2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)最新文献

筛选
英文 中文
Coverage Optimization of Wireless Sensor Networks with Normal Distribution 正态分布无线传感器网络的覆盖优化
Anas A. Al-Roubaiey, B. Al-Gohi
{"title":"Coverage Optimization of Wireless Sensor Networks with Normal Distribution","authors":"Anas A. Al-Roubaiey, B. Al-Gohi","doi":"10.1109/ICIS.2018.8466476","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466476","url":null,"abstract":"The sensors at the first-hop from the base station limit the network lifetime of a uniformly deployed Wireless Sensor Networks (WSN). That is because all the other nodes rely on them to forward their traffic to the base station; which eventually results in \"energy hole\" problem. Normal distribution is considered as a promising solution for this problem. Thus, in this paper we focus on studying the effect of the normal distribution deployment variations on the network performance. We selected the coverage performance metric, which is considered as one of the most important Quality of Service metrics in WSN. We derive an equation that can be used to get the best distribution parameters (σx, σy), standard deviations, using our proposed approximation approach called equivalent square method (ESM). Our model is verified using previous reliable published results.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130068338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Propagation Path Loss Prediction Based-on Grey Verhulst Model 基于灰色Verhulst模型的传播路径损耗预测
L. Wu, Xiaomei Liu, Ying-Jian Qi, Zheng-peng Wu
{"title":"Propagation Path Loss Prediction Based-on Grey Verhulst Model","authors":"L. Wu, Xiaomei Liu, Ying-Jian Qi, Zheng-peng Wu","doi":"10.1109/ICIS.2018.8466461","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466461","url":null,"abstract":"This paper presents a new method of predicting propagation path-loss, which idea comes from grey system theory and Verhulst difference equation, which is called Grey Verhuslt Model. In order to validate correction and accuracy of the model, the simulation and prediction values are compared with the experimental data obtained from the laboratory experiment environment and computing results from Method of Moments (MOM). The performance criterion selected for the comparison between the actual and the predicted data are the root mean square error (RMSE), mean relative error (MRE).","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Design and Implementation of Script Authoring Assistant System of Film and Television Big Data 影视大数据剧本创作辅助系统的设计与实现
Mengyu Liu, Wenqian Shang, Jianxiang Cao, Chan Pan, Weiguo Lin, Hao Fu
{"title":"The Design and Implementation of Script Authoring Assistant System of Film and Television Big Data","authors":"Mengyu Liu, Wenqian Shang, Jianxiang Cao, Chan Pan, Weiguo Lin, Hao Fu","doi":"10.1109/ICIS.2018.8466381","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466381","url":null,"abstract":"Big data is increasingly becoming a hot research topic, applied to all walks of life. And the film and television big data makes big data science and film and television industry blend together, making far-reaching impact on the film and television works of creation, dissemination, acceptance and other aspects. With the hit of different types of films and TV plays, the screenwriter directing industry has become a lot of people dream career, they eager to show talent in this area. The significance of this paper is to use the online writing mode of the script to draw the figure of character relationship. It can clearly grasp the characters in the script by visualization, and make the decision support of the characters and balance the role relation to ensure the scriptwriter’s layout is reasonable. Based on the current situation of script creation and the actual needs of users, so that different levels of users can freely create character relationship map, and give the role of quantitative analysis of the results, so as to achieve the purpose of supporting the creation.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126386944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Primate Swarm Algorithm with Adaptive K-Mean for Optimization Problems 一种改进的自适应k -均值灵长类群算法求解优化问题
Amarita Ritthipakdee
{"title":"An Improved Primate Swarm Algorithm with Adaptive K-Mean for Optimization Problems","authors":"Amarita Ritthipakdee","doi":"10.1109/ICIS.2018.8466435","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466435","url":null,"abstract":"A bio-inspired is well known in a group of swarm intelligent. There are many researchers research algorithms to solve computation problems. This research is to develop foraging behavior improvement of primate swarm algorithm. The proposed algorithm is inspired by the behavior of the primate. In nature, primates live in wild as a small group for spreading foraging behavior and grown up mature primate creates new primate group. The primate who creates the group becomes a group leader to find other foraging. This research proposes adaptive K-mean algorithm for primate grouping to improve primate swarm intelligent for foraging behavior. A conventional primate swarm intelligent finds forage randomly which is an important problem of local search. Primate grouping is improved, simulates primate adaptation with adaptive K-mean technique for foraging behavior, number of new primate groups is gradually increase when forage is found. The results from this research are compared with PSA, CM-DNAGA, PSOCO, PSOTD algorithms. The proposed algorithm is tested with eight standard benchmark functions and most of which convergence to the optimal value.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Experimental Implementation of GrabCut for Hardcode Subtitle Extraction 硬码字幕提取中GrabCut的实验实现
Dong Wang, Aimoerfu
{"title":"The Experimental Implementation of GrabCut for Hardcode Subtitle Extraction","authors":"Dong Wang, Aimoerfu","doi":"10.1109/ICIS.2018.8466484","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466484","url":null,"abstract":"In this paper, we describe a relatively convenient way to extract and recognize text from a background in various circumstances of complicity. One general purpose in many applications is to extract hardcode subtitles from videos. Popular hardcode subtitle-rip tools (applications) nowadays follow a similar procedure from text location settings, customized image post-editing to OCR process. The quality of results usually may not be satisfied, and the supporting video formats are limited. Thanks to \"GrabCut\" image segmentation algorithm and \"Tesseract-OCR\" technology, we have developed a more augmented version in python for hardcode subtitle extraction on a fixed location, based on many attempts of experimental practice and research. The method we proposed outperforms most of the competitive tools on the quality of results.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constructing an Intrusion Detection Model based on Long Short-term Neural Networks 基于长短期神经网络的入侵检测模型构建
