首页 > 最新文献

2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)最新文献

英文 中文
Smart Tutoring System for Arabic Sign Language Using Leap Motion Controller 基于Leap运动控制器的阿拉伯手语智能辅导系统
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538425
Heba A. Fasihuddin, S. Alsolami, Seham Alzahrani, Rawan Alasiri, Afnan Sahloli
This paper presents a smart tutoring system for Arabic Sign Language (ArSL). Sign language is one of the main approaches of communication for people with hearing impairment. Many people are willing to learn sign language and support this segment of the society; however, learning this language requires some effort and assistant. Tools that are used to support sign language learners and specifically ArSL are limited and insufficient. Hence, the development of a tool that is capable of training and assessing ArSL learners becomes a necessity. We proposed a smart tutoring for ArSL based on using the leap motion’s hand tracking technology. The aim of this system is assisting non-disabled learners who want to learn the sign language, such as undergraduates specializing in hearing disabilities, parents of kids with hearing impairment or any interested subject. The system allows learners to practice ArSL in different levels and self-assess themselves. As it utilizes the recent technology of leap motion controller, it can detect and track hand and fingers movements and consequently assess the position and movement accuracy. Machine learning techniques, specifically the K- Nearest Neighbor algorithm was applied for classification and sign recognition. Preliminary prototype was developed and tested in terms of users’ acceptance. The outcomes show satisfactory and promising results. It is expected that the proposed system will contribute in enriching the learning process of ArSL and consequently support an important segment of our community.
本文提出了一种智能阿拉伯手语教学系统。手语是听力障碍人士交流的主要方式之一。许多人愿意学习手语并支持这一社会群体;然而,学习这门语言需要一些努力和帮助。用于支持手语学习者,特别是ArSL的工具是有限和不足的。因此,有必要开发一种能够培训和评估ArSL学习者的工具。提出了一种基于跳跃运动手部跟踪技术的ArSL智能辅导方案。该系统的目的是帮助想要学习手语的非残疾学习者,如听力障碍专业的本科生,听力障碍儿童的父母或任何感兴趣的科目。该系统允许学习者进行不同层次的ArSL练习和自我评估。由于采用了最新的跳跃运动控制器技术,它可以检测和跟踪手和手指的运动,从而评估位置和运动的准确性。机器学习技术,特别是K近邻算法应用于分类和符号识别。开发了初步原型,并根据用户的接受程度进行了测试。结果显示出令人满意和有希望的结果。预计拟议的系统将有助于丰富ArSL的学习过程,从而支持我们社区的一个重要部分。
{"title":"Smart Tutoring System for Arabic Sign Language Using Leap Motion Controller","authors":"Heba A. Fasihuddin, S. Alsolami, Seham Alzahrani, Rawan Alasiri, Afnan Sahloli","doi":"10.1109/ICSCEE.2018.8538425","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538425","url":null,"abstract":"This paper presents a smart tutoring system for Arabic Sign Language (ArSL). Sign language is one of the main approaches of communication for people with hearing impairment. Many people are willing to learn sign language and support this segment of the society; however, learning this language requires some effort and assistant. Tools that are used to support sign language learners and specifically ArSL are limited and insufficient. Hence, the development of a tool that is capable of training and assessing ArSL learners becomes a necessity. We proposed a smart tutoring for ArSL based on using the leap motion’s hand tracking technology. The aim of this system is assisting non-disabled learners who want to learn the sign language, such as undergraduates specializing in hearing disabilities, parents of kids with hearing impairment or any interested subject. The system allows learners to practice ArSL in different levels and self-assess themselves. As it utilizes the recent technology of leap motion controller, it can detect and track hand and fingers movements and consequently assess the position and movement accuracy. Machine learning techniques, specifically the K- Nearest Neighbor algorithm was applied for classification and sign recognition. Preliminary prototype was developed and tested in terms of users’ acceptance. The outcomes show satisfactory and promising results. It is expected that the proposed system will contribute in enriching the learning process of ArSL and consequently support an important segment of our community.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127308329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Analysis of Generalized LED Index Modulation OFDM on FPGA 基于FPGA的广义LED指数调制OFDM的设计与分析
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538427
Dwi Astharini, Nurul Ihsan Hariz Pratama, S. Rahardjo, F. Triputra, A. Syahriar, Octarina Nur Samijayani
In this paper, design and analysis one of the proposed Optical Orthogonal Frequency Division Multiplexing (OFDM) for Visible Light Communication has been conducted. The chosen design is Generalized LED Index Modulation Orthogonal Frequency Division Multiplexing (GLIM-OFDM), with its proposed scheme that avoid Hermitian symmetry and DC bias. Thus, by utilizing the properties of complex data signal and the bipolar index with spatial modulation Multi Input Multi Output (MIMO) configuration. System generator is used to design the GLIM-OFDM. The design is targeted into Arty Board with Xilinx Artix-7 FPGA. Analysis and comparison are covering in the arithmetic option of unscaled and scaled for its effect on precision, performance, and resource usage. The designed system is proven to work according to theory of operation scheme. To verify that, the reversible design has been designed to ensure the processed data in the transmitter side with the origin data signal. The unscaled option performs slightly faster than the scaled option. Both arithmetic option has same precision of data representation. The GLIM-OFDM design used less resource in unscaled option compared with the design in scaled option.
