Computer Science & Information Technology (CS & IT )最新文献

筛选
英文 中文
APPLICATION OF DOMAIN SPECIFIC LANGUAGE FOR DESCRIBING AN ONLINE FILE STORAGE SYSTEM 应用领域特定语言描述在线文件存储系统
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90610
Salla Nelson Stanley
{"title":"APPLICATION OF DOMAIN SPECIFIC LANGUAGE FOR DESCRIBING AN ONLINE FILE STORAGE SYSTEM","authors":"Salla Nelson Stanley","doi":"10.5121/CSIT.2019.90610","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90610","url":null,"abstract":"This research Intends to develop an online File Storage/book-bank monitoring system using a well-known Domain Specific Language for Kebbi State University of Science and Technology. It was intended to address the current problems encountered in using a manual system to monitor the activities of the book-banks in Kebbi State University of Science and Technology Aliero library. Interviews, observation and record consultation were used to gather data. The research analyzes the system requirements and then came up with the requirements specifications and system specifications. The system was designed in accordance with specifications to satisfy the requirements. The system designed was implemented with MYSQL, PHP and HTML. The system is designed as an interactive and content management system which deals with data entry, validation and updating while the interactive system deals with system interaction with the users. The system is capable to largely address the problems mentioned in the existing system.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117080661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESEARCH ON GAIT PREDICTION BASED ON LSTM 基于LSTM的步态预测研究
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90603
Bofan Liang, Qili Chen
{"title":"RESEARCH ON GAIT PREDICTION BASED ON LSTM","authors":"Bofan Liang, Qili Chen","doi":"10.5121/CSIT.2019.90603","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90603","url":null,"abstract":"With an aging population that continues to grow, the protection and assistance of the older persons has become a very important issue. Falls are the main safety problems of the elderly people, so it is very important to predict the falls. In this paper, a gait prediction method is proposed. Firstly, the lumbar posture of the human body is measured by the acceleration gyroscope as the gait feature, and then the gait is predicted by the LSTM network. The experimental results show that the RMSE between the gait trend predicted by the method and the actual gait trend can be reached a level of 0.06 ± 0.01. The proposed method can predict the gait trend well.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PROBABILITY-DIRECTED PROBLEM OPTIMIZATION TECHNIQUE FOR SOLVING SYSTEMS OF LINEAR AND NON-LINEAR EQUATIONS 求解线性和非线性方程组的概率导向问题优化技术
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90605
M. Al-Muhammed
{"title":"PROBABILITY-DIRECTED PROBLEM OPTIMIZATION TECHNIQUE FOR SOLVING SYSTEMS OF LINEAR AND NON-LINEAR EQUATIONS","authors":"M. Al-Muhammed","doi":"10.5121/CSIT.2019.90605","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90605","url":null,"abstract":"Although many methods have been proposed for solving linear or nonlinear systems of equations, there is always a pressing need for more effective and efficient methods. Good methods should produce solutions with high precision and speed. This paper proposed an innovative method for solving systems of linear and nonlinear equations. This method transforms the problem into an optimization problem and uses a probability guided search technique for solving this optimization problem, which is the solution for the system of equations. The transformation results in an aggregate violation function and a criterion function. The aggregation violation function is composed of the constraints that represent the equations and whose satisfaction is a solution for the system of equations. The criterion function intelligently guides the search for the solution to the aggregate violation function by determining when the constraints must be checked; thereby avoiding unnecessary, timeintensive checks for the constraints. Experiments conducted with our prototype implementation showed that our method is effective in finding solutions with high precision and efficient in terms of CPU time.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115559288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COPING WITH CLASS IMBALANCE IN CLASSIFICATION OF TRAFFIC CRASH SEVERITY BASED ON SENSOR AND ROAD DATA: A FEATURE SELECTION AND DATA AUGMENTATION APPROACH 基于传感器和道路数据处理交通碰撞严重程度分类中的类不平衡:一种特征选择和数据增强方法
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90611
Deepti Lamba, Majed Alsadhan, W. Hsu, Eric J. Fitzsimmons
