2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)最新文献

筛选
英文 中文
De-blurring methodology of license plate using sparse representation 基于稀疏表示的车牌去模糊方法
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395348
Venous Moslemi
{"title":"De-blurring methodology of license plate using sparse representation","authors":"Venous Moslemi","doi":"10.1109/ICCKE.2012.6395348","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395348","url":null,"abstract":"A super-resolution reconstruction from single image algorithm designed for license plate recognition is proposed in this paper. Low resolution images database is generated by down sampling and adding white Gaussian noise to the super resolution license plate database. The low-resolution image can be viewed as a down sampled version of a high-resolution image, where its patches are assumed to have a sparse representation with respect to an over-complete dictionary of prototype signal atoms. The principle of compressed sensing ensures that under mild conditions, the sparse representation can be correctly recovered from the down sampled signal. Therefore, two dictionary of low and high resolution from same images patches are trained. Finally, super resolution images from single low resolution image are recovered, by solving an optimization problem by genetic algorithm.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blind digital image watermarking based on CT-SVD and chaotic cellular automata 基于CT-SVD和混沌元胞自动机的数字图像盲水印
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395396
R. Hadi, P. Ayubi
{"title":"Blind digital image watermarking based on CT-SVD and chaotic cellular automata","authors":"R. Hadi, P. Ayubi","doi":"10.1109/ICCKE.2012.6395396","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395396","url":null,"abstract":"In this paper a new blind watermarking scheme for Gray scale image is proposed based on contourlet Transform, Singular value decomposition and chaotic cellular automata. Contourlet transform is a new two-dimensional extension of the wavelet transform using multiscale and directional filter banks. In this work, Cellular automata is used to encrypt the watermarking logo to improve the security of watermarked image also used to determine the location of image's block for the watermarking embedding. To test the robustness and effectiveness of our proposed method, Several attacks are applied to the watermarked image and the best results have been reported. Also we used four key for improve security watermarking.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124100224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sales forecast for pickup truck parts: A case study on brake rubber 皮卡零件的销售预测:以制动橡胶为例
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395374
M. Kamranfard, K. Kiani
{"title":"Sales forecast for pickup truck parts: A case study on brake rubber","authors":"M. Kamranfard, K. Kiani","doi":"10.1109/ICCKE.2012.6395374","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395374","url":null,"abstract":"In this paper we address sales forecasting of brake rubber for 1600 pickup truck manufactured by Iran Khodro Co. To this end, we use two different methods named Neural Network (NN) and regression model. Further, we develop two types of neural networks, one general network and a set of monthly networks. Results reveal that when data are nonlinear and chaotic, traditional models like regression are less likely to be useful. In these cases we can use nonlinear models like neural networks. It is shown that general network is not a useful tool for forecasting sales of brake rubber, whereas monthly networks are accurate and useful for this purpose.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Churn calculation based on Swarm Intelligence algorithms in social networks 基于群体智能算法的社交网络流失率计算
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395373
H. Sotoodeh, E. Daei, F. Safaei, Pejman Mohammadi
{"title":"Churn calculation based on Swarm Intelligence algorithms in social networks","authors":"H. Sotoodeh, E. Daei, F. Safaei, Pejman Mohammadi","doi":"10.1109/ICCKE.2012.6395373","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395373","url":null,"abstract":"Today, the churn phenomenon has been considered in many applications as an important outcome. Social networks can be considered as one of the most important applications with the mentioned outcome. Churn in social networks depends on the users' activity in a communication environment and appears if this activity is less than a required extent. Swarm Intelligence algorithms(SI), assumed to be the proper tools to model the communications in a social network. This bunch of algorithms according to the local agents' behavior, try to result the global behavior. This paper aims to measuring the user's churn by the mentioned method and including the communication messages transferred by the users in the network. Considering the measured activity rate, a churn threshold in various areas of communication will be obtained. Simulation results referring to confirmed the presented model of communication. The model validation and other values are obtained by a discrete event simulator. The communications used in this simulation result from mining a data set including real communications for one species of the mentioned networks.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on the effect of applying clustering on sink movement for data gathering in wireless sensor networks 应用聚类对无线传感器网络数据采集中sink移动的影响研究
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395390
A. N. Emamzade, M. Heidari, H. Naji
{"title":"A study on the effect of applying clustering on sink movement for data gathering in wireless sensor networks","authors":"A. N. Emamzade, M. Heidari, H. Naji","doi":"10.1109/ICCKE.2012.6395390","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395390","url":null,"abstract":"In mobile wireless sensor networks, mobile elements can be either sink or sensor. In these networks, energy constraint is very important. Clustering enhances network performance by conserve more energy as a result of data aggregation and fewer data transmission. More energy saving in mobile wireless sensor networks results using energy aware clustering algorithms, which causes network remains longer. The goal of this study is using LEACH as a clustering algorithm, which is one of the most well-known and practical energy balancing algorithms in the network. We perform mathematical analysis based on LEACH using Markov model. Furthermore, the most optimal path for moving sink is achieved by an improvement of ant colony optimization. Comparing our proposed method with circular sink methodology revealed that our method outperforms in network longevity and energy consumption.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121717719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved direct torque control using fuzzy logic controllers and adaptive observer 采用模糊逻辑控制器和自适应观测器对直接转矩控制进行改进
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395357
