首页 > 最新文献

2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence最新文献

英文 中文
Evaluating the accessibility, usability and security of Hospitals websites: An exploratory study 评价医院网站的可访问性、可用性和安全性:一项探索性研究
Arvinder Kaur, Diksha Dani, Gaurav Agrawal
Technology offers the potential to improve healthcare service delivery. The objective of healthcare website is to provide services and updated information at low cost to all the people regardless of their abilities and disabilities, which can reduce overcrowding in hospitals and reduce spread of disease. In a developing country like India, where hospitals are overcrowded, healthcare websites can play a major role in delivering updated healthcare services. Therefore, designing an effective healthcare website is becoming essential as numerous people are accessing the web for gathering information about hospitals and their healthcare services. There are no specific guidelines available for designing the health care website. So, it has become extremely important to evaluate hospital websites and address the design issues. The objective of this paper is to evaluate the accessibility, usability and security of hospitals websites in metro cities of India. Accessibility is evaluated using WCAG 2.0 accessibility guidelines, usability is evaluated using readability score and language analysis. Security analysis takes content management system into account.
技术提供了改善医疗保健服务提供的潜力。医疗保健网站的目标是为所有人提供低成本的服务和最新信息,无论他们的能力和残疾如何,这可以减少医院的过度拥挤,减少疾病的传播。在印度这样的发展中国家,医院人满为患,医疗保健网站可以在提供更新的医疗保健服务方面发挥重要作用。因此,设计一个有效的医疗保健网站变得至关重要,因为许多人正在访问网络收集有关医院及其医疗服务的信息。目前还没有设计医疗保健网站的具体指导方针。因此,对医院网站进行评估和解决设计问题变得尤为重要。本文的目的是评估印度地铁城市医院网站的可访问性、可用性和安全性。可访问性使用WCAG 2.0可访问性指南进行评估,可用性使用可读性评分和语言分析进行评估。安全性分析需要考虑到内容管理系统。
{"title":"Evaluating the accessibility, usability and security of Hospitals websites: An exploratory study","authors":"Arvinder Kaur, Diksha Dani, Gaurav Agrawal","doi":"10.1109/CONFLUENCE.2017.7943237","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943237","url":null,"abstract":"Technology offers the potential to improve healthcare service delivery. The objective of healthcare website is to provide services and updated information at low cost to all the people regardless of their abilities and disabilities, which can reduce overcrowding in hospitals and reduce spread of disease. In a developing country like India, where hospitals are overcrowded, healthcare websites can play a major role in delivering updated healthcare services. Therefore, designing an effective healthcare website is becoming essential as numerous people are accessing the web for gathering information about hospitals and their healthcare services. There are no specific guidelines available for designing the health care website. So, it has become extremely important to evaluate hospital websites and address the design issues. The objective of this paper is to evaluate the accessibility, usability and security of hospitals websites in metro cities of India. Accessibility is evaluated using WCAG 2.0 accessibility guidelines, usability is evaluated using readability score and language analysis. Security analysis takes content management system into account.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"81 1","pages":"674-680"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82590601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Substantiation of K-Means and Affinity Propagation algorithm k -均值和亲和传播算法的证明
Preeti Arora, Deepali Virmani, Shipra Varshney
Our research is based is to create implementations of two common clustering algorithms K-Means and Affinity Propagation. There are certain drawbacks of K-Means however the main drawback with this and the same kind of similar algorithms is in selecting some number of clusters, and choosing the initial set of points. Affinity Propagation locates exemplars between datum or data points or series points and thus forms clusters of this datum around these exemplars. After forming the groups it operates by simultaneously considering all d atum as probable exemplars and interchange messages between data points till a good set of exemplars and clusters appears. Finally, we have finish making an Affinity Propagation program which nearly supervene the details laid out because the affinity propagation has an aptness to form many clusters. Using these two programs we slandered a variety of one and two dimensional datasets, and we examined the results to confirm that Affinity Propagation produces clustering errors in involving competition with that of K-Means in an order of enormity less time.
