首页 > 最新文献

Romanian Journal of Information Science and Technology最新文献

英文 中文
AHB Interconnect - Functional Verification AHB互连-功能验证
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.04
Andrei COZMA, Nicolae ȚĂPUȘ
This paper offers an in-depth exploration of the verification procedure pertaining to the integration of an Advanced High-performance Bus (AHB) Interconnect module. The verification process holds pivotal significance within chip development, entailing thorough validation and examination of the hardware design before entering the mass production phase. The principal objective of this verification process is to meticulously unearth potential bugs or imperfections embedded in the design, which could potentially trigger undesirable outcomes, compromised performance, or even critical malfunctions in the final product. At the heart of this verification approach lies the functional verification paradigm, centered around simulation-based testing. Within this framework, the AHB Interconnect module is instantiated in a controlled verification environment designed to emulate real-world scenarios. This environment orchestrates input stimuli to the module and captures ensuing outputs generated by it. The environment is meticulously programmed to anticipate specific behavioral patterns from the module. Deviations from these anticipated behaviors are promptly flagged as errors. This meticulous methodology serves to guarantee that the module aligns with its intended operations and strictly adheres to predefined functional benchmarks. The paper is dedicated to Acad. Florin Gheorghe Filip, at his 15th anniversary as the Chairman of the Information Science and Technology Section of the Romanian Academy, and at his 75th anniversary.
本文对高级高性能总线(AHB)互连模块集成的验证程序进行了深入的探讨。验证过程在芯片开发中具有关键意义,需要在进入批量生产阶段之前对硬件设计进行彻底的验证和检查。此验证过程的主要目标是一丝不苟地挖掘设计中嵌入的潜在错误或缺陷,这些错误或缺陷可能潜在地触发不期望的结果,降低性能,甚至是最终产品中的严重故障。这种验证方法的核心是功能验证范例,以基于模拟的测试为中心。在这个框架中,AHB Interconnect模块在一个受控的验证环境中被实例化,该环境被设计用来模拟真实世界的场景。该环境将输入刺激编排到模块,并捕获由模块生成的后续输出。环境经过精心编程,可以预测模块的特定行为模式。与这些预期行为的偏差被迅速标记为错误。这种细致的方法可以保证模块与其预期的操作保持一致,并严格遵守预定义的功能基准。这篇论文是献给Florin georghe Filip院士,在他担任罗马尼亚科学院信息科学与技术部主席15周年,以及他的75周年纪念日。
{"title":"AHB Interconnect - Functional Verification","authors":"Andrei COZMA, Nicolae ȚĂPUȘ","doi":"10.59277/romjist.2023.3-4.04","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.04","url":null,"abstract":"This paper offers an in-depth exploration of the verification procedure pertaining to the integration of an Advanced High-performance Bus (AHB) Interconnect module. The verification process holds pivotal significance within chip development, entailing thorough validation and examination of the hardware design before entering the mass production phase. The principal objective of this verification process is to meticulously unearth potential bugs or imperfections embedded in the design, which could potentially trigger undesirable outcomes, compromised performance, or even critical malfunctions in the final product. At the heart of this verification approach lies the functional verification paradigm, centered around simulation-based testing. Within this framework, the AHB Interconnect module is instantiated in a controlled verification environment designed to emulate real-world scenarios. This environment orchestrates input stimuli to the module and captures ensuing outputs generated by it. The environment is meticulously programmed to anticipate specific behavioral patterns from the module. Deviations from these anticipated behaviors are promptly flagged as errors. This meticulous methodology serves to guarantee that the module aligns with its intended operations and strictly adheres to predefined functional benchmarks. The paper is dedicated to Acad. Florin Gheorghe Filip, at his 15th anniversary as the Chairman of the Information Science and Technology Section of the Romanian Academy, and at his 75th anniversary.","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XOR-Based Detector of Different Decisions on Anomalies in the Computer Network Traffic 基于xor的计算机网络流量异常不同决策检测器
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.06
Danijela PROTIC, Miomir STANKOVIC
Anomaly-based intrusion detection systems are designed to scan computer network traffic for abnormal behavior. Binary classifiers based on supervised machine learning have proven to be highly accurate tools for classifying instances as normal or abnormal. Main disadvantages of supervised machine learning are the long processing time and large amount of training data required to ensure accurate results. Two preprocessing steps to reduce data sets are feature selection and feature scaling. In this article, we present a new hyperbolic tangent feature scaling approach based on the linearization of the tangent hyperbolic function and the damping strategy of the Levenberg-Marquardt algorithm. Experiments performed on the Kyoto 2006+ dataset used four high-precision binary classifiers: weighted k-nearest neighbors, decision tree, feedforward neural networks, and support vector machine. It is shown that hyperbolic tangent scaling reduces processing time by more than twofold. An XOR-based detector is proposed to determine conflicting decisions about anomalies. The decisions of the FNN and wk-NN models are compared. It is shown that decisions sometimes turn out differently. The percentage of the opposite decisions has been shown to vary and is not affected by dataset size.
