首页 > 最新文献

International Journal of Software Engineering and Computer Systems最新文献

英文 中文
DUAL FEATURE EXTRACTION TECHNIQUES FOR IRIS RECOGNITION SYSTEM 虹膜识别系统的双特征提取技术
Pub Date : 2019-02-01 DOI: 10.15282/IJSECS.5.1.2019.1.0051
T. O. Aro, M. B. Jibrin, O. Matiluko, I. S. Abdulkadir, I. O Oluwaseyi
The extraction of feature remains the significant phase in recognition system using iris. A successful recognition rate and reduction in classification time of two iris templates mostly depend on efficient feature extraction technique. This paper performs comparative analysis on two selected feature extraction techniques: Gabor Wavelet Transform (GWT) and Scale Invariant Feature Transform (SIFT). The developed system was evaluated with CASIA iris dataset. Performance evaluation of the system based on False Acceptance Rate (FAR), False Rejection Rate (FRR), Error Rate (ER) and accuracy produced different results of each technique. It was showed that the Gabor Wavelet Transform gave FAR of 0.9500, FRR of 0.0750, 92% of accuracy, and ER of 8% as compared with the SIFT technique which gave FAR of 0.900, FRR of 0.0631, ERR of 16.6% and 88.33% of accuracy. Finally, the results of comparative analysis showed that Gabor Wavelet Transform outperformed SIFT technique. From the results obtained, GWT is strongly recommended as a feature extraction method for the development of a robust iris authentication system.
特征提取是虹膜识别系统的重要环节。两种虹膜模板的成功识别率和分类时间的缩短主要依赖于高效的特征提取技术。本文对Gabor小波变换(GWT)和尺度不变特征变换(SIFT)两种特征提取技术进行了比较分析。利用CASIA虹膜数据对系统进行了评价。基于错误接受率(FAR)、错误拒绝率(FRR)、错误率(ER)和准确率对系统进行性能评价,得出了每种技术的不同结果。结果表明,Gabor小波变换的FAR为0.9500,FRR为0.0750,准确率为92%,ER为8%,而SIFT技术的FAR为0.900,FRR为0.0631,ERR为16.6%,准确率为88.33%。最后,对比分析结果表明,Gabor小波变换优于SIFT技术。从获得的结果来看,强烈推荐GWT作为开发健壮的虹膜认证系统的特征提取方法。
{"title":"DUAL FEATURE EXTRACTION TECHNIQUES FOR IRIS RECOGNITION SYSTEM","authors":"T. O. Aro, M. B. Jibrin, O. Matiluko, I. S. Abdulkadir, I. O Oluwaseyi","doi":"10.15282/IJSECS.5.1.2019.1.0051","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.1.0051","url":null,"abstract":"The extraction of feature remains the significant phase in recognition system using iris. A successful recognition rate and reduction in classification time of two iris templates mostly depend on efficient feature extraction technique. This paper performs comparative analysis on two selected feature extraction techniques: Gabor Wavelet Transform (GWT) and Scale Invariant Feature Transform (SIFT). The developed system was evaluated with CASIA iris dataset. Performance evaluation of the system based on False Acceptance Rate (FAR), False Rejection Rate (FRR), Error Rate (ER) and accuracy produced different results of each technique. It was showed that the Gabor Wavelet Transform gave FAR of 0.9500, FRR of 0.0750, 92% of accuracy, and ER of 8% as compared with the SIFT technique which gave FAR of 0.900, FRR of 0.0631, ERR of 16.6% and 88.33% of accuracy. Finally, the results of comparative analysis showed that Gabor Wavelet Transform outperformed SIFT technique. From the results obtained, GWT is strongly recommended as a feature extraction method for the development of a robust iris authentication system.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87172851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EFFICIENT METHOD TO IMPROVE HUMAN BRAIN SENSOR ACTIVITIES USING PROPOSED NEUROHEADSET DEVICE EMBEDDED WITH SENSORS: A COMPREHENSIVE STUDY 利用嵌入传感器的神经耳机设备改善人脑传感器活动的有效方法:一项综合研究
Pub Date : 2019-02-01 DOI: 10.15282/IJSECS.5.1.2019.4.0054
Rajib Chowdhury, A. Saif
The main purpose of this research is to investigate the human brain sensor activities related prior researches towards the needs of an efficient method to improve the human brain sensor activities. Human brain activities mainly measured by brain signal acquired from  the  brain  sensor  electrodes  positioned  on  several  parts  of  the  brain cortex. Although previous researches investigated human brain activities in various aspects, the improvement of the human brain sensor activities is still unsolved. In today’s world, it is very crucial need for improving the sensor activities of the human brain using that human brain improved signal externally. This research demonstrated a comprehensive critical  analysis  