首页 > 最新文献

International Journal of Advances in Soft Computing and its Applications最新文献

英文 中文
A Model Combining BDI Logic and Temporal Logics for Decision-Making in Emergency BDI逻辑与时态逻辑相结合的应急决策模型
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.03
Ferdaous Benrouba, R. Boudour
Abstract Nowadays, we are dealing with panic and unpleasant situations in which, we are constrained to make crucial decisions in a limited delay, due to the mixed emotions that may affect our decision, especially FEAR, this kind of emotion occurs when unwanted or uncontrollable events are present in the environment. These recent years, fear modelling has been well researched and since this emotion is usually associated with the fact that one or more fundamental desires are at stake Unluckily, most of these models miss that FEAR does not always occur similarly in all agents. This paper proposes a new conceptual architecture with a new component by extending BDI logic with the emotion of FEAR, so that the new Emotional-BDI agents may better cope with extremely dynamic unpleasant situations in their surroundings. We also address how we verify the emotional properties by employing a model checker NuSMV. The proposed architecture confirms that NuSMV can be applied to verify the emotional specifications we can program agents that are capable of reasoning over emotions, our experimental results indicate the viability and efficiency of our model. Keywords: Emotional-BDI, Model checking, NuSMV, CUDD, Unpleasant situations.
如今,我们在处理恐慌和不愉快的情况下,我们被迫在有限的延迟内做出关键的决定,由于各种各样的情绪可能会影响我们的决定,尤其是恐惧,这种情绪发生在环境中出现不想要的或无法控制的事件时。近年来,恐惧模型已经得到了很好的研究,因为这种情绪通常与一个或多个基本欲望处于危险之中的事实有关。不幸的是,大多数这些模型都忽略了恐惧并不总是在所有主体中相似地发生。本文提出了一种新的概念架构和一个新的组件,通过将BDI逻辑扩展到恐惧情绪,从而使新的情绪-BDI智能体能够更好地应对周围极度动态的不愉快情况。我们还讨论了如何通过使用模型检查器NuSMV来验证情感属性。所提出的架构证实了NuSMV可以应用于验证情感规范,我们可以编程具有情感推理能力的代理,我们的实验结果表明了我们模型的可行性和效率。关键词:情绪- bdi,模型检验,NuSMV, CUDD,不愉快情境。
{"title":"A Model Combining BDI Logic and Temporal Logics for Decision-Making in Emergency","authors":"Ferdaous Benrouba, R. Boudour","doi":"10.15849/ijasca.221128.03","DOIUrl":"https://doi.org/10.15849/ijasca.221128.03","url":null,"abstract":"Abstract Nowadays, we are dealing with panic and unpleasant situations in which, we are constrained to make crucial decisions in a limited delay, due to the mixed emotions that may affect our decision, especially FEAR, this kind of emotion occurs when unwanted or uncontrollable events are present in the environment. These recent years, fear modelling has been well researched and since this emotion is usually associated with the fact that one or more fundamental desires are at stake Unluckily, most of these models miss that FEAR does not always occur similarly in all agents. This paper proposes a new conceptual architecture with a new component by extending BDI logic with the emotion of FEAR, so that the new Emotional-BDI agents may better cope with extremely dynamic unpleasant situations in their surroundings. We also address how we verify the emotional properties by employing a model checker NuSMV. The proposed architecture confirms that NuSMV can be applied to verify the emotional specifications we can program agents that are capable of reasoning over emotions, our experimental results indicate the viability and efficiency of our model. Keywords: Emotional-BDI, Model checking, NuSMV, CUDD, Unpleasant situations.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47290101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Machine Learning- Supervised Learning Techniques for Tennis Players Dataset Analysis 机器学习-监督学习技术在网球运动员数据集分析中的应用
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.13
M. Khder, S. Fujo
Abstract ATP Tennis stands for the “The Association of Tennis Professionals” which is the primary governing body for male tennis players. ATP was formed in Sep 1972 for professional tennis players. A study has been done on tennis players’ datasets to implement supervised machine learning techniques to illustrate match data and make predictions. An appropriate dataset has been chosen, data cleaning has been implemented to extract anomalies, data is visualized via plotting methods in R language and supervised machine learning models applied. The main models applied are linear regression and decision tree. Results and predictions have been extracted from the applied models. In the linear regression model, the correlation is calculated to find the relation between dependent and independent variables, furthermore the results and prediction are extracted from the linear regression model. Also, three hypotheses are applied for multiple linear regression model. The decision tree modeled the best of 3 or best of 5 sets of matches and predicted which set of matches would be considered best. Keywords: Machine Learning, supervised learning, linear regression, decision tree, R language, Tennis, ATP.
