首页 > 最新文献

International Journal of Innovative Computing Information and Control最新文献

英文 中文
Performance Evaluation of Support Vector Machine Kernels in Intrusion Detection System for Wireless Sensor Network 支持向量机核在无线传感器网络入侵检测系统中的性能评价
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-11-16 DOI: 10.11113/ijic.v12n1.334
Muhammad Amir Hamzah, S. H. Othman
Wireless sensor network is very popular in the industrial application due to its characteristics of infrastructure-less wireless network and self-configured for physical and environmental conditions monitoring. However, the dynamic environments of wireless network expose WSN to network vulnerabilities. Intrusion Detection System (IDS) has been used to mitigate the vulnerability issue of network. Researches towards the efficiency improvement of WSN-IDS has been extensively done because the rapid growth of technologies influence the growth of network attacks. Implementation Support Vector Machine (SVM) was found to be one of the optimum algorithms for the improvement of WSN-IDS. Yet, classification efficiency of SVM is based on the kernel function used because different kernel gives different SVM architecture. Linear classification of SVM has limitation to maximize the margin due to the dynamic environment of wireless network which consist of nonlinear data. Since maximizing the margin is the primary goal of SVM, it is crucial to implement the optimum kernel in the classification of nonlinear data. Each SVM model in this research use different kernels which are Linear, RBF, Polynomial and Sigmoid kernels. Further, NSL-KDD dataset was used for the experiment of this research. Performance of each kernel were evaluated based on the experimental result obtained and it was found that RBF kernel provides the best classification accuracy with the score of 91%. Finally, discussion based on the findings was made.
无线传感器网络以其无基础设施的无线网络和自配置的物理和环境条件监测的特点,在工业应用中非常受欢迎。然而,无线网络的动态环境使WSN暴露在网络漏洞中。入侵检测系统(IDS)被用于缓解网络中的漏洞问题。由于技术的快速发展影响着网络攻击的增长,因此对WSN-IDS的效率提高进行了广泛的研究。实现支持向量机(SVM)是改进WSN-IDS的最佳算法之一。然而,支持向量机的分类效率取决于所使用的核函数,因为不同的核函数给出不同的支持向量机架构。由于无线网络是由非线性数据构成的动态环境,支持向量机的线性分类不能最大限度地实现余量。由于支持向量机的主要目标是使余量最大化,因此在非线性数据分类中实现最优核是至关重要的。本研究中每个支持向量机模型都使用了不同的核,分别是线性核、RBF核、多项式核和Sigmoid核。此外,本研究的实验采用NSL-KDD数据集。根据得到的实验结果对每个核的性能进行了评价,发现RBF核的分类准确率最高,达到91%。最后,根据研究结果进行了讨论。
{"title":"Performance Evaluation of Support Vector Machine Kernels in Intrusion Detection System for Wireless Sensor Network","authors":"Muhammad Amir Hamzah, S. H. Othman","doi":"10.11113/ijic.v12n1.334","DOIUrl":"https://doi.org/10.11113/ijic.v12n1.334","url":null,"abstract":"Wireless sensor network is very popular in the industrial application due to its characteristics of infrastructure-less wireless network and self-configured for physical and environmental conditions monitoring. However, the dynamic environments of wireless network expose WSN to network vulnerabilities. Intrusion Detection System (IDS) has been used to mitigate the vulnerability issue of network. Researches towards the efficiency improvement of WSN-IDS has been extensively done because the rapid growth of technologies influence the growth of network attacks. Implementation Support Vector Machine (SVM) was found to be one of the optimum algorithms for the improvement of WSN-IDS. Yet, classification efficiency of SVM is based on the kernel function used because different kernel gives different SVM architecture. Linear classification of SVM has limitation to maximize the margin due to the dynamic environment of wireless network which consist of nonlinear data. Since maximizing the margin is the primary goal of SVM, it is crucial to implement the optimum kernel in the classification of nonlinear data. Each SVM model in this research use different kernels which are Linear, RBF, Polynomial and Sigmoid kernels. Further, NSL-KDD dataset was used for the experiment of this research. Performance of each kernel were evaluated based on the experimental result obtained and it was found that RBF kernel provides the best classification accuracy with the score of 91%. Finally, discussion based on the findings was made.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"10 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82042116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Scheme of Pairwise Feature Combinations to Improve Sentiment Classification Using Book Review Dataset 基于书评数据集的两两特征组合改进情感分类方案
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-11-16 DOI: 10.11113/ijic.v12n1.344
