首页 > 最新文献

2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)最新文献

英文 中文
Accessibility of the cyprus Island municipal websites 塞浦路斯市政网站的可访问性
E. Iseri, K. Uyar, Ü. Ilhan
The accessibility of the websites is important for the persons with disabilities. In this study the accessibility of the 67 municipal websites, 28 in Turkish Cypriots-controlled area and 39 in Greek Cypriots-controlled area of the Cyprus Island were evaluated. The online tools European Internet Inclusion Initiative (EIII) Page Checker and AChecker based on the Web Content Accessibility Guidelines (WCAG) 2.0 published by the World Wide Web Consortium (W3C) were used for automated evaluation. The results of these tools showed that all surveyed websites have accessibility problems.
网站的无障碍对残疾人士来说很重要。在这项研究中,对塞浦路斯岛67个市政网站的可访问性进行了评价,其中28个位于土族塞人控制区,39个位于希族塞人控制区。使用基于万维网联盟(W3C)发布的Web内容可访问性指南(WCAG) 2.0的在线工具欧洲互联网包容倡议(EIII)页面检查器和AChecker进行自动评估。这些工具的结果表明,所有被调查的网站都存在可访问性问题。
{"title":"Accessibility of the cyprus Island municipal websites","authors":"E. Iseri, K. Uyar, Ü. Ilhan","doi":"10.1109/CICN.2017.8319359","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319359","url":null,"abstract":"The accessibility of the websites is important for the persons with disabilities. In this study the accessibility of the 67 municipal websites, 28 in Turkish Cypriots-controlled area and 39 in Greek Cypriots-controlled area of the Cyprus Island were evaluated. The online tools European Internet Inclusion Initiative (EIII) Page Checker and AChecker based on the Web Content Accessibility Guidelines (WCAG) 2.0 published by the World Wide Web Consortium (W3C) were used for automated evaluation. The results of these tools showed that all surveyed websites have accessibility problems.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation of load sharing with fast voltage regulation in parallel connected cascaded power boost converters based on droop coefficients refreshing method 基于下垂系数刷新法的并联级联功率升压变换器负载共享快速稳压实现
Davood Ghaderi, M. Celebi
Droop control has been widely implemented in Parallel structures of DC DC converters due to its inherent modularity and ease of implementation. In this kind of converters with resistive distribution lines, the P-V droop with boost converters is the most common method for load sharing. Current or load sharing is the most critical parameter in parallel operation of converters. Most of the methods to guarantee equal load sharing utilize some form of communication between the units. This increases the complexity and sensitivity to noise. The method that has been considered in this paper is P-V control option. P-V droop controls the dc current depending on the dc voltage. In this technique, per 10 microseconds, droop coefficients will be refreshing by sampling by load current. This circuit is simulated by MATLAB/SIMULINK and CADENCE for preparing to instruction and the results of the simulation confirmed the theoretical design. This design has implemented on a parallel structure with two blocks of cascaded boost converters at laboratory scales.
下垂控制由于其固有的模块化和易于实现,在直流变换器的并联结构中得到了广泛的应用。在这类具有电阻配电线路的变换器中,升压变换器的P-V下垂是最常用的负载分担方法。电流或负载分担是变流器并联运行中最关键的参数。大多数保证相等负荷分担的方法都利用单元之间某种形式的通信。这增加了复杂性和对噪声的敏感性。本文考虑的方法是P-V控制选项。P-V压降根据直流电压控制直流电流。在这种技术中,每10微秒,下垂系数将通过负载电流采样来刷新。利用MATLAB/SIMULINK和CADENCE对该电路进行了仿真,为教学做准备,仿真结果证实了理论设计。该设计在实验室规模上实现了两个级联升压转换器的并联结构。
{"title":"Implementation of load sharing with fast voltage regulation in parallel connected cascaded power boost converters based on droop coefficients refreshing method","authors":"Davood Ghaderi, M. Celebi","doi":"10.1109/CICN.2017.8319384","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319384","url":null,"abstract":"Droop control has been widely implemented in Parallel structures of DC DC converters due to its inherent modularity and ease of implementation. In this kind of converters with resistive distribution lines, the P-V droop with boost converters is the most common method for load sharing. Current or load sharing is the most critical parameter in parallel operation of converters. Most of the methods to guarantee equal load sharing utilize some form of communication between the units. This increases the complexity and sensitivity to noise. The method that has been considered in this paper is P-V control option. P-V droop controls the dc current depending on the dc voltage. In this technique, per 10 microseconds, droop coefficients will be refreshing by sampling by load current. This circuit is simulated by MATLAB/SIMULINK and CADENCE for preparing to instruction and the results of the simulation confirmed the theoretical design. This design has implemented on a parallel structure with two blocks of cascaded boost converters at laboratory scales.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116916066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Diabetes prediction using ensemble perceptron algorithm 基于集成感知器算法的糖尿病预测
