首页 > 最新文献

Mansoura Journal for Computer and Information Sciences最新文献

英文 中文
A new strategy for mobility prediction in the PCS network 一种新的PCS网络移动预测策略
Pub Date : 2018-12-01 DOI: 10.21608/mjcis.2018.312007
Abeer M. Hekal, Ahmed I. Saleh, Magdi Zakria
Mobility prediction is one of the main challenges that faced Personal Communication Service (PCS) network. It is probable for many users to move among cells (coverage areas) during their calls. Therefore, the network needs to predict their next location in order to reserve another resource in that next cell to keep their calls going on. In this paper, a new strategy is proposed for mobility prediction named Mixed Mobility Prediction (MMP). It is composed of two predictors. The first one is named Association Rules Predictor (ARP), and the second one is called Weighted Ant Colony Predictor (WACP). In ARP the prediction is based on Association rules in data mining and detecting the time of calls. In WACP the prediction is based on Ant Colony (AC) in swarm intelligence. In addition to that, roads lead to their predicted next locations, and priority of famous places found in those locations. Finally, MMP merges the decisions of both predictors to get the final accurate decision in the absence of sufficient history for a MT. The proposed approach outperformed the compared the state-of-arts methods in terms of; Prediction Accuracy (PA), and Quality of Measure (QM).
移动性预测是个人通信服务(PCS)网络面临的主要挑战之一。许多用户在通话期间可能会在蜂窝(覆盖区域)之间移动。因此,网络需要预测他们的下一个位置,以便在下一个小区中保留另一个资源,以保持他们的呼叫继续进行。本文提出了一种新的迁移率预测策略——混合迁移率预测。它由两个预测因子组成。第一个被称为关联规则预测器(ARP),第二个被称为加权蚁群预测器(WACP)。在ARP中,预测是基于数据挖掘中的关联规则和检测调用时间。在WACP中,预测是基于群体智能中的蚁群(AC)。除此之外,道路会通向他们预测的下一个地点,以及在这些地点发现的著名地点的优先级。最后,MMP将两个预测器的决策合并在一起,在没有足够历史记录的情况下获得最终的准确决策。该方法在以下方面优于目前的方法;预测精度(PA)和测量质量(QM)。
{"title":"A new strategy for mobility prediction in the PCS network","authors":"Abeer M. Hekal, Ahmed I. Saleh, Magdi Zakria","doi":"10.21608/mjcis.2018.312007","DOIUrl":"https://doi.org/10.21608/mjcis.2018.312007","url":null,"abstract":"Mobility prediction is one of the main challenges that faced Personal Communication Service (PCS) network. It is probable for many users to move among cells (coverage areas) during their calls. Therefore, the network needs to predict their next location in order to reserve another resource in that next cell to keep their calls going on. In this paper, a new strategy is proposed for mobility prediction named Mixed Mobility Prediction (MMP). It is composed of two predictors. The first one is named Association Rules Predictor (ARP), and the second one is called Weighted Ant Colony Predictor (WACP). In ARP the prediction is based on Association rules in data mining and detecting the time of calls. In WACP the prediction is based on Ant Colony (AC) in swarm intelligence. In addition to that, roads lead to their predicted next locations, and priority of famous places found in those locations. Finally, MMP merges the decisions of both predictors to get the final accurate decision in the absence of sufficient history for a MT. The proposed approach outperformed the compared the state-of-arts methods in terms of; Prediction Accuracy (PA), and Quality of Measure (QM).","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving DNA Computing through CRISPR based Model and Visual DNA Tool 利用CRISPR模型和可视化DNA工具改进DNA计算
Pub Date : 2018-12-01 DOI: 10.21608/mjcis.2018.312010
A. M. El-Edkawy, M. El-Dosuky, T. Hamza
Since the advent of DNA computing field; there’s debate about its ability to solve hard computational problems. A way to deal with the debate is to design a computational model for DNA computing and then studying its complexity power. The main contribution of this paper is to propose a DNA computing model that presents a usage of CRISPR in DNA computing field. The model has three basic operations which are merge, CRISPR and detect. The model is argued to be robust, as the three operations are robust, and to be the minimum model for DNA computing in terms of the number of operations. The proposed model has corresponded with a model inspired from the evolution of DNA sequences called Accepting Hybrid Network of Evolutionary Processors (AHNEPs). Based on that correspondence, the proposed model can be used to solve NP problems in polynomial time and PSPACE problems in polynomial space. The model is used to solve, the NP problem, the Hamiltonian Path Problem (HPP) in linear time. The limitations of DNA computing area could be avoided within the model. Also, the study presents “Visual DNA” which is a software that can simulate biochemical operations in DNA computing. Also, the software can make analysis for DNA sequences. So this simulation software will offer a useful tool for the DNA computing implementation because it will help in the analysis of input DNA sequences and in the prediction of output DNA sequences which would be helpful to avoid errors during the experimental process.
