{"title":"De-blurring methodology of license plate using sparse representation","authors":"Venous Moslemi","doi":"10.1109/ICCKE.2012.6395348","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395348","url":null,"abstract":"A super-resolution reconstruction from single image algorithm designed for license plate recognition is proposed in this paper. Low resolution images database is generated by down sampling and adding white Gaussian noise to the super resolution license plate database. The low-resolution image can be viewed as a down sampled version of a high-resolution image, where its patches are assumed to have a sparse representation with respect to an over-complete dictionary of prototype signal atoms. The principle of compressed sensing ensures that under mild conditions, the sparse representation can be correctly recovered from the down sampled signal. Therefore, two dictionary of low and high resolution from same images patches are trained. Finally, super resolution images from single low resolution image are recovered, by solving an optimization problem by genetic algorithm.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind digital image watermarking based on CT-SVD and chaotic cellular automata","authors":"R. Hadi, P. Ayubi","doi":"10.1109/ICCKE.2012.6395396","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395396","url":null,"abstract":"In this paper a new blind watermarking scheme for Gray scale image is proposed based on contourlet Transform, Singular value decomposition and chaotic cellular automata. Contourlet transform is a new two-dimensional extension of the wavelet transform using multiscale and directional filter banks. In this work, Cellular automata is used to encrypt the watermarking logo to improve the security of watermarked image also used to determine the location of image's block for the watermarking embedding. To test the robustness and effectiveness of our proposed method, Several attacks are applied to the watermarked image and the best results have been reported. Also we used four key for improve security watermarking.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124100224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sales forecast for pickup truck parts: A case study on brake rubber","authors":"M. Kamranfard, K. Kiani","doi":"10.1109/ICCKE.2012.6395374","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395374","url":null,"abstract":"In this paper we address sales forecasting of brake rubber for 1600 pickup truck manufactured by Iran Khodro Co. To this end, we use two different methods named Neural Network (NN) and regression model. Further, we develop two types of neural networks, one general network and a set of monthly networks. Results reveal that when data are nonlinear and chaotic, traditional models like regression are less likely to be useful. In these cases we can use nonlinear models like neural networks. It is shown that general network is not a useful tool for forecasting sales of brake rubber, whereas monthly networks are accurate and useful for this purpose.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Churn calculation based on Swarm Intelligence algorithms in social networks","authors":"H. Sotoodeh, E. Daei, F. Safaei, Pejman Mohammadi","doi":"10.1109/ICCKE.2012.6395373","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395373","url":null,"abstract":"Today, the churn phenomenon has been considered in many applications as an important outcome. Social networks can be considered as one of the most important applications with the mentioned outcome. Churn in social networks depends on the users' activity in a communication environment and appears if this activity is less than a required extent. Swarm Intelligence algorithms(SI), assumed to be the proper tools to model the communications in a social network. This bunch of algorithms according to the local agents' behavior, try to result the global behavior. This paper aims to measuring the user's churn by the mentioned method and including the communication messages transferred by the users in the network. Considering the measured activity rate, a churn threshold in various areas of communication will be obtained. Simulation results referring to confirmed the presented model of communication. The model validation and other values are obtained by a discrete event simulator. The communications used in this simulation result from mining a data set including real communications for one species of the mentioned networks.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on the effect of applying clustering on sink movement for data gathering in wireless sensor networks","authors":"A. N. Emamzade, M. Heidari, H. Naji","doi":"10.1109/ICCKE.2012.6395390","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395390","url":null,"abstract":"In mobile wireless sensor networks, mobile elements can be either sink or sensor. In these networks, energy constraint is very important. Clustering enhances network performance by conserve more energy as a result of data aggregation and fewer data transmission. More energy saving in mobile wireless sensor networks results using energy aware clustering algorithms, which causes network remains longer. The goal of this study is using LEACH as a clustering algorithm, which is one of the most well-known and practical energy balancing algorithms in the network. We perform mathematical analysis based on LEACH using Markov model. Furthermore, the most optimal path for moving sink is achieved by an improvement of ant colony optimization. Comparing our proposed method with circular sink methodology revealed that our method outperforms in network longevity and energy consumption.