首页 > 最新文献

2020 International Conference on Computer Science and Software Engineering (CSASE)最新文献

英文 中文
Triple Mobile Anchors Approach for Localization in WSN 基于移动锚点的WSN定位方法
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142084
Bashaer Khalil Ibrahim, M. A. Mahdi, M. A. Salman
Localization in WSNs provides critical data for decisions when collecting data from wide area spread sensors. Using embedded GPS unit on sensor board is not a cost-effective solution Therefore; researchers have paid more attention to locate sensors in WSNs without using many GPSs units. Several algorithms have been suggested for this purpose. However, they are different in terms of cost and accuracy. This paper is going to suggest a new range-based algorithm called Triple Mobile Anchors for Localization (TMAL). This algorithm is based on three mobile sensors that form a mobile triangle to locate unknown sensors. As other approaches, it uses Receive Signal Strength indicator (RSSI). Besides, the algorithm assumes that the mobile anchors are chargeable to avoid the energy issue. Based on a method known as the Relative Side Coordinates (RSC) the simulation results emphasis of the proposed algorithm compare by RELMA-method1 and RELMA-method 2, the TMAL has good accuracy and low cost. It shows how to control the accuracy based on the area of the mobile triangle.
当从广域传感器收集数据时,无线传感器网络中的定位为决策提供了关键数据。因此,在传感器板上使用嵌入式GPS单元不是一种经济有效的解决方案;如何在无线传感器网络中实现不使用大量gps单元的传感器定位已成为研究热点。为此提出了几种算法。然而,它们在成本和准确性方面有所不同。本文提出了一种新的基于距离的定位算法——三移动定位锚(TMAL)。该算法基于三个移动传感器组成一个移动三角形来定位未知传感器。与其他方法一样,它使用接收信号强度指示器(RSSI)。此外,该算法假设移动锚是可充电的,以避免能量问题。基于相对侧坐标(Relative Side Coordinates, RSC)方法,将本文算法的仿真结果与RELMA-method1和RELMA-method 2的仿真结果进行了对比,结果表明该算法具有较好的精度和较低的成本。演示了如何根据移动三角形的面积来控制精度。
{"title":"Triple Mobile Anchors Approach for Localization in WSN","authors":"Bashaer Khalil Ibrahim, M. A. Mahdi, M. A. Salman","doi":"10.1109/CSASE48920.2020.9142084","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142084","url":null,"abstract":"Localization in WSNs provides critical data for decisions when collecting data from wide area spread sensors. Using embedded GPS unit on sensor board is not a cost-effective solution Therefore; researchers have paid more attention to locate sensors in WSNs without using many GPSs units. Several algorithms have been suggested for this purpose. However, they are different in terms of cost and accuracy. This paper is going to suggest a new range-based algorithm called Triple Mobile Anchors for Localization (TMAL). This algorithm is based on three mobile sensors that form a mobile triangle to locate unknown sensors. As other approaches, it uses Receive Signal Strength indicator (RSSI). Besides, the algorithm assumes that the mobile anchors are chargeable to avoid the energy issue. Based on a method known as the Relative Side Coordinates (RSC) the simulation results emphasis of the proposed algorithm compare by RELMA-method1 and RELMA-method 2, the TMAL has good accuracy and low cost. It shows how to control the accuracy based on the area of the mobile triangle.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optic Disc Segmentation in Retinal Fundus Images Using Morphological Techniques and Intensity Thresholding 基于形态学和强度阈值的视网膜眼底图像视盘分割
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142061
Hayder Jaber Samawi, A. Al-Sultan, Enas Hamood Al-Saadi
Among the many diseases that affect the retina, there are two serious diseases: Diabetic Retinopathy and Glaucoma. Diabetic Retinopathy (DR) is a sight-threatening risk inflicting disorder diabetic patient. It occurs due to damage in the retina as a result of diabetes. Glaucoma is a disease of the retinal system that damages the optic nerve of the eye and gets worse over time. A buildup of pressure inside the eye is often associated with it, so it can damage the optic nerve that transmits images to the brain. If damage to the optic nerve caused by high eye pressure continues, glaucoma causes permanent vision loss. Early diagnosis and treatment have been shown to prevent blindness and visual loss. Compared with the manual diagnostic methods, automated retinal analysis systems help save patients’ time, cost and vision. In this context, a fundamental process for diagnosing these diseases is the precise and effective localization of the Optic Disc (OD) in retinal images. This paper offers a robust and efficient method for automatic diagnosis of OD. The method starts with removing the undesirable portions of the image, such as noise, reflections and blur. Next, the OD has been detected by means of morphological operations considering the intensity threshold feature. The proposed method is fast and robustness to detect OD even if interrupted by the visible blood vessels. This method was applied on seven data sets which are the Origa, Rim-One 3, Drishti, Messidor, Drions, Diaretdb0 and DIARETDBI, and the resulted accuracy for these data set are 98.46, 97.48, 97.03, 98.75, 97.27, 95.38, 95.45 respectively.