基于异常的入侵检测系统旨在扫描计算机网络流量以发现异常行为。基于监督机器学习的二元分类器已被证明是将实例分类为正常或异常的高度准确的工具。监督式机器学习的主要缺点是处理时间长,需要大量的训练数据来确保准确的结果。约简数据集的两个预处理步骤是特征选择和特征缩放。在本文中,我们提出了一种新的基于正切双曲函数线性化和Levenberg-Marquardt算法的阻尼策略的双曲正切特征缩放方法。在京都2006+数据集上进行的实验使用了四种高精度二元分类器:加权k近邻、决策树、前馈神经网络和支持向量机。结果表明,双曲正切缩放可使处理时间缩短两倍以上。提出了一种基于xor的检测器来确定异常的冲突决策。比较了FNN和wk-NN模型的决策结果。研究表明,决策有时会产生不同的结果。相反决策的百分比已被证明是变化的,并且不受数据集大小的影响。
{"title":"XOR-Based Detector of Different Decisions on Anomalies in the Computer Network Traffic","authors":"Danijela PROTIC, Miomir STANKOVIC","doi":"10.59277/romjist.2023.3-4.06","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.06","url":null,"abstract":"Anomaly-based intrusion detection systems are designed to scan computer network traffic for abnormal behavior. Binary classifiers based on supervised machine learning have proven to be highly accurate tools for classifying instances as normal or abnormal. Main disadvantages of supervised machine learning are the long processing time and large amount of training data required to ensure accurate results. Two preprocessing steps to reduce data sets are feature selection and feature scaling. In this article, we present a new hyperbolic tangent feature scaling approach based on the linearization of the tangent hyperbolic function and the damping strategy of the Levenberg-Marquardt algorithm. Experiments performed on the Kyoto 2006+ dataset used four high-precision binary classifiers: weighted k-nearest neighbors, decision tree, feedforward neural networks, and support vector machine. It is shown that hyperbolic tangent scaling reduces processing time by more than twofold. An XOR-based detector is proposed to determine conflicting decisions about anomalies. The decisions of the FNN and wk-NN models are compared. It is shown that decisions sometimes turn out differently. The percentage of the opposite decisions has been shown to vary and is not affected by dataset size.","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approach to Evaluate the Data of Moss Biomonitoring Studies: Preprocessing and Preliminary Ranking 苔藓生物监测数据评价方法:预处理与初步排序
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.02
Gheorghe DUCA, Sergey TRAVIN, Inga ZINICOVSCAIA
This paper, dedicated to Acad. Florin Gheorghe Filip, at his 15th anniversary as the Chairman of the Information Science and Technology Section of the Romanian Academy, suggests an approach to describe the data obtained in biomonitoring studies using mosses, on the example of the Republic of Moldova. In total, 33 moss samples were collected on the territory of Moldova, the elemental composition of which was determined by neutron activation analysis and atomic absorption spectrometry. At the first stage of the work, a correlation analysis was carried out with the ranking of data in the order of decreasing total correlation, which made it possible to preliminarily reduce the number of elements to two factors. At the stage of data sorting, iron, the content of which in the environment can be associated with anthropogenic activity, was chosen as the element determining the rank. The next stage of work was data smoothing using a discrete cosine transform, for which the codes were rewritten and the algorithm was ported to the Excel-VBA environment, which is most suitable for preprocessing and graphical display of experimental data. Also, an algorithm was developed for determining the number of linearly independent (basis) vectors in which the matrix itself can be decomposed. Two principal roots were identified, of which the larger one is several thousand units, and three lower roots, which are less than unit were excluded, since their absolute values differ by two to three or more orders of magnitude downward from the eigenvalues of the influencing components. The paper is dedicated to Acad. Florin Gheorghe Filip, at his 15th anniversary as the Chairman of the Information Science and Technology Section of the Romanian Academy, and at his 75th anniversary.
