2015 Long Island Systems, Applications and Technology最新文献

筛选
英文 中文
A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention 用于黑色素瘤早期检测和预防的自动皮肤病变分析系统特征集的比较
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160183
O. Abuzaghleh, M. Faezipour, B. Barkana
{"title":"A comparison of feature sets for an automated skin lesion analysis system for melanoma early detection and prevention","authors":"O. Abuzaghleh, M. Faezipour, B. Barkana","doi":"10.1109/LISAT.2015.7160183","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160183","url":null,"abstract":"One in five Americans will develop skin cancer in their lifetime, and on average, one American dies from skin cancer every hour. Melanoma spreads through metastasis, and can often be fatal. Statistical evidence has revealed that the majority of deaths resulting from skin cancer are as a result of melanoma. Further investigations have shown that the survival rates in patients depend on the stage of the cancer at the time it is first diagnosed; early detection and intervention of melanoma indicates higher chances of cure. Clinical diagnosis and prognosis of melanoma are challenging since the processes are prone to misdiagnosis and inaccuracies due to doctors' subjectivity. Malignant melanomas are asymmetrical, have irregular borders, notched edges, and color variations, so analyzing the shape, color, and texture of the skin lesion is important for melanoma early detection and prevention. This paper proposes the two major components of a noninvasive real-time automated skin lesion analysis system for melanoma early detection and prevention. The first component is a real-time alert to help users prevent skin burn caused by sunlight; a novel equation to compute the time for skin to burn is thereby introduced. The second component is an automated image analysis module which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction, and classification. The proposed system uses PH2 Dermoscopy image database from Pedro Hispano Hospital for development and testing purposes. The image database contains a total of 200 dermoscopy images of lesions, including benign, atypical, and melanoma cases. A comparison of the performance of all feature sets is presented in this paper in order to determine what feature sets provide the best classification results.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125568772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Determining the thickness of the liquid on the cornea for open and closed angle glaucoma using haar filter 用haar滤光片测定开角型和闭角型青光眼角膜液的厚度
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160182
Mohammad Aloudat, M. Faezipour
{"title":"Determining the thickness of the liquid on the cornea for open and closed angle glaucoma using haar filter","authors":"Mohammad Aloudat, M. Faezipour","doi":"10.1109/LISAT.2015.7160182","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160182","url":null,"abstract":"Evaluating the anterior chamber angle with gonioscopy is an essential part of evaluating patients at risk of contracting glaucoma and neovascularization. It also provides useful information for patients with iris abnormalities or a history of trauma or ocular inflammation. Unfortunately, gonioscopy is underutilized by both optometrists and ophthalmologists. There are many symptoms that call for performing gonioscopy. One of the most common reasons for performing gonioscopy is in cases where the doctor suspects a patient is at risk of being infected with angle closure glaucoma (ACG) with pupil dilation. This paper aims at calculating the angle of open and closed glaucoma as a first step of determining the thickness of the liquid available on the cornea, which has been proven to be very helpful in preventing vision loss. The techniques involved in this study include proposing an eye segmentation process, the calculation of the angle opening distance (AOD), trabecular iris angle (TIA), and trabecular iris space area (TISA). The simulation results obtained and the performance of the proposed method are found to be highly efficient and accurate.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scalable and energy efficient medium access control protocol for wireless sensor networks 用于无线传感器网络的可扩展和节能介质访问控制协议
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160212
A. Razaque, K. Elleithy
{"title":"Scalable and energy efficient medium access control protocol for wireless sensor networks","authors":"A. Razaque, K. Elleithy","doi":"10.1109/LISAT.2015.7160212","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160212","url":null,"abstract":"Scalable and efficient Medium Access Control (MAC) protocol has been of the paramount significance for boosting the performance of wireless sensor networks (WSNs). In this paper, scalable and efficient medium access control (SE-MAC) protocol is introduced for WSNs. The Goal of SE-MAC is to reduce the communication delay time, channel delay time and control delays caused by acknowledgment packets, request-to-send (RTS), clear-to-send (CTS) etc. Thus, reducing the delays, SE-MAC incorporates the adaptable application independent aggregation (AAIA) model to achieve the expected goals. Furthermore, SE-MAC is supported with handoff process feature, which helps extend the network lifetime. AAIA model for SE-MAC plays a role of cross-layering that extensively reduces the different delays incurred at MAC sub-layer and network layer. Evaluation of SE-MAC is conducted using network simulator-2 (NS2) then compared with known MAC protocols: Zebra medium access control (Z-MAC), receiver-initiated asynchronous duty cycle MAC (RI-MAC) and an energy-efficient multi-channel mac (Y-MAC). Based on the initial Simulation results, we demonstrate that SE-MAC protocol saves extra 9.8-15% time and energy resources for channel delays as compared with other MAC protocols.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127980770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure cloud WLAN using dynamic placement and migration with a cloud name resolution protocol 使用带有云名称解析协议的动态放置和迁移来保护云WLAN
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160202
Rowida Alharbi, K. Elleithy, A. Alharbi, Wafa Elmannai
