首页 > 最新文献

IOSR journal of computer engineering最新文献

英文 中文
OSPP Face Recognition Using Meta-Heuristic Algorithm 基于元启发式算法的OSPP人脸识别
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903036165
Syed ArshiRahaman
Face recognition has drawn dramatic attention due to the advancement of pattern recognition technologies. Face recognition systems have reached a level of maturity under certain conditions but still the performance of face recognition algorithms are easily affected by external and internal variations. Thus many well-known algorithms have been proposed to overcome these challenging problems. Here we are trying to use one sample face image of individual for training the whole system which will not only reduce labouring effort for the collection and also reduce cost for storing and processing them. One sample per person face recognition (OSPP) is considered as a challenging problem in face recognition community and lack of samples leads to performance deterioration. Here face recognition is performed by application of the swarm optimization algorithms [12] . It was found out that the underlying foraging principle and the swarm optimization can be integrated into evolutionary computational algorithms to provide a better search strategy for finding optimal feature vectors for face recognition. Finally, it is believed that the particle swarm optimization may be useful for the development of face recognition system. A meta-heuristic algorithm PSO is used that makes few or no assumptions about the problem being optimized and can search very large spaces of candidate solutions and also used for classifying purpose. Keywords: One sample per person, particle swarm optimization, meta-heuristic algorithm, face recognition, intra-class variety model 
 I. Introduction The fundamental task of face recognition technology is to recognize a human face. Here we consider the images (training set) of different subject and then extract the features from them. the next step includes training the system for classification purpose. The same architecture is followed and one sample per person is considered for the training purpose and for classification purpose Meta-heuristic algorithm like PSO is used. Particle Swarm Optimisation is an algorithm capable of optimising a nonlinear and multidimensional problem which usually reaches good solutions efficiently while requiring minimal parameterisation. The basic concept of the algorithm is to create a swarm of particles which could move in the space around the problem space searching for their goal, the place which best suits their needs given by a fitness function. OSPP face recognition algorithm is based on PSO. If we consider a neutral image of each subject as a particle, each particle has a specific mode of direction (mode of direction has been discus in proposed model). In each iteration every particle moves towards optimal solution based on the cost function. after a specific amount of iterations, the particle holding best cost function will be the optimal point (solution). Particle swarm optimisation is chosen to find out the optimum combination of the basis and variety in terms of the minimum L2 distance relative to the
由于模式识别技术的进步,人脸识别受到了极大的关注。人脸识别系统在一定条件下已经达到了一定的成熟程度,但人脸识别算法的性能仍然容易受到外部和内部变化的影响。因此,人们提出了许多著名的算法来克服这些具有挑战性的问题。在这里,我们尝试使用一个个人的人脸图像样本来训练整个系统,这不仅可以减少收集的工作量,还可以降低存储和处理它们的成本。一人一样本人脸识别(OSPP)一直是人脸识别领域的一个难题,缺乏样本会导致性能下降。在这里,人脸识别是通过应用群优化算法进行的[12]。研究发现,将底层觅食原理和群体优化算法整合到进化计算算法中,可以为寻找人脸识别的最优特征向量提供更好的搜索策略。最后,认为粒子群算法对人脸识别系统的发展具有一定的指导意义。采用了一种元启发式算法PSO,该算法对待优化问题很少或不做任何假设,可以搜索非常大的候选解空间,并用于分类目的。关键词:一人一样本,粒子群优化,元启发式算法,人脸识别,类内变异模型
一、简介人脸识别技术的基本任务是识别人脸。在这里,我们考虑不同主题的图像(训练集),然后从中提取特征。下一步包括训练系统进行分类。遵循相同的体系结构,每个人考虑一个样本用于训练目的和分类目的,使用类似PSO的元启发式算法。粒子群优化算法是一种能够对非线性和多维问题进行优化的算法,通常在需要最小参数化的情况下有效地得到很好的解。该算法的基本概念是创建一群粒子,这些粒子可以在问题空间周围的空间中移动,寻找它们的目标,并通过适应度函数给出最适合它们需求的地方。OSPP人脸识别算法是基于粒子群算法的。如果我们将每个主体的中性图像视为一个粒子,则每个粒子具有特定的方向模式(方向模式已在所提出的模型中讨论)。在每次迭代中,每个粒子都根据代价函数向最优解移动。经过一定次数的迭代后,具有最佳代价函数的粒子将成为最优点(解)。选择粒子群算法,根据相对于查询图像的最小L2距离,找出基与变异的最优组合。粒子在搜索空间中随机分散。在寻找最优值的过程中,粒子平衡了遵循值梯度和随机探索的目标。随着时间的推移,它们开始聚集在最优值的一般区域。最后,粒子收敛到概念中的最优值。在扩展的耶鲁人脸数据库上进行了实验,验证了该算法的有效性。2材料和方法OSPP问题准确率通常与人脸识别所采集的训练样本数量成正比。“每个人一个样本”(OSPP)问题关注的是仅使用一个训练样本来识别一个人。单个样本的面部识别减少了收集训练数据所需的劳动,并使一些只有单个样本可用的应用成为可能。根据OSPP中使用的特征,问题可以分为三个部分:•整体方法:这些方法使用整个人脸图像作为输入来识别人脸。这些方法面临的主要挑战是如何解决极小样本问题。如主成分分析(PCA)的扩展,它的投影丰富了人脸图像。(PC) 2a:二维PCA[2]•局部方法:这些方法使用局部面部特征进行识别。在决定如何将全局对抗信息纳入局部人脸模型时,应注意。如DCP使用OSPP人脸识别使用元启发式算法DOI: 10.9790/0661-1903036165 www.iosrjournals.org 62 |页面方向角点(DCP)特征识别图匹配方法[3-6]局部概率子空间局部概率子空间方法神经网络方法基于SOM学习的识别隐马尔可夫模型HMM方法混合方法:这些方法使用局部和整体特征来识别人脸。 耶鲁大学面部数据库B包括39个受试者[YealB01至YealB39],其中每个受试者包括