本文以摩尔多瓦共和国为例,为纪念Florin georghe Filip院士担任罗马尼亚科学院信息科学与技术部主席15周年,提出了一种描述利用苔藓进行生物监测研究获得的数据的方法。在摩尔多瓦境内共采集了33份苔藓样品,采用中子活化分析和原子吸收光谱法测定了苔藓的元素组成。在工作的第一阶段,对数据进行相关性分析,按照总相关性递减的顺序对数据进行排序,初步可以将元素的数量减少到两个因子。在数据排序阶段,选择铁作为决定等级的元素,铁在环境中的含量可以与人为活动相关联。下一阶段的工作是利用离散余弦变换对数据进行平滑处理,为此重写了代码,并将算法移植到最适合实验数据预处理和图形显示的Excel-VBA环境中。此外,还开发了一种算法,用于确定矩阵本身可以分解的线性无关(基)向量的数量。确定了两个主根,其中较大的一个是几千个单位,三个小于单位的低根被排除在外,因为它们的绝对值比影响成分的特征值向下相差两到三个数量级或更多。这篇论文是献给Florin georghe Filip院士,在他担任罗马尼亚科学院信息科学与技术部主席15周年,以及他的75周年纪念日。
{"title":"Approach to Evaluate the Data of Moss Biomonitoring Studies: Preprocessing and Preliminary Ranking","authors":"Gheorghe DUCA, Sergey TRAVIN, Inga ZINICOVSCAIA","doi":"10.59277/romjist.2023.3-4.02","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.02","url":null,"abstract":"This paper, dedicated to Acad. Florin Gheorghe Filip, at his 15th anniversary as the Chairman of the Information Science and Technology Section of the Romanian Academy, suggests an approach to describe the data obtained in biomonitoring studies using mosses, on the example of the Republic of Moldova. In total, 33 moss samples were collected on the territory of Moldova, the elemental composition of which was determined by neutron activation analysis and atomic absorption spectrometry. At the first stage of the work, a correlation analysis was carried out with the ranking of data in the order of decreasing total correlation, which made it possible to preliminarily reduce the number of elements to two factors. At the stage of data sorting, iron, the content of which in the environment can be associated with anthropogenic activity, was chosen as the element determining the rank. The next stage of work was data smoothing using a discrete cosine transform, for which the codes were rewritten and the algorithm was ported to the Excel-VBA environment, which is most suitable for preprocessing and graphical display of experimental data. Also, an algorithm was developed for determining the number of linearly independent (basis) vectors in which the matrix itself can be decomposed. Two principal roots were identified, of which the larger one is several thousand units, and three lower roots, which are less than unit were excluded, since their absolute values differ by two to three or more orders of magnitude downward from the eigenvalues of the influencing components. The paper is dedicated to Acad. Florin Gheorghe Filip, at his 15th anniversary as the Chairman of the Information Science and Technology Section of the Romanian Academy, and at his 75th anniversary.","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Data Hiding Approach for Secured Data Communication 一种安全数据通信的数据隐藏方法
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.07
T. T. MIRNALINEE, J. BHUVANA, SB. VINODHINISRI
"In the digital era preserving the privacy of confidential information is the crucial issue in authentication and secret communication. Cryptography, steganography, data anonymization are few techniques used to preserve the information. Steganography is the process of hiding information into other non-secret sources of information like text, image or audio, so that secret information is not visible to the naked eye. This paper proposes a novel Prime Number Based Embedding (PNBE) approach for efficient data hiding to encode the data in images without any visual distortion. This approach proposes a novel scheme for identifying the embedding location of the data in the image and PNBE algorithm for the encoding and decoding of messages. The proposed approach is demonstrated with benchmark images. The data encoding capacity and quality are tested on different sized images. Experimental results show better hiding capacity in terms of bytes ranging from 6,327 to 12,448 based on the size of the image. The quality of the image is described as Peak to Signal Noise Ratio (PSNR), which computes the quality difference between original and compressed images. The efficiency of the proposed approach is demonstrated using PSNR with higher values. It is observed from the results that the proposed approach outperforms the existing ones in terms of embedding capacity and quality of the images. "
