首页 > 最新文献

2019 First International Conference of Computer and Applied Sciences (CAS)最新文献

英文 中文
Numerical Solution for Couple Elliptic Boundary Value Problem 耦合椭圆边值问题的数值解
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075813
J. Al-Hawasy, M. Jawad
The Galerkin finite elements method (GAFEM) is used to find the numerical solution (NS) of the couple linear elliptic boundary value problem (CLEBVP). The solution of the CLEBVP is approximated by a linear combination of piecewise linear and continuous basis functions, upon substituting this approximated solution into the CLEBVP the problem then reduces to solve a “Galerkin” linear algebraic system (GALAS). This system is solved by using the classical Cholesky method (CChM). Some illustrative examples are given; to show the high efficiency of the GAFEM to solve such for the CLEBVPs. Figures provide the NS with “results”.
采用伽辽金有限元法(GAFEM)求解了一对线性椭圆边值问题的数值解。CLEBVP的解近似为分段线性和连续基函数的线性组合,将该近似解代入CLEBVP后,问题便简化为求解一个“伽辽金”线性代数系统(Galerkin linear algebra system, GALAS)。该系统采用经典的Cholesky方法(CChM)求解。给出了一些说明性实例;证明了GAFEM求解clebvp问题的高效率。图表向统计处提供“结果”。
{"title":"Numerical Solution for Couple Elliptic Boundary Value Problem","authors":"J. Al-Hawasy, M. Jawad","doi":"10.1109/CAS47993.2019.9075813","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075813","url":null,"abstract":"The Galerkin finite elements method (GAFEM) is used to find the numerical solution (NS) of the couple linear elliptic boundary value problem (CLEBVP). The solution of the CLEBVP is approximated by a linear combination of piecewise linear and continuous basis functions, upon substituting this approximated solution into the CLEBVP the problem then reduces to solve a “Galerkin” linear algebraic system (GALAS). This system is solved by using the classical Cholesky method (CChM). Some illustrative examples are given; to show the high efficiency of the GAFEM to solve such for the CLEBVPs. Figures provide the NS with “results”.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124436098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Support System in GIS to Find Best Route GIS中寻找最佳路径的决策支持系统
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075719
Ali Mahammed Abd ALrhman, Alaa A. Jabbar
Geographical information systems (GIS) become a popular tool in applications that include spatial objects and relations in the real world. The fast-technological expansions in the applications of web-based, simplifying the interaction between GIS and users. A fundamental problem remains available when dealing with a large amount of data in the GIS. Though the GIS strengths in the process of the spatial domain analysis, the systems of GIS are almost uninformed concerning the handling and analysis in the temporal domain. GIS systems find the path between two points or locations depending on time and speed. Therefore, in these days, considerable efforts are guided on this field towards the short time representation on GIS and safe this road. For accomplishing the particular goals of this paper and improve the usefulness of Google maps for the applications of GIS, this work builds a methodological structure to process vector and attribute data and visualise it. The conceptual model utilised here includes three main portions: firstly, the database tier; secondly, the application tier; and thirdly the client tier. This paper proposes a new spatial decision support system in GIS to find the best route between two locations based on different factors; it calculates the shortest and the fastest route depending on either length like other decision support systems or on other features like road safety or quality road by assigning a value to each road using intelligent algorithms (Dijkstra, Astar). The obtained results show decreasing in the time required to find the best result and adding more features as a cost to help the user to select the suitable road.
