首页 > 最新文献

International Journal of Computing最新文献

英文 中文
Improving Continuous Hopfield Network Stability Using Runge-Kutta Method 利用龙格-库塔方法改进连续Hopfield网络的稳定性
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2876
Mohammed El Alaoui, M. Ettaouil
Continuous Hopfield network is a recurring network that has shown its ability to solve important optimization problems. Continuous Hopfield network dynamic system is characterized by a differential equation. This equation is difficult to solve, especially for large problems. This led researchers to discretize the differential equation using Euler’s method. However, this method generally does not converge to a good solution because it is sensitive to the step size decision and initial conditions. In this work, we discretize the dynamic system of continuous Hopfield network by a new method of Runge-Kutta. This method is strong in terms of stability and performance in order to converge to a better solution. This new method introduces two phases for better network stability. The first phase targets to solve the dynamic equation by the Euler method, while the second phase allows refining the solution found in the first phase. Experimental results on benchmarks show that the proposed approach can effectively improve Hopfield neural network performance.
连续Hopfield网络是一种循环网络,已显示出解决重要优化问题的能力。连续Hopfield网络动态系统用微分方程表示。这个方程很难解,特别是对于大问题。这导致研究人员使用欧拉方法离散微分方程。然而,由于该方法对步长决定和初始条件敏感,通常不能收敛到一个好的解。本文采用一种新的龙格-库塔方法对连续Hopfield网络的动态系统进行离散化。该方法在稳定性和性能方面都很强,以便收敛到更好的解决方案。为了提高网络的稳定性,该方法引入了两个相位。第一阶段的目标是用欧拉法求解动力学方程,而第二阶段允许对第一阶段的解进行细化。基准实验结果表明,该方法能有效提高Hopfield神经网络的性能。
{"title":"Improving Continuous Hopfield Network Stability Using Runge-Kutta Method","authors":"Mohammed El Alaoui, M. Ettaouil","doi":"10.47839/ijc.22.1.2876","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2876","url":null,"abstract":"Continuous Hopfield network is a recurring network that has shown its ability to solve important optimization problems. Continuous Hopfield network dynamic system is characterized by a differential equation. This equation is difficult to solve, especially for large problems. This led researchers to discretize the differential equation using Euler’s method. However, this method generally does not converge to a good solution because it is sensitive to the step size decision and initial conditions. In this work, we discretize the dynamic system of continuous Hopfield network by a new method of Runge-Kutta. This method is strong in terms of stability and performance in order to converge to a better solution. This new method introduces two phases for better network stability. The first phase targets to solve the dynamic equation by the Euler method, while the second phase allows refining the solution found in the first phase. Experimental results on benchmarks show that the proposed approach can effectively improve Hopfield neural network performance.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75144807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Symmetrical Cryptosystems based on Cellular Automata 基于元胞自动机的对称密码系统
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2874
Serhii Ostapov, Bohdan Diakonenko, Maksym Fylypiuk, K. Hazdiuk, Liliia Shumyliak, O.Yu. Tarnovetska
This paper deals with the development of two symmetric encryption algorithms on the basis of cellular automata: a block cipher, that is based on AES and uses three-dimensional cellular automata; a stream cipher, that exploits a hardware-software entropy generation (tracking of keystrokes and mouse pointer movement), as well as the developed hash function, based on “cryptographic sponge” architecture of SHA-3, modified by cellular automata transformations. The block cipher is designed in architecture of SP-network and uses the AES substitution block. Permutation layer and key generation is designed on the basis of cellular automata rules (rules “22”, “105” and “150”). The optimal number of rounds to achieve maximum crypto resistance is determined. The stream cipher is designed on the basis of hardware-software entropy generation and uses the cryptographic hash-function in the SHA-3 architecture. Permutation function is developed on the basis of cellular automata rules (rules “30” and “146”). The procedures of shift and permutation of rows and columns is used for better permutation. A final permutation of state elements is used to improve the avalanche effect. The received results are analyzed and summarized; the conclusions and justifications about cipher parameters (like number of rounds, where needed) are made.
