首页 > 最新文献

2019 14th International Conference on Computer Engineering and Systems (ICCES)最新文献

英文 中文
Improving Golay Code Using Hashing Technique 使用哈希技术改进Golay代码
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068153
Sara Salama, Rashed K. Salem, H. Abdel-Kader
Data are the representation of our world and our life. Data are increasing continuously, they come from different sources such as sensors, maps, climate informatics, smartphones, social media and/or medical data domains. Data are represented by different forms such as image, text, video and/or digital data. These incomprehensible data need an influential technique to be clustered and analyzed. This paper presents a hashing technique for the clustering process of unclassified and disorganized data. These clustered data are useful for decision-making process. The proposed technique is based on Golay error-correction code. The main concept is reversing the original Golay error-correction scheme and building Golay Code Addresses Hash Table (GCAHT). Simulation results stated that the proposed technique achieved high performance. Beta-CV, Dunn Index, C-index and Sum Square Error are used for measurements.
数据代表着我们的世界和生活。数据不断增加,它们来自不同的来源,如传感器、地图、气候信息、智能手机、社交媒体和/或医疗数据领域。数据由不同的形式表示,如图像、文本、视频和/或数字数据。这些难以理解的数据需要一种有影响力的技术来聚类和分析。本文提出了一种用于未分类和无组织数据聚类过程的散列技术。这些聚类数据对决策过程很有用。该技术基于Golay纠错码。主要概念是逆转原始的Golay纠错方案并构建Golay代码地址哈希表(GCAHT)。仿真结果表明,该方法取得了良好的性能。测量采用β - cv、邓恩指数、c指数和和方误差。
{"title":"Improving Golay Code Using Hashing Technique","authors":"Sara Salama, Rashed K. Salem, H. Abdel-Kader","doi":"10.1109/ICCES48960.2019.9068153","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068153","url":null,"abstract":"Data are the representation of our world and our life. Data are increasing continuously, they come from different sources such as sensors, maps, climate informatics, smartphones, social media and/or medical data domains. Data are represented by different forms such as image, text, video and/or digital data. These incomprehensible data need an influential technique to be clustered and analyzed. This paper presents a hashing technique for the clustering process of unclassified and disorganized data. These clustered data are useful for decision-making process. The proposed technique is based on Golay error-correction code. The main concept is reversing the original Golay error-correction scheme and building Golay Code Addresses Hash Table (GCAHT). Simulation results stated that the proposed technique achieved high performance. Beta-CV, Dunn Index, C-index and Sum Square Error are used for measurements.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swarm Intelligence Optimization for Feature Selection of Biomolecules 生物分子特征选择的群体智能优化
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068178
Walaa Alkady, Walaa K. Gad, K. Bahnasy
The biological activity of molecules is usually measured in assays to establish the level of inhibition of signal transduction or metabolic pathways. Drug discovery involves the use of Quantitative Structure Activity Relationship (QSAR) to identify chemical structures that could have good inhibitory effects on specific targets and have low toxicity. QSAR has very complicated 3D structure. Therefore, the flower-based optimization model (FBOM) for molecules is proposed to solve the curse of dimensionality problems. Four performance measures: accuracy, precision, sensitivity and specificity are used to evaluate the proposed model. Molecules activity is predicted using support vector machine (SVM), Naive Bayesian (NB), K-Nearest Neighbor (KNN), Decision Tree (DT) and Neural Network (NN) Classifiers. The results of the proposed model are promising. The proposed model reduces the number of features to 8 features out of 1666 features. Moreover, the average classification accuracy reaches to 95%.
