首页 > 最新文献

2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)最新文献

英文 中文
Perception of Financial Auditor on Usage of Computer Assisted Audit Techniques 财务审计师对使用计算机辅助审计技术的看法
B. Handoko, S. Ariyanto, D. Warganegara
The purpose of this study is to determine the perception of financial auditor about the use of computer assisted audit techniques (CAATs) in their daily process of work. This research is a quantitative research uses, which use primary data by distributing questionnaires to the respondent. The respondents are financial auditor who worked in public accounting firm in Jakarta Special Region of Indonesia. This study tested the hypotheses between variables by using path analysis, while the independent variables in this study are Performance Expectancy, Effort Expectancy, Social Influence and Facilitating Condition. Intervening variable is Behavioral Intention and dependent variable is Use Behavior. The results of this research indicate that Performance Expectancy has significant impact on Behavioral Intention. Both Effort Expectancy and Social Influence do not have significant impact on Behavioral Intention. Facilitating Condition and Behavioral Intention have significant impact on Use Behavior
本研究的目的是确定财务审计师对在其日常工作过程中使用计算机辅助审计技术(CAATs)的看法。本研究是一项定量研究,通过向受访者分发问卷来使用原始数据。受访者是在印度尼西亚雅加达特区的公共会计师事务所工作的财务审计师。本研究采用通径分析检验变量之间的假设,自变量为绩效期望、努力期望、社会影响和促进条件。干预变量为行为意向,因变量为使用行为。本研究结果表明,绩效预期对行为意向有显著影响。努力期望和社会影响对行为意向均无显著影响。促进条件和行为意向对使用行为有显著影响
{"title":"Perception of Financial Auditor on Usage of Computer Assisted Audit Techniques","authors":"B. Handoko, S. Ariyanto, D. Warganegara","doi":"10.1109/ICCIA.2018.00052","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00052","url":null,"abstract":"The purpose of this study is to determine the perception of financial auditor about the use of computer assisted audit techniques (CAATs) in their daily process of work. This research is a quantitative research uses, which use primary data by distributing questionnaires to the respondent. The respondents are financial auditor who worked in public accounting firm in Jakarta Special Region of Indonesia. This study tested the hypotheses between variables by using path analysis, while the independent variables in this study are Performance Expectancy, Effort Expectancy, Social Influence and Facilitating Condition. Intervening variable is Behavioral Intention and dependent variable is Use Behavior. The results of this research indicate that Performance Expectancy has significant impact on Behavioral Intention. Both Effort Expectancy and Social Influence do not have significant impact on Behavioral Intention. Facilitating Condition and Behavioral Intention have significant impact on Use Behavior","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128644120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Tamper Resistance Evaluation Method for Energy Harvester 能量采集器抗篡改评估方法
Y. Nozaki, M. Yoshikawa
Energy harvesting has been attracted attention for Internet of Things. From the viewpoint of security, data encryption for energy harvester is very important. On the other hand, the threat of side-channel attacks for a cryptographic circuit, which reveal the secret key using the physical information such as power consumption or electromagnetic wave, is pointed out. This study proposes a new tamper resistance evaluation method to secure energy harvester in the future. In experiments, an actual energy harvester, which consists of a TWELITE microcontroller and a silicon based solar cell, was used, and a lightweight cipher TWINE was implemented as an encryption technique. Then, experimental results by the proposed method revealed the 7 partial keys out of 8 with 900 electromagnetic waveforms, and the tamper resistance was successfully evaluated.