ATP网球代表“职业网球协会”,是男子网球运动员的主要管理机构。ATP成立于1972年9月,为职业网球运动员服务。对网球运动员的数据集进行了一项研究,以实施监督机器学习技术来说明比赛数据并进行预测。选择了合适的数据集,实施了数据清洗以提取异常,通过R语言的绘图方法和应用的监督机器学习模型将数据可视化。应用的主要模型是线性回归和决策树。从应用的模型中提取了结果和预测。在线性回归模型中,通过计算相关性来找到因变量和自变量之间的关系,并从线性回归模型中提取结果和预测。并对多元线性回归模型进行了三个假设。决策树对3组最佳或5组最佳的匹配进行建模,并预测哪组匹配将被认为是最佳的。关键词:机器学习,监督学习,线性回归,决策树,R语言,网球,ATP。
{"title":"Applying Machine Learning- Supervised Learning Techniques for Tennis Players Dataset Analysis","authors":"M. Khder, S. Fujo","doi":"10.15849/ijasca.221128.13","DOIUrl":"https://doi.org/10.15849/ijasca.221128.13","url":null,"abstract":"Abstract ATP Tennis stands for the “The Association of Tennis Professionals” which is the primary governing body for male tennis players. ATP was formed in Sep 1972 for professional tennis players. A study has been done on tennis players’ datasets to implement supervised machine learning techniques to illustrate match data and make predictions. An appropriate dataset has been chosen, data cleaning has been implemented to extract anomalies, data is visualized via plotting methods in R language and supervised machine learning models applied. The main models applied are linear regression and decision tree. Results and predictions have been extracted from the applied models. In the linear regression model, the correlation is calculated to find the relation between dependent and independent variables, furthermore the results and prediction are extracted from the linear regression model. Also, three hypotheses are applied for multiple linear regression model. The decision tree modeled the best of 3 or best of 5 sets of matches and predicted which set of matches would be considered best. Keywords: Machine Learning, supervised learning, linear regression, decision tree, R language, Tennis, ATP.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44606114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study and Comparison of Different 3D Reconstruction Methods Following Quality Criteria 基于质量标准的不同三维重建方法的研究与比较
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.09
A. Akdim, A. Mahdaoui, H. Roukhe, A. M. Hseini, A. Bouazi
Abstract 3D image of a real object is a process that must be passed through two stages. The first is scanning real object by using 3D scanner, this step allows the acquisition of 3D point cloud of the object. The second is the reconstruction step, where the construction of the mesh that represents the real object is done. The surface reconstruction is carried out by means of an existing surface reconstruction method. Mesh reconstruction techniques can be grouped into two categories: the combinatorial approach and the approach by adjusting a predefined model. A large number of combinatorial methods have the principle of establishing relations between the points of a sample. The second approach is based on the idea of approximating the sampled surface using predefined models, built on global or local assumptions concerning the shape to be reconstructed. In this paper, a review of literature and experimental studies of 3d reconstruction methods, that exist in the literature, are realized then a comparison, between these methods based on Frey criterion that represents the quality of the produced surface and execution time. The experimental results show that in terms of surface quality, Ball Pivoting technique, presents a good result. However, alpha shapes method gives relevant results in execution time. Keywords: 3D reconstruction, Delaunay triangulation, Alpha Shapes, Ball Pivoting Algorithm, Poisson Method, Frey Quality, RBF, MLS
真实物体的三维成像是一个必须经过两个阶段的过程。第一步是利用三维扫描仪对真实物体进行扫描,获取物体的三维点云。第二步是重建步骤,在这个步骤中,完成了代表真实物体的网格的构建。利用现有的表面重建方法进行表面重建。网格重建技术可以分为两类:组合法和通过调整预定义模型的方法。大量的组合方法都有建立样本点间关系的原则。第二种方法基于使用预定义模型近似采样表面的思想,这些模型建立在关于要重建的形状的全局或局部假设之上。本文对现有的三维重建方法进行了文献综述和实验研究,并基于代表曲面质量和执行时间的Frey准则对这些方法进行了比较。实验结果表明,在表面质量方面,滚珠旋转技术取得了较好的效果。然而,alpha shapes方法在执行时间上给出了相关的结果。关键词:三维重建,Delaunay三角剖分,Alpha形状,球旋转算法,泊松方法,Frey质量,RBF, MLS