{"title":"COPING WITH CLASS IMBALANCE IN CLASSIFICATION OF TRAFFIC CRASH SEVERITY BASED ON SENSOR AND ROAD DATA: A FEATURE SELECTION AND DATA AUGMENTATION APPROACH","authors":"Deepti Lamba, Majed Alsadhan, W. Hsu, Eric J. Fitzsimmons","doi":"10.5121/CSIT.2019.90611","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90611","url":null,"abstract":"This paper presents machine learning-based approaches to classification of historical traffic crashes in Kansas by severity, applied to a data set consisting of highway geometry, weather, and road sensor data. The goal of this work is to identify relevant features using a variety of loss measures and algorithms for feature selection. This is shown to facilitate the discovery of the most relevant sensors for the task of learning to predict severe crashes (those involving bodily injury). The key technical challenges are to cope with class imbalance (as a 75% majority of crashes are non-severe) and a highly correlated and redundant set of features from multiple coalesced sources. The major novel contributions of this work are the development of a random oversampling strategy for data augmentation, combined with the systematic application of multiple feature selection measures over a range of supervised inductive learning models and algorithms. Positive results from this approach, on a data set of 277 initial ground features and 20,000 vehicle crashes collected over 9 years (2007 – 2015) by the Kansas Department of Transportation (KDOT), included models trained using 30 features (out of 277) that achieve cross-validation precision and recall comparable to those obtained using the full set of features. These and other results point towards potential use of feature selection findings and the resultant models in planning future road construction.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128242748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
NUCLEAR: AN EFFICIENT METHOD FOR MINING FREQUENT ITEMSETS BASED ON KERNELS AND EXTENDABLE SETS 核:一种基于核和可扩展集的挖掘频繁项集的有效方法
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90607
H. Pham, Duc-Hoc Tran, Ninh Bao Duong, Philippe Fournier-Viger, A. Ngom
{"title":"NUCLEAR: AN EFFICIENT METHOD FOR MINING FREQUENT ITEMSETS BASED ON KERNELS AND EXTENDABLE SETS","authors":"H. Pham, Duc-Hoc Tran, Ninh Bao Duong, Philippe Fournier-Viger, A. Ngom","doi":"10.5121/CSIT.2019.90607","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90607","url":null,"abstract":"Frequent itemset (FI) mining is an interesting data mining task. Directly mining the FIs from data often requires lots of time and memory, and should be avoided in many cases. A more preferred approach is to mine only the frequent closed itemsets (FCIs) first and then extract the FIs for each FCI because the number of FCIs is usually much less than that of the FIs. However, some algorithms require the generators for each FCI to extract the FIs, leading to an extra cost. In this paper, based on the concepts of “kernel set” and “extendable set”, we introduce the NUCLEAR algorithm which easily and quickly induces the FIs from the lattice of FCIs without the need of the generators. Experimental results showed that NUCLEAR is effective as compared to previous studies, especially, the time for extracting the FIs is usually much smaller than that for mining the FCIs.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN ADVISING SYSTEM FOR PARKING USING CANNY AND K-NN TECHNIQUES 使用canny和k-nn技术的停车提示系统
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90604
C. Dow, Wei-kang Wang, Huu-Huy Ngo, Shiow-Fen Hwang
{"title":"AN ADVISING SYSTEM FOR PARKING USING CANNY AND K-NN TECHNIQUES","authors":"C. Dow, Wei-kang Wang, Huu-Huy Ngo, Shiow-Fen Hwang","doi":"10.5121/CSIT.2019.90604","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90604","url":null,"abstract":"This study proposes a system which provides the parking characteristics and an application service platform. This system can be used to assist in selecting the parking space for drivers. The system can identify the contours of vehicles, such as cars and motorcycles by using the Canny algorithm. The data can be used to create the dataset and calculate the Parking density. Next, we use the k-nearest neighbour (K-NN) algorithm to produce the parking pattern. The model makes predictions for different conditions at different time.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133997186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BRAIN COMPUTER INTERFACE FOR BIOMETRIC AUTHENTICATION BY RECORDING SIGNAL 脑机接口,通过记录信号进行生物识别认证
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90613
Abd Abrahim Mosslah, R. Mahdi, S. M. Al-Barzinji
{"title":"BRAIN COMPUTER INTERFACE FOR BIOMETRIC AUTHENTICATION BY RECORDING SIGNAL","authors":"Abd Abrahim Mosslah, R. Mahdi, S. M. Al-Barzinji","doi":"10.5121/CSIT.2019.90613","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90613","url":null,"abstract":"Electroencephalogram(EEG) is done in several ways, which are referred to as brainwaves, which scientists interpret as an electromagnetic phenomenon that reflects the activity in the human brain, this study is used to diagnose brain diseases such as schizophrenia, epilepsy, Parkinson's, Alzheimer's, etc. It is also used in brain machine interfaces and in brain computers. In these applications wireless recording is necessary for these waves. What we need today is Authentication? Authentication is obtained from several techniques, in this paper we will check the efficiency of these techniques such as password and pin. There are also biometrics techniques used to obtain authentication such as heart rate, fingerprint, eye mesh and sound, these techniques give acceptable authentication. If we want to get a technology that gives us integrated and efficient authentication, we use brain wave recording. The aim of the technique in our proposed paper is to improve the efficiency of the reception of radio waves in the brain and to provide authentication.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132613400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MACHINE LEARNING AND WEARABLE DEVICES FOR PHONOCARDIOGRAM-BASED DIAGNOSIS 基于心音图诊断的机器学习和可穿戴设备