物联网的能量收集已经引起了人们的关注。从安全的角度来看,能源采集器的数据加密是非常重要的。另一方面,指出了利用功耗或电磁波等物理信息泄露密钥的侧信道攻击对加密电路的威胁。本研究提出了一种新的抗篡改评估方法,为未来能源采集器的安全提供保障。在实验中,使用了一个实际的能量采集器,该采集器由一个12ite微控制器和一个硅基太阳能电池组成,并实现了一个轻量级密码TWINE作为加密技术。实验结果表明,该方法能够在900个电磁波波形中识别出8个部分密钥中的7个,并成功地评估了密钥的抗篡改能力。
{"title":"Tamper Resistance Evaluation Method for Energy Harvester","authors":"Y. Nozaki, M. Yoshikawa","doi":"10.1109/ICCIA.2018.00045","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00045","url":null,"abstract":"Energy harvesting has been attracted attention for Internet of Things. From the viewpoint of security, data encryption for energy harvester is very important. On the other hand, the threat of side-channel attacks for a cryptographic circuit, which reveal the secret key using the physical information such as power consumption or electromagnetic wave, is pointed out. This study proposes a new tamper resistance evaluation method to secure energy harvester in the future. In experiments, an actual energy harvester, which consists of a TWELITE microcontroller and a silicon based solar cell, was used, and a lightweight cipher TWINE was implemented as an encryption technique. Then, experimental results by the proposed method revealed the 7 partial keys out of 8 with 900 electromagnetic waveforms, and the tamper resistance was successfully evaluated.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132597266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Safely and Quickly Deploying New Features with a Staged Rollout Framework Using Sequential Test and Adaptive Experimental Design 使用顺序测试和自适应实验设计的分阶段推出框架安全快速地部署新功能
Zhenyu Zhao, Mandie Liu, Anirban Deb
During the rapid development cycle for Internet products (websites and mobile apps), new features are developed and rolled out to users constantly. Features with code defects or design flaws can cause outages and significant degradation of user experience. The traditional method of code review and change management can be time-consuming and error-prone. In order to make the feature rollout process safe and fast, this paper proposes a methodology for rolling out features in an automated way using an adaptive experimental design. Under this framework, a feature is gradually ramped up from a small proportion of users to a larger population based on real-time evaluation of the performance of important metrics. If there are any regression detected during the ramp-up step, the ramp-up process stops and the feature developer is alerted. There are two main algorithm components powering this framework: 1) a continuous monitoring algorithm - using a variant of the sequential probability ratio test (SPRT) to monitor the feature performance metrics and alert feature developers when a metric degradation is detected, 2) an automated ramp-up algorithm - deciding when and how to ramp up to the next stage with larger sample size. This paper presents one monitoring algorithm and three ramping up algorithms including time-based, power-based, and risk-based (a Bayesian approach) schedules. These algorithms are evaluated and compared on both simulated data and real data. There are three benefits provided by this framework for feature rollout: 1) for defective features, it can detect the regression early and reduce negative effect, 2) for healthy features, it rolls out the feature quickly, 3) it reduces the need for manual intervention via the automation of the feature rollout process.
在互联网产品(网站和移动应用)的快速开发周期中,不断有新的特性被开发出来并推向用户。带有代码缺陷或设计缺陷的特性可能导致中断和显著降低用户体验。传统的代码审查和变更管理方法既耗时又容易出错。为了保证特征推出过程的安全性和快速性,本文提出了一种基于自适应实验设计的特征自动推出方法。在这个框架下,基于对重要指标性能的实时评估,一个功能从一小部分用户逐渐增加到更大的人群。如果在升级步骤中检测到任何回归,那么升级过程将停止,并向功能开发人员发出警报。这个框架有两个主要的算法组件:1)一个持续监控算法——使用序列概率比测试(SPRT)的一种变体来监控特征性能指标,并在检测到指标退化时向特征开发人员发出警报;2)一个自动提升算法——决定何时以及如何以更大的样本量提升到下一阶段。本文提出了一种监测算法和三种加速算法,包括基于时间的、基于功率的和基于风险的(贝叶斯方法)调度。在模拟数据和实际数据上对这些算法进行了评价和比较。该框架为功能推出提供了三个好处:1)对于有缺陷的功能,它可以及早发现回归并减少负面影响;2)对于健康的功能,它可以快速推出功能;3)通过功能推出过程的自动化减少了人工干预的需要。
{"title":"Safely and Quickly Deploying New Features with a Staged Rollout Framework Using Sequential Test and Adaptive Experimental Design","authors":"Zhenyu Zhao, Mandie Liu, Anirban Deb","doi":"10.1109/ICCIA.2018.00019","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00019","url":null,"abstract":"During the rapid development cycle for Internet products (websites and mobile apps), new features are developed and rolled out to users constantly. Features with code defects or design flaws can cause outages and significant degradation of user experience. The traditional method of code review and change management can be time-consuming and error-prone. In order to make the feature rollout process safe and fast, this paper proposes a methodology for rolling out features in an automated way using an adaptive experimental design. Under this framework, a feature is gradually ramped up from a small proportion of users to a larger population based on real-time evaluation of the performance of important metrics. If there are any regression detected during the ramp-up step, the ramp-up process stops and the feature developer is alerted. There are two main algorithm components powering this framework: 1) a continuous monitoring