Xuhui Chen, N. Saleem, M. I. Khattak, Khalid Rabbani
{"title":"Coherence based Dual Microphone Source Separation in Low SNR Noisy Environments","authors":"Xuhui Chen, N. Saleem, M. I. Khattak, Khalid Rabbani","doi":"10.1109/ICIS.2018.8466495","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466495","url":null,"abstract":"A coherence function based dual-microphone source separation method in the adverse noisy environments is presented in this paper. The method is based on the coherence between the clean speech and noise signal for the noise reduction. The technique is applied to closely spaced microphones array and assumed that noise signals are captured by microphones are highly correlated. The presented technique is straightforward to realize and does not need any noise statistics estimation. The technique is evaluated in terms of the speech intelligibility, perceptual quality, segmental SNR (SNRSeg), speech distortion and residual noise objective measures. The experimental results indicate improved gains in perceptual quality, and speech intelligibility comparative to the noisy speech. Moreover, the presented technique yielded substantial improvements in terms of the SNRSeg, speech distortion and residual noise, respectively in low SNR (-5 and -10 dB) noisy environments than noisy speech. The time-varying spectral and time-domain waveform analysis indicated a low residual noise and less speech distortion in the spectrums of speech processed by the coherence based source separation technique.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125097999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Node Incentive Strategy in Selfish Opportunistic Network","authors":"Yanfei Wu, Yanqin Zhu, Zhe Yang","doi":"10.1109/ICIS.2018.8466410","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466410","url":null,"abstract":"Nodes in selfish opportunistic network are selfish when forwarding messages due to limited resources. To solve the problem, this paper proposes a kind of node incentive strategy based on the overdraft virtual currency mechanism NISOVCM. The strategy designs an overdraft virtual currency mechanism, which solving the problem of virtual currency issue by using the capability of forwarding message of a node as virtual overdraft guarantee. In the trading mechanism of the strategy, the resource status and wealth status are public. When the message trading cannot be completed once, there will be a second bargaining based on the resources status and wealth status to suppress the false quotation offer between two sides. The result of simulation shows that the proposed strategy is effective and can suppress the false quotation.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131550821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Improvement of Convolutional Neural Network","authors":"N. Yi, Chunfang Li, Xin Feng, Minyong Shi","doi":"10.1109/ICIS.2018.8466474","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466474","url":null,"abstract":"With the continuous development of Internet technology, there is a growing desire for greater breakthroughs in the field of artificial intelligence to promote social development and progress. However, artificial intelligence has developed slowly in the past due to the complexity of its theory and the constraints of the related software and hardware conditions. As a branch of the field of AI, deep learning can learn the essential features of data and promote the development of AI. Convolution neural network is a typical multi-layer supervised learning neural network, which is widely used in various fields, especially image processing and speech recognition. This paper first introduces the research significance of convolution neural network, and then introduces its structure. The following paper studies and analyzes the architecture of LeNet-5, and improves it. Finally, the Keras framework is used to carry out the experiment on the improved network structure.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134488046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multicriteria Analysis Approach for Benchmarking Open Innovation Practices of IT Organizations","authors":"S. Grandhi, S. Wibowo","doi":"10.1109/ICIS.2018.8466494","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466494","url":null,"abstract":"This paper presents a multicriteria analysis approach for measuring and benchmarking open innovation practices of IT organizations. Five important criteria for measuring the open innovation performance of IT organizations are identified. To model the vagueness and imprecision of the decision making process, interval-valued intuitionistic fuzzy numbers are used. Based on the concept of the ideal solutions, the closeness coefficient can be obtained for determining the ranking of the alternatives. This multicriteria analysis approach helps IT organizations to understand their strengths and weaknesses in terms of their open innovation practices performance, and identify relevant areas for improvement.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132682699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trademark Image Retrieval System Based on SIFT Algorithm","authors":"Zhengkang Chen, Xiaohong Wang","doi":"10.1109/ICIS.2018.8466451","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466451","url":null,"abstract":"In this paper, the theory of bag of view words model and sift algorithm is introduced for image retrieval, Try to use this model and algorithm to achieve trademark image matching. and the most dissimilarity coefficient is used for vector comparison to improve the accuracy. Based on this image matching algorithm, an image retrieval system is constructed for trademark image. The system matches the pictures with the corresponding trademark from the gallery, Help people get trademark information to a certain extent.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICIS 2018 Message from General Chair","authors":"","doi":"10.1109/icis.2018.8466407","DOIUrl":"https://doi.org/10.1109/icis.2018.8466407","url":null,"abstract":"","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Allinjawi, Amjad Alsulami, Yasmeen Alsaedy, K. Hussein