{"title":"OSPP Face Recognition Using Meta-Heuristic Algorithm","authors":"Syed ArshiRahaman","doi":"10.9790/0661-1903036165","DOIUrl":"https://doi.org/10.9790/0661-1903036165","url":null,"abstract":"Face recognition has drawn dramatic attention due to the advancement of pattern recognition technologies. Face recognition systems have reached a level of maturity under certain conditions but still the performance of face recognition algorithms are easily affected by external and internal variations. Thus many well-known algorithms have been proposed to overcome these challenging problems. Here we are trying to use one sample face image of individual for training the whole system which will not only reduce labouring effort for the collection and also reduce cost for storing and processing them. One sample per person face recognition (OSPP) is considered as a challenging problem in face recognition community and lack of samples leads to performance deterioration. Here face recognition is performed by application of the swarm optimization algorithms [12] . It was found out that the underlying foraging principle and the swarm optimization can be integrated into evolutionary computational algorithms to provide a better search strategy for finding optimal feature vectors for face recognition. Finally, it is believed that the particle swarm optimization may be useful for the development of face recognition system. A meta-heuristic algorithm PSO is used that makes few or no assumptions about the problem being optimized and can search very large spaces of candidate solutions and also used for classifying purpose. Keywords: One sample per person, particle swarm optimization, meta-heuristic algorithm, face recognition, intra-class variety model \u2028 I. Introduction The fundamental task of face recognition technology is to recognize a human face. Here we consider the images (training set) of different subject and then extract the features from them. the next step includes training the system for classification purpose. The same architecture is followed and one sample per person is considered for the training purpose and for classification purpose Meta-heuristic algorithm like PSO is used. Particle Swarm Optimisation is an algorithm capable of optimising a nonlinear and multidimensional problem which usually reaches good solutions efficiently while requiring minimal parameterisation. The basic concept of the algorithm is to create a swarm of particles which could move in the space around the problem space searching for their goal, the place which best suits their needs given by a fitness function. OSPP face recognition algorithm is based on PSO. If we consider a neutral image of each subject as a particle, each particle has a specific mode of direction (mode of direction has been discus in proposed model). In each iteration every particle moves towards optimal solution based on the cost function. after a specific amount of iterations, the particle holding best cost function will be the optimal point (solution). Particle swarm optimisation is chosen to find out the optimum combination of the basis and variety in terms of the minimum L2 distance relative to the ","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74854497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Integrity Verification in Cloud Computing 云计算中的数据完整性验证
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903052327
G. Gupta
Cloud computing is recognized as a hottest technology which has a significant impact on IT field in the nearby future. Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. That means customers pay providers based on usage. Data Integrity is the major issue in cloud computing. To provide the integrity various methods have been proposed by the researchers. In this paper we will proposed a model which will provide the data integrity using Elgamal Algorithm and SHA-2 Algorithm. The Proposed model shows that the data which is uploaded on cloud is secured if the hash key matches with the local keys which are stored on the system.
