{"title":"An Adaptive User-Interface Based on User's Emotion","authors":"K. Dalvand, M. Kazemifard","doi":"10.1109/ICCKE.2012.6395371","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395371","url":null,"abstract":"In this paper, we introduce AUBUE - Adaptive User-Interface Based on User's Emotion in which a user's emotions are detected according to interactions of the user with keyboard; then user interface's color is adopted regarding to users' emotion. AUBUE includes four elements: keyboard interpretation, event interpretation, mood update, and color selection. In the keyboard interpretation element, interactions of a user with keyboard are analyzed with respect to some predefined parameters. In the event interpretation element, keyboard interactions are interpreted as active emotions of the user. Mood update element is responsible for mapping active emotions to a mood and updating current mood. Finally, the color selection element selects appropriate colors to cope with current mood. We have implemented AUBUE in a shape guess game.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three novel spike detection approaches for noisy neuronal data","authors":"Hamed Azami, Saeid Sanei","doi":"10.1109/ICCKE.2012.6395350","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395350","url":null,"abstract":"In this paper three new approaches based on smoothed nonlinear energy operator (SNEO), fractal dimension (FD) and standard deviation to detect the spikes for noisy neuronal data are proposed. In many cases, especially when there are several noise sources, these methods may not be acceptable as spike detectors. To overcome these problems, we use Savitzky-Golay filter and discrete wavelet transform (DWT) as pre-processing steps. Results show that when there is too much noise in the signal, the proposed method using the standard deviation and DWT can detect the spikes better than the other methods. The average detection rate and false detection of spikes for the proposed method based on standard deviation and DWT are respectively 100% and 43% for semireal signals with SNR=-5 dB.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126652909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new digital image watermarking approach based on DWT-SVD and CPPN-NEAT","authors":"K. Ghaderi, F. Akhlghian, P. Moradi","doi":"10.1109/ICCKE.2012.6395344","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395344","url":null,"abstract":"Digital watermarking has been proposed as a way to claim ownership. In this paper, a new approach in digital image watermarking based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is presented. We use compositional pattern producing networks (CPPNs) to make a very compact representation of watermark. Using Neuro Evolution of Augmenting Topologies (NEAT) will evolve the CPPN structure to produce a suitable watermark image. In the embedding phase, at first we perform decomposing of the host image with 2D-DWT transform at 5-level, then the SVD is applied to LH3-LH5 sub-bands of transformed image, and embed the watermark by modifying the singular values. In watermark extraction phase, the embedded coefficients of CPPN neat are extracted from the watermarked image. Then the watermark image is rendered by CPPN. The experiments indicate that the watermark is robust against the different attacks, such as average filter, Jpeg compression and etc.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous parallel parking of a vehicle in a limited space using a RBF network and a feedback linearization controller","authors":"N. N. Samani, J. Ghaisari, M. Danesh","doi":"10.1109/ICCKE.2012.6395363","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395363","url":null,"abstract":"In this paper, the issue of autonomous parallel parking of a vehicle in a limited space has been considered based on a parked vehicle in front. A Radial Basis Function Network (RBFN) has been developed to online path generation according to the measured distance from the parked vehicle. These measurements are obtained by employing two sonar sensors mounted in the front left corner of the vehicle. Fifth order polynomial reference paths for three different initial positions have been used to generate training data for the network. In order to use feedback linearization controller for tracking the desired parking path, two timing laws have been proposed for forward and backward maneuvers and the control laws have been designed in timing laws-domain. These timing laws have been considered such that zero velocity is obtained for the vehicle at the initial and goal points of the parking maneuver, as well as, at the point that direction of motion must change, without occurrence singularity in the control laws. Furthermore, due to change of the desired path and direction of motion based on the vehicle's configuration, the vehicle can be parked in limited area. Simulation results show the effectiveness of the proposed approach to use the nonlinear controller in order to intelligently perform the parallel parking in a limited space without knowing the parking space width and only based on distance measurements from the parked vehicle.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115835675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A feasibility study on detection of Neovascularization in retinal color images using texture","authors":"Maryam Vatanparast, A. Harati","doi":"10.1109/ICCKE.2012.6395382","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395382","url":null,"abstract":"Retinal Neovascularization (NV) is one of the most important causes of diabetic blindness which emphasizes the serious need for automatic screening tools to diagnose diabetes and treat it as early as possible. In this work, the problem of NV detection in the color images of retina is considered. Previous researches in the analysis of retinal images either ignore such complex lesion or in few cases approach it superficially and pose many limitations. Obtaining a complete vessel map and then trying to identify NV is a recent methodology. Unfortunately, NV mainly affects small and hard to detect vessels, hence, we believe such an approach is inherently limited. Therefore, in this paper six different texture descriptions are proposed as features in the classification of retinal images into NV and normal group. We study application of the proposed features using a support vector machine (SVM) as a simple classifier to emphasize the importance of features against the complexity of the classifier. Feature extraction is performed on local regions of the images (128×128) to localize the lesion. A dataset of 4541 regions is considered that contains 1319 NV regions which are manually marked by an expert. The results show the proposed texture descriptors are able to reveal the NV lesion with an acceptable accuracy of around 90%.