首页 > 最新文献

Computer science & information technology最新文献

英文 中文
Product Recommendation using Object Detection from Video, Based on Facial Emotions 基于面部情绪的视频对象检测产品推荐
Pub Date : 2020-12-26 DOI: 10.5121/csit.2020.102006
Kshitiz Badola, Ajay J. Joshi, Deepesh Sengar
In today’s world, with the increasing demand of products and their growing productivity from producers, customers sometimes failed to decide whether they are interested in buying a particular product or not. So author, here proposed a framework which deals with the buying of only items of interest, for a consumer. In our feature-set, whenever any consumer tends to watch any video from YouTube, it results in breakdown into several frames (frames per second), and from there we use object detection technique to detect each and every object in a particular frame, and then to find whether our consumer is interested in that particular object or not, we use facial emotion detector to check whether our user is happy, surprised, neutral or any other emotion. After viewing those products which are present in a frame of a video. Merging only those items of interest which were tend to fall for consumer’s positive choices (emotions), we then used Amazon online marketing technique to recommend products selected by our framework.
在当今世界,随着产品需求的增加和生产者生产率的提高,客户有时无法决定他们是否有兴趣购买特定的产品。因此,作者在此提出了一个框架来处理消费者只购买感兴趣的物品。在我们的功能集中,每当任何消费者倾向于观看YouTube上的任何视频时,它都会导致分解为几帧(每秒帧),从那里我们使用对象检测技术来检测特定帧中的每个对象,然后发现我们的消费者是否对该特定对象感兴趣,我们使用面部情绪检测器来检查我们的用户是否高兴,惊讶,中立或任何其他情绪。在观看了这些产品后,这些产品出现在视频的框架中。只合并那些消费者倾向于积极选择(情感)的感兴趣的项目,然后我们使用亚马逊在线营销技术来推荐我们的框架选择的产品。
{"title":"Product Recommendation using Object Detection from Video, Based on Facial Emotions","authors":"Kshitiz Badola, Ajay J. Joshi, Deepesh Sengar","doi":"10.5121/csit.2020.102006","DOIUrl":"https://doi.org/10.5121/csit.2020.102006","url":null,"abstract":"In today’s world, with the increasing demand of products and their growing productivity from producers, customers sometimes failed to decide whether they are interested in buying a particular product or not. So author, here proposed a framework which deals with the buying of only items of interest, for a consumer. In our feature-set, whenever any consumer tends to watch any video from YouTube, it results in breakdown into several frames (frames per second), and from there we use object detection technique to detect each and every object in a particular frame, and then to find whether our consumer is interested in that particular object or not, we use facial emotion detector to check whether our user is happy, surprised, neutral or any other emotion. After viewing those products which are present in a frame of a video. Merging only those items of interest which were tend to fall for consumer’s positive choices (emotions), we then used Amazon online marketing technique to recommend products selected by our framework.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44292104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Machine Learning Classifiers for Intrusion Detection using UNSW-NB15 Dataset 基于UNSW-NB15数据集的入侵检测机器学习分类器性能分析
Pub Date : 2020-12-26 DOI: 10.5121/csit.2020.102004
Geeta Kocher, G. Kumar
With the advancement of internet technology, the numbers of threats are also rising exponentially. To reduce the impact of these threats, researchers have proposed many solutions for intrusion detection. In the literature, various machine learning classifiers are trained on older datasets for intrusion detection which limits their detection accuracy. So, there is a need to train the machine learning classifiers on latest dataset. In this paper, UNSW-NB15, the latest dataset is used to train machine learning classifiers. On the basis of theoretical analysis, taxonomy is proposed in terms of lazy and eager learners. From this proposed taxonomy, KNearest Neighbors (KNN), Stochastic Gradient Descent (SGD), Decision Tree (DT), Random Forest (RF), Logistic Regression (LR) and Naïve Bayes (NB) classifiers are selected for training. The performance of these classifiers is tested in terms of Accuracy, Mean Squared Error (MSE), Precision, Recall, F1-Score, True Positive Rate (TPR) and False Positive Rate (FPR) on UNSW-NB15 dataset and comparative analysis of these machine learning classifiers is carried out. The experimental results show that RF classifier outperforms other classifiers.
