首页 > 最新文献

Computer Engineering and Applications最新文献

英文 中文
Reconstruction of Events in Digital Forensics 数字取证中的事件重建
Pub Date : 2013-09-16 DOI: 10.18495/COMENGAPP.V2I2.24
M. Prasad, B. Kumar, Y.Naga Satish, K. Sriraman
Detecting and gaining clues from the crime scene plays a major role in the process of investigation. Now a days with increase of cybercrime and fraud on the internet, digital forensics gaining importance. It needs to collect information the events happened at crime place. This paper deals with event reconstruction process which is useful for digital crime scene. The process of reconstruction is based on crime event and event characteristics. It also furnishes crime rate guess using some semi-formal techniques. Keyword: Digital Investigation, Digital Forensics, Events, Attack Trees, Reconstruction
从犯罪现场发现和获取线索在侦查过程中起着重要作用。如今,随着网络犯罪和网络欺诈的增加,数字取证变得越来越重要。它需要收集犯罪现场发生的事件的信息。本文研究了数字犯罪现场的事件重构过程。重构过程以犯罪事件和事件特征为依据。它还使用一些半正式的技术提供了犯罪率的猜测。关键词:数字调查,数字取证,事件,攻击树,重构
{"title":"Reconstruction of Events in Digital Forensics","authors":"M. Prasad, B. Kumar, Y.Naga Satish, K. Sriraman","doi":"10.18495/COMENGAPP.V2I2.24","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I2.24","url":null,"abstract":"Detecting and gaining clues from the crime scene plays a major role in the process of investigation. Now a days with increase of cybercrime and fraud on the internet, digital forensics gaining importance. It needs to collect information the events happened at crime place. This paper deals with event reconstruction process which is useful for digital crime scene. The process of reconstruction is based on crime event and event characteristics. It also furnishes crime rate guess using some semi-formal techniques. Keyword: Digital Investigation, Digital Forensics, Events, Attack Trees, Reconstruction","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Product Review Mining for Opinion Using Ensemble Classifier 基于集成分类器的产品评论意见挖掘
Pub Date : 2013-09-13 DOI: 10.18495/COMENGAPP.V2I2.22
G. Vinodhini, R. Chandrasekaran
Online product reviews is considered as a major informative resource which is useful for both customers and manufacturers. The online reviews are unstructured-free-texts in natural language form. The task of manually scanning through huge volume of review is very tedious and time consuming. Therefore it is needed to automatically process the online reviews and provide the necessary information in a suitable form. In this paper, we dedicate our work to the task of classifying the reviews based on the opinion, i.e. positive or negative opinion. This paper mainly addresses using ensemble approach of Support Vector Machine (SVM) for opinion mining. Ensemble classifier was examined for feature based product review dataset for three different products. We showed that proposed ensemble of Support Vector Machine is superior to individual baseline approach for opinion mining in terms of error rate and Receiver operating characteristics Curve. Key words: Opinion, Classification, Machine Learning.