“在数字时代,保护机密信息的隐私是身份验证和秘密通信的关键问题。密码术、隐写术、数据匿名化是用来保存信息的几种技术。隐写术是将信息隐藏到其他非秘密信息源(如文本、图像或音频)中,使秘密信息肉眼不可见的过程。本文提出了一种新的基于素数的嵌入(PNBE)方法来实现有效的数据隐藏,从而在不产生视觉失真的情况下对图像中的数据进行编码。该方法提出了一种识别图像中数据嵌入位置的新方案,并提出了一种用于消息编码和解码的PNBE算法。用基准图像对该方法进行了验证。在不同大小的图像上测试了数据的编码容量和质量。实验结果表明,基于图像大小,该算法的隐藏容量在6327 ~ 12448字节之间。图像的质量被描述为峰值信噪比(PSNR),它计算原始图像和压缩图像之间的质量差。用更高的PSNR值验证了该方法的有效性。从结果中可以看出,所提出的方法在嵌入容量和图像质量方面优于现有方法。
{"title":"A Data Hiding Approach for Secured Data Communication","authors":"T. T. MIRNALINEE, J. BHUVANA, SB. VINODHINISRI","doi":"10.59277/romjist.2023.3-4.07","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.07","url":null,"abstract":"\"In the digital era preserving the privacy of confidential information is the crucial issue in authentication and secret communication. Cryptography, steganography, data anonymization are few techniques used to preserve the information. Steganography is the process of hiding information into other non-secret sources of information like text, image or audio, so that secret information is not visible to the naked eye. This paper proposes a novel Prime Number Based Embedding (PNBE) approach for efficient data hiding to encode the data in images without any visual distortion. This approach proposes a novel scheme for identifying the embedding location of the data in the image and PNBE algorithm for the encoding and decoding of messages. The proposed approach is demonstrated with benchmark images. The data encoding capacity and quality are tested on different sized images. Experimental results show better hiding capacity in terms of bytes ranging from 6,327 to 12,448 based on the size of the image. The quality of the image is described as Peak to Signal Noise Ratio (PSNR), which computes the quality difference between original and compressed images. The efficiency of the proposed approach is demonstrated using PSNR with higher values. It is observed from the results that the proposed approach outperforms the existing ones in terms of embedding capacity and quality of the images. \"","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twitter's Mirroring of the 2022 Energy Crisis: What It Teaches Decision-Makers - A Preliminary Study 推特对2022年能源危机的反映:它教给决策者什么——一项初步研究
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.05
Horia-Nicolai TEODORESCU, Mironela PIRNAU
The paper pertains to the field of opinion mining on social networks in view of decision-making. It was designed to determine the effect of the energy crises on the socio-ethical and ethical worries and concerns related to the role of Information and Communication Technology (ICT) in the crisis, as reflected on Twitter. Knowing public opinions during crises is a key component of decision-making. Other purposes include the determination of the perception of the correlations between these categories of concerns and the determination of specificities of distributions of such perceptions, as represented by words. A mixture of tools from lexical, topical, and semantical analysis were applied for generating the bag of words and for analyzing a set of tweets collected during the initial stage of an energy crisis, with special emphasis to coherence indices. The results confirm that energy crises may be associated with such concerns, as expected, but the association probability is low for the 2022 energy crisis, indicating at least a partial success of the mitigation decisions of the respective authorities. Some surprising relationships also occurred from the study. The paper is dedicated to Acad. Florin Gheorghe Filip, at the 75th anniversary.
