Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6719938
Sazianti Mohd Saad, Siti Sakira Kamarudin
The accuracy of similarity measurement between sentences is critical to the performance of several applications such as text mining, question answering, and text summarization. This paper focuses on calculating semantic similarities between sentences and performing a comparative analysis among identified similarity measurement techniques. Comparison between three popular similarity measurements which are Jaccard, Cosine and Dice similarity measures has been conducted. The performance of each identified measurement was evaluated and recorded. In this paper, we use a large lexical database of English known as WordNet to calculate the word-to-word semantic similarity. The result of this research concludes that the Jaccard and Dice performs better in measuring the semantic similarity between sentences.
句子间相似度度量的准确性对文本挖掘、问答和文本摘要等应用的性能至关重要。本文的重点是计算句子之间的语义相似度,并对现有的相似度测量技术进行比较分析。比较了三种流行的相似性度量,即Jaccard, cos和Dice相似性度量。评估和记录每一个确定的测量的性能。在本文中,我们使用一个叫做WordNet的大型英语词汇数据库来计算词与词的语义相似度。结果表明,Jaccard and Dice在句子间语义相似度的测量中表现较好。
{"title":"Comparative analysis of similarity measures for sentence level semantic measurement of text","authors":"Sazianti Mohd Saad, Siti Sakira Kamarudin","doi":"10.1109/ICCSCE.2013.6719938","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6719938","url":null,"abstract":"The accuracy of similarity measurement between sentences is critical to the performance of several applications such as text mining, question answering, and text summarization. This paper focuses on calculating semantic similarities between sentences and performing a comparative analysis among identified similarity measurement techniques. Comparison between three popular similarity measurements which are Jaccard, Cosine and Dice similarity measures has been conducted. The performance of each identified measurement was evaluated and recorded. In this paper, we use a large lexical database of English known as WordNet to calculate the word-to-word semantic similarity. The result of this research concludes that the Jaccard and Dice performs better in measuring the semantic similarity between sentences.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6720040
Lucyantie Mazalan, Sharifah Syafiqah Syed Hamdan, Nurzaimah Masudi, H. Hashim, R. A. Rahman, N. Tahir, N. Zaini, R. Rosli, H. Omar
Cluster computing involves connection between a server and multiple hosts in one single environment and multi-cluster in inter-cluster environments. One of the crucial factors of a clustering is its network communication. Relying for support of a server-client internetworking, cluster computing uses the TCP/IP socket communication mechanism extensively. Mechanism that controls the data transfer interruptions between a server and client is referred to as a flow control. Theoretically, if the receive window size for TCP/IP buffers is too small, the receive window buffer is frequently overrun, and the flow control mechanism stops the data transfer until the receive buffer is empty. Thus, as a result flow control activity contributes to unnecessary additional network latency which is unacceptable in any server-client networking especially in clustering environment where it involves highly reliable data transfer. Among the solutions to this problem is by adjusting buffer size to avoid or reduce the potential for flow control to occur. This paper describes the analysis of TCP/IP socket buffer length in Local Area Network (LAN) and Wide Area Network (WAN) clustering. It details the process and flow of setting up the environment, implementing as well as analyzing the throughput performance of the measured buffering.
{"title":"Throughput analysis of LAN and WAN network based on socket buffer length using JPerf","authors":"Lucyantie Mazalan, Sharifah Syafiqah Syed Hamdan, Nurzaimah Masudi, H. Hashim, R. A. Rahman, N. Tahir, N. Zaini, R. Rosli, H. Omar","doi":"10.1109/ICCSCE.2013.6720040","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6720040","url":null,"abstract":"Cluster computing involves connection between a server and multiple hosts in one single environment and multi-cluster in inter-cluster environments. One of the crucial factors of a clustering is its network communication. Relying for support of a server-client internetworking, cluster computing uses the TCP/IP socket communication mechanism extensively. Mechanism that controls the data transfer interruptions between a server and client is referred to as a flow control. Theoretically, if the receive window size for TCP/IP buffers is too small, the receive window buffer is frequently overrun, and the flow control mechanism stops the data transfer until the receive buffer is empty. Thus, as a result flow control activity contributes to unnecessary additional network latency which is unacceptable in any server-client networking especially in clustering environment where it involves highly reliable data transfer. Among the solutions to this problem is by adjusting buffer size to avoid or reduce the potential for flow control to occur. This paper describes the analysis of TCP/IP socket buffer length in Local Area Network (LAN) and Wide Area Network (WAN) clustering. It details the process and flow of setting up the environment, implementing as well as analyzing the throughput performance of the measured buffering.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127119695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6719940
Oytun Eris, S. Kurtulan, Yaprak Yalçın
Nowadays, the use of electronic control units are limited in applications that require high safety integrity. Therefore, to satisfy the conditions for applications requiring high reliability, control circuits are used instead of digital electronic control units like PLCs. Due to the lack of efficient, simple and applicable methods in the literature, design of control circuits are mainly based on heuristic methods. In this study, existing problems related to the application of the known formal methods will be examined and an effective solution will be proposed.