在线产品评论被认为是一种重要的信息资源,对消费者和制造商都很有用。在线评论是自然语言形式的无结构文本。手动浏览大量的审查是非常繁琐和耗时的任务。因此,需要自动处理在线评论并以合适的形式提供必要的信息。在本文中,我们致力于基于意见(即积极或消极意见)对评论进行分类的任务。本文主要研究了支持向量机集成方法在意见挖掘中的应用。对三种不同产品的基于特征的产品评论数据集进行了集成分类器测试。结果表明,基于支持向量机集成的意见挖掘方法在错误率和接收者工作特征曲线方面优于单个基线方法。关键词:意见,分类,机器学习。
{"title":"Product Review Mining for Opinion Using Ensemble Classifier","authors":"G. Vinodhini, R. Chandrasekaran","doi":"10.18495/COMENGAPP.V2I2.22","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I2.22","url":null,"abstract":"Online product reviews is considered as a major informative resource which is useful for both customers and manufacturers. The online reviews are unstructured-free-texts in natural language form. The task of manually scanning through huge volume of review is very tedious and time consuming. Therefore it is needed to automatically process the online reviews and provide the necessary information in a suitable form. In this paper, we dedicate our work to the task of classifying the reviews based on the opinion, i.e. positive or negative opinion. This paper mainly addresses using ensemble approach of Support Vector Machine (SVM) for opinion mining. Ensemble classifier was examined for feature based product review dataset for three different products. We showed that proposed ensemble of Support Vector Machine is superior to individual baseline approach for opinion mining in terms of error rate and Receiver operating characteristics Curve. Key words: Opinion, Classification, Machine Learning.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128423767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Analysis of Adaptive Approach for Document Binarization 一种自适应文档二值化方法分析
Pub Date : 2013-09-13 DOI: 10.18495/COMENGAPP.V2I2.21
R. F. Malik, Saparudin, Intan Septyliana
Abstract Binarization is an initial step in document image analysis for differentiate text area from background. Determination of binarization technique is really important to retrieve all the text information especially from degraded document image. This paper explains about adaptive binarization using Gatos’s method. Gatos’s method is doing preprocessing, foreground estimation using Sauvola’s method, background estimation, upsampling, final thresholding and postprocessing. In this paper, Sauvola’s method is final thresholding from Wiener filter image result and source image, and count F-Measure from both of these binary image results. By using optimum constant value on k value, n local window, K sw and K sw1, Gatos’s method can produced binary image better than Sauvola’s method based on F-Measure value. Sauvola’s method produces average value F=84,62%, Sauvola’s method with Wiener filter produces average value F=99.06% and Gatos’s method produces average value F=99,43%. Keyword : Degraded Document Image, Adaptive Approcah for Binarization, Gatos’s  Method, Sauvola’s Method DOI: 10.18495/comengapp.22.185194
摘要二值化是文档图像分析中区分文本区域和背景的第一步。二值化技术的确定对于检索所有文本信息,特别是从退化的文档图像中检索文本信息至关重要。本文介绍了用Gatos方法进行自适应二值化的方法。Gatos的方法是做预处理,使用Sauvola的方法进行前景估计,背景估计,上采样,最终阈值和后处理。在本文中,Sauvola的方法是对维纳滤波图像结果和源图像进行最终阈值分割,并对这两个二值图像结果进行F-Measure计数。Gatos方法利用k值、n个局部窗口、ksw和ksw1的最优常数,比Sauvola基于F-Measure值的方法能更好地生成二值图像。Sauvola的方法得到的平均值F=84,62%,带Wiener滤波的方法得到的平均值F=99.06%, Gatos的方法得到的平均值F=99,43%。关键词:退化文档图像,自适应二值化方法,Gatos方法,Sauvola方法
{"title":"An Analysis of Adaptive Approach for Document Binarization","authors":"R. F. Malik, Saparudin, Intan Septyliana","doi":"10.18495/COMENGAPP.V2I2.21","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I2.21","url":null,"abstract":"Abstract Binarization is an initial step in document image analysis for differentiate text area from background. Determination of binarization technique is really important to retrieve all the text information especially from degraded document image. This paper explains about adaptive binarization using Gatos’s method. Gatos’s method is doing preprocessing, foreground estimation using Sauvola’s method, background estimation, upsampling, final thresholding and postprocessing. In this paper, Sauvola’s method is final thresholding from Wiener filter image result and source image, and count F-Measure from both of these binary image results. By using optimum constant value on k value, n local window, K sw and K sw1, Gatos’s method can produced binary image better than Sauvola’s method based on F-Measure value. Sauvola’s method produces average value F=84,62%, Sauvola’s method with Wiener filter produces average value F=99.06% and Gatos’s method produces average value F=99,43%. Keyword : Degraded Document Image, Adaptive Approcah for Binarization, Gatos’s  Method, Sauvola’s Method DOI: 10.18495/comengapp.22.185194","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115969467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Copy-Move Forgery Detection Technique 复制-移动伪造检测技术的优化
