{"title":"Automatic Identification and Classifications for Fruits Using k-NN","authors":"A. Nosseir, S. Ahmed","doi":"10.1145/3220267.3220278","DOIUrl":"https://doi.org/10.1145/3220267.3220278","url":null,"abstract":"Most fruit recognition techniques combine different analysis method like color-based, shaped-based, size-based and texture-based. This work classifies the fruits features based on the color RBG values and texture values of the first statistical order and second statistical of the Gray Level Co-occurrence Matrix (GLCM). It applies different classifies Fine K-NN, Medium K-NN, Coarse K-NN, Cosine K-NN, Cubic K-NN, Weighted K-NN. The accuracy of each classifier is 96.3%, 93.8%, 25%, 83.8%, 90%, and 95% respectively. The system is evaluated with 46 images by amateur photographers of seasonal fruits at the time namely, strawberry, apply and banana. 100% of these pictures were recognised correctly.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123311298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework to Automate the generation of movies' trailers using only subtitles","authors":"Eslam Amer, Ayman M. Nabil","doi":"10.1145/3220267.3220293","DOIUrl":"https://doi.org/10.1145/3220267.3220293","url":null,"abstract":"With the rapidly increasing rate of user-generated videos over the World Wide Web, it becoming a high necessity for users to navigate through them efficiently. Video summarization is considered to be one of the promising and effective approach for efficacious realization of video content by means of identifying and selecting descriptive frames of the video. In this paper, a proposed adaptive framework called Smart-Trailer (S-Trailer) is introduced to automatize the process of creating a movie trailer for any movie through its associated subtitles only. The proposed framework utilizes only English subtitles to be the language of usage. S-Trailer resolves the subtitle file to extract meaningful textual features that used to classify the movie into its corresponding genre(s). Experimentations on real movies showed that the proposed framework returns a considerable classification accuracy rate (0.89) to classify movies into their associated genre(s). The introduced framework generates an automated trailer that contains on average about (43%) accuracy in terms of recalling same scenes issued on the original movie trailer.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Extraction of Arabic Number from Egyptian ID Cards","authors":"A. Nosseir, Omar Adel","doi":"10.1145/3220267.3220277","DOIUrl":"https://doi.org/10.1145/3220267.3220277","url":null,"abstract":"ID check is a vital process to verify people identify and to allow entry to different places like universities, check points or a banks. This process is usually done by just looking into the ID or writing it down. To improve the check process and make it quick and easy, our work develops a novel system that extracts the Arabic numbers from the ID picture.\u0000 The proposed algorithm uses morphological operations more specifically dilation to maximally eliminate non Region Of Interest (ROI) and enhance the (ROI). Moreover, algorithm applies (Speeded Up Robust Features) SUFE algorithm to extract feature points of each image and the correlation based template matching technique to recognise characters.\u0000 The approach has been evaluated with 17 ID cards pictures taken by amateur people with their mobile and other pictures from the internet. The images were too bright, dark, or from an angle. The algorithm is tested with these pictures and all ID numbers where identified correctly","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121866433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive security scheme for real-time VoIP using multi-layer steganography","authors":"Shourok AbdelRahim, S. Ghoneimy, G. Selim","doi":"10.1145/3220267.3220281","DOIUrl":"https://doi.org/10.1145/3220267.3220281","url":null,"abstract":"Nowadays Voice over Internet Protocol (VoIP) is one of the most widely used technologies to transmit the voice. With the widely spreading in such technology many counters attaches tried to apply different counter measure. In this paper we tried to build a counter countermeasure which increases the security of specific messages by performing a complicated three security stages. These stages are; embedding the selected voice into RGB image, hidden the image in voice signal and perform data integrity using real time protocol (RTP). Following such a proposed algorithm, the process of eavesdrop or counter attacks will not be able to break such a multi-layer security process. In this paper, we propose an Adaptive VoIP steganography approach to hide the audio information within images to enhance the security of the voice communications. The proposed system is completely implemented and developed using C++ in OPNET Modeler. Simulation results showed that the proposed system is robust enough to overcome many attacks such as denial of service, man-in-the-middle and eavesdrop without affecting network performance or quality of service.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Code Loading to a Bare-metal Embedded Target","authors":"Andrew Sadek, M. Elmahdy, Tarek ElDeeb","doi":"10.1145/3220267.3220568","DOIUrl":"https://doi.org/10.1145/3220267.3220568","url":null,"abstract":"Dynamic Code loading at run-time is a challenging task in embedded systems. While dynamic linker feature is provided by many operating systems for ELF files such as Linux, bare metal embedded systems shall not depend on any OS support. Indeed, various researches have deployed Position Independent Code (PIC) approach instead of dynamic linking allowing the code to run regardless its memory location. The work presented here aims at providing an efficient methodology for run-time code loading of multiple applications to a bare metal embedded target. In the first place, the code is compiled in position-independent form then linked with base image at compile time. Correspondingly, the resulting program is considered as an add-on to the base image and sent to a specified section in the target memory. Furthermore, 'GCC' and 'Binutils' were customized to enhance the current implemented methodology of (PIC). This allows referencing data by offset from the start of text section instead of using Global Offset Table (GOT) hence making position independent code smaller and more efficient. After all, work-ow was implemented on an FPGA Board using Microblaze processor and tested with Dhrystone benchmark. Markedly, the results and performance analysis have proven better efficiency for the proposed work-ow.