首页 > 最新文献

International Journal of Innovative Computing Information and Control最新文献

英文 中文
Recurrent neural network based stock price prediction using multiple stock brands 基于递归神经网络的多品牌股票价格预测
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-01-01 DOI: 10.24507/IJICIC.16.03.1093
Shota Rikukawa, H. Mori, Taku Harada
{"title":"Recurrent neural network based stock price prediction using multiple stock brands","authors":"Shota Rikukawa, H. Mori, Taku Harada","doi":"10.24507/IJICIC.16.03.1093","DOIUrl":"https://doi.org/10.24507/IJICIC.16.03.1093","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"15 1","pages":"1093-1099"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74172212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Integrating Virtual Reality and Augmented Reality in a Collaborative User Interface 在协作用户界面中集成虚拟现实和增强现实
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-11-28 DOI: 10.11113/ijic.v9n2.242
M. N. A. Nor’a, A. W. Ismail
Application that adopts collaborative system allows multiple users to interact with other users in the same virtual space either in Virtual Reality (VR) or Augmented Reality (AR). This paper aims to integrate the VR and AR space in a Collaborative User Interface that enables the user to cooperate with other users in a different type of interfaces in a single shared space manner. The gesture interaction technique is proposed as the interaction tool in both of the virtual spaces as it can provide a more natural gesture interaction when interacting with the virtual object. The integration of VR and AR space provide a cross-discipline shared data interchange through the network protocol of client-server architecture.
采用协同系统的应用程序允许多个用户在同一虚拟空间中以虚拟现实(VR)或增强现实(AR)的方式与其他用户进行交互。本文旨在将VR和AR空间整合到一个协作用户界面中,使用户能够以单一共享空间的方式在不同类型的界面中与其他用户进行合作。由于手势交互技术可以在与虚拟对象交互时提供更自然的手势交互,因此提出了手势交互技术作为两个虚拟空间中的交互工具。VR和AR空间的融合通过客户端-服务器架构的网络协议提供了跨学科的共享数据交换。
{"title":"Integrating Virtual Reality and Augmented Reality in a Collaborative User Interface","authors":"M. N. A. Nor’a, A. W. Ismail","doi":"10.11113/ijic.v9n2.242","DOIUrl":"https://doi.org/10.11113/ijic.v9n2.242","url":null,"abstract":"Application that adopts collaborative system allows multiple users to interact with other users in the same virtual space either in Virtual Reality (VR) or Augmented Reality (AR). This paper aims to integrate the VR and AR space in a Collaborative User Interface that enables the user to cooperate with other users in a different type of interfaces in a single shared space manner. The gesture interaction technique is proposed as the interaction tool in both of the virtual spaces as it can provide a more natural gesture interaction when interacting with the virtual object. The integration of VR and AR space provide a cross-discipline shared data interchange through the network protocol of client-server architecture.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86455871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The effect of stimulus pattern, color combination and flicker frequency on steady-state visual evoked potentials topography 刺激方式、颜色组合和闪烁频率对稳态视觉诱发电位形貌的影响
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-08-01 DOI: 10.24507/IJICIC.15.04.1521
K. Goto, T. Sugi, H. Fukuda, T. Yamasaki, S. Tobimatsu, Y. Goto
{"title":"The effect of stimulus pattern, color combination and flicker frequency on steady-state visual evoked potentials topography","authors":"K. Goto, T. Sugi, H. Fukuda, T. Yamasaki, S. Tobimatsu, Y. Goto","doi":"10.24507/IJICIC.15.04.1521","DOIUrl":"https://doi.org/10.24507/IJICIC.15.04.1521","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"92 1","pages":"1521-1530"},"PeriodicalIF":1.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75923456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient matrix embedding technique by using submatrix transform for grayscale images 基于子矩阵变换的灰度图像矩阵嵌入技术
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-08-01 DOI: 10.24507/IJICIC.15.04.1565
Hsi-Yuan Chang, Jyun-Jie Wang, Chi-Yuan Lin, Chin-hsing Chen