自DNA计算领域出现以来;关于它解决复杂计算问题的能力存在争议。解决这个问题的一个方法是设计一个DNA计算的计算模型,然后研究它的复杂能力。本文的主要贡献是提出了一个DNA计算模型,展示了CRISPR在DNA计算领域的应用。该模型有合并、CRISPR和检测三种基本操作。该模型被认为是鲁棒的,因为这三个操作都是鲁棒的,并且就操作数量而言,它是DNA计算的最小模型。提出的模型与DNA序列进化的一个模型相对应,这个模型被称为进化处理器的接受混合网络(AHNEPs)。基于这种对应关系,该模型可用于求解多项式时间内的NP问题和多项式空间内的PSPACE问题。该模型用于求解线性时间的NP问题哈密顿路径问题(HPP)。该模型可以避免DNA计算面积的限制。此外,该研究还提出了一种可以模拟DNA计算中的生化操作的软件“视觉DNA”。此外,该软件还可以对DNA序列进行分析。因此,该模拟软件将为DNA计算实现提供一个有用的工具,因为它可以帮助分析输入DNA序列和预测输出DNA序列,从而有助于避免实验过程中的错误。
{"title":"Improving DNA Computing through CRISPR based Model and Visual DNA Tool","authors":"A. M. El-Edkawy, M. El-Dosuky, T. Hamza","doi":"10.21608/mjcis.2018.312010","DOIUrl":"https://doi.org/10.21608/mjcis.2018.312010","url":null,"abstract":"Since the advent of DNA computing field; there’s debate about its ability to solve hard computational problems. A way to deal with the debate is to design a computational model for DNA computing and then studying its complexity power. The main contribution of this paper is to propose a DNA computing model that presents a usage of CRISPR in DNA computing field. The model has three basic operations which are merge, CRISPR and detect. The model is argued to be robust, as the three operations are robust, and to be the minimum model for DNA computing in terms of the number of operations. The proposed model has corresponded with a model inspired from the evolution of DNA sequences called Accepting Hybrid Network of Evolutionary Processors (AHNEPs). Based on that correspondence, the proposed model can be used to solve NP problems in polynomial time and PSPACE problems in polynomial space. The model is used to solve, the NP problem, the Hamiltonian Path Problem (HPP) in linear time. The limitations of DNA computing area could be avoided within the model. Also, the study presents “Visual DNA” which is a software that can simulate biochemical operations in DNA computing. Also, the software can make analysis for DNA sequences. So this simulation software will offer a useful tool for the DNA computing implementation because it will help in the analysis of input DNA sequences and in the prediction of output DNA sequences which would be helpful to avoid errors during the experimental process.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130046421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Approach for Automatic Morphological Diacritization of Arabic Text 一种阿拉伯语文本形态自动变音符的混合方法
Pub Date : 2018-12-01 DOI: 10.21608/mjcis.2018.312008
Hatem M Noaman, Shahenda S. Sarhan, M. Rashwan
Arabic Modern texts are commonly written without diacritization, which is a critical task for other Arabic processing tasks as word sense disambiguation, automatic speech recognition, and text to speech, where word meaning or pronunciation is decided based on the diacritic signs assigned to each letter. This paper presents a novel approach for automatic Arabic text diacritization using deep encode-decode recurrent neural networks that is followed by several text correction techniques, to improve the overall system output accuracy. Experimental results of the proposed system on Wikinews test set show superior performance and are competitive with those of the-state-of-the-art diacritization methods. Namely, our method achieves morphological diacritization Word Error Rate (WER) 3.85% and Diacritic Error Rate (DER) 1.12%.
