首页 > 最新文献

2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)最新文献

英文 中文
Design of car license plate area detection algorithm for enhanced recognition plate 设计汽车车牌面积检测算法,增强车牌识别
Chi-Sung Ahn, Bong-Gyou Lee, Seung-Su Yang, Seok-Cheon Park
The high penetration rate of cars in Korea causes a great deal of congested traffic, and a variety of car management systems which use license plate detection technology are being employed to overcome this problem. However, detection errors occur in existing edge-based license plate detection technology due to a low license plate area recognition rate. Therefore, in this paper we have designed a car license plate area detection algorithm which improves the recognition rate through an operation which combines canny and Laplacian edges in order to improve the license plate recognition rate.
由于韩国的汽车普及率高,导致交通拥堵,因此正在开发利用车牌识别技术的各种车辆管理系统。然而,现有的基于边缘的车牌检测技术由于车牌区域识别率较低,存在检测误差。因此,本文设计了一种汽车车牌区域检测算法,通过将canny边缘和拉普拉斯边缘相结合的操作来提高识别率,从而提高车牌的识别率。
{"title":"Design of car license plate area detection algorithm for enhanced recognition plate","authors":"Chi-Sung Ahn, Bong-Gyou Lee, Seung-Su Yang, Seok-Cheon Park","doi":"10.1109/CAIPT.2017.8320749","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320749","url":null,"abstract":"The high penetration rate of cars in Korea causes a great deal of congested traffic, and a variety of car management systems which use license plate detection technology are being employed to overcome this problem. However, detection errors occur in existing edge-based license plate detection technology due to a low license plate area recognition rate. Therefore, in this paper we have designed a car license plate area detection algorithm which improves the recognition rate through an operation which combines canny and Laplacian edges in order to improve the license plate recognition rate.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123557728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A study on the effective interaction method to improve the presence in social virtual reality game 提高社交虚拟现实游戏中存在感的有效交互方法研究
S. Oh, T. Whangbo
In this study, an effective interaction method for the elements that may maximize inter-user presence in social VR game that plays a role of social relation extension space is intended to be suggested. Relevant research on presence, immersion, interaction, social VR game required for this method including particularly effective player movement based on function of controller and HMD that is a system of connecting reality with virtual environment, haptic and correlation with audio will be progressed.
本研究旨在提出一种有效的交互方法,使社交VR游戏中发挥社会关系延伸空间作用的元素最大化用户间的存在感。该方法所需的临场、沉浸、互动、社交VR游戏的相关研究,包括基于控制器功能的特别有效的玩家移动,以及连接现实与虚拟环境、触觉和音频关联的HMD系统。
{"title":"A study on the effective interaction method to improve the presence in social virtual reality game","authors":"S. Oh, T. Whangbo","doi":"10.1109/CAIPT.2017.8320715","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320715","url":null,"abstract":"In this study, an effective interaction method for the elements that may maximize inter-user presence in social VR game that plays a role of social relation extension space is intended to be suggested. Relevant research on presence, immersion, interaction, social VR game required for this method including particularly effective player movement based on function of controller and HMD that is a system of connecting reality with virtual environment, haptic and correlation with audio will be progressed.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114251205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance analysis of extract, transform, load (ETL) in apache Hadoop atop NAS storage using ISCSI 在apache Hadoop NAS存储上使用ISCSI实现ETL的性能分析
Adnan, A. A. Ilham, S. Usman
Data analytics has become a key element of the business decision process over the last decade. ETL is Process to migrate the data from the source to the required database, Store and process the huge amount of structured and unstructured data for complex analysis business. Standard ETL tools don't efficiently handle it. Improving it can provide a better return on company's investment. Become interesting to find an opportunity to construct computing-storage devices low-cost, low-power components to perform ETL Process. In this paper, we proposed Hadoop on iSCSI over Ethernet adapted Network Attached Storage (NAS) to process ETL, investigate the benefits of running Hadoop over NAS storage as compared with normal HDFS using a benchmark about extract performance, transform performance and load performance. This research used 1 NameNode, 4 DataNodes, NAS Storage, and dataset to examine the proposed architecture. The result showed that the proposed architecture is ability to use low-cost components to deliver scalable performance and could become storage solution in the Big Data space.
