首页 > 最新文献

2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)最新文献

英文 中文
Graph-Cuts Technique For Melanoma Segmentation Over Different Color Spaces 不同颜色空间上黑色素瘤分割的图形切割技术
Olusoji B. Akinrinade, Pius Adewale Owolawi, Chunling Tu, T. Mapayi
Application of automated image analysis techniques for the detection, diagnosis and management melanoma continues to be an active research area globally. Although a lot of progress has been made on the study of different automated methods of melanoma segmentation, there is still need for further improvement. This paper presents a study on the use of graph-cuts technique for the segmentation of melanoma in clinical images over four different color spaces. The four color spaces considered in this study are RGB, HSV, HSI and HSL. Experimental results show that the use of graph-cuts technique over all the four color spaces are very promising as the average accuracy rate of 96.98%, average sensitivity rate of 89.68%, average specificity rate of 98.96%, average precision rate of 96.34% and average f-score rate of 93,51% are achieved.
自动图像分析技术在黑色素瘤检测、诊断和管理中的应用一直是全球一个活跃的研究领域。虽然各种自动化的黑色素瘤分割方法的研究已经取得了很大的进展,但仍需要进一步的改进。本文提出了一项研究使用图形切割技术的黑色素瘤在临床图像的分割超过四个不同的颜色空间。本研究考虑的四个色彩空间分别是RGB、HSV、HSI和HSL。实验结果表明,在四种颜色空间上使用图形切割技术,平均准确率为96.98%,平均灵敏度为89.68%,平均特异性为98.96%,平均准确率为96.34%,平均f评分率为93.51%,具有良好的应用前景。
{"title":"Graph-Cuts Technique For Melanoma Segmentation Over Different Color Spaces","authors":"Olusoji B. Akinrinade, Pius Adewale Owolawi, Chunling Tu, T. Mapayi","doi":"10.1109/ICONIC.2018.8601269","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601269","url":null,"abstract":"Application of automated image analysis techniques for the detection, diagnosis and management melanoma continues to be an active research area globally. Although a lot of progress has been made on the study of different automated methods of melanoma segmentation, there is still need for further improvement. This paper presents a study on the use of graph-cuts technique for the segmentation of melanoma in clinical images over four different color spaces. The four color spaces considered in this study are RGB, HSV, HSI and HSL. Experimental results show that the use of graph-cuts technique over all the four color spaces are very promising as the average accuracy rate of 96.98%, average sensitivity rate of 89.68%, average specificity rate of 98.96%, average precision rate of 96.34% and average f-score rate of 93,51% are achieved.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117055891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICONIC 2018 TOC
{"title":"ICONIC 2018 TOC","authors":"","doi":"10.1109/iconic.2018.8601299","DOIUrl":"https://doi.org/10.1109/iconic.2018.8601299","url":null,"abstract":"","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121067267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Effects of Hardware Configurations on Bro under DDoS Attacks 评估DDoS攻击下硬件配置对Bro的影响
Welcome Luthuli, O. Oki, Paul Tarwireyi, M. Adigun
The exponential growth of network traffic and the growing sophistication of network attacks call for faster, efficient and scalable intrusion detection systems (IDS) that will be able to quickly look into the traffic and timeously produce alerts when malicious traffic has been detected. Snort has been the de-facto standard of IDS for so many years but has been ineffective under heavy loads. In both multi-core and single core hardware configuration snort shows no improvement in detection capability of Transmission Control Protocol (TCP) flooding Distributed Denial of Service (DDoS) attack. This has led to the development of alternative IDS which try to address the limitations of Snort. Bro is a flexible script-driven intrusion detection system, which provides a ‘worker’ based architecture to utilize multiple processors. The aim of this paper is to evaluate Bro in terms of performance and packet handling against TCP flooding DDoS attacks under different hardware configurations. To achieve this aim, Bro was installed on different hardware configurations. Tests were conducted to assess its performance under each configuration. Packet loss, Throughput and resource utilization metrics were measured. The results show that utilizing better hardware increases resources availability hence gives the system better performance.