S. Huspi, Haisal Dauda Abubakar, M. Umar
Sentiment Analysis is a Natural Language Processing (NLP) domain related to the identification or extraction of user sentiments or opinions from written language. Although the approaches to achieve the goals may vary, Machine Learning (ML) methods are gradually becoming the preferred method because of their ability to automatically draw useful insight from data regardless of their complexity. However, an important prerequisite for most ML algorithms to learn from text data is to encode them into numerical vectors. Popular approaches to this include word level representation methods TF-IDF, distributed word representations (word2vec) and distributed document representations (doc2vec). Each of these methods has demonstrated remarkable success in representing the encoded text, however we found that no method has been set to be excellence in all tasks. Motivated by this challenge, an improved scheme of pairwise fusion are proposed for sentiment classification of book reviews. In the experimental findings, Artificial Neural Networks (ANN) and Logistic Regression (LR) classifiers showed that the proposed scheme improved the performance compared to the single method vectorization method. We see that TF-IDF-word2vec performed best among other methods with a mean accuracy of 91.0% (ANN) and 92.5% (LR); showed an improvement of 0.7% and 0.2% respectively over TF-IDF which is the best single vector method. Thus, the proposed method can used as a compact alternative to the popular bag-of-n-gram models as it captures contextual information of encoded document with a less sparse data.
情感分析是一个自然语言处理(NLP)领域,涉及从书面语言中识别或提取用户情感或意见。尽管实现目标的方法可能会有所不同,但机器学习(ML)方法正逐渐成为首选方法,因为它们能够自动从数据中提取有用的见解,而不管其复杂性如何。然而,大多数ML算法从文本数据中学习的一个重要先决条件是将它们编码为数值向量。常用的方法包括词级表示方法TF-IDF、分布式词表示(word2vec)和分布式文档表示(doc2vec)。这些方法中的每一种都在表示编码文本方面取得了显著的成功,但是我们发现没有一种方法在所有任务中都是卓越的。针对这一挑战,提出了一种改进的两两融合的书评情感分类方法。在人工神经网络(ANN)和逻辑回归(LR)分类器的实验结果中,与单一方法的矢量化方法相比,该方法的性能有所提高。我们看到TF-IDF-word2vec在其他方法中表现最好,平均准确率为91.0% (ANN)和92.5% (LR);与最佳单载体TF-IDF相比,分别提高了0.7%和0.2%。因此,所提出的方法可以作为流行的n-gram bag模型的紧凑替代方案,因为它使用较少稀疏的数据捕获编码文档的上下文信息。
{"title":"A Scheme of Pairwise Feature Combinations to Improve Sentiment Classification Using Book Review Dataset","authors":"S. Huspi, Haisal Dauda Abubakar, M. Umar","doi":"10.11113/ijic.v12n1.344","DOIUrl":"https://doi.org/10.11113/ijic.v12n1.344","url":null,"abstract":"Sentiment Analysis is a Natural Language Processing (NLP) domain related to the identification or extraction of user sentiments or opinions from written language. Although the approaches to achieve the goals may vary, Machine Learning (ML) methods are gradually becoming the preferred method because of their ability to automatically draw useful insight from data regardless of their complexity. However, an important prerequisite for most ML algorithms to learn from text data is to encode them into numerical vectors. Popular approaches to this include word level representation methods TF-IDF, distributed word representations (word2vec) and distributed document representations (doc2vec). Each of these methods has demonstrated remarkable success in representing the encoded text, however we found that no method has been set to be excellence in all tasks. Motivated by this challenge, an improved scheme of pairwise fusion are proposed for sentiment classification of book reviews. In the experimental findings, Artificial Neural Networks (ANN) and Logistic Regression (LR) classifiers showed that the proposed scheme improved the performance compared to the single method vectorization method. We see that TF-IDF-word2vec performed best among other methods with a mean accuracy of 91.0% (ANN) and 92.5% (LR); showed an improvement of 0.7% and 0.2% respectively over TF-IDF which is the best single vector method. Thus, the proposed method can used as a compact alternative to the popular bag-of-n-gram models as it captures contextual information of encoded document with a less sparse data.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"16 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82692992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Deep Neural Network Algorithm for the Prediction of Limited Proteolysis in Native Protein 基于改进深度神经网络的天然蛋白极限水解预测算法
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-11-16 DOI: 10.11113/IJIC.V12N1.351
Nur Sabrina Azmi, H. Hashim, L. Hong, A. A. Samah, H. Majid, Z. A. Shah, Nuraina Syaza Azman