Roxana Mirshahvalad, Nastaran Asadi Zanjani
Today, people's new way of life leads their eating habits towards fast-foods and ready-to-use products more than before. These foods contain large amounts of sugar and fat, which increase the number of people at risk of diabetes. Many people are required to get diabetes diagnosis by various blood tests regularly. These tests bring significant amounts of cost and take facilities and time when it comes to a large number of people. Machine learning algorithms can be used as computer aided systems to predict if a person is highly probable to have diabetes or not, in order to reduce huge number of people who require to take diagnosis blood tests, to save time and money. In this study, we proposed a learning algorithm which ensemble boosting algorithm with perceptron algorithm to improve performance of perceptron algorithm in prediction of undiagnosed patients. Proposed method is tested on three different publicly available datasets and compared with performance of perceptron algorithm. The results show that proposed algorithm outperform perceptron algorithm on average AUC basis.
如今,人们的新生活方式使他们的饮食习惯比以前更多地转向快餐和即食产品。这些食物含有大量的糖和脂肪,增加了患糖尿病的风险。许多人需要定期通过各种血液检查来诊断糖尿病。当涉及到大量的人时,这些测试带来了大量的成本和设备和时间。机器学习算法可以用作计算机辅助系统来预测一个人是否极有可能患有糖尿病,以减少需要进行诊断血液检查的人数,节省时间和金钱。在本研究中,我们提出了一种将增强算法与感知器算法集成的学习算法,以提高感知器算法在未诊断患者预测中的性能。在三个不同的公开数据集上对该方法进行了测试,并与感知器算法的性能进行了比较。结果表明,该算法在平均AUC基础上优于感知器算法。
{"title":"Diabetes prediction using ensemble perceptron algorithm","authors":"Roxana Mirshahvalad, Nastaran Asadi Zanjani","doi":"10.1109/CICN.2017.8319383","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319383","url":null,"abstract":"Today, people's new way of life leads their eating habits towards fast-foods and ready-to-use products more than before. These foods contain large amounts of sugar and fat, which increase the number of people at risk of diabetes. Many people are required to get diabetes diagnosis by various blood tests regularly. These tests bring significant amounts of cost and take facilities and time when it comes to a large number of people. Machine learning algorithms can be used as computer aided systems to predict if a person is highly probable to have diabetes or not, in order to reduce huge number of people who require to take diagnosis blood tests, to save time and money. In this study, we proposed a learning algorithm which ensemble boosting algorithm with perceptron algorithm to improve performance of perceptron algorithm in prediction of undiagnosed patients. Proposed method is tested on three different publicly available datasets and compared with performance of perceptron algorithm. The results show that proposed algorithm outperform perceptron algorithm on average AUC basis.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Optical stegnography to enhance speed of analog transmission with security enhancement through image encryption 光学隐写技术通过对图像进行加密,提高模拟传输速度,增强安全性
Amanpreet Kaur, G. Soni
Data transmission is the way through which data is sent from source to destination over a physical medium. In networking we use coaxial cable, twisted pair wires for transfer of data from source to destination. These medium of data transfer are slower in nature and data which is transferred may leak or lost during transmission and also there no security of data. To overcome these problems during transmission we use fibre optics. In fibre optics the data is transferred in the form of light beams so there it is less prone to leakage of data. It also uses some security mechanisms for secure transmission of data. The data which are transferred firstly encrypt and after that transferred to the destination in the form of light beams. In our proposed system we introduced encryption in fibre optics using image. Also various encryption algorithms have been proposed to make optical medium data secure, vulnerable and give concern to the security issues, challenges and also comparisons have been made between AES, DES and RSA algorithms to find the best one security algorithm, which has to be used in Optical medium for making Optical medium data secure and not to be hacked by attackers.