网络流量的指数级增长和网络攻击的日益复杂,需要更快、更高效和可扩展的入侵检测系统(IDS),它将能够快速查看流量,并在检测到恶意流量时及时发出警报。Snort多年来一直是IDS的事实上的标准,但是在高负载下一直是无效的。在多核和单核硬件配置中,snort对传输控制协议(TCP)泛滥的分布式拒绝服务(DDoS)攻击的检测能力没有任何改进。这导致了替代IDS的开发,这些IDS试图解决Snort的局限性。Bro是一个灵活的脚本驱动的入侵检测系统,它提供了一个基于“工作者”的架构来利用多个处理器。本文的目的是评估Bro在不同硬件配置下对TCP泛洪DDoS攻击的性能和数据包处理。为了实现这一目标,将Bro安装在不同的硬件配置上。进行了测试,以评估其在每种配置下的性能。测量了丢包、吞吐量和资源利用率指标。结果表明,利用更好的硬件可以提高资源的可用性,从而提高系统的性能。
{"title":"Evaluating the Effects of Hardware Configurations on Bro under DDoS Attacks","authors":"Welcome Luthuli, O. Oki, Paul Tarwireyi, M. Adigun","doi":"10.1109/ICONIC.2018.8601247","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601247","url":null,"abstract":"The exponential growth of network traffic and the growing sophistication of network attacks call for faster, efficient and scalable intrusion detection systems (IDS) that will be able to quickly look into the traffic and timeously produce alerts when malicious traffic has been detected. Snort has been the de-facto standard of IDS for so many years but has been ineffective under heavy loads. In both multi-core and single core hardware configuration snort shows no improvement in detection capability of Transmission Control Protocol (TCP) flooding Distributed Denial of Service (DDoS) attack. This has led to the development of alternative IDS which try to address the limitations of Snort. Bro is a flexible script-driven intrusion detection system, which provides a ‘worker’ based architecture to utilize multiple processors. The aim of this paper is to evaluate Bro in terms of performance and packet handling against TCP flooding DDoS attacks under different hardware configurations. To achieve this aim, Bro was installed on different hardware configurations. Tests were conducted to assess its performance under each configuration. Packet loss, Throughput and resource utilization metrics were measured. The results show that utilizing better hardware increases resources availability hence gives the system better performance.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Neural Networks in Water Distribution Systems: A Literature Synopsis 配水系统中的人工神经网络:文献综述
T. Mosetlhe, Y. Hamam, Shengzhi Du, Y. Alayli
High computational requirements are commonly associated with the hydraulic simulation of large-scale water distribution. The convergence of the cumbersome iterative procedures involved has been a well-debated issue for the past decades. The large-scale and non-linear properties pose a great hindrance towards the development of online applications for water distribution network (WDN) analysis and pressure control thereof. Consequently, there has been a great interest in the deployment of model-free techniques to mimic the rather computationally expensive non-linear hydraulic simulations. As the hydraulic simulation based research is still being conducted, the advantages of model-free techniques make them more suitable alternatives. Artificial neural networks (ANN) is one of the most successful model-free methods for WDN analysis and management. In this paper, a literature synopsis of existing applications of model-free approaches in water distribution is presented. The technical advantages of applying such technique in a large-scale non-linear network are brought up in this paper.