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90606
S. Abdelmageed, M. Elmusrati
{"title":"MACHINE LEARNING AND WEARABLE DEVICES FOR PHONOCARDIOGRAM-BASED DIAGNOSIS","authors":"S. Abdelmageed, M. Elmusrati","doi":"10.5121/CSIT.2019.90606","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90606","url":null,"abstract":"The heart sound signal, Phonocardiogram (PCG) is difficult to interpret even for experienced cardiologists. Interpretation are very subjective depending on the hearing ability of the physician. mHealth has been the adopted approach towards simplifying that and getting quick diagnosis using mobile devices. However, it has been challenging due to the required high quality of data, high computation load, and high-power consumption. The aim of this paper is to diagnose the heart condition based on Phonocardiogram analysis using Machine Learning techniques assuming limited processing power to be encapsulated later in a wearable device. The cardiovascular system is modelled in a transfer function to provide PCG signal recording as it would be recorded at the wrist. The signal is, then, decomposed using filter bank and the analysed using discriminant function. The results showed that PCG with a 19 dB Signal-toNoise-Ratio can lead to 97.33% successful diagnosis.The same decomposed signal is then analysed using pattern recognition neural network, and the classification was 100% successful with 83.3% trust level.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131501472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEVELOPMENT OF A KNOWLEDGE- BASED SYSTEM FOR UNDERTAKING THE RISK ANALYSIS OF PROPOSED BUILDING PROJECTS FOR A SELECTED CLIENT 开发一个以知识为基础的系统,为选定的客户进行拟议建筑项目的风险分析
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90608
I. Yakubu
{"title":"DEVELOPMENT OF A KNOWLEDGE- BASED SYSTEM FOR UNDERTAKING THE RISK ANALYSIS OF PROPOSED BUILDING PROJECTS FOR A SELECTED CLIENT","authors":"I. Yakubu","doi":"10.5121/CSIT.2019.90608","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90608","url":null,"abstract":"A Knowledge-Based System for the risk analysis of proposed building projects was developed for a selected client. The Fuzzy Decision Variables (FDVs) that cause differences between initial and final contract sums of building projects were identified, the likelihood of the occurrence of the risks were determined and a Knowledge-Based System that would rank the risks was constructed using JAVA programming language and Graphic User Interface. The Knowledge-Based System is composed a Knowledge Base for storing data, an Inference Engine for controlling and directing the use of knowledge for problem-solution, and a User Interface that assists the user retrieve, use and alter data in the Knowledge Base. The developed Knowledge-Based System was compiled, implemented and validated with data of previously completed projects. The client could utilize the Knowledge-Based System to undertake proposed building projects","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130583576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVIDENCE FOR THE CORRELATION BETWEEN CONFLICT RISK INDICATORS GCRI AND FSI USING DEEP LEARNING 使用深度学习的冲突风险指标gcri和fsi之间相关性的证据
Computer Science & Information Technology (CS & IT ) Pub Date : 2019-05-25 DOI: 10.5121/CSIT.2019.90602
V. Kamp, Jp Knust, R. Moratz, Kevin Stehn, Soren Stohrmann
{"title":"EVIDENCE FOR THE CORRELATION BETWEEN CONFLICT RISK INDICATORS GCRI AND FSI USING DEEP LEARNING","authors":"V. Kamp, Jp Knust, R. Moratz, Kevin Stehn, Soren Stohrmann","doi":"10.5121/CSIT.2019.90602","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90602","url":null,"abstract":"Data mining enables an innovative, largely automatic meta-analysis of the relationship between political and economic geography analyses of crisis regions. As an example, the two approaches Global Conflict Risk Index (GCRI) and Fragile States Index (FSI) can be related to each other. The GCRI is a quantitative conflict risk assessment based on open source data and a statistical regression method developed by the Joint Research Centre of the European Commission. The FSI is based on a conflict assessment framework developed by The Fund for Peace in Washington, DC. In contrast to the quantitative GCRI, the FSI is essentially focused on qualitative data. Both approaches therefore have closely related objectives, but very different methodologies and data sources. It is therefore hoped that the two complementary approaches can be combined to form an even more meaningful meta-analysis, or that contradictions can be discovered, or that a validation of the approaches can be obtained if there are similarities. We propose an approach to automatic meta-analysis that makes use of machine learning (data mining). Such a procedure represents a novel approach in the meta-analysis of conflict risk analysis.","PeriodicalId":372948,"journal":{"name":"Computer Science & Information Technology (CS & IT )","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123381199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信