Pub Date : 2013-09-13 DOI: 10.18495/COMENGAPP.V2I2.23
Amanpreet Kaur, Richa Sharma
Digital images are foremost source for information transfer. Due to advancement of the technology, images are now not treated as reliable source of information. Digital images can be edited according to the need. Adding and deleting content from an image is most easiest and popular way of creating image forgery, which is known as copy-move forgery. Digital Image Forensics is the field that deals with the authenticity of the images. Digital image forensics checks the integrity of the images by detecting various forgeries. In order to hide the traces of copy-move forgery there are editing operations like rotation, scaling, JPEG compression, Gaussian noise called as attacks, which are performed on the copied part of the image before pasting. Till now these attacks are not detected by the single method. The novel approach is proposed to detect image forgery by copy-move under above attacks by combining block-based and keypoint-based method. Keywords: Digital image forensics, copy-move forgery, passive blind approach, keypoint-based, block-based methods
数字图像是信息传递的主要来源。由于技术的进步,图像现在不被视为可靠的信息来源。数字图像可以根据需要进行编辑。从图像中添加和删除内容是创建图像伪造的最简单和最流行的方法,这被称为复制-移动伪造。数字图像取证是处理图像真实性的领域。数字图像取证通过检测各种伪造来检查图像的完整性。为了隐藏复制-移动伪造的痕迹,有编辑操作,如旋转,缩放,JPEG压缩,高斯噪声称为攻击,这些操作在粘贴之前对图像的复制部分执行。到目前为止,这些攻击还没有被单一的方法检测到。将基于块的方法和基于关键点的方法相结合,提出了一种检测上述攻击下复制移动图像伪造的新方法。关键词:数字图像取证,复制-移动伪造,被动盲法,基于关键点,基于块的方法
{"title":"Optimization of Copy-Move Forgery Detection Technique","authors":"Amanpreet Kaur, Richa Sharma","doi":"10.18495/COMENGAPP.V2I2.23","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I2.23","url":null,"abstract":"Digital images are foremost source for information transfer. Due to advancement of the technology, images are now not treated as reliable source of information. Digital images can be edited according to the need. Adding and deleting content from an image is most easiest and popular way of creating image forgery, which is known as copy-move forgery. Digital Image Forensics is the field that deals with the authenticity of the images. Digital image forensics checks the integrity of the images by detecting various forgeries. In order to hide the traces of copy-move forgery there are editing operations like rotation, scaling, JPEG compression, Gaussian noise called as attacks, which are performed on the copied part of the image before pasting. Till now these attacks are not detected by the single method. The novel approach is proposed to detect image forgery by copy-move under above attacks by combining block-based and keypoint-based method. Keywords: Digital image forensics, copy-move forgery, passive blind approach, keypoint-based, block-based methods","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem 基于椭圆曲线离散对数问题的盲签名方案研究进展
Pub Date : 2013-05-07 DOI: 10.18495/COMENGAPP.V2I1.16
E. Kinani, Fatima Amounas
In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers due to its robust mathematical structure and highest security compared to other existing algorithm like RSA. Our main objective in this work was to provide a novel blind signature scheme based on ECC. The security of the proposed method results from the infeasibility to solve the discrete logarithm over an elliptic curve. In this paper we introduce a proposed to development the blind signature scheme with more complexity as compared to the existing schemes. Keyword: Cryptography, Blind Signature, Elliptic Curve, Blindness, Untraceability. DOI: 10.18495/comengapp.21.151160
近年来,与RSA等现有算法相比,椭圆曲线密码术(Elliptic Curve Cryptography, ECC)以其强大的数学结构和较高的安全性受到了研究人员的关注。本文的主要目标是提出一种基于ECC的盲签名方案。该方法的安全性主要体现在它不能求解椭圆曲线上的离散对数。本文介绍了一种开发盲签名方案的方案,与现有方案相比,该方案具有更高的复杂度。关键词:密码学,盲签名,椭圆曲线,盲性,不可追溯性。DOI: 10.18495 / comengapp.21.151160