of  human  brain  activities  related  prior  researches  to  claim  for  an efficient method integrated with proposed neuroheadset device. This research presented a comprehensive review in various aspects like previous methods, existing frameworks analysis and existing results analysis with the discussion to establish an efficient method for acquiring human brain signal, improving the acquired signal and developing the sensor activities of the human brain using that human brain improved signal. Demonstrated critical review has expected for constituting an efficient method to improve the performance of maneuverability, visualization, subliminal activities and so forth on human brain activities. Keywords: Human Brain Activities; Human Brain Signal; Efficient Method; ProposedNeuroheadset Device; Brain Engineering;
本研究的主要目的是对前人有关人脑传感器活动的研究进行梳理,以期找到一种有效提高人脑传感器活动的方法。人脑活动主要是通过位于大脑皮层几个部分的大脑传感器电极获得的大脑信号来测量的。虽然以往的研究对人脑活动进行了多方面的研究,但对人脑传感器活动的改进仍是一个有待解决的问题。在当今世界,利用人类大脑的外部改进信号来改善人类大脑的传感器活动是非常重要的。本研究展示了对人类大脑活动相关的先前研究的全面批判性分析,以声称一种有效的方法与拟议的神经耳机设备相结合。本研究从以往的方法、已有的框架分析、已有的结果分析等方面进行了全面的综述,探讨了如何建立一种有效的获取人脑信号的方法,并对采集到的信号进行改进,利用改进后的人脑信号发展人脑的传感器活动。论证性批判性评价被认为是提高人脑活动的可操作性、可视化、阈下活动等性能的一种有效方法。关键词:人脑活动;人脑信号;有效的方法;ProposedNeuroheadset装置;大脑工程;
{"title":"EFFICIENT METHOD TO IMPROVE HUMAN BRAIN SENSOR ACTIVITIES USING PROPOSED NEUROHEADSET DEVICE EMBEDDED WITH SENSORS: A COMPREHENSIVE STUDY","authors":"Rajib Chowdhury, A. Saif","doi":"10.15282/IJSECS.5.1.2019.4.0054","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.4.0054","url":null,"abstract":"The main purpose of this research is to investigate the human brain sensor activities related prior researches towards the needs of an efficient method to improve the human brain sensor activities. Human brain activities mainly measured by brain signal acquired from  the  brain  sensor  electrodes  positioned  on  several  parts  of  the  brain cortex. Although previous researches investigated human brain activities in various aspects, the improvement of the human brain sensor activities is still unsolved. In today’s world, it is very crucial need for improving the sensor activities of the human brain using that human brain improved signal externally. This research demonstrated a comprehensive critical  analysis  of  human  brain  activities  related  prior  researches  to  claim  for  an efficient method integrated with proposed neuroheadset device. This research presented a comprehensive review in various aspects like previous methods, existing frameworks analysis and existing results analysis with the discussion to establish an efficient method for acquiring human brain signal, improving the acquired signal and developing the sensor activities of the human brain using that human brain improved signal. Demonstrated critical review has expected for constituting an efficient method to improve the performance of maneuverability, visualization, subliminal activities and so forth on human brain activities. \u0000Keywords: Human Brain Activities; Human Brain Signal; Efficient Method; ProposedNeuroheadset Device; Brain Engineering;","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82162895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near Optimum User Selection for Minimum Mean Square Error Based Tomlinson Harashima Precoding 基于最小均方误差的Tomlinson Harashima预编码近最优用户选择
Pub Date : 2019-01-31 DOI: 10.15344/2456-4451/2019/142
S. Denno, T. Baba, Kenta Asaka, Yafei Hou
This paper proposes novel user selection techniques for the Tomlinson-Harashima precoding (THP) based on the minimum mean square error (MMSE) criterion. These techniques utilize a part of the intermediate values in the derivation of the THP weight, which makes it possible to implement the techniques with lower computational complexity. For further complexity reduction, we propose successive user selection techniques based on the techniques proposed above where user terminals are selected one by one. It is confirmed by computer simulations that the proposed techniques outperform conventional selection techniques. The computational complexity of the successive selection techniques is about 1/20 as small as that of the original selection techniques when 4 user terminals are selected out of 10 terminals.
