首页 > 最新文献

2019 14th International Conference on Computer Engineering and Systems (ICCES)最新文献

英文 中文
Efficiency Improvement Approach of Deep Web Data Extraction 深度网络数据提取效率提升方法
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068134
Mona M. Nasr, Hanan Fahmy, M. Thabet
Deep Web is an important topic of research. According to the deep web pages' complicated structure, extracting content is a very challenging issue. In this paper a framework for efficiently discovery deep web data records is proposed. The proposed framework is able to perform crawling and fetching relevant pages related to user's text query. To retrieve the relevant pages this paper proposes a similarity method based on the improved weighting function (ITF-IDF). This framework utilizes the web page's visual features to obtain data records rather than analyze the source code of HTML. To accurately retrieve the data records, an approach called layout tree is exploited. The proposed framework uses Noise Filter (NSFilter) algorithm to eliminate all noise like header, footer, ads and unnecessary content. Data records are defined as a similar layout visual blocks. To cluster the visual blocks with similar layout, this paper proposes a method based on appearance similarity and similar shape and coordinate feature (SSC). The experiment results illustrate that the framework being proposed is better than previous data extraction works.
深网是一个重要的研究课题。由于深层网页结构复杂,内容提取是一个非常具有挑战性的问题。本文提出了一种高效发现深度网络数据记录的框架。该框架能够抓取和获取与用户文本查询相关的页面。为了检索相关页面,本文提出了一种基于改进加权函数(ITF-IDF)的相似性方法。该框架利用网页的可视化特性来获取数据记录,而不是分析HTML的源代码。为了准确地检索数据记录,采用了一种称为布局树的方法。该框架使用噪声过滤器(NSFilter)算法来消除所有噪声,如页眉、页脚、广告和不必要的内容。数据记录被定义为类似可视化块的布局。为了对具有相似布局的视觉块进行聚类,本文提出了一种基于外观相似性和相似形状与坐标特征的聚类方法。实验结果表明,所提出的框架优于以往的数据提取方法。
{"title":"Efficiency Improvement Approach of Deep Web Data Extraction","authors":"Mona M. Nasr, Hanan Fahmy, M. Thabet","doi":"10.1109/ICCES48960.2019.9068134","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068134","url":null,"abstract":"Deep Web is an important topic of research. According to the deep web pages' complicated structure, extracting content is a very challenging issue. In this paper a framework for efficiently discovery deep web data records is proposed. The proposed framework is able to perform crawling and fetching relevant pages related to user's text query. To retrieve the relevant pages this paper proposes a similarity method based on the improved weighting function (ITF-IDF). This framework utilizes the web page's visual features to obtain data records rather than analyze the source code of HTML. To accurately retrieve the data records, an approach called layout tree is exploited. The proposed framework uses Noise Filter (NSFilter) algorithm to eliminate all noise like header, footer, ads and unnecessary content. Data records are defined as a similar layout visual blocks. To cluster the visual blocks with similar layout, this paper proposes a method based on appearance similarity and similar shape and coordinate feature (SSC). The experiment results illustrate that the framework being proposed is better than previous data extraction works.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of Video Face Detection methods Using HSV, HSL and HSI Color Spaces 基于HSV、HSL和HSI色彩空间的视频人脸检测方法比较
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068182
S. Elaw, W. Abd-Elhafiez, M. Heshmat
this paper presents, new face detection methods based on HSL and HSI color spaces are presented. A comparison of the new face detection methods and a new HSV skin color range is presented. The three color spaces are based on: H, S, V, L, and I, whose represent Hue, Saturation, Value, Luminance and Intensity respectively. YouTube Celebrities Face Tracking and Recognition Dataset is used. It contains 1910 sequences of 47 subjects. All dataset videos are encoded in MPEG4 at 25fps rate. The proposed methods based on two main steps, at the beginning, the skin like regions is detected by the gradient values of the proposed color space. According to main facial features, such as eyes, mouth and nose the desired faces are determined from the recommended regions. According to experimental results, HSV color space gives good results in lighten_faces, HSL color space gives good results for multi_faces and HSI color space gives good results for single_faces and zoomed_faces videos.
