2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)最新文献

筛选
英文 中文
Developed clustering approaches to enhance the data transmissions in WSNs 提出了提高无线传感器网络数据传输性能的聚类方法
S. T. Hasson, Hawraa Abd Al-kadhum
{"title":"Developed clustering approaches to enhance the data transmissions in WSNs","authors":"S. T. Hasson, Hawraa Abd Al-kadhum","doi":"10.1109/CRCSIT.2017.7965541","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965541","url":null,"abstract":"Wireless sensor networks (WSNs) usually build from huge number of randomly deployed sensor nodes in certain area. The sensors are mainly utilized to monitor physical and environmental conditions, gather information, process this data locally and transfer the sensed data back to the Base Station (BS). The main objective of this paper is to simulate, evaluate and observe the behavior of developed clustering approaches and compare their performance metrics. In this study all the cluster nodes must sensing certain data and transmit it to its cluster head (CH). These data will be collected at particular nodes known as cluster heads that is previously assigned for each cluster. The CH aggregates the data and forwards it to the base station or a node sink. In this study two developed clustering approaches are suggested and created using Net Logo (5.2.1 version 2015). These approaches are Extreme node and double Extreme nodes. In addition to these two approaches, the DB-Scan clustering approach is also suggested to be used as a reference to compare its results with these two suggested algorithms. Results show certain improvement in these suggested algorithms. Many performance metrics can be used to Measure the performance of the suggested WSN such as NRL, PDF, End-to-end and throughput.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125037038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Classification and discrimination of focal and non-focal EEG signals based on deep neural network 基于深度神经网络的病灶与非病灶脑电信号分类与识别
A. M. Taqi, Fadwa Al-Azzo, M. Mariofanna, Jassim M. Al-Saadi
{"title":"Classification and discrimination of focal and non-focal EEG signals based on deep neural network","authors":"A. M. Taqi, Fadwa Al-Azzo, M. Mariofanna, Jassim M. Al-Saadi","doi":"10.1109/CRCSIT.2017.7965539","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965539","url":null,"abstract":"In this paper, a new model of focal and non-focal electroencephalography classification is carried out using a deep neural network (DNN). The Convolution Architecture For Feature Extraction (Caffe) framework with three different models (LeNet, AlexNet, and GoogLeNet) are applied, where the DNN is trained with different training epoch values (TEs). The performance of discriminating the focal and non-focal EEG signals using soft-max classifier is investigated. This classification serves medical specialists for taking a surgery decision of focal epilepsy patient. In this work, the EEG signals acquired from EEG database in literature works for five epilepsy patients are used for examining the proposed scheme. The results demonstrate a significant performance in terms of the classification accuracy and the remarkable short running time, via few numbers of the training epochs (TEs). However, the first model (LeNet) displays the best performance. Overall, the proposed classification approach provides a better performance as compared with the existing state-of-the-art techniques. Classification accuracy result is 100% for LeNet model at TE=2, while the accuracy of AlexNet reaches to 100% at TE=5, and finally, GoogLeNet touches an accuracy of 100% at TE=10.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126969174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Robot path planning based on PSO and D∗ algorithmsin dynamic environment 动态环境下基于粒子群算法和D *算法的机器人路径规划
A. Sadiq, Ali Hadi Hasan
{"title":"Robot path planning based on PSO and D∗ algorithmsin dynamic environment","authors":"A. Sadiq, Ali Hadi Hasan","doi":"10.1109/CRCSIT.2017.7965550","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965550","url":null,"abstract":"This paper proposes two new approaches of robot path planning in dynamic environments based on D∗ algorithm and particle swarm optimization. Generally speaking, the grid method is used to decompose two-dimensional space to build class node which contains the information of the space environment. D∗ algorithm analyze the environment from the goal node and computes the cost for each node to the start node. In the first approach, Lbest PSO algorithm is used to move the robot from the start node through dynamic environment which contains dynamic obstacle moving in free space by finding and displaying the optimal path. In the second approach a method is developed to manipulate the gate raise state where the robot cannot pass this node unlike D∗ algorithm. Some experimental results are simulation in different dynamic environments, show that in second approach the robot reaches its target without colliding obstacles and finds the optimal path with minimum iterations, minimum total arc cost and minimum time occupy.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Classification of red blood cells disease using fuzzy logic theory 模糊逻辑理论在红细胞疾病分类中的应用
