首页 > 最新文献

Proceedings of the International Conference on Information and Communication Technology - ICICT '19最新文献

英文 中文
The effects of EEG feature extraction using multi-wavelet decomposition for mental tasks classification 多小波分解脑电特征提取对脑任务分类的影响
Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khadeer, M. Al-Betar, A. Abasi, S. Makhadmeh, Nabeel Salih Ali
In modern life, the identification system is considered as one of the most challenging projects because identity authentication needs to be secure. Researchers have developed digital authentication techniques which are implemented in society. One of these techniques is using biometric technology which is commonly known as face recognition, voice recognition, and fingerprinting. These techniques have achieved a high level of authentication but are subject to hacking or counterfeiting. In this paper, a new identification method based on electroencephalogram (EEG) signals is proposed. The EEG method uses a standard EEG database which deals with five different thought patterns or mental tasks which are multiplication, baseline, letter composition, rotation, and visual board counting. Using ANN (artificial neural network) classifier, EEG signals were classified. The performance of this proposed method is evaluated using five criteria: (accuracy, sensitivity, specificity, F-Score measure, and false acceptance rate). The experimental results show that the EEG features extraction with wavelet 10 decomposition levels can achieve better than 5 decomposition levels for all mental tasks. The proposed method achieved the highest accuracy when using a visual counting mental task.
在现代生活中,身份认证系统被认为是最具挑战性的项目之一,因为身份认证需要安全性。研究人员已经开发出了在社会中实施的数字认证技术。其中一种技术是使用生物识别技术,即通常所说的面部识别、声音识别和指纹识别。这些技术已经实现了高水平的身份验证,但容易遭到黑客攻击或伪造。本文提出了一种新的基于脑电图信号的识别方法。EEG方法使用一个标准的EEG数据库,该数据库处理五种不同的思维模式或心理任务,即乘法、基线、字母组成、旋转和视觉板计数。采用人工神经网络分类器对脑电信号进行分类。该方法的性能使用五个标准进行评估:(准确性,灵敏度,特异性,F-Score测量和错误接受率)。实验结果表明,基于小波10级分解的脑电特征提取方法对所有脑任务的提取效果都优于5级分解。当使用视觉计数心理任务时,所提出的方法达到了最高的准确率。
{"title":"The effects of EEG feature extraction using multi-wavelet decomposition for mental tasks classification","authors":"Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khadeer, M. Al-Betar, A. Abasi, S. Makhadmeh, Nabeel Salih Ali","doi":"10.1145/3321289.3321327","DOIUrl":"https://doi.org/10.1145/3321289.3321327","url":null,"abstract":"In modern life, the identification system is considered as one of the most challenging projects because identity authentication needs to be secure. Researchers have developed digital authentication techniques which are implemented in society. One of these techniques is using biometric technology which is commonly known as face recognition, voice recognition, and fingerprinting. These techniques have achieved a high level of authentication but are subject to hacking or counterfeiting. In this paper, a new identification method based on electroencephalogram (EEG) signals is proposed. The EEG method uses a standard EEG database which deals with five different thought patterns or mental tasks which are multiplication, baseline, letter composition, rotation, and visual board counting. Using ANN (artificial neural network) classifier, EEG signals were classified. The performance of this proposed method is evaluated using five criteria: (accuracy, sensitivity, specificity, F-Score measure, and false acceptance rate). The experimental results show that the EEG features extraction with wavelet 10 decomposition levels can achieve better than 5 decomposition levels for all mental tasks. The proposed method achieved the highest accuracy when using a visual counting mental task.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115651478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A steganography based on orthogonal moments 基于正交矩的隐写术
Hayder S. Radeaf, Basheera M. Mahmmod, S. Abdulhussain, Dhyia Al-Jumaeily
The increase in data transmission volume and repository size have increased the need to secure and protecting a message such that it does not draw attention. in this paper, a new steganography algorithm in the transform domain of images based on orthogonal polynomials (OPs) is presented. The algorithms get benefits from the low energy moments, where the message is embedded. First, the proposed algorithm transforms the cover image into the transform domain using squared form of Krawtchouk-Tchebichef polynomials. After that, the low energy moments (transform coefficients) is substituted by the message data. Finally, the transform domain coefficients are transformed into the spatial domain to obtain the stego-image. Experimental results show that the proposed algorithm is competent in embedding information compared to other methods in terms of message size and image quality.