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129143210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting the Survivors of the Titanic Kaggle, Machine Learning From Disaster","authors":"Nadine Farag, Ghada Hassan","doi":"10.1145/3220267.3220282","DOIUrl":"https://doi.org/10.1145/3220267.3220282","url":null,"abstract":"April 14th, 1912 was very unfortunate for the most powerful ship ever built at that time, the Titanic. Grievously, 1503 out of 2203 passengers perished the sinking, but the rationale behind survival still remains a question mark. In efforts to study the Titanic passengers; Kaggle, a popular data science website, assembled information about each passenger back in the days of the Titanic into a dataset, and made it available for a competition titled: \"Titanic: Machine Learning from Disaster.\" This research aims to use machine learning techniques on the Titanic data to analyze the data for classification and to predict the survival of the Titanic passengers by using data-mining algorithms; specifically Decision Trees and Naïve Bayes. The prediction and efficiency of these algorithms depend greatly on data analysis and the model. The paper presents an implementation which combines the benefits of feature selection and machine learning to accurately select and distinguish characteristics of passengers' age, class, cabin, and port of embarkation then consequently infer an authentic model for an accurate prediction. The data-set is described and the implementation details and prediction results are presented then compared to other results. The Decision Tree algorithm has accurately predicted 90.01% of the survival of passengers, while the Gaussian Naïve Bayes witnessed 92.52% accuracy in prediction.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129875242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour, K. Rababah
{"title":"Advantages and Factors Affecting the Adoption of Cloud Computing","authors":"Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour, K. Rababah","doi":"10.1145/3512716.3512726","DOIUrl":"https://doi.org/10.1145/3512716.3512726","url":null,"abstract":"In Cloud Computing, the system is generally fitted with a set of IT infrastructure, platform and the relevant applications supplied via Internet, with low cost of installation and network access to a shared configurable computing pool of resources and pay-by-use services. Although cloud computing has a great potential, literature indicates that factors affecting its adoption and the benefits leveraged from it have not been largely examined among empirical studies. Hence, in this study the authors explain the advantages and factors that affect the drive of cloud computing adoption. This paper is organized in the following way: In section one, the paper provides the introduction to the topic. this is followed by section two that contains cloud computing information in detail and section three that provides a description of the advantages that can be reaped from its use. Section four provides the factors that affect cloud computing adoption or the barriers to its implementation and finally, section five provides the paper conclusion and recommendations for future studies.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"77 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123566952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Sensing Limitations in Cognitive Radio Networks","authors":"Hazim E. Mustafa, M. Abdellatif","doi":"10.1145/3512716.3512720","DOIUrl":"https://doi.org/10.1145/3512716.3512720","url":null,"abstract":"As the number of wireless devices is increasing daily, the radio frequency spectrum is becoming more crowded. Moreover, due to the stochastic nature of wireless communications technologies, some frequency bands which are allocated to services or users can be underutilized. On the other hand, some users may not be able to access the medium as all the frequency bands have been already allocated to different users. Cognitive radio has gained a lot of interest in the past few years as it tackles the problem of spectrum scarcity by taking advantage of spectrum holes that are available in the frequency spectrum. Spectrum Sensing is the tool that cognitive radio nodes use to find such holes. A cognitive radio node senses the frequency band, and if it is found to be free, uses it to transmit and receive data. There are two main sensing schemes, Energy Detection, and cooperative sensing. In this paper, we give an overview of these two main schemes focusing on their limitations and ways to optimize their performance in cognitive radio networks.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"1995 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Massive MIMO Beamforming Analysis for 5g Systems","authors":"Aya Abdel Moniem, M. Abdellatif","doi":"10.1145/3512716.3512723","DOIUrl":"https://doi.org/10.1145/3512716.3512723","url":null,"abstract":"Multiple input multiple outputs, MIMO Technology is based on the usage of multiple receivers and transmitters or antennas at the sending and receiving end of a signal, to increase the throughput and capacity of the network. The number of antennas in a MIMO station can reach up to eight. The Massive MIMO is like the simple MIMO, with the only difference is the number of antennas can reach hundreds. Massive MIMO operates in time division duplex mode, which means the channel has reciprocal properties of radio propagation. The base station calculates an estimate the channel capacity from the uplink pilots transmitted by the end user. This gives us the technology advantage of scalability with the respect of the base station's antenna numbers. In this paper, the MIMO and massive MIMO systems are presented and compared in terms of BER and Beamforming capabilities.","PeriodicalId":177522,"journal":{"name":"International Conference on Software and Information Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124533117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}