Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323015
T. Xu, V. Leppãnen
In this paper, we propose and investigate a task mapping algorithm for big data applications. As a critical resource, data are produced faster than ever before. Parallel programs that process these data on massive parallel systems are widely adopted. The task mapping algorithm however, has not been well optimized for these applications. We explore the characteristics of big data applications based on a shared cache/memory multicore processor. The latencies of cache and memory sub-systems are analysed. The proposed algorithm is designed to optimize the cache/memory latency, as well as intra-application latency. We introduce an efficient greedy algorithm to calculate the mapping result based on the congregate degree of nodes. Different numbers of search spaces are discussed and evaluated. Experiments are conducted based on synthetic simulation and running real applications on a full system simulation environment. Results confirmed the effectiveness of the proposed algorithm. Average execution time of five selected big data applications is reduced by 8% compared with the first fit algorithm.
{"title":"A cache- and memory-aware mapping algorithm for big data applications","authors":"T. Xu, V. Leppãnen","doi":"10.1109/ICDIPC.2015.7323015","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323015","url":null,"abstract":"In this paper, we propose and investigate a task mapping algorithm for big data applications. As a critical resource, data are produced faster than ever before. Parallel programs that process these data on massive parallel systems are widely adopted. The task mapping algorithm however, has not been well optimized for these applications. We explore the characteristics of big data applications based on a shared cache/memory multicore processor. The latencies of cache and memory sub-systems are analysed. The proposed algorithm is designed to optimize the cache/memory latency, as well as intra-application latency. We introduce an efficient greedy algorithm to calculate the mapping result based on the congregate degree of nodes. Different numbers of search spaces are discussed and evaluated. Experiments are conducted based on synthetic simulation and running real applications on a full system simulation environment. Results confirmed the effectiveness of the proposed algorithm. Average execution time of five selected big data applications is reduced by 8% compared with the first fit algorithm.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323010
A. El-Mahdy, Wassim Alexan, N. Ashraf
One of the major problems of wireless communication is the channel estimation error and co-channel interference, which causes degradation in the performance of the system. Cooperative communication is one of the most efficient techniques to enhance the performance of wireless systems in the presence of channel estimation error and co-channel interference. In this paper, the performance of decode and forward two-way relay network (TWRN) scheme is evaluated in presence of channel estimation error and co-channel interference. The performance is evaluated analytically in terms of a metric called signal-to-noise gap ratio, which measures the reduction in the signal-to-noise ratio due to channel estimation error and co-channel interference. The effect of different parameters on the performance of the two way relaying scheme is studied. It is that TWRN, cooperative communications not only enhance the BER performance but also reduce the effect of channel estimation error and/ or co-channel interference.
{"title":"Performance of two way DF relaying with co-channel interference and channel estimation error","authors":"A. El-Mahdy, Wassim Alexan, N. Ashraf","doi":"10.1109/ICDIPC.2015.7323010","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323010","url":null,"abstract":"One of the major problems of wireless communication is the channel estimation error and co-channel interference, which causes degradation in the performance of the system. Cooperative communication is one of the most efficient techniques to enhance the performance of wireless systems in the presence of channel estimation error and co-channel interference. In this paper, the performance of decode and forward two-way relay network (TWRN) scheme is evaluated in presence of channel estimation error and co-channel interference. The performance is evaluated analytically in terms of a metric called signal-to-noise gap ratio, which measures the reduction in the signal-to-noise ratio due to channel estimation error and co-channel interference. The effect of different parameters on the performance of the two way relaying scheme is studied. It is that TWRN, cooperative communications not only enhance the BER performance but also reduce the effect of channel estimation error and/ or co-channel interference.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121478178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323017
S. F. Sabri, S. Daud, S. Sam, K. Kamardin, Nor’asnilawati Salleh
Computer Designated Mode (CDM) plays an important role during tracking ISRO's launch vehicle, GSLV D5. It allows tracking data to be transferred from Satish Dhawan Space Centre, India to Malaysia Space Centre, Malaysia. The data are used for real time tracking. This paper looks into the development of CDM that is based on functional requirement whereas the security measure is not considered at the moment. This paper explains the architecture of CDM and how the security will be implemented on the systems. RSA algorithm is chosen as the encryption technique which will be applied in the system. Simulation result shows that this technique is feasible for the mentioned implementation.