数据传输量和存储库大小的增加增加了保护和保护消息的需求,使其不会引起注意。本文提出了一种基于正交多项式(OPs)的图像变换域隐写算法。该算法从嵌入信息的低能矩中获益。首先,该算法利用krawtchouk - chebichef多项式的平方形式将封面图像变换到变换域;然后,用消息数据代替低能矩(变换系数)。最后,将变换域系数变换到空间域中,得到隐写图像。实验结果表明,该算法在信息大小和图像质量方面优于其他方法。
{"title":"A steganography based on orthogonal moments","authors":"Hayder S. Radeaf, Basheera M. Mahmmod, S. Abdulhussain, Dhyia Al-Jumaeily","doi":"10.1145/3321289.3321324","DOIUrl":"https://doi.org/10.1145/3321289.3321324","url":null,"abstract":"The increase in data transmission volume and repository size have increased the need to secure and protecting a message such that it does not draw attention. in this paper, a new steganography algorithm in the transform domain of images based on orthogonal polynomials (OPs) is presented. The algorithms get benefits from the low energy moments, where the message is embedded. First, the proposed algorithm transforms the cover image into the transform domain using squared form of Krawtchouk-Tchebichef polynomials. After that, the low energy moments (transform coefficients) is substituted by the message data. Finally, the transform domain coefficients are transformed into the spatial domain to obtain the stego-image. Experimental results show that the proposed algorithm is competent in embedding information compared to other methods in terms of message size and image quality.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Security in telehealth applications: issues in medical image watermarking scheme through the shearlet transform 远程医疗应用中的安全性:shearlet变换医学图像水印方案中的问题
Nemir Al-Azzawi
Medical image data are important part of diagnoses in existing health care information systems. The medical image's document is a communication instrument that serves clinical decision, give medication, explanation, consultation, coordination of services, validation and identification. This paper proposed an efficient and secure watermark approached using shearlet transform domain techniques for telehealth applications. The shearlet representation is very well improved the edges and the other anisotropic objects, which are the main features in medical images. Medical images with watermarks provide alternatives to various issues related to security, data management, and distribution. Applying the Arnold based encryption algorithms to a watermark image in a less complex way will better protect privacy. The conclusion that arises from the results is that the proposed method has improved in terms of acceptance, satisfaction, and integration of the application of telehealth security. Image quality is measured by a number of commonly used metrics. The experimental results show that quality analysis of the proposed approach provides an effective way to transmit a secure medical image over the public network. Moreover, the results clearly indicate that the proposed techniques are very powerful and adequate for the security of many procedures of aggressions without any noticeable misrepresentations between the watermarks and the cover image.
