Open Computer Science最新文献

筛选
英文 中文
The effect of hyperparameter search on artificial neural network in human activity recognition 超参数搜索对人工神经网络在人体活动识别中的作用
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0227
J. Suto
{"title":"The effect of hyperparameter search on artificial neural network in human activity recognition","authors":"J. Suto","doi":"10.1515/comp-2020-0227","DOIUrl":"https://doi.org/10.1515/comp-2020-0227","url":null,"abstract":"Abstract In the last decade, many researchers applied shallow and deep networks for human activity recognition (HAR). Currently, the trending research line in HAR is applying deep learning to extract features and classify activities from raw data. However, we observed that, authors of previous studies have not performed an efficient hyperparameter search on their artificial neural network (shallow or deep)-based classifier. Therefore, in this article, we demonstrate the effect of the random and Bayesian parameter search on a shallow neural network using five HAR databases. The result of this work shows that a shallow neural network with correct parameter optimization can achieve similar or even better recognition accuracy than the previous best deep classifier(s) on all databases. In addition, we draw conclusions about the advantages and disadvantages of the two hyperparameter search techniques according to the results.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0227","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44773328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The look at the various uses of VR 看看VR的各种用途
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0123
P. Voštinár, D. Horváthová, Martin Mitter, M. Bako
{"title":"The look at the various uses of VR","authors":"P. Voštinár, D. Horváthová, Martin Mitter, M. Bako","doi":"10.1515/comp-2020-0123","DOIUrl":"https://doi.org/10.1515/comp-2020-0123","url":null,"abstract":"Abstract Virtual, augmented and mixed reality (VR, AR and MR) infiltrated not only gaming, industry, engineering, live events, entertainment, real estate, retail, military, etc., but as surveys indicate, also healthcare and education. In all these areas there is a lack of software development experts for VR, AR and MR to meet the needs of practice. Therefore, our intention at the Department of Computer Science, Faculty of Natural Sciences, Matej Bel University in Banská Bystrica, Slovakia, is to focus on the education and enlightenment of these areas. The aim of this article is to show the role of interactivity in different VR applications and its impact on users in three different areas: gaming, healthcare and education. In the case of one application of Arachnophobia, we also present the results of the research using a questionnaire.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0123","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41640631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lévy flight and chaos theory-based gravitational search algorithm for mechanical and structural engineering design optimization 基于lsamvy飞行和混沌理论的重力搜索算法在机械结构工程设计优化中的应用
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0223
Sajad Ahmad Rather, Perumal Shanthi Bala
{"title":"Lévy flight and chaos theory-based gravitational search algorithm for mechanical and structural engineering design optimization","authors":"Sajad Ahmad Rather, Perumal Shanthi Bala","doi":"10.1515/comp-2020-0223","DOIUrl":"https://doi.org/10.1515/comp-2020-0223","url":null,"abstract":"Abstract The main aim of this article is to explore the real-life problem-solving potential of the proposed Lévy flight-based chaotic gravitational search algorithm (LCGSA) for the minimization of engineering design variables of speed reducer design (SRD), three bar truss design (TBTD), and hydrodynamic thrust bearing design (HTBD) problems. In LCGSA, the diversification of the search space is carried out by Lévy flight distribution. Simultaneously, chaotic maps have been utilized for the intensification of the candidate solutions towards the global optimum. Moreover, the penalty function method has been used to deal with the non-linear and fractional design constraints. The investigation of experimental outcomes has been performed through various performance metrics like statistical measures, run time analysis, convergence rate, and box plot analysis. Moreover, statistical verification of experimental results is carried out using a signed Wilcoxon rank-sum test. Furthermore, eleven heuristic algorithms were employed for comparative analysis of the simulation results. The simulation outcomes clearly show that LCGSA provides better values for TBTD and HTBD benchmarks than standard GSA and most of the competing algorithms. Besides, all the participating algorithms, including LCGSA, have the same results for the SRD problem. On the qualitative side, LCGSA has successfully resolved entrapment in local minima and convergence issues of standard GSA.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43649917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a Formal Specification of Production Processes Suitable for Automatic Execution 制定适合自动执行的生产过程的正式规范
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0200
Marko Vještica, Vladimir Dimitrieski, M. Pisarić, Slavica Kordić, S. Ristić, I. Luković
