首页 > 最新文献

The International Arab Journal of Information Technology最新文献

英文 中文
An Effective Framework for Speech and Music Segregation 语言和音乐隔离的有效框架
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/9
Sidra Sajid, A. Javed, Aun Irtaza
Speech and music segregation from a single channel is a challenging task due to background interference and intermingled signals of voice and music channels. It is of immense importance due to its utility in wide range of applications such as music information retrieval, singer identification, lyrics recognition and alignment. This paper presents an effective method for speech and music segregation. Considering the repeating nature of music, we first detect the local repeating structures in the signal using a locally defined window for each segment. After detecting the repeating structure, we extract them and perform separation using a soft time-frequency mask. We apply an ideal binary mask to enhance the speech and music intelligibility. We evaluated the proposed method on the mixtures set at -5 dB, 0 dB, 5 dB from Multimedia Information Retrieval1000 clips (MIR-1K) dataset. Experimental results demonstrate that the proposed method for speech and music segregation outperforms the existing state-of-the-art methods in terms of Global-Normalized-Signal-to-Distortion Ratio (GNSDR) values.
由于背景干扰和语音和音乐信道的混杂信号,从单个信道中分离语音和音乐是一项具有挑战性的任务。由于其在音乐信息检索、歌手识别、歌词识别和对齐等方面的广泛应用,它具有巨大的重要性。本文提出了一种有效的语音和音乐分离方法。考虑到音乐的重复性质,我们首先使用每个片段的局部定义窗口来检测信号中的局部重复结构。在检测到重复结构后,我们提取它们并使用软时频掩模进行分离。我们采用理想的二值掩模来提高语音和音乐的可理解性。我们对多媒体信息检索1000个片段(MIR-1K)数据集中-5 dB、0 dB和5 dB的混合设置进行了评估。实验结果表明,所提出的语音和音乐分离方法在全局归一化信失真比(GNSDR)值方面优于现有的最先进的方法。
{"title":"An Effective Framework for Speech and Music Segregation","authors":"Sidra Sajid, A. Javed, Aun Irtaza","doi":"10.34028/iajit/17/4/9","DOIUrl":"https://doi.org/10.34028/iajit/17/4/9","url":null,"abstract":"Speech and music segregation from a single channel is a challenging task due to background interference and intermingled signals of voice and music channels. It is of immense importance due to its utility in wide range of applications such as music information retrieval, singer identification, lyrics recognition and alignment. This paper presents an effective method for speech and music segregation. Considering the repeating nature of music, we first detect the local repeating structures in the signal using a locally defined window for each segment. After detecting the repeating structure, we extract them and perform separation using a soft time-frequency mask. We apply an ideal binary mask to enhance the speech and music intelligibility. We evaluated the proposed method on the mixtures set at -5 dB, 0 dB, 5 dB from Multimedia Information Retrieval1000 clips (MIR-1K) dataset. Experimental results demonstrate that the proposed method for speech and music segregation outperforms the existing state-of-the-art methods in terms of Global-Normalized-Signal-to-Distortion Ratio (GNSDR) values.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115781892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generation of Chaotic Signal for Scrambling Matrix Content 置乱矩阵内容混沌信号的产生
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/13
N. Khlif, Ahmed Ghorbel, Walid Aydi, N. Masmoudi
Very well evolved, information technology made so easy the transfer of all types of data over public channels. For this reason, ensuring data security is certainly a necessary requirement. Scrambling data is one solution to hide information from non authorized users. Presenting matrix content, image scrambling can be made by only adding a mask to the real content. A user, having the appropriate mask, can recognize the image content by only subtracting it. Chaotic function is recently used for image encryption. In this paper, an algorithm of image scrambling based on three logistic chaotic functions is proposed. Defined by its initial condition and parameter, each chaotic function will generate a random signal. The set of initial conditions and parameters is the encryption key. The performance of this technique is ensured for two great reasons. First, using masks on the image makes unintelligible its content. Second, using three successive encryption processes makes so difficult attacks. This point reflects, in one hand, a sufficient key length to resist to brute force attack. In the other hand, it reflects the random aspect of the pixel distribution in the scrambled image. That means, the randomness in one mask minimizes the correlations really existent between neighboring pixels. That makes our proposed approach resistant to known attacks and suitable for applications requiring secure data transfer such as medical image exchanged between doctors.