随着互联网技术的进步,威胁的数量也呈指数级增长。为了减少这些威胁的影响,研究人员提出了许多入侵检测的解决方案。在文献中,各种机器学习分类器是在旧的数据集上训练用于入侵检测的,这限制了它们的检测精度。因此,有必要在最新的数据集上训练机器学习分类器。本文使用最新的数据集UNSW-NB15来训练机器学习分类器。在理论分析的基础上,提出了懒惰和渴望学习者的分类法。从该分类法中,选择最近邻(KNN)、随机梯度下降(SGD)、决策树(DT)、随机森林(RF)、逻辑回归(LR)和朴素贝叶斯(NB)分类器进行训练。在UNSW-NB15数据集上测试了这些分类器在准确性、均方误差(MSE)、精度、召回率、F1分数、真阳性率(TPR)和假阳性率(FPR)方面的性能,并对这些机器学习分类器进行了比较分析。实验结果表明,RF分类器的性能优于其他分类器。
{"title":"Performance Analysis of Machine Learning Classifiers for Intrusion Detection using UNSW-NB15 Dataset","authors":"Geeta Kocher, G. Kumar","doi":"10.5121/csit.2020.102004","DOIUrl":"https://doi.org/10.5121/csit.2020.102004","url":null,"abstract":"With the advancement of internet technology, the numbers of threats are also rising exponentially. To reduce the impact of these threats, researchers have proposed many solutions for intrusion detection. In the literature, various machine learning classifiers are trained on older datasets for intrusion detection which limits their detection accuracy. So, there is a need to train the machine learning classifiers on latest dataset. In this paper, UNSW-NB15, the latest dataset is used to train machine learning classifiers. On the basis of theoretical analysis, taxonomy is proposed in terms of lazy and eager learners. From this proposed taxonomy, KNearest Neighbors (KNN), Stochastic Gradient Descent (SGD), Decision Tree (DT), Random Forest (RF), Logistic Regression (LR) and Naïve Bayes (NB) classifiers are selected for training. The performance of these classifiers is tested in terms of Accuracy, Mean Squared Error (MSE), Precision, Recall, F1-Score, True Positive Rate (TPR) and False Positive Rate (FPR) on UNSW-NB15 dataset and comparative analysis of these machine learning classifiers is carried out. The experimental results show that RF classifier outperforms other classifiers.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44116069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Assessing the Mobility of Elderly People in Domestic Smart Home Environments 评估老年人在家庭智能家居环境中的流动性
Pub Date : 2020-12-19 DOI: 10.5121/csit.2020.101911
Björn Friedrich, Enno-Edzard Steen, Sebastian J. F. Fudickar, A. Hein
A continuous monitoring of the physical strength and mobility of elderly people is important for maintaining their health and treating diseases at an early stage. However, frequent screenings by physicians are exceeding the logistic capacities. An alternate approach is the automatic and unobtrusive collection of functional measures by ambient sensors. In the current publication, we show the correlation among data of ambient motion sensors and the wellestablished mobility assessment Short-Physical-Performance-Battery and Tinetti. We use the average number of motion sensor events for correlation with the assessment scores. The evaluation on a real-world dataset shows a moderate to strong correlation with the scores of standardised geriatrics physical assessments.
持续监测老年人的体力和活动能力对于保持他们的健康和在早期治疗疾病非常重要。然而,医生频繁的筛查超出了后勤能力。另一种方法是通过环境传感器自动和不显眼地收集功能测量。在当前的出版物中,我们展示了环境运动传感器数据与完善的移动性评估Short-Physical-Performance-Battery和Tinetti之间的相关性。我们使用运动传感器事件的平均数量与评估分数的相关性。对真实世界数据集的评估显示,与标准化老年医学物理评估的分数有中等到强烈的相关性。
{"title":"Assessing the Mobility of Elderly People in Domestic Smart Home Environments","authors":"Björn Friedrich, Enno-Edzard Steen, Sebastian J. F. Fudickar, A. Hein","doi":"10.5121/csit.2020.101911","DOIUrl":"https://doi.org/10.5121/csit.2020.101911","url":null,"abstract":"A continuous monitoring of the physical strength and mobility of elderly people is important for maintaining their health and treating diseases at an early stage. However, frequent screenings by physicians are exceeding the logistic capacities. An alternate approach is the automatic and unobtrusive collection of functional measures by ambient sensors. In the current publication, we show the correlation among data of ambient motion sensors and the wellestablished mobility assessment Short-Physical-Performance-Battery and Tinetti. We use the average number of motion sensor events for correlation with the assessment scores. The evaluation on a real-world dataset shows a moderate to strong correlation with the scores of standardised geriatrics physical assessments.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45991593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Dynamic Call Admission Control for 4G and 5G Networks 一种适用于4G和5G网络的高效动态呼叫接纳控制
Pub Date : 2020-12-19 DOI: 10.5121/csit.2020.101905
M. Mamman, Z. Hanapi
The goal for improved wireless communication between interconnected objects in a network has been long anticipated. The present Long Term Evolution (LTE) fourth-generation (4G) network does not allow the variety of services for the future need, as the fifth-generation (5G) network is faster, efficient, reliable, and more flexible. The 5G network and call admission control (CAC) are best certainty that defines the elementary principles of the smart cities of the upcoming 5G network technology. It is predicted that substantial CAC in the smart cites environment where millions of wireless devices are connected, communication will be granted based on latency, speed, and cost. Furthermore, the present CAC algorithm suffers from performance deteriorates under the 4G network because of the adaptive threshold value used to determine the strength of the network. In this paper, a novel CAC algorithm that uses dynamic threshold value for smart cities in the 5G network to address performance deterioration is proposed. Simulation is used to evaluate the efficacy of the proposed algorithm, and results show that it significantly performs better than do other algorithm based on the metrics measured.
