首页 > 最新文献

2020 International Conference on Intelligent Systems and Computer Vision (ISCV)最新文献

英文 中文
Smooth Filters for Improving Prony’s Method in Labview Environment Labview环境下改进proony方法的平滑滤波器
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204174
Lina El Alaoui El Abidi, M. Hanine, B. Aksasse
Exponentially decaying signals occur in various parts of nature and affect the performance and flexibility of signals. In fact, that drives scientists to invest in a perpetual search for new solutions. To meet this challenge few methods are proposed. In this study, we focused on the use of the Prony Method and Bessel and Butterworth smoothing methods in the LabVIEW environment for estimating the parameters of a sum of real exponential signals in the presence of noise. The performances of the proposed method are illustrated using simulated data, clearly showing the improved performance of the Prony Method and especially with Butterworth filter.
指数衰减信号存在于自然界的各个部分,影响信号的性能和灵活性。事实上,这促使科学家不断投资寻找新的解决方案。为了应对这一挑战,提出了几种方法。在本研究中,我们重点研究了在LabVIEW环境中使用proony方法和Bessel和Butterworth平滑方法来估计存在噪声的真实指数信号和的参数。用仿真数据说明了该方法的性能,清楚地显示了proony方法的性能改进,特别是巴特沃斯滤波器。
{"title":"Smooth Filters for Improving Prony’s Method in Labview Environment","authors":"Lina El Alaoui El Abidi, M. Hanine, B. Aksasse","doi":"10.1109/ISCV49265.2020.9204174","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204174","url":null,"abstract":"Exponentially decaying signals occur in various parts of nature and affect the performance and flexibility of signals. In fact, that drives scientists to invest in a perpetual search for new solutions. To meet this challenge few methods are proposed. In this study, we focused on the use of the Prony Method and Bessel and Butterworth smoothing methods in the LabVIEW environment for estimating the parameters of a sum of real exponential signals in the presence of noise. The performances of the proposed method are illustrated using simulated data, clearly showing the improved performance of the Prony Method and especially with Butterworth filter.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125725662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit Card Fraud Detection Based on Multilayer Perceptron and Extreme Learning Machine Architectures 基于多层感知机和极限学习机架构的信用卡欺诈检测
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204185
Fatima Zohra El hlouli, J. Riffi, Mohamed Adnane Mahraz, Ali El Yahyaouy, H. Tairi
Due to the increasing digitalization of banking services and the predominance of mobile banking applications, the rate of credit card payments is increasing every year, among billions of transactions identified as fraudulent. Data mining algorithms have played a fundamental role in detecting fraudulent transactions, through combating fraudster’s attacks working around classical fraud prevention systems. In this paper, we try to detect fraudulent transactions using two artificial neural network classifiers, Multilayer Perceptron (MLP) and Extreme Learning Machine (ELM), applied on the credit card fraud dataset. The performance of these classifiers is evaluated based on accuracy, recall, precision, and classification time. The results show that the accuracy of MLP and ELM classifiers achieves respectively 97.84% and 95.46%. Otherwise, ELM is very fast for predicting new fraudulent transactions.