分子的生物活性通常在测定中测量,以确定信号转导或代谢途径的抑制水平。药物发现涉及使用定量构效关系(QSAR)来识别对特定靶点具有良好抑制作用且毒性低的化学结构。QSAR具有非常复杂的三维结构。为此,提出了基于花的分子优化模型(FBOM)来解决维数问题。四个性能指标:准确性,精密度,灵敏度和特异性被用来评估所提出的模型。分子活性预测使用支持向量机(SVM)、朴素贝叶斯(NB)、k近邻(KNN)、决策树(DT)和神经网络(NN)分类器。该模型的结果是有希望的。该模型将1666个特征中的特征数量减少到8个。平均分类准确率达到95%以上。
{"title":"Swarm Intelligence Optimization for Feature Selection of Biomolecules","authors":"Walaa Alkady, Walaa K. Gad, K. Bahnasy","doi":"10.1109/ICCES48960.2019.9068178","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068178","url":null,"abstract":"The biological activity of molecules is usually measured in assays to establish the level of inhibition of signal transduction or metabolic pathways. Drug discovery involves the use of Quantitative Structure Activity Relationship (QSAR) to identify chemical structures that could have good inhibitory effects on specific targets and have low toxicity. QSAR has very complicated 3D structure. Therefore, the flower-based optimization model (FBOM) for molecules is proposed to solve the curse of dimensionality problems. Four performance measures: accuracy, precision, sensitivity and specificity are used to evaluate the proposed model. Molecules activity is predicted using support vector machine (SVM), Naive Bayesian (NB), K-Nearest Neighbor (KNN), Decision Tree (DT) and Neural Network (NN) Classifiers. The results of the proposed model are promising. The proposed model reduces the number of features to 8 features out of 1666 features. Moreover, the average classification accuracy reaches to 95%.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementing Arabic Handwritten Recognition Approach using Cloud Computing and Google APIs on a mobile application 在移动应用程序上使用云计算和Google api实现阿拉伯手写识别方法
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068124
Nada Shorim, Taraggy M. Ghanim, Ashraf AbdelRaouf
Cloud computing application for automatic recognition of Arabic handwritten is needed nowadays and of great importance especially when implemented on a mobile application. It is a type of applications that includes many challenging aspects. This paper introduces for the first time a cloud based mobile app that applies Arabic handwritten recognition for translation purposes and finding locations on Google maps. Proposing such a service for non-Arabic speakers is of great importance especially while visiting Arabic speaking countries. Our approach is the first to build a mobile app based on cloud computing that proposes a multi-phase hybrid classifier for Arabic Handwritten text recognition. Google Maps and Google Translate APIs are applied on the recognized text as part of the introduced cloud computing application. The recognition part of the proposed approach is a multi-stage classifier introduced to cope with big database and high computation complexities. The experiment applied on our approach shows better results of our Arabic handwritten recognition when compared with similar approaches.
现在需要云计算应用程序来自动识别阿拉伯手写体,特别是在移动应用程序上实现时,这一点非常重要。这是一种应用程序类型,包含许多具有挑战性的方面。本文首次介绍了一个基于云的移动应用程序,该应用程序将阿拉伯语手写识别用于翻译目的和在谷歌地图上查找位置。为非阿拉伯语使用者提供这样的服务是非常重要的,特别是在访问阿拉伯语国家时。我们的方法是第一个建立一个基于云计算的移动应用程序,提出了一个用于阿拉伯手写文本识别的多阶段混合分类器。作为引入的云计算应用程序的一部分,将Google Maps和Google Translate api应用于识别的文本。该方法的识别部分是为了应对大数据库和高计算复杂度而引入的多阶段分类器。实验结果表明,与同类方法相比,我们的方法具有更好的识别效果。
{"title":"Implementing Arabic Handwritten Recognition Approach using Cloud Computing and Google APIs on a mobile application","authors":"Nada Shorim, Taraggy M. Ghanim, Ashraf AbdelRaouf","doi":"10.1109/ICCES48960.2019.9068124","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068124","url":null,"abstract":"Cloud computing application for automatic recognition of Arabic handwritten is needed nowadays and of great importance especially when implemented on a mobile application. It is a type of applications that includes many challenging aspects. This paper introduces for the first time a cloud based mobile app that applies Arabic handwritten recognition for translation purposes and finding locations on Google maps. Proposing such a service for non-Arabic speakers is of great importance especially while visiting Arabic speaking countries. Our approach is the first to build a mobile app based on cloud computing that proposes a multi-phase hybrid classifier for Arabic Handwritten text recognition. Google Maps and Google Translate APIs are applied on the recognized text as part of the introduced cloud computing application. The recognition part of the proposed approach is a multi-stage classifier introduced to cope with big database and high computation complexities. The experiment applied on our approach shows better results of our Arabic handwritten recognition when compared with similar approaches.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of A Homomorphic MAC Scheme in a Transparent Hardware Appliance for Network Coding 网络编码透明硬件设备中同态MAC方案的实现
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068122
A. Kamal, H. Dahshan, A. Elbayoumy
Network coding (NC) can effectively improve data delivery in a noisy network. It allows the nodes to combine multiple packets and deliver them out. The destination can then recover it. However, pollution attacks are the most common threat to NC. As malicious nodes can inject false Ethernet packets into the network to ban the receiver from decoding the packets properly, certain authentication information must be embedded in the packets to enable the receiver to authenticate received packets. In this paper, a new scheme to apply secure Message Authentication Code (MAC) with network coding is proposed. By applying this scheme, malicious packets could be rejected in intermediate nodes without waiting until verified and dropped by the receiving node. This technique is applied with the aid of a separate hardware device with an Altera Cyclone IV FPGA chip to generate the MAC and append it to the original ethernet packets. The proposed scheme can be integrated in the existing running environments without any changes in the network configuration. The performance of the proposed scheme is evaluated to measure its throughput.
