首页 > 最新文献

J. Chem. Inf. Comput. Sci.最新文献

英文 中文
Pathological Voice Signal Analysis Using Machine Learning Based Approaches 基于机器学习的病理语音信号分析方法
Pub Date : 2017-11-22 DOI: 10.5539/cis.v11n1p8
Yahia Alemami, L. Almazaydeh
Voice signal analysis is becoming one of the most significant examination in clinical practice due to the importance of extracting related parameters to reflect the patient's health. In this regard, various acoustic studies have been revealed that the analysis of laryngeal, respiratory and articulatory function may be efficient as an early indicator in the diagnosis of Parkinson disease (PD). PD is a common chronic neurodegenerative disorder, which affects a central nervous system and it is characterized by progressive loss of muscle control. Tremor, movement and speech disorders are the main symptoms of PD. The diagnosis decision of PD is obtained by continued clinical observation which relies on expert human observer. Therefore, an additional diagnosis method is desirable for most comfortable and timely detection of PD as well as faster treatment is needed. In this study, we develop and validate automated classification algorithms, which are based on Naive Bayes and K- Nearest Neighbors (KNN) using voice signal measurements to predict PD. According to the results, the diagnostic performance provided by the automated classification algorithm using Naive Bayes was superior to that of the KNN and it is useful as a predictive tool for PD screening with a high degree of accuracy, approximately 93.3%.
由于提取相关参数反映患者健康状况的重要性,语音信号分析已成为临床实践中最重要的检查之一。在这方面,各种声学研究表明,喉、呼吸和发音功能的分析可能是帕金森病(PD)诊断的早期指标。PD是一种常见的慢性神经退行性疾病,它影响中枢神经系统,其特征是肌肉逐渐失去控制。震颤、运动和语言障碍是帕金森病的主要症状。PD的诊断决策是依靠专家观察者的持续临床观察得出的。因此,需要一种额外的诊断方法来最舒适和及时地检测PD,并需要更快的治疗。在本研究中,我们开发并验证了基于朴素贝叶斯和K近邻(KNN)的自动分类算法,该算法使用语音信号测量来预测PD。结果表明,基于朴素贝叶斯的自动分类算法的诊断性能优于KNN,可作为PD筛查的预测工具,准确率高达93.3%。
{"title":"Pathological Voice Signal Analysis Using Machine Learning Based Approaches","authors":"Yahia Alemami, L. Almazaydeh","doi":"10.5539/cis.v11n1p8","DOIUrl":"https://doi.org/10.5539/cis.v11n1p8","url":null,"abstract":"Voice signal analysis is becoming one of the most significant examination in clinical practice due to the importance of extracting related parameters to reflect the patient's health. In this regard, various acoustic studies have been revealed that the analysis of laryngeal, respiratory and articulatory function may be efficient as an early indicator in the diagnosis of Parkinson disease (PD). PD is a common chronic neurodegenerative disorder, which affects a central nervous system and it is characterized by progressive loss of muscle control. Tremor, movement and speech disorders are the main symptoms of PD. The diagnosis decision of PD is obtained by continued clinical observation which relies on expert human observer. Therefore, an additional diagnosis method is desirable for most comfortable and timely detection of PD as well as faster treatment is needed. In this study, we develop and validate automated classification algorithms, which are based on Naive Bayes and K- Nearest Neighbors (KNN) using voice signal measurements to predict PD. According to the results, the diagnostic performance provided by the automated classification algorithm using Naive Bayes was superior to that of the KNN and it is useful as a predictive tool for PD screening with a high degree of accuracy, approximately 93.3%.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"37 1","pages":"8-13"},"PeriodicalIF":0.0,"publicationDate":"2017-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91210933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions 恶意USB MITM:基于物理访问的网络攻击及其实用安全解决方案
Pub Date : 2017-11-22 DOI: 10.5539/cis.v11n1p1
L. Almazaydeh, Jun Zhang, Peiqiao Wu, Ruoqi Wei, Yisheng Cheng, K. Elleithy
Due its universality, Universal Serial Bus (USB) has become the major connecting port of modern computers. Programmability provides convenience between hardware vendors and operating system vendors to develop their products and related firmware.  However, it leads to high risk by opening a door for a potential vulnerability. In the past three years, researchers have attempt to stop and prevent the security influence of compromised products, reported this issue and their suggestion to chips vendors, peripheral vendors and OS vendor, in order to patch up existing vulnerable device and avoid known exploits in the future. In result, none of those vendors could successfully overcome the vulnerabilities, with inactive response to either the reports by security researchers or incidents by hacker communities. Thus, third party organizations and research teams start to take over the problem of "BadUSB" and focus on discovering its solution. In this paper ,we introduce an approach to protect against BadUSB. A comparison between the presented scheme and the existing defense methods demonstrates that the presented approach outperforms the reported approaches in literature.