本文设计并分析了一种用于可见光通信的光正交频分复用(OFDM)。所选择的设计是广义LED指数调制正交频分复用(gim - ofdm),其所提出的方案避免了厄米对称和直流偏置。因此,利用复杂数据信号的特性和双极指数具有空间调制的多输入多输出(MIMO)配置。系统发生器用于微光- ofdm的设计。该设计针对Xilinx Artix-7 FPGA的Arty板。分析和比较涵盖了未缩放和缩放的算术选项对精度、性能和资源使用的影响。根据运行方案理论,设计的系统运行良好。为了验证这一点,设计了可逆设计,以保证处理后的数据在发送端与原始数据信号保持一致。未缩放选项的执行速度略快于缩放选项。两种算术选项具有相同的数据表示精度。与有比例选项的设计相比,无比例选项的设计使用了更少的资源。
{"title":"Design and Analysis of Generalized LED Index Modulation OFDM on FPGA","authors":"Dwi Astharini, Nurul Ihsan Hariz Pratama, S. Rahardjo, F. Triputra, A. Syahriar, Octarina Nur Samijayani","doi":"10.1109/ICSCEE.2018.8538427","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538427","url":null,"abstract":"In this paper, design and analysis one of the proposed Optical Orthogonal Frequency Division Multiplexing (OFDM) for Visible Light Communication has been conducted. The chosen design is Generalized LED Index Modulation Orthogonal Frequency Division Multiplexing (GLIM-OFDM), with its proposed scheme that avoid Hermitian symmetry and DC bias. Thus, by utilizing the properties of complex data signal and the bipolar index with spatial modulation Multi Input Multi Output (MIMO) configuration. System generator is used to design the GLIM-OFDM. The design is targeted into Arty Board with Xilinx Artix-7 FPGA. Analysis and comparison are covering in the arithmetic option of unscaled and scaled for its effect on precision, performance, and resource usage. The designed system is proven to work according to theory of operation scheme. To verify that, the reversible design has been designed to ensure the processed data in the transmitter side with the origin data signal. The unscaled option performs slightly faster than the scaled option. Both arithmetic option has same precision of data representation. The GLIM-OFDM design used less resource in unscaled option compared with the design in scaled option.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126554046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying RNN and J48 Deep Learning in Android Cyber Security Space for Threat Analysis 应用RNN和J48深度学习在Android网络安全空间进行威胁分析
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538405
T. Teoh, G. Chiew, Y. Jaddoo, H. Michael, A. Karunakaran, Y. Goh
Recurrent Neural Networks (RNN) are a special class of deep learning algorithms using neurons or nodes, and have received much attention in the subject of data science in the recent years. In RNN, the input nodes take into consideration not only the current inputs, but the previously perceived outputs as well – hence the term recursive. In today’s context, smartphones are very much a part of almost every individual’s daily lives. The demand, development and usage of Android devices is massive. As Android devices dominate the current market share, the question of security naturally arises in our complex world. Consequently, the amount of malware data available for research is voluminous as well. This publication demonstrates the power and efficiency of RNN applied onto Android malware data. We study a procured dataset, with over 4000 entries labeled as malicious or benign. From our experiment and data analytics, we present a prediction accuracy of 0.964 using RNN.