Ziad M. Abood, G. S. Karam, Rafied E. Hluot
{"title":"Classification of red blood cells disease using fuzzy logic theory","authors":"Ziad M. Abood, G. S. Karam, Rafied E. Hluot","doi":"10.1109/CRCSIT.2017.7965558","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965558","url":null,"abstract":"Blood cell classification is the initial process for detecting diseases; the diseases can be carried if it is detected at early stage. For solving such problems. Quantitative processing of digital images based on fuzzy technique is applied for classification of red blood cells. There are various features consist of shape, size and colour based features that based on statistical analysis (i.e. Mean, Standard Deviation, Variance, Roundness, Skewness, Kurtosis) have been extracted. The classification results indicated that these features highly signification and can be used for classification of red cells to the normal and up normal cells. The obtained result successfully identified 98% of red blood cells.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Arabic text mining based on clustering and coreference resolution 基于聚类和共指解析的阿拉伯语文本挖掘
S. Mahmood, Faiez Musa Lahmood Al-Rufaye
{"title":"Arabic text mining based on clustering and coreference resolution","authors":"S. Mahmood, Faiez Musa Lahmood Al-Rufaye","doi":"10.1109/CRCSIT.2017.7965549","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965549","url":null,"abstract":"Text mining discover and extract useful information from documents, whenever increase the size and number documents leads to redouble features. The huge features for the documents adds challenge to text mining called high dimension. The aim of this proposed study is minimize the high dimension of the documents, and improve Arabic text mining using clustering. In order to achieve this goal, we propose to applied coreference resolution technique using the clustering algorithms k-mediods and k-means. This study uses the similarity metrics Euclidean and Cosine. The system implements using a corpus contains on 200 sport news Arabic. Finally, evaluation measures are used including (Precision' Recall and F-measure) to evaluate our system.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image processing technique for determining cold thyroid nodules 确定甲状腺冷结节的图像处理技术
Amir Torab-Miandoab, Peyman Rezaei-Hachesu, T. Samad, Sogand Habibi-chenaran
{"title":"Image processing technique for determining cold thyroid nodules","authors":"Amir Torab-Miandoab, Peyman Rezaei-Hachesu, T. Samad, Sogand Habibi-chenaran","doi":"10.1109/CRCSIT.2017.7965547","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965547","url":null,"abstract":"Image processing is a technique that can be applied on medical images for detecting abnormalities such as tumors. Due to risk of malignancy, detecting and diagnosing of cold nodules in thyroid gland are important. We applied Image Enhancement (circular averaging filter, morphological opening by diamond structure element, division of results, transforming colorful image in to gray image), Image segmentation (thresholding) and feature extraction (hill climbing algorithm) to determine cold thyroid nodules automatically with high accuracy.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115885690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Human voice extracted biometric features: What can be used for 提取人类声音的生物特征:可用于什么
S. Sadkhan, Baheeja K. Al-Shukur, Ali K. Mattar
{"title":"Human voice extracted biometric features: What can be used for","authors":"S. Sadkhan, Baheeja K. Al-Shukur, Ali K. Mattar","doi":"10.1109/CRCSIT.2017.7965543","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965543","url":null,"abstract":"Strength of encryption algorithm is based on statistical performance of the bits key stream. Generate high quality key stream is a difficult task, which decides the level of security provided by the encryption algorithm. This paper propose two main directions to deal with the biometric features of human voice: first it focuses on how to extract good features that lead to produce encryption keys of lengths 128, 196, and 256 bits that have randomness characteristics, and secondly: how to generate a new encryption keys (18 new key each of 108-bits), only from 12 biometric voice features through a proposed random numbers generator. Statistical performance was performed to make sure that the random key sequence, which was generated in this paper have noise like characteristics to prove the importance of the features that were extracted from the signal of human voice, and how to deal with it. All keys that were used, passed successfully the randomness NIST tests (National Institute of Standards and Technology).","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dijkstra algorithm applied: Design and implementation of a framework to find nearest hotels and booking systems in Iraqi Dijkstra算法的应用:设计和实现一个框架,在伊拉克找到最近的酒店和预订系统