本文提出了基于HSL和HSI颜色空间的人脸检测新方法。对新的人脸检测方法和新的HSV肤色范围进行了比较。这三个色彩空间基于:H、S、V、L和I,分别代表Hue、Saturation、Value、Luminance和Intensity。使用YouTube名人面部跟踪和识别数据集。它包含47个主题的1910个序列。所有数据集视频都以25fps的速率以MPEG4编码。该方法主要分为两个步骤:首先,利用所提出的颜色空间的梯度值检测类皮肤区域;根据主要的面部特征,如眼睛、嘴巴和鼻子,从推荐的区域确定理想的脸。实验结果表明,HSV色彩空间对lighten_faces具有较好的效果,HSL色彩空间对multi_faces具有较好的效果,HSI色彩空间对single_faces和zoomed_faces具有较好的效果。
{"title":"Comparison of Video Face Detection methods Using HSV, HSL and HSI Color Spaces","authors":"S. Elaw, W. Abd-Elhafiez, M. Heshmat","doi":"10.1109/ICCES48960.2019.9068182","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068182","url":null,"abstract":"this paper presents, new face detection methods based on HSL and HSI color spaces are presented. A comparison of the new face detection methods and a new HSV skin color range is presented. The three color spaces are based on: H, S, V, L, and I, whose represent Hue, Saturation, Value, Luminance and Intensity respectively. YouTube Celebrities Face Tracking and Recognition Dataset is used. It contains 1910 sequences of 47 subjects. All dataset videos are encoded in MPEG4 at 25fps rate. The proposed methods based on two main steps, at the beginning, the skin like regions is detected by the gradient values of the proposed color space. According to main facial features, such as eyes, mouth and nose the desired faces are determined from the recommended regions. According to experimental results, HSV color space gives good results in lighten_faces, HSL color space gives good results for multi_faces and HSI color space gives good results for single_faces and zoomed_faces videos.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126784646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compact aggregate short-lived signatures for consortium consensus protocols 用于财团协商一致协议的紧凑聚合短寿命签名
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068157
Sherif M. Samir, H. K. Mohamed, Hazem Said
Cryptography and cryptographic primitives are widely considered to be the most important fundamental of blockchain that provide secure and anonymity guaranteed decentralized solutions. In the history of papers study cryptographic primitives used in blockchain, the focus has always been in the use cases of blockchain in different aspects of industry, example health care, IoT, information security, consensus building systems and some other fields. To the best of our knowledge, current cryptography techniques used in blockchain, or still theoretical but the security proof can be proven under certain security assumption, so can be used in blockchain has gathered numerous awareness in the last five years. In this paper, we fully review and analysis some cryptographic techniques used in designing a distributed consensus protocol that is efficient, decentralized, and flexible as a framework which are already used in blockchain. Take in consideration deploying a permissioned consensus like delegated proof-of-stack (DPoS) in the decentralized IOT applications is hard. The IOT systems needs to consider a larger data size and a larger span deployment. With this in mind we point to the special challenge for the IOT applications related to blockchain. Several modern cryptography techniques have been adopted to enhance the consensus process with respect to the computational overhead vs communication overhead and storage cost. Additionally, we re-examine non-interactive signature and public key aggregation in digital signature on different messages types and present a change in the aggregation scheme, as far as we know this is the first time that pairing become more faster in verify signatures, and to enable more transaction in the block.