递归神经网络(RNN)是一类特殊的使用神经元或节点的深度学习算法,近年来在数据科学领域受到了广泛关注。在RNN中,输入节点不仅考虑当前的输入,还考虑之前感知到的输出——因此称为递归。在今天的背景下,智能手机几乎是每个人日常生活的一部分。Android设备的需求、开发和使用都是巨大的。随着Android设备占据当前的市场份额,安全问题自然会在我们这个复杂的世界中出现。因此,可用于研究的恶意软件数据的数量也是巨大的。本文演示了RNN应用于Android恶意软件数据的能力和效率。我们研究了一个获取的数据集,其中有超过4000个条目被标记为恶意或良性。通过实验和数据分析,我们提出了RNN的预测精度为0.964。
{"title":"Applying RNN and J48 Deep Learning in Android Cyber Security Space for Threat Analysis","authors":"T. Teoh, G. Chiew, Y. Jaddoo, H. Michael, A. Karunakaran, Y. Goh","doi":"10.1109/ICSCEE.2018.8538405","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538405","url":null,"abstract":"Recurrent Neural Networks (RNN) are a special class of deep learning algorithms using neurons or nodes, and have received much attention in the subject of data science in the recent years. In RNN, the input nodes take into consideration not only the current inputs, but the previously perceived outputs as well – hence the term recursive. In today’s context, smartphones are very much a part of almost every individual’s daily lives. The demand, development and usage of Android devices is massive. As Android devices dominate the current market share, the question of security naturally arises in our complex world. Consequently, the amount of malware data available for research is voluminous as well. This publication demonstrates the power and efficiency of RNN applied onto Android malware data. We study a procured dataset, with over 4000 entries labeled as malicious or benign. From our experiment and data analytics, we present a prediction accuracy of 0.964 using RNN.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124193052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Empirical Study On Tonal Patterns Of Shandong Dialects 山东方言声调模式的实证研究
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538408
Yuan Jia
–-Tonal patterns in spoken language carry rich semantic and sentiment information. However, they may differ significantly from dialect to dialect, even within the same language. Therefore, understanding dialect-specific tonal patterns plays an important role for developing intelligent and customized speech understanding and generation technologies. The present study adopts phonetic experiments to systematically investigate the citation tone and tone sandhi patterns of Liaocheng and Tai’an dialects that belong to the Shangdong dialectal region in China. It aims to provide empirical data for the theoretical analysis and explore the diversities of tonal phenomenon within Shandong (Hereinafter, as SD) dialect. Results demonstrate that both of these two dialects have four citation tones, i.e., Tone 1(14), Tone2 (51), Tone3 (55), and Tone4 (35) in Liaocheng dialect; Tone 1(14), Tone2 (51), Tone3 (55), and Tone4 (213) in Tai’an dialect. Due to the difference of Tone4 between these two dialects, Tai’an dialect exhibits more kinds of tone sandhi patterns than Liaocheng dialect. This result lies in the devious tone4 in Tai’an dialect, which triggers more tonal variations in disyllabic sequences.
