{"title":"Comparison of the efficiency of principal component analysis and multiple linear regression to determine students' academic achievement","authors":"M. Erguven","doi":"10.1109/ICAICT.2012.6398537","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398537","url":null,"abstract":"The Georgia Ministry of Education and Science is responsible foundation to prepare the National Unified Entrance Examination (NUEE) in Georgia. Georgian Language, Logic, English Language and Mathematics are some of the categories of this examination. In this study we focused on how NUEE affects the grade point averages (GPA) of the students of International Black Sea University (IBSU). The relation between NUEE scores and GPA is represented and compared for the all students of the faculty of Computer Technologies and Engineering (CT&E) and the faculty of Business and Management (B&M). The research is also done and indicated separately for female and male students. The major purpose of this study is to compare the efficiency of multiple linear regressions (MLR) and principal component analysis (PCA) in predicting the response variable GPA using NUEE's explanatory variables (X). In the consequence, using principal components as entries improves multiple linear regression prediction by reducing complexity and high dimensionality.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128049808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution mobile wireless communication and LTE networks","authors":"T. Mshvidobadze","doi":"10.1109/ICAICT.2012.6398495","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398495","url":null,"abstract":"Mobile communications systems revolutionized the way people communicate, joining together communications and mobility. A long way in a remarkably short time has been achieved in the history of wireless. Evolution of wireless access technologies is about to reach its fourth generation (4G). Looking past, wireless access technologies have followed different evolutionary paths aimed at unified target: performance and efficiency in high mobile environment. The first generation (1G) has fulfilled the basic mobile voice, while the second generation (2G) has introduced capacity and coverage. This is followed by the third generation (3G), which has quest for data at higher speeds to open the gates for truly \"mobile broadband\" experience, which will be further realized by the fourth generation (4G). The Fourth generation (4G) will provide access to wide range o f telecommunication services, including advanced mobile services, supported by mobile and fixed networks, which are increasingly packet based, along with a support for low to high mobility applications and wide range o f data rates, in accordance with service demands in multiuser environment. This paper provides a high level overview of the evolution o f Mobile Wireless Communication Networks from 3G to 4G. Is described LTE(Long Term Evolution) a fourth generation (4G) mobile network technology.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127520031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study on feature selection in Chinese Spam Filtering","authors":"Yan Xu","doi":"10.1109/ICAICT.2012.6398481","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398481","url":null,"abstract":"Feature selection plays an important role in Spam Filtering. Automatic feature selection methods such as document frequency thresholding (DF), information gain (IG), and so on are commonly applied in spam filtering. Spam filtering can also be seen as a special two-class text categorization (TC) problem. Many existing experiments show IG is one of the most effective methods in text categorization task. However, what is the most effective method on spam filtering? As we all know there was not a systematic research about these feature selection methods on spam filtering. This paper is a comparative study of feature selection methods in spam filtering. The focus is on aggressive dimensionality reduction. We explore 2 classifiers (Naïve Bayes and SVM), and run our experiments on Chinese-spam collection. Six methods were evaluated, including term selection based on document frequency (DF), information gain(IG), χ2 feature selection method, expected cross entropy (ECE), the weight of evidence for text (WET) and odds ratio (ODD). We found ODD and WET most effective in our experiments. In contrast, IG and χ2 had relatively poor performance due to their bias towards favoring rare terms, and its sensitivity to probability estimation errors.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ZIPPER: The holistic spell checker","authors":"L. Alhusaini","doi":"10.1109/ICAICT.2012.6398519","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398519","url":null,"abstract":"This article discusses a novel problem with a novel solution. The thesis of this work is to perform document and text editing. We look specifically at providing a document editor with a tool for text editing and that tool is holistic spell checker. We propose ZIPPER, a holistic spell checker, that finds out user misspell words all at once. Our approach to this approximated problem is probabilistic. We use Markovian tree that exploits the dependencies amongst characters in a word. For computation over Markovian tree, we use a set of probabilistic and information theory metrics. For link quantification, we use information theory metric which is pointwise mutual information. Probabilistically, we use belief propagation using message passing paradigm for node quantification. To create a suggestion list for each misspelled word, we decompose Markovian tree into clique tree. For computation over clique tree, where each node is a complete word, we use information theory metrics like: entropy for computing the value of a complete word, and mutual information for computing how much value there is between two words.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nouri, N. Farhangian, Karim Baghery, Z. Zeinolabedini
{"title":"Conceptual discrete wavelet transformation speech hashing for content authentication","authors":"M. Nouri, N. Farhangian, Karim Baghery, Z. Zeinolabedini","doi":"10.1109/ICAICT.2012.6682861","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6682861","url":null,"abstract":"Conceptual hash functions provide a tool for fast and reliable identification of content authentication. Robust hashing for multimedia authentication is an emergent research area. A different key-dependent robust speech hashing based upon speech construction model is proposed in this article. The proposed hash function is based on the essential frequency series. Robust hash is calculated based on linear spectrum frequencies which model the verbal territory. The correlation between LSFs is decoupled by discrete wavelet transformation (DWT). A randomization structure controlled by a secret key is used in hash generation for random feature selection. The hash function is key-dependent and collision resistant. Temporarily, it is extremely robust to content protective operations besides having high accuracy of tampering localization. They are found, the first, to perform very adequately in identification and verification tests, and the second, to be very robust to a large range of attacks. Furthermore, it can be addressed the issue of security of hashes and proposed a keying technique, and thereby a key-dependent hash function.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The model for predicting the competitiveness of science engineering products","authors":"A. V. Maslov","doi":"10.1109/ICAICT.2012.6398511","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398511","url":null,"abstract":"A model for predicting the competitiveness of high-tech products according to changes in consumer preferences and improving the technical characteristics of products based on catastrophe theory.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}