阿拉伯语现代文本通常没有变音符,这是其他阿拉伯语处理任务的关键任务,如词义消歧,自动语音识别和文本到语音,其中单词的意义或发音是根据分配给每个字母的变音符符号来决定的。本文提出了一种利用深度编解码递归神经网络实现阿拉伯文本自动变音符的新方法,并辅以几种文本校正技术,以提高系统的整体输出精度。在Wikinews测试集上的实验结果表明,该系统具有优异的性能,并可与目前最先进的变音方法相媲美。即,我们的方法实现了词形变音符错误率(WER) 3.85%和变音符错误率(DER) 1.12%。
{"title":"A Hybrid Approach for Automatic Morphological Diacritization of Arabic Text","authors":"Hatem M Noaman, Shahenda S. Sarhan, M. Rashwan","doi":"10.21608/mjcis.2018.312008","DOIUrl":"https://doi.org/10.21608/mjcis.2018.312008","url":null,"abstract":"Arabic Modern texts are commonly written without diacritization, which is a critical task for other Arabic processing tasks as word sense disambiguation, automatic speech recognition, and text to speech, where word meaning or pronunciation is decided based on the diacritic signs assigned to each letter. This paper presents a novel approach for automatic Arabic text diacritization using deep encode-decode recurrent neural networks that is followed by several text correction techniques, to improve the overall system output accuracy. Experimental results of the proposed system on Wikinews test set show superior performance and are competitive with those of the-state-of-the-art diacritization methods. Namely, our method achieves morphological diacritization Word Error Rate (WER) 3.85% and Diacritic Error Rate (DER) 1.12%.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127704032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software and Hardware Implementation of Local Intrusion Detection Strategy 本地入侵检测策略的软硬件实现
Pub Date : 2018-12-01 DOI: 10.21608/mjcis.2018.312004
I. I. Saada, R. H. Sakr, M. Rashad
A mobile ad hoc network (MANET) has many undesirable challenges, black hole (BH) is one of the most significant challenges in MANET. Many researchers have proposed researches which depend on different strategies to face this challenge. The problem is how much the ability of these strategies to detect and block BH in order to empty the network from the threats, and how much these solutions could be implemented practically to treat with threats. However, the required strategy should also maintain network performance at the same time. The idea of this research has been applied on AODV based MANET, the strategy deals with cooperative black hole by using a deceptive message with virtual address that is not in the addresses range [1]. The main interest in this paper beside proposing the new idea, is to convert this idea into strategy by providing the necessary details, in addition to implement the strategy by hardware and software models. These models have been built in order to illustrate how black hole works and how the strategy can detect and block the black hole practically in AODV based MANET. This paper presents the method in an integrated manner. In this method, the detection process starts from the previous node, not from the source node. However, this method can choose the shortest path and can deal with more than one black hole. These additions will preserve the performance of network, the hardware model has been provided with liquid crystal displays LCD put on each node. LCD is used to appear each step, and to make the system full-acknowledgment.
