首页 > 最新文献

Mansoura Journal for Computer and Information Sciences最新文献

英文 中文
A Multimodal Wireless System for Instant Quizzing and Feedback 用于即时测验和反馈的多模态无线系统
Pub Date : 2018-06-01 DOI: 10.21608/mjcis.2018.311998
Khaled Mohammed, A. Tolba, Mohammed M Elmogy
This paper presents a wireless system for instant quizzing in the classroom and collecting students’ feedback on teachers performance. This system is integrated with a student attendance management system to facilitate management of quizzing and quiz marking in addition to questionnaires about Quizzes. Such a system is very essential for following attendance and student learning progress in addition to formative assessment. The system uses two communication technologies: Wi-Fi, and Radio Frequency Identification (RFID). Such a low-cost system assures attendance follow up to assure abiding by the university bylaws, avoid spoofing and cheating, and enhance both teaching and learning. A student recommendation system is also implemented to increase student retention and enhance students success rate.
本文提出了一种用于课堂即时测验和收集学生对教师表现反馈的无线系统。本系统集成了学生出勤管理系统,方便了学生对测验和测验评分的管理,以及对测验问卷的管理。除了形成性评估之外,这样的系统对于跟踪出勤和学生学习进度非常重要。该系统使用两种通信技术:Wi-Fi和射频识别(RFID)。这种低成本的系统保证了考勤的跟进,确保遵守学校的规章制度,避免欺骗和作弊,提高教与学。此外,学校亦推行学生推荐制度,以提高学生的保留率和成功率。
{"title":"A Multimodal Wireless System for Instant Quizzing and Feedback","authors":"Khaled Mohammed, A. Tolba, Mohammed M Elmogy","doi":"10.21608/mjcis.2018.311998","DOIUrl":"https://doi.org/10.21608/mjcis.2018.311998","url":null,"abstract":"This paper presents a wireless system for instant quizzing in the classroom and collecting students’ feedback on teachers performance. This system is integrated with a student attendance management system to facilitate management of quizzing and quiz marking in addition to questionnaires about Quizzes. Such a system is very essential for following attendance and student learning progress in addition to formative assessment. The system uses two communication technologies: Wi-Fi, and Radio Frequency Identification (RFID). Such a low-cost system assures attendance follow up to assure abiding by the university bylaws, avoid spoofing and cheating, and enhance both teaching and learning. A student recommendation system is also implemented to increase student retention and enhance students success rate.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126932316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video Analysis For Human Action Recognition Using Deep Convolutional Neural Networks 基于深度卷积神经网络的人体动作识别视频分析
Pub Date : 2018-06-01 DOI: 10.21608/mjcis.2018.311989
Nehal N. Mostafa, M. F. Alrahmawy, O. Nomair
In the last few years, human action recognition potential applications have been studied in many fields such as robotics, human computer interaction, and video surveillance systems and it has been evaluated as an active research area. This paper presents a recognition system using deep learning to recognize and identify human actions from video input. The proposed system has been fine-tuned by partial training and dropout of the classification layer of Alexnet and replacing it by another one that use SVM. The performance of the network is boosted by using key frames that were extracted via applying Kalman filter during dataset augmentation. The proposed system resulted in oromising performance compared to the state of the art approaches. The classification accuracy reached 92.35%.
