首页 > 最新文献

2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)最新文献

英文 中文
Spreading of Corona Virus in Central Europe: The Cases of Italy and Spain and the Very Beginning of Pandemic 冠状病毒在中欧的传播:意大利和西班牙的案例和大流行的开始
H. Nieto-Chaupis
In this paper a mathematical model that focuses at the very beginning of pandemic at Europe is presented. In essence it is assumed that once the virus arrived to Italy then the geographical propagation was done through probabilistic rules among then to Spain. Because of this the model of propagation of Feynman in conjunction to Wiener schemes have been used to model the displacement of virus from Wuhan to Milan as well from Milan to Spain, as seen at the end of 2019 triggering the beginning of European pandemic at January of 2020. As seen at official data Italy and Spain have presented same statistics at the first months of local pandemic. From the usage of the proposed formalism, it is found that the country data are following Gaussian-like distributions due to the space-time propagation of virus.
本文提出了一个以欧洲大流行初期为中心的数学模型。从本质上讲,假设一旦病毒到达意大利,那么地理传播就会通过概率规则从意大利传播到西班牙。正因为如此,费曼传播模型与维纳方案相结合,被用于模拟病毒从武汉到米兰以及从米兰到西班牙的转移,正如2019年底引发2020年1月欧洲大流行的情况。正如官方数据所示,意大利和西班牙在当地大流行的头几个月提供了相同的统计数据。从所提出的形式的使用中,发现由于病毒的时空传播,国家数据遵循高斯分布。
{"title":"Spreading of Corona Virus in Central Europe: The Cases of Italy and Spain and the Very Beginning of Pandemic","authors":"H. Nieto-Chaupis","doi":"10.1109/SNPD51163.2021.9704918","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9704918","url":null,"abstract":"In this paper a mathematical model that focuses at the very beginning of pandemic at Europe is presented. In essence it is assumed that once the virus arrived to Italy then the geographical propagation was done through probabilistic rules among then to Spain. Because of this the model of propagation of Feynman in conjunction to Wiener schemes have been used to model the displacement of virus from Wuhan to Milan as well from Milan to Spain, as seen at the end of 2019 triggering the beginning of European pandemic at January of 2020. As seen at official data Italy and Spain have presented same statistics at the first months of local pandemic. From the usage of the proposed formalism, it is found that the country data are following Gaussian-like distributions due to the space-time propagation of virus.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123293469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face-recognition System Design and Manufacture 人脸识别系统设计与制造
Menq-Jiun Wu, Ye Chen, Yi-Sheng Liao, Jun-An Chen, Hao-Han Lin
The theory of face recognition is mainly from the idea of feature vectors. The face image is converted into a series of numbers to form a feature vector. For a feature vector of a face image, its content includes various features, such as: face height, face width, average face color, lips width, and nose height. The face-recognition operation is to compare the input of the feature vector of a face image with a large number of feature vectors in a dataset to identify the personal identity.The face recognition system in this paper is mainly implemented in the Python environment. Face generation is achieved by selfie of face. The image is cut to retain the part of the face, and stored in the database. Comparing the face image input with those saved in the dataset, if the similarity value passes the threshold value of true. The program will show the face image identification. Otherwise, the system will display a false message. The face recognition system is completed and the experimental results show the correct face-recognition. Finally the laptop Webcam is used to take the face image, and the result of comparison is also correct.