在许多影响视网膜的疾病中,有两种严重的疾病:糖尿病视网膜病变和青光眼。糖尿病视网膜病变(DR)是一种严重危及糖尿病患者视力的疾病。它的发生是由于糖尿病导致视网膜受损。青光眼是一种视网膜系统疾病,它会损害眼睛的视神经,并随着时间的推移而恶化。眼内压力的增加通常与此有关,因此它会损害将图像传递给大脑的视神经。如果高眼压引起的视神经损伤持续下去,青光眼会导致永久性视力丧失。早期诊断和治疗已被证明可以预防失明和视力丧失。与人工诊断方法相比,自动化视网膜分析系统有助于节省患者的时间、成本和视力。在这种情况下,诊断这些疾病的一个基本过程是在视网膜图像中精确有效地定位视盘(OD)。本文提出了一种鲁棒、高效的OD自动诊断方法。该方法首先去除图像中不需要的部分,如噪声、反射和模糊。其次,考虑强度阈值特征,通过形态学操作检测OD。该方法具有快速、鲁棒性好,即使在可见血管干扰下也能检测出OD。将该方法应用于Origa、Rim-One 3、Drishti、Messidor、Drions、Diaretdb0和DIARETDBI 7个数据集,结果准确率分别为98.46、97.48、97.03、98.75、97.27、95.38和95.45。
{"title":"Optic Disc Segmentation in Retinal Fundus Images Using Morphological Techniques and Intensity Thresholding","authors":"Hayder Jaber Samawi, A. Al-Sultan, Enas Hamood Al-Saadi","doi":"10.1109/CSASE48920.2020.9142061","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142061","url":null,"abstract":"Among the many diseases that affect the retina, there are two serious diseases: Diabetic Retinopathy and Glaucoma. Diabetic Retinopathy (DR) is a sight-threatening risk inflicting disorder diabetic patient. It occurs due to damage in the retina as a result of diabetes. Glaucoma is a disease of the retinal system that damages the optic nerve of the eye and gets worse over time. A buildup of pressure inside the eye is often associated with it, so it can damage the optic nerve that transmits images to the brain. If damage to the optic nerve caused by high eye pressure continues, glaucoma causes permanent vision loss. Early diagnosis and treatment have been shown to prevent blindness and visual loss. Compared with the manual diagnostic methods, automated retinal analysis systems help save patients’ time, cost and vision. In this context, a fundamental process for diagnosing these diseases is the precise and effective localization of the Optic Disc (OD) in retinal images. This paper offers a robust and efficient method for automatic diagnosis of OD. The method starts with removing the undesirable portions of the image, such as noise, reflections and blur. Next, the OD has been detected by means of morphological operations considering the intensity threshold feature. The proposed method is fast and robustness to detect OD even if interrupted by the visible blood vessels. This method was applied on seven data sets which are the Origa, Rim-One 3, Drishti, Messidor, Drions, Diaretdb0 and DIARETDBI, and the resulted accuracy for these data set are 98.46, 97.48, 97.03, 98.75, 97.27, 95.38, 95.45 respectively.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Scheme of Digital Image Watermarking Based on Hessenberg Factorization and DWT 一种基于海森伯格分解和小波变换的高效数字图像水印方案
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142096
Areej M. Abduldaim, Jumana Waleed, A. N. Mazher
Nowadays, the widespread availability of digital images manipulating software leads to the easy potential for editing images with no need for professional knowledge. Generally, the digital images tampering is very subtle in order that it is not distinguishable by the system of human vision. Most of the attackers work on exploiting and misusing this property. Therefore, for preventing illegal manipulation and unlawful access for any digital image, digital images watermarking schemes are developed to hide an imperceptible watermark into a cover image. Based on the utilized application, the significant requirements for these watermarking schemes are security, capacity, robustness, and imperceptibility. In order to satisfy most of these requirements, in this paper, an efficient digital image watermarking scheme has been proposed that relies on Hessenberg Matrix Decomposition (HMD) applied to each block produced from transforming the cover image by discrete wavelet transform (DWT). In the experiments, the obtained results show that the proposed scheme has a high performance in providing the significant requirements of watermarking; security, capacity, robustness, and imperceptibility.