近年来,人体动作识别在机器人、人机交互、视频监控系统等领域的潜在应用得到了广泛的研究,并被认为是一个活跃的研究领域。本文提出了一种利用深度学习对视频输入中的人类行为进行识别的识别系统。通过对Alexnet的分类层进行部分训练和放弃,并用支持向量机的分类层代替该分类层,对系统进行了微调。在数据集增强过程中使用卡尔曼滤波提取的关键帧来提高网络的性能。与最先进的方法相比,拟议的系统产生了令人乐观的性能。分类准确率达到92.35%。
{"title":"Video Analysis For Human Action Recognition Using Deep Convolutional Neural Networks","authors":"Nehal N. Mostafa, M. F. Alrahmawy, O. Nomair","doi":"10.21608/mjcis.2018.311989","DOIUrl":"https://doi.org/10.21608/mjcis.2018.311989","url":null,"abstract":"In the last few years, human action recognition potential applications have been studied in many fields such as robotics, human computer interaction, and video surveillance systems and it has been evaluated as an active research area. This paper presents a recognition system using deep learning to recognize and identify human actions from video input. The proposed system has been fine-tuned by partial training and dropout of the classification layer of Alexnet and replacing it by another one that use SVM. The performance of the network is boosted by using key frames that were extracted via applying Kalman filter during dataset augmentation. The proposed system resulted in oromising performance compared to the state of the art approaches. The classification accuracy reached 92.35%.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125519379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arabic characters descriptors for lexicon reduction in Arabic handwriting 阿拉伯语手写体中用于词典缩减的阿拉伯字符描述符
Pub Date : 2018-06-01 DOI: 10.21608/mjcis.2018.311990
Nada Essa, Eman El- Daydamony, A. Atwan
This paper introduces an advanced Arabic handwriting recognition technique using lexicon reduction. The lexicon reduction technique stands on extracting the Arabic character shape descriptors. The technique implementation consists of two major stages. The first stage presents a method for extracting the shape descriptor of each character. The second stage suggests Aho-Corasik string searching algorithm for Arabic character recognition. Various stages have been evaluated on the IFN/ENIT database. The results demonstrate the efficiency of the suggested technique.
介绍了一种基于词汇约简的阿拉伯语手写识别技术。词典约简技术的核心是提取阿拉伯字符形状描述符。技术实现包括两个主要阶段。第一阶段提出了一种提取每个字符形状描述符的方法。第二阶段提出了用于阿拉伯字符识别的Aho-Corasik字符串搜索算法。在IFN/ENIT数据库上对各个阶段进行了评估。实验结果证明了该方法的有效性。
{"title":"Arabic characters descriptors for lexicon reduction in Arabic handwriting","authors":"Nada Essa, Eman El- Daydamony, A. Atwan","doi":"10.21608/mjcis.2018.311990","DOIUrl":"https://doi.org/10.21608/mjcis.2018.311990","url":null,"abstract":"This paper introduces an advanced Arabic handwriting recognition technique using lexicon reduction. The lexicon reduction technique stands on extracting the Arabic character shape descriptors. The technique implementation consists of two major stages. The first stage presents a method for extracting the shape descriptor of each character. The second stage suggests Aho-Corasik string searching algorithm for Arabic character recognition. Various stages have been evaluated on the IFN/ENIT database. The results demonstrate the efficiency of the suggested technique.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swarm Intelligence based Fault-Tolerant Real-Time Cloud Scheduler 基于群智能的容错实时云调度
Pub Date : 2018-06-01 DOI: 10.21608/mjcis.2018.311991
A. Abohamama, M. F. Alrahmawy, Mohamed A. Elsoud, Taher T. Hamza
Cloud computing is a distributed computing paradigm that is deployed in many real-life applications. Many of these applications are real-time such as scientific computing, financial transactions, etc. Therefore, improving the dependability of cloud environments is extremely important to fulfill the reliability and availability requirements of different applications, especially real-time applications. Fault tolerance is the most common approach for improving the system’s dependability. In addition to traditional fault tolerance techniques such as replication, job migration, software rejuvenation, etc, fault-tolerant scheduling algorithms can play a great role toward more dependable systems. In this paper, an ACO based fault-tolerant soft real-time cloud scheduler is developed to minimize deadlines missing rate, makespan, and the imbalance in distributing the workload among the different machines. The performance of proposed scheduler has been assessed under different scenarios. Also, it has been compared to other well-known scheduling algorithms and the experimental results have shown the superiority of the proposed algorithm.