{"title":"Towards a Formal Specification of Production Processes Suitable for Automatic Execution","authors":"Marko Vještica, Vladimir Dimitrieski, M. Pisarić, Slavica Kordić, S. Ristić, I. Luković","doi":"10.1515/comp-2020-0200","DOIUrl":"https://doi.org/10.1515/comp-2020-0200","url":null,"abstract":"Abstract Technological advances and increasing customer need for highly customized products have triggered a fourth industrial revolution. A digital revolution in the manufacturing industry is enforced by introducing smart devices and knowledge bases to form intelligent manufacturing information systems. One of the goals of the digital revolution is to allow flexibility of smart factories by automating shop floor changes based on the changes in input production processes and ordered products. In order to make this possible, a formal language to describe production processes is needed, together with a code generator for its models and an engine to execute the code on smart devices. Existing process modeling languages are not usually tailored to model production processes, especially if models are needed for automatic code generation. In this paper we propose a research on Industry 4.0 manufacturing using a Domain-Specific Modeling Language (DSML) within a Model-Driven Software Development (MDSD) approach to model production processes. The models would be used to generate instructions to smart devices and human workers, and gather a feedback from them during the process execution. A pilot comparative analysis of three modeling languages that are commonly used for process modeling is given with the goal of identifying supported modeling concepts, good practices and usage patterns.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0200","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48936533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Natural mapping between voice commands and APIs 语音命令和API之间的自然映射
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0125
Matúš Sulír, J. Porubän
{"title":"Natural mapping between voice commands and APIs","authors":"Matúš Sulír, J. Porubän","doi":"10.1515/comp-2020-0125","DOIUrl":"https://doi.org/10.1515/comp-2020-0125","url":null,"abstract":"Abstract After a voice control system transforms audio input into a natural language sentence, its main purpose is to map this sentence to a specific action in the API (application programming interface) that should be performed. This mapping is usually specified after the API is already designed. In this paper, we show how an API can be designed with voice control in mind, which makes this mapping natural. The classes, methods, and parameters in the source code are named and typed according to the terms expected in the natural language commands. When this is insufficient, annotations (attribute-oriented programming) are used to define synonyms, string-to-object maps, or other properties. We also describe the mapping process and present a preliminary implementation called VCMapper. In its evaluation on a third-party dataset, it was successfully used to map all the sentences, while a large portion of the mapping was performed using only naming and typing conventions.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0125","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46725617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Stream Network Model for Lung Cancer Classification in the CT Images CT图像肺癌分类的三流网络模型
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0145
T. Arumuga Maria Devi, V. I. Mebin Jose
{"title":"Three Stream Network Model for Lung Cancer Classification in the CT Images","authors":"T. Arumuga Maria Devi, V. I. Mebin Jose","doi":"10.1515/comp-2020-0145","DOIUrl":"https://doi.org/10.1515/comp-2020-0145","url":null,"abstract":"Abstract Lung cancer is considered to be one of the deadly diseases that threaten the survival of human beings. It is a challenging task to identify lung cancer in its early stage from the medical images because of the ambiguity in the lung regions. This paper proposes a new architecture to detect lung cancer obtained from the CT images. The proposed architecture has a three-stream network to extract the manual and automated features from the images. Among these three streams, automated feature extraction as well as the classification is done using residual deep neural network and custom deep neural network. Whereas the manual features are the handcrafted features obtained using high and low-frequency sub-bands in the frequency domain that are classified using a Support Vector Machine Classifier. This makes the architecture robust enough to capture all the important features required to classify lung cancer from the input image. Hence, there is no chance of missing feature information. Finally, all the obtained prediction scores are combined by weighted based fusion. The experimental results show 98.2% classification accuracy which is relatively higher in comparison to other existing methods.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0145","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66887241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid lightweight Signcryption scheme for IoT 物联网的混合轻量级签密方案
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0105
M. Sruthi, R. Rajasekaran
{"title":"Hybrid lightweight Signcryption scheme for IoT","authors":"M. Sruthi, R. Rajasekaran","doi":"10.1515/comp-2020-0105","DOIUrl":"https://doi.org/10.1515/comp-2020-0105","url":null,"abstract":"Abstract The information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assure integrity, confidentiality, and non-repudiation is to first sign the message and then encrypt it. Signcryption is a technique where the signature and the encryption are performed in a single round. The current Signcryption system uses traditional cryptographic approaches that are overloaded for IoT, as it consists of resource-constrained devices and uses the weak session key to encrypt the data. We propose a hybrid Signcryption scheme that employs PRESENT, a lightweight block cipher algorithm to encrypt the data, and the session key is encrypted by ECC. The time taken to signcrypt the proposed Signcryption is better when compared to current Signcryption techniques, as it deploys lightweight cryptography techniques that are devoted to resource-constrained devices.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42660959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation of MRI Brain Tumor Image using Optimization based Deep Convolutional Neural networks (DCNN) 基于优化的深度卷积神经网络(DCNN)在MRI脑肿瘤图像分割中的应用