地理信息系统(GIS)在包括现实世界中的空间对象和关系的应用中成为一种流行的工具。基于web的应用技术的快速发展,简化了GIS与用户之间的交互。在处理GIS中的大量数据时,一个基本问题仍然存在。虽然GIS在空间域分析过程中具有优势,但在时间域的处理和分析方面,GIS系统几乎一无所知。地理信息系统根据时间和速度找到两点或两点之间的路径。因此,近年来,在GIS短时间表示和道路安全方面进行了大量的工作。为了实现本文的特定目标并提高谷歌地图对GIS应用的有用性,本工作构建了一个方法结构来处理矢量和属性数据并将其可视化。这里使用的概念模型包括三个主要部分:首先是数据库层;第二,应用层;第三是客户层。本文提出了一种基于不同因素的地理信息系统空间决策支持系统,以寻找两个地点之间的最佳路线;它根据其他决策支持系统的长度或其他特征,如道路安全或道路质量,通过使用智能算法为每条道路分配一个值来计算最短和最快的路线(Dijkstra, Astar)。得到的结果表明,寻找最佳结果所需的时间在减少,并增加了更多的特征作为成本,以帮助用户选择合适的道路。
{"title":"Decision Support System in GIS to Find Best Route","authors":"Ali Mahammed Abd ALrhman, Alaa A. Jabbar","doi":"10.1109/CAS47993.2019.9075719","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075719","url":null,"abstract":"Geographical information systems (GIS) become a popular tool in applications that include spatial objects and relations in the real world. The fast-technological expansions in the applications of web-based, simplifying the interaction between GIS and users. A fundamental problem remains available when dealing with a large amount of data in the GIS. Though the GIS strengths in the process of the spatial domain analysis, the systems of GIS are almost uninformed concerning the handling and analysis in the temporal domain. GIS systems find the path between two points or locations depending on time and speed. Therefore, in these days, considerable efforts are guided on this field towards the short time representation on GIS and safe this road. For accomplishing the particular goals of this paper and improve the usefulness of Google maps for the applications of GIS, this work builds a methodological structure to process vector and attribute data and visualise it. The conceptual model utilised here includes three main portions: firstly, the database tier; secondly, the application tier; and thirdly the client tier. This paper proposes a new spatial decision support system in GIS to find the best route between two locations based on different factors; it calculates the shortest and the fastest route depending on either length like other decision support systems or on other features like road safety or quality road by assigning a value to each road using intelligent algorithms (Dijkstra, Astar). The obtained results show decreasing in the time required to find the best result and adding more features as a cost to help the user to select the suitable road.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127528550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Blowfish Algorithm for Image Encryption Based on Chaotic Map 基于混沌映射的增强Blowfish图像加密算法
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075747
Ammar H. Jassem, A. T. Hashim, Suhad A. Ali
Image security is essential, topic through the increase of the image usage in most of communications besides assures information security which is hidden in these images such as military and medical images. Blowfish is outstanding symmetric cryptography, which has the benefits of strong ability to resist attackers. Thus it is widely used in data encryption, but it is not suitable for image encryption because of the huge data, higher redundancy and toughly correlation of image pixels. The proposed enhanced method has been employed Blowfish based image encryption technique. Firstly the digital image is decomposed into several key-based blocks randomly to decorrelated the relationship between original and processed image then each block is passed through the Blowfish algorithm. The proposed system is designed to take advantage of the powerful facility, which is supported by a chaotic map resulting in a much-improved security/performance trade-off. As a result, the proposed system offers good performance for image encryption. To ensure improved Blowfish encryption algorithm, the implementation of both techniques has been carried out for experimental purposes which are showed that the original image has a flat histogram after encrypted, a decreasing correlation between adjacent pixels in all colour components and increasing entropy for the cases studied. A comparative study with previous Blowfish algorithm shows the superiority of the modified algorithm.