{"title":"A Study and Comparison of Different 3D Reconstruction Methods Following Quality Criteria","authors":"A. Akdim, A. Mahdaoui, H. Roukhe, A. M. Hseini, A. Bouazi","doi":"10.15849/ijasca.221128.09","DOIUrl":"https://doi.org/10.15849/ijasca.221128.09","url":null,"abstract":"Abstract 3D image of a real object is a process that must be passed through two stages. The first is scanning real object by using 3D scanner, this step allows the acquisition of 3D point cloud of the object. The second is the reconstruction step, where the construction of the mesh that represents the real object is done. The surface reconstruction is carried out by means of an existing surface reconstruction method. Mesh reconstruction techniques can be grouped into two categories: the combinatorial approach and the approach by adjusting a predefined model. A large number of combinatorial methods have the principle of establishing relations between the points of a sample. The second approach is based on the idea of approximating the sampled surface using predefined models, built on global or local assumptions concerning the shape to be reconstructed. In this paper, a review of literature and experimental studies of 3d reconstruction methods, that exist in the literature, are realized then a comparison, between these methods based on Frey criterion that represents the quality of the produced surface and execution time. The experimental results show that in terms of surface quality, Ball Pivoting technique, presents a good result. However, alpha shapes method gives relevant results in execution time. Keywords: 3D reconstruction, Delaunay triangulation, Alpha Shapes, Ball Pivoting Algorithm, Poisson Method, Frey Quality, RBF, MLS","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48754111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covid-19 and Tuberculosis Detection in X-Ray of Lung Images with Deep Convolutional Neural Network 基于深度卷积神经网络的肺部x线图像Covid-19和结核病检测
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.01
Firda Ummah, D. Utari
Abstract Tuberculosis is an infectious disease with symptoms similar to those of Covid-19, such as fever, cough, and shortness of breath. Based on the existing cases, these two diseases attack the lungs and can affect their shape. Detection of this disease can be done through a chest X-ray. In the X-ray images of Covid-19 and Tuberculosis, both have ground-glass opacity and consolidation, thus classifying the two diseases is tricky if done manually. One method that can be used for classification is Convolutional Neural Network (CNN). The results obtained from this research are the implementation of the CNN algorithm with four convolutions which are convolution - pooling and repeated four times. The best architecture for parameters epoch 50 with the optimizer ADAM, image size 100x100 pixels, kernel size 3x3, and in the data scenario 80%:20%. The results of the level of accuracy of the classification process in the test data are 85.4%. In addition, the labeling prediction obtained is that the Covid-19 label is predicted to be correct with a probability percentage of 95.85%, while the probability percentage for the Tuberculosis label is 98%. Keywords: Covid-19, Tuberculosis, Image, CNN
摘要结核病是一种与新冠肺炎症状相似的传染性疾病,表现为发热、咳嗽、呼吸短促等。根据现有的病例,这两种疾病会攻击肺部,并影响肺部的形状。这种疾病可以通过胸部x光检查。在Covid-19和结核病的x射线图像中,两者都有磨玻璃不透明和实变,因此如果手工对两种疾病进行分类是很棘手的。一种可以用于分类的方法是卷积神经网络(CNN)。本研究得到的结果是四个卷积的CNN算法的实现,这四个卷积是卷积池,重复了四次。使用优化器ADAM的参数epoch 50的最佳体系结构,图像大小为100x100像素,内核大小为3x3,在数据场景中为80%:20%。结果表明,该分类过程在测试数据中的准确率为85.4%。另外,得到的标签预测结果为,Covid-19标签预测正确的概率百分比为95.85%,而Tuberculosis标签预测正确的概率百分比为98%。关键词:Covid-19,结核病,图像,CNN
{"title":"Covid-19 and Tuberculosis Detection in X-Ray of Lung Images with Deep Convolutional Neural Network","authors":"Firda Ummah, D. Utari","doi":"10.15849/ijasca.221128.01","DOIUrl":"https://doi.org/10.15849/ijasca.221128.01","url":null,"abstract":"Abstract Tuberculosis is an infectious disease with symptoms similar to those of Covid-19, such as fever, cough, and shortness of breath. Based on the existing cases, these two diseases attack the lungs and can affect their shape. Detection of this disease can be done through a chest X-ray. In the X-ray images of Covid-19 and Tuberculosis, both have ground-glass opacity and consolidation, thus classifying the two diseases is tricky if done manually. One method that can be used for classification is Convolutional Neural Network (CNN). The results obtained from this research are the implementation of the CNN algorithm with four convolutions which are convolution - pooling and repeated four times. The best architecture for parameters epoch 50 with the optimizer ADAM, image size 100x100 pixels, kernel size 3x3, and in the data scenario 80%:20%. The results of the level of accuracy of the classification process in the test data are 85.4%. In addition, the labeling prediction obtained is that the Covid-19 label is predicted to be correct with a probability percentage of 95.85%, while the probability percentage for the Tuberculosis label is 98%. Keywords: Covid-19, Tuberculosis, Image, CNN","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46386193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems Xen和Hyper-V在使用加密系统的云计算中的性能比较