网络编码(NC)可以有效地改善噪声网络中的数据传输。它允许节点组合多个数据包并将其发送出去。然后目的地可以恢复它。然而,污染袭击是NC最常见的威胁。由于恶意节点可以向网络中注入虚假的以太网报文,从而阻止接收方对报文进行正确的解码,因此必须在报文中嵌入一定的认证信息,使接收方能够对接收到的报文进行认证。本文提出了一种将安全消息认证码(MAC)与网络编码结合使用的新方案。通过应用该方案,可以在中间节点拒绝恶意数据包,而无需等待接收节点的验证和丢弃。该技术通过使用Altera Cyclone IV FPGA芯片的单独硬件设备来生成MAC并将其附加到原始以太网数据包中。该方案可以在不改变网络配置的情况下集成到现有的运行环境中。对所提方案的性能进行了评估,以衡量其吞吐量。
{"title":"Implementation of A Homomorphic MAC Scheme in a Transparent Hardware Appliance for Network Coding","authors":"A. Kamal, H. Dahshan, A. Elbayoumy","doi":"10.1109/ICCES48960.2019.9068122","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068122","url":null,"abstract":"Network coding (NC) can effectively improve data delivery in a noisy network. It allows the nodes to combine multiple packets and deliver them out. The destination can then recover it. However, pollution attacks are the most common threat to NC. As malicious nodes can inject false Ethernet packets into the network to ban the receiver from decoding the packets properly, certain authentication information must be embedded in the packets to enable the receiver to authenticate received packets. In this paper, a new scheme to apply secure Message Authentication Code (MAC) with network coding is proposed. By applying this scheme, malicious packets could be rejected in intermediate nodes without waiting until verified and dropped by the receiving node. This technique is applied with the aid of a separate hardware device with an Altera Cyclone IV FPGA chip to generate the MAC and append it to the original ethernet packets. The proposed scheme can be integrated in the existing running environments without any changes in the network configuration. The performance of the proposed scheme is evaluated to measure its throughput.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of segmentation on iris liveness detection 分割对虹膜活性检测的影响
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068147
Manar Ramzy Dronky, W. Khalifa, M. Roushdy
Applying iris recognition systems in many sensitive security areas highlights the importance of developing liveness detection methods. These methods read the users physiological signs of life to verify if the iris pattern acquired for identification is fake or real. This paper explores the results of BSIF for solving the problem of iris liveness detection to combat presentation attacks. Four public datasets representing printed, plastic, synthetic and contact lens attacks were used for method evaluation in both scenarios segmented and unsegmented eye images. The results have showed that BSIF can efficiently detect plastic and synthetic attacks without segmentation with correct classification rate of 100%. In addition, unsegmented eye images achieved better results in detecting print attack on the tested datasets. While, segmentation is still required in the most challenging attack which is by contact lens.
