M. Albared, Marc Gallofré Ocaña, Abdullah S. Ghareb, Tareq Al-Moslmi
{"title":"Recent Progress of Named Entity Recognition over the Most Popular Datasets","authors":"M. Albared, Marc Gallofré Ocaña, Abdullah S. Ghareb, Tareq Al-Moslmi","doi":"10.1109/ICOICE48418.2019.9035170","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035170","url":null,"abstract":"Named entity recognition (NER) has been considered as an initial step for many applications and tasks such as information retrieval and extraction, question answering, topic modelling, open information extraction, knowledge graph construction, and so forth. Therefore, NER has been receiving increasing attention in the research community. Despite the abundant availability of previous studies on NER, few of them have been applied for more than one dataset. Hence, one system might outperform other systems in one dataset and fail to do in another one. The previous NER surveys have mostly focused on reporting the NER systems without providing a clear comparison for all systems proposed for each dataset. In this paper, we will track the NER performance progress for the most commonly used datasets in NER and report the most recent best systems that have been proposed for each dataset during the last few years.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114846187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tareq Al-Moslmi, M. Albared, Adel Al-Shabi, S. Abdullah, N. Omar
{"title":"Bidirectional Feature Transfer for Cross-Domain Sentiment Analysis","authors":"Tareq Al-Moslmi, M. Albared, Adel Al-Shabi, S. Abdullah, N. Omar","doi":"10.1109/ICOICE48418.2019.9035194","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035194","url":null,"abstract":"With the evolution of user-based web content, people naturally and freely share their opinion in numerous domains. However, this would result in a massive cost to label training data for many domains and prevent us from taking advantage of the shared information across domains. As a result, cross-domain sentiment analysis is a challenging NLP task due to feature and polarity divergence. The main aim of this work is to automatically create a bidirectional thesaurus which could be used to transfer feature vectors of the source and target domains. This paper aims at designing an algorithm of feature transfer to select and transfer the informative and representative features between the source and target domains. Furthermore, several experiments were conducted in order to evaluate the proposed model, and the results were compared to similar known baseline methods.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126996358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Aldhaeebi, Saeed M. Bamatraf, O. Ramahi, Saeed A. Binajjaj
{"title":"Breast Tumor Diagnosis using Machine Learning with Microwave Probes","authors":"M. Aldhaeebi, Saeed M. Bamatraf, O. Ramahi, Saeed A. Binajjaj","doi":"10.1109/ICOICE48418.2019.9035150","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035150","url":null,"abstract":"In this paper, we propose a detection technique that combines a machine learning modality with microwave near-field probes for breast tumor diagnosis. The proposed technique uses a highly sensitive microwave probe to identify differences between normal and abnormal breasts. Distinguishing between healthy and non-healthy breast based on estimating the differences in the reflection coefficient of the probe response for both normal and abnormal cases. Machine learning techniques are applied to accentuate the variance in the sensor's responses for both healthy and tumorous cases. We investigated the detection of breast tumors if a woman has different breast sizes and she has an abnormality in one of them. We show that for two different breast phantom sizes, one with a tumor and one without, the sensor provides reliable detection. Simulation results of ninety different-size realistic breast phantoms (45 healthy breasts and 45 tumorous breasts) show that the proposed system provides highly encouraging reliable detection probability.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shallow vs. Deep Image Representations: A comparative Study Applied for the Problem of Generic Object Recognition","authors":"Yasser M. Abdullah, Mussa M. Ahmed","doi":"10.1109/ICOICE48418.2019.9035136","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035136","url":null,"abstract":"The traditional approach for solving the object recognition problem requires image representations to be first extracted and then fed to a learning model such as an SVM to learn the classification decision boundary. These representations are handcrafted and heavily engineered by running the object image through a sequence of pipeline processes that require a good prior knowledge of the problem domain. However, in end-to-end deep learning models, image representations along with classification decision boundary are all learnt directly from the raw image pixels requiring no prior knowledge of the problem domain. Moreover, the deep model features are more discriminative than handcrafted ones since the model is trained to discriminate between features