Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068131
Maha M. Khalil, A. Afifi, K. M. Amin
Rehabilitation is a vital process for adult people after injury to regain their quality of life. This paper proposes a mobile-based system for upper limb rehabilitation to overcome a lack of motivation that occurs in the conventional one. Recent studies found that poor adherence to physiotherapy sessions refers to many reasons, one of them is the lack of motivation. Accordingly, conducting therapeutic sessions in the form of serious games will surely motivate patients more, hence helping them to improve their quality of life. In this work, therefore, we propose two serious mobile games to facilitate post-injures rehabilitation, which utilize smartphone's accelerometer sensor to control the game. Since the proposed system depends on User Centered Design (UCD) approach, two prototypes were tested. The First Prototype targets elbow and shoulder joints. To cover these mentioned joints' exercises, the game is developed into three levels: first-level targets elbow extension. The second one includes two sub-levels; first one targets wrist supination/pronation, second sub-level combines both wrist supination and elbow extension. In the third level, the patient must perform wrist supination/pronation, and elbow flexion/extension. Second prototype includes three different games which target wrist supination/pronation, forearm supination/pronation, shoulder flexion, shoulder horizontal adduction/abduction, and elbow flexion/extension. As a pilot evaluation many visits to a rehabilitation center were arranged, the therapist confirmed that the game covers those mentioned exercises and selected three convenient recruited cases to play the game and check its usability. They stated that the system covers some conventional exercises they perform; they provided feedback that helped in system enhancement prior to final evaluation. As a final evaluation the system was tested for twelve sessions by one case, with a progress rate of 1.7 ±0.38, and 3 ±0.9 cm for both anterior, and lateral scales respectively.
{"title":"Mobile-based Environment to Facilitate Rehabilitation of Adults Post-Injuries","authors":"Maha M. Khalil, A. Afifi, K. M. Amin","doi":"10.1109/ICCES48960.2019.9068131","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068131","url":null,"abstract":"Rehabilitation is a vital process for adult people after injury to regain their quality of life. This paper proposes a mobile-based system for upper limb rehabilitation to overcome a lack of motivation that occurs in the conventional one. Recent studies found that poor adherence to physiotherapy sessions refers to many reasons, one of them is the lack of motivation. Accordingly, conducting therapeutic sessions in the form of serious games will surely motivate patients more, hence helping them to improve their quality of life. In this work, therefore, we propose two serious mobile games to facilitate post-injures rehabilitation, which utilize smartphone's accelerometer sensor to control the game. Since the proposed system depends on User Centered Design (UCD) approach, two prototypes were tested. The First Prototype targets elbow and shoulder joints. To cover these mentioned joints' exercises, the game is developed into three levels: first-level targets elbow extension. The second one includes two sub-levels; first one targets wrist supination/pronation, second sub-level combines both wrist supination and elbow extension. In the third level, the patient must perform wrist supination/pronation, and elbow flexion/extension. Second prototype includes three different games which target wrist supination/pronation, forearm supination/pronation, shoulder flexion, shoulder horizontal adduction/abduction, and elbow flexion/extension. As a pilot evaluation many visits to a rehabilitation center were arranged, the therapist confirmed that the game covers those mentioned exercises and selected three convenient recruited cases to play the game and check its usability. They stated that the system covers some conventional exercises they perform; they provided feedback that helped in system enhancement prior to final evaluation. As a final evaluation the system was tested for twelve sessions by one case, with a progress rate of 1.7 ±0.38, and 3 ±0.9 cm for both anterior, and lateral scales respectively.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127182796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/icces.2014.7030973
{"title":"Blank Page Background","authors":"","doi":"10.1109/icces.2014.7030973","DOIUrl":"https://doi.org/10.1109/icces.2014.7030973","url":null,"abstract":"","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127252729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068183
A. Khalifa, Ayman M. Bahaa-Eldin, Mohamed Sobh
Blockchain as a distributed data structure or ledger is perceived to provide solutions in manifold areas beyond their prominent form of digital currency; they also showed several challenges. As enhancements to the existing blockchain systems are being proposed and developed, alternative underlying data structures were driven to solve some of the challenges facing them whilst maintaining their key ideas. We start by explaining the key concepts of the blockchain as implemented in Bitcoin and Ethereum. From there, we explain the challenges and survey on the alternative data structures along with their consensus mechanisms. We find a generalization in using hash pointers in the alternative data structures and unfold the current research and implementation directions for solutions to the challenges.