大规模配水的水力模拟通常要求较高的计算量。在过去的几十年里,所涉及的繁琐迭代过程的收敛一直是一个备受争议的问题。配水网络的大规模和非线性特性对其在线分析和压力控制应用的发展造成了很大的阻碍。因此,人们对部署无模型技术来模拟计算成本相当高的非线性水力模拟非常感兴趣。由于基于水力仿真的研究仍在进行中,无模型技术的优点使其成为更合适的替代方案。人工神经网络(ANN)是WDN分析和管理中最成功的无模型方法之一。本文对无模型方法在水资源分配中的应用进行了文献综述。文中指出了该技术在大型非线性网络中应用的技术优势。
{"title":"Artificial Neural Networks in Water Distribution Systems: A Literature Synopsis","authors":"T. Mosetlhe, Y. Hamam, Shengzhi Du, Y. Alayli","doi":"10.1109/ICONIC.2018.8601090","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601090","url":null,"abstract":"High computational requirements are commonly associated with the hydraulic simulation of large-scale water distribution. The convergence of the cumbersome iterative procedures involved has been a well-debated issue for the past decades. The large-scale and non-linear properties pose a great hindrance towards the development of online applications for water distribution network (WDN) analysis and pressure control thereof. Consequently, there has been a great interest in the deployment of model-free techniques to mimic the rather computationally expensive non-linear hydraulic simulations. As the hydraulic simulation based research is still being conducted, the advantages of model-free techniques make them more suitable alternatives. Artificial neural networks (ANN) is one of the most successful model-free methods for WDN analysis and management. In this paper, a literature synopsis of existing applications of model-free approaches in water distribution is presented. The technical advantages of applying such technique in a large-scale non-linear network are brought up in this paper.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115024389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Access Control Framework for Protecting Personal Electronic Health Records 保护个人电子健康记录的访问控制框架
Ambrose Atuheire Izaara, Richard Ssembatya, Fred Kaggwa
The increasing expansion of wireless systems and the extensive popularity and usage of mobile devices such as mobile phones and wireless tablets represents a great opportunity to use mobile devices as widespread health data access tools. Unfortunately, some problems impeding the general acceptance of mhealth such as privacy protection, limitation of wireless networks and handheld devices are still common. Challenges such as unreliable data repositories and limited connection speeds in resource limited environments are also evident. The inadequate capabilities of hand-held devices and wireless systems make these Public Key Cryptography based frameworks unsuitable for mobile networks. Moreover, these protocols were designed to preserve customary flow of health data, which is vulnerable to attack and increase the user’s risk. This research drew its foundations from literature and theoretical review and used qualitative approaches. In this paper, the researchers build on existing concepts of Medical Information Systems and use of Symmetric Key Infrastructure to design a framework for secure access to personal electronic health records. The framework provides identity protection for a patient from all forms of unathorised data access. The framework not only reduces the computational operations between the engaging parties, but also achieves privacy protection for the user. Validation results from ICT experts demonstrate that the designed framework is applicable for secure access to personal medical health records in resource limited settings.
无线系统的不断扩展以及移动设备(如移动电话和无线平板电脑)的广泛普及和使用,为使用移动设备作为广泛的健康数据访问工具提供了一个很好的机会。不幸的是,一些阻碍人们普遍接受移动医疗的问题仍然很普遍,比如隐私保护、无线网络和手持设备的限制。在资源有限的环境中,诸如不可靠的数据存储库和有限的连接速度等挑战也很明显。手持设备和无线系统的能力不足使得这些基于公钥加密的框架不适合移动网络。此外,这些协议旨在保持健康数据的习惯流动,这些数据容易受到攻击,并增加用户的风险。本研究以文献和理论综述为基础,采用定性研究方法。在本文中,研究人员以现有的医疗信息系统概念和对称密钥基础设施的使用为基础,设计了一个安全访问个人电子健康记录的框架。该框架为患者提供身份保护,使其免受各种形式的未经授权的数据访问。该框架不仅减少了参与方之间的计算操作,而且实现了对用户隐私的保护。信通技术专家的验证结果表明,所设计的框架适用于在资源有限的情况下安全获取个人医疗健康记录。
{"title":"An Access Control Framework for Protecting Personal Electronic Health Records","authors":"Ambrose Atuheire Izaara, Richard Ssembatya, Fred Kaggwa","doi":"10.1109/ICONIC.2018.8601287","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601287","url":null,"abstract":"The increasing expansion of wireless systems and the extensive popularity and usage of mobile devices such as mobile phones and wireless tablets represents a great opportunity to use mobile devices as widespread health data access tools. Unfortunately, some problems impeding the general acceptance of mhealth such as privacy protection, limitation of wireless networks and handheld devices are still common. Challenges such as unreliable data repositories and limited connection speeds in resource limited environments are