人脸识别的理论主要来源于特征向量的思想。将人脸图像转换成一系列数字,形成特征向量。对于人脸图像的特征向量,其内容包括各种特征,如:人脸高度、人脸宽度、平均面部颜色、嘴唇宽度和鼻子高度。人脸识别操作是将人脸图像的特征向量输入与数据集中大量的特征向量进行比较,从而识别出个人身份。本文的人脸识别系统主要是在Python环境下实现的。人脸生成是通过脸部自拍实现的。图像被切割以保留人脸的部分,并存储在数据库中。将输入的人脸图像与数据集中保存的人脸图像进行比较,如果相似度值超过阈值true。该程序将显示人脸图像识别。否则,系统将显示错误信息。完成了人脸识别系统的设计,实验结果表明,人脸识别是正确的。最后利用笔记本电脑摄像头拍摄人脸图像,对比结果也是正确的。
{"title":"Face-recognition System Design and Manufacture","authors":"Menq-Jiun Wu, Ye Chen, Yi-Sheng Liao, Jun-An Chen, Hao-Han Lin","doi":"10.1109/SNPD51163.2021.9705014","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9705014","url":null,"abstract":"The theory of face recognition is mainly from the idea of feature vectors. The face image is converted into a series of numbers to form a feature vector. For a feature vector of a face image, its content includes various features, such as: face height, face width, average face color, lips width, and nose height. The face-recognition operation is to compare the input of the feature vector of a face image with a large number of feature vectors in a dataset to identify the personal identity.The face recognition system in this paper is mainly implemented in the Python environment. Face generation is achieved by selfie of face. The image is cut to retain the part of the face, and stored in the database. Comparing the face image input with those saved in the dataset, if the similarity value passes the threshold value of true. The program will show the face image identification. Otherwise, the system will display a false message. The face recognition system is completed and the experimental results show the correct face-recognition. Finally the laptop Webcam is used to take the face image, and the result of comparison is also correct.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125328181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effectiveness of Explaining a Program to Others in Finding Its Bugs 向他人解释程序发现bug的有效性
Toshihiro Nakamura, Akito Monden, Mariko Sasakura, H. Uwano
Explaining a program to others helps get others to find bugs and for the explainer him/herself to find bugs. However, to the best of our knowledge, there is no quantitative evidence that explaining a program to others helps the explainer find bugs. This study aims to show quantitatively, using an experimental evaluation, that the explainer himself can find new bugs by explaining the program to others. In the experiment, subjects first review a program that contains many bugs and try to find as many bugs as possible. Next, they are required to explain the program aloud to others. We see if they notice any new bugs themselves during the explanation. As a result of the experiment, five out of the six subjects could find new bugs when explaining the program to others. According to the questionnaire to the subjects, the subjects who find many bugs feel that they can understand the program better by explaining it to others.
向别人解释一个程序可以帮助别人找到bug,也可以帮助解释者自己找到bug。然而,据我们所知,没有定量的证据表明向别人解释一个程序可以帮助解释者找到bug。本研究旨在通过实验评估,定量地展示解释器自己可以通过向他人解释程序来发现新的缺陷。在实验中,受试者首先回顾一个包含许多错误的程序,并试图找到尽可能多的错误。接下来,他们需要大声向其他人解释程序。我们看看他们在解释过程中是否注意到任何新的bug。实验的结果是,在向其他人解释程序时,6名受试者中有5人发现了新的漏洞。根据对被试的问卷调查,发现很多bug的被试认为通过向别人解释可以更好地理解程序。
{"title":"Effectiveness of Explaining a Program to Others in Finding Its Bugs","authors":"Toshihiro Nakamura, Akito Monden, Mariko Sasakura, H. Uwano","doi":"10.1109/SNPD51163.2021.9704932","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9704932","url":null,"abstract":"Explaining a program to others helps get others to find bugs and for the explainer him/herself to find bugs. However, to the best of our knowledge, there is no quantitative evidence that explaining a program to others helps the explainer find bugs. This study aims to show quantitatively, using an experimental evaluation, that the explainer himself can find new bugs by explaining the program to others. In the experiment, subjects first review a program that contains many bugs and try to find as many bugs as possible. Next, they are required to explain the program aloud to others. We see if they notice any new bugs themselves during the explanation. As a result of the experiment, five out of the six subjects could find new bugs when explaining the program to others. According to the questionnaire to the subjects, the subjects who find many bugs feel that they can understand the program better by explaining it to others.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Tire Status Estimation Using Hall Sensor and G-Sensor 利用霍尔传感器和g传感器实现轮胎状态估计
W. Chang, Rong-Terng Juang, Min-Hsiang Huang, M. Sung
Vehicles are one kind of human’s transport tools that can carry us to anywhere. Safety is an important issue for vehicle applications. Tire is an important element of the vehicle, because the vehicle only has four points connect on the road through tires. Many accidents are caused the tire problems. There are more and more researches in intelligent tire base on safety issues. Tire pressure monitor system (TPMS) can be called an application of intelligent tires that are currently a very popular tire monitoring device, it provides pressure and temperature information for drivers. The information can let drivers understand their tire’s status through simple information. Not only pressure and temperature can affect safety, but also tire’s use mileage. The tire wear has some relation to safety. The mileage has been defined by tire spec. The different tires have different specs and the tire wear status cannot be defined clearly. The wear status is hard to get that is because the vehicle condition, use scenario and situation are complicated. Drivers can’t understand how many miles did the tire use and what status the tire. This paper proposed a method to estimate and monitor tire mileage and wear base on simple sensors. G-sensor and hall sensors are common sensors in applications. The method will use these simple sensors to implement the method. Drivers can accord information to evaluate the tire status and decide the timing to replace the tire. It can help drivers to increase safety during the drive and provide a solution to support intelligent tire function.
