International Journal of Software Engineering and Computer Systems最新文献

筛选
英文 中文
DUAL FEATURE EXTRACTION TECHNIQUES FOR IRIS RECOGNITION SYSTEM 虹膜识别系统的双特征提取技术
International Journal of Software Engineering and Computer Systems Pub Date : 2019-02-01 DOI: 10.15282/IJSECS.5.1.2019.1.0051
T. O. Aro, M. B. Jibrin, O. Matiluko, I. S. Abdulkadir, I. O Oluwaseyi
{"title":"DUAL FEATURE EXTRACTION TECHNIQUES FOR IRIS RECOGNITION SYSTEM","authors":"T. O. Aro, M. B. Jibrin, O. Matiluko, I. S. Abdulkadir, I. O Oluwaseyi","doi":"10.15282/IJSECS.5.1.2019.1.0051","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.1.0051","url":null,"abstract":"The extraction of feature remains the significant phase in recognition system using iris. A successful recognition rate and reduction in classification time of two iris templates mostly depend on efficient feature extraction technique. This paper performs comparative analysis on two selected feature extraction techniques: Gabor Wavelet Transform (GWT) and Scale Invariant Feature Transform (SIFT). The developed system was evaluated with CASIA iris dataset. Performance evaluation of the system based on False Acceptance Rate (FAR), False Rejection Rate (FRR), Error Rate (ER) and accuracy produced different results of each technique. It was showed that the Gabor Wavelet Transform gave FAR of 0.9500, FRR of 0.0750, 92% of accuracy, and ER of 8% as compared with the SIFT technique which gave FAR of 0.900, FRR of 0.0631, ERR of 16.6% and 88.33% of accuracy. Finally, the results of comparative analysis showed that Gabor Wavelet Transform outperformed SIFT technique. From the results obtained, GWT is strongly recommended as a feature extraction method for the development of a robust iris authentication system.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87172851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EFFICIENT METHOD TO IMPROVE HUMAN BRAIN SENSOR ACTIVITIES USING PROPOSED NEUROHEADSET DEVICE EMBEDDED WITH SENSORS: A COMPREHENSIVE STUDY 利用嵌入传感器的神经耳机设备改善人脑传感器活动的有效方法:一项综合研究
International Journal of Software Engineering and Computer Systems Pub Date : 2019-02-01 DOI: 10.15282/IJSECS.5.1.2019.4.0054
Rajib Chowdhury, A. Saif
{"title":"EFFICIENT METHOD TO IMPROVE HUMAN BRAIN SENSOR ACTIVITIES USING PROPOSED NEUROHEADSET DEVICE EMBEDDED WITH SENSORS: A COMPREHENSIVE STUDY","authors":"Rajib Chowdhury, A. Saif","doi":"10.15282/IJSECS.5.1.2019.4.0054","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.4.0054","url":null,"abstract":"The main purpose of this research is to investigate the human brain sensor activities related prior researches towards the needs of an efficient method to improve the human brain sensor activities. Human brain activities mainly measured by brain signal acquired from  the  brain  sensor  electrodes  positioned  on  several  parts  of  the  brain cortex. Although previous researches investigated human brain activities in various aspects, the improvement of the human brain sensor activities is still unsolved. In today’s world, it is very crucial need for improving the sensor activities of the human brain using that human brain improved signal externally. This research demonstrated a comprehensive critical  analysis  of  human  brain  activities  related  prior  researches  to  claim  for  an efficient method integrated with proposed neuroheadset device. This research presented a comprehensive review in various aspects like previous methods, existing frameworks analysis and existing results analysis with the discussion to establish an efficient method for acquiring human brain signal, improving the acquired signal and developing the sensor activities of the human brain using that human brain improved signal. Demonstrated critical review has expected for constituting an efficient method to improve the performance of maneuverability, visualization, subliminal activities and so forth on human brain activities. \u0000Keywords: Human Brain Activities; Human Brain Signal; Efficient Method; ProposedNeuroheadset Device; Brain Engineering;","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82162895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near Optimum User Selection for Minimum Mean Square Error Based Tomlinson Harashima Precoding 基于最小均方误差的Tomlinson Harashima预编码近最优用户选择
International Journal of Software Engineering and Computer Systems Pub Date : 2019-01-31 DOI: 10.15344/2456-4451/2019/142
S. Denno, T. Baba, Kenta Asaka, Yafei Hou