{"title":"Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem","authors":"E. Kinani, Fatima Amounas","doi":"10.18495/COMENGAPP.V2I1.16","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I1.16","url":null,"abstract":"In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers due to its robust mathematical structure and highest security compared to other existing algorithm like RSA. Our main objective in this work was to provide a novel blind signature scheme based on ECC. The security of the proposed method results from the infeasibility to solve the discrete logarithm over an elliptic curve. In this paper we introduce a proposed to development the blind signature scheme with more complexity as compared to the existing schemes. Keyword: Cryptography, Blind Signature, Elliptic Curve, Blindness, Untraceability. DOI: 10.18495/comengapp.21.151160","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Iranian Vehicle License Plate Recognition System Based on Support Vector Machine (SVM) Algorithms 基于支持向量机算法的伊朗车辆车牌自动识别系统
Pub Date : 2013-05-03 DOI: 10.18495/COMENGAPP.V2I1.17
M. Aghaie, F. Shokri, M. Y. Tabari
There are far more cars on the road now than there used to be. Therefore, Controlling and managing the huge volume of traffic is virtually impossible without the use of computer technology. This paper represents design and implement of an intelligent system for license plate recognition based on three main steps. This process includes the detection of license plate location, character segmentation and character recognition. In this study, we used Classifier svm to detect the characters. According to the results, the performance of the proposed system is better compared to similar algorithms such as neural network. It is worth mentioning that Recognition Approach is tested in various conditions and results are described. Keyword - Vehicle license plate recognition, Morphology Operations, Histogram, The edge detection, Classifier SVM DOI: 10.18495/comengapp.21.161174
现在路上的汽车比过去多得多。因此,如果不使用计算机技术,控制和管理大量的交通几乎是不可能的。本文介绍了一种基于三个主要步骤的智能车牌识别系统的设计与实现。该过程包括车牌定位检测、字符分割和字符识别。在本研究中,我们使用分类器svm来检测字符。结果表明,与神经网络等类似算法相比,该系统的性能有所提高。值得一提的是,识别方法在各种条件下进行了测试,并描述了结果。关键词:车牌识别,形态学运算,直方图,边缘检测,SVM分类器
{"title":"Automatic Iranian Vehicle License Plate Recognition System Based on Support Vector Machine (SVM) Algorithms","authors":"M. Aghaie, F. Shokri, M. Y. Tabari","doi":"10.18495/COMENGAPP.V2I1.17","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I1.17","url":null,"abstract":"There are far more cars on the road now than there used to be. Therefore, Controlling and managing the huge volume of traffic is virtually impossible without the use of computer technology. This paper represents design and implement of an intelligent system for license plate recognition based on three main steps. This process includes the detection of license plate location, character segmentation and character recognition. In this study, we used Classifier svm to detect the characters. According to the results, the performance of the proposed system is better compared to similar algorithms such as neural network. It is worth mentioning that Recognition Approach is tested in various conditions and results are described. Keyword - Vehicle license plate recognition, Morphology Operations, Histogram, The edge detection, Classifier SVM DOI: 10.18495/comengapp.21.161174","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126204582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robotics Current Issues and Trends 机器人技术当前的问题和趋势
Pub Date : 2013-03-31 DOI: 10.18495/COMENGAPP.V2I1.13
S. Nurmaini
The ongoing research and development work in the field of robotics have resulted in so many new technological trends. There are revolution which are being achieved with the use of latest technology in robotics, giving birth to new possibilities for automating tasks and enriching human lives for better. One can easily witness the presence of robotics in every sphere of life from industrial robots, service robots to personal robots. It other words, robots have become a part of our world to meet new demands of a new society. DOI: 10.18495/comengapp.21.117120
机器人领域正在进行的研究和开发工作产生了许多新的技术趋势。机器人技术的最新技术正在实现革命,为自动化任务和更好地丰富人类生活提供了新的可能性。从工业机器人、服务机器人到个人机器人,人们可以很容易地看到机器人在生活的各个领域的存在。换句话说,机器人已经成为我们世界的一部分,以满足新社会的新需求。DOI: 10.18495 / comengapp.21.117120