信息技术发展得非常好,使得通过公共渠道传输各种类型的数据变得非常容易。出于这个原因,确保数据安全当然是一个必要的要求。置乱数据是向未经授权的用户隐藏信息的一种解决方案。呈现矩阵内容时,只需在真实内容上添加掩码即可实现图像置乱。具有适当掩码的用户可以通过仅减去图像内容来识别图像内容。混沌函数最近被用于图像加密。提出了一种基于三逻辑混沌函数的图像置乱算法。由混沌函数的初始条件和参数定义,每个混沌函数都会产生一个随机信号。初始条件和参数的集合就是加密密钥。保证这种技术的性能有两个主要原因。首先,在图像上使用蒙版会使其内容变得难以理解。其次,使用三个连续的加密过程使得攻击变得非常困难。这一点一方面反映了有足够的密钥长度来抵抗暴力攻击。另一方面,它反映了打乱后图像中像素分布的随机性。这意味着,一个掩模中的随机性将相邻像素之间真实存在的相关性最小化。这使得我们提出的方法可以抵抗已知的攻击,并且适用于需要安全数据传输的应用,例如医生之间交换医疗图像。
{"title":"Generation of Chaotic Signal for Scrambling Matrix Content","authors":"N. Khlif, Ahmed Ghorbel, Walid Aydi, N. Masmoudi","doi":"10.34028/iajit/17/4/13","DOIUrl":"https://doi.org/10.34028/iajit/17/4/13","url":null,"abstract":"Very well evolved, information technology made so easy the transfer of all types of data over public channels. For this reason, ensuring data security is certainly a necessary requirement. Scrambling data is one solution to hide information from non authorized users. Presenting matrix content, image scrambling can be made by only adding a mask to the real content. A user, having the appropriate mask, can recognize the image content by only subtracting it. Chaotic function is recently used for image encryption. In this paper, an algorithm of image scrambling based on three logistic chaotic functions is proposed. Defined by its initial condition and parameter, each chaotic function will generate a random signal. The set of initial conditions and parameters is the encryption key. The performance of this technique is ensured for two great reasons. First, using masks on the image makes unintelligible its content. Second, using three successive encryption processes makes so difficult attacks. This point reflects, in one hand, a sufficient key length to resist to brute force attack. In the other hand, it reflects the random aspect of the pixel distribution in the scrambled image. That means, the randomness in one mask minimizes the correlations really existent between neighboring pixels. That makes our proposed approach resistant to known attacks and suitable for applications requiring secure data transfer such as medical image exchanged between doctors.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Hypred Improved Method for Measuring Concept Semantic Similarity in WordNet WordNet中概念语义相似度度量的一种新的混合改进方法
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/1
Xiao-gang Zhang, Shouqian Sun, Ke-jun Zhang
Computing semantic similarity between concepts is an important issue in natural language processing, artificial intelligence, information retrieval and knowledge management. The measure of computing concept similarity is a fundament of semantic computation. In this paper, we analyze typical semantic similarity measures and note Wu and Palmer’s measure which does not distinguish the similarities between nodes from a node to different nodes of the same level. Then, we synthesize the advantages of measure of path-based and IC-based, and propose a new hybrid method for measuring semantic similarity. By testing on a fragment of WordNet hierarchical tree, the results demonstrate the proposed method accurately distinguishes the similarities between nodes from a node to different nodes of the same level and overcome the shortcoming of the Wu and Palmer’s measure
