2019 First International Conference of Intelligent Computing and Engineering (ICOICE)最新文献

筛选
英文 中文
Recent Progress of Named Entity Recognition over the Most Popular Datasets 基于最流行数据集的命名实体识别研究进展
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035170
M. Albared, Marc Gallofré Ocaña, Abdullah S. Ghareb, Tareq Al-Moslmi
{"title":"Recent Progress of Named Entity Recognition over the Most Popular Datasets","authors":"M. Albared, Marc Gallofré Ocaña, Abdullah S. Ghareb, Tareq Al-Moslmi","doi":"10.1109/ICOICE48418.2019.9035170","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035170","url":null,"abstract":"Named entity recognition (NER) has been considered as an initial step for many applications and tasks such as information retrieval and extraction, question answering, topic modelling, open information extraction, knowledge graph construction, and so forth. Therefore, NER has been receiving increasing attention in the research community. Despite the abundant availability of previous studies on NER, few of them have been applied for more than one dataset. Hence, one system might outperform other systems in one dataset and fail to do in another one. The previous NER surveys have mostly focused on reporting the NER systems without providing a clear comparison for all systems proposed for each dataset. In this paper, we will track the NER performance progress for the most commonly used datasets in NER and report the most recent best systems that have been proposed for each dataset during the last few years.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114846187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bidirectional Feature Transfer for Cross-Domain Sentiment Analysis 面向跨域情感分析的双向特征转移
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035194
Tareq Al-Moslmi, M. Albared, Adel Al-Shabi, S. Abdullah, N. Omar
{"title":"Bidirectional Feature Transfer for Cross-Domain Sentiment Analysis","authors":"Tareq Al-Moslmi, M. Albared, Adel Al-Shabi, S. Abdullah, N. Omar","doi":"10.1109/ICOICE48418.2019.9035194","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035194","url":null,"abstract":"With the evolution of user-based web content, people naturally and freely share their opinion in numerous domains. However, this would result in a massive cost to label training data for many domains and prevent us from taking advantage of the shared information across domains. As a result, cross-domain sentiment analysis is a challenging NLP task due to feature and polarity divergence. The main aim of this work is to automatically create a bidirectional thesaurus which could be used to transfer feature vectors of the source and target domains. This paper aims at designing an algorithm of feature transfer to select and transfer the informative and representative features between the source and target domains. Furthermore, several experiments were conducted in order to evaluate the proposed model, and the results were compared to similar known baseline methods.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126996358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Breast Tumor Diagnosis using Machine Learning with Microwave Probes 微波探针机器学习诊断乳腺肿瘤
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035150
M. Aldhaeebi, Saeed M. Bamatraf, O. Ramahi, Saeed A. Binajjaj
{"title":"Breast Tumor Diagnosis using Machine Learning with Microwave Probes","authors":"M. Aldhaeebi, Saeed M. Bamatraf, O. Ramahi, Saeed A. Binajjaj","doi":"10.1109/ICOICE48418.2019.9035150","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035150","url":null,"abstract":"In this paper, we propose a detection technique that combines a machine learning modality with microwave near-field probes for breast tumor diagnosis. The proposed technique uses a highly sensitive microwave probe to identify differences between normal and abnormal breasts. Distinguishing between healthy and non-healthy breast based on estimating the differences in the reflection coefficient of the probe response for both normal and abnormal cases. Machine learning techniques are applied to accentuate the variance in the sensor's responses for both healthy and tumorous cases. We investigated the detection of breast tumors if a woman has different breast sizes and she has an abnormality in one of them. We show that for two different breast phantom sizes, one with a tumor and one without, the sensor provides reliable detection. Simulation results of ninety different-size realistic breast phantoms (45 healthy breasts and 45 tumorous breasts) show that the proposed system provides highly encouraging reliable detection probability.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shallow vs. Deep Image Representations: A comparative Study Applied for the Problem of Generic Object Recognition 浅与深图像表示:用于通用对象识别问题的比较研究
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035136
Yasser M. Abdullah, Mussa M. Ahmed
{"title":"Shallow vs. Deep Image Representations: A comparative Study Applied for the Problem of Generic Object Recognition","authors":"Yasser M. Abdullah, Mussa M. Ahmed","doi":"10.1109/ICOICE48418.2019.9035136","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035136","url":null,"abstract":"The traditional approach for solving the object recognition problem requires image representations to be first extracted and then fed to a learning model such as an SVM to learn the classification decision boundary. These representations are handcrafted and heavily engineered by running the object image through a sequence of pipeline processes that require a good prior knowledge of the problem domain. However, in end-to-end deep learning models, image representations along with classification decision boundary are all learnt directly from the raw image pixels requiring no