2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)最新文献

筛选
英文 中文
An Adaptive User-Interface Based on User's Emotion 基于用户情感的自适应用户界面
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395371
K. Dalvand, M. Kazemifard
{"title":"An Adaptive User-Interface Based on User's Emotion","authors":"K. Dalvand, M. Kazemifard","doi":"10.1109/ICCKE.2012.6395371","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395371","url":null,"abstract":"In this paper, we introduce AUBUE - Adaptive User-Interface Based on User's Emotion in which a user's emotions are detected according to interactions of the user with keyboard; then user interface's color is adopted regarding to users' emotion. AUBUE includes four elements: keyboard interpretation, event interpretation, mood update, and color selection. In the keyboard interpretation element, interactions of a user with keyboard are analyzed with respect to some predefined parameters. In the event interpretation element, keyboard interactions are interpreted as active emotions of the user. Mood update element is responsible for mapping active emotions to a mood and updating current mood. Finally, the color selection element selects appropriate colors to cope with current mood. We have implemented AUBUE in a shape guess game.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Three novel spike detection approaches for noisy neuronal data 噪声神经元数据的三种新型尖峰检测方法
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395350
Hamed Azami, Saeid Sanei
{"title":"Three novel spike detection approaches for noisy neuronal data","authors":"Hamed Azami, Saeid Sanei","doi":"10.1109/ICCKE.2012.6395350","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395350","url":null,"abstract":"In this paper three new approaches based on smoothed nonlinear energy operator (SNEO), fractal dimension (FD) and standard deviation to detect the spikes for noisy neuronal data are proposed. In many cases, especially when there are several noise sources, these methods may not be acceptable as spike detectors. To overcome these problems, we use Savitzky-Golay filter and discrete wavelet transform (DWT) as pre-processing steps. Results show that when there is too much noise in the signal, the proposed method using the standard deviation and DWT can detect the spikes better than the other methods. The average detection rate and false detection of spikes for the proposed method based on standard deviation and DWT are respectively 100% and 43% for semireal signals with SNR=-5 dB.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126652909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new digital image watermarking approach based on DWT-SVD and CPPN-NEAT 一种基于DWT-SVD和CPPN-NEAT的数字图像水印方法
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395344
K. Ghaderi, F. Akhlghian, P. Moradi
{"title":"A new digital image watermarking approach based on DWT-SVD and CPPN-NEAT","authors":"K. Ghaderi, F. Akhlghian, P. Moradi","doi":"10.1109/ICCKE.2012.6395344","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395344","url":null,"abstract":"Digital watermarking has been proposed as a way to claim ownership. In this paper, a new approach in digital image watermarking based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is presented. We use compositional pattern producing networks (CPPNs) to make a very compact representation of watermark. Using Neuro Evolution of Augmenting Topologies (NEAT) will evolve the CPPN structure to produce a suitable watermark image. In the embedding phase, at first we perform decomposing of the host image with 2D-DWT transform at 5-level, then the SVD is applied to LH3-LH5 sub-bands of transformed image, and embed the watermark by modifying the singular values. In watermark extraction phase, the embedded coefficients of CPPN neat are extracted from the watermarked image. Then the watermark image is rendered by CPPN. The experiments indicate that the watermark is robust against the different attacks, such as average filter, Jpeg compression and etc.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Autonomous parallel parking of a vehicle in a limited space using a RBF network and a feedback linearization controller 基于RBF网络和反馈线性化控制器的车辆在有限空间内自主平行停车
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395363
N. N. Samani, J. Ghaisari, M. Danesh
{"title":"Autonomous parallel parking of a vehicle in a limited space using a RBF network and a feedback linearization controller","authors":"N. N. Samani, J. Ghaisari, M. Danesh","doi":"10.1109/ICCKE.2012.6395363","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395363","url":null,"abstract":"In this paper, the issue of autonomous parallel parking of a vehicle in a limited space has been considered based on a parked vehicle in front. A Radial Basis Function Network (RBFN) has been developed to online path generation according to the measured distance from the parked vehicle. These measurements are obtained by employing two sonar sensors mounted in the front left corner of the vehicle. Fifth order polynomial reference paths for three different initial positions have been used to generate