由于银行服务的日益数字化和移动银行应用的主导地位,信用卡支付的比率每年都在增加,其中数十亿笔交易被确定为欺诈。数据挖掘算法在检测欺诈性交易方面发挥了重要作用,通过打击欺诈者围绕经典欺诈预防系统的攻击。在本文中,我们尝试使用两种人工神经网络分类器,多层感知器(MLP)和极限学习机(ELM)来检测欺诈性交易,并将其应用于信用卡欺诈数据集。这些分类器的性能是基于准确性、召回率、精度和分类时间来评估的。结果表明,MLP和ELM分类器的准确率分别达到97.84%和95.46%。否则,ELM在预测新的欺诈性交易方面非常快。
{"title":"Credit Card Fraud Detection Based on Multilayer Perceptron and Extreme Learning Machine Architectures","authors":"Fatima Zohra El hlouli, J. Riffi, Mohamed Adnane Mahraz, Ali El Yahyaouy, H. Tairi","doi":"10.1109/ISCV49265.2020.9204185","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204185","url":null,"abstract":"Due to the increasing digitalization of banking services and the predominance of mobile banking applications, the rate of credit card payments is increasing every year, among billions of transactions identified as fraudulent. Data mining algorithms have played a fundamental role in detecting fraudulent transactions, through combating fraudster’s attacks working around classical fraud prevention systems. In this paper, we try to detect fraudulent transactions using two artificial neural network classifiers, Multilayer Perceptron (MLP) and Extreme Learning Machine (ELM), applied on the credit card fraud dataset. The performance of these classifiers is evaluated based on accuracy, recall, precision, and classification time. The results show that the accuracy of MLP and ELM classifiers achieves respectively 97.84% and 95.46%. Otherwise, ELM is very fast for predicting new fraudulent transactions.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124517543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor 基于ECC和模糊提取器的物联网环境隐私和认证方案
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204164
Abderrezzak Sebbah, B. Kadri
the internet of things (IoT) is consisting of many complementary elements which have their own specificities and capacities. These elements are gaining new application and use cases in our lives. Nevertheless, they open a negative horizon of security and privacy issues which must be treated delicately before the deployment of any IoT. Recently, different works emerged dealing with the same branch of issues, like the work of Yuwen Chen et al. that is called LightPriAuth. LightPriAuth has several drawbacks and weakness against various popular attacks such as Insider attack and stolen smart card. Our objective in this paper is to propose a novel solution which is “authentication scheme with three factor using ECC and fuzzy extractor” to ensure security and privacy. The obtained results had proven the superiority of our scheme’s performances compared to that of LightPriAuth which, additionally, had defeated the weaknesses left by LightPriAuth.
物联网(IoT)是由许多互补的元素组成的,这些元素有自己的特点和能力。这些元素在我们的生活中获得了新的应用和用例。然而,它们打开了安全和隐私问题的负面视野,在部署任何物联网之前必须谨慎处理这些问题。最近,不同的作品出现了,处理同一分支的问题,如Yuwen Chen等人的作品,被称为LightPriAuth。对于各种流行的攻击,如内部攻击和被盗智能卡,LightPriAuth有几个缺点和弱点。本文的目标是提出一种新的解决方案,即“使用ECC和模糊提取器的三因素认证方案”,以确保安全性和隐私性。得到的结果证明了我们方案的性能优于LightPriAuth方案,并且克服了LightPriAuth方案的缺点。
{"title":"A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor","authors":"Abderrezzak Sebbah, B. Kadri","doi":"10.1109/ISCV49265.2020.9204164","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204164","url":null,"abstract":"the internet of things (IoT) is consisting of many complementary elements which have their own specificities and capacities. These elements are gaining new application and use cases in our lives. Nevertheless, they open a negative horizon of security and privacy issues which must be treated delicately before the deployment of any IoT. Recently, different works emerged dealing with the same branch of issues, like the work of Yuwen Chen et al. that is called LightPriAuth. LightPriAuth has several drawbacks and weakness against various popular attacks such as Insider attack and stolen smart card. Our objective in this paper is to propose a novel solution which is “authentication scheme with three factor using ECC and fuzzy extractor” to ensure security and privacy. The obtained results had proven the superiority of our scheme’s performances compared to that of LightPriAuth which, additionally, had defeated the weaknesses left by LightPriAuth.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Offline Arabic Handwriting Recognition Using Deep Learning: Comparative Study 使用深度学习的离线阿拉伯手写识别:比较研究
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204214
Hicham Lamtougui, H. E. Moubtahij, Hassan Fouadi, Ali Yahyaouy, K. Satori
By virtue of advances in machine learning, handwriting recognition is considered as one of the main research topics in this field. Many studies have been proposed to improve this recognition of handwritten texts for different languages such as Latin and Chinese. Yet, the processing of Arabic texts remains a particularly distinctive problem due to the complicated nature of the Arabic script compared to other scripts. In this work, we display a study and an evaluation of relevant articles recently published in conferences and indexed journals. The core of the problem is to relatively find out an efficient method capable of recognizing the handwritten text by any user via digital devices. In this article, we study the various works interested in the recognition of handwritten Arabic script implemented by deep learning. We thouroughly discuss different classification approaches like CNN, RNN and DBN. The pros and cons of each approach will be presented, as well as their different results.
