2017 20th International Conference of Computer and Information Technology (ICCIT)最新文献

筛选
英文 中文
Bangla handwritten numeral character recognition using directional pattern 使用方向模式的孟加拉手写数字字符识别
2017 20th International Conference of Computer and Information Technology (ICCIT) Pub Date : 2017-12-01 DOI: 10.1109/ICCITECHN.2017.8281820
T. Aziz, Al Shahriar Rubelt, Md Sirajus Salekin, Rafsanjany Kushol
{"title":"Bangla handwritten numeral character recognition using directional pattern","authors":"T. Aziz, Al Shahriar Rubelt, Md Sirajus Salekin, Rafsanjany Kushol","doi":"10.1109/ICCITECHN.2017.8281820","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2017.8281820","url":null,"abstract":"Handwritten character recognition has become a challenging and interesting field in the recent days due to its complex character shapes and huge pragmatic applications. A lot of research is already done and underway on English alphabets and numerals recognition. But in case of Bangla, even being the fifth largest spoken language in the world, has not undergone that much research. Besides, different complex shape of Bangla character makes the recognition more challenging. In this paper, we propose a directional pattern approach for feature extraction of Bangla numeric characters which attains a high accuracy of recognition. We use Local Directional Pattern (LDP) and Gradient Directional Pattern (GDP) for feature extraction and then two well-known machine learning algorithms, K-Nearest Neighbour (KNN) and Support Vector Machine (SVM), to classify the numeric character. We also ensemble the pattern oriented results to enhance the accuracy. Experimental results on the benchmark dataset CMATERdb 3.1.1 demonstrates an astounding recognition rate of accuracy 95.62% without preprocessing the data.","PeriodicalId":350374,"journal":{"name":"2017 20th International Conference of Computer and Information Technology (ICCIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An initial centroid selection method based on radial and angular coordinates for K-means algorithm 基于径向和角坐标的K-means算法初始质心选择方法
2017 20th International Conference of Computer and Information Technology (ICCIT) Pub Date : 2017-12-01 DOI: 10.1109/ICCITECHN.2017.8281801
Md Shamsur Rahim, Tanvir Ahmed
{"title":"An initial centroid selection method based on radial and angular coordinates for K-means algorithm","authors":"Md Shamsur Rahim, Tanvir Ahmed","doi":"10.1109/ICCITECHN.2017.8281801","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2017.8281801","url":null,"abstract":"Clustering is a technique for dividing a set of similar objects into same groups and dissimilar objects into different groups. Among different clustering algorithms, the K-means algorithm is considered as the most popular due to its simplicity. However, the outcome from the K-means algorithm is highly sensitive to the initial centroid selection. As a consequence, the selection of initial centroids in the K-means algorithm plays a crucial part in accuracy and efficiency. To select the initial centroids more effectively, in this paper, we propose a new method based on radial and angular coordinates. To check the feasibility of the proposed method, we compare our method with the standard K-means algorithm. For the comparison, we use synthetic data sets with different size of instances and number of clusters. The experiment shows that in most of the cases the proposed method clearly dominates over the standard K-means algorithm in terms of execution time and required number of iterations.","PeriodicalId":350374,"journal":{"name":"2017 20th International Conference of Computer and Information Technology (ICCIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Optimization of collaborative transportation scheduling in supply chain management with TPL using chemical reaction optimization 基于化学反应优化的TPL供应链协同运输调度优化
2017 20th International Conference of Computer and Information Technology (ICCIT) Pub Date : 2017-12-01 DOI: 10.1109/ICCITECHN.2017.8281767
M. Mahmud, Rayhan Morshed Pritom, Md. Rafiqul Islam
{"title":"Optimization of collaborative transportation scheduling in supply chain management with TPL using chemical reaction optimization","authors":"M. Mahmud, Rayhan Morshed Pritom, Md. Rafiqul Islam","doi":"10.1109/ICCITECHN.2017.8281767","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2017.8281767","url":null,"abstract":"Optimization includes resources and existing technologies at the best possible way. We have studied and analyzed the characteristics of transportation vehicle scheduling problem in supply chain management with third party logistics enterprise. At first, we have classified all the transportation nodes into three distinct classifications. In this paper, a collaborative transportation scheduling strategy is proposed based on two special kinds of transportation nodes that have integrated the self-support vehicle and TPL vehicle resource. Then, depending on the transport criteria of each kind of transportation nodes, we have proposed a chemical reaction optimization algorithm with four reaction operators to minimize the transportation cost. The simulation results demonstrate that the proposed approach is practical and efficient than existing ACO based solution.","PeriodicalId":350374,"journal":{"name":"2017 20th International Conference of Computer and Information Technology (ICCIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123420752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Web service performance enhancement for portable devices modifying SOAP security principle 修改SOAP安全原则的便携式设备的Web服务性能增强
2017 20th International Conference of Computer and Information Technology (ICCIT) Pub Date : 2017-12-01 DOI: 10.1109/ICCITECHN.2017.8281799
Debasish Chakroborti, Sristy Sumana Nath