{"title":"Implementation of security in computer designated mode system","authors":"S. F. Sabri, S. Daud, S. Sam, K. Kamardin, Nor’asnilawati Salleh","doi":"10.1109/ICDIPC.2015.7323017","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323017","url":null,"abstract":"Computer Designated Mode (CDM) plays an important role during tracking ISRO's launch vehicle, GSLV D5. It allows tracking data to be transferred from Satish Dhawan Space Centre, India to Malaysia Space Centre, Malaysia. The data are used for real time tracking. This paper looks into the development of CDM that is based on functional requirement whereas the security measure is not considered at the moment. This paper explains the architecture of CDM and how the security will be implemented on the systems. RSA algorithm is chosen as the encryption technique which will be applied in the system. Simulation result shows that this technique is feasible for the mentioned implementation.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323000
Sundresan Perumal, N. Norwawi, V. Raman
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, internet of things (IoT) is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices including smart objects, is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid. The main research challenge in Internet of things (IoT) for the forensic investigators is based size of the objects of forensic interest, relevancy, blurry network boundaries and edgeless networks, especially on method for conducting the investigation. The aim of this paper is to identify the best approach by designing a novel model to conduct the investigation situations for digital forensic professionals and experts. There was existing research works which introduce models for identifying the objects of forensics interest in investigations, but there were no rigorous testing for accepting the approach. Currently in this work, an integrated model is designed based on triage model and 1-2-3 zone model for volatile based data preservation.
{"title":"Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology","authors":"Sundresan Perumal, N. Norwawi, V. Raman","doi":"10.1109/ICDIPC.2015.7323000","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323000","url":null,"abstract":"The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, internet of things (IoT) is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices including smart objects, is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid. The main research challenge in Internet of things (IoT) for the forensic investigators is based size of the objects of forensic interest, relevancy, blurry network boundaries and edgeless networks, especially on method for conducting the investigation. The aim of this paper is to identify the best approach by designing a novel model to conduct the investigation situations for digital forensic professionals and experts. There was existing research works which introduce models for identifying the objects of forensics interest in investigations, but there were no rigorous testing for accepting the approach. Currently in this work, an integrated model is designed based on triage model and 1-2-3 zone model for volatile based data preservation.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"44 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123376000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323018
Hossam Deraz, G. Awuah, Desalegn Abraha
Do consumers of the same brand from different culture have the same perceptions while assessing the advertisements on Social Networking Sites' (SNSAs)? To answer this question, the data for this study were collected from brand communities' consumers (BCCs) on SNSs. 278 respondents from three different cultural backgrounds (Egyptians, Dutch and British) answered the questionnaires. Five main variables to collect the consumers' assessment of SNSAs were tested (information value, entertainment value, credibility value, interactivity value, and irritation value). Based on the empirical findings, the three groups perceived five of the six variables with significant difference F ratios. Consequently, their perception of the entertainment value of SNSAs has no significant differences between the three groups. Based on the cross-cultural theory, the findings of this study have some agreements and some contradictions, especially the influences of power distance and uncertainly avoidance. Moreover, the researchers used the Oneway analysis of variance (ANOVA) with Post Hoc tests to compare between the assessments of the three groups.
{"title":"The effect of culture on the consumers' assessment of advertisements on social networking sites; Cross-cultural analysis","authors":"Hossam Deraz, G. Awuah, Desalegn Abraha","doi":"10.1109/ICDIPC.2015.7323018","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323018","url":null,"abstract":"Do consumers of the same brand from different culture have the same perceptions while assessing the advertisements on Social Networking Sites' (SNSAs)? To answer this question, the data for this study were collected from brand communities' consumers (BCCs) on SNSs. 278 respondents from three different cultural backgrounds (Egyptians, Dutch and British) answered the questionnaires. Five main variables to collect the consumers' assessment of SNSAs were tested (information value, entertainment value, credibility value, interactivity value, and irritation value). Based on the empirical findings, the three groups perceived five of the six variables with significant difference F ratios. Consequently, their perception of the entertainment value of SNSAs has no significant differences between the three groups. Based on the cross-cultural theory, the findings of this study have some agreements and some contradictions, especially the influences of power distance and uncertainly avoidance. Moreover, the researchers used the Oneway analysis of variance (ANOVA) with Post Hoc tests to compare between the assessments of the three groups.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323002
Lumka Thami P. Salamntu, Lisa F. Seymour
Managing information and content in organisations can be a challenging task hence the implementation of the Enterprise Content Management (ECM) systems. ECM can be classified as integrated approach to information management. The ECM concept has received much attention from the practitioners and vendors perspective but ECM research is still an emerging field in Information Systems (IS) research. ECM research is approximately more than one decade but it only received little consideration from scholars and a lot of attention from industries. This paper will provide an in-depth review of the ECM literature mainly its implementation and the benefits associated with it. When looking at the four ECM dimensions, research indicates that the majority of the literature focuses on content mainly on the information and system views. However, ECM research still lacks consistency and well accepted definitions as it is a concept that is still evolving. Most of the literature consists of case studies and most frequent contribution in field studies with a promising trend towards contributing theory. This is a comprehensive analysis of the ECM literature across a number of sources and offers an important insight about the directions of the ECM research.