training data for the network. In order to use feedback linearization controller for tracking the desired parking path, two timing laws have been proposed for forward and backward maneuvers and the control laws have been designed in timing laws-domain. These timing laws have been considered such that zero velocity is obtained for the vehicle at the initial and goal points of the parking maneuver, as well as, at the point that direction of motion must change, without occurrence singularity in the control laws. Furthermore, due to change of the desired path and direction of motion based on the vehicle's configuration, the vehicle can be parked in limited area. Simulation results show the effectiveness of the proposed approach to use the nonlinear controller in order to intelligently perform the parallel parking in a limited space without knowing the parking space width and only based on distance measurements from the parked vehicle.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115835675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A feasibility study on detection of Neovascularization in retinal color images using texture 利用纹理检测视网膜彩色图像新生血管的可行性研究
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395382
Maryam Vatanparast, A. Harati
{"title":"A feasibility study on detection of Neovascularization in retinal color images using texture","authors":"Maryam Vatanparast, A. Harati","doi":"10.1109/ICCKE.2012.6395382","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395382","url":null,"abstract":"Retinal Neovascularization (NV) is one of the most important causes of diabetic blindness which emphasizes the serious need for automatic screening tools to diagnose diabetes and treat it as early as possible. In this work, the problem of NV detection in the color images of retina is considered. Previous researches in the analysis of retinal images either ignore such complex lesion or in few cases approach it superficially and pose many limitations. Obtaining a complete vessel map and then trying to identify NV is a recent methodology. Unfortunately, NV mainly affects small and hard to detect vessels, hence, we believe such an approach is inherently limited. Therefore, in this paper six different texture descriptions are proposed as features in the classification of retinal images into NV and normal group. We study application of the proposed features using a support vector machine (SVM) as a simple classifier to emphasize the importance of features against the complexity of the classifier. Feature extraction is performed on local regions of the images (128×128) to localize the lesion. A dataset of 4541 regions is considered that contains 1319 NV regions which are manually marked by an expert. The results show the proposed texture descriptors are able to reveal the NV lesion with an acceptable accuracy of around 90%.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A light-weight secure broadcast for delay-tolerant applications in single-hop wireless sensor networks 用于单跳无线传感器网络中容延迟应用的轻量级安全广播
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395397
H. Nasiraee, J. B. Mohasefi
{"title":"A light-weight secure broadcast for delay-tolerant applications in single-hop wireless sensor networks","authors":"H. Nasiraee, J. B. Mohasefi","doi":"10.1109/ICCKE.2012.6395397","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395397","url":null,"abstract":"Symmetric encryption of data using time-varying keys at base-station is proposed as an attractive and interesting method for broadcasting in wireless sensor networks since last time. In this paper, we have proposed a light-weight encryption scheme using time-varying at cost of delayed-verification. Main idea of the proposed model is that instead of using one key per each packet, we use one key per each given number of packets. However, a significant problem is that interference or disconnections may cause a receiver to miss broadcast packets and the dynamic keys contained therein, rendering it unable to participate in subsequent broadcasts. Hence, we improve our proposal by a patch-like loss-recovery scheme. At the end, we will discuss the security and performance aspects of our method.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new method for hybridizing metaheuristics for multi-objective flexible job shop scheduling 多目标柔性作业车间调度的混合元启发式新方法
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395361
R. Javadi, M. Hasanzadeh