{"title":"Near Optimum User Selection for Minimum Mean Square Error Based Tomlinson Harashima Precoding","authors":"S. Denno, T. Baba, Kenta Asaka, Yafei Hou","doi":"10.15344/2456-4451/2019/142","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/142","url":null,"abstract":"This paper proposes novel user selection techniques for the Tomlinson-Harashima precoding (THP) based on the minimum mean square error (MMSE) criterion. These techniques utilize a part of the intermediate values in the derivation of the THP weight, which makes it possible to implement the techniques with lower computational complexity. For further complexity reduction, we propose successive user selection techniques based on the techniques proposed above where user terminals are selected one by one. It is confirmed by computer simulations that the proposed techniques outperform conventional selection techniques. The computational complexity of the successive selection techniques is about 1/20 as small as that of the original selection techniques when 4 user terminals are selected out of 10 terminals.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87555106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Personal Use Vehicle Anti-Theft Tracking System Using IoT Platform 基于物联网平台的自用车辆防盗跟踪系统
International Journal of Software Engineering and Computer Systems Pub Date : 2019-01-22 DOI: 10.15344/2456-4451/2019/141
Saw Nang Paing, M. Oo, Mazliza Othman, N. Funabiki
{"title":"A Personal Use Vehicle Anti-Theft Tracking System Using IoT Platform","authors":"Saw Nang Paing, M. Oo, Mazliza Othman, N. Funabiki","doi":"10.15344/2456-4451/2019/141","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/141","url":null,"abstract":"Recently, the vehicle theft has become the serious issue in developing countries including Myanmar, due to the rapid increase of vehicles. Then, a Vehicle Anti-theft Tracking (VAT) system can play an important role to protect it. Unfortunately, a conventional VAT system is too expensive to be introduced for many people in such countries. On the one hand, the Internet of Things (IoT) has come out as a popular technology changing the concept of “connecting people” to “connecting things”, where low-cost IoT devices and cloud platforms have become available. In this paper, we propose a personal use VAT system using IoT platform that can be easily introduced due to the very low cost. This system has the following features: (1) the vehicle theft is detected using an Arduino-connected GPS module, (2) the alarm message is sent to the mobile phone of the vehicle owner as an SMS message on GSM, (3) the conditions of GPS/GSM modules are always monitored where the alarm is sent to the owner if they are not live, and (4) the location data of the vehicle is periodically stored in the IoT cloud platform called ThingSpeak. We implement this system and confirm the correctness of the implemented functions through trial applications.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86997123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Review of IoT Security Framework Based on Mobile Edge Computing 基于移动边缘计算的物联网安全框架综述
International Journal of Software Engineering and Computer Systems Pub Date : 2019-01-01 DOI: 10.15344/2456-4451/2019/148
F. Yong-kai, Zhao Guanqun, Sun Xiaofeng, Lin Xiaodong
{"title":"The Review of IoT Security Framework Based on Mobile Edge Computing","authors":"F. Yong-kai, Zhao Guanqun, Sun Xiaofeng, Lin Xiaodong","doi":"10.15344/2456-4451/2019/148","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/148","url":null,"abstract":"At present, IoT has received extensive attention and has exerted tremendous influence in the life of people and production. The number of actuators and sensors stationed across the world is also growing rapidly. The application of smart devices and smart services has upgraded our lives more refined and more convenient. However, while bringing convenience to our lives, it also brings a series of security and privacy risks. In this article, we have integrated the background knowledge of IoT, including the development process and applications, the mobile edge computing, the security threats, the security requirements and the basic architecture of IoT. On this basis, we focused on the analysis of the mainstream of the academic community. Compared with the IoT security framework adopted by the industry, comparing and evaluating several popular frameworks, we have put forward our own security framework perspectives and possible in-depth research points in the future.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78761506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposal of Transmission Power Minimization Extension in Active Access-Point Configuration Algorithm for Elastic Wireless Local-Area Network System 弹性无线局域网系统主动接入点配置算法中传输功率最小扩展的一种方案
