{"title":"A mapreduce fuzzy techniques of big data classification","authors":"O. Hegazy, Soha Safwat, M. El Bakry","doi":"10.1109/SAI.2016.7555971","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555971","url":null,"abstract":"Due to the huge increase in the size of the data it becomes troublesome to perform efficient analysis using the current traditional techniques. Big data put forward a lot of challenges due to its several characteristics like volume, velocity, variety, variability, value and complexity. Today there is not only a necessity for efficient data mining techniques to process large volume of data but in addition a need for a means to meet the computational requirements to process such huge volume of data. The objective of this research is to implement a map reduce paradigm using fuzzy and crisp techniques, and to provide a comparative study between the results of the proposed systems and the methods reviewed in the literature. In this paper four proposed system is implemented using the map reduce paradigm to process on big data. First, in the mapper there are two techniques used; the fuzzy k-nearest neighbor method as a fuzzy technique and the support vector machine as non-fuzzy technique. Second, in the reducer there are three techniques used; the mode, the fuzzy soft labels and Gaussian fuzzy membership function. The first proposed system is using the fuzzy KNN in the mapper and the mode in the reducer, the second proposed system is using the SVM in the mapper and the mode in the reducer, the third proposed system is using the SVM in the mapper and the soft labels in the reducer, and the fourth proposed system is using the SVM in the mapper and fuzzy Gaussian membership function in the reducer. Results on different data sets show that the fuzzy proposed methods outperform a better performance than the crisp proposed method and the method reviewed in the literature.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126221645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to compare search engines in CBIR?","authors":"T. Jaworska","doi":"10.1109/SAI.2016.7555995","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555995","url":null,"abstract":"At present a great deal of research is being done in different aspects of Content-Based Image Retrieval (CBIR) of which the search engine is one of the most important elements. In this paper we cover the state-of-the-art techniques in CBIR according to the aims of retrieval and matching techniques. The issue we address is the analysis of search engines reducing the `semantic gap'. The matching methods are compared in terms of their usefulness for different user's aims. Finally, we compare our search engine with Google's and the SIFT method.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the computational cost of EEG dynamic modeling methods","authors":"G. Safont, A. Salazar, L. Vergara, A. Vidal","doi":"10.1109/SAI.2016.7555969","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555969","url":null,"abstract":"The recording of brain activity at the scalp level, also known as electroencephalography (EEG), is a brain imaging technique commonly used in the clinical environment. Adequate modeling of the recorded signals could help to improve the diagnosis of several illnesses such as sleep disorders and epilepsy. This paper presents a computational cost analysis for dynamic modeling methods and considers their suitability to real-time biomedical applications. The analyzed state-of-the-art methods are Dynamic Bayesian Networks (DBN) and Sequential Independent Component Analysis Mixture Modeling (SICAMM). The results show that the ICA-based methods have a lower computational cost than the BN-based methods. The applicability of these methods to patient monitoring using EEG signals is discussed, considering the improvement of the time response by means of parallelization techniques.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wormhole attack detection in wireless sensor networks","authors":"M. Bendjima, M. Feham","doi":"10.1109/SAI.2016.7556151","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556151","url":null,"abstract":"A wireless sensor network (WSN) consists of a large number of sensor nodes with limited batteries, the sensoring devices are deployed randomly on a zone to collect data. WSNs are threatened by several malicious behaviors caused by some nodes. The impact of such behaviors can be serious, even fatal, due to the collaborative nature of nodes in a network without fixed infrastructure. Then, in this work we have referred to the need for a secure network communication network with mechanisms that take into account the limited resources of the nodes. In order to achieve such a security, the network can be split into sectors, and mobile agents (MAs) can be used to reject traffic intruders caused by Wormhole attacks taking into account energy constraint. Wormhole attack is a denial of service attack launched by malicious nodes by creating a tunnel through which the packets are replayed to malicious nodes disrupting the communication channel and corrupting network routing. In order to evaluate the performance of our proposal, we have carried out several simulation tests using the SINALGO simulator. The results obtained show that our proposal extends the life of the network, in terms of energy consumption and the rate of packet delivery.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131057005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient application of multi-core processors as substitute of the E-Gas (Etc) monitoring concept","authors":"Manfred Grosmann, M. Hirz, J. Fabian","doi":"10.1109/SAI.2016.7556089","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556089","url":null,"abstract":"Complexity and electrification of automobiles increases steadily, which involves an enhancement of safety-requirements of applied E/E-components, controllers and their connection and interaction in between. As a fundamental safety-relevant standard, the E-Gas monitoring concept has been introduced in the '90s. Recently, a new version of this E-Gas monitoring concept has been published, which includes the application of multi-core processors. In this context, the paper contains an analysis and evaluation of modern multi-core architectures in automotive applications and discusses requirements, benefits and potentials for integrated safety mechanisms. In addition it is discussed, if modern safety-certified automotive micro-controller are able to replace the well-established 3-level monitoring concept.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133045578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HASKEU: An editor to support visual and textual programming in tandem","authors":"Abu S. Alam, V. Bush","doi":"10.1109/SAI.2016.7556071","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556071","url":null,"abstract":"Typical text editors allow “Free Typing” (syntax/semantics-free editing) to construct and maintain textual programs rapidly and easily by expert programmers, but this style does not support novice programmers learning the syntax and semantics of a language. On the other hand, visual editors enforce correct construction of programs using syntax-directed editing. Additionally, they clearly represent the program flow in a visual way. Both textual and visual editors have pros and cons for learners and experts. This paper argues that an editor that offers both a visual and a textual representation of the program in tandem has advantages to offer both learner and expert programmers. It describes the editor, HASKEU, which embodies this principle by providing visual and textual support for editing Haskell functional programs.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Birahime Diouf, I. Diop, K. W. Keita, S. M. Farssi, O. Khouma, M. Diouf, K. Tall
