2012 6th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Comparison of the efficiency of principal component analysis and multiple linear regression to determine students' academic achievement 主成分分析与多元线性回归测定学生学业成绩的有效性比较
M. Erguven
{"title":"Comparison of the efficiency of principal component analysis and multiple linear regression to determine students' academic achievement","authors":"M. Erguven","doi":"10.1109/ICAICT.2012.6398537","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398537","url":null,"abstract":"The Georgia Ministry of Education and Science is responsible foundation to prepare the National Unified Entrance Examination (NUEE) in Georgia. Georgian Language, Logic, English Language and Mathematics are some of the categories of this examination. In this study we focused on how NUEE affects the grade point averages (GPA) of the students of International Black Sea University (IBSU). The relation between NUEE scores and GPA is represented and compared for the all students of the faculty of Computer Technologies and Engineering (CT&E) and the faculty of Business and Management (B&M). The research is also done and indicated separately for female and male students. The major purpose of this study is to compare the efficiency of multiple linear regressions (MLR) and principal component analysis (PCA) in predicting the response variable GPA using NUEE's explanatory variables (X). In the consequence, using principal components as entries improves multiple linear regression prediction by reducing complexity and high dimensionality.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128049808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evolution mobile wireless communication and LTE networks 演进移动无线通信和LTE网络
T. Mshvidobadze
{"title":"Evolution mobile wireless communication and LTE networks","authors":"T. Mshvidobadze","doi":"10.1109/ICAICT.2012.6398495","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398495","url":null,"abstract":"Mobile communications systems revolutionized the way people communicate, joining together communications and mobility. A long way in a remarkably short time has been achieved in the history of wireless. Evolution of wireless access technologies is about to reach its fourth generation (4G). Looking past, wireless access technologies have followed different evolutionary paths aimed at unified target: performance and efficiency in high mobile environment. The first generation (1G) has fulfilled the basic mobile voice, while the second generation (2G) has introduced capacity and coverage. This is followed by the third generation (3G), which has quest for data at higher speeds to open the gates for truly \"mobile broadband\" experience, which will be further realized by the fourth generation (4G). The Fourth generation (4G) will provide access to wide range o f telecommunication services, including advanced mobile services, supported by mobile and fixed networks, which are increasingly packet based, along with a support for low to high mobility applications and wide range o f data rates, in accordance with service demands in multiuser environment. This paper provides a high level overview of the evolution o f Mobile Wireless Communication Networks from 3G to 4G. Is described LTE(Long Term Evolution) a fourth generation (4G) mobile network technology.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127520031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A comparative study on feature selection in Chinese Spam Filtering 中文垃圾邮件过滤中特征选择的比较研究
Yan Xu
{"title":"A comparative study on feature selection in Chinese Spam Filtering","authors":"Yan Xu","doi":"10.1109/ICAICT.2012.6398481","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398481","url":null,"abstract":"Feature selection plays an important role in Spam Filtering. Automatic feature selection methods such as document frequency thresholding (DF), information gain (IG), and so on are commonly applied in spam filtering. Spam filtering can also be seen as a special two-class text categorization (TC) problem. Many existing experiments show IG is one of the most effective methods in text categorization task. However, what is the most effective method on spam filtering? As we all know there was not a systematic research about these feature selection methods on spam filtering. This paper is a comparative study of feature selection methods in spam filtering. The focus is on aggressive dimensionality reduction. We explore 2 classifiers (Naïve Bayes and SVM), and run our experiments on Chinese-spam collection. Six methods were evaluated, including term selection based on document frequency (DF), information gain(IG), χ2 feature selection method, expected cross entropy (ECE), the weight of evidence for text (WET) and odds ratio (ODD). We found ODD and WET most effective in our experiments. In contrast, IG and χ2 had relatively poor performance due to their bias towards favoring rare terms, and its sensitivity to probability estimation errors.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ZIPPER: The holistic spell checker 拉链:整体拼写检查
L. Alhusaini
{"title":"ZIPPER: The holistic spell checker","authors":"L. Alhusaini","doi":"10.1109/ICAICT.2012.6398519","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398519","url":null,"abstract":"This article discusses a novel problem with a novel solution. The thesis of this work is to perform document and text editing. We look specifically at providing a document editor with a tool for text editing and that tool is holistic spell checker. We propose ZIPPER, a holistic spell checker, that finds out user misspell words all at once. Our approach to this approximated problem is probabilistic. We use Markovian tree that exploits the dependencies amongst characters in a word. For computation over Markovian tree, we use a set of probabilistic and information theory metrics. For link quantification, we use information theory metric which is pointwise mutual information. Probabilistically, we use belief propagation using message passing paradigm for node quantification. To create a suggestion list for each misspelled word, we decompose Markovian tree into clique tree. For computation over clique tree, where each node is a complete word, we use information theory metrics like: entropy for computing the value of a complete word, and mutual information for computing how much value there is between two words.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conceptual discrete wavelet transformation speech hashing for content authentication 概念离散小波变换语音哈希内容认证
M. Nouri, N. Farhangian, Karim Baghery, Z. Zeinolabedini
{"title":"Conceptual discrete wavelet transformation speech hashing for content authentication","authors":"M. Nouri, N. Farhangian, Karim Baghery, Z. Zeinolabedini","doi":"10.1109/ICAICT.2012.6682861","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6682861","url":null,"abstract":"Conceptual hash functions provide a tool for fast and reliable identification of content authentication. Robust hashing for multimedia authentication is an emergent research area. A different key-dependent robust speech hashing based upon speech construction model is proposed in this article. The proposed hash function is based on the essential frequency series. Robust hash is calculated based on linear spectrum frequencies which model the verbal territory. The correlation between LSFs is decoupled by discrete wavelet transformation (DWT). A randomization structure controlled by a secret key is used in hash generation for random feature selection. The hash function is key-dependent and collision resistant. Temporarily, it is extremely robust to content protective operations besides having high accuracy of tampering localization. They are found, the first, to perform very adequately in identification and verification tests, and the second, to be very robust to a large range of attacks. Furthermore, it can be addressed the issue of security of hashes and proposed a keying technique, and thereby a key-dependent hash function.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The model for predicting the competitiveness of science engineering products 科技工程产品竞争力预测模型
A. V. Maslov
{"title":"The model for predicting the competitiveness of science engineering products","authors":"A. V. Maslov","doi":"10.1109/ICAICT.2012.6398511","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398511","url":null,"abstract":"A model for predicting the competitiveness of high-tech products according to changes in consumer preferences and improving the technical characteristics of products based on catastrophe theory.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信