如今,数字图像处理软件的广泛可用性导致无需专业知识即可轻松编辑图像。一般来说,数字图像的篡改是非常微妙的,以至于无法被人类的视觉系统所识别。大多数攻击者都在利用和滥用这个属性。因此,为了防止对任何数字图像的非法操纵和非法访问,开发了数字图像水印方案,将难以察觉的水印隐藏在封面图像中。根据所使用的应用,对这些水印方案提出了安全性、容量、鲁棒性和不可感知性的要求。为了满足这些要求,本文提出了一种高效的数字图像水印方案,该方案利用离散小波变换(DWT)对封面图像进行变换后产生的每个块进行Hessenberg矩阵分解(HMD)。实验结果表明,该方案在满足显著的水印要求方面具有较高的性能;安全性、容量、健壮性和不可感知性。
{"title":"An Efficient Scheme of Digital Image Watermarking Based on Hessenberg Factorization and DWT","authors":"Areej M. Abduldaim, Jumana Waleed, A. N. Mazher","doi":"10.1109/CSASE48920.2020.9142096","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142096","url":null,"abstract":"Nowadays, the widespread availability of digital images manipulating software leads to the easy potential for editing images with no need for professional knowledge. Generally, the digital images tampering is very subtle in order that it is not distinguishable by the system of human vision. Most of the attackers work on exploiting and misusing this property. Therefore, for preventing illegal manipulation and unlawful access for any digital image, digital images watermarking schemes are developed to hide an imperceptible watermark into a cover image. Based on the utilized application, the significant requirements for these watermarking schemes are security, capacity, robustness, and imperceptibility. In order to satisfy most of these requirements, in this paper, an efficient digital image watermarking scheme has been proposed that relies on Hessenberg Matrix Decomposition (HMD) applied to each block produced from transforming the cover image by discrete wavelet transform (DWT). In the experiments, the obtained results show that the proposed scheme has a high performance in providing the significant requirements of watermarking; security, capacity, robustness, and imperceptibility.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Genetic Algorithm for Solving an Optimization Problem: Decision Making in Project Management 求解最优化问题的遗传算法:项目管理中的决策
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142054
Sagvan Saleh, Shelan Kamal Ahmed, F. Nashat
In this paper, an optimization problem belonging to project management family is determined, where the objective is to maximize the benefit of a certain projects. The selection of projects to be performed with a limited budget is a decision process which is characterized by its difficulty in case of high scale problems. In this paper, an approach based on genetic algorithm is presented for solving high scale of the tackled problem with the goal of maximization the benefits. First, a mathematical programming model is presented to represent the problem. Then, a heuristic method was proposed based on genetic algorithm and random neighborhood search techniques. The study realized here simulate a practical situation as an optimization problem and highlighted the effectiveness of genetic algorithm and random search techniques for solving it. The presented method is competitive since it is able to present high quality solutions in acceptable solution time. As shown in the computation results section the proposed genetic algorithm: Decision-Making in Project Management average solution needs 13.7 s, random neighborhood search needs 14.1 s, and greedy procedure needs so small time. In spite of genetic algorithm: Decision-Making in Project Management required more solution time than others algorithms greedy algorithm and random neighborhood algorithm, but the solution quality is better. In addition, the presented work highlights the effectiveness of optimization solution procedures in decision-making to justify the investment budget and so maximizing benefits of organizations, personnel, and others.