概念间语义相似度计算是自然语言处理、人工智能、信息检索和知识管理等领域的一个重要问题。计算概念相似度的度量是语义计算的基础。在本文中,我们分析了典型的语义相似度度量,并注意到Wu和Palmer的度量没有区分节点之间的相似度,从一个节点到同一层次的不同节点。在此基础上,综合了基于路径的度量和基于集成电路的度量的优点,提出了一种新的混合度量语义相似度的方法。通过在WordNet层次树的一个片段上进行测试,结果表明该方法能够准确地区分同一节点与同一层次的不同节点之间的相似度,克服了Wu和Palmer方法的不足
{"title":"A New Hypred Improved Method for Measuring Concept Semantic Similarity in WordNet","authors":"Xiao-gang Zhang, Shouqian Sun, Ke-jun Zhang","doi":"10.34028/iajit/17/4/1","DOIUrl":"https://doi.org/10.34028/iajit/17/4/1","url":null,"abstract":"Computing semantic similarity between concepts is an important issue in natural language processing, artificial intelligence, information retrieval and knowledge management. The measure of computing concept similarity is a fundament of semantic computation. In this paper, we analyze typical semantic similarity measures and note Wu and Palmer’s measure which does not distinguish the similarities between nodes from a node to different nodes of the same level. Then, we synthesize the advantages of measure of path-based and IC-based, and propose a new hybrid method for measuring semantic similarity. By testing on a fragment of WordNet hierarchical tree, the results demonstrate the proposed method accurately distinguishes the similarities between nodes from a node to different nodes of the same level and overcome the shortcoming of the Wu and Palmer’s measure","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"445 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123228282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Connectionist Temporal Classification Model for Dynamic Hand Gesture Recognition using RGB and Optical flow Data 基于RGB和光流数据的动态手势识别的联结主义时间分类模型
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/8
S. Patel, R. Makwana
Automatic classification of dynamic hand gesture is challenging due to the large diversity in a different class of gesture, Low resolution, and it is performed by finger. Due to a number of challenges many researchers focus on this area. Recently deep neural network can be used for implicit feature extraction and Soft Max layer is used for classification. In this paper, we propose a method based on a two-dimensional convolutional neural network that performs detection and classification of hand gesture simultaneously from multimodal Red, Green, Blue, Depth (RGBD) and Optical flow Data and passes this feature to Long-Short Term Memory (LSTM) recurrent network for frame-to-frame probability generation with Connectionist Temporal Classification (CTC) network for loss calculation. We have calculated an optical flow from Red, Green, Blue (RGB) data for getting proper motion information present in the video. CTC model is used to efficiently evaluate all possible alignment of hand gesture via dynamic programming and check consistency via frame-to-frame for the visual similarity of hand gesture in the unsegmented input stream. CTC network finds the most probable sequence of a frame for a class of gesture. The frame with the highest probability value is selected from the CTC network by max decoding. This entire CTC network is trained end-to-end with calculating CTC loss for recognition of the gesture. We have used challenging Vision for Intelligent Vehicles and Applications (VIVA) dataset for dynamic hand gesture recognition captured with RGB and Depth data. On this VIVA dataset, our proposed hand gesture recognition technique outperforms competing state-of-the-art algorithms and gets an accuracy of 86%.
