首页 > 最新文献

2013 8th International Conference on Computer Engineering & Systems (ICCES)最新文献

英文 中文
LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography LSBase:一个密钥封装方案,用于改进使用DNA隐写术的混合密码系统
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707182
A. Khalifa
A hybrid cryptosystem is itself a public-key system, whose public and private keys are the same as in the key encapsulation scheme. In this paper, DNA-steganography and cryptography are used together such that the key distribution process is improved without any sacrifice in security. That is, the session key is hidden inside a chosen DNA sequence and hence can be securely exchanged between parties through public channels such as the internet. The proposed steganographic algorithm; called LSBase, uses the codon degeneracy as an efficient way to hide secret information within DNA sequences without actually affecting the type or structure of the protein they code for. Furthermore, the extraction process can be done blindly without any need to the reference sequence.
混合密码系统本身就是一个公钥系统,其公钥和私钥与密钥封装方案中的公钥和私钥相同。本文将dna隐写术与密码学结合使用,在不牺牲安全性的前提下改进了密钥分发过程。也就是说,会话密钥隐藏在选定的DNA序列中,因此可以通过internet等公共渠道在各方之间安全地交换。提出的隐写算法;该项目名为LSBase,利用密码子简并作为一种有效的方法,在DNA序列中隐藏秘密信息,而不会影响它们所编码的蛋白质的类型或结构。此外,提取过程可以在不需要参考序列的情况下盲目进行。
{"title":"LSBase: A key encapsulation scheme to improve hybrid crypto-systems using DNA steganography","authors":"A. Khalifa","doi":"10.1109/ICCES.2013.6707182","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707182","url":null,"abstract":"A hybrid cryptosystem is itself a public-key system, whose public and private keys are the same as in the key encapsulation scheme. In this paper, DNA-steganography and cryptography are used together such that the key distribution process is improved without any sacrifice in security. That is, the session key is hidden inside a chosen DNA sequence and hence can be securely exchanged between parties through public channels such as the internet. The proposed steganographic algorithm; called LSBase, uses the codon degeneracy as an efficient way to hide secret information within DNA sequences without actually affecting the type or structure of the protein they code for. Furthermore, the extraction process can be done blindly without any need to the reference sequence.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A new hybrid security allocation steganography algorithm 一种新的混合安全分配隐写算法
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707207
M. Tayel, Alaa El-Din Sayed Hafez, H. Zied
Security, authentication, and identification are essential requirement for confidential data transmission. The will known methods of data encryption attain certain security levels, they make the encrypted data unreadable and unnatural this attracts some unintended observer attention. To search for a higher security approach, Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other converts the message into an unreadable format. This paper, describes a method for integrating the advantages of Cryptography and Steganography together through image processing. The paper introduces a New Hybrid Security message Allocation Algorithm (NHSA) to achieve a higher level of security. The statistical evaluation of this system shows that, a higher PSNR and MSE are achieved comparing with the other systems.
安全、认证和识别是机密数据传输的基本要求。已知的数据加密方法达到一定的安全级别,它们使加密的数据不可读和不自然,这吸引了一些意想不到的观察者的注意。为了寻找更高安全性的方法,隐写术和密码学是两种流行的以秘密方式发送重要信息的方法。一个隐藏消息的存在,另一个将消息转换为不可读的格式。本文介绍了一种通过图像处理将密码学和隐写术的优点结合起来的方法。为了实现更高的安全性,本文提出了一种新的混合安全消息分配算法(NHSA)。对该系统的统计评价表明,与其他系统相比,该系统具有更高的PSNR和MSE。
{"title":"A new hybrid security allocation steganography algorithm","authors":"M. Tayel, Alaa El-Din Sayed Hafez, H. Zied","doi":"10.1109/ICCES.2013.6707207","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707207","url":null,"abstract":"Security, authentication, and identification are essential requirement for confidential data transmission. The will known methods of data encryption attain certain security levels, they make the encrypted data unreadable and unnatural this attracts some unintended observer attention. To search for a higher security approach, Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other converts the message into an unreadable format. This paper, describes a method for integrating the advantages of Cryptography and Steganography together through image processing. The paper introduces a New Hybrid Security message Allocation Algorithm (NHSA) to achieve a higher level of security. The statistical evaluation of this system shows that, a higher PSNR and MSE are achieved comparing with the other systems.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A dynamic uplink scheduling scheme for WiMAX networks 一种用于WiMAX网络的动态上行调度方案