{"title":"Blockchain and its Alternative Distributed Ledgers - A Survey","authors":"A. Khalifa, Ayman M. Bahaa-Eldin, Mohamed Sobh","doi":"10.1109/ICCES48960.2019.9068183","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068183","url":null,"abstract":"Blockchain as a distributed data structure or ledger is perceived to provide solutions in manifold areas beyond their prominent form of digital currency; they also showed several challenges. As enhancements to the existing blockchain systems are being proposed and developed, alternative underlying data structures were driven to solve some of the challenges facing them whilst maintaining their key ideas. We start by explaining the key concepts of the blockchain as implemented in Bitcoin and Ethereum. From there, we explain the challenges and survey on the alternative data structures along with their consensus mechanisms. We find a generalization in using hash pointers in the alternative data structures and unfold the current research and implementation directions for solutions to the challenges.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126173502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068175
A. Ahmed, Wessam H. El-Behaidy, A. Youssif
Image denoising is an important preprocessing step in two-dimensional gel electrophoresis (2-DGE) that strongly affect spot detection or pixel-based methods. Denoising autoen-coders (DAE) is a new approach in deep learning used in image denoising that has a challenging performance. In this study, DAE technique is applied on 2-DGE images motivated by its ability to learn a robust representation to partially corrupted input. DAE is applied on over than 300 real gels got from LEeB 2-D PAGE database. To validate the efficiency of this technique three indicators are used; Signal-to-noise ratio (SNR), False discovery rate (FDR) and spot efficiency. The average results before denoising are 0.6332 for SNR and 71.05 for spot efficiency. Whereas, the average results after DAE are 61.3317 for SNR, 99.9944 for FDR and 88.4 for spot efficiency. Moreover, DAE outperforms the denoising wavelet by 1.75 %.
{"title":"Automatic Enhancement of Two-Dimensional Gel electrophoresis images using Denoising Autoencoder","authors":"A. Ahmed, Wessam H. El-Behaidy, A. Youssif","doi":"10.1109/ICCES48960.2019.9068175","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068175","url":null,"abstract":"Image denoising is an important preprocessing step in two-dimensional gel electrophoresis (2-DGE) that strongly affect spot detection or pixel-based methods. Denoising autoen-coders (DAE) is a new approach in deep learning used in image denoising that has a challenging performance. In this study, DAE technique is applied on 2-DGE images motivated by its ability to learn a robust representation to partially corrupted input. DAE is applied on over than 300 real gels got from LEeB 2-D PAGE database. To validate the efficiency of this technique three indicators are used; Signal-to-noise ratio (SNR), False discovery rate (FDR) and spot efficiency. The average results before denoising are 0.6332 for SNR and 71.05 for spot efficiency. Whereas, the average results after DAE are 61.3317 for SNR, 99.9944 for FDR and 88.4 for spot efficiency. Moreover, DAE outperforms the denoising wavelet by 1.75 %.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068149
Shahenda S. Abou Emira, Khaled Y. Youssef, M. Abouelatta
The livestock breeding performance is becoming significant due to the global challenges of protein sources against the dramatic increase of world population that reaches 8 billion. Digitalization of livestock management technique could be the clue to increase productivity and improve operational efficiency. It could be done through control of losses and realization of models relating the productivity rates versus operational parameters counting on big volume of data being collected as a result of digitalization process. The use of Internet of Things (IoT) as a key technology by a lot of research entities is usually challenged by problems of energy and power-efficient communication technologies. In this paper, Adhoc network protocol study is presented with associated simulation models to pave the way for adopting IoT technology in livestock environments. It is proven that fixed network technologies in outdoor mobile use cases are very difficult to manage from battery life time perspective.