belonging to different classes. The purpose of this study is six fold: (1) review the literature of the pipeline processes used in the previous state-of-the-art codebook model approach for tackling the problem of generic object recognition, (2) Introduce several enhancements in the local feature extraction and normalization processes of the recognition pipeline, (3) compare the enhancements proposed to different encoding methods and contrast them to previous results, (4) experiment with current state-of-the-art deep model architectures used for object recognition, (5) compare between deep representations extracted from the deep learning model and shallow representations handcrafted by an expert and produced through the recognition pipeline, and finally, (6) improve the results further by combining multiple different deep learning models into an ensemble and taking the maximum posterior probability.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128133804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Shatari, F. Hussin, A. Aziz, G. Witjaksono, M. S. Rohmad, Xuan-Tu Tran
{"title":"An Efficient Implementation of LED Block Cipher on FPGA","authors":"M. Al-Shatari, F. Hussin, A. Aziz, G. Witjaksono, M. S. Rohmad, Xuan-Tu Tran","doi":"10.1109/ICOICE48418.2019.9035193","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035193","url":null,"abstract":"LED is an ultra-lightweight block cipher targeting resource-constrained devices. The current hardware architectures of this cipher utilize large logic area, operate in low frequencies and have low throughput. To improve the trade-offs between area utilization and performance, an iterative round-based architecture of LED block cipher is implemented in this paper. LED algorithm is available in 64-bit and 128-bit key sizes. In this paper, the focus is on the 64-bit key with 64-bit block size. This algorithm is implemented on various Field Programmable Gate Array (FPGA) devices. The design is verified on several Altera and Xilinx devices using Altera Quartus II, ModelSim and Xilinx ISE simulators. Both low-cost and high-end FPGA devices were targeted. Tradeoffs between area and performance were considered, with the optimization for performance. The throughput and maximum operating frequency are benchmarked with the existing literature and better performance is achieved. The results show large improvements in maximum operating frequency and throughput as well as reduction in area utilization compared to recent designs of round-based LED block cipher.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128160005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. A. Bahashwan, P. Ehkan, Syed Alwee Aljunid Syed Junid, A. Safar, Mazen Abdullah Bahashwan, Adel Hafeezallah
{"title":"Rain-streaks Detection and Removal In Single Image Using Curvelet Transform","authors":"A. A. Bahashwan, P. Ehkan, Syed Alwee Aljunid Syed Junid, A. Safar, Mazen Abdullah Bahashwan, Adel Hafeezallah","doi":"10.1109/ICOICE48418.2019.9035161","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035161","url":null,"abstract":"This study implements a new way to address the issue of rain streaks detection and elimination from a single picture based on the transform of Curvelet. This approach depends on a decomposing of the rainy image into different scales and sub-bands frequencies by using the curvelet transform. Features have been extracted from each sub-band frequency and the neural network will classify these features into “rain” or “non-rain” signatures. The reconstructed image is obtained without the sub-bands that have the rain signature. The findings from the experiments indicate that the proposed approach improves the visualizing quality as well as PSNR and outperforms previous rain removal algorithms.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129633634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Steganography Based on LSB Matching and Image Enlargement","authors":"Naziha Al-Aidroos, H. Bahamish","doi":"10.1109/ICOICE48418.2019.9035172","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035172","url":null,"abstract":"Steganography plays a main role in data security field. It aims to cover important data within a cover medium such that the data existence remains confidential. The secret data is hidden in such a way that no one knows about it except the sender or the intended recipient. The least significant bit (LSB) substitution method is the most popular image steganography method for hiding a secret data in an image with high payload, while the human visual system (HVS) cannot notice any distortion in the resulted stego image. The proposed scheme employs the LSB matching method as a fundamental stage besides using the principle of an image enlargement. Image enlargement is used to extend the stego image dimensions, adding this step will distribute the secret data over the resulting image. Experimental results showed that the proposed method significantly had a high capacity with preserve image quality. Moreover, the secret data was embedded in non-consecutive pixel positions, which provides a high diffusion and lead to resist the image steganalysis effectively.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124119781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarah Abdalrahman Alshqaqi, Ammar T. Zahary, M. M. Zayed