本文讨论了基于元胞自动机的两种对称加密算法的发展:基于AES并使用三维元胞自动机的分组密码;一种流密码,利用硬件软件熵生成(跟踪击键和鼠标指针移动),以及基于SHA-3的“加密海绵”架构的开发哈希函数,通过元胞自动机转换进行修改。该分组密码是在sp网络体系结构中设计的,采用AES替换块。排列层和密钥生成基于元胞自动机规则(规则“22”、“105”和“150”)进行设计。确定了实现最大加密阻力的最佳轮数。该流密码是在软硬件熵生成的基础上设计的,并使用了SHA-3体系结构中的加密哈希函数。排列函数是在元胞自动机规则(规则“30”和“146”)的基础上开发的。为了更好地排列,采用了行和列的移位和排列过程。最后利用状态元的排列来改善雪崩效应。对接收到的结果进行分析和总结;得出关于密码参数(如需要的轮数)的结论和论证。
{"title":"Symmetrical Cryptosystems based on Cellular Automata","authors":"Serhii Ostapov, Bohdan Diakonenko, Maksym Fylypiuk, K. Hazdiuk, Liliia Shumyliak, O.Yu. Tarnovetska","doi":"10.47839/ijc.22.1.2874","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2874","url":null,"abstract":"This paper deals with the development of two symmetric encryption algorithms on the basis of cellular automata: a block cipher, that is based on AES and uses three-dimensional cellular automata; a stream cipher, that exploits a hardware-software entropy generation (tracking of keystrokes and mouse pointer movement), as well as the developed hash function, based on “cryptographic sponge” architecture of SHA-3, modified by cellular automata transformations. The block cipher is designed in architecture of SP-network and uses the AES substitution block. Permutation layer and key generation is designed on the basis of cellular automata rules (rules “22”, “105” and “150”). The optimal number of rounds to achieve maximum crypto resistance is determined. The stream cipher is designed on the basis of hardware-software entropy generation and uses the cryptographic hash-function in the SHA-3 architecture. Permutation function is developed on the basis of cellular automata rules (rules “30” and “146”). The procedures of shift and permutation of rows and columns is used for better permutation. A final permutation of state elements is used to improve the avalanche effect. The received results are analyzed and summarized; the conclusions and justifications about cipher parameters (like number of rounds, where needed) are made.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82014544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulated Annealing – 2 Opt Algorithm for Solving Traveling Salesman Problem 求解旅行商问题的模拟退火- 2优算法
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2878
P. H. Gunawan, I. Iryanto
The purpose of this article is to elaborate performance of the hybrid model of Simulated Annealing (SA) and 2 Opt algorithm for solving the traveling salesman problem (TSP). The SA algorithm used in this article is based on the outer and inner loop SA algorithm. The hybrid algorithm has promising results in solving small and medium-scale symmetric traveling salesman problem benchmark tests taken from the TSPLIB reference. Results of the optimal solution and standard deviation indicate that the hybrid algorithm shows good performance in terms of reliability and stability in finding the optimal solution from the TSP benchmark case. Values of average error and standard deviation for all simulations in the medium scale are 0.0267 and 644.12, respectively. Moreover, in some cases namely KroB100, Pr107, and Pr144, the hybrid algorithm finds a better solution compared with the best-known solution mentioned in the reference. Further, the hybrid algorithm is 1.207 – 5.692 times faster than the pure outer and inner loop-based SA algorithm. Additionally, the results show that the hybrid algorithm outperforms other hybrid algorithms such as SA – nearest neighbor (NN) and NN – 2 Opt.