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.02
Waleed K AbdulRaheem
Abstract Cloud computing is internet-distributed computing model transferring processes from personal computers or servers to cloud servers. Nowadays, security and performance of cloud computing is considered challenging for both users and cloud service providers. Securing data on cloud computing servers will ensures privacy, confidentiality, integrity, and availability. Using cryptographic techniques is one of the major methods to ensure the data security while storing and transmission. Hypervisor in a cloud is a software that provides abstraction and called virtual machine monitor. Hyper-V and Xen are two different types of hypervisors. In this paper, eight different types of cryptographic algorithms are deployed by using the two hypervisors with instances, to measure the hypervisors performance while encryption and decryption. CPU utilization and response time are measured while encryption and decryption are having different data types and sizes. Results show that Xen is better than Hyper-V in most results on average at 15% and 6.1% for time duration and CPU utilization respectively. Keywords: Cloud Computing, Virtualization, Hypervisors, Xen, Hyper-V, Cryptographic Algorithm
摘要云计算是一种将进程从个人计算机或服务器转移到云服务器的互联网分布式计算模型。如今,云计算的安全性和性能被认为对用户和云服务提供商都具有挑战性。确保云计算服务器上的数据安全将确保隐私、机密性、完整性和可用性。使用加密技术是保证数据存储和传输安全的主要方法之一。云管理程序是一种提供抽象的软件,称为虚拟机监视器。Hyper-V和Xen是两种不同类型的管理程序。在本文中,通过使用带有实例的两个管理程序,部署了八种不同类型的加密算法,以衡量管理程序在加密和解密时的性能。当加密和解密具有不同的数据类型和大小时,测量CPU利用率和响应时间。结果表明,Xen在大多数结果上优于Hyper-V,在持续时间和CPU利用率方面平均分别为15%和6.1%。关键词:云计算,虚拟化,Hypervisors,Xen,Hyper-V,加密算法
{"title":"Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems","authors":"Waleed K AbdulRaheem","doi":"10.15849/ijasca.221128.02","DOIUrl":"https://doi.org/10.15849/ijasca.221128.02","url":null,"abstract":"Abstract Cloud computing is internet-distributed computing model transferring processes from personal computers or servers to cloud servers. Nowadays, security and performance of cloud computing is considered challenging for both users and cloud service providers. Securing data on cloud computing servers will ensures privacy, confidentiality, integrity, and availability. Using cryptographic techniques is one of the major methods to ensure the data security while storing and transmission. Hypervisor in a cloud is a software that provides abstraction and called virtual machine monitor. Hyper-V and Xen are two different types of hypervisors. In this paper, eight different types of cryptographic algorithms are deployed by using the two hypervisors with instances, to measure the hypervisors performance while encryption and decryption. CPU utilization and response time are measured while encryption and decryption are having different data types and sizes. Results show that Xen is better than Hyper-V in most results on average at 15% and 6.1% for time duration and CPU utilization respectively. Keywords: Cloud Computing, Virtualization, Hypervisors, Xen, Hyper-V, Cryptographic Algorithm","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45286791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Variable Selection in High Dimensional Data with Interactions 具有交互作用的高维数据中的变量选择
Q3 Computer Science Pub Date : 2022-07-20 DOI: 10.15849/ijasca.220720.11
Zuharah Jaafar, N. Ismail
