首页 > 最新文献

2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)最新文献

英文 中文
A semi-automated review classification system based on supervised machine learning 基于监督机器学习的半自动评论分类系统
Mukta Y. Raut, S. Barve
The field of opinion mining is expanding rapidly with the widespread use of internet for e-commerce and social interaction. One of the interesting use of opinion mining is in the field of online producer-consumer industry. The primary goal of the work presented in this paper is to perform a semi-automated sentiment classification on online product reviews for product evaluation using machine learning. We also aim to induce simplicity in sentiment classification; by using a method called Dual Sentiment Analysis, we relegate the need of using complex human annotations or very high end linguistic tools to solve the polarity shift problem in opinion classification. We also propose use of a pseudo-opposites dictionary based on our training corpus which is domain consistent with the training dataset.
随着互联网在电子商务和社会交往中的广泛应用,舆论挖掘的领域正在迅速扩大。意见挖掘的一个有趣应用是在线生产者-消费者行业。本文提出的工作的主要目标是使用机器学习对在线产品评论进行半自动情感分类,以进行产品评估。我们还旨在诱导情感分类的简单性;通过使用一种称为双情感分析的方法,我们减少了使用复杂的人工注释或非常高端的语言工具来解决意见分类中的极性转移问题的需要。我们还建议使用基于我们的训练语料库的伪对立字典,该词典与训练数据集是域一致的。
{"title":"A semi-automated review classification system based on supervised machine learning","authors":"Mukta Y. Raut, S. Barve","doi":"10.1109/ICISIM.2017.8122162","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122162","url":null,"abstract":"The field of opinion mining is expanding rapidly with the widespread use of internet for e-commerce and social interaction. One of the interesting use of opinion mining is in the field of online producer-consumer industry. The primary goal of the work presented in this paper is to perform a semi-automated sentiment classification on online product reviews for product evaluation using machine learning. We also aim to induce simplicity in sentiment classification; by using a method called Dual Sentiment Analysis, we relegate the need of using complex human annotations or very high end linguistic tools to solve the polarity shift problem in opinion classification. We also propose use of a pseudo-opposites dictionary based on our training corpus which is domain consistent with the training dataset.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Identifying features in opinion mining using bootstrap methodology 使用自举方法识别意见挖掘中的特征
Vishakha I. Sardar, Saroj Date
Many approaches are characteristic of name opinion is based only on the review of the single-shaft, ignoring non-trivial disparities in the distribution of the word of those around Corpus different. In Proposed work a new technique introduced to determine the characteristics of the idea of the magazine online by using the difference in those statistics through two and more than two different entities, a corpus of specific domain entity and a free domain of the corpus contrasted. Then determine the inconsistency through a measurement called relevance domain (DR), which characterizes the relevance of the term for a collection of manuscripts. Compile a list of candidates for the review of the terms of the domain corpus review of a set of rules of syntax dependency. For each function extracted candidates, Then evaluate the intrinsic domain and extrinsic domain relevance, in the entities of domain-dependent and independent respectively. The candidates which are different and more specific to the domain are confirmed as the hallmark of those.
许多方法的特点是名称的意见仅仅是基于单轴的审查,忽略了非琐碎的差异,在分布的那些语料库周围不同的词。本文提出了一种新技术,通过对两个或两个以上不同实体、特定领域实体的语料库和自由领域的语料库进行对比,利用这些统计数据的差异来确定在线杂志的思想特征。然后通过称为相关域(DR)的测量来确定不一致性,该测量表征了手稿集合术语的相关性。编制候选词列表,用于审查领域语料库中的术语,审查一组语法依赖规则。对于每个提取的候选函数,然后评估内在域和外在域的相关性,分别在实体的领域依赖和独立。这些候选是不同的,更具体的领域被确认为标志。
{"title":"Identifying features in opinion mining using bootstrap methodology","authors":"Vishakha I. Sardar, Saroj Date","doi":"10.1109/ICISIM.2017.8122152","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122152","url":null,"abstract":"Many approaches are characteristic of name opinion is based only on the review of the single-shaft, ignoring non-trivial disparities in the distribution of the word of those around Corpus different. In Proposed work a new technique introduced to determine the characteristics of the idea of the magazine online by using the difference in those statistics through two and more than two different entities, a corpus of specific domain entity and a free domain of the corpus contrasted. Then determine the inconsistency through a measurement called relevance domain (DR), which characterizes the relevance of the term for a collection of manuscripts. Compile a list of candidates for the review of the terms of the domain corpus review of a set of rules of syntax dependency. For each function extracted candidates, Then evaluate the intrinsic domain and extrinsic domain relevance, in the entities of domain-dependent and independent respectively. The candidates which are different and more specific to the domain are confirmed as the hallmark of those.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive traffic light control system 自适应交通灯控制系统
Swapnil Manchar Shinde