移动自组织网络(MANET)存在许多不良挑战,黑洞(BH)是MANET中最重要的挑战之一。许多研究人员提出了依靠不同策略来应对这一挑战的研究。问题是这些策略有多大的能力来检测和阻止BH以清空网络中的威胁,以及这些解决方案在实际中可以实现多少来处理威胁。然而,所需要的策略也应该在保持网络性能的同时。本研究的思想已应用于基于AODV的MANET,该策略通过使用不在地址范围内的虚拟地址的欺骗性消息来处理合作黑洞[1]。本文的主要兴趣除了提出新的思想外,还在于通过提供必要的细节将这一思想转化为战略,并通过硬件和软件模型实现战略。这些模型的建立是为了说明黑洞是如何工作的,以及该策略如何在基于AODV的MANET中实际地探测和阻止黑洞。本文综合介绍了该方法。在这种方法中,检测过程从前一个节点开始,而不是从源节点开始。然而,该方法可以选择最短路径,并且可以处理多个黑洞。这些增加将保持网络的性能,硬件模型已提供液晶显示器放在每个节点上。采用液晶显示器显示各步骤,并使系统充分确认。
{"title":"Software and Hardware Implementation of Local Intrusion Detection Strategy","authors":"I. I. Saada, R. H. Sakr, M. Rashad","doi":"10.21608/mjcis.2018.312004","DOIUrl":"https://doi.org/10.21608/mjcis.2018.312004","url":null,"abstract":"A mobile ad hoc network (MANET) has many undesirable challenges, black hole (BH) is one of the most significant challenges in MANET. Many researchers have proposed researches which depend on different strategies to face this challenge. The problem is how much the ability of these strategies to detect and block BH in order to empty the network from the threats, and how much these solutions could be implemented practically to treat with threats. However, the required strategy should also maintain network performance at the same time. The idea of this research has been applied on AODV based MANET, the strategy deals with cooperative black hole by using a deceptive message with virtual address that is not in the addresses range [1]. The main interest in this paper beside proposing the new idea, is to convert this idea into strategy by providing the necessary details, in addition to implement the strategy by hardware and software models. These models have been built in order to illustrate how black hole works and how the strategy can detect and block the black hole practically in AODV based MANET. This paper presents the method in an integrated manner. In this method, the detection process starts from the previous node, not from the source node. However, this method can choose the shortest path and can deal with more than one black hole. These additions will preserve the performance of network, the hardware model has been provided with liquid crystal displays LCD put on each node. LCD is used to appear each step, and to make the system full-acknowledgment.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132293138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Security of the Internet of Medical Things (IOMT) 增强医疗物联网(IOMT)安全性
Pub Date : 2018-12-01 DOI: 10.21608/mjcis.2018.312002
I. S. Farahat, A. Tolba, Waleed Eladrosy
Healthcare is the major problem that faces the individuals around the world especially oldsters and disables. The development of the object to object technology (Internet of things (IoT)) is improved until it can be used to overcome the healthcare problem. The progress of the IoT extends to help the science in remote healthcare and predict the disease of the patients before it happened. But with these improvements the patient data become in danger because the patient data are sent from patient side over the internet to the physician so it becomes available for any attackers to attack the data and modified or stolen it in its way to the doctor or to the patient. So the healthcare field is having a security and privacy issue. This paper introduces system that can solve this problem by changing the data before it leaves the patient. So the transfer data is secured enough to protect the patients' data. The proposed system using a three technique one for encoding data to change the shape of data and compressed it and one technique for encrypt encoded data with AES but with rotated key and last one for make an authentication mechanism to protect data from output access and permit any person that have username and password credential to access patient's data. The authentication mechanism is built at the website with a private IP the proposed system is developed with low cost hardware to minimize the cost of the product with high efficiency.