医学图像数据是现有医疗信息系统诊断的重要组成部分。医学影像文件是服务于临床决策、用药、解释、咨询、服务协调、验证和鉴定的沟通工具。本文提出了一种基于shearlet变换域技术的高效、安全的远程医疗水印方法。剪切波表示很好地改善了边缘和其他各向异性物体的特征,这是医学图像的主要特征。带水印的医学图像为与安全性、数据管理和分布相关的各种问题提供了替代方案。将基于Arnold的加密算法以较简单的方式应用于水印图像,可以更好地保护隐私。从结果中得出的结论是,所提出的方法在远程医疗安全应用的接受度、满意度和集成方面都有所提高。图像质量是由一些常用的度量来衡量的。实验结果表明,该方法的质量分析为在公共网络上传输安全的医学图像提供了一种有效的方法。此外,结果清楚地表明,所提出的技术是非常强大的,足以保证许多入侵程序的安全性,而不会在水印和封面图像之间产生任何明显的错误表征。
{"title":"Security in telehealth applications: issues in medical image watermarking scheme through the shearlet transform","authors":"Nemir Al-Azzawi","doi":"10.1145/3321289.3321326","DOIUrl":"https://doi.org/10.1145/3321289.3321326","url":null,"abstract":"Medical image data are important part of diagnoses in existing health care information systems. The medical image's document is a communication instrument that serves clinical decision, give medication, explanation, consultation, coordination of services, validation and identification. This paper proposed an efficient and secure watermark approached using shearlet transform domain techniques for telehealth applications. The shearlet representation is very well improved the edges and the other anisotropic objects, which are the main features in medical images. Medical images with watermarks provide alternatives to various issues related to security, data management, and distribution. Applying the Arnold based encryption algorithms to a watermark image in a less complex way will better protect privacy. The conclusion that arises from the results is that the proposed method has improved in terms of acceptance, satisfaction, and integration of the application of telehealth security. Image quality is measured by a number of commonly used metrics. The experimental results show that quality analysis of the proposed approach provides an effective way to transmit a secure medical image over the public network. Moreover, the results clearly indicate that the proposed techniques are very powerful and adequate for the security of many procedures of aggressions without any noticeable misrepresentations between the watermarks and the cover image.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new miniaturized folded fractal based PIFA antenna design for MIMO wireless applications 用于MIMO无线应用的新型小型化折叠分形PIFA天线设计
A. Salim, R. Fyath, J. Ali
Design of a new miniaturized FF-PIFA (Folded Fractal Planar Inverted F-antenna) with dual-band resonant behavior is introduced in this paper for use in the dual-band WLAN MIMO (multi-input multi-output) applications. Firstly, the fourth iteration Koch's fractal geometry has been applied to the edges of the conventional rectangular patch structure to create a single miniaturized antenna. Then for further miniaturization, the radiating patch is folded in its sides. A substrate with relative permittivity of 2.2 and thickness of 0.9 mm has been used. The proposed antenna is located at the corner of a copper ground plane of 0.05mm thickness and dimensions of 110 × 70 mm2. The dimensions of the single antenna are 12mm × 15mm × 6.2 mm, making it suitable for mobile terminal applications. The proposed antenna offers a dual-band resonance covering the two WLAN band standards. Modeling and performance evaluation of the proposed antenna have been carried out using the CST Microwave Studio. After that, the FF-PIFA antenna has been investigated in a 4 by 4 MIMO system suggested for use in dual band WLAN applications. Simulation results show that the MIMO system offers ≤ -10 dB impedance bandwidths of about 182.32MHz with an isolation more than 12.17 dB, for the lower band, and 400MHz with an isolation of higher than 20 dB, for the upper band. This makes the proposed system suitable for use in MIMO dual-band WLAN applications.