改进网络中相互连接的对象之间的无线通信的目标已经被期待很久了。目前的LTE (Long Term Evolution)第四代(4G)网络无法满足未来需求的各种业务,而第五代(5G)网络更快、更高效、更可靠、更灵活。5G网络和呼叫接纳控制(CAC)是定义即将到来的5G网络技术的智慧城市基本原则的最佳确定性。据预测,在数百万无线设备连接的智能城市环境中,大量的CAC将根据延迟、速度和成本授予通信。此外,由于使用自适应阈值来确定网络强度,目前的CAC算法在4G网络下性能下降。本文提出了一种新的CAC算法,利用5G网络中智慧城市的动态阈值来解决性能下降问题。通过仿真对该算法的有效性进行了评价,结果表明,该算法的性能明显优于基于测量指标的其他算法。
{"title":"An Efficient Dynamic Call Admission Control for 4G and 5G Networks","authors":"M. Mamman, Z. Hanapi","doi":"10.5121/csit.2020.101905","DOIUrl":"https://doi.org/10.5121/csit.2020.101905","url":null,"abstract":"The goal for improved wireless communication between interconnected objects in a network has been long anticipated. The present Long Term Evolution (LTE) fourth-generation (4G) network does not allow the variety of services for the future need, as the fifth-generation (5G) network is faster, efficient, reliable, and more flexible. The 5G network and call admission control (CAC) are best certainty that defines the elementary principles of the smart cities of the upcoming 5G network technology. It is predicted that substantial CAC in the smart cites environment where millions of wireless devices are connected, communication will be granted based on latency, speed, and cost. Furthermore, the present CAC algorithm suffers from performance deteriorates under the 4G network because of the adaptive threshold value used to determine the strength of the network. In this paper, a novel CAC algorithm that uses dynamic threshold value for smart cities in the 5G network to address performance deterioration is proposed. Simulation is used to evaluate the efficacy of the proposed algorithm, and results show that it significantly performs better than do other algorithm based on the metrics measured.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41869578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mar_Security: A Joint Scheme for Improving the Security in VANET using Secure Group Key Management and Cryptography (SGKC) Mar_Security:利用安全组密钥管理和加密技术(SGKC)提高VANET安全性的联合方案
Pub Date : 2020-12-19 DOI: 10.5121/csit.2020.101904
Mahabaleshwar S. Kabbur, V. Kumar
Vehicular Ad-hoc network (VANET) has gained huge attraction from research community due to their significant nature of providing the autonomous vehicular communication. The efficient communication is considered as prime concern in these networks however, several techniques have been introduced to improve the overall communication of VANETs. Security and privacy are also considered as prime aspects of VANETs. Maintaining data security and privacy is highly dynamic VANETs is a challenging task. Several techniques have been introduced recently which are based on the cryptography and key exchange. However, these techniques provide solution to limited security threats. Hence, this work introduces a novel approach for key management and distribution in VANET to provide the security to the network and its components. This approach is later incorporated with cryptography mechanism to secure data packets. Hence, the proposed approach is named as Secure Group Key Management and Cryptography (SGKC). The experimental study shows significant improvements in the network performance. This SGKC approach will help the VANET user’s fraternity to perform secured data transmission.