本文确定了一个属于项目管理族的优化问题,其目标是使某一项目的效益最大化。在有限的预算下选择项目是一个决策过程,其特点是在大规模问题的情况下困难重重。本文以效益最大化为目标,提出了一种基于遗传算法的求解大规模待处理问题的方法。首先,提出了一个数学规划模型来表示该问题。然后,提出了一种基于遗传算法和随机邻域搜索技术的启发式方法。本研究实现了将实际情况模拟为一个优化问题,并突出了遗传算法和随机搜索技术解决该问题的有效性。所提出的方法具有竞争力,因为它能够在可接受的解决时间内提出高质量的解决方案。如计算结果部分所示,本文提出的遗传算法在项目管理决策中的平均求解时间为13.7 s,随机邻域搜索时间为14.1 s,贪心过程所需时间非常短。尽管遗传算法在项目管理决策中比贪心算法和随机邻域算法需要更多的求解时间,但解的质量更好。此外,所提出的工作强调了优化解决方案程序在决策中的有效性,以证明投资预算的合理性,从而最大化组织,人员和其他人的利益。
{"title":"A Genetic Algorithm for Solving an Optimization Problem: Decision Making in Project Management","authors":"Sagvan Saleh, Shelan Kamal Ahmed, F. Nashat","doi":"10.1109/CSASE48920.2020.9142054","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142054","url":null,"abstract":"In this paper, an optimization problem belonging to project management family is determined, where the objective is to maximize the benefit of a certain projects. The selection of projects to be performed with a limited budget is a decision process which is characterized by its difficulty in case of high scale problems. In this paper, an approach based on genetic algorithm is presented for solving high scale of the tackled problem with the goal of maximization the benefits. First, a mathematical programming model is presented to represent the problem. Then, a heuristic method was proposed based on genetic algorithm and random neighborhood search techniques. The study realized here simulate a practical situation as an optimization problem and highlighted the effectiveness of genetic algorithm and random search techniques for solving it. The presented method is competitive since it is able to present high quality solutions in acceptable solution time. As shown in the computation results section the proposed genetic algorithm: Decision-Making in Project Management average solution needs 13.7 s, random neighborhood search needs 14.1 s, and greedy procedure needs so small time. In spite of genetic algorithm: Decision-Making in Project Management required more solution time than others algorithms greedy algorithm and random neighborhood algorithm, but the solution quality is better. In addition, the presented work highlights the effectiveness of optimization solution procedures in decision-making to justify the investment budget and so maximizing benefits of organizations, personnel, and others.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127396011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal and Near Optimal Solutions for Multi Objective Function on a Single Machine 单机上多目标函数的最优解和近最优解
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142053
F. Ali, M. Ahmed
This In this paper, we studied one of the multi objective function problem on a single machine which is represented by the sum of total completion times, range of lateness and maximum tardiness on a single machine. As an exact solving method, we proposed the branch and bound (BAB) method to find the optimal solution for our problem, by using two techniques which are including new Upper bounds and Lower bounds. In addition, we introduce the idea of Dominance Rules to be used in BAB method to reduce the time by reducing the number of branching nodes in the search tree. Lastly, we suggested two heuristic methods to find near optimal solutions for our problem. The practical results proved the efficiency of BAB method in obtaining optimal solutions and the good performance of the proposed heuristic methods.