密码学和密码学原语被广泛认为是区块链最重要的基础,提供了安全和匿名保证的去中心化解决方案。在研究区块链中使用的密码原语的论文历史中,重点一直放在区块链在不同行业方面的用例上,例如医疗保健、物联网、信息安全、共识构建系统等领域。据我们所知,目前用于区块链的加密技术,还是理论性的,但其安全性证明可以在一定的安全假设下证明,因此可以用于区块链在过去的五年里已经聚集了众多的意识。在本文中,我们全面回顾和分析了用于设计分布式共识协议的一些加密技术,该协议作为已经在区块链中使用的框架,具有高效,分散和灵活的特点。考虑到在分散的物联网应用程序中部署像委托堆栈证明(DPoS)这样的许可共识是困难的。物联网系统需要考虑更大的数据量和更大的跨度部署。考虑到这一点,我们指出了与区块链相关的物联网应用的特殊挑战。在计算开销、通信开销和存储成本方面,采用了几种现代加密技术来增强共识过程。此外,我们重新研究了不同消息类型的数字签名中的非交互式签名和公钥聚合,并提出了聚合方案的变化,据我们所知,这是第一次在验证签名时配对变得更快,并且在块中启用更多的事务。
{"title":"Compact aggregate short-lived signatures for consortium consensus protocols","authors":"Sherif M. Samir, H. K. Mohamed, Hazem Said","doi":"10.1109/ICCES48960.2019.9068157","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068157","url":null,"abstract":"Cryptography and cryptographic primitives are widely considered to be the most important fundamental of blockchain that provide secure and anonymity guaranteed decentralized solutions. In the history of papers study cryptographic primitives used in blockchain, the focus has always been in the use cases of blockchain in different aspects of industry, example health care, IoT, information security, consensus building systems and some other fields. To the best of our knowledge, current cryptography techniques used in blockchain, or still theoretical but the security proof can be proven under certain security assumption, so can be used in blockchain has gathered numerous awareness in the last five years. In this paper, we fully review and analysis some cryptographic techniques used in designing a distributed consensus protocol that is efficient, decentralized, and flexible as a framework which are already used in blockchain. Take in consideration deploying a permissioned consensus like delegated proof-of-stack (DPoS) in the decentralized IOT applications is hard. The IOT systems needs to consider a larger data size and a larger span deployment. With this in mind we point to the special challenge for the IOT applications related to blockchain. Several modern cryptography techniques have been adopted to enhance the consensus process with respect to the computational overhead vs communication overhead and storage cost. Additionally, we re-examine non-interactive signature and public key aggregation in digital signature on different messages types and present a change in the aggregation scheme, as far as we know this is the first time that pairing become more faster in verify signatures, and to enable more transaction in the block.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121521770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous Redundancy for PCB Track Failures: An Automotive Example PCB轨迹故障的异构冗余:一个汽车实例
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068123
M. Labib, Dina G. Mahmoud, G. Alkady, I. Adly, H. Amer, R. Daoud, H. Elsayed
Reliability is a very important aspect in electronic components used in the Automotive industry. Due to the harsh environments in this industry, Printed Circuit Board (PCB) tracks are a very common cause of failure. This paper proposes a scheme that will increase the reliability of chip-to-chip interconnections. The scheme relies on the availability of unused microcontroller IO ports. It is shown how to implement a 1-out-of-2 (or even 1-out-of-3) fault-tolerant communication channel. To illustrate the advantage of the proposed scheme, communication channel reliability is calculated with and without fault tolerance and a use case indicates that the increase in reliability can be significant.
可靠性是汽车工业中电子元件的一个非常重要的方面。由于这个行业的恶劣环境,印刷电路板(PCB)轨道是一个非常常见的故障原因。本文提出了一种提高芯片间互连可靠性的方案。该方案依赖于未使用的微控制器IO端口的可用性。演示了如何实现1 / 2(甚至1 / 3)容错通信通道。为了说明该方案的优点,计算了有容错和无容错情况下的通信信道可靠性,一个用例表明,可靠性的提高是显著的。
{"title":"Heterogeneous Redundancy for PCB Track Failures: An Automotive Example","authors":"M. Labib, Dina G. Mahmoud, G. Alkady, I. Adly, H. Amer, R. Daoud, H. Elsayed","doi":"10.1109/ICCES48960.2019.9068123","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068123","url":null,"abstract":"Reliability is a very important aspect in electronic components used in the Automotive industry. Due to the harsh environments in this industry, Printed Circuit Board (PCB) tracks are a very common cause of failure. This paper proposes a scheme that will increase the reliability of chip-to-chip interconnections. The scheme relies on the availability of unused microcontroller IO ports. It is shown how to implement a 1-out-of-2 (or even 1-out-of-3) fault-tolerant communication channel. To illustrate the advantage of the proposed scheme, communication channel reliability is calculated with and without fault tolerance and a use case indicates that the increase in reliability can be significant.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"1838 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125169484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Proposed Framework for Improving Analysis of Big Unstructured Data in Social Media 一种改进社交媒体大非结构化数据分析的建议框架
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068154
Mohamed Elsayed, A. Abdelwahab, Hatem Ahdelkader
With the rapid development of Big Data and the necessity for analyzing their huge volumes, the issue of Unstructured Data analysis in social media was appeared. The Data analysis process is very important in all fields as to make decisions at the right time and over certain facts. The usage of social media has become the latest trend in today's world in which users send, read posts known as ‘message’ and communicate with various groups. Users are sharing their regular life, posting their views on everything like products and locations. This data is extremely unstructured, making it hard to analyze. Machine learning technology offers important data preparation techniques for processing large-scale data to extract knowledge, e.g., classifying data. Extract useful information from social media data is essential to success in the big data age. Therefore, fresh strategies are needed for handling huge quantities of unstructured data and finding the hidden information in these data and achieving better data analysis outcomes, In this paper, the proposed framework recommends the construction of a machine-learning model capable of analyzing unstructured text data with highly accuracy compared to other machine learning algorithms.