云计算是公认的最热门的技术,在不久的将来将对IT领域产生重大影响。云计算是一种基于互联网的计算。它为组织提供服务,如存储、应用程序和服务器。云计算是按需付费的服务。这意味着用户根据使用情况向提供商付费。数据完整性是云计算中的主要问题。为了提供完整性,研究人员提出了各种方法。在本文中,我们将提出一个使用Elgamal算法和SHA-2算法提供数据完整性的模型。该模型表明,如果哈希密钥与存储在系统上的本地密钥匹配,则上传到云上的数据是安全的。
{"title":"Data Integrity Verification in Cloud Computing","authors":"G. Gupta","doi":"10.9790/0661-1903052327","DOIUrl":"https://doi.org/10.9790/0661-1903052327","url":null,"abstract":"Cloud computing is recognized as a hottest technology which has a significant impact on IT field in the nearby future. Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. That means customers pay providers based on usage. Data Integrity is the major issue in cloud computing. To provide the integrity various methods have been proposed by the researchers. In this paper we will proposed a model which will provide the data integrity using Elgamal Algorithm and SHA-2 Algorithm. The Proposed model shows that the data which is uploaded on cloud is secured if the hash key matches with the local keys which are stored on the system.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86462176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document Clustering Using Divisive Hierarchical Bisecting Min Max Clustering Algorithm 基于分割分层平分最小最大聚类算法的文档聚类
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903066670
V. Kamat, Terence Johnson, Rudresh Chodankar, Rama Harmalkar, G. Naik, Prajyot Narulkar
Document clustering is a process of grouping data object having similar properties. Bisecting kmeans is a top down clustering approach wherein all the documents are considered as single cluster. That cluster is then partitioned into two sub-clusters using k-means clustering algorithm, so k is considered as 2. Sum of square errors (SSE) of both the clusters are calculated. The cluster which has SSE greater, that cluster is split. This process is repeated until the desired number of clusters are obtained. Divisive Hierarchical Bisecting Min–Max Clustering Algorithm is similar to bisecting k-means clustering algorithm with a slight modification. To obtain a certain number of clusters. The main cluster is divided into two clusters using Min-Max algorithm. A cluster is selected in order to split it furthers. This process is repeated until the desired number of clusters are obtained. Divisive Hierarchical Bisecting Min–Max Clustering Algorithm is similar to bisecting k-means clustering algorithm with a slight modification. To obtain a certain number of clusters. The main cluster is divided into two clusters using Min-Max algorithm. A cluster is selected in order to split it furthers. This process is repeated until desired numbers of clusters are obtained.