{"title":"Robotics Current Issues and Trends","authors":"S. Nurmaini","doi":"10.18495/COMENGAPP.V2I1.13","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I1.13","url":null,"abstract":"The ongoing research and development work in the field of robotics have resulted in so many new technological trends. There are revolution which are being achieved with the use of latest technology in robotics, giving birth to new possibilities for automating tasks and enriching human lives for better. One can easily witness the presence of robotics in every sphere of life from industrial robots, service robots to personal robots. It other words, robots have become a part of our world to meet new demands of a new society. DOI: 10.18495/comengapp.21.117120","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"17 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133110457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Codes correcting and simultaneously detecting solid burst errors 码纠正和同时检测固体突发错误
Pub Date : 2013-03-31 DOI: 10.18495/COMENGAPP.V2I1.15
P. Das
Detecting and correcting errors is one of the main tasks in coding theory. The bounds are important in terms of error-detecting and -correcting capabilities of the codes. Solid Burst error is common in several communication channels. This paper obtains lower and upper bounds on the number of parity-check digits required for linear codes capable of correcting any solid burst error of length b or less and simultaneously detecting any solid burst error of length s (> b ) or less. Illustration of such a code is also provided. Keywords: Parity check matrix, Syndromes, Solid burst errors, Standard array DOI: 10.18495/comengapp.21.143150
错误检测和纠错是编码理论的主要任务之一。就代码的错误检测和纠错能力而言,边界是重要的。固体突发错误是几种通信信道中常见的错误。本文给出了能够纠正长度小于等于b的实突发错误并同时检测长度小于等于s的实突发错误的线性码所需的奇偶校验位数的下界和上界。还提供了这种代码的说明。关键词:奇偶校验矩阵,综合征,实体突发错误,标准阵列DOI: 10.18495/comengapp.21.143150
{"title":"Codes correcting and simultaneously detecting solid burst errors","authors":"P. Das","doi":"10.18495/COMENGAPP.V2I1.15","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I1.15","url":null,"abstract":"Detecting and correcting errors is one of the main tasks in coding theory. The bounds are important in terms of error-detecting and -correcting capabilities of the codes. Solid Burst error is common in several communication channels. This paper obtains lower and upper bounds on the number of parity-check digits required for linear codes capable of correcting any solid burst error of length b or less and simultaneously detecting any solid burst error of length s (> b ) or less. Illustration of such a code is also provided. Keywords: Parity check matrix, Syndromes, Solid burst errors, Standard array DOI: 10.18495/comengapp.21.143150","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128767609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Immune Based Patient Anomaly Detection using RFID Technology 基于免疫的射频识别技术患者异常检测
Pub Date : 2013-03-26 DOI: 10.18495/COMENGAPP.V2I1.14
S. Rosa, S. Shamsuddin, Evizal Evizal
Detecting of anomalies patients data are important to gives early alert to hospital, in this paper will explore on anomalies patient data detecting and processing using artificial computer intelligent system. Artificial Immune System (AIS) is an intelligent computational technique refers to human immunology system and has been used in many areas such as computer system, pattern recognition, stock market trading, etc. In this case, real value negative selection algorithm (RNSA) of artificial immune system used for detecting anomalies patient body parameters such as temperature. Patient data from monitoring system or database classified into real valued, real negative selection algorithm results is real values deduction by RNSA distance, the algorithm used is minimum distance and the value of detector generated for the algorithm. The real valued compared with the distance of data, if the distance is less than a RNSA detector distance then data classified into abnormal. To develop real time detecting and monitoring system, Radio Frequency Identification (RFID) technology has been used in this system. Keywords: AIS, RNSA, RFID, Abnormal DOI: 10.18495/comengapp.21.121142
异常患者数据的检测对于医院早期预警具有重要意义,本文将探讨利用人工计算机智能系统对异常患者数据进行检测和处理。人工免疫系统(Artificial Immune System, AIS)是指人体免疫系统的一种智能计算技术,已被应用于计算机系统、模式识别、股票市场交易等诸多领域。在这种情况下,人工免疫系统的实值负选择算法(RNSA)用于检测异常患者体温等身体参数。患者数据从监测系统或数据库中分类成实值,实负选择算法的结果是实值通过RNSA距离演绎,算法使用的是最小距离和检测器生成的值为算法。将实数值与数据的距离进行比较,如果距离小于一个RNSA探测器的距离则数据归类为异常。为了开发实时检测和监控系统,本系统采用了射频识别技术。关键词:AIS, RNSA, RFID,异常