虹膜识别系统在许多敏感安全领域的应用凸显了开发活体检测方法的重要性。这些方法读取用户的生理体征,以验证用于身份识别的虹膜图案是假的还是真的。本文探讨了基于BSIF的虹膜活体检测对抗呈现攻击的结果。四个公共数据集分别代表印刷、塑料、合成和隐形眼镜攻击,用于对分割和未分割的眼睛图像进行方法评估。结果表明,BSIF可以有效地检测不需要分割的塑性攻击和合成攻击,分类正确率达到100%。此外,未分割的眼睛图像在检测打印攻击方面取得了更好的效果。然而,分割仍然需要在最具挑战性的攻击,这是由隐形眼镜。
{"title":"Impact of segmentation on iris liveness detection","authors":"Manar Ramzy Dronky, W. Khalifa, M. Roushdy","doi":"10.1109/ICCES48960.2019.9068147","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068147","url":null,"abstract":"Applying iris recognition systems in many sensitive security areas highlights the importance of developing liveness detection methods. These methods read the users physiological signs of life to verify if the iris pattern acquired for identification is fake or real. This paper explores the results of BSIF for solving the problem of iris liveness detection to combat presentation attacks. Four public datasets representing printed, plastic, synthetic and contact lens attacks were used for method evaluation in both scenarios segmented and unsegmented eye images. The results have showed that BSIF can efficiently detect plastic and synthetic attacks without segmentation with correct classification rate of 100%. In addition, unsegmented eye images achieved better results in detecting print attack on the tested datasets. While, segmentation is still required in the most challenging attack which is by contact lens.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware-Assisted Virtualization for Heterogeneous Automotive Applications 异构汽车应用的硬件辅助虚拟化
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068143
Mohamed Mounir, Mohamed Abdelsalam, M. Safar, A. Salem
Today's car manufacturers are racing in deploying new innovative functionalities in modern cars like human-machine interface (HMI) technologies, cloud-based services, vehicle ad-hoc networks (V ANET) and autonomous driving. Such new technologies increase the complexity of vehicle's E/E architecture and adds new requirements on automotive software systems. This can specially be seen in cockpit domain units like Advanced Driver Assistance Systems (ADAS), Infotainment Head Units (IHU) and Telematics (TEM). The software applications of such units now exhibit large variations in requirements in terms of safety, security and connectivity as they are involved in both in-Vehicle network communication and cellular vehicle communication (V2X). In addition to that, Original Equipment Manufacturers (OEMs) are heading towards consolidating multiple units into single high computing platform. Although this simplifies the networking model of the vehicle, it adds more challenges on the architecture of automotive software systems. This paper focuses on utilizing hardware-assisted virtualization techniques to allow consolidating these heterogeneous applications on the same hardware. The performance of the proposed approach is evaluated to proof meeting the requirements of such applications.
如今的汽车制造商正在竞相在现代汽车中部署新的创新功能,如人机界面(HMI)技术、基于云的服务、车辆自组织网络(vanet)和自动驾驶。这些新技术增加了车辆E/E架构的复杂性,并对汽车软件系统提出了新的要求。这一点在高级驾驶辅助系统(ADAS)、信息娱乐头部单元(IHU)和远程信息处理(TEM)等驾驶舱领域单元中尤为明显。这些单元的软件应用现在在安全性、安全性和连接性方面表现出很大的变化,因为它们涉及车载网络通信和蜂窝车辆通信(V2X)。除此之外,原始设备制造商(oem)正朝着将多个单元整合到单个高计算平台的方向发展。虽然这简化了车辆的联网模型,但也给汽车软件系统的架构带来了更多的挑战。本文着重于利用硬件辅助的虚拟化技术,以便在同一硬件上整合这些异构应用程序。对所提出的方法的性能进行了评估,以证明满足此类应用的要求。
{"title":"Hardware-Assisted Virtualization for Heterogeneous Automotive Applications","authors":"Mohamed Mounir, Mohamed Abdelsalam, M. Safar, A. Salem","doi":"10.1109/ICCES48960.2019.9068143","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068143","url":null,"abstract":"Today's car manufacturers are racing in deploying new innovative functionalities in modern cars like human-machine interface (HMI) technologies, cloud-based services, vehicle ad-hoc networks (V ANET) and autonomous driving. Such new technologies increase the complexity of vehicle's E/E architecture and adds new requirements on automotive software systems. This can specially be seen in cockpit domain units like Advanced Driver Assistance Systems (ADAS), Infotainment Head Units (IHU) and Telematics (TEM). The software applications of such units now exhibit large variations in requirements in terms of safety, security and connectivity as they are involved in both in-Vehicle network communication and cellular vehicle communication (V2X). In addition to that, Original Equipment Manufacturers (OEMs) are heading towards consolidating multiple units into single high computing platform. Although this simplifies the networking model of the vehicle, it adds more challenges on the architecture of automotive software systems. This paper focuses on utilizing hardware-assisted virtualization techniques to allow consolidating these heterogeneous applications on the same hardware. The performance of the proposed approach is evaluated to proof meeting the requirements of such applications.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic detection for students behaviors in a group presentation 自动检测学生在小组演示中的行为
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068128
A. Fekry, Georgios A. Dafoulas, Manal A. Ismail
This paper suggests a model for automatic detection of student behavior to be used in student presentations. The proposed approach is based on the combined use of computer vision libraries and machine learning algorithms to help and support in student assessment using video content. This paper is a part of a research study focusing on investigating and analysing, human behaviours and finding relations between human behaviours and their personal modalities using pattern recognition techniques. For the purpose of this study a group of specific behaviours expressed by students during group presentations in higher education level, are selected. The study proceeds with the detection of the occurrences of those behaviours and comparative analysis of the model's suggested behavioural patterns against those observed through the manual analysis of observations. Both approaches are based on the same set of video files.
