2016 8th Computer Science and Electronic Engineering (CEEC)最新文献

筛选
英文 中文
Quaternion linear colour edge-sharpening filter using genetic algorithm 采用遗传算法的四元数线性彩色边缘锐化滤波器
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-09-01 DOI: 10.1109/CEEC.2016.7835900
Shagufta Yasmin, S. Sangwine
{"title":"Quaternion linear colour edge-sharpening filter using genetic algorithm","authors":"Shagufta Yasmin, S. Sangwine","doi":"10.1109/CEEC.2016.7835900","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835900","url":null,"abstract":"A quaternion linear colour edge-sharpening filter is presented. A quaternion convolution mask is created using a genetic algorithm (GA) and a zooming technique. When the new filter is applied to colour images, it produces sharpened colour edges in all directions in regions where colour (but not intensity) edges occur in the image. The methodology of the proposed filter depends on the zooming technique and fitness function. The new filter is tested on different kind of colour images and the experimental results show that the proposed scheme is needed for sharpening colour edges in all directions with only one mask. This proposed filter is a great achievement for developing linear colour vector image filters because it is difficult to design manually/mathematically. This new filter is an example of a linear colour vector image filter developed using genetic algorithm and zooming techniques.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122993145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Standard deviation based weighted clustering algorithm for wireless sensor networks 基于标准差的无线传感器网络加权聚类算法
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-09-01 DOI: 10.1109/CEEC.2016.7835907
Faris Al-Baadani, S. Yousef, L. Al-Jobouri, Sourabh Bhart
{"title":"Standard deviation based weighted clustering algorithm for wireless sensor networks","authors":"Faris Al-Baadani, S. Yousef, L. Al-Jobouri, Sourabh Bhart","doi":"10.1109/CEEC.2016.7835907","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835907","url":null,"abstract":"Clustering in wireless sensor networks (WSN) is a proven technique to avoid redundant transmissions to the sink for better utilization of scarce network resources such as energy. Most of the clustering algorithms proposed in literature involves high number of message exchanges which results in unnecessary energy consumption. In this paper, we propose a standard deviation based weighted cluster head selection algorithm to avoid such message exchanges. The proposed mechanism uses distance and connectivity as two key parameters for optimal cluster head selection. Simulation results show that the proposed algorithm results in low packet drop, delay and control overhead.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectral clustering using the kNN-MST similarity graph 使用kNN-MST相似图的谱聚类
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-09-01 DOI: 10.1109/CEEC.2016.7835917
Patrick Veenstra, C. Cooper, S. Phelps
{"title":"Spectral clustering using the kNN-MST similarity graph","authors":"Patrick Veenstra, C. Cooper, S. Phelps","doi":"10.1109/CEEC.2016.7835917","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835917","url":null,"abstract":"Spectral clustering is a technique that uses the spectrum of a similarity graph to cluster data. Part of this procedure involves calculating the similarity between data points and creating a similarity graph from the resulting similarity matrix. This is ordinarily achieved by creating a k-nearest neighbour (kNN) graph. In this paper, we show the benefits of using a different similarity graph, namely the union of the kNN graph and the minimum spanning tree of the negated similarity matrix (kNN-MST). We show that this has some distinct advantages on both synthetic and real datasets. Specifically, the clustering accuracy of kNN-MST is less dependent on the choice of k than kNN is.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Serious games for Fire and Rescue training 消防和救援训练的严肃游戏
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-09-01 DOI: 10.1109/CEEC.2016.7835902
W. Viant, Jon Purdy, J. Wood
{"title":"Serious games for Fire and Rescue training","authors":"W. Viant, Jon Purdy, J. Wood","doi":"10.1109/CEEC.2016.7835902","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835902","url":null,"abstract":"The Incident Commander plays a vital role in the effectiveness of the UK's Fire and Rescue Services, in tackling fires. The reduction in the number of incidents along with budget cuts is placing an increased emphasis on training. In this paper we propose a serious game as a replacement for the tradition training methods for these important command positions, with a discussion of immersion versus more traditional platform.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Change-point cloud DDoS detection using packet inter-arrival time 基于报文到达间隔时间的变点云DDoS检测
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-09-01 DOI: 10.1109/CEEC.2016.7835914
O. Osanaiye, Kim-Kwang Raymond Choo, M. Dlodlo
{"title":"Change-point cloud DDoS detection using packet inter-arrival time","authors":"O. Osanaiye, Kim-Kwang Raymond Choo, M. Dlodlo","doi":"10.1109/CEEC.2016.7835914","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835914","url":null,"abstract":"Notwithstanding the increased popularity of cloud computing, Distributed Denial of Service (DDoS) remains a threat to its adoption. In this paper, we propose the use of a change-point monitoring algorithm to detect DDoS flooding attacks against cloud services by examining the packet inter-arrival time (IAT). This method leverages on the fact that most DDoS attacks are automated and exhibit similar patterns. These patterns, when closely examined, can be distinguished from normal traffic patterns, and can therefore be tracked using a cumulative sum (CUSUM) algorithm. The proposed solution was validated by conducting a trace-driven simulation and empirical evaluation. The results demonstrated the efficiency and accuracy of this proposed solution.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124344782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Forward error correction with physical layer network coding in two-way relay free space optical links 双向中继自由空间光链路中物理层网络编码前向纠错
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-09-01 DOI: 10.1109/CEEC.2016.7835879
Zina Abu-Almaalie, Zabih Ghassemlooy, Alaa A. S. Al-Rubaie, It Ee Lee, H. L. Minh