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0166
P. K. Mishra, S. Satapathy, M. Rout
{"title":"Segmentation of MRI Brain Tumor Image using Optimization based Deep Convolutional Neural networks (DCNN)","authors":"P. K. Mishra, S. Satapathy, M. Rout","doi":"10.1515/comp-2020-0166","DOIUrl":"https://doi.org/10.1515/comp-2020-0166","url":null,"abstract":"Abstract Segmentation of brain image should be done accurately as it can help to predict deadly brain tumor disease so that it can be possible to control the malicious segments of brain image if known beforehand. The accuracy of the brain tumor analysis can be enhanced through the brain tumor segmentation procedure. Earlier DCNN models do not consider the weights as of learning instances which may decrease accuracy levels of the segmentation procedure. Considering the above point, we have suggested a framework for optimizing the network parameters such as weight and bias vector of DCNN models using swarm intelligent based algorithms like Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Gray Wolf Optimization (GWO) and Whale Optimization Algorithm (WOA). The simulation results reveals that the WOA optimized DCNN segmentation model is outperformed than other three optimization based DCNN models i.e., GA-DCNN, PSO-DCNN, GWO-DCNN.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0166","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42794895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A big data framework for E-Government in Industry 4.0 工业4.0中的电子政务大数据框架
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0191
Cuiping Long, Rashmi Agrawal, Ha Quoc Trung, H. Pham
{"title":"A big data framework for E-Government in Industry 4.0","authors":"Cuiping Long, Rashmi Agrawal, Ha Quoc Trung, H. Pham","doi":"10.1515/comp-2020-0191","DOIUrl":"https://doi.org/10.1515/comp-2020-0191","url":null,"abstract":"Abstract The next generation of E-Government and healthcare has the potential to increase the more intelligent governance with improvements in transparency, accountability, efficiency, and effectiveness. It enables organizations to use the benefits of information via big data analysis to settle the difficulties effectively. Big Data has emerged which plays a significant role in many sectors around the world. Global trends in taking advantage of the benefits from big data are considered with an overview of the US, European Union, and several developing countries. To deeply understand the utilization of big data in several domains, this study has presented a brief survey of key concepts (such as IoT-enabled data, blockchain-enabled data, and intelligent systems data) to deeply understand the utilization of big data in several domains. Our analysis sets out also the similarities and differences in these concepts. We have also surveyed state-of-the-art technologies including cloud computing, multi-cloud, webservice, and microservice which are used to exploit potential benefits of big data analytics. Furthermore, some typical big data frameworks are surveyed and a big data framework for E-Government is also proposed. Open research questions and challenges are highlighted (for researchers and developers) following our review. Our goal in presenting the novel concepts presented in this article is to promote creative ideas in the research endeavor to perform efficaciously next-generation E-Government in the context of Industry 4.0.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49380930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Digital Watermarking using Grasshopper Optimization Algorithm 基于Grasshopper优化算法的数字水印
IF 1.5
Open Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2019-0023
Satender Sharma, U. Chauhan, Ruqaiya Khanam, Krishnavir Singh
{"title":"Digital Watermarking using Grasshopper Optimization Algorithm","authors":"Satender Sharma, U. Chauhan, Ruqaiya Khanam, Krishnavir Singh","doi":"10.1515/comp-2019-0023","DOIUrl":"https://doi.org/10.1515/comp-2019-0023","url":null,"abstract":"Abstract The advancement in computer science technology has led to some serious concerns about the piracy and copyright of digital content. Digital watermarking technique is widely used for copyright protection and other similar applications. In this paper, a technique for digital watermarking based on Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Grasshopper Optimization Algorithm (GOA) is proposed. The method computes the DWT of the cover image to obtain the sub-components of the image. The subcomponent is converted to frequency domain using DCT. The challenge is to find the optimal scaling factor to be used for watermarking. The authors have designed a GOA based technique that finds the optimized scaling factor and the coefficient for embedding the watermark. GOA makes the watermark undetectable and is invisible in the cover image. The watermark image is embedded in the cover image using these coefficients. The extraction of watermark from the cover image is done by using inverse DCT and DWT. The proposed method is compared with the other state of the art methods. The effectiveness of the proposed method is computed using Peak Signal to Noise Ratio (PSNR), Normalized Cross Correlation (NCC) and Image Fidelity (IF). The proposed method outperforms the other methods and can be effectively used for practical digital watermarking.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2019-0023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46644825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信