介绍了一种具有双频谐振特性的新型小型化折叠分形平面倒f天线(FF-PIFA)的设计,该天线可用于双频无线局域网的多输入多输出应用。首先,将第四次迭代Koch分形几何应用于常规矩形贴片结构的边缘,形成单个小型化天线;然后,为了进一步小型化,辐射贴片在其两侧折叠。衬底的相对介电常数为2.2,厚度为0.9 mm。该天线位于厚度为0.05mm、尺寸为110 × 70 mm2的铜接地面的一角。单天线尺寸为12mm × 15mm × 6.2 mm,适合移动终端应用。所提出的天线提供覆盖两个WLAN频段标准的双频谐振。利用CST微波工作室对所提出的天线进行了建模和性能评估。在此之后,FF-PIFA天线在一个建议用于双频WLAN应用的4 × 4 MIMO系统中进行了研究。仿真结果表明,MIMO系统的阻抗带宽≤-10 dB,下频段约为182.32MHz,隔离度大于12.17 dB;上频段约为400MHz,隔离度大于20 dB。这使得所提出的系统适用于MIMO双频WLAN应用。
{"title":"A new miniaturized folded fractal based PIFA antenna design for MIMO wireless applications","authors":"A. Salim, R. Fyath, J. Ali","doi":"10.1145/3321289.3321298","DOIUrl":"https://doi.org/10.1145/3321289.3321298","url":null,"abstract":"Design of a new miniaturized FF-PIFA (Folded Fractal Planar Inverted F-antenna) with dual-band resonant behavior is introduced in this paper for use in the dual-band WLAN MIMO (multi-input multi-output) applications.\u0000 Firstly, the fourth iteration Koch's fractal geometry has been applied to the edges of the conventional rectangular patch structure to create a single miniaturized antenna. Then for further miniaturization, the radiating patch is folded in its sides. A substrate with relative permittivity of 2.2 and thickness of 0.9 mm has been used. The proposed antenna is located at the corner of a copper ground plane of 0.05mm thickness and dimensions of 110 × 70 mm2. The dimensions of the single antenna are 12mm × 15mm × 6.2 mm, making it suitable for mobile terminal applications. The proposed antenna offers a dual-band resonance covering the two WLAN band standards. Modeling and performance evaluation of the proposed antenna have been carried out using the CST Microwave Studio. After that, the FF-PIFA antenna has been investigated in a 4 by 4 MIMO system suggested for use in dual band WLAN applications. Simulation results show that the MIMO system offers ≤ -10 dB impedance bandwidths of about 182.32MHz with an isolation more than 12.17 dB, for the lower band, and 400MHz with an isolation of higher than 20 dB, for the upper band. This makes the proposed system suitable for use in MIMO dual-band WLAN applications.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134335751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Navigation system for visually impaired people based on RGB-D camera and ultrasonic sensor 基于RGB-D相机和超声波传感器的视障人士导航系统
Heba Hakim, A. Fadhil
This paper presents a smart guiding system and wearable device to assist the visually impaired people in avoiding obstacles and navigate safely through indoor environments. The proposed navigation system includes a pair of glasses with a RGB-D camera and an ultrasonic sensor in the front, Raspberry pi 3 B+ board, and earphone. An obstacle avoiding algorithm based on integration of a computer vision and ETA techniques is adopted to provide an accurate and low cost solution. The measuring distance approach depends on an ultrasonic sensor and the raw depth map that is acquired from depth sensor to output several suitable moving directions. The integration of different data input helps to detect the small and transparent obstacles and increases the accuracy of the navigation system output. This work has been tested and evaluated in different real-time scenarios. The experimental results indicate accurate guiding instructions and effective performance of obstacle detected and avoiding algorithm. The guiding instruction has been sent to the user as audio message through earphone.
本文设计了一种智能引导系统和可穿戴设备,用于帮助视障人士在室内环境中避障和安全导航。该导航系统包括一副带有RGB-D摄像头和超声波传感器的眼镜,树莓派3b +板和耳机。采用了基于计算机视觉和ETA技术相结合的避障算法,以提供准确和低成本的解决方案。测量距离的方法依赖于超声波传感器和从深度传感器获取的原始深度图来输出几个合适的移动方向。不同数据输入的整合有助于检测小而透明的障碍物,提高导航系统输出的精度。这项工作已经在不同的实时场景中进行了测试和评估。实验结果表明,该算法具有准确的引导指令和有效的避障检测性能。引导指令已通过耳机以音频信息的形式发送给用户。
{"title":"Navigation system for visually impaired people based on RGB-D camera and ultrasonic sensor","authors":"Heba Hakim, A. Fadhil","doi":"10.1145/3321289.3321303","DOIUrl":"https://doi.org/10.1145/3321289.3321303","url":null,"abstract":"This paper presents a smart guiding system and wearable device to assist the visually impaired people in avoiding obstacles and navigate safely through indoor environments. The proposed navigation system includes a pair of glasses with a RGB-D camera and an ultrasonic sensor in the front, Raspberry pi 3 B+ board, and earphone. An obstacle avoiding algorithm based on integration of a computer vision and ETA techniques is adopted to provide an accurate and low cost solution. The measuring distance approach depends on an ultrasonic sensor and the raw depth map that is acquired from depth sensor to output several suitable moving directions. The integration of different data input helps to detect the small and transparent obstacles and increases the accuracy of the navigation system output. This work has been tested and evaluated in different real-time scenarios. The experimental results indicate accurate guiding instructions and effective performance of obstacle detected and avoiding algorithm. The guiding instruction has been sent to the user as audio message through earphone.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Orthogonal polynomial embedded image kernel 正交多项式嵌入图像核