本文的目的是阐述模拟退火(SA)和2opt算法的混合模型在求解旅行商问题(TSP)中的性能。本文使用的SA算法是基于外环和内环SA算法。该混合算法在求解中小型对称旅行商问题的基准测试中取得了良好的效果。最优解和标准差的结果表明,混合算法在TSP基准情况下具有较好的可靠性和稳定性。所有模拟的中尺度平均误差和标准差分别为0.0267和644.12。此外,在某些情况下,即KroB100, Pr107和Pr144,混合算法找到了比参考文献中提到的最知名解更好的解。此外,混合算法比单纯的基于内外环的SA算法快1.207 ~ 5.692倍。此外,结果表明,该混合算法优于其他混合算法,如SA -最近邻(NN)和NN - 2 Opt。
{"title":"Simulated Annealing – 2 Opt Algorithm for Solving Traveling Salesman Problem","authors":"P. H. Gunawan, I. Iryanto","doi":"10.47839/ijc.22.1.2878","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2878","url":null,"abstract":"The purpose of this article is to elaborate performance of the hybrid model of Simulated Annealing (SA) and 2 Opt algorithm for solving the traveling salesman problem (TSP). The SA algorithm used in this article is based on the outer and inner loop SA algorithm. The hybrid algorithm has promising results in solving small and medium-scale symmetric traveling salesman problem benchmark tests taken from the TSPLIB reference. Results of the optimal solution and standard deviation indicate that the hybrid algorithm shows good performance in terms of reliability and stability in finding the optimal solution from the TSP benchmark case. Values of average error and standard deviation for all simulations in the medium scale are 0.0267 and 644.12, respectively. Moreover, in some cases namely KroB100, Pr107, and Pr144, the hybrid algorithm finds a better solution compared with the best-known solution mentioned in the reference. Further, the hybrid algorithm is 1.207 – 5.692 times faster than the pure outer and inner loop-based SA algorithm. Additionally, the results show that the hybrid algorithm outperforms other hybrid algorithms such as SA – nearest neighbor (NN) and NN – 2 Opt.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88106912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Selection Based Evolution Strategies 基于交叉选择的进化策略
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2881
L. Khilkova
A search for an optimal value of a complex multi-dimensional continuous function is still one of the most pressing problems. The genetic algorithms (GA) and evolution strategies (ES) are methods to solving optimization problems that is based on natural selection, the process that drives biological evolution. Our goal was to use evolutionary optimization methods to find the global optimal value (minimum) of a non-smooth multi-dimensional function with a large number of local minimums. We took several test functions of different levels of complexity and used evolution strategies to solve the problem. The standard evolution strategies, which work well with smooth functions, gave us various points of local minimums as a solution, without finding the global minimum, for the complex function. In our work, we propose a new approach: the cross-selection method, which, in combination with previously developed methods - adaptive evolution strategies, gave a good result for the searth for the global minimum the complex function.
寻找一个复杂的多维连续函数的最优值仍然是最紧迫的问题之一。遗传算法(GA)和进化策略(ES)是解决基于自然选择的优化问题的方法,自然选择是驱动生物进化的过程。我们的目标是使用进化优化方法寻找具有大量局部最小值的非光滑多维函数的全局最优值(最小值)。我们采用了几个不同复杂程度的测试函数,并使用进化策略来解决问题。对于光滑函数,标准进化策略给出了不同的局部最小值点作为解,而不需要找到全局最小值。在我们的工作中,我们提出了一种新的方法:交叉选择方法,该方法与先前开发的方法-自适应进化策略相结合,在寻找复杂函数的全局最小值方面取得了良好的结果。
{"title":"Cross-Selection Based Evolution Strategies","authors":"L. Khilkova","doi":"10.47839/ijc.22.1.2881","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2881","url":null,"abstract":"A search for an optimal value of a complex multi-dimensional continuous function is still one of the most pressing problems. The genetic algorithms (GA) and evolution strategies (ES) are methods to solving optimization problems that is based on natural selection, the process that drives biological evolution. Our goal was to use evolutionary optimization methods to find the global optimal value (minimum) of a non-smooth multi-dimensional function with a large number of local minimums. We took several test functions of different levels of complexity and used evolution strategies to solve the problem. The standard evolution strategies, which work well with smooth functions, gave us various points of local minimums as a solution, without finding the global minimum, for the complex function. In our work, we propose a new approach: the cross-selection method, which, in combination with previously developed methods - adaptive evolution strategies, gave a good result for the searth for the global minimum the complex function.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83195310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm for Calculation the Carry and Borrow Signs in Multi-digit Operations in the Parallel Computational Model 并行计算模型中多位数运算进借号的计算算法
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2875
A. Tereshchenko, V. Zadiraka
The fast algorithm to calculate carry signs and borrow signs for implementation of fast multi-digit operations in the parallel computational model is proposed. The proposed algorithm also makes it possible to predict carry signs in the case of an addition operation and predict borrow signs for a subtraction operation. It is shown how the sign prediction algorithm is implemented in operations in which each parallel processor proceeds the separate group of words into which multi-digit numbers are divided. The iterative calculations of carry signs of grouped words are described. The sign calculation algorithm as component of new modifications of multi-digit addition, subtraction, comparison, the sum of three or more numbers in the parallel computational model is presented. The sign calculation algorithm provides general approach to the implementation of multiplication, division, multiplication by modulo, exponentiation by modulo in the parallel computational model. In the form of a table, a general analysis of the complexity of algorithms and an analysis of the complexity by the number of single-word operations per processor are given.