提出了基于最小均方误差(MMSE)准则的Tomlinson-Harashima预编码(THP)用户选择新技术。这些技术在THP权重的推导中利用了一部分中间值,这使得实现这些技术具有较低的计算复杂度。为了进一步降低复杂性,我们在上述技术的基础上提出了逐次选择用户终端的用户选择技术。计算机模拟结果表明,该方法优于传统的选择方法。当从10个终端中选择4个用户终端时,连续选择技术的计算复杂度约为原始选择技术的1/20。
{"title":"Near Optimum User Selection for Minimum Mean Square Error Based Tomlinson Harashima Precoding","authors":"S. Denno, T. Baba, Kenta Asaka, Yafei Hou","doi":"10.15344/2456-4451/2019/142","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/142","url":null,"abstract":"This paper proposes novel user selection techniques for the Tomlinson-Harashima precoding (THP) based on the minimum mean square error (MMSE) criterion. These techniques utilize a part of the intermediate values in the derivation of the THP weight, which makes it possible to implement the techniques with lower computational complexity. For further complexity reduction, we propose successive user selection techniques based on the techniques proposed above where user terminals are selected one by one. It is confirmed by computer simulations that the proposed techniques outperform conventional selection techniques. The computational complexity of the successive selection techniques is about 1/20 as small as that of the original selection techniques when 4 user terminals are selected out of 10 terminals.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87555106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Personal Use Vehicle Anti-Theft Tracking System Using IoT Platform 基于物联网平台的自用车辆防盗跟踪系统
Pub Date : 2019-01-22 DOI: 10.15344/2456-4451/2019/141
Saw Nang Paing, M. Oo, Mazliza Othman, N. Funabiki
Recently, the vehicle theft has become the serious issue in developing countries including Myanmar, due to the rapid increase of vehicles. Then, a Vehicle Anti-theft Tracking (VAT) system can play an important role to protect it. Unfortunately, a conventional VAT system is too expensive to be introduced for many people in such countries. On the one hand, the Internet of Things (IoT) has come out as a popular technology changing the concept of “connecting people” to “connecting things”, where low-cost IoT devices and cloud platforms have become available. In this paper, we propose a personal use VAT system using IoT platform that can be easily introduced due to the very low cost. This system has the following features: (1) the vehicle theft is detected using an Arduino-connected GPS module, (2) the alarm message is sent to the mobile phone of the vehicle owner as an SMS message on GSM, (3) the conditions of GPS/GSM modules are always monitored where the alarm is sent to the owner if they are not live, and (4) the location data of the vehicle is periodically stored in the IoT cloud platform called ThingSpeak. We implement this system and confirm the correctness of the implemented functions through trial applications.