随着大数据的快速发展和对海量数据进行分析的需要,社交媒体中的非结构化数据分析问题应运而生。数据分析过程在所有领域都是非常重要的,因为它可以在正确的时间和特定的事实上做出决定。社交媒体的使用已经成为当今世界的最新趋势,用户在社交媒体上发送、阅读被称为“消息”的帖子,并与各种群体进行交流。用户正在分享他们的日常生活,发布他们对产品和地点等一切事物的看法。这些数据是非结构化的,很难分析。机器学习技术为处理大规模数据提取知识提供了重要的数据准备技术,例如对数据进行分类。从社交媒体数据中提取有用信息是在大数据时代取得成功的关键。因此,需要新的策略来处理大量的非结构化数据,并发现这些数据中的隐藏信息,从而获得更好的数据分析结果。本文提出的框架建议构建一种机器学习模型,与其他机器学习算法相比,该模型能够以较高的精度分析非结构化文本数据。
{"title":"A Proposed Framework for Improving Analysis of Big Unstructured Data in Social Media","authors":"Mohamed Elsayed, A. Abdelwahab, Hatem Ahdelkader","doi":"10.1109/ICCES48960.2019.9068154","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068154","url":null,"abstract":"With the rapid development of Big Data and the necessity for analyzing their huge volumes, the issue of Unstructured Data analysis in social media was appeared. The Data analysis process is very important in all fields as to make decisions at the right time and over certain facts. The usage of social media has become the latest trend in today's world in which users send, read posts known as ‘message’ and communicate with various groups. Users are sharing their regular life, posting their views on everything like products and locations. This data is extremely unstructured, making it hard to analyze. Machine learning technology offers important data preparation techniques for processing large-scale data to extract knowledge, e.g., classifying data. Extract useful information from social media data is essential to success in the big data age. Therefore, fresh strategies are needed for handling huge quantities of unstructured data and finding the hidden information in these data and achieving better data analysis outcomes, In this paper, the proposed framework recommends the construction of a machine-learning model capable of analyzing unstructured text data with highly accuracy compared to other machine learning algorithms.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Distributed Electronic Health Records Semantic Interoperability Based on a Fuzzy Ontology Architecture 基于模糊本体体系结构的分布式电子健康记录语义互操作性
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068117
Ebtsam Adel, S. Barakat, Mohammed M Elmogy
Realthcare is one of the main domains where sharing information is an essential requirement. Medical information systems store all the clinical data in many different kinds of formats. Subsequently, there is an urgent requirement to address the semantic interoperability problem. This paper proposes a fuzzy-ontology framework that could integrate most existing EHR different data models. In the proposed framework, each input source is represented into an ontology representation. Those data sources may be relational databases, XML documents, Excel spreadsheets, CSV files, or EHRs standards. Second, all those output ontologies are merged and combined in only one ontology. DL-Query Protégé plug-in is used for providing specific queries. All the results are explained with the help of screenshots. We expect our framework to be a step towards solving the specific problem without losses of data and semantics.
