首页 > 最新文献

International Journal of Intelligent Computing and Information Sciences最新文献

英文 中文
A REVIEW OF CLUSTERING ALGORITHMS FOR DETERMINATION OF CANCER SIGNATURES 聚类算法用于确定癌症特征的综述
Pub Date : 2022-08-01 DOI: 10.21608/ijicis.2022.146718.1197
H. Ramadan, Khaled A. ElBahnasy
: Important information needed to comprehend the biological processes that happen in a specific organism, and for sure with a relevance to its environment. Gene expression data is responsible to hide that. We can improve our understanding of functional genomics, and this is possible if we understood the underlying trends in gene expression data. The difficulty of understanding and interpreting the resulting deluge of data is exacerbated by the complexity of biological networks. These issues need to be resolved, so clustering algorithms is used as a start for that. Also, they are needed in many files like the data mining. They can find the natural structures. They are able to extract the most effective patterns. It has been demonstrated that clustering gene expression data is effective for discovering the gene expression data’s natural structure, comprehending cellular processes, gene functions, and cell subtypes, mining usable information from comprehending gene regulation, and noisy data. This review examines the various clustering algorithms that could be applied to the gene expression data, this is aiming to identify the signature genes of biological diseases, which is one the most significant applications of clustering techniques.
:了解特定生物体中发生的生物过程所需的重要信息,并且肯定与其环境相关。基因表达数据负责隐藏这一点。我们可以提高我们对功能基因组学的理解,如果我们了解基因表达数据的潜在趋势,这是可能的。生物网络的复杂性加剧了理解和解释由此产生的海量数据的难度。这些问题需要解决,所以聚类算法被用作解决这个问题的开始。此外,在数据挖掘等许多文件中也需要它们。他们可以找到自然结构。他们能够提取出最有效的模式。研究表明,聚类基因表达数据对于发现基因表达数据的自然结构、理解细胞过程、基因功能和细胞亚型、从理解基因调控和噪声数据中挖掘可用信息是有效的。本文综述了可应用于基因表达数据的各种聚类算法,旨在识别生物学疾病的特征基因,这是聚类技术最重要的应用之一。
{"title":"A REVIEW OF CLUSTERING ALGORITHMS FOR DETERMINATION OF CANCER SIGNATURES","authors":"H. Ramadan, Khaled A. ElBahnasy","doi":"10.21608/ijicis.2022.146718.1197","DOIUrl":"https://doi.org/10.21608/ijicis.2022.146718.1197","url":null,"abstract":": Important information needed to comprehend the biological processes that happen in a specific organism, and for sure with a relevance to its environment. Gene expression data is responsible to hide that. We can improve our understanding of functional genomics, and this is possible if we understood the underlying trends in gene expression data. The difficulty of understanding and interpreting the resulting deluge of data is exacerbated by the complexity of biological networks. These issues need to be resolved, so clustering algorithms is used as a start for that. Also, they are needed in many files like the data mining. They can find the natural structures. They are able to extract the most effective patterns. It has been demonstrated that clustering gene expression data is effective for discovering the gene expression data’s natural structure, comprehending cellular processes, gene functions, and cell subtypes, mining usable information from comprehending gene regulation, and noisy data. This review examines the various clustering algorithms that could be applied to the gene expression data, this is aiming to identify the signature genes of biological diseases, which is one the most significant applications of clustering techniques.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133730634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Stage Hybrid Text-to-Image Generation Models. 多阶段混合文本到图像生成模型。
Pub Date : 2022-08-01 DOI: 10.21608/ijicis.2022.117124.1157
Razan Bayoumi, Marco Alfonse, Abdel-Badeeh M. Salem
Generative Adversarial Networks (GANs) have proven their outstanding potential in creating realistic images that can't differentiate between them and the real images, but text-to-image (conditional generation) still faces some challenges. In this paper, we propose a new model called (AttnDM GAN) stands for Attentional Dynamic Memory Generative Adversarial Memory, which seeks to generate realistic output semantically harmonious with an input text description. AttnDM GAN is a three-stage hybrid model of the Attentional Generative Adversarial Network (AttnGAN) and the Dynamic Memory Generative Adversarial Network (DM-GAN), the 1 st stage is called the Initial Image Generation, in which low resolution 64x64 images are generated conditioned on the encoded input textual description. The 2 nd stage is the Attention Image Generation stage that generates higher-resolution images 128x128, and the last stage is Dynamic Memory Based Image Refinement that refines the images to 256x256 resolution images. We conduct an experiment on our model the AttnDM GAN using the Caltech-UCSD Birds 200 dataset and evaluate it using the Frechet Inception Distance (FID) with a value of 19.78. We also proposed another model called Dynamic Memory Attention Generative Adversarial Networks (DMAttn-GAN) which considered a variation of the AttnDM GAN model, where the second and the third stages are switched together, its FID value is 17.04.