本文提出了一种用于学生演讲的学生行为自动检测模型。所提出的方法是基于计算机视觉库和机器学习算法的结合使用,以帮助和支持使用视频内容的学生评估。本文是一项利用模式识别技术调查和分析人类行为并发现人类行为与其个人模式之间关系的研究的一部分。为了本研究的目的,我们选择了一组高等教育学生在小组演讲中表现出来的具体行为。研究的进行是检测这些行为的发生,并将模型所建议的行为模式与通过人工观察分析所观察到的行为模式进行比较分析。这两种方法都基于同一组视频文件。
{"title":"Automatic detection for students behaviors in a group presentation","authors":"A. Fekry, Georgios A. Dafoulas, Manal A. Ismail","doi":"10.1109/ICCES48960.2019.9068128","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068128","url":null,"abstract":"This paper suggests a model for automatic detection of student behavior to be used in student presentations. The proposed approach is based on the combined use of computer vision libraries and machine learning algorithms to help and support in student assessment using video content. This paper is a part of a research study focusing on investigating and analysing, human behaviours and finding relations between human behaviours and their personal modalities using pattern recognition techniques. For the purpose of this study a group of specific behaviours expressed by students during group presentations in higher education level, are selected. The study proceeds with the detection of the occurrences of those behaviours and comparative analysis of the model's suggested behavioural patterns against those observed through the manual analysis of observations. Both approaches are based on the same set of video files.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131884719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Statistical and Time Series Analysis of Accelerometer Signals for Human Activity Recognition 用于人体活动识别的加速度计信号的统计和时间序列分析
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068140
W. Gomaa
Sensor-based human activity recognition HAR has become increasingly more important in our daily lives for a number of reasons. Advances in the sensing capabilities of personal devices have seen unprecedented growth over the past decade. HAR systems have many applications especially in health monitoring, intelligent environments, and smart spaces. Wearable sensors are particularly suited in these areas. This is due to the fact that they have small size, their cost has been steadily decreasing, and they are currently embedded in almost all commodity mobile devices such as smart phones, smart watches, sensory gloves, hand straps, and shoes. In this paper we focus on analyzing sensory accelerometer data collected from wearable devices. And in particular, we study activities of daily living (ADL) which are the activities ordinary people have the ability for doing on a daily basis like eating, moving, individual hygiene, and dressing. To the best of our knowledge most HAR systems are based on supervised machine learning techniques and algorithms, In this paper we widens the scope of techniques that can be used for the automatic analysis of human activities and provide a valuation of the relative effectiveness and efficiency of a potentially myriad pool of techniques. Specifically, we apply two approaches. The first approach is time-aware treating the incoming data in its natural form as a sequential temporal sequence of measurements. The techniques we used are based on time series analysis. The other approach is time-neglectful. It is based on using statistical methods based on goodness-of-fit tests. Our comparative assessment shows that the latter approach has some potential in classification accuracy, though needs further investigation. The time-aware approach gives much better results, though the computational resources required can be prohibitive, so also needs further investigation from that perspective.