我们的研究是基于创建两种常见的聚类算法K-Means和Affinity Propagation的实现。K-Means有一定的缺点,但是它的主要缺点是选择一些数量的聚类,以及选择初始点集。亲和传播将样本定位在基准或数据点或序列点之间,从而在这些样本周围形成该基准的簇。在形成组后,它同时考虑所有的样本作为可能的样本,并在数据点之间交换信息,直到出现一组良好的样本和聚类。最后,我们编制了一个亲和性传播程序,由于亲和性传播具有形成多个集群的能力,因此该程序几乎可以覆盖所布置的细节。使用这两个程序,我们对各种一维和二维数据集进行了诽谤,并检查了结果,以确认亲和性传播在涉及K-Means竞争时产生聚类误差,其时间比K-Means短得多。
{"title":"Substantiation of K-Means and Affinity Propagation algorithm","authors":"Preeti Arora, Deepali Virmani, Shipra Varshney","doi":"10.1109/CONFLUENCE.2017.7943128","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943128","url":null,"abstract":"Our research is based is to create implementations of two common clustering algorithms K-Means and Affinity Propagation. There are certain drawbacks of K-Means however the main drawback with this and the same kind of similar algorithms is in selecting some number of clusters, and choosing the initial set of points. Affinity Propagation locates exemplars between datum or data points or series points and thus forms clusters of this datum around these exemplars. After forming the groups it operates by simultaneously considering all d atum as probable exemplars and interchange messages between data points till a good set of exemplars and clusters appears. Finally, we have finish making an Affinity Propagation program which nearly supervene the details laid out because the affinity propagation has an aptness to form many clusters. Using these two programs we slandered a variety of one and two dimensional datasets, and we examined the results to confirm that Affinity Propagation produces clustering errors in involving competition with that of K-Means in an order of enormity less time.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"28 1","pages":"82-85"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82979095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Remotely sensed image thresholding using OTSU & differential evolution approach 基于OTSU和差分进化方法的遥感图像阈值分割
Smriti Sehgal, Sushil Kumar, M. H. Bindu
Remotely sensed images have detailed stored information spreaded over many spectral bands coving full Electromagnetic spectrum. This information needs to be carefully extracted based on the type of segmentation one is doing or on the type of objects to be classified. In this paper, segmentation of high resolution image is done through bi-level and multi-level thresholding techniques. For bi-level, traditional OTSU method is used and Differential Evolution with OTSU technique as its objective function is used for multi-level thresholding. Segmented results with both the techniques are shown and it is clearly seen that differential evolution with OTSU method yield better results.
遥感图像具有详细的存储信息,分布在覆盖全电磁波谱的多个波段上。这些信息需要根据所做的分割类型或要分类的对象类型仔细提取。本文采用双级阈值分割和多级阈值分割技术对高分辨率图像进行分割。对于双层次,采用传统的OTSU方法,并以OTSU技术为目标函数的差分进化方法进行多层次阈值分割。本文给出了两种方法的分割结果,并且可以清楚地看到,差分进化与OTSU方法产生了更好的结果。
{"title":"Remotely sensed image thresholding using OTSU & differential evolution approach","authors":"Smriti Sehgal, Sushil Kumar, M. H. Bindu","doi":"10.1109/CONFLUENCE.2017.7943138","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943138","url":null,"abstract":"Remotely sensed images have detailed stored information spreaded over many spectral bands coving full Electromagnetic spectrum. This information needs to be carefully extracted based on the type of segmentation one is doing or on the type of objects to be classified. In this paper, segmentation of high resolution image is done through bi-level and multi-level thresholding techniques. For bi-level, traditional OTSU method is used and Differential Evolution with OTSU technique as its objective function is used for multi-level thresholding. Segmented results with both the techniques are shown and it is clearly seen that differential evolution with OTSU method yield better results.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"493 1","pages":"138-142"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77788423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Statistical tool for clock offset selection in time synchronization protocols of Wireless Sensor Network 无线传感器网络时间同步协议中时钟偏移选择的统计工具
Divya Upadhyay, Ashwani Kumar Dubey
Advancements in the applications of Wireless Sensor Networks such as tracking, surveillance, localizing, and so on, synchronization of sensor nodes clock time is very important. Therefore, in recent decades to synchronize the network lot of time synchronization protocols are available. These protocols give good precision in various ways. This paper discusses a sender-receiver protocol for which a proposed procedure for selecting the most probable clock offset is applied. The proposed procedure is based on the statistical tool of maximum probability theory.