为了实现并行计算模型中快速的多位数运算,提出了进位和借位的快速计算算法。该算法还可以预测加法运算的进位符号和减法运算的借位符号。它显示了符号预测算法是如何在操作中实现的,其中每个并行处理器处理被分成多位数的单独的单词组。描述了分组词进位符号的迭代计算。提出了一种符号计算算法,作为并行计算模型中多位数加、减、比较、三数或三数以上和的新修改的组成部分。符号计算算法提供了在并行计算模型中实现乘法、除法、乘模、求模的通用方法。以表格的形式,给出了算法复杂度的一般分析和每个处理器的单字运算次数的复杂度分析。
{"title":"Algorithm for Calculation the Carry and Borrow Signs in Multi-digit Operations in the Parallel Computational Model","authors":"A. Tereshchenko, V. Zadiraka","doi":"10.47839/ijc.22.1.2875","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2875","url":null,"abstract":"The fast algorithm to calculate carry signs and borrow signs for implementation of fast multi-digit operations in the parallel computational model is proposed. The proposed algorithm also makes it possible to predict carry signs in the case of an addition operation and predict borrow signs for a subtraction operation. It is shown how the sign prediction algorithm is implemented in operations in which each parallel processor proceeds the separate group of words into which multi-digit numbers are divided. The iterative calculations of carry signs of grouped words are described. The sign calculation algorithm as component of new modifications of multi-digit addition, subtraction, comparison, the sum of three or more numbers in the parallel computational model is presented. The sign calculation algorithm provides general approach to the implementation of multiplication, division, multiplication by modulo, exponentiation by modulo in the parallel computational model. In the form of a table, a general analysis of the complexity of algorithms and an analysis of the complexity by the number of single-word operations per processor are given.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89412082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Study on Software Requirements Specification and Modelling Techniques 软件需求规范与建模技术的实践研究
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2882
Denys Gobov
The quality of specified and modeled requirements is critical for IT project success. A significant number of specialized techniques are used for documenting the requirements. The selection of the appropriate technique considerably influences a project plan and the success of a change as a whole. This paper aims to examine practitioners’ industrial standards and experience in the requirements specification activities and identify factors influencing the choice of specific techniques. To get the data from business analysis practitioners, we carried out a survey involving 328 specialists from Ukrainian IT companies and a series of interviews with experts. A list of specification and modelling techniques is selected based on international standards and bodies of knowledge. Project context and participants’ background influence on the probability of particular technique selection are analyzed. A set of dependencies are identified using the Chi-Square test for association and Cramer’s V. Results can be used as guidelines for building a framework for business analysis techniques selection in IT projects.