基于传感器的人类活动识别HAR在我们的日常生活中变得越来越重要,原因有很多。在过去十年中,个人设备的传感能力取得了前所未有的发展。HAR系统有许多应用,特别是在健康监测、智能环境和智能空间方面。可穿戴传感器特别适合这些领域。这是因为它们体积小,成本一直在稳步下降,目前它们几乎被嵌入到所有的商品移动设备中,如智能手机、智能手表、传感手套、手带和鞋子。在本文中,我们重点分析从可穿戴设备收集的传感加速度计数据。特别是,我们研究日常生活活动(ADL),即普通人在日常生活中有能力进行的活动,如进食、移动、个人卫生和穿衣。据我们所知,大多数HAR系统都是基于监督机器学习技术和算法的。在本文中,我们扩大了可用于人类活动自动分析的技术范围,并提供了对潜在无数技术池的相对有效性和效率的评估。具体来说,我们采用了两种方法。第一种方法是时间感知的,将输入的数据以其自然形式处理为连续的测量时间序列。我们使用的技术是基于时间序列分析。另一种方法是忽略时间的。它基于使用基于拟合优度检验的统计方法。我们的比较评估表明,后一种方法在分类精度上有一定的潜力,但需要进一步的研究。时间感知的方法提供了更好的结果,尽管所需的计算资源可能令人望而却步,因此还需要从这个角度进一步研究。
{"title":"Statistical and Time Series Analysis of Accelerometer Signals for Human Activity Recognition","authors":"W. Gomaa","doi":"10.1109/ICCES48960.2019.9068140","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068140","url":null,"abstract":"Sensor-based human activity recognition HAR has become increasingly more important in our daily lives for a number of reasons. Advances in the sensing capabilities of personal devices have seen unprecedented growth over the past decade. HAR systems have many applications especially in health monitoring, intelligent environments, and smart spaces. Wearable sensors are particularly suited in these areas. This is due to the fact that they have small size, their cost has been steadily decreasing, and they are currently embedded in almost all commodity mobile devices such as smart phones, smart watches, sensory gloves, hand straps, and shoes. In this paper we focus on analyzing sensory accelerometer data collected from wearable devices. And in particular, we study activities of daily living (ADL) which are the activities ordinary people have the ability for doing on a daily basis like eating, moving, individual hygiene, and dressing. To the best of our knowledge most HAR systems are based on supervised machine learning techniques and algorithms, In this paper we widens the scope of techniques that can be used for the automatic analysis of human activities and provide a valuation of the relative effectiveness and efficiency of a potentially myriad pool of techniques. Specifically, we apply two approaches. The first approach is time-aware treating the incoming data in its natural form as a sequential temporal sequence of measurements. The techniques we used are based on time series analysis. The other approach is time-neglectful. It is based on using statistical methods based on goodness-of-fit tests. Our comparative assessment shows that the latter approach has some potential in classification accuracy, though needs further investigation. The time-aware approach gives much better results, though the computational resources required can be prohibitive, so also needs further investigation from that perspective.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DNA Computing for RGB image Encryption with Genetic Algorithm 遗传算法用于RGB图像加密的DNA计算
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068136
H. Hussien
A combination of DNA computing and a genetic algorithm is announced for RGB image encryption. The model is strong based on the scrambling technique of DNA computing operations using the crossover and mutation process and establishing a dynamic key based on a genetic algorithm, including a set of parameters such as population size, number of generation and mutation probability. First, the decoding of the image GA selected DNA sequence encoding process and the random key for the three R G B channels were followed by the DNA addition process. The decoded DNA added to the matrix of the output. Finally, conduct the XOR-mod procedure on the decoded matrix and the random number of the genetic algorithm to obtain the encrypted image. The paper includes countless experimental steps to confirm that the model has a high degree of safety and strength against different types of attacks.