在过去十年中,数据分析已成为业务决策过程的关键要素。ETL是将数据从数据源迁移到所需数据库的过程,存储和处理大量的结构化和非结构化数据,用于复杂的分析业务。标准的ETL工具不能有效地处理它。改进它可以为公司的投资提供更好的回报。寻找一个构建低成本、低功耗组件来执行ETL Process的计算存储设备的机会变得很有趣。在本文中,我们提出了基于iSCSI over Ethernet的Hadoop,采用网络附加存储(NAS)来处理ETL,并使用关于提取性能、转换性能和加载性能的基准测试来研究在NAS存储上运行Hadoop与普通HDFS相比的好处。本研究使用了1个NameNode、4个datanode、NAS Storage和数据集来检验提议的架构。结果表明,所提出的架构能够使用低成本的组件来提供可扩展的性能,并且可以成为大数据领域的存储解决方案。
{"title":"Performance analysis of extract, transform, load (ETL) in apache Hadoop atop NAS storage using ISCSI","authors":"Adnan, A. A. Ilham, S. Usman","doi":"10.1109/CAIPT.2017.8320716","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320716","url":null,"abstract":"Data analytics has become a key element of the business decision process over the last decade. ETL is Process to migrate the data from the source to the required database, Store and process the huge amount of structured and unstructured data for complex analysis business. Standard ETL tools don't efficiently handle it. Improving it can provide a better return on company's investment. Become interesting to find an opportunity to construct computing-storage devices low-cost, low-power components to perform ETL Process. In this paper, we proposed Hadoop on iSCSI over Ethernet adapted Network Attached Storage (NAS) to process ETL, investigate the benefits of running Hadoop over NAS storage as compared with normal HDFS using a benchmark about extract performance, transform performance and load performance. This research used 1 NameNode, 4 DataNodes, NAS Storage, and dataset to examine the proposed architecture. The result showed that the proposed architecture is ability to use low-cost components to deliver scalable performance and could become storage solution in the Big Data space.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121646205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Encryption scheme in portable electric vehicle charging infrastructure: Encryption scheme using symmetric key 便携式电动汽车充电基础设施的加密方案:对称密钥加密方案
Chan-Kuk Jang, Jae-Hoon Lee, Okyeon Yi
In recent years, Electric Vehicles have developed rapidly around the world as a measure against depletion of fossil fuels. However, compared to the development of electric vehicles, electric vehicle charging infrastructure is slow to develop, and security services are not provided at all. This paper focuses on the encryption scheme for portable electric vehicle charging infrastructure.
近年来,电动汽车作为一种对抗化石燃料枯竭的措施,在世界范围内得到了迅速发展。但是,相比电动汽车的发展,电动汽车充电基础设施发展缓慢,安全服务根本没有提供。本文主要研究便携式电动汽车充电基础设施的加密方案。
{"title":"Encryption scheme in portable electric vehicle charging infrastructure: Encryption scheme using symmetric key","authors":"Chan-Kuk Jang, Jae-Hoon Lee, Okyeon Yi","doi":"10.1109/CAIPT.2017.8320674","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320674","url":null,"abstract":"In recent years, Electric Vehicles have developed rapidly around the world as a measure against depletion of fossil fuels. However, compared to the development of electric vehicles, electric vehicle charging infrastructure is slow to develop, and security services are not provided at all. This paper focuses on the encryption scheme for portable electric vehicle charging infrastructure.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123899505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ensemble GradientBoost for increasing classification accuracy of credit scoring 用于提高信用评分分类精度的Ensemble GradientBoost
A. Lawi, F. Aziz, S. Syarif
The method for Credit Scoring has been developed to select a better model in predicting credit risk. Data mining methods are superior to the statistical methods of dealing with Credit Scoring issues, especially for nonlinear relationships between variables. By flashing the ensemble method with statistical methods, proven to achieve a higher level of accuracy than the method of data mining. This paper proposes a credit scoring algorithm using Ensemble Logistic Regression by boosting the method using the GradientBoost algorithm. Two datasets for implementing the algorithm, i.e., German and Australian Dataset. The results showed that GradientBoost Ensemble managed to improve the performance of a single classification Logistic Regression and achieve the highest level of accuracy in both datasets. The proposed method produces accuracy of 81% for German datasets and 88.4% for Australian datasets.