also evident. The inadequate capabilities of hand-held devices and wireless systems make these Public Key Cryptography based frameworks unsuitable for mobile networks. Moreover, these protocols were designed to preserve customary flow of health data, which is vulnerable to attack and increase the user’s risk. This research drew its foundations from literature and theoretical review and used qualitative approaches. In this paper, the researchers build on existing concepts of Medical Information Systems and use of Symmetric Key Infrastructure to design a framework for secure access to personal electronic health records. The framework provides identity protection for a patient from all forms of unathorised data access. The framework not only reduces the computational operations between the engaging parties, but also achieves privacy protection for the user. Validation results from ICT experts demonstrate that the designed framework is applicable for secure access to personal medical health records in resource limited settings.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Innovative Method for Power Factor Correction using a Solar Plant as a Source of Reactive Power 利用太阳能发电厂作为无功电源进行功率因数校正的创新方法
E. Malatji, Billy Chabangu
Due to the low power factor of an electrical system there is a high demand of reactive power from the transformers which results in overloading of the transformers. Traditionally, this problem is solved by adding a capacitor in parallel with the load in order to correct the power factor. In this paper a new innovative method which utilizes the solar plant at night when it is idling or during the day when it is not producing real power. During these times a solar plant is used as a source of reactive power, the inverters used in solar plants are capable of being used as a source of reactive power. The case study used to test this innovative method is a food processing plant with multiple transformers. The results show that it is possible to use a solar plant for power factor correction and hence relieve the transformers from overloading issues.
由于电力系统的低功率因数,变压器的无功功率需求很高,导致变压器过载。传统上,这个问题是通过在负载上并联一个电容器来修正功率因数来解决的。本文提出了一种利用太阳能发电厂在夜间空转或白天不发电时进行发电的创新方法。在这些时候,太阳能发电厂被用作无功功率的来源,太阳能发电厂中使用的逆变器能够被用作无功功率的来源。用于测试这种创新方法的案例研究是一个具有多个变压器的食品加工厂。结果表明,可以使用太阳能发电厂进行功率因数校正,从而减轻变压器过载问题。
{"title":"Innovative Method for Power Factor Correction using a Solar Plant as a Source of Reactive Power","authors":"E. Malatji, Billy Chabangu","doi":"10.1109/ICONIC.2018.8601214","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601214","url":null,"abstract":"Due to the low power factor of an electrical system there is a high demand of reactive power from the transformers which results in overloading of the transformers. Traditionally, this problem is solved by adding a capacitor in parallel with the load in order to correct the power factor. In this paper a new innovative method which utilizes the solar plant at night when it is idling or during the day when it is not producing real power. During these times a solar plant is used as a source of reactive power, the inverters used in solar plants are capable of being used as a source of reactive power. The case study used to test this innovative method is a food processing plant with multiple transformers. The results show that it is possible to use a solar plant for power factor correction and hence relieve the transformers from overloading issues.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"377 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116610694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual Private Network’s Impact on Network Performance 虚拟专用网对网络性能的影响
Claude Nawej, Shengzhi Du
We categorized VPN’s impact in to two different aspects; The affecting aspect, and the affected aspect. The affecting aspect of the impact encompasses factors such as security, algorithms, hardware, and software. Whereas the affected aspect is of the likes of network performance. While VPNs have managed to integrate security, one of the affecting aspect of the impact on one hand, on the other hand, VPNs should be regarded as a potential threat to network performance. In this study, for affordability purpose, we choose to use NS-2 simulated test-bed to shed light on the VPN’s performance impact in a network. Considering the most common network performance metrics, throughput and delay; we assessed these performance metrics by means of average and percentage changes theories. The findings emphasize quantitative impact on the TCP/IP throughput than on its counterpart UDP/IP. We finally developed an analytical equation to model this VPN’s performance impact.