汽车是人类的一种交通工具,可以把我们带到任何地方。安全性是车辆应用的一个重要问题。轮胎是车辆的重要组成部分,因为车辆只有四个点通过轮胎连接在道路上。许多事故都是由轮胎问题引起的。基于安全问题的智能轮胎研究越来越多。胎压监测系统(TPMS)可称为智能轮胎的一种应用,是目前非常流行的一种轮胎监测装置,它为驾驶员提供压力和温度信息。这些信息可以让驾驶员通过简单的信息了解轮胎的状态。不仅压力和温度会影响安全,轮胎的使用里程也会受到影响。轮胎磨损与安全性有一定的关系。里程是由轮胎规格来定义的,不同的轮胎规格不同,轮胎磨损情况不能明确定义。由于车辆状况、使用场景和使用情况复杂,车辆的磨损状况难以掌握。司机不知道轮胎用了多少英里,轮胎处于什么状态。提出了一种基于简单传感器的轮胎里程和磨损估计与监测方法。g传感器和霍尔传感器是应用中常见的传感器。该方法将使用这些简单的传感器来实现该方法。驾驶员可以根据信息评估轮胎状态并决定更换轮胎的时机。它可以帮助驾驶员在驾驶过程中提高安全性,并提供支持智能轮胎功能的解决方案。
{"title":"Implementation of Tire Status Estimation Using Hall Sensor and G-Sensor","authors":"W. Chang, Rong-Terng Juang, Min-Hsiang Huang, M. Sung","doi":"10.1109/SNPD51163.2021.9704975","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9704975","url":null,"abstract":"Vehicles are one kind of human’s transport tools that can carry us to anywhere. Safety is an important issue for vehicle applications. Tire is an important element of the vehicle, because the vehicle only has four points connect on the road through tires. Many accidents are caused the tire problems. There are more and more researches in intelligent tire base on safety issues. Tire pressure monitor system (TPMS) can be called an application of intelligent tires that are currently a very popular tire monitoring device, it provides pressure and temperature information for drivers. The information can let drivers understand their tire’s status through simple information. Not only pressure and temperature can affect safety, but also tire’s use mileage. The tire wear has some relation to safety. The mileage has been defined by tire spec. The different tires have different specs and the tire wear status cannot be defined clearly. The wear status is hard to get that is because the vehicle condition, use scenario and situation are complicated. Drivers can’t understand how many miles did the tire use and what status the tire. This paper proposed a method to estimate and monitor tire mileage and wear base on simple sensors. G-sensor and hall sensors are common sensors in applications. The method will use these simple sensors to implement the method. Drivers can accord information to evaluate the tire status and decide the timing to replace the tire. It can help drivers to increase safety during the drive and provide a solution to support intelligent tire function.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128274342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules 基于去聚类规则的SMVQ压缩图像可逆数据隐藏
Kunpeng Sun, Ji-Hwei Horng, C. Chang
Vector quantization (VQ) is a popular digital image compression technique. Its resulting index table can be further compressed using the side match vector quantization (SMVQ). In this research, we propose a reversible data hiding scheme based on the de-clustering rules to embed secret data during SMVQ compression. Referring to differently assigned codebooks, the de-clustering rules are equally applicable to both compressible and uncompressible VQ indices. The proposed scheme can produce a camouflaged VQ index table with a high payload. Besides, our scheme is free from the indicator bit, which is required in the conventional SMVQ. Experimental results are compared with state-of-the-art methods.
矢量量化(VQ)是一种流行的数字图像压缩技术。它的结果索引表可以使用侧匹配矢量量化(SMVQ)进一步压缩。在本研究中,我们提出了一种基于去聚类规则的可逆数据隐藏方案来嵌入SMVQ压缩过程中的秘密数据。对于不同分配的码本,该去聚规则同样适用于可压缩和不可压缩的VQ索引。该方案可以生成一个高负载的伪装VQ索引表。此外,我们的方案省去了传统SMVQ所需要的指示位。实验结果与最先进的方法进行了比较。
{"title":"Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules","authors":"Kunpeng Sun, Ji-Hwei Horng, C. Chang","doi":"10.1109/SNPD51163.2021.9704947","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9704947","url":null,"abstract":"Vector quantization (VQ) is a popular digital image compression technique. Its resulting index table can be further compressed using the side match vector quantization (SMVQ). In this research, we propose a reversible data hiding scheme based on the de-clustering rules to embed secret data during SMVQ compression. Referring to differently assigned codebooks, the de-clustering rules are equally applicable to both compressible and uncompressible VQ indices. The proposed scheme can produce a camouflaged VQ index table with a high payload. Besides, our scheme is free from the indicator bit, which is required in the conventional SMVQ. Experimental results are compared with state-of-the-art methods.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130204352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How to Enlighten Novice Users on Behavior of Machine Learning Models? 如何让新手了解机器学习模型的行为?
