首页 > 最新文献

2013 9th International Computer Engineering Conference (ICENCO)最新文献

英文 中文
Three different classifiers for facial age estimation based on K-nearest neighbor 基于k近邻的面部年龄估计的三种不同分类器
Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736476
A. Tharwat, A. M. Ghanem, A. Hassanien
The exact age estimation is often treated as a classification problem; while it can be formulated as a regression problem. In this article, three different classifiers based on KNN classifier's concept for facial age estimation were designed and developed to achieve high efficiency calculation of facial age estimation. In the first classifier, we adopt KNN-distance approach to calculate minimum distance between test face image and all instances belong to the class that has the highest number of nearest samples. Additionally, in the second classifier a modified-KNN version was proposed and the classifier scoring results interpolated to calculate the exact age estimation. Furthermore, KNN-regression classifier as third classifier that used to combine the classification and regression approaches to improve the accuracy of the age estimation system. Moreover, we compared age estimation errors under two situations: case 1, age estimation is performed without discrimination between males and females (gender unknown); and case 2, age estimation is performed for males and females separately (gender known). Results of experiments conducted on well know benchmark FG-NET Database show the effectiveness of the proposed approach.
准确的年龄估计通常被视为一个分类问题;而它可以被表述为一个回归问题。本文基于KNN分类器的面部年龄估计概念,设计并开发了三种不同的分类器,实现了面部年龄估计的高效计算。在第一个分类器中,我们采用KNN-distance方法计算测试人脸图像与所有属于最近样本数量最多的类的实例之间的最小距离。此外,在第二分类器中提出了一种改进的knn版本,并将分类器评分结果内插以计算准确的年龄估计。进一步,knn回归分类器作为第三种分类器,将分类和回归方法相结合,提高了年龄估计系统的准确性。此外,我们比较了两种情况下的年龄估计误差:情况1,年龄估计是在没有性别歧视的情况下进行的(性别未知);情况2,分别对男性和女性进行年龄估计(性别已知)。在知名基准FG-NET数据库上进行的实验结果表明了该方法的有效性。
{"title":"Three different classifiers for facial age estimation based on K-nearest neighbor","authors":"A. Tharwat, A. M. Ghanem, A. Hassanien","doi":"10.1109/ICENCO.2013.6736476","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736476","url":null,"abstract":"The exact age estimation is often treated as a classification problem; while it can be formulated as a regression problem. In this article, three different classifiers based on KNN classifier's concept for facial age estimation were designed and developed to achieve high efficiency calculation of facial age estimation. In the first classifier, we adopt KNN-distance approach to calculate minimum distance between test face image and all instances belong to the class that has the highest number of nearest samples. Additionally, in the second classifier a modified-KNN version was proposed and the classifier scoring results interpolated to calculate the exact age estimation. Furthermore, KNN-regression classifier as third classifier that used to combine the classification and regression approaches to improve the accuracy of the age estimation system. Moreover, we compared age estimation errors under two situations: case 1, age estimation is performed without discrimination between males and females (gender unknown); and case 2, age estimation is performed for males and females separately (gender known). Results of experiments conducted on well know benchmark FG-NET Database show the effectiveness of the proposed approach.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128109869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Improving prediction accuracy of Matrix Factorization based Network coordinate systems 提高基于矩阵分解的网络坐标系预测精度
Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736486
Walaa Saber, R. Rizk, H. Harb
Matrix factorization (MF) based Network coordinate (NC) systems solve the triangle inequality violations (TIVs) that is the main problem of Euclidean distances. However, these systems suffer from low prediction accuracy. In this paper, Conditional Clustered Network Coordinate (CCNC) System is proposed. It divides the space into a number of clusters in a balanced, dynamic, and decentralized way. Clustering the whole space is based on two thresholds in order to guarantee a balanced clustered operation. The performance of CCNC system is evaluated with King data set and PlanetLab data set to be compared against two well known NC systems: Phoenix and Pancake. The simulation results show that CCNC outperforms Phoenix and Pancake significantly in terms of estimation accuracy, expected time to construct the clusters, and the communication overhead.