随着无线传感器网络在跟踪、监控、定位等应用领域的不断发展,传感器节点时钟时间的同步是非常重要的。因此,近几十年来,为了实现网络同步,出现了大量的时间同步协议。这些协议以各种方式提供了良好的精度。本文讨论了一种用于选择最可能时钟偏移的程序的发送-接收协议。所提出的程序是基于最大概率理论的统计工具。
{"title":"Statistical tool for clock offset selection in time synchronization protocols of Wireless Sensor Network","authors":"Divya Upadhyay, Ashwani Kumar Dubey","doi":"10.1109/CONFLUENCE.2017.7943182","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943182","url":null,"abstract":"Advancements in the applications of Wireless Sensor Networks such as tracking, surveillance, localizing, and so on, synchronization of sensor nodes clock time is very important. Therefore, in recent decades to synchronize the network lot of time synchronization protocols are available. These protocols give good precision in various ways. This paper discusses a sender-receiver protocol for which a proposed procedure for selecting the most probable clock offset is applied. The proposed procedure is based on the statistical tool of maximum probability theory.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"9 1","pages":"397-401"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78746364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal storage and repair in distributed storage system 分布式存储系统的优化存储与维修
S. Singal, N. Rakesh, Rakesh Matam
The distributed storage system maintains the data at multiple nodes in the network to provide faster access to data. In case of failure of one node the data is made available to the users from other nodes and the lost data can be recovered from the surviving nodes. Network coding plays an important role in managing the distributed data. Various coding mechanism like Replication, Erasure Coding, Local Reconstruction, Regeneration, Hybrid and Double Coding have been found beneficial for distributed storage systems. The parameters that make these approaches different from each other are storage requirement, repair bandwidth, node access, fault tolerance etc. This paper proposes a new approach that is capable of repairing the damages with minimum repair bandwidth and occupies less storage compared to other related approaches.
分布式存储系统对网络中的多个节点进行数据维护,以提供更快的数据访问速度。在一个节点发生故障的情况下,用户可以从其他节点获得数据,并且可以从幸存的节点恢复丢失的数据。网络编码在分布式数据管理中起着重要的作用。各种编码机制,如复制、Erasure编码、本地重构、再生、混合和双重编码,都被发现对分布式存储系统有益。这些方法的不同之处在于存储需求、修复带宽、节点访问、容错性等参数。本文提出了一种新的修复方法,与其他相关方法相比,该方法能够以最小的修复带宽修复损伤,并且占用更少的存储空间。
{"title":"Optimal storage and repair in distributed storage system","authors":"S. Singal, N. Rakesh, Rakesh Matam","doi":"10.1109/CONFLUENCE.2017.7943195","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943195","url":null,"abstract":"The distributed storage system maintains the data at multiple nodes in the network to provide faster access to data. In case of failure of one node the data is made available to the users from other nodes and the lost data can be recovered from the surviving nodes. Network coding plays an important role in managing the distributed data. Various coding mechanism like Replication, Erasure Coding, Local Reconstruction, Regeneration, Hybrid and Double Coding have been found beneficial for distributed storage systems. The parameters that make these approaches different from each other are storage requirement, repair bandwidth, node access, fault tolerance etc. This paper proposes a new approach that is capable of repairing the damages with minimum repair bandwidth and occupies less storage compared to other related approaches.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"35 1","pages":"461-465"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89213748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A classification of emotion and gender using approximation image Gabor local binary pattern 基于近似图像Gabor局部二值模式的情绪和性别分类
K. S. Kalsi, P. Rai
Gender classification and emotion detection plays an important role in the areas security. Gender classification and emotion detection aids in identification of a person by recognizing its gender (male/female) with their emotions (happy/sad) from the face image only. Individual works has been done in the Gender classification and emotion detection fields but not together. In this paper, we proposed a system to do detection of emotion and gender simultaneously for a specific face image. In this paper AIGLBP (Approximation image Gabor local binary pattern) is applied for feature extraction and SVM is used for classification. The number of experiments is initiated on a standard face image databases taken in controlled (FERET and INDIAN FACE) environment. The experimental results demonstrate that the proposed system is effective enough to give high performance in terms of speed and accuracy.