图像安全是必不可少的,通过图像在大多数通信中的使用量的增加,除了保证隐藏在这些图像中的信息安全,如军事和医学图像。河豚算法是一种出色的对称密码算法,具有较强的抗攻击能力。因此在数据加密中得到了广泛的应用,但由于数据量大、冗余度高、图像像素相关性强,因此不适合用于图像加密。所提出的增强方法采用了基于Blowfish的图像加密技术。首先将数字图像随机分解为若干个基于密钥的块,去相关原始图像和处理后图像之间的关系,然后对每个块进行Blowfish算法。所提出的系统旨在利用强大的功能,该功能由混沌映射支持,从而大大提高了安全性/性能权衡。结果表明,该系统具有良好的图像加密性能。为了确保改进的Blowfish加密算法,对这两种技术进行了实验,结果表明,加密后的原始图像具有平坦的直方图,在所研究的情况下,所有颜色分量中相邻像素之间的相关性降低,熵增加。通过与先前的Blowfish算法的比较研究,证明了改进算法的优越性。
{"title":"Enhanced Blowfish Algorithm for Image Encryption Based on Chaotic Map","authors":"Ammar H. Jassem, A. T. Hashim, Suhad A. Ali","doi":"10.1109/CAS47993.2019.9075747","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075747","url":null,"abstract":"Image security is essential, topic through the increase of the image usage in most of communications besides assures information security which is hidden in these images such as military and medical images. Blowfish is outstanding symmetric cryptography, which has the benefits of strong ability to resist attackers. Thus it is widely used in data encryption, but it is not suitable for image encryption because of the huge data, higher redundancy and toughly correlation of image pixels. The proposed enhanced method has been employed Blowfish based image encryption technique. Firstly the digital image is decomposed into several key-based blocks randomly to decorrelated the relationship between original and processed image then each block is passed through the Blowfish algorithm. The proposed system is designed to take advantage of the powerful facility, which is supported by a chaotic map resulting in a much-improved security/performance trade-off. As a result, the proposed system offers good performance for image encryption. To ensure improved Blowfish encryption algorithm, the implementation of both techniques has been carried out for experimental purposes which are showed that the original image has a flat histogram after encrypted, a decreasing correlation between adjacent pixels in all colour components and increasing entropy for the cases studied. A comparative study with previous Blowfish algorithm shows the superiority of the modified algorithm.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The trade-off between security and quality using permutation and substitution techniques in speech scrambling system 语音置乱系统中使用置换和替换技术的安全性和质量的权衡
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075489
S. Sadkhan, A. Salah
Speech is one of the means of communication between people throughout the universe, so people want to communicate with each other no matter how far away since wireless networking offers, this feature, the freedom to connect from anywhere and anytime. Because speech is used extensively in wireless networks, it takes much time to encrypt it using well-known cryptographic algorithms, so, speech scrambler techniques have been used in the modern communication systems to overcome this problem. It has proven its presence in protecting data transmitted over wireless networks in the past few years. The main objective of this paper is to compare the systems that use process permutation with the systems that use the substitution process in the speech scrambling technique to protect speech information. To find out which is better use the permutation process or substitution in the technique of speech scrambling in terms of security and quality, security and quality results we will compare between our proposed system, which uses permutation process, with another system, uses substitution process. Based on the values of the segmental signal-to-noise ratio measure (SSNR), Comparison of the above two systems will take place because it used in both systems to evaluate the performance of the system in terms of security and quality of the recovered speech.
语音是宇宙中人与人之间的交流手段之一,所以人们想要彼此交流,无论多远,因为无线网络提供了这个功能,可以随时随地自由连接。由于语音在无线网络中被广泛使用,使用已知的加密算法对其进行加密需要花费大量时间,因此,语音扰频技术已被用于现代通信系统中以克服这一问题。在过去的几年里,它已经证明了它在保护通过无线网络传输的数据方面的存在。本文的主要目的是比较语音置乱技术中使用过程置换和使用替换过程来保护语音信息的系统。为了找出在语音置乱技术中,哪一种使用置换过程或替换过程在安全性和质量方面更好,我们将使用置换过程的系统与另一种使用替换过程的系统进行安全性和质量的比较。基于分段信噪比测量(SSNR)的值,将对上述两个系统进行比较,因为它在两个系统中都用于评估系统在恢复语音的安全性和质量方面的性能。
{"title":"The trade-off between security and quality using permutation and substitution techniques in speech scrambling system","authors":"S. Sadkhan, A. Salah","doi":"10.1109/CAS47993.2019.9075489","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075489","url":null,"abstract":"Speech is one of the means of communication between people throughout the universe, so people want to communicate with each other no matter how far away since wireless networking offers, this feature, the freedom to connect from anywhere and anytime. Because speech is used extensively in wireless networks, it takes much time to encrypt it using well-known cryptographic algorithms, so, speech scrambler techniques have been used in the modern communication systems to overcome this problem. It has proven its presence in protecting data transmitted over wireless networks in the past few years. The main objective of this paper is to compare the systems that use process permutation with the systems that use the substitution process in the speech scrambling technique to protect speech information. To find out which is better use the permutation process or substitution in the technique of speech scrambling in terms of security and quality, security and quality results we will compare between our proposed system, which uses permutation process, with another system, uses substitution process. Based on the values of the segmental signal-to-noise ratio measure (SSNR), Comparison of the above two systems will take place because it used in both systems to evaluate the performance of the system in terms of security and quality of the recovered speech.