{"title":"A new method for hybridizing metaheuristics for multi-objective flexible job shop scheduling","authors":"R. Javadi, M. Hasanzadeh","doi":"10.1109/ICCKE.2012.6395361","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395361","url":null,"abstract":"Flexible job shop scheduling problem (FJSP) is an important extension of the classical job shop scheduling problem, where each operation could be processed on more than one machine and vice versa. Since it has been proven that this problem is strongly NP-hard, it is difficult to achieve an optimal solution with traditional optimization algorithms. In this paper a new approach is proposed to solve the multi-objective FJSP. This new approach has three steps. First, an initial population of feasible solutions with good distribution in the search space is created by using a parameter called neighborhood. Second, this population, based on fitness and neighborhood parameters, explores the search space until it will form several dynamic clusters around good areas, including local optimums. Finally, in parallel, a local search is performed on the best solution for each cluster by using Tabu Search algorithm and eventually the optimal solution is obtained among them. Computational results on benchmark problems show that the optimal solutions are obtained much faster than other approaches.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129324792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Attribute-based recommender system for learning resource by learner preference tree 基于学习者偏好树的学习资源属性推荐系统
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395366
M. Salehi, I. N. Kmalabadi
{"title":"Attribute-based recommender system for learning resource by learner preference tree","authors":"M. Salehi, I. N. Kmalabadi","doi":"10.1109/ICCKE.2012.6395366","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395366","url":null,"abstract":"In recent years, with growth of online learning technology, a huge amount of e-learning resources have been generated in various media formats. This growth has caused difficulty of locating appropriate learning resources to learners. A personalized recommendation is an enabling mechanism to overcome information overload occurred in the new learning environments and deliver suitable learner resources to learners. Since users express their opinions based on some specific attributes of items, this paper considers contextual information including attributes of learning resources and rating of learner simultaneously to address some problem such as sparsity and cold start problem and also improve the quality on recommendations. Learning Tree (LT) is introduced that can model the interest of learners based on attributes of learning resources in multidimensional space using learner historical accessed resources. Then, using a new similarity measure between learners, recommendations are generated. The experimental results show that our proposed method outperforms current algorithms and alleviates problems such as cold-start and sparsity.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Localization of hard exudates in retinal fundus image by mathematical morphology operations 用数学形态学方法定位眼底硬渗出物
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395375
Mehdi Ghafourian Fakhar Eadgahi, H. Pourreza
{"title":"Localization of hard exudates in retinal fundus image by mathematical morphology operations","authors":"Mehdi Ghafourian Fakhar Eadgahi, H. Pourreza","doi":"10.1109/ICCKE.2012.6395375","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395375","url":null,"abstract":"Diabetic retinopathy is one of the leading causes of blindness in the world. Detection of hard exudates is an important step for early diagnosis in eye diseases such as Macular Edema(ME). If hard exudates were segmented precisely, laser treatments can be applied more effective for patients by surgeons. The possibility of blindness is very high when the hard exudates are very close to Macula region or Optic disc. Therefore, fast and accurate segmentation is one of the most important factors in elimination of hard exudates. In this paper, a method is proposed for segmentation of hard exudates in retinal color image based on morphological operation. In the proposed method, the retinal images preprocessed and optic disc and the blood vessels identified primarily and then they eliminate from the image. Finally, the Hard Exudates (HEs) are segmented by mixture of morphological operation such as Top-hat, Bottom-hat and reconstruction operations. The proposed method was tested on DIARETDB1 database and 78.28% of sensitivity was obtained. Comparing to other recent automatic method available in the literature, our proposed method can obtain acceptable exudates detection result in term of sensitivity.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133009121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Fuzzy gravitational search algorithm 模糊引力搜索算法
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395370
Fatemeh-Sadat Saeidi-Khabisi, E. Rashedi
{"title":"Fuzzy gravitational search algorithm","authors":"Fatemeh-Sadat Saeidi-Khabisi, E. Rashedi","doi":"10.1109/ICCKE.2012.6395370","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395370","url":null,"abstract":"One of the noticeable topics in fuzzy logic controllers is parameter controlling of heuristic search algorithms. In this paper, one of the parameters of Gravitational Search Algorithm, GSA, is controlled using fuzzy logic controller to achieve better optimization results and to increase convergence rate. Several experiments are performed and results are compared with the results of the original GSA. Experimental results confirm the efficiency of the proposed method.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信