Conventional traffic light control systems are based on fixed time intervals of the traffic lights. These conventional fixed traffic light controllers have limitations and are less efficient because they use a hardware, which functions according to the program that lacks the flexibility of modification and adaptation on a real time basis. Thus due to the fixed time intervals of green and red signals there is excess and unnecessary waiting time on roads and vehicles consume more fuel. This eventually adds up to the environmental pollution and creates several health issues among the people on road and residing nearby. Also these conventional traffic light control systems do not have any provisions to provide any information on traffic densities on various roads, which leads to traffic congestions. Thus, to make traffic light controlling and traffic regulation more efficient, we exploit the emergence of new technique called as Adaptive Traffic Light Control System (ATLCS). The proposed system makes the use of network of array of sensors for sensing the traffic. On categorising this sensed traffic the timing intervals of red and green lights at each crossing of roads are intelligently decided and varied so as to keep the waiting time minimum. Thus, optimization of the traffic light switching increases the road capacity, saves time for travelling and prevents traffic congestions. The system also aims at incorporating special provisions for making immediate way for the emergency vehicles. GSM cell phone interface provides traffic information to drivers on demand and also helps in efficiently regulating the traffic and alternate route taking decisions. Efficiently regulated traffic also reduces pollution. The performance of this proposed system is compared with the conventional fixed time traffic light control system. The various performance evaluation parameters are efficient operation of sensor assembly, time saved per cycle, signal switching frequency, efficient emergency mode operation and the satisfactory operation of SMS using GSM mobile. The effectiveness of this system is shown and discussed in this paper by means of simulation results and on-board display.
传统的交通灯控制系统是基于交通灯的固定时间间隔。这些传统的固定交通灯控制器由于使用硬件,根据程序运行,缺乏实时修改和适应的灵活性,因此具有局限性,效率较低。因此,由于绿灯和红灯的时间间隔固定,道路上的等待时间过多和不必要,车辆消耗更多的燃料。这最终会造成环境污染,并在路上和附近居民中造成一些健康问题。此外,这些传统的交通灯控制系统没有提供任何有关不同道路交通密度的信息,从而导致交通堵塞。因此,为了使交通灯控制和交通调节更有效,我们利用了一种新技术,称为自适应交通灯控制系统(ATLCS)。该系统利用传感器阵列网络对交通流量进行感知。在对这些感知到的交通进行分类后,每个十字路口的红绿灯的时间间隔都被智能地决定和改变,以保持等待时间最少。因此,优化红绿灯开关可以增加道路通行能力,节省出行时间,防止交通拥堵。该制度还旨在纳入为紧急车辆让路的特别规定。GSM手机接口提供交通信息给司机的需求,也有助于有效地调节交通和替代路线的决策。有效的交通管制也减少了污染。将该系统的性能与传统的定时交通灯控制系统进行了比较。各项性能评价参数为传感器组件的高效运行、每周期节省的时间、信号切换频率、应急模式的高效运行和GSM手机短信的满意运行。通过仿真结果和车载显示,论证了该系统的有效性。
{"title":"Adaptive traffic light control system","authors":"Swapnil Manchar Shinde","doi":"10.1109/ICISIM.2017.8122189","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122189","url":null,"abstract":"Conventional traffic light control systems are based on fixed time intervals of the traffic lights. These conventional fixed traffic light controllers have limitations and are less efficient because they use a hardware, which functions according to the program that lacks the flexibility of modification and adaptation on a real time basis. Thus due to the fixed time intervals of green and red signals there is excess and unnecessary waiting time on roads and vehicles consume more fuel. This eventually adds up to the environmental pollution and creates several health issues among the people on road and residing nearby. Also these conventional traffic light control systems do not have any provisions to provide any information on traffic densities on various roads, which leads to traffic congestions. Thus, to make traffic light controlling and traffic regulation more efficient, we exploit the emergence of new technique called as Adaptive Traffic Light Control System (ATLCS). The proposed system makes the use of network of array of sensors for sensing the traffic. On categorising this sensed traffic the timing intervals of red and green lights at each crossing of roads are intelligently decided and varied so as to keep the waiting time minimum. Thus, optimization of the traffic light switching increases the road capacity, saves time for travelling and prevents traffic congestions. The system also aims at incorporating special provisions for making immediate way for the emergency vehicles. GSM cell phone interface provides traffic information to drivers on demand and also helps in efficiently regulating the traffic and alternate route taking decisions. Efficiently regulated traffic also reduces pollution. The performance of this proposed system is compared with the conventional fixed time traffic light control system. The various performance evaluation parameters are efficient operation of sensor assembly, time saved per cycle, signal switching frequency, efficient emergency mode operation and the satisfactory operation of SMS using GSM mobile. The effectiveness of this system is shown and discussed in this paper by means of simulation results and on-board display.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117160891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Musical instrument identification using SVM, MLP& AdaBoost with formal concept analysis 使用支持向量机、mlp和AdaBoost进行乐器识别,并进行形式概念分析
Swati D. Patil, P. S. Sanjekar
Musical instruments are consist of wide variety of domain so manual classification of these instruments is difficult and challenging task. To make the process of classifying musical instrument easy and less dependent on human supervision given system is designed. There are some algorithm are available for classification tsk from which we uses SVM, MLP and AdaBoost for better result. This system mainly designed for automatic classification of musical instrument using SVM, MLP and AdaBoost classifiers. Formal Concept Analysis technique is also applied to show relationship between musical instruments and their attributes. This system is evaluated with SVM, MLP and AdaBoost classifiers which show that AdaBoost gives better result than SVM and MLP.