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707183
Nada El-shennawy, M. Youssef, M. El-Derini, M. Fahmy
Over the past few years, there has been a rapid growth of new services such as online video games, video conferences, and multimedia services to end users. WiMAX is an emerging technology for next generation wireless networks which supports a large number of users. To achieve Quality of Service (QoS) requirements, an efficient and reliable scheduling algorithm is urgently needed. Among a large number of the proposed approaches in the literature, a variably weighted round robin scheduling algorithm (VWRR) has been proven to provide the best performance in an IP backbone network with no attempts on WiMAX networks. This paper proposes a dynamic uplink scheduling algorithm for WiMAX networks based on VWRR to allocate the bandwidth to users to maximize the throughput and ensure the constraints of delay, jitter, and load. A comparative study between the proposed scheduling algorithm and the two most famous scheduling algorithms: weighted round robin algorithm (WRR) and modified deficit round robin algorithm (MDRR) over WiMAX networks, is presented. Simulation results obtained using OPNET reveal that the proposed algorithm has a superior performance compared with WRR with respect to throughput, delay, jitter, and load. Additionally, the proposed scheduling algorithm is shown to provide an excellent level of reliability and scalability when increasing the number of served subscriber stations.
在过去几年中,针对终端用户的在线视频游戏、视频会议和多媒体服务等新业务迅速增长。WiMAX是支持大量用户的下一代无线网络的新兴技术。为了满足服务质量(QoS)的要求,迫切需要一种高效可靠的调度算法。在文献中提出的大量方法中,可变加权轮询调度算法(VWRR)已被证明可以在IP骨干网中提供最佳性能,而无需尝试在WiMAX网络上进行调度。本文提出了一种基于VWRR的WiMAX网络动态上行调度算法,将带宽分配给用户,实现吞吐量最大化,同时保证时延、抖动和负载约束。将该调度算法与WiMAX网络上最著名的加权轮询算法(WRR)和改进赤字轮询算法(MDRR)进行了比较研究。基于OPNET的仿真结果表明,该算法在吞吐量、时延、抖动和负载等方面都优于WRR算法。此外,当增加服务用户站的数量时,所提出的调度算法提供了良好的可靠性和可扩展性。
{"title":"A dynamic uplink scheduling scheme for WiMAX networks","authors":"Nada El-shennawy, M. Youssef, M. El-Derini, M. Fahmy","doi":"10.1109/ICCES.2013.6707183","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707183","url":null,"abstract":"Over the past few years, there has been a rapid growth of new services such as online video games, video conferences, and multimedia services to end users. WiMAX is an emerging technology for next generation wireless networks which supports a large number of users. To achieve Quality of Service (QoS) requirements, an efficient and reliable scheduling algorithm is urgently needed. Among a large number of the proposed approaches in the literature, a variably weighted round robin scheduling algorithm (VWRR) has been proven to provide the best performance in an IP backbone network with no attempts on WiMAX networks. This paper proposes a dynamic uplink scheduling algorithm for WiMAX networks based on VWRR to allocate the bandwidth to users to maximize the throughput and ensure the constraints of delay, jitter, and load. A comparative study between the proposed scheduling algorithm and the two most famous scheduling algorithms: weighted round robin algorithm (WRR) and modified deficit round robin algorithm (MDRR) over WiMAX networks, is presented. Simulation results obtained using OPNET reveal that the proposed algorithm has a superior performance compared with WRR with respect to throughput, delay, jitter, and load. Additionally, the proposed scheduling algorithm is shown to provide an excellent level of reliability and scalability when increasing the number of served subscriber stations.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117043619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Learning cross-domain social knowledge from cognitive scripts 从认知脚本中学习跨领域社会知识
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707163
M. Gawish, Safia Abbas, M. Mostafa, Abdel-badeeh M. Salem
Creating artificial intelligence (AI) agents with computational models based on human cognitive abilities is an ongoing research area. This paper proposes a new evolutionary cognitive model for cross-domain learning, which aims to improve the cognitive learning process by extracting new experienced knowledge from pre-existing socio-cultural cognitive scripts. This knowledge is necessary for the Al agents to develop learning for the current faced social situation (Target). The model depends basically on two phases; the retrieval phase and the learning phase. In the retrieval phase, Pharaoh algorithm is utilized to retrieve the most relevant cognitive script (Base) to the target script considering the context. Whereas, the learning phase employs evolutional processes to enrich the target script. Finally, the enriched script replaces the target script in the evolved script-base in order to be used in the learning and retrieval phases again.