云计算是一种分布式计算范例,部署在许多实际应用程序中。这些应用程序中的许多都是实时的,例如科学计算、金融交易等。因此,提高云环境的可靠性对于满足不同应用特别是实时应用的可靠性和可用性需求是极其重要的。容错是提高系统可靠性最常用的方法。除了传统的容错技术,如复制、作业迁移、软件再生等,容错调度算法可以在提高系统可靠性方面发挥重要作用。本文开发了一种基于蚁群算法的容错软实时云调度程序,以最大限度地减少工期缺失率、最大完工时间和不同机器间工作负载分配的不平衡。在不同的场景下评估了所建议的调度器的性能。并与其他知名调度算法进行了比较,实验结果表明了该算法的优越性。
{"title":"Swarm Intelligence based Fault-Tolerant Real-Time Cloud Scheduler","authors":"A. Abohamama, M. F. Alrahmawy, Mohamed A. Elsoud, Taher T. Hamza","doi":"10.21608/mjcis.2018.311991","DOIUrl":"https://doi.org/10.21608/mjcis.2018.311991","url":null,"abstract":"Cloud computing is a distributed computing paradigm that is deployed in many real-life applications. Many of these applications are real-time such as scientific computing, financial transactions, etc. Therefore, improving the dependability of cloud environments is extremely important to fulfill the reliability and availability requirements of different applications, especially real-time applications. Fault tolerance is the most common approach for improving the system’s dependability. In addition to traditional fault tolerance techniques such as replication, job migration, software rejuvenation, etc, fault-tolerant scheduling algorithms can play a great role toward more dependable systems. In this paper, an ACO based fault-tolerant soft real-time cloud scheduler is developed to minimize deadlines missing rate, makespan, and the imbalance in distributing the workload among the different machines. The performance of proposed scheduler has been assessed under different scenarios. Also, it has been compared to other well-known scheduling algorithms and the experimental results have shown the superiority of the proposed algorithm.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116796861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Security Evaluation Based on Trend Line Rules Model 基于趋势线规则模型的数据安全评估
Pub Date : 2017-12-01 DOI: 10.21608/mjcis.2017.311960
Nazar K. Khorsheed, Mohammad A. El-Dosuky, Taher T. Hamza, M. Z. Rashad
With the rise in demand for cloud services, most companies attempt to provide a lot of cloud services and benefit from them, one of the most important services is accounting the cost of data ciphering in the clouds market. This proposed work proved that the cryptographic keys are variable as evident mathematically, which in turn makes it difficult to guess the decoding of the data, and extends the cloud security model by generating both private and public keys based on local cost and trend line rules respectively. Due to the increased decoding time as evident from the proof results, the suitable security level is implemented and tested using Symmetric and Asymmetric encryption algorithms.
随着对云服务需求的增加,大多数公司都试图提供大量的云服务并从中受益,其中最重要的服务之一是计算云市场中数据加密的成本。本文提出的工作证明了加密密钥在数学上是可变的,这反过来又使得很难猜测数据的解码,并通过分别基于本地成本和趋势线规则生成私钥和公钥来扩展云安全模型。由于从证明结果中可以明显看出解码时间的增加,因此使用对称和非对称加密算法实现和测试了适当的安全级别。
{"title":"Data Security Evaluation Based on Trend Line Rules Model","authors":"Nazar K. Khorsheed, Mohammad A. El-Dosuky, Taher T. Hamza, M. Z. Rashad","doi":"10.21608/mjcis.2017.311960","DOIUrl":"https://doi.org/10.21608/mjcis.2017.311960","url":null,"abstract":"With the rise in demand for cloud services, most companies attempt to provide a lot of cloud services and benefit from them, one of the most important services is accounting the cost of data ciphering in the clouds market. This proposed work proved that the cryptographic keys are variable as evident mathematically, which in turn makes it difficult to guess the decoding of the data, and extends the cloud security model by generating both private and public keys based on local cost and trend line rules respectively. Due to the increased decoding time as evident from the proof results, the suitable security level is implemented and tested using Symmetric and Asymmetric encryption algorithms.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128737088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure Multimodal Biometric Authentication with Cryptographic key Management Using Double Random Phase Encoding 基于双随机相位编码的密钥管理安全多模态生物特征认证
Pub Date : 2017-12-01 DOI: 10.21608/mjcis.2017.311956
Eman Tarek, O. Ouda, A. Atwan