我们将VPN的影响分为两个不同的方面;影响的一面,和被影响的一面。影响的方面包括安全、算法、硬件和软件等因素。而受影响的方面是网络性能。虽然vpn已经设法集成了安全性,一方面影响了一方面方面的影响,另一方面,应将vpn视为对网络性能的潜在威胁。在本研究中,出于可负担性的考虑,我们选择使用NS-2模拟测试平台来阐明VPN在网络中的性能影响。考虑到最常见的网络性能指标,吞吐量和延迟;我们通过平均和百分比变化理论来评估这些性能指标。研究结果强调了对TCP/IP吞吐量的定量影响,而不是对其对应的UDP/IP。我们最终开发了一个解析方程来模拟该VPN的性能影响。
{"title":"Virtual Private Network’s Impact on Network Performance","authors":"Claude Nawej, Shengzhi Du","doi":"10.1109/ICONIC.2018.8601281","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601281","url":null,"abstract":"We categorized VPN’s impact in to two different aspects; The affecting aspect, and the affected aspect. The affecting aspect of the impact encompasses factors such as security, algorithms, hardware, and software. Whereas the affected aspect is of the likes of network performance. While VPNs have managed to integrate security, one of the affecting aspect of the impact on one hand, on the other hand, VPNs should be regarded as a potential threat to network performance. In this study, for affordability purpose, we choose to use NS-2 simulated test-bed to shed light on the VPN’s performance impact in a network. Considering the most common network performance metrics, throughput and delay; we assessed these performance metrics by means of average and percentage changes theories. The findings emphasize quantitative impact on the TCP/IP throughput than on its counterpart UDP/IP. We finally developed an analytical equation to model this VPN’s performance impact.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Real-time Multiple Vehicle Detection using a Rear Camera Mounted on a Vehicle 使用安装在车辆上的后置摄像头进行实时多车检测
Olivier Oheka, Chunling Tu
An increase in demand for traffic monitoring of densely populated areas has been the subject of many discussions concerning the security on the road. Cameras and other sensors are used to monitor, identify and manage potential incidents that can occur. Therefore, there is a need for computer vision system and algorithms to detect and track vehicles, which will facilitate the management of traffic and driving assistance. In this paper, a vehicle detection and tracking system is proposed using an efficient background cancelation technique and Haar-like features with a modified Adaboost algorithm in a cascade configuration for maximum accuracy and robustness. The proposed system is implemented on a passenger car with a camera mounted at the rear to detect vehicles behind it. Video data are collected and processed in real-time and the performance of the system is verified experimentally.
对人口稠密地区的交通监测需求的增加已成为许多关于道路安全的讨论的主题。摄像头和其他传感器用于监控、识别和管理可能发生的潜在事故。因此,需要计算机视觉系统和算法来检测和跟踪车辆,这将有助于交通管理和驾驶辅助。本文提出了一种车辆检测和跟踪系统,该系统采用有效的背景消除技术和haar样特征,并在级联配置中使用改进的Adaboost算法,以获得最大的精度和鲁棒性。该系统安装在一辆乘用车上,其后部安装了一个摄像头,用于探测后面的车辆。对视频数据进行了实时采集和处理,并通过实验验证了系统的性能。
{"title":"Real-time Multiple Vehicle Detection using a Rear Camera Mounted on a Vehicle","authors":"Olivier Oheka, Chunling Tu","doi":"10.1109/ICONIC.2018.8601211","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601211","url":null,"abstract":"An increase in demand for traffic monitoring of densely populated areas has been the subject of many discussions concerning the security on the road. Cameras and other sensors are used to monitor, identify and manage potential incidents that can occur. Therefore, there is a need for computer vision system and algorithms to detect and track vehicles, which will facilitate the management of traffic and driving assistance. In this paper, a vehicle detection and tracking system is proposed using an efficient background cancelation technique and Haar-like features with a modified Adaboost algorithm in a cascade configuration for maximum accuracy and robustness. The proposed system is implemented on a passenger car with a camera mounted at the rear to detect vehicles behind it. Video data are collected and processed in real-time and the performance of the system is verified experimentally.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117176511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Advanced Multiplier Design and Implementation using Hancarlson Adder 高级乘法器的设计与实现