动态手势的自动分类具有很大的挑战性,因为不同类别的手势差异很大,分辨率低,并且是由手指完成的。由于面临许多挑战,许多研究人员关注这一领域。近年来,深度神经网络用于隐式特征提取,Soft Max层用于分类。在本文中,我们提出了一种基于二维卷积神经网络的方法,该方法从多模态红、绿、蓝、深(RGBD)和光流数据中同时对手势进行检测和分类,并将该特征传递给长短期记忆(LSTM)循环网络进行帧间概率生成,并将连接时间分类(CTC)网络进行损失计算。我们计算了红、绿、蓝(RGB)数据的光流,以获得视频中存在的适当运动信息。使用CTC模型通过动态规划有效地评估所有可能的手势对齐,并通过帧对帧检查未分割输入流中手势视觉相似性的一致性。CTC网络为一类手势找到一个帧的最可能序列。通过最大解码从CTC网络中选择概率值最高的帧。整个CTC网络通过计算CTC损失来进行端到端的训练,以识别手势。我们使用具有挑战性的智能车辆和应用视觉(VIVA)数据集,通过RGB和深度数据捕获动态手势识别。在这个VIVA数据集上,我们提出的手势识别技术优于竞争最先进的算法,准确率达到86%。
{"title":"Connectionist Temporal Classification Model for Dynamic Hand Gesture Recognition using RGB and Optical flow Data","authors":"S. Patel, R. Makwana","doi":"10.34028/iajit/17/4/8","DOIUrl":"https://doi.org/10.34028/iajit/17/4/8","url":null,"abstract":"Automatic classification of dynamic hand gesture is challenging due to the large diversity in a different class of gesture, Low resolution, and it is performed by finger. Due to a number of challenges many researchers focus on this area. Recently deep neural network can be used for implicit feature extraction and Soft Max layer is used for classification. In this paper, we propose a method based on a two-dimensional convolutional neural network that performs detection and classification of hand gesture simultaneously from multimodal Red, Green, Blue, Depth (RGBD) and Optical flow Data and passes this feature to Long-Short Term Memory (LSTM) recurrent network for frame-to-frame probability generation with Connectionist Temporal Classification (CTC) network for loss calculation. We have calculated an optical flow from Red, Green, Blue (RGB) data for getting proper motion information present in the video. CTC model is used to efficiently evaluate all possible alignment of hand gesture via dynamic programming and check consistency via frame-to-frame for the visual similarity of hand gesture in the unsegmented input stream. CTC network finds the most probable sequence of a frame for a class of gesture. The frame with the highest probability value is selected from the CTC network by max decoding. This entire CTC network is trained end-to-end with calculating CTC loss for recognition of the gesture. We have used challenging Vision for Intelligent Vehicles and Applications (VIVA) dataset for dynamic hand gesture recognition captured with RGB and Depth data. On this VIVA dataset, our proposed hand gesture recognition technique outperforms competing state-of-the-art algorithms and gets an accuracy of 86%.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi Label Ranking Based on Positive Pairwise Correlations Among Labels 基于标签间正成对相关的多标签排序
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/2
Raed Alazaidah, F. Ahmad, M. Mohsin
Multi-Label Classification (MLC) is a general type of classification that has attracted many researchers in the last few years. Two common approaches are being used to solve the problem of MLC: Problem Transformation Methods (PTMs) and Algorithm Adaptation Methods (AAMs). This Paper is more interested in the first approach; since it is more general and applicable to any domain. In specific, this paper aims to meet two objectives. The first objective is to propose a new multi-label ranking algorithm based on the positive pairwise correlations among labels, while the second objective aims to propose new simple PTMs that are based on labels correlations, and not based on labels frequency as in conventional PTMs. Experiments showed that the proposed algorithm overcomes the existing methods and algorithms on all evaluation metrics that have been used in the experiments. Also, the proposed PTMs show a superior performance when compared with the existing PTMs
多标签分类(Multi-Label Classification, MLC)是近年来备受关注的一种分类方法。目前解决MLC问题的两种常用方法是:问题转换方法(ptm)和算法自适应方法(AAMs)。本文对第一种方法更感兴趣;因为它更通用,适用于任何领域。具体而言,本文旨在实现两个目标。第一个目标是提出一种新的基于标签之间的正成对相关性的多标签排序算法,而第二个目标是提出一种新的基于标签相关性的简单标签排序算法,而不是像传统的标签排序算法那样基于标签频率。实验表明,该算法在实验中使用的所有评价指标上都克服了现有的方法和算法。此外,与现有的ptm相比,所提出的ptm具有更好的性能