——口语中的声调模式承载着丰富的语义和情感信息。然而,即使在同一种语言中,它们也可能因方言而异。因此,理解方言特定的音调模式对于开发智能和定制的语音理解和生成技术具有重要作用。本研究采用语音实验的方法,系统考察了山东方言地区聊城方言和泰安方言的引证语气和连读模式。旨在为理论分析提供实证数据,探索山东方言声调现象的多样性。结果表明,两种方言均有四个引证声调,即聊城方言的引证声调1(14)、引证声调2(51)、引证声调3(55)和引证声调4 (35);声调1(14)、声调2(51)、声调3(55)、声调4(213)。由于两种方言Tone4的差异,泰安方言比聊城方言表现出更多的变调模式。造成这种结果的原因在于泰安方言的声调偏曲,从而引发了更多的双音节序列的声调变化。
{"title":"An Empirical Study On Tonal Patterns Of Shandong Dialects","authors":"Yuan Jia","doi":"10.1109/ICSCEE.2018.8538408","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538408","url":null,"abstract":"–-Tonal patterns in spoken language carry rich semantic and sentiment information. However, they may differ significantly from dialect to dialect, even within the same language. Therefore, understanding dialect-specific tonal patterns plays an important role for developing intelligent and customized speech understanding and generation technologies. The present study adopts phonetic experiments to systematically investigate the citation tone and tone sandhi patterns of Liaocheng and Tai’an dialects that belong to the Shangdong dialectal region in China. It aims to provide empirical data for the theoretical analysis and explore the diversities of tonal phenomenon within Shandong (Hereinafter, as SD) dialect. Results demonstrate that both of these two dialects have four citation tones, i.e., Tone 1(14), Tone2 (51), Tone3 (55), and Tone4 (35) in Liaocheng dialect; Tone 1(14), Tone2 (51), Tone3 (55), and Tone4 (213) in Tai’an dialect. Due to the difference of Tone4 between these two dialects, Tai’an dialect exhibits more kinds of tone sandhi patterns than Liaocheng dialect. This result lies in the devious tone4 in Tai’an dialect, which triggers more tonal variations in disyllabic sequences.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115610909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial Frequency Filtering Using Sofm For Image Compression 利用Sofm进行空间频率滤波的图像压缩
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538375
Shadi M. S. Hilles
The aim of the research is to propose a new approach to image coding using SOFM and spatial frequency band-pass filter to investigate the Artificial Neural Network. The approach is based on SOFM which is similar to vector quantization (VQ) and it is adopted the technique to improve the image compression effectively. In the approach has been using the band-pass filter for image compression by SOFM based on vector quantization by components as the original image and the spatial frequency image component, which is derived from the adaptive to the contours of the 2D analysis and synthesis. The calculation of the computational cost is compression based on SOFM. The new approach of image coding using a band-pass filter, where is used as a first stage of proposed method of image encoding and as well as the image decoding has been presented with De-quantization with entropy coding based on arithmetic coder and high pass filter, the evaluation with jpeg format compression shows, that using 16x16 image block of pre-processing in SOFM has given the best compression ratio with small SNR. On the given experiment shows the different pixels presented by Lena.bmp, girl256.bmp and compared with a compression ratio of the Iena.jpeg file.
本研究的目的是提出一种利用SOFM和空间频率带通滤波器对人工神经网络进行图像编码的新方法。该方法基于与矢量量化(VQ)相似的SOFM,并采用该技术有效地提高了图像的压缩性能。在该方法中一直采用带通滤波器进行图像压缩,由基于矢量量化的SOFM分量作为原始图像和空间频率图像分量,从而对二维轮廓进行自适应分析和合成。计算代价的计算是基于SOFM的压缩。本文提出了一种基于带通滤波器的图像编码新方法,将带通滤波器作为图像编码的第一阶段,并提出了基于算法编码器和高通滤波器的熵编码去量化的图像解码方法,并对jpeg格式的压缩进行了评价,结果表明,在SOFM中使用16x16的预处理图像块获得了较小信噪比的最佳压缩比。在给定的实验上展示了Lena.bmp和girl256.bmp所呈现的不同像素,并与Iena.jpeg文件的压缩比进行了比较。
{"title":"Spatial Frequency Filtering Using Sofm For Image Compression","authors":"Shadi M. S. Hilles","doi":"10.1109/ICSCEE.2018.8538375","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538375","url":null,"abstract":"The aim of the research is to propose a new approach to image coding using SOFM and spatial frequency band-pass filter to investigate the Artificial Neural Network. The approach is based on SOFM which is similar to vector quantization (VQ) and it is adopted the technique to improve the image compression effectively. In the approach has been using the band-pass filter for image compression by SOFM based on vector quantization by components as the original image and the spatial frequency image component, which is derived from the adaptive to the contours of the 2D analysis and synthesis. The calculation of the computational cost is compression based on SOFM. The new approach of image coding using a band-pass filter, where is used as a first stage of proposed method of image encoding and as well as the image decoding has been presented with De-quantization with entropy coding based on arithmetic coder and high pass filter, the evaluation with jpeg format compression shows, that using 16x16 image block of pre-processing in SOFM has given the best compression ratio with small SNR. On the given experiment shows the different pixels presented by Lena.bmp, girl256.bmp and compared with a compression ratio of the Iena.jpeg file.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud Computing Review: Features And Issues 云计算评论:特点和问题
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538387
A. Al-Ahmad, Hasan Kahtan
Cloud computing is an on-demand network selfservice, dynamic power and virtual resources. It provide elasticity, restrictions and interactivity which introduces many new features and issues. This paper will review cloud computing common features and issues mainly in term of security. Security has been selected to be the focus of his paper due to high interest in security form both academics and inducts. This paper has categorized cloud computing feature into three categories i.e. technology, economy, and on-Technology. On the other hand this paper has categorized the cloud computing security issues into five categories i.e. infrastructure, data, access, compliance, and provider. This paper provides researchers and industry an insight about the cloud features and issues that may help them in directing their research and implementation of technologies and provide categorization for loud computing features and issues, which can be expanded while the cloud computing technology advances.
