首页 > 最新文献

2019 14th International Conference on Computer Engineering and Systems (ICCES)最新文献

英文 中文
Improving Golay Code Using Hashing Technique 使用哈希技术改进Golay代码
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068153
Sara Salama, Rashed K. Salem, H. Abdel-Kader
Data are the representation of our world and our life. Data are increasing continuously, they come from different sources such as sensors, maps, climate informatics, smartphones, social media and/or medical data domains. Data are represented by different forms such as image, text, video and/or digital data. These incomprehensible data need an influential technique to be clustered and analyzed. This paper presents a hashing technique for the clustering process of unclassified and disorganized data. These clustered data are useful for decision-making process. The proposed technique is based on Golay error-correction code. The main concept is reversing the original Golay error-correction scheme and building Golay Code Addresses Hash Table (GCAHT). Simulation results stated that the proposed technique achieved high performance. Beta-CV, Dunn Index, C-index and Sum Square Error are used for measurements.
数据代表着我们的世界和生活。数据不断增加,它们来自不同的来源,如传感器、地图、气候信息、智能手机、社交媒体和/或医疗数据领域。数据由不同的形式表示,如图像、文本、视频和/或数字数据。这些难以理解的数据需要一种有影响力的技术来聚类和分析。本文提出了一种用于未分类和无组织数据聚类过程的散列技术。这些聚类数据对决策过程很有用。该技术基于Golay纠错码。主要概念是逆转原始的Golay纠错方案并构建Golay代码地址哈希表(GCAHT)。仿真结果表明,该方法取得了良好的性能。测量采用β - cv、邓恩指数、c指数和和方误差。
{"title":"Improving Golay Code Using Hashing Technique","authors":"Sara Salama, Rashed K. Salem, H. Abdel-Kader","doi":"10.1109/ICCES48960.2019.9068153","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068153","url":null,"abstract":"Data are the representation of our world and our life. Data are increasing continuously, they come from different sources such as sensors, maps, climate informatics, smartphones, social media and/or medical data domains. Data are represented by different forms such as image, text, video and/or digital data. These incomprehensible data need an influential technique to be clustered and analyzed. This paper presents a hashing technique for the clustering process of unclassified and disorganized data. These clustered data are useful for decision-making process. The proposed technique is based on Golay error-correction code. The main concept is reversing the original Golay error-correction scheme and building Golay Code Addresses Hash Table (GCAHT). Simulation results stated that the proposed technique achieved high performance. Beta-CV, Dunn Index, C-index and Sum Square Error are used for measurements.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swarm Intelligence Optimization for Feature Selection of Biomolecules 生物分子特征选择的群体智能优化
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068178
Walaa Alkady, Walaa K. Gad, K. Bahnasy
The biological activity of molecules is usually measured in assays to establish the level of inhibition of signal transduction or metabolic pathways. Drug discovery involves the use of Quantitative Structure Activity Relationship (QSAR) to identify chemical structures that could have good inhibitory effects on specific targets and have low toxicity. QSAR has very complicated 3D structure. Therefore, the flower-based optimization model (FBOM) for molecules is proposed to solve the curse of dimensionality problems. Four performance measures: accuracy, precision, sensitivity and specificity are used to evaluate the proposed model. Molecules activity is predicted using support vector machine (SVM), Naive Bayesian (NB), K-Nearest Neighbor (KNN), Decision Tree (DT) and Neural Network (NN) Classifiers. The results of the proposed model are promising. The proposed model reduces the number of features to 8 features out of 1666 features. Moreover, the average classification accuracy reaches to 95%.
