首页 > 最新文献

2017 8th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
A framework for measurability of security 安全性可度量性的框架
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921989
Seraj Fayyad, Josef Noll
Having an effective security level for Embedded System (ES), helps a reliable and stable operation of this system. In order to identify, if the current security level for a given ES is effective or not, we need a proactive evaluation for this security level. The evaluation of the security level for ESs is not straightforward process, things like the heterogeneity among the components of ES complicate this process. One of the productive approaches, which overcame the complexity of evaluation for Security, Privacy and Dependability (SPD) is the Multi Metrics (MM). As most of SPD evaluation approaches, the MM approach bases on the experts knowledge for the basic evaluation. Regardless of its advantages, experts evaluation has some drawbacks, which foster the need for less experts-dependent evaluation. In this paper, we propose a framework for security measurability as a part of security, privacy and dependability evaluation. The security evaluation based on Multi Metric (MM) approach as being an effective approach for evaluations, thus, we call it MM framework. The art of evaluation investigated within MM framework, based also on systematic storing and retrieving of experts knowledge. Using MM framework, the administrator of the ES could evaluate and enhance the S-level of their system, without being an expert in security.
为嵌入式系统(ES)设置有效的安全级别,有助于系统可靠、稳定地运行。为了确定给定ES的当前安全级别是否有效,我们需要对该安全级别进行主动评估。对ESs的安全级别进行评估并不是一个简单的过程,像ES组件之间的异质性这样的事情使这个过程变得复杂。多度量(MM)是克服安全、隐私和可靠性(SPD)评估复杂性的有效方法之一。与大多数社发力评价方法一样,MM方法以专家知识为基础进行基本评价。专家评价虽然有其优点,但也存在一些不足,这就需要减少对专家的依赖。在本文中,我们提出了一个安全可度量性框架,作为安全、隐私和可靠性评估的一部分。基于多度量(MM)方法的安全评价是一种有效的评价方法,因此我们称之为MM框架。在MM框架下,基于专家知识的系统存储和检索,研究了评价的艺术。使用MM框架,系统管理员可以评估和提高系统的s级,而不必是安全专家。
{"title":"A framework for measurability of security","authors":"Seraj Fayyad, Josef Noll","doi":"10.1109/IACS.2017.7921989","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921989","url":null,"abstract":"Having an effective security level for Embedded System (ES), helps a reliable and stable operation of this system. In order to identify, if the current security level for a given ES is effective or not, we need a proactive evaluation for this security level. The evaluation of the security level for ESs is not straightforward process, things like the heterogeneity among the components of ES complicate this process. One of the productive approaches, which overcame the complexity of evaluation for Security, Privacy and Dependability (SPD) is the Multi Metrics (MM). As most of SPD evaluation approaches, the MM approach bases on the experts knowledge for the basic evaluation. Regardless of its advantages, experts evaluation has some drawbacks, which foster the need for less experts-dependent evaluation. In this paper, we propose a framework for security measurability as a part of security, privacy and dependability evaluation. The security evaluation based on Multi Metric (MM) approach as being an effective approach for evaluations, thus, we call it MM framework. The art of evaluation investigated within MM framework, based also on systematic storing and retrieving of experts knowledge. Using MM framework, the administrator of the ES could evaluate and enhance the S-level of their system, without being an expert in security.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using metadata in optimizing the design and development of enterprise information systems 利用元数据优化企业信息系统的设计和开发
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921969
Jalal Kiswani, Muhanna A. Muhanna, Abdullah Qusef
Enterprise information systems are being widely and extensively used in many business domains. In fact, some of these domains cannot survive in operations without depending heavily on such systems. Although several research studies have been performed that explored the importance of enterprise information systems, only a few have been focusing on an effective and efficient end-to-end method to design and develop such systems. This paper presents a proposed approach of using a metadata model to design and implement APIs that can be utilized and reused as separate libraries to build enterprise information systems more effectively and efficiently than the traditional approaches. Primarily results of validating the proposed approach show promising potentials in reducing the manual development time and effort by an average of 64%.