云计算是一种按需网络自助服务、动态动力和虚拟资源。它提供了弹性、限制和交互性,从而引入了许多新特性和新问题。本文将主要从安全性方面回顾云计算的常见特征和问题。他之所以选择安全作为论文的重点,是因为无论是学术界还是企业界,都对安全问题非常感兴趣。本文将云计算特征分为技术、经济和非技术三大类。另一方面,本文将云计算安全问题分为五类,即基础设施、数据、访问、遵从性和提供商。本文为研究人员和业界提供了关于云特性和问题的见解,可以帮助他们指导技术的研究和实施,并提供了云计算特性和问题的分类,可以在云计算技术进步的同时扩展。
{"title":"Cloud Computing Review: Features And Issues","authors":"A. Al-Ahmad, Hasan Kahtan","doi":"10.1109/ICSCEE.2018.8538387","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538387","url":null,"abstract":"Cloud computing is an on-demand network selfservice, dynamic power and virtual resources. It provide elasticity, restrictions and interactivity which introduces many new features and issues. This paper will review cloud computing common features and issues mainly in term of security. Security has been selected to be the focus of his paper due to high interest in security form both academics and inducts. This paper has categorized cloud computing feature into three categories i.e. technology, economy, and on-Technology. On the other hand this paper has categorized the cloud computing security issues into five categories i.e. infrastructure, data, access, compliance, and provider. This paper provides researchers and industry an insight about the cloud features and issues that may help them in directing their research and implementation of technologies and provide categorization for loud computing features and issues, which can be expanded while the cloud computing technology advances.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129654313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Identification of Age, Gender, & Race SMT (Scare, Marks, Tattoos) from Unconstrained Facial Images Using Statistical Techniques 使用统计技术从无约束的面部图像中识别年龄,性别和种族SMT(惊吓,标记,纹身)
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538423
Rishi Gupta, Sandeep Kumar, Pradeep Yadav, Sumit K. Shrivastava
There has been a developing enthusiasm for programmed human statistic estimation i.e., Age, sexual orientation scare, marks, tattoos and race from unconstrained facial pictures because of an assortment of potential applications in law requirement, security control, and human-PC cooperation. Bounteous writing has explored the issue of computerized age, sexual orientation, and race acknowledgement from unconstrained facial pictures. Nonetheless, in spite of the concurrence of this component, a large portion of the investigations have tended to them independently, next to no consideration has been given to their connections. Programmed statistic estimation remains a testing issue since people having a place with a similar statistic gathering can be tremendously unique in their facial appearances because of natural and extraneous elements. This paper shows a non-exclusive system for the programmed statistic (age. sexual orientation and race) estimation. The proposed approach comprises of the accompanying three principal stages. Preprocessing, Highlight Extraction and Prediction given a face picture. To start with it preprocesses the facial picture next concentrate statistic useful highlights and afterwards, it gauges age, sexual orientation, and race. Tests are directed on two open databases (MORPH II and LFW)[I] MORPH (Craniofacial Longitudinal Morphological Face Database) [1] is one amongst the most important in public accessible longitudinal face databases, The tagged Faces within the Wild (LFW 4) [10] may be an information of faces that contains 13000 pictures of 1680 celebrities tagged with gender, demonstrate that the proposed approach has better execution analyzed than the cutting edge. The proposed method is evaluated based on evaluation measurement precision, recall, accuracy, and MAE. The proposed work gives stable and good results.