A common research area in statistical machine learning has been variable selection in high dimensional settings. In recent years, numerous effective approaches have been created to deal with these challenges. In order to improve the prediction accuracy of the model for the given dataset, this study sought to present a double approach variable selection method when pairwise interactions between the explanatory variables exist and to choose the smallest explanatory variable set (considering interactions among them). In this study, a double step method consolidating Random Forest and Adaptive Elastic Net was further examined to mimic potential health effects of environmental contamination. When there were existing interactions in the data or none at all, the double step approach was compared to the single-step adaptive elastic net method and two-step CART paired with the adaptive elastic net method. Using significant statistical tests like RMSE, R2 , and the quantity of the variable chosen for the final model, the success of the strategies was measured. The double step RF+AENET approach produces a simple, constrained model. Despite the complex association between exposure variables, it has the lowest false detection rate for null interactions. A set of variables that have correlation with the result are effectively retained by the screening and variable reduction processes in the RF step of the RF+AENET approach. The double step RF+AENET performs prediction better than a single technique and chooses a sparse model that is close to the true model. Thus, it can be said that when there are pairwise interactions between variables in the simulated biological dataset, the double step technique is a better method for model prediction and parameter estimation. Keywords: Adaptive Elastic Net, Random Forest, Variable Selection, CART.
统计机器学习的一个常见研究领域是高维环境下的变量选择。近年来,已经制定了许多有效的方法来应对这些挑战。为了提高模型对给定数据集的预测精度,本研究试图提出在解释变量之间存在两两交互作用时,选择最小解释变量集(考虑它们之间的交互作用)的双途径变量选择方法。在本研究中,我们进一步研究了一种双步方法,将随机森林和自适应弹性网络整合在一起,以模拟环境污染对健康的潜在影响。当数据中存在相互作用或不存在相互作用时,将双步法与单步自适应弹性网法和两步CART与自适应弹性网法配对进行比较。使用RMSE、R2和最终模型选择的变量数量等显著统计检验来衡量策略的成功。双步RF+AENET方法产生了一个简单的约束模型。尽管暴露变量之间存在复杂的关联,但它对零相互作用的误检率最低。在RF+AENET方法的RF步骤中,筛选和变量缩减过程有效地保留了一组与结果相关的变量。双步RF+AENET预测效果优于单步技术,并选择接近真实模型的稀疏模型。因此,可以说,当模拟生物数据集中变量之间存在两两相互作用时,双步技术是一种较好的模型预测和参数估计方法。关键词:自适应弹性网,随机森林,变量选择,CART。
{"title":"Variable Selection in High Dimensional Data with Interactions","authors":"Zuharah Jaafar, N. Ismail","doi":"10.15849/ijasca.220720.11","DOIUrl":"https://doi.org/10.15849/ijasca.220720.11","url":null,"abstract":"A common research area in statistical machine learning has been variable selection in high dimensional settings. In recent years, numerous effective approaches have been created to deal with these challenges. In order to improve the prediction accuracy of the model for the given dataset, this study sought to present a double approach variable selection method when pairwise interactions between the explanatory variables exist and to choose the smallest explanatory variable set (considering interactions among them). In this study, a double step method consolidating Random Forest and Adaptive Elastic Net was further examined to mimic potential health effects of environmental contamination. When there were existing interactions in the data or none at all, the double step approach was compared to the single-step adaptive elastic net method and two-step CART paired with the adaptive elastic net method. Using significant statistical tests like RMSE, R2 , and the quantity of the variable chosen for the final model, the success of the strategies was measured. The double step RF+AENET approach produces a simple, constrained model. Despite the complex association between exposure variables, it has the lowest false detection rate for null interactions. A set of variables that have correlation with the result are effectively retained by the screening and variable reduction processes in the RF step of the RF+AENET approach. The double step RF+AENET performs prediction better than a single technique and chooses a sparse model that is close to the true model. Thus, it can be said that when there are pairwise interactions between variables in the simulated biological dataset, the double step technique is a better method for model prediction and parameter estimation. Keywords: Adaptive Elastic Net, Random Forest, Variable Selection, CART.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47920848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Prediction of Heart Disease Using Ensemble Learning and Feature Selection 利用集成学习和特征选择改进心脏病预测
Q3 Computer Science Pub Date : 2022-07-20 DOI: 10.15849/ijasca.220720.03
Priyanka Gupta, Seth D.D.
