World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering最新文献

筛选
英文 中文
Application Design to Release Stress 应用程序设计释放压力
M. Watanabe, T. Fujimoto
{"title":"Application Design to Release Stress","authors":"M. Watanabe, T. Fujimoto","doi":"10.17706/ijcce.2022.11.1.1-9","DOIUrl":"https://doi.org/10.17706/ijcce.2022.11.1.1-9","url":null,"abstract":"In this research, we design an application to release user’s daily stress. It is said that contemporary people are in a pretty stressful situation. For example, in recent years, we have suffered from difficulty to meet friends casually and enjoy talking with them to get rid of our daily stress due to the COVID-19 pandemic. In other words, the variation of ways of overcoming stress have been limited. In addition, people have deteriorated relationships with their family members because of the longer stay-at-home time than before. Health problems such as the onset of depression caused by the stress of the pandemic are also becoming more serious. Moreover, people are worrying of increasing the number of suicides. This situation is one of the problems that people consider it important in the society recently. Therefore, there is an urgent need to find solutions to such a situation. In this research, we develop the functions to cope with daily stress easily for the application of the smartphones that anyone has. We include functions in this application we suggest in this research. They are “vent mode”, which is a dynamic de-stressing method by words, “empathy mode”, which is a static de-stressing method, and “physical touch mode”, which is a dynamic de-stressing method that is accompanied with physical exercise. In addition, we design the application for de-stress in order to break through the stressful situation these days.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"284 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76849269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Pruning Algorithm Based on Optimized Depth Neural Network 基于优化深度神经网络的剪枝算法综述
Qi Song, Xuanze Xia
{"title":"A Survey on Pruning Algorithm Based on Optimized Depth Neural Network","authors":"Qi Song, Xuanze Xia","doi":"10.17706/ijcce.2022.11.2.10-23","DOIUrl":"https://doi.org/10.17706/ijcce.2022.11.2.10-23","url":null,"abstract":": In recent years, deep neural network has continuously renewed its best performance in tasks such as computer vision and natural language processing, and has become the most concerned research direction. Although the performance of deep network model is remarkable, it is still difficult to deploy to the embedded or mobile devices with a limited hardware due to the large number of parameters, high storage and computing costs. It has been found by relevant studies that the depth model based on convolutional neural network has parameter redundancy, and there are parameters that are useless to the final result in the model, which provides theoretical support for the pruning of depth network model. Therefore, how to reduce the model size under the condition of ensuring the model accuracy has become a hot issue. This paper classifies and summarizes the achievements of domestic and foreign scholars in model pruning in recent years, selects several new pruning algorithm methods in different directions, analyzes their functionality through experiments and discusses the current problems of different models and the development direction of pruning model optimization in the future.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88586837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Stages Evaluation for 2D Action Game Generated by DC-GAN Based on Artificial Intelligence 基于人工智能的DC-GAN生成2D动作游戏的阶段评估研究
Kotaro Nagahiro, Sho Ooi, Mutsuo Sano
{"title":"Study on Stages Evaluation for 2D Action Game Generated by DC-GAN Based on Artificial Intelligence","authors":"Kotaro Nagahiro, Sho Ooi, Mutsuo Sano","doi":"10.17706/ijcce.2021.10.2.28-36","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.2.28-36","url":null,"abstract":"Recently, research on generative adversarial networks (GANs) in deep learning has advanced rapidly. For instance, in the field of image recognition, using a GAN, the number of training data was increased. GAN have also been used to create new similar images using training images, which can help designers such as car designer, character designer, game designer and more. We have been researching a method to automatically generate a game stage based on a dot-picture using GAN. So far, we have been studying game stage generation using GAN. In this study, we consider an evaluation method for generated game stages. Specifically, we consider using the A * search algorithm to evaluate the playability of the generated game stage from the number of jumps and the clear time. As a result, the jumping count of an automatically player using the A * algorithm was 17 times for the original stage, 12 times for stage No.1, 16 times for stage No.2, and 18 times for stage No.3. Next, the clear time was 9 seconds for the original stage, 8 seconds for stage No.1, 10 seconds for stage No.2, and 11 seconds for stage No.3. In other words, we suggest stage No.1 is simpler than the original stage, and stage 2 and stage 3 are a little more difficult than the original stage.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88042680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Key Technology of High-Definition Maps Distribution Based on Edge Computing 基于边缘计算的高清地图分发关键技术
Rongbo Zhang, Kaiyu Cai