生成对抗网络(GANs)已经证明了其在创建逼真图像方面的突出潜力,但文本到图像(条件生成)仍然面临一些挑战。在本文中,我们提出了一个新的模型(AttnDM GAN),即注意动态记忆生成对抗记忆(attention Dynamic Memory Generative Adversarial Memory),该模型旨在生成与输入文本描述语义协调的真实输出。AttnDM GAN是注意生成对抗网络(attention Generative Adversarial Network, AttnGAN)和动态记忆生成对抗网络(Dynamic Memory Generative Adversarial Network, DM-GAN)的三阶段混合模型,第一阶段称为初始图像生成,在此阶段,根据编码的输入文本描述生成低分辨率64x64图像。第二阶段是注意力图像生成阶段,生成更高分辨率的图像128x128,最后阶段是基于动态记忆的图像细化,将图像细化到256x256分辨率的图像。我们使用Caltech-UCSD Birds 200数据集对我们的AttnDM GAN模型进行了实验,并使用值为19.78的Frechet Inception Distance (FID)对其进行了评估。我们还提出了另一个称为动态记忆注意生成对抗网络(dmatn -GAN)的模型,该模型考虑了AttnDM GAN模型的变体,其中第二阶段和第三阶段被交换在一起,其FID值为17.04。
{"title":"Multi-Stage Hybrid Text-to-Image Generation Models.","authors":"Razan Bayoumi, Marco Alfonse, Abdel-Badeeh M. Salem","doi":"10.21608/ijicis.2022.117124.1157","DOIUrl":"https://doi.org/10.21608/ijicis.2022.117124.1157","url":null,"abstract":"Generative Adversarial Networks (GANs) have proven their outstanding potential in creating realistic images that can't differentiate between them and the real images, but text-to-image (conditional generation) still faces some challenges. In this paper, we propose a new model called (AttnDM GAN) stands for Attentional Dynamic Memory Generative Adversarial Memory, which seeks to generate realistic output semantically harmonious with an input text description. AttnDM GAN is a three-stage hybrid model of the Attentional Generative Adversarial Network (AttnGAN) and the Dynamic Memory Generative Adversarial Network (DM-GAN), the 1 st stage is called the Initial Image Generation, in which low resolution 64x64 images are generated conditioned on the encoded input textual description. The 2 nd stage is the Attention Image Generation stage that generates higher-resolution images 128x128, and the last stage is Dynamic Memory Based Image Refinement that refines the images to 256x256 resolution images. We conduct an experiment on our model the AttnDM GAN using the Caltech-UCSD Birds 200 dataset and evaluate it using the Frechet Inception Distance (FID) with a value of 19.78. We also proposed another model called Dynamic Memory Attention Generative Adversarial Networks (DMAttn-GAN) which considered a variation of the AttnDM GAN model, where the second and the third stages are switched together, its FID value is 17.04.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122350399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PREDICTING STUDENTS’ PERFORMANCE USING AN ENHANCED AGGREGATION STRATEGY FOR SUPERVISED MULTICLASS CLASSIFICATION 基于监督多类分类的增强聚合策略预测学生表现
Pub Date : 2022-08-01 DOI: 10.21608/ijicis.2022.146420.1195
M. Yacoub, Huda Amin, Nivin Atef, S. Soto, Tarek G Gharib
: Predicting students performance efficiently became one of the most interesting research topics. Efficiently mining the educational data is the cornerstone and the first step to make the appropriate intervention to help at-risk students achieve better performance and enhance the educational outcomes. The objective of this paper is to efficiently predict students’ performance by predicting their academic performance level. This is achieved by proposing an enhanced aggregation strategy on a supervised multiclass classification problem to improve the prediction accuracy of students’ performance. Two binary classification techniques: Support Vector Machine (SVM) and Perceptron algorithms, have been experimented to use their output as an input to the proposed aggregation strategy to be compared with a previously used aggregation strategy. The proposed strategy improved the prediction performance and achieved an accuracy, recall, and precision of 75.0%, 76.0%, and 75.48% using Perceptron, respectively. Moreover, the proposed strategy outperformed and achieved an accuracy, recall, and precision of 73.96%, 73.93%, and 75.33% using SVM, respectively.