医疗保健是一个主要领域,其中共享信息是一个基本要求。医疗信息系统以许多不同的格式存储所有的临床数据。因此,迫切需要解决语义互操作性问题。本文提出了一种模糊本体框架,可以集成现有的大多数电子病历不同的数据模型。在提出的框架中,每个输入源都被表示为本体表示。这些数据源可以是关系数据库、XML文档、Excel电子表格、CSV文件或ehr标准。其次,将所有这些输出本体合并并组合为一个本体。DL-Query proprotesdatame插件用于提供特定的查询。所有的结果都在截图的帮助下解释。我们希望我们的框架能够在不丢失数据和语义的情况下解决特定问题。
{"title":"Distributed Electronic Health Records Semantic Interoperability Based on a Fuzzy Ontology Architecture","authors":"Ebtsam Adel, S. Barakat, Mohammed M Elmogy","doi":"10.1109/ICCES48960.2019.9068117","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068117","url":null,"abstract":"Realthcare is one of the main domains where sharing information is an essential requirement. Medical information systems store all the clinical data in many different kinds of formats. Subsequently, there is an urgent requirement to address the semantic interoperability problem. This paper proposes a fuzzy-ontology framework that could integrate most existing EHR different data models. In the proposed framework, each input source is represented into an ontology representation. Those data sources may be relational databases, XML documents, Excel spreadsheets, CSV files, or EHRs standards. Second, all those output ontologies are merged and combined in only one ontology. DL-Query Protégé plug-in is used for providing specific queries. All the results are explained with the help of screenshots. We expect our framework to be a step towards solving the specific problem without losses of data and semantics.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131372121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Taxonomy of Discretization Techniques based on Class Labels and Attributes' Relationship 基于类标签和属性关系的离散化技术分类
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068185
Hanan Elhilbawi, S. Eldawlatly, Hani M. K. Mahdi
Discretizing continuous attributes is one essential and important data preprocessing step in data mining. Various data mining techniques are designed to be applied to discrete attributes. There have been tremendous efforts to propose discretization techniques with different characteristics. However, a clear pathway that can guide the choice of the needed discretization technique for different types of datasets is lacking. This paper proposes a taxonomy based on the existence of class information and relationship between attributes in the analyzed dataset. We review different discretization techniques classified according to the proposed taxonomy. The proposed taxonomy emphasizes the advantages and disadvantages of each discretization technique to be able theoretically to find a suitable discretization technique for a particular dataset.
离散化连续属性是数据挖掘中一个重要的数据预处理步骤。各种数据挖掘技术被设计用于离散属性。为了提出具有不同特性的离散化技术,人们付出了巨大的努力。然而,缺乏一个明确的途径,可以指导选择不同类型的数据集所需的离散化技术。本文提出了一种基于类信息存在性和属性间关系的分类方法。我们回顾了根据所提出的分类分类的不同离散化技术。提出的分类法强调了每种离散化技术的优点和缺点,以便能够从理论上找到适合特定数据集的离散化技术。
{"title":"A Taxonomy of Discretization Techniques based on Class Labels and Attributes' Relationship","authors":"Hanan Elhilbawi, S. Eldawlatly, Hani M. K. Mahdi","doi":"10.1109/ICCES48960.2019.9068185","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068185","url":null,"abstract":"Discretizing continuous attributes is one essential and important data preprocessing step in data mining. Various data mining techniques are designed to be applied to discrete attributes. There have been tremendous efforts to propose discretization techniques with different characteristics. However, a clear pathway that can guide the choice of the needed discretization technique for different types of datasets is lacking. This paper proposes a taxonomy based on the existence of class information and relationship between attributes in the analyzed dataset. We review different discretization techniques classified according to the proposed taxonomy. The proposed taxonomy emphasizes the advantages and disadvantages of each discretization technique to be able theoretically to find a suitable discretization technique for a particular dataset.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115830584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Recognition of Fish Diseases in Fish Farms 养鱼场鱼类疾病的自动识别
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068141
A. Waleed, H. Medhat, Mariam Esmail, Kareem Osama, Radwa Samy, Taraggy M. Ghanim
Fish diseases are the major cause for increasing mortality in fish farms. Automatic identification of diseased fish at early stages is necessary step to prevent spreading disease. Fish disease diagnosis suffers from some limitations that need high level of expertise to be resolved. Recognition of fish abnormal behaviors helps in early prediction of fish diseases. Fish behavior is evaluated by analyzing fish trajectories in videos. Abnormalities may be due to environmental changes. This paper introduces a survey on what computer vision techniques propose in that field. A comprehensive comparison between different automatic recognition systems is included. Finally, our approach is proposed to automatically recognize and identify three different types of fish diseases. These diseases are Epizootic ulcerative syndrome (EUS), Ichthyophthirius (Ich) and Columnaris. Our approach shows the effect of different color spaces on the Convolutional Neural Networkk CNN final performance.