Multibiometric systems are more efficient and reliable than unibiometric systems as they can provide lower error rates as well as robustness against frauds and subsystem failures. However, the deployment of multibiometric systems in large-scale biometric applications increases the risk of users‟ privacy violation because once a multibiometric system is compromised; multiple biometric traits are disclosed to adversaries. As a result, protecting biometric templates stored in centralized databases of multibiometric systems has become a necessary prerequisite to allow wide-spread deployment of these systems. In this paper, we propose a biometric template protection method for securing image templates in multibiometric systems using the double random phase encoding (DRPE) scheme. DRPE is a well-known image encryption scheme and therefore it is more suited to secure image-based biometric templates. First, the proposed method encodes a randomly generated key as a binary image. Second, the phase components of two images captured from two different biometric modalities; namely, palmprint and fingerprint are convolved to produce a multi-biometric image of the same size as the binary image-encoded key. Finally, image-encoded key is encrypted using DRPE employing the multi-biometric image as a cipher key. During authentication, the encoded key is correctly recovered only if genuine biometric images are presented to the system; otherwise, the authentication process fails. Therefore, the proposed method can not only protect image-based biometric templates but also can provide a reliable means for securing cryptographic keys. Experimental results illustrate that the proposed method can secure both biometric templates and cryptographic keys without sacrificing the recognition accuracy of the underlying unprotected biometric recognition system.
多生物识别系统比单生物识别系统更有效和可靠,因为它们可以提供更低的错误率以及对欺诈和子系统故障的鲁棒性。然而,在大规模生物识别应用中部署多生物识别系统增加了用户隐私侵犯的风险,因为一旦多生物识别系统被泄露;多个生物特征被披露给对手。因此,保护存储在多生物识别系统集中数据库中的生物识别模板已成为允许这些系统广泛部署的必要先决条件。本文提出了一种基于双随机相位编码(DRPE)的多生物识别系统图像模板保护方法。DRPE是一种众所周知的图像加密方案,因此它更适合于保护基于图像的生物识别模板。首先,该方法将随机生成的密钥编码为二值图像。其次,从两种不同的生物识别模式捕获的两幅图像的相位分量;也就是说,将掌纹和指纹进行卷积以产生与二进制图像编码密钥大小相同的多生物特征图像。最后,采用多生物特征图像作为密码密钥,使用DRPE对图像编码密钥进行加密。在身份验证过程中,只有向系统提供真实的生物特征图像,才能正确地恢复编码的密钥;否则,认证过程将失败。因此,该方法不仅可以保护基于图像的生物特征模板,而且可以为加密密钥的安全提供可靠的手段。实验结果表明,该方法在不牺牲底层无保护生物特征识别系统的识别精度的前提下,可以同时保护生物特征模板和密码密钥。
{"title":"A secure Multimodal Biometric Authentication with Cryptographic key Management Using Double Random Phase Encoding","authors":"Eman Tarek, O. Ouda, A. Atwan","doi":"10.21608/mjcis.2017.311956","DOIUrl":"https://doi.org/10.21608/mjcis.2017.311956","url":null,"abstract":"Multibiometric systems are more efficient and reliable than unibiometric systems as they can provide lower error rates as well as robustness against frauds and subsystem failures. However, the deployment of multibiometric systems in large-scale biometric applications increases the risk of users‟ privacy violation because once a multibiometric system is compromised; multiple biometric traits are disclosed to adversaries. As a result, protecting biometric templates stored in centralized databases of multibiometric systems has become a necessary prerequisite to allow wide-spread deployment of these systems. In this paper, we propose a biometric template protection method for securing image templates in multibiometric systems using the double random phase encoding (DRPE) scheme. DRPE is a well-known image encryption scheme and therefore it is more suited to secure image-based biometric templates. First, the proposed method encodes a randomly generated key as a binary image. Second, the phase components of two images captured from two different biometric modalities; namely, palmprint and fingerprint are convolved to produce a multi-biometric image of the same size as the binary image-encoded key. Finally, image-encoded key is encrypted using DRPE employing the multi-biometric image as a cipher key. During authentication, the encoded key is correctly recovered only if genuine biometric images are presented to the system; otherwise, the authentication process fails. Therefore, the proposed method can not only protect image-based biometric templates but also can provide a reliable means for securing cryptographic keys. Experimental results illustrate that the proposed method can secure both biometric templates and cryptographic keys without sacrificing the recognition accuracy of the underlying unprotected biometric recognition system.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126789462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Cloud-Based IoT Mashup Algorithm 自动基于云的物联网混搭算法