S. Abdulhussain, A. Ramli, A. Hussain, Basheera M. Mahmmod, Wissam A. Jassim
Preprocessing operations of images and video frame sequences are beneficial in computer vision algorithms. For example, smoothing frames is used to eliminate noise; while computing frame gradient in x-direction and y-direction is used for frame feature extraction or for finding frame edges. Such operations involve convolving operators (image kernels) with an image precomputing moments will add extra computation cost to computer vision algorithm. In case of video, the computational time accumulatively increased because of the convolution operation for each frame is performed. To overcome this problem, a mathematical model is established for computing preprocessed frame moments via embedding the operator (image kernel) in the orthogonal polynomial (OP) functions. The experimental results show that the computation time for feature extraction using the proposed method is noticeably reduced in the both trends: image size and moment selection order. The average speed up ratio of the proposed method to traditional method is 3x, 5x, 8x, and 40x for moment selection ratio 100%, 25%, 10%, and 5%, respectively. In addition, the percentage reduction in processing time for small image size is ~ 99% and for large image size is ~ 40%.
图像和视频帧序列的预处理操作对计算机视觉算法是有益的。例如,平滑帧用于消除噪声;而在x方向和y方向上计算帧梯度用于提取帧特征或寻找帧边缘。这些操作涉及卷积算子(图像核),具有图像预计算矩,会给计算机视觉算法增加额外的计算成本。在视频的情况下,由于对每帧进行卷积操作,计算时间累积增加。为了克服这一问题,通过在正交多项式(OP)函数中嵌入算子(图像核),建立了计算预处理帧矩的数学模型。实验结果表明,在图像大小和矩选择顺序两方面,采用该方法进行特征提取的计算时间都明显缩短。当矩选择比为100%、25%、10%和5%时,本文方法与传统方法的平均加速比分别为3x、5倍、8倍和40倍。此外,小图像尺寸的处理时间减少百分比为~ 99%,大图像尺寸的处理时间减少百分比为~ 40%。
{"title":"Orthogonal polynomial embedded image kernel","authors":"S. Abdulhussain, A. Ramli, A. Hussain, Basheera M. Mahmmod, Wissam A. Jassim","doi":"10.1145/3321289.3321310","DOIUrl":"https://doi.org/10.1145/3321289.3321310","url":null,"abstract":"Preprocessing operations of images and video frame sequences are beneficial in computer vision algorithms. For example, smoothing frames is used to eliminate noise; while computing frame gradient in x-direction and y-direction is used for frame feature extraction or for finding frame edges. Such operations involve convolving operators (image kernels) with an image precomputing moments will add extra computation cost to computer vision algorithm. In case of video, the computational time accumulatively increased because of the convolution operation for each frame is performed. To overcome this problem, a mathematical model is established for computing preprocessed frame moments via embedding the operator (image kernel) in the orthogonal polynomial (OP) functions. The experimental results show that the computation time for feature extraction using the proposed method is noticeably reduced in the both trends: image size and moment selection order. The average speed up ratio of the proposed method to traditional method is 3x, 5x, 8x, and 40x for moment selection ratio 100%, 25%, 10%, and 5%, respectively. In addition, the percentage reduction in processing time for small image size is ~ 99% and for large image size is ~ 40%.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123489984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Human emotion classification based on respiration signal 基于呼吸信号的人类情感分类
R. A. Hameed, Mohannad K. Sabir, M. Fadhel, O. Al-Shamma, Laith Alzubaidi
Interactions between people commonly expressed and possessed emotions due to the human beings. Respiration is one of the parameters that reflects an emotion. The reasonable hypothesis, that various respiratory patterns are associated with various emotions, has enhanced the evidence for links between respiration and emotion. For instance, breathing turns out to be, deeper and slower at leisure or relief, shallower and faster at scare or terror, and deeper and faster at anger or excitement. In this study, the breathing signals, which include the features; airflow rate and volume, are acquired from the BIOPAC instrument. The extracted features, which include Max/Min and Mean/Variance of the main features, are analyzed using Fast Fourier Transform (FFT) and classified using Orang open source program, respectively. The result is very successful and agreed by 80%, which in turn, extremely accepted by the researchers.