医疗保健是全世界个人,特别是老年人和残疾人面临的主要问题。对象对对象技术(物联网(IoT))的发展得到了改进,直到它可以用于克服医疗保健问题。物联网的进步延伸到帮助远程医疗科学,并在患者发病前预测疾病。但随着这些改进,患者数据变得危险起来,因为患者数据是通过互联网从患者端发送给医生的,因此任何攻击者都可以攻击这些数据,并在医生或患者那里修改或窃取这些数据。因此,医疗保健领域存在安全和隐私问题。本文介绍了一个系统,可以通过在数据离开患者之前更改数据来解决这一问题。因此,传输数据的安全性足以保护患者的数据。该系统采用三种技术:一种是对数据进行编码,改变数据的形状并对其进行压缩;一种是对编码后的数据进行AES加密,但使用旋转密钥;最后一种是建立身份验证机制,以保护数据不被输出访问,并允许任何拥有用户名和密码凭证的人访问患者数据。该认证机制建立在具有私有IP的网站上,该系统采用低成本的硬件开发,以最大限度地降低产品成本,提高效率。
{"title":"Enhanced Security of the Internet of Medical Things (IOMT)","authors":"I. S. Farahat, A. Tolba, Waleed Eladrosy","doi":"10.21608/mjcis.2018.312002","DOIUrl":"https://doi.org/10.21608/mjcis.2018.312002","url":null,"abstract":"Healthcare is the major problem that faces the individuals around the world especially oldsters and disables. The development of the object to object technology (Internet of things (IoT)) is improved until it can be used to overcome the healthcare problem. The progress of the IoT extends to help the science in remote healthcare and predict the disease of the patients before it happened. But with these improvements the patient data become in danger because the patient data are sent from patient side over the internet to the physician so it becomes available for any attackers to attack the data and modified or stolen it in its way to the doctor or to the patient. So the healthcare field is having a security and privacy issue. This paper introduces system that can solve this problem by changing the data before it leaves the patient. So the transfer data is secured enough to protect the patients' data. The proposed system using a three technique one for encoding data to change the shape of data and compressed it and one technique for encrypt encoded data with AES but with rotated key and last one for make an authentication mechanism to protect data from output access and permit any person that have username and password credential to access patient's data. The authentication mechanism is built at the website with a private IP the proposed system is developed with low cost hardware to minimize the cost of the product with high efficiency.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Real-Time Shadow Rendering Technique in Outdoor Augmented Reality 户外增强现实中增强的实时阴影渲染技术
Pub Date : 2018-12-01 DOI: 10.21608/mjcis.2018.312006
Naira Elazab, N. Mekky, A. Atwan, Hassan H. Soliman
In this paper, the point is to give steady shadows amongst virtual and genuine objects for outdoor scene without requiring any earlier data. The technique gives a real-time framework for recreating reliable virtual shadows in an outdoor scene. The proposed procedure firstly handles the shadow areas because of genuine things; secondly ensures the pixels in genuine shadow are prevented from more rendering and finally rendering shadows because of virtual things. The main research contribution, in addition to shadow refinement, is handling the overlap between real and virtual shadows. Consequently those shadows for virtual things are depend on the shadows of real things. The experimental results create the impression that the recommended system has basically upgraded that authenticity about steady outside augmented reality rendering, in this manner taking care of the issue of practical augmented reality frameworks. Results show a comparison of shadow rendering between proposed technique and other techniques in different resolutions.