Pub Date : 2017-12-01 DOI: 10.21608/mjcis.2017.311953
Dalia Elwi, O. Nomair, S. Elmougy
Internet of Things (IoT) and cloud computing are two of the most important trends in information and communication technology that attract the attention of many researchers in recent years. A new trend is raised from integrating both trends called Cloud of Things (CoT). In this paper, we focus on integrating IoT with cloud computing because of the benefits that IoT can gained from unlimited storage and unlimited processing capabilities provided by cloud computing. Firstly, we propose a CoT architecture that supports Things as a Service (TaaS) and IoT Mashup as a Service (MaaS). Secondly, we develop an automatic IoT Mashup Algorithm (IoTMA) for application development in less response time by composing existing things services and web services without needing of high experience in programming. Experimental results proved that our algorithm reduced the response time compared to some other recent related works.
物联网(Internet of Things, IoT)和云计算是近年来信息通信技术发展的两个最重要的趋势,引起了许多研究者的关注。将这两种趋势结合起来的新趋势被称为物联网云(CoT)。在本文中,我们专注于将物联网与云计算集成,因为物联网可以从云计算提供的无限存储和无限处理能力中获得好处。首先,我们提出了一个支持物联网即服务(TaaS)和物联网混搭即服务(MaaS)的CoT架构。其次,我们开发了一种自动化的物联网混搭算法(IoTMA),通过组合现有的物联网服务和web服务,在更短的响应时间内开发应用程序,而不需要高的编程经验。实验结果表明,与近期的一些相关研究成果相比,我们的算法缩短了响应时间。
{"title":"Automatic Cloud-Based IoT Mashup Algorithm","authors":"Dalia Elwi, O. Nomair, S. Elmougy","doi":"10.21608/mjcis.2017.311953","DOIUrl":"https://doi.org/10.21608/mjcis.2017.311953","url":null,"abstract":"Internet of Things (IoT) and cloud computing are two of the most important trends in information and communication technology that attract the attention of many researchers in recent years. A new trend is raised from integrating both trends called Cloud of Things (CoT). In this paper, we focus on integrating IoT with cloud computing because of the benefits that IoT can gained from unlimited storage and unlimited processing capabilities provided by cloud computing. Firstly, we propose a CoT architecture that supports Things as a Service (TaaS) and IoT Mashup as a Service (MaaS). Secondly, we develop an automatic IoT Mashup Algorithm (IoTMA) for application development in less response time by composing existing things services and web services without needing of high experience in programming. Experimental results proved that our algorithm reduced the response time compared to some other recent related works.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117037128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wrapper Feature Selection Technique for Improving Diagnosis of Breast Cancer 一种提高乳腺癌诊断的包膜特征选择技术
Pub Date : 2017-12-01 DOI: 10.21608/mjcis.2017.311961
Amal F. Goweda, Mohammed M Elmogy, S. Barakat
Nowadays, cancer is considered as a fairly common disease. Regarding the number of newly detected cases, breast cancer is ranked as one of the most leading cancer types to death in women. It can be cured, if it is identified and treated in its early stages. Therefore, this study explores a proposed integrated wrapper feature selection method called wrapper naïve-greedy search (WNGS) to improve the accuracy of the breast cancer diagnosis. WNGS is based on a wrapper method, which is blended with a greedy forward search to select optimal feature subset. WNGS method integrates a wrapper method based on Naïve Bayes (NB) classifier as a learning scheme with a forward greedy search method. Then, the selected feature subset is fed to a classifier to determine breast cancer. In addition, K-nearest neighbor-greedy search (KNN-GS) is used for comparison. In KNN-GS method, k-nearest neighbor (KNN) classifier is used as a learning scheme while a forward greedy search method is used to search through features. NB is used as the classifier for classification process for both methods. By applying these two methods, data features are reduced, and the classification rate is improved. Both methods are tested on two different benchmark breast cancer datasets. Accuracy results showed that WNGS method outperformed KNN-GS method. Also, WNGS method overcame KNN-GS regarding precision, recall, F-measure, and sensitivity.