{"title":"An efficient matrix embedding technique by using submatrix transform for grayscale images","authors":"Hsi-Yuan Chang, Jyun-Jie Wang, Chi-Yuan Lin, Chin-hsing Chen","doi":"10.24507/IJICIC.15.04.1565","DOIUrl":"https://doi.org/10.24507/IJICIC.15.04.1565","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"48 1","pages":"1565-1580"},"PeriodicalIF":1.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87935952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study for the Development of Automated Essay Scoring (AES) in Malaysian English Test Environment 马来西亚英语考试环境中自动作文评分系统的开发研究
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.220
Wee Sian Wong, Chih How Bong
Automated Essay Scoring (AES) is the use of specialized computer programs to assign grades to essays written in an educational assessment context. It is developed to overcome time, cost, and reliability issues in writing assessment. Most of the contemporary AES are “western” proprietary product, designed for native English speakers, where the source code is not made available to public and the assessment criteria may tend to be associated with the scoring rubrics of a particular English test context. Therefore, such AES may not be appropriate to be directly adopted in Malaysia context. There is no actual software development work found in building an AES for Malaysian English test environment. As such, this work is carried out as the study for formulating the requirement of a local AES, targeted for Malaysia's essay assessment environment. In our work, we assessed a well-known AES called LightSide for determining its suitability in our local context. We use various Machine Learning technique provided by LightSide to predict the score of Malaysian University English Test (MUET) essays; and compare its performance, i.e. the percentage of exact agreement of LightSide with the human score of the essays. Besides, we review and discuss the theoretical aspect of the AES, i.e. its state-of-the-art, reliability and validity requirement. The finding in this paper will be used as the basis of our future work in developing a local AES, namely Intelligent Essay Grader (IEG), for Malaysian English test environment.
自动论文评分(AES)是使用专门的计算机程序来分配分数的文章写在教育评估的背景下。它的开发是为了克服写作评估的时间、成本和可靠性问题。大多数当代AES是“西方”专有产品,为母语为英语的人设计,源代码不向公众提供,评估标准可能倾向于与特定英语测试上下文的评分标准相关联。因此,这种AES可能不适合在马来西亚的情况下直接采用。在为马来西亚英语测试环境构建AES时,没有发现实际的软件开发工作。因此,这项工作是作为制定当地AES要求的研究进行的,针对马来西亚的论文评估环境。在我们的工作中,我们评估了一个著名的AES,称为LightSide,以确定其在我们当地环境中的适用性。我们使用LightSide提供的各种机器学习技术来预测马来西亚大学英语考试(MUET)论文的分数;并比较它的性能,即LightSide与人类评分的精确一致性百分比。此外,我们还对AES的理论方面进行了回顾和讨论,即AES的技术水平、信度和效度要求。本文的发现将作为我们未来开发马来西亚英语测试环境的本地AES,即智能作文评分器(IEG)的基础。
{"title":"A Study for the Development of Automated Essay Scoring (AES) in Malaysian English Test Environment","authors":"Wee Sian Wong, Chih How Bong","doi":"10.11113/IJIC.V9N1.220","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.220","url":null,"abstract":"Automated Essay Scoring (AES) is the use of specialized computer programs to assign grades to essays written in an educational assessment context. It is developed to overcome time, cost, and reliability issues in writing assessment. Most of the contemporary AES are “western” proprietary product, designed for native English speakers, where the source code is not made available to public and the assessment criteria may tend to be associated with the scoring rubrics of a particular English test context. Therefore, such AES may not be appropriate to be directly adopted in Malaysia context. There is no actual software development work found in building an AES for Malaysian English test environment. As such, this work is carried out as the study for formulating the requirement of a local AES, targeted for Malaysia's essay assessment environment. In our work, we assessed a well-known AES called LightSide for determining its suitability in our local context. We use various Machine Learning technique provided by LightSide to predict the score of Malaysian University English Test (MUET) essays; and compare its performance, i.e. the percentage of exact agreement of LightSide with the human score of the essays. Besides, we review and discuss the theoretical aspect of the AES, i.e. its state-of-the-art, reliability and validity requirement. The finding in this paper will be used as the basis of our future work in developing a local AES, namely Intelligent Essay Grader (IEG), for Malaysian English test environment.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"96 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86988761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Bioinformatics Model and Computational Software of Next Generation Sequencing 下一代测序的生物信息学模型及计算软件研究进展