文档聚类是对具有相似属性的数据对象进行分组的过程。平分kmeans是一种自顶向下的聚类方法,其中所有文档都被视为单个聚类。然后使用k-means聚类算法将该聚类划分为两个子聚类,因此将k视为2。计算两类聚类的误差平方和(SSE)。SSE更大的集群将被分割。重复这个过程,直到获得所需的簇数。分阶等分Min-Max聚类算法类似于等分k-means聚类算法,只是做了一些修改。获取一定数量的簇。采用Min-Max算法将主聚类划分为两个聚类。选择一个集群是为了进一步拆分它。重复这个过程,直到获得所需的簇数。分阶等分Min-Max聚类算法类似于等分k-means聚类算法,只是做了一些修改。获取一定数量的簇。采用Min-Max算法将主聚类划分为两个聚类。选择一个集群是为了进一步拆分它。重复这个过程,直到获得所需的簇数。
{"title":"Document Clustering Using Divisive Hierarchical Bisecting Min Max Clustering Algorithm","authors":"V. Kamat, Terence Johnson, Rudresh Chodankar, Rama Harmalkar, G. Naik, Prajyot Narulkar","doi":"10.9790/0661-1903066670","DOIUrl":"https://doi.org/10.9790/0661-1903066670","url":null,"abstract":"Document clustering is a process of grouping data object having similar properties. Bisecting kmeans is a top down clustering approach wherein all the documents are considered as single cluster. That cluster is then partitioned into two sub-clusters using k-means clustering algorithm, so k is considered as 2. Sum of square errors (SSE) of both the clusters are calculated. The cluster which has SSE greater, that cluster is split. This process is repeated until the desired number of clusters are obtained. Divisive Hierarchical Bisecting Min–Max Clustering Algorithm is similar to bisecting k-means clustering algorithm with a slight modification. To obtain a certain number of clusters. The main cluster is divided into two clusters using Min-Max algorithm. A cluster is selected in order to split it furthers. This process is repeated until the desired number of clusters are obtained. Divisive Hierarchical Bisecting Min–Max Clustering Algorithm is similar to bisecting k-means clustering algorithm with a slight modification. To obtain a certain number of clusters. The main cluster is divided into two clusters using Min-Max algorithm. A cluster is selected in order to split it furthers. This process is repeated until desired numbers of clusters are obtained.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74284579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Adaptive Approach for Congestion Control In Wireless Sensor Networks 无线传感器网络中自适应拥塞控制方法的性能分析
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903047178
S. Kumari, Dr.C.S. Lamba, Ajay Kumar
{"title":"Performance Analysis of Adaptive Approach for Congestion Control In Wireless Sensor Networks","authors":"S. Kumari, Dr.C.S. Lamba, Ajay Kumar","doi":"10.9790/0661-1903047178","DOIUrl":"https://doi.org/10.9790/0661-1903047178","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87976183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptanalysis and Further Improvement of a Certificateless Aggregate Signature Scheme 一种无证书聚合签名方案的密码分析及进一步改进
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903067175
Pankaj Kumar, Vishnu Sharma, Vinod Kumar, Ankush Kumar
Certificateless aggregate signature reduces nsignatures on n distinct messages from n distinct users into a compact single length signature. Recently Deng et al proposed CLAS Scheme which is an improvement of Hou et al scheme and claims that their scheme is secure against type I type II adversary but unfortunately it is found insecure by against the“Honest but Curious” attack by adversary II. In this paper, we demonstrate that Deng et al proposed CLAS scheme is insecure against type II adversary and suggest an improved CLAS scheme.