车载自组织网络(VANET)由于其提供自动车辆通信的重要性质而受到研究界的巨大吸引力。高效的通信被认为是这些网络中最关心的问题,然而,已经引入了几种技术来改善VANET的整体通信。安全和隐私也被认为是VANET的主要方面。维护数据安全和隐私是高度动态的VANET,是一项具有挑战性的任务。最近介绍了几种基于密码学和密钥交换的技术。然而,这些技术为有限的安全威胁提供了解决方案。因此,本文介绍了一种在VANET中进行密钥管理和分发的新方法,为网络及其组件提供安全性。这种方法后来与加密机制结合在一起,以保护数据包的安全。因此,所提出的方法被命名为安全组密钥管理和加密(SGKC)。实验研究表明,网络性能显著提高。这种SGKC方法将帮助VANET用户的兄弟会执行安全的数据传输。
{"title":"Mar_Security: A Joint Scheme for Improving the Security in VANET using Secure Group Key Management and Cryptography (SGKC)","authors":"Mahabaleshwar S. Kabbur, V. Kumar","doi":"10.5121/csit.2020.101904","DOIUrl":"https://doi.org/10.5121/csit.2020.101904","url":null,"abstract":"Vehicular Ad-hoc network (VANET) has gained huge attraction from research community due to their significant nature of providing the autonomous vehicular communication. The efficient communication is considered as prime concern in these networks however, several techniques have been introduced to improve the overall communication of VANETs. Security and privacy are also considered as prime aspects of VANETs. Maintaining data security and privacy is highly dynamic VANETs is a challenging task. Several techniques have been introduced recently which are based on the cryptography and key exchange. However, these techniques provide solution to limited security threats. Hence, this work introduces a novel approach for key management and distribution in VANET to provide the security to the network and its components. This approach is later incorporated with cryptography mechanism to secure data packets. Hence, the proposed approach is named as Secure Group Key Management and Cryptography (SGKC). The experimental study shows significant improvements in the network performance. This SGKC approach will help the VANET user’s fraternity to perform secured data transmission.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42236694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind SQL Injection Attacks Optimization SQL盲注入攻击优化
Pub Date : 2020-12-19 DOI: 10.5121/csit.2020.101909
Ruben Ventura
This paper presents new and evolved methods to perform Blind SQL Injection attacks. These are much faster than the current publicly available tools and techniques due to optimization and redesign ideas that hack databases in more efficient methods, using cleverer injection payloads; this is the result of years of private research. Implementing these methods within carefully crafted code has resulted in the development of the fastest tools in the world to extract information from a database through Blind SQL Injection vulnerabilities. These tools are around 1600% faster than the currently most popular tools. The nature of such attack vectors will be explained in this paper, including all of their intrinsic details.
本文提出了执行盲SQL注入攻击的新方法和改进方法。由于优化和重新设计的想法,使用更聪明的注入有效载荷,以更有效的方法破解数据库,这些工具和技术比目前公开可用的工具和技术快得多;这是多年私人研究的结果。通过在精心编制的代码中实现这些方法,开发出了世界上最快的工具,可以通过盲SQL注入漏洞从数据库中提取信息。这些工具比目前最流行的工具快1600%左右。本文将解释这种攻击向量的性质,包括其所有内在细节。
{"title":"Blind SQL Injection Attacks Optimization","authors":"Ruben Ventura","doi":"10.5121/csit.2020.101909","DOIUrl":"https://doi.org/10.5121/csit.2020.101909","url":null,"abstract":"This paper presents new and evolved methods to perform Blind SQL Injection attacks. These are much faster than the current publicly available tools and techniques due to optimization and redesign ideas that hack databases in more efficient methods, using cleverer injection payloads; this is the result of years of private research. Implementing these methods within carefully crafted code has resulted in the development of the fastest tools in the world to extract information from a database through Blind SQL Injection vulnerabilities. These tools are around 1600% faster than the currently most popular tools. The nature of such attack vectors will be explained in this paper, including all of their intrinsic details.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45449771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Noise Reduction and Enhancement of Weld Image 焊缝图像的降噪与增强研究
Pub Date : 2020-12-19 DOI: 10.5121/csit.2020.101902
Xiang-Song Zhang, Wei-Xin Gao, Shihuan Zhu