利用基于人类认知能力的计算模型创建人工智能(AI)代理是一个正在进行的研究领域。本文提出了一种新的跨领域学习的进化认知模型,该模型旨在通过从已有的社会文化认知脚本中提取新的经验知识来改善认知学习过程。这些知识对于ai智能体针对当前面临的社会状况进行学习是必要的(目标)。该模型主要依赖于两个阶段;检索阶段和学习阶段。在检索阶段,利用法老算法根据上下文将最相关的认知文字(Base)检索到目标文字。而学习阶段则采用进化过程来丰富目标脚本。最后,改进后的脚本将替换进化后的脚本库中的目标脚本,以便再次用于学习和检索阶段。
{"title":"Learning cross-domain social knowledge from cognitive scripts","authors":"M. Gawish, Safia Abbas, M. Mostafa, Abdel-badeeh M. Salem","doi":"10.1109/ICCES.2013.6707163","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707163","url":null,"abstract":"Creating artificial intelligence (AI) agents with computational models based on human cognitive abilities is an ongoing research area. This paper proposes a new evolutionary cognitive model for cross-domain learning, which aims to improve the cognitive learning process by extracting new experienced knowledge from pre-existing socio-cultural cognitive scripts. This knowledge is necessary for the Al agents to develop learning for the current faced social situation (Target). The model depends basically on two phases; the retrieval phase and the learning phase. In the retrieval phase, Pharaoh algorithm is utilized to retrieve the most relevant cognitive script (Base) to the target script considering the context. Whereas, the learning phase employs evolutional processes to enrich the target script. Finally, the enriched script replaces the target script in the evolved script-base in order to be used in the learning and retrieval phases again.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114761547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A robust owner-to-user data sharing framework in honest but curious cloud environments 在诚实但奇怪的云环境中,一个健壮的所有者对用户数据共享框架
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707170
Ibrahim M. Ibrahim, S.H. Nour El-Din, R. Elgohary, H. Faheem, M. Mostafa
This paper proposes robust owner to user framework for secure data sharing in honest but curious cloud environments. The proposed framework presents a robust solution to accomplish the honest but curious cloud environments desired features such as data confidentiality, scalability, fine-grained data access, efficient user revocation, stateless cloud, preventing colluding users from accessing unauthorized data and generic construction. Furthermore, the proposed framework exploits the public key infrastructure (PKI) desired security features to provide an access control mechanism to prevent colluding users to access unauthorized data. Moreover, the proposed framework counters the attack of the rejoining of a revoked user authorized with different attributes to gain access to his previously authorized data. In addition, the proposed framework prohibits the collusion between an authorized user and a revoked user to possess the access privileges once assigned to the revoked user. This is accomplished with the aid of using dual signature technique. Moreover, the proposed framework capitalizes the existence of PKI to maximize the usage of offline operations to enhance the framework performance. Also, the proposed framework makes use of PKI to offer a secure transmission of private data and defends man in the middle attack. The implementation and the complexity analysis of the proposed framework express the framework practicability.