{"title":"Forward error correction with physical layer network coding in two-way relay free space optical links","authors":"Zina Abu-Almaalie, Zabih Ghassemlooy, Alaa A. S. Al-Rubaie, It Ee Lee, H. L. Minh","doi":"10.1109/CEEC.2016.7835879","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835879","url":null,"abstract":"Physical layer network coding (PNC) is a promising technique to improve the network throughput in a wireless two-way relay (TWR) channel. The PNC is embraced for TWR with free space optical (FSO) communication link, TWR-FSO, for full utilization of network resources. In this paper, forward error correction (FEC) is employed with TWR-FSO PNC system. The convolutional code (CC) is considered to combat the deleterious effect of FSO turbulence channel to increase the system reliability. The performance of end-to-end (E2E) CC with TWR-FSO PNC scheme is examined in terms of bit error rate (BER) under the influence of turbulence-induced channel fading. The results show that the proposed scheme can achieve a significant BER performance improvement through the introduction of CC joint with PNC mapping, which enables the system to effectively mitigate the impact of channel.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A blind source separation approach based on IVA for convolutive speech mixtures 基于IVA的卷积混合语音盲源分离方法
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-09-01 DOI: 10.1109/CEEC.2016.7835903
T. Jan, H. Zafar, R. A. Khalil, M. Ashraf
{"title":"A blind source separation approach based on IVA for convolutive speech mixtures","authors":"T. Jan, H. Zafar, R. A. Khalil, M. Ashraf","doi":"10.1109/CEEC.2016.7835903","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835903","url":null,"abstract":"Here we present a new algorithm for the separation of convolutive speech observations using recordings from 2 microphones. This method is the union of independent vector analysis (IVA) and ideal binary mask (IBM), in conjunction with a post-filtering process in the cepstral domain. The proposed algorithm comprises of 3 steps. In the first step, an IVA algorithm is applied for the separation of the source signals from 2-microphone recordings. Second step is the estimation of IBM by the comparison of the energy of corresponding time-frequency (T-F) units of the segregated sources that are achieved using the IVA technique. Final step is the reduction of the musical noise by employing cepstral smoothing and such a noise is generated due to T-F masking. The signal to noise ratio (SNR) measurement has been used to evaluate the overall performance of the proposed method by employing the reverberant mixtures that are produced via simulated room model. The evaluation shows that it is more efficient and speech quality has been improved while generating similar segregation performance compared to a state-of-the-art approach.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129558956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enabling wireless Software Defined Networking in cloud based Machine-to-Machine gateway 在基于云的机器对机器网关中实现无线软件定义网络
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-09-01 DOI: 10.1109/CEEC.2016.7835883
Bilal R. Al-Kaseem, H. Al-Raweshidy
{"title":"Enabling wireless Software Defined Networking in cloud based Machine-to-Machine gateway","authors":"Bilal R. Al-Kaseem, H. Al-Raweshidy","doi":"10.1109/CEEC.2016.7835883","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835883","url":null,"abstract":"Machine-to-Machine (M2M) and Internet-of-Things (IoT) buildup of a large number of devices that are capable of sensing or actuating and provide ubiquitous connectivity and processing to enhance the daily life activities. This paper proposes a wireless Software Defined Networking (SDN) solution for M2M gateway based on the cloud environment. The proposed approach takes the advantage of SDN in separating the control plane from the data plane in network devices and running the software component on centralized M2M gateway connected to the cloud. The proposed approach validated through experimental analysis testbed, the obtained result shows that SD-M2M gateway reduces the end-to-end delay by approximately 23% and 15% compared to M2M gateway without SDN in terms of data gathering and control command sending respectively. The proposed approach provides significant flexibility for network resource management.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rolling Horizon Coevolutionary planning for two-player video games 双人电子游戏的协同进化规划
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 2016-07-06 DOI: 10.1109/CEEC.2016.7835909
Jialin Liu, Diego Perez Liebana, S. Lucas
{"title":"Rolling Horizon Coevolutionary planning for two-player video games","authors":"Jialin Liu, Diego Perez Liebana, S. Lucas","doi":"10.1109/CEEC.2016.7835909","DOIUrl":"https://doi.org/10.1109/CEEC.2016.7835909","url":null,"abstract":"This paper describes a new algorithm for decision making in two-player real-time video games. As with Monte Carlo Tree Search, the algorithm can be used without heuristics and has been developed for use in general video game AI.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132627319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Human Activity Recognition from automatically labeled data in RGB-D videos 基于RGB-D视频中自动标记数据的人类活动识别
2016 8th Computer Science and Electronic Engineering (CEEC) Pub Date : 1900-01-01 DOI: 10.1109/ceec.2016.7835894
David Jardim, Luís Nunes, José Miguel Salles Dias
{"title":"Human Activity Recognition from automatically labeled data in RGB-D videos","authors":"David Jardim, Luís Nunes, José Miguel Salles Dias","doi":"10.1109/ceec.2016.7835894","DOIUrl":"https://doi.org/10.1109/ceec.2016.7835894","url":null,"abstract":"Human Activity Recognition (HAR) is an interdisciplinary research area that has been attracting interest from several research communities specialized in machine learning, computer vision, medical and gaming research. The potential applications range from surveillance systems, human computer interfaces, sports video analysis, digital shopping assistants, video retrieval, games and health-care. Several and diverse approaches exist to recognize a human action. From computer vision techniques, modeling relations between human motion and objects, marker-based tracking systems and RGB-D cameras. Using a Kinect sensor that provides the position of the main skeleton joints we extract features based solely on the motion of those joints. This paper aims to compare the performance of several supervised classifiers trained with manually labeled data versus the same classifiers trained with data automatically labeled. We propose a framework capable of recognizing human actions using supervised classifiers trained with automatically labeled data.","PeriodicalId":114518,"journal":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信