由于其通用性,通用串行总线(USB)已成为现代计算机的主要连接端口。可编程性为硬件供应商和操作系统供应商开发其产品和相关固件提供了便利。然而,它为潜在的漏洞打开了一扇门,从而导致高风险。在过去的三年里,研究人员一直试图阻止和防止受感染产品的安全影响,向芯片供应商、外设供应商和操作系统供应商报告了这个问题,并提出了他们的建议,以便修补现有的易受攻击的设备,避免未来已知的漏洞。结果,这些供应商都无法成功克服这些漏洞,对安全研究人员的报告或黑客社区的事件都没有做出积极的反应。因此,第三方组织和研究团队开始接管“BadUSB”的问题,并专注于发现其解决方案。在本文中,我们介绍了一种防止BadUSB的方法。将所提出的方案与现有的防御方法进行比较,表明所提出的方法优于文献中报道的方法。
{"title":"Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions","authors":"L. Almazaydeh, Jun Zhang, Peiqiao Wu, Ruoqi Wei, Yisheng Cheng, K. Elleithy","doi":"10.5539/cis.v11n1p1","DOIUrl":"https://doi.org/10.5539/cis.v11n1p1","url":null,"abstract":"Due its universality, Universal Serial Bus (USB) has become the major connecting port of modern computers. Programmability provides convenience between hardware vendors and operating system vendors to develop their products and related firmware.  However, it leads to high risk by opening a door for a potential vulnerability. In the past three years, researchers have attempt to stop and prevent the security influence of compromised products, reported this issue and their suggestion to chips vendors, peripheral vendors and OS vendor, in order to patch up existing vulnerable device and avoid known exploits in the future. In result, none of those vendors could successfully overcome the vulnerabilities, with inactive response to either the reports by security researchers or incidents by hacker communities. Thus, third party organizations and research teams start to take over the problem of \"BadUSB\" and focus on discovering its solution. In this paper ,we introduce an approach to protect against BadUSB. A comparison between the presented scheme and the existing defense methods demonstrates that the presented approach outperforms the reported approaches in literature.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"16 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82966319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study to the Semantics of Ontology Chain-Based Data Access Control versus Conventional Methods in Healthcare Applications 医疗保健应用中基于本体链的数据访问控制与传统方法的语义比较研究
Pub Date : 2017-10-31 DOI: 10.5539/cis.v10n4p1
Esraa Omran, David Nelson, A. Roumani
The necessity of having intelligent methodology to access databases in networks has become more apparent in the age of distributed networks. Using semantics and ontologies can be highly helpful in developing such methodologies, as they provide the required classifications and mined information. The necessities that are required by the database administrator to build durable, reliable, and flexible data access methodology have been highly appreciated. This study that compares between the proposed system and conventional methods, for example Role Based Access Control (RBAC) and classical chain-based methods. The comparison is done using applications in the healthcare sector. This study is based on real surveys that have been conducted in an active hospital in the State of Kuwait.