数据传输是通过物理介质将数据从源发送到目的的方式。在网络中,我们使用同轴电缆和双绞线将数据从源传输到目的。这些数据传输介质的速度较慢,传输的数据在传输过程中可能会泄漏或丢失,而且数据没有安全性。为了克服传输过程中的这些问题,我们使用光纤。在光纤中,数据以光束的形式传输,因此数据泄漏的可能性较小。它还使用一些安全机制来安全传输数据。传输的数据首先进行加密,然后以光束的形式传输到目的地。在我们提出的系统中,我们使用图像在光纤中引入加密。为了保证光介质数据的安全,不被攻击者攻击,提出了各种加密算法,并对安全问题和挑战进行了比较,并对AES、DES和RSA算法进行了比较,找到了最好的一种安全算法,以保证光介质数据的安全,不被攻击者攻击。
{"title":"Optical stegnography to enhance speed of analog transmission with security enhancement through image encryption","authors":"Amanpreet Kaur, G. Soni","doi":"10.1109/cicn.2017.8319378","DOIUrl":"https://doi.org/10.1109/cicn.2017.8319378","url":null,"abstract":"Data transmission is the way through which data is sent from source to destination over a physical medium. In networking we use coaxial cable, twisted pair wires for transfer of data from source to destination. These medium of data transfer are slower in nature and data which is transferred may leak or lost during transmission and also there no security of data. To overcome these problems during transmission we use fibre optics. In fibre optics the data is transferred in the form of light beams so there it is less prone to leakage of data. It also uses some security mechanisms for secure transmission of data. The data which are transferred firstly encrypt and after that transferred to the destination in the form of light beams. In our proposed system we introduced encryption in fibre optics using image. Also various encryption algorithms have been proposed to make optical medium data secure, vulnerable and give concern to the security issues, challenges and also comparisons have been made between AES, DES and RSA algorithms to find the best one security algorithm, which has to be used in Optical medium for making Optical medium data secure and not to be hacked by attackers.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"13 23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combination of the symmetrical local threshold and the sobel edge detector for lane feature extraction 结合对称局部阈值和索贝尔边缘检测器进行车道特征提取
U. Ozgunalp
In this paper, two of lane feature extractors are combined for better lane feature extraction. Namely; the Symmetrical local threshold (SLT) and the Sobel edge detector. The SLT is found to be one of the most robust lane marking feature extractor. However, it relies on the Dark-Light-Dark feature of the painted lane markings. However, in many cases there is no painted lane marking on one or two sides of the road border. Although, edge detector is not assumed to be as good as the SLT for the lane marking feature extraction, it has more advantage on detecting the road borders. Thus, even though many lane marking feature extractors are proposed in the literature, edge detectors are still popular method for lane detection. In this paper, a new approach to combine two of the feature extractors is proposed. With the proposed approach, while detecting painted lane markings accurately, it is possible to detect road borders and poorly painted road markings as well.
为了更好地提取车道特征,本文将两种车道特征提取器相结合。即;对称局部阈值(SLT)和索贝尔边缘检测器。该方法是一种鲁棒性最好的车道标记特征提取方法。然而,它依赖于深色-浅色-深色的车道标记特征。然而,在许多情况下,在道路边界的一侧或两侧没有涂上车道标记。虽然边缘检测器在车道标记特征提取方面不如SLT,但它在道路边界检测方面更有优势。因此,尽管文献中提出了许多车道标记特征提取器,但边缘检测器仍然是常用的车道检测方法。本文提出了一种结合两种特征提取器的新方法。使用该方法,在准确检测涂漆车道标记的同时,也可以检测道路边界和涂漆不良的道路标记。
{"title":"Combination of the symmetrical local threshold and the sobel edge detector for lane feature extraction","authors":"U. Ozgunalp","doi":"10.1109/cicn.2017.8319349","DOIUrl":"https://doi.org/10.1109/cicn.2017.8319349","url":null,"abstract":"In this paper, two of lane feature extractors are combined for better lane feature extraction. Namely; the Symmetrical local threshold (SLT) and the Sobel edge detector. The SLT is found to be one of the most robust lane marking feature extractor. However, it relies on the Dark-Light-Dark feature of the painted lane markings. However, in many cases there is no painted lane marking on one or two sides of the road border. Although, edge detector is not assumed to be as good as the SLT for the lane marking feature extraction, it has more advantage on detecting the road borders. Thus, even though many lane marking feature extractors are proposed in the literature, edge detectors are still popular method for lane detection. In this paper, a new approach to combine two of the feature extractors is proposed. With the proposed approach, while detecting painted lane markings accurately, it is possible to detect road borders and poorly painted road markings as well.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Metric based detection of refused bequest code smell 基于度量的被拒绝遗赠代码气味检测
B. M. Merzah, Y. E. Selçuk