近年来,由于车辆数量的迅速增加,车辆盗窃在包括缅甸在内的发展中国家已经成为一个严重的问题。因此,车辆防盗跟踪(VAT)系统可以起到重要的保护作用。不幸的是,对于这些国家的许多人来说,传统的增值税制度太昂贵了。一方面,物联网(IoT)已经成为一种流行的技术,将“连接人”的概念转变为“连接物”,其中低成本的物联网设备和云平台已经成为可能。在本文中,我们提出了一个使用物联网平台的个人使用增值税系统,由于成本非常低,可以很容易地引入。该系统具有以下特点:(1)使用arduino连接的GPS模块检测车辆被盗,(2)报警信息以GSM短信的形式发送到车主的手机,(3)始终监控GPS/GSM模块的状态,如果它们不在线则向车主发送报警,(4)车辆的位置数据定期存储在物联网云平台ThingSpeak中。我们实现了该系统,并通过试用验证了所实现功能的正确性。
{"title":"A Personal Use Vehicle Anti-Theft Tracking System Using IoT Platform","authors":"Saw Nang Paing, M. Oo, Mazliza Othman, N. Funabiki","doi":"10.15344/2456-4451/2019/141","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/141","url":null,"abstract":"Recently, the vehicle theft has become the serious issue in developing countries including Myanmar, due to the rapid increase of vehicles. Then, a Vehicle Anti-theft Tracking (VAT) system can play an important role to protect it. Unfortunately, a conventional VAT system is too expensive to be introduced for many people in such countries. On the one hand, the Internet of Things (IoT) has come out as a popular technology changing the concept of “connecting people” to “connecting things”, where low-cost IoT devices and cloud platforms have become available. In this paper, we propose a personal use VAT system using IoT platform that can be easily introduced due to the very low cost. This system has the following features: (1) the vehicle theft is detected using an Arduino-connected GPS module, (2) the alarm message is sent to the mobile phone of the vehicle owner as an SMS message on GSM, (3) the conditions of GPS/GSM modules are always monitored where the alarm is sent to the owner if they are not live, and (4) the location data of the vehicle is periodically stored in the IoT cloud platform called ThingSpeak. We implement this system and confirm the correctness of the implemented functions through trial applications.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86997123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Review of IoT Security Framework Based on Mobile Edge Computing 基于移动边缘计算的物联网安全框架综述
Pub Date : 2019-01-01 DOI: 10.15344/2456-4451/2019/148
F. Yong-kai, Zhao Guanqun, Sun Xiaofeng, Lin Xiaodong
At present, IoT has received extensive attention and has exerted tremendous influence in the life of people and production. The number of actuators and sensors stationed across the world is also growing rapidly. The application of smart devices and smart services has upgraded our lives more refined and more convenient. However, while bringing convenience to our lives, it also brings a series of security and privacy risks. In this article, we have integrated the background knowledge of IoT, including the development process and applications, the mobile edge computing, the security threats, the security requirements and the basic architecture of IoT. On this basis, we focused on the analysis of the mainstream of the academic community. Compared with the IoT security framework adopted by the industry, comparing and evaluating several popular frameworks, we have put forward our own security framework perspectives and possible in-depth research points in the future.