{"title":"A review of enterprise content management (ECM): Growth and maturation of ECM from the year 2001 to 2011","authors":"Lumka Thami P. Salamntu, Lisa F. Seymour","doi":"10.1109/ICDIPC.2015.7323002","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323002","url":null,"abstract":"Managing information and content in organisations can be a challenging task hence the implementation of the Enterprise Content Management (ECM) systems. ECM can be classified as integrated approach to information management. The ECM concept has received much attention from the practitioners and vendors perspective but ECM research is still an emerging field in Information Systems (IS) research. ECM research is approximately more than one decade but it only received little consideration from scholars and a lot of attention from industries. This paper will provide an in-depth review of the ECM literature mainly its implementation and the benefits associated with it. When looking at the four ECM dimensions, research indicates that the majority of the literature focuses on content mainly on the information and system views. However, ECM research still lacks consistency and well accepted definitions as it is a concept that is still evolving. Most of the literature consists of case studies and most frequent contribution in field studies with a promising trend towards contributing theory. This is a comprehensive analysis of the ECM literature across a number of sources and offers an important insight about the directions of the ECM research.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323024
Md. Akram Hossain, M. Hasan, Md. Rakibul Hasan
The purposes of this study are to analyze - (1) the dissimilarities in job attitude of modern technology enabled (web-fed printing press) and outmoded (sheet-fed printing press) printing press workers; and (2) the factors influencing outmoded printing press workers intention to adopt Advanced Printing Technology (APT) in Bangladesh. Nine variables are selected based on literature review to measure the job attitude. On the other hand, five constructs/latent variables (measured by 17 observed variables) derived from UTAUT model are used to measure the “Behavioral Intention” of the workers. 496 workers are surveyed in this study. Discriminant analysis is used to analyze the dissimilarities and PLS-SEM (Partial Least Square-Structural Equation Modelling) is applied to assess the “Behavioral Intention”. Two groups of workers are significantly different in terms of the six dimensions (mental stress, physical stress, readiness of the printing machines, work flexibility, workplace safety, and working environment) of job attitude. On the other hand, Personal Innovativeness (PI), Performance Expectancy (PE), Effort Expectancy (EE), and Social Influence (SI) have significantly affected the Behavioral Intention (BI) of the workers to adopt APT. But Facilitating Condition (FC) does not affect the BI significantly. Arranging adequate institutional training/educational program on APT arranged for the workers and enormous investments made by both public and private sector can make the facilitating condition of printing industry in Bangladesh more favorable and adaptable.
{"title":"Job attitude and adoption of Advanced Printing Technology in Modern & Outmoded printing presses in Bangladesh","authors":"Md. Akram Hossain, M. Hasan, Md. Rakibul Hasan","doi":"10.1109/ICDIPC.2015.7323024","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323024","url":null,"abstract":"The purposes of this study are to analyze - (1) the dissimilarities in job attitude of modern technology enabled (web-fed printing press) and outmoded (sheet-fed printing press) printing press workers; and (2) the factors influencing outmoded printing press workers intention to adopt Advanced Printing Technology (APT) in Bangladesh. Nine variables are selected based on literature review to measure the job attitude. On the other hand, five constructs/latent variables (measured by 17 observed variables) derived from UTAUT model are used to measure the “Behavioral Intention” of the workers. 496 workers are surveyed in this study. Discriminant analysis is used to analyze the dissimilarities and PLS-SEM (Partial Least Square-Structural Equation Modelling) is applied to assess the “Behavioral Intention”. Two groups of workers are significantly different in terms of the six dimensions (mental stress, physical stress, readiness of the printing machines, work flexibility, workplace safety, and working environment) of job attitude. On the other hand, Personal Innovativeness (PI), Performance Expectancy (PE), Effort Expectancy (EE), and Social Influence (SI) have significantly affected the Behavioral Intention (BI) of the workers to adopt APT. But Facilitating Condition (FC) does not affect the BI significantly. Arranging adequate institutional training/educational program on APT arranged for the workers and enormous investments made by both public and private sector can make the facilitating condition of printing industry in Bangladesh more favorable and adaptable.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133291077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7322999
T. Tsujimura, K. Izumi, Koichi Yoshida
This paper studies the laser beam alignment method for free space optical communication. Distributed control system is designed to administer laser beam direction for stable bilateral optical transmission system. Strategic process is proposed to keep optical line connected, as well as the initial adjustment procedure of the laser beam. Analytic and statistic estimation methods of the laser beam alignment are investigated based on the Gaussian beam optics. Computer simulation evaluates the accuracy of the proposed estimation methods, and experiments disclose that the methods help us to find the optical axis of laser beam and to adjust it to the receiver mounted on the remote FSO equipment.