人与人之间的互动是人类共同表达和拥有的情感。呼吸是反映情绪的参数之一。合理的假设是,不同的呼吸模式与不同的情绪有关,这加强了呼吸和情绪之间联系的证据。例如,在休闲或放松时,呼吸变深变慢,在恐惧或恐惧时呼吸变浅变快,在愤怒或兴奋时呼吸变深变快。在本研究中,呼吸信号,包括特征;气流速率和体积,由BIOPAC仪器获得。提取的特征包括主要特征的Max/Min和Mean/Variance,分别使用快速傅里叶变换(Fast Fourier Transform, FFT)进行分析,使用Orang开源程序进行分类。结果非常成功,80%的人同意,这反过来又被研究人员非常接受。
{"title":"Human emotion classification based on respiration signal","authors":"R. A. Hameed, Mohannad K. Sabir, M. Fadhel, O. Al-Shamma, Laith Alzubaidi","doi":"10.1145/3321289.3321315","DOIUrl":"https://doi.org/10.1145/3321289.3321315","url":null,"abstract":"Interactions between people commonly expressed and possessed emotions due to the human beings. Respiration is one of the parameters that reflects an emotion. The reasonable hypothesis, that various respiratory patterns are associated with various emotions, has enhanced the evidence for links between respiration and emotion. For instance, breathing turns out to be, deeper and slower at leisure or relief, shallower and faster at scare or terror, and deeper and faster at anger or excitement. In this study, the breathing signals, which include the features; airflow rate and volume, are acquired from the BIOPAC instrument. The extracted features, which include Max/Min and Mean/Variance of the main features, are analyzed using Fast Fourier Transform (FFT) and classified using Orang open source program, respectively. The result is very successful and agreed by 80%, which in turn, extremely accepted by the researchers.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Highly secure image steganography approach using Arnold's Cat map and maximum image entropy 高度安全的图像隐写方法使用阿诺德的猫图和最大的图像熵
Y. A. Hamza
Media (image, text, sound, and video) becomes available in the digital form. The ability to copy or modify contents and access to these media easily lead to making these problems challenging when transferring them to the internet. Therefore, data hiding methods are developed to handle these problems. In addition, cryptography algorithms can be combined with data hiding to increase the security of secret data that are used during the hiding process. In this paper, a new method of image steganography is proposed. The suggested approach is based on using ACM and array of random bits generated using BBS CSPRBG to encrypt the secret logo that is used during the hiding process. In embedding process, the cover-image is divided into blocks and the entropy of each block is computed. Then, the block that has a maximum value of entropy is selected to hide secret logo in it using (1st-LSB) algorithm. According to experimental results, the suggested method has achieved the best quality for the stego-image. Also, the secrecy of the logo is enhanced.