企业信息系统在许多业务领域得到了广泛的应用。事实上,如果不严重依赖此类系统,其中一些领域就无法在操作中生存。虽然已经进行了几项研究,探讨了企业信息系统的重要性,但只有少数研究集中于设计和开发这种系统的有效和高效的端到端方法。本文提出了一种使用元数据模型来设计和实现api的建议方法,这些api可以作为单独的库来使用和重用,从而比传统方法更有效和高效地构建企业信息系统。验证所提出的方法的主要结果显示,在平均减少64%的人工开发时间和工作量方面有很大的潜力。
{"title":"Using metadata in optimizing the design and development of enterprise information systems","authors":"Jalal Kiswani, Muhanna A. Muhanna, Abdullah Qusef","doi":"10.1109/IACS.2017.7921969","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921969","url":null,"abstract":"Enterprise information systems are being widely and extensively used in many business domains. In fact, some of these domains cannot survive in operations without depending heavily on such systems. Although several research studies have been performed that explored the importance of enterprise information systems, only a few have been focusing on an effective and efficient end-to-end method to design and develop such systems. This paper presents a proposed approach of using a metadata model to design and implement APIs that can be utilized and reused as separate libraries to build enterprise information systems more effectively and efficiently than the traditional approaches. Primarily results of validating the proposed approach show promising potentials in reducing the manual development time and effort by an average of 64%.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of Harmonic and Arithmetic-Geometric Mean inequality for performance analysis of relay networks 谐波不等式与算术几何平均不等式在中继网络性能分析中的比较
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921982
M. Khalil, S. Berber, K. Sowerby
A new method of analyzing the Asymptotic Bit Error Rate (ABER) performance of Bidirectional Amplify-and-Forward Multiple Relay (BAF-MR) networks is presented in this paper. The analytical expression of the average Signal-to-Noise Ratio (SNR) is derived using both of Arithmetic-Geometric Mean inequality (AGM) and Harmonic Mean (HM). The ABER results obtained from the AGM and HM are then compared to determine the more accurate ABER. All the analytical expressions are verified using simulation results.
提出了一种分析双向放大转发多中继(BAF-MR)网络渐近误码率(ABER)性能的新方法。利用算术-几何平均不等式(AGM)和谐波平均(HM)推导了平均信噪比(SNR)的解析表达式。然后比较AGM和HM获得的ABER结果,以确定更准确的ABER。用仿真结果验证了所有解析表达式的正确性。
{"title":"Comparison of Harmonic and Arithmetic-Geometric Mean inequality for performance analysis of relay networks","authors":"M. Khalil, S. Berber, K. Sowerby","doi":"10.1109/IACS.2017.7921982","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921982","url":null,"abstract":"A new method of analyzing the Asymptotic Bit Error Rate (ABER) performance of Bidirectional Amplify-and-Forward Multiple Relay (BAF-MR) networks is presented in this paper. The analytical expression of the average Signal-to-Noise Ratio (SNR) is derived using both of Arithmetic-Geometric Mean inequality (AGM) and Harmonic Mean (HM). The ABER results obtained from the AGM and HM are then compared to determine the more accurate ABER. All the analytical expressions are verified using simulation results.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for clustering LTE devices for implementing group D2D communication and multicast capability 一种用于实现组D2D通信和多播能力的LTE设备集群的框架
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921974
Salam Doumiati, H. Artail, K. Kabalan
In fluctuating mobile environments where operators have to confront the increasing demands of their subscribers, insufficient spectrum poses capacity limitations. This work studies the gain that cooperative multicast transmission provides when used to boost the data rate in Device-to-Device (D2D) communication, enabling data sharing among users. A multicast network combines the benefits of both a fixed cellular infrastructure and the flexibility of an ad hoc network. However, a challenging issue is the need to cluster devices in a way that yields good channel quality between the clusterhead and each one of the cluster members. In this paper, we propose a D2D clustering scheme that achieves the above goal and works within the confines of the LTE standard. Simulations conducted using Matlab show how direct communication within a group of devices, cluster, can improve the performance of a conventional cellular system.