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121717719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved direct torque control using fuzzy logic controllers and adaptive observer","authors":"H. Saberi, M. Sharifian","doi":"10.1109/ICCKE.2012.6395357","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395357","url":null,"abstract":"Simple structure, quick, and robust response of direct torque control (DTC) make it attractive in ac drives. However, in sensorless applications, precise estimation of rotor speed is a crucial issue as well as the torque and flux estimation. In this paper an adaptive flux observer is introduced with stator current and flux vector components as state variables and rotor speed as an unknown parameter which are estimated simultaneously using an adaptive scheme. Also torque, flux, and current pulsations during steady state are considered as the disadvantages of the classical DTC method. A combined DTC-SVM strategy is presented using fuzzy logic control (FLC). Fuzzy logic controllers are designed such that obtain a fast response for dynamic performance, and high accuracy in steady state.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"118 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114169498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reusability assessment of test collections with multi-levels of judgments","authors":"M. Khodabakhsh, S. Araban","doi":"10.1109/ICCKE.2012.6395381","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395381","url":null,"abstract":"Constructing good test collection is an expensive and time-consuming process. Traditionally, test collections contain binary judgments. In recent years, however, there has been increasingly interest in test collections with Multi-levels judgments and of certain qualities. Such collections are even more expensive to construct. Therefore, ability to reuse test collections can not only save construction costs, but also boosts our confidence in their quality. This paper proposes a method for assessing reusability of a test collection with multi-level judgments. The proposed method can help IR researchers to determine whether an existing test collection with a set of multi-level judgments is suitable for evaluating a new IR system or not. Results of our experiments (on MAHAK test collection) suggest that this method can help assessing reusability of a test collection.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115103954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach toward spam detection based on iterative patterns","authors":"M. Razmara, B. Asadi, M. Narouei, M. Ahmadi","doi":"10.1109/ICCKE.2012.6395399","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395399","url":null,"abstract":"Spamming is becoming a major threat that negatively impacts the usability of e-mail. Although lots of techniques have been proposed for detecting and blocking spam messages, Spammers still spread spam e-mails for different purposes such as advertising, phishing, adult and other purposes and there is not any complete solution for this problem. In this work we present a novel solution toward spam filtering by using a new set of features for classification models. These features are the sequential unique and closed patterns which are extracted from the content of messages. After applying a term selection method, we show that these features have good performance in classifying spam messages from legitimate messages. The achieved results on 6 different datasets show the effectiveness of our proposed method compared to close similar methods. We outperform the accuracy near +2% compared to related state of arts. In addition our method is resilient against injecting irrelevant and bothersome words.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130103852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent target tracking in Wireless Visual Sensor Networks","authors":"Mohammd Sabokrou, Mahmood Fathy, Mojtaba Hoseni","doi":"10.1109/ICCKE.2012.6395383","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395383","url":null,"abstract":"In this paper, a new target tracking method is proposed in Wireless Visual Sensor Networks (WVSN) using target movement prediction. Two important criteria in this regard are accuracy of tracking and efficient energy consumption. Because there is a direct relationship between the amount of coverage and accuracy tracking, an Evolutionary Algorithm (EA) is used as pre-processing to increase the coverage percentage. Then, a neural network-based approach using history of target movements is presented to predict the path of the target. Computer simulations showed improvement in tracking accuracy, configuration of WVSN cost and energy conservation. The important advantage of this approach is the capability of tracking in an environment, which is not covered completely.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A group-based trust propagation method","authors":"F. Easa, A. G. Bafghi, H. Shakeri","doi":"10.1109/ICCKE.2012.6395398","DOIUrl":"https://doi.org/10.1109/ICCKE.2012.6395398","url":null,"abstract":"Trust is a concept taken from social sciences and is considered as a soft security approach that is effective in reducing risk. In this paper, for estimating the trust between unknown nodes, a group-based trust propagation method has been proposed. Most of the conventional trust propagation methods are not applicable for trust evaluation of today's large trust graphs. Our trust propagation method is scalable because of using grouping method. For better trust estimation inside group the confidence of trust value have been considered. We also consider two factors Intermediate Group Confidence (IGC) and Group Confidence (GC) for confidence of trust between two groups. To evaluate this method a real large data set of advogato.org is used. Evaluation of accuracy is based on correlation and mean absolute error(MAE). Comparing the proposed method with the Iterative Multiplication method (IMS) results suggests that the correlation and absolute mean error have been improved. In addition, due to the use of group-based method the speed of the proposed method has been improved.","PeriodicalId":154379,"journal":{"name":"2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115440462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}