本文研究了单台机器上的多目标函数问题,该问题由单台机器上的总完工时间、迟到范围和最大迟到时间之和表示。作为一种精确求解方法,我们提出了分支定界法(BAB)来寻找问题的最优解,该方法采用了包含新上界和下界的两种技术。此外,我们还引入了优势规则的思想,通过减少搜索树中的分支节点数量来减少搜索时间。最后,我们提出了两种启发式方法来寻找问题的近最优解。实际结果证明了BAB方法在获得最优解方面的有效性和所提启发式方法的良好性能。
{"title":"Optimal and Near Optimal Solutions for Multi Objective Function on a Single Machine","authors":"F. Ali, M. Ahmed","doi":"10.1109/CSASE48920.2020.9142053","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142053","url":null,"abstract":"This In this paper, we studied one of the multi objective function problem on a single machine which is represented by the sum of total completion times, range of lateness and maximum tardiness on a single machine. As an exact solving method, we proposed the branch and bound (BAB) method to find the optimal solution for our problem, by using two techniques which are including new Upper bounds and Lower bounds. In addition, we introduce the idea of Dominance Rules to be used in BAB method to reduce the time by reducing the number of branching nodes in the search tree. Lastly, we suggested two heuristic methods to find near optimal solutions for our problem. The practical results proved the efficiency of BAB method in obtaining optimal solutions and the good performance of the proposed heuristic methods.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127026008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TQAIOD: A Backup Technique to Surpassing the Internet Outage TQAIOD:超越互联网中断的备份技术
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142118
A. A. Albabawat, Shimal S.Taher, A. Al-Khalil
The internet plays significant roles in different aspects of daily life especially in education and learning fields. Nowadays, many interactive applications have been emerged to satisfy the requirements of both teachers and students. These applications can contribute to the ease of the data delivery processes which are essentially depending on the internet access. In this paper, new backup technique have been proposed to surpassing the issue of internet outage. The teacher quality assurance system at University of Duhok have been taken as a case study to evaluate the designed technique. The designed technique mainly focuses on overcoming the issue of internet outage while the academic staff get their students’ feedbacks. The proposed technique has been successfully designed to fulfill two main goals: first, the internet outage can recovered by adding a local backup server that can achieve parallel tasks, and this local server replace the main server when the internet connection is unavailable. Second, the backed up information in the local server will be automatically uploaded to the main server once the internet is available. The approached used in this paper minimizes three key aspects in internet-based IMSs, which are traffic, time, and IT requirements.
互联网在日常生活的各个方面发挥着重要作用,特别是在教育和学习领域。目前,已经出现了许多交互式应用程序,以满足教师和学生的需求。这些应用程序有助于简化基本上依赖于互联网访问的数据传递过程。本文提出了一种新的备份技术来解决网络中断的问题。以杜胡克大学教师质量保证体系为例,对设计的技术进行了评价。所设计的技术主要集中在克服网络中断的问题,而教学人员得到学生的反馈。所提出的技术已经成功地实现了两个主要目标:第一,通过添加一个可以实现并行任务的本地备份服务器可以恢复互联网中断,并且当互联网连接不可用时,该本地服务器取代主服务器。其次,一旦网络可用,本地服务器中的备份信息将自动上传到主服务器。本文中使用的方法最大限度地减少了基于互联网的IMSs的三个关键方面,即流量、时间和IT需求。
{"title":"TQAIOD: A Backup Technique to Surpassing the Internet Outage","authors":"A. A. Albabawat, Shimal S.Taher, A. Al-Khalil","doi":"10.1109/CSASE48920.2020.9142118","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142118","url":null,"abstract":"The internet plays significant roles in different aspects of daily life especially in education and learning fields. Nowadays, many interactive applications have been emerged to satisfy the requirements of both teachers and students. These applications can contribute to the ease of the data delivery processes which are essentially depending on the internet access. In this paper, new backup technique have been proposed to surpassing the issue of internet outage. The teacher quality assurance system at University of Duhok have been taken as a case study to evaluate the designed technique. The designed technique mainly focuses on overcoming the issue of internet outage while the academic staff get their students’ feedbacks. The proposed technique has been successfully designed to fulfill two main goals: first, the internet outage can recovered by adding a local backup server that can achieve parallel tasks, and this local server replace the main server when the internet connection is unavailable. Second, the backed up information in the local server will be automatically uploaded to the main server once the internet is available. The approached used in this paper minimizes three key aspects in internet-based IMSs, which are traffic, time, and IT requirements.