{"title":"Multi Label Ranking Based on Positive Pairwise Correlations Among Labels","authors":"Raed Alazaidah, F. Ahmad, M. Mohsin","doi":"10.34028/iajit/17/4/2","DOIUrl":"https://doi.org/10.34028/iajit/17/4/2","url":null,"abstract":"Multi-Label Classification (MLC) is a general type of classification that has attracted many researchers in the last few years. Two common approaches are being used to solve the problem of MLC: Problem Transformation Methods (PTMs) and Algorithm Adaptation Methods (AAMs). This Paper is more interested in the first approach; since it is more general and applicable to any domain. In specific, this paper aims to meet two objectives. The first objective is to propose a new multi-label ranking algorithm based on the positive pairwise correlations among labels, while the second objective aims to propose new simple PTMs that are based on labels correlations, and not based on labels frequency as in conventional PTMs. Experiments showed that the proposed algorithm overcomes the existing methods and algorithms on all evaluation metrics that have been used in the experiments. Also, the proposed PTMs show a superior performance when compared with the existing PTMs","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Query Authentication of Outsourced Spatial Database 外包空间数据库查询认证
Pub Date : 2020-07-01 DOI: 10.34028/iajit/17/4/12
Jun Hong, Tao Wen, Quan Guo
Outsourcing spatial database to a third party is becoming a common practice for more and more individuals and companies to save the cost of managing and maintaining database, where a data owner delegates its spatial data management tasks to a third party and grants it to provide query services. However, the third party is not full trusted. Thus, authentication information should be provided to the client for query authentication. In this paper, we introduce an efficient space authenticated data structure, called Verifiable Similarity Indexing tree (VSS-tree), to support authenticated spatial query. We build VSS-tree based on SS-tree which employs bounding sphere rather than bounding rectangle for region shape and extend it with authentication information. Based on VSS-tree, the third party finds query results and builds their corresponding verification object. The client performs query authentication using the verification object and the public key published. Finally, we evaluate the performance and validity of our algorithms, the experiment results show that VSS-tree can efficiently support spatial query and have better performance than Merkle R tree (MR-tree).
为节省管理和维护数据库的成本,越来越多的个人和公司将空间数据库外包给第三方,即数据所有者将其空间数据管理任务委托给第三方,并授权第三方提供查询服务,这已成为一种普遍的做法。但是,第三方是不完全可信的。因此,应该向客户端提供身份验证信息以进行查询身份验证。本文引入了一种高效的空间认证数据结构——可验证相似度索引树(VSS-tree)来支持空间认证查询。我们在SS-tree的基础上,采用边界球代替边界矩形作为区域形状,构建了VSS-tree,并对其进行了扩展。第三方基于VSS-tree查找查询结果并构建相应的验证对象。客户端使用验证对象和发布的公钥执行查询身份验证。最后,对算法的性能和有效性进行了评价,实验结果表明,vss树能够有效地支持空间查询,并具有比Merkle R树(MR-tree)更好的性能。
{"title":"Query Authentication of Outsourced Spatial Database","authors":"Jun Hong, Tao Wen, Quan Guo","doi":"10.34028/iajit/17/4/12","DOIUrl":"https://doi.org/10.34028/iajit/17/4/12","url":null,"abstract":"Outsourcing spatial database to a third party is becoming a common practice for more and more individuals and companies to save the cost of managing and maintaining database, where a data owner delegates its spatial data management tasks to a third party and grants it to provide query services. However, the third party is not full trusted. Thus, authentication information should be provided to the client for query authentication. In this paper, we introduce an efficient space authenticated data structure, called Verifiable Similarity Indexing tree (VSS-tree), to support authenticated spatial query. We build VSS-tree based on SS-tree which employs bounding sphere rather than bounding rectangle for region shape and extend it with authentication information. Based on VSS-tree, the third party finds query results and builds their corresponding verification object. The client performs query authentication using the verification object and the public key published. Finally, we evaluate the performance and validity of our algorithms, the experiment results show that VSS-tree can efficiently support spatial query and have better performance than Merkle R tree (MR-tree).","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"2 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126335503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MPKC-based Threshold Proxy Signcryption Scheme 基于mpkc的阈值代理签名加密方案