指定和建模需求的质量对于IT项目的成功至关重要。大量的专门技术用于记录需求。适当技术的选择在很大程度上影响了项目计划和整个变更的成功。本文旨在检查从业者在需求规范活动中的行业标准和经验,并确定影响特定技术选择的因素。为了从业务分析从业者那里获得数据,我们进行了一项调查,涉及来自乌克兰IT公司的328名专家,并对专家进行了一系列访谈。规范和建模技术的清单是根据国际标准和知识体系选择的。分析了项目背景和参与者背景对特定技术选择概率的影响。使用关联的卡方检验和克莱默v来确定一组依赖关系,结果可以用作构建IT项目中业务分析技术选择框架的指导方针。
{"title":"Practical Study on Software Requirements Specification and Modelling Techniques","authors":"Denys Gobov","doi":"10.47839/ijc.22.1.2882","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2882","url":null,"abstract":"The quality of specified and modeled requirements is critical for IT project success. A significant number of specialized techniques are used for documenting the requirements. The selection of the appropriate technique considerably influences a project plan and the success of a change as a whole. This paper aims to examine practitioners’ industrial standards and experience in the requirements specification activities and identify factors influencing the choice of specific techniques. To get the data from business analysis practitioners, we carried out a survey involving 328 specialists from Ukrainian IT companies and a series of interviews with experts. A list of specification and modelling techniques is selected based on international standards and bodies of knowledge. Project context and participants’ background influence on the probability of particular technique selection are analyzed. A set of dependencies are identified using the Chi-Square test for association and Cramer’s V. Results can be used as guidelines for building a framework for business analysis techniques selection in IT projects.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74059328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Chains Defects Detection in a Printed Circuit Board Image by the Plane Partition and Flood-filling of Traces 基于平面分割和迹线填充的印刷电路板图像链缺陷检测
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2877
R. Melnyk, Tetyana Korotyeyeva, Yevheniya Levus
An approach to dividing the printed circuit board into parts to increase visibility of defects in a PCB image is considered. The approach is based on a piecewise linear approximation of a cumulative histogram. The last one is calculated for numbers of informative pixels placed in rows and columns of an image matrix. Informative pixels are those indicating contacts and C traces. The histogram demonstrates a distribution of informative pixels along the OX and OY axes. The beginning and ending points of linear lines are taken as coordinates of the divided parts of the PCB board. The flood-fill algorithm is used to color and separate the PCB chains components. The start pixels are taken from a set of informative pixels. To measure defect values, a mean intensity and gradient functions for the template and manufactured images are used. Distributed cumulative histograms are applied to PCB components to detect places and intensity of defects.
提出了一种将印刷电路板划分为多个部分的方法,以提高PCB图像中缺陷的可见性。该方法基于累积直方图的分段线性逼近。最后一个是计算放置在图像矩阵的行和列中的信息像素的数量。信息像素是那些指示触点和C轨迹的像素。直方图展示了信息像素沿OX和y轴的分布。以直线的起点和终点作为PCB板划分部分的坐标。采用泛填充算法对PCB链元件进行上色和分离。起始像素取自一组信息像素。为了测量缺陷值,使用了模板和制造图像的平均强度和梯度函数。将分布累积直方图应用于PCB元件中,检测缺陷的位置和强度。
{"title":"Chains Defects Detection in a Printed Circuit Board Image by the Plane Partition and Flood-filling of Traces","authors":"R. Melnyk, Tetyana Korotyeyeva, Yevheniya Levus","doi":"10.47839/ijc.22.1.2877","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2877","url":null,"abstract":"An approach to dividing the printed circuit board into parts to increase visibility of defects in a PCB image is considered. The approach is based on a piecewise linear approximation of a cumulative histogram. The last one is calculated for numbers of informative pixels placed in rows and columns of an image matrix. Informative pixels are those indicating contacts and C traces. The histogram demonstrates a distribution of informative pixels along the OX and OY axes. The beginning and ending points of linear lines are taken as coordinates of the divided parts of the PCB board. The flood-fill algorithm is used to color and separate the PCB chains components. The start pixels are taken from a set of informative pixels. To measure defect values, a mean intensity and gradient functions for the template and manufactured images are used. Distributed cumulative histograms are applied to PCB components to detect places and intensity of defects.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79293405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Face-mask Detection System using YOLOv5 for Preventing Spread of COVID-19 基于YOLOv5的新型冠状病毒自动口罩检测系统
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2880
Md Asifuzzaman Jishan, Md. Shahabub Alam, Imran Rashid Mazumder, K. Mahmud, Abul Kalam al Azad
Object detection systems based on deep learning have been immensely successful incomplex object detection tasks images and have shown potential in a wide range of real-life applicationsincluding the COVID-19 pandemic. One of the key challenges in containing and mitigating the infectionamong the population is to ensure and enforce the proper use of face masks. The objective of this paperis to detect the proper use of facial masks among the urban population in a megacity. In this study, wetrained and validated a new dataset to detect images such as ‘with mask’, ‘without mask’, and ‘masknot in position’ using YOLOv5. The dataset is comprised of 6550 images with the three classes. Thedataset attained a commendable performance accuracy of 95% on mAP. This study can be implementedfor automated scanning for monitoring the proper use of face masks in different settings of public spaces.