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secured Method of Reversible Data Hiding 一种安全的可逆数据隐藏方法
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142098
Y. A. Hamza, W. M. Abduallah
In this paper, a new method of secured reversible data hiding that depends on modified pixel expansion has been proposed. The coloured image is divided into three layers (red, green, and blue); then, the blue-layer will be selected as a cover-media for embedding. Next, the difference between two adjacent pixels of the cover-image is calculated, and the result is assigned to the second pixel. After that, a secret logo of size (256x512) will be embedded into each 1st MSB of the second pixel of the cover-image to obtain a stego-image (blue layer only). Finally, the other layers of stego-image; red and green will be encrypted using the Henon chaotic system, and they will be merged to generate the final encrypted image. The receiver has to use the extraction and recovery process to decrypt the ciphered image to obtain the original layers of the image (red, green, and blue). Also, the secret logo will be extracted from 1st MSB of the stego-image then the original cover-image will be ideally recovered via using the recovery process. The red, green, and recovered blue layer has to be combined to obtain the final original image. According to the results, the proposed approach has achieved the best embedding capacity equal to (0.5 bpp) and optimal image quality for the recovered image. The confidentiality of the stego-image and secret logo has been improved via applying Henon chaotic system. Besides, the proposed method is straightforward for implementation, and it requires a little execution time.
本文提出了一种基于改进像素扩展的安全可逆数据隐藏方法。彩色图像分为三层(红、绿、蓝);然后,选择蓝色图层作为覆盖媒体进行嵌入。接下来,计算覆盖图像的两个相邻像素之间的差,并将结果分配给第二个像素。之后,将一个大小为(256x512)的秘密徽标嵌入到封面图像的第二个像素的每个第一个MSB中,以获得隐写图像(仅限蓝色图层)。最后是其他层的隐写图像;红色和绿色将使用Henon混沌系统进行加密,并将它们合并以生成最终的加密图像。接收方必须使用提取和恢复过程对加密图像进行解密,以获得图像的原始层(红、绿、蓝)。此外,秘密标志将从隐写图像的第一个MSB中提取,然后原始封面图像将通过使用恢复过程理想地恢复。红色、绿色和恢复的蓝色图层必须结合起来才能获得最终的原始图像。结果表明,该方法获得了最佳的嵌入容量(0.5 bpp)和最佳的图像质量。应用Henon混沌系统,提高了隐写图像和秘密标志的保密性。此外,该方法实现简单,执行时间短。
{"title":"A Secured Method of Reversible Data Hiding","authors":"Y. A. Hamza, W. M. Abduallah","doi":"10.1109/CSASE48920.2020.9142098","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142098","url":null,"abstract":"In this paper, a new method of secured reversible data hiding that depends on modified pixel expansion has been proposed. The coloured image is divided into three layers (red, green, and blue); then, the blue-layer will be selected as a cover-media for embedding. Next, the difference between two adjacent pixels of the cover-image is calculated, and the result is assigned to the second pixel. After that, a secret logo of size (256x512) will be embedded into each 1st MSB of the second pixel of the cover-image to obtain a stego-image (blue layer only). Finally, the other layers of stego-image; red and green will be encrypted using the Henon chaotic system, and they will be merged to generate the final encrypted image. The receiver has to use the extraction and recovery process to decrypt the ciphered image to obtain the original layers of the image (red, green, and blue). Also, the secret logo will be extracted from 1st MSB of the stego-image then the original cover-image will be ideally recovered via using the recovery process. The red, green, and recovered blue layer has to be combined to obtain the final original image. According to the results, the proposed approach has achieved the best embedding capacity equal to (0.5 bpp) and optimal image quality for the recovered image. The confidentiality of the stego-image and secret logo has been improved via applying Henon chaotic system. Besides, the proposed method is straightforward for implementation, and it requires a little execution time.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124462169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSASE 2020 Keynote Speakers-2 CSASE 2020主题演讲嘉宾2名