A. Ahmed, S. H. Ahmed, Omed Hassan Ahmed
{"title":"Dijkstra algorithm applied: Design and implementation of a framework to find nearest hotels and booking systems in Iraqi","authors":"A. Ahmed, S. H. Ahmed, Omed Hassan Ahmed","doi":"10.1109/CRCSIT.2017.7965546","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965546","url":null,"abstract":"This paper was primarily conducted to develop an Online Booking System where users can search for different varieties of hotels and are able to sort them according to their price, number of stars or their location distance to any particular place in the city. Once the hotel is selected, Users are able to guess the fastest routes to all the tourist attraction places and restaurants nearby each hotel using Dijkstra algorithm. The system is more designed to help Iraqi tourists to prior explore and reserve rooms during peak times, Therefore, one if the main goal of the system is to adopt a payment agent that fits situation. This is because banking systems is not as efficient as it supposed to be. Hence, users are able to do the payment process through Visa cards or through their cell phones using payment services providers like Asia hawala or Zain Cash. Agile methodology, as one of the software engineering models has been used to design and implement this approach.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A comprehensive study of spectrum sensing techniques in cognitive radio networks 认知无线电网络中频谱感知技术的综合研究
Ahmed M. Jasim, Haidar N. Al-Anbagi
{"title":"A comprehensive study of spectrum sensing techniques in cognitive radio networks","authors":"Ahmed M. Jasim, Haidar N. Al-Anbagi","doi":"10.1109/CRCSIT.2017.7965542","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965542","url":null,"abstract":"Frequency spectrum scarcity has been a strong research motivation. Those researches have focused on developing methodologies to utilize frequency spectrum as much as it could be. Meanwhile, this spectrum utilization and its great revenue should not affect the quality of services being provided by network providers. In most cases, statistics have shown that only quarter of the spectrum is well utilized. Therefore, regulated authorities, which are in charge of organizing the access to the frequency spectrum, have proposed a strategy to share the already allocated spectrum band with the unlicensed users based on the appearance, or not, of the licensed users. This concept of vertical spectrum sharing is called cognitive radio (CR). Spectrum scarcity, dynamic spectrum access, and the cognitive radio networks (CRNs) are comprehensively investigated in this study. Furthermore, this study deeply examines the spectrum sensing of cognitive radio network providing an idea of this important technology and the challenges it may face.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117091342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Enhancing 3D-playfair algorithm to support all the existing characters and increase the resistanceto brute force and frequency analysis attacks 增强3d游戏公平算法,支持所有现有的字符,并增加对暴力破解和频率分析攻击的抵抗力
A. Ahmed, S. H. Ahmed, Omed Hassan Ahmed
{"title":"Enhancing 3D-playfair algorithm to support all the existing characters and increase the resistanceto brute force and frequency analysis attacks","authors":"A. Ahmed, S. H. Ahmed, Omed Hassan Ahmed","doi":"10.1109/CRCSIT.2017.7965538","DOIUrl":"https://doi.org/10.1109/CRCSIT.2017.7965538","url":null,"abstract":"Play Fairal gorithm has been enhanced in various ways. One of the methods is to increase the confusion rates by transforming the algorithm into 3D-playfair which has four tables of 4×4 and accepts trigraph rather than digraph. This paper further enhances the 3D-playfair algorithm by extending its tables and hereby increasing the security level as well as supporting the characters of all the world's living languages. This is achieved by using four matrices of 128×128 to store all the possible characters which are 65536. As a result, the proposed algorithm has more resistanceto brute force andfrequency analysis attacks.","PeriodicalId":312746,"journal":{"name":"2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122331390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信