特征选择方法的输出结果进行检验,选出最佳设计,并在考虑不同参数的情况下与同类作品进行比较。经评估,该系统的最优精度为99%。
{"title":"E-mail spam filtering by a new hybrid feature selection method using IG and CNB wrapper","authors":"Seyed Mostafa Pourhashemi","doi":"10.18495/COMENGAPP.V2I3.29","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I3.29","url":null,"abstract":"The growing volume of spam emails has resulted in the necessity for more accurate and efficient email classification system. The purpose of this research is presenting an machine learning approach for enhancing the accuracy of automatic spam detecting and filtering and separating them from legitimate messages. In this regard, for reducing the error rate and increasing the efficiency, the hybrid architecture on feature selection has been used. Features used in these systems, are the body of text messages. Proposed system of this research has used the combination of two filtering models, Filter and Wrapper, with Information Gain (IG) filter and Complement Naive Bayes (CNB) wrapper as feature selectors. In addition, Multinomial Naive Bayes (MNB) classifier, Discriminative Multinomial Naive Bayes (DMNB) classifier, Support Vector Machine (SVM) classifier and Random Forest classifier are used for classification. Finally, the output results of this classifiers and feature selection methods are examined and the best design is selected and it is compared with another similar works by considering different parameters. The optimal accuracy of the proposed system is evaluated equal to 99%.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human Perception Based Color Image Segmentation 基于人类感知的彩色图像分割
Pub Date : 2013-12-11 DOI: 10.18495/COMENGAPP.V2I3.34
Neeta Gargote, S. Devaraj, S. Shahapure
Color image segmentation is probably the most important task in image analysis and understanding. A novel Human Perception Based Color Image Segmentation System is presented in this paper. This system uses a neural network architecture. The neurons here uses a multisigmoid activation function. The multisigmoid activation function is the key for segmentation. The number of steps ie. thresholds in the multisigmoid function are dependent on the number of clusters in the image. The threshold values for detecting the clusters and their labels are found automatically from the first order derivative of histograms of saturation and intensity in the HSI color space. Here the main use of neural network is to detect the number of objects automatically from an image. It labels the objects with their mean colors. The algorithm is found to be reliable and works satisfactorily on different kinds of color images.
彩色图像分割可能是图像分析和理解中最重要的任务。提出了一种新的基于人类感知的彩色图像分割系统。该系统采用神经网络架构。这里的神经元使用多s型激活功能。多s型激活函数是分割的关键。步骤数。多重s型函数的阈值取决于图像中聚类的数量。从HSI色彩空间中饱和度和强度直方图的一阶导数中自动找到检测聚类及其标签的阈值。这里神经网络的主要用途是从图像中自动检测物体的数量。它用物体的平均颜色来标记它们。实验结果表明,该算法是可靠的,在不同类型的彩色图像上都能取得满意的效果。
{"title":"Human Perception Based Color Image Segmentation","authors":"Neeta Gargote, S. Devaraj, S. Shahapure","doi":"10.18495/COMENGAPP.V2I3.34","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I3.34","url":null,"abstract":"Color image segmentation is probably the most important task in image analysis and understanding. A novel Human Perception Based Color Image Segmentation System is presented in this paper. This system uses a neural network architecture. The neurons here uses a multisigmoid activation function. The multisigmoid activation function is the key for segmentation. The number of steps ie. thresholds in the multisigmoid function are dependent on the number of clusters in the image. The threshold values for detecting the clusters and their labels are found automatically from the first order derivative of histograms of saturation and intensity in the HSI color space. Here the main use of neural network is to detect the number of objects automatically from an image. It labels the objects with their mean colors. The algorithm is found to be reliable and works satisfactorily on different kinds of color images.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computing Trends and Converging Technological Factors With Device Metric Enhancement to Envelop Application Wide Middleware Infrastructure 计算趋势和融合技术因素与设备度量增强包络应用范围的中间件基础设施
Pub Date : 2013-09-16 DOI: 10.18495/COMENGAPP.V2I2.25
T. Prasath, D. Rampriya
In the emerging trends the pervasive nature across the computing environment shows that the system is platform independent and device independent. The system development is designed with the help of Structured Query Language and middleware infrastructure that are used to collect the information from various nodes. An essential feature of this proposed middleware architecture suites the device independent as the major supporting capability to the system. This facilitates to add new device types in the system feels easy through the use of device self-description.  It mainly focuses on the issues related to the heterogeneity of the different devices composing a pervasive system: This aspect is investigated both at data management and at physical integration levels. Using the nontrivial approach aims at handling the related issues are resolved with the corresponding solution. Keyword: Perla, Cloud Monitoring, Middleware, Declarative Language