由于在法律要求、安全控制和人机合作方面的各种潜在应用,人们对程序化的人类统计估计(如年龄、性取向、标记、纹身和种族)的热情日益高涨。大量的文章从不受约束的面部图片中探索了计算机化的年龄、性取向和种族认知问题。然而,尽管这一组成部分是一致的,但大部分调查都是独立进行的,几乎没有考虑到它们之间的联系。程序统计估计仍然是一个测试问题,因为拥有类似统计收集的地方的人可能在他们的面部外观上非常独特,因为自然和外来元素。本文给出了程序统计(年龄)的一个非排他性系统。性取向和种族)估计。拟议的办法包括相应的三个主要阶段。给定人脸图像的预处理、高光提取和预测。首先,它对面部图像进行预处理,然后集中统计有用的亮点,然后,它测量年龄,性取向和种族。测试在两个开放数据库(MORPH II和LFW)上进行[I] MORPH(颅面纵向形态面部数据库)[1]是公共可访问的纵向面部数据库中最重要的数据库之一,野外标记的面孔(LFW 4)[10]可能是包含13000张带有性别标记的1680名名人照片的面部信息,表明所提出的方法比前沿方法具有更好的执行分析。基于评价测量精密度、召回率、准确度和MAE对该方法进行了评价。所提出的工作取得了稳定、良好的效果。
{"title":"Identification of Age, Gender, & Race SMT (Scare, Marks, Tattoos) from Unconstrained Facial Images Using Statistical Techniques","authors":"Rishi Gupta, Sandeep Kumar, Pradeep Yadav, Sumit K. Shrivastava","doi":"10.1109/ICSCEE.2018.8538423","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538423","url":null,"abstract":"There has been a developing enthusiasm for programmed human statistic estimation i.e., Age, sexual orientation scare, marks, tattoos and race from unconstrained facial pictures because of an assortment of potential applications in law requirement, security control, and human-PC cooperation. Bounteous writing has explored the issue of computerized age, sexual orientation, and race acknowledgement from unconstrained facial pictures. Nonetheless, in spite of the concurrence of this component, a large portion of the investigations have tended to them independently, next to no consideration has been given to their connections. Programmed statistic estimation remains a testing issue since people having a place with a similar statistic gathering can be tremendously unique in their facial appearances because of natural and extraneous elements. This paper shows a non-exclusive system for the programmed statistic (age. sexual orientation and race) estimation. The proposed approach comprises of the accompanying three principal stages. Preprocessing, Highlight Extraction and Prediction given a face picture. To start with it preprocesses the facial picture next concentrate statistic useful highlights and afterwards, it gauges age, sexual orientation, and race. Tests are directed on two open databases (MORPH II and LFW)[I] MORPH (Craniofacial Longitudinal Morphological Face Database) [1] is one amongst the most important in public accessible longitudinal face databases, The tagged Faces within the Wild (LFW 4) [10] may be an information of faces that contains 13000 pictures of 1680 celebrities tagged with gender, demonstrate that the proposed approach has better execution analyzed than the cutting edge. The proposed method is evaluated based on evaluation measurement precision, recall, accuracy, and MAE. The proposed work gives stable and good results.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130195729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Developing a Framework for Cost-Benefit Analysis of Cloud Computing Adoption by Higher Education Institutions in Saudi Arabia 开发沙特阿拉伯高等教育机构采用云计算的成本效益分析框架
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538380
Nouf S. Aldahwan, M. Saleh
The adoption of cloud computing technology in higher education institutions and universities to fulfill their evolving computing needs is an emerging research field. Saudi Arabia is the largest economy in the Gulf region, which makes KSA a potential market for cloud computing technologies. In addition, KSA’s higher institutions differ from other institutions around the world as they have uniquely separated campuses of males and females. Cloud computing has its own advantages since it can often decrease infrastructure and maintenance costs, improve operational efficiency by allowing various computing devices to complete tasks, and increase the user’s ability to access resources, applications, and data anytime, anywhere. However, there is a lack of tools to help the decision makers at higher education institutions analyze and evaluate the best cost-effective manner to adopt cloud services. Thus, there is a need for a cost-benefit computing tool that is based on a comprehensive multilayer framework to evaluate the costs different cloud service providers such as Amazon, Google, and Microsoft. In this study, an attempt has been made to develop the computing tool and its accompanying framework for cost-benefit analysis to study the suitability of different cloud computing deployment models for the higher education environment. The proposed tool will support decision makers at institutions to assess the various tangible benefits of adopting cloud services versus inhouse services, while taking into consideration the various intangible benefits. The developed tool has been evaluated by experts through interviews. The results showed that the framework can analyze the costs and benefits through comparison between different cloud models, which saves time and effort for decision makers to find the optimal solutions.