性别分类和情感检测在区域安全中起着重要的作用。性别分类和情绪检测有助于识别一个人的性别(男性/女性)与他们的情绪(快乐/悲伤)仅从面部图像。在性别分类和情感检测领域已经有了单独的研究,但没有结合在一起。本文提出了一种针对特定人脸图像同时进行情感和性别检测的系统。本文采用近似图像Gabor局部二值模式(AIGLBP)进行特征提取,采用支持向量机进行分类。实验的数量是在标准的人脸图像数据库上进行的,这些数据库是在受控的(FERET和INDIAN face)环境下进行的。实验结果表明,该系统在速度和精度方面都具有较高的性能。
{"title":"A classification of emotion and gender using approximation image Gabor local binary pattern","authors":"K. S. Kalsi, P. Rai","doi":"10.1109/CONFLUENCE.2017.7943227","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943227","url":null,"abstract":"Gender classification and emotion detection plays an important role in the areas security. Gender classification and emotion detection aids in identification of a person by recognizing its gender (male/female) with their emotions (happy/sad) from the face image only. Individual works has been done in the Gender classification and emotion detection fields but not together. In this paper, we proposed a system to do detection of emotion and gender simultaneously for a specific face image. In this paper AIGLBP (Approximation image Gabor local binary pattern) is applied for feature extraction and SVM is used for classification. The number of experiments is initiated on a standard face image databases taken in controlled (FERET and INDIAN FACE) environment. The experimental results demonstrate that the proposed system is effective enough to give high performance in terms of speed and accuracy.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"24 1","pages":"623-628"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87452056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Novel approach in classical pade approximation 经典页近似的新方法
Parvendra Kumar, S. Chaudhary
In this paper, a novel approach of pade approximation has been proposed. Pade approximation is used to convert higher order model into a lower order model. In this reduction a deep analysis gives some new results about pade approximation and its pole placement. Therefore shifting the pole of higher order model, a novel approach has been proposed for the pole placement of reduced order model.
本文提出了一种新的页逼近方法。采用Pade近似将高阶模型转化为低阶模型。在这一简化中,深入的分析给出了关于页逼近及其极点布置的一些新结果。因此,通过对高阶模型极点的移位,提出了一种新的降阶模型极点放置方法。
{"title":"Novel approach in classical pade approximation","authors":"Parvendra Kumar, S. Chaudhary","doi":"10.1109/CONFLUENCE.2017.7943235","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943235","url":null,"abstract":"In this paper, a novel approach of pade approximation has been proposed. Pade approximation is used to convert higher order model into a lower order model. In this reduction a deep analysis gives some new results about pade approximation and its pole placement. Therefore shifting the pole of higher order model, a novel approach has been proposed for the pole placement of reduced order model.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"548 1","pages":"667-670"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78893524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Understanding the business strategy factors that drive the business impacts of cloud computing 理解驱动云计算业务影响的业务策略因素
Fagmie Davids, J. Van Belle
Organizations are faced with business environments that rapidly change and are fiercely competitive. Information Technology (IT) can assist the organization to achieve business value, provided it is an enabler. The purpose of this paper is to investigate various business strategy categories, and align those to the various cloud computing options available to organizations may undertake. To achieve this objective, literature was reviewed to provide insight into cloud computing, organizational impacts, business strategies, the role IT plays within an organization, and finally the various strategic contributions cloud computing. The findings revealed that organizations adopting IT to achieve business value should at minimum consider the role of their management staff, the organizational agility, and the organizational culture. From a business strategy perspective it is important to understand the type of business strategy the organization is undertaking, its strategic position, and what execution strategy will be applied. Strategically, IT can assist in playing various roles and require an understanding of the organizational view of IT. This research enables a better understanding of how cloud computing can contribute towards business strategy; provides a consolidated view of consideration when adopting cloud computing within an organization; and insight into what level of strategic contribution each form of cloud computing option provides towards a business strategy.
