首页 > 最新文献

Int. J. Knowl. Based Intell. Eng. Syst.最新文献

英文 中文
Models for MADM with hesitant interval-valued fuzzy information under uncertain environment 不确定环境下具有犹豫区间模糊信息的MADM模型
Pub Date : 2021-11-10 DOI: 10.3233/kes-210074
Hongjun Wang
This paper is a research of interval-valued fuzzy and Muirhead Mean algorithms. We deduced new algorithms named as hesitant interval-valued fuzzy Muirhead Mean (HIVFMM) and hesitant interval-valued fuzzy Muirhead Mean (HIVFWMM) with Muirhead Mean algorithms based on Hesitant interval-valued fuzzy set (HIVFS). Firstly, we introduced some concepts and operation laws of HIVFS and the formula form of MM, then we combined them both and gave the proof process of properties and theorems, a mathematic model applying to MADM and a numerical example was given to illustrate the effectively and practically.
本文研究了区间值模糊和Muirhead均值算法。利用基于犹豫区间值模糊集(HIVFS)的Muirhead均值算法,推导了犹豫区间值模糊Muirhead均值(HIVFMM)和犹豫区间值模糊Muirhead均值(HIVFWMM)算法。首先介绍了HIVFS的一些概念和运行规律以及MM的公式形式,然后将两者结合起来,给出了性质和定理的证明过程,建立了一个适用于MADM的数学模型,并给出了一个数值算例。
{"title":"Models for MADM with hesitant interval-valued fuzzy information under uncertain environment","authors":"Hongjun Wang","doi":"10.3233/kes-210074","DOIUrl":"https://doi.org/10.3233/kes-210074","url":null,"abstract":"This paper is a research of interval-valued fuzzy and Muirhead Mean algorithms. We deduced new algorithms named as hesitant interval-valued fuzzy Muirhead Mean (HIVFMM) and hesitant interval-valued fuzzy Muirhead Mean (HIVFWMM) with Muirhead Mean algorithms based on Hesitant interval-valued fuzzy set (HIVFS). Firstly, we introduced some concepts and operation laws of HIVFS and the formula form of MM, then we combined them both and gave the proof process of properties and theorems, a mathematic model applying to MADM and a numerical example was given to illustrate the effectively and practically.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127048178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized privacy assistant for digital voice assistants: Case study on Amazon Alexa 数字语音助手的个性化隐私助手:以亚马逊Alexa为例
Pub Date : 2021-11-10 DOI: 10.3233/kes-210071
J. Hyma, M. Murty, A. Naveen
The advancements in modern technologies permit the invention of various digital devices which are controlled and activated by people’s gestures, touch and even by one’s voice. Google Assistant, iPhone Siri, Amazon Alexa etc., are most popular voice enabled devices which have grabbed the attention of digital gadget users. Their usage definitely makes the life easier and comfortable. The other side of these smart enabled devices is incredible violation of the privacy. This happens due to their continuous listening to the user and data transmission over a public network to the third-party services. The work proposed in this paper attempts to overcome the existing privacy violation problem with the voice enabled devices. The main idea is to incorporate an intelligent privacy assistant that works based on the user preferences over their data.