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114814305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic, Secure, and Invariant Watermarking System for Multiview Plus Depth Video 多视点加深度视频的动态、安全、不变水印系统
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075651
Abeer D. Salman, H. B. Abdulwahab
Recently, 3D media and its immersive experience became more attractive and widely used due to the development in network technology and decrease the prices of the display devices. The 3D videos that are created by DIBR techniques are getting a view of interest in the last years because of its visual reality and using it in many applications. Since DIBR takes the original colour with a depth view and generated two virtual views left and right, Copyright protection of DIBR is a difficult task because the centre, left-eye, and right-eye views need to be protected. In this paper, a dynamic, secure, and invariant watermark system is proposed to keep the copyright and ensure the authentication of 3D Video, where different watermark bits are embedded in different locations within the 3D video frame. The watermark bits are secured by encrypting it with the modified stream cipher algorithm. Experiment results show the secured watermark system embeds different watermarks with keeping the quality of the 3D Video system and makes the system more tolerant to attacks and the watermarks are extracted from the centre and generated rendered views correctly with minimum error rate after an attack.
近年来,由于网络技术的发展和显示设备价格的下降,3D媒体及其沉浸式体验越来越具有吸引力和广泛的应用。由DIBR技术制作的3D视频在过去几年中因其视觉真实感和在许多应用中使用而引起了人们的兴趣。由于DIBR采用深度视图的原始颜色,并生成左右两个虚拟视图,因此DIBR的版权保护是一项艰巨的任务,因为需要保护中心,左眼和右眼视图。本文提出了一种动态、安全、不变性的水印系统,在3D视频帧内的不同位置嵌入不同的水印位,以保证3D视频的版权保护和认证。通过使用改进的流密码算法对水印位进行加密来保护水印位。实验结果表明,该安全水印系统在保证三维视频系统质量的前提下嵌入不同的水印,增强了系统对攻击的容忍度,水印从中心提取,并在攻击后以最小的错误率正确生成渲染视图。
{"title":"Dynamic, Secure, and Invariant Watermarking System for Multiview Plus Depth Video","authors":"Abeer D. Salman, H. B. Abdulwahab","doi":"10.1109/CAS47993.2019.9075651","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075651","url":null,"abstract":"Recently, 3D media and its immersive experience became more attractive and widely used due to the development in network technology and decrease the prices of the display devices. The 3D videos that are created by DIBR techniques are getting a view of interest in the last years because of its visual reality and using it in many applications. Since DIBR takes the original colour with a depth view and generated two virtual views left and right, Copyright protection of DIBR is a difficult task because the centre, left-eye, and right-eye views need to be protected. In this paper, a dynamic, secure, and invariant watermark system is proposed to keep the copyright and ensure the authentication of 3D Video, where different watermark bits are embedded in different locations within the 3D video frame. The watermark bits are secured by encrypting it with the modified stream cipher algorithm. Experiment results show the secured watermark system embeds different watermarks with keeping the quality of the 3D Video system and makes the system more tolerant to attacks and the watermarks are extracted from the centre and generated rendered views correctly with minimum error rate after an attack.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126339797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Simulation to Estimate Reliability for Transmuted Inverse Exponential Distribution 用仿真方法估计变换逆指数分布的可靠性
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075709
Makki A. Mohammed Salih, Jaafer Hmood Eidi
In this paper, we estimated scale parameter and reliability function for Transmuted Inverse Exponential Distribution (TIE) by five estimation methods Median (MED), Modified Moment (MM), Percentile (PER), Regression (REG) and Maximum Likelihood (MLE) methods. Simulation experiments were used to generate random variables by six experiments $(E_{1}, E_{2}, ldots, E_{6})$ and five times for reliability $(t)$ which is explain it in the simulation results section. Finally, Comparisons were made between the obtained results by using Mean Square Error (MSE); the results have been put in tables for comparison purpose. The results indicate that (MLE) estimator for an estimate the scale parameter and reliability function is the best concerning all estimators in four experiments, and (REG) estimator is the best in two experiments.