无证书聚合签名将来自n个不同用户的n个不同消息的n个不同签名减少为一个紧凑的单长度签名。最近Deng等人提出了CLAS方案,这是对Hou等人方案的改进,并声称他们的方案对I型II型对手是安全的,但不幸的是,面对对手II的“诚实但好奇”攻击,它被发现是不安全的。在本文中,我们证明了Deng等人提出的CLAS方案对II型对手是不安全的,并提出了一种改进的CLAS方案。
{"title":"Cryptanalysis and Further Improvement of a Certificateless Aggregate Signature Scheme","authors":"Pankaj Kumar, Vishnu Sharma, Vinod Kumar, Ankush Kumar","doi":"10.9790/0661-1903067175","DOIUrl":"https://doi.org/10.9790/0661-1903067175","url":null,"abstract":"Certificateless aggregate signature reduces nsignatures on n distinct messages from n distinct users into a compact single length signature. Recently Deng et al proposed CLAS Scheme which is an improvement of Hou et al scheme and claims that their scheme is secure against type I type II adversary but unfortunately it is found insecure by against the“Honest but Curious” attack by adversary II. In this paper, we demonstrate that Deng et al proposed CLAS scheme is insecure against type II adversary and suggest an improved CLAS scheme.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83339858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lossy Image Compression Using Wavelet Transform, Polynomial Prediction And Block Truncation Coding 基于小波变换、多项式预测和块截断编码的有损图像压缩
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904013438
G. AL-Khafaji, Rafaa I. Yahya
{"title":"Lossy Image Compression Using Wavelet Transform, Polynomial Prediction And Block Truncation Coding","authors":"G. AL-Khafaji, Rafaa I. Yahya","doi":"10.9790/0661-1904013438","DOIUrl":"https://doi.org/10.9790/0661-1904013438","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84026865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparison between Adaptive and Conventional RBFNN Based Approach for Short-Term Load Forecasting 基于自适应和传统RBFNN的短期负荷预测方法比较
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903043340
Eyad K. Almaita
In this paper, a comparison between novel adaptive Radial Basis Function Neural Networks (RBFNN) algorithm and conventional RBFNN is conducted. Both algorithms are used to forecast electrical load demand in Jordan. The Same forecasting features are used in both algorithms. Most of the forecasting models need to be adjusted after a period of time, because the change in the system parameters. The data used in this paper is real data measured by National Electrical Power co. (Jordan). The data is divided into two sets. Set for a training and the other for testing. The results illustrated that the adaptive RBFNN model outperformed conventional RBFNN. The proposed adaptive RBFNN model can enhance the reliability of the conventional RBFNN after embedding the network in the system. This is achieved by introducing an adaptive algorithm that allows the change of the weights of the RBFNN after the training process is completed, which will eliminate the need to retrain the RBFNN model again.
本文对新型自适应径向基函数神经网络(RBFNN)算法与传统的RBFNN算法进行了比较。这两种算法都用于预测约旦的电力负荷需求。两种算法使用了相同的预测特征。由于系统参数的变化,大多数预测模型需要在一段时间后进行调整。本文所用数据为约旦国家电力公司实测数据。数据被分成两组。一个用于培训,另一个用于测试。结果表明,自适应RBFNN模型优于传统的RBFNN。提出的自适应RBFNN模型在将网络嵌入系统后,可以提高传统RBFNN的可靠性。这是通过引入一种自适应算法来实现的,该算法允许在训练过程完成后改变RBFNN的权重,这将消除再次训练RBFNN模型的需要。
{"title":"Comparison between Adaptive and Conventional RBFNN Based Approach for Short-Term Load Forecasting","authors":"Eyad K. Almaita","doi":"10.9790/0661-1903043340","DOIUrl":"https://doi.org/10.9790/0661-1903043340","url":null,"abstract":"In this paper, a comparison between novel adaptive Radial Basis Function Neural Networks (RBFNN) algorithm and conventional RBFNN is conducted. Both algorithms are used to forecast electrical load demand in Jordan. The Same forecasting features are used in both algorithms. Most of the forecasting models need to be adjusted after a period of time, because the change in the system parameters. The data used in this paper is real data measured by National Electrical Power co. (Jordan). The data is divided into two sets. Set for a training and the other for testing. The results illustrated that the adaptive RBFNN model outperformed conventional RBFNN. The proposed adaptive RBFNN model can enhance the reliability of the conventional RBFNN after embedding the network in the system. This is achieved by introducing an adaptive algorithm that allows the change of the weights of the RBFNN after the training process is completed, which will eliminate the need to retrain the RBFNN model again.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86544676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Statistical Process Control of a Calcite Grinding Plant Using Total Color Difference Parameter (ΔE) 基于总色差参数的方解石磨矿模糊统计过程控制(ΔE)