现代技术的进步使各种数字设备得以发明,这些设备可以通过人们的手势、触摸甚至声音来控制和激活。谷歌助手、iPhone Siri、亚马逊Alexa等都是最受欢迎的语音设备,吸引了数字设备用户的注意。它们的使用确实使生活更轻松和舒适。这些智能设备的另一方面是对隐私的极大侵犯。这种情况的发生是由于他们不断地监听用户并通过公共网络向第三方服务传输数据。本文提出的工作试图克服现有的语音设备的隐私侵犯问题。其主要想法是整合一个智能隐私助手,根据用户对其数据的偏好进行工作。
{"title":"Personalized privacy assistant for digital voice assistants: Case study on Amazon Alexa","authors":"J. Hyma, M. Murty, A. Naveen","doi":"10.3233/kes-210071","DOIUrl":"https://doi.org/10.3233/kes-210071","url":null,"abstract":"The advancements in modern technologies permit the invention of various digital devices which are controlled and activated by people’s gestures, touch and even by one’s voice. Google Assistant, iPhone Siri, Amazon Alexa etc., are most popular voice enabled devices which have grabbed the attention of digital gadget users. Their usage definitely makes the life easier and comfortable. The other side of these smart enabled devices is incredible violation of the privacy. This happens due to their continuous listening to the user and data transmission over a public network to the third-party services. The work proposed in this paper attempts to overcome the existing privacy violation problem with the voice enabled devices. The main idea is to incorporate an intelligent privacy assistant that works based on the user preferences over their data.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133706167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach for bibliographic citation sentiment analysis using deep learning 基于深度学习的书目引文情感分析方法
Pub Date : 2021-01-18 DOI: 10.3233/kes-200087
S. Muppidi, Satya Keerthi Gorripati, B. Kishore
Sentiment analysis of scientific citations is a novel and remarkable research area. Most of the work on opinion or sentiment analysis has been suggested on social platforms such as Blogs, Twitter, and Facebook. Nevertheless, when it comes to recognizing sentiments from scientific citation papers, investigators used to face difficulties due to the implied and unseen natures of sentiments or opinions. As the citation references are reflected implicitly positive in opinion, famous ranking and indexing prototypes frequently disregard the sentiment existence while citing. Hence, in the proposed framework the paper emphasizes the issue of classifying positive and negative polarity of reference sentiments in scientific research papers. First, the paper scraps the PDF articles from arxiv.org under the computer science group consisting of articles that are comprised of ‘autism’ in their title, then the paper extracted cited references and assigns polarity scores to each cited reference. The paper uses a supervised classifier with a combination of significant feature sets and compared the performance of the models. Experimental results show that a combined CNN-LSTM deep neural network model results in 85% of accuracy while traditional models result in less accuracy.
科学引文的情感分析是一个新颖而引人注目的研究领域。大多数关于意见或情绪分析的工作都是在博客、Twitter和Facebook等社交平台上提出的。然而,当涉及到从科学引文论文中识别情感时,由于情感或观点的隐含性和不可见性,研究者过去常常面临困难。由于被引文献在观点上隐含着积极的反映,著名的排名和标引原型往往忽视了被引时情感的存在。因此,在本文提出的框架中,本文强调了科研论文中参考情绪的正负极性分类问题。首先,论文从arxiv.org的计算机科学组中提取PDF格式的文章,这些文章的标题中包含“自闭症”,然后论文提取被引用的参考文献,并为每个被引用的参考文献分配极性分数。本文使用具有显著特征集组合的监督分类器,并比较了模型的性能。实验结果表明,CNN-LSTM联合深度神经网络模型的准确率达到85%,而传统模型的准确率较低。
{"title":"An approach for bibliographic citation sentiment analysis using deep learning","authors":"S. Muppidi, Satya Keerthi Gorripati, B. Kishore","doi":"10.3233/kes-200087","DOIUrl":"https://doi.org/10.3233/kes-200087","url":null,"abstract":"Sentiment analysis of scientific citations is a novel and remarkable research area. Most of the work on opinion or sentiment analysis has been suggested on social platforms such as Blogs, Twitter, and Facebook. Nevertheless, when it comes to recognizing sentiments from scientific citation papers, investigators used to face difficulties due to the implied and unseen natures of sentiments or opinions. As the citation references are reflected implicitly positive in opinion, famous ranking and indexing prototypes frequently disregard the sentiment existence while citing. Hence, in the proposed framework the paper emphasizes the issue of classifying positive and negative polarity of reference sentiments in scientific research papers. First, the paper scraps the PDF articles from arxiv.org under the computer science group consisting of articles that are comprised of ‘autism’ in their title, then the paper extracted cited references and assigns polarity scores to each cited reference. The paper uses a supervised classifier with a combination of significant feature sets and compared the performance of the models. Experimental results show that a combined CNN-LSTM deep neural network model results in 85% of accuracy while traditional models result in less accuracy.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114868737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identification of myocardial infarction from analysis of ECG signal 从心电信号分析判断心肌梗死
Pub Date : 2020-09-28 DOI: 10.3233/KES-200043
D. Jagannadham, D. V. S. Narayana, P. Ganesh, D. Koteswar
Many heart diseases can be identified and cured at an early stage by studying the changes in the features of electrocardiogram (ECG) signal. Myocardial Infarction (MI) is the serious cause of death worldwide. If MI can be detected early, the death rate will reduce. In this paper, an algorithm to detect MI in an ECG signal using Daubechies wavelet transform technique is developed. The ECG signal-denoising is performed by removing the corresponding wavelet coefficients at higher scale. After denoising, an important step towards identifying an arrhythmia is the feature extraction from the ECG. Feature extraction is carried out to detect the R peaks of the ECG signal. Since as R peak is having the highest amplitude, and therefore it is detected in the first round, subsequently location of other peaks are determined. Having completed the preprocessing and the feature extraction the MI is detected from the ECG based on inverted T wave logic and ST segment elevation. The algorithm was evaluated using MIT-BIH database and European database satisfactorily.