基于深度学习的目标检测系统在复杂的目标检测任务图像中取得了巨大成功,并在包括COVID-19大流行在内的广泛现实应用中显示出潜力。控制和减轻人群感染的主要挑战之一是确保和强制正确使用口罩。本文的目的是检测超大城市人口中口罩的正确使用情况。在这项研究中,我们训练并验证了一个新的数据集,以检测图像,如“带口罩”,“不带口罩”和“masknot In position”使用YOLOv5。该数据集由6550张具有这三个类的图像组成。该数据集在mAP上达到了值得称赞的95%的性能准确性。本研究可用于自动扫描,以监测在公共场所不同设置下口罩的正确使用情况。
{"title":"An Automated Face-mask Detection System using YOLOv5 for Preventing Spread of COVID-19","authors":"Md Asifuzzaman Jishan, Md. Shahabub Alam, Imran Rashid Mazumder, K. Mahmud, Abul Kalam al Azad","doi":"10.47839/ijc.22.1.2880","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2880","url":null,"abstract":"Object detection systems based on deep learning have been immensely successful incomplex object detection tasks images and have shown potential in a wide range of real-life applicationsincluding the COVID-19 pandemic. One of the key challenges in containing and mitigating the infectionamong the population is to ensure and enforce the proper use of face masks. The objective of this paperis to detect the proper use of facial masks among the urban population in a megacity. In this study, wetrained and validated a new dataset to detect images such as ‘with mask’, ‘without mask’, and ‘masknot in position’ using YOLOv5. The dataset is comprised of 6550 images with the three classes. Thedataset attained a commendable performance accuracy of 95% on mAP. This study can be implementedfor automated scanning for monitoring the proper use of face masks in different settings of public spaces.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84935237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Pair Comparison for Near-duplicates Detection 近重复检测的图像对比较
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2879
O. Gorokhovatskyi, O. Peredrii
The paper describes the search for a solution to the image near-duplicate detection problem. We assume that there are only two images to compare and classify whether they are near-duplicates. There are some traditional methods to match pair of images, and the evaluation of the most famous of them in terms of the problem is performed in this research. The effective thresholds to separate near-duplicate classes are found during experimental modeling using the INRIA Holidays dataset. The sequence of methods is proposed to make the joint decision better in terms of accuracy. It is shown also that the accuracy of binary classification of the proposed approach for the combination of the histogram comparison and ORB descriptors matching is about 85% for both near-duplicate and not near-duplicate pairs of images. This is compared to the existing methods, and it is shown, that the accuracy of more powerful methods, based on deep learning, is better, but the speed of the proposed method is higher.