Hiroto Mizutani, Masateru Tsunoda, K. Nakasai
Background: Machine learning models are sometimes embedded in software to implement the required functions. As a result, non-experts in machine learning are becoming familiar with the models. However, the interpretability of the built models is often low in machine learning, such as deep learning, and the recognition process of such models is very different from that of humans. Therefore, it is not easy for novice users, such as end-users and beginners, to anticipate the behavior of models that they will use or build. Aim: We assist novice users to realize an aspect of the behavior of machine learning models relating to robustness intuitively. Method: We formalized and evaluated quiz-based analysis, which is often applied by practitioners to test the robustness of machine learning models arbitrarily. To generate test cases of the models, the analysis converts images towards the boundary of classification for both machine learning and humans. It can be regarded as a type of boundary value analysis of software development. Results: In the experiment, we evaluated whether the analysis quantitatively clarified the aspects of the models. The analysis clarified the robustness of the model for image conversion and misclassification quantitatively. Conclusion: The analysis is expected to enlighten novice users on the behavior of machine learning models. This may promote behavioral changes in the evaluation of models for novice users.
背景:机器学习模型有时被嵌入到软件中以实现所需的功能。因此,非机器学习专家也开始熟悉这些模型。然而,在深度学习等机器学习中,构建的模型的可解释性往往很低,而且这种模型的识别过程与人类的识别过程有很大的不同。因此,对于新手用户(例如最终用户和初学者)来说,预测他们将要使用或构建的模型的行为并不容易。目的:我们帮助新手用户直观地认识到与鲁棒性相关的机器学习模型行为的一个方面。方法:我们形式化并评估了基于测验的分析,这种分析通常被实践者任意地用于测试机器学习模型的鲁棒性。为了生成模型的测试用例,分析将图像转换为机器学习和人类的分类边界。它可以看作是软件开发的一种边界值分析。结果:在实验中,我们评估了分析是否定量地阐明了模型的各个方面。分析定量地阐明了该模型对图像转换和误分类的鲁棒性。结论:该分析有望启发新手用户对机器学习模型的行为。这可能会促进新用户在评估模型时的行为改变。
{"title":"How to Enlighten Novice Users on Behavior of Machine Learning Models?","authors":"Hiroto Mizutani, Masateru Tsunoda, K. Nakasai","doi":"10.1109/SNPD51163.2021.9704891","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9704891","url":null,"abstract":"Background: Machine learning models are sometimes embedded in software to implement the required functions. As a result, non-experts in machine learning are becoming familiar with the models. However, the interpretability of the built models is often low in machine learning, such as deep learning, and the recognition process of such models is very different from that of humans. Therefore, it is not easy for novice users, such as end-users and beginners, to anticipate the behavior of models that they will use or build. Aim: We assist novice users to realize an aspect of the behavior of machine learning models relating to robustness intuitively. Method: We formalized and evaluated quiz-based analysis, which is often applied by practitioners to test the robustness of machine learning models arbitrarily. To generate test cases of the models, the analysis converts images towards the boundary of classification for both machine learning and humans. It can be regarded as a type of boundary value analysis of software development. Results: In the experiment, we evaluated whether the analysis quantitatively clarified the aspects of the models. The analysis clarified the robustness of the model for image conversion and misclassification quantitatively. Conclusion: The analysis is expected to enlighten novice users on the behavior of machine learning models. This may promote behavioral changes in the evaluation of models for novice users.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reversible Database Watermark Scheme for Textual and Numerical Datasets 文本和数字数据集的可逆数据库水印方案
Chinchen Chang, T. Nguyen, Chia-Chen Lin
In this paper, we present our design of a new, blind, reversible, robust, watermarking scheme for relational databases storing textual and numerical data, which is not only guaranteed to meet the above seven requirements and to provide proof of ownership for the legal owner of a relational database but also does not require the existence of the primary key attribute in the relational database. Extensive analysis and our experimental results showed that the proposed scheme achieves strong robustness under a variety of possible attacks, e.g., deletion attacks, modification attacks, addition attacks, and sorting attacks. In addition, in comparison with six existing schemes, the proposed scheme was more secure and robust, as evidenced by our experimental results and robustness analysis.