乐器是由各种各样的领域组成的,因此对这些乐器进行人工分类是一项困难而具有挑战性的任务。为了使乐器分类过程简单易行,减少对人工监督的依赖,设计了给定的系统。有一些算法可以用于分类任务,我们使用SVM, MLP和AdaBoost来获得更好的结果。本系统主要采用SVM、MLP和AdaBoost分类器对乐器进行自动分类。形式概念分析技术也应用于乐器及其属性之间的关系。用支持向量机、MLP和AdaBoost分类器对该系统进行了评价,结果表明AdaBoost分类器的分类效果优于支持向量机和MLP分类器。
{"title":"Musical instrument identification using SVM, MLP& AdaBoost with formal concept analysis","authors":"Swati D. Patil, P. S. Sanjekar","doi":"10.1109/ICISIM.2017.8122157","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122157","url":null,"abstract":"Musical instruments are consist of wide variety of domain so manual classification of these instruments is difficult and challenging task. To make the process of classifying musical instrument easy and less dependent on human supervision given system is designed. There are some algorithm are available for classification tsk from which we uses SVM, MLP and AdaBoost for better result. This system mainly designed for automatic classification of musical instrument using SVM, MLP and AdaBoost classifiers. Formal Concept Analysis technique is also applied to show relationship between musical instruments and their attributes. This system is evaluated with SVM, MLP and AdaBoost classifiers which show that AdaBoost gives better result than SVM and MLP.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A review on contemporary security issues of cloud computing 当代云计算安全问题综述
Tejashri A. Patil, S. Pandey, A. T. Bhole
In cloud computing environment various forms of services allows users to store the information at remote location. But, there are many drawbacks as well because of the remote storage. However, it is plagued by security issues despite its numerous advantages. The paper presents a review of the current security issues in cloud computing environment like lack of control of data, lack of trust and multi-tenancy. Ensuring cloud data integrity is to be the big issue. To overcome unauthorized access of data users by Cloud Service Provider, integrity verification is done through Trusted Third Party Auditor. The proposed algorithm handles encrypted data and performs auditing without decrypting data. The algorithm performs auditing over encrypted data. As data is not decrypted by auditors during auditing process, proposed algorithm becomes more secure than existing algorithm. Third party auditing process removes auditing overhead of data owner.
在云计算环境中,各种形式的服务允许用户在远程位置存储信息。但是,由于远程存储,也有许多缺点。然而,尽管它有许多优点,安全问题却一直困扰着我们。本文综述了当前云计算环境中存在的数据缺乏控制、信任缺失和多租户等安全问题。确保云数据的完整性将是一个大问题。为了克服云服务提供商对数据用户的未经授权访问,完整性验证是通过可信第三方审计机构进行的。该算法在不解密数据的情况下处理加密数据并执行审计。该算法对加密的数据进行审计。由于审计人员在审计过程中不需要对数据进行解密,因此该算法比现有算法具有更高的安全性。第三方审计流程消除了数据所有者的审计开销。
{"title":"A review on contemporary security issues of cloud computing","authors":"Tejashri A. Patil, S. Pandey, A. T. Bhole","doi":"10.1109/ICISIM.2017.8122170","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122170","url":null,"abstract":"In cloud computing environment various forms of services allows users to store the information at remote location. But, there are many drawbacks as well because of the remote storage. However, it is plagued by security issues despite its numerous advantages. The paper presents a review of the current security issues in cloud computing environment like lack of control of data, lack of trust and multi-tenancy. Ensuring cloud data integrity is to be the big issue. To overcome unauthorized access of data users by Cloud Service Provider, integrity verification is done through Trusted Third Party Auditor. The proposed algorithm handles encrypted data and performs auditing without decrypting data. The algorithm performs auditing over encrypted data. As data is not decrypted by auditors during auditing process, proposed algorithm becomes more secure than existing algorithm. Third party auditing process removes auditing overhead of data owner.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhancing security in Tokenization using NGE for storage as a service 使用NGE作为存储服务来增强令牌化的安全性
Sunil Dilip Jain
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a strong encryption and authentication mechanism for maintaining the confidentiality and integrity of the data which leverages the security and privacy provided by Tokenization mechanism.