在分布式网络时代,使用智能方法访问网络中的数据库的必要性变得更加明显。使用语义和本体对于开发这种方法非常有帮助,因为它们提供了所需的分类和挖掘的信息。数据库管理员构建持久、可靠和灵活的数据访问方法所必需的必要条件得到了高度赞赏。本文将该系统与传统的基于角色的访问控制(RBAC)和经典的基于链的方法进行了比较。比较是使用医疗保健部门的应用程序完成的。这项研究基于在科威特国一家活跃医院进行的真实调查。
{"title":"A Comparative Study to the Semantics of Ontology Chain-Based Data Access Control versus Conventional Methods in Healthcare Applications","authors":"Esraa Omran, David Nelson, A. Roumani","doi":"10.5539/cis.v10n4p1","DOIUrl":"https://doi.org/10.5539/cis.v10n4p1","url":null,"abstract":"The necessity of having intelligent methodology to access databases in networks has become more apparent in the age of distributed networks. Using semantics and ontologies can be highly helpful in developing such methodologies, as they provide the required classifications and mined information. The necessities that are required by the database administrator to build durable, reliable, and flexible data access methodology have been highly appreciated. This study that compares between the proposed system and conventional methods, for example Role Based Access Control (RBAC) and classical chain-based methods. The comparison is done using applications in the healthcare sector. This study is based on real surveys that have been conducted in an active hospital in the State of Kuwait.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"53 1","pages":"1-15"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84561371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realization of Dynamic Interface and High Performance Data Retrieval 动态接口与高性能数据检索的实现
Pub Date : 2017-10-31 DOI: 10.5539/cis.v10n4p16
H. Jiang, Chang Wan
This paper introduces a method to realize dynamic interface, and designs a database storage model based on XML field technology to realize convenient data storage, any combination condition retrieval function and how to improve the retrieval speed in this kind of storage model. Usually a business system needs to provide information entry and retrieval functions, software designers have to design the appropriate entry items, input interface and retrieval functions for each business system and spend too much time on the repetitive works. And later engineers have to maintain the changing needs of the entry project, so we can apply the dynamic interface technology to achieve the customize needs of input items by the user, reducing the time of the repetitive works. Dynamic interface technology includes the realization of database storage and high performance data retrieval. This paper explores a storage model based on XML database to realize common and efficient storage and discuss on how to improve the retrieval speed in this kind of storage model.
介绍了一种动态接口的实现方法,设计了一种基于XML字段技术的数据库存储模型,实现了方便的数据存储和任意组合条件的检索功能,以及如何在这种存储模型中提高检索速度。通常一个业务系统需要提供信息录入和检索功能,软件设计者必须为每个业务系统设计合适的录入项、输入界面和检索功能,花费大量的时间在重复的工作上。而后期工程师需要维护输入项目的不断变化的需求,因此我们可以应用动态界面技术来实现用户对输入项目的定制需求,减少重复工作的时间。动态接口技术包括数据库存储和高性能数据检索的实现。本文探索了一种基于XML数据库的存储模式,以实现通用、高效的存储,并对如何提高这种存储模式下的检索速度进行了探讨。
{"title":"Realization of Dynamic Interface and High Performance Data Retrieval","authors":"H. Jiang, Chang Wan","doi":"10.5539/cis.v10n4p16","DOIUrl":"https://doi.org/10.5539/cis.v10n4p16","url":null,"abstract":"This paper introduces a method to realize dynamic interface, and designs a database storage model based on XML field technology to realize convenient data storage, any combination condition retrieval function and how to improve the retrieval speed in this kind of storage model. Usually a business system needs to provide information entry and retrieval functions, software designers have to design the appropriate entry items, input interface and retrieval functions for each business system and spend too much time on the repetitive works. And later engineers have to maintain the changing needs of the entry project, so we can apply the dynamic interface technology to achieve the customize needs of input items by the user, reducing the time of the repetitive works. Dynamic interface technology includes the realization of database storage and high performance data retrieval. This paper explores a storage model based on XML database to realize common and efficient storage and discuss on how to improve the retrieval speed in this kind of storage model.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"13 1","pages":"16-21"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82901447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approximation Method of Bézier Curve bsamizier曲线的一种近似方法
Pub Date : 2017-10-31 DOI: 10.5539/cis.v10n4p67
Zhi Wu, Chuanning Song, Deng Bao
It is proved that the linear space constructed by power base is a banach space under 2-norm by using approximation method. For the Bezier curve--the elements in banach space, the linear combination of the low-order S power base is used to approximate optimal the high-order Bernstein base function. The original Bezier curve is instituted by the linear combination of low-order S power base and the optimal approximation element of the original Bezier curve is obtained.
