{"title":"Persian offline signature verification based on curvature and gradient histograms","authors":"Amir Soleimani, K. Fouladi, Babak Nadjar Araabi","doi":"10.1109/ICCKE.2016.7802131","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802131","url":null,"abstract":"The distinctive characteristic of Persian signature implies its own specific feature extraction approaches for verification systems. In this paper, inspired by the cursive nature of Persian signature, and motivated by the opinion of Persian forensic handwritten experts that put emphasis on this factor, we propose a framework for Persian offline signature verification that uses histogram of curvature (HOC) and histogram of oriented gradient (HOG) as features. Calculating curvature for offline signature due to lack of temporal information is not a straightforward task. To this end, we use a discrete curvature estimator that works by normalized gradient and its Jacobian matrix. We investigate the effect of preserving signatures' scale, center of gravity, grid size, grid overlapping, number of bins, and smoothing factor on the accuracy. Support vector machine (SVM) is used to train writer-dependent classifiers on genuine signatures and random forgeries as training samples. Results show competitive performance between HOC and HOG descriptors on UTSig dataset which consists of 8280 samples from 115 classes. Using combination of HOC and HOG descriptors, we achieve promising equal error rate for finding genuine signatures versus skilled forgeries, while false random forgery acceptance is close to zero.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128803651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new method for classification of POLSAR images","authors":"Nastaran Aghaei, G. Akbarizadeh","doi":"10.1109/ICCKE.2016.7802160","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802160","url":null,"abstract":"The present paper proposes an unsupervised feature learning method for POLSAR image classification. The proposed method includes two steps. In these two steps, features are created and learned from scratch. The first is to learn dictionaries and encode features using scatter matrices. The dictionary is learned using a set of vectors that are known as hierarchical matching pursuit (HMP). The dictionary is learned with K-singular vector decomposition (K-SVD). Afterward, the sparse codes can be computed with orthogonal matching pursuit (OMP). The second step extracts features from the previous step. The results demonstrate that the features extracted and learned from this method led to more efficient POLSAR classification results than other existing similar methods.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115582754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Razieh Rezaee, A. G. Bafghi, Masoud Khosravi-Farmad
{"title":"A threat risk estimation model for computer network security","authors":"Razieh Rezaee, A. G. Bafghi, Masoud Khosravi-Farmad","doi":"10.1109/ICCKE.2016.7802144","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802144","url":null,"abstract":"Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this paper proposes UML models to represent expert's security information. We propose a UML class diagram which is built up of necessary classes for security analysis of networks. These classes are the building blocks needed for estimation of probability and effects of security threats. This model is created once and represents the security information needed for analysis. To analyze any network, the needed objects should be instantiated from the provided classes. These objects form the security model of the network with all the threats and their risks specified in. To instantiate the objects of network security model, its information is needed. This information is usually available in documents of a network or is obtainable via automated scanners. We show the applicability of the proposed model on a test network. As the result, the security model of the network which contains its security threats and also their risks are obtained.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted semi-supervised manifold clustering via sparse representation","authors":"Amir Abedi, R. Monsefi, Davood Zabih Zadeh","doi":"10.1109/ICCKE.2016.7802146","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802146","url":null,"abstract":"over the last few years, manifold clustering has attracted considerable interest in high-dimensional data clustering. However achieving accurate clustering results that match user desires and data structure is still an open problem. One way to do so is incorporating additional information that indicate relation between data objects. In this paper we propose a method for constrained clustering that take advantage of pairwise constraints. It first solves an optimization program to construct an affinity matrix according to pairwise constraints and manifold structure of data, then applies spectral clustering to find data clusters. Experiments demonstrated that our algorithm outperforms other related algorithms in face image datasets and has comparable results on hand-written digit datasets.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122662586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leila Samimi-Dehkordi, B. Zamani, S. Kolahdouz-Rahimi
{"title":"Bidirectional model transformation approaches a comparative study","authors":"Leila Samimi-Dehkordi, B. Zamani, S. Kolahdouz-Rahimi","doi":"10.1109/ICCKE.2016.7802159","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802159","url":null,"abstract":"Bidirectional model transformations (Bx) are considered as one of the cornerstones of model-driven engineering paradigm. Bx re-establishes the consistency between the source and target models, when they are evolved independently. Recently, a large number of approaches for Bx are proposed, each with different capabilities and characteristics. Among them is a novel Bx approach, called EVL+trace, which have previously proposed by the authors. In order to choose an appropriate bidirectional transformation language for a particular task, a developer needs to evaluate and compare Bx approaches. In this paper, a comparison method is proposed in which a family of 19 major criteria, mainly inspired from programming language evaluation criteria and bidirectional features, is used to evaluate Bx languages. In order to investigate the effectiveness of the EVL+trace approach, it is compared to three well-known bidirectional languages including Query/View/Transformation-Relational (QVT-R), Triple Graph Grammar (TGG), and Janus Transformation Language (JTL) based on the elicited criteria. The results of analysis demonstrate the effectiveness of the comparison method for Bx approaches and the superiorities and weaknesses of EVL+trace.