{"title":"Web service performance enhancement for portable devices modifying SOAP security principle","authors":"Debasish Chakroborti, Sristy Sumana Nath","doi":"10.1109/ICCITECHN.2017.8281799","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2017.8281799","url":null,"abstract":"Nowadays most of the wed applications are bound to Service Oriented Architecture (SOA) [1], [11], [14] such as — inter-operable web services, and their performance and security greatly depend on the backend structure of web service. Web Service has two layers of security — message level security (WS-Security) and transport level security [18]. In WS-Security, embedding of security modules within SOAP message increases the line of code which lengthens the response time and thus decreases the overall performance of web services [13], [20]. Our experiments on different web services showed that, among three security modules of WS-Security of SOAP message, authentication module requires processing time the most, in Table I. Another essential part of web service is WSDL and security for WSDL is emphasized by few researchers recently as it is open to access and vulnerable for presenting SOAP messaging information [1], [4], [13]. Restricted access of WSDL file can play a strong role to increase the authentication and overall security of web service as in [4]. In this paper, we have proposed a new model to improve web service performance modifying the security principle of SOAP message and tethering WSDL file to facilitate authentication. Experimental results on our model have shown significant improvements in the line of code and response time over the traditional approach without compromising any WS-Security module's contrivances (Authentication, Signature, and Encryption).","PeriodicalId":350374,"journal":{"name":"2017 20th International Conference of Computer and Information Technology (ICCIT)","volume":"147 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125869526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bengali handwritten character recognition using deep convolutional neural network 使用深度卷积神经网络的孟加拉手写字符识别
2017 20th International Conference of Computer and Information Technology (ICCIT) Pub Date : 2017-12-01 DOI: 10.1109/ICCITECHN.2017.8281853
Bishwajit Purkaystha, T. Datta, Md Saiful Islam
{"title":"Bengali handwritten character recognition using deep convolutional neural network","authors":"Bishwajit Purkaystha, T. Datta, Md Saiful Islam","doi":"10.1109/ICCITECHN.2017.8281853","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2017.8281853","url":null,"abstract":"Handwritten character recognition is a nontrivial task as it seeks to recognize the correct class for user independent handwritten characters. This problem becomes even more challenging for a highly stylized, morphologically complex, and potentially juxtapositional characters comprising language like Bengali. As a result, the improvements over the years in Bengali character recognition are significantly less as compared to the other languages. In this paper, we propose a convolutional deep model to recognize Bengali handwritten characters. We first learnt a useful set of features by using kernels and local receptive fields, and then we have employed densely connected layers for the discrimination task. Our system has been tested on BanglaLekha-Isolated dataset. It achieves 98.66% accuracy on numerals (10 character classes), 94.99% accuracy on vowels (11 character classes), 91.60% accuracy on compound letters (20 character classes), 91.23% accuracy on alphabets (50 character classes), and 89.93% accuracy on almost all Bengali characters (80 character classes). Most of the errors incurred by our model in recognition task are due to extreme proximity in shapes among characters. A significant number of errors was caused by the mislabeled, irrecoverably distorted, and illegal data examples.","PeriodicalId":350374,"journal":{"name":"2017 20th International Conference of Computer and Information Technology (ICCIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Exhaustive study of essential constraint satisfaction problem techniques based on N-Queens problem 基于N-Queens问题的基本约束满足问题技术的详尽研究
2017 20th International Conference of Computer and Information Technology (ICCIT) Pub Date : 2017-10-23 DOI: 10.1109/ICCITECHN.2017.8281850
Md. Ahsan Ayub, K. Kalpoma, Humaira Tasnim Proma, Syed Mehrab Kabir, Rakib Ibna Hamid Chowdhury
{"title":"Exhaustive study of essential constraint satisfaction problem techniques based on N-Queens problem","authors":"Md. Ahsan Ayub, K. Kalpoma, Humaira Tasnim Proma, Syed Mehrab Kabir, Rakib Ibna Hamid Chowdhury","doi":"10.1109/ICCITECHN.2017.8281850","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2017.8281850","url":null,"abstract":"Constraint Satisfaction Problem (CSP) is observed in various applications, i.e., scheduling problems, timetabling problems, assignment problems, etc. Researchers adopt a CSP technique to tackle a certain problem; however, each technique follows different approaches and ways to solve a problem network. In this exhaustive study, it has been possible to visualize the processes of essential CSP algorithms from a very concrete constraint satisfaction example, N-Queens Problem, in order to possess a deep understanding about how a particular constraint satisfaction problem will be dealt with by the studied and implemented techniques. Besides, benchmark results — time vs. value of N in N-Queens — have been generated from the implemented approaches, which help understand at what factor each algorithm produces solutions; especially, in N-Queens puzzle. Thus, extended decisions can be made to instantiate a real life problem within CSP's framework.","PeriodicalId":350374,"journal":{"name":"2017 20th International Conference of Computer and Information Technology (ICCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116668717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信