Pub Date : 2020-02-28 DOI: 10.34028/IAJIT/17/2/7
Li Huixian, Gao Jin, Wan Lingyun, Pang Liaojun
{"title":"MPKC-based Threshold Proxy Signcryption Scheme","authors":"Li Huixian, Gao Jin, Wan Lingyun, Pang Liaojun","doi":"10.34028/IAJIT/17/2/7","DOIUrl":"https://doi.org/10.34028/IAJIT/17/2/7","url":null,"abstract":"","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124976774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Median Flow Tracker Based on Photometric Correction for Videos with Abrupt Changing Illumination 光照突变视频中基于光度校正的增强型中值流跟踪器
Pub Date : 2020-02-28 DOI: 10.34028/iajit/17/2/15
Asha Narayana, N. Venkata
Object tracking is a fundamental task in video surveillance, human-computer interaction and activity analysis. One of the common challenges in visual object tracking is illumination variation. A large number of methods for tracking have been proposed over the recent years, and median flow tracker is one of them which can handle various challenges. Median flow tracker is designed to track an object using Lucas-Kanade optical flow method which is sensitive to illumination variation, hence fails when sudden illumination changes occur between the frames. In this paper, we propose an enhanced median flow tracker to achieve an illumination invariance to abruptly varying lighting conditions. In this approach, illumination variation is compensated by modifying the Discrete Cosine Transform (DCT) coefficients of an image in the logarithmic domain. The illumination variations are mainly reflected in the low-frequency coefficients of an image. Therefore, a fixed number of DCT coefficients are ignored. Moreover, the Discrete Cosine (DC) coefficient is maintained almost constant all through the video based on entropy difference to minimize the sudden variations of lighting impacts. In addition, each video frame is enhanced by employing pixel transformation technique that improves the contrast of dull images based on probability distribution of pixels. The proposed scheme can effectively handle the gradual and abrupt changes in the illumination of the object. The experiments are conducted on fast-changing illumination videos, and results show that the proposed method improves median flow tracker with outperforming accuracy compared to the state-of-the-art trackers
目标跟踪是视频监控、人机交互和活动分析中的一项基本任务。光照变化是视觉目标跟踪的常见问题之一。近年来提出了大量的跟踪方法,中位数流量跟踪器是其中一种可以应对各种挑战的方法。中位流跟踪器采用Lucas-Kanade光流方法对目标进行跟踪,该方法对光照变化非常敏感,因此在帧间光照突然变化时无法实现目标跟踪。在本文中,我们提出了一种增强的中值流跟踪器,以实现突然变化的光照条件下的照明不变性。在这种方法中,通过在对数域中修改图像的离散余弦变换(DCT)系数来补偿光照变化。光照变化主要体现在图像的低频系数上。因此,忽略固定数量的DCT系数。此外,基于熵差的离散余弦(DC)系数在整个视频过程中几乎保持恒定,以最小化光照冲击的突然变化。此外,采用基于像素概率分布的像素变换技术对每个视频帧进行增强,提高了暗淡图像的对比度。该方法可以有效地处理物体光照的渐变和突变。在快速变化的照明视频中进行了实验,结果表明,与最先进的跟踪器相比,该方法提高了中值流跟踪器的精度
{"title":"Enhanced Median Flow Tracker Based on Photometric Correction for Videos with Abrupt Changing Illumination","authors":"Asha Narayana, N. Venkata","doi":"10.34028/iajit/17/2/15","DOIUrl":"https://doi.org/10.34028/iajit/17/2/15","url":null,"abstract":"Object tracking is a fundamental task in video surveillance, human-computer interaction and activity analysis. One of the common challenges in visual object tracking is illumination variation. A large number of methods for tracking have been proposed over the recent years, and median flow tracker is one of them which can handle various challenges. Median flow tracker is designed to track an object using Lucas-Kanade optical flow method which is sensitive to illumination variation, hence fails when sudden illumination changes occur between the frames. In this paper, we propose an