2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)最新文献

筛选
英文 中文
Learner's knowledge modeling using annotation and Bayesian network 基于标注和贝叶斯网络的学习者知识建模
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993391
A. Kardan, Yosra Bahrani
{"title":"Learner's knowledge modeling using annotation and Bayesian network","authors":"A. Kardan, Yosra Bahrani","doi":"10.1109/ICCKE.2014.6993391","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993391","url":null,"abstract":"Learner's knowledge assessment is very important in the e-learning system. Knowledge assessment is effective for knowledge gap discovery. Knowledge gap, Causes the learners do not understand educational content correctly. This paper presents a new method for learner's knowledge modeling based on knowledge gap discovery for concepts of educational content. There are two methods for learner's knowledge gap discovery: 1- Explicit Method 2- Implicit method. The explicit method is based on a questionnaire. In this method directly asks about various concepts of educational content from learners. Learner's answers show the level of learner's knowledge and knowledge gap regarding each concept. But, in the implicit method, knowledge gap discovery is done without direct questioning. In this paper, implicit method has been used by annotation. Annotation provide a way for learners to present their ideas and issues directly through comments, questions, and other reactions when learners as read. The main aim of this work is modeling knowledge and the knowledge gap of any learner to the concepts by Bayesian networks. The test project is done for 25 students in three fields (E-commerce, Computer, other) in three degrees (bachelors, master, PhD). The proposed method is evaluated so that the pre-test will be held for learners and the result of the pre-test is compared with the predicted knowledge.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131597198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Probabilistic two-dimensional canonical correlation analysis for face recognition 概率二维典型相关分析在人脸识别中的应用
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993337
Homayun Afrabandpey, M. Safayani, Abdolreza Mirzaei
{"title":"Probabilistic two-dimensional canonical correlation analysis for face recognition","authors":"Homayun Afrabandpey, M. Safayani, Abdolreza Mirzaei","doi":"10.1109/ICCKE.2014.6993337","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993337","url":null,"abstract":"Recently, two-dimensional canonical correlation analysis (2DCCA) proved to be an efficient technique for image feature extraction. In this paper we present a method of 2DCCA with probabilistic framework called probabilistic 2DCCA (P2DCCA), which is robust to noise and is able to cope with missing data problems. The experimental recognition results on three subsets of AR face database show the robustness of the proposed algorithm in face recognition in different illumination conditions, facial expressions and occlusion.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133311760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multitask speaker profiling for estimating age, height, weight and smoking habits from spontaneous telephone speech signals 从自发电话语音信号中估计年龄、身高、体重和吸烟习惯的多任务说话人分析
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993339
A. H. Poorjam, M. H. Bahari, H. Van hamme
{"title":"Multitask speaker profiling for estimating age, height, weight and smoking habits from spontaneous telephone speech signals","authors":"A. H. Poorjam, M. H. Bahari, H. Van hamme","doi":"10.1109/ICCKE.2014.6993339","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993339","url":null,"abstract":"This paper proposes a novel approach for automatic estimation of four important traits of speakers, namely age, height, weight and smoking habit, from speech signals. In this method, each utterance is modeled using the i-vector framework which is based on the factor analysis on Gaussian Mixture Model (GMM) mean supervectors, and the Non-negative Factor Analysis (NFA) framework which is based on a constrained factor analysis on GMM weights. Then, Artificial Neural Networks (ANNs) and Least Squares Support Vector Regression (LSSVR) are employed to estimate age, height and weight of speakers from given utterances, and ANNs and logistic regression (LR) are utilized to perform smoking habit detection. Since GMM weights provide complementary information to GMM means, a score-level fusion of the i-vector-based and the NFA-based recognizers is considered for age and smoking habit estimation tasks to improve the performance. In addition, a multitask speaker profiling approach is proposed to evaluate the correlated tasks simultaneously and in interaction with each other, and consequently, to boost the accuracy in speaker age, height, weight and smoking habit estimations. To this end, a hybrid architecture involving the score-level fusion of the i-vector-based and the NFA-based recognizers is proposed to exploit the available information in both Gaussian means and Gaussian weights. ANNs are then employed to share the learned information with all tasks while they are learned in parallel. The proposed method is evaluated on telephone speech signals of National Institute for Standards and Technology (NIST) 2008 and 2010 Speaker Recognition Evaluation (SRE) corpora. Experimental results over 1194 utterances show the effectiveness of the proposed method in automatic speaker profiling.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132650056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