信用评分方法的发展是为了选择一个更好的模型来预测信用风险。数据挖掘方法在处理信用评分问题时优于统计方法,特别是在处理变量之间的非线性关系时。通过将集成方法与统计方法相结合,证明了集成方法比数据挖掘方法具有更高的精度。本文提出了一种基于集成逻辑回归的信用评分算法,该算法在GradientBoost算法的基础上进行了改进。实现算法的两个数据集,即德国和澳大利亚数据集。结果表明,GradientBoost Ensemble设法提高了单个分类逻辑回归的性能,并在两个数据集上实现了最高水平的准确性。该方法对德国数据集的准确率为81%,对澳大利亚数据集的准确率为88.4%。
{"title":"Ensemble GradientBoost for increasing classification accuracy of credit scoring","authors":"A. Lawi, F. Aziz, S. Syarif","doi":"10.1109/CAIPT.2017.8320700","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320700","url":null,"abstract":"The method for Credit Scoring has been developed to select a better model in predicting credit risk. Data mining methods are superior to the statistical methods of dealing with Credit Scoring issues, especially for nonlinear relationships between variables. By flashing the ensemble method with statistical methods, proven to achieve a higher level of accuracy than the method of data mining. This paper proposes a credit scoring algorithm using Ensemble Logistic Regression by boosting the method using the GradientBoost algorithm. Two datasets for implementing the algorithm, i.e., German and Australian Dataset. The results showed that GradientBoost Ensemble managed to improve the performance of a single classification Logistic Regression and achieve the highest level of accuracy in both datasets. The proposed method produces accuracy of 81% for German datasets and 88.4% for Australian datasets.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
G-code conversion from 3D model data for 3D printers on Hadoop systems 从Hadoop系统上的3D打印机的3D模型数据的g代码转换
Sungsuk Kim, Kwang-Sik Chung, Heonchang Yu, S. Yang
3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. It is needed conversion process from 3D model data to G-code to print by 3D printer. 3D model data generally can be stored in STL file format, which is composed of lots of facet data. If the file contains much more facets, the conversion time will also increase. In this paper, we try to develop a software to converse in Hadoop to cope with the problem. Our main motivation is that the conversion from a facet does not affect the other sets of facets. Thus, our algorithm proceeds to step 4: preprocessing, mapping, shuffling, and reducing. Finally, performance evaluation was performed using the developed software.
3D打印或增材制造是一种从数字文件制作三维实体物体的过程。需要将3D模型数据转换为g代码,然后用3D打印机打印。三维模型数据一般采用STL文件格式存储,该格式由大量的面数据组成。如果文件包含更多的facet,转换时间也会增加。在本文中,我们尝试在Hadoop中开发一个会话软件来解决这个问题。我们的主要动机是,从一个方面进行的转换不会影响其他方面的集合。因此,我们的算法进入第4步:预处理、映射、洗牌和约简。最后利用开发的软件进行了性能评价。
{"title":"G-code conversion from 3D model data for 3D printers on Hadoop systems","authors":"Sungsuk Kim, Kwang-Sik Chung, Heonchang Yu, S. Yang","doi":"10.1109/CAIPT.2017.8320709","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320709","url":null,"abstract":"3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. It is needed conversion process from 3D model data to G-code to print by 3D printer. 3D model data generally can be stored in STL file format, which is composed of lots of facet data. If the file contains much more facets, the conversion time will also increase. In this paper, we try to develop a software to converse in Hadoop to cope with the problem. Our main motivation is that the conversion from a facet does not affect the other sets of facets. Thus, our algorithm proceeds to step 4: preprocessing, mapping, shuffling, and reducing. Finally, performance evaluation was performed using the developed software.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Designing gamification on Social Agriculture (SociAg) application to increase end-user engagement 设计社交农业(socialag)应用的游戏化,以提高终端用户的参与度
I. Nuritha, Vandha Widartha, S. Bukhori
Social Agriculture (SociAg) application is a web based social media application prototype which is used for providing active, interactive, and persuasive communication among farmers, farmer communities and professionals as space for sharing information each other to improve science and technology knowledge in agriculture. SociAg application is developed by implementing gamification concept for increasing user interest within using this application. Gamification is used as one of strategy end-user engagement to attract enthusiastic farmers, farmer communities, and professionals in utilizing SociAg applications to interact with useful information sharing especially in agriculture. Through gamification concept, the active SociAg application user will earn reward be in the form of point in each the use of SociAg application activities. The achievement of these points are able to be used either by government or by policy maker as one of reference to grant the agriculture assistance, in order the assistance is able to be provided on the right target.