In order to eliminate the salt pepper and Gaussian mixed noise in X-ray weld image, the extreme value characteristics of salt and pepper noise are used to separate the mixed noise, and the non local mean filtering algorithm is used to denoise it. Because the smoothness of the exponential weighted kernel function is too large, it is easy to cause the image details fuzzy, so the cosine coefficient based on the function is adopted. An improved non local mean image denoising algorithm is designed by using weighted Gaussian kernel function. The experimental results show that the new algorithm reduces the noise and retains the details of the original image, and the peak signal-to-noise ratio is increased by 1.5 dB. An adaptive salt and pepper noise elimination algorithm is proposed, which can automatically adjust the filtering window to identify the noise probability. Firstly, the median filter is applied to the image, and the filtering results are compared with the pre filtering results to get the noise points. Then the weighted average of the middle three groups of data under each filtering window is used to estimate the image noise probability. Before filtering, the obvious noise points are removed by threshold method, and then the central pixel is estimated by the reciprocal square of the distance from the center pixel of the window. Finally, according to Takagi Sugeno (T-S) fuzzy rules, the output estimates of different models are fused by using noise probability. Experimental results show that the algorithm has the ability of automatic noise estimation and adaptive window adjustment. After filtering, the standard mean square deviation can be reduced by more than 20%, and the speed can be increased more than twice. In the enhancement part, a nonlinear image enhancement method is proposed, which can adjust the parameters adaptively and enhance the weld area automatically instead of the background area. The enhancement effect achieves the best personal visual effect. Compared with the traditional method, the enhancement effect is better and more in line with the needs of industrial field.
为了消除X射线焊缝图像中的椒盐和高斯混合噪声,利用椒盐噪声的极值特性对混合噪声进行分离,并采用非局部均值滤波算法对其进行去噪。由于指数加权核函数的平滑度过大,容易导致图像细节模糊,因此采用了基于该函数的余弦系数。利用加权高斯核函数设计了一种改进的非局部均值图像去噪算法。实验结果表明,新算法降低了噪声,保留了原始图像的细节,峰值信噪比提高了1.5dB。提出了一种自适应椒盐噪声消除算法,该算法可以自动调整滤波窗口来识别噪声概率。首先,将中值滤波器应用于图像,并将滤波结果与预滤波结果进行比较,得到噪声点。然后使用每个滤波窗口下中间三组数据的加权平均值来估计图像噪声概率。在滤波之前,通过阈值法去除明显的噪声点,然后通过与窗口中心像素的距离的倒数平方来估计中心像素。最后,根据Takagi-Sugeno(T-S)模糊规则,利用噪声概率对不同模型的输出估计进行融合。实验结果表明,该算法具有自动噪声估计和自适应窗口调整的能力。滤波后,标准均方偏差可降低20%以上,速度可提高两倍以上。在增强部分,提出了一种非线性图像增强方法,该方法可以自适应地调整参数,自动增强焊缝区域而不是背景区域。增强效果达到最佳的个人视觉效果。与传统方法相比,增强效果更好,更符合工业领域的需要。
{"title":"Research on Noise Reduction and Enhancement of Weld Image","authors":"Xiang-Song Zhang, Wei-Xin Gao, Shihuan Zhu","doi":"10.5121/csit.2020.101902","DOIUrl":"https://doi.org/10.5121/csit.2020.101902","url":null,"abstract":"In order to eliminate the salt pepper and Gaussian mixed noise in X-ray weld image, the extreme value characteristics of salt and pepper noise are used to separate the mixed noise, and the non local mean filtering algorithm is used to denoise it. Because the smoothness of the exponential weighted kernel function is too large, it is easy to cause the image details fuzzy, so the cosine coefficient based on the function is adopted. An improved non local mean image denoising algorithm is designed by using weighted Gaussian kernel function. The experimental results show that the new algorithm reduces the noise and retains the details of the original image, and the peak signal-to-noise ratio is increased by 1.5 dB. An adaptive salt and pepper noise elimination algorithm is proposed, which can automatically adjust the filtering window to identify the noise probability. Firstly, the median filter is applied to the image, and the filtering results are compared with the pre filtering results to get the noise points. Then the weighted average of the middle three groups of data under each filtering window is used to estimate the image noise probability. Before filtering, the obvious noise points are removed by threshold method, and then the central pixel is estimated by the reciprocal square of the distance from the center pixel of the window. Finally, according to Takagi Sugeno (T-S) fuzzy rules, the output estimates of different models are fused by using noise probability. Experimental results show that the algorithm has the ability of automatic noise estimation and adaptive window adjustment. After filtering, the standard mean square deviation can be reduced by more than 20%, and the speed can be increased more than twice. In the enhancement part, a nonlinear image enhancement method is proposed, which can adjust the parameters adaptively and enhance the weld area automatically instead of the background area. The enhancement effect achieves the best personal visual effect. Compared with the traditional method, the enhancement effect is better and more in line with the needs of industrial field.