RTLB-DSR: A load-balancing DSR based QoS routing protocol in MANETs RTLB-DSR:一种基于负载均衡DSR的QoS路由协议
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993411
Hanif Maleki, M. Kargahi, S. Jabbehdari
{"title":"RTLB-DSR: A load-balancing DSR based QoS routing protocol in MANETs","authors":"Hanif Maleki, M. Kargahi, S. Jabbehdari","doi":"10.1109/ICCKE.2014.6993411","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993411","url":null,"abstract":"Providing the Quality of Service in Mobile Ad Hoc Networks (MANETs) is not straightforward due to the unstable wireless link, restricted capacity and irregular availability. It has been shown that the shortest path routing does not lead to a balanced load distribution among nodes. Instead, it offers a heavier load to the central nodes which may lead to an increase in the probability of congestion and energy exhaustion in these nodes. In this paper, we present Real-Time Load Balancing Dynamic Source Routing (RTLB-DSR), a DSR-based load-balanced routing that provides Quality of Service in the network through a differentiating service method among best effort and real-time flows. Simulation results show that Quality of Service metrics, such as end-to-end delay, packet lost, and jitter, are improved through the proposed routing algorithm.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131440150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Introducing a socio-inspired swarm intelligence algorithm for numerical function optimization 介绍一种社会启发的群体智能算法用于数值函数优化
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993417
Javad Basiri, F. Taghiyareh
{"title":"Introducing a socio-inspired swarm intelligence algorithm for numerical function optimization","authors":"Javad Basiri, F. Taghiyareh","doi":"10.1109/ICCKE.2014.6993417","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993417","url":null,"abstract":"Swarm intelligence algorithms have been successfully applied as optimization tools in various applications, such as biology, commerce, and engineering. This paper presents BRADO (BRAin Drain Optimization) algorithm as a new socio-inspired swarm intelligence approach, in which the search algorithm is inspired by the process of brain drain phenomenon. In order to evaluate the BRADO performance, it was applied to several benchmark optimization functions and the results produced by BRADO, particle swarm optimization, imperialist competitive algorithm and GA have been compared. Our findings show the BRADO superiority to avoid the regions around local minima and dealing with high dimensionality problems.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115908753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Constrained two-stage Kalman filter for target tracking 目标跟踪的约束两级卡尔曼滤波
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993432
Mohammad-Reza Khabbazi, R. M. Esfanjani
{"title":"Constrained two-stage Kalman filter for target tracking","authors":"Mohammad-Reza Khabbazi, R. M. Esfanjani","doi":"10.1109/ICCKE.2014.6993432","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993432","url":null,"abstract":"This note investigates the problem of state estimation for an uncertain linear system with a priori known information in the form of equality constraints. System projection idea is employed to develop a robust two-stage Kalman filter satisfying state constraints. The proposed method is utilized to solve the target tracking problem. Simulation results illustrate that the proposed two-stage filter outperforms the standard constrained Kalman filter.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
2 Conditional tag estimation method for DFSA algorithms in RFID systems RFID系统中DFSA算法的条件标签估计方法
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993449
M. HajMirzaei, Zahra Adelani
{"title":"2 Conditional tag estimation method for DFSA algorithms in RFID systems","authors":"M. HajMirzaei, Zahra Adelani","doi":"10.1109/ICCKE.2014.6993449","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993449","url":null,"abstract":"Radio Frequency Identification system has some critical issues like tag collision and reader collision. Dynamic Framed Slotted Aloha is one of popular algorithms which is proposed to address tag collision issue in RFID. This method needs to guess the number of tags in each identification cycle to gain its best performance. So in this paper we propose a novel tag estimation method which is comprises 2 parts. First we calculate the optimal percentage of collision and free slots then we change the frame size according to difference between the real number of collision and free slots and optimal number of collision and free slots. At the end we evaluate our method and compare it with other proposed methods to prove its efficiency.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blind image quality assessment of multi-degraded images 多重退化图像的盲图像质量评价