prior knowledge of the problem domain. Moreover, the deep model features are more discriminative than handcrafted ones since the model is trained to discriminate between features belonging to different classes. The purpose of this study is six fold: (1) review the literature of the pipeline processes used in the previous state-of-the-art codebook model approach for tackling the problem of generic object recognition, (2) Introduce several enhancements in the local feature extraction and normalization processes of the recognition pipeline, (3) compare the enhancements proposed to different encoding methods and contrast them to previous results, (4) experiment with current state-of-the-art deep model architectures used for object recognition, (5) compare between deep representations extracted from the deep learning model and shallow representations handcrafted by an expert and produced through the recognition pipeline, and finally, (6) improve the results further by combining multiple different deep learning models into an ensemble and taking the maximum posterior probability.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128133804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Implementation of LED Block Cipher on FPGA LED分组密码在FPGA上的高效实现
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035193
M. Al-Shatari, F. Hussin, A. Aziz, G. Witjaksono, M. S. Rohmad, Xuan-Tu Tran
{"title":"An Efficient Implementation of LED Block Cipher on FPGA","authors":"M. Al-Shatari, F. Hussin, A. Aziz, G. Witjaksono, M. S. Rohmad, Xuan-Tu Tran","doi":"10.1109/ICOICE48418.2019.9035193","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035193","url":null,"abstract":"LED is an ultra-lightweight block cipher targeting resource-constrained devices. The current hardware architectures of this cipher utilize large logic area, operate in low frequencies and have low throughput. To improve the trade-offs between area utilization and performance, an iterative round-based architecture of LED block cipher is implemented in this paper. LED algorithm is available in 64-bit and 128-bit key sizes. In this paper, the focus is on the 64-bit key with 64-bit block size. This algorithm is implemented on various Field Programmable Gate Array (FPGA) devices. The design is verified on several Altera and Xilinx devices using Altera Quartus II, ModelSim and Xilinx ISE simulators. Both low-cost and high-end FPGA devices were targeted. Tradeoffs between area and performance were considered, with the optimization for performance. The throughput and maximum operating frequency are benchmarked with the existing literature and better performance is achieved. The results show large improvements in maximum operating frequency and throughput as well as reduction in area utilization compared to recent designs of round-based LED block cipher.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128160005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Rain-streaks Detection and Removal In Single Image Using Curvelet Transform 基于曲线变换的单幅图像雨纹检测与去除
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035161
A. A. Bahashwan, P. Ehkan, Syed Alwee Aljunid Syed Junid, A. Safar, Mazen Abdullah Bahashwan, Adel Hafeezallah
{"title":"Rain-streaks Detection and Removal In Single Image Using Curvelet Transform","authors":"A. A. Bahashwan, P. Ehkan, Syed Alwee Aljunid Syed Junid, A. Safar, Mazen Abdullah Bahashwan, Adel Hafeezallah","doi":"10.1109/ICOICE48418.2019.9035161","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035161","url":null,"abstract":"This study implements a new way to address the issue of rain streaks detection and elimination from a single picture based on the transform of Curvelet. This approach depends on a decomposing of the rainy image into different scales and sub-bands frequencies by using the curvelet transform. Features have been extracted from each sub-band frequency and the neural network will classify these features into “rain” or “non-rain” signatures. The reconstructed image is obtained without the sub-bands that have the rain signature. The findings from the experiments indicate that the proposed approach improves the visualizing quality as well as PSNR and outperforms previous rain removal algorithms.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129633634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Steganography Based on LSB Matching and Image Enlargement 基于LSB匹配和图像放大的图像隐写
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035172
Naziha Al-Aidroos, H. Bahamish
{"title":"Image Steganography Based on LSB Matching and Image Enlargement","authors":"Naziha Al-Aidroos, H. Bahamish","doi":"10.1109/ICOICE48418.2019.9035172","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035172","url":null,"abstract":"Steganography plays a main role in data security field. It aims to cover important data within a cover medium such that the data existence remains confidential. The secret data is hidden in such a way that no one knows about it except the sender or the intended recipient. The least significant bit (LSB) substitution method is the most popular image steganography method for hiding a secret data in an image with high payload, while the human visual system (HVS) cannot notice any distortion in the resulted stego image. The proposed scheme employs the LSB matching method as a fundamental stage besides using the principle of an image enlargement. Image enlargement is used to extend the stego image dimensions, adding this step will distribute the secret data over the resulting image. Experimental results showed that the proposed method significantly had a high capacity with preserve image quality. Moreover, the secret data was embedded in non-consecutive pixel positions, which provides a high diffusion and lead to resist the image steganalysis effectively.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124119781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ubiquitous Computing Environment: literature review 普适计算环境:文献综述