分子的生物活性通常在测定中测量,以确定信号转导或代谢途径的抑制水平。药物发现涉及使用定量构效关系(QSAR)来识别对特定靶点具有良好抑制作用且毒性低的化学结构。QSAR具有非常复杂的三维结构。为此,提出了基于花的分子优化模型(FBOM)来解决维数问题。四个性能指标:准确性,精密度,灵敏度和特异性被用来评估所提出的模型。分子活性预测使用支持向量机(SVM)、朴素贝叶斯(NB)、k近邻(KNN)、决策树(DT)和神经网络(NN)分类器。该模型的结果是有希望的。该模型将1666个特征中的特征数量减少到8个。平均分类准确率达到95%以上。
{"title":"Swarm Intelligence Optimization for Feature Selection of Biomolecules","authors":"Walaa Alkady, Walaa K. Gad, K. Bahnasy","doi":"10.1109/ICCES48960.2019.9068178","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068178","url":null,"abstract":"The biological activity of molecules is usually measured in assays to establish the level of inhibition of signal transduction or metabolic pathways. Drug discovery involves the use of Quantitative Structure Activity Relationship (QSAR) to identify chemical structures that could have good inhibitory effects on specific targets and have low toxicity. QSAR has very complicated 3D structure. Therefore, the flower-based optimization model (FBOM) for molecules is proposed to solve the curse of dimensionality problems. Four performance measures: accuracy, precision, sensitivity and specificity are used to evaluate the proposed model. Molecules activity is predicted using support vector machine (SVM), Naive Bayesian (NB), K-Nearest Neighbor (KNN), Decision Tree (DT) and Neural Network (NN) Classifiers. The results of the proposed model are promising. The proposed model reduces the number of features to 8 features out of 1666 features. Moreover, the average classification accuracy reaches to 95%.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementing Arabic Handwritten Recognition Approach using Cloud Computing and Google APIs on a mobile application 在移动应用程序上使用云计算和Google api实现阿拉伯手写识别方法
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068124
Nada Shorim, Taraggy M. Ghanim, Ashraf AbdelRaouf
Cloud computing application for automatic recognition of Arabic handwritten is needed nowadays and of great importance especially when implemented on a mobile application. It is a type of applications that includes many challenging aspects. This paper introduces for the first time a cloud based mobile app that applies Arabic handwritten recognition for translation purposes and finding locations on Google maps. Proposing such a service for non-Arabic speakers is of great importance especially while visiting Arabic speaking countries. Our approach is the first to build a mobile app based on cloud computing that proposes a multi-phase hybrid classifier for Arabic Handwritten text recognition. Google Maps and Google Translate APIs are applied on the recognized text as part of the introduced cloud computing application. The recognition part of the proposed approach is a multi-stage classifier introduced to cope with big database and high computation complexities. The experiment applied on our approach shows better results of our Arabic handwritten recognition when compared with similar approaches.
现在需要云计算应用程序来自动识别阿拉伯手写体,特别是在移动应用程序上实现时,这一点非常重要。这是一种应用程序类型,包含许多具有挑战性的方面。本文首次介绍了一个基于云的移动应用程序,该应用程序将阿拉伯语手写识别用于翻译目的和在谷歌地图上查找位置。为非阿拉伯语使用者提供这样的服务是非常重要的,特别是在访问阿拉伯语国家时。我们的方法是第一个建立一个基于云计算的移动应用程序,提出了一个用于阿拉伯手写文本识别的多阶段混合分类器。作为引入的云计算应用程序的一部分,将Google Maps和Google Translate api应用于识别的文本。该方法的识别部分是为了应对大数据库和高计算复杂度而引入的多阶段分类器。实验结果表明,与同类方法相比,我们的方法具有更好的识别效果。
{"title":"Implementing Arabic Handwritten Recognition Approach using Cloud Computing and Google APIs on a mobile application","authors":"Nada Shorim, Taraggy M. Ghanim, Ashraf AbdelRaouf","doi":"10.1109/ICCES48960.2019.9068124","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068124","url":null,"abstract":"Cloud computing application for automatic recognition of Arabic handwritten is needed nowadays and of great importance especially when implemented on a mobile application. It is a type of applications that includes many challenging aspects. This paper introduces for the first time a cloud based mobile app that applies Arabic handwritten recognition for translation purposes and finding locations on Google maps. Proposing such a service for non-Arabic speakers is of great importance especially while visiting Arabic speaking countries. Our approach is the first to build a mobile app based on cloud computing that proposes a multi-phase hybrid classifier for Arabic Handwritten text recognition. Google Maps and Google Translate APIs are applied on the recognized text as part of the introduced cloud computing application. The recognition part of the proposed approach is a multi-stage classifier introduced to cope with big database and high computation complexities. The experiment applied on our approach shows better results of our Arabic handwritten recognition when compared with similar approaches.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of A Homomorphic MAC Scheme in a Transparent Hardware Appliance for Network Coding 网络编码透明硬件设备中同态MAC方案的实现
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068122
A. Kamal, H. Dahshan, A. Elbayoumy
Network coding (NC) can effectively improve data delivery in a noisy network. It allows the nodes to combine multiple packets and deliver them out. The destination can then recover it. However, pollution attacks are the most common threat to NC. As malicious nodes can inject false Ethernet packets into the network to ban the receiver from decoding the packets properly, certain authentication information must be embedded in the packets to enable the receiver to authenticate received packets. In this paper, a new scheme to apply secure Message Authentication Code (MAC) with network coding is proposed. By applying this scheme, malicious packets could be rejected in intermediate nodes without waiting until verified and dropped by the receiving node. This technique is applied with the aid of a separate hardware device with an Altera Cyclone IV FPGA chip to generate the MAC and append it to the original ethernet packets. The proposed scheme can be integrated in the existing running environments without any changes in the network configuration. The performance of the proposed scheme is evaluated to measure its throughput.
