Proceedings of the International Multiconference on Computer Science and Information Technology最新文献

筛选
英文 中文
Using Self Organizing Map to cluster Arabic crime documents 用自组织地图聚类阿拉伯犯罪文件
M. Alruily, A. Ayesh, Abdulsamad Al-Marghilani
{"title":"Using Self Organizing Map to cluster Arabic crime documents","authors":"M. Alruily, A. Ayesh, Abdulsamad Al-Marghilani","doi":"10.1109/IMCSIT.2010.5679616","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5679616","url":null,"abstract":"This paper presents a system that combines two text mining techniques; information extraction and clustering. A rule-based approach is used to perform the information extraction task, based on the dependency relation between some intransitive verbs and prepositions. This relationship helps in extracting types of crime from documents within the crime domain. With regard to the clustering task, the Self Organizing Map (SOM) is used to cluster Arabic crime documents based on crime types. This work is then validated through experiments, the results of which show that the techniques developed here are promising.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125791806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
LEXiTRON-Pro Editor: An integrated tool for developing Thai pronunciation dictionary LEXiTRON-Pro编辑器:一个开发泰语发音字典的综合工具
Supon Klaithin, P. Chootrakool, K. Kosawat
{"title":"LEXiTRON-Pro Editor: An integrated tool for developing Thai pronunciation dictionary","authors":"Supon Klaithin, P. Chootrakool, K. Kosawat","doi":"10.1109/IMCSIT.2010.5679947","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5679947","url":null,"abstract":"Pronunciation dictionary is a crucial part for both Text-To-Speech and Automatic Speech Recognition systems. In this paper, we propose a tool to easily create and edit Thai pronunciation dictionary, called LEXiTRON-Pro Editor. This tool integrates Thai word segmentation, Thai Grapheme-to-Phoneme (G2P) conversion, and database system with statistics. It automatically proposes a word's pronunciation to users by 1 of the 3 options in the successive order: the pronunciation from LEXiTRON-Pro database, the pronunciation combined from syllables with highest probability, and the pronunciation from Thai G2P. However, users can switch to another option or even directly input their own pronunciation with an easy interface editor. Our LEXiTRON-Pro database contains initially 105,129 unique words and 24,736 unique syllables with pronunciations. Compared to the previous version, our new program can reduce the process of dictionary development from 5 to only 1 step and the number of tools used by linguists from 3 to only 1. Moreover, our experiment shows that the time consumption and the number of ungenerable words are significantly reduced while the pronunciation accuracy is considerably improved.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130807916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security model for personal information security management based on partial approximative set theory 基于部分逼近集理论的个人信息安全管理安全模型
Z. Csajbók
{"title":"A security model for personal information security management based on partial approximative set theory","authors":"Z. Csajbók","doi":"10.1109/IMCSIT.2010.5679939","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5679939","url":null,"abstract":"Nowadays, computer users especially run their applications in a complex open computing environment which permanently changes in the running time. To describe the behavior of such systems, we focus solely on externally observable execution traces generated by the observed computing system. In these extreme circumstances the pattern of sequences of primitive actions (execution traces) which is observed by an external observer cannot be designed and/or forecast in advance. We have also taken into account in our framework that security policies are partial-natured. To manage the outlined problem we need tools which are approximately able to discover secure or insecure patterns in execution traces based on presupposes of computer users. Rough set theory may be such a tool. According to it, the vagueness of a subset of a finite universe U is defined by the difference of its lower and upper approximations with respect to a partition of the universe U. Using partitions, however, is a very strict requirement. In this paper, our starting point will be an arbitrary family of subsets of U. Neither that this family of sets covers the universe nor that the universe is finite will be assumed. This new approach is called the partial approximative set theory. We will apply it to build up a new security model for distributed software systems solely focusing on their externally observable executions and to find out whether the observed system is secure or not.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bidirectional voting and continuous voting concepts as possible use of Internet in democratic voting process 双向投票和连续投票的概念尽可能利用互联网在民主投票过程中
Jacek Wachowicz
{"title":"Bidirectional voting and continuous voting concepts as possible use of Internet in democratic voting process","authors":"Jacek Wachowicz","doi":"10.1109/IMCSIT.2010.5680038","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5680038","url":null,"abstract":"Democracies need elections for choosing their authorities and governments. This process has many factors that shape today's procedures. However, the Internet is a medium that may change the possibilities and elections. The main issue is concern on how changes may influence the whole democratic process. This paper shows two possible ideas - that of bidirectional voting and continuous voting, and considers possible reasons for introducing changes as well as the consequences. An introductory research in into this matter gives additional hints.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115654581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
APyCA: Towards the automatic subtitling of television content in Spanish APyCA:西班牙语电视内容的自动字幕
Aitor Álvarez, A. D. Pozo, Andoni Arruti
{"title":"APyCA: Towards the automatic subtitling of television content in Spanish","authors":"Aitor Álvarez, A. D. Pozo, Andoni Arruti","doi":"10.1109/IMCSIT.2010.5680055","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5680055","url":null,"abstract":"Automatic subtitling of television content has become an approachable challenge due to the advancement of the technology involved. In addition, it has also become a priority need for many Spanish TV broadcasters, who will have to broadcast up to 90% of subtitled content by 2013 to comply with recently approved national audiovisual policies. APyCA, the prototype system described in this paper, has been developed in an attempt to automate the process of subtitling television content in Spanish through the application of state-of-the-art speech and language technologies. Voice activity detection, automatic speech recognition and alignment, discourse segment detection and speaker diarization have proved to be useful to generate time-coded colour-assigned draft transcriptions for post-editing. The productive benefit of the followed approach heavily depends on the performance of the speech recognition module, which achieves reasonable results on clean read speech but degrades as this becomes more noisy and/or spontaneous.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"77 4 Pt 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115040354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
