ebook img

Computational Science/Intelligence and Applied Informatics PDF

193 Pages·2020·6.839 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Computational Science/Intelligence and Applied Informatics

Studies in Computational Intelligence 848 Roger Lee Editor Computational Science/ Intelligence and Applied Informatics Studies in Computational Intelligence Volume 848 Series Editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland The series “Studies in Computational Intelligence” (SCI) publishes new develop- mentsandadvancesinthevariousareasofcomputationalintelligence—quicklyand with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output. The books of this series are submitted to indexing to Web of Science, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink. More information about this series at http://www.springer.com/series/7092 Roger Lee Editor Computational Science/Intelligence and Applied Informatics 123 Editor RogerLee Software Engineering andInformation Technology Institute Central Michigan University Mount Pleasant,MI, USA ISSN 1860-949X ISSN 1860-9503 (electronic) Studies in Computational Intelligence ISBN978-3-030-25224-3 ISBN978-3-030-25225-0 (eBook) https://doi.org/10.1007/978-3-030-25225-0 ©SpringerNatureSwitzerlandAG2020 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained hereinorforanyerrorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregard tojurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Foreword The purpose of the 6th ACIS International Conference on Computational Science/Intelligence and Applied Informatics (CSII 2019) which was held on May 29–31 in Honolulu, Hawaii was to together researchers, scientists, engineers, industry practitioners, and students to discuss, encourage, and exchange new ideas, research results, and experiences on all aspects of A Computational Science/IntelligenceandAppliedInformaticsandtodiscussthepracticalchallenges encounteredalongthewayandthesolutionsadoptedtosolvethem.Theconference organizers have selected the best 13 papers from those papers accepted for pre- sentationattheconferenceinordertopublishtheminthisvolume.Thepaperswere chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. In chapter “The Analysis on Commercial and Open Source Software Speech Recognition Technology”, Jong-Bae Kim and Hye-Jeong Kweon compared and analyzed features and functions of typical speech recognition software in the commercialandopen-sourcesoftwarefields.Itisexpectedthatthecomparisonand analysis on the features and functions of commercial and open-source software in the speech recognition software field carried out in this study could suggest a standard for selecting speech recognition technologies to help use proper API in context. In chapter “Implementation of Electronic Braille Document for Improved Web Accessibility”,Ho-SungPark,Yeong-HwiLee,Sam-HyunChunandJong-BaeKim discuss the problems associated with the access to electronic documents that are provided by an information system through the Web or email are examined from the perspective of information access of visually impaired people. They propose a method to convert data of an electronic document into braille in the information system server for enabling visually impaired people to access documents more accurately. In chapter “A Reliable Method to Keep Up-to-Date Rights Management Information of Public Domain Images Based on Deep Learning”, Youngmo Kim, ByeongchanParkandSeok-YoonKimproposeareliablemethodofintegratingthe RMI representation system and updating the RMI with the up-to-date information v vi Foreword basedonthemostreliabledataamonginformationcollectedfromeachsitethrough a comparative search technique for public domain images based on deep learning. Inchapter“ApplyingGAasAutonomousLandingMethodologytoaComputer- Simulated UAV”, Changhee Han proposes a genetic algorithm method to achieve autonomy of unmanned aerial vehicles and will check the possibility of self-regulated autonomous unmanned aerial vehicle by applying the genetic algorithm. Inchapter“Vision-BasedVirtualJoystickInterface”,SuwonLeeandYong-HoSeo propose a virtual joystick system, which is a type of virtual input device. Their systemdetectsahandheldstickandcomputesthedirectioninwhichtheuser’shand moves relative to a user-defined center. The proposed system’s accuracy is com- petitive and has real-time speed in the laptop environment. Inchapter“AStudyonImprovementofSoundQualityofFlatDisplaySpeaker byImprovingAcousticRadiationCharacteristics”,SungtaeLee,KwanhoParkand HyungwooParkanalyzetheacousticcharacteristicsofaflatspeakertorealizesuch stereophonic sound and improve sound quality for organic light-emitting diode (OLED) panel televisions. In chapter “Edge Detection in Roof Images Using Transfer Learning in CNN”, AneeqaAhmed,Yung-Cheol Byun and SangYong Byun employ CNN methodto detectedgesofroofimages.IncorporatingCNNintoedgedetectionproblemmakes the whole system simple, fast, and reliable. Moreover, with no more extra training and without additional feature extraction, CNN can process input images of any size. In chapter “Improvement of Incremental Hierarchical Clustering Algorithm by Re-insertion”, Kakeru Narita, Teruhisa