由于机器学习的进步,手写识别被认为是该领域的主要研究课题之一。为了提高对不同语言(如拉丁文和中文)手写文本的识别能力,已经提出了许多研究。然而,阿拉伯文本的处理仍然是一个特别独特的问题,因为阿拉伯文字与其他文字相比具有复杂的性质。在这项工作中,我们展示了最近在会议和索引期刊上发表的相关文章的研究和评估。问题的核心是相对地找到一种能够识别任何用户通过数字设备手写文本的有效方法。在本文中,我们研究了各种对通过深度学习实现手写阿拉伯文字识别感兴趣的作品。我们深入讨论了不同的分类方法,如CNN, RNN和DBN。将介绍每种方法的优缺点,以及它们的不同结果。
{"title":"Offline Arabic Handwriting Recognition Using Deep Learning: Comparative Study","authors":"Hicham Lamtougui, H. E. Moubtahij, Hassan Fouadi, Ali Yahyaouy, K. Satori","doi":"10.1109/ISCV49265.2020.9204214","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204214","url":null,"abstract":"By virtue of advances in machine learning, handwriting recognition is considered as one of the main research topics in this field. Many studies have been proposed to improve this recognition of handwritten texts for different languages such as Latin and Chinese. Yet, the processing of Arabic texts remains a particularly distinctive problem due to the complicated nature of the Arabic script compared to other scripts. In this work, we display a study and an evaluation of relevant articles recently published in conferences and indexed journals. The core of the problem is to relatively find out an efficient method capable of recognizing the handwritten text by any user via digital devices. In this article, we study the various works interested in the recognition of handwritten Arabic script implemented by deep learning. We thouroughly discuss different classification approaches like CNN, RNN and DBN. The pros and cons of each approach will be presented, as well as their different results.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Moroccan Dialect Speech Recognition System Based on CMU SphinxTools 基于CMU SphinxTools的摩洛哥方言语音识别系统
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204250
Abderrahim Ezzine, H. Satori, Mohamed Hamidi, K. Satori
The main aim of an Automatic Speech Recognition system (ASR) is to produce a system that is able to simulate the human listener based on the learning approach and speech data of a studied language. In this paper, we describe the Darija Moroccan Dialect speech recognition system that is implemented to recognize the ten first Arabic digits spoken in Moroccan dialect (Darija) collected from 20 speakers including both males and females. This system is designed based on the CMU Sphinx tools through the ASR Hidden Markov Model method with small data and the Mel frequency spectral coefficients (MFCCs) that are used in the feature extraction phase. Our best-obtained accuracy is 96.27 % found with 8 GMMs.
自动语音识别系统(ASR)的主要目的是产生一个能够基于学习方法和所学习语言的语音数据模拟人类听者的系统。在本文中,我们描述了Darija摩洛哥方言语音识别系统,该系统用于识别从20名男女说话者中收集的摩洛哥方言(Darija)的前十位阿拉伯数字。本系统基于CMU Sphinx工具,通过小数据的ASR隐马尔可夫模型方法和特征提取阶段使用的Mel频谱系数(mfc)进行设计。我们获得的最佳准确度为96.27%,发现8个GMMs。
{"title":"Moroccan Dialect Speech Recognition System Based on CMU SphinxTools","authors":"Abderrahim Ezzine, H. Satori, Mohamed Hamidi, K. Satori","doi":"10.1109/ISCV49265.2020.9204250","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204250","url":null,"abstract":"The main aim of an Automatic Speech Recognition system (ASR) is to produce a system that is able to simulate the human listener based on the learning approach and speech data of a studied language. In this paper, we describe the Darija Moroccan Dialect speech recognition system that is implemented to recognize the ten first Arabic digits spoken in Moroccan dialect (Darija) collected from 20 speakers including both males and females. This system is designed based on the CMU Sphinx tools through the ASR Hidden Markov Model method with small data and the Mel frequency spectral coefficients (MFCCs) that are used in the feature extraction phase. Our best-obtained accuracy is 96.27 % found with 8 GMMs.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126805367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Compact Microstrip T-Shaped Resonator Band Pass Filter for 5G Applications 一种用于5G应用的紧凑型微带t形谐振器带通滤波器
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204054
Souhaila Ben Haddi, A. Zugari, A. Zakriti, Soufiane Achraou
In this paper, we introduce a compact wideband microstrip band pass filter for 3.5GHz, with excellent performance for the next generation mobile standards “5G”. The frequency band also includes the frequencies of the WIMAX (Worldwide Interoperability for Microwave Access) and WLAN (wireless local area network) applications. The proposed band pass filter is based on a rectangular T-Shaped resonator. Their dimensions are equal to 9×5mm2. The proposed compact microstrip band pass filter has been designed by software CST Microwave Studio using FR4 substrate having relative permittivity (εr) of 4.3. This filter has a center frequency of 4,75GHz and 3dB bandwidth from 3 to 6GHz, an insertion loss low than 1dB, a return loss better than 30dB and also a fractional bandwidth more than 70%. This results are in good agreement with those accomplished by Advanced Design System “ADS”.