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A light-weight secure broadcast for delay-tolerant applications in single-hop wireless sensor networks","authors":"H. Nasiraee, J. B. Mohasefi","doi":"10.1109/ICCKE.2012.6395397","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395397","url":null,"abstract":"Symmetric encryption of data using time-varying keys at base-station is proposed as an attractive and interesting method for broadcasting in wireless sensor networks since last time. In this paper, we have proposed a light-weight encryption scheme using time-varying at cost of delayed-verification. Main idea of the proposed model is that instead of using one key per each packet, we use one key per each given number of packets. However, a significant problem is that interference or disconnections may cause a receiver to miss broadcast packets and the dynamic keys contained therein, rendering it unable to participate in subsequent broadcasts. Hence, we improve our proposal by a patch-like loss-recovery scheme. At the end, we will discuss the security and performance aspects of our method.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new method for hybridizing metaheuristics for multi-objective flexible job shop scheduling","authors":"R. Javadi, M. Hasanzadeh","doi":"10.1109/ICCKE.2012.6395361","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395361","url":null,"abstract":"Flexible job shop scheduling problem (FJSP) is an important extension of the classical job shop scheduling problem, where each operation could be processed on more than one machine and vice versa. Since it has been proven that this problem is strongly NP-hard, it is difficult to achieve an optimal solution with traditional optimization algorithms. In this paper a new approach is proposed to solve the multi-objective FJSP. This new approach has three steps. First, an initial population of feasible solutions with good distribution in the search space is created by using a parameter called neighborhood. Second, this population, based on fitness and neighborhood parameters, explores the search space until it will form several dynamic clusters around good areas, including local optimums. Finally, in parallel, a local search is performed on the best solution for each cluster by using Tabu Search algorithm and eventually the optimal solution is obtained among them. Computational results on benchmark problems show that the optimal solutions are obtained much faster than other approaches.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129324792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-based recommender system for learning resource by learner preference tree","authors":"M. Salehi, I. N. Kmalabadi","doi":"10.1109/ICCKE.2012.6395366","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395366","url":null,"abstract":"In recent years, with growth of online learning technology, a huge amount of e-learning resources have been generated in various media formats. This growth has caused difficulty of locating appropriate learning resources to learners. A personalized recommendation is an enabling mechanism to overcome information overload occurred in the new learning environments and deliver suitable learner resources to learners. Since users express their opinions based on some specific attributes of items, this paper considers contextual information including attributes of learning resources and rating of learner simultaneously to address some problem such as sparsity and cold start problem and also improve the quality on recommendations. Learning Tree (LT) is introduced that can model the interest of learners based on attributes of learning resources in multidimensional space using learner historical accessed resources. Then, using a new similarity measure between learners, recommendations are generated. The experimental results show that our proposed method outperforms current algorithms and alleviates problems such as cold-start and sparsity.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization of hard exudates in retinal fundus image by mathematical morphology operations","authors":"Mehdi Ghafourian Fakhar Eadgahi, H. Pourreza","doi":"10.1109/ICCKE.2012.6395375","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395375","url":null,"abstract":"Diabetic retinopathy is one of the leading causes of blindness in the world. Detection of hard exudates is an important step for early diagnosis in eye diseases such as Macular Edema(ME). If hard exudates were segmented precisely, laser treatments can be applied more effective for patients by surgeons. The possibility of blindness is very high when the hard exudates are very close to Macula region or Optic disc. Therefore, fast and accurate segmentation is one of the most important factors in elimination of hard exudates. In this paper, a method is proposed for segmentation of hard exudates in retinal color image based on morphological operation. In the proposed method, the retinal images preprocessed and optic disc and the blood vessels identified primarily and then they eliminate from the image. Finally, the Hard Exudates (HEs) are segmented by mixture of morphological operation such as Top-hat, Bottom-hat and reconstruction operations. The proposed method was tested on DIARETDB1 database and 78.28% of sensitivity was obtained. Comparing to other recent automatic method available in the literature, our proposed method can obtain acceptable exudates detection result in term of sensitivity.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133009121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy gravitational search algorithm","authors":"Fatemeh-Sadat Saeidi-Khabisi, E. Rashedi","doi":"10.1109/ICCKE.2012.6395370","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395370","url":null,"abstract":"One of the noticeable topics in fuzzy logic controllers is parameter controlling of heuristic search algorithms. In this paper, one of the parameters of Gravitational Search Algorithm, GSA, is controlled using fuzzy logic controller to achieve better optimization results and to increase convergence rate. Several experiments are performed and results are compared with the results of the original GSA. Experimental results confirm the efficiency of the proposed method.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}