在波动的移动环境中,运营商必须面对用户日益增长的需求,频谱不足会造成容量限制。本工作研究了协作多播传输在设备到设备(D2D)通信中用于提高数据速率时提供的增益,从而实现用户之间的数据共享。多播网络结合了固定蜂窝基础设施的优点和自组织网络的灵活性。然而,一个具有挑战性的问题是,需要以一种能够在集群头和每个集群成员之间产生良好通道质量的方式对设备进行集群。在本文中,我们提出了一种D2D聚类方案,实现了上述目标,并在LTE标准的范围内工作。使用Matlab进行的仿真显示了一组设备(集群)内的直接通信如何提高传统蜂窝系统的性能。
{"title":"A framework for clustering LTE devices for implementing group D2D communication and multicast capability","authors":"Salam Doumiati, H. Artail, K. Kabalan","doi":"10.1109/IACS.2017.7921974","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921974","url":null,"abstract":"In fluctuating mobile environments where operators have to confront the increasing demands of their subscribers, insufficient spectrum poses capacity limitations. This work studies the gain that cooperative multicast transmission provides when used to boost the data rate in Device-to-Device (D2D) communication, enabling data sharing among users. A multicast network combines the benefits of both a fixed cellular infrastructure and the flexibility of an ad hoc network. However, a challenging issue is the need to cluster devices in a way that yields good channel quality between the clusterhead and each one of the cluster members. In this paper, we propose a D2D clustering scheme that achieves the above goal and works within the confines of the LTE standard. Simulations conducted using Matlab show how direct communication within a group of devices, cluster, can improve the performance of a conventional cellular system.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129090421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Real-time intruder surveillance using low-cost remote wireless sensors 使用低成本远程无线传感器的实时入侵者监控
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921970
Muhannad Quwaider
Intruder Detection is needed in order to monitor sensitive passages or gateways. These passages are usually existing in airports, police stations, government buildings, courts or even in special laboratories, like nuclear or chemical laboratories. For security or safety purposes, nobody is usually allowed to walk through these passages without permission and during the working hours. Video streaming monitoring systems are usually expensive in terms of data communication and data analysis, which may need an extra human subject analysis. In addition, to the scene limit of the camera visible area. In this paper we present real-time intruder detection mechanism using remote wireless sensor networks. Pair of wireless sensors are deployed in the monitored passage. In order to detect the motion of intruders, the proposed mechanism adopts the measured Received Signal Strength Indicator (RSSI) of the Radio Frequency (RF) signal between the deployed sensors. The results show that the RSSI of the received signal is reduced significantly when there are intruders in the passage and the amount of reduction depends on the number of intruders.
为了监控敏感通道或网关,需要进行入侵者检测。这些通道通常存在于机场,警察局,政府大楼,法院甚至特殊实验室,如核或化学实验室。出于安全考虑,在没有许可的情况下,在工作时间内,通常不允许任何人通过这些通道。视频流监控系统在数据通信和数据分析方面通常是昂贵的,这可能需要额外的人工主体分析。另外,对场景限定的摄像机可见区域。本文提出了一种基于远程无线传感器网络的实时入侵检测机制。在监控通道中部署一对无线传感器。为了检测入侵者的运动,该机制采用部署传感器之间射频(RF)信号的测量接收信号强度指示器(RSSI)。结果表明,当通道中存在入侵者时,接收信号的RSSI明显降低,并且降低的幅度与入侵者的数量有关。
{"title":"Real-time intruder surveillance using low-cost remote wireless sensors","authors":"Muhannad Quwaider","doi":"10.1109/IACS.2017.7921970","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921970","url":null,"abstract":"Intruder Detection is needed in order to monitor sensitive passages or gateways. These passages are usually existing in airports, police stations, government buildings, courts or even in special laboratories, like nuclear or chemical laboratories. For security or safety purposes, nobody is usually allowed to walk through these passages without permission and during the working hours. Video streaming monitoring systems are usually expensive in terms of data communication and data analysis, which may need an extra human subject analysis. In addition, to the scene limit of the camera visible area. In this paper we present real-time intruder detection mechanism using remote wireless sensor networks. Pair of wireless sensors are deployed in the monitored passage. In order to detect the motion of intruders, the proposed mechanism adopts the measured Received Signal Strength Indicator (RSSI) of the Radio Frequency (RF) signal between the deployed sensors. The results show that the RSSI of the received signal is reduced significantly when there are intruders in the passage and the amount of reduction depends on the number of intruders.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