在本文中,我们介绍了一种3.5GHz的紧凑型宽带微带带通滤波器,该滤波器在下一代移动标准“5G”中具有优异的性能。该频段还包括WIMAX(全球微波接入互操作性)和WLAN(无线局域网)应用的频率。所提出的带通滤波器是基于矩形t形谐振器。它们的尺寸等于9×5mm2。采用相对介电常数(εr)为4.3的FR4衬底,利用CST Microwave Studio软件设计了该紧凑型微带带通滤波器。该滤波器的中心频率为4,75 ghz,带宽为3dB,范围为3 ~ 6GHz,插入损耗低于1dB,回波损耗优于30dB,分数带宽大于70%。该结果与先进设计系统“ADS”的结果一致。
{"title":"A Compact Microstrip T-Shaped Resonator Band Pass Filter for 5G Applications","authors":"Souhaila Ben Haddi, A. Zugari, A. Zakriti, Soufiane Achraou","doi":"10.1109/ISCV49265.2020.9204054","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204054","url":null,"abstract":"In this paper, we introduce a compact wideband microstrip band pass filter for 3.5GHz, with excellent performance for the next generation mobile standards “5G”. The frequency band also includes the frequencies of the WIMAX (Worldwide Interoperability for Microwave Access) and WLAN (wireless local area network) applications. The proposed band pass filter is based on a rectangular T-Shaped resonator. Their dimensions are equal to 9×5mm2. The proposed compact microstrip band pass filter has been designed by software CST Microwave Studio using FR4 substrate having relative permittivity (εr) of 4.3. This filter has a center frequency of 4,75GHz and 3dB bandwidth from 3 to 6GHz, an insertion loss low than 1dB, a return loss better than 30dB and also a fractional bandwidth more than 70%. This results are in good agreement with those accomplished by Advanced Design System “ADS”.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116445676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
WordNet and Wiki Based Approach for Finding Polysemy Tags in a Tag Set 基于WordNet和Wiki的标签集中多义标签查找方法
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204288
S. Iftikhar, F. Jabeen, Hira Nasir, Shahwana Fida
The tagging process involves use of labels to provide content with further information using a set of keywords (tags). A tag is a keyword or phrase used to provide metadata about a resource. Resource can be image, web page, video, audio etc., which are available on Web. In this research article the issue of polysemy (a word or phrase with multiple meanings) in tagging is analyzed because it creates a lot of confusion and is cause of ambiguity, redundancy and incorrect search results. In particular if a user looks at URLs the user can’t guess about what sort of resource it refers. By looking at tag set associated with a resource a user can guess about the resource, but the guess can be ambiguous if tag set contains polysemy tags. A novel solution is proposed for the detection of polysemy tags in folk tag set. The capabilities of Word Net, Wikipedia and visual tag dictionary are exploited. Experiments are performed on tag sets that is taken from Delicious. This approach can detect many common types of polysemy that appears in folksonomies like contrastive and complementary polysemy.