有效地预测学生的表现成为最有趣的研究课题之一。有效地挖掘教育数据是采取适当干预措施,帮助有风险的学生取得更好的成绩和提高教育成果的基石和第一步。本文的目的是通过预测学生的学习成绩水平来有效地预测学生的学习成绩。这是通过在一个有监督的多类分类问题上提出一种增强的聚合策略来提高学生成绩的预测精度来实现的。两种二元分类技术:支持向量机(SVM)和感知器算法,已经被实验使用它们的输出作为所提出的聚合策略的输入,并与先前使用的聚合策略进行比较。该策略提高了预测性能,使用感知器的准确率、召回率和精密度分别达到75.0%、76.0%和75.48%。此外,该策略的准确率、召回率和精密度分别达到73.96%、73.93%和75.33%。
{"title":"PREDICTING STUDENTS’ PERFORMANCE USING AN ENHANCED AGGREGATION STRATEGY FOR SUPERVISED MULTICLASS CLASSIFICATION","authors":"M. Yacoub, Huda Amin, Nivin Atef, S. Soto, Tarek G Gharib","doi":"10.21608/ijicis.2022.146420.1195","DOIUrl":"https://doi.org/10.21608/ijicis.2022.146420.1195","url":null,"abstract":": Predicting students performance efficiently became one of the most interesting research topics. Efficiently mining the educational data is the cornerstone and the first step to make the appropriate intervention to help at-risk students achieve better performance and enhance the educational outcomes. The objective of this paper is to efficiently predict students’ performance by predicting their academic performance level. This is achieved by proposing an enhanced aggregation strategy on a supervised multiclass classification problem to improve the prediction accuracy of students’ performance. Two binary classification techniques: Support Vector Machine (SVM) and Perceptron algorithms, have been experimented to use their output as an input to the proposed aggregation strategy to be compared with a previously used aggregation strategy. The proposed strategy improved the prediction performance and achieved an accuracy, recall, and precision of 75.0%, 76.0%, and 75.48% using Perceptron, respectively. Moreover, the proposed strategy outperformed and achieved an accuracy, recall, and precision of 73.96%, 73.93%, and 75.33% using SVM, respectively.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128311318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study on Feature Selection Methods for Protein 蛋白质特征选择方法的比较研究
Pub Date : 2022-08-01 DOI: 10.21608/ijicis.2022.144051.1190
Walaa Alkady, Khaled A. ElBahnasy, Walaa K. Gad
Received 2022-06-11; Revised 2022-07-22; Accepted 2022-07-24 Abstract: The automated and high-throughput identification of protein function is one of the main issues in computational biology. Predicting the protein's structure is a crucial step in this procedure. In recent years, a wide range of approaches for predicting protein structure has been put forth. They can be divided into two groups: database-based and sequence-based. The first is to identify the principles behind protein structure and attempts to extract valuable characteristics from amino acid sequences. The second one uses pre-existing public annotation databases for data mining. This study emphasizes the sequence-based method and makes use of the ability of amino acid sequences to predict protein activity. The amino acid composition approach, the amino acid tuple approach, and several optimization algorithms were compared. Different protein sequence data sets were used in our experiments. Five classifiers were tested in this research. The best accuracy is 98% using across 10fold cross-validation. This represents the highest performance in the Human dataset.