基于矩阵分解(MF)的网络坐标系统解决了欧氏距离的主要问题——三角不等式违背问题。然而,这些系统的预测精度较低。本文提出了条件聚类网络坐标(CCNC)系统。它以平衡、动态和分散的方式将空间划分为多个集群。基于两个阈值对整个空间进行聚类,以保证均衡的聚类操作。利用King数据集和PlanetLab数据集对CCNC系统的性能进行了评估,并与Phoenix和Pancake两种著名的NC系统进行了比较。仿真结果表明,CCNC算法在估计精度、构建聚类的预期时间和通信开销方面明显优于Phoenix算法和Pancake算法。
{"title":"Improving prediction accuracy of Matrix Factorization based Network coordinate systems","authors":"Walaa Saber, R. Rizk, H. Harb","doi":"10.1109/ICENCO.2013.6736486","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736486","url":null,"abstract":"Matrix factorization (MF) based Network coordinate (NC) systems solve the triangle inequality violations (TIVs) that is the main problem of Euclidean distances. However, these systems suffer from low prediction accuracy. In this paper, Conditional Clustered Network Coordinate (CCNC) System is proposed. It divides the space into a number of clusters in a balanced, dynamic, and decentralized way. Clustering the whole space is based on two thresholds in order to guarantee a balanced clustered operation. The performance of CCNC system is evaluated with King data set and PlanetLab data set to be compared against two well known NC systems: Phoenix and Pancake. The simulation results show that CCNC outperforms Phoenix and Pancake significantly in terms of estimation accuracy, expected time to construct the clusters, and the communication overhead.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134374745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new security protocol using hybrid cryptography algorithms 一种采用混合密码算法的新型安全协议
Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736485
Yasmin Alkady, Mohmed I. Habib, R. Rizk
A group of sensor nodes deployed in particular environment constitutes a wireless sensor network (WSN). At times the WSN can be even deployed in a very sensitive area where the security becomes a great problem. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. A hybrid encryption method that combines both symmetric and asymmetric key can provide high security with minimized key maintenance. In this paper, a new security protocol using combination of both symmetric and asymmetric cryptographic techniques is proposed. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. XOR-DUAL RSA algorithm is considered for authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.
一组部署在特定环境中的传感器节点构成了无线传感器网络。有时,无线传感器网络甚至可以部署在非常敏感的区域,这就成为了一个很大的安全问题。目前的非对称加密方法和对称加密方法可以提供安全级别,但存在许多局限性。例如,密钥维护是对称加密方法面临的一个大问题,而非对称加密方法虽然密钥维护容易,但安全性较低。采用对称密钥和非对称密钥相结合的混合加密方法,可以在最小化密钥维护的同时提供较高的安全性。本文提出了一种结合对称和非对称密码技术的安全协议。该协议提供了三个加密原语:完整性、机密性和身份验证。它是椭圆曲线加密(ECC)和高级加密(AES)相结合提供节点加密的混合加密方法。XOR-DUAL RSA算法用于身份验证,(MD5)用于完整性。结果表明,本文提出的混合密码算法在计算时间和密文大小方面都有较好的性能。
{"title":"A new security protocol using hybrid cryptography algorithms","authors":"Yasmin Alkady, Mohmed I. Habib, R. Rizk","doi":"10.1109/ICENCO.2013.6736485","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736485","url":null,"abstract":"A group of sensor nodes deployed in particular environment constitutes a wireless sensor network (WSN). At times the WSN can be even deployed in a very sensitive area where the security becomes a great problem. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. A hybrid encryption method that combines both symmetric and asymmetric key can provide high security with minimized key maintenance. In this paper, a new security protocol using combination of both symmetric and asymmetric cryptographic techniques is proposed. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. XOR-DUAL RSA algorithm is considered for authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128832181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Identification of weed seeds species in mixed sample with wheat grains using SIFT algorithm 基于SIFT算法的小麦混样杂草种子种类识别
Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736468
M. Wafy, Hashem Ibrahim, E. Kamel
The problem of plant seed identification is important for agricultural sector, such as maintaining seed quality and to prevent the spreading of weed species. Seed identification is currently performed by a human seed analyst; human must often search through many seed images before finding the desired seed. This process of manual identification is slow and posses a degree of subjectivity which is hard to be quantified. Therefore, it is highly recommended economically to introduce an automatic system for seed identification. Modern techniques in different computer science fields such as image analysis, pattern recognition and computer vision can be applied in this system. In this paper, we use Scale-Invariant Feature Transform (SIFT) algorithm to identification three types of weed seeds (Coronopus didymus (L.) Sm., Lolium multiflorum Lam. and Chenopodium ambrosioides L.) that mixed with wheat grains samples. The accuracies of weed seeds detection were 90.5%, 89.2 and 95.3 for the three species respectively. SIFT algorithm discriminated well between wheat grains and weed seeds.
