2022 5th International Conference on Computing and Informatics (ICCI)最新文献

筛选
英文 中文
An Optimized Arabic Sarcasm Detection in Tweets using Artificial Neural Networks 利用人工神经网络优化推文中的阿拉伯语讽刺检测
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756102
Ahmed Omar, A. Hassanien
{"title":"An Optimized Arabic Sarcasm Detection in Tweets using Artificial Neural Networks","authors":"Ahmed Omar, A. Hassanien","doi":"10.1109/icci54321.2022.9756102","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756102","url":null,"abstract":"This paper presents an optimized Arabic sarcasm classification model using artificial neural networks in conjunction with particle swarm optimization. Artificial Neural Networks (ANNs) are used to learn the extracted feature representation of a given text. Term frequency with inverse document frequency (TFIDF) is adapted for feature extraction and text transformation into numerical values. Particle Swarm Optimization (PSO) selects the most relevant features to optimize classification performance. Experiments show that the classification accuracy is optimized after using PSO from 82.12% to 86.85%.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Cryptography: A Systematic Review 图像密码学:系统综述
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756107
Mahmoud Magdy, N. Ghali, S. Ghoniemy, K. Hosny
{"title":"Image Cryptography: A Systematic Review","authors":"Mahmoud Magdy, N. Ghali, S. Ghoniemy, K. Hosny","doi":"10.1109/icci54321.2022.9756107","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756107","url":null,"abstract":"In recent years due to the observed growth of online multimedia applications, communication, and computer technologies, image security has been an essential demand. This survey paper summarizes existing image security approaches, their merits and demerits, and the area of future work. Along with the survey, the authors present a brief discussion of different multimedia data, as well as the attacks that affect the image transmission, general concepts of multimedia security, primary requirements, and recent applications. Multimedia security is classified into cryptography and data hiding techniques, including digital watermarking, steganography, and hybridization. Recent research work for cryptography techniques is discussed in the following sections.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129715436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eye-Controlled Wheelchair Eye-Controlled轮椅
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756116
M. Tharwat, Ghada Shalabi, Leena Saleh, Nora Badawoud, Raghad Alfalati
{"title":"Eye-Controlled Wheelchair","authors":"M. Tharwat, Ghada Shalabi, Leena Saleh, Nora Badawoud, Raghad Alfalati","doi":"10.1109/icci54321.2022.9756116","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756116","url":null,"abstract":"A powered wheelchair is a mobility device for moderate or severe physical disabilities or chronic disorders. Many patients with Amyotrophic Lateral Sclerosis and quadriplegia have to depend on others to move their wheelchairs. Although assistive mobility devices, such as manual and electrical wheelchairs, exist, these options do not suit all individuals who suffer from activity limitations. This project aims to use information technology to assist people with disabilities to move their wheelchairs independently in order to enjoy their lives and integrate into their community. The proposed hands-free wheelchair is based on an eye-controlled system. Different measurement systems for the eye trackers have been evolved, such as search coil, electrooculography, video-oculography, and infrared oculography systems. Usually, the eye-tracking systems add the techniques of eyeball tracking with hardware equipment and software. The movement of eyeballs is used to control the wheelchair movements instead of hands. The infrared eye-tracking system was adopted in this project for several advantages. To achieve this goal, a system consisting of a head-mounted eye-tracker, a powered wheelchair, and an obstacles detector has been designed and tested. The head-mounted eye-tracking system uses infrared light emitters and sensors in gaze detection. By measuring the intensity of the infrared light reflected from the corneal. The changes of the reflected intensity can be translated into signals to determine an eye position. After the gaze direction is determined, it is used to steer the wheelchair accordingly. Furthermore, the chair includes safety features that implement proximity sensors to prevent crashing into objects.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129905465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Bee colony is the most suitable with multi-query optimization? 为什么蜂群最适合多查询优化?