{"title":"Secure cloud WLAN using dynamic placement and migration with a cloud name resolution protocol","authors":"Rowida Alharbi, K. Elleithy, A. Alharbi, Wafa Elmannai","doi":"10.1109/LISAT.2015.7160202","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160202","url":null,"abstract":"Cloud computing systems have displayed many intriguing possibilities for the end users. Several cloud computing systems are centralized, and might lead to a system's overload. This situation influences security and leads to the blockage within the network especially when important routers and servers are malfunctioning. Over the past few years, there has been a great development in Peer-to-Peer (P2P) cloud computing. This paper introduces a transportation protocol that is a less complex in interaction between the servers in transporting the session state data between one another. The proposed methodology has been implemented using the Visual Studio platform. The platform has been extensively tested and it has demonstrated promising results.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115911869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enforcing security, safety and privacy for the Internet of Things 加强物联网的安全、安全和隐私
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160214
C. Warren Axelrod
{"title":"Enforcing security, safety and privacy for the Internet of Things","authors":"C. Warren Axelrod","doi":"10.1109/LISAT.2015.7160214","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160214","url":null,"abstract":"The connecting of physical units, such as thermostats, medical devices and self-driving vehicles, to the Internet is happening very quickly and will most likely continue to increase exponentially for some time to come. Valid concerns about security, safety and privacy do not appear to be hampering this rapid growth of the so-called Internet of Things (IoT). There have been many popular and technical publications by those in software engineering, cyber security and systems safety describing issues and proposing various “fixes.” In simple terms, they address the “why” and the “what” of IoT security, safety and privacy, but not the “how.” There are many cultural and economic reasons why security and privacy concerns are relegated to lower priorities. Also, when many systems are interconnected, the overall security, safety and privacy of the resulting systems of systems generally have not been fully considered and addressed. In order to arrive at an effective enforcement regime, we will examine the costs of implementing suitable security, safety and privacy and the economic consequences of failing to do so. We evaluated current business, professional and government structures and practices for achieving better IoT security, safety and privacy, and found them lacking. Consequently, we proposed a structure for ensuring that appropriate security, safety and privacy are built into systems from the outset. Within such a structure, enforcement can be achieved by incentives on one hand and penalties on the other. Determining the structures and rules necessary to optimize the mix of penalties and incentives is a major goal of this paper.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115396485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Comparative study of ERP implementation strategies ERP实施策略的比较研究
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160177
Shruti Nagpal, S. Khatri, Ashok Kumar
{"title":"Comparative study of ERP implementation strategies","authors":"Shruti Nagpal, S. Khatri, Ashok Kumar","doi":"10.1109/LISAT.2015.7160177","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160177","url":null,"abstract":"Enterprise Resource Planning, ERP software has come a long way since its inception as Inventory Management and Control Systems of 1960s. The value of ERP Implementation Strategy has been stressed over the years and it has been included as an important Critical Success Factor, CSF, as recorded by previous researchers. Traditional ERP implementation followed more or less a sequential approach akin to the Waterfall Model. Researchers over the years have categorized ERP Implementation methodology and developed frameworks. These are based on varied ERP Implementation observations. Given the variety of methodologies and frameworks available, the real-world ERP implementation demands the development and adoption of a strategy as a guiding principle for underlying methods. This paper suggests a new classification approach based on the ERP implementation strategy that can be categorized as custom-made, vendor-specific or consultant-specific. This research paper also conducts a comparative study of leading vendor-specific ERP implementation methodologies along-with their example cases. It then discusses how the principles of Agile Methodology as laid down in the Agile Manifesto [1] are being incorporated in ERP implementations.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132339000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Highly secure image steganography algorithm using curvelet transform and DCT encryption 采用曲线变换和DCT加密的高安全图像隐写算法
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160204
Ahmed S. ELSayed, Abdelrahman Elleithy, P. Thunga, Zhengping Wu
{"title":"Highly secure image steganography algorithm using curvelet transform and DCT encryption","authors":"Ahmed S. ELSayed, Abdelrahman Elleithy, P. Thunga, Zhengping Wu","doi":"10.1109/LISAT.2015.7160204","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160204","url":null,"abstract":"This paper presents a highly secure data hiding system (a.k.a. Steganography) in a cover image using the low frequency Curvelet domain. The contribution of the suggested technique is its high security, because it is using four secret keys (encryption key, two shuffling keys, data hiding key) and using only the low frequency component of Curvelet domain. The use of low frequency component of Curvelet transform in steganography provides a number of advantages compared to other techniques such as: 1) Computation time reduction and, 2) Curvelet transform are designed to handle curves discontinuities using only a small number of coefficients, so hiding in the low frequency components will not affect edges coefficients, which produces better stego object quality.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient obstructive sleep apnea classification based on EEG signals 基于脑电图信号的阻塞性睡眠呼吸暂停有效分类