Pub Date : 2020-04-01 DOI: 10.1109/csase48920.2020.9142049
{"title":"CSASE 2020 Keynote Speakers-2","authors":"","doi":"10.1109/csase48920.2020.9142049","DOIUrl":"https://doi.org/10.1109/csase48920.2020.9142049","url":null,"abstract":"","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132439639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spyware Injection in Android using Fake Application 在Android中使用假应用程序注入间谍软件
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142101
Huda M. Salih, M. S. Mohammed
Malicious is a malevolent software used to disturb installed applications, collect information. From the outset, malicious software has been developed alongside authentic computer software, creating programs to spy on the user and invade the user’s privacy. The purpose of such applications is often business related, enabling information to be sold for large sums of money. This creates major problems for protection companies and software developers needing to detect spyware, because this is often hidden within the system or within fake applications. In this paper we are going to analyze the behaviour of venous Android spyware. Also, a complete Spyware system has been developed, concealed in a fake application on an Android phone, for the purpose of obtaining information about the victim, such as contacts, messages, calls, accounts, geographical location by Wi-Fi or subscriber identity module (SIM) card, 3G, 4G, Long-Term Evolution (LTE) and other personal information. The spyware can be used to send fake alerts to the victim for purposes of deception.
恶意软件是一种恶意软件,用于干扰已安装的应用程序,收集信息。从一开始,恶意软件就与正版计算机软件一起开发,创建监视用户并侵犯用户隐私的程序。此类应用程序的目的通常与业务相关,使信息能够出售以获得大笔资金。这给需要检测间谍软件的保护公司和软件开发人员带来了重大问题,因为这通常隐藏在系统或假应用程序中。在本文中,我们将分析静脉Android间谍软件的行为。此外,一个完整的间谍软件系统已经被开发出来,隐藏在Android手机的假应用程序中,目的是通过Wi-Fi或用户身份模块(SIM)卡,3G, 4G,长期演进(LTE)等获取受害者的信息,如联系人,短信,通话,账户,地理位置等个人信息。间谍软件可以用来向受害者发送虚假警报,以达到欺骗的目的。
{"title":"Spyware Injection in Android using Fake Application","authors":"Huda M. Salih, M. S. Mohammed","doi":"10.1109/CSASE48920.2020.9142101","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142101","url":null,"abstract":"Malicious is a malevolent software used to disturb installed applications, collect information. From the outset, malicious software has been developed alongside authentic computer software, creating programs to spy on the user and invade the user’s privacy. The purpose of such applications is often business related, enabling information to be sold for large sums of money. This creates major problems for protection companies and software developers needing to detect spyware, because this is often hidden within the system or within fake applications. In this paper we are going to analyze the behaviour of venous Android spyware. Also, a complete Spyware system has been developed, concealed in a fake application on an Android phone, for the purpose of obtaining information about the victim, such as contacts, messages, calls, accounts, geographical location by Wi-Fi or subscriber identity module (SIM) card, 3G, 4G, Long-Term Evolution (LTE) and other personal information. The spyware can be used to send fake alerts to the victim for purposes of deception.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129332754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FPGA Implementation of Visual Speech Recognition System based on NVGRAM-WNN 基于NVGRAM-WNN的视觉语音识别系统的FPGA实现
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142095
Wisam H. Ali, Thamir R. Saeed, Mahmuod H. Al-Muifraje