高等教育机构和大学采用云计算技术以满足其不断发展的计算需求是一个新兴的研究领域。沙特阿拉伯是海湾地区最大的经济体,这使得沙特阿拉伯成为云计算技术的潜在市场。此外,KSA的高等院校与世界其他院校不同,因为他们有独特的男女分开的校园。云计算有其自身的优势,因为它通常可以降低基础设施和维护成本,通过允许各种计算设备完成任务来提高操作效率,并增加用户随时随地访问资源、应用程序和数据的能力。然而,缺乏工具来帮助高等教育机构的决策者分析和评估采用云服务的最佳成本效益方式。因此,需要一种基于综合多层框架的成本效益计算工具,以评估不同云服务提供商(如Amazon、Google和Microsoft)的成本。在本研究中,尝试开发计算工具及其附带的成本效益分析框架,以研究不同云计算部署模型对高等教育环境的适用性。拟议的工具将支持机构决策者评估采用云服务与内部服务的各种有形利益,同时考虑到各种无形利益。专家通过访谈对开发的工具进行了评估。结果表明,该框架可以通过不同云模型之间的比较分析成本和收益,为决策者节省了寻找最优解决方案的时间和精力。
{"title":"Developing a Framework for Cost-Benefit Analysis of Cloud Computing Adoption by Higher Education Institutions in Saudi Arabia","authors":"Nouf S. Aldahwan, M. Saleh","doi":"10.1109/ICSCEE.2018.8538380","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538380","url":null,"abstract":"The adoption of cloud computing technology in higher education institutions and universities to fulfill their evolving computing needs is an emerging research field. Saudi Arabia is the largest economy in the Gulf region, which makes KSA a potential market for cloud computing technologies. In addition, KSA’s higher institutions differ from other institutions around the world as they have uniquely separated campuses of males and females. Cloud computing has its own advantages since it can often decrease infrastructure and maintenance costs, improve operational efficiency by allowing various computing devices to complete tasks, and increase the user’s ability to access resources, applications, and data anytime, anywhere. However, there is a lack of tools to help the decision makers at higher education institutions analyze and evaluate the best cost-effective manner to adopt cloud services. Thus, there is a need for a cost-benefit computing tool that is based on a comprehensive multilayer framework to evaluate the costs different cloud service providers such as Amazon, Google, and Microsoft. In this study, an attempt has been made to develop the computing tool and its accompanying framework for cost-benefit analysis to study the suitability of different cloud computing deployment models for the higher education environment. The proposed tool will support decision makers at institutions to assess the various tangible benefits of adopting cloud services versus inhouse services, while taking into consideration the various intangible benefits. The developed tool has been evaluated by experts through interviews. The results showed that the framework can analyze the costs and benefits through comparison between different cloud models, which saves time and effort for decision makers to find the optimal solutions.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128741661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network Planning optimization of Long Term Evolution Radio Transmitter Using Taguchi’s Method 基于田口法的长程演化无线电发射机网络规划优化
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538386
S. Rahmatia, Ali Akbar Tanjung, Octarina Nur Samijayani, W. N. Tanjung
Long Term Evolution (LTE) is newest technology for mobile telecommunication, it has some advantages that are high data rates, low Iatency and using all Internet Protocols (IP) network architecture. The implementation of LTE requires high cost and takes a long time therefore we need network planning to reduce the risks, some calculations, simulations and optimization is done in network planning. We use software named Atoll as tool for network planning and use Taguchi’s Method (TM) as optimization technique. The objective of this paper is to obtain the optimal parameters value of azimuth, mechanical downtilt, antenna gain and antenna height. The result is the responses that determine the most influential factors due to result depending on their delta value. From this paper, the most influential factor based on SN ratio is antenna height which have delta value 9.47. Then we implement the optimized LTE radio transmitter parameters into LTE network design. The result gave more 12.2% coverage area by signal level, increase average signal received power by 0.69 dBm and increase the coverage area by throughput downlink by 1.5%.