目前,物联网受到了广泛的关注,并在人们的生活和生产中产生了巨大的影响。驻扎在世界各地的执行器和传感器的数量也在迅速增长。智能设备和智能服务的应用,让我们的生活更精致、更便捷。然而,在给我们的生活带来便利的同时,也带来了一系列的安全和隐私风险。在本文中,我们整合了物联网的背景知识,包括物联网的开发过程和应用、移动边缘计算、安全威胁、安全需求和物联网的基本架构。在此基础上,重点分析了学术界的主流观点。与业界采用的物联网安全框架进行比较,对几种流行的框架进行比较和评估,提出了自己的安全框架视角和未来可能深入研究的点。
{"title":"The Review of IoT Security Framework Based on Mobile Edge Computing","authors":"F. Yong-kai, Zhao Guanqun, Sun Xiaofeng, Lin Xiaodong","doi":"10.15344/2456-4451/2019/148","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/148","url":null,"abstract":"At present, IoT has received extensive attention and has exerted tremendous influence in the life of people and production. The number of actuators and sensors stationed across the world is also growing rapidly. The application of smart devices and smart services has upgraded our lives more refined and more convenient. However, while bringing convenience to our lives, it also brings a series of security and privacy risks. In this article, we have integrated the background knowledge of IoT, including the development process and applications, the mobile edge computing, the security threats, the security requirements and the basic architecture of IoT. On this basis, we focused on the analysis of the mainstream of the academic community. Compared with the IoT security framework adopted by the industry, comparing and evaluating several popular frameworks, we have put forward our own security framework perspectives and possible in-depth research points in the future.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78761506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposal of Transmission Power Minimization Extension in Active Access-Point Configuration Algorithm for Elastic Wireless Local-Area Network System 弹性无线局域网系统主动接入点配置算法中传输功率最小扩展的一种方案
Pub Date : 2018-12-13 DOI: 10.15344/2456-4451/2019/140
Funabiki Nobuo, Kuribayashi Minoru, Kao Wen-Chung
Nowadays, the wireless local-area network (WLAN) has become common in the low-cost Internet access solution using wireless communications between access points (APs) and hosts. In WLAN, traffic demands from users tend to fluctuate according to day and time. To minimize the power consumption of active APs, we have studied the elastic WLAN system and implemented the testbed using Raspberry Pi for the AP. Also, the active AP configuration algorithm has been proposed to optimize the active AP configuration with channel assignments and host associations for the elastic WLAN system. In this paper, we propose the transmission power minimization extension in the active AP configuration algorithm to further minimize the power consumption. After the previous algorithm is applied with the maximum transmission power, it minimizes the power of each active AP such that it satisfies the minimum throughput constraint. The effectiveness of our proposal is verified through simulations using the WIMNET simulator and experiments using the testbed in several network scenarios.
目前,无线局域网(WLAN)在使用接入点(ap)和主机之间的无线通信的低成本Internet接入解决方案中已经变得普遍。在WLAN中,用户的流量需求往往会随着时间和时间的变化而波动。为了最大限度地减少活动AP的功耗,我们研究了弹性WLAN系统,并使用树莓派为AP实现了测试平台。此外,我们还提出了活动AP配置算法,通过信道分配和主机关联来优化弹性WLAN系统的活动AP配置。本文提出了在有源AP配置算法中进行传输功率最小化的扩展,进一步实现了功耗最小化。在使用最大传输功率后,将每个活动AP的功率最小化,使其满足最小吞吐量约束。通过WIMNET仿真器的仿真和测试平台在多个网络场景下的实验,验证了该方案的有效性。
{"title":"A Proposal of Transmission Power Minimization Extension in Active Access-Point Configuration Algorithm for Elastic Wireless Local-Area Network System","authors":"Funabiki Nobuo, Kuribayashi Minoru, Kao Wen-Chung","doi":"10.15344/2456-4451/2019/140","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/140","url":null,"abstract":"Nowadays, the wireless local-area network (WLAN) has become common in the low-cost Internet access solution using wireless communications between access points (APs) and hosts. In WLAN, traffic demands from users tend to fluctuate according to day and time. To minimize the power consumption of active APs, we have studied the elastic WLAN system and implemented the testbed using Raspberry Pi for the AP. Also, the active AP configuration algorithm has been proposed to optimize the active AP configuration with channel assignments and host associations for the elastic WLAN system. In this paper, we propose the transmission power minimization extension in the active AP configuration algorithm to further minimize the power consumption. After the previous algorithm is applied with the maximum transmission power, it minimizes the power of each active AP such that it satisfies the minimum throughput constraint. The effectiveness of our proposal is verified through simulations using the WIMNET simulator and experiments using the testbed in several network scenarios.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"123 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75808835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Determining the Similarity Between Two Arbitrary 2-D Shapes and Its Application to Biological Objects 确定任意二维形状之间的相似性及其在生物物体上的应用
Pub Date : 2018-11-16 DOI: 10.15344/2456-4451/2018/139
P. Perner
Generalized shape models of objects are necessary to match and identify an object in an image. To acquire these kind of models special methods are necessary that allow to learn the similarity pair-wise similarity between shapes. They mainly concern is the establishment of point correspondences between two shapes and the detection of outlier. Known algorithm assume that the aligned shapes are quite similar in a way. But special problems arise if we have to align shapes that are very different, for example aligning concave to convex shapes. In such cases it is indispensable to take into account the order of the pointsets and to enforce legal sets of correspondences; otherwise the calculated distances are incorrect. We present our novel shape alignment algorithm which can also handle such cases. The algorithm establishes symmetric and legal one-to-one point correspondences between arbitrary shapes, represented as ordered sets of 2D-points and returns a distance measure which runs between 0 and 1.