enhanced median flow tracker to achieve an illumination invariance to abruptly varying lighting conditions. In this approach, illumination variation is compensated by modifying the Discrete Cosine Transform (DCT) coefficients of an image in the logarithmic domain. The illumination variations are mainly reflected in the low-frequency coefficients of an image. Therefore, a fixed number of DCT coefficients are ignored. Moreover, the Discrete Cosine (DC) coefficient is maintained almost constant all through the video based on entropy difference to minimize the sudden variations of lighting impacts. In addition, each video frame is enhanced by employing pixel transformation technique that improves the contrast of dull images based on probability distribution of pixels. The proposed scheme can effectively handle the gradual and abrupt changes in the illumination of the object. The experiments are conducted on fast-changing illumination videos, and results show that the proposed method improves median flow tracker with outperforming accuracy compared to the state-of-the-art trackers","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"1113 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Neuro-Fuzzy System to Detect IPv6 Router Alert Option DoS Packets 一种神经模糊系统检测IPv6路由器告警选项DoS报文
Pub Date : 2019-01-01 DOI: 10.34028/IAJIT/17/1/3
S. Abdullah
Detecting the denial of service attacks that solely target the router is a maximum security imperative in deploying IPv6 networks. The state-of-the-art Denial of Service detection methods aim at leveraging the advantages of flow statistical features and machine learning techniques. However, the detection performance is highly affected by the quality of the feature selector and the reliability of datasets of IPv6 flow information. This paper proposes a new neuro-fuzzy inference system to tackle the problem of classifying the packets in IPv6 networks in crucial situation of small-supervised training dataset. The proposed system is capable of classifying the IPv6 router alert option packets into denial of service and normal by utilizing the neuro-fuzzy strengths to boost the classification accuracy. A mathematical analysis from the fuzzy sets theory perspective is provided to express performance benefit of the proposed system. An empirical performance test is conducted on comprehensive dataset of IPv6 packets produced in a supervised environment. The result shows that the proposed system overcomes robustly some state-of-the-art systems.
检测仅针对路由器的拒绝服务攻击是部署IPv6网络的最大安全要求。最先进的拒绝服务检测方法旨在利用流量统计特征和机器学习技术的优势。然而,特征选择器的质量和IPv6流量信息数据集的可靠性对检测性能有很大影响。本文提出了一种新的神经模糊推理系统来解决IPv6网络中在小监督训练数据集的关键情况下的数据包分类问题。该系统能够利用神经模糊强度将IPv6路由器告警选项包分类为拒绝服务和正常,从而提高分类精度。从模糊集理论的角度对系统的性能效益进行了数学分析。在监督环境下生成的IPv6数据包综合数据集上进行了实证性能测试。结果表明,所提出的系统鲁棒性地克服了一些最先进的系统。
{"title":"A Neuro-Fuzzy System to Detect IPv6 Router Alert Option DoS Packets","authors":"S. Abdullah","doi":"10.34028/IAJIT/17/1/3","DOIUrl":"https://doi.org/10.34028/IAJIT/17/1/3","url":null,"abstract":"Detecting the denial of service attacks that solely target the router is a maximum security imperative in deploying IPv6 networks. The state-of-the-art Denial of Service detection methods aim at leveraging the advantages of flow statistical features and machine learning techniques. However, the detection performance is highly affected by the quality of the feature selector and the reliability of datasets of IPv6 flow information. This paper proposes a new neuro-fuzzy inference system to tackle the problem of classifying the packets in IPv6 networks in crucial situation of small-supervised training dataset. The proposed system is capable of classifying the IPv6 router alert option packets into denial of service and normal by utilizing the neuro-fuzzy strengths to boost the classification accuracy. A mathematical analysis from the fuzzy sets theory perspective is provided to express performance benefit of the proposed system. An empirical performance test is conducted on comprehensive dataset of IPv6 packets produced in a supervised environment. The result shows that the proposed system overcomes robustly some state-of-the-art systems.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Study of Zombie Enterprise Classification and Recognition Systems Based on Ensemble Learning 基于集成学习的僵尸企业分类识别系统设计与研究