鱼类疾病是养鱼场死亡率上升的主要原因。在早期阶段自动识别病鱼是防止疾病传播的必要步骤。鱼类疾病诊断存在一些局限性,需要高水平的专业知识才能解决。对鱼类异常行为的识别有助于鱼类疾病的早期预测。通过分析视频中鱼的运动轨迹来评估鱼的行为。异常可能是环境变化所致。本文介绍了计算机视觉技术在该领域的发展概况。对不同的自动识别系统进行了全面的比较。最后,我们提出了一种自动识别和识别三种不同类型鱼类疾病的方法。这些疾病是兽疫性溃疡综合征(EUS)、鱼鳞病(Ich)和柱状病。我们的方法显示了不同颜色空间对卷积神经网络CNN最终性能的影响。
{"title":"Automatic Recognition of Fish Diseases in Fish Farms","authors":"A. Waleed, H. Medhat, Mariam Esmail, Kareem Osama, Radwa Samy, Taraggy M. Ghanim","doi":"10.1109/ICCES48960.2019.9068141","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068141","url":null,"abstract":"Fish diseases are the major cause for increasing mortality in fish farms. Automatic identification of diseased fish at early stages is necessary step to prevent spreading disease. Fish disease diagnosis suffers from some limitations that need high level of expertise to be resolved. Recognition of fish abnormal behaviors helps in early prediction of fish diseases. Fish behavior is evaluated by analyzing fish trajectories in videos. Abnormalities may be due to environmental changes. This paper introduces a survey on what computer vision techniques propose in that field. A comprehensive comparison between different automatic recognition systems is included. Finally, our approach is proposed to automatically recognize and identify three different types of fish diseases. These diseases are Epizootic ulcerative syndrome (EUS), Ichthyophthirius (Ich) and Columnaris. Our approach shows the effect of different color spaces on the Convolutional Neural Networkk CNN final performance.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125173125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An Enhanced Machine Larning based Threat Hunter An Intelligent Network Intrusion Detection System 基于增强机器学习的威胁猎人智能网络入侵检测系统
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068160
Sayed Salah Ahmed Hasan, H. Mohamed, Ayman M. Bahaa-Eldin
In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication between different sources. This can be done by supporting networks with security systems to thwart any chances of exploitations by any attacker. Intrusion Detection System (IDS) is one of the major systems as it is capable of monitoring all network traffics (ingoing and outgoing) and performs some analysis and inspection to evaluate the behavior of such traffics. IDS can block all suspicious activities that are trying to breach any network based on policies that are demanded by a system administrator. Traditional IDS has some limits and does not provide a complete solution for some kind of problems. IDS searches for potential abnormal activities on the network traffic and sometimes succeeds to find some vulnerability which may result in compromising the network. We, therefore, suggest an efficient application in this paper of Machine Learning (ML) based IDS.