网络编码(NC)可以有效地改善噪声网络中的数据传输。它允许节点组合多个数据包并将其发送出去。然后目的地可以恢复它。然而,污染袭击是NC最常见的威胁。由于恶意节点可以向网络中注入虚假的以太网报文,从而阻止接收方对报文进行正确的解码,因此必须在报文中嵌入一定的认证信息,使接收方能够对接收到的报文进行认证。本文提出了一种将安全消息认证码(MAC)与网络编码结合使用的新方案。通过应用该方案,可以在中间节点拒绝恶意数据包,而无需等待接收节点的验证和丢弃。该技术通过使用Altera Cyclone IV FPGA芯片的单独硬件设备来生成MAC并将其附加到原始以太网数据包中。该方案可以在不改变网络配置的情况下集成到现有的运行环境中。对所提方案的性能进行了评估,以衡量其吞吐量。
{"title":"Implementation of A Homomorphic MAC Scheme in a Transparent Hardware Appliance for Network Coding","authors":"A. Kamal, H. Dahshan, A. Elbayoumy","doi":"10.1109/ICCES48960.2019.9068122","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068122","url":null,"abstract":"Network coding (NC) can effectively improve data delivery in a noisy network. It allows the nodes to combine multiple packets and deliver them out. The destination can then recover it. However, pollution attacks are the most common threat to NC. As malicious nodes can inject false Ethernet packets into the network to ban the receiver from decoding the packets properly, certain authentication information must be embedded in the packets to enable the receiver to authenticate received packets. In this paper, a new scheme to apply secure Message Authentication Code (MAC) with network coding is proposed. By applying this scheme, malicious packets could be rejected in intermediate nodes without waiting until verified and dropped by the receiving node. This technique is applied with the aid of a separate hardware device with an Altera Cyclone IV FPGA chip to generate the MAC and append it to the original ethernet packets. The proposed scheme can be integrated in the existing running environments without any changes in the network configuration. The performance of the proposed scheme is evaluated to measure its throughput.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of segmentation on iris liveness detection 分割对虹膜活性检测的影响
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068147
Manar Ramzy Dronky, W. Khalifa, M. Roushdy
Applying iris recognition systems in many sensitive security areas highlights the importance of developing liveness detection methods. These methods read the users physiological signs of life to verify if the iris pattern acquired for identification is fake or real. This paper explores the results of BSIF for solving the problem of iris liveness detection to combat presentation attacks. Four public datasets representing printed, plastic, synthetic and contact lens attacks were used for method evaluation in both scenarios segmented and unsegmented eye images. The results have showed that BSIF can efficiently detect plastic and synthetic attacks without segmentation with correct classification rate of 100%. In addition, unsegmented eye images achieved better results in detecting print attack on the tested datasets. While, segmentation is still required in the most challenging attack which is by contact lens.