提出了一种结合DNA计算和遗传算法的RGB图像加密方法。该模型基于DNA计算操作的置乱技术,利用交叉和突变过程,建立了基于遗传算法的动态密钥,包括种群大小、代数和突变概率等参数。首先,对图像进行GA解码,选择DNA序列编码过程和三个rgb通道的随机密钥,然后进行DNA加法处理。解码后的DNA加入到输出的矩阵中。最后,对解码后的矩阵和遗传算法的随机数进行异或模运算,得到加密后的图像。本文包含了无数的实验步骤,以证实该模型具有很高的安全性和强度,可以抵御不同类型的攻击。
{"title":"DNA Computing for RGB image Encryption with Genetic Algorithm","authors":"H. Hussien","doi":"10.1109/ICCES48960.2019.9068136","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068136","url":null,"abstract":"A combination of DNA computing and a genetic algorithm is announced for RGB image encryption. The model is strong based on the scrambling technique of DNA computing operations using the crossover and mutation process and establishing a dynamic key based on a genetic algorithm, including a set of parameters such as population size, number of generation and mutation probability. First, the decoding of the image GA selected DNA sequence encoding process and the random key for the three R G B channels were followed by the DNA addition process. The decoded DNA added to the matrix of the output. Finally, conduct the XOR-mod procedure on the decoded matrix and the random number of the genetic algorithm to obtain the encrypted image. The paper includes countless experimental steps to confirm that the model has a high degree of safety and strength against different types of attacks.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133863101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robotic Façade Cleaning System for High-Rise Building 高层建筑机器人表面清洁系统
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068112
Hussein M. Fawzy, H. El Sherif, A. Khamis
There is a considerable increase in the number of skyscrapers in the world due modern development of construction technology. Current maintenance work for high-rise buildings mostly uses conventional ropes and scaffolds that pose a high risk of accidents and exhibit poor performance and efficiency. There is a demand to develop an automated cleaning system that can reduce accidents and improve the maintenance efficiency of the conventional high-rise building façade maintenance systems. In this paper, we demonstrate an automated façade cleaning system that can reduce accidents and decrease labor costs. We propose a new technique of cleaning mechanism for façade cleaning in high-rise buildings; the system consists of two Robots working for the cleaning process; the lifting robot or the Roof Top Robot (RTR) and the Cleaning Robot (CR). The RTR is designed to lift the CR vertically on the façade in the upper and lower directions; the horizontal direction is also performed by the end of each vertical motion. The CR acts as the main cleaning unit, which utilizes different cleaning modules that is required for the cleaning quality. The performance of the proposed cleaning system is evaluated experimentally; however, additional study should be necessary for more complicated facades architect designs.
由于现代建筑技术的发展,世界上摩天大楼的数量有了相当大的增加。目前高层建筑的维护工作大多采用传统的绳索和脚手架,事故风险高,性能和效率不高。在传统高层建筑立面维护系统中,需要开发一种能够减少事故、提高维护效率的自动化清洁系统。在本文中,我们展示了一个自动化的表面清洗系统,可以减少事故和降低人工成本。提出了一种高层建筑表面清洁机理的新技术;该系统由两个机器人组成,负责清洗过程;升降机器人或屋顶机器人(RTR)和清洁机器人(CR)。RTR设计为在面板上上下方向垂直提升CR;水平方向也由每个垂直运动的末端执行。CR作为主要的清洗单元,它采用不同的清洗模块,以满足清洗质量的要求。实验对该清洗系统的性能进行了评价;然而,对于更复杂的立面建筑师设计,应该进行额外的研究。
{"title":"Robotic Façade Cleaning System for High-Rise Building","authors":"Hussein M. Fawzy, H. El Sherif, A. Khamis","doi":"10.1109/ICCES48960.2019.9068112","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068112","url":null,"abstract":"There is a considerable increase in the number of skyscrapers in the world due modern development of construction technology. Current maintenance work for high-rise buildings mostly uses conventional ropes and scaffolds that pose a high risk of accidents and exhibit poor performance and efficiency. There is a demand to develop an automated cleaning system that can reduce accidents and improve the maintenance efficiency of the conventional high-rise building façade maintenance systems. In this paper, we demonstrate an automated façade cleaning system that can reduce accidents and decrease labor costs. We propose a new technique of cleaning mechanism for façade cleaning in high-rise buildings; the system consists of two Robots working for the cleaning process; the lifting robot or the Roof Top Robot (RTR) and the Cleaning Robot (CR). The RTR is designed to lift the CR vertically on the façade in the upper and lower directions; the horizontal direction is also performed by the end of each vertical motion. The CR acts as the main cleaning unit, which utilizes different cleaning modules that is required for the cleaning quality. The performance of the proposed cleaning system is evaluated experimentally; however, additional study should be necessary for more complicated facades architect designs.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134552169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 14th International Conference on Computer Engineering and Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1