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160186
Wafaa S. Almuhammadi, K. Aboalayon, M. Faezipour
{"title":"Efficient obstructive sleep apnea classification based on EEG signals","authors":"Wafaa S. Almuhammadi, K. Aboalayon, M. Faezipour","doi":"10.1109/LISAT.2015.7160186","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160186","url":null,"abstract":"Nowadays, analyzing EEG signals has made it easy to diagnose many sleep-related breathing disorders such as Obstructive Sleep Apnea (OSA), which is a potentially serious sleep disorder that affects the quality of human life. This paper introduces an efficient methodology that could be implemented in hardware to differentiate OSA patients from normal controls, based on the Electroencephalogram (EEG) signals. For this purpose, first, the EEG recorded datasets that were obtained from the Phsyionet website are filtered and decomposed into delta, theta alpha, beta and gamma sub-bands using Infinite Impulse Response (IIR) Butterworth band-pass filters. Second, descriptive features such as energy and variance are extracted from each frequency band that are used as input parameters for classification. Finally, several machine learning algorithms including Support Vector Machines (SVM), Artificial Neural Networks (ANN), Linear Discriminant Analysis (LDA) and Naive Bayes (NB) are employed in order to identify if the OSA exists or not, according to the objective of this study. The results that are obtained from these classifiers are then compared in terms of accuracy, sensitivity and specificity. The experimental results show that the SVM attained the best classification accuracy of 97.14% as compared to the others.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123686668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Building the “Internet of Everything” (IoE) for first responders 为急救人员构建“万物互联”(IoE)
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160172
R. Balfour
{"title":"Building the “Internet of Everything” (IoE) for first responders","authors":"R. Balfour","doi":"10.1109/LISAT.2015.7160172","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160172","url":null,"abstract":"The “Internet of Everything” (IoE) describes the “bringing together of people, process, data, and things to make networked connections more relevant and valuable than ever before”. IoE encompasses both machine-to-machine (M2M) and Internet-of-Things (IoT) technologies, and it is the pervasiveness of IoE than can be leveraged to achieve many things for many people, including first responders. The emerging IoE will continue to evolve over the next ten years and beyond, but the IoT can happen now, with automated M2M communications bringing first responder communications and situational awareness to the leading-edge of IoE-leveraged technology - exactly where they belong as they risk their lives to protect and save others. Presented here are a number of technological capabilities that are critical to achieving the IoE, especially for first responders and emergency managers, including (a) Security; (b) a global M2M standard; (c) powerful four-dimensional M2M applications; and (d) Data Privacy and trust. For advanced security, Software Defined network Perimeters (SDP) can provide the critical functionality to protect and secure M2M nodes in an ad-hoc M2M IoT/IoE network. Without a secure, dynamic, M2M network, the vision of an emergency responder instantly communicating with a “smart building” would not be feasible. But with SDP, it can, and will, happen. SDP enables an ad-hoc, secure M2M network to rapidly deploy and “hide in plain sight”. In an emergency response situation, this is exactly what we need. For M2M/IoT to go mobile and leverage global IoE capabilities anywhere (which is what emergency responders need as emergency locations are somewhat unpredictable and change every day), a global industry standard must be, and is being, developed: oneM2M. And the existing fourDscape® technology/platform could quickly support a oneM2M system structure that can be deployed in the short term, with the fourDscape browser providing powerful M2M IoT/IoE applications and 4D visualizations. Privacy-by-design principles can also be applied and other critical related issues addressed beyond privacy (i.e. once privacy is achieved and available IoE sensors/data can be leveraged), such as trusting, scaling, hacking, and securing M2M IoT/IoE devices and systems. Without the full package of IoE innovation embracing the very public IoE world in a very private and secure way, and can continue to evolve in parallel with emerging commercial IoE technology, first responders would not be able to leverage the commercial state-of-the-art in the short term and in the years to come. Current technology innovation can change that.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129105161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Directed diffusion based on weighted Grover's quantum algorithm (DWGQ) 基于加权Grover量子算法(DWGQ)的定向扩散
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160216
Anas Bushnag, Ali Alessa, Minzhi Li, K. Elleithy
{"title":"Directed diffusion based on weighted Grover's quantum algorithm (DWGQ)","authors":"Anas Bushnag, Ali Alessa, Minzhi Li, K. Elleithy","doi":"10.1109/LISAT.2015.7160216","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160216","url":null,"abstract":"Wireless sensor networks (WSN) have become involved in many different areas such as military, disaster management, and many other civic uses. So, improving the overall performance of the network is very necessarily to achieve the desired aim. One of the most famous protocols that used in wireless sensor networks is the Directed Diffusion protocol. Also, Quantum computing is a new field in computer science and it tries to speed up the process of any computation by parallelizing the work using the same hardware. Therefore, in this study a comparison is conducted between the classical Directed Diffusion Protocol and the proposed protocol that based on the weighted Grover's Quantum Algorithm. An example of the proposed solution shows that our protocol is performing much better in case of end-to-end delay and power consumption.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信