{"title":"Power Efficient Routing Protocol (AODV) for IoT Based Livestock Applications","authors":"Shahenda S. Abou Emira, Khaled Y. Youssef, M. Abouelatta","doi":"10.1109/ICCES48960.2019.9068149","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068149","url":null,"abstract":"The livestock breeding performance is becoming significant due to the global challenges of protein sources against the dramatic increase of world population that reaches 8 billion. Digitalization of livestock management technique could be the clue to increase productivity and improve operational efficiency. It could be done through control of losses and realization of models relating the productivity rates versus operational parameters counting on big volume of data being collected as a result of digitalization process. The use of Internet of Things (IoT) as a key technology by a lot of research entities is usually challenged by problems of energy and power-efficient communication technologies. In this paper, Adhoc network protocol study is presented with associated simulation models to pave the way for adopting IoT technology in livestock environments. It is proven that fixed network technologies in outdoor mobile use cases are very difficult to manage from battery life time perspective.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123936100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068116
Eman Abouelkheir, S. El-sherbiny
The Vehicular Ad-hoc Network (VANET) is vulnerable to multiple attacks such as brute force attack, malicious users, and malicious nodes due to the lack of authentication between vehicles., and as a result, attackers could perform malicious intrusion in any vulnerable VANET. This paper presentes an efficiently computational identity based pairing-free group key distribution scheme to enhance the authentication between vehicles and hence the V ANETs can overcome the multiple attacks. When comparing the proposed scheme with other previously proposed, our proposed scheme provides less computational cost and better performance in secure group key communication. A Mathematica code program is done for the proposed scheme.
{"title":"A Computationally Efficient Pairing-Free Group Key Distribution Scheme for Vehicular Ad-Hoc Network","authors":"Eman Abouelkheir, S. El-sherbiny","doi":"10.1109/ICCES48960.2019.9068116","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068116","url":null,"abstract":"The Vehicular Ad-hoc Network (VANET) is vulnerable to multiple attacks such as brute force attack, malicious users, and malicious nodes due to the lack of authentication between vehicles., and as a result, attackers could perform malicious intrusion in any vulnerable VANET. This paper presentes an efficiently computational identity based pairing-free group key distribution scheme to enhance the authentication between vehicles and hence the V ANETs can overcome the multiple attacks. When comparing the proposed scheme with other previously proposed, our proposed scheme provides less computational cost and better performance in secure group key communication. A Mathematica code program is done for the proposed scheme.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068114
Rasha Shoitan, Z. Nossair, I. Ibrahim, S. M. Elshoura
Orthogonal matching pursuit (OMP) is a common reconstruction technique for sparse signal, which greedily calculates an estimated value for the original signal. Although OMP is fast and suitable for large sized applications, it requires a large number of measurements and suffers from low reconstruction accuracy. Many research suggested improving its reconstruction quality by transforming the image to the sparse domain; however this method increases the computational complexity especially at the encoding side. In this research, the Walsh measurement matrix is suggested to be applied directly on the image without any transformation to enhance the performance of the OMP technique. The use of the Walsh matrix reduces the computational complexity by getting rid of a transformation step at the encoder, and improves the OMP reconstruction accuracy as well. The proposed method has been applied on various test images and compared to the conventional BCS-OMP method. Simulation results have shown that using the proposed method has improved the quality of the output images by 2–7dB than the conventional one depending on the test image used. In addition, the computational complexity at the encoder and at the decoder for the proposed BCS-OMP technique is much less than that of the conventional technique.
