{"title":"Incorporating adaptive discretization into genetic programming for data classification","authors":"Emmanuel Dufourq, N. Pillay","doi":"10.1109/WICT.2013.7113123","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113123","url":null,"abstract":"Genetic programming (GP) for data classification using decision trees has been successful in creating models which obtain high classification accuracies. When categorical data is used GP is able to directly use decision trees to create models, however when the data contains continuous attributes discretization is required as a pre-processing step prior to learning. There has been no attempt to incorporate the discretization mechanism into the GP algorithm and this serves as the rationale for this paper. This paper proposes an adaptive discretization method for inclusion into the GP algorithm by randomly creating intervals during the execution of the algorithm through the use of a new genetic operator. This proposed approach was tested on five data sets and serves as an initial attempt at dynamically altering the intervals of GP decision trees while simultaneously searching for an optimal solution during the learning phase. The proposed method performs well when compared to other non-GP adaptive methods.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132768786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A design of data storage using voice over sensor network(VoSN) systems","authors":"M. K. Jung, Jae Hyung Lee, S. Cho","doi":"10.1109/WICT.2013.7113159","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113159","url":null,"abstract":"Research line actively in the field of multi-media voice and recently emerged from the application of existing home network, remote control, and automatic sensor by using the feature low power consumption, low-speed data, low-cost of IEEE802.15.4. In this paper, we designed a TDMA / TDD MAC of IEEE802.15.4 PHY based for voice storage system using a sensor network of existing; we had developed a hardware Half-duplex system. Further, it was confirmed that in order to analyze the voice quality, it is possible to measure Mean Opinion Score (MOS), as compared to voice conventional systems, to extend the application solution in a production environment.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hoang Van Viet, N. H. Minh, Bui The Truyen, Nguyen Thi Nga
{"title":"Improving on the integrated Diffie-Hellman-GOST.R94 key agreement protocols","authors":"Hoang Van Viet, N. H. Minh, Bui The Truyen, Nguyen Thi Nga","doi":"10.1109/WICT.2013.7113119","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113119","url":null,"abstract":"Recently, there are some works that developed key exchange protocol by integrating Diffie Hellman key exchange protocol (DHKE) into Digital Signature Algorithm (DSA). It was claimed that the protocols provide known key authentication, forward secrecy, known-key security, unknown key-share attack, key relay attack and key freshness. In this Paper, we show that the protocols do not provide session-state reveal attribute which is one of the standard security attributes that key exchange protocols should have. We also present two new protocols: NDH-GOST1 and NDH-GOST2 which ensure the session-state reveal property.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115817132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The method for improving sound quality of IEEE 802.15.4 PHY based voice communication with TDMA/TDD MAC protocol","authors":"Hoon-Jae Lee, M. K. Jung, S. Cho","doi":"10.1109/WICT.2013.7113105","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113105","url":null,"abstract":"Sensor network-based voice communications research has been focused on realizing the voice call. In recent years, there are the needs to improve call quality in voice communication based on sensor network. Therefore in this paper, we propose the TDMA/TDD MAC which is based on IEEE 802.15.4 PHY in order to realize a clean voice calls which are based on sensor network. In addition, the results were verified by comparing MOS of the proposed system and the previous system.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized discernibility function based attribute reduction in set-valued decision systems","authors":"T. Phung","doi":"10.1109/WICT.2013.7113139","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113139","url":null,"abstract":"Rough set approach for attribute reduction is an important research subject in data mining and machine learning. However, most of attribute reduction methods are performed on single-valued decision system decision table. In this paper, we propose methods for attribute reduction in static set-valued decision systems and dynamic set-valued decision systems with dynamically-increasing and decreasing conditional attributes. The methods use generalized discernibility matrix and function in tolerance-based rough sets.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122922163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New design switching rule for the robust mean square stability of uncertain stochastic discrete-time hybrid systems","authors":"G. Rajchakit","doi":"10.1109/WICT.2013.7113137","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113137","url":null,"abstract":"This paper is concerned with robust mean square stability of uncertain stochastic switched discrete time-delay systems. The system to be considered is subject to interval time-varying delays, which allows the delay to be a fast time-varying function and the lower bound is not restricted to zero. Based on the discrete Lyapunov functional, a switching rule for the robust mean square stability for the uncertain stochastic discrete time-delay system is designed via linear matrix inequalities.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"T162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New delay-dependent sufficient conditions for the exponential stability of linear hybrid systems with interval time-varying delays","authors":"M. Rajchakit, G. Rajchakit","doi":"10.1109/WICT.2013.7113140","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113140","url":null,"abstract":"This paper is concerned with exponential stability of switched linear systems with interval time-varying delays. The time delay is any continuous function belonging to a given interval, in which the lower bound of delay is not restricted to zero. By constructing a suitable augmented Lyapunov-Krasovskii functional combined with Leibniz-Newton's formula, a switching rule for the exponential stability of switched linear systems with interval time-varying delays and new delay-dependent sufficient conditions for the exponential stability of the systems are first established in terms of LMIs.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129765834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On selection of representative object set for attribute reduction in set-valued information systems","authors":"T. Phung","doi":"10.1109/WICT.2013.7113147","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113147","url":null,"abstract":"In recent years, there have been many researches on tolerance rough set to solve attribute reduction and rule extraction problems in set-valued information systems. For attribute reduction problems, the most important issue is to minimize the time complexity of attribute reduction algorithms. There have been many methods for attribute reduction, but finding reducts in these methods is almost performed on initial object set. In this paper, we propose a method for selection representative object set from initial object set to solve attribute reduction problem in set-valued information systems. Because of the size of representative object set is smaller the size of initial object set, our method reduces significantly the time complexity of attribute reduction algorithms.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"2003 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker identification using voice-based cryptography for mobile VoIP secure voice communication","authors":"S. Ryu, Hyoung‐Gook Kim","doi":"10.1109/WICT.2013.7113116","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113116","url":null,"abstract":"This paper presents a speaker identification using voice-based cryptography for mobile VoIP secure voice communication system. The cryptographic public key is generated from the user's voice and used to encrypt the transferred voice data over IP networks. The voice fingerprint from the received voice data is decrypted for the speaker identification based on Bayesian information criterion and Mahalanobis distance.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The computational web technologies for decision of oil problems","authors":"M. Z. Mukimbekov, M. Nakibayeva","doi":"10.1109/WICT.2013.7113097","DOIUrl":"https://doi.org/10.1109/WICT.2013.7113097","url":null,"abstract":"In oil branch for the economic analysis of oil fields' development the high-performance computational technologies, based on modern mathematical methods and computing algorithms are widely used. In this paper, the software developed by authors, for the solution of production's problems on the analysis of oil stratums development's processes taking into account water forcing in wells' system is offered. The software is realized in the form of the web-solution and allows to model three-dimensional stratum processes at high level.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}