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.217
Jalilah Arijah Mohd Kamarudin, A. Abdullah, R. Sallehuddin
In the past decade it has become increasingly the effort for researcher to surpass the bioinformatics challenges foremost in next generation sequencing (NGS). This review paper gives an overview of the computational software and bioinformatics model that has been used for next generation sequencing. In this paper, the description on functionalities, source type and website of the program or software are provided. These computational software and bioinformatics model are differentiating into three types of bioinformatics analysis stages including alignment, variant calling and filtering and annotation. Besides, we discuss the future work and the development for new bioinformatics tool to be advanced.
在过去的十年中,研究人员越来越多地努力克服下一代测序(NGS)中最重要的生物信息学挑战。这篇综述文章给出了计算软件和生物信息学模型的概述,已用于下一代测序。本文对该程序或软件的功能、源代码类型和网站进行了描述。这些计算软件和生物信息学模型正在分化为三种类型的生物信息学分析阶段:比对、变体调用和过滤和注释。此外,我们还讨论了未来的工作和新的生物信息学工具的发展。
{"title":"A Review of Bioinformatics Model and Computational Software of Next Generation Sequencing","authors":"Jalilah Arijah Mohd Kamarudin, A. Abdullah, R. Sallehuddin","doi":"10.11113/IJIC.V9N1.217","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.217","url":null,"abstract":"In the past decade it has become increasingly the effort for researcher to surpass the bioinformatics challenges foremost in next generation sequencing (NGS). This review paper gives an overview of the computational software and bioinformatics model that has been used for next generation sequencing. In this paper, the description on functionalities, source type and website of the program or software are provided. These computational software and bioinformatics model are differentiating into three types of bioinformatics analysis stages including alignment, variant calling and filtering and annotation. Besides, we discuss the future work and the development for new bioinformatics tool to be advanced.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"11 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75211376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhancement of TOE Model by Investigating the Influential Factors of Cloud Adoption Security Objectives 研究云采用安全目标影响因素对TOE模型的改进
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.192
Md Yeahia Bhuiyan, S. H. Othman, Raja Zahilah Raja Md Radzi
Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but due to lack of resources, experience, expertise and low financial structure scenario CC can be most helpful. CC faces a major issue in term of cloud security, an organization doesn’t understand the cloud security factors in the organization and data owner doubts about their data. In the research paper, an investigation on the cloud security objectives to find out the influential factors for cloud adoption in SMEs by proposing an enhancement of Technology-Organization-Environment (TOE) model with some positive influential factor like cloud security, relative advantages, cost saving, availability, SLA, capability, top management, organizational readiness, IS knowledge, malicious insiders, government regulatory support, competitive pressure, size and type. Some negative influencing factors like technological readiness, cloud trust and lack of standards in cloud security. Data were collected by questionnaires from a selected IT company based on SaaS and public cloud. Case study method has been used for validating the enhance TOE model. The IBM Statistics SPSS v22 tool was used for data analysis. The results of data analysis support the enhancement as well as all the proposed hypotheses. In summary, the results of the analysis show that all the enhancement factors were found to have a significant cloud security influence on adoption of cloud computing for SMEs.