收到2022-06-11;修改后的2022-07-22;摘要:蛋白质功能的自动化和高通量鉴定是计算生物学的主要问题之一。在这个过程中,预测蛋白质的结构是至关重要的一步。近年来,人们提出了多种预测蛋白质结构的方法。它们可以分为两类:基于数据库的和基于序列的。首先是确定蛋白质结构背后的原理,并试图从氨基酸序列中提取有价值的特征。第二种方法使用预先存在的公共注释数据库进行数据挖掘。本研究强调基于序列的方法,利用氨基酸序列预测蛋白质活性的能力。比较了氨基酸组成法、氨基酸元组法和几种优化算法。我们的实验使用了不同的蛋白质序列数据集。本研究对五个分类器进行了测试。使用10倍交叉验证的最佳准确率为98%。这代表了人类数据集中的最高性能。
{"title":"Comparative Study on Feature Selection Methods for Protein","authors":"Walaa Alkady, Khaled A. ElBahnasy, Walaa K. Gad","doi":"10.21608/ijicis.2022.144051.1190","DOIUrl":"https://doi.org/10.21608/ijicis.2022.144051.1190","url":null,"abstract":"Received 2022-06-11; Revised 2022-07-22; Accepted 2022-07-24 Abstract: The automated and high-throughput identification of protein function is one of the main issues in computational biology. Predicting the protein's structure is a crucial step in this procedure. In recent years, a wide range of approaches for predicting protein structure has been put forth. They can be divided into two groups: database-based and sequence-based. The first is to identify the principles behind protein structure and attempts to extract valuable characteristics from amino acid sequences. The second one uses pre-existing public annotation databases for data mining. This study emphasizes the sequence-based method and makes use of the ability of amino acid sequences to predict protein activity. The amino acid composition approach, the amino acid tuple approach, and several optimization algorithms were compared. Different protein sequence data sets were used in our experiments. Five classifiers were tested in this research. The best accuracy is 98% using across 10fold cross-validation. This represents the highest performance in the Human dataset.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117026624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Identification of the Top Positive Influential Users of the Social Networks to Help in the Control of Covid-19 Spread 识别社交网络上最具积极影响力的用户以帮助控制Covid-19的传播
Pub Date : 2022-07-28 DOI: 10.21608/ijicis.2022.105691.1139
A. Samir, Tarek G Gharib, S. Rady
: Covid-19 pandemic is considered the most worldwide problem, and causes horrible crises for all human being. Social networks can play a vital role in the prevention of the spread of the Covid-19 pandemic. The top influential users of social networks like Twitter can have positive or negative effect in the broadcast of useful and same time harmful information about how to deal with the virus, and encourage people to follow up the rules announced by World Health Organization (WHO). So the detection of the top positive and negative influential users can help in the control of the spread of the virus. The proposed approach is based on applying influence maximization solutions to identify the top influential users from Twitter social network graph, and to determine if the influence is positive or not. The proposed approach has four main phases, the first phase is collecting Covid-19 pandemic related tweets dataset and extract the related users and their followers. The second phase is creating a social network graph from the collected dataset. The third phase is using LKG influence maximization approach to identify the most effective users from the social network graph. The last phase is based on using hashtags frequency analysis to be able to identify the type of influence of each top influential user.
Covid-19大流行被认为是最世界性的问题,给全人类带来了可怕的危机。社交网络可以在预防Covid-19大流行的传播中发挥至关重要的作用。像推特这样的社交网络上最具影响力的用户可以通过传播有用的和有害的关于如何应对病毒的信息来产生积极或消极的影响,并鼓励人们遵循世界卫生组织(WHO)宣布的规则。因此,检测出最具正面和负面影响的用户可以帮助控制病毒的传播。提出的方法是基于应用影响力最大化解决方案,从Twitter社交网络图中识别最具影响力的用户,并确定影响是否积极。该方法主要分为四个阶段,第一阶段是收集新冠肺炎疫情相关推文数据集,提取相关用户及其关注者。第二阶段是从收集到的数据集创建一个社交网络图。第三阶段是使用LKG影响力最大化方法从社交网络图中识别最有效的用户。最后一个阶段是基于使用标签频率分析,能够识别每个最具影响力用户的影响类型。
{"title":"The Identification of the Top Positive Influential Users of the Social Networks to Help in the Control of Covid-19 Spread","authors":"A. Samir, Tarek G Gharib, S. Rady","doi":"10.21608/ijicis.2022.105691.1139","DOIUrl":"https://doi.org/10.21608/ijicis.2022.105691.1139","url":null,"abstract":": Covid-19 pandemic is considered the most worldwide problem, and causes horrible crises for all human being. Social networks can play a vital role in the prevention of the spread of the Covid-19 pandemic. The top influential users of social networks like Twitter can have positive or negative effect in the broadcast of useful and same time harmful information about how to deal with the virus, and encourage people to follow up the rules announced by World Health Organization (WHO). So the detection of the top positive and negative influential users can help in the control of the spread of the virus. The proposed approach is based on applying influence maximization solutions to identify the top influential users from Twitter social network graph, and to determine if the influence is positive or not. The proposed approach has four main phases, the first phase is collecting Covid-19 pandemic related tweets dataset and extract the related users and their followers. The second phase is creating a social network graph from the collected dataset. The third phase is using LKG influence maximization approach to identify the most effective users from the social network graph. The last phase is based on using hashtags frequency analysis to be able to identify the type of influence of each top influential user.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicles Detection and Tracking in Advanced & Automated Driving Systems: Limitations and Challenges 先进自动驾驶系统中的车辆检测与跟踪:限制与挑战