Heart or cardiovascular disease is main cause of mortality. The main objective of developing the proposed model is to increase the accuracy and reliability of predicting the coronary heart disease. This paper attempts in predicting the risk of heart disease more accurately using the techniques of ensemble learning. Moreover, the techniques of feature selection and hyper parameter tuning has been implemented in this work leading to further increase in accuracy. Among the three ensemble techniques, stacking, majority voting and bagging used in this work, the improvement achieved in prediction accuracies is 2.11%, 7.42% and 0.14% respectively. Majority voting has shown the best results in terms of increase in prediction accuracies with an accuracy of 98.38%. Keywords: Heart Disease, Ensemble Learning, Feature selection, Machine Learning
心脏或心血管疾病是死亡的主要原因。开发该模型的主要目的是提高预测冠心病的准确性和可靠性。本文尝试使用集成学习技术更准确地预测心脏病的风险。此外,本工作还采用了特征选择和超参数调整技术,进一步提高了精度。在本文所采用的叠加、多数投票和套袋三种集成技术中,预测准确率分别提高了2.11%、7.42%和0.14%。多数投票在预测准确度的提高方面显示出最好的结果,准确率为98.38%。关键词:心脏病,集成学习,特征选择,机器学习
{"title":"Improving the Prediction of Heart Disease Using Ensemble Learning and Feature Selection","authors":"Priyanka Gupta, Seth D.D.","doi":"10.15849/ijasca.220720.03","DOIUrl":"https://doi.org/10.15849/ijasca.220720.03","url":null,"abstract":"Heart or cardiovascular disease is main cause of mortality. The main objective of developing the proposed model is to increase the accuracy and reliability of predicting the coronary heart disease. This paper attempts in predicting the risk of heart disease more accurately using the techniques of ensemble learning. Moreover, the techniques of feature selection and hyper parameter tuning has been implemented in this work leading to further increase in accuracy. Among the three ensemble techniques, stacking, majority voting and bagging used in this work, the improvement achieved in prediction accuracies is 2.11%, 7.42% and 0.14% respectively. Majority voting has shown the best results in terms of increase in prediction accuracies with an accuracy of 98.38%. Keywords: Heart Disease, Ensemble Learning, Feature selection, Machine Learning","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47009721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing ANOVA F-test and Sequential Feature Selection for Intrusion Detection Systems 入侵检测系统的方差分析F检验和序列特征选择
Q3 Computer Science Pub Date : 2022-07-20 DOI: 10.15849/ijasca.220720.13
Muhammad Siraj
An Intrusion Detection System (IDS) helps the computer system notify an admin when an attack is coming to a network. However, some problems may delay this process, such as a long time caused by several features in the captured data to classify. One of the optimization approaches is to select those critical features. It is intended to increase performance and reduce computational time. This research evaluates feature selection methods using the ANOVA F-test and Sequential Feature Selection (SFS), whose performance is measured using some metrics: accuracy, specificity, and sensitivity over NSLKDD, Kyoto2006, and UNSW_NB15 datasets. Using that approach, the performance increases, on average, by more than 10% for multiclass; and about 5% for binary class. It can be inferred that an optimal number of features can be obtained, where the best features are selected by SFS. Nevertheless, this method still needs to be improved before being implemented in a real system. Keywords: Network security, Network infrastructure, Intrusion Detection System, Data Security, Information Security.