社会农业(Social Agriculture, SociAg)应用程序是一个基于web的社交媒体应用原型,用于在农民、农民社区和专业人员之间提供积极、互动和有说服力的沟通,作为相互分享信息的空间,以提高农业科技知识。社交应用程序是通过实现游戏化概念来提高用户使用该应用程序的兴趣而开发的。游戏化被用作终端用户参与策略之一,以吸引热心的农民、农民社区和专业人士利用社会化农业应用程序与有用的信息共享进行互动,尤其是在农业领域。通过游戏化的理念,活跃的社交应用用户将在每次使用社交应用的活动中以积分的形式获得奖励。这些要点的实现可以作为政府或政策制定者提供农业援助的参考之一,以便能够向正确的目标提供援助。
{"title":"Designing gamification on Social Agriculture (SociAg) application to increase end-user engagement","authors":"I. Nuritha, Vandha Widartha, S. Bukhori","doi":"10.1109/CAIPT.2017.8320713","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320713","url":null,"abstract":"Social Agriculture (SociAg) application is a web based social media application prototype which is used for providing active, interactive, and persuasive communication among farmers, farmer communities and professionals as space for sharing information each other to improve science and technology knowledge in agriculture. SociAg application is developed by implementing gamification concept for increasing user interest within using this application. Gamification is used as one of strategy end-user engagement to attract enthusiastic farmers, farmer communities, and professionals in utilizing SociAg applications to interact with useful information sharing especially in agriculture. Through gamification concept, the active SociAg application user will earn reward be in the form of point in each the use of SociAg application activities. The achievement of these points are able to be used either by government or by policy maker as one of reference to grant the agriculture assistance, in order the assistance is able to be provided on the right target.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Incentive mechanism with privacy-preservation on intelligent parking system utilizing mobile crowdsourcing 基于移动众包的智能停车系统的隐私保护激励机制
Mihui Kim
With expanding of Internet of Things (IoT) devices with various sensors, mobile crowdsourcing services (or called cloud-based sensing-as-a-service (CSaaS)) are popularly growing. The participation of many users in sensing activities is very important for successful service realization. Thus, a proper incentive mechanism is necessary. However, the data sensed by personal equipment are usually sensitive to privacy, a problem that can constrain data sharing. In this paper, we propose a privacy preserved incentive mechanism for mobile crowdsourcing services, and apply it to intelligent parking system, an example of crowdsourcing service. This mechanism protects location and identity privacy for users by utilizing an on-demand incentive payment method and group signatures. We also plan to evaluate our mechanism on systems with several specifications.
随着具有各种传感器的物联网(IoT)设备的扩展,移动众包服务(或称为基于云的传感即服务(CSaaS))越来越受欢迎。许多用户参与感知活动对于成功实现服务非常重要。因此,合理的激励机制是必要的。然而,个人设备感知的数据通常对隐私敏感,这一问题可能会限制数据共享。本文提出了一种面向移动众包服务的隐私保护激励机制,并将其应用于众包服务中的智能停车系统。该机制通过使用按需激励支付方法和组签名来保护用户的位置和身份隐私。我们还计划在几个规范的系统上评估我们的机制。
{"title":"Incentive mechanism with privacy-preservation on intelligent parking system utilizing mobile crowdsourcing","authors":"Mihui Kim","doi":"10.1109/CAIPT.2017.8320729","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320729","url":null,"abstract":"With expanding of Internet of Things (IoT) devices with various sensors, mobile crowdsourcing services (or called cloud-based sensing-as-a-service (CSaaS)) are popularly growing. The participation of many users in sensing activities is very important for successful service realization. Thus, a proper incentive mechanism is necessary. However, the data sensed by personal equipment are usually sensitive to privacy, a problem that can constrain data sharing. In this paper, we propose a privacy preserved incentive mechanism for mobile crowdsourcing services, and apply it to intelligent parking system, an example of crowdsourcing service. This mechanism protects location and identity privacy for users by utilizing an on-demand incentive payment method and group signatures. We also plan to evaluate our mechanism on systems with several specifications.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126447540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malaysian to German sign language statistical machine translation using Markov chain and search algorithms 马来语到德语手语统计机器翻译使用马尔可夫链和搜索算法
F. Mandita, H. M. Abdullah, T. Anwar
Sign language has shown advancement indication results in the last decade of years. Research in the area of sign language has been done but mostly focuses in signer independent schemas consists of sign language and video. Unfortunately, research of sign language to translate one sign language to another sign language is infrequently. The research contributes to Malaysian to German sign language statistical machine translation for hearing impaired people. Markov chain and search algorithms are used to apply the process of translation from Malaysian to German sign language and vice versa. The corpus data are used for testing statistical machine translation around 10.000. A binary search and linear search algorithm in cooperation with a Markov chain are used to apply the process of translation. An output of execution time between 2 models of algorithms has been explored. The accuracy of the binary search algorithm is better than linear search algorithm when using for translation.