BeesyBees - efficient and reliable execution of service-based workflow applications for BeesyCluster using distributed agents BeesyBees -使用分布式代理为BeesyCluster高效可靠地执行基于服务的工作流应用程序
P. Czarnul, Mariusz R. Matuszek, Michal Wójcik, Karol Zalewski
{"title":"BeesyBees - efficient and reliable execution of service-based workflow applications for BeesyCluster using distributed agents","authors":"P. Czarnul, Mariusz R. Matuszek, Michal Wójcik, Karol Zalewski","doi":"10.1109/IMCSIT.2010.5679922","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5679922","url":null,"abstract":"The paper presents an architecture and implementation that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish applications as services, define service costs, grant access to other users and consume services published by others. Workflows created in the BeesyCluster middleware are exported to BPEL and executed by agents in a distributed environment. As a proof of concept, we have implemented a real workflow for parallel processing of digital images and tested it in a real cluster-based environment. Firstly, we demonstrate that engaging several agents for distributed execution is more efficient than a centralized approach.We also show increasing negotiation time in case of too many agents. Secondly, we demonstrate that execution in the proposed environment is reliable even in case of failures. If a service fails, a task agent picks a new equivalent service at runtime. If one of task agents fails, another of remaining agents takes over its responsibilities. The communication between the middleware, agents and services is encrypted.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117062278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automatic visual object formation using image fragment matching 使用图像片段匹配自动视觉对象形成
M. Paradowski, A. Sluzek
{"title":"Automatic visual object formation using image fragment matching","authors":"M. Paradowski, A. Sluzek","doi":"10.1109/IMCSIT.2010.5679732","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5679732","url":null,"abstract":"Low-level vision approaches, such as local image features, are an important component of bottom-up machine vision solutions. They are able to effectively identify local visual similarities between fragments of underlying physical objects. Such vision approaches are used to build a learning system capable to form meaningful visual objects out of unlabelled collections of images. By capturing similar fragments of images, the underlying physical objects are extracted and their visual appearances are generalized. This leads to formation of visual objects, which (typically) represent specific underlying physical objects in a form of automatically extracted multiple template images.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117268889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of optimal settings of the LMS adaptive filter for speech signal processing LMS自适应滤波器的最佳设置在语音信号处理中的应用
J. Vanus, V. Stýskala
{"title":"Application of optimal settings of the LMS adaptive filter for speech signal processing","authors":"J. Vanus, V. Stýskala","doi":"10.1109/IMCSIT.2010.5679739","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5679739","url":null,"abstract":"This paper describes a proposition of the method for optimal adjustment parameters of the adaptive filter with LMS algorithm in the practical application of suppression of additive noise in a speech signal for voice communication with the control system. By the proposed method, the optimal values of parameters of adaptive filter are calculated with guarantees the stability and convergence of the LMS algorithm. The DTW criterion is used for the quality assessment of speech signal processing obtained from output of adaptive filter with LMS algorithm. In the experimental section is described the way of verification of the proposed method on the structure of the adaptive filter with LMS algorithm and on the structure of the adaptive filter with LMS algorithm in application of suppressing noise from speech signal by simulations in MATLAB software and implementation on DSK TMS320C6713.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125751472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Matura Evaluation experiment based on human evaluation of machine translation 基于人对机器翻译评价的成熟度评价实验
Aleksandra Wojak, F. Gralinski
{"title":"Matura Evaluation experiment based on human evaluation of machine translation","authors":"Aleksandra Wojak, F. Gralinski","doi":"10.1109/IMCSIT.2010.5679864","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5679864","url":null,"abstract":"A Web-based system for human evaluation of machine translation is presented in this paper. The system is based on comprehension tests similar to the ones used in Polish matura (secondary school-leaving) examinations. The results of preliminary experiments for Polish-English and English-Polish machine translation evaluation are presented and discussed.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SyMGiza++: A tool for parallel computation of symmetrized word alignment models symgiz++:一个用于并行计算对称字对齐模型的工具
Marcin Junczys-Dowmunt, A. Szal
{"title":"SyMGiza++: A tool for parallel computation of symmetrized word alignment models","authors":"Marcin Junczys-Dowmunt, A. Szal","doi":"10.1109/IMCSIT.2010.5679866","DOIUrl":"https://doi.org/10.1109/IMCSIT.2010.5679866","url":null,"abstract":"SyMGiza++ - a tool that computes symmetric word alignment models with the capability to take advantage of multi-processor systems - is presented. A series of fairly simple modifications to the original IBM/Giza++ word alignment models allows to update the symmetrized models between each iteration of the original training algorithms. We achieve a relative alignment quality improvement of more than 17% compared to Giza++ and MGiza++ on the standard Canadian Hansards task, while maintaining the speed improvements provided by MGiza++'s capability of parallel computations.","PeriodicalId":147803,"journal":{"name":"Proceedings of the International Multiconference on Computer Science and Information Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125676947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信