本文提出了一个健壮的所有者到用户框架,用于在诚实但好奇的云环境中安全共享数据。所提出的框架提供了一个健壮的解决方案,以实现诚实但好奇的云环境所需的功能,如数据机密性、可扩展性、细粒度数据访问、有效的用户撤销、无状态云、防止串通用户访问未经授权的数据和通用结构。此外,所提出的框架利用公钥基础设施(PKI)所需的安全特性提供访问控制机制,以防止串通用户访问未经授权的数据。此外,所提出的框架还可以防止被撤销的用户重新加入具有不同属性的用户以访问其先前授权的数据的攻击。此外,建议的框架禁止授权用户和被撤销用户之间的勾结,以拥有曾经分配给被撤销用户的访问权限。这是借助双重签名技术完成的。此外,所提出的框架利用PKI的存在来最大限度地利用离线操作来提高框架的性能。此外,该框架还利用PKI提供了私有数据的安全传输,并防御了中间人攻击。该框架的实现和复杂度分析表明了该框架的实用性。
{"title":"A robust owner-to-user data sharing framework in honest but curious cloud environments","authors":"Ibrahim M. Ibrahim, S.H. Nour El-Din, R. Elgohary, H. Faheem, M. Mostafa","doi":"10.1109/ICCES.2013.6707170","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707170","url":null,"abstract":"This paper proposes robust owner to user framework for secure data sharing in honest but curious cloud environments. The proposed framework presents a robust solution to accomplish the honest but curious cloud environments desired features such as data confidentiality, scalability, fine-grained data access, efficient user revocation, stateless cloud, preventing colluding users from accessing unauthorized data and generic construction. Furthermore, the proposed framework exploits the public key infrastructure (PKI) desired security features to provide an access control mechanism to prevent colluding users to access unauthorized data. Moreover, the proposed framework counters the attack of the rejoining of a revoked user authorized with different attributes to gain access to his previously authorized data. In addition, the proposed framework prohibits the collusion between an authorized user and a revoked user to possess the access privileges once assigned to the revoked user. This is accomplished with the aid of using dual signature technique. Moreover, the proposed framework capitalizes the existence of PKI to maximize the usage of offline operations to enhance the framework performance. Also, the proposed framework makes use of PKI to offer a secure transmission of private data and defends man in the middle attack. The implementation and the complexity analysis of the proposed framework express the framework practicability.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126198854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient elliptic curve parallel scalar multiplication methods 高效的椭圆曲线并行标量乘法方法
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707184
Ahmed AL-Otaibi, T. Al-Somani, P. Beckett
In this paper we compare the computational complexity of two parallel scalar multiplication methods used to speed up scalar multiplications for Elliptic Curve Cryptography applications. Pre-computations are advantageous only when the elliptic curve point is fixed. However, during secure communication sessions using either public keys or digital signatures, the elliptic curve point depends on the public key of the communicating entities and is therefore session dependent. Hence, a second method that replaces pre-computations with some post-computations, allows the pre-computation overhead to be distributed amongst parallel processors. Thus scalar multiplication can be computed more efficiently using the post-computation method in the more typical case where the elliptic curve point is variable.
本文比较了椭圆曲线密码中用于加速标量乘法的两种并行标量乘法的计算复杂度。只有当椭圆曲线点固定时,预计算才有优势。但是,在使用公钥或数字签名的安全通信会话期间,椭圆曲线点依赖于通信实体的公钥,因此依赖于会话。因此,第二种方法是用一些后计算代替预计算,允许在并行处理器之间分配预计算开销。因此,在椭圆曲线点可变的较为典型的情况下,使用后算方法可以更有效地计算标量乘法。
{"title":"Efficient elliptic curve parallel scalar multiplication methods","authors":"Ahmed AL-Otaibi, T. Al-Somani, P. Beckett","doi":"10.1109/ICCES.2013.6707184","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707184","url":null,"abstract":"In this paper we compare the computational complexity of two parallel scalar multiplication methods used to speed up scalar multiplications for Elliptic Curve Cryptography applications. Pre-computations are advantageous only when the elliptic curve point is fixed. However, during secure communication sessions using either public keys or digital signatures, the elliptic curve point depends on the public key of the communicating entities and is therefore session dependent. Hence, a second method that replaces pre-computations with some post-computations, allows the pre-computation overhead to be distributed amongst parallel processors. Thus scalar multiplication can be computed more efficiently using the post-computation method in the more typical case where the elliptic curve point is variable.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122237834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of shift estimation techniques of super resolution applied to satellite images 卫星图像超分辨率偏移估计技术分析
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707210
Marwa Moustafa, H. M. Ebied, A. Helmy
There is a high demand for high-resolution satellite sensing in modern application. Super Resolution (SR) offers an affordable solution for this high demand. The accuracy of super resolution depends on the accuracy of determining the difference between the low-resolution images. Shift estimation is the first and the most critical step in super resolution. This paper discusses shift estimation techniques in both spatial and frequency domains. It compares Vandewalle algorithm, Lucchese algorithm and Keran algorithm. Two real satellite images (SPOT-5) are used in the experiment. The images have -0.5 and 0.5 sub pixel shift in the horizontal and vertical directions respectively. The experimental results show that the Estimation shift parameters in spatial domain methods outperform the frequency domain methods.