本文从决策的角度研究了社交网络上的意见挖掘。它旨在确定能源危机对社会伦理和伦理担忧的影响,以及与信息和通信技术(ICT)在危机中的作用有关的担忧,如Twitter所反映的。在危机期间了解民意是决策的关键组成部分。其他目的包括确定对这些关注类别之间的相关性的感知,以及确定这些感知的分布的特殊性,如用单词表示的那样。词汇分析、话题分析和语义分析的混合工具被用于生成单词包,并用于分析在能源危机初始阶段收集的一组tweet,特别强调连贯性指数。研究结果证实,正如预期的那样,能源危机可能与这些担忧有关,但2022年能源危机的关联概率很低,这表明各国当局的缓解决策至少在一定程度上取得了成功。这项研究还发现了一些令人惊讶的关系。这篇论文是在75周年纪念时献给弗洛林·乔治·菲利普院士的。
{"title":"Twitter's Mirroring of the 2022 Energy Crisis: What It Teaches Decision-Makers - A Preliminary Study","authors":"Horia-Nicolai TEODORESCU, Mironela PIRNAU","doi":"10.59277/romjist.2023.3-4.05","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.05","url":null,"abstract":"The paper pertains to the field of opinion mining on social networks in view of decision-making. It was designed to determine the effect of the energy crises on the socio-ethical and ethical worries and concerns related to the role of Information and Communication Technology (ICT) in the crisis, as reflected on Twitter. Knowing public opinions during crises is a key component of decision-making. Other purposes include the determination of the perception of the correlations between these categories of concerns and the determination of specificities of distributions of such perceptions, as represented by words. A mixture of tools from lexical, topical, and semantical analysis were applied for generating the bag of words and for analyzing a set of tweets collected during the initial stage of an energy crisis, with special emphasis to coherence indices. The results confirm that energy crises may be associated with such concerns, as expected, but the association probability is low for the 2022 energy crisis, indicating at least a partial success of the mitigation decisions of the respective authorities. Some surprising relationships also occurred from the study. The paper is dedicated to Acad. Florin Gheorghe Filip, at the 75th anniversary.","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meaning in Action: a Qualitative Approach of Information 行动中的意义:信息的定性方法
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.03
Gheorghe ȘTEFAN
"There are many approaches to the concept of information in terms of quantity, but there is a lack of consensus on what information is. We measure it in many ways, but we don’t consistently state what information is. We will try in this text to offer a qualitative image for the concept of information. On this occasion, perhaps we will better understand the role of information at different levels in existence by defining information as a symbolic structure that acts through the meaning it has in a given context."
“从数量的角度来看,有很多方法可以理解信息的概念,但对信息是什么缺乏共识。我们用很多方法来衡量它,但我们并没有一致地说明什么是信息。在本文中,我们将尝试为信息的概念提供一个定性的形象。在这种情况下,也许我们会更好地理解信息在存在的不同层次上的作用,通过定义信息作为一个符号结构,通过它在给定的语境中所具有的意义而起作用。”
{"title":"Meaning in Action: a Qualitative Approach of Information","authors":"Gheorghe ȘTEFAN","doi":"10.59277/romjist.2023.3-4.03","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.03","url":null,"abstract":"\"There are many approaches to the concept of information in terms of quantity, but there is a lack of consensus on what information is. We measure it in many ways, but we don’t consistently state what information is. We will try in this text to offer a qualitative image for the concept of information. On this occasion, perhaps we will better understand the role of information at different levels in existence by defining information as a symbolic structure that acts through the meaning it has in a given context.\"","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infinite Spike Trains in Spiking Neural P Systems 脉冲神经P系统中的无限脉冲序列
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.01
Gheorghe PĂUN, Mario J. PÉREZ-JIMÉNEZ, Grzegorz ROZENBERG
We initiate the study of spiking neural P systems associated with infinite sequences, by considering them as computability devices which generate infinite sequences of bits (1 indicates a step when a spike exits the system, and 0 indicates a step when the system does not send a spike to the environment), and as devices which process infinite sequence of bits (for instance, computing Boolean operations or other operations on two input sequences). For both the generating and the transduction case we introduce some basic notions illustrated by numerous examples, establish some basic properties, and formulate a number of research topics.