随着云计算的发展,全世界的存储都开始向云端转移。如此大的数据管理和安全是非常困难的,为了降低安全问题,token化被开发出来,但是为了维护token化服务器的安全性和安全性,需要一个强大的加密算法。本文提出了下一代加密算法,这是一种强大的加密和认证机制,用于维护数据的机密性和完整性,它利用了令牌化机制提供的安全性和隐私性。
{"title":"Enhancing security in Tokenization using NGE for storage as a service","authors":"Sunil Dilip Jain","doi":"10.1109/ICISIM.2017.8122179","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122179","url":null,"abstract":"With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a strong encryption and authentication mechanism for maintaining the confidentiality and integrity of the data which leverages the security and privacy provided by Tokenization mechanism.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128037887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DDFP: Duplicate detection and fragment placement in deduplication system for security and storage space DDFP:在重复数据删除系统中进行重复检测和片段放置,以提高安全性和存储空间
Jayashri Patil, S. Barve
Due to increasing volume of data in information technology, saving storage space and providing security to data has acquired more attention and popularity. In data processing and data mining, duplicates can effect severely. Data deduplication is a technique that eliminates duplicate data and store only one copy, promoting single instance storage. The main challenges are to identify maximum duplicate segment and selecting the storage nodes for distributing fragments of files. In this paper we proposed, Duplicate Detection and Fragment Placement (DDFP) a deduplication system that effectively eliminates duplicate data and fragments placement that allocates unique instances of a data file on storage nodes. For repeated data, reference pointer is used and only unique data is stored on the storage node. This increases the percentage of duplicate data detection. A fragment placement algorithm is used for placing fragments on different storage nodes. To select nodes T-coloring is used, Set T is used, which restricts the nodes that are at distance T from one another. DDFP considerably achieves duplicate elimination and obtain the high level of security on data fragments by storing fragments of the data file using T-coloring. This Selects the nodes that are not adjacent which prevent unauthorized access to data from other users.
随着信息技术的发展,数据量越来越大,节约存储空间和保障数据安全越来越受到人们的关注和重视。在数据处理和数据挖掘中,重复会产生严重的影响。重复数据删除是一种消除重复数据并只存储一个副本的技术,促进单实例存储。主要的挑战是识别最大重复段和选择用于分发文件片段的存储节点。在本文中,我们提出了重复检测和片段放置(DDFP),这是一种重复数据删除系统,可以有效地消除重复数据和片段放置,并在存储节点上分配数据文件的唯一实例。对于重复的数据,使用引用指针,只在存储节点上保存唯一的数据。这增加了重复数据检测的百分比。分片放置算法用于将分片放置在不同的存储节点上。为了选择节点,使用T着色,使用Set T,这限制了彼此之间距离为T的节点。通过使用t -着色存储数据文件的片段,DDFP相当程度地实现了重复消除,并获得了数据片段的高级别安全性。选择不相邻的节点,以防止其他用户对数据进行未经授权的访问。
{"title":"DDFP: Duplicate detection and fragment placement in deduplication system for security and storage space","authors":"Jayashri Patil, S. Barve","doi":"10.1109/ICISIM.2017.8122177","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122177","url":null,"abstract":"Due to increasing volume of data in information technology, saving storage space and providing security to data has acquired more attention and popularity. In data processing and data mining, duplicates can effect severely. Data deduplication is a technique that eliminates duplicate data and store only one copy, promoting single instance storage. The main challenges are to identify maximum duplicate segment and selecting the storage nodes for distributing fragments of files. In this paper we proposed, Duplicate Detection and Fragment Placement (DDFP) a deduplication system that effectively eliminates duplicate data and fragments placement that allocates unique instances of a data file on storage nodes. For repeated data, reference pointer is used and only unique data is stored on the storage node. This increases the percentage of duplicate data detection. A fragment placement algorithm is used for placing fragments on different storage nodes. To select nodes T-coloring is used, Set T is used, which restricts the nodes that are at distance T from one another. DDFP considerably achieves duplicate elimination and obtain the high level of security on data fragments by storing fragments of the data file using T-coloring. This Selects the nodes that are not adjacent which prevent unauthorized access to data from other users.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134526087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A semantic network approach to affect analysis: A case study on depression 情感分析的语义网络方法:以抑郁症为例
Rekha Sugandhi, A. Mahajan
This paper discusses the semantic network approach to identify affects in natural language input and focusses on representing spatio-temporal affect information. It has been observed that this approach performs better in analysis of affect information that can be effectively utilized for the prognosis of human cognitive behavior. The research work in this paper describes a new approach towards simple representation of multi-dimensional affect data that facilitates the provision of emotions or affects with varying granularity. The analysis algorithm thus executed on the semantic representation generates temporally significant behavior patterns. The analysis of the semantic network generates temporally significant behavior patterns. The framework has been designed to be extensible over a wide variety of applications in cognitive computing.