通过研究心电图信号特征的变化,可以早期发现和治疗许多心脏病。心肌梗死(MI)是世界范围内最严重的死亡原因。如果能及早发现心肌梗死,死亡率将会降低。本文提出了一种利用小波变换技术检测心电信号中心肌梗死的算法。通过在更高尺度上去除相应的小波系数来实现心电信号的去噪。在去噪之后,识别心律失常的一个重要步骤是从心电图中提取特征。进行特征提取,检测心电信号的R峰。由于R峰具有最高的振幅,因此在第一轮检测到它,因此随后确定其他峰的位置。在完成预处理和特征提取后,基于反T波逻辑和ST段抬高对心电信号进行检测。采用MIT-BIH数据库和欧洲数据库对该算法进行了满意的评价。
{"title":"Identification of myocardial infarction from analysis of ECG signal","authors":"D. Jagannadham, D. V. S. Narayana, P. Ganesh, D. Koteswar","doi":"10.3233/KES-200043","DOIUrl":"https://doi.org/10.3233/KES-200043","url":null,"abstract":"Many heart diseases can be identified and cured at an early stage by studying the changes in the features of electrocardiogram (ECG) signal. Myocardial Infarction (MI) is the serious cause of death worldwide. If MI can be detected early, the death rate will reduce. In this paper, an algorithm to detect MI in an ECG signal using Daubechies wavelet transform technique is developed. The ECG signal-denoising is performed by removing the corresponding wavelet coefficients at higher scale. After denoising, an important step towards identifying an arrhythmia is the feature extraction from the ECG. Feature extraction is carried out to detect the R peaks of the ECG signal. Since as R peak is having the highest amplitude, and therefore it is detected in the first round, subsequently location of other peaks are determined. Having completed the preprocessing and the feature extraction the MI is detected from the ECG based on inverted T wave logic and ST segment elevation. The algorithm was evaluated using MIT-BIH database and European database satisfactorily.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116672649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust intrusion detection system using machine learning techniques for MANET 基于机器学习技术的入侵检测系统
Pub Date : 2020-09-28 DOI: 10.3233/KES-200047
N. Ravi, G. Ramachandran
Recent advancement in technologies such as Cloud, Internet of Things etc., leads to the increase usage of mobile computing. Present day mobile computing are too sophisticated and advancement are reaching great heights. Moreover, the present day mobile network suffers due to external and internal intrusions within and outside networks. The existing security systems to protect the mobile networks are incapable to detect the recent attacks. Further, the existing security system completely depends on the traditional signature and rule based approaches. Recent attacks have the property of not fluctuating its behaviour during attack. Hence, a robust Intrusion Detection System (IDS) is desirable. In order to address the above mentioned issue, this paper proposed a robust IDS using Machine Learning Techniques (MLT). The key of using MLT is to utilize the power of ensembles. The ensembles of classifier used in this paper are Random Forest (RF), KNN, Naïve Bayes (NB), etc. The proposed IDS is experimentally tested and validated using a secure test bed. The experimental results also confirms that the proposed IDS is robust enough to withstand and detect any form of intrusions and it is also noted that the proposed IDS outperforms the state of the art IDS with more than 95% accuracy.