虹膜识别系统在许多敏感安全领域的应用凸显了开发活体检测方法的重要性。这些方法读取用户的生理体征,以验证用于身份识别的虹膜图案是假的还是真的。本文探讨了基于BSIF的虹膜活体检测对抗呈现攻击的结果。四个公共数据集分别代表印刷、塑料、合成和隐形眼镜攻击,用于对分割和未分割的眼睛图像进行方法评估。结果表明,BSIF可以有效地检测不需要分割的塑性攻击和合成攻击,分类正确率达到100%。此外,未分割的眼睛图像在检测打印攻击方面取得了更好的效果。然而,分割仍然需要在最具挑战性的攻击,这是由隐形眼镜。
{"title":"Impact of segmentation on iris liveness detection","authors":"Manar Ramzy Dronky, W. Khalifa, M. Roushdy","doi":"10.1109/ICCES48960.2019.9068147","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068147","url":null,"abstract":"Applying iris recognition systems in many sensitive security areas highlights the importance of developing liveness detection methods. These methods read the users physiological signs of life to verify if the iris pattern acquired for identification is fake or real. This paper explores the results of BSIF for solving the problem of iris liveness detection to combat presentation attacks. Four public datasets representing printed, plastic, synthetic and contact lens attacks were used for method evaluation in both scenarios segmented and unsegmented eye images. The results have showed that BSIF can efficiently detect plastic and synthetic attacks without segmentation with correct classification rate of 100%. In addition, unsegmented eye images achieved better results in detecting print attack on the tested datasets. While, segmentation is still required in the most challenging attack which is by contact lens.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware-Assisted Virtualization for Heterogeneous Automotive Applications 异构汽车应用的硬件辅助虚拟化
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068143
Mohamed Mounir, Mohamed Abdelsalam, M. Safar, A. Salem
Today's car manufacturers are racing in deploying new innovative functionalities in modern cars like human-machine interface (HMI) technologies, cloud-based services, vehicle ad-hoc networks (V ANET) and autonomous driving. Such new technologies increase the complexity of vehicle's E/E architecture and adds new requirements on automotive software systems. This can specially be seen in cockpit domain units like Advanced Driver Assistance Systems (ADAS), Infotainment Head Units (IHU) and Telematics (TEM). The software applications of such units now exhibit large variations in requirements in terms of safety, security and connectivity as they are involved in both in-Vehicle network communication and cellular vehicle communication (V2X). In addition to that, Original Equipment Manufacturers (OEMs) are heading towards consolidating multiple units into single high computing platform. Although this simplifies the networking model of the vehicle, it adds more challenges on the architecture of automotive software systems. This paper focuses on utilizing hardware-assisted virtualization techniques to allow consolidating these heterogeneous applications on the same hardware. The performance of the proposed approach is evaluated to proof meeting the requirements of such applications.
如今的汽车制造商正在竞相在现代汽车中部署新的创新功能,如人机界面(HMI)技术、基于云的服务、车辆自组织网络(vanet)和自动驾驶。这些新技术增加了车辆E/E架构的复杂性,并对汽车软件系统提出了新的要求。这一点在高级驾驶辅助系统(ADAS)、信息娱乐头部单元(IHU)和远程信息处理(TEM)等驾驶舱领域单元中尤为明显。这些单元的软件应用现在在安全性、安全性和连接性方面表现出很大的变化,因为它们涉及车载网络通信和蜂窝车辆通信(V2X)。除此之外,原始设备制造商(oem)正朝着将多个单元整合到单个高计算平台的方向发展。虽然这简化了车辆的联网模型,但也给汽车软件系统的架构带来了更多的挑战。本文着重于利用硬件辅助的虚拟化技术,以便在同一硬件上整合这些异构应用程序。对所提出的方法的性能进行了评估,以证明满足此类应用的要求。
{"title":"Hardware-Assisted Virtualization for Heterogeneous Automotive Applications","authors":"Mohamed Mounir, Mohamed Abdelsalam, M. Safar, A. Salem","doi":"10.1109/ICCES48960.2019.9068143","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068143","url":null,"abstract":"Today's car manufacturers are racing in deploying new innovative functionalities in modern cars like human-machine interface (HMI) technologies, cloud-based services, vehicle ad-hoc networks (V ANET) and autonomous driving. Such new technologies increase the complexity of vehicle's E/E architecture and adds new requirements on automotive software systems. This can specially be seen in cockpit domain units like Advanced Driver Assistance Systems (ADAS), Infotainment Head Units (IHU) and Telematics (TEM). The