{"title":"Coverage Optimization of Wireless Sensor Networks with Normal Distribution","authors":"Anas A. Al-Roubaiey, B. Al-Gohi","doi":"10.1109/ICIS.2018.8466476","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466476","url":null,"abstract":"The sensors at the first-hop from the base station limit the network lifetime of a uniformly deployed Wireless Sensor Networks (WSN). That is because all the other nodes rely on them to forward their traffic to the base station; which eventually results in \"energy hole\" problem. Normal distribution is considered as a promising solution for this problem. Thus, in this paper we focus on studying the effect of the normal distribution deployment variations on the network performance. We selected the coverage performance metric, which is considered as one of the most important Quality of Service metrics in WSN. We derive an equation that can be used to get the best distribution parameters (σx, σy), standard deviations, using our proposed approximation approach called equivalent square method (ESM). Our model is verified using previous reliable published results.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130068338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Propagation Path Loss Prediction Based-on Grey Verhulst Model","authors":"L. Wu, Xiaomei Liu, Ying-Jian Qi, Zheng-peng Wu","doi":"10.1109/ICIS.2018.8466461","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466461","url":null,"abstract":"This paper presents a new method of predicting propagation path-loss, which idea comes from grey system theory and Verhulst difference equation, which is called Grey Verhuslt Model. In order to validate correction and accuracy of the model, the simulation and prediction values are compared with the experimental data obtained from the laboratory experiment environment and computing results from Method of Moments (MOM). The performance criterion selected for the comparison between the actual and the predicted data are the root mean square error (RMSE), mean relative error (MRE).","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design and Implementation of Script Authoring Assistant System of Film and Television Big Data","authors":"Mengyu Liu, Wenqian Shang, Jianxiang Cao, Chan Pan, Weiguo Lin, Hao Fu","doi":"10.1109/ICIS.2018.8466381","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466381","url":null,"abstract":"Big data is increasingly becoming a hot research topic, applied to all walks of life. And the film and television big data makes big data science and film and television industry blend together, making far-reaching impact on the film and television works of creation, dissemination, acceptance and other aspects. With the hit of different types of films and TV plays, the screenwriter directing industry has become a lot of people dream career, they eager to show talent in this area. The significance of this paper is to use the online writing mode of the script to draw the figure of character relationship. It can clearly grasp the characters in the script by visualization, and make the decision support of the characters and balance the role relation to ensure the scriptwriter’s layout is reasonable. Based on the current situation of script creation and the actual needs of users, so that different levels of users can freely create character relationship map, and give the role of quantitative analysis of the results, so as to achieve the purpose of supporting the creation.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126386944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Primate Swarm Algorithm with Adaptive K-Mean for Optimization Problems","authors":"Amarita Ritthipakdee","doi":"10.1109/ICIS.2018.8466435","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466435","url":null,"abstract":"A bio-inspired is well known in a group of swarm intelligent. There are many researchers research algorithms to solve computation problems. This research is to develop foraging behavior improvement of primate swarm algorithm. The proposed algorithm is inspired by the behavior of the primate. In nature, primates live in wild as a small group for spreading foraging behavior and grown up mature primate creates new primate group. The primate who creates the group becomes a group leader to find other foraging. This research proposes adaptive K-mean algorithm for primate grouping to improve primate swarm intelligent for foraging behavior. A conventional primate swarm intelligent finds forage randomly which is an important problem of local search. Primate grouping is improved, simulates primate adaptation with adaptive K-mean technique for foraging behavior, number of new primate groups is gradually increase when forage is found. The results from this research are compared with PSA, CM-DNAGA, PSOCO, PSOTD algorithms. The proposed algorithm is tested with eight standard benchmark functions and most of which convergence to the optimal value.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Experimental Implementation of GrabCut for Hardcode Subtitle Extraction","authors":"Dong Wang, Aimoerfu","doi":"10.1109/ICIS.2018.8466484","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466484","url":null,"abstract":"In this paper, we describe a relatively convenient way to extract and recognize text from a background in various circumstances of complicity. One general purpose in many applications is to extract hardcode subtitles from videos. Popular hardcode subtitle-rip tools (applications) nowadays follow a similar procedure from text location settings, customized image post-editing to OCR process. The quality of results usually may not be satisfied, and the supporting video formats are limited. Thanks to \"GrabCut\" image segmentation algorithm and \"Tesseract-OCR\" technology, we have developed a more augmented version in python for hardcode subtitle extraction on a fixed location, based on many attempts of experimental practice and research. The method we proposed outperforms most of the competitive tools on the quality of results.