2018 6th International Conference on Multimedia Computing and Systems (ICMCS)最新文献

筛选
英文 中文
Outsourced Private Set Intersection Cardinality with Fully Homomorphic Encryption 具有完全同态加密的外包私有集交集基数
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-11-06 DOI: 10.1109/ICMCS.2018.8525881
A. Tajima, Hiroki Sato, H. Yamana
{"title":"Outsourced Private Set Intersection Cardinality with Fully Homomorphic Encryption","authors":"A. Tajima, Hiroki Sato, H. Yamana","doi":"10.1109/ICMCS.2018.8525881","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525881","url":null,"abstract":"Cloud database services have attracted considerable interest with the increase in the amount of data to be analyzed. Delegating data management to cloud services, however, causes security and privacy issues because cloud services are not always trustable. In this study, we address the problem of answering join queries across outsourced private datasets while maintaining data confidentiality. We particularly consider a scenario in which two data owners each own a set of elements and a querier asks the cloud to perform join operations to obtain the size of the common elements in the two datasets. To process the join operations without revealing the contents of data to the cloud, we propose two protocols, a basic protocol and a querier-friendly protocol, which adopt a functionality of outsourced private set intersection cardinality (OPSI-CA) with fully homomorphic encryption (FHE) and bloom filters. The querier-friendly protocol achieves a reduction in communication and computation costs for the querier. Our experimental results show that it takes 436 s for the basic protocol and 298 s for the querier-friendly protocol to execute the join query on the two datasets with 100 elements each. The novelty of this study is that our protocols are the first approaches for outsourced join operations adopting FHE.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127928950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modified Monarch Butterfly Optimization Algorithm for RFID Network Planning 基于改进君主蝶优化算法的RFID网络规划
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-11-06 DOI: 10.1109/ICMCS.2018.8525930
I. Strumberger, Eva Tuba, N. Bačanin, M. Beko, M. Tuba
{"title":"Modified Monarch Butterfly Optimization Algorithm for RFID Network Planning","authors":"I. Strumberger, Eva Tuba, N. Bačanin, M. Beko, M. Tuba","doi":"10.1109/ICMCS.2018.8525930","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525930","url":null,"abstract":"This paper presents an implementation of the modified monarch butterfly optimization algorithm for solving the RFID network planning problem. This problem is one of the most studied challenges in the RFID domain, and was not tackled with the monarch butterfly optimization metaheuristic before. RFID system consists of tags and readers, where readers access from certain distance the information that is stored in tags. By testing basic monarch butterfly algorithm, we noticed that the algorithm can be improved by enhancing exploitation in the late iterations. We tested our approach on the standard RFID model and data set, and conducted comparative analysis with other approaches. According to the performed experiments, we concluded that the modified monarch butterfly optimization can be successfully applied to the RFID network planning problem.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122489355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Emotion Recognition in E-learning Systems 电子学习系统中的情感识别
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-05-10 DOI: 10.1109/ICMCS.2018.8525872
O. Elhammoumi, Fatimaezzahra Benmarrakchi, Nihal Ouherrou, J. E. Kafi, Ali El Hore
{"title":"Emotion Recognition in E-learning Systems","authors":"O. Elhammoumi, Fatimaezzahra Benmarrakchi, Nihal Ouherrou, J. E. Kafi, Ali El Hore","doi":"10.1109/ICMCS.2018.8525872","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525872","url":null,"abstract":"Technological advances in e-learning systems offer new opportunities for students to reinforce academic development and to improve accessibility to education. Facial expression recognition is an increasingly important area in intelligent e-learning systems. However, supporting the emotional side of students during learning tasks is challenging and demands an awareness of students' emotions. For this purpose, a brief review is presented in order to underlie the importance role of facial expression recognition in e-learning systems. Its role in special education is investigated too. This paper centers on facial expression recognition using convolutional neural networks and its application in e-learning systems, by introducing a new system composed of three main steps: preprocessing, features extraction and classification. We tested the proposed system with students aged between 8 and 12 years old, in an educational game. The results showed that the proposed system reached state of the art results.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123446226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Color Images Segmentation using Pairwise Markov Chain 基于成对马尔可夫链的彩色图像分割
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-05-10 DOI: 10.1109/ICMCS.2018.8525988