software applications of such units now exhibit large variations in requirements in terms of safety, security and connectivity as they are involved in both in-Vehicle network communication and cellular vehicle communication (V2X). In addition to that, Original Equipment Manufacturers (OEMs) are heading towards consolidating multiple units into single high computing platform. Although this simplifies the networking model of the vehicle, it adds more challenges on the architecture of automotive software systems. This paper focuses on utilizing hardware-assisted virtualization techniques to allow consolidating these heterogeneous applications on the same hardware. The performance of the proposed approach is evaluated to proof meeting the requirements of such applications.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical and Time Series Analysis of Accelerometer Signals for Human Activity Recognition 用于人体活动识别的加速度计信号的统计和时间序列分析
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068140
W. Gomaa
Sensor-based human activity recognition HAR has become increasingly more important in our daily lives for a number of reasons. Advances in the sensing capabilities of personal devices have seen unprecedented growth over the past decade. HAR systems have many applications especially in health monitoring, intelligent environments, and smart spaces. Wearable sensors are particularly suited in these areas. This is due to the fact that they have small size, their cost has been steadily decreasing, and they are currently embedded in almost all commodity mobile devices such as smart phones, smart watches, sensory gloves, hand straps, and shoes. In this paper we focus on analyzing sensory accelerometer data collected from wearable devices. And in particular, we study activities of daily living (ADL) which are the activities ordinary people have the ability for doing on a daily basis like eating, moving, individual hygiene, and dressing. To the best of our knowledge most HAR systems are based on supervised machine learning techniques and algorithms, In this paper we widens the scope of techniques that can be used for the automatic analysis of human activities and provide a valuation of the relative effectiveness and efficiency of a potentially myriad pool of techniques. Specifically, we apply two approaches. The first approach is time-aware treating the incoming data in its natural form as a sequential temporal sequence of measurements. The techniques we used are based on time series analysis. The other approach is time-neglectful. It is based on using statistical methods based on goodness-of-fit tests. Our comparative assessment shows that the latter approach has some potential in classification accuracy, though needs further investigation. The time-aware approach gives much better results, though the computational resources required can be prohibitive, so also needs further investigation from that perspective.
基于传感器的人类活动识别HAR在我们的日常生活中变得越来越重要,原因有很多。在过去十年中,个人设备的传感能力取得了前所未有的发展。HAR系统有许多应用,特别是在健康监测、智能环境和智能空间方面。可穿戴传感器特别适合这些领域。这是因为它们体积小,成本一直在稳步下降,目前它们几乎被嵌入到所有的商品移动设备中,如智能手机、智能手表、传感手套、手带和鞋子。在本文中,我们重点分析从可穿戴设备收集的传感加速度计数据。特别是,我们研究日常生活活动(ADL),即普通人在日常生活中有能力进行的活动,如进食、移动、个人卫生和穿衣。据我们所知,大多数HAR系统都是基于监督机器学习技术和算法的。在本文中,我们扩大了可用于人类活动自动分析的技术范围,并提供了对潜在无数技术池的相对有效性和效率的评估。具体来说,我们采用了两种方法。第一种方法是时间感知的,将输入的数据以其自然形式处理为连续的测量时间序列。我们使用的技术是基于时间序列分析。另一种方法是忽略时间的。它基于使用基于拟合优度检验的统计方法。我们的比较评估表明,后一种方法在分类精度上有一定的潜力,但需要进一步的研究。时间感知的方法提供了更好的结果,尽管所需的计算资源可能令人望而却步,因此还需要从这个角度进一步研究。
{"title":"Statistical and Time Series Analysis of Accelerometer Signals for Human Activity Recognition","authors":"W. Gomaa","doi":"10.1109/ICCES48960.2019.9068140","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068140","url":null,"abstract":"Sensor-based human activity recognition HAR has become increasingly more important in our daily lives for a number of reasons. Advances in the sensing capabilities of personal devices have seen unprecedented growth over the past decade. HAR systems have many applications especially in health monitoring, intelligent environments, and smart spaces. Wearable sensors are particularly