媒体(图像、文本、声音和视频)以数字形式可用。复制或修改内容以及访问这些媒体的能力很容易使这些问题在将它们传输到互联网时变得具有挑战性。因此,开发了数据隐藏方法来处理这些问题。此外,可以将加密算法与数据隐藏相结合,以提高隐藏过程中使用的秘密数据的安全性。本文提出了一种新的图像隐写方法。建议的方法是基于使用ACM和使用BBS CSPRBG生成的随机位数组对隐藏过程中使用的秘密徽标进行加密。在嵌入过程中,对覆盖图像进行分块,计算每个分块的熵。然后,使用(1 - lsb)算法选择熵值最大的块隐藏秘密标识。实验结果表明,该方法对隐写图像具有较好的处理效果。同时,也增强了标识的保密性。
{"title":"Highly secure image steganography approach using Arnold's Cat map and maximum image entropy","authors":"Y. A. Hamza","doi":"10.1145/3321289.3321323","DOIUrl":"https://doi.org/10.1145/3321289.3321323","url":null,"abstract":"Media (image, text, sound, and video) becomes available in the digital form. The ability to copy or modify contents and access to these media easily lead to making these problems challenging when transferring them to the internet. Therefore, data hiding methods are developed to handle these problems. In addition, cryptography algorithms can be combined with data hiding to increase the security of secret data that are used during the hiding process. In this paper, a new method of image steganography is proposed. The suggested approach is based on using ACM and array of random bits generated using BBS CSPRBG to encrypt the secret logo that is used during the hiding process. In embedding process, the cover-image is divided into blocks and the entropy of each block is computed. Then, the block that has a maximum value of entropy is selected to hide secret logo in it using (1st-LSB) algorithm. According to experimental results, the suggested method has achieved the best quality for the stego-image. Also, the secrecy of the logo is enhanced.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128245652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal control of compliant planar robot for safe impact using steepest descent technique 基于最陡下降技术的平面柔性机器人安全碰撞最优控制
Izzat Al-Darraji, A. Kılıç, S. Kapucu
This study introduces a detailed mathematical modeling of a suggested compliant three-link planar robot. The modeling method is based on state-space representation, which allows a standard access to the interconnection of links with Variable Stiffness Actuator (VSA) by means of first-order differential equations. In these differential equations, the expression of the stiffness is derived in the time domain. In addition, the stiffness of VSA as control input exists in a dependent manner with state variables. An iterative numerical method is proposed, in which, the optimal trajectory of VSA is generated using steepest descent method. Besides this, the optimal feedback controller is designed to minimize the velocities of joints to avoid unsafe contact with the environment. Thus, the performance function was to minimize the velocities of joints and stiffness of VSA. The stabilization of joint velocities is achieved within the optimal feedback control system. A computer program is written to test the model and the proposed control method.
提出了一种柔性三连杆平面机器人的详细数学建模方法。该建模方法基于状态空间表示,允许通过一阶微分方程标准地访问具有变刚度作动器(VSA)的链路互连。在这些微分方程中,导出了在时域内的刚度表达式。此外,VSA作为控制输入的刚度与状态变量呈依赖关系。提出了一种迭代的数值方法,利用最陡下降法生成VSA的最优轨迹。此外,设计了最优反馈控制器,使关节的速度最小,以避免与环境的不安全接触。因此,性能函数是最小化关节的速度和VSA的刚度。在最优反馈控制系统内实现了关节速度的稳定。编写了一个计算机程序来测试该模型和所提出的控制方法。
{"title":"Optimal control of compliant planar robot for safe impact using steepest descent technique","authors":"Izzat Al-Darraji, A. Kılıç, S. Kapucu","doi":"10.1145/3321289.3321313","DOIUrl":"https://doi.org/10.1145/3321289.3321313","url":null,"abstract":"This study introduces a detailed mathematical modeling of a suggested compliant three-link planar robot. The modeling method is based on state-space representation, which allows a standard access to the interconnection of links with Variable Stiffness Actuator (VSA) by means of first-order differential equations. In these differential equations, the expression of the stiffness is derived in the time domain. In addition, the stiffness of VSA as control input exists in a dependent manner with state variables. An iterative numerical method is proposed, in which, the optimal trajectory of VSA is generated using steepest descent method. Besides this, the optimal feedback controller is designed to minimize the velocities of joints to avoid unsafe contact with the environment. Thus, the performance function was to minimize the velocities of joints and stiffness of VSA. The stabilization of joint velocities is achieved within the optimal feedback control system. A computer program is written to test the model and the proposed control method.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122958510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal access point location algorithm based real measurement for indoor communication 基于实际测量的室内通信最优接入点定位算法