植物种子鉴定问题对农业部门具有重要意义,如保持种子质量和防止杂草的蔓延。种子鉴定目前由人类种子分析师进行;人类往往要在许多种子图像中搜索才能找到想要的种子。这种人工识别的过程是缓慢的,并且具有一定程度的主观性,难以量化。因此,从经济的角度建议引进种子自动鉴定系统。图像分析、模式识别、计算机视觉等计算机科学领域的现代技术均可应用于该系统。本文采用尺度不变特征变换(SIFT)算法对三种杂草种子(Coronopus didymus (L.))进行识别。Sm。何首乌和Chenopodium ambrosioides L.)与小麦颗粒样品混合。三种杂草种子的检测准确率分别为90.5%、89.2和95.3。SIFT算法对小麦籽粒和杂草种子具有较好的区分能力。
{"title":"Identification of weed seeds species in mixed sample with wheat grains using SIFT algorithm","authors":"M. Wafy, Hashem Ibrahim, E. Kamel","doi":"10.1109/ICENCO.2013.6736468","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736468","url":null,"abstract":"The problem of plant seed identification is important for agricultural sector, such as maintaining seed quality and to prevent the spreading of weed species. Seed identification is currently performed by a human seed analyst; human must often search through many seed images before finding the desired seed. This process of manual identification is slow and posses a degree of subjectivity which is hard to be quantified. Therefore, it is highly recommended economically to introduce an automatic system for seed identification. Modern techniques in different computer science fields such as image analysis, pattern recognition and computer vision can be applied in this system. In this paper, we use Scale-Invariant Feature Transform (SIFT) algorithm to identification three types of weed seeds (Coronopus didymus (L.) Sm., Lolium multiflorum Lam. and Chenopodium ambrosioides L.) that mixed with wheat grains samples. The accuracies of weed seeds detection were 90.5%, 89.2 and 95.3 for the three species respectively. SIFT algorithm discriminated well between wheat grains and weed seeds.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131460603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An online parallel CRC32 realization for Hybrid Memory Cube protocol 混合存储立方体协议的在线并行CRC32实现
Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736466
K. Salah
Hybrid Memory Cube (HMC) is a revolutionary standard in DRAM architecture based on 3D integration. It provides marvelous concurrency and reduced latency. HMC uses CRC32 for data integrity, but conventional Serial CRC calculation is very slow and has long latencies, here we propose three methods to implement parallel CRC to be very fast. The first method uses symbolic toolbox in MATLAB to generate the final equations of the CRC, and then these equations are exported to VERILOG so that we are able to calculate it in only one clock cycle. The second method is depending on using an existing tool that can generate parallel CRC but this tool has a limitation on the input data width as it is less than the maximum allowed data width in HMC which is 1152 bits, so we were able to find a work around method that enable us to calculate CRC32 for large data widthwith this tool. The third method is based on using the polynomial mathematics for CRC, as the CRC can be calculated using long division method. Method 1 latency is one clock cycle, Method 2 latency is 2 clock cycles, and method 3 latency is 37 clock cycles compared to serial CRC which latency is 1152 clock cycles.
混合内存立方体(HMC)是基于3D集成的DRAM架构中的革命性标准。它提供了惊人的并发性并减少了延迟。HMC使用CRC32来保证数据的完整性,但是传统的串行CRC计算速度很慢,并且有很长的延迟,在这里我们提出三种方法来实现并行CRC,以达到非常快的速度。第一种方法是利用MATLAB中的符号工具箱生成CRC的最终方程,然后将这些方程导出到VERILOG中,这样我们就可以在一个时钟周期内进行计算。第二种方法依赖于使用可以生成并行CRC的现有工具,但该工具对输入数据宽度有限制,因为它小于HMC中允许的最大数据宽度,即1152位,因此我们能够找到一种绕过方法,使我们能够使用该工具计算大数据宽度的CRC32。第三种方法基于对CRC的多项式数学,可以使用长除法计算CRC。与串行CRC的1152时钟周期相比,方法1的时延为1个时钟周期,方法2的时延为2个时钟周期,方法3的时延为37个时钟周期。
{"title":"An online parallel CRC32 realization for Hybrid Memory Cube protocol","authors":"K. Salah","doi":"10.1109/ICENCO.2013.6736466","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736466","url":null,"abstract":"Hybrid Memory Cube (HMC) is a revolutionary standard in DRAM architecture based on 3D integration. It provides marvelous concurrency and reduced latency. HMC uses CRC32 for data integrity, but conventional Serial CRC calculation is very slow and has long latencies, here we propose three methods to implement parallel CRC to be very fast. The first method uses symbolic toolbox in MATLAB to generate the final equations of the CRC, and then these equations are exported to VERILOG so that we are able to calculate it in only one clock cycle. The second method is depending on using an existing tool that can generate parallel CRC but this tool has a limitation on the input data width as it is less than the maximum allowed data width in HMC which is 1152 bits, so we were able to find a work around method that enable us to calculate CRC32 for large data widthwith this tool. The third method is based on using the polynomial mathematics for CRC, as the CRC can be calculated using long division method. Method 1 latency is one clock cycle, Method 2 latency is 2 clock cycles, and method 3 latency is 37 clock cycles compared to serial CRC which latency is 1152 clock cycles.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124974552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 9th International Computer Engineering Conference (ICENCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1