云计算(CC)是技术基础设施发展的未来技术趋势。作为未来工业技术基础设施的支柱,它正在强劲增长。由于CC服务提供了很多,它也有一些客户不能忽视的主要缺点。对于CC服务的采用,潜在的候选者是中小企业,但由于缺乏资源、经验、专业知识和低财务结构情景,CC可能是最有帮助的。CC在云安全方面面临一个主要问题,一个组织不了解组织中的云安全因素,数据所有者对他们的数据持怀疑态度。本文通过对中小企业云安全目标的调查,提出了一种增强的技术-组织-环境(TOE)模型,通过云安全、相对优势、成本节约、可用性、SLA、能力、高层管理、组织准备、IS知识、恶意内部人员、政府监管支持、竞争压力、规模和类型等正向影响因素,找出中小企业采用云的影响因素。一些负面的影响因素,如技术准备、云信任和云安全缺乏标准。数据通过问卷调查的方式从一家基于SaaS和公有云的IT公司收集。采用实例研究的方法对改进的TOE模型进行了验证。使用IBM Statistics SPSS v22工具进行数据分析。数据分析的结果支持该增强以及所有提出的假设。综上所述,分析结果表明,所有增强因素都对中小企业采用云计算具有显著的云安全影响。
{"title":"An Enhancement of TOE Model by Investigating the Influential Factors of Cloud Adoption Security Objectives","authors":"Md Yeahia Bhuiyan, S. H. Othman, Raja Zahilah Raja Md Radzi","doi":"10.11113/IJIC.V9N1.192","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.192","url":null,"abstract":"Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but due to lack of resources, experience, expertise and low financial structure scenario CC can be most helpful. CC faces a major issue in term of cloud security, an organization doesn’t understand the cloud security factors in the organization and data owner doubts about their data. In the research paper, an investigation on the cloud security objectives to find out the influential factors for cloud adoption in SMEs by proposing an enhancement of Technology-Organization-Environment (TOE) model with some positive influential factor like cloud security, relative advantages, cost saving, availability, SLA, capability, top management, organizational readiness, IS knowledge, malicious insiders, government regulatory support, competitive pressure, size and type. Some negative influencing factors like technological readiness, cloud trust and lack of standards in cloud security. Data were collected by questionnaires from a selected IT company based on SaaS and public cloud. Case study method has been used for validating the enhance TOE model. The IBM Statistics SPSS v22 tool was used for data analysis. The results of data analysis support the enhancement as well as all the proposed hypotheses. In summary, the results of the analysis show that all the enhancement factors were found to have a significant cloud security influence on adoption of cloud computing for SMEs.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"149 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91142121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Conceptual Framework of Information Security Database Audit and Assessment 信息安全数据库审计与评估的概念框架
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.206
Muneeb ul-Hasan, S. H. Othman, Marina Md Arshad
Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion.