在本文中,我们设计了一种新的、盲的、可逆的、鲁棒的、用于存储文本和数字数据的关系数据库的水印方案,该方案不仅保证满足上述七个要求,并为关系数据库的合法所有者提供所有权证明,而且不要求关系数据库中存在主键属性。大量分析和实验结果表明,该方案在删除攻击、修改攻击、添加攻击和排序攻击等多种可能的攻击下都具有较强的鲁棒性。实验结果和鲁棒性分析表明,与现有的6种方案相比,本文提出的方案具有更高的安全性和鲁棒性。
{"title":"A Reversible Database Watermark Scheme for Textual and Numerical Datasets","authors":"Chinchen Chang, T. Nguyen, Chia-Chen Lin","doi":"10.1109/SNPD51163.2021.9704991","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9704991","url":null,"abstract":"In this paper, we present our design of a new, blind, reversible, robust, watermarking scheme for relational databases storing textual and numerical data, which is not only guaranteed to meet the above seven requirements and to provide proof of ownership for the legal owner of a relational database but also does not require the existence of the primary key attribute in the relational database. Extensive analysis and our experimental results showed that the proposed scheme achieves strong robustness under a variety of possible attacks, e.g., deletion attacks, modification attacks, addition attacks, and sorting attacks. In addition, in comparison with six existing schemes, the proposed scheme was more secure and robust, as evidenced by our experimental results and robustness analysis.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Geometrical Schemes as Probabilistic and Entropic Tools to Estimate Duration and Peaks of Pandemic Waves 几何格式作为估计大流行波持续时间和峰值的概率和熵工具
H. Nieto-Chaupis
At the end of first quarter of 2020 it was seen in most countries statistics the beginning of an imminent second wave of pandemic. On January of 2021 it was seen in the data a rapid growth of new infections. In this paper, a geometry-based scheme is presented. In concrete the rectangle and trapezoid shapes are analyzed. From this, a relation between both geometries is extracted in terms of polynomial functions. The resulting characterization of a pandemic in terms of geometric variables is presented. Thus the present model is confronted with official data of USA and India. From the results of this paper, it is strongly believed that entropy might be behind of a global pandemic dynamics.
在2020年第一季度末,大多数国家的统计数据显示,即将到来的第二波大流行开始了。2021年1月的数据显示,新感染病例快速增长。本文提出了一种基于几何的方案。在混凝土中对矩形和梯形进行了分析。由此,两个几何图形之间的关系被提取为多项式函数。本文提出了用几何变量描述大流行的结果。因此,本模型面对的是美国和印度的官方数据。从本文的结果来看,我们强烈相信熵可能是全球大流行动态的背后。
{"title":"Geometrical Schemes as Probabilistic and Entropic Tools to Estimate Duration and Peaks of Pandemic Waves","authors":"H. Nieto-Chaupis","doi":"10.1109/SNPD51163.2021.9704981","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9704981","url":null,"abstract":"At the end of first quarter of 2020 it was seen in most countries statistics the beginning of an imminent second wave of pandemic. On January of 2021 it was seen in the data a rapid growth of new infections. In this paper, a geometry-based scheme is presented. In concrete the rectangle and trapezoid shapes are analyzed. From this, a relation between both geometries is extracted in terms of polynomial functions. The resulting characterization of a pandemic in terms of geometric variables is presented. Thus the present model is confronted with official data of USA and India. From the results of this paper, it is strongly believed that entropy might be behind of a global pandemic dynamics.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116085417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Eight-Arm Maze Trajectory Tracking System for Feature Extraction of TBI Animals TBI动物特征提取的自动八臂迷宫轨迹跟踪系统
Shu-Cing Wu, Chi-Yuan Lin, Liang-Jyun Hong, Chi-Chun Chen
Traumatic Brain Injury (TBI) is most commonly accident injury in modern society. The deterioration of cognition and memory is a common phenomenon caused by TBI. Most of the basic experiments used rats for pathological research. Moreover, an eight-arm maze was often used to test the spatial learning behavior of brain diseases, such as Alzheimer’s disease and TBI. However, most of maze experimental data were collected in manual records. This process would take a lot of manpower and time. Therefore, the research built an automatic tracking trajectory system of the eight-arm maze to collect experiment data. Furthermore, the path trajectory of the rat can be recorded in time. Finally, these path trajectory data were used to analysis behavior feature of TBI animals. The results showed that TBI rats have a 40%~80% chance of having a trajectory to the right.