在本文中,重点是在不需要任何早期数据的情况下,为室外场景提供虚拟和真实物体之间的稳定阴影。该技术为在室外场景中重建可靠的虚拟阴影提供了一个实时框架。该方法首先处理了真实事物产生的阴影区域;其次确保真实阴影中的像素不会因为虚拟的东西而被渲染更多的阴影。除了阴影细化之外,主要的研究贡献是处理真实阴影和虚拟阴影之间的重叠。因此,虚拟事物的阴影依赖于真实事物的阴影。实验结果表明,所推荐的系统基本提升了增强现实外稳定渲染的真实性,从而解决了实际增强现实框架的问题。结果表明,在不同分辨率下,本文提出的方法与其他方法的阴影绘制效果进行了比较。
{"title":"An Enhanced Real-Time Shadow Rendering Technique in Outdoor Augmented Reality","authors":"Naira Elazab, N. Mekky, A. Atwan, Hassan H. Soliman","doi":"10.21608/mjcis.2018.312006","DOIUrl":"https://doi.org/10.21608/mjcis.2018.312006","url":null,"abstract":"In this paper, the point is to give steady shadows amongst virtual and genuine objects for outdoor scene without requiring any earlier data. The technique gives a real-time framework for recreating reliable virtual shadows in an outdoor scene. The proposed procedure firstly handles the shadow areas because of genuine things; secondly ensures the pixels in genuine shadow are prevented from more rendering and finally rendering shadows because of virtual things. The main research contribution, in addition to shadow refinement, is handling the overlap between real and virtual shadows. Consequently those shadows for virtual things are depend on the shadows of real things. The experimental results create the impression that the recommended system has basically upgraded that authenticity about steady outside augmented reality rendering, in this manner taking care of the issue of practical augmented reality frameworks. Results show a comparison of shadow rendering between proposed technique and other techniques in different resolutions.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114070260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wavelet-based Video Enhancement Using Contrast Limited Adaptive Histogram Equalization 基于小波的对比度限制自适应直方图均衡化视频增强
Pub Date : 2018-06-01 DOI: 10.21608/mjcis.2018.311997
Fatma Faek, O. Nomir, Ehab Essa, Ebrahim El-henawy
A combination of wavelet transforms and contrast limited adaptive histogram equalization (CLAHE) techniques are used to efficiently enhance videos. The proposed technique handles the noises within video frames and enhances the resolution of the video. Lifting wavelet transform (LWT) and stationary wavelet transform (SWT) are applied to separate original frame into the low-frequency sub-bands, and the high-frequency sub-bands. Thereafter, we applied the interpolation to correct the coefficients of the high-frequency and the original frame separately. Next, Inverse Lifting wavelet transform (ILWT) is utilized for the integration of each all these enhanced sub-band. Finally, the CLAHE algorithm is applied to make the details of the frame more visible, and meaningful to generally improve the resolution of the video. The output video shows that the proposed technique enhances the quality of resolution videos under various environmental conditions, alleviates noises and avoids the over-enhancement problems.
结合小波变换和对比度有限的自适应直方图均衡化(CLAHE)技术有效地增强了视频。该技术处理了视频帧内的噪声,提高了视频的分辨率。采用提升小波变换(LWT)和平稳小波变换(SWT)将原始帧分离为低频子带和高频子带。然后利用插值分别对高频和原帧的系数进行校正。然后,利用逆提升小波变换(ILWT)对各增强子带进行积分。最后,应用CLAHE算法使帧的细节更加清晰可见,对整体提高视频的分辨率具有重要意义。输出视频结果表明,该技术提高了各种环境条件下分辨率视频的质量,减轻了噪声,避免了过度增强问题。
{"title":"Wavelet-based Video Enhancement Using Contrast Limited Adaptive Histogram Equalization","authors":"Fatma Faek, O. Nomir, Ehab Essa, Ebrahim El-henawy","doi":"10.21608/mjcis.2018.311997","DOIUrl":"https://doi.org/10.21608/mjcis.2018.311997","url":null,"abstract":"A combination of wavelet transforms and contrast limited adaptive histogram equalization (CLAHE) techniques are used to efficiently enhance videos. The proposed technique handles the noises within video frames and enhances the resolution of the video. Lifting wavelet transform (LWT) and stationary wavelet transform (SWT) are applied to separate original frame into the low-frequency sub-bands, and the high-frequency sub-bands. Thereafter, we applied the interpolation to correct the coefficients of the high-frequency and the original frame separately. Next, Inverse Lifting wavelet transform (ILWT) is utilized for the integration of each all these enhanced sub-band. Finally, the CLAHE algorithm is applied to make the details of the frame more visible, and meaningful to generally improve the resolution of the video. The output video shows that the proposed technique enhances the quality of resolution videos under various environmental conditions, alleviates noises and avoids the over-enhancement problems.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122822706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Algorithms for Counting Rectangles in Large Bipartite Graphs using MapReduce 基于MapReduce的大型二部图中矩形计数的改进算法
Pub Date : 2018-06-01 DOI: 10.21608/mjcis.2018.311999
Ahmed T. Sharafeldeen, M. F. Alrahmawy, S. Elmougy
Rectangles for bipartite graphs are like triangles for unipartite graphs as both represent the smallest cycles in such graphs. Rectangle Counting is considered an important task in many bipartite network analysis metrics and is considered the core of computing such metrics, especially in cluster coefficient, bitruss, etc. However, there are few efficient algorithms to deal with this problem, especially in a large bipartite graph. In this work, we use MapReduce to enhance an algorithm to count rectangles in a large bipartite graph. The results show that our proposed MapReduce-based algorithm gives a better execution time than the existing algorithms, especially when it is applied in very large bipartite graphs.