suited in these areas. This is due to the fact that they have small size, their cost has been steadily decreasing, and they are currently embedded in almost all commodity mobile devices such as smart phones, smart watches, sensory gloves, hand straps, and shoes. In this paper we focus on analyzing sensory accelerometer data collected from wearable devices. And in particular, we study activities of daily living (ADL) which are the activities ordinary people have the ability for doing on a daily basis like eating, moving, individual hygiene, and dressing. To the best of our knowledge most HAR systems are based on supervised machine learning techniques and algorithms, In this paper we widens the scope of techniques that can be used for the automatic analysis of human activities and provide a valuation of the relative effectiveness and efficiency of a potentially myriad pool of techniques. Specifically, we apply two approaches. The first approach is time-aware treating the incoming data in its natural form as a sequential temporal sequence of measurements. The techniques we used are based on time series analysis. The other approach is time-neglectful. It is based on using statistical methods based on goodness-of-fit tests. Our comparative assessment shows that the latter approach has some potential in classification accuracy, though needs further investigation. The time-aware approach gives much better results, though the computational resources required can be prohibitive, so also needs further investigation from that perspective.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Computer Aided Detection System for Breast Cancer in the MammogramsBased on Particle Swarm Optimization Algorithm 基于粒子群优化算法的乳腺x线影像中乳腺癌计算机辅助检测系统
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068111
Nesma El-Sokkary, A. Arafa, Ahmed H. Asad, H. Hefny
the majority cancer mortality among women is due to breast cancer over the world wide. Recent researches have shown the effectiveness of x-ray mammography in early detection of breast cancer. Unfortunately, the present systems for early detection are expensive and needs extremely complex algorithms. The crucial challenge in designing a computer-aided detection (CAD) systems for breast cancer are the segmentation phase, which requires highly complex computation. Hence, this paper proposes a CAD system to be utilized for breast cancer detection in mammographic datasets. The segmentation step is performed by a Particle Swarm Optimization Algorithm (PSO). Statistical, textural and shape feature are calculated over the segmented region. A non linear support vector machine (SVM) is exploited in the next phase in order to analyze the extracted features and classify the mammograms into normal, benign or malignant. For the sack of evaluating the performance, the experiment is performed on Mini-MIAS database. The obtained accuracy rates based on 10-folds cross validation are 85.4% for classifying normal from abnormal, 89.5% for classifying malignant from benign. The experiment shows that the classification accuracy is 81% when classifying normal, malignant or benign. The result compromises with recent researches concurs that the proposed algorithm compromises between the achieved accuracy to complexity cost.
在世界范围内,妇女因癌症死亡的主要原因是乳腺癌。最近的研究表明,x射线乳房x线摄影在早期发现乳腺癌方面是有效的。不幸的是,目前用于早期检测的系统是昂贵的,并且需要极其复杂的算法。设计乳腺癌计算机辅助检测(CAD)系统的关键挑战是分割阶段,这需要高度复杂的计算。因此,本文提出了一种用于乳腺x线摄影数据集中乳腺癌检测的CAD系统。分割步骤由粒子群优化算法(PSO)完成。在分割的区域上计算统计、纹理和形状特征。下一阶段将利用非线性支持向量机(SVM)对提取的特征进行分析,并将乳房x光片分为正常、良性或恶性。为了评估性能,在Mini-MIAS数据库上进行了实验。10倍交叉验证的正确率为正常与异常的85.4%,恶性与良性的89.5%。实验表明,对正常、恶性、良性的分类准确率为81%。结果与近期研究结果一致,提出的算法在实现精度和复杂度代价之间折衷。