{"title":"An Immune Based Patient Anomaly Detection using RFID Technology","authors":"S. Rosa, S. Shamsuddin, Evizal Evizal","doi":"10.18495/COMENGAPP.V2I1.14","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I1.14","url":null,"abstract":"Detecting of anomalies patients data are important to gives early alert to hospital, in this paper will explore on anomalies patient data detecting and processing using artificial computer intelligent system. Artificial Immune System (AIS) is an intelligent computational technique refers to human immunology system and has been used in many areas such as computer system, pattern recognition, stock market trading, etc. In this case, real value negative selection algorithm (RNSA) of artificial immune system used for detecting anomalies patient body parameters such as temperature. Patient data from monitoring system or database classified into real valued, real negative selection algorithm results is real values deduction by RNSA distance, the algorithm used is minimum distance and the value of detector generated for the algorithm. The real valued compared with the distance of data, if the distance is less than a RNSA detector distance then data classified into abnormal. To develop real time detecting and monitoring system, Radio Frequency Identification (RFID) technology has been used in this system. Keywords: AIS, RNSA, RFID, Abnormal DOI: 10.18495/comengapp.21.121142","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Constructing Static Evaluation Function using Temporal Difference Learning 用时间差分学习构造静态评价函数
Pub Date : 2013-03-18 DOI: 10.18495/COMENGAPP.V2I1.18
Samuel Choi Ping Man
Programming computers to play board games against human players has long been used as a measure for the development of artificial intelligence. The standard approach for computer game playing is to search for the best move from a given game state by using minimax search with static evaluation function. The static evaluation function is critical to the game playing performance but its design often relies on human expert players. This paper discusses how temporal differences (TD) learning can be used to construct a static evaluation function through self-playing and evaluates the effects for various parameter settings. The game of Kalah, a non-chance game of moderate complexity, is chosen as a testbed. The empirical result shows that TD learning is particularly promising for constructing a good evaluation function for the end games and can substantially improve the overall game playing performance in learning the entire game. DOI: 10.18495/comengapp.21.175184
长期以来,通过编程让计算机与人类棋手进行棋盘游戏一直被用作人工智能发展的一种衡量标准。计算机游戏的标准方法是使用静态评估函数的极大极小搜索,从给定的游戏状态中搜索最佳走法。静态评估功能对游戏性能至关重要,但其设计往往依赖于人类专家玩家。本文讨论了如何利用时间差异学习(temporal difference, TD)通过自演构造静态评价函数,并对不同参数设置的效果进行评价。Kalah游戏,一个中等复杂度的非偶然游戏,被选为测试平台。实证结果表明,TD学习对于构建一个良好的终端博弈评价函数尤其有前景,并且在学习整个博弈的过程中可以大幅提高整体博弈的表现。DOI: 10.18495 / comengapp.21.175184
{"title":"On Constructing Static Evaluation Function using Temporal Difference Learning","authors":"Samuel Choi Ping Man","doi":"10.18495/COMENGAPP.V2I1.18","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V2I1.18","url":null,"abstract":"Programming computers to play board games against human players has long been used as a measure for the development of artificial intelligence. The standard approach for computer game playing is to search for the best move from a given game state by using minimax search with static evaluation function. The static evaluation function is critical to the game playing performance but its design often relies on human expert players. This paper discusses how temporal differences (TD) learning can be used to construct a static evaluation function through self-playing and evaluates the effects for various parameter settings. The game of Kalah, a non-chance game of moderate complexity, is chosen as a testbed. The empirical result shows that TD learning is particularly promising for constructing a good evaluation function for the end games and can substantially improve the overall game playing performance in learning the entire game. DOI: 10.18495/comengapp.21.175184","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124931387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Engineering and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1