最近云、物联网等技术的进步导致移动计算的使用增加。现在的移动计算太复杂了,进步达到了很高的水平。此外,目前的移动网络受到网络内外的外部和内部入侵。现有的保护移动网络的安全系统无法检测到最近的攻击。此外,现有的安全系统完全依赖于传统的基于签名和规则的方法。最近的攻击具有在攻击期间不波动其行为的特性。因此,需要一个健壮的入侵检测系统(IDS)。为了解决上述问题,本文提出了一种使用机器学习技术(MLT)的鲁棒入侵检测系统。使用MLT的关键是利用集成的力量。本文使用的分类器集合有Random Forest (RF)、KNN、Naïve Bayes (NB)等。所提出的入侵检测系统在一个安全的测试平台上进行了实验测试和验证。实验结果还证实,所提出的入侵检测系统具有足够的鲁棒性,可以承受和检测任何形式的入侵,并且还指出,所提出的入侵检测系统的性能优于目前最先进的入侵检测系统,准确率超过95%。
{"title":"A robust intrusion detection system using machine learning techniques for MANET","authors":"N. Ravi, G. Ramachandran","doi":"10.3233/KES-200047","DOIUrl":"https://doi.org/10.3233/KES-200047","url":null,"abstract":"Recent advancement in technologies such as Cloud, Internet of Things etc., leads to the increase usage of mobile computing. Present day mobile computing are too sophisticated and advancement are reaching great heights. Moreover, the present day mobile network suffers due to external and internal intrusions within and outside networks. The existing security systems to protect the mobile networks are incapable to detect the recent attacks. Further, the existing security system completely depends on the traditional signature and rule based approaches. Recent attacks have the property of not fluctuating its behaviour during attack. Hence, a robust Intrusion Detection System (IDS) is desirable. In order to address the above mentioned issue, this paper proposed a robust IDS using Machine Learning Techniques (MLT). The key of using MLT is to utilize the power of ensembles. The ensembles of classifier used in this paper are Random Forest (RF), KNN, Naïve Bayes (NB), etc. The proposed IDS is experimentally tested and validated using a secure test bed. The experimental results also confirms that the proposed IDS is robust enough to withstand and detect any form of intrusions and it is also noted that the proposed IDS outperforms the state of the art IDS with more than 95% accuracy.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Economic victimisation of convict's family: Statistical analysis through SPSS 罪犯家庭经济受害:SPSS统计分析
Pub Date : 2020-09-28 DOI: 10.3233/KES-200048
Snigdha Sarkar, S. Samanta, A. Mitra
In new age scenario Prisons are meant not only to punish the convict but also correct the situation and habits of the convicts, who is responsible for inflicting harm on the victim. But family members of the convict are also the victim in the process and situation. Convicts family face the horrific situation during this process. Prisoner’s families are maltreated directly and indirectly by the society. They live in destitution. Imprisonment of family member not only diminishes the earnings of adult men but also reduces familial resources for the basic necessities of life. The family members have to sacrifice their children’s education, ancestor’s property, past savings, in some cases even necessary wants of their life. We always think about the victim on whom the harm has been directly inflicted and completely ignore the harm inflicted on the kin of the convict. The present study is an endeavour to bring to light the economic vulnerability of families of convicts in a prison in Bhubaneswar. After interviewing the family members of prisoners, statistical analysis is done through SPSS. The findings are elaborated in narrative manner so that the findings will be helpful for policy makers in future.