用逼近方法证明了幂基构造的线性空间是2范数下的巴拿赫空间。对于Bezier曲线—巴拿赫空间中的元素,采用低阶S幂基的线性组合来近似优化高阶Bernstein基函数。通过低阶S次基的线性组合建立了原Bezier曲线,得到了原Bezier曲线的最优逼近元。
{"title":"An Approximation Method of Bézier Curve","authors":"Zhi Wu, Chuanning Song, Deng Bao","doi":"10.5539/cis.v10n4p67","DOIUrl":"https://doi.org/10.5539/cis.v10n4p67","url":null,"abstract":"It is proved that the linear space constructed by power base is a banach space under 2-norm by using approximation method. For the Bezier curve--the elements in banach space, the linear combination of the low-order S power base is used to approximate optimal the high-order Bernstein base function. The original Bezier curve is instituted by the linear combination of low-order S power base and the optimal approximation element of the original Bezier curve is obtained.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"26 1","pages":"67-72"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75112480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community Detection Using Node Attributes and Structural Patterns in Online Social Networks 基于节点属性和结构模式的在线社交网络社区检测
Pub Date : 2017-10-31 DOI: 10.5539/cis.v10n4p50
B. C. Singh, Mohammad Muntasir Rahman, Md. Sipon Miah, M. K. Baowaly
Community detection in online social networks is a difficult but important phenomenon in term of revealing hidden relationships patterns among people so that we can understand human behaviors in term of social-economics perspectives. Community detection algorithms allow us to discover these types of patterns in online social networks. Identifying and detecting communities are not only of particular importance but also have immediate applications. For this reason, researchers have been intensively investigated to implement efficient algorithms to detect community in recent years. In this paper, we introduce set theory to address the community detection problem considering node attributes and network structural patterns. We also formulate probability theory to detect the overlapping community in online social network. Furthermore, we extend our focus on the comparative analysis on some existing community detection methods, which basically consider node attributes and edge contents for detecting community. We conduct comprehensive analysis on our framework so that we justify the performance of our proposed model. The experimental results show the effectiveness of the proposed approach.
在线社交网络中的社区检测是一个困难但重要的现象,它揭示了人们之间隐藏的关系模式,从而使我们能够从社会经济学的角度理解人类的行为。社区检测算法允许我们在在线社交网络中发现这些类型的模式。识别和探测社区不仅特别重要,而且具有直接的应用。因此,近年来研究人员一直在深入研究如何实现高效的社区检测算法。本文将集合理论引入到考虑节点属性和网络结构模式的社区检测问题中。我们还建立了概率论来检测在线社交网络中的重叠社区。此外,我们将重点扩展到比较分析现有的一些社区检测方法,这些方法基本上是考虑节点属性和边缘内容来检测社区。我们对我们的框架进行全面的分析,以证明我们所建议的模型的性能。实验结果表明了该方法的有效性。
{"title":"Community Detection Using Node Attributes and Structural Patterns in Online Social Networks","authors":"B. C. Singh, Mohammad Muntasir Rahman, Md. Sipon Miah, M. K. Baowaly","doi":"10.5539/cis.v10n4p50","DOIUrl":"https://doi.org/10.5539/cis.v10n4p50","url":null,"abstract":"Community detection in online social networks is a difficult but important phenomenon in term of revealing hidden relationships patterns among people so that we can understand human behaviors in term of social-economics perspectives. Community detection algorithms allow us to discover these types of patterns in online social networks. Identifying and detecting communities are not only of particular importance but also have immediate applications. For this reason, researchers have been intensively investigated to implement efficient algorithms to detect community in recent years. In this paper, we introduce set theory to address the community detection problem considering node attributes and network structural patterns. We also formulate probability theory to detect the overlapping community in online social network. Furthermore, we extend our focus on the comparative analysis on some existing community detection methods, which basically consider node attributes and edge contents for detecting community. We conduct comprehensive analysis on our framework so that we justify the performance of our proposed model. The experimental results show the effectiveness of the proposed approach.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"186 1","pages":"50-59"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77482683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Linguistic Steganalysis Approach Base on Source Features of Text and Immune Mechanism 基于文本源特征和免疫机制的语言隐写分析方法
Pub Date : 2017-10-31 DOI: 10.5539/cis.v10n4p60
Licai Zhu