在现代应用中,对高分辨率卫星遥感有很高的要求。超分辨率(SR)为这种高需求提供了一种经济实惠的解决方案。超分辨率的精度取决于确定低分辨率图像之间差异的精度。偏移估计是实现超分辨率的第一步,也是最关键的一步。本文讨论了空间域和频域的移位估计技术。比较了Vandewalle算法、Lucchese算法和Keran算法。实验中使用了两张真实的卫星图像(SPOT-5)。图像在水平和垂直方向上分别有-0.5和0.5亚像素的位移。实验结果表明,空间域方法的估计位移参数优于频域方法。
{"title":"Analysis of shift estimation techniques of super resolution applied to satellite images","authors":"Marwa Moustafa, H. M. Ebied, A. Helmy","doi":"10.1109/ICCES.2013.6707210","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707210","url":null,"abstract":"There is a high demand for high-resolution satellite sensing in modern application. Super Resolution (SR) offers an affordable solution for this high demand. The accuracy of super resolution depends on the accuracy of determining the difference between the low-resolution images. Shift estimation is the first and the most critical step in super resolution. This paper discusses shift estimation techniques in both spatial and frequency domains. It compares Vandewalle algorithm, Lucchese algorithm and Keran algorithm. Two real satellite images (SPOT-5) are used in the experiment. The images have -0.5 and 0.5 sub pixel shift in the horizontal and vertical directions respectively. The experimental results show that the Estimation shift parameters in spatial domain methods outperform the frequency domain methods.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131919549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of 3D feature registration techniques for indoor mapping 室内测绘三维特征配准技术比较
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707211
Doaa M. A.-Latif, M. A. Salem, H. Ramadan, Mohamed Roushdy
Maps are used extensively to understand the surrounding environment and to navigate through it. This has motivated research in localization and mapping and as a result numerous algorithms have been proposed to construct different types of maps. The mapping problem involves many difficulties such as: the estimation of the sensor position and orientation at each observation, the correct interpretation of data and the error minimization in aligning observations. In this paper a comprehensive overview of the visual SLAM problem is provided along with a comparison of different algorithms used in the construction of 3D maps. The algorithms have been tested on standard 3D datasets of indoor environments.
地图被广泛用于了解周围环境并在其中导航。这激发了对定位和地图的研究,并因此提出了许多算法来构建不同类型的地图。映射问题涉及到许多困难,如:每次观测时传感器位置和方向的估计,数据的正确解释以及对齐观测时误差的最小化。本文对可视化SLAM问题进行了全面的概述,并对用于构建3D地图的不同算法进行了比较。这些算法已经在室内环境的标准3D数据集上进行了测试。
{"title":"Comparison of 3D feature registration techniques for indoor mapping","authors":"Doaa M. A.-Latif, M. A. Salem, H. Ramadan, Mohamed Roushdy","doi":"10.1109/ICCES.2013.6707211","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707211","url":null,"abstract":"Maps are used extensively to understand the surrounding environment and to navigate through it. This has motivated research in localization and mapping and as a result numerous algorithms have been proposed to construct different types of maps. The mapping problem involves many difficulties such as: the estimation of the sensor position and orientation at each observation, the correct interpretation of data and the error minimization in aligning observations. In this paper a comprehensive overview of the visual SLAM problem is provided along with a comparison of different algorithms used in the construction of 3D maps. The algorithms have been tested on standard 3D datasets of indoor environments.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115349260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and implementation of course timetabling system based on genetic algorithm 基于遗传算法的课程排课系统设计与实现
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707195
Hamdy M. Mousa, A. El-Sisi
University course timetabling is one of the most important and time-consuming problem which takes place frequently in all the educational institutes. This paper proposes design and implementation system to generate timetable based on genetic algorithm using different combinations selection algorithm and mutation types. Two cases small problem and big problem are studied. The results show that two cases tournament selection is giving solutions better than roulette wheel Selection. The worst pair is roulette wheel selection and mutation. Mutation error method helps to reach to the best solution faster. In case of conflicts and no solution, our system generates a report, containing conflict constraints that must be remove or modified.