Visual identification is an exciting field because it reflects the primary form of understanding of objects used by humans. At the beginning of artificial intelligent technology, multiple experiments were suggested by the researcher to develop a computer image recogniser similar to human recognition. One such application is in the speech recognition system in a noisy environment, where the visual cue representing the movement of the lips contains some essential information added to the audio signal, as well as how the person merges audio-visual stimuli to identify output words. A little, but unresolved, part of this problem is the classification of utterance using only the visual signals without the speaker’s acoustic signal being available. Taking into account a collection of frames from a recorded video for a person speaking a word; a robust image processing technique is adopted to isolate the region of the lips; then extracting correct geometric characteristics that reflect the variation of the mouth shape during the speech. The observed features are utilised by the identification stage to identify the spoken word. This paper aims to solve this problem by introducing a new segmentation technique to isolate the area of the lips together with a collection of visual shape features centred on the boundary of the extracted lips that can read the lips with significant results. Weightless neural network classifier is proposed to enhance the utterance identification with hardware implementation based on FPGA. Furthermore, A specialised laboratory is designed to collect the utterance of twenty-six English letters from thirty speakers who are adopted in this paper.
视觉识别是一个令人兴奋的领域,因为它反映了人类对物体的主要理解形式。在人工智能技术之初,研究人员建议通过多次实验来开发一种类似于人类识别的计算机图像识别器。一个这样的应用是在嘈杂环境中的语音识别系统中,其中代表嘴唇运动的视觉线索包含一些添加到音频信号中的基本信息,以及人如何合并视听刺激来识别输出单词。这个问题的一部分是只使用视觉信号而不使用说话人的声音信号来对话语进行分类,这是一个很小但尚未解决的问题。考虑从录制的视频中收集的一个人说一个词的帧;采用鲁棒图像处理技术对嘴唇区域进行分离;然后提取正确的几何特征,反映说话过程中嘴型的变化。识别阶段利用观察到的特征来识别口语单词。本文旨在通过引入一种新的分割技术来解决这一问题,该技术将嘴唇的区域与以提取的嘴唇边界为中心的视觉形状特征集合隔离开来,可以读取嘴唇并取得显著的结果。为了增强语音识别能力,提出了一种基于FPGA的无权重神经网络分类器。此外,我们还设计了一个专门的实验室来收集本文所采用的30位说话者的26个英文字母的发音。
{"title":"FPGA Implementation of Visual Speech Recognition System based on NVGRAM-WNN","authors":"Wisam H. Ali, Thamir R. Saeed, Mahmuod H. Al-Muifraje","doi":"10.1109/CSASE48920.2020.9142095","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142095","url":null,"abstract":"Visual identification is an exciting field because it reflects the primary form of understanding of objects used by humans. At the beginning of artificial intelligent technology, multiple experiments were suggested by the researcher to develop a computer image recogniser similar to human recognition. One such application is in the speech recognition system in a noisy environment, where the visual cue representing the movement of the lips contains some essential information added to the audio signal, as well as how the person merges audio-visual stimuli to identify output words. A little, but unresolved, part of this problem is the classification of utterance using only the visual signals without the speaker’s acoustic signal being available. Taking into account a collection of frames from a recorded video for a person speaking a word; a robust image processing technique is adopted to isolate the region of the lips; then extracting correct geometric characteristics that reflect the variation of the mouth shape during the speech. The observed features are utilised by the identification stage to identify the spoken word. This paper aims to solve this problem by introducing a new segmentation technique to isolate the area of the lips together with a collection of visual shape features centred on the boundary of the extracted lips that can read the lips with significant results. Weightless neural network classifier is proposed to enhance the utterance identification with hardware implementation based on FPGA. Furthermore, A specialised laboratory is designed to collect the utterance of twenty-six English letters from thirty speakers who are adopted in this paper.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128030221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 International Conference on Computer Science and Software Engineering (CSASE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1