在新时代情景中,监狱不仅意味着惩罚罪犯,而且意味着纠正罪犯的处境和习惯,罪犯对受害者造成伤害负有责任。但是罪犯的家庭成员在这个过程和情况中也是受害者。在这一过程中,罪犯家属面临着可怕的处境。囚犯家属受到社会直接或间接的虐待。他们生活在贫困之中。监禁家庭成员不仅减少了成年男子的收入,而且也减少了家庭用于基本生活必需品的资源。家庭成员不得不牺牲他们孩子的教育、祖先的财产、过去的积蓄,在某些情况下甚至是他们生活中必要的需要。我们总是想到直接受到伤害的受害者,而完全忽视了罪犯亲属所受到的伤害。本研究旨在揭示布巴内斯瓦尔一所监狱中囚犯家属的经济脆弱性。在对囚犯家属进行访谈后,通过SPSS软件进行统计分析。研究结果以叙述的方式进行阐述,以便研究结果对未来的政策制定者有所帮助。
{"title":"Economic victimisation of convict's family: Statistical analysis through SPSS","authors":"Snigdha Sarkar, S. Samanta, A. Mitra","doi":"10.3233/KES-200048","DOIUrl":"https://doi.org/10.3233/KES-200048","url":null,"abstract":"In new age scenario Prisons are meant not only to punish the convict but also correct the situation and habits of the convicts, who is responsible for inflicting harm on the victim. But family members of the convict are also the victim in the process and situation. Convicts family face the horrific situation during this process. Prisoner’s families are maltreated directly and indirectly by the society. They live in destitution. Imprisonment of family member not only diminishes the earnings of adult men but also reduces familial resources for the basic necessities of life. The family members have to sacrifice their children’s education, ancestor’s property, past savings, in some cases even necessary wants of their life. We always think about the victim on whom the harm has been directly inflicted and completely ignore the harm inflicted on the kin of the convict. The present study is an endeavour to bring to light the economic vulnerability of families of convicts in a prison in Bhubaneswar. After interviewing the family members of prisoners, statistical analysis is done through SPSS. The findings are elaborated in narrative manner so that the findings will be helpful for policy makers in future.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133186607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Literature review and analysis on big data stream classification techniques 大数据流分类技术的文献综述与分析
Pub Date : 2020-09-28 DOI: 10.3233/KES-200042
B. Srivani, N. Sandhya, B. Rani
Rapid growth in technology and information lead the human to witness the improved growth in velocity, volume of data, and variety. The data in the business organizations demonstrate the development of big data applications. Because of the improving demand of applications, analysis of sophisticated streaming big data tends to become a significant area in data mining. One of the significant aspects of the research is employing deep learning approaches for effective extraction of complex data representations. Accordingly, this survey provides the detailed review of big data classification methodologies, like deep learning based techniques, Convolutional Neural Network (CNN) based techniques, K-Nearest Neighbor (KNN) based techniques, Neural Network (NN) based techniques, fuzzy based techniques, and Support vector based techniques, and so on. Moreover, a detailed study is made by concerning the parameters, like evaluation metrics, implementation tool, employed framework, datasets utilized, adopted classification methods, and accuracy range obtained by various techniques. Eventually, the research gaps and issues of various big data classification schemes are presented.
技术和信息的快速发展使人类目睹了数据的速度、数量和种类的提高。商业机构的数据展示了大数据应用的发展。随着应用需求的不断提高,复杂流大数据的分析逐渐成为数据挖掘的一个重要领域。该研究的一个重要方面是采用深度学习方法有效地提取复杂的数据表示。因此,本调查提供了大数据分类方法的详细回顾,如基于深度学习的技术,基于卷积神经网络(CNN)的技术,基于k -最近邻(KNN)的技术,基于神经网络(NN)的技术,基于模糊的技术,以及基于支持向量的技术等。并对评价指标、实施工具、采用的框架、使用的数据集、采用的分类方法、各种技术获得的准确率范围等参数进行了详细的研究。最后指出了各种大数据分类方案的研究差距和存在的问题。
{"title":"Literature review and analysis on big data stream classification techniques","authors":"B. Srivani, N. Sandhya, B. Rani","doi":"10.3233/KES-200042","DOIUrl":"https://doi.org/10.3233/KES-200042","url":null,"abstract":"Rapid growth in technology and information lead the human to witness the improved growth in velocity, volume of data, and variety. The data in the business organizations demonstrate the development of big data applications. Because of the improving demand of applications, analysis of sophisticated streaming big data tends to become a significant area in data mining. One of the significant aspects of the research is employing deep learning approaches for effective extraction of complex data representations. Accordingly, this survey provides the detailed review of big data classification methodologies, like deep learning based techniques, Convolutional Neural Network (CNN) based techniques, K-Nearest Neighbor (KNN) based techniques, Neural Network (NN) based techniques, fuzzy based techniques, and Support vector based techniques, and so on. Moreover, a detailed study is made by concerning the parameters, like evaluation metrics, implementation tool, employed framework, datasets utilized, adopted classification methods, and accuracy range obtained by various techniques. Eventually, the research gaps and issues of various big data classification schemes are presented.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129057025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Minimum square distance thresholding method applying gray-gradient co-occurrence matrix 应用灰度梯度共现矩阵的最小二乘距离阈值法
Pub Date : 2020-09-28 DOI: 10.3233/KES-200040
Hong Zhang, Qiang Zhi, Fan Yang
In image thresholding segmentation, gray level of pixels is the basic element to describe images. Besides, the gradient information of pixels is also a key feature to represent image space distribution. Therefore, the co-occurrence probability of gray and gradient of pixels is an effective information to describe image. In this paper, gray-gradient asymmetrical co-occurrence matrix is constructed, uniformity probability of image region is produced, and a minimum square distance criterion function based on gray-gradient co-occurrence matrix is proposed to measure the deviation between original and binary images. Comparing with gray-gray asymmetrical co-occurrence matrix and relative entropy-based symmetrical co-occurrence matrix method, the proposed method can obtain more complete segmentation results, especially for small-size object extraction. The peak signal to noise ratio probability also shows the better segmentation performance of our proposed method.