今天,数据库是IT世界中最重要的东西之一,它也变得越来越流行,全球的组织正在逐渐将其传统的IT设置转移到数据库模型,以获得保护数据的好处,并提供易于访问的IT服务和弹性。有了数据库安全性,组织中的IT服务角色就可以集成起来,从而为整个IT操作模型提供更加结构化的布局。然而,这种客观性只有在适当的规划和执行到位的情况下才能实现。因此,数据库系统的正确执行和实现将包括一套严格的检查和审计过程。数据库审计的核心目标是确定所涉及的服务及其维护者在保护客户数据和组织标准方面是否满足某些法律要求,从而成功实现安全的数据资产,抵御各种安全威胁。因此,本项目通过结构化小组讨论收集数据,探讨影响安全审计质量的因素。
{"title":"A Conceptual Framework of Information Security Database Audit and Assessment","authors":"Muneeb ul-Hasan, S. H. Othman, Marina Md Arshad","doi":"10.11113/IJIC.V9N1.206","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.206","url":null,"abstract":"Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"25 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87935315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed CESVM-DR Anomaly Detection for Wireless Sensor Network 无线传感器网络分布式CESVM-DR异常检测
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.218
Nurfazrina Mohd Zamry, A. Zainal, M. Rassam
Nowadays, the advancement of the sensor technology, has introduced the smart living community where the sensor is communicating with each other or to other entities. This has introduced the new term called internet-of-things (IoT). The data collected from sensor nodes will be analyzed at the endpoint called based station or sink for decision making. Unfortunately, accurate data is not usually accurate and reliable which will affect the decision making at the base station. There are many reasons constituted to the inaccurate and unreliable data like the malicious attack, harsh environment as well as the sensor node failure itself. In a worse case scenario, the node failure will also lead to the dysfunctional of the entire network. Therefore, in this paper, an unsupervised one-class SVM (OCSVM) is used to build the anomaly detection schemes in recourse constraint Wireless Sensor Networks (WSNs). Distributed network topology will be used to minimize the data communication in the network which can prolong the network lifetime. Meanwhile, the dimension reduction has been providing the lightweight of the anomaly detection schemes. In this paper Distributed Centered Hyperellipsoidal Support Vector Machine (DCESVM-DR) anomaly detection schemes is proposed to provide the efficiency and effectiveness of the anomaly detection schemes.
如今,传感器技术的进步,引入了智能生活社区,传感器之间或与其他实体进行通信。这就引入了一个新术语——物联网(IoT)。从传感器节点收集的数据将在称为基站或接收器的端点进行分析,以进行决策。不幸的是,准确的数据通常并不准确和可靠,这将影响基站的决策。造成数据不准确、不可靠的原因有很多,如恶意攻击、恶劣环境、传感器节点本身故障等。更严重的情况下,节点故障还会导致整个网络的故障。因此,本文采用无监督单类支持向量机(OCSVM)来构建资源约束无线传感器网络(WSNs)中的异常检测方案。采用分布式网络拓扑结构,最大限度地减少网络中的数据通信,延长网络寿命。同时,降维为异常检测方案提供了轻量级。为了提高异常检测方案的高效性和有效性,本文提出了分布式中心超椭球支持向量机异常检测方案。
{"title":"Distributed CESVM-DR Anomaly Detection for Wireless Sensor Network","authors":"Nurfazrina Mohd Zamry, A. Zainal, M. Rassam","doi":"10.11113/IJIC.V9N1.218","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.218","url":null,"abstract":"Nowadays, the advancement of the sensor technology, has introduced the smart living community where the sensor is communicating with each other or to other entities. This has introduced the new term called internet-of-things (IoT). The data collected from sensor nodes will be analyzed at the endpoint called based station or sink for decision making. Unfortunately, accurate data is not usually accurate and reliable which will affect the decision making at the base station. There are many reasons constituted to the inaccurate and unreliable data like the malicious attack, harsh environment as well as the sensor node failure itself. In a worse case scenario, the node failure will also lead to the dysfunctional of the entire network. Therefore, in this paper, an unsupervised one-class SVM (OCSVM) is used to build the anomaly detection schemes in recourse constraint Wireless Sensor Networks (WSNs). Distributed network topology will be used to minimize the data communication in the network which can prolong the network lifetime. Meanwhile, the dimension reduction has been providing the lightweight of the anomaly detection schemes. In this paper Distributed Centered Hyperellipsoidal Support Vector Machine (DCESVM-DR) anomaly detection schemes is proposed to provide the efficiency and effectiveness of the anomaly detection schemes.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"23 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80813322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PSO-FuzzyNN Techniques in Gender Classification Based on Bovine Bone Morphology Properties 基于牛骨形态特征的PSO-FuzzyNN性别分类技术
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.215
Nur A. Sahadun, N. A. Ali, H. Haron
This simulation project aims to solve forensic anthropology issues by using the computational method. The positive identification on gender is such a potential field to be explored. Basically, gender identification in forensic anthropology by comparative skeletal anatomy by atlas and crucially affect the identification accuracy. The simulation identification method was studied in order to determine the best model, which reduce the total costs of the post-mortem as an objective. The computational method on simulation run improves the identification accuracy as proven by many studies. Fuzzy K-nearest neighbours classifier (FuzzyNN) is such a computational intelligence method and always shows the best performance in many fields including forensic anthropology. Thus, this intelligent identification method was implemented within the determining for best accuracy. The result of this proposed model was compared with raw data collection and standard collections datasets; Goldman Osteometric dataset and Ryan and Shaw Dataset (RSD) as a benchmark for the identification policy. To improve the accuracy of FuzzyNN classifier, Particle Swarm Optimization (PSO) feature selection was used as the basis for choosing the best features to be used by the selected FuzzyNN classification model. The model is called PSO-FuzzyNN and has been developed by MATLAB and WEKA tools platform. Comparisons of the performance measurement namely the percentage of the classification accuracy of the model were performed. The result show potential the proposed PSO-FuzzyNN method demonstrates the capability to the obtained highest accuracy of identification.