本文采用中位数法(MED)、修正矩法(MM)、百分位数法(PER)、回归法(REG)和最大似然法(MLE)五种估计方法估计了转化逆指数分布(TIE)的尺度参数和可靠性函数。仿真实验通过6次实验$(E_{1}, E_{2}, ldots, E_{6})$和5次实验$(t)$生成随机变量,在仿真结果部分解释。最后,利用均方误差(MSE)对所得结果进行比较;结果已列在表格中以便比较。结果表明,在4个实验中,(MLE)估计量对尺度参数和信度函数的估计是最好的,(REG)估计量在2个实验中是最好的。
{"title":"Using Simulation to Estimate Reliability for Transmuted Inverse Exponential Distribution","authors":"Makki A. Mohammed Salih, Jaafer Hmood Eidi","doi":"10.1109/CAS47993.2019.9075709","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075709","url":null,"abstract":"In this paper, we estimated scale parameter and reliability function for Transmuted Inverse Exponential Distribution (TIE) by five estimation methods Median (MED), Modified Moment (MM), Percentile (PER), Regression (REG) and Maximum Likelihood (MLE) methods. Simulation experiments were used to generate random variables by six experiments $(E_{1}, E_{2}, ldots, E_{6})$ and five times for reliability $(t)$ which is explain it in the simulation results section. Finally, Comparisons were made between the obtained results by using Mean Square Error (MSE); the results have been put in tables for comparison purpose. The results indicate that (MLE) estimator for an estimate the scale parameter and reliability function is the best concerning all estimators in four experiments, and (REG) estimator is the best in two experiments.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"666 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134389620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speaker identification using convolutional neural network for clean and noisy speech samples 使用卷积神经网络对干净和有噪声的语音样本进行说话人识别
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075461
Ali Muayad Jalil, F. S. Hasan, H. Alabbasi
Conventional speaker identification systems require features that are carefully designed to achieve high identification accuracy rates. With deep learning, these features are learned rather than specifically designed. The improvements of deep neural networks algorithms and techniques lead to an increase in using deep neural networks for speaker identification systems in favour of the conventional systems. In this paper, we use a convolutional neural network with Mel-spectrogram as an input for the identification purpose. The experiments are done on TIMIT dataset to evaluate the proposed CNN architecture and to compare with state-of-the-art systems for clean and noisy speech samples.
传统的说话人识别系统需要经过精心设计的功能,以达到较高的识别准确率。通过深度学习,这些特征是学习而不是专门设计的。随着深度神经网络算法和技术的进步,越来越多的人将深度神经网络用于说话人识别系统,而不是传统的系统。在本文中,我们使用带有mel谱图的卷积神经网络作为识别目的的输入。实验在TIMIT数据集上进行,以评估所提出的CNN架构,并与最先进的系统进行干净和有噪声语音样本的比较。
{"title":"Speaker identification using convolutional neural network for clean and noisy speech samples","authors":"Ali Muayad Jalil, F. S. Hasan, H. Alabbasi","doi":"10.1109/CAS47993.2019.9075461","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075461","url":null,"abstract":"Conventional speaker identification systems require features that are carefully designed to achieve high identification accuracy rates. With deep learning, these features are learned rather than specifically designed. The improvements of deep neural networks algorithms and techniques lead to an increase in using deep neural networks for speaker identification systems in favour of the conventional systems. In this paper, we use a convolutional neural network with Mel-spectrogram as an input for the identification purpose. The experiments are done on TIMIT dataset to evaluate the proposed CNN architecture and to compare with state-of-the-art systems for clean and noisy speech samples.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114474617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Numerical Solutions of Systems of Nonlinear Fredholm Integro- Differential Equations by Using Block by Block Method 用分块法求解非线性Fredholm积分微分方程组的数值解
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075463
A. Saleh
In this peeper, some of the numerical methods for solving first order nonlinear Fredholm Integro-Differential Equations [FIDEs] are presented._ The numerical solution of these equations is obtained by using Block by Block method values at each step. The Block methods are used to produce two values of the solution at two successive points as well as formulas of three Blocks are derived from giving three values at each step, and four Blocks are derived from giving four values at each step.