本文讨论了自然语言输入中情感识别的语义网络方法,重点研究了时空情感信息的表征。已经观察到,这种方法在分析影响信息方面表现更好,可以有效地用于人类认知行为的预后。本文的研究工作描述了一种简单表示多维情感数据的新方法,该方法有助于提供不同粒度的情感或情感。因此,在语义表示上执行的分析算法生成时间上重要的行为模式。对语义网络的分析产生了具有时间意义的行为模式。该框架被设计为可扩展到认知计算中的各种应用程序。
{"title":"A semantic network approach to affect analysis: A case study on depression","authors":"Rekha Sugandhi, A. Mahajan","doi":"10.1109/ICISIM.2017.8122182","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122182","url":null,"abstract":"This paper discusses the semantic network approach to identify affects in natural language input and focusses on representing spatio-temporal affect information. It has been observed that this approach performs better in analysis of affect information that can be effectively utilized for the prognosis of human cognitive behavior. The research work in this paper describes a new approach towards simple representation of multi-dimensional affect data that facilitates the provision of emotions or affects with varying granularity. The analysis algorithm thus executed on the semantic representation generates temporally significant behavior patterns. The analysis of the semantic network generates temporally significant behavior patterns. The framework has been designed to be extensible over a wide variety of applications in cognitive computing.","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125376716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image inconsistency detection using histogram of orientated gradient (HOG) 基于方向梯度直方图的图像不一致检测
M. Hilal, P. Yannawar, A. Gaikwad
Today there are various types of image editing tools which make totally changes in image with free of cost, Image has performed a significant role in Human life but image has easily fiddle using image processing software. Fiddle image has difficult to detect that it is original or not for this reasons the image forgery detection topic is active research work nowadays. The proposed of this paper to detect image inconsistency using Histogram of Orientated Gradient (HOG) method which help us to determining which block has manipulation of an images. The paper conducting with many stages namely acquisition, preprocessing, and feature extraction and matching the performance of this system are based on false accepted rate (FAR) and false reject rate (FRR)
今天有各种各样的图像编辑工具,它们可以免费改变图像,图像在人类生活中扮演着重要的角色,但图像处理软件很容易篡改图像。由于伪造图像的真伪难以检测,因此图像伪造检测是当今研究工作的热点。本文提出了使用定向梯度直方图(HOG)方法检测图像不一致的方法,该方法可以帮助我们确定哪个块对图像进行了操作。本文通过采集、预处理、特征提取等多个阶段进行研究,并根据系统的误接受率(FAR)和误拒绝率(FRR)对系统的性能进行匹配。
{"title":"Image inconsistency detection using histogram of orientated gradient (HOG)","authors":"M. Hilal, P. Yannawar, A. Gaikwad","doi":"10.1109/ICISIM.2017.8122141","DOIUrl":"https://doi.org/10.1109/ICISIM.2017.8122141","url":null,"abstract":"Today there are various types of image editing tools which make totally changes in image with free of cost, Image has performed a significant role in Human life but image has easily fiddle using image processing software. Fiddle image has difficult to detect that it is original or not for this reasons the image forgery detection topic is active research work nowadays. The proposed of this paper to detect image inconsistency using Histogram of Orientated Gradient (HOG) method which help us to determining which block has manipulation of an images. The paper conducting with many stages namely acquisition, preprocessing, and feature extraction and matching the performance of this system are based on false accepted rate (FAR) and false reject rate (FRR)","PeriodicalId":139000,"journal":{"name":"2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)","volume":"3 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116810485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 1st International Conference on Intelligent Systems and Information Management (ICISIM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1