Protease is a proteolytic enzyme that hydrolyzes the amino acid where the cleavage only occurs at specific sites of the amino acid substrate.  By discovering the nick site, the prediction on the function of proteases can be identified and enable humans to control the protein's hydrolysis by their corresponding protease. It is very contributed to controlling protein production especially viral protein. The experts may alter the production of viral protein by reducing the viral proteases to undergo proteolysis. With the rise of computational methods in this era, deep learning is becoming more famous and applied in every field of study, including the biological area. Conventional techniques such as mass spectrometry and two-dimensional gel electrophoresis are being replaced by computational methods due to time-consuming. Thus, this study improves the deep learning algorithm by proposing the Hybrid model of Random Forest + Deep Neural Network (Hybrid RF+DNN) to classify nick sites. The classification in this study is compared with the other machine learning algorithms such as Random Forest (RF), Support Vector Machine (SVM),  and Deep Neural Network (DNN). The proposed method is believed to enhance the classification results in identifying the positive and negative nick sites. The RF is a feature-selector that gathers the most important feature before entering the DNN classifier. This approach reduces the data dimensionality and speeds up the execution time of the training process. The performance of the models was measured by confusion matrix, specificity, sensitivity, etc. However, the proposed method is not the best performer among the mentioned classifiers from the result. The proposed method may become the best performer as the parameter tuning is done more precisely, even after the feature selection by the RF algorithm. Thus, the proposed method with the enhancement appears to be an alternative to the researcher discovering nick site.
蛋白酶是一种水解氨基酸的蛋白水解酶,其中裂解仅发生在氨基酸底物的特定位点。通过发现缺口位点,可以对蛋白酶的功能进行预测,使人类能够通过相应的蛋白酶来控制蛋白质的水解。它对控制蛋白质特别是病毒蛋白的产生有重要作用。专家们可以通过减少病毒蛋白酶进行蛋白水解来改变病毒蛋白的产生。随着这个时代计算方法的兴起,深度学习越来越出名,并应用于各个研究领域,包括生物领域。传统的技术,如质谱和二维凝胶电泳,由于费时,正在被计算方法所取代。因此,本研究改进了深度学习算法,提出了随机森林+深度神经网络的混合模型(Hybrid RF+DNN)对缺口位点进行分类。将本研究中的分类方法与随机森林(Random Forest, RF)、支持向量机(Support Vector machine, SVM)、深度神经网络(Deep Neural Network, DNN)等机器学习算法进行比较。所提出的方法可以提高识别正负刻痕位点的分类结果。RF是一个特征选择器,它在进入DNN分类器之前收集最重要的特征。该方法降低了数据维数,加快了训练过程的执行时间。通过混淆矩阵、特异性、敏感性等指标对模型的性能进行评价。然而,从结果来看,所提出的方法并不是上述分类器中性能最好的。该方法可以成为性能最好的方法,因为参数调整更精确,即使是在RF算法的特征选择之后。因此,提出的方法与增强似乎是一种替代研究人员发现缺陷的地方。
{"title":"An Improved Deep Neural Network Algorithm for the Prediction of Limited Proteolysis in Native Protein","authors":"Nur Sabrina Azmi, H. Hashim, L. Hong, A. A. Samah, H. Majid, Z. A. Shah, Nuraina Syaza Azman","doi":"10.11113/IJIC.V12N1.351","DOIUrl":"https://doi.org/10.11113/IJIC.V12N1.351","url":null,"abstract":"Protease is a proteolytic enzyme that hydrolyzes the amino acid where the cleavage only occurs at specific sites of the amino acid substrate.  By discovering the nick site, the prediction on the function of proteases can be identified and enable humans to control the protein's hydrolysis by their corresponding protease. It is very contributed to controlling protein production especially viral protein. The experts may alter the production of viral protein by reducing the viral proteases to undergo proteolysis. With the rise of computational methods in this era, deep learning is becoming more famous and applied in every field of study, including the biological area. Conventional techniques such as mass spectrometry and two-dimensional gel electrophoresis are being replaced by computational methods due to time-consuming. Thus, this study improves the deep learning algorithm by proposing the Hybrid model of Random Forest + Deep Neural Network (Hybrid RF+DNN) to classify nick sites. The classification in this study is compared with the other machine learning algorithms such as Random Forest (RF), Support Vector Machine (SVM),  and Deep Neural Network (DNN). The proposed method is believed to enhance the classification results in identifying the positive and negative nick sites. The RF is a feature-selector that gathers the most important feature before entering the DNN classifier. This approach reduces the data dimensionality and speeds up the execution time of the training process. The performance of the models was measured by confusion matrix, specificity, sensitivity, etc. However, the proposed method is not the best performer among the mentioned classifiers from the result. The proposed method may become the best performer as the parameter tuning is done more precisely, even after the feature selection by the RF algorithm. Thus, the proposed method with the enhancement appears to be an alternative to the researcher discovering nick site.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"25 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78826335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Centralized Students’ Authentication for Higher Education Systems 高等教育系统学生集中认证