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"23 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123477951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASIP Design for Two dimensional cordic based DFT and DCT algorithms","authors":"Mohammad Pivezhandi, M. Eshghi","doi":"10.1109/ICCKE.2016.7802151","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802151","url":null,"abstract":"In this paper a cordic based Application-Specific Instruction-set Processor(ASIP) for Two dimensional Discrete Fourier Transform(DFT) and Discrete Cosine Transform(DCT) is proposed. Today, DFT performs an important role in digital signal processing, and DCT algorithm is suitable for image compression applications. Using cordic method inside these two signal processing algorithms reduces the number of memory accesses. ASIP can act as an alternative to ASIC and GPP design if it does satisfy the critical points of power consumption, total delay, manufacturing cost and productivity of those designs. Furthermore, for satisfying these parameters, two stage of utilization is performed on the basic Mano model. As a mater of fact, temporary registers and data bus are improved, RAM and cache memory are added, and the number of Functional units is increased. As a result the number of gates in the control unit is decreased about 84% in the DFT and 86% in the DCT in comparison to the Mano design. Moreover, the DFT and the DCT instructions in this design consume 3.6% and 3.86% as the number of clocks as the Mano design does. Utilization in the proposed pipeline architecture is evaluated with Register Transfer Language (RTL) codes.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"64 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the stateful robustness testing of embedded real-time operating systems","authors":"Raheleh Shahpasand, Yasser Sedaghat, S. Paydar","doi":"10.1109/ICCKE.2016.7802133","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802133","url":null,"abstract":"Software fault tolerance is an important issue when using software systems in safety-critical applications. In such systems, software robustness is an essential requirement for improving software fault tolerance. Since an operating system (OS) is a major part of a safety-critical system, its robustness has considerable influence on the system's overall robustness. In recent years, researchers have emphasized the importance of considering the OS state in robustness testing. OS state is determined by analysis of the interactions between OS components. In this paper, an approach, named TIMEOUT, is proposed for robustness testing of embedded real-time OSs. This approach reveals the impact of time delays, i.e. inputs with invalid timing delay, on the OS kernel functionality. TIMEOUT takes the OS state into account and improves the existing robustness testing methods. The proposed approach has been implemented and the experiments have been performed on Linux PREEMPT-RT, which is an embedded real-time implementation of Linux operating system. The results show that OS state can influence the OS behavior with respect to fault tolerance, in the presence of time delays. Based on the results of this approach, system developers can identify criticality of OS states and improve robustness of OS in those states.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133766002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mortaheb, Farzad Rostami, Safoura Shahin, R. Amirfattahi
{"title":"Wavelet based single trial Event Related Potential extraction in very low SNR conditions","authors":"S. Mortaheb, Farzad Rostami, Safoura Shahin, R. Amirfattahi","doi":"10.1109/ICCKE.2016.7802120","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802120","url":null,"abstract":"Event Related Potentials (ERPs) are generated in ongoing brain electrical activity due to visual, auditory, or sensory stimuli. These signals have very low SNR and are contaminated by background EEG. Extraction of single trial ERPs from background EEG is a challenging task due to overlapping nature of the frequency bands of ERP and EEG signals and much higher power of EEG than ERPs. In this paper we proposed a method based on wavelet transform and adaptive noise cancelers in order to extract single trial ERPs from background EEG in very low SNR conditions. Simulation results show the superiority of the proposed algorithm over the existing methods. In addition, performance of the algorithm is justified under different noise models namely White Gaussian Noise, Auto Regressive, and Real EEG signals.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131108208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Jeddisaravi, Reza Javanmard Alitappeh, F. Guimarães
{"title":"Multi-objective mobile robot path planning based on A* search","authors":"K. Jeddisaravi, Reza Javanmard Alitappeh, F. Guimarães","doi":"10.1109/ICCKE.2016.7802107","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802107","url":null,"abstract":"Finding a path for a robot is a fundamental task in robot motion planning. Depending on applications and robot's capabilities, different objectives can be defined in multi-objective path planning. In this paper, by considering a Mars Rover scenario, we define several real objectives that must be minimized. The objectives for the proposed scenario are to minimize difficulty, danger, elevation, and length of the path from a start to a goal point. A* search algorithm is applied to solve the problem, since it guarantees to find a complete and optimal solution that minimizes the path cost. Simulation results in a simple map and more realistic scenario validate the applicability of the proposed method.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114205950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging big data technology for small and medium-sized enterprises (SMEs)","authors":"Reza Shokri Kalan, M. Ünalir","doi":"10.1109/ICCKE.2016.7802106","DOIUrl":"https://doi.org/10.1109/ICCKE.2016.7802106","url":null,"abstract":"Wisdom aligns with technology is the key factor for sustainable business development. By increasing amount of public and private data, organizations need to find new solutions to manage data and information which lead to knowledge, better decision making, and value. In the big data-bang, smart organization surfing on-line technology and start planning big data strategy. However, many organizations do not yet have a big data strategy. A challenge facing SMEs is that they may not have the same capacity as large companies to analysis new data sets. Also, traditional data processing tools are not capable for SMEs decision making because of volume, velocity and variety if data. For address this problem we need new leveraging technology, tools and talent. SMEs which have risen to leveraging the value of big data are using advantage of cloud computing and open-source software to realize various goals. The main goal of this investment is about value as a new concept in a big data era. In this study, we focus on emerging trends and future requirement: technology and tools for SMEs.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134270866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}