{"title":"The Key Technology of High-Definition Maps Distribution Based on Edge Computing","authors":"Rongbo Zhang, Kaiyu Cai","doi":"10.17706/ijcce.2021.10.3.52-67","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.3.52-67","url":null,"abstract":"The High-Definition map (HD map) is a key technology to achieve automatic driving above the grade of L3, with the amount of data comes to more than 105 times that of traditional navigation map. With the arrival of 5G communication and the rapid development of Internet of Things, each autonomous vehicle will request HD map service by accessing the Internet. The service of traditional navigation map under “cloud-end” mode may not be well adapted to future HD map application, so the paper proposes a MEC proposal for HD map application, deploying HD map server under “cloud-edge-end” mode to mitigate the high latency and improve low reliability caused by the faraway physical distance rather than “cloud-end” mode. The HD map is divided according to the latitude and longitude regions, being pushed to local edge computing node servers respectively to realize the interaction between autonomous vehicles and edge servers, which makes more convenient and reliable HD map services available. The experimental results show that the proposed proposal can cut off the communication delay effectively, ensuring the reliability of the HD map service, and providing high-quality HD map service for autonomous vehicles.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"105 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76888927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep LSTM for Generating Brand Personalities Using Social Media: A Case Study from Higher Education Institutions 利用社交媒体生成品牌个性的深度LSTM:以高等教育机构为例
Piyumini Wijenayake, D. Alahakoon, Daswin De Silva, S. Kirigeeganage
{"title":"Deep LSTM for Generating Brand Personalities Using Social Media: A Case Study from Higher Education Institutions","authors":"Piyumini Wijenayake, D. Alahakoon, Daswin De Silva, S. Kirigeeganage","doi":"10.17706/IJCCE.2021.10.1.17-27","DOIUrl":"https://doi.org/10.17706/IJCCE.2021.10.1.17-27","url":null,"abstract":": This paper introduces a novel technique to generate brand personalities for organizations from social media text data using a deep bi - directional Long Short - Term Memory (BiLSTM) neural network model in combination with an accepted brand personality scale model. Brand Personality has evolved into an indispensable element in modern business organizations. Currently brand personality of an organization is generated using traditional techniques such as stakeholder interviews, questionnaires, which are time and resource intensive and limited in efficacy. However, the rise of the internet and social media have provided a platform for stakeholders to frequently and freely express their opinions and experiences related to organizations. Such social media data while now successfully being used for customer analytics have not yet been fully investigated and used to understand brand personalities. Our research investigated how this data can be effectively leveraged by organizations to generate and monitor their brand in near real time. Our technique has been successfully demonstrated on Higher Education Institutes, as Higher Education is an industry that is increasingly being exposed to business competition over the last few decades.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"186 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75555141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Digital Recognition System Based on Vernier Caliper 基于游标卡尺的智能数字识别系统
Hui Sun, Feng Shan, Xiaoyu Tang, Weiwei Shi, Xiaowei Wang, Xiaofeng Li, Yuan-Chin Cheng, Haiwei Zhang
{"title":"Intelligent Digital Recognition System Based on Vernier Caliper","authors":"Hui Sun, Feng Shan, Xiaoyu Tang, Weiwei Shi, Xiaowei Wang, Xiaofeng Li, Yuan-Chin Cheng, Haiwei Zhang","doi":"10.17706/IJCCE.2021.10.1.1-8","DOIUrl":"https://doi.org/10.17706/IJCCE.2021.10.1.1-8","url":null,"abstract":"The detection and recognition of information in natural scenes has always been a difficult problem in computer vision. Digital instrument character recognition is one of the more representative and valuable things. In recent years, there is a lot of research work on this problem, but the solutions rely on string location, character segmentation and other preprocessing processes, the results of these preprocessing processes directly affect the final character recognition results. In contrast, the character recognition method of digital instrument based on convolution neural network (CNN) omits the complex preprocessing process through graph to graph prediction, and the character recognition result is obtaind directly. And has a strong generalization ability, can identify multiple types of instruments. At the same time, through the weighted fusion of muti-scale and multi-level features in the CNN, a better ability of feature extraction and information integration is obtained. The experimental results show that the method can directly and accurately recognize the characters in the Vernier caliper.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"37 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83843418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Communication Characteristics of Projectile-Carried Communication Jamming Object 弹载通信干扰目标通信特性分析
Jie Zhang, Haixia Shao, Haijun Wang