标记过程包括使用标签来使用一组关键字(标记)提供带有进一步信息的内容。标记是用于提供有关资源的元数据的关键字或短语。资源可以是图片、网页、视频、音频等,这些都可以在网络上获得。本文对标注中的多义问题进行了分析,多义现象是造成标注歧义、冗余和错误搜索结果的主要原因。特别是当用户查看url时,用户无法猜测它引用的是哪种资源。通过查看与资源相关联的标记集,用户可以猜测该资源,但是如果标记集包含多义标记,则猜测可能是不明确的。提出了一种新的民俗标签集中多义标签的检测方法。利用了Word Net、维基百科和可视标签词典的功能。实验是在取自Delicious的标签集上进行的。这种方法可以检测到民俗分类学中出现的许多常见类型的多义,如对比多义和互补多义。
{"title":"WordNet and Wiki Based Approach for Finding Polysemy Tags in a Tag Set","authors":"S. Iftikhar, F. Jabeen, Hira Nasir, Shahwana Fida","doi":"10.1109/ISCV49265.2020.9204288","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204288","url":null,"abstract":"The tagging process involves use of labels to provide content with further information using a set of keywords (tags). A tag is a keyword or phrase used to provide metadata about a resource. Resource can be image, web page, video, audio etc., which are available on Web. In this research article the issue of polysemy (a word or phrase with multiple meanings) in tagging is analyzed because it creates a lot of confusion and is cause of ambiguity, redundancy and incorrect search results. In particular if a user looks at URLs the user can’t guess about what sort of resource it refers. By looking at tag set associated with a resource a user can guess about the resource, but the guess can be ambiguous if tag set contains polysemy tags. A novel solution is proposed for the detection of polysemy tags in folk tag set. The capabilities of Word Net, Wikipedia and visual tag dictionary are exploited. Experiments are performed on tag sets that is taken from Delicious. This approach can detect many common types of polysemy that appears in folksonomies like contrastive and complementary polysemy.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Small-Signal Modeling of GaAs – pHEMT Using Direct Extraction Method 基于直接提取法的GaAs - pHEMT小信号建模
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204237
M. El bakkali, Said Elkhaldi, H. Elftouh, N. Touhami
In this paper 16 elements small-signal equivalent circuit for GaAs pHEMT is presented. ED02AH process based on III-V materiel is chosen. This process is used in the improvement of telecommunication systems, space and defense applications. This work presents the results of direct extraction of the small signal or linear model based on an analytical method and measurements of the dispersion parameters [S]. The extraction of the parameters of the small signal equivalent scheme is done for an ED02AH (6x15$mu$m) process of GaAs technology, a transistor of 6 gate fingers, each with a width of 15 $mu$m. A good agreement between the simulated and measured parameters S confirms the validity of the proposed method.
本文设计了一种16元GaAs pHEMT小信号等效电路。选择基于III-V材料的ED02AH工艺。这一过程用于改进电信系统、空间和国防应用。这项工作提出了基于分析方法和色散参数测量的直接提取小信号或线性模型的结果[S]。小信号等效方案的参数提取是针对GaAs技术的ED02AH (6x15$mu$m)工艺进行的,该工艺是一个具有6个门指的晶体管,每个门指的宽度为15$mu$m。模拟参数S与实测参数S吻合较好,验证了所提方法的有效性。
{"title":"Small-Signal Modeling of GaAs – pHEMT Using Direct Extraction Method","authors":"M. El bakkali, Said Elkhaldi, H. Elftouh, N. Touhami","doi":"10.1109/ISCV49265.2020.9204237","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204237","url":null,"abstract":"In this paper 16 elements small-signal equivalent circuit for GaAs pHEMT is presented. ED02AH process based on III-V materiel is chosen. This process is used in the improvement of telecommunication systems, space and defense applications. This work presents the results of direct extraction of the small signal or linear model based on an analytical method and measurements of the dispersion parameters [S]. The extraction of the parameters of the small signal equivalent scheme is done for an ED02AH (6x15$mu$m) process of GaAs technology, a transistor of 6 gate fingers, each with a width of 15 $mu$m. A good agreement between the simulated and measured parameters S confirms the validity of the proposed method.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115164039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on predicting and diagnosing non-communicable diseases: case of cardiovascular diseases 非传染性疾病的预测和诊断研究:以心血管疾病为例
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204022
F. Ngom, Ibrahima Fall, M. Camara, A. Bah
Heart disease causes millions of deaths worldwide. Many approaches have been proposed for the prediction of heart disease. Several machine learning, deep learning, and data mining algorithms are used in the detection and diagnosis of heart disease based on parameters or risk factors. The most used algorithms are Naïve Bayes, Machine Vector Support, decision tree, KNNs, and artificial neural networks. The most frequently used parameters or risk factors are the 14 attributes of the UCI Cleveland standard. In this article, a study on these different approaches is carried out. This study shows diversity in relation to the choices and the use of different attributes in the prediction of cardiovascular diseases.