长期演进(LTE)技术是移动通信的最新技术,它具有数据传输速率高、时延低和使用全互联网协议(IP)网络架构等优点。LTE的实现成本高,耗时长,因此需要进行网络规划来降低风险,在网络规划中进行了一些计算、仿真和优化。我们使用名为Atoll的软件作为网络规划工具,并使用田口法(TM)作为优化技术。本文的目标是获得方位、机械下倾角、天线增益和天线高度的最优参数值。结果是根据其delta值确定结果中最具影响力的因素的响应。从本文来看,基于SN比的影响最大的因素是天线高度,其δ值为9.47。然后将优化后的LTE无线发射机参数应用到LTE网络设计中。结果表明,按信号电平计算的覆盖面积增加了12.2%,平均接收信号功率增加了0.69 dBm,吞吐量下行覆盖面积增加了1.5%。
{"title":"Network Planning optimization of Long Term Evolution Radio Transmitter Using Taguchi’s Method","authors":"S. Rahmatia, Ali Akbar Tanjung, Octarina Nur Samijayani, W. N. Tanjung","doi":"10.1109/ICSCEE.2018.8538386","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538386","url":null,"abstract":"Long Term Evolution (LTE) is newest technology for mobile telecommunication, it has some advantages that are high data rates, low Iatency and using all Internet Protocols (IP) network architecture. The implementation of LTE requires high cost and takes a long time therefore we need network planning to reduce the risks, some calculations, simulations and optimization is done in network planning. We use software named Atoll as tool for network planning and use Taguchi’s Method (TM) as optimization technique. The objective of this paper is to obtain the optimal parameters value of azimuth, mechanical downtilt, antenna gain and antenna height. The result is the responses that determine the most influential factors due to result depending on their delta value. From this paper, the most influential factor based on SN ratio is antenna height which have delta value 9.47. Then we implement the optimized LTE radio transmitter parameters into LTE network design. The result gave more 12.2% coverage area by signal level, increase average signal received power by 0.69 dBm and increase the coverage area by throughput downlink by 1.5%.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126211408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Thermal image processing to Recognize and Quantify Pain in Human Body 热图像处理识别和量化人体疼痛
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538368
Naresh Pal, Aravind Kilaru, Y. Savaria, A. Lakhssassi
The basic symptom of a human body for any sort of diseases or problems is pain. Pain can be termed as a message from the injured or diseased body part sent to the brain since ancient ages physicians have used pain as a symptom or benchmark to know the severity of a disease or the condition of the human body. Measuring or quantifying the pain can immensely help the physicians to diagnose the patient and to track the healing process of the patient. In the 21st century, Infrared thermography has become one of the best ways to diagnosis human body pain using the skin temperature. This article introduces various ways of quantifying the pain by using thermal or non-thermal methods.
人体任何疾病或问题的基本症状都是疼痛。疼痛可以被称为从受伤或患病的身体部位发送到大脑的信息,自古以来,医生就将疼痛作为了解疾病严重程度或人体状况的症状或基准。测量或量化疼痛可以极大地帮助医生诊断患者并跟踪患者的愈合过程。进入21世纪,红外热像仪已成为利用皮肤温度诊断人体疼痛的最佳方法之一。本文介绍了用热法或非热法量化疼痛的各种方法。
{"title":"Thermal image processing to Recognize and Quantify Pain in Human Body","authors":"Naresh Pal, Aravind Kilaru, Y. Savaria, A. Lakhssassi","doi":"10.1109/ICSCEE.2018.8538368","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538368","url":null,"abstract":"The basic symptom of a human body for any sort of diseases or problems is pain. Pain can be termed as a message from the injured or diseased body part sent to the brain since ancient ages physicians have used pain as a symptom or benchmark to know the severity of a disease or the condition of the human body. Measuring or quantifying the pain can immensely help the physicians to diagnose the patient and to track the healing process of the patient. In the 21st century, Infrared thermography has become one of the best ways to diagnosis human body pain using the skin temperature. This article introduces various ways of quantifying the pain by using thermal or non-thermal methods.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130632845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1