本文描述了图像近重复检测问题的一种解决方案。我们假设只有两幅图像来比较和分类它们是否接近重复。传统的图像对匹配方法有很多,本研究对其中最著名的图像对匹配方法进行了评价。在使用INRIA节假日数据集进行实验建模时,发现了分离近重复类的有效阈值。为了提高联合决策的精度,提出了一系列的方法。实验还表明,将直方图比较和ORB描述符匹配相结合的方法对近重复和非近重复图像的二值分类准确率均在85%左右。这与现有的方法进行了比较,结果表明,基于深度学习的更强大的方法的准确性更好,但所提出的方法的速度更高。
{"title":"Image Pair Comparison for Near-duplicates Detection","authors":"O. Gorokhovatskyi, O. Peredrii","doi":"10.47839/ijc.22.1.2879","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2879","url":null,"abstract":"The paper describes the search for a solution to the image near-duplicate detection problem. We assume that there are only two images to compare and classify whether they are near-duplicates. There are some traditional methods to match pair of images, and the evaluation of the most famous of them in terms of the problem is performed in this research. The effective thresholds to separate near-duplicate classes are found during experimental modeling using the INRIA Holidays dataset. The sequence of methods is proposed to make the joint decision better in terms of accuracy. It is shown also that the accuracy of binary classification of the proposed approach for the combination of the histogram comparison and ORB descriptors matching is about 85% for both near-duplicate and not near-duplicate pairs of images. This is compared to the existing methods, and it is shown, that the accuracy of more powerful methods, based on deep learning, is better, but the speed of the proposed method is higher.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79887060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Classification Algorithm for Movie Review Sentiment Analysis 电影评论情感分析分类算法的性能评价
Q3 Computer Science Pub Date : 2023-03-29 DOI: 10.47839/ijc.22.1.2873
Sutriawan Sutriawan, P. Andono, Muljono Muljono, R. A. Pramunendar
The majority of the current research on sentiment analysis, which covers topics like political reviews, movie reviews, and product reviews, has developed quickly. The classification and clustering stage of sentiment analysis research involves a number of subjects. Some of them cover text classification comparison research and algorithm performance optimization. An intricate issue in sentiment analysis research is dealing with unstructured or semi-structured data. The sentiment analysis procedure and improving the efficacy of the classifier’s algorithm are both hampered by unstructured data. In order to manage unstructured data successfully and provide accurate and relevant information, unique strategies are required. The proposed classification model performance evaluation using Support Vector Machine, Naive Bayes, K-Nearest Neighbor, and Decision Tree is specifically covered in this paper. According to the study’s findings, SVM has an accuracy rate of 96% and Naive Bayes is 86%. While the decision tree’s gain accuracy is 78 percent and the kNN classification model’s gain accuracy is 78 percent, respectively. The test results demonstrate that SVM is superior to other classification models in terms of accuracy performance.
目前大多数关于情感分析的研究都发展迅速,涵盖了政治评论、电影评论和产品评论等主题。情感分析研究的分类和聚类阶段涉及多个学科。其中包括文本分类比较研究和算法性能优化。情感分析研究中的一个复杂问题是处理非结构化或半结构化数据。非结构化数据阻碍了情感分析过程和分类器算法效率的提高。为了成功地管理非结构化数据并提供准确和相关的信息,需要独特的策略。本文详细介绍了基于支持向量机、朴素贝叶斯、k近邻和决策树的分类模型性能评价方法。根据研究结果,SVM的准确率为96%,朴素贝叶斯为86%。而决策树的增益精度为78%,kNN分类模型的增益精度为78%。测试结果表明,SVM在准确率性能上优于其他分类模型。
{"title":"Performance Evaluation of Classification Algorithm for Movie Review Sentiment Analysis","authors":"Sutriawan Sutriawan, P. Andono, Muljono Muljono, R. A. Pramunendar","doi":"10.47839/ijc.22.1.2873","DOIUrl":"https://doi.org/10.47839/ijc.22.1.2873","url":null,"abstract":"The majority of the current research on sentiment analysis, which covers topics like political reviews, movie reviews, and product reviews, has developed quickly. The classification and clustering stage of sentiment analysis research involves a number of subjects. Some of them cover text classification comparison research and algorithm performance optimization. An intricate issue in sentiment analysis research is dealing with unstructured or semi-structured data. The sentiment analysis procedure and improving the efficacy of the classifier’s algorithm are both hampered by unstructured data. In order to manage unstructured data successfully and provide accurate and relevant information, unique strategies are required. The proposed classification model performance evaluation using Support Vector Machine, Naive Bayes, K-Nearest Neighbor, and Decision Tree is specifically covered in this paper. According to the study’s findings, SVM has an accuracy rate of 96% and Naive Bayes is 86%. While the decision tree’s gain accuracy is 78 percent and the kNN classification model’s gain accuracy is 78 percent, respectively. The test results demonstrate that SVM is superior to other classification models in terms of accuracy performance.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90147686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1