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49644260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Deep-Learning-based Face Recognition to Increase Robustness against Morphing Attacks 改进基于深度学习的人脸识别以提高对变形攻击的鲁棒性
Pub Date : 2020-12-19 DOI: 10.5121/csit.2020.101901
Una M. Kelly, L. Spreeuwers, R. Veldhuis
State-of-the-art face recognition systems (FRS) are vulnerable to morphing attacks, in which two photos of different people are merged in such a way that the resulting photo resembles both people. Such a photo could be used to apply for a passport, allowing both people to travel with the same identity document. Research has so far focussed on developing morphing detection methods. We suggest that it might instead be worthwhile to make face recognition systems themselves more robust to morphing attacks. We show that deep-learning-based face recognition can be improved simply by treating morphed images just like real images during training but also that, for significant improvements, more work is needed. Furthermore, we test the performance of our FRS on morphs of a type not seen during training. This addresses the problem of overfitting to the type of morphs used during training, which is often overlooked in current research.
最先进的人脸识别系统(FRS)很容易受到变形攻击,在这种攻击中,两张不同人的照片被合并在一起,结果照片看起来像两个人。这样的照片可以用来申请护照,允许两个人用相同的身份证件旅行。到目前为止,研究的重点是开发变形检测方法。我们建议,让人脸识别系统本身对变形攻击更强大,可能是值得的。我们表明,基于深度学习的人脸识别可以简单地通过在训练过程中像处理真实图像一样处理变形图像来改进,但要实现显著改进,还需要更多的工作。此外,我们测试了FRS对训练中未见过的类型的变形的性能。这解决了训练中使用的变形类型的过拟合问题,这在当前的研究中经常被忽视。
{"title":"Improving Deep-Learning-based Face Recognition to Increase Robustness against Morphing Attacks","authors":"Una M. Kelly, L. Spreeuwers, R. Veldhuis","doi":"10.5121/csit.2020.101901","DOIUrl":"https://doi.org/10.5121/csit.2020.101901","url":null,"abstract":"State-of-the-art face recognition systems (FRS) are vulnerable to morphing attacks, in which two photos of different people are merged in such a way that the resulting photo resembles both people. Such a photo could be used to apply for a passport, allowing both people to travel with the same identity document. Research has so far focussed on developing morphing detection methods. We suggest that it might instead be worthwhile to make face recognition systems themselves more robust to morphing attacks. We show that deep-learning-based face recognition can be improved simply by treating morphed images just like real images during training but also that, for significant improvements, more work is needed. Furthermore, we test the performance of our FRS on morphs of a type not seen during training. This addresses the problem of overfitting to the type of morphs used during training, which is often overlooked in current research.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44108994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Feature Extraction via Sparse Autoencoder for Intrusion Detection System 基于稀疏自编码器的入侵检测系统深度特征提取
Pub Date : 2020-12-19 DOI: 10.5121/csit.2020.101906
Cao Xiaopeng, Qu Hongyan
The massive network traffic and high-dimensional features affect detection performance. In order to improve the efficiency and performance of detection, whale optimization sparse autoencoder model (WO-SAE) is proposed. Firstly, sparse autoencoder performs unsupervised training on high-dimensional raw data and extracts low-dimensional features of network traffic. Secondly, the key parameters of sparse autoencoder are optimized automatically by whale optimization algorithm to achieve better feature extraction ability. Finally, gated recurrent unit is used to classify the time series data. The experimental results show that the proposed model is superior to existing detection algorithms in accuracy, precision, and recall. And the accuracy presents 98.69%. WO-SAE model is a novel approach that reduces the user’s reliance on deep learning expertise.