{"title":"Ubiquitous Computing Environment: literature review","authors":"Sarah Abdalrahman Alshqaqi, Ammar T. Zahary, M. M. Zayed","doi":"10.1109/ICOICE48418.2019.9035157","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035157","url":null,"abstract":"During the fast improvement of computing technology worldwide, the new intelligent concept of Ubiquitous Computing (Ubicomp) has appeared as a promising field that cover different areas such as sensors network, artificial intelligence and computer science. Ubicomp is a way to improve the quality of users life by making many computers available and effectively invisible to the user throughout the physical environment. There have been number of studies, research developments and technologies that have emerged in Ubicomp such as the components and fundamental properties of Ubicomp system, context aware systems, wearable systems, Internet of Things technology(IoT) and Things That Think(TTT). However, there is still a lack of understanding of Ubicomp environments and the comprehensive studies in this part are limited. Therefore, this paper aims to show understanding literature review that classify the Ubicomp environments into Pervasive computing, Context-aware system, Internet of things (IoT), Wearable system and Things that think (TTT).","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123889821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Hadwan, M. Ayob, M. Rassam, Essa A. Hezam
{"title":"Deluge Harmony Search Algorithm For Nurse Rostering Problems","authors":"Mohammed Hadwan, M. Ayob, M. Rassam, Essa A. Hezam","doi":"10.1109/ICOICE48418.2019.9035163","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035163","url":null,"abstract":"Harmony search algorithm (HSA) is one of the relatively new metaheuristic algorithms that classified under population-based search algorithms. Based on literature, hybridizing local-based searching algorithms with population-based algorithms can improve the performance of hybridized algorithms. This research is an extension to our previous work that focus on solving Nurse Rostering Problems (NRP) using hybrid metaheuristic algorithms. One of the improved version of HSA is enhanced harmony search algorithm (EHSA) where it overcomes some of the weaknesses of basic HSA. Slow convergence is noticed in EHSA which encourage us to hybridize it with other metaheuristic algorithms to improve its performance. In this research, EHSA is hybridized with great deluge algorithm (GD) and called Deluged harmony search algorithm (DHSA). DHSA then compared to CHSA (the hybridization of EHSA with Hill climbing (HC)) which developed earlier. To strike the balance between exploration and exploitation, the exploration stage run using EHSA and the exploitation stage used GD. DHSA is tested to solve a real world NRP problem at National University Malaysia Medical Center (UKMMC). The results show that, DHSA performed much better than CHSA in all instances in terms of solution quality with slightly higher execution time.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122931725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fatoumata Sorra, M. Othman, Fakrul Hakim, Mohamed A. Alrshah, M. Abdullah, Anwar Saif
{"title":"Two-Level Frame Aggregation Scheme Under Unreliable Channel Conditions for IEEE 802.11n WLANs: A Survey","authors":"Fatoumata Sorra, M. Othman, Fakrul Hakim, Mohamed A. Alrshah, M. Abdullah, Anwar Saif","doi":"10.1109/ICOICE48418.2019.9035181","DOIUrl":"https://doi.org/10.1109/ICOICE48418.2019.9035181","url":null,"abstract":"Frame Aggregation schemes defined by IEEE 802.11n is the combination of the Aggregate MAC Service Data Unit (A-MSDU) and MAC Protocol Data Unit (A- MPDU). The units are aimed at maximizing Wireless Local Area Networks (WLANs) efficiency at Media Access Control (MAC) level, via the sharing of headers and timing overheads. Moreover, the combination of A-MSDU and A-MPDU is known as Two-level frame aggregation. In spite of their abilities in improving the throughput of MAC Layer, the scheme is still limited by other overheads as a result of aggregation which affects the system performance. Block Acknowledgement (Block ACK) and Frame aggregation were introduced in order to minimize MAC Layer overheads. Still, there are some parameters that affect the aggregation performance, such as aggregate length, sub frame size and channel condition overheads. A-MPDU in other hand minimizes the effect of error condition through sub frame transmission. Therefore, A- MPDU aggregation performances, its limitations, and its promising performances motivated this survey to focus on enhancing Aggregation Mac Protocol Data Unit (eA-MPDU) performance by minimizing the headers overheads of the Two-Level Frame Aggregation Scheme, for the reduction of the channel noise, which by its role will increase the Signal Noise Ratio (SNR) and improve the throughput.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121177396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}