International Journal of Software Engineering and Computer Systems Pub Date : 2018-12-13 DOI: 10.15344/2456-4451/2019/140
Funabiki Nobuo, Kuribayashi Minoru, Kao Wen-Chung
{"title":"A Proposal of Transmission Power Minimization Extension in Active Access-Point Configuration Algorithm for Elastic Wireless Local-Area Network System","authors":"Funabiki Nobuo, Kuribayashi Minoru, Kao Wen-Chung","doi":"10.15344/2456-4451/2019/140","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/140","url":null,"abstract":"Nowadays, the wireless local-area network (WLAN) has become common in the low-cost Internet access solution using wireless communications between access points (APs) and hosts. In WLAN, traffic demands from users tend to fluctuate according to day and time. To minimize the power consumption of active APs, we have studied the elastic WLAN system and implemented the testbed using Raspberry Pi for the AP. Also, the active AP configuration algorithm has been proposed to optimize the active AP configuration with channel assignments and host associations for the elastic WLAN system. In this paper, we propose the transmission power minimization extension in the active AP configuration algorithm to further minimize the power consumption. After the previous algorithm is applied with the maximum transmission power, it minimizes the power of each active AP such that it satisfies the minimum throughput constraint. The effectiveness of our proposal is verified through simulations using the WIMNET simulator and experiments using the testbed in several network scenarios.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"123 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75808835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Determining the Similarity Between Two Arbitrary 2-D Shapes and Its Application to Biological Objects 确定任意二维形状之间的相似性及其在生物物体上的应用
International Journal of Software Engineering and Computer Systems Pub Date : 2018-11-16 DOI: 10.15344/2456-4451/2018/139
P. Perner
{"title":"Determining the Similarity Between Two Arbitrary 2-D Shapes and Its Application to Biological Objects","authors":"P. Perner","doi":"10.15344/2456-4451/2018/139","DOIUrl":"https://doi.org/10.15344/2456-4451/2018/139","url":null,"abstract":"Generalized shape models of objects are necessary to match and identify an object in an image. To acquire these kind of models special methods are necessary that allow to learn the similarity pair-wise similarity between shapes. They mainly concern is the establishment of point correspondences between two shapes and the detection of outlier. Known algorithm assume that the aligned shapes are quite similar in a way. But special problems arise if we have to align shapes that are very different, for example aligning concave to convex shapes. In such cases it is indispensable to take into account the order of the pointsets and to enforce legal sets of correspondences; otherwise the calculated distances are incorrect. We present our novel shape alignment algorithm which can also handle such cases. The algorithm establishes symmetric and legal one-to-one point correspondences between arbitrary shapes, represented as ordered sets of 2D-points and returns a distance measure which runs between 0 and 1.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83883080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of a Part-of-Speech Combination Method for Chinese eWOM Analysis 汉语eWOM词性组合分析方法的发展
International Journal of Software Engineering and Computer Systems Pub Date : 2018-10-24 DOI: 10.15344/2456-4451/2018/138
Yuh-Jen Chen, Yuh-Min Chen