The concept of code smell was introduced as a signs of internal design flaws within the software. Code smells detection has become a mandatory technique to detect code issues that may affect negatively on the software quality by causing problems for further development and maintenance. Accordingly, the consensus is that all types of code smells need to be refactored to deny or diminish such issues. The refactoring techniques can get rid of particular design flaws or principle violations, and restore the code fragment that present a smell, to an acceptable quality level. In the context of object-oriented systems, the concept of inheritance has been known as a key feature proposed to increase the amount of software reusability. However, using inheritance is not always the best solution, particularly if it is utilized in improper cases where other types of relationships would be more appropriate. One of the particular issues that violate inheritance principles is the Refused Bequest code smell. It is related to an inheritance hierarchy where a subclass does not obligate the interface inherited from its parent class. Some studies, mentioned in Section 2, had been made to detect the Refused Bequest smell. In this paper we present a new detection strategy by computing the similarity between common methods of the base class with the overridden methods of the sub-class, and then by calculating the average of these values for the given sub-class. That average value is defined as a new metric in our detection mechanism.
代码气味的概念是作为软件内部设计缺陷的标志引入的。代码气味检测已经成为一项强制性的技术,用于检测可能会对软件质量产生负面影响的代码问题,因为这些问题会给进一步的开发和维护带来问题。因此,共识是需要重构所有类型的代码气味,以否认或减少此类问题。重构技术可以消除特定的设计缺陷或违反原则的情况,并将出现问题的代码片段恢复到可接受的质量水平。在面向对象系统的上下文中,继承的概念被认为是增加软件可重用性的关键特性。然而,使用继承并不总是最好的解决方案,特别是在其他类型的关系更合适的不适当情况下使用继承时。违反继承原则的一个特殊问题是拒绝继承代码气味。它与继承层次结构有关,在继承层次结构中,子类不要求从其父类继承接口。在第2节中提到的一些研究已经用于检测拒绝遗赠的气味。本文提出了一种新的检测策略,通过计算基类的公共方法与子类的覆盖方法之间的相似度,然后计算给定子类的这些值的平均值。在我们的检测机制中,这个平均值被定义为一个新的度量。
{"title":"Metric based detection of refused bequest code smell","authors":"B. M. Merzah, Y. E. Selçuk","doi":"10.1109/CICN.2017.8319355","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319355","url":null,"abstract":"The concept of code smell was introduced as a signs of internal design flaws within the software. Code smells detection has become a mandatory technique to detect code issues that may affect negatively on the software quality by causing problems for further development and maintenance. Accordingly, the consensus is that all types of code smells need to be refactored to deny or diminish such issues. The refactoring techniques can get rid of particular design flaws or principle violations, and restore the code fragment that present a smell, to an acceptable quality level. In the context of object-oriented systems, the concept of inheritance has been known as a key feature proposed to increase the amount of software reusability. However, using inheritance is not always the best solution, particularly if it is utilized in improper cases where other types of relationships would be more appropriate. One of the particular issues that violate inheritance principles is the Refused Bequest code smell. It is related to an inheritance hierarchy where a subclass does not obligate the interface inherited from its parent class. Some studies, mentioned in Section 2, had been made to detect the Refused Bequest smell. In this paper we present a new detection strategy by computing the similarity between common methods of the base class with the overridden methods of the sub-class, and then by calculating the average of these values for the given sub-class. That average value is defined as a new metric in our detection mechanism.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new dynamic secured IEEE 802.11e AES based system 一种新的基于IEEE 802.11e AES的动态安全系统
Moustafa Mamdouh, R. Sadek, Hussein El Ghoz, Yousry El Far
In computer networks, the network resources are shared among different applications based on a Quality of Service (QoS) priority scheme. Enhanced Distribution Channel Access (EDCA) is effectively based on Distributed Coordination Function (DCF) with four priorities (Background — Best Effort — Video — Voice), which decreases the congestion in the network. This paper proposes a novel technique of context aware Advanced Encryption Standard (AES) algorithm Cipher Block Chaining (CBC) as a general mode for IEEE 802.11e. This algorithm is based on the selection of some different parameters of AES according to the type of the received application, due to parameters variation an enhancement in the system security is observed. Results are obtained by merging both MATLAB and OPNET modeler to evaluate the network performance among several critical metrics.