M. Ameur, N. Idrissi, C. Daoui
{"title":"Color Images Segmentation using Pairwise Markov Chain","authors":"M. Ameur, N. Idrissi, C. Daoui","doi":"10.1109/ICMCS.2018.8525988","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525988","url":null,"abstract":"In this paper, we present two comparative studies. The first one is between two hidden stationaries models of Markov using in image segmentation such as Hidden Markov Chain with Independent Noise (HMC-IN) and Pairwise Markov Chain (PMC). The second one is between three parameter estimators such as EM (Exceptation-Maximization) algorithm, ICE (Iterative Conditional Estimation) algorithm and SEM (Stochastic Exceptation-Maximization) algorithm. To estimate the final configuration of X, we have used MPM (Marginal Posteriori Mode) algorithm. From these comparisons, we can confirm that PMC provides better results of segmentation than HMC-IN. Moreover, EM, ICE, SEM give the same results under HMC-IN and PMC.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"377 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NLP-Enriched Automatic Video Segmentation 丰富的nlp自动视频分割
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-05-10 DOI: 10.1109/ICMCS.2018.8525880
Mohannad AlMousa, R. Benlamri, R. Khoury
{"title":"NLP-Enriched Automatic Video Segmentation","authors":"Mohannad AlMousa, R. Benlamri, R. Khoury","doi":"10.1109/ICMCS.2018.8525880","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525880","url":null,"abstract":"E-learning environments are heavily dependent on videos as the main media to deliver lectures to learners. Despite the merits of video-based lectures, new challenges can paralyze the learning process. Challenges that deal with video content accessibility, such as searching, retrieving, explaining, matching, organizing, and even summarizing these contents, significantly limit the potential of video-based learning. In this paper, we propose a novel approach to segment video lectures and integrate Natural Language Processing (NLP) tasks to extract key linguistic features exist within the video. We exploit the benefits of visual, audio, and textual features in order to create comprehensive temporal feature vectors for the enhanced segmented video. Afterwards, we apply an NLP cosine similarity to the cluster and identify the various topics presented in the video. The final product would be an indexed, vector-based searchable video segments of a specific topic/subtopic","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods 基于Haar级联和特征脸方法的多人脸识别
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-05-10 DOI: 10.1109/ICMCS.2018.8525935
T. Mantoro, M. A. Ayu, Suhendi
{"title":"Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods","authors":"T. Mantoro, M. A. Ayu, Suhendi","doi":"10.1109/ICMCS.2018.8525935","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525935","url":null,"abstract":"Face recognition can be considered one of the most successful biometric identification methods among several types of biometric identification including fingerprints, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Face recognition provides biometric identification that utilizes the uniqueness of faces for security purposes. The problem with face recognition using biometric identification is its lengthy process and the accuracy of the results. This paper proposes solutions for a faster face recognition process with accurate results. The proposed face recognition process was done using a hybrid process of Haar Cascades and Eigenface methods, which can detect multiple faces (55 faces) in a single detection process. This improved face recognition approach was able to recognize multiple faces with 91.67% accuracy level.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130810226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks 基于sip的VOIP网络中DOS攻击检测技术的比较研究
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-05-10 DOI: 10.1109/ICMCS.2018.8525878
Rababe Safoine, Soufyane Mounir, A. Farchi
{"title":"Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks","authors":"Rababe Safoine, Soufyane Mounir, A. Farchi","doi":"10.1109/ICMCS.2018.8525878","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525878","url":null,"abstract":"Thanks to the low cost of communication provided by Voice over Internet Protocol (VoIP) networks, the use of VoIP services has significantly increased. Session Initiation Protocol (SIP) is the main protocol used for nowadays VoIP services. Being a text based protocol and implemented in an open environment, SIP is exposed to various security threats including flooding. One of the most well-known attacks is Denial of Service. Given this, numerous flooding detecting techniques were designed. Our paper will focus on presenting a study of those different techniques, and comparing two specific proposed mechanisms for detecting anomalies and alerting users of possible intrusions. Besides, we propose a new VoIP scheme of detecting attacks, so as to protect private communications and raise security awareness in SIP-based VoIP networks.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134591582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A proposed secure remote data acquisition architecture of photovoltaic systems based on the Internet of Things 提出了一种基于物联网的光伏系统安全远程数据采集架构