Pub Date : 2017-05-01 DOI: 10.9790/3021-0705010722
M. Uçurum
Statistical process control (SPC) is one of the important approaches used in quality management. SPC can be applied in plants to obtain good quality and high standard products that have become very popular in many industries. Fuzzy process capability analysis by using X-R control charts gives more realistic results, developed with fuzzy theory. Fuzzy control charts are more sensitive than SPC. Therefore, fuzzy control charts lead to producing better-quality products. In this study, total color difference parameter (ΔE) was studied using fuzzy observation on a calcite grinding plant products. For this purpose, color parameters of the grinding plant products were evaluated using triangular fuzzy number (TFN) and fuzzy process capability indices (PCIs). The results show that the mill plant seems to be under control. Therefore, on a randomly selected sample used in the fuzzy statistical process control work was chosen and other color parameters such as whiteness index (WI), saturation index (SI), hue angle (H), browning index (BI) and yellowness index (YI) and particle size properties, XRF, XRD, FTIR, TGA-DTA and SEM were then determined on the calcite sample.
统计过程控制(SPC)是质量管理的重要手段之一。SPC可以应用于工厂,以获得高质量和高标准的产品,在许多行业中已经非常流行。模糊过程能力分析是在模糊理论的基础上发展起来的,用X-R控制图进行模糊过程能力分析的结果更为真实。模糊控制图比SPC更敏感。因此,模糊控制图可以生产出质量更好的产品。本研究采用模糊观察法对某方解石磨厂产品的总色差参数(ΔE)进行了研究。为此,采用三角模糊数(TFN)和模糊加工能力指数(PCIs)对磨厂产品的颜色参数进行评价。结果表明,该工厂似乎得到了控制。因此,在模糊统计过程控制工作中随机选取一个样品,并对方解石样品进行XRF、XRD、FTIR、TGA-DTA和SEM等颜色参数的测定,如白度指数(WI)、饱和度指数(SI)、色相角(H)、褐变指数(BI)、黄度指数(YI)和粒度性质等。
{"title":"Fuzzy Statistical Process Control of a Calcite Grinding Plant Using Total Color Difference Parameter (ΔE)","authors":"M. Uçurum","doi":"10.9790/3021-0705010722","DOIUrl":"https://doi.org/10.9790/3021-0705010722","url":null,"abstract":"Statistical process control (SPC) is one of the important approaches used in quality management. SPC can be applied in plants to obtain good quality and high standard products that have become very popular in many industries. Fuzzy process capability analysis by using X-R control charts gives more realistic results, developed with fuzzy theory. Fuzzy control charts are more sensitive than SPC. Therefore, fuzzy control charts lead to producing better-quality products. In this study, total color difference parameter (ΔE) was studied using fuzzy observation on a calcite grinding plant products. For this purpose, color parameters of the grinding plant products were evaluated using triangular fuzzy number (TFN) and fuzzy process capability indices (PCIs). The results show that the mill plant seems to be under control. Therefore, on a randomly selected sample used in the fuzzy statistical process control work was chosen and other color parameters such as whiteness index (WI), saturation index (SI), hue angle (H), browning index (BI) and yellowness index (YI) and particle size properties, XRF, XRD, FTIR, TGA-DTA and SEM were then determined on the calcite sample.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73544413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study On The Effect Of Temperature On Octane Number Rating Of Reformate From Nigerian Heavy Treated Naphtha Samples. 温度对尼日利亚重质石脑油重整油辛烷值影响的比较研究。
Pub Date : 2017-05-01 DOI: 10.9790/3021-0705013641
I. Otaraku, I. Egun
{"title":"Comparative Study On The Effect Of Temperature On Octane Number Rating Of Reformate From Nigerian Heavy Treated Naphtha Samples.","authors":"I. Otaraku, I. Egun","doi":"10.9790/3021-0705013641","DOIUrl":"https://doi.org/10.9790/3021-0705013641","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79992048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Online Judge in Cloud Environment 云环境下的安全在线裁判