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035157
Sarah Abdalrahman Alshqaqi, Ammar T. Zahary, M. M. Zayed
{"title":"Ubiquitous Computing Environment: literature review","authors":"Sarah Abdalrahman Alshqaqi, Ammar T. Zahary, M. M. Zayed","doi":"10.1109/ICOICE48418.2019.9035157","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035157","url":null,"abstract":"During the fast improvement of computing technology worldwide, the new intelligent concept of Ubiquitous Computing (Ubicomp) has appeared as a promising field that cover different areas such as sensors network, artificial intelligence and computer science. Ubicomp is a way to improve the quality of users life by making many computers available and effectively invisible to the user throughout the physical environment. There have been number of studies, research developments and technologies that have emerged in Ubicomp such as the components and fundamental properties of Ubicomp system, context aware systems, wearable systems, Internet of Things technology(IoT) and Things That Think(TTT). However, there is still a lack of understanding of Ubicomp environments and the comprehensive studies in this part are limited. Therefore, this paper aims to show understanding literature review that classify the Ubicomp environments into Pervasive computing, Context-aware system, Internet of things (IoT), Wearable system and Things that think (TTT).","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123889821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deluge Harmony Search Algorithm For Nurse Rostering Problems 护士名册问题的洪水和谐搜索算法
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035163
Mohammed Hadwan, M. Ayob, M. Rassam, Essa A. Hezam
{"title":"Deluge Harmony Search Algorithm For Nurse Rostering Problems","authors":"Mohammed Hadwan, M. Ayob, M. Rassam, Essa A. Hezam","doi":"10.1109/ICOICE48418.2019.9035163","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035163","url":null,"abstract":"Harmony search algorithm (HSA) is one of the relatively new metaheuristic algorithms that classified under population-based search algorithms. Based on literature, hybridizing local-based searching algorithms with population-based algorithms can improve the performance of hybridized algorithms. This research is an extension to our previous work that focus on solving Nurse Rostering Problems (NRP) using hybrid metaheuristic algorithms. One of the improved version of HSA is enhanced harmony search algorithm (EHSA) where it overcomes some of the weaknesses of basic HSA. Slow convergence is noticed in EHSA which encourage us to hybridize it with other metaheuristic algorithms to improve its performance. In this research, EHSA is hybridized with great deluge algorithm (GD) and called Deluged harmony search algorithm (DHSA). DHSA then compared to CHSA (the hybridization of EHSA with Hill climbing (HC)) which developed earlier. To strike the balance between exploration and exploitation, the exploration stage run using EHSA and the exploitation stage used GD. DHSA is tested to solve a real world NRP problem at National University Malaysia Medical Center (UKMMC). The results show that, DHSA performed much better than CHSA in all instances in terms of solution quality with slightly higher execution time.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122931725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Two-Level Frame Aggregation Scheme Under Unreliable Channel Conditions for IEEE 802.11n WLANs: A Survey IEEE 802.11n无线局域网中信道不可靠条件下的两级帧聚合方案研究
2019 First International Conference of Intelligent Computing and Engineering (ICOICE) Pub Date : 2019-12-01 DOI: 10.1109/ICOICE48418.2019.9035181
Fatoumata Sorra, M. Othman, Fakrul Hakim, Mohamed A. Alrshah, M. Abdullah, Anwar Saif
{"title":"Two-Level Frame Aggregation Scheme Under Unreliable Channel Conditions for IEEE 802.11n WLANs: A Survey","authors":"Fatoumata Sorra, M. Othman, Fakrul Hakim, Mohamed A. Alrshah, M. Abdullah, Anwar Saif","doi":"10.1109/ICOICE48418.2019.9035181","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035181","url":null,"abstract":"Frame Aggregation schemes defined by IEEE 802.11n is the combination of the Aggregate MAC Service Data Unit (A-MSDU) and MAC Protocol Data Unit (A- MPDU). The units are aimed at maximizing Wireless Local Area Networks (WLANs) efficiency at Media Access Control (MAC) level, via the sharing of headers and timing overheads. Moreover, the combination of A-MSDU and A-MPDU is known as Two-level frame aggregation. In spite of their abilities in improving the throughput of MAC Layer, the scheme is still limited by other overheads as a result of aggregation which affects the system performance. Block Acknowledgement (Block ACK) and Frame aggregation were introduced in order to minimize MAC Layer overheads. Still, there are some parameters that affect the aggregation performance, such as aggregate length, sub frame size and channel condition overheads. A-MPDU in other hand minimizes the effect of error condition through sub frame transmission. Therefore, A- MPDU aggregation performances, its limitations, and its promising performances motivated this survey to focus on enhancing Aggregation Mac Protocol Data Unit (eA-MPDU) performance by minimizing the headers overheads of the Two-Level Frame Aggregation Scheme, for the reduction of the channel noise, which by its role will increase the Signal Noise Ratio (SNR) and improve the throughput.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121177396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信