{"title":"A new approach for the design of relay control circuits","authors":"Oytun Eris, S. Kurtulan, Yaprak Yalçın","doi":"10.1109/ICCSCE.2013.6719940","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6719940","url":null,"abstract":"Nowadays, the use of electronic control units are limited in applications that require high safety integrity. Therefore, to satisfy the conditions for applications requiring high reliability, control circuits are used instead of digital electronic control units like PLCs. Due to the lack of efficient, simple and applicable methods in the literature, design of control circuits are mainly based on heuristic methods. In this study, existing problems related to the application of the known formal methods will be examined and an effective solution will be proposed.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114240548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6719953
M. A. Jatoi, N. Kamel, A. Malik, I. Faye, T. Begum
Finite Element Method (FEM) is a numerical tool usually used to solve various problems related to electromagnetic field, biomechanics, stress analysis etc. In this paper, the finite element is proposed as a solution to the localization problem of the active sources inside the brain. This localization is termed as the EEG Inverse problem. The solution to EEG inverse problem with less localization error, high resolution and less computational complexity leads to better understanding of human brain behavior and helps neurologist and neurosurgeons in curing various neurological disorders. The implementation of the FEM in solving EEG inverse problem is explained and then a pseudo code in MATLAB is designed and explained for the application to solve the problem. However, for illustration purpose, the solution to the 1D electromagnetic problem through FEM is plotted to elaborate graphically the procedure.
有限元法(Finite Element Method, FEM)是一种通常用于求解电磁场、生物力学、应力分析等各种问题的数值工具。本文提出用有限元方法来解决脑内有源的定位问题。这种定位被称为EEG逆问题。这种定位误差小、分辨率高、计算复杂度低的脑电图逆问题解决方案,有助于更好地了解人类大脑行为,有助于神经科医生和神经外科医生治疗各种神经系统疾病。阐述了有限元法求解EEG逆问题的实现方法,并在MATLAB中设计了求解该问题的伪代码。然而,为了便于说明,用有限元法对一维电磁问题进行了求解,以图解的方式阐述了这一过程。
{"title":"Representing EEG source localization using Finite Element Method","authors":"M. A. Jatoi, N. Kamel, A. Malik, I. Faye, T. Begum","doi":"10.1109/ICCSCE.2013.6719953","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6719953","url":null,"abstract":"Finite Element Method (FEM) is a numerical tool usually used to solve various problems related to electromagnetic field, biomechanics, stress analysis etc. In this paper, the finite element is proposed as a solution to the localization problem of the active sources inside the brain. This localization is termed as the EEG Inverse problem. The solution to EEG inverse problem with less localization error, high resolution and less computational complexity leads to better understanding of human brain behavior and helps neurologist and neurosurgeons in curing various neurological disorders. The implementation of the FEM in solving EEG inverse problem is explained and then a pseudo code in MATLAB is designed and explained for the application to solve the problem. However, for illustration purpose, the solution to the 1D electromagnetic problem through FEM is plotted to elaborate graphically the procedure.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6720004
F. Husain, S. M. Hussein, Thuaibatul Aslamiah Mastor, Abdul Rauf Abdul Rasam, A. Samad, I. Ma'arof, K. A. Hashim
Integration of the Geographical Information System (GIS) technology and various applications are able to contribute towards reconstructing the dynamic of representation in GIS visualization. WEB-based GIS visualization users like architects, planners, landuse planners and urban designers are capable to visualize the effect of urban, proposed and zoning landuse. It's also capable to predict the results of smart growth initiatives for sustainable development to be achieved. Therefore this paper will review and discuss on how the GIS and other combined techniques are potentially into modeling a WEB-based GIS visualization of the real heritage world. This paper will focus on the discussion in establishing the WEB-based GIS together with visualization towards sustainable development of George Town (not “Georgetown” as most people used and tend to spell it) as world heritage site while application from this WEB-based is capable to become a tool for sustainable development of George Town as world heritage site. It is expected that by using WEB-based GIS many users are capable to analyst the categories of heritage building in George Town, in terms of non - heritage building or heritage building and so on. Therefore it is believed that WEB-based GIS is capable to become efficient tools to be use in supporting the process of such as data sharing, decision making, manipulation of data information and map for George Town as the world heritage site.