本模拟项目旨在利用计算方法解决法医人类学问题。对性别的积极认同就是这样一个有待探索的潜在领域。法医人类学的性别鉴定主要是通过比较骨骼解剖图谱进行的,对鉴定的准确性有重要影响。为了确定以降低尸体总成本为目标的最佳模型,研究了仿真识别方法。仿真运行的计算方法提高了识别精度,已被许多研究证明。模糊k近邻分类器(FuzzyNN)就是这样一种计算智能方法,在包括法医人类学在内的许多领域都表现出最好的性能。因此,这种智能识别方法在确定范围内实现了最佳的准确性。将该模型与原始采集数据集和标准采集数据集进行了比较;以Goldman骨测量数据集和Ryan and Shaw数据集(RSD)作为识别策略的基准。为了提高FuzzyNN分类器的准确率,将粒子群优化(Particle Swarm Optimization, PSO)特征选择作为选择最佳特征的基础,供所选的FuzzyNN分类模型使用。该模型被称为PSO-FuzzyNN,并通过MATLAB和WEKA工具平台开发。进行了性能度量的比较,即模型的分类准确率的百分比。结果表明,所提出的PSO-FuzzyNN方法具有较高的识别精度。
{"title":"PSO-FuzzyNN Techniques in Gender Classification Based on Bovine Bone Morphology Properties","authors":"Nur A. Sahadun, N. A. Ali, H. Haron","doi":"10.11113/IJIC.V9N1.215","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.215","url":null,"abstract":"This simulation project aims to solve forensic anthropology issues by using the computational method. The positive identification on gender is such a potential field to be explored. Basically, gender identification in forensic anthropology by comparative skeletal anatomy by atlas and crucially affect the identification accuracy. The simulation identification method was studied in order to determine the best model, which reduce the total costs of the post-mortem as an objective. The computational method on simulation run improves the identification accuracy as proven by many studies. Fuzzy K-nearest neighbours classifier (FuzzyNN) is such a computational intelligence method and always shows the best performance in many fields including forensic anthropology. Thus, this intelligent identification method was implemented within the determining for best accuracy. The result of this proposed model was compared with raw data collection and standard collections datasets; Goldman Osteometric dataset and Ryan and Shaw Dataset (RSD) as a benchmark for the identification policy. To improve the accuracy of FuzzyNN classifier, Particle Swarm Optimization (PSO) feature selection was used as the basis for choosing the best features to be used by the selected FuzzyNN classification model. The model is called PSO-FuzzyNN and has been developed by MATLAB and WEKA tools platform. Comparisons of the performance measurement namely the percentage of the classification accuracy of the model were performed. The result show potential the proposed PSO-FuzzyNN method demonstrates the capability to the obtained highest accuracy of identification.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"88 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72553853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Innovative Computing Information and Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1