创伤性脑损伤(TBI)是现代社会最常见的意外伤害。认知和记忆衰退是脑外伤引起的常见现象。大多数基础实验用大鼠进行病理研究。此外,八臂迷宫常被用来测试脑疾病的空间学习行为,如阿尔茨海默病和创伤性脑损伤。然而,大多数迷宫实验数据都是手工记录的。这个过程需要大量的人力和时间。为此,本研究搭建了八臂迷宫自动跟踪轨迹系统,采集实验数据。此外,还可以及时记录大鼠的运动轨迹。最后,利用这些路径轨迹数据分析脑外伤动物的行为特征。结果表明,脑外伤大鼠有40%~80%的机会出现向右运动轨迹。
{"title":"Automated Eight-Arm Maze Trajectory Tracking System for Feature Extraction of TBI Animals","authors":"Shu-Cing Wu, Chi-Yuan Lin, Liang-Jyun Hong, Chi-Chun Chen","doi":"10.1109/SNPD51163.2021.9704966","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9704966","url":null,"abstract":"Traumatic Brain Injury (TBI) is most commonly accident injury in modern society. The deterioration of cognition and memory is a common phenomenon caused by TBI. Most of the basic experiments used rats for pathological research. Moreover, an eight-arm maze was often used to test the spatial learning behavior of brain diseases, such as Alzheimer’s disease and TBI. However, most of maze experimental data were collected in manual records. This process would take a lot of manpower and time. Therefore, the research built an automatic tracking trajectory system of the eight-arm maze to collect experiment data. Furthermore, the path trajectory of the rat can be recorded in time. Finally, these path trajectory data were used to analysis behavior feature of TBI animals. The results showed that TBI rats have a 40%~80% chance of having a trajectory to the right.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121702801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditional Data Augmentation For Sky Segmentation 天空分割的条件数据增强
Zheng-An Zhu, Chien-Hao Chen, Chen-Kuo Chiang
Outdoor scene parsing is a very popular topic which algorithms seek to labels or identify objects in images. Sky segmentation is one of the popular outdoor scene parsing task. Sky segmentation models are usually trained on ideal datasets and produce high quality results. However, the performance of sky segmentation model decreases because of varying weather conditions, different time and scene changes due to seasonal weather or other issues in reality. This paper focuses on applying data augmentation methods to generate diversified images. A conditional data augmentation method based on BicycleGAN is proposed in this paper. The model considers mask loss and content loss for improving the quality and details of the generated images. The experimental results demonstrate that the quality of the generated image is better than the existing methods.
户外场景解析是一个非常热门的话题,它的算法寻求标记或识别图像中的物体。天空分割是户外场景分析中比较流行的任务之一。天空分割模型通常在理想的数据集上训练,并产生高质量的结果。但是,现实中由于天气条件的变化、季节天气造成的时间和场景的变化等问题,会导致天空分割模型的性能下降。本文的重点是应用数据增强方法来生成多样化的图像。提出了一种基于BicycleGAN的条件数据增强方法。该模型考虑了掩模损失和内容损失,以提高生成图像的质量和细节。实验结果表明,生成的图像质量优于现有的方法。
{"title":"Conditional Data Augmentation For Sky Segmentation","authors":"Zheng-An Zhu, Chien-Hao Chen, Chen-Kuo Chiang","doi":"10.1109/SNPD51163.2021.9705011","DOIUrl":"https://doi.org/10.1109/SNPD51163.2021.9705011","url":null,"abstract":"Outdoor scene parsing is a very popular topic which algorithms seek to labels or identify objects in images. Sky segmentation is one of the popular outdoor scene parsing task. Sky segmentation models are usually trained on ideal datasets and produce high quality results. However, the performance of sky segmentation model decreases because of varying weather conditions, different time and scene changes due to seasonal weather or other issues in reality. This paper focuses on applying data augmentation methods to generate diversified images. A conditional data augmentation method based on BicycleGAN is proposed in this paper. The model considers mask loss and content loss for improving the quality and details of the generated images. The experimental results demonstrate that the quality of the generated image is better than the existing methods.","PeriodicalId":235370,"journal":{"name":"2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1