{"title":"A review of WEB - based GIS for visualization of George Town, Penang sustainability as world heritage site","authors":"F. Husain, S. M. Hussein, Thuaibatul Aslamiah Mastor, Abdul Rauf Abdul Rasam, A. Samad, I. Ma'arof, K. A. Hashim","doi":"10.1109/ICCSCE.2013.6720004","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6720004","url":null,"abstract":"Integration of the Geographical Information System (GIS) technology and various applications are able to contribute towards reconstructing the dynamic of representation in GIS visualization. WEB-based GIS visualization users like architects, planners, landuse planners and urban designers are capable to visualize the effect of urban, proposed and zoning landuse. It's also capable to predict the results of smart growth initiatives for sustainable development to be achieved. Therefore this paper will review and discuss on how the GIS and other combined techniques are potentially into modeling a WEB-based GIS visualization of the real heritage world. This paper will focus on the discussion in establishing the WEB-based GIS together with visualization towards sustainable development of George Town (not “Georgetown” as most people used and tend to spell it) as world heritage site while application from this WEB-based is capable to become a tool for sustainable development of George Town as world heritage site. It is expected that by using WEB-based GIS many users are capable to analyst the categories of heritage building in George Town, in terms of non - heritage building or heritage building and so on. Therefore it is believed that WEB-based GIS is capable to become efficient tools to be use in supporting the process of such as data sharing, decision making, manipulation of data information and map for George Town as the world heritage site.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6719985
N. A. N. Mohamad, J. Jai, N. Arham, A. Hadi
With the emerging catalytic, optical and medical applications of nanoparticles, there is a growing demand for green synthesis methods to ensure consumer safety. Among bio-organisms, plants are the major source of reducing agents due to the simple procedures and inexpensive cost required. This paper presents a short review of bimetallic nanoparticle synthesis using several plant extracts. Biosynthesis studies examining pH and concentration of plant extract, reaction temperature, and ionic ratio are also presented to provide a clear understanding of how these parameters affect the formation of nanoparticles.
{"title":"A short review on the synthesis of bimetallic nanoparticles using plant extract","authors":"N. A. N. Mohamad, J. Jai, N. Arham, A. Hadi","doi":"10.1109/ICCSCE.2013.6719985","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6719985","url":null,"abstract":"With the emerging catalytic, optical and medical applications of nanoparticles, there is a growing demand for green synthesis methods to ensure consumer safety. Among bio-organisms, plants are the major source of reducing agents due to the simple procedures and inexpensive cost required. This paper presents a short review of bimetallic nanoparticle synthesis using several plant extracts. Biosynthesis studies examining pH and concentration of plant extract, reaction temperature, and ionic ratio are also presented to provide a clear understanding of how these parameters affect the formation of nanoparticles.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132931694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6719981
K. K. Hasan, U. K. Ngah, M. Salleh
In this paper, flexible hardware architecture of multi-level decomposition Discrete Wavelet Transform (DWT) is proposed for image compression applications to eliminate redundant information from the transmitted images or video frames over the wireless channel. This architecture of DWT is described and synthesized with the Very High Speed Integrated Circuit (VHSIC) Hardware Description Language (VHDL) based methodology. The design can be accommodated on any targeting Field Programmable Gate Array (FPGA) device with slight changes. It facilitates to images of size 64×64, 128×128, 256×256, and 512× 512 pixels and capable of seven levels of decomposition. In order to reduce computational complexities, Fast Haar Wavelet Transform (FHWT) is used. The reduction in the resource usage of this 2D DWT multilevel FPGA core can be used to counter severe hardware constraints of various wireless and mobile device applications.