Maan Muataz Abdulwahid, O. A. Al-Ani, M. Mosleh, R. A. Abd-Alhmeed
The deployment of access points (AP's) with optimum location has particular importance in optimizing the coverage, operation, and management of the networks. In addition, the most interesting researcher topics recently were finding the lowest cost localization algorithm and methods for indoor communication. The most utilizing approach was based on the use of Received Signal Strength (RSS) measurement, due to reasons related to its availability in the wireless network. As well as, it can be easily accessed from a different operating system. In this paper, a localization algorithm for optimal AP deployment based on RSS measurement has been presented. RSS measurement obtained from different received points in a real-world environment. Measurement results obtained using specialized software was considered the optimum direction in each received point. Our algorithm uses these measurements and considered two-step localization approach, data collecting phase, and localization phase. It is worth to mention, that the same location was considered to be the optimum for both real-world measurement scenario and simulation scenario that has been clarified in previous work. This study may be considered as a quite verification for simulating results obtained using 3D-Ray Tracing approach based wireless InSite software. Furthermore, it is a low-cost method for achieving the optimum location for AP deployment and enhancing the network coverage area.
部署位置最优的接入点对于优化网络的覆盖、运行和管理具有重要意义。此外,寻找成本最低的室内通信定位算法和方法是近年来研究热点。由于其在无线网络中的可用性,最有效的方法是基于使用接收信号强度(RSS)测量。此外,它可以很容易地从不同的操作系统访问。本文提出了一种基于RSS测量的AP最优部署定位算法。在真实环境中从不同接收点获得的RSS测量值。利用专用软件得到的测量结果被认为是每个接收点的最佳方向。我们的算法使用这些测量,并考虑了两步定位方法,数据收集阶段和定位阶段。值得一提的是,相同的位置被认为是现实世界测量场景和模拟场景的最佳选择,这在之前的工作中已经得到了澄清。本研究可视为对基于无线InSite软件的3D-Ray Tracing方法获得的模拟结果的相当验证。此外,它是实现AP部署的最佳位置和扩大网络覆盖面积的低成本方法。
{"title":"Optimal access point location algorithm based real measurement for indoor communication","authors":"Maan Muataz Abdulwahid, O. A. Al-Ani, M. Mosleh, R. A. Abd-Alhmeed","doi":"10.1145/3321289.3321300","DOIUrl":"https://doi.org/10.1145/3321289.3321300","url":null,"abstract":"The deployment of access points (AP's) with optimum location has particular importance in optimizing the coverage, operation, and management of the networks. In addition, the most interesting researcher topics recently were finding the lowest cost localization algorithm and methods for indoor communication. The most utilizing approach was based on the use of Received Signal Strength (RSS) measurement, due to reasons related to its availability in the wireless network. As well as, it can be easily accessed from a different operating system. In this paper, a localization algorithm for optimal AP deployment based on RSS measurement has been presented. RSS measurement obtained from different received points in a real-world environment. Measurement results obtained using specialized software was considered the optimum direction in each received point. Our algorithm uses these measurements and considered two-step localization approach, data collecting phase, and localization phase. It is worth to mention, that the same location was considered to be the optimum for both real-world measurement scenario and simulation scenario that has been clarified in previous work. This study may be considered as a quite verification for simulating results obtained using 3D-Ray Tracing approach based wireless InSite software. Furthermore, it is a low-cost method for achieving the optimum location for AP deployment and enhancing the network coverage area.","PeriodicalId":375095,"journal":{"name":"Proceedings of the International Conference on Information and Communication Technology - ICICT '19","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125207872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
Proceedings of the International Conference on Information and Communication Technology - ICICT '19
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1