在计算机网络中,基于服务质量(QoS)优先级方案,网络资源在不同的应用程序之间共享。增强型分配通道接入(EDCA)是基于分布式协调函数(DCF)的四种优先级(后台-最佳努力-视频-语音),有效地降低了网络的拥塞。本文提出了一种新的上下文感知高级加密标准(AES)算法——密码块链(CBC)作为IEEE 802.11e的通用模式。该算法根据接收到的应用类型选择不同的AES参数,由于参数的变化,系统的安全性得到了提高。通过合并MATLAB和OPNET建模器,在几个关键指标之间评估网络性能,得到了结果。
{"title":"A new dynamic secured IEEE 802.11e AES based system","authors":"Moustafa Mamdouh, R. Sadek, Hussein El Ghoz, Yousry El Far","doi":"10.1109/CICN.2017.8319365","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319365","url":null,"abstract":"In computer networks, the network resources are shared among different applications based on a Quality of Service (QoS) priority scheme. Enhanced Distribution Channel Access (EDCA) is effectively based on Distributed Coordination Function (DCF) with four priorities (Background — Best Effort — Video — Voice), which decreases the congestion in the network. This paper proposes a novel technique of context aware Advanced Encryption Standard (AES) algorithm Cipher Block Chaining (CBC) as a general mode for IEEE 802.11e. This algorithm is based on the selection of some different parameters of AES according to the type of the received application, due to parameters variation an enhancement in the system security is observed. Results are obtained by merging both MATLAB and OPNET modeler to evaluate the network performance among several critical metrics.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132619268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A physiotherapy application with MS kinect for patients with shoulder joint, muscle and tendon damage MS kinect用于肩关节、肌肉和肌腱损伤患者的物理治疗应用
Burakhan Çubukçu, Uğur Yüzgeç
Patients with undergone traditional physiotherapy have some problems, especially in terms of transportation and doing correct exercise. Nowadays telerehabilitation is becoming a popular method to reduce these problems and to help with treatment. MS Kinect is also one of the effective equipments in telerehabilitation. In this study, the problems of physically treated patients and studies using MS Kinect for this disease were examined. A physiotherapy application was developed with MS Kinect for shoulder joint, muscle and tendon damaged patients. In this application, six exercises have been selected for patients with shoulder joint, muscle and tendon damage. Thanks to the developed physiotherapy application with MS Kinect, the patients can do their exercises with highest accuracy.
接受传统物理治疗的患者存在一些问题,特别是在交通和正确运动方面。如今,远程康复正在成为一种流行的方法来减少这些问题,并帮助治疗。微软Kinect也是远程康复的有效设备之一。在本研究中,对物理治疗患者的问题和使用MS Kinect治疗该疾病的研究进行了检查。利用MS Kinect开发了一种用于肩关节、肌肉和肌腱损伤患者的物理治疗应用程序。在本应用中,针对肩关节、肌肉和肌腱损伤的患者选择了六种锻炼方式。由于开发了MS Kinect的物理治疗应用程序,患者可以以最高的准确性进行锻炼。
{"title":"A physiotherapy application with MS kinect for patients with shoulder joint, muscle and tendon damage","authors":"Burakhan Çubukçu, Uğur Yüzgeç","doi":"10.1109/CICN.2017.8319390","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319390","url":null,"abstract":"Patients with undergone traditional physiotherapy have some problems, especially in terms of transportation and doing correct exercise. Nowadays telerehabilitation is becoming a popular method to reduce these problems and to help with treatment. MS Kinect is also one of the effective equipments in telerehabilitation. In this study, the problems of physically treated patients and studies using MS Kinect for this disease were examined. A physiotherapy application was developed with MS Kinect for shoulder joint, muscle and tendon damaged patients. In this application, six exercises have been selected for patients with shoulder joint, muscle and tendon damage. Thanks to the developed physiotherapy application with MS Kinect, the patients can do their exercises with highest accuracy.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129354212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Control humanoid robot using intelligent optimization algorithms fusion with fourier series 采用傅立叶级数融合的智能优化算法控制仿人机器人
E. Abedi, Pooya Alamirpour, Roxana Mirshahvalad
Robot walking on two feet is a complex motion. Researchers are trying to improve biped robots walking in case of walking speed. The analysis of biped walking patterns is used to obtain more detailed information in this field. Several researches have been done to achieve this purpose and the equation of walking trajectory is one of them. This article will introduce a new algorithm in which an evolutionary computing, based on learning automata along with a continual action on control signals of humanoid robot's motion, showing the success of the proposed method as the result to be used for optimizing the parameters of Truncated Fourier Series (TFS) after being compared with the results of Genetic Algorithm (GA) implementation. It is notable that the conditions of the experiment for these two algorithms are considered to be identical.