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing an Intrusion Detection Model based on Long Short-term Neural Networks","authors":"Songge Xiao, Jing An, Wenqing Fan","doi":"10.1109/ICIS.2018.8466445","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466445","url":null,"abstract":"In this paper an intrusion detection model is constructed based on the long short-term neural networks. Training of the model and tests on its performance are done with KDD 99 and UNSW-NB15 data-sets by choosing the optimum parameters via experiments. What’s more, a comparison is done with the traditional machine learning model. The results show that this intrusion detection model has a higher detection accuracy than the traditional machine learning models. The detection accuracy with respect to the two data-sets is 98.99% and 99.41% respectively.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115676259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"My Data: A Framework for Transfer of User Data Using NS2 Simulator","authors":"M. Abbasi, S. Ghani","doi":"10.1109/ICIS.2018.8466417","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466417","url":null,"abstract":"ns2 Simulator has been widely used to simulate various scenarios related to wired and wireless medium. However, transfer of real time user data has not been implemented as researchers are more concerned with the output of the system in terms of range of values of particular parameter desired or else. This framework besides running the default simulation as done by ns2 adds the capability to allow transfer of user data and allows user to save at the other end or destination the data received. The user data may be multimedia data or any data (plain text), document file, binary file or raw data. Simulations result show that actual user data received may be same or different, due packet error or noise, respectively depending upon the network topologies used. The user data transfer has been implemented in UDP (CBR traffic).","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123205886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICIS 2018 Committees","authors":"","doi":"10.1109/icis.2018.8466389","DOIUrl":"https://doi.org/10.1109/icis.2018.8466389","url":null,"abstract":"","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PPNDN: Popularity-based Caching for Privacy Preserving in Named Data Networking","authors":"Ji-Yeon Yang, Hyoung-kee Choi","doi":"10.1109/ICIS.2018.8466482","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466482","url":null,"abstract":"Due to the inefficiency of present day Internet architecture, Content-Centric Networking (CCN) has been proposed to evolve the network architecture. In the CCN, every single router has cache storage to store requested contents, and uses it as a key feature to improve overall performance. Routers store all received content, until cache replacement occurs. Therefore, an attacker can infer the activity of the user connected to the access router by using the round-trip time (RTT). In this paper, we introduce a popularity-based caching strategy, PPNDN, which has been designed to prevent cache privacy violation, without compromising network performance. The popularity was measured once by the content provider at the time of creation, and kept updated by local NDN routers based on demands by local users. Adjusting cache period based on the demand makes it immune to cache privacy violation, and at the same time sustains optimal network performance. The analysis confirmed by simulation results shows that PPNDN has the lowest cache period without degrading performance, compared to other cache policies.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114779475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Saleem, M. I. Khattak, Xuhui Chen, Muhammad Ali
{"title":"Deep Neural Network based Supervised Speech Enhancement in Speech-Babble Noise","authors":"N. Saleem, M. I. Khattak, Xuhui Chen, Muhammad Ali","doi":"10.1109/ICIS.2018.8466542","DOIUrl":"https://doi.org/10.1109/ICIS.2018.8466542","url":null,"abstract":"Speech enhancement is fundamental for many real-time speech applications and it is challenging in case of single-channel because practically only one data channel is available. Without any constraint, a countless range of solutions are possible to solve this problem. In this paper, we present a supervised learning approach to enhance a speech degraded by speech-babble noise, which is most challenging type of noise in speech enhancement systems. The proposed method is composed of deep neural networks (DNNs) and less aggressive Wiener filtering (LW) for speech enhancement, labeled as the DNN-LW. The proposed method is composed of the training and testing stages, respectively. The DNN in the training stage calculates the magnitude spectrums of noise-free speech and the noise signals, respectively from the input noise-masked speech features concurrently. The Less aggressive Wiener filter is then placed as an extra layer on top of the deep neural network to create the enhanced magnitude spectrum. Finally, the phase of noisy speech is used to restore the estimate of clean speech. During testing stage, the trained DNN is provided the features of noise-masked speech to attain the enhanced speech. The experimental results revealed that the DNN-LW approach performs significantly better against baseline speech enhancement methods.","PeriodicalId":447019,"journal":{"name":"2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}