大学课程排课是一个重要而费时的问题,在各个教育机构中都经常发生。本文提出了基于遗传算法的时刻表生成系统的设计与实现,采用不同的组合选择算法和突变类型。研究了小问题和大问题两种情况。结果表明,两种情况下的锦标赛选择比轮盘赌选择给出的解更好。最糟糕的一对是轮盘选择和突变。突变误差法有助于更快地得到最优解。在冲突和没有解决方案的情况下,我们的系统生成一个报告,其中包含必须删除或修改的冲突约束。
{"title":"Design and implementation of course timetabling system based on genetic algorithm","authors":"Hamdy M. Mousa, A. El-Sisi","doi":"10.1109/ICCES.2013.6707195","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707195","url":null,"abstract":"University course timetabling is one of the most important and time-consuming problem which takes place frequently in all the educational institutes. This paper proposes design and implementation system to generate timetable based on genetic algorithm using different combinations selection algorithm and mutation types. Two cases small problem and big problem are studied. The results show that two cases tournament selection is giving solutions better than roulette wheel Selection. The worst pair is roulette wheel selection and mutation. Mutation error method helps to reach to the best solution faster. In case of conflicts and no solution, our system generates a report, containing conflict constraints that must be remove or modified.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114867719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Robust watermarking approach for 3D triangular mesh using self organization map 基于自组织映射的三维三角形网格鲁棒水印方法
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707181
Mona M. Soliman, A. Hassanien, H. Onsi
The objective of this paper is to explore innovative ways to insert the maximum amount of secret information into 3D mesh models without causing perceptual distortion and also make it difficult for the attacker to guess where the watermark was inserted. It is based on clustering 3D vertices into appropriate or inappropriate candidates for watermark insertion using Self Organization Map (SOM). Two methods were used to embed the watermark into 3D model. The first method is a statistical approach that modified the distribution of vertex norms to hide watermark information into host 3D model while the second method is a mixed insertion of watermark bits into host model using vertex norm distribution and mesh vertices at the same time. The robustness of proposed techniques is evaluated experimentally by simulating attacks such as mesh smoothing, noise addition and mesh cropping.
本文的目的是探索一种创新的方法,在不引起感知失真的情况下将最大数量的秘密信息插入到3D网格模型中,同时使攻击者难以猜测水印被插入的位置。该算法基于自组织映射(SOM)将三维顶点聚类到合适或不合适的候选对象中进行水印插入。采用两种方法将水印嵌入到三维模型中。第一种方法是通过统计方法修改顶点范数分布,将水印信息隐藏到宿主模型中;第二种方法是同时利用顶点范数分布和网格顶点混合插入水印位到宿主模型中。通过模拟网格平滑、噪声添加和网格裁剪等攻击,对所提技术的鲁棒性进行了实验评估。
{"title":"Robust watermarking approach for 3D triangular mesh using self organization map","authors":"Mona M. Soliman, A. Hassanien, H. Onsi","doi":"10.1109/ICCES.2013.6707181","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707181","url":null,"abstract":"The objective of this paper is to explore innovative ways to insert the maximum amount of secret information into 3D mesh models without causing perceptual distortion and also make it difficult for the attacker to guess where the watermark was inserted. It is based on clustering 3D vertices into appropriate or inappropriate candidates for watermark insertion using Self Organization Map (SOM). Two methods were used to embed the watermark into 3D model. The first method is a statistical approach that modified the distribution of vertex norms to hide watermark information into host 3D model while the second method is a mixed insertion of watermark bits into host model using vertex norm distribution and mesh vertices at the same time. The robustness of proposed techniques is evaluated experimentally by simulating attacks such as mesh smoothing, noise addition and mesh cropping.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130825797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2013 8th International Conference on Computer Engineering & Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1