如今,癌症被认为是一种相当常见的疾病。关于新发现病例的数量,乳腺癌被列为导致妇女死亡的最主要癌症类型之一。如果在早期阶段得到识别和治疗,它是可以治愈的。因此,本研究提出了一种集成包装器特征选择方法wrapper naïve-greedy search (WNGS),以提高乳腺癌诊断的准确性。WNGS基于一种包装方法,该方法与贪婪前向搜索相结合,以选择最优特征子集。WNGS方法将基于Naïve贝叶斯(NB)分类器的包装器方法作为学习方案与前向贪婪搜索方法相结合。然后,将选择的特征子集馈送到分类器以确定乳腺癌。此外,还使用k近邻贪婪搜索(KNN-GS)进行比较。在KNN- gs方法中,使用k近邻分类器作为学习方案,使用前向贪婪搜索方法搜索特征。两种方法的分类过程都使用NB作为分类器。通过这两种方法的应用,减少了数据特征,提高了分类率。这两种方法都在两个不同的基准乳腺癌数据集上进行了测试。精度结果表明,WNGS方法优于KNN-GS方法。此外,WNGS方法在精密度、召回率、f值、灵敏度等方面也优于KNN-GS方法。
{"title":"A Wrapper Feature Selection Technique for Improving Diagnosis of Breast Cancer","authors":"Amal F. Goweda, Mohammed M Elmogy, S. Barakat","doi":"10.21608/mjcis.2017.311961","DOIUrl":"https://doi.org/10.21608/mjcis.2017.311961","url":null,"abstract":"Nowadays, cancer is considered as a fairly common disease. Regarding the number of newly detected cases, breast cancer is ranked as one of the most leading cancer types to death in women. It can be cured, if it is identified and treated in its early stages. Therefore, this study explores a proposed integrated wrapper feature selection method called wrapper naïve-greedy search (WNGS) to improve the accuracy of the breast cancer diagnosis. WNGS is based on a wrapper method, which is blended with a greedy forward search to select optimal feature subset. WNGS method integrates a wrapper method based on Naïve Bayes (NB) classifier as a learning scheme with a forward greedy search method. Then, the selected feature subset is fed to a classifier to determine breast cancer. In addition, K-nearest neighbor-greedy search (KNN-GS) is used for comparison. In KNN-GS method, k-nearest neighbor (KNN) classifier is used as a learning scheme while a forward greedy search method is used to search through features. NB is used as the classifier for classification process for both methods. By applying these two methods, data features are reduced, and the classification rate is improved. Both methods are tested on two different benchmark breast cancer datasets. Accuracy results showed that WNGS method outperformed KNN-GS method. Also, WNGS method overcame KNN-GS regarding precision, recall, F-measure, and sensitivity.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement Of Text Recognition In Scene Images 场景图像中文本识别的增强
Pub Date : 2017-12-01 DOI: 10.21608/mjcis.2017.311954
Moayed Hamad, O. Abu-Elnasr, S. Barakat
Text detection and recognition in natural scene images has received significant attention in last years. However, it is still an unsolved problem, due to some difficulties such as some images may have complex background, low contrast, noise, and /or various orientation styles. Also, the texts in those images can be of different font types and sizes. These difficulties make the automatic text extraction and recognizing it very difficult. This paper proposes the implementation of an intelligent system for automatic detection of text from images and explains the system which extracts and recognizes text in natural scene images by using some text detection algorithms to enhance text recognition. The proposed system implements various algorithms, such as Maximally Stable Extremal Regions (MSER) algorithm to detect the regions in the image, Canny edges algorithm to enhance edge detection and Bounding Box algorithm to detect and segment area of interest. Once the text is extracted from the image, the recognition process is done using Optical Character Recognition (OCR). The proposed system has been evaluated using public datasets (ICDAR2003 and the experimental results have proved the robust performance of the proposed system.