组织面临着快速变化和竞争激烈的商业环境。信息技术(IT)可以帮助组织实现业务价值,前提是它是一个推动者。本文的目的是调查各种业务策略类别,并将其与组织可能采用的各种云计算选项相结合。为了实现这一目标,对文献进行了回顾,以深入了解云计算、组织影响、业务策略、IT在组织中扮演的角色,以及云计算的各种战略贡献。研究结果表明,采用IT来实现业务价值的组织至少应该考虑其管理人员的角色、组织敏捷性和组织文化。从商业战略的角度来看,了解组织正在实施的商业战略的类型、战略地位以及将应用的执行战略是很重要的。在战略上,IT可以协助扮演各种角色,并且需要理解IT的组织视图。这项研究使我们能够更好地理解云计算如何为商业战略做出贡献;在组织内采用云计算时提供统一的考虑视图;并深入了解每种形式的云计算选项对业务战略的战略贡献程度。
{"title":"Understanding the business strategy factors that drive the business impacts of cloud computing","authors":"Fagmie Davids, J. Van Belle","doi":"10.1109/CONFLUENCE.2017.7943163","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943163","url":null,"abstract":"Organizations are faced with business environments that rapidly change and are fiercely competitive. Information Technology (IT) can assist the organization to achieve business value, provided it is an enabler. The purpose of this paper is to investigate various business strategy categories, and align those to the various cloud computing options available to organizations may undertake. To achieve this objective, literature was reviewed to provide insight into cloud computing, organizational impacts, business strategies, the role IT plays within an organization, and finally the various strategic contributions cloud computing. The findings revealed that organizations adopting IT to achieve business value should at minimum consider the role of their management staff, the organizational agility, and the organizational culture. From a business strategy perspective it is important to understand the type of business strategy the organization is undertaking, its strategic position, and what execution strategy will be applied. Strategically, IT can assist in playing various roles and require an understanding of the organizational view of IT. This research enables a better understanding of how cloud computing can contribute towards business strategy; provides a consolidated view of consideration when adopting cloud computing within an organization; and insight into what level of strategic contribution each form of cloud computing option provides towards a business strategy.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"9 1","pages":"281-287"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87635037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Gender classification system for half face images using multi manifold discriminant analysis 基于多流形判别分析的半人脸性别分类系统
Kanwal Deep Kaur, P. Rai, P. Khanna
Recognizing the gender from the half face image is a challenging problem in the field of computer vision. This paper investigates the issue and proposes a gender classification system that works for full-face images to half face images. In this manuscript, a Discrete Wavelet Transform (DWT) followed by MMDA is used for feature extraction. The proposed approach uses DWT to gather the potential information from the face images. Support Vector Machine (SVM) and k-NN classifiers are used to finds the features that can discriminate between male and female. The proposed method is evaluated on FERET and FEI databases and the experimental result shows that the proposed technique achieves the gender classification target with more than 94% accuracy for both half face and full-face images.