二部图的矩形与单部图的三角形一样,都表示图中的最小环。矩形计数在许多二部网络分析度量中被认为是一项重要的任务,并且被认为是计算二部网络分析度量的核心,特别是在聚类系数、比特线等方面。然而,很少有有效的算法来处理这个问题,特别是在一个大的二部图中。在这项工作中,我们使用MapReduce来增强一种算法来对大型二部图中的矩形进行计数。结果表明,我们提出的基于mapreduce的算法比现有算法有更好的执行时间,特别是当它应用于非常大的二部图时。
{"title":"Enhanced Algorithms for Counting Rectangles in Large Bipartite Graphs using MapReduce","authors":"Ahmed T. Sharafeldeen, M. F. Alrahmawy, S. Elmougy","doi":"10.21608/mjcis.2018.311999","DOIUrl":"https://doi.org/10.21608/mjcis.2018.311999","url":null,"abstract":"Rectangles for bipartite graphs are like triangles for unipartite graphs as both represent the smallest cycles in such graphs. Rectangle Counting is considered an important task in many bipartite network analysis metrics and is considered the core of computing such metrics, especially in cluster coefficient, bitruss, etc. However, there are few efficient algorithms to deal with this problem, especially in a large bipartite graph. In this work, we use MapReduce to enhance an algorithm to count rectangles in a large bipartite graph. The results show that our proposed MapReduce-based algorithm gives a better execution time than the existing algorithms, especially when it is applied in very large bipartite graphs.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ETL Semantic Model for Big Data Aggregation, Integration, and Representation 面向大数据聚合、集成和表示的ETL语义模型
Pub Date : 2018-06-01 DOI: 10.21608/mjcis.2018.311994
Abeer Saber, Aya M. Al-Zoghby, S. Elmougy
Semantic web introduces new benefits for many research topics on big-data. It semantically maintains a large amount of data and provides meaningful meaning of unstructured data contents. Big data refers to large scale. It is used to describe a massive collection of datasets in different formats. The semantic and structural heterogeneity are the biggest problems that still face the aggregating, integrating, and storing big data. In this paper, we solved both of the problems of columns redundancy that are produced from the semantic heterogeneity and the problem of structural heterogeneity through developing and implementing a new ETL model based on semantic and ontology technologies. Geospatial data is used as a case study because its integration is complex and usually suffers from the variety of resources and the representation of the produced big data. The results of using this model showed that it solves the problem of heterogeneity in several data sources and it improves the data integration and representation.