Linguistic steganalysis is a technique that discovering potentially hidden information embedded through using linguistically in plain text using. Varieties of syntax and multi-meanings of semantics for linguistics augment the difficulty of linguistic steganalysis intensely, thereby it is a challenge area. In this paper, we propose a novel steganalysis method for linguistics based on immune. This method has two attributions: i). basis statistical features of text are employed for blind steganalysis ii). immune technique is chosen to build a two-level detection mechanism to detect two categories of stego text respectively, one of which is Success-Stego-text and another is False-Stego-text. Appropriate detections are generated and preferable features are signed . Experiments prove the approach has higher accuracy than current steganalysis algorithms. Especially when the segment size of text is greater than 3kB, the accuracies of detecting for natural text and stego text are both more than 95%.
语言隐写分析是一种通过在纯文本中使用语言来发现潜在隐藏信息的技术。语言学中语法的多样性和语义的多义性极大地增加了语言隐写分析的难度,是一个具有挑战性的领域。本文提出了一种基于免疫的语言学隐写分析方法。该方法具有两个属性:1)利用文本的基本统计特征进行盲隐写分析;2)采用免疫技术构建两级检测机制,分别检测成功隐写文本和假隐写文本两类隐写文本。生成适当的检测并签名优选的特征。实验证明,该方法比现有的隐写分析算法具有更高的准确率。特别是当文本的片段大小大于3kB时,自然文本和隐文本的检测准确率都在95%以上。
{"title":"A Linguistic Steganalysis Approach Base on Source Features of Text and Immune Mechanism","authors":"Licai Zhu","doi":"10.5539/cis.v10n4p60","DOIUrl":"https://doi.org/10.5539/cis.v10n4p60","url":null,"abstract":"Linguistic steganalysis is a technique that discovering potentially hidden information embedded through using linguistically in plain text using. Varieties of syntax and multi-meanings of semantics for linguistics augment the difficulty of linguistic steganalysis intensely, thereby it is a challenge area. In this paper, we propose a novel steganalysis method for linguistics based on immune. This method has two attributions: i). basis statistical features of text are employed for blind steganalysis ii). immune technique is chosen to build a two-level detection mechanism to detect two categories of stego text respectively, one of which is Success-Stego-text and another is False-Stego-text. Appropriate detections are generated and preferable features are signed . Experiments prove the approach has higher accuracy than current steganalysis algorithms. Especially when the segment size of text is greater than 3kB, the accuracies of detecting for natural text and stego text are both more than 95%.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"92 25 1","pages":"60-66"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81268741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method of Semantic Hidden Reduction Based on Collocation 一种基于搭配的语义隐约简方法
Pub Date : 2017-10-31 DOI: 10.5539/cis.v10n4p73
Licai Zhu
Semantic hiding is the technology of using semantic knowledge to embed secret information into text carrier. Among the many methods of semantic hiding, "synonym substitution" is paid more and more attention by semantic hiding. The main idea of this method is to hide the secret information by replacing synonyms in text so as to retain its original meaning as much as possible. In order to effectively restore hidden information, we need to find the synonym replacement location as accurately as possible, so it is very important to recognize the collocation of words. So far, however, there is no effective way to identify and match Natural Language Processing, that is, it is very difficult to tell exactly whether or not the words in the text have been replaced. In this paper, a hidden reduction method based on collocation is proposed. By analyzing the characteristics of synonyms and their collocation, this paper treats their relation as the relation between the pairs of samples in statistical sense. According to the nature of the statistic, we design several decision features to identify the collocations. At the same time, we introduce the form of point mutual information in the information theory as a feature to use the independence of quantifier pairs. In order to recognize word collocation effectively, this paper combines these features, and uses genetic algorithm to get the recognition degree of each feature. Then, a replacement recognition system based on immune abnormality mechanism is designed. Synonyms for collocation are regarded as "normal", while substitutions are regarded as "anomalies"". The experimental samples are generated by semantic hidden software TLEX. To better render the restore process, we rewrote the TLEX to add the key selection module.