入侵检测系统(IDS)帮助计算机系统在网络受到攻击时通知管理员。然而,一些问题可能会延迟这一过程,例如由于捕获的数据中的几个特征导致分类时间过长。其中一种优化方法是选择这些关键特征。它旨在提高性能并减少计算时间。本研究使用方差分析f检验和顺序特征选择(SFS)来评估特征选择方法,其性能使用一些指标来衡量:NSLKDD, Kyoto2006和UNSW_NB15数据集的准确性,特异性和敏感性。使用这种方法,对于多类别,性能平均提高了10%以上;二进制类大约5%可以推断,可以获得最优数量的特征,其中最优特征被SFS选择。然而,在实际系统中实现之前,该方法仍需要改进。关键词:网络安全,网络基础设施,入侵检测系统,数据安全,信息安全
{"title":"Analyzing ANOVA F-test and Sequential Feature Selection for Intrusion Detection Systems","authors":"Muhammad Siraj","doi":"10.15849/ijasca.220720.13","DOIUrl":"https://doi.org/10.15849/ijasca.220720.13","url":null,"abstract":"An Intrusion Detection System (IDS) helps the computer system notify an admin when an attack is coming to a network. However, some problems may delay this process, such as a long time caused by several features in the captured data to classify. One of the optimization approaches is to select those critical features. It is intended to increase performance and reduce computational time. This research evaluates feature selection methods using the ANOVA F-test and Sequential Feature Selection (SFS), whose performance is measured using some metrics: accuracy, specificity, and sensitivity over NSLKDD, Kyoto2006, and UNSW_NB15 datasets. Using that approach, the performance increases, on average, by more than 10% for multiclass; and about 5% for binary class. It can be inferred that an optimal number of features can be obtained, where the best features are selected by SFS. Nevertheless, this method still needs to be improved before being implemented in a real system. Keywords: Network security, Network infrastructure, Intrusion Detection System, Data Security, Information Security.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42031562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New approach to Recognize Human Face Under Unconstrained Environment 一种无约束环境下人脸识别的新方法
Q3 Computer Science Pub Date : 2022-07-20 DOI: 10.15849/ijasca.220720.01
M. Rifaee, Mohammad Al Rawajbeh, Basem AlOkosh, Farhan AbdelFattah
Human face is considered as one of the most useful traits in biometrics, and it has been widely used in education, security, military and many other applications. However, in most of currently deployed face recognition systems ideal imaging conditions are assumed; to capture a fully featured images with enough quality to perform the recognition process. As the unmasked face will have a considerable impact on the numbers of new infections in the era of COVID-19 pandemic, a new unconstrained partial facial recognition method must be developed. In this research we proposed a mask detection method based on HOG (Histogram of Gradient) features descriptor and SVM (Support Vector Machine) to determine whether the face is masked or not, the proposed method was tested over 10000 randomly selected images from Masked Face-Net database and was able to correctly classify 98.73% of the tested images. Moreover, and to extract enough features from partially occluded face images, a new geometrical features extraction algorithm based on Contourlet transform was proposed. The method achieved 97.86% recognition accuracy when tested over 4784 correctly masked face images from Masked Face-Net database. Keywords: Facial Recognition, Unconstraint conditions, masked faces, HOG, Support Vector Machine.