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-11-16 DOI: 10.11113/ijic.v12n1.325
M. Ahmed
Increase in the adoption of ICT for service provision renders higher educational institutions in Nigeria vulnerable to numerous security challenges. The information security threats addressed in this paper encompasses identity theft and identification frauds. The high number of students patronizing these institutions seeking for knowledge results in the challenges of identifying authentic students. The use of students’ identification number and password is no longer sufficient for authentication of students. Therefore, this paper proposed a centralized authentication model for higher education system (CAMHES) for Nigeria. The model uses multi-factor authentication combining students’ identification number, students’ fingerprint biometric and smartcard technology for students’ authentication. The solution authenticates the identity of genuine students to eliminate impersonation in Nigerian higher education systems. Although, this solution provides authentication that is extremely difficult to replicate, it is recommended that the students’ biometric data captured must be strictly kept safe.
越来越多地采用信息通信技术提供服务,使得尼日利亚的高等教育机构容易受到许多安全挑战的影响。本文讨论的信息安全威胁包括身份盗窃和身份欺诈。大量学生光顾这些机构寻求知识,这给识别真正的学生带来了挑战。使用学生的身份证号和密码已不足以对学生进行身份验证。为此,本文提出了尼日利亚高等教育系统集中式认证模型(CAMHES)。该模型采用学生身份证号、学生指纹生物识别和智能卡技术相结合的多因素认证技术对学生进行身份认证。该解决方案验证了真实学生的身份,以消除尼日利亚高等教育系统中的假冒行为。尽管此解决方案提供了极难复制的身份验证,但建议必须严格保护捕获的学生生物识别数据的安全。
{"title":"Centralized Students’ Authentication for Higher Education Systems","authors":"M. Ahmed","doi":"10.11113/ijic.v12n1.325","DOIUrl":"https://doi.org/10.11113/ijic.v12n1.325","url":null,"abstract":"Increase in the adoption of ICT for service provision renders higher educational institutions in Nigeria vulnerable to numerous security challenges. The information security threats addressed in this paper encompasses identity theft and identification frauds. The high number of students patronizing these institutions seeking for knowledge results in the challenges of identifying authentic students. The use of students’ identification number and password is no longer sufficient for authentication of students. Therefore, this paper proposed a centralized authentication model for higher education system (CAMHES) for Nigeria. The model uses multi-factor authentication combining students’ identification number, students’ fingerprint biometric and smartcard technology for students’ authentication. The solution authenticates the identity of genuine students to eliminate impersonation in Nigerian higher education systems. Although, this solution provides authentication that is extremely difficult to replicate, it is recommended that the students’ biometric data captured must be strictly kept safe.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"44 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81037847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A User-Centric Multi-Context Hybrid Reasoning Information Retrieval Model 以用户为中心的多上下文混合推理信息检索模型
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-11-16 DOI: 10.11113/ijic.v12n1.337
S. E. Nnebe, E. Okoro, F. Sadiq, B. Abara
Information Retrieval has been in existence since the 1940s and is impossible to do without. However, current information retrieval systems are known to be ineffective. The reason that seems to encompass this ineffectiveness is design-focused. Designers and developers of Information Retrieval Systems are known to be system focused rather than user-focused. They provide the same information to users even when they are in different contexts and have diverse preferences. Using a restaurant use case, we propose a conceptual user-centric multi-context hybrid reasoning Information Retrieval model to improve the accuracy of retrieved results.