IMHT: Improved MHT-LEACH protocol for wireless sensor networks IMHT:改进的无线传感器网络MHT-LEACH协议
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921979
Emad Alnawafa, I. Marghescu
Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is considered as one of the most important protocols that are frequently used in the Wireless Sensor Network (WSN). Many protocols were developed to modify and improve the LEACH protocol. The multi-hop technique (MHT-LEACH) is one of these protocols, which appeared to improve the performance of the LEACH protocol. In this paper, an improved multi-hope technique (IMHT-LEACH) is proposed. Instead of distributing all the Cluster Heads (CHs) into two levels as in the MHT-LEACH, the IMHT-LEACH distributes all the CHs into a number of levels. It suggests a new technique to route the data to the Base Station (BS) through the levels. Simulation results indicate that the IMHT-LEACH improves the lifetime, stability and throughput of the WSN comparing with the conventional LEACH and the MHT-LEACH protocols.
低能量自适应聚类层次(LEACH)协议是无线传感器网络(WSN)中常用的重要协议之一。开发了许多协议来修改和改进LEACH协议。多跳技术(multi-hop technique, MHT-LEACH)就是其中的一种,它的出现提高了LEACH协议的性能。本文提出了一种改进的多希望技术(IMHT-LEACH)。与MHT-LEACH中将所有簇头(CHs)分布到两个级别不同,IMHT-LEACH将所有CHs分布到多个级别。它提出了一种通过关卡将数据路由到基站(BS)的新技术。仿真结果表明,与传统LEACH协议和MHT-LEACH协议相比,IMHT-LEACH协议提高了无线传感器网络的寿命、稳定性和吞吐量。
{"title":"IMHT: Improved MHT-LEACH protocol for wireless sensor networks","authors":"Emad Alnawafa, I. Marghescu","doi":"10.1109/IACS.2017.7921979","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921979","url":null,"abstract":"Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is considered as one of the most important protocols that are frequently used in the Wireless Sensor Network (WSN). Many protocols were developed to modify and improve the LEACH protocol. The multi-hop technique (MHT-LEACH) is one of these protocols, which appeared to improve the performance of the LEACH protocol. In this paper, an improved multi-hope technique (IMHT-LEACH) is proposed. Instead of distributing all the Cluster Heads (CHs) into two levels as in the MHT-LEACH, the IMHT-LEACH distributes all the CHs into a number of levels. It suggests a new technique to route the data to the Base Station (BS) through the levels. Simulation results indicate that the IMHT-LEACH improves the lifetime, stability and throughput of the WSN comparing with the conventional LEACH and the MHT-LEACH protocols.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116079044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Towards a model-based approach for developing and QA of online business processes 为在线业务流程的开发和质量保证采用基于模型的方法
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921952
Mohammad Alhaj, Kavya Mallur, B. Stepien, L. Peyton
Business Process Management (BPM) is used to move existing paper-based business processes into online in order to improve the quality of provided services and reduce the operational costs. A typical approach of BPM focuses on implementing the online business process and neglect validating the improvement of quality the new process in terms of defined business goals. It is desirable to detect and anticipate any deficiencies in meeting business goals at the early stages of business process development where corrective actions can be more easily made. In this paper, we propose a model-based approach for developing and providing quality assurance of online business processes. The approach measures the performance of online business processes as they are being developed. It also provides a repeatable, systematic, cost-efficient approach to quality assurance using a testing workbench with a suite of testing tools. The approach prototype is evaluated using a hospital case study developed in collaboration with a hospital in Canada to develop an online business process for cancer patients' assessment.