物体的广义形状模型是匹配和识别图像中物体的必要条件。为了获得这类模型,需要特殊的方法来学习形状之间的相似性对相似性。它们主要关注的是两个形状之间点对应关系的建立和异常值的检测。已知的算法假设对齐的形状在某种程度上非常相似。但是,如果我们必须对齐非常不同的形状,例如将凹形状对齐到凸形状,就会出现特殊问题。在这种情况下,必须考虑点集的顺序并强制执行合法的对应集;否则计算出的距离是不正确的。我们提出了一种新的形状对齐算法,也可以处理这种情况。该算法在任意形状之间建立对称和合法的一对一点对应关系,表示为有序的2d点集,并返回在0到1之间运行的距离度量。
{"title":"Determining the Similarity Between Two Arbitrary 2-D Shapes and Its Application to Biological Objects","authors":"P. Perner","doi":"10.15344/2456-4451/2018/139","DOIUrl":"https://doi.org/10.15344/2456-4451/2018/139","url":null,"abstract":"Generalized shape models of objects are necessary to match and identify an object in an image. To acquire these kind of models special methods are necessary that allow to learn the similarity pair-wise similarity between shapes. They mainly concern is the establishment of point correspondences between two shapes and the detection of outlier. Known algorithm assume that the aligned shapes are quite similar in a way. But special problems arise if we have to align shapes that are very different, for example aligning concave to convex shapes. In such cases it is indispensable to take into account the order of the pointsets and to enforce legal sets of correspondences; otherwise the calculated distances are incorrect. We present our novel shape alignment algorithm which can also handle such cases. The algorithm establishes symmetric and legal one-to-one point correspondences between arbitrary shapes, represented as ordered sets of 2D-points and returns a distance measure which runs between 0 and 1.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83883080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of a Part-of-Speech Combination Method for Chinese eWOM Analysis 汉语eWOM词性组合分析方法的发展
Pub Date : 2018-10-24 DOI: 10.15344/2456-4451/2018/138
Yuh-Jen Chen, Yuh-Min Chen
Electronic word-of-mouth (eWOM) has recently become a common channel for spreading product appraisals and an important reference for enterprise internal improvement. Nevertheless, the various virtual communities that have emerged with the popularity of the Internet have also resulted in information overload because of the explosive growth of eWOM. Therefore, how to help enterprises analyze useful decision references from a large amount of eWOM has become a key issue in implementing customer relationship management (CRM). This study develops a method of Part-of-Speech (POS) combination to support eWOM analysis to effectively help an enterprise rapidly and accurately realize the contents of eWOM appraisals to improve customer relationships. This objective can be achieved by performing the following tasks: (i) designing a process for POS-combination supported eWOM analysis, (ii) developing techniques related to POScombination supported eWOM analysis, and (iii) implementing a mechanism for POS-combination supported eWOM analysis.