本文给出了求解一阶非线性Fredholm积分-微分方程的一些数值方法。_这些方程的数值解是在每一步使用Block by Block方法的值得到的。Block方法用于在两个连续的点上产生两个解的值,并且通过在每一步给出三个值推导出三个Block的公式,并且通过在每一步给出四个值推导出四个Block。
{"title":"Numerical Solutions of Systems of Nonlinear Fredholm Integro- Differential Equations by Using Block by Block Method","authors":"A. Saleh","doi":"10.1109/CAS47993.2019.9075463","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075463","url":null,"abstract":"In this peeper, some of the numerical methods for solving first order nonlinear Fredholm Integro-Differential Equations [FIDEs] are presented._ The numerical solution of these equations is obtained by using Block by Block method values at each step. The Block methods are used to produce two values of the solution at two successive points as well as formulas of three Blocks are derived from giving three values at each step, and four Blocks are derived from giving four values at each step.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Turbo encoder/ decoder using FPGA Turbo编/解码器的FPGA设计与实现
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075589
M. A. Fleah, Q. Al-Doori
Turbo codes are used to reduce the errors that occur when sending a message through a communication channel. They do that by detecting and correcting these errors. They are widely used in applications that need to transmit the information reliably over a noisy channel, due to their good performance that reaches to the Shannon limit of the channel capacity. This work will design the turbo codes using MATLAB program by two programming methods Simulink and M.file. The Simulink design is used to build the turbo codes and to implement them practically on an FPGA device using VHDL code. While in M.file is used to measure the turbo code performance in terms of Bit Error Rate (BER). BER is tested by changing the parameters of the turbo codes like the codes length, the iteration numbers, also by taking different rates, and the different decoding algorithms. The effect of the puncturing and non-puncturing operation is also presented. Then the obtained simulation results can be compared with each other to discuss which parameters can be used to give the best performance in designing the turbo codes circuit.
Turbo码用于减少通过通信通道发送消息时发生的错误。他们通过检测和纠正这些错误来做到这一点。由于具有良好的性能,可以达到信道容量的香农极限,因此被广泛应用于需要在噪声信道上可靠传输信息的应用中。本工作将利用MATLAB编程,通过Simulink和m.f iler两种编程方法来设计turbo码。使用Simulink设计构建turbo码,并使用VHDL代码在FPGA器件上实际实现。而在m .文件是用来衡量turbo码的误码率(BER)方面的性能。通过改变turbo码的参数,如码长、迭代次数,以及采用不同的速率和不同的解码算法来测试误码率。并介绍了穿刺和不穿刺操作的效果。然后将所得到的仿真结果进行比较,讨论在设计turbo码电路时,哪些参数能达到最佳的性能。
{"title":"Design and Implementation of Turbo encoder/ decoder using FPGA","authors":"M. A. Fleah, Q. Al-Doori","doi":"10.1109/CAS47993.2019.9075589","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075589","url":null,"abstract":"Turbo codes are used to reduce the errors that occur when sending a message through a communication channel. They do that by detecting and correcting these errors. They are widely used in applications that need to transmit the information reliably over a noisy channel, due to their good performance that reaches to the Shannon limit of the channel capacity. This work will design the turbo codes using MATLAB program by two programming methods Simulink and M.file. The Simulink design is used to build the turbo codes and to implement them practically on an FPGA device using VHDL code. While in M.file is used to measure the turbo code performance in terms of Bit Error Rate (BER). BER is tested by changing the parameters of the turbo codes like the codes length, the iteration numbers, also by taking different rates, and the different decoding algorithms. The effect of the puncturing and non-puncturing operation is also presented. Then the obtained simulation results can be compared with each other to discuss which parameters can be used to give the best performance in designing the turbo codes circuit.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126663295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
New Vehicle System Identification Based On Magnetic Feature Map 基于磁特征图的新型车辆系统识别
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075636
Maryem Abd AL-Munem Salman, S. A. Makki