{"title":"Development of a Part-of-Speech Combination Method for Chinese eWOM Analysis","authors":"Yuh-Jen Chen, Yuh-Min Chen","doi":"10.15344/2456-4451/2018/138","DOIUrl":"https://doi.org/10.15344/2456-4451/2018/138","url":null,"abstract":"Electronic word-of-mouth (eWOM) has recently become a common channel for spreading product appraisals and an important reference for enterprise internal improvement. Nevertheless, the various virtual communities that have emerged with the popularity of the Internet have also resulted in information overload because of the explosive growth of eWOM. Therefore, how to help enterprises analyze useful decision references from a large amount of eWOM has become a key issue in implementing customer relationship management (CRM). This study develops a method of Part-of-Speech (POS) combination to support eWOM analysis to effectively help an enterprise rapidly and accurately realize the contents of eWOM appraisals to improve customer relationships. This objective can be achieved by performing the following tasks: (i) designing a process for POS-combination supported eWOM analysis, (ii) developing techniques related to POScombination supported eWOM analysis, and (iii) implementing a mechanism for POS-combination supported eWOM analysis.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"145 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72922503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Defect Classification of Electronic Circuit Board Using Multi-Input Convolutional Neural Network 基于多输入卷积神经网络的电子电路板缺陷分类
International Journal of Software Engineering and Computer Systems Pub Date : 2018-09-17 DOI: 10.15344/2456-4451/2018/137
Tokiko Shiina, Y. Iwahori, B. Kijsirikul
{"title":"Defect Classification of Electronic Circuit Board Using Multi-Input Convolutional Neural Network","authors":"Tokiko Shiina, Y. Iwahori, B. Kijsirikul","doi":"10.15344/2456-4451/2018/137","DOIUrl":"https://doi.org/10.15344/2456-4451/2018/137","url":null,"abstract":"Automatic Optical Inspection (AOI) is introduced in the manufacturing process. Detected defect is classified by the human eys check and human eye check may cause problem of unbalanced accuracy and that of cost. Based on these reasons, automatic defect classification is desired to the manufacuturing process. This paper proposes a convolutional neural network (CNN) of multiple input images with two different connection layers using two test images taken under two different conditions of illumination. Comparison is demonstrated in the experiments and the result suggests that better accuracy is obtained from the multi-input CNN which connects the two different connection layers near input layer. The performance of the proposed approach was validated with the obtained result of experiments.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89037819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big Data Mining for Assessing Calibration of Building Energy Models 建筑能源模型校准评估的大数据挖掘
International Journal of Software Engineering and Computer Systems Pub Date : 2018-09-08 DOI: 10.15344/2456-4451/2018/136
J. New, J. Sanyal, Bob S. Slattery, Anthony A. Gehl, W. Miller, Aaron Garrett
{"title":"Big Data Mining for Assessing Calibration of Building Energy Models","authors":"J. New, J. Sanyal, Bob S. Slattery, Anthony A. Gehl, W. Miller, Aaron Garrett","doi":"10.15344/2456-4451/2018/136","DOIUrl":"https://doi.org/10.15344/2456-4451/2018/136","url":null,"abstract":"Residential and commercial buildings in China, India, the United States (US), United Kingdom (UK), and Italy consume 39-45% of each nation's primary energy. Building energy models can be used to automatically optimize the return-on-investment for retrofits to improve a building’s energy efficiency. However, with an average of 3,000 building descriptors necessary to accurately simulate a single building, there is a market need to reduce the transaction cost for creating a more robust model for simulating every building in a city and accurately estimate savings prior to capital expenditures. We used two of the world’s fastest supercomputers, assembled unique datasets, and developed innovative algorithms for big data mining to assess different methods to create an accurate building energy model. The team has leveraged a total of eight high performance computing resources and 218 servers to analyze the best methods, metrics, and algorithms for creating an accurate building energy model beyond current industry standards necessary for private-sector financing. The project developed the world’s fastest buildings simulator, has completed over 8 million simulations totaling over 300TB, and mined this data with over 130,000 parallel artificial intelligence algorithms. This was used to quantify accuracy of AI-developed calibration algorithms with results that surpass industry standard guidelines and can identify individual building parameters to between 15% and 32% of their actual value.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86568257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信