近年来,电子口碑已成为传播产品评价的常用渠道和企业内部改进的重要参考。然而,随着互联网的普及而出现的各种虚拟社区也因为eom的爆发式增长而导致了信息超载。因此,如何帮助企业从大量的eWOM中分析出有用的决策参考,成为实施客户关系管理(CRM)的关键问题。本研究开发了一种词性组合方法来支持eWOM分析,有效地帮助企业快速准确地实现eWOM评价的内容,从而改善客户关系。这一目标可以通过执行以下任务来实现:(i)设计一个poss组合支持的eom分析流程,(ii)开发与poss组合支持的eom分析相关的技术,以及(iii)实现poss组合支持的eom分析机制。
{"title":"Development of a Part-of-Speech Combination Method for Chinese eWOM Analysis","authors":"Yuh-Jen Chen, Yuh-Min Chen","doi":"10.15344/2456-4451/2018/138","DOIUrl":"https://doi.org/10.15344/2456-4451/2018/138","url":null,"abstract":"Electronic word-of-mouth (eWOM) has recently become a common channel for spreading product appraisals and an important reference for enterprise internal improvement. Nevertheless, the various virtual communities that have emerged with the popularity of the Internet have also resulted in information overload because of the explosive growth of eWOM. Therefore, how to help enterprises analyze useful decision references from a large amount of eWOM has become a key issue in implementing customer relationship management (CRM). This study develops a method of Part-of-Speech (POS) combination to support eWOM analysis to effectively help an enterprise rapidly and accurately realize the contents of eWOM appraisals to improve customer relationships. This objective can be achieved by performing the following tasks: (i) designing a process for POS-combination supported eWOM analysis, (ii) developing techniques related to POScombination supported eWOM analysis, and (iii) implementing a mechanism for POS-combination supported eWOM analysis.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"145 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72922503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Defect Classification of Electronic Circuit Board Using Multi-Input Convolutional Neural Network 基于多输入卷积神经网络的电子电路板缺陷分类
Pub Date : 2018-09-17 DOI: 10.15344/2456-4451/2018/137
Tokiko Shiina, Y. Iwahori, B. Kijsirikul
Automatic Optical Inspection (AOI) is introduced in the manufacturing process. Detected defect is classified by the human eys check and human eye check may cause problem of unbalanced accuracy and that of cost. Based on these reasons, automatic defect classification is desired to the manufacuturing process. This paper proposes a convolutional neural network (CNN) of multiple input images with two different connection layers using two test images taken under two different conditions of illumination. Comparison is demonstrated in the experiments and the result suggests that better accuracy is obtained from the multi-input CNN which connects the two different connection layers near input layer. The performance of the proposed approach was validated with the obtained result of experiments.
在制造过程中引入了自动光学检测(AOI)。检测到的缺陷是通过人眼检查来分类的,人眼检查可能会造成精度不平衡和成本不平衡的问题。基于这些原因,需要在制造过程中对缺陷进行自动分类。本文利用在两种不同光照条件下拍摄的两幅测试图像,提出了具有两种不同连接层的多输入图像卷积神经网络(CNN)。实验结果表明,在输入层附近连接两个不同的连接层的多输入CNN获得了更好的准确率。实验结果验证了该方法的有效性。
{"title":"Defect Classification of Electronic Circuit Board Using Multi-Input Convolutional Neural Network","authors":"Tokiko Shiina, Y. Iwahori, B. Kijsirikul","doi":"10.15344/2456-4451/2018/137","DOIUrl":"https://doi.org/10.15344/2456-4451/2018/137","url":null,"abstract":"Automatic Optical Inspection (AOI) is introduced in the manufacturing process. Detected defect is classified by the human eys check and human eye check may cause problem of unbalanced accuracy and that of cost. Based on these reasons, automatic defect classification is desired to the manufacuturing process. This paper proposes a convolutional neural network (CNN) of multiple input images with two different connection layers using two test images taken under two different conditions of illumination. Comparison is demonstrated in the experiments and the result suggests that better accuracy is obtained from the multi-input CNN which connects the two different connection layers near input layer. The performance of the proposed approach was validated with the obtained result of experiments.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89037819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big Data Mining for Assessing Calibration of Building Energy Models 建筑能源模型校准评估的大数据挖掘