Vehicle detection is one of the important solutions for transposition system problems and can be utilised for different applications. Vehicles consist of deferent iron parts that lead to having a magnetic behaviour or map. This paper presents a new vehicle detection and identification system using magnetic sensors. A specific new system has been designed consisting of a non-magnetic material frame. Four magnetic sensors to detect the magnetic fields around the vehicle have been fixed in the frame in suitable places. Each sensor signal has been measured and transmitted to a PC for storing, analysing and identifying. Signals from magnetic sensors detected when the vehicle passes through the frame. A new database has been built employing the designed identification system used as reference data or reference signals. Two approaches have been used to analyse and identify the vehicle type. The first approach uses normalised cross-correlation depending on Fast Fourier Transform to find the similarity between magnetic sensors signals and the reference signals. The second approach uses a matching pattern approach in which the signals from sensors converted to an image and make a matching between the two patterns to identify the vehicle. The accuracy of the first approach of vehicle identification reached 90%, and the accuracy for the second approach reached 95%. These two approaches, compared with other approaches, gave more accurate results to identify the type of vehicle and distinguish between vehicles of the same type and give a signature to each type/model of the vehicles. Other approaches just detect the vehicle and identify if it is a small or big vehicle.
车辆检测是解决换位系统问题的重要方法之一,可用于不同的应用。车辆由不同的铁部件组成,这些部件导致具有磁性行为或地图。提出了一种利用磁传感器的新型车辆检测与识别系统。设计了一种特殊的新系统,由非磁性材料框架组成。四个用于检测车辆周围磁场的磁传感器已固定在车架的合适位置。每个传感器信号被测量并传输到PC机进行存储、分析和识别。当车辆通过车架时,检测到磁传感器发出的信号。利用所设计的识别系统作为参考数据或参考信号,建立了一个新的数据库。采用了两种方法来分析和识别车辆类型。第一种方法利用基于快速傅里叶变换的归一化互相关来寻找磁传感器信号与参考信号之间的相似性。第二种方法使用匹配模式方法,将来自传感器的信号转换为图像,并在两种模式之间进行匹配以识别车辆。第一种方法的车辆识别准确率达到90%,第二种方法的车辆识别准确率达到95%。与其他方法相比,这两种方法在识别车辆类型和区分同一类型车辆以及对每种类型/型号的车辆进行签名方面的结果更加准确。其他方法只是检测车辆并确定它是小型车辆还是大型车辆。
{"title":"New Vehicle System Identification Based On Magnetic Feature Map","authors":"Maryem Abd AL-Munem Salman, S. A. Makki","doi":"10.1109/CAS47993.2019.9075636","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075636","url":null,"abstract":"Vehicle detection is one of the important solutions for transposition system problems and can be utilised for different applications. Vehicles consist of deferent iron parts that lead to having a magnetic behaviour or map. This paper presents a new vehicle detection and identification system using magnetic sensors. A specific new system has been designed consisting of a non-magnetic material frame. Four magnetic sensors to detect the magnetic fields around the vehicle have been fixed in the frame in suitable places. Each sensor signal has been measured and transmitted to a PC for storing, analysing and identifying. Signals from magnetic sensors detected when the vehicle passes through the frame. A new database has been built employing the designed identification system used as reference data or reference signals. Two approaches have been used to analyse and identify the vehicle type. The first approach uses normalised cross-correlation depending on Fast Fourier Transform to find the similarity between magnetic sensors signals and the reference signals. The second approach uses a matching pattern approach in which the signals from sensors converted to an image and make a matching between the two patterns to identify the vehicle. The accuracy of the first approach of vehicle identification reached 90%, and the accuracy for the second approach reached 95%. These two approaches, compared with other approaches, gave more accurate results to identify the type of vehicle and distinguish between vehicles of the same type and give a signature to each type/model of the vehicles. Other approaches just detect the vehicle and identify if it is a small or big vehicle.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 First International Conference of Computer and Applied Sciences (CAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1