{"title":"A Computer Aided Detection System for Breast Cancer in the MammogramsBased on Particle Swarm Optimization Algorithm","authors":"Nesma El-Sokkary, A. Arafa, Ahmed H. Asad, H. Hefny","doi":"10.1109/ICCES48960.2019.9068111","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068111","url":null,"abstract":"the majority cancer mortality among women is due to breast cancer over the world wide. Recent researches have shown the effectiveness of x-ray mammography in early detection of breast cancer. Unfortunately, the present systems for early detection are expensive and needs extremely complex algorithms. The crucial challenge in designing a computer-aided detection (CAD) systems for breast cancer are the segmentation phase, which requires highly complex computation. Hence, this paper proposes a CAD system to be utilized for breast cancer detection in mammographic datasets. The segmentation step is performed by a Particle Swarm Optimization Algorithm (PSO). Statistical, textural and shape feature are calculated over the segmented region. A non linear support vector machine (SVM) is exploited in the next phase in order to analyze the extracted features and classify the mammograms into normal, benign or malignant. For the sack of evaluating the performance, the experiment is performed on Mini-MIAS database. The obtained accuracy rates based on 10-folds cross validation are 85.4% for classifying normal from abnormal, 89.5% for classifying malignant from benign. The experiment shows that the classification accuracy is 81% when classifying normal, malignant or benign. The result compromises with recent researches concurs that the proposed algorithm compromises between the achieved accuracy to complexity cost.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alzheimer's Disease Integrated Ontology (ADIO) 阿尔茨海默病集成本体(ADIO)
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068176
Nora Shoaip, S. Barakat, Mohammed M Elmogy
In the near future, the elderly will occupy nearly a quarter of the world's population. Such a percentage poses a significant challenge to face diseases related to this age, including Alzheimer's disease (AD), which is responsible for the destruction of brain cells and memory. This paper is our first step toward comprehensive research in the Alzheimer management system. It related to AD knowledge structures and semantic reasoning by using ontology. There is a necessary need to coordinate strategies that reuse existing ontology to support and enhance knowledge resources around the world. So we aim to reuse existing ontology and ensure comprehensive integration between them to improve the accuracy of reasoning. We propose Alzheimer's Disease Integrated Ontology (ADIO) that is intended to integrate two important biomedical ontologies for AD researches (i) Alzheimer's disease ontology (ADO) and (ii) AD Map Ontology (ADMO). ADO was described in OWL format and related to clinical, preclinical, experimental, and molecular mechanisms. ADMO represents the complexity of AD pathophysiology and more specific for the description of biological systems. So ADO and ADMO are relevant complements with each other, and their integration can increase the satisfaction of AD knowledge resources. As a result, HermiT 1.4.3.456 reasoner in Protégé provides checking of AD I 0 consistency, and the results of DLQuery show that ADIO is reliable and effective.
在不久的将来,老年人将占世界人口的近四分之一。这一比例对面对与这个年龄相关的疾病构成了重大挑战,包括导致脑细胞和记忆破坏的阿尔茨海默病(AD)。本文是我们对老年痴呆症管理系统进行全面研究的第一步。利用本体对AD知识结构和语义推理进行了关联。有必要协调重用现有本体的策略,以支持和增强世界各地的知识资源。因此,我们的目标是重用现有的本体,并确保它们之间的全面集成,以提高推理的准确性。我们提出了阿尔茨海默病集成本体(ADIO),旨在整合两种重要的生物医学本体(1)阿尔茨海默病本体(ADO)和(2)阿尔茨海默病地图本体(ADMO)。ADO以OWL格式描述,涉及临床、临床前、实验和分子机制。ADMO代表了AD病理生理的复杂性,对生物系统的描述更具特异性。因此,ADO与ADMO是相辅相成的,它们的整合可以提高AD知识资源的满意度。因此,protesamuise中的HermiT 1.4.4.456推理器提供了ADI 0一致性的检查,DLQuery的结果表明ADIO是可靠有效的。
{"title":"Alzheimer's Disease Integrated Ontology (ADIO)","authors":"Nora Shoaip, S. Barakat, Mohammed M Elmogy","doi":"10.1109/ICCES48960.2019.9068176","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068176","url":null,"abstract":"In the near future, the elderly will occupy nearly a quarter of the world's population. Such a percentage poses a significant challenge to face diseases related to this age, including Alzheimer's disease (AD), which is responsible for the destruction of brain cells and memory. This paper is our first step toward comprehensive research in the Alzheimer management system. It related to AD knowledge structures and semantic reasoning by using ontology. There is a necessary need