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756086
Sayed AbdelGaber, M. Abdel-Fattah, S. Nasr
{"title":"Why Bee colony is the most suitable with multi-query optimization?","authors":"Sayed AbdelGaber, M. Abdel-Fattah, S. Nasr","doi":"10.1109/icci54321.2022.9756086","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756086","url":null,"abstract":"This paper presents the comparison results on the performance of the swarm algorithms with Multi-Query Optimization (MQO). First the paper discusses query optimization process and the challenges appear when applied on multi query. Then the paper tackles swarm algorithms and how did they confront these challenges and achieve good results. Finally, proved that Artificial Bee Colony (ABC) algorithm achieves the best results in time and performance.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Fixed-Point Hardware Accelerator of Convolutional Neural Network on FPGA Based 基于FPGA的卷积神经网络实时定点硬件加速器
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756093
Bahadır Özkilbaç, I. Ozbek, T. Karacali
{"title":"Real-Time Fixed-Point Hardware Accelerator of Convolutional Neural Network on FPGA Based","authors":"Bahadır Özkilbaç, I. Ozbek, T. Karacali","doi":"10.1109/icci54321.2022.9756093","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756093","url":null,"abstract":"Convolutional neural networks (CNN), which have the advantage of automatically detecting the important features of the input data without any human interfere, are widely used in many applications such as face recognition, speech recognition, image classification and object detection. In real-time CNN applications, computation speed is very important as well as accuracy. However, in some applications with high computational complexity, available systems are insufficient to meet the high-speed performance demand at low power consumption. In this study, the design of the CNN accelerator hardware in FPGA is presented to meet the speed demand. In this design, CNN is considered as a streaming interface application. Thus, temporary storage amount and memory latency are reduced. Each layer is designed with maximum parallelism, taking advantage of the FPGA. Because fixed-point number representation has the advantage of low latency, it is preferred in design with negligible sacrifice of accuracy. Thus, forward propagation of a CNN can be executed at high speed in FPGA. In order to compare real-time performance, digit classification application is executed in this hardware designed in FPGA and ARM processor on the same chip. The real-time results show that the application in the hardware designed in the FPGA is 30x faster than the ARM processor.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127839153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloudlet Selection Strategy According to the Types of Applications in Cloud Networks 基于云网络中应用类型的Cloudlet选择策略
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756087
R. Alakbarov
{"title":"Cloudlet Selection Strategy According to the Types of Applications in Cloud Networks","authors":"R. Alakbarov","doi":"10.1109/icci54321.2022.9756087","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756087","url":null,"abstract":"The selection of the most suitable cloudlet that allows running users applications rapidly in the cloud is still an urgent problem. For the elimination of resource shortages, power consumption, and delays in communication channels on mobile devices, the remote cloud servers are placed adjacent to devices. The delays on communication channels and power consumption on mobile devices are reduced through cloud-based mobile computing. In the paper we propose a strategy for selecting a cloudlet with high computing productivity, which provides a fast solution, considering the complexity degree of the application (file type). Also, in the paper, the solution of the task in a cloudlet close to the user, the downloading of the task to the cloudlet, the sending of the outcome to the user, and the minimization of network interruptions are presented.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121179471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FAML: Fog Descriptor Language for Fog Service Development and Deployments FAML:用于雾服务开发和部署的雾描述语言
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756068
Ahmed H. Ibrahim, Z. Fayed, H. Faheem