信息检索自20世纪40年代以来一直存在,没有它是不可能的。然而,目前的信息检索系统被认为是无效的。这种无效的原因似乎是设计为中心的。众所周知,信息检索系统的设计者和开发人员关注的是系统而不是用户。它们向用户提供相同的信息,即使用户处于不同的环境中并且有不同的偏好。以餐厅为例,提出了一种以用户为中心的多上下文混合推理信息检索模型,以提高检索结果的准确性。
{"title":"A User-Centric Multi-Context Hybrid Reasoning Information Retrieval Model","authors":"S. E. Nnebe, E. Okoro, F. Sadiq, B. Abara","doi":"10.11113/ijic.v12n1.337","DOIUrl":"https://doi.org/10.11113/ijic.v12n1.337","url":null,"abstract":"Information Retrieval has been in existence since the 1940s and is impossible to do without. However, current information retrieval systems are known to be ineffective. The reason that seems to encompass this ineffectiveness is design-focused. Designers and developers of Information Retrieval Systems are known to be system focused rather than user-focused. They provide the same information to users even when they are in different contexts and have diverse preferences. Using a restaurant use case, we propose a conceptual user-centric multi-context hybrid reasoning Information Retrieval model to improve the accuracy of retrieved results.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"108 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77056626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Display for 3D Telepresence: A Review 3D远程呈现的3D显示:综述
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-11-16 DOI: 10.11113/ijic.v12n1.318
F. E. Fadzli, M. N. A. Nor’a, A. W. Ismail
Over the years, people have tried to advance 3D display technology and researchers as well as developers have created different innovations in recent decades. there are many other different types of 3D display technology that can be classified into stereoscopic, auto stereoscopic, holographic and volumetric 3D displays. This paper, however, discusses the 3D display technology that have been implemented in the telepresence system, which can be divided into two main devices, projectors and head mounted display (HMD). From these two devices, the 3D display technology using projector devices are on-stage hologram, auto stereoscopic display, and holographic projection; while for HMD can be divided into MR headset and VR HMD. This paper provides a review on these 3D display for telepresence. Finally, we make a comparison based on the features of the 3D display technologies such as life-size capability, viewable from different perspectives, headset-free experience number of viewers per device, level of ease of setup and the nausea of discomfort level. To choose the best 3D display technology for a telepresence system, we must first identify the number of users who will be projected and who will be viewed. The goal and activity of using telepresence technology will also define the appropriate type of 3D display.
多年来,人们一直在努力推进3D显示技术,近几十年来,研究人员和开发人员创造了不同的创新。还有许多其他不同类型的3D显示技术,可分为立体、自动立体、全息和体三维显示。然而,本文讨论了在远程呈现系统中已经实现的3D显示技术,该系统可以分为两个主要设备,投影仪和头戴式显示器(HMD)。从这两种设备来看,使用投影设备的3D显示技术有舞台全息、自动立体显示和全息投影;而对于头戴式显示器可分为MR头戴式显示器和VR头戴式显示器。本文对这些用于远程呈现的三维显示技术进行了综述。最后,我们根据3D显示技术的特点,如真人大小的能力、不同角度的可观看性、每台设备的无头显体验人数、设置的容易程度和恶心程度进行了比较。要为远程呈现系统选择最佳的3D显示技术,我们必须首先确定将被投影和被观看的用户数量。使用远程呈现技术的目标和活动也将定义适当的3D显示类型。
{"title":"3D Display for 3D Telepresence: A Review","authors":"F. E. Fadzli, M. N. A. Nor’a, A. W. Ismail","doi":"10.11113/ijic.v12n1.318","DOIUrl":"https://doi.org/10.11113/ijic.v12n1.318","url":null,"abstract":"Over the years, people have tried to advance 3D display technology and researchers as well as developers have created different innovations in recent decades. there are many other different types of 3D display technology that can be classified into stereoscopic, auto stereoscopic, holographic and volumetric 3D displays. This paper, however, discusses the 3D display technology that have been implemented in the telepresence system, which can be divided into two main devices, projectors and head mounted display (HMD). From these two devices, the 3D display technology using projector devices are on-stage hologram, auto stereoscopic display, and holographic projection; while for HMD can be divided into MR headset and VR HMD. This paper provides a review on these 3D display for telepresence. Finally, we make a comparison based on the features of the 3D display technologies such as life-size capability, viewable from different perspectives, headset-free experience number of viewers per device, level of ease of setup and the nausea of discomfort level. To choose the best 3D display technology for a telepresence system, we must first identify the number of users who will be projected and who will be viewed. The goal and activity of using telepresence technology will also define the appropriate type of 3D display.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"49 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82161109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Real-Time 3D Reconstruction Methods in Dynamic Scene 动态场景实时三维重建方法研究进展
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-11-16 DOI: 10.11113/ijic.v12n1.317
M. N. A. Nor’a, F. E. Fadzli, A. W. Ismail
Advancements made in consumer and readily available RGB-D capturing devices have sparked researcher interest in 3D reconstruction, particularly in dynamic scenes, as well as the quality performance and its speed. The recent advancement in such devices supports the developments of various applications such as teleportation, gaming, volumetric video, and CG films. Real-time 3D reconstruction methods review in a dynamic scene of virtual environment is depicted in this paper. This provides an insight view on how real-time 3D reconstruction beneficial achievement further enables reconstruction systems to be managed in real-time technology such as virtual reality or augmented reality application.