to coordinate strategies that reuse existing ontology to support and enhance knowledge resources around the world. So we aim to reuse existing ontology and ensure comprehensive integration between them to improve the accuracy of reasoning. We propose Alzheimer's Disease Integrated Ontology (ADIO) that is intended to integrate two important biomedical ontologies for AD researches (i) Alzheimer's disease ontology (ADO) and (ii) AD Map Ontology (ADMO). ADO was described in OWL format and related to clinical, preclinical, experimental, and molecular mechanisms. ADMO represents the complexity of AD pathophysiology and more specific for the description of biological systems. So ADO and ADMO are relevant complements with each other, and their integration can increase the satisfaction of AD knowledge resources. As a result, HermiT 1.4.3.456 reasoner in Protégé provides checking of AD I 0 consistency, and the results of DLQuery show that ADIO is reliable and effective.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improvement the Performing of Spectrum Distinguishing in Cognitive Radio using MIMO-Alamouti Scheme 利用MIMO-Alamouti方案改进认知无线电频谱识别性能
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068107
Mohamed Ismail Ibrahim, Dina M. Ellaithy
This paper exploits the efficient performing of the Multiple Input Multiple Output (MIMO)-Alamouti scheme for spectrum sensing in cognitive radio (CR). Consequently, enhancement in the overall performance and the detection probability by using the MIMO-Alamouti scheme is achieved. Moreover, at low signal-to-noise ratio (SNR), the cooperative spectrum distinguishing algorithm among the different spectrum distinguishing techniques is employed to raise the probability of detection and also solving the hidden node problem. Matlab software is used to simulate the detection probability versus SNR for different schemes. Up to 50% enhancement in detection probability (Pd) as compared with the conventional technique under signal to noise ratio (SNR) equals −15 dB and false alarm probability (Pf) equals 0.1. As compared with the common spectrum sensing approach in case of the majority rule, at least 10% advance in the probability of detection at false alarm probability equals 0.1 under SNR equals −10 dB and the number of secondary user (SU) equals 5.
本文研究了多输入多输出(MIMO)-Alamouti方案在认知无线电(CR)频谱感知中的高效执行。因此,使用MIMO-Alamouti方案可以提高整体性能和检测概率。此外,在低信噪比下,采用不同频谱识别技术之间的协同频谱识别算法,提高了检测概率,也解决了隐节点问题。利用Matlab软件对不同方案的检测概率与信噪比进行了仿真。在信噪比(SNR)为−15 dB,虚警概率(Pf)为0.1的情况下,检测概率(Pd)比传统技术提高50%。在信噪比为−10 dB、辅助用户数量为5时,在虚警概率为0.1的情况下,与采用多数原则的普通频谱感知方法相比,检测概率至少提高10%。
{"title":"Improvement the Performing of Spectrum Distinguishing in Cognitive Radio using MIMO-Alamouti Scheme","authors":"Mohamed Ismail Ibrahim, Dina M. Ellaithy","doi":"10.1109/ICCES48960.2019.9068107","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068107","url":null,"abstract":"This paper exploits the efficient performing of the Multiple Input Multiple Output (MIMO)-Alamouti scheme for spectrum sensing in cognitive radio (CR). Consequently, enhancement in the overall performance and the detection probability by using the MIMO-Alamouti scheme is achieved. Moreover, at low signal-to-noise ratio (SNR), the cooperative spectrum distinguishing algorithm among the different spectrum distinguishing techniques is employed to raise the probability of detection and also solving the hidden node problem. Matlab software is used to simulate the detection probability versus SNR for different schemes. Up to 50% enhancement in detection probability (Pd) as compared with the conventional technique under signal to noise ratio (SNR) equals −15 dB and false alarm probability (Pf) equals 0.1. As compared with the common spectrum sensing approach in case of the majority rule, at least 10% advance in the probability of detection at false alarm probability equals 0.1 under SNR equals −10 dB and the number of secondary user (SU) equals 5.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 14th International Conference on Computer Engineering and Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1