algorithm - using a variant of the sequential probability ratio test (SPRT) to monitor the feature performance metrics and alert feature developers when a metric degradation is detected, 2) an automated ramp-up algorithm - deciding when and how to ramp up to the next stage with larger sample size. This paper presents one monitoring algorithm and three ramping up algorithms including time-based, power-based, and risk-based (a Bayesian approach) schedules. These algorithms are evaluated and compared on both simulated data and real data. There are three benefits provided by this framework for feature rollout: 1) for defective features, it can detect the regression early and reduce negative effect, 2) for healthy features, it rolls out the feature quickly, 3) it reduces the need for manual intervention via the automation of the feature rollout process.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130811078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ICCIA 2018 Conference Organization ICCIA 2018会议组织
{"title":"ICCIA 2018 Conference Organization","authors":"","doi":"10.1109/iccia.2018.00006","DOIUrl":"https://doi.org/10.1109/iccia.2018.00006","url":null,"abstract":"","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Protection and Communication Strategy of Cangyuan Cliff Painting Based on Virtual Reality Technology 基于虚拟现实技术的沧源岩画保护与传播策略研究
L. Ke, Xu Wu, He Jin, Cao Lucheng
At present, the protection methods of Yunnan Cangyuan cliff paintings are mainly based on storage and shape protection. Because of the long history and various natural factors, the protection of Cangyuan cliff painting can not be well protected and stored; moreover, as a result of the reality factors that Cangyuan cliff painting has been damaged by many tourists, its integrity has not been as good as before, which has led the relevant departments to protect the cultural heritage. Many scenic spots of Cangyuan cliff painting have not been opened to the public, which has great influence on their transmission and inheritance. In this article, we used digital means to collect the original material of cliff paintings. First of all, we model it in three-dimensional and summarize the common patterns of cliff paintings. Then we used the restoration techniques to repair the missing part of Cangyuan cliff painting. We have not only refined the complex images and culture connotation of Cangyuan cliff painting, but also use the three-dimensional model to establish the virtual exhibition hall. Finally, we achieve the perfect combination of traditional culture and modern technology.
目前,云南沧源岩画的保护方法主要以保管和造型保护为主。由于历史悠久和各种自然因素的影响,沧源岩画的保护不能得到很好的保护和保存;此外,由于现实因素,沧源岩画被许多游客破坏,其完整性已经不如以前了,这导致了有关部门对文化遗产的保护。沧源岩画的许多景点还没有对外开放,这对它们的传播和传承影响很大。在这篇文章中,我们使用数字化的手段来收集岩画的原始材料。首先,我们对其进行三维建模,总结出岩画常见的图案。然后运用修复技术对沧源岩画缺失的部分进行修复。我们不仅提炼了沧源岩画的复杂形象和文化内涵,还利用三维模型建立了虚拟展厅。最后,我们实现了传统文化与现代科技的完美结合。
{"title":"Research on the Protection and Communication Strategy of Cangyuan Cliff Painting Based on Virtual Reality Technology","authors":"L. Ke, Xu Wu, He Jin, Cao Lucheng","doi":"10.1109/iccia.2018.00042","DOIUrl":"https://doi.org/10.1109/iccia.2018.00042","url":null,"abstract":"At present, the protection methods of Yunnan Cangyuan cliff paintings are mainly based on storage and shape protection. Because of the long history and various natural factors, the protection of Cangyuan cliff painting can not be well protected and stored; moreover, as a result of the reality factors that Cangyuan cliff painting has been damaged by many tourists, its integrity has not been as good as before, which has led the relevant departments to protect the cultural heritage. Many scenic spots of Cangyuan cliff painting have not been opened to the public, which has great influence on their transmission and inheritance. In this article, we used digital means to collect the original material of cliff paintings. First of all, we model it in three-dimensional and summarize the common patterns of cliff paintings. Then we used the restoration techniques to repair the missing part of Cangyuan cliff painting. We have not only refined the complex images and culture connotation of Cangyuan cliff painting, but also use the three-dimensional model to establish the virtual exhibition hall. Finally, we achieve the perfect combination of traditional culture and modern technology.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Underdetermined Blind Source Separation with an Unknown Number of Sources 一种未知源数量的欠定盲源分离方法
Rongjie Wang
Aiming to source number estimation, the recovery of mixing matrix and source signal under underdetermined case, we propose a method of underdetermined blind source separation with an unknown number of sources. Firstly, we introduced an algorithm based on S transform and fuzzy c-means clustering technique to estimate number of sources and mixing mixtures. Then sources are represented as null space form and the source signals are recovered by using an algorithm based on Maximum Likelihood. The simulation results show that the proposed method can separate sources of any distribution, and it has superior evaluation performance to the conventional methods.