语义网为大数据领域的许多研究课题带来了新的优势。它在语义上维护了大量的数据,并提供了有意义的非结构化数据内容。大数据指的是大规模。它被用来描述大量不同格式的数据集。语义异构和结构异构是大数据聚合、集成和存储所面临的最大问题。本文通过开发和实现一种基于语义和本体技术的ETL模型,解决了由语义异构引起的列冗余问题和结构异构问题。地理空间数据被用作案例研究,因为它的整合是复杂的,通常受到各种资源和产生的大数据的表示的影响。应用结果表明,该模型解决了多个数据源的异构性问题,提高了数据的集成和表示能力。
{"title":"ETL Semantic Model for Big Data Aggregation, Integration, and Representation","authors":"Abeer Saber, Aya M. Al-Zoghby, S. Elmougy","doi":"10.21608/mjcis.2018.311994","DOIUrl":"https://doi.org/10.21608/mjcis.2018.311994","url":null,"abstract":"Semantic web introduces new benefits for many research topics on big-data. It semantically maintains a large amount of data and provides meaningful meaning of unstructured data contents. Big data refers to large scale. It is used to describe a massive collection of datasets in different formats. The semantic and structural heterogeneity are the biggest problems that still face the aggregating, integrating, and storing big data. In this paper, we solved both of the problems of columns redundancy that are produced from the semantic heterogeneity and the problem of structural heterogeneity through developing and implementing a new ETL model based on semantic and ontology technologies. Geospatial data is used as a case study because its integration is complex and usually suffers from the variety of resources and the representation of the produced big data. The results of using this model showed that it solves the problem of heterogeneity in several data sources and it improves the data integration and representation.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132638878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Representation Learning Framework of Object Recognition via Feature Construction 基于特征构建的物体识别表征学习框架
Pub Date : 2018-06-01 DOI: 10.21608/mjcis.2018.311995
Muhammad H. Zayyan, S. Elmougy, M. F. Alrahmawy
In this paper, we recognize objects within images by collecting information from a large number of random-size patches of the image. The different backgrounds accompany the foreground object demand to have a learning system to identify each patch as belonging to the object category or to the background category. We strengthen a recent method called Evolution-COnstructed (ECO), which is based on the ensemble learning approach which combines several weak classifier. The improvement is relying on decreasing the overfitting problem. Two different improving ideas are proposed: 1) Pooling operation, which is applied to the weak classifiers data, 2) Random Forest algorithm, which combines the weak classifiers outcomes. Experimental results are reported for classification of 9 categories of Caltech-101 data sets and proved that our modifications boost the performance over the base method and other existing methods.
在本文中,我们通过从图像的大量随机大小的补丁中收集信息来识别图像中的物体。伴随着前景对象的不同背景要求有一个学习系统来识别每个补丁属于对象类别或背景类别。我们加强了最近的一种称为进化构造(ECO)的方法,该方法基于集成学习方法,结合了几个弱分类器。改进依赖于减少过拟合问题。提出了两种不同的改进思路:1)池化操作,应用于弱分类器数据;2)随机森林算法,结合弱分类器的结果。对Caltech-101数据集的9个类别进行了分类实验,结果表明我们的改进提高了基本方法和其他现有方法的性能。
{"title":"Representation Learning Framework of Object Recognition via Feature Construction","authors":"Muhammad H. Zayyan, S. Elmougy, M. F. Alrahmawy","doi":"10.21608/mjcis.2018.311995","DOIUrl":"https://doi.org/10.21608/mjcis.2018.311995","url":null,"abstract":"In this paper, we recognize objects within images by collecting information from a large number of random-size patches of the image. The different backgrounds accompany the foreground object demand to have a learning system to identify each patch as belonging to the object category or to the background category. We strengthen a recent method called Evolution-COnstructed (ECO), which is based on the ensemble learning approach which combines several weak classifier. The improvement is relying on decreasing the overfitting problem. Two different improving ideas are proposed: 1) Pooling operation, which is applied to the weak classifiers data, 2) Random Forest algorithm, which combines the weak classifiers outcomes. Experimental results are reported for classification of 9 categories of Caltech-101 data sets and proved that our modifications boost the performance over the base method and other existing methods.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Mansoura Journal for Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1