{"title":"Image Recovery from Incomplete Walsh Measurements Based on Orthogonal Matching Pursuit","authors":"Rasha Shoitan, Z. Nossair, I. Ibrahim, S. M. Elshoura","doi":"10.1109/ICCES48960.2019.9068114","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068114","url":null,"abstract":"Orthogonal matching pursuit (OMP) is a common reconstruction technique for sparse signal, which greedily calculates an estimated value for the original signal. Although OMP is fast and suitable for large sized applications, it requires a large number of measurements and suffers from low reconstruction accuracy. Many research suggested improving its reconstruction quality by transforming the image to the sparse domain; however this method increases the computational complexity especially at the encoding side. In this research, the Walsh measurement matrix is suggested to be applied directly on the image without any transformation to enhance the performance of the OMP technique. The use of the Walsh matrix reduces the computational complexity by getting rid of a transformation step at the encoder, and improves the OMP reconstruction accuracy as well. The proposed method has been applied on various test images and compared to the conventional BCS-OMP method. Simulation results have shown that using the proposed method has improved the quality of the output images by 2–7dB than the conventional one depending on the test image used. In addition, the computational complexity at the encoder and at the decoder for the proposed BCS-OMP technique is much less than that of the conventional technique.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126225550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068145
Noureldin Laban, B. Abdellatif, H. M. Ebeid, Howida A. Shedeed, M. Tolba
Nowadays, object detection has acquired a great concentration either in ordinary images or satellite images. For satellite images, object detection is a challenging problem because objects have different scales and sparsity with very complicated background. Recent deep learning approaches have achieved breaking results for object detection than traditional ones. The ability of bounding boxes to catch existing objects with a complete and precise manner is still a challenging problem. We propose a dilated anchor method based on You Only Look Once version 3(YOLOv3) algorithm to make object detection more flexible and precise. The proposed method uses greater size anchor bounding boxes with about 30 % to 40 % larger than the traditional ones. This increase in anchor size increases the ability to catch more class objects with less influence on location detection. The experimental results using public NWPU VHR-10 dataset demonstrate the effectiveness of the proposed method in object detection of most classes and increase the overall accuracy with minimal effect on the precise location.
目前,无论是普通图像还是卫星图像,目标检测都得到了极大的关注。对于卫星图像来说,目标检测是一个具有挑战性的问题,因为目标具有不同的尺度和稀疏性,背景也非常复杂。最近的深度学习方法在目标检测方面取得了比传统方法突破性的成果。边界盒以完整和精确的方式捕获现有物体的能力仍然是一个具有挑战性的问题。我们提出了一种基于You Only Look Once version 3(YOLOv3)算法的扩展锚点方法,使目标检测更加灵活和精确。该方法使用比传统锚定边界框大30% ~ 40%的更大尺寸锚定边界框。锚大小的增加增加了捕获更多类对象的能力,对位置检测的影响较小。使用NWPU VHR-10公共数据集的实验结果表明,该方法在大多数类别的目标检测中都是有效的,并且在对精确定位影响最小的情况下提高了整体精度。
{"title":"Convolutional Neural Network with Dilated Anchors for Object Detection in Very High Resolution Satellite Images","authors":"Noureldin Laban, B. Abdellatif, H. M. Ebeid, Howida A. Shedeed, M. Tolba","doi":"10.1109/ICCES48960.2019.9068145","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068145","url":null,"abstract":"Nowadays, object detection has acquired a great concentration either in ordinary images or satellite images. For satellite images, object detection is a challenging problem because objects have different scales and sparsity with very complicated background. Recent deep learning approaches have achieved breaking results for object detection than traditional ones. The ability of bounding boxes to catch existing objects with a complete and precise manner is still a challenging problem. We propose a dilated anchor method based on You Only Look Once version 3(YOLOv3) algorithm to make object detection more flexible and precise. The proposed method uses greater size anchor bounding boxes with about 30 % to 40 % larger than the traditional ones. This increase in anchor size increases the ability to catch more class objects with less influence on location detection. The experimental results using public NWPU VHR-10 dataset demonstrate the effectiveness of the proposed method in object detection of most classes and increase the overall accuracy with minimal effect on the precise location.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124345706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068190
Sahar Selim, Ethar Elhinamy, Hisham Othman, Wael Abouelsaadat, M. A. Salem
Epilepsy is a neurological disorder that causes unusual behavior, sensations, and, in some cases, loss of awareness. It is accompanied by seizures, which are intervals of unusual patterns of brain activities. Early detection or prediction of the epileptic seizure is vital for providing effective instantaneous treatment and reducing the risk of injury. This has been an active area of research, fueled by the increasing affordability of non-invasive EEG capturing devices and the fast evolvement of the machine learning algorithms. This study provides an up-to-date review of the recent epileptic seizures approaches. Special attention is directed towards the feature extraction methods and classification algorithms. The commonly-used EEG datasets and their availability are noted. The discussed approaches range from those which rely on the traditional machine learning approaches as Naïve Bayes, Support Vector Machine (SVM), and Linear Discriminant Analysis (LDA); to those that benefit from the recent deep learning approaches, such as Long Short Term Memory (LSTM) and deep Convolutional Neural Network (CNN). It also includes the hybrid approaches that combine traditional and deep learning techniques, such as combining CNN with SVM. The study concludes the discussed approaches and their limitations by comparing them in terms of reported sensitivity, prediction time and false alarm rate.