E. Rao, T. Ramanjaneyulu, K. J. Kumar
Finite Impulse Response (FIR) filters, microprocessors and digital signal processors are the core system of multipliers. The Multiplier and Accumulator Unit (MAC) is the predominant block in a Digital Signal Processing (DSP) system. The objective of MAC is implementation of signal processing with high performance but multiplier most of the time occupies much area and become power consuming circuits. In this paper, a Modified Russian Peasant Multiplier (MRPM) using Hancarlson adder (HA) has been proposed. According to Russian Rules, a Divide and conquer technique is used in the multiplication process. But, in the perspective of digital design, only shifters and adders are used in the Russian Peasant Multiplier (RPM) to produce a Partial Product Generation (PPG). In this paper, we present an approach towards the reduction of delay in existing RPM by using HA, in the partial product reduction stage and proposed RPM with HA at Partial Product Addition (PPA). The proposed design is also compared to the RPM with Ripple Carry Adder (RCA), Carry Selector Adder (CSA) and 8-2 Adder Compressors (AC) in terms of propagation delay. The proposed design enhances speed of the system by 80.4% compared to the RPM using RCA, 81.7% compared to RPM using CSA and 77.5% compare to RPM with 8:2 adder compressors (AC’s). The total operation is coded with Verilog Hardware Description language (HDL) using Model-Sim 6.3C, synthesized by using the Xilinx Integrated Software Environment (ISE) 14.7 design tool.
有限脉冲响应(FIR)滤波器、微处理器和数字信号处理器是乘法器的核心系统。乘法器和累加器单元(MAC)是数字信号处理(DSP)系统中的主要模块。MAC的目标是实现高性能的信号处理,但乘法器往往占用大量的面积,成为耗电电路。本文提出了一种基于汉卡尔森加法器(HA)的改良俄国农民乘数(MRPM)。根据俄罗斯规则,在乘法过程中使用分而治之的技术。但是,从数字设计的角度来看,在俄罗斯农民乘数(RPM)中仅使用移位器和加法器来产生部分产品生成(PPG)。在本文中,我们提出了一种在部分产品还原阶段使用HA来减少现有RPM延迟的方法,并提出了在部分产品添加(PPA)时使用HA的RPM。在传输延迟方面,还将所提出的设计与带有纹波进位加法器(RCA)、进位选择加法器(CSA)和8-2加法器压缩器(AC)的RPM进行了比较。与使用RCA的RPM相比,所提出的设计将系统的速度提高了80.4%,与使用CSA的RPM相比提高了81.7%,与使用8:2加法器压缩机(AC)的RPM相比提高了77.5%。整个操作使用Verilog硬件描述语言(HDL)进行编码,使用Model-Sim 6.3C,使用Xilinx集成软件环境(ISE) 14.7设计工具进行合成。
{"title":"Advanced Multiplier Design and Implementation using Hancarlson Adder","authors":"E. Rao, T. Ramanjaneyulu, K. J. Kumar","doi":"10.1109/ICONIC.2018.8601252","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601252","url":null,"abstract":"Finite Impulse Response (FIR) filters, microprocessors and digital signal processors are the core system of multipliers. The Multiplier and Accumulator Unit (MAC) is the predominant block in a Digital Signal Processing (DSP) system. The objective of MAC is implementation of signal processing with high performance but multiplier most of the time occupies much area and become power consuming circuits. In this paper, a Modified Russian Peasant Multiplier (MRPM) using Hancarlson adder (HA) has been proposed. According to Russian Rules, a Divide and conquer technique is used in the multiplication process. But, in the perspective of digital design, only shifters and adders are used in the Russian Peasant Multiplier (RPM) to produce a Partial Product Generation (PPG). In this paper, we present an approach towards the reduction of delay in existing RPM by using HA, in the partial product reduction stage and proposed RPM with HA at Partial Product Addition (PPA). The proposed design is also compared to the RPM with Ripple Carry Adder (RCA), Carry Selector Adder (CSA) and 8-2 Adder Compressors (AC) in terms of propagation delay. The proposed design enhances speed of the system by 80.4% compared to the RPM using RCA, 81.7% compared to RPM using CSA and 77.5% compare to RPM with 8:2 adder compressors (AC’s). The total operation is coded with Verilog Hardware Description language (HDL) using Model-Sim 6.3C, synthesized by using the Xilinx Integrated Software Environment (ISE) 14.7 design tool.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Criteria Model for Users Trust Management in Ad-hoc Mobile Cloud Computing 自组织移动云计算中用户信任管理的多准则模型