Pub Date : 2022-07-24 DOI: 10.21608/ijicis.2022.117646.1158
Mona A. Sadik, Sherin M. Moussa, Ahmed El-Sayed, Z. Fayed
: Automated Driving Systems (ADS) and Advanced Driving Assistance Systems (ADAS) are widely investigated for developing safe and intelligent transportation systems. A common module in both systems is road objects monitoring, in which the semantic segmentation for road scene understanding has encountered lots of challenges. Due to the rapid evolution in technologies applied in vision-based systems in many fields, diverse techniques and algorithms have emerged to tackle such limitations, as invariant-illumination conditions, shadows, false positives, misdetections, weather conditions, real time processing and occlusions. A comparative study is conducted in this paper for vehicle detection and tracking methods applied on images and streams produced from monocular cameras and sensors in ADAS and ADS in terms of the aforementioned problems, the used dataset, along with the extracted features and the associated evaluation criteria. The study deduces the limitations of the current state-of-art techniques in such particular systems and highlights the main directions that can be ado ted for future research and investigations.
自动驾驶系统(ADS)和高级驾驶辅助系统(ADAS)在开发安全和智能交通系统方面得到了广泛的研究。两个系统的共同模块是道路对象监测,其中道路场景理解的语义分割遇到了很多挑战。由于在许多领域基于视觉的系统中应用的技术的快速发展,出现了各种各样的技术和算法来解决这些限制,如恒定光照条件、阴影、误报、误检测、天气条件、实时处理和遮挡。本文针对上述问题、使用的数据集、提取的特征以及相关的评价标准,对ADAS和ADS中单目摄像头和传感器产生的图像和流所采用的车辆检测和跟踪方法进行了对比研究。该研究推断了目前最先进的技术在这些特定系统中的局限性,并强调了未来研究和调查可以关注的主要方向。
{"title":"Vehicles Detection and Tracking in Advanced & Automated Driving Systems: Limitations and Challenges","authors":"Mona A. Sadik, Sherin M. Moussa, Ahmed El-Sayed, Z. Fayed","doi":"10.21608/ijicis.2022.117646.1158","DOIUrl":"https://doi.org/10.21608/ijicis.2022.117646.1158","url":null,"abstract":": Automated Driving Systems (ADS) and Advanced Driving Assistance Systems (ADAS) are widely investigated for developing safe and intelligent transportation systems. A common module in both systems is road objects monitoring, in which the semantic segmentation for road scene understanding has encountered lots of challenges. Due to the rapid evolution in technologies applied in vision-based systems in many fields, diverse techniques and algorithms have emerged to tackle such limitations, as invariant-illumination conditions, shadows, false positives, misdetections, weather conditions, real time processing and occlusions. A comparative study is conducted in this paper for vehicle detection and tracking methods applied on images and streams produced from monocular cameras and sensors in ADAS and ADS in terms of the aforementioned problems, the used dataset, along with the extracted features and the associated evaluation criteria. The study deduces the limitations of the current state-of-art techniques in such particular systems and highlights the main directions that can be ado ted for future research and investigations.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131538207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intelligent Educational System for Breast Cancer Management" “乳腺癌管理智能教育系统”
Pub Date : 2022-07-20 DOI: 10.21608/ijicis.2022.136628.1179
نجوي عبدالعال
{"title":"An Intelligent Educational System for Breast Cancer Management\"","authors":"نجوي عبدالعال","doi":"10.21608/ijicis.2022.136628.1179","DOIUrl":"https://doi.org/10.21608/ijicis.2022.136628.1179","url":null,"abstract":"","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125068331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Image Data Hiding Techniques** 图像数据隐藏技术综述**
Pub Date : 2022-06-21 DOI: 10.21608/ijicis.2022.130393.1174
Mahmoud Mohamed, S. Ghoniemy, N. Ghali
: Due to the observed growth in recent years of digital image communication, computer technologies, and image processing techniques image security has been an essential demand due to the different image attacks. Image security approaches are classified into cryptography and data hiding techniques, including digital watermarking and steganography. This study paper reviews existing picture data hiding techniques, their benefits and drawbacks, and future research directions. In addition to the survey, we included a brief explanation of several geometric and image processing attacks that impair picture transmission. General multimedia security ideas, primary requirements, and recent applications We addressed various approaches and their characteristics, types, requirements, and working mechanisms. We classify the techniques based on different domains. General concepts of data hiding approaches, their characteristics, recent applications used in, also recent research work for proposed techniques is discussed in the following sections, finally, a comparison between different methodologies has been presented in a table.