Pub Date : 2018-09-08 DOI: 10.15344/2456-4451/2018/136
J. New, J. Sanyal, Bob S. Slattery, Anthony A. Gehl, W. Miller, Aaron Garrett
Residential and commercial buildings in China, India, the United States (US), United Kingdom (UK), and Italy consume 39-45% of each nation's primary energy. Building energy models can be used to automatically optimize the return-on-investment for retrofits to improve a building’s energy efficiency. However, with an average of 3,000 building descriptors necessary to accurately simulate a single building, there is a market need to reduce the transaction cost for creating a more robust model for simulating every building in a city and accurately estimate savings prior to capital expenditures. We used two of the world’s fastest supercomputers, assembled unique datasets, and developed innovative algorithms for big data mining to assess different methods to create an accurate building energy model. The team has leveraged a total of eight high performance computing resources and 218 servers to analyze the best methods, metrics, and algorithms for creating an accurate building energy model beyond current industry standards necessary for private-sector financing. The project developed the world’s fastest buildings simulator, has completed over 8 million simulations totaling over 300TB, and mined this data with over 130,000 parallel artificial intelligence algorithms. This was used to quantify accuracy of AI-developed calibration algorithms with results that surpass industry standard guidelines and can identify individual building parameters to between 15% and 32% of their actual value.
中国、印度、美国、英国和意大利的住宅和商业建筑消耗了各国39-45%的一次能源。建筑能源模型可用于自动优化改造的投资回报率,以提高建筑的能源效率。然而,由于平均需要3,000个建筑描述符来准确模拟单个建筑物,因此市场需要降低交易成本,以创建一个更健壮的模型来模拟城市中的每个建筑物,并在资本支出之前准确估计节省的费用。我们使用了两台世界上最快的超级计算机,组装了独特的数据集,并开发了用于大数据挖掘的创新算法,以评估不同的方法来创建准确的建筑能源模型。该团队利用了总共8个高性能计算资源和218台服务器来分析最佳方法、指标和算法,以创建一个精确的建筑能源模型,超出了私营部门融资所需的当前行业标准。该项目开发了世界上最快的建筑模拟器,已经完成了800多万次模拟,总计超过300TB,并使用超过13万个并行人工智能算法挖掘这些数据。这被用于量化人工智能开发的校准算法的准确性,其结果超过了行业标准指导方针,并且可以将单个建筑参数识别为其实际值的15%至32%。
{"title":"Big Data Mining for Assessing Calibration of Building Energy Models","authors":"J. New, J. Sanyal, Bob S. Slattery, Anthony A. Gehl, W. Miller, Aaron Garrett","doi":"10.15344/2456-4451/2018/136","DOIUrl":"https://doi.org/10.15344/2456-4451/2018/136","url":null,"abstract":"Residential and commercial buildings in China, India, the United States (US), United Kingdom (UK), and Italy consume 39-45% of each nation's primary energy. Building energy models can be used to automatically optimize the return-on-investment for retrofits to improve a building’s energy efficiency. However, with an average of 3,000 building descriptors necessary to accurately simulate a single building, there is a market need to reduce the transaction cost for creating a more robust model for simulating every building in a city and accurately estimate savings prior to capital expenditures. We used two of the world’s fastest supercomputers, assembled unique datasets, and developed innovative algorithms for big data mining to assess different methods to create an accurate building energy model. The team has leveraged a total of eight high performance computing resources and 218 servers to analyze the best methods, metrics, and algorithms for creating an accurate building energy model beyond current industry standards necessary for private-sector financing. The project developed the world’s fastest buildings simulator, has completed over 8 million simulations totaling over 300TB, and mined this data with over 130,000 parallel artificial intelligence algorithms. This was used to quantify accuracy of AI-developed calibration algorithms with results that surpass industry standard guidelines and can identify individual building parameters to between 15% and 32% of their actual value.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86568257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Software Engineering and Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1