海量的网络流量和高维特征影响检测性能。为了提高检测效率和性能,提出了鲸鱼优化稀疏自动编码器模型(WO-SAE)。首先,稀疏自动编码器对高维原始数据进行无监督训练,提取网络流量的低维特征。其次,利用whale优化算法对稀疏自动编码器的关键参数进行自动优化,以获得更好的特征提取能力。最后,使用门控递归单元对时间序列数据进行分类。实验结果表明,该模型在准确度、精度和召回率方面优于现有的检测算法。WO-SAE模型是一种减少用户对深度学习专业知识依赖的新方法。
{"title":"Deep Feature Extraction via Sparse Autoencoder for Intrusion Detection System","authors":"Cao Xiaopeng, Qu Hongyan","doi":"10.5121/csit.2020.101906","DOIUrl":"https://doi.org/10.5121/csit.2020.101906","url":null,"abstract":"The massive network traffic and high-dimensional features affect detection performance. In order to improve the efficiency and performance of detection, whale optimization sparse autoencoder model (WO-SAE) is proposed. Firstly, sparse autoencoder performs unsupervised training on high-dimensional raw data and extracts low-dimensional features of network traffic. Secondly, the key parameters of sparse autoencoder are optimized automatically by whale optimization algorithm to achieve better feature extraction ability. Finally, gated recurrent unit is used to classify the time series data. The experimental results show that the proposed model is superior to existing detection algorithms in accuracy, precision, and recall. And the accuracy presents 98.69%. WO-SAE model is a novel approach that reduces the user’s reliance on deep learning expertise.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48366142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quality Model based on Playability for the Understandability and Usability Components in Serious Video Games 基于可玩性的严肃电子游戏可理解性和可用性组件的质量模型
Pub Date : 2020-12-19 DOI: 10.5121/csit.2020.101912
Iván Humberto Fuentes Chab, Damián Uriel Rosado Castellanos, Olivia Graciela Fragoso Diaz, Ivette Stephany Pacheco Farfán
A serious video game is an easy and practical way to get the player to learn about a complex subject, such as performing integrals, applying first aid, or even getting children to learn to read and write in their native language or another language. Therefore, to develop a serious video game, you must have a guide containing the basic or necessary elements of its software components to be considered. This research presents a quality model to evaluate the playability, taking the attributes of usability and understandability at the level of software components. This model can serve as parameters to measure the quality of the software product of the serious video games before and during its development, providing a margin with the primordial elements that a serious video game must have so that the players reach the desired objective of learning while playing. The experimental results show that 88.045% is obtained concerning for to the quality model proposed for the serious video game used in the test case, margin that can vary according to the needs of the implemented video game.
严肃的电子游戏是一种简单实用的方式,可以让玩家了解复杂的主题,例如进行积分、应用急救,甚至让孩子学习用母语或其他语言读写。因此,要开发一款严肃的电子游戏,你必须有一份指南,其中包含要考虑的软件组件的基本或必要元素。本研究提出了一个评估可玩性的质量模型,在软件组件层面上考虑了可用性和可理解性的属性。该模型可以作为参数,在开发之前和开发过程中衡量严肃视频游戏的软件产品的质量,为严肃视频游戏必须具备的原始元素提供余量,以便玩家在玩游戏时达到所需的学习目标。实验结果表明,对于测试用例中使用的严肃视频游戏所提出的质量模型,获得了88.045%的支持率,裕度可以根据所实现的视频游戏的需要而变化。
{"title":"Quality Model based on Playability for the Understandability and Usability Components in Serious Video Games","authors":"Iván Humberto Fuentes Chab, Damián Uriel Rosado Castellanos, Olivia Graciela Fragoso Diaz, Ivette Stephany Pacheco Farfán","doi":"10.5121/csit.2020.101912","DOIUrl":"https://doi.org/10.5121/csit.2020.101912","url":null,"abstract":"A serious video game is an easy and practical way to get the player to learn about a complex subject, such as performing integrals, applying first aid, or even getting children to learn to read and write in their native language or another language. Therefore, to develop a serious video game, you must have a guide containing the basic or necessary elements of its software components to be considered. This research presents a quality model to evaluate the playability, taking the attributes of usability and understandability at the level of software components. This model can serve as parameters to measure the quality of the software product of the serious video games before and during its development, providing a margin with the primordial elements that a serious video game must have so that the players reach the desired objective of learning while playing. The experimental results show that 88.045% is obtained concerning for to the quality model proposed for the serious video game used in the test case, margin that can vary according to the needs of the implemented video game.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42242342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer science & information technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1