业务流程管理(BPM)用于将现有的基于纸张的业务流程迁移到在线,以提高所提供服务的质量并降低操作成本。BPM的典型方法侧重于实现在线业务流程,而忽略了根据已定义的业务目标验证新流程的质量改进。在业务流程开发的早期阶段,检测和预测在满足业务目标方面的任何缺陷是可取的,因为在早期阶段可以更容易地采取纠正措施。在本文中,我们提出了一种基于模型的方法来开发和提供在线业务流程的质量保证。该方法测量正在开发的在线业务流程的性能。它还提供了一种可重复的、系统化的、具有成本效益的方法来使用带有一套测试工具的测试工作台进行质量保证。采用与加拿大一家医院合作开发的医院案例研究对方法原型进行了评估,以开发用于癌症患者评估的在线业务流程。
{"title":"Towards a model-based approach for developing and QA of online business processes","authors":"Mohammad Alhaj, Kavya Mallur, B. Stepien, L. Peyton","doi":"10.1109/IACS.2017.7921952","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921952","url":null,"abstract":"Business Process Management (BPM) is used to move existing paper-based business processes into online in order to improve the quality of provided services and reduce the operational costs. A typical approach of BPM focuses on implementing the online business process and neglect validating the improvement of quality the new process in terms of defined business goals. It is desirable to detect and anticipate any deficiencies in meeting business goals at the early stages of business process development where corrective actions can be more easily made. In this paper, we propose a model-based approach for developing and providing quality assurance of online business processes. The approach measures the performance of online business processes as they are being developed. It also provides a repeatable, systematic, cost-efficient approach to quality assurance using a testing workbench with a suite of testing tools. The approach prototype is evaluated using a hospital case study developed in collaboration with a hospital in Canada to develop an online business process for cancer patients' assessment.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"35 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Early diagnosis of breast cancer using contrast limited adaptive histogram equalization (CLAHE) and Morphology methods 利用对比有限自适应直方图均衡化(CLAHE)和形态学方法早期诊断乳腺癌
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921957
Nabin Kharel, A. Alsadoon, P. Prasad, A. Elchouemi
The main aim of this paper is to enhance using hybrid solution for early diagnosis of breast cancer using mammogram images. For the CAD system for any image processing system follows mainly four steps that is image pre processing, segmentation, features extraction and classification and evaluation. For this research purpose follows the same structure using best possible methods in each stage found in literature review and proposed solution. From the experiment hybrid image enhancement method using CLAHE and Morphology method helps to enhance image for further computation in CAD system to early diagnosis of breast cancer using mammogram images while maintaining processing time as previous best solution. From the study depict that the purposed solution can help to enhance mammogram images for the further processing for segmentation, feature extraction and classification. However, further testing and implementation of proper classification method needed for before clinical use.