人脸被认为是生物识别技术中最有用的特征之一,在教育、安全、军事等领域有着广泛的应用。然而,在目前部署的大多数人脸识别系统中,都假设了理想的成像条件;捕捉到具有足够质量的全功能图像来执行识别过程。在新冠肺炎大流行时代,揭下的人脸将对新增感染人数产生相当大的影响,因此必须开发一种新的无约束部分人脸识别方法。在本研究中,我们提出了一种基于HOG (Histogram of Gradient)特征描述符和SVM (Support Vector Machine)来判断人脸是否被屏蔽的掩模检测方法,该方法对从蒙面网数据库中随机选择的10000多张图像进行了测试,正确分类率达到98.73%。此外,为了从部分遮挡的人脸图像中提取足够的特征,提出了一种基于Contourlet变换的几何特征提取算法。通过对来自蒙面网数据库的4784张正确蒙面的人脸图像进行测试,该方法的识别准确率达到97.86%。关键词:人脸识别,无约束条件,蒙面,HOG,支持向量机
{"title":"A New approach to Recognize Human Face Under Unconstrained Environment","authors":"M. Rifaee, Mohammad Al Rawajbeh, Basem AlOkosh, Farhan AbdelFattah","doi":"10.15849/ijasca.220720.01","DOIUrl":"https://doi.org/10.15849/ijasca.220720.01","url":null,"abstract":"Human face is considered as one of the most useful traits in biometrics, and it has been widely used in education, security, military and many other applications. However, in most of currently deployed face recognition systems ideal imaging conditions are assumed; to capture a fully featured images with enough quality to perform the recognition process. As the unmasked face will have a considerable impact on the numbers of new infections in the era of COVID-19 pandemic, a new unconstrained partial facial recognition method must be developed. In this research we proposed a mask detection method based on HOG (Histogram of Gradient) features descriptor and SVM (Support Vector Machine) to determine whether the face is masked or not, the proposed method was tested over 10000 randomly selected images from Masked Face-Net database and was able to correctly classify 98.73% of the tested images. Moreover, and to extract enough features from partially occluded face images, a new geometrical features extraction algorithm based on Contourlet transform was proposed. The method achieved 97.86% recognition accuracy when tested over 4784 correctly masked face images from Masked Face-Net database. Keywords: Facial Recognition, Unconstraint conditions, masked faces, HOG, Support Vector Machine.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44037438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design Fractional-order PID Controllers for Single-Joint Robot Arm Model 单关节机械臂模型的分数阶PID控制器设计
Q3 Computer Science Pub Date : 2022-07-20 DOI: 10.15849/ijasca.220720.07
Iqbal M. Batiha, Suhaib A. Njadat, Radwan M. Batyha, A. Zraiqat, Amer Dababneh, S. Momani
he major goal of the this work is to present an optimal design of the Fractional-order Proportional-Derivative-Integral (FoPID) controller for the single-joint arm dynamics. For meeting this aim, the Particle Swarm Optimization (PSO) algorithm will be implement to tune the parameters of such controller. Six FoPID-controllers will be generated in accordance with two kinds of approaches (Continued Fraction Expansion (CFE) and Outstaloup’s approaches) for Laplacian operators, coupled with three fitness functions (IAE, ITAE, ITSE). These controllers will be competed to each other to determine which one can provide to the closed-loop system of the single-joint robot arm model a good rise time, short settling time, and an excellent overshoot. Keywords: Fractional-order model; Oustaloup approximation, Continued
本文的主要目标是提出单关节臂动力学的分数阶比例导数积分(FoPID)控制器的优化设计。为了实现这一目标,将采用粒子群优化算法(PSO)对该控制器的参数进行整定。根据拉普拉斯算子的两种方法(连分数展开法(CFE)和Outstaloup方法),结合3种适应度函数(IAE, ITAE, ITSE),生成6个fopid控制器。这些控制器将相互竞争,以确定哪一个可以为单关节机械臂模型的闭环系统提供良好的上升时间,短的沉降时间和良好的超调量。关键词:分数阶模型;乌斯塔鲁近似,继续
{"title":"Design Fractional-order PID Controllers for Single-Joint Robot Arm Model","authors":"Iqbal M. Batiha, Suhaib A. Njadat, Radwan M. Batyha, A. Zraiqat, Amer Dababneh, S. Momani","doi":"10.15849/ijasca.220720.07","DOIUrl":"https://doi.org/10.15849/ijasca.220720.07","url":null,"abstract":"he major goal of the this work is to present an optimal design of the Fractional-order Proportional-Derivative-Integral (FoPID) controller for the single-joint arm dynamics. For meeting this aim, the Particle Swarm Optimization (PSO) algorithm will be implement to tune the parameters of such controller. Six FoPID-controllers will be generated in accordance with two kinds of approaches (Continued Fraction Expansion (CFE) and Outstaloup’s approaches) for Laplacian operators, coupled with three fitness functions (IAE, ITAE, ITSE). These controllers will be competed to each other to determine which one can provide to the closed-loop system of the single-joint robot arm model a good rise time, short settling time, and an excellent overshoot. Keywords: Fractional-order model; Oustaloup approximation, Continued","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47313298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
International Journal of Advances in Soft Computing and its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1