针对欠定情况下的源数估计、混合矩阵和源信号的恢复问题,提出了一种未知源数的欠定盲源分离方法。首先,我们介绍了一种基于S变换和模糊c均值聚类技术的估计源数和混合料的算法。然后将信号源表示为零空间形式,并采用基于极大似然的算法对信号源进行恢复。仿真结果表明,该方法可以对任意分布的源进行分离,具有优于传统方法的评价性能。
{"title":"A Method of Underdetermined Blind Source Separation with an Unknown Number of Sources","authors":"Rongjie Wang","doi":"10.1109/ICCIA.2018.00050","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00050","url":null,"abstract":"Aiming to source number estimation, the recovery of mixing matrix and source signal under underdetermined case, we propose a method of underdetermined blind source separation with an unknown number of sources. Firstly, we introduced an algorithm based on S transform and fuzzy c-means clustering technique to estimate number of sources and mixing mixtures. Then sources are represented as null space form and the source signals are recovered by using an algorithm based on Maximum Likelihood. The simulation results show that the proposed method can separate sources of any distribution, and it has superior evaluation performance to the conventional methods.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128645287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Variation Autoencoder with Topic Information for Text Similarity 具有主题信息的文本相似度深度变化自动编码器
Zheng Gong, Yujiao Fu, Xiangdong Su, Heng Xu
Representation learning is an essential process in the text similarity task. The methods based on neural variational inference first learn the semantic representation of the texts, then measure the similarity of these texts by calculating the cosine similarity of their representations. However, it is not generally desirable that using the neural network simply to learn semantic representation as it cannot capture the rich semantic information completely. Considering that the similarity of context information reflects the similarity of text pairs in most cases, we integrate the topic information into a stacked variational autoencoder in process of text representation learning. The improved text representations are used in text similarity calculation. Experiment result shows that our approach obtains the state-of-art performance.
表征学习是文本相似任务中的一个重要过程。基于神经变分推理的方法首先学习文本的语义表示,然后通过计算文本表示的余弦相似度来度量文本的相似度。然而,由于神经网络不能完全捕获丰富的语义信息,因此通常不希望简单地使用神经网络来学习语义表示。考虑到上下文信息的相似度在大多数情况下反映了文本对的相似度,在文本表示学习过程中,我们将主题信息集成到一个堆叠变分自编码器中。将改进后的文本表示用于文本相似度计算。实验结果表明,该方法获得了最先进的性能。
{"title":"Deep Variation Autoencoder with Topic Information for Text Similarity","authors":"Zheng Gong, Yujiao Fu, Xiangdong Su, Heng Xu","doi":"10.1109/ICCIA.2018.00058","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00058","url":null,"abstract":"Representation learning is an essential process in the text similarity task. The methods based on neural variational inference first learn the semantic representation of the texts, then measure the similarity of these texts by calculating the cosine similarity of their representations. However, it is not generally desirable that using the neural network simply to learn semantic representation as it cannot capture the rich semantic information completely. Considering that the similarity of context information reflects the similarity of text pairs in most cases, we integrate the topic information into a stacked variational autoencoder in process of text representation learning. The improved text representations are used in text similarity calculation. Experiment result shows that our approach obtains the state-of-art performance.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115849214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Spatial Big Data Framework for Maritime Traffic Data 海上交通数据空间大数据框架
Lei Bao, Yang Le
In order to analysis maritime traffic data from Automatic Identification System,this paper present a big data framework based on SpatialHadoop. This framework extend the data type, storage, computing and operation layer of traditional Hadoop to incorporate maritime location data. In storage layer, it introduce a two-layer spatial index structure which can establish R-tree or R+-tree spatial index on Hadoop Distributed File System(HDFS) storage. And it add two new components in Mapreduce programming,which make it fitful for parallel computing on maritime spatial data. Based on these function provided, we can build up various spatial analysis operation on big maritime location data, and support various spatial statistical or spatial data mining applications
为了对自动识别系统中的海上交通数据进行分析,本文提出了一个基于SpatialHadoop的大数据框架。该框架扩展了传统Hadoop的数据类型、存储、计算和操作层,纳入了海上定位数据。在存储层,引入了两层空间索引结构,可以在Hadoop HDFS存储上建立R-tree或R+ tree空间索引。并在Mapreduce编程中增加了两个新组件,使其适合于海洋空间数据的并行计算。基于这些提供的功能,我们可以对海上大位置数据建立各种空间分析操作,支持各种空间统计或空间数据挖掘应用
{"title":"A Spatial Big Data Framework for Maritime Traffic Data","authors":"Lei Bao, Yang Le","doi":"10.1109/ICCIA.2018.00054","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00054","url":null,"abstract":"In order to analysis maritime traffic data from Automatic Identification System,this paper present a big data framework based on SpatialHadoop. This framework extend the data type, storage, computing and operation layer of traditional Hadoop to incorporate maritime location data. In storage layer, it introduce a two-layer spatial index structure which can establish R-tree or R+-tree spatial index on Hadoop Distributed File System(HDFS) storage. And it add two new components in Mapreduce programming,which make it fitful for parallel computing on maritime spatial data. Based on these function provided, we can build up various spatial analysis operation on big maritime location data, and support various spatial statistical or spatial data mining applications","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Locating Heartbeats from Electrocardiograms and Other Correlated Signals 从心电图和其他相关信号定位心跳
Dan Li, S. Bass, S. Hurley
The electrocardiogram (ECG) is the main source of heartbeat analysis. However, analyzing the ECG alone can be problematic because ECG data can be noisy. This research analyzes the associations between ECG and a variety of biomedical signals, and uses these associations to detect heartbeat locations with a higher accuracy than just analyzing ECG alone.
