scispace - formally typeset
Search or ask a question
Journal

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering 

World Academy of Science, Engineering and Technology
About: World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering is an academic journal. The journal publishes majorly in the area(s): Artificial neural network & Fuzzy logic. Over the lifetime, 3631 publications have been published receiving 27746 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper presents the most well know algorithms for each step of data pre-processing so that one achieves the best performance for their data set.
Abstract: Many factors affect the success of Machine Learning (ML) on a given task. The representation and quality of the instance data is first and foremost. If there is much irrelevant and redundant information present or noisy and unreliable data, then knowledge discovery during the training phase is more difficult. It is well known that data preparation and filtering steps take considerable amount of processing time in ML problems. Data pre-processing includes data cleaning, normalization, transformation, feature extraction and selection, etc. The product of data pre-processing is the final training set. It would be nice if a single sequence of data pre-processing algorithms had the best performance for each data set but this is not happened. Thus, we present the most well know algorithms for each step of data pre-processing so that one achieves the best performance for their data set. Keywords—Data mining, feature selection, data cleaning.

659 citations

Journal ArticleDOI
TL;DR: In this article, an up-to-date review of major human face recognition research is provided, including a review of the most recent face recognition techniques and their applications, as well as a summary of the research results.
Abstract: The task of face recognition has been actively researched in recent years. This paper provides an up-to-date review of major human face recognition research. We first present an overview of face recognition and its applications. Then, a literature review of the most recent face recognition techniques is presented. Description and limitations of face databases which are used to test the performance of these face recognition algorithms are given. A brief summary of the face recognition vendor test (FRVT) 2002, a large scale evaluation of automatic face recognition technology, and its conclusions are also given. Finally, we give a summary of the research results. Keywords—Combined classifiers, face recognition, graph matching, neural networks.

316 citations

Journal Article
TL;DR: In this paper a review of vision based hand gesture recognition is presented, the existing approaches are categorized into 3D model based approaches and appearance based approaches, highlighting their advantages and shortcomings and identifying the open issues.
Abstract: With the development of ubiquitous computing, current user interaction approaches with keyboard, mouse and pen are not sufficient. Due to the limitation of these devices the useable command set is also limited. Direct use of hands as an input device is an attractive method for providing natural Human Computer Interaction which has evolved from text-based interfaces through 2D graphical-based interfaces, multimedia-supported interfaces, to fully fledged multi-participant Virtual Environment (VE) systems. Imagine the human-computer interaction of the future: A 3D- application where you can move and rotate objects simply by moving and rotating your hand - all without touching any input device. In this paper a review of vision based hand gesture recognition is presented. The existing approaches are categorized into 3D model based approaches and appearance based approaches, highlighting their advantages and shortcomings and identifying the open issues.

296 citations

Journal Article
TL;DR: This work proposes a trainable summarizer, which takes into account several features, including sentence position, positive keyword, negative keyword, sentence centrality, sentence resemblance to the title, sentence inclusion of name entity, sentenceclusion of numerical data, sentence relative length, Bushy path of the sentence and aggregated similarity for each sentence to generate summaries.
Abstract: This work proposes an approach to address automatic text summarization. This approach is a trainable summarizer, which takes into account several features, including sentence position, positive keyword, negative keyword, sentence centrality, sentence resemblance to the title, sentence inclusion of name entity, sentence inclusion of numerical data, sentence relative length, Bushy path of the sentence and aggregated similarity for each sentence to generate summaries. First we investigate the effect of each sentence feature on the summarization task. Then we use all features score function to train genetic algorithm (GA) and mathematical regression (MR) models to obtain a suitable combination of feature weights. The proposed approach performance is measured at several compression rates on a data corpus composed of 100 English religious articles. The results of the proposed approach are promising.

260 citations

Journal Article
TL;DR: The Advanced Encryption Standard (AES) is analyzed, and a key stream generator (A5/1, W7) is added to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy.
Abstract: With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm. Keywords—Cryptography, Encryption, Advanced Encryption Standard (AES), ECB mode, statistical analysis, key stream generator.

225 citations

Network Information
Related Journals (5)
Neural Computing and Applications
8.8K papers, 174.9K citations
82% related
Applied Intelligence
5K papers, 80.2K citations
82% related
Expert Systems With Applications
16.5K papers, 780.1K citations
82% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
201828
2017136
2016187
2015342
2014285
2013205