从半人脸图像中识别性别是计算机视觉领域的一个具有挑战性的问题。本文对这一问题进行了研究,提出了一种适用于全脸图像和半脸图像的性别分类系统。在本文中,使用离散小波变换(DWT)和MMDA进行特征提取。该方法利用小波变换从人脸图像中提取潜在信息。使用支持向量机(SVM)和k-NN分类器找到可以区分男性和女性的特征。在FERET和FEI数据库上对该方法进行了评价,实验结果表明,该方法在半脸和全脸图像上均达到了94%以上的性别分类目标。
{"title":"Gender classification system for half face images using multi manifold discriminant analysis","authors":"Kanwal Deep Kaur, P. Rai, P. Khanna","doi":"10.1109/CONFLUENCE.2017.7943221","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943221","url":null,"abstract":"Recognizing the gender from the half face image is a challenging problem in the field of computer vision. This paper investigates the issue and proposes a gender classification system that works for full-face images to half face images. In this manuscript, a Discrete Wavelet Transform (DWT) followed by MMDA is used for feature extraction. The proposed approach uses DWT to gather the potential information from the face images. Support Vector Machine (SVM) and k-NN classifiers are used to finds the features that can discriminate between male and female. The proposed method is evaluated on FERET and FEI databases and the experimental result shows that the proposed technique achieves the gender classification target with more than 94% accuracy for both half face and full-face images.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"21 1","pages":"595-598"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85741249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Keystroke dynamics based user authentication using numeric keypad 使用数字键盘的基于用户身份验证的击键动力学
B. Saini, Navdeep Kaur, K. Bhatia
Keystroke dynamics is the study to identify/authenticate a person based on his/her typing rhythms, which are inferred from keystroke events like key-press and key-release. A lot of research work has been done in this field where the researchers have used either only alphabetic or alphanumeric or only numeric inputs. In this paper we address the question — What is the best possible numeric input for authentication using keystroke dynamics. We accomplished this by making the users enter four different numbers. Each number consisted of 8-digits. Out of these four numbers two were random numbers while the other two were formed using digits which had some pattern to them. Random Forest and Naive Bayes were used as classifiers. The results showed that using Random Forest classifier yielded best results when a random number is taken as input. The study also proved that a combination of hold time and latency as features yielded improved results. We achieved an average false acceptance rate of 2.7% and false rejection rate of 35.9%.
击键动力学是根据一个人的打字节奏来识别/认证他/她的研究,这是从击键事件(如按键和释放键)中推断出来的。在这个领域已经做了大量的研究工作,研究人员要么只使用字母或字母数字输入,要么只使用数字输入。在本文中,我们解决了这个问题-使用击键动力学进行身份验证的最佳数字输入是什么。我们通过让用户输入四个不同的数字来实现这一点。每个数字由8位数字组成。在这四个数字中,有两个是随机数,而另外两个是由具有某种模式的数字组成的。使用随机森林和朴素贝叶斯作为分类器。结果表明,以随机数为输入时,使用随机森林分类器的分类效果最好。该研究还证明,将保持时间和延迟作为特征的组合会产生更好的结果。平均误接受率为2.7%,误拒率为35.9%。
{"title":"Keystroke dynamics based user authentication using numeric keypad","authors":"B. Saini, Navdeep Kaur, K. Bhatia","doi":"10.1109/CONFLUENCE.2017.7943118","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943118","url":null,"abstract":"Keystroke dynamics is the study to identify/authenticate a person based on his/her typing rhythms, which are inferred from keystroke events like key-press and key-release. A lot of research work has been done in this field where the researchers have used either only alphabetic or alphanumeric or only numeric inputs. In this paper we address the question — What is the best possible numeric input for authentication using keystroke dynamics. We accomplished this by making the users enter four different numbers. Each number consisted of 8-digits. Out of these four numbers two were random numbers while the other two were formed using digits which had some pattern to them. Random Forest and Naive Bayes were used as classifiers. The results showed that using Random Forest classifier yielded best results when a random number is taken as input. The study also proved that a combination of hold time and latency as features yielded improved results. We achieved an average false acceptance rate of 2.7% and false rejection rate of 35.9%.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"51 1","pages":"25-29"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73566391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1