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993396
Ehsanhosein Kalatehjari, F. Yaghmaee
{"title":"Blind image quality assessment of multi-degraded images","authors":"Ehsanhosein Kalatehjari, F. Yaghmaee","doi":"10.1109/ICCKE.2014.6993396","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993396","url":null,"abstract":"In recent years one of the most important problems in blind image quality assessment is to achieving perceptual model that can predict the quality of distorted images completely blind. It means the model should perform without any learning process and by as little knowledge about their distortion as possible. Most previously methods measure the quality of an image degraded by a single degradation. Single degradation relies on a great degree of accuracy while, they aren't appropriate to be performed for a combination of two degradations. In this paper a new method is proposed which is able to evaluate the degradation of combination of blur and desaturation. Moreover, it has proven that the natural images have regular statistical characteristics and thus, the proposed method relies on color characteristics. These characteristics are measurably modified where distortion exists. Thus we extract some natural scene statistic features which are enabling the prediction of the image quality score without any training process.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117176686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Query-independent learning to rank RDF entity results of SPARQL queries 对SPARQL查询的RDF实体结果进行排序的查询独立学习
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993425
Sara Latifi, M. Nematbakhsh
{"title":"Query-independent learning to rank RDF entity results of SPARQL queries","authors":"Sara Latifi, M. Nematbakhsh","doi":"10.1109/ICCKE.2014.6993425","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993425","url":null,"abstract":"RDF is a data model to represent structured data on the web. SPARQL is a query language for RDF data that returns exactly matching results. Number of these results may be very high. By rapid growth of web of data the need for efficient ranking methods for results of this kind of queries is increased. Because of exactly matching results in SPARQL queries, the focus is on the query independent features for ranking them. We use a learning to rank approach with four sets of query independent features to rank entity results of SPARQL queries over DBpedia. These features include: features extracted from RDF graph, weighted LinkCount, search engine based and information content of the RDF resource. We investigate the performance of individual features and the combination of them in learning to rank entity results. Experiments show that the complete feature set has the best performance in rankings. As an individual feature, the proposed information content of the RDF resource is a good choice based on its performance in ranking and the elapsed time for extracting this feature.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123591845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A two-stage shot boundary detection framework in the presence of fast movements: Application to soccer videos 快速运动中的两阶段镜头边界检测框架:在足球视频中的应用
2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2014-12-22 DOI: 10.1109/ICCKE.2014.6993405
Farshad Bayat, M. Moin
{"title":"A two-stage shot boundary detection framework in the presence of fast movements: Application to soccer videos","authors":"Farshad Bayat, M. Moin","doi":"10.1109/ICCKE.2014.6993405","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993405","url":null,"abstract":"This paper addresses the shot boundary detection issue in soccer videos, in presence of fast camera and/or players movements. An approach is proposed based on the modified dissimilarity features corresponding to the distribution of intensity histogram of pixels as well as image texture combined with a fuzzy C-Mean clustering method. In the proposed approach, the singular value decomposition technique is used to map into the refined features space which considerably simplifies the detection process. As a key feature of the proposed approach, some preprocessing techniques are proposed to cope with the effects of fast movements in the videos. Furthermore, in the detection step a two-stage defuzzifier is introduced to increase the precision. Finally, the proposed method is applied to a big dataset which demonstrates its effectiveness and performance.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123630059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信