{"title":"FAML: Fog Descriptor Language for Fog Service Development and Deployments","authors":"Ahmed H. Ibrahim, Z. Fayed, H. Faheem","doi":"10.1109/icci54321.2022.9756068","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756068","url":null,"abstract":"Cloud-centric services are experiencing major challenges due to the tsunami of computations and data streaming. Some of these challenges are bandwidth, latency, uninterrupted requests, continuous data streaming by the end devices, and computation dependability. Fog computing is a new computation paradigm that attempts to address delay and latency challenges in cloud services, mainly by offloading computations to computing nodes near the consumers. One of the main challenges to this computation model adoption is the lack of standardized software development kits (SDKs), tools, and run-time environment. This paper introduces a new descriptor and annotation language that can be used to develop an offloadable fog service from an already existing cloud service. FAML is an abbreviation for Fog Annotation and Meta Language; a language that can beused to develop a fog service. The FAML compiler has been implemented to work with Golang cloud service implementations. The generated fog services have been offloaded into fog nodes in the same local network of the service consumer as part of the experiment's evaluation. The paper presents the usage of the proposed language in three different service development use cases: image enhancement service, weather forecast service, and bulk update service.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dominant Meaning Technique for dedicating Social Criminal Twitter Posts 社交犯罪推特帖子的支配意义技术
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756074
Yasser Ibrahim, M. A. Razek, N. El-Sherbeny
{"title":"Dominant Meaning Technique for dedicating Social Criminal Twitter Posts","authors":"Yasser Ibrahim, M. A. Razek, N. El-Sherbeny","doi":"10.1109/icci54321.2022.9756074","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756074","url":null,"abstract":"social media like Facebook, Twitter, and LinkedIn has gotten to be a portion of our lives. Cybercrime has ended up an imperative issue, particularly in creating nations. The spread of data with no hazard of being identified and brought leads to an increment in cybercriminals. In the meantime, the huge of information constantly generated from Twitter has made the method of detecting cybercriminals a troublesome task. This paper analyzes how content size such as tweets on Twitter, posts on Facebook, etc. on other social media played in the predict cybercrime. So, in this paper, we try to answer, “What are the fit content sizes that have more effects on accuracy?”. This paper presents a solution based on two techniques: Dominant Meaning DM, and Term Frequency Inverse Document Frequency TF-IDF. This solution constructs super comparable vectors for both pockets negative and positive from different contents that have the same size. These vector plays a vital role to predict pocket for input tweets. To overcome this challenge, we compared the performance of the two mentioned methods. Our results introduced recommendations sizes of content that answered the question of research. However, the recommendation sizes may be disturbed by changes in the technique that generate super comparable vectors. The range of improvement which comes from dominant meaning for precision, recall, and F1 values is 75%, 75%, 70.07% respectively.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Emotion in Speech-related Audio Files with LSTM-Transformer 基于LSTM-Transformer的语音音频文件情感识别
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756100
Felicia Andayani, Lau Bee Theng, Mark Tee Kit Tsun, C. Chua
{"title":"Recognition of Emotion in Speech-related Audio Files with LSTM-Transformer","authors":"Felicia Andayani, Lau Bee Theng, Mark Tee Kit Tsun, C. Chua","doi":"10.1109/icci54321.2022.9756100","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756100","url":null,"abstract":"In our everyday audio events, there is some emotional information in almost any speech audio received by humans. Thus, Speech Emotion Recognition (SER) has become an important research field in the last decade. SER recognizes human emotional states through human speech or daily conversation. It plays a crucial role in developing Human-Computer Interaction (HCI) and signals processing systems. Moreover, human emotions change naturally over time. Thus, it requires a good model for learning the long-term dependencies in the speech signal. In this paper, a hybrid model which combines two widely used deep learning methods is proposed. The proposed model combines the Long-Short Term Memory (LSTM) and Transformer architectures to learn the long-term dependencies through the extracted Mel Frequency Cepstral Coefficient (MFCC) features. The preliminary results of the proposed model evaluated on the publicly available dataset called RAVDESS are presented. The model achieved 75.33% of weighted accuracy (WA) and 73.12% of unweighted accuracy (UA) over the RAVDESS dataset. The experiment's result indicates the effectiveness of the proposed model in learning the temporal information from the frequency distributions according to the MFCC features.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114234095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Keynote Speeches [4 abstracts] 主旨演讲[4摘要]
2022 5th International Conference on Computing and Informatics (ICCI) Pub Date : 2022-03-09 DOI: 10.1109/icci54321.2022.9756101
{"title":"Keynote Speeches [4 abstracts]","authors":"","doi":"10.1109/icci54321.2022.9756101","DOIUrl":"https://doi.org/10.1109/icci54321.2022.9756101","url":null,"abstract":"","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信