{"title":"Proposing an Adaptive E-learning System Using Learners’ Knowledge in Simulating Medical Module","authors":"A. Allinjawi, Amjad Alsulami, Yasmeen Alsaedy, K. Hussein","doi":"10.1109/ICIS.2018.8466514","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466514","url":null,"abstract":"Medical curricula in the foundation years focus on teaching students symptoms and diseases. At King Abdulaziz University - Saudi Arabia, data was collected from medical students who are in their preclinical year (third year) to determine the sources the students use and prefer while studying the physiology modules. Results showed that 69% of students rely on video and photos from websites, while 44% of students face difficulties in finding an e-learning source which can train them on specific content. In this paper, we propose an adaptive e-learning environment \"GAMICAL\" which will control and adapt to the students' knowledge, during the simulation of the endocrine physiology module.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"44 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Business Process Improvement and Reengineering of Multimedia Audiovisual in Colleges","authors":"Chao Lin, Xuhui Chen, Ruizhe Ye","doi":"10.1109/ICIS.2018.8466487","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466487","url":null,"abstract":"With the further development of modern educational technology, the construction of intelligent classrooms in colleges is in full swing, which brings great convenience to teachers and students. However, traditional multimedia audiovisual management of colleges has encountered a bottleneck in management and service. It is noted that business process reengineering (BPR) is used to improve their internal functions to better achieve business objectives. Organizational processes are identified, analyzed, and improved by applying BPR. In this paper, we use ESIA method for BPR and propose a model of multimedia audio-visual business based on ESIA method. This flexible framework forms a knowledge base that is not only useful for improving BPR application, but also provides a basis for future research in this context. We optimize and reengineer an existing process and related business processes. The process is applying for the use of public multimedia classroom. This work solves the problems of ambiguous positioning of duties, complex business processes, and duplication of data reporting in business processes. Also, it achieves the high efficiency and convenience of multimedia audio-visual business processes, and promotes the standardization of multimedia audio-visual education management.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121173276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Golden Ball Algorithm for the Vehicle Routing Problem with Simultaneous Pickup and Delivery","authors":"Kanjana Ruttanateerawichien, W. Kurutach","doi":"10.1109/ICIS.2018.8466513","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466513","url":null,"abstract":"A Golden Ball (IGB) algorithm was improved for the well-known vehicle routing problem, which simultaneously considers the customer demand from both delivery and pickup orders. The objective of this problem was to determine the optimal set of routes to totally satisfy both the delivery and pickup demand of the customer population. In this paper, the Golden Ball (GB) algorithm was improved using intra-move improvement algorithms modify process selection players and coaching procedure. The aim was to find the solution that minimizes the total cost. Computational results showed that the IGB algorithm was competitive and outperforms the Golden Ball (GB) algorithm in all directions. Moreover, the best known solutions were also obtained in 67.43% of tested instances (19 out of 28).","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"113 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Intrusion Detection System using K-means and K-Nearest Neighbors Algorithms","authors":"Y. Y. Aung, M. Min","doi":"10.1109/ICIS.2018.8466537","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466537","url":null,"abstract":"With the widespread use of technology, companies of all sizes have benefited from the use of resources and technologies on the Internet. On the other hand, real security threats are increasing problems and intrusion detection systems (IDS) can help protect external and internal organizations and provide network security. The intrusion detection system only monitors network traffic and informs the system administrator for unusual activity. It is very similar to a home alarm system that will turn on the alarm when the thief enters the window or door. Various methods such as machine learning, data processing and optimization are also analyzed to support the important developments of IDS and to assist better future problems suggestions. In this paper we use hybrid data mining methods such as k-means and k-nearest neighbors to reduce time complexity of the system with great accuracy. This model is implemented by using KDD’99 data set.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121050988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}