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/3
Shutong Pang, Zi Yang, Chengyou Cai, Zhimin Li
The existence of a large number of zombie enterprises will affect the economic development and hinder the transformation and upgrading of economic industries. To improve the accuracy of zombie enterprise identification, this paper takes multidimensional enterprise data as the original data set, divides it into training set and validation set, and gives the corresponding data pre-processing methods. Combined with 14 standardized features, an integrated learning model for zombie enterprise classification and recognition is constructed and studied based on three pattern recognition algorithms. By using the idea of integration and the cross-validation method to determine the optimal parameters, the Gradient Boosting Decision Tree (GBDT), linear kernel Support Vector Machine (SVM) and Deep Neural Network (DNN) algorithms with classification accuracies of 95%, 96% and 96%, respectively, are used as sub-models, and a more comprehensive strong supervision model with a classification accuracy of 98% is obtained by the stacking method in combination with the advantages of multiple sub-models to analyze the fundamental information of 30885 enterprises. The study improves the accuracy of zombie enterprise identification to 98%, builds enterprise portraits based on this, and finally visualizes the classification results through the platform, which provides an auxiliary means for zombie enterprise classification and identification.
大量僵尸企业的存在会影响经济发展,阻碍经济产业的转型升级。为了提高僵尸企业识别的准确率,本文以多维企业数据为原始数据集,将其分为训练集和验证集,并给出相应的数据预处理方法。结合14个标准化特征,构建并研究了基于三种模式识别算法的僵尸企业分类识别集成学习模型。采用积分思想和交叉验证方法确定最优参数,以分类准确率分别为95%、96%和96%的梯度增强决策树(GBDT)、线性核支持向量机(SVM)和深度神经网络(DNN)算法为子模型,通过叠加法结合多个子模型的优势,对30885家企业的基础信息进行分析,得到了分类准确率达到98%的更全面的强监督模型。本研究将僵尸企业识别的准确率提高到98%,并以此为基础构建企业画像,最后通过平台将分类结果可视化,为僵尸企业分类识别提供了一种辅助手段。
{"title":"Design and Study of Zombie Enterprise Classification and Recognition Systems Based on Ensemble Learning","authors":"Shutong Pang, Zi Yang, Chengyou Cai, Zhimin Li","doi":"10.34028/iajit/20/5/3","DOIUrl":"https://doi.org/10.34028/iajit/20/5/3","url":null,"abstract":"The existence of a large number of zombie enterprises will affect the economic development and hinder the transformation and upgrading of economic industries. To improve the accuracy of zombie enterprise identification, this paper takes multidimensional enterprise data as the original data set, divides it into training set and validation set, and gives the corresponding data pre-processing methods. Combined with 14 standardized features, an integrated learning model for zombie enterprise classification and recognition is constructed and studied based on three pattern recognition algorithms. By using the idea of integration and the cross-validation method to determine the optimal parameters, the Gradient Boosting Decision Tree (GBDT), linear kernel Support Vector Machine (SVM) and Deep Neural Network (DNN) algorithms with classification accuracies of 95%, 96% and 96%, respectively, are used as sub-models, and a more comprehensive strong supervision model with a classification accuracy of 98% is obtained by the stacking method in combination with the advantages of multiple sub-models to analyze the fundamental information of 30885 enterprises. The study improves the accuracy of zombie enterprise identification to 98%, builds enterprise portraits based on this, and finally visualizes the classification results through the platform, which provides an auxiliary means for zombie enterprise classification and identification.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The International Arab Journal of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1