Songge Xiao, Jing An, Wenqing Fan
{"title":"Constructing an Intrusion Detection Model based on Long Short-term Neural Networks","authors":"Songge Xiao, Jing An, Wenqing Fan","doi":"10.1109/ICIS.2018.8466445","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466445","url":null,"abstract":"In this paper an intrusion detection model is constructed based on the long short-term neural networks. Training of the model and tests on its performance are done with KDD 99 and UNSW-NB15 data-sets by choosing the optimum parameters via experiments. What’s more, a comparison is done with the traditional machine learning model. The results show that this intrusion detection model has a higher detection accuracy than the traditional machine learning models. The detection accuracy with respect to the two data-sets is 98.99% and 99.41% respectively.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115676259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
My Data: A Framework for Transfer of User Data Using NS2 Simulator 我的数据:一个使用NS2模拟器传输用户数据的框架
M. Abbasi, S. Ghani
{"title":"My Data: A Framework for Transfer of User Data Using NS2 Simulator","authors":"M. Abbasi, S. Ghani","doi":"10.1109/ICIS.2018.8466417","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466417","url":null,"abstract":"ns2 Simulator has been widely used to simulate various scenarios related to wired and wireless medium. However, transfer of real time user data has not been implemented as researchers are more concerned with the output of the system in terms of range of values of particular parameter desired or else. This framework besides running the default simulation as done by ns2 adds the capability to allow transfer of user data and allows user to save at the other end or destination the data received. The user data may be multimedia data or any data (plain text), document file, binary file or raw data. Simulations result show that actual user data received may be same or different, due packet error or noise, respectively depending upon the network topologies used. The user data transfer has been implemented in UDP (CBR traffic).","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123205886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICIS 2018 Committees
{"title":"ICIS 2018 Committees","authors":"","doi":"10.1109/icis.2018.8466389","DOIUrl":"https://doi.org/10.1109/icis.2018.8466389","url":null,"abstract":"","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PPNDN: Popularity-based Caching for Privacy Preserving in Named Data Networking 命名数据网络中基于流行度的隐私保护缓存
Ji-Yeon Yang, Hyoung-kee Choi
{"title":"PPNDN: Popularity-based Caching for Privacy Preserving in Named Data Networking","authors":"Ji-Yeon Yang, Hyoung-kee Choi","doi":"10.1109/ICIS.2018.8466482","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466482","url":null,"abstract":"Due to the inefficiency of present day Internet architecture, Content-Centric Networking (CCN) has been proposed to evolve the network architecture. In the CCN, every single router has cache storage to store requested contents, and uses it as a key feature to improve overall performance. Routers store all received content, until cache replacement occurs. Therefore, an attacker can infer the activity of the user connected to the access router by using the round-trip time (RTT). In this paper, we introduce a popularity-based caching strategy, PPNDN, which has been designed to prevent cache privacy violation, without compromising network performance. The popularity was measured once by the content provider at the time of creation, and kept updated by local NDN routers based on demands by local users. Adjusting cache period based on the demand makes it immune to cache privacy violation, and at the same time sustains optimal network performance. The analysis confirmed by simulation results shows that PPNDN has the lowest cache period without degrading performance, compared to other cache policies.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114779475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Neural Network based Supervised Speech Enhancement in Speech-Babble Noise 基于深度神经网络的有监督语音增强研究
N. Saleem, M. I. Khattak, Xuhui Chen, Muhammad Ali
{"title":"Deep Neural Network based Supervised Speech Enhancement in Speech-Babble Noise","authors":"N. Saleem, M. I. Khattak, Xuhui Chen, Muhammad Ali","doi":"10.1109/ICIS.2018.8466542","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466542","url":null,"abstract":"Speech enhancement is fundamental for many real-time speech applications and it is challenging in case of single-channel because practically only one data channel is available. Without any constraint, a countless range of solutions are possible to solve this problem. In this paper, we present a supervised learning approach to enhance a speech degraded by speech-babble noise, which is most challenging type of noise in speech enhancement systems. The proposed method is composed of deep neural networks (DNNs) and less aggressive Wiener filtering (LW) for speech enhancement, labeled as the DNN-LW. The proposed method is composed of the training and testing stages, respectively. The DNN in the training stage calculates the magnitude spectrums of noise-free speech and the noise signals, respectively from the input noise-masked speech features concurrently. The Less aggressive Wiener filter is then placed as an extra layer on top of the deep neural network to create the enhanced magnitude spectrum. Finally, the phase of noisy speech is used to restore the estimate of clean speech. During testing stage, the trained DNN is provided the features of noise-masked speech to attain the enhanced speech. The experimental results revealed that the DNN-LW approach performs significantly better against baseline speech enhancement methods.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信