语义隐藏是利用语义知识将秘密信息嵌入到文本载体中的技术。在众多的语义隐藏方法中,“同义词替换”越来越受到语义隐藏的重视。这种方法的主要思想是通过替换文本中的同义词来隐藏秘密信息,从而尽可能地保留其原意。为了有效地恢复隐藏的信息,我们需要尽可能准确地找到同义词的替换位置,因此识别单词的搭配非常重要。然而,到目前为止,还没有有效的方法来识别和匹配自然语言处理,也就是说,很难准确地判断文本中的单词是否被替换了。提出了一种基于搭配的隐约简方法。本文通过分析同义词及其搭配的特点,将其关系视为统计意义上的成对样本关系。根据统计量的性质,设计了若干决策特征来识别组合。同时,我们引入信息论中点互信息的形式作为特征来利用量词对的独立性。为了有效地识别单词搭配,本文将这些特征结合起来,并使用遗传算法得到每个特征的识别程度。然后,设计了基于免疫异常机制的替代识别系统。搭配的同义词被视为“正常”,而替换则被视为“异常”。实验样本由语义隐藏软件TLEX生成。为了更好地呈现还原过程,我们重写了TLEX以添加键选择模块。
{"title":"A Method of Semantic Hidden Reduction Based on Collocation","authors":"Licai Zhu","doi":"10.5539/cis.v10n4p73","DOIUrl":"https://doi.org/10.5539/cis.v10n4p73","url":null,"abstract":"Semantic hiding is the technology of using semantic knowledge to embed secret information into text carrier. Among the many methods of semantic hiding, \"synonym substitution\" is paid more and more attention by semantic hiding. The main idea of this method is to hide the secret information by replacing synonyms in text so as to retain its original meaning as much as possible. In order to effectively restore hidden information, we need to find the synonym replacement location as accurately as possible, so it is very important to recognize the collocation of words. So far, however, there is no effective way to identify and match Natural Language Processing, that is, it is very difficult to tell exactly whether or not the words in the text have been replaced. In this paper, a hidden reduction method based on collocation is proposed. By analyzing the characteristics of synonyms and their collocation, this paper treats their relation as the relation between the pairs of samples in statistical sense. According to the nature of the statistic, we design several decision features to identify the collocations. At the same time, we introduce the form of point mutual information in the information theory as a feature to use the independence of quantifier pairs. In order to recognize word collocation effectively, this paper combines these features, and uses genetic algorithm to get the recognition degree of each feature. Then, a replacement recognition system based on immune abnormality mechanism is designed. Synonyms for collocation are regarded as \"normal\", while substitutions are regarded as \"anomalies\"\". The experimental samples are generated by semantic hidden software TLEX. To better render the restore process, we rewrote the TLEX to add the key selection module.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"1 1","pages":"73-80"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91355729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Sensing, Gis and Cellular Automata for Urban Growth Simulation 遥感、地理信息系统和元胞自动机在城市增长模拟中的应用
Pub Date : 2017-10-31 DOI: 10.5539/cis.v10n4p38
Munira Al-Ageili, Malek Mouhoub, J. Piwowar
Cities are complex spatial systems and modeling their dynamics of growth using traditional modeling techniques is a challenging task. Cellular automata (CA) have been widely used for modeling urban growth because of their computational simplicity, their explicit representation of time and space and their ability to generate complex patterns from the interaction of simple components of the system using simple rules. Integrating GIS tools and remote sensing data with CA has the potential to provide realistic simulation of the future urban growth of cities. The proposed approach is applied to model the growth of the City of Montreal. Land use/land cover maps derived from Landsat data acquired in 1975 and 1990 were used to train a CA model which was then used to project the land use in 2005.  A comparison of the projected and actual land uses for 2005 is presented and discussed.