Hochin, Yoshihiro Hayashi and Hiroki Nomiya attempt to improve the incremental clustering method. By examining the clustermultimodalitywhichisthepropertyofaclusterhavingseveralmodes,they can select some points of a different distribution inferred from a dendrogram and transfer the points in the cluster to a different cluster. In chapter “A New Probabilistic Tree Expression for Probabilistic Model Building Genetic Programming”, Daichi Kumoyama, Yoshiko Hanada and Keiko Ono propose a new expression of probabilistic tree for probabilistic model building GPs (PMBGP). Tree-structured PMBGPs estimate the probability of appearance of symbols at each node of the tree from past search information and decide the symbol based on the probability at each node in generating a solution. Through numerical experiments, they show the effectiveness of the proposed probabilistic tree by incorporating it to a local search-based crossover in symbolic regression problems. In chapter “Infrastructure in Assessing Disaster-Relief Agents in the RoboCupRescue Simulation”, Shunki Takami, Masaki Onishi, Itsuki Noda, Kazunori Iwata, Nobuhiro Ito, Takeshi Uchitane and Yohsuke Murase propose a combination of an agent development framework and experiment management software in this study as infrastructures in assessing disaster-relief agents in the RoboCupRescue Simulation. In the evaluation, a combinatorial experiment as a case study confirms the effectiveness of the environment and shows that the Foreword vii environment can contribute to future disaster response research that utilizes a multi-agent simulation. In chapter “OOCQM: Object Oriented Code Quality Meter”, Asma Shaheen, UsmanQamar,AimanNazir,RaheelaBibi,MunazzaAnsarandIqraZafarpropose aframeworknamedObjectOrientedCodeQualityMeter(OOCQM)formeasuring source code quality of object-oriented code using low-level code metrics and high-level quality factors. In chapter “A Fault-Tolerant and Flexible Privacy-Preserving Multisubset Data Aggregation in Smart Grid”, Hung-Yu Chien and Chunhua Su propose a new PPMA scheme that facilitates flexible SM deployment, independent SM status reporting without strict synchronization, and fault tolerance to any SM failure as long as at least two well-function SMs. In chapter “Secure and Efficient MQTT Group Communication Design”, Hung-Yu Chien, Xi-An Kou, Mao-Lun Chiang and Chunhua Su design a secure MQTT group communication framework in which each MQTT application would periodically update the group key and the data communication can be efficiently and securely encrypted by the group keys. Both the prototype system and the analysis show that our design can improve the performance of security, computa- tion, and communication. It is our sincere hope that this volume provides stimulation and inspiration and that it will be used as a foundation for works to come. May 2019 Hitoshi Iima Kyoto Institute of Technology Kyoto, Japan Contents The Analysis on Commercial and Open Source Software Speech Recognition Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Jong-Bae Kim and Hye-Jeong Kweon Implementation of Electronic Braille Document for Improved Web Accessibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Ho-Sung Park, Yeong-Hwi Lee, Sam-Hyun Chun and Jong-Bae Kim A Reliable Method to Keep Up-to-Date Rights Management Information of Public Domain Images Based on Deep Learning . . . . . . 35 Youngmo Kim, Byeongchan Park and Seok-Yoon Kim Applying GA as Autonomous Landing Methodology to a Computer-Simulated UAV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Changhee Han Vision-Based Virtual Joystick Interface . . . . . . . . . . . . . . . . . . . . . . . . . 65 Suwon Lee and Yong-Ho Seo A Study on Improvement of Sound Quality of Flat Display Speaker by Improving Acoustic Radiation Characteristics . . . . . . . . . . . . . . . . . 79 Sungtae Lee, Kwanho Park and Hyungwoo Park Edge Detection in Roof Images Using Transfer Learning in CNN . . . . . 91 Aneeqa Ahmed, Yung-Cheol Byun and Sang Yong Byun Improvement of Incremental Hierarchical Clustering Algorithm by Re-insertion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Kakeru Narita, Teruhisa Hochin, Yoshihiro Hayashi and Hiroki Nomiya ANewProbabilisticTreeExpressionfor ProbabilisticModelBuilding Genetic Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Daichi Kumoyama, Yoshiko Hanada and Keiko Ono ix x Contents Infrastructure in Assessing Disaster-Relief Agents in the RoboCupRescue Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Shunki Takami, Masaki Onishi, Itsuki Noda, Kazunori Iwata, Nobuhiro Ito, Takeshi Uchitane and Yohsuke Murase OOCQM: Object Oriented Code Quality Meter. . . . . . . . . . . . . . . . . . . 149 Asma Shaheen, Usman Qamar, Aiman Nazir, Raheela Bibi, Munazza Ansar and Iqra Zafar A Fault-Tolerant and Flexible Privacy-Preserving Multisubset Data Aggregation in Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Hung-Yu Chien and Chunhua Su Secure and Efficient MQTT Group Communication Design. . . . . . . . . . 177 Hung-Yu Chien, Xi-An Kou, Mao-Lun Chiang and Chunhua Su Author Index.. .... .... .... ..... .... .... .... .... .... ..... .... 187

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.