消费者和现成的RGB-D捕获设备的进步引发了研究人员对3D重建的兴趣,特别是在动态场景中,以及质量性能和速度。这些设备的最新进展支持各种应用的发展,如隐形传输、游戏、体积视频和CG电影。本文综述了虚拟环境中动态场景的实时三维重建方法。这提供了一个关于实时3D重建有益成果如何进一步使重建系统能够在虚拟现实或增强现实应用等实时技术中进行管理的见解。
{"title":"A Review on Real-Time 3D Reconstruction Methods in Dynamic Scene","authors":"M. N. A. Nor’a, F. E. Fadzli, A. W. Ismail","doi":"10.11113/ijic.v12n1.317","DOIUrl":"https://doi.org/10.11113/ijic.v12n1.317","url":null,"abstract":"Advancements made in consumer and readily available RGB-D capturing devices have sparked researcher interest in 3D reconstruction, particularly in dynamic scenes, as well as the quality performance and its speed. The recent advancement in such devices supports the developments of various applications such as teleportation, gaming, volumetric video, and CG films. Real-time 3D reconstruction methods review in a dynamic scene of virtual environment is depicted in this paper. This provides an insight view on how real-time 3D reconstruction beneficial achievement further enables reconstruction systems to be managed in real-time technology such as virtual reality or augmented reality application.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"22 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78993872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Enterprise Resource Planning Failure Through an Enhanced Approach to Solve Ineffective Communication 通过改进解决无效沟通的方法防止企业资源规划失败
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.320
Mazen Ahmed Kabbary, Dayang N. A. Jawawi
Enterprise Resource Planning (ERP) is a widely known type of software that eases the managerial aspect in enterprises. It increases their efficiency and productivity which helps them to exponentially grow in a short span of time compared to organizations that are not using it. However, as much as productive it is, implementing it does not often succeed. Majority of ERP implementations ends up failing due to different types of factors. Spotting the light on technical aspects showed that several factors contribute to this failure. Starting from pre-implementation phase with Business Process Reengineering (BPR) execution failure, or during the implementation phase due to miscommunication or incapable project members. The research amount in this field, particularly in critical failure factors is not sufficient to learn from and avoid future implementations, hence this topic provides insights about this specific issue. Quantitative method is used to analyse the data collected from a survey questionnaire for those who got involved in ERP or BPR implementations. The research process goes through objectives from problem identification to an in-detail explanation about its causes and effects, to how it is going to be addressed, how the data is going to be collected and analysed, and finally the proposed approach with a technical evaluation for it. The final objective of the research results in developing an approach that minimises the negative contribution of two failure factors, poor BPR and ineffective communication on the mentioned implementations, or prevent them entirely. The reason these two were chosen were due to their high occurrence frequency and lack of research regarding why they are considered failure factors. Concluding the research, the mentioned enhanced approach is being evaluated showing its potential to solve these factors, as they are relying on each other, with additional suggestions to further improve the approach in future work.