本文的主要目的是提高使用混合溶液的早期诊断乳腺癌使用乳房x光图像。对于任何图像处理系统来说,CAD系统主要遵循图像预处理、图像分割、特征提取和分类评价四个步骤。为了本研究的目的,遵循相同的结构,在文献综述和提出的解决方案中发现的每个阶段使用最佳方法。从实验来看,clhe和形态学混合图像增强方法在保持处理时间不变的前提下,有助于增强图像以供CAD系统进一步计算,从而利用乳房x线照片进行乳腺癌早期诊断。研究表明,该解决方案有助于增强乳房x光图像的进一步分割、特征提取和分类处理。然而,临床应用前需要进一步的测试和实施正确的分类方法。
{"title":"Early diagnosis of breast cancer using contrast limited adaptive histogram equalization (CLAHE) and Morphology methods","authors":"Nabin Kharel, A. Alsadoon, P. Prasad, A. Elchouemi","doi":"10.1109/IACS.2017.7921957","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921957","url":null,"abstract":"The main aim of this paper is to enhance using hybrid solution for early diagnosis of breast cancer using mammogram images. For the CAD system for any image processing system follows mainly four steps that is image pre processing, segmentation, features extraction and classification and evaluation. For this research purpose follows the same structure using best possible methods in each stage found in literature review and proposed solution. From the experiment hybrid image enhancement method using CLAHE and Morphology method helps to enhance image for further computation in CAD system to early diagnosis of breast cancer using mammogram images while maintaining processing time as previous best solution. From the study depict that the purposed solution can help to enhance mammogram images for the further processing for segmentation, feature extraction and classification. However, further testing and implementation of proper classification method needed for before clinical use.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123635101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Personalized information retrieval through alignment of ontologies: State of art 通过本体对齐的个性化信息检索:技术现状
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921963
Oumayma Banouar, S. Raghay
Current information systems provide transparent access to multiple, distributed, autonomous and potentially redundant data sources based on a mediation architecture. Their users may not know the sources they questioned, nor their description and content. Consequently, their queries reflect no more a need that must be satisfied but an intention that must be refined based on data sources available at the time of interrogation. The purpose of the personalization is to facilitate the expression of users' needs. It allows them to obtain relevant information by maximizing the exploitation of their preferences grouped in their respective profiles. Our work aims to extend the users queries by extending the research field using ontologies. In a mediation architecture context, founded on the couple mediator-adapter, our process must consider not only the users' profiles but also the semantic description of data sources defined by mediation requests. The mediator solves the problems associated with heterogeneity while adapters describe the available data sources. The users express their requests in terms of a global schema when the system evaluates them over multiple data sources with different structure and content. Each data source is modeled using a local ontology when the global schema is obtained via a global one. The use of an adequate process of ontology alignment will allow us to increase the recall (retrieved information) and the precision or accuracy (relevant information) of our integration system. This article is a comparative study of the existing works that attempt to establish matching and alignment between ontologies. It presents their capabilities in terms of information retrieval metrics namely: precision, recall and F-measure. It highlights then their strength and week points. In addition, it presents the massive role of machine learning techniques to insure the interoperability over large-scale ontologies.
当前的信息系统提供对基于中介体系结构的多个分布式、自治和可能冗余的数据源的透明访问。他们的用户可能不知道他们质疑的来源,也不知道他们的描述和内容。因此,他们的询问反映的不再是必须满足的需要,而是必须根据询问时可获得的数据来源加以改进的意图。个性化的目的是为了方便用户需求的表达。它允许用户通过最大限度地利用分组在各自配置文件中的偏好来获取相关信息。我们的工作旨在通过使用本体扩展研究领域来扩展用户查询。在基于一对中介适配器的中介体系结构上下文中,我们的流程不仅必须考虑用户的配置文件,还必须考虑中介请求定义的数据源的语义描述。中介解决与异构相关的问题,而适配器描述可用的数据源。当系统对具有不同结构和内容的多个数据源进行评估时,用户用全局模式来表达他们的请求。当通过全局模式获得全局模式时,使用本地本体对每个数据源进行建模。使用适当的本体对齐过程将使我们能够提高集成系统的召回率(检索信息)和精度或准确性(相关信息)。本文对现有的试图在本体之间建立匹配和对齐的作品进行了比较研究。从信息检索指标的角度来描述它们的能力,即:精确度、召回率和f度量。它突出了他们的力量和周点。此外,它还展示了机器学习技术在确保大规模本体互操作性方面的重要作用。