在图像阈值分割中,像素的灰度值是描述图像的基本要素。此外,像素的梯度信息也是表示图像空间分布的关键特征。因此,像素的灰度和梯度的共现概率是描述图像的有效信息。本文构造了灰度梯度非对称共现矩阵,生成了图像区域的均匀性概率,并提出了基于灰度梯度共现矩阵的最小二乘距离判据函数来度量原始图像与二值图像之间的偏差。与灰-灰非对称共现矩阵和基于相对熵的对称共现矩阵方法相比,该方法可以获得更完整的分割结果,尤其适用于小尺寸目标的提取。峰值信噪比概率也表明本文方法具有较好的分割性能。
{"title":"Minimum square distance thresholding method applying gray-gradient co-occurrence matrix","authors":"Hong Zhang, Qiang Zhi, Fan Yang","doi":"10.3233/KES-200040","DOIUrl":"https://doi.org/10.3233/KES-200040","url":null,"abstract":"In image thresholding segmentation, gray level of pixels is the basic element to describe images. Besides, the gradient information of pixels is also a key feature to represent image space distribution. Therefore, the co-occurrence probability of gray and gradient of pixels is an effective information to describe image. In this paper, gray-gradient asymmetrical co-occurrence matrix is constructed, uniformity probability of image region is produced, and a minimum square distance criterion function based on gray-gradient co-occurrence matrix is proposed to measure the deviation between original and binary images. Comparing with gray-gray asymmetrical co-occurrence matrix and relative entropy-based symmetrical co-occurrence matrix method, the proposed method can obtain more complete segmentation results, especially for small-size object extraction. The peak signal to noise ratio probability also shows the better segmentation performance of our proposed method.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic segmentation algorithm for breast cell image based on multi-scale CNN and CSS corner detection 基于多尺度CNN和CSS角点检测的乳腺细胞图像自动分割算法
Pub Date : 2020-09-28 DOI: 10.3233/KES-200041
Hao-yang Tang, Cong Song, Meng Qian
As the shapes of breast cell are diverse and there is adherent between cells, fast and accurate segmentation for breast cell remains a challenging task. In this paper, an automatic segmentation algorithm for breast cell image is proposed, which focuses on the segmentation of adherent cells. First of all, breast cell image enhancement is carried out by the staining regularization. Then, the cells and background are separated by Multi-scale Convolutional Neural Network (CNN) to obtain the initial segmentation results. Finally, the Curvature Scale Space (CSS) corner detection is used to segment adherent cells. Experimental results show that the proposed algorithm can achieve 93.01% accuracy, 93.93% sensitivity and 95.69% specificity. Compared with other segmentation algorithms of breast cell, the proposed algorithm can not only solve the difficulty of segmenting adherent cells, but also improve the segmentation accuracy of adherent cells.