{"title":"A Review of Machine Learning Approaches for Epileptic Seizure Prediction","authors":"Sahar Selim, Ethar Elhinamy, Hisham Othman, Wael Abouelsaadat, M. A. Salem","doi":"10.1109/ICCES48960.2019.9068190","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068190","url":null,"abstract":"Epilepsy is a neurological disorder that causes unusual behavior, sensations, and, in some cases, loss of awareness. It is accompanied by seizures, which are intervals of unusual patterns of brain activities. Early detection or prediction of the epileptic seizure is vital for providing effective instantaneous treatment and reducing the risk of injury. This has been an active area of research, fueled by the increasing affordability of non-invasive EEG capturing devices and the fast evolvement of the machine learning algorithms. This study provides an up-to-date review of the recent epileptic seizures approaches. Special attention is directed towards the feature extraction methods and classification algorithms. The commonly-used EEG datasets and their availability are noted. The discussed approaches range from those which rely on the traditional machine learning approaches as Naïve Bayes, Support Vector Machine (SVM), and Linear Discriminant Analysis (LDA); to those that benefit from the recent deep learning approaches, such as Long Short Term Memory (LSTM) and deep Convolutional Neural Network (CNN). It also includes the hybrid approaches that combine traditional and deep learning techniques, such as combining CNN with SVM. The study concludes the discussed approaches and their limitations by comparing them in terms of reported sensitivity, prediction time and false alarm rate.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130044322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICCES48960.2019.9068138
E. S. Shoukralla, B. Ahmed
This paper presents a new computational method for solving linear Volterra integral equations of the second kind. Three techniques are used to establish the method; the first technique is based on re-describing the Barycentric Lagrange interpolation in a new formula that reduces the round-off error resulting from the high degree interpolant polynomials; the second technique is based on expanding the Lagrange Barycentric functions into Maclaurin polynomials and expressing them via a monomial basis that facilitates calculations and reduces the procedure's steps. In the third technique, the equidistance Chebyshev interpolation nodes have been chosen so that the bad behavior of the solution near the endpoints of the integration domain is treated. Moreover, the method reduces the solution to the solution of an equivalent matrix equation that can be easily solved by using the undermined coefficients method. The obtained results of the five illustrated examples show that if the unknown function is algebraic, the numerical solutions are found in explicit mathematical form equal to the exact solutions, regardless of the properties of the given function or the kernel. If the unknown function is non-algebraic, the numerical solutions are strongly converging to the exact solutions rather close to the endpoint of the integration domain which ensures the accuracy, efficiency, and authenticity of the presented method.
{"title":"Multi-techniques method for Solving Volterra Integral Equations of the Second Kind","authors":"E. S. Shoukralla, B. Ahmed","doi":"10.1109/ICCES48960.2019.9068138","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068138","url":null,"abstract":"This paper presents a new computational method for solving linear Volterra integral equations of the second kind. Three techniques are used to establish the method; the first technique is based on re-describing the Barycentric Lagrange interpolation in a new formula that reduces the round-off error resulting from the high degree interpolant polynomials; the second technique is based on expanding the Lagrange Barycentric functions into Maclaurin polynomials and expressing them via a monomial basis that facilitates calculations and reduces the procedure's steps. In the third technique, the equidistance Chebyshev interpolation nodes have been chosen so that the bad behavior of the solution near the endpoints of the integration domain is treated. Moreover, the method reduces the solution to the solution of an equivalent matrix equation that can be easily solved by using the undermined coefficients method. The obtained results of the five illustrated examples show that if the unknown function is algebraic, the numerical solutions are found in explicit mathematical form equal to the exact solutions, regardless of the properties of the given function or the kernel. If the unknown function is non-algebraic, the numerical solutions are strongly converging to the exact solutions rather close to the endpoint of the integration domain which ensures the accuracy, efficiency, and authenticity of the presented method.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}