企业资源计划(ERP)是一种广为人知的简化企业管理方面的软件。与不使用它的组织相比,它提高了他们的效率和生产力,帮助他们在短时间内呈指数级增长。然而,尽管它很有成效,但实施它并不经常成功。大多数ERP实施由于不同类型的因素而失败。从技术方面来看,有几个因素导致了这个失败。从实现前阶段开始,业务流程再造(BPR)执行失败,或者在实现阶段,由于错误的沟通或无能的项目成员。该领域的研究数量,特别是在关键失效因素方面的研究数量不足以学习和避免未来的实施,因此本主题提供了关于这一特定问题的见解。采用定量方法对参与ERP或BPR实施的人员进行问卷调查收集的数据进行分析。研究过程的目标是从问题识别到详细解释其原因和影响,再到如何解决问题,如何收集和分析数据,最后提出方法并对其进行技术评估。研究的最终目标是开发一种方法,最大限度地减少两个失败因素的负面贡献,即糟糕的业务流程再造和对上述实施的无效沟通,或者完全防止它们。选择这两个原因是由于它们的高发生频率和缺乏关于为什么它们被认为是失败因素的研究。在研究结束时,正在对上述增强方法进行评估,显示其解决这些因素的潜力,因为它们相互依赖,并提出进一步改进该方法的其他建议。
{"title":"Preventing Enterprise Resource Planning Failure Through an Enhanced Approach to Solve Ineffective Communication","authors":"Mazen Ahmed Kabbary, Dayang N. A. Jawawi","doi":"10.11113/ijic.v11n2.320","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.320","url":null,"abstract":"Enterprise Resource Planning (ERP) is a widely known type of software that eases the managerial aspect in enterprises. It increases their efficiency and productivity which helps them to exponentially grow in a short span of time compared to organizations that are not using it. However, as much as productive it is, implementing it does not often succeed. Majority of ERP implementations ends up failing due to different types of factors. Spotting the light on technical aspects showed that several factors contribute to this failure. Starting from pre-implementation phase with Business Process Reengineering (BPR) execution failure, or during the implementation phase due to miscommunication or incapable project members. The research amount in this field, particularly in critical failure factors is not sufficient to learn from and avoid future implementations, hence this topic provides insights about this specific issue. Quantitative method is used to analyse the data collected from a survey questionnaire for those who got involved in ERP or BPR implementations. The research process goes through objectives from problem identification to an in-detail explanation about its causes and effects, to how it is going to be addressed, how the data is going to be collected and analysed, and finally the proposed approach with a technical evaluation for it. The final objective of the research results in developing an approach that minimises the negative contribution of two failure factors, poor BPR and ineffective communication on the mentioned implementations, or prevent them entirely. The reason these two were chosen were due to their high occurrence frequency and lack of research regarding why they are considered failure factors. Concluding the research, the mentioned enhanced approach is being evaluated showing its potential to solve these factors, as they are relying on each other, with additional suggestions to further improve the approach in future work.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"22 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83902175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Gender Identification Based on Audio Recordings Using Gaussian Mixture Model and Mel Frequency Cepstrum Coefficient Technique 基于高斯混合模型和Mel倒谱系数技术的录音性别识别研究
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.343
Thurgeaswary Rokanatnam, Hazinah Kutty Mammi
Speaker recognition is an ability to identify speaker’s characteristics based from spoken language. The purpose of this study is to identify gender of speakers based on audio recordings. The objective of this study is to evaluate the accuracy rate of this technique to differentiate the gender and also to determine the performance rate to classify even when using self-acquired recordings. Audio forensics uses voice recordings as part of evidence to solve cases. This study is mainly conducted to provide an easier technique to identify the unknown speaker characteristics in forensic field. This experiment is fulfilled by training the pattern classifier using gender dependent data. In order to train the model, a speech database is obtained from an online speech corpus comprising of both male and female speakers. During the testing phase, apart from the data from speech corpus, audio recordings of UTM students will too be used to determine the accuracy rate of this speaker identification experiment. As for the technique to run this experiment, Mel Frequency Cepstrum Coefficient (MFCC) algorithm is used to extract the features from speech data while Gaussian Mixture Model (GMM) is used to model the gender identifier. Noise removal was not used for any speech data in this experiment. Python software is used to extract using MFCC coefficients and model the behavior using GMM technique. Experiment results show that GMM-MFCC technique can identify gender regardless of language but with varying accuracy rate.