{"title":"Optical axis adjustment of laser beam transmission system","authors":"T. Tsujimura, K. Izumi, Koichi Yoshida","doi":"10.1109/ICDIPC.2015.7322999","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7322999","url":null,"abstract":"This paper studies the laser beam alignment method for free space optical communication. Distributed control system is designed to administer laser beam direction for stable bilateral optical transmission system. Strategic process is proposed to keep optical line connected, as well as the initial adjustment procedure of the laser beam. Analytic and statistic estimation methods of the laser beam alignment are investigated based on the Gaussian beam optics. Computer simulation evaluates the accuracy of the proposed estimation methods, and experiments disclose that the methods help us to find the optical axis of laser beam and to adjust it to the receiver mounted on the remote FSO equipment.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128323121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323007
Esraa Omran, Tyrone Grandison, Salah Al Sharhan
Kuwait is aspiring to be amongst the top countries in the world in the provision of healthcare services to its people. To do this, issues surrounding information availability, data security, and data privacy must be addressed. Hospitals struggle with providing access to (possibly sensitive and critical) data at the right levels, at the right time, while ensuring seamless service. In this paper, we propose a cloud-based system for hospitals and healthcare institutions in Kuwait that takes steps towards solving these issues.
{"title":"Leveraging cloud services to spark innovation, privacy and security in Kuwait hospitals","authors":"Esraa Omran, Tyrone Grandison, Salah Al Sharhan","doi":"10.1109/ICDIPC.2015.7323007","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323007","url":null,"abstract":"Kuwait is aspiring to be amongst the top countries in the world in the provision of healthcare services to its people. To do this, issues surrounding information availability, data security, and data privacy must be addressed. Hospitals struggle with providing access to (possibly sensitive and critical) data at the right levels, at the right time, while ensuring seamless service. In this paper, we propose a cloud-based system for hospitals and healthcare institutions in Kuwait that takes steps towards solving these issues.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124823939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-12DOI: 10.1109/ICDIPC.2015.7323027
Peter Wlodarczak, J. Soar, Mustafa A. Ally
Due to the large amounts of Multimedia data on the Internet, Multimedia mining has become a very active area of research. Multimedia mining is a form of data mining. Data mining uses algorithms to segment data to identify useful patterns and to make predictions. Despite the successes in many areas, data mining remains a challenging task. In the past, multimedia mining was one of the fields where the results were often not satisfactory. Multimedia Data Mining extracts relevant data from multimedia files such as audio, video and still images to perform similarity searches, identify associations, entity resolution and for classification. As the mining techniques have matured, new techniques were developed. A lot of progress has been made in areas such as visual data mining and natural language processing using deep learning techniques. Deep learning is a branch of machine learning and has been used among other on Smartphones for face recognition and voice commands. Deep learners are a type of artificial neural networks with multiple data processing layers that learn representations by increasing the level of abstraction from one layer to the next. These methods have improved the state-of-the-art in multimedia mining, in speech recognition, visual object recognition, natural language processing and other areas such as genome mining and predicting the efficacy of drug molecules. This paper describes some of the deep learning techniques that have been used in recent research for multimedia data mining.
{"title":"Multimedia data mining using deep learning","authors":"Peter Wlodarczak, J. Soar, Mustafa A. Ally","doi":"10.1109/ICDIPC.2015.7323027","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323027","url":null,"abstract":"Due to the large amounts of Multimedia data on the Internet, Multimedia mining has become a very active area of research. Multimedia mining is a form of data mining. Data mining uses algorithms to segment data to identify useful patterns and to make predictions. Despite the successes in many areas, data mining remains a challenging task. In the past, multimedia mining was one of the fields where the results were often not satisfactory. Multimedia Data Mining extracts relevant data from multimedia files such as audio, video and still images to perform similarity searches, identify associations, entity resolution and for classification. As the mining techniques have matured, new techniques were developed. A lot of progress has been made in areas such as visual data mining and natural language processing using deep learning techniques. Deep learning is a branch of machine learning and has been used among other on Smartphones for face recognition and voice commands. Deep learners are a type of artificial neural networks with multiple data processing layers that learn representations by increasing the level of abstraction from one layer to the next. These methods have improved the state-of-the-art in multimedia mining, in speech recognition, visual object recognition, natural language processing and other areas such as genome mining and predicting the efficacy of drug molecules. This paper describes some of the deep learning techniques that have been used in recent research for multimedia data mining.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}