我们开始研究与无限序列相关的尖峰神经P系统,将它们视为可计算设备,产生无限序列的位(1表示当尖峰退出系统时的步骤,0表示系统不向环境发送尖峰时的步骤),以及处理无限序列的位(例如,计算布尔运算或对两个输入序列的其他操作)。对于生成和转导两种情况,我们都引入了一些基本概念,通过大量的例子说明,建立了一些基本性质,并制定了一些研究课题。
{"title":"Infinite Spike Trains in Spiking Neural P Systems","authors":"Gheorghe PĂUN, Mario J. PÉREZ-JIMÉNEZ, Grzegorz ROZENBERG","doi":"10.59277/romjist.2023.3-4.01","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.01","url":null,"abstract":"We initiate the study of spiking neural P systems associated with infinite sequences, by considering them as computability devices which generate infinite sequences of bits (1 indicates a step when a spike exits the system, and 0 indicates a step when the system does not send a spike to the environment), and as devices which process infinite sequence of bits (for instance, computing Boolean operations or other operations on two input sequences). For both the generating and the transduction case we introduce some basic notions illustrated by numerous examples, establish some basic properties, and formulate a number of research topics.","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary Anarchic Society Optimization for Feature Selection 二元无政府社会特征选择优化
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.08
Umit KILIC, Esra SARAC ESSIZ, Mumine KAYA KELES
"Datasets comprise a collection of features; however, not all of these features may be necessary. Feature selection is the process of identifying the most relevant features while eliminating redundant or irrelevant ones. To be effective, feature selection should improve classification performance while reducing the number of features. Existing algorithms can be adapted and modified into feature selectors. In this study, we introduce the implementation of the Anarchic Society Optimization algorithm, a human-inspired algorithm, as a feature selector. This is the first study that utilizes the binary version of the algorithm for feature selection. The proposed Binary Anarchic Society Algorithm is evaluated on nine datasets and compared to three known algorithms: Binary Genetic Algorithm, Binary Particle Swarm Optimization, and Binary Gray Wolf Optimization. Additionally, four traditional feature selection techniques (Info Gain, Gain Ratio, Chi-square, and ReliefF) are incorporated for performance comparison. Our experiments highlight the competitive nature of the proposed method, suggesting its potential as a valuable addition to existing feature selection techniques."