由于乳腺细胞形态多样,且细胞间具有贴壁性,快速准确的分割是一项具有挑战性的任务。本文提出了一种针对乳腺细胞图像的自动分割算法,该算法主要关注贴壁细胞的分割。首先,通过染色正则化对乳腺细胞图像进行增强。然后,通过多尺度卷积神经网络(CNN)对细胞和背景进行分离,得到初始分割结果。最后,利用曲率尺度空间(CSS)角点检测对贴壁细胞进行分割。实验结果表明,该算法的准确率为93.01%,灵敏度为93.93%,特异度为95.69%。与其他乳腺细胞分割算法相比,该算法不仅解决了贴壁细胞分割的困难,而且提高了贴壁细胞的分割精度。
{"title":"Automatic segmentation algorithm for breast cell image based on multi-scale CNN and CSS corner detection","authors":"Hao-yang Tang, Cong Song, Meng Qian","doi":"10.3233/KES-200041","DOIUrl":"https://doi.org/10.3233/KES-200041","url":null,"abstract":"As the shapes of breast cell are diverse and there is adherent between cells, fast and accurate segmentation for breast cell remains a challenging task. In this paper, an automatic segmentation algorithm for breast cell image is proposed, which focuses on the segmentation of adherent cells. First of all, breast cell image enhancement is carried out by the staining regularization. Then, the cells and background are separated by Multi-scale Convolutional Neural Network (CNN) to obtain the initial segmentation results. Finally, the Curvature Scale Space (CSS) corner detection is used to segment adherent cells. Experimental results show that the proposed algorithm can achieve 93.01% accuracy, 93.93% sensitivity and 95.69% specificity. Compared with other segmentation algorithms of breast cell, the proposed algorithm can not only solve the difficulty of segmenting adherent cells, but also improve the segmentation accuracy of adherent cells.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recognition of human emotion with spectral features using multi layer-perceptron 基于多层感知器的人类情感谱特征识别
Pub Date : 2020-09-28 DOI: 10.3233/KES-200044
A. Reddy, V. Vijayarajan
For emotion recognition, here the features extracted from prevalent speech samples of Berlin emotional database are pitch, intensity, log energy, formant, mel-frequency ceptral coefficients (MFCC) as base features and power spectral density as an added function of frequency. In these work seven emotions namely anger, neutral, happy, Boredom, disgust, fear and sadness are considered in our study. Temporal and Spectral features are considered for building AER(Automatic Emotion Recognition) model. The extracted features are analyzed using Support Vector Machine (SVM) and with multilayer perceptron (MLP) a class of feed-forward ANN classifiers is/are used to classify different emotional states. We observed 91% accuracy for Angry and Boredom emotional classes by using SVM and more than 96% accuracy using ANN and with an overall accuracy of 87.17% using SVM, 94% for ANN.
对于情感识别,本文从柏林情感数据库的流行语音样本中提取的特征是基音、强度、对数能量、形成峰、mel-frequency cepal系数(MFCC)作为基本特征,功率谱密度作为频率的附加函数。在这些工作中,我们的研究考虑了七种情绪,即愤怒,中立,快乐,无聊,厌恶,恐惧和悲伤。在建立自动情绪识别模型时,考虑了时间特征和谱特征。使用支持向量机(SVM)对提取的特征进行分析,并结合多层感知器(MLP),采用一类前馈神经网络分类器对不同的情绪状态进行分类。我们观察到,使用支持向量机对愤怒和无聊情绪类的准确率为91%,使用人工神经网络的准确率超过96%,使用支持向量机的总体准确率为87.17%,人工神经网络的总体准确率为94%。
{"title":"Recognition of human emotion with spectral features using multi layer-perceptron","authors":"A. Reddy, V. Vijayarajan","doi":"10.3233/KES-200044","DOIUrl":"https://doi.org/10.3233/KES-200044","url":null,"abstract":"For emotion recognition, here the features extracted from prevalent speech samples of Berlin emotional database are pitch, intensity, log energy, formant, mel-frequency ceptral coefficients (MFCC) as base features and power spectral density as an added function of frequency. In these work seven emotions namely anger, neutral, happy, Boredom, disgust, fear and sadness are considered in our study. Temporal and Spectral features are considered for building AER(Automatic Emotion Recognition) model. The extracted features are analyzed using Support Vector Machine (SVM) and with multilayer perceptron (MLP) a class of feed-forward ANN classifiers is/are used to classify different emotional states. We observed 91% accuracy for Angry and Boredom emotional classes by using SVM and more than 96% accuracy using ANN and with an overall accuracy of 87.17% using SVM, 94% for ANN.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Int. J. Knowl. Based Intell. Eng. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1