{"title":"Personalized information retrieval through alignment of ontologies: State of art","authors":"Oumayma Banouar, S. Raghay","doi":"10.1109/IACS.2017.7921963","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921963","url":null,"abstract":"Current information systems provide transparent access to multiple, distributed, autonomous and potentially redundant data sources based on a mediation architecture. Their users may not know the sources they questioned, nor their description and content. Consequently, their queries reflect no more a need that must be satisfied but an intention that must be refined based on data sources available at the time of interrogation. The purpose of the personalization is to facilitate the expression of users' needs. It allows them to obtain relevant information by maximizing the exploitation of their preferences grouped in their respective profiles. Our work aims to extend the users queries by extending the research field using ontologies. In a mediation architecture context, founded on the couple mediator-adapter, our process must consider not only the users' profiles but also the semantic description of data sources defined by mediation requests. The mediator solves the problems associated with heterogeneity while adapters describe the available data sources. The users express their requests in terms of a global schema when the system evaluates them over multiple data sources with different structure and content. Each data source is modeled using a local ontology when the global schema is obtained via a global one. The use of an adequate process of ontology alignment will allow us to increase the recall (retrieved information) and the precision or accuracy (relevant information) of our integration system. This article is a comparative study of the existing works that attempt to establish matching and alignment between ontologies. It presents their capabilities in terms of information retrieval metrics namely: precision, recall and F-measure. It highlights then their strength and week points. In addition, it presents the massive role of machine learning techniques to insure the interoperability over large-scale ontologies.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121940517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Victory sign biometrie for terrorists identification: Preliminary results 胜利标志生物特征识别恐怖分子:初步结果
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921968
Ahmad Hassanat, Eman Btoush, M. Abbadi, Bassam M. Al-Mahadeen, Mouhammd Al-Awadi, Khalil I. Mseidein, Amin M. Almseden, A. Tarawneh, M. B. Alhasanat, V. B. Surya Prasath, Fatimah A. Al-alem
Covering the face and all body parts, sometimes the only evidence to identify a person is their hand geometry, and not the whole hand-only two fingers (the index and the middle fingers) while showing the victory sign, as seen in many terrorists videos. This paper investigates for the first time a new way to identify persons, particularly (terrorists) from their victory sign. We have created a new database in this regard using a mobile phone camera, imaging the victory signs of 50 different persons over two sessions. Simple measurements for the fingers, in addition to the Hu Moments for the areas of the fingers were used to extract the geometric features of the shown part of the hand shown after segmentation. The experimental results using the KNN classifier with three different distance metrics were encouraging for most of the recorded persons; with about 40% to 93% total identification accuracy, depending on the features, distance metric and K used.
遮住脸部和身体的所有部位,有时唯一的识别证据是他们的手的几何形状,而不是整个手-只有两个手指(食指和中指),同时显示胜利的手势,就像在许多恐怖分子的视频中看到的那样。本文首次研究了一种从胜利标志中识别人物,特别是恐怖分子的新方法。在这方面,我们使用手机相机创建了一个新的数据库,对50个不同的人在两次会议上的胜利迹象进行成像。对手指进行简单的测量,除了对手指的面积进行胡矩提取,提取分割后所示手的显示部分的几何特征。使用三种不同距离度量的KNN分类器的实验结果对大多数被记录的人都是令人鼓舞的;总识别准确率约为40%至93%,具体取决于所使用的特征、距离度量和K。
{"title":"Victory sign biometrie for terrorists identification: Preliminary results","authors":"Ahmad Hassanat, Eman Btoush, M. Abbadi, Bassam M. Al-Mahadeen, Mouhammd Al-Awadi, Khalil I. Mseidein, Amin M. Almseden, A. Tarawneh, M. B. Alhasanat, V. B. Surya Prasath, Fatimah A. Al-alem","doi":"10.1109/IACS.2017.7921968","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921968","url":null,"abstract":"Covering the face and all body parts, sometimes the only evidence to identify a person is their hand geometry, and not the whole hand-only two fingers (the index and the middle fingers) while showing the victory sign, as seen in many terrorists videos. This paper investigates for the first time a new way to identify persons, particularly (terrorists) from their victory sign. We have created a new database in this regard using a mobile phone camera, imaging the victory signs of 50 different persons over two sessions. Simple measurements for the fingers, in addition to the Hu Moments for the areas of the fingers were used to extract the geometric features of the shown part of the hand shown after segmentation. The experimental results using the KNN classifier with three different distance metrics were encouraging for most of the recorded persons; with about 40% to 93% total identification accuracy, depending on the features, distance metric and K used.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2017 8th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1