近年来,自然场景图像中的文本检测与识别受到了广泛的关注。然而,由于一些图像可能具有复杂的背景、低对比度、噪声和/或不同的方向样式等困难,这仍然是一个未解决的问题。此外,这些图像中的文本可以是不同的字体类型和大小。这些困难使得文本的自动提取和识别非常困难。本文提出了一种智能的图像文本自动检测系统的实现方案,并阐述了该系统利用一些文本检测算法对自然场景图像中的文本进行提取和识别,以增强文本识别能力。该系统实现了多种算法,如用于检测图像区域的最大稳定极值区域(MSER)算法、用于增强边缘检测的Canny边缘算法和用于检测和分割感兴趣区域的Bounding Box算法。从图像中提取文本后,使用光学字符识别(OCR)完成识别过程。利用公共数据集(ICDAR2003)对该系统进行了评估,实验结果证明了该系统的鲁棒性。
{"title":"Enhancement Of Text Recognition In Scene Images","authors":"Moayed Hamad, O. Abu-Elnasr, S. Barakat","doi":"10.21608/mjcis.2017.311954","DOIUrl":"https://doi.org/10.21608/mjcis.2017.311954","url":null,"abstract":"Text detection and recognition in natural scene images has received significant attention in last years. However, it is still an unsolved problem, due to some difficulties such as some images may have complex background, low contrast, noise, and /or various orientation styles. Also, the texts in those images can be of different font types and sizes. These difficulties make the automatic text extraction and recognizing it very difficult. This paper proposes the implementation of an intelligent system for automatic detection of text from images and explains the system which extracts and recognizes text in natural scene images by using some text detection algorithms to enhance text recognition. The proposed system implements various algorithms, such as Maximally Stable Extremal Regions (MSER) algorithm to detect the regions in the image, Canny edges algorithm to enhance edge detection and Bounding Box algorithm to detect and segment area of interest. Once the text is extracted from the image, the recognition process is done using Optical Character Recognition (OCR). The proposed system has been evaluated using public datasets (ICDAR2003 and the experimental results have proved the robust performance of the proposed system.","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116660746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Iris Recognition Using Multi-feature Fusion 基于多特征融合的高效虹膜识别
Pub Date : 2017-12-01 DOI: 10.21608/mjcis.2017.311791
Shaimaa A.M. Hegazy, Mostafa G.M. Mostafa, Ahmed Abu Elfetouh
.
{"title":"Efficient Iris Recognition Using Multi-feature Fusion","authors":"Shaimaa A.M. Hegazy, Mostafa G.M. Mostafa, Ahmed Abu Elfetouh","doi":"10.21608/mjcis.2017.311791","DOIUrl":"https://doi.org/10.21608/mjcis.2017.311791","url":null,"abstract":".","PeriodicalId":253950,"journal":{"name":"Mansoura Journal for Computer and Information Sciences","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116125281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Mansoura Journal for Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1