{"title":"Analysis of Communication Characteristics of Projectile-Carried Communication Jamming Object","authors":"Jie Zhang, Haixia Shao, Haijun Wang","doi":"10.17706/IJCCE.2021.10.1.9-16","DOIUrl":"https://doi.org/10.17706/IJCCE.2021.10.1.9-16","url":null,"abstract":"In order to facilitate the construction of projectile-carried communication jamming system model, this paper used the methods of literature search, classification and summary, and details sorting, deeply analyzing the communication characteristics of projectile-carried communication jamming object from seven aspects, including communication modulation mode, antenna type, antenna length, antenna transmission gain, sensitivity calculation, jamming tolerance, initial synchronization process and its characteristics. Then, the boundary conditions of projectile-carried communication jamming object were determined. In other words, the modulation mode of projectile-carried communication jamming object was 2FSK, the antenna type was whip antenna, the antenna length was 2 m or 2.4 m, the short wave antenna transmission gain was -10.5912 dBi, the ultrashort wave antenna transmission gain was -1.383 dBi, the jamming tolerance was 32% of the available frequency, and the initial synchronization time was calculated as 182 ms. The relevant conclusions lay a foundation for the follow-up study of projectile-carried communication jamming performance.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"162 1","pages":"9-16"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75429258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Critical Review of SQL-Based Mining Relational Database 基于sql的关系数据库挖掘技术综述
Yuexiao Teng
{"title":"A Critical Review of SQL-Based Mining Relational Database","authors":"Yuexiao Teng","doi":"10.17706/ijcce.2021.10.3.68-74","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.3.68-74","url":null,"abstract":"Mining database aims to discover hidden, yet potentially useful knowledge in database and it has many applications. SQL-based mining relational database is one of its branches, which takes advantage of Standard Query Language to mine datasets. However, due to the little survey research emphasis on this very specific area, currently few literature review has been conducted to investigate, summarize or critique this field. In order to fill this existing gap, in this paper, an original critical review has been carried out, which is based on academic research papers since 1990. To author’s best knowledge, it is the first time to conduct such a review in a critical way regarding SQL-based mining relational database. This review highlights a strong point and a point of improvement and organized in a reversely chronologic order. The review result shows that since 1990, there have been some research work done to mine relational database by SQL. Almost all of it was empirical and some of it was based on the extension of the standard SQL, however all of research or proposed systems did not support distributed relational databases.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84959998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A GAN-Based Data Augmentation Approach for Sensor-Based Human Activity Recognition 一种基于gan的基于传感器的人体活动识别数据增强方法
Wen-Hui Chen, Po-Chuan Cho
{"title":"A GAN-Based Data Augmentation Approach for Sensor-Based Human Activity Recognition","authors":"Wen-Hui Chen, Po-Chuan Cho","doi":"10.17706/ijcce.2021.10.4.75-84","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.4.75-84","url":null,"abstract":"Recently, deep learning has emerged as a powerful technique and been successfully employed for various tasks. It has also been applied to human activity recognition and showed better performance than traditional machine learning algorithms. However, the success of deep learning always comes with large labeled datasets when the learning model goes deeper. If the training data is limited, the performance of the classification model may not generally perform well due to overfitting of the networks to the training data, which can be alleviated through data augmentation. Generative adversarial networks (GANs) can be used as a technique to produce data artificially. GAN-based approaches have made rapid progress in generating synthetic data, but they are mostly studied for image data. Comparatively little research has been conducted to examine the effectiveness of generating sensor data using GANs. This study aims to investigate the data scarcity problem by using conditional generative adversarial networks (CGANs) as a data augmentation method. The proposed approach was experimentally evaluated on a benchmark sensor dataset for activity recognition. The experimental results showed that the proposed approach can boost the model accuracy and has better performance when compared with existing approaches.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91145058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of DNS Covert Channel Based on Stacking Method 基于叠加法的DNS隐蔽通道识别
Peng Yang, Xinxin Wan, Guangye Shi, Hao Qu, Juan Li, Lixin Yang
{"title":"Identification of DNS Covert Channel Based on Stacking Method","authors":"Peng Yang, Xinxin Wan, Guangye Shi, Hao Qu, Juan Li, Lixin Yang","doi":"10.17706/ijcce.2021.10.2.37-51","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.2.37-51","url":null,"abstract":"A covert channel is an information channel which is used by computer process to exfiltrate data through bypassing security policies. The domain name system (DNS) protocol is one of the important ways to implement a covert channel. DNS covert channels are easily used by attackers for malicious purposes. Therefore, an effective detection of the DNS covert channels is significant for computer system and network security. Aiming at the difficulty of the DNS covert channel identification, we propose a DNS covert channel detection method based on stacking model. The stacking model is evaluated in a campus network and the experimental results show that the detection based on the stacking model can detect the DNS covert channels effectively. Besides, it can also identify unknown covert channel traffic. The area under the curve (AUC) of the proposed method, reaching 0.9901, outperforms the existed methods.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":"55 6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85246511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信