H. Saberi, M. Sharifian
{"title":"An improved direct torque control using fuzzy logic controllers and adaptive observer","authors":"H. Saberi, M. Sharifian","doi":"10.1109/ICCKE.2012.6395357","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395357","url":null,"abstract":"Simple structure, quick, and robust response of direct torque control (DTC) make it attractive in ac drives. However, in sensorless applications, precise estimation of rotor speed is a crucial issue as well as the torque and flux estimation. In this paper an adaptive flux observer is introduced with stator current and flux vector components as state variables and rotor speed as an unknown parameter which are estimated simultaneously using an adaptive scheme. Also torque, flux, and current pulsations during steady state are considered as the disadvantages of the classical DTC method. A combined DTC-SVM strategy is presented using fuzzy logic control (FLC). Fuzzy logic controllers are designed such that obtain a fast response for dynamic performance, and high accuracy in steady state.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"118 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114169498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reusability assessment of test collections with multi-levels of judgments 用多层判断对测试集合进行可重用性评估
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395381
M. Khodabakhsh, S. Araban
{"title":"Reusability assessment of test collections with multi-levels of judgments","authors":"M. Khodabakhsh, S. Araban","doi":"10.1109/ICCKE.2012.6395381","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395381","url":null,"abstract":"Constructing good test collection is an expensive and time-consuming process. Traditionally, test collections contain binary judgments. In recent years, however, there has been increasingly interest in test collections with Multi-levels judgments and of certain qualities. Such collections are even more expensive to construct. Therefore, ability to reuse test collections can not only save construction costs, but also boosts our confidence in their quality. This paper proposes a method for assessing reusability of a test collection with multi-level judgments. The proposed method can help IR researchers to determine whether an existing test collection with a set of multi-level judgments is suitable for evaluating a new IR system or not. Results of our experiments (on MAHAK test collection) suggest that this method can help assessing reusability of a test collection.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115103954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach toward spam detection based on iterative patterns 基于迭代模式的垃圾邮件检测新方法
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395399
M. Razmara, B. Asadi, M. Narouei, M. Ahmadi
{"title":"A novel approach toward spam detection based on iterative patterns","authors":"M. Razmara, B. Asadi, M. Narouei, M. Ahmadi","doi":"10.1109/ICCKE.2012.6395399","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395399","url":null,"abstract":"Spamming is becoming a major threat that negatively impacts the usability of e-mail. Although lots of techniques have been proposed for detecting and blocking spam messages, Spammers still spread spam e-mails for different purposes such as advertising, phishing, adult and other purposes and there is not any complete solution for this problem. In this work we present a novel solution toward spam filtering by using a new set of features for classification models. These features are the sequential unique and closed patterns which are extracted from the content of messages. After applying a term selection method, we show that these features have good performance in classifying spam messages from legitimate messages. The achieved results on 6 different datasets show the effectiveness of our proposed method compared to close similar methods. We outperform the accuracy near +2% compared to related state of arts. In addition our method is resilient against injecting irrelevant and bothersome words.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130103852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intelligent target tracking in Wireless Visual Sensor Networks 无线视觉传感器网络中的智能目标跟踪
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395383
Mohammd Sabokrou, Mahmood Fathy, Mojtaba Hoseni
{"title":"Intelligent target tracking in Wireless Visual Sensor Networks","authors":"Mohammd Sabokrou, Mahmood Fathy, Mojtaba Hoseni","doi":"10.1109/ICCKE.2012.6395383","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395383","url":null,"abstract":"In this paper, a new target tracking method is proposed in Wireless Visual Sensor Networks (WVSN) using target movement prediction. Two important criteria in this regard are accuracy of tracking and efficient energy consumption. Because there is a direct relationship between the amount of coverage and accuracy tracking, an Evolutionary Algorithm (EA) is used as pre-processing to increase the coverage percentage. Then, a neural network-based approach using history of target movements is presented to predict the path of the target. Computer simulations showed improvement in tracking accuracy, configuration of WVSN cost and energy conservation. The important advantage of this approach is the capability of tracking in an environment, which is not covered completely.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A group-based trust propagation method 一种基于组的信任传播方法
2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) Pub Date : 2012-12-31 DOI: 10.1109/ICCKE.2012.6395398
F. Easa, A. G. Bafghi, H. Shakeri
{"title":"A group-based trust propagation method","authors":"F. Easa, A. G. Bafghi, H. Shakeri","doi":"10.1109/ICCKE.2012.6395398","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395398","url":null,"abstract":"Trust is a concept taken from social sciences and is considered as a soft security approach that is effective in reducing risk. In this paper, for estimating the trust between unknown nodes, a group-based trust propagation method has been proposed. Most of the conventional trust propagation methods are not applicable for trust evaluation of today's large trust graphs. Our trust propagation method is scalable because of using grouping method. For better trust estimation inside group the confidence of trust value have been considered. We also consider two factors Intermediate Group Confidence (IGC) and Group Confidence (GC) for confidence of trust between two groups. To evaluate this method a real large data set of advogato.org is used. Evaluation of accuracy is based on correlation and mean absolute error(MAE). Comparing the proposed method with the Iterative Multiplication method (IMS) results suggests that the correlation and absolute mean error have been improved. In addition, due to the use of group-based method the speed of the proposed method has been improved.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115440462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信