“数据集包括特征的集合;然而,并非所有这些特性都是必需的。特征选择是识别最相关的特征,同时消除冗余或不相关的特征的过程。为了有效,特征选择应该在减少特征数量的同时提高分类性能。现有的算法可以调整和修改为特征选择器。在这项研究中,我们引入了无政府社会优化算法的实现,这是一种人类启发的算法,作为特征选择器。这是首次利用该算法的二进制版本进行特征选择的研究。提出的二元无政府社会算法在9个数据集上进行了评估,并与三种已知算法:二元遗传算法、二元粒子群算法和二元灰狼算法进行了比较。此外,还结合了四种传统的特征选择技术(信息增益、增益比、卡方和ReliefF)进行性能比较。我们的实验突出了所提出方法的竞争性,表明它有可能成为现有特征选择技术的一个有价值的补充。”
{"title":"Binary Anarchic Society Optimization for Feature Selection","authors":"Umit KILIC, Esra SARAC ESSIZ, Mumine KAYA KELES","doi":"10.59277/romjist.2023.3-4.08","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.08","url":null,"abstract":"\"Datasets comprise a collection of features; however, not all of these features may be necessary. Feature selection is the process of identifying the most relevant features while eliminating redundant or irrelevant ones. To be effective, feature selection should improve classification performance while reducing the number of features. Existing algorithms can be adapted and modified into feature selectors. In this study, we introduce the implementation of the Anarchic Society Optimization algorithm, a human-inspired algorithm, as a feature selector. This is the first study that utilizes the binary version of the algorithm for feature selection. The proposed Binary Anarchic Society Algorithm is evaluated on nine datasets and compared to three known algorithms: Binary Genetic Algorithm, Binary Particle Swarm Optimization, and Binary Gray Wolf Optimization. Additionally, four traditional feature selection techniques (Info Gain, Gain Ratio, Chi-square, and ReliefF) are incorporated for performance comparison. Our experiments highlight the competitive nature of the proposed method, suggesting its potential as a valuable addition to existing feature selection techniques.\"","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Emotion Recognition Using Deep Neural Networks, Transfer Learning, and Ensemble Classification Techniques 使用深度神经网络、迁移学习和集成分类技术的语音情感识别
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.10
Serban MIHALACHE, Dragos BURILEANU
Speech emotion recognition (SER) is the task of determining the affective content present in speech, a promising research area of great interest in recent years, with important applications especially in the field of forensic speech and law enforcement operations, among others. In this paper, systems based on deep neural networks (DNNs) spanning five levels of complexity are proposed, developed, and tested, including systems leveraging transfer learning (TL) for the top modern image recognition deep learning models, as well as several ensemble classification techniques that lead to significant performance increases. The systems were tested on the most relevant SER datasets: EMODB, CREMAD, and IEMOCAP, in the context of: (i) classification: using the standard full sets of emotion classes, as well as additional negative emotion subsets relevant for forensic speech applications; and (ii) regression: using the continuously valued 2D arousal-valence affect space. The proposed systems achieved state-of-the-art results for the full class subset for EMODB (up to 83% accuracy) and performance comparable to other published research for the full class subsets for CREMAD and IEMOCAP (up to 55% and 62% accuracy). For the class subsets focusing only on negative affective content, the proposed solutions offered top performance vs. previously published state of the art results.
语音情感识别(SER)是确定语音中存在的情感内容的任务,是近年来备受关注的一个有前途的研究领域,特别是在法医语音和执法行动等领域具有重要的应用。本文提出、开发和测试了基于深度神经网络(dnn)的系统,该系统跨越了五个复杂级别,包括利用迁移学习(TL)的顶级现代图像识别深度学习模型的系统,以及几种导致性能显著提高的集成分类技术。这些系统在最相关的SER数据集上进行了测试:EMODB, CREMAD和IEMOCAP,在以下背景下:(i)分类:使用标准的完整情感类别集,以及与法医语音应用相关的额外负面情绪子集;(ii)回归:利用连续值二维唤醒效价影响空间。所提出的系统在EMODB的全类子集上取得了最先进的结果(准确率高达83%),其性能可与其他已发表的CREMAD和IEMOCAP的全类子集研究(准确率高达55%和62%)相媲美。对于只关注负面情感内容的类子集,所提出的解决方案提供了与先前发布的最先进结果相比的最佳性能。