由于近年来数字图像通信,计算机技术和图像处理技术的增长,由于不同的图像攻击,图像安全已经成为一种基本需求。图像安全方法分为加密技术和数据隐藏技术,包括数字水印和隐写技术。本文综述了现有的图像数据隐藏技术及其优缺点,并展望了未来的研究方向。除了调查之外,我们还简要解释了几种损害图像传输的几何和图像处理攻击。一般多媒体安全思想、主要需求和最新应用我们讨论了各种方法及其特点、类型、需求和工作机制。我们根据不同的领域对技术进行分类。数据隐藏方法的一般概念,它们的特点,最近的应用,以及最近的研究工作中提出的技术将在以下部分进行讨论,最后,不同的方法之间的比较已经在一个表中提出。
{"title":"A Survey on Image Data Hiding Techniques**","authors":"Mahmoud Mohamed, S. Ghoniemy, N. Ghali","doi":"10.21608/ijicis.2022.130393.1174","DOIUrl":"https://doi.org/10.21608/ijicis.2022.130393.1174","url":null,"abstract":": Due to the observed growth in recent years of digital image communication, computer technologies, and image processing techniques image security has been an essential demand due to the different image attacks. Image security approaches are classified into cryptography and data hiding techniques, including digital watermarking and steganography. This study paper reviews existing picture data hiding techniques, their benefits and drawbacks, and future research directions. In addition to the survey, we included a brief explanation of several geometric and image processing attacks that impair picture transmission. General multimedia security ideas, primary requirements, and recent applications We addressed various approaches and their characteristics, types, requirements, and working mechanisms. We classify the techniques based on different domains. General concepts of data hiding approaches, their characteristics, recent applications used in, also recent research work for proposed techniques is discussed in the following sections, finally, a comparison between different methodologies has been presented in a table.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Method for Classifying Electro-Oculography (EOG) Signals Using Deep Learning 基于深度学习的眼电信号分类方法研究
Pub Date : 2022-05-23 DOI: 10.21608/ijicis.2022.99424.1126
R. Hossieny, M. Tantawi, H. Shedeed, Mohamed Tolba
: Recently, a significant increase appears in the number of patients with severe motor disabilities even though the cognitive parts of their brains are intact. These disabilities prevent them from being able to move all their limbs except for the movement of their eyes. This creates great difficulty in carrying out the simplest daily activities, as well as difficulty in communicating with their surrounding environment. With the advent of Human Computer Interfaces (HCI), a new method of communication has been found based on determining the direction of eye movement. The eye movement is recorded by Electro-oculogram (EOG) using a set of electrodes placed around the eye horizontally and vertically. In this work, The horizontal and vertical EOG signals are filtered and analyzed to determine six eye movement directions (Right, left, up, down, center, and double blinking). The deep learning models namely Residual network and ResNet-50 network have been examined. The experimental results show that the ResNet-50 network gives the best average accuracy 95.8%.