{"title":"Adaptive linear programming of polar codes to minimize additive distortion in steganography","authors":"Birahime Diouf, I. Diop, K. W. Keita, S. M. Farssi, O. Khouma, M. Diouf, K. Tall","doi":"10.1109/SAI.2016.7556113","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556113","url":null,"abstract":"A new practical syndrome coding method is proposed in this paper to minimize a suitably defined additive distortion function using Adaptive Linear Programming of Polar Codes (ALP-PC). We propose modifications of the ALP-PC based on a new reduced factor graph for steganographic purposes which we denote by ALP-PCS. The implementation of wet paper codes in practice is possible using ALP-PCS. Simulation results show that this method minimizes additive distortion in steganography and gives good embedding efficiency performance.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116423451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum fluctuations in biological functions: Computational analysis of diseases with the human microRNA memory package","authors":"Tatsunori Osone, Masaru Yoshikawa, Y. Fujii","doi":"10.1109/SAI.2016.7556131","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556131","url":null,"abstract":"Recent advances in computer technology and calculation theory have enabled us to simulate more complex and various phenomena on computer than before. Computer based calculation is used in wide fields from weather prediction to protein structure analysis. Precise simulations by adopting excellent models and appropriate algorithms have given us numerous novel information and understandings. Here, we showed a novel theoretical and quantitative algorithm for disease diagnosis. There are huge number of small RNA genes named microRNA (miRNA), a regulator of gene expression, in humans. It has recently been indicated that miRNAs have quantum character according to RNA wave 2000 model. Application of this quantum simulation to disease big data including miRNA expression level were executed by using cluster-computing. Algorithms based on this theory have revealed synergistic miRNA functions with quantum coherent and disease-implicated miRNA superposition spectrums have been discovered as miRNA memory. Our result revealed that disease may be able to express linear function between disease tissue and normal tissue by miRNA quantum superposition. In turn, only to calculation of miRNA quantum superposition could be needed to diagnose and cure disease. Thus, this is the first paper that significant correlations between miRNA quantum score and diseases were successfully observed in quantum fluctuation.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mateen Ahmed, Mujtaba Idrees, Zain Ul Abideen, R. Mumtaz, S. Khalique
{"title":"Deaf talk using 3D animated sign language: A sign language interpreter using Microsoft's kinect v2","authors":"Mateen Ahmed, Mujtaba Idrees, Zain Ul Abideen, R. Mumtaz, S. Khalique","doi":"10.1109/SAI.2016.7556002","DOIUrl":"https://doi.org/10.1109/SAI.2016.7556002","url":null,"abstract":"This paper describes a neoteric approach to bridge the communication gap between deaf people and normal human beings. In any community there exists such group of disable people who face severe difficulties in communication due to their speech and hearing impediments. Such people use various gestures and symbols to talk and receive their messages and this mode of communication is called sign language. Yet the communication problem doesn't end here, as natural language speakers don't understand sign language resulting in a communication gap. Towards such ends there is a need to develop a system which can act as an interpreter for sign language speakers and a translator for natural language speaker. For this purpose, a software based solution has been developed in this research by exploiting the latest technologies from Microsoft i.e. Kinect for windows V2. The proposed system is dubbed as Deaf Talk, and it acts as a sign language interpreter and translator to provide a dual mode of communication between sign language speakers and natural language speakers. The dual mode of communication has following independent modules (1) Sign/Gesture to speech conversion (2) Speech to sign language conversion. In sign to speech conversion module, the person with speech inhibition has to place himself within Kinect's field of view (FOV) and then performs the sign language gestures. The system receives the performed gestures through Kinect sensor and then comprehends those gestures by comparing them with the trained gestures already stored in the database. Once the gesture is determined, it is mapped to the keyword corresponding to that gesture. The keywords are then sent to text to speech conversion module, which speaks or plays the sentence for natural language speaker. In contrast to sign to speech conversion, the speech to sign language conversion module translates the spoken language to sign language. In this case, the normal person places himself in the Kinect sensor's FOV and speaks in his native language (English for this case). The system then converts it into text using speech to text API. The keywords are then mapped to their corresponding pre-stored animated gestures and then animations are played on the screen for the spoken sentence. In this way the disable person can visualize the spoken sentence, translated into a 3D animated sign language. The accuracy of Deaf Talk is 87 percent for speech to sign language conversion and 84 percent for sign language to speech conversion.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128571511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joao Carlos Silva de Souza, Suzana Gomes Claudino, Rodolfo da Silva Simoes, Patricia Rufino Oliveira, K. M. Honório
{"title":"Recent advances for handling imbalancement and uncertainty in labelling in medicinal chemistry data analysis","authors":"Joao Carlos Silva de Souza, Suzana Gomes Claudino, Rodolfo da Silva Simoes, Patricia Rufino Oliveira, K. M. Honório","doi":"10.1109/SAI.2016.7555985","DOIUrl":"https://doi.org/10.1109/SAI.2016.7555985","url":null,"abstract":"The discovery of new drugs is a very important area of study in medicinal chemistry. Developing a drug is not an easy task, as much time and money are needed to undertake all steps required for the development and test of new drugs. Amid this context, chemoinformatics is the area that has the role of interfacing between chemistry and computing, assisting in the process of identifying potential new drugs, through machine learning techniques for classification. This article will present the difficulties of classification found in chemoinformatics and approach machine learning techniques that, applied in the context of chemoinformatics, assist in treating issues related to uncertainty in data labeling and unbalanced classes, as they are common problems when using data sets of a chemical nature.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}