在新兴趋势中,整个计算环境的普遍性表明系统是平台无关和设备无关的。系统的开发采用结构化查询语言和中间件基础结构进行设计,中间件基础结构用于收集各个节点的信息。所提出的中间件体系结构的一个基本特征是将设备独立作为系统的主要支持功能。这有助于在系统中添加新的设备类型,通过使用设备自我描述感觉很容易。它主要关注与组成普适系统的不同设备的异构性相关的问题:在数据管理和物理集成级别对这方面进行了研究。采用非平凡方法的目的是处理相关问题,用相应的解决方案加以解决。关键词:Perla,云监控,中间件,声明式语言
{"title":"Computing Trends and Converging Technological Factors With Device Metric Enhancement to Envelop Application Wide Middleware Infrastructure","authors":"T. Prasath, D. Rampriya","doi":"10.18495/COMENGAPP.V2I2.25","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I2.25","url":null,"abstract":"In the emerging trends the pervasive nature across the computing environment shows that the system is platform independent and device independent. The system development is designed with the help of Structured Query Language and middleware infrastructure that are used to collect the information from various nodes. An essential feature of this proposed middleware architecture suites the device independent as the major supporting capability to the system. This facilitates to add new device types in the system feels easy through the use of device self-description.  It mainly focuses on the issues related to the heterogeneity of the different devices composing a pervasive system: This aspect is investigated both at data management and at physical integration levels. Using the nontrivial approach aims at handling the related issues are resolved with the corresponding solution. Keyword: Perla, Cloud Monitoring, Middleware, Declarative Language","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131368331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Technique to Find Outliers in Mixed Attribute Datasets 混合属性数据中异常点的一种新方法
Pub Date : 2013-09-16 DOI: 10.18495/comengapp.v2i2.26
A. Kalpana, P. Rambabu, D. LakshmiSreeniuvasareddy
An Outlier is a data point which is significantly different from the remaining data points. Outlier is also referred as discordant, deviants and abnormalities. Outliers may have a particular interest, such as credit card fraud detection, where outliers indicate fraudulent activity. Thus, outlier detection analysis is an interesting data mining task, referred to as outlier analysis. Detecting outliers efficiently from dataset is an important task in many fields like Credit card Fraud, Medicine, Law enforcement, Earth Sciences etc. Many methods are available to identify outliers in numerical dataset. But there exist limited number of methods are available for categorical and mixed attribute datasets. In the proposed work, a novel outlier detection method is proposed. This proposed method finds anomalies based on each record’s “multi attribute outlier factor through correlation” score and it has great intuitive appeal. This algorithm utilizes the frequency of each value in categorical part of the dataset and correlation factor of each record with mean record of the entire dataset. This proposed method used Attribute Value Frequency score (AVF score) concept for categorical part. Results of the proposed method are compared with existing methods. The Bank data (Mixed) is used for experiments in this paper which is taken from UCI machine learning repository. Keyword: Outlier, Mixed Attribute Datasets, Attribute Value Frequency Score
离群点是与其他数据点显著不同的数据点。离群值也被称为不和谐、偏差和异常。异常值可能具有特定的兴趣,例如信用卡欺诈检测,其中异常值表示欺诈活动。因此,离群点检测分析是一项有趣的数据挖掘任务,称为离群点分析。有效地从数据集中检测异常值是信用卡欺诈、医学、执法、地球科学等许多领域的重要任务。数值数据集中异常值的识别方法有很多。但是对于分类和混合属性数据集,可用的方法有限。本文提出了一种新的异常值检测方法。该方法基于每条记录的“多属性异常因子关联”得分来发现异常,具有很强的直观吸引力。该算法利用了数据集分类部分各值出现的频率以及每条记录与整个数据集均值记录的相关系数。该方法采用属性值频率评分(Attribute Value Frequency score, AVF score)概念对分类部分进行分类。将所提方法的结果与现有方法进行了比较。本文中使用的Bank数据(Mixed)取自UCI机器学习存储库。关键词:离群值,混合属性数据集,属性值频率评分
{"title":"A Novel Technique to Find Outliers in Mixed Attribute Datasets","authors":"A. Kalpana, P. Rambabu, D. LakshmiSreeniuvasareddy","doi":"10.18495/comengapp.v2i2.26","DOIUrl":"https://doi.org/10.18495/comengapp.v2i2.26","url":null,"abstract":"An Outlier is a data point which is significantly different from the remaining data points. Outlier is also referred as discordant, deviants and abnormalities. Outliers may have a particular interest, such as credit card fraud detection, where outliers indicate fraudulent activity. Thus, outlier detection analysis is an interesting data mining task, referred to as outlier analysis. Detecting outliers efficiently from dataset is an important task in many fields like Credit card Fraud, Medicine, Law enforcement, Earth Sciences etc. Many methods are available to identify outliers in numerical dataset. But there exist limited number of methods are available for categorical and mixed attribute datasets. In the proposed work, a novel outlier detection method is proposed. This proposed method finds anomalies based on each record’s “multi attribute outlier factor through correlation” score and it has great intuitive appeal. This algorithm utilizes the frequency of each value in categorical part of the dataset and correlation factor of each record with mean record of the entire dataset. This proposed method used Attribute Value Frequency score (AVF score) concept for categorical part. Results of the proposed method are compared with existing methods. The Bank data (Mixed) is used for experiments in this paper which is taken from UCI machine learning repository. Keyword: Outlier, Mixed Attribute Datasets, Attribute Value Frequency Score","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Engineering and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1