Pub Date : 2017-05-01 DOI: 10.9790/0661-190302102106
Himanshu Sharma
Cloud Computing is a rapidly developing technology in the IT Sector. It provides an on demand service to its users using the Internet. It provides the users with the resources as per their demand and also enables the users to pay as per their usage of resources. The users can access the cloud anytime using the Internet. Such features eliminate the requirement of carrying documentation for the users as the cloud can be accessed globally and remotely by the user. But, this introduces the possibility of security breaches or intruder attacks while the user interacts with the cloud database. In this paper, some of the security concerns while using a Cloud based Online Judge will be addressed using new approaches. An Online Judge is a system which takes a code, compiles it, checks for compilation errors, and executes the code by giving it some hidden inputs and capturing the output produced after it. It checks for runtime errors and finally matches the output with the expected output from the solution. The Online Judge system is very important for grading of coding assignments and for programming contests as it can include the constraints on the solutions for source code limit and various resources such as time and space requirements. It also removes the subjective nature in the grading system of coding assignments. The Online judge faces various security issues at authorization level and access rights of users. There is also possibility of a user running a malicious code on the judge thus harming the server or other resources. In this paper we address such issues.
云计算是IT领域发展迅速的一项技术。它通过互联网为用户提供随需应变的服务。它可以根据用户的需求为用户提供资源,也可以根据用户对资源的使用情况付费。用户可以通过互联网随时访问云。这些特性消除了用户携带文档的需求,因为用户可以在全局和远程访问云。但是,这在用户与云数据库交互时引入了安全漏洞或入侵者攻击的可能性。在本文中,使用基于云的在线裁判时的一些安全问题将使用新的方法来解决。Online Judge是一个系统,它接受代码,编译代码,检查编译错误,并通过给代码一些隐藏的输入和捕获之后产生的输出来执行代码。它检查运行时错误,并最终将输出与解决方案的预期输出相匹配。Online Judge系统对于编码作业的评分和编程竞赛非常重要,因为它可以包含对源代码限制和各种资源(如时间和空间要求)的解决方案的约束。它也消除了编码作业评分制度的主观性。在线法官在授权级别和用户访问权限方面面临着各种安全问题。用户也有可能在法官上运行恶意代码,从而损害服务器或其他资源。在本文中,我们将讨论这些问题。
{"title":"Secure Online Judge in Cloud Environment","authors":"Himanshu Sharma","doi":"10.9790/0661-190302102106","DOIUrl":"https://doi.org/10.9790/0661-190302102106","url":null,"abstract":"Cloud Computing is a rapidly developing technology in the IT Sector. It provides an on demand service to its users using the Internet. It provides the users with the resources as per their demand and also enables the users to pay as per their usage of resources. The users can access the cloud anytime using the Internet. Such features eliminate the requirement of carrying documentation for the users as the cloud can be accessed globally and remotely by the user. But, this introduces the possibility of security breaches or intruder attacks while the user interacts with the cloud database. In this paper, some of the security concerns while using a Cloud based Online Judge will be addressed using new approaches. An Online Judge is a system which takes a code, compiles it, checks for compilation errors, and executes the code by giving it some hidden inputs and capturing the output produced after it. It checks for runtime errors and finally matches the output with the expected output from the solution. The Online Judge system is very important for grading of coding assignments and for programming contests as it can include the constraints on the solutions for source code limit and various resources such as time and space requirements. It also removes the subjective nature in the grading system of coding assignments. The Online judge faces various security issues at authorization level and access rights of users. There is also possibility of a user running a malicious code on the judge thus harming the server or other resources. In this paper we address such issues.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81097152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IOSR journal of computer engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1