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-05-10 DOI: 10.1109/ICMCS.2018.8525902
Chaimae Zedak, A. Lekbich, Abdelaziz Belfqih, Jamal Boukherouaa, Touria Haidi, F. E. Mariami
{"title":"A proposed secure remote data acquisition architecture of photovoltaic systems based on the Internet of Things","authors":"Chaimae Zedak, A. Lekbich, Abdelaziz Belfqih, Jamal Boukherouaa, Touria Haidi, F. E. Mariami","doi":"10.1109/ICMCS.2018.8525902","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525902","url":null,"abstract":"So far, solar energy is one of the inexhaustible and reliable energies that are known for their low running costs and low maintenance. It has become a potential solution for sustainable energy in the future. Since this renewable energy source has become increasingly integrated into the electrical grid, there is a growing need to control and monitor it in real time to optimize network performance and make it more and more intelligent , stable and remotely controllable.This article proposes a secure architecture for remote data acquisition from solar panels using the Internet of Things (IOT) with voltage, current, temperature, solar irradiance sensors and other field devices. The data will be routed to the Raspberry Pi then stored on the IOT cloud service. This data can be accessed from a web interface on the phone.The architecture discussed in this article can facilitate faults diagnosis, data collection for forecasting, preventive maintenance…","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129767159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Clowiz: A Model-driven Development Platform for Cloud-based Information Systems 基于云的信息系统的模型驱动开发平台
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-05-10 DOI: 10.1109/ICMCS.2018.8525494
Jalal Kiswani, S. Dascalu, Muhanna A. Muhanna, F. Harris
{"title":"Clowiz: A Model-driven Development Platform for Cloud-based Information Systems","authors":"Jalal Kiswani, S. Dascalu, Muhanna A. Muhanna, F. Harris","doi":"10.1109/ICMCS.2018.8525494","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525494","url":null,"abstract":"Cloud-based solution of software systems development is currently the preferred approach over traditional on-premise one. In fact, utilizing cloud computing can reduce cost, time to market and allows for potential growth and scalability. However, this approach requires special quality attributes (i.e. non-functional requirements) to be taken into consideration. These attributes include traceability, recoverability, portability, and hot-deployability, along with the more common attributes of usability, reliability, efficiency, availability and security. Consequently, this increases the complexity of design and implementation of such applications. Therefore, such systems have a higher-cost and longer development time than traditional applications. In this paper, Clowiz is proposed. In particular, it is a cloud-based platform enabling rapid application development for building high-quality information systems applications. It is based on a model-driven development approach. In this approach, software developers shall use a web-based modeling toolkit to develop Internet based information systems, and modify them on the fly. The development process includes building application’s views map (i.e. workflow), design systems entities (e.g. tables), and develop user interface forms. The platform enables application preview and deployment. In addition, it enables monitoring applications behavior at run time. The work presented in this paper contains a full waterfall software engineering process with full standard deliverables based on the UML modeling language, starting from requirements, and continuing to design and architecture, development, testing, and evolution.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126907702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Framework Using PCA, LDA and KNN-SVM to Activity Recognition Based SmartPhone’s Sensors 基于PCA、LDA和KNN-SVM的智能手机传感器活动识别新框架
2018 6th International Conference on Multimedia Computing and Systems (ICMCS) Pub Date : 2018-05-10 DOI: 10.1109/ICMCS.2018.8525987
Ihssene Menhour, M. Abidine, B. Fergani
{"title":"A New Framework Using PCA, LDA and KNN-SVM to Activity Recognition Based SmartPhone’s Sensors","authors":"Ihssene Menhour, M. Abidine, B. Fergani","doi":"10.1109/ICMCS.2018.8525987","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525987","url":null,"abstract":"In this paper, we proposed a new model to perform automatic recognition of activities using Smartphones data from a gyroscope and accelerometer sensors. We target assisted living applications such as activity monitoring for the disabled and the elderly persons. The proposed method combine the Principal Component Analysis (PCA) or Linear Discriminant Analysis (LDA) for dimension reduction and KNN-SVM using K-Nearest Neighbors (KNN) with Support Vector Machines (SVM) allowing to better discrimination between the classes of activities. Several experiments performed with real datasets shows a significant improvement of our proposed approach in terms of recognition performance.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信