最近,严重运动障碍患者的数量显著增加,尽管他们大脑的认知部分完好无损。这些残疾使他们无法活动除眼睛以外的所有肢体。这给他们进行最简单的日常活动带来了很大的困难,也给他们与周围环境交流带来了困难。随着人机界面(HCI)的出现,人们发现了一种基于确定眼球运动方向的新的通信方法。眼球运动通过眼电图(EOG)记录下来,眼电图使用一组水平和垂直放置在眼睛周围的电极。在这项工作中,对水平和垂直的EOG信号进行过滤和分析,以确定六种眼动方向(右、左、上、下、中、双眨)。对深度学习模型残差网络和ResNet-50网络进行了研究。实验结果表明,ResNet-50网络的平均准确率最高,达到95.8%。
{"title":"Developing a Method for Classifying Electro-Oculography (EOG) Signals Using Deep Learning","authors":"R. Hossieny, M. Tantawi, H. Shedeed, Mohamed Tolba","doi":"10.21608/ijicis.2022.99424.1126","DOIUrl":"https://doi.org/10.21608/ijicis.2022.99424.1126","url":null,"abstract":": Recently, a significant increase appears in the number of patients with severe motor disabilities even though the cognitive parts of their brains are intact. These disabilities prevent them from being able to move all their limbs except for the movement of their eyes. This creates great difficulty in carrying out the simplest daily activities, as well as difficulty in communicating with their surrounding environment. With the advent of Human Computer Interfaces (HCI), a new method of communication has been found based on determining the direction of eye movement. The eye movement is recorded by Electro-oculogram (EOG) using a set of electrodes placed around the eye horizontally and vertically. In this work, The horizontal and vertical EOG signals are filtered and analyzed to determine six eye movement directions (Right, left, up, down, center, and double blinking). The deep learning models namely Residual network and ResNet-50 network have been examined. The experimental results show that the ResNet-50 network gives the best average accuracy 95.8%.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131866185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SURVEY ON AUTOMATED USER INTERFACE TESTING FOR MOBILE APPLICATIONS 关于移动应用程序自动化用户界面测试的调查
Pub Date : 2022-05-19 DOI: 10.21608/ijicis.2022.98138.1124
Amira Samir, Huda Amin, N. Badr
: Nowadays, smartphones play a remarkable role in our lives. Testing mobile applications is significant to guarantee their quality. Automated testing is applied to minimize the cost and the interval of time instead of manual testing. There are different testing levels which are unit testing, integration testing, system testing and acceptance testing. Automated mobile application testing type methodologies are categorized into white-box testing, black-box testing and grey-box testing. Besides, there are several testing types such as functional testing and non-functional testing. Most of the existing studies focus on user interface testing which is type of functional testing. In this paper, testing approaches for user interface testing through different existing studies from 2013 to 2021 have been surveyed. Those approaches are classified into model-based testing, model learning testing, search-based testing, random-based testing, and record & replay testing. Several essential issues related to those approach such as the optimization and redundancy for generation of test suites have been mentioned. Finally, challenges in automated mobile applications user interface testing have been discussed.
如今,智能手机在我们的生活中扮演着重要的角色。测试移动应用程序对于保证其质量非常重要。自动化测试应用于最小化成本和时间间隔,而不是手工测试。测试分为单元测试、集成测试、系统测试和验收测试。自动化移动应用程序测试类型的方法分为白盒测试、黑盒测试和灰盒测试。此外,还有多种测试类型,如功能测试和非功能测试。现有的研究大多集中在用户界面测试这一功能测试的类型上。本文通过2013年至2021年不同的现有研究,对用户界面测试的测试方法进行了调查。这些方法分为基于模型的测试、模型学习测试、基于搜索的测试、基于随机的测试和记录&重放测试。与这些方法相关的几个基本问题,如测试套件生成的优化和冗余已经被提到。最后,讨论了自动化移动应用程序用户界面测试面临的挑战。
{"title":"A SURVEY ON AUTOMATED USER INTERFACE TESTING FOR MOBILE APPLICATIONS","authors":"Amira Samir, Huda Amin, N. Badr","doi":"10.21608/ijicis.2022.98138.1124","DOIUrl":"https://doi.org/10.21608/ijicis.2022.98138.1124","url":null,"abstract":": Nowadays, smartphones play a remarkable role in our lives. Testing mobile applications is significant to guarantee their quality. Automated testing is applied to minimize the cost and the interval of time instead of manual testing. There are different testing levels which are unit testing, integration testing, system testing and acceptance testing. Automated mobile application testing type methodologies are categorized into white-box testing, black-box testing and grey-box testing. Besides, there are several testing types such as functional testing and non-functional testing. Most of the existing studies focus on user interface testing which is type of functional testing. In this paper, testing approaches for user interface testing through different existing studies from 2013 to 2021 have been surveyed. Those approaches are classified into model-based testing, model learning testing, search-based testing, random-based testing, and record & replay testing. Several essential issues related to those approach such as the optimization and redundancy for generation of test suites have been mentioned. Finally, challenges in automated mobile applications user interface testing have been discussed.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Intelligent Computing and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1