城市是一个复杂的空间系统,使用传统的建模技术对其增长动态进行建模是一项具有挑战性的任务。元胞自动机(CA)由于其计算简单、对时间和空间的明确表示以及能够使用简单规则从系统的简单组件的相互作用中生成复杂模式而被广泛用于城市增长建模。将地理信息系统工具和遥感数据与CA相结合,有可能提供对未来城市增长的真实模拟。将提出的方法应用于蒙特利尔市的发展模型。从1975年和1990年获得的Landsat数据获得的土地利用/土地覆盖图被用于训练CA模型,然后用于2005年的土地利用预测。提出并讨论了2005年预计土地利用与实际土地利用的比较。
{"title":"Remote Sensing, Gis and Cellular Automata for Urban Growth Simulation","authors":"Munira Al-Ageili, Malek Mouhoub, J. Piwowar","doi":"10.5539/cis.v10n4p38","DOIUrl":"https://doi.org/10.5539/cis.v10n4p38","url":null,"abstract":"Cities are complex spatial systems and modeling their dynamics of growth using traditional modeling techniques is a challenging task. Cellular automata (CA) have been widely used for modeling urban growth because of their computational simplicity, their explicit representation of time and space and their ability to generate complex patterns from the interaction of simple components of the system using simple rules. Integrating GIS tools and remote sensing data with CA has the potential to provide realistic simulation of the future urban growth of cities. The proposed approach is applied to model the growth of the City of Montreal. Land use/land cover maps derived from Landsat data acquired in 1975 and 1990 were used to train a CA model which was then used to project the land use in 2005.  A comparison of the projected and actual land uses for 2005 is presented and discussed.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"85 1","pages":"38-49"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73439518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Marketplaces for Digital Data: Quo Vadis? 数字数据市场:现状如何?
Pub Date : 2017-10-31 DOI: 10.5539/cis.v10n4p22
F. Stahl, Fabian Schomm, Lara Vomfell, G. Vossen
The newly emerging market for data is insufficiently researched up to now. The survey presented in this work - which is the third iteration of a a series of studies that started in 2012 - intends to provide a deeper understanding of this emerging type of market. Research questions concerning the provider manifestations and the commoditization of data are identified. The findings indicate that data providers focus on limited business models and that data remains individualized and differentiated. Nevertheless, a trend towards commoditization for certain types of data can be foreseen, which even allows an outlook to further developments in this area.
对于新兴的数据市场,目前的研究还不够充分。这项研究是2012年开始的一系列研究的第三次迭代,旨在对这种新兴市场类型提供更深入的了解。确定了有关提供者表现和数据商品化的研究问题。研究结果表明,数据提供者专注于有限的商业模式,数据仍然是个性化和差异化的。然而,可以预见某些类型数据的商品化趋势,甚至可以展望这一领域的进一步发展。
{"title":"Marketplaces for Digital Data: Quo Vadis?","authors":"F. Stahl, Fabian Schomm, Lara Vomfell, G. Vossen","doi":"10.5539/cis.v10n4p22","DOIUrl":"https://doi.org/10.5539/cis.v10n4p22","url":null,"abstract":"The newly emerging market for data is insufficiently researched up to now. The survey presented in this work - which is the third iteration of a a series of studies that started in 2012 - intends to provide a deeper understanding of this emerging type of market. Research questions concerning the provider manifestations and the commoditization of data are identified. The findings indicate that data providers focus on limited business models and that data remains individualized and differentiated. Nevertheless, a trend towards commoditization for certain types of data can be foreseen, which even allows an outlook to further developments in this area.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"73 1","pages":"22-37"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83966975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
J. Chem. Inf. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1