A. T. Akinola, M. Adigun
Ad-hoc Mobile Cloud (AMC) came up as a result of the need to alleviate the inadvertent and incessant connectivity challenges that are experienced in Mobile Cloud computing (MCC). Thus, mobile devices teamed up in groups to share their resources among one another which are majorly Web Services, Storage and Computing resources. However, potential participants in AMC often feel a level of insecurity as they envisaged loss of control over various personal and confidential data in their mobile devices which can occur in the course of sharing of resources. Therefore, AMC as a service provisioning paradigm for mobile device users has a need for an implementation of a trust management system to serve as a protection and guarantee of confidence for intended AMC participants. This study proposed a Multi-Criteria Trust Management system (MCTM) architecture for AMC to protect the interest of various participating mobile devices. This system provides an avenue to identify trustworthy mobile devices to whom they can carry out resource sharing and as well alert or notify them of any malicious act that could have happened. We carried out a simple evaluation procedure with a number of incorrect service matches in the course of responding to a query as well as comparing the level of precision attained by the proposed architecture with already existing research. The proposed system proves to give a maximum confidence to mobile users to show high interest in participating in the AMC system.
Ad-hoc移动云(AMC)的出现是为了缓解移动云计算(MCC)中遇到的无意和持续的连接挑战。因此,移动设备组成小组,在彼此之间共享资源,这些资源主要是Web服务、存储和计算资源。然而,AMC的潜在参与者通常会感到一定程度的不安全感,因为他们设想在资源共享过程中可能会失去对移动设备中各种个人和机密数据的控制。因此,AMC作为移动设备用户的服务提供范例,需要一个信任管理系统的实现,以保护和保证预期的AMC参与者的信心。本研究提出一种多准则信任管理系统(Multi-Criteria Trust Management system, MCTM)架构,以保护各参与行动装置的利益。该系统提供了一种途径来识别值得信赖的移动设备,他们可以对其进行资源共享,并警告或通知他们可能发生的任何恶意行为。在响应查询的过程中,我们执行了一个简单的评估过程,其中包含了许多不正确的服务匹配,并将所提出的体系结构所获得的精度水平与已有的研究进行了比较。实验证明,该系统能够最大程度地保证移动用户对参与AMC系统表现出较高的兴趣。
{"title":"A Multi-Criteria Model for Users Trust Management in Ad-hoc Mobile Cloud Computing","authors":"A. T. Akinola, M. Adigun","doi":"10.1109/ICONIC.2018.8601095","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601095","url":null,"abstract":"Ad-hoc Mobile Cloud (AMC) came up as a result of the need to alleviate the inadvertent and incessant connectivity challenges that are experienced in Mobile Cloud computing (MCC). Thus, mobile devices teamed up in groups to share their resources among one another which are majorly Web Services, Storage and Computing resources. However, potential participants in AMC often feel a level of insecurity as they envisaged loss of control over various personal and confidential data in their mobile devices which can occur in the course of sharing of resources. Therefore, AMC as a service provisioning paradigm for mobile device users has a need for an implementation of a trust management system to serve as a protection and guarantee of confidence for intended AMC participants. This study proposed a Multi-Criteria Trust Management system (MCTM) architecture for AMC to protect the interest of various participating mobile devices. This system provides an avenue to identify trustworthy mobile devices to whom they can carry out resource sharing and as well alert or notify them of any malicious act that could have happened. We carried out a simple evaluation procedure with a number of incorrect service matches in the course of responding to a query as well as comparing the level of precision attained by the proposed architecture with already existing research. The proposed system proves to give a maximum confidence to mobile users to show high interest in participating in the AMC system.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1