2013 9th International Computer Engineering Conference (ICENCO)最新文献

筛选
英文 中文
Three different classifiers for facial age estimation based on K-nearest neighbor 基于k近邻的面部年龄估计的三种不同分类器
2013 9th International Computer Engineering Conference (ICENCO) Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736476
A. Tharwat, A. M. Ghanem, A. Hassanien
{"title":"Three different classifiers for facial age estimation based on K-nearest neighbor","authors":"A. Tharwat, A. M. Ghanem, A. Hassanien","doi":"10.1109/ICENCO.2013.6736476","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736476","url":null,"abstract":"The exact age estimation is often treated as a classification problem; while it can be formulated as a regression problem. In this article, three different classifiers based on KNN classifier's concept for facial age estimation were designed and developed to achieve high efficiency calculation of facial age estimation. In the first classifier, we adopt KNN-distance approach to calculate minimum distance between test face image and all instances belong to the class that has the highest number of nearest samples. Additionally, in the second classifier a modified-KNN version was proposed and the classifier scoring results interpolated to calculate the exact age estimation. Furthermore, KNN-regression classifier as third classifier that used to combine the classification and regression approaches to improve the accuracy of the age estimation system. Moreover, we compared age estimation errors under two situations: case 1, age estimation is performed without discrimination between males and females (gender unknown); and case 2, age estimation is performed for males and females separately (gender known). Results of experiments conducted on well know benchmark FG-NET Database show the effectiveness of the proposed approach.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128109869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Improving prediction accuracy of Matrix Factorization based Network coordinate systems 提高基于矩阵分解的网络坐标系预测精度
2013 9th International Computer Engineering Conference (ICENCO) Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736486
Walaa Saber, R. Rizk, H. Harb
{"title":"Improving prediction accuracy of Matrix Factorization based Network coordinate systems","authors":"Walaa Saber, R. Rizk, H. Harb","doi":"10.1109/ICENCO.2013.6736486","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736486","url":null,"abstract":"Matrix factorization (MF) based Network coordinate (NC) systems solve the triangle inequality violations (TIVs) that is the main problem of Euclidean distances. However, these systems suffer from low prediction accuracy. In this paper, Conditional Clustered Network Coordinate (CCNC) System is proposed. It divides the space into a number of clusters in a balanced, dynamic, and decentralized way. Clustering the whole space is based on two thresholds in order to guarantee a balanced clustered operation. The performance of CCNC system is evaluated with King data set and PlanetLab data set to be compared against two well known NC systems: Phoenix and Pancake. The simulation results show that CCNC outperforms Phoenix and Pancake significantly in terms of estimation accuracy, expected time to construct the clusters, and the communication overhead.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134374745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new security protocol using hybrid cryptography algorithms 一种采用混合密码算法的新型安全协议
2013 9th International Computer Engineering Conference (ICENCO) Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736485
Yasmin Alkady, Mohmed I. Habib, R. Rizk
{"title":"A new security protocol using hybrid cryptography algorithms","authors":"Yasmin Alkady, Mohmed I. Habib, R. Rizk","doi":"10.1109/ICENCO.2013.6736485","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736485","url":null,"abstract":"A group of sensor nodes deployed in particular environment constitutes a wireless sensor network (WSN). At times the WSN can be even deployed in a very sensitive area where the security becomes a great problem. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. A hybrid encryption method that combines both symmetric and asymmetric key can provide high security with minimized key maintenance. In this paper, a new security protocol using combination of both symmetric and asymmetric cryptographic techniques is proposed. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. XOR-DUAL RSA algorithm is considered for authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128832181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Identification of weed seeds species in mixed sample with wheat grains using SIFT algorithm 基于SIFT算法的小麦混样杂草种子种类识别
2013 9th International Computer Engineering Conference (ICENCO) Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736468
M. Wafy, Hashem Ibrahim, E. Kamel
{"title":"Identification of weed seeds species in mixed sample with wheat grains using SIFT algorithm","authors":"M. Wafy, Hashem Ibrahim, E. Kamel","doi":"10.1109/ICENCO.2013.6736468","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736468","url":null,"abstract":"The problem of plant seed identification is important for agricultural sector, such as maintaining seed quality and to prevent the spreading of weed species. Seed identification is currently performed by a human seed analyst; human must often search through many seed images before finding the desired seed. This process of manual identification is slow and posses a degree of subjectivity which is hard to be quantified. Therefore, it is highly recommended economically to introduce an automatic system for seed identification. Modern techniques in different computer science fields such as image analysis, pattern recognition and computer vision can be applied in this system. In this paper, we use Scale-Invariant Feature Transform (SIFT) algorithm to identification three types of weed seeds (Coronopus didymus (L.) Sm., Lolium multiflorum Lam. and Chenopodium ambrosioides L.) that mixed with wheat grains samples. The accuracies of weed seeds detection were 90.5%, 89.2 and 95.3 for the three species respectively. SIFT algorithm discriminated well between wheat grains and weed seeds.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131460603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An online parallel CRC32 realization for Hybrid Memory Cube protocol 混合存储立方体协议的在线并行CRC32实现
2013 9th International Computer Engineering Conference (ICENCO) Pub Date : 2013-12-01 DOI: 10.1109/ICENCO.2013.6736466
K. Salah
{"title":"An online parallel CRC32 realization for Hybrid Memory Cube protocol","authors":"K. Salah","doi":"10.1109/ICENCO.2013.6736466","DOIUrl":"https://doi.org/10.1109/ICENCO.2013.6736466","url":null,"abstract":"Hybrid Memory Cube (HMC) is a revolutionary standard in DRAM architecture based on 3D integration. It provides marvelous concurrency and reduced latency. HMC uses CRC32 for data integrity, but conventional Serial CRC calculation is very slow and has long latencies, here we propose three methods to implement parallel CRC to be very fast. The first method uses symbolic toolbox in MATLAB to generate the final equations of the CRC, and then these equations are exported to VERILOG so that we are able to calculate it in only one clock cycle. The second method is depending on using an existing tool that can generate parallel CRC but this tool has a limitation on the input data width as it is less than the maximum allowed data width in HMC which is 1152 bits, so we were able to find a work around method that enable us to calculate CRC32 for large data widthwith this tool. The third method is based on using the polynomial mathematics for CRC, as the CRC can be calculated using long division method. Method 1 latency is one clock cycle, Method 2 latency is 2 clock cycles, and method 3 latency is 37 clock cycles compared to serial CRC which latency is 1152 clock cycles.","PeriodicalId":256564,"journal":{"name":"2013 9th International Computer Engineering Conference (ICENCO)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124974552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信