说话人识别是一种基于口语识别说话人特征的能力。本研究的目的是根据录音来确定说话人的性别。本研究的目的是评估该技术区分性别的准确率,并确定即使使用自获得录音也能进行分类的表现率。音频取证使用录音作为破案证据的一部分。本研究主要是为了在法医领域提供一种更容易识别未知说话人特征的技术。该实验通过使用性别相关数据训练模式分类器来完成。为了训练模型,从在线语音语料库中获得一个由男性和女性演讲者组成的语音数据库。在测试阶段,除了语音语料库中的数据外,还将使用UTM学生的录音来确定本次说话人识别实验的准确率。在实验技术上,采用Mel Frequency倒频谱系数(MFCC)算法提取语音数据中的特征,采用高斯混合模型(GMM)对性别标识符进行建模。本实验未对任何语音数据进行去噪处理。使用Python软件使用MFCC系数提取,并使用GMM技术对行为进行建模。实验结果表明,GMM-MFCC技术可以在不同语言下识别性别,但准确率存在差异。
{"title":"Study on Gender Identification Based on Audio Recordings Using Gaussian Mixture Model and Mel Frequency Cepstrum Coefficient Technique","authors":"Thurgeaswary Rokanatnam, Hazinah Kutty Mammi","doi":"10.11113/ijic.v11n2.343","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.343","url":null,"abstract":"Speaker recognition is an ability to identify speaker’s characteristics based from spoken language. The purpose of this study is to identify gender of speakers based on audio recordings. The objective of this study is to evaluate the accuracy rate of this technique to differentiate the gender and also to determine the performance rate to classify even when using self-acquired recordings. Audio forensics uses voice recordings as part of evidence to solve cases. This study is mainly conducted to provide an easier technique to identify the unknown speaker characteristics in forensic field. This experiment is fulfilled by training the pattern classifier using gender dependent data. In order to train the model, a speech database is obtained from an online speech corpus comprising of both male and female speakers. During the testing phase, apart from the data from speech corpus, audio recordings of UTM students will too be used to determine the accuracy rate of this speaker identification experiment. As for the technique to run this experiment, Mel Frequency Cepstrum Coefficient (MFCC) algorithm is used to extract the features from speech data while Gaussian Mixture Model (GMM) is used to model the gender identifier. Noise removal was not used for any speech data in this experiment. Python software is used to extract using MFCC coefficients and model the behavior using GMM technique. Experiment results show that GMM-MFCC technique can identify gender regardless of language but with varying accuracy rate.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"43 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84231340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training Evaluation Models for Skill-Based E-learning System: A Systematic Literature Review 基于技能的电子学习系统培训评估模型:系统文献综述
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-10-31 DOI: 10.11113/ijic.v11n2.323
Muneswary a/p Saminathan, Norhaida Mohd Suaib
Training evaluation can be defined as a way of measuring how well users learn and adapt to a system or software. Various methods have been developed to carry out training evaluations of systems or software over the past few decades. A systematic literature review report on the assessment training model was conducted to give different views on the usability aspects of the proposed approach. This study provides a current systematic review of training evaluation on skill-based system or software. The particular purpose of the review is to explore the research as preliminary step that helps in choosing the right type of training evaluation model for skill-based E-learning system or software. There is a lack of appropriate models available through the specific gaps in literature and finding especially for skill-based E-learning system evaluation.
培训评估可以定义为一种衡量用户学习和适应系统或软件的程度的方法。在过去的几十年里,已经开发了各种方法来对系统或软件进行培训评估。对评估培训模型进行了系统的文献回顾报告,对所提出的方法的可用性方面给出了不同的观点。本研究提供了当前基于技能的系统或软件培训评估的系统回顾。本文的主要目的是将该研究作为初步的探索,为基于技能的电子学习系统或软件选择合适类型的培训评估模型提供帮助。由于文献和发现的具体差距,缺乏适当的模型,特别是用于基于技能的电子学习系统评估。
{"title":"Training Evaluation Models for Skill-Based E-learning System: A Systematic Literature Review","authors":"Muneswary a/p Saminathan, Norhaida Mohd Suaib","doi":"10.11113/ijic.v11n2.323","DOIUrl":"https://doi.org/10.11113/ijic.v11n2.323","url":null,"abstract":"Training evaluation can be defined as a way of measuring how well users learn and adapt to a system or software. Various methods have been developed to carry out training evaluations of systems or software over the past few decades. A systematic literature review report on the assessment training model was conducted to give different views on the usability aspects of the proposed approach. This study provides a current systematic review of training evaluation on skill-based system or software. The particular purpose of the review is to explore the research as preliminary step that helps in choosing the right type of training evaluation model for skill-based E-learning system or software. There is a lack of appropriate models available through the specific gaps in literature and finding especially for skill-based E-learning system evaluation.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"17 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87506605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Innovative Computing Information and Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1