{"title":"Speech Emotion Recognition Using Deep Neural Networks, Transfer Learning, and Ensemble Classification Techniques","authors":"Serban MIHALACHE, Dragos BURILEANU","doi":"10.59277/romjist.2023.3-4.10","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.10","url":null,"abstract":"Speech emotion recognition (SER) is the task of determining the affective content present in speech, a promising research area of great interest in recent years, with important applications especially in the field of forensic speech and law enforcement operations, among others. In this paper, systems based on deep neural networks (DNNs) spanning five levels of complexity are proposed, developed, and tested, including systems leveraging transfer learning (TL) for the top modern image recognition deep learning models, as well as several ensemble classification techniques that lead to significant performance increases. The systems were tested on the most relevant SER datasets: EMODB, CREMAD, and IEMOCAP, in the context of: (i) classification: using the standard full sets of emotion classes, as well as additional negative emotion subsets relevant for forensic speech applications; and (ii) regression: using the continuously valued 2D arousal-valence affect space. The proposed systems achieved state-of-the-art results for the full class subset for EMODB (up to 83% accuracy) and performance comparable to other published research for the full class subsets for CREMAD and IEMOCAP (up to 55% and 62% accuracy). For the class subsets focusing only on negative affective content, the proposed solutions offered top performance vs. previously published state of the art results.","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Swear Words Increases the Irritability – a Study Using AI Algorithms 使用人工智能算法研究:说脏话会增加易怒
4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.59277/romjist.2023.3-4.09
Costin Andrei BRATAN, Ana Voichita TEBEANU, Gabriela BOBES
This paper presents the effects’ analysis produced by the frequent use of swearing from the perspective of irritability. The analysis was carried out with the help of two psychological questionnaires that were completed by the volunteers before and after the inducement of the negative emotions and automatic recognition functions implemented by Convolutional Neural Networks (CNN), applied for the speech signals of two volunteer groups for whom negative emotions were induced. The CNN architecture uses Mel-frequency cepstral coefficients (MFCCs), obtained from the speech signal, and has 87,944 trainable parameters, the outputs of the network being the 8 main classes of emotion detected by the algorithm (1 neutral, 3 positive, and 4 negative). The CNN also gives information about the negative emotion and irritability level. For the volunteers who swore during the experiment, there is an increase of 14% in negative emotion intensity and of 21% for the irritability level than for the volunteers who didn’t swear during the trials. The use of this current research is the understanding that cursing causes a higher level of irritability.
本文从易怒的角度对频繁使用脏话所产生的影响进行了分析。通过对两组被诱导负性情绪的志愿者的语音信号进行卷积神经网络(Convolutional Neural Networks, CNN)实现的自动识别功能,并在诱导负性情绪前后分别对志愿者完成两份心理问卷进行分析。CNN架构使用从语音信号中获得的Mel-frequency倒谱系数(MFCCs),具有87,944个可训练参数,网络的输出是算法检测到的8类主要情绪(1类中性,3类积极,4类消极)。CNN还提供了有关负面情绪和易怒程度的信息。在实验中说过脏话的志愿者的负面情绪强度比没有说过脏话的志愿者增加了14%,易怒程度增加了21%。目前这项研究的用途是理解诅咒会导致更高程度的易怒。
{"title":"Using Swear Words Increases the Irritability – a Study Using AI Algorithms","authors":"Costin Andrei BRATAN, Ana Voichita TEBEANU, Gabriela BOBES","doi":"10.59277/romjist.2023.3-4.09","DOIUrl":"https://doi.org/10.59277/romjist.2023.3-4.09","url":null,"abstract":"This paper presents the effects’ analysis produced by the frequent use of swearing from the perspective of irritability. The analysis was carried out with the help of two psychological questionnaires that were completed by the volunteers before and after the inducement of the negative emotions and automatic recognition functions implemented by Convolutional Neural Networks (CNN), applied for the speech signals of two volunteer groups for whom negative emotions were induced. The CNN architecture uses Mel-frequency cepstral coefficients (MFCCs), obtained from the speech signal, and has 87,944 trainable parameters, the outputs of the network being the 8 main classes of emotion detected by the algorithm (1 neutral, 3 positive, and 4 negative). The CNN also gives information about the negative emotion and irritability level. For the volunteers who swore during the experiment, there is an increase of 14% in negative emotion intensity and of 21% for the irritability level than for the volunteers who didn’t swear during the trials. The use of this current research is the understanding that cursing causes a higher level of irritability.","PeriodicalId":54448,"journal":{"name":"Romanian Journal of Information Science and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Romanian Journal of Information Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1