机器人用两脚行走是一种复杂的运动。研究人员正在努力提高两足机器人的行走速度。通过对两足动物行走模式的分析,可以获得该领域更详细的信息。为了实现这一目标,人们做了许多研究,其中之一就是行走轨迹方程。本文将介绍一种新的算法,即基于学习自动机的进化计算以及对人形机器人运动控制信号的持续作用,并将其与遗传算法(GA)的实现结果进行比较,表明所提出的方法作为截断傅立叶级数(TFS)参数优化的结果是成功的。值得注意的是,这两个算法的实验条件被认为是相同的。
{"title":"Control humanoid robot using intelligent optimization algorithms fusion with fourier series","authors":"E. Abedi, Pooya Alamirpour, Roxana Mirshahvalad","doi":"10.1109/CICN.2017.8319381","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319381","url":null,"abstract":"Robot walking on two feet is a complex motion. Researchers are trying to improve biped robots walking in case of walking speed. The analysis of biped walking patterns is used to obtain more detailed information in this field. Several researches have been done to achieve this purpose and the equation of walking trajectory is one of them. This article will introduce a new algorithm in which an evolutionary computing, based on learning automata along with a continual action on control signals of humanoid robot's motion, showing the success of the proposed method as the result to be used for optimizing the parameters of Truncated Fourier Series (TFS) after being compared with the results of Genetic Algorithm (GA) implementation. It is notable that the conditions of the experiment for these two algorithms are considered to be identical.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125297704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A planar UWB antenna with tripple notched bands 三陷波带的平面超宽带天线
M. I. Khattak, Muhammad Irshad Khan, A. Najam, Mohammad Saleem, M. Shafi
This paper presents a rectangular planar monopole antenna with triple stop bands for ultra-wide band Applications. The antenna is compact size (24mm × 24mm × 1.6mm) and is covering the entire UWB band with VSWR < 2 except the band of WiMAX range from 3.07–4.73 GHz, the WLAN band range from 5.14–5.97 GHz and the ITU frequency band range from of 7.92–8.61 GHz. The three slots are added to this antenna to stop various bands. Different shaped slots i.e. inverted Z, C and U are introduced in radiating element to stop WiMAX, WLAN and ITU respectively. The antenna is simulated using High Frequency Structure Simulator (HFSS) using FR4 as a substrate.
提出了一种用于超宽带应用的三阻带矩形平面单极天线。该天线尺寸紧凑(24mm × 24mm × 1.6mm),覆盖除WiMAX 3.07-4.73 GHz、WLAN 5.14-5.97 GHz和ITU 7.92-8.61 GHz频段外,VSWR < 2的整个UWB频段。在这个天线上增加了三个槽来阻挡不同的波段。在辐射单元中引入不同形状的槽,即倒Z、倒C和倒U,分别阻挡WiMAX、WLAN和ITU。采用高频结构模拟器(HFSS)以FR4为衬底对天线进行仿真。
{"title":"A planar UWB antenna with tripple notched bands","authors":"M. I. Khattak, Muhammad Irshad Khan, A. Najam, Mohammad Saleem, M. Shafi","doi":"10.1109/CICN.2017.8319344","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319344","url":null,"abstract":"This paper presents a rectangular planar monopole antenna with triple stop bands for ultra-wide band Applications. The antenna is compact size (24mm × 24mm × 1.6mm) and is covering the entire UWB band with VSWR < 2 except the band of WiMAX range from 3.07–4.73 GHz, the WLAN band range from 5.14–5.97 GHz and the ITU frequency band range from of 7.92–8.61 GHz. The three slots are added to this antenna to stop various bands. Different shaped slots i.e. inverted Z, C and U are introduced in radiating element to stop WiMAX, WLAN and ITU respectively. The antenna is simulated using High Frequency Structure Simulator (HFSS) using FR4 as a substrate.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1