近十年来,手语已显示出先进的指示效果。在手语领域的研究已经完成,但主要集中在由手语和视频组成的手语独立图式上。遗憾的是,将一种手语翻译成另一种手语的研究很少。该研究有助于为听障人士提供马来语到德语的手语统计机器翻译。马尔可夫链和搜索算法用于马来语和德语手语的翻译过程,反之亦然。语料库数据用于测试大约10000左右的统计机器翻译。利用二元搜索和线性搜索算法配合马尔可夫链实现翻译过程。探讨了两种算法模型之间的执行时间输出。二叉搜索算法的翻译精度优于线性搜索算法。
{"title":"Malaysian to German sign language statistical machine translation using Markov chain and search algorithms","authors":"F. Mandita, H. M. Abdullah, T. Anwar","doi":"10.1109/CAIPT.2017.8320697","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320697","url":null,"abstract":"Sign language has shown advancement indication results in the last decade of years. Research in the area of sign language has been done but mostly focuses in signer independent schemas consists of sign language and video. Unfortunately, research of sign language to translate one sign language to another sign language is infrequently. The research contributes to Malaysian to German sign language statistical machine translation for hearing impaired people. Markov chain and search algorithms are used to apply the process of translation from Malaysian to German sign language and vice versa. The corpus data are used for testing statistical machine translation around 10.000. A binary search and linear search algorithm in cooperation with a Markov chain are used to apply the process of translation. An output of execution time between 2 models of algorithms has been explored. The accuracy of the binary search algorithm is better than linear search algorithm when using for translation.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133838777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New approach toward data hiding by using affine cipher and least significant bit algorithm 利用仿射密码和最低有效位算法实现数据隐藏的新方法
D. Rachmawati, M. A. Budiman
Data security is not a top priority of most people at the moment. So the common misuse of the data and other security disturbances. To address the security disorder, can be used in the science of encryption data such as Cryptography and Steganography. The science of Cryptography use randomize or disguise the data, whereas the science of Steganography to hide data in a way. In this research the cryptographic algorithms used are Affine cipher Algorithm. Affine cipher algorithm requires a key that contains two integers, i.e. a and k. plaintext encryption process is transformed into ciphertext. Next do the embedding (concealment of data) on image Steganography techniques with the Least Significant Bit (LSB) and insert a message at the last bits of the image. It was needed extraction process to get the previous ciphertext. Then through the decryption stage to get the original plaintext. With a combination of Affine and LSB, data security will increase because after the message is scrambled into a ciphertext, the ciphertext will be inserted into the image file.
目前,数据安全并不是大多数人的首要任务。所以普遍存在数据误用等安全隐患。为了解决安全混乱的问题,可以采用科学的加密方法对数据进行加密,如密码学和隐写术。密码学使用随机化或伪装数据,而隐写术则在某种程度上隐藏数据。本研究使用的密码算法是仿射密码算法。仿射密码算法需要一个包含两个整数的密钥,即a和k。明文加密过程转化为密文。然后利用最低有效位(LSB)对图像隐写技术进行嵌入(隐藏数据),并在图像的最后位插入信息。要得到之前的密文,需要经过一定的提取过程。然后通过解密阶段得到原始明文。将仿射和LSB结合使用,数据安全性将得到提高,因为在将消息加扰为密文后,密文将被插入到图像文件中。
{"title":"New approach toward data hiding by using affine cipher and least significant bit algorithm","authors":"D. Rachmawati, M. A. Budiman","doi":"10.1109/CAIPT.2017.8320737","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320737","url":null,"abstract":"Data security is not a top priority of most people at the moment. So the common misuse of the data and other security disturbances. To address the security disorder, can be used in the science of encryption data such as Cryptography and Steganography. The science of Cryptography use randomize or disguise the data, whereas the science of Steganography to hide data in a way. In this research the cryptographic algorithms used are Affine cipher Algorithm. Affine cipher algorithm requires a key that contains two integers, i.e. a and k. plaintext encryption process is transformed into ciphertext. Next do the embedding (concealment of data) on image Steganography techniques with the Least Significant Bit (LSB) and insert a message at the last bits of the image. It was needed extraction process to get the previous ciphertext. Then through the decryption stage to get the original plaintext. With a combination of Affine and LSB, data security will increase because after the message is scrambled into a ciphertext, the ciphertext will be inserted into the image file.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1