在网络安全中,有许多应用程序和技术可用于维护高级别安全性目标,例如机密性、完整性、可用性和不可否认性,以实现不同来源之间的安全通信。这可以通过支持带有安全系统的网络来阻止任何攻击者利用的机会来实现。入侵检测系统(Intrusion Detection System, IDS)是主要的网络检测系统之一,它能够监控所有的网络流量(进出),并对这些流量进行分析和检测,以评估这些流量的行为。IDS可以根据系统管理员要求的策略阻止试图破坏任何网络的所有可疑活动。传统的IDS有一些限制,并且不能为某些问题提供完整的解决方案。IDS在网络流量中搜索潜在的异常活动,有时会成功发现一些可能导致网络危害的漏洞。因此,我们在本文中提出了基于机器学习(ML)的IDS的有效应用。
{"title":"An Enhanced Machine Larning based Threat Hunter An Intelligent Network Intrusion Detection System","authors":"Sayed Salah Ahmed Hasan, H. Mohamed, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES48960.2019.9068160","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068160","url":null,"abstract":"In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication between different sources. This can be done by supporting networks with security systems to thwart any chances of exploitations by any attacker. Intrusion Detection System (IDS) is one of the major systems as it is capable of monitoring all network traffics (ingoing and outgoing) and performs some analysis and inspection to evaluate the behavior of such traffics. IDS can block all suspicious activities that are trying to breach any network based on policies that are demanded by a system administrator. Traditional IDS has some limits and does not provide a complete solution for some kind of problems. IDS searches for potential abnormal activities on the network traffic and sometimes succeeds to find some vulnerability which may result in compromising the network. We, therefore, suggest an efficient application in this paper of Machine Learning (ML) based IDS.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Video Transmission Scheduling Using Concurrent Multipath Transfer 基于并发多径传输的视频传输调度框架
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068150
Hatem Fetoh, Ahmad M. Hamad, K. M. Amin
Concurrent multipath scheduling aims to realize the highest efficiency of the network bandwidth utilization. However, concurrent multipath transfer confronts challenges such as long transmission delay, receiver buffer blocking, packet loss, and poor quality of service which significantly degrade the transmission performance in the network. To overcome these challenges, the proposed framework for adaptive scheduling of the concurrent multipath transfer is introduced. This proposed framework depends on the estimation of the bandwidth, path load, packet loss rate, and path delay for next transmissions. The estimation of the bandwidth, path load, packet loss rate, and path delay is based on the transmission information details which are sent from the receiver by the path map. Then, the path score based on the estimated bandwidth, path load, packet loss rate, and path delay is introduced for the best path selection of the next transmission. The simulation results show that the proposed framework improves throughput and reduces retransmission time-out.
并发多路径调度的目的是实现网络带宽的最高利用效率。然而,并发多径传输面临传输延迟长、接收端缓冲区阻塞、丢包和服务质量差等问题,严重影响了网络的传输性能。为了克服这些挑战,提出了一种并行多径传输的自适应调度框架。该框架基于对带宽、路径负载、丢包率和下一次传输的路径延迟的估计。带宽、路径负载、丢包率和路径延迟的估计是基于接收端通过路径映射发送的传输信息的细节。然后,引入基于估计带宽、路径负载、丢包率和路径延迟的路径评分,为下一次传输选择最佳路径。仿真结果表明,该框架提高了吞吐量,减少了重传超时。
{"title":"A Framework for Video Transmission Scheduling Using Concurrent Multipath Transfer","authors":"Hatem Fetoh, Ahmad M. Hamad, K. M. Amin","doi":"10.1109/ICCES48960.2019.9068150","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068150","url":null,"abstract":"Concurrent multipath scheduling aims to realize the highest efficiency of the network bandwidth utilization. However, concurrent multipath transfer confronts challenges such as long transmission delay, receiver buffer blocking, packet loss, and poor quality of service which significantly degrade the transmission performance in the network. To overcome these challenges, the proposed framework for adaptive scheduling of the concurrent multipath transfer is introduced. This proposed framework depends on the estimation of the bandwidth, path load, packet loss rate, and path delay for next transmissions. The estimation of the bandwidth, path load, packet loss rate, and path delay is based on the transmission information details which are sent from the receiver by the path map. Then, the path score based on the estimated bandwidth, path load, packet loss rate, and path delay is introduced for the best path selection of the next transmission. The simulation results show that the proposed framework improves throughput and reduces retransmission time-out.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 14th International Conference on Computer Engineering and Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1