全世界有数百万人死于心脏病。人们提出了许多预测心脏病的方法。几种机器学习、深度学习和数据挖掘算法被用于基于参数或风险因素的心脏病检测和诊断。最常用的算法是Naïve贝叶斯,机器向量支持,决策树,knn和人工神经网络。最常用的参数或风险因素是UCI克利夫兰标准的14个属性。本文对这些不同的方法进行了研究。本研究显示了在心血管疾病预测中不同属性的选择和使用的多样性。
{"title":"A study on predicting and diagnosing non-communicable diseases: case of cardiovascular diseases","authors":"F. Ngom, Ibrahima Fall, M. Camara, A. Bah","doi":"10.1109/ISCV49265.2020.9204022","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204022","url":null,"abstract":"Heart disease causes millions of deaths worldwide. Many approaches have been proposed for the prediction of heart disease. Several machine learning, deep learning, and data mining algorithms are used in the detection and diagnosis of heart disease based on parameters or risk factors. The most used algorithms are Naïve Bayes, Machine Vector Support, decision tree, KNNs, and artificial neural networks. The most frequently used parameters or risk factors are the 14 attributes of the UCI Cleveland standard. In this article, a study on these different approaches is carried out. This study shows diversity in relation to the choices and the use of different attributes in the prediction of cardiovascular diseases.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An enhanced backoff strategy for fair channel access in WBAN-based health monitoring systems 基于无线宽带网络的健康监测系统中公平通道接入的增强后退策略
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204167
Azdad Nabila, E. Mohamed
In this paper, we consider an IEEE 802.15.4-based Wireless Body Area Network (WBAN), where different biomedical sensors are distributed on a human body and have to send the measured data to a coordinator node. Focusing on the Slotted Carrier Sense Multiple Access with Collision Avoidance algorithm (Slotted CSMA/CA) defined by the IEEE 802.15.4 norm in the beacon-enabled mode, we propose an enhanced backoff strategy to provide nodes an equitable access to the communication medium. Then we analyze its performance over realistic requirements of the considered sensors using the latest version of Castalia Simulator. The obtained results reveal the efficiency of our proposal as compared to the traditional profile of the norm in terms of reliability, timeliness and throughput.
在本文中,我们考虑基于IEEE 802.15.4的无线身体区域网络(WBAN),其中不同的生物医学传感器分布在人体上,并且必须将测量数据发送到协调节点。针对IEEE 802.15.4规范在信标启用模式下定义的带避撞算法(Slotted CSMA/CA)的开槽载波感测多址,我们提出了一种增强的后退策略,以提供节点对通信介质的公平访问。然后使用最新版本的Castalia Simulator对所考虑传感器的实际要求进行性能分析。所获得的结果表明,与传统规范的可靠性、及时性和吞吐量相比,我们的建议是有效的。
{"title":"An enhanced backoff strategy for fair channel access in WBAN-based health monitoring systems","authors":"Azdad Nabila, E. Mohamed","doi":"10.1109/ISCV49265.2020.9204167","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204167","url":null,"abstract":"In this paper, we consider an IEEE 802.15.4-based Wireless Body Area Network (WBAN), where different biomedical sensors are distributed on a human body and have to send the measured data to a coordinator node. Focusing on the Slotted Carrier Sense Multiple Access with Collision Avoidance algorithm (Slotted CSMA/CA) defined by the IEEE 802.15.4 norm in the beacon-enabled mode, we propose an enhanced backoff strategy to provide nodes an equitable access to the communication medium. Then we analyze its performance over realistic requirements of the considered sensors using the latest version of Castalia Simulator. The obtained results reveal the efficiency of our proposal as compared to the traditional profile of the norm in terms of reliability, timeliness and throughput.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124242692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 International Conference on Intelligent Systems and Computer Vision (ISCV)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1