心电图(ECG)是心跳分析的主要来源。然而,单独分析心电图可能会有问题,因为心电图数据可能有噪声。本研究分析了ECG与多种生物医学信号之间的关联,并利用这些关联来检测心跳位置,比单独分析ECG具有更高的准确性。
{"title":"Locating Heartbeats from Electrocardiograms and Other Correlated Signals","authors":"Dan Li, S. Bass, S. Hurley","doi":"10.1109/ICCIA.2018.00032","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00032","url":null,"abstract":"The electrocardiogram (ECG) is the main source of heartbeat analysis. However, analyzing the ECG alone can be problematic because ECG data can be noisy. This research analyzes the associations between ECG and a variety of biomedical signals, and uses these associations to detect heartbeat locations with a higher accuracy than just analyzing ECG alone.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114195849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research of Voltage Prediction of Solar UAV Panel by Improved Mind Evolutionary Algorithm 基于改进思维进化算法的太阳能无人机面板电压预测研究
Wang Haixin, Haixin Wang
Solar energy is a new energy, which is not only perennial but also obtainable to every strata of the world. The use of solar photovoltaic systems (SPV) is the process of converting solar energy into electricity. Photovoltaic modules are mounted on the wings of solar unmanned aerial vehicles. In this paper, a new MPPT controller is proposed to predict the voltage to obtain the maximum power from the solar panel. The proposed MPPT controller is based on mind evolution algorithm (MEA) optimized back propagation neural network (BPNN). Firstly, the mind evolution algorithm model is constructed based on topology of BP Neural Network. Then, it is used to obtain the optimal solutions, which is regarded as initial weights and threshold value of BP Neural Network. Finally, the simulation experiment is carried out by using MATLAB software. The prediction results of the BP neural network optimized by the mind evolution algorithm are compared.
太阳能是一种新能源,不仅是多年生的,而且是世界各阶层都能获得的。利用太阳能光伏系统(SPV)是将太阳能转化为电能的过程。光伏组件安装在太阳能无人机的机翼上。本文提出了一种新的MPPT控制器来预测电压以获得太阳能电池板的最大功率。所提出的MPPT控制器是基于思维进化算法(MEA)优化的反向传播神经网络(BPNN)。首先,基于BP神经网络的拓扑结构,构建了心智进化算法模型;然后,将得到的最优解作为BP神经网络的初始权值和阈值。最后,利用MATLAB软件进行仿真实验。比较了心灵进化算法优化后的BP神经网络的预测结果。
{"title":"The Research of Voltage Prediction of Solar UAV Panel by Improved Mind Evolutionary Algorithm","authors":"Wang Haixin, Haixin Wang","doi":"10.1109/iccia.2018.00020","DOIUrl":"https://doi.org/10.1109/iccia.2018.00020","url":null,"abstract":"Solar energy is a new energy, which is not only perennial but also obtainable to every strata of the world. The use of solar photovoltaic systems (SPV) is the process of converting solar energy into electricity. Photovoltaic modules are mounted on the wings of solar unmanned aerial vehicles. In this paper, a new MPPT controller is proposed to predict the voltage to obtain the maximum power from the solar panel. The proposed MPPT controller is based on mind evolution algorithm (MEA) optimized back propagation neural network (BPNN). Firstly, the mind evolution algorithm model is constructed based on topology of BP Neural Network. Then, it is used to obtain the optimal solutions, which is regarded as initial weights and threshold value of BP Neural Network. Finally, the simulation experiment is carried out by using MATLAB software. The prediction results of the BP neural network optimized by the mind evolution algorithm are compared.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1