{"title":"Multilevel decomposition Discrete Wavelet Transform for hardware image compression architectures applications","authors":"K. K. Hasan, U. K. Ngah, M. Salleh","doi":"10.1109/ICCSCE.2013.6719981","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6719981","url":null,"abstract":"In this paper, flexible hardware architecture of multi-level decomposition Discrete Wavelet Transform (DWT) is proposed for image compression applications to eliminate redundant information from the transmitted images or video frames over the wireless channel. This architecture of DWT is described and synthesized with the Very High Speed Integrated Circuit (VHSIC) Hardware Description Language (VHDL) based methodology. The design can be accommodated on any targeting Field Programmable Gate Array (FPGA) device with slight changes. It facilitates to images of size 64×64, 128×128, 256×256, and 512× 512 pixels and capable of seven levels of decomposition. In order to reduce computational complexities, Fast Haar Wavelet Transform (FHWT) is used. The reduction in the resource usage of this 2D DWT multilevel FPGA core can be used to counter severe hardware constraints of various wireless and mobile device applications.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6719933
Amir Mukhtar, L. Xia, T. Tang, K. A. A. Kassim
Driver Assistance System (DAS) plays a vital and promising role in most intelligent vehicles technologies by alerting the motorists about any possible collision. In such systems robustness, reliability and real-time detection are critical. This paper focused on on-road detection of approaching motorcycles, where sensor is preferably attached on the rear side of vehicle. More attention is given to the applicability of methods and technologies on motorcycle detection and recognition, as motorcycles are smaller and harder to be noticed by vehicle driver. First we discuss the problem of on-road motorcycle detection using different sensors followed by review of motorcycle detection research. Then, we discuss types of sensor to set the stage for vision-based motorcycle detection. Methods used for hypothesis generation (HG) and hypothesis verification (HV) are mentioned before the integration of detection and tracking systems. Finally, we present a critical overview of the methods discussed and assess the potential of these methodologies for the future research and applications.
{"title":"On-road approaching motorcycle detection and tracking techniques: A survey","authors":"Amir Mukhtar, L. Xia, T. Tang, K. A. A. Kassim","doi":"10.1109/ICCSCE.2013.6719933","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6719933","url":null,"abstract":"Driver Assistance System (DAS) plays a vital and promising role in most intelligent vehicles technologies by alerting the motorists about any possible collision. In such systems robustness, reliability and real-time detection are critical. This paper focused on on-road detection of approaching motorcycles, where sensor is preferably attached on the rear side of vehicle. More attention is given to the applicability of methods and technologies on motorcycle detection and recognition, as motorcycles are smaller and harder to be noticed by vehicle driver. First we discuss the problem of on-road motorcycle detection using different sensors followed by review of motorcycle detection research. Then, we discuss types of sensor to set the stage for vision-based motorcycle detection. Methods used for hypothesis generation (HG) and hypothesis verification (HV) are mentioned before the integration of detection and tracking systems. Finally, we present a critical overview of the methods discussed and assess the potential of these methodologies for the future research and applications.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115466479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6719955
A. Jaber, M. F. Zolkipli
Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system.
{"title":"Use of cryptography in cloud computing","authors":"A. Jaber, M. F. Zolkipli","doi":"10.1109/ICCSCE.2013.6719955","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6719955","url":null,"abstract":"Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"18 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120985880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCSCE.2013.6720016
J. Saraswathy, M. Hariharan, W. Khairunizam, S. Yaacob, N. Thiyagar
Acoustic analysis of infant cry has been the subject of a number of researchers since half decades ago. This paper addresses a simple time-frequency analysis based signal processing technique using short-time Fourier transform (STFT) for the investigation and classification of infant cry signals. A cluster of statistical features are derived from the time-frequency plots of infant cry signals. The extracted feature vectors are used to model and train two types of radial basis neural network namely Probabilistic Neural Network (PNN) and General Regression Neural Network (GRNN) in classification phases. Three classes of infant cry signals are considered such as normal cry signals cry signals from deaf infants and infants with asphyxia. Promising classification results above 99% reveals that the proposed features and classification technique can effectively classify different infant cries.
{"title":"Infant cry classification: Time frequency analysis","authors":"J. Saraswathy, M. Hariharan, W. Khairunizam, S. Yaacob, N. Thiyagar","doi":"10.1109/ICCSCE.2013.6720016","DOIUrl":"https://doi.org/10.1109/ICCSCE.2013.6720016","url":null,"abstract":"Acoustic analysis of infant cry has been the subject of a number of researchers since half decades ago. This paper addresses a simple time-frequency analysis based signal processing technique using short-time Fourier transform (STFT) for the investigation and classification of infant cry signals. A cluster of statistical features are derived from the time-frequency plots of infant cry signals. The extracted feature vectors are used to model and train two types of radial basis neural network namely Probabilistic Neural Network (PNN) and General Regression Neural Network (GRNN) in classification phases. Three classes of infant cry signals are considered such as normal cry signals cry signals from deaf infants and infants with asphyxia. Promising classification results above 99% reveals that the proposed features and classification technique can effectively classify different infant cries.","PeriodicalId":319285,"journal":{"name":"2013 IEEE International Conference on Control System, Computing and Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}