{"title":"Accessibility of the cyprus Island municipal websites","authors":"E. Iseri, K. Uyar, Ü. Ilhan","doi":"10.1109/CICN.2017.8319359","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319359","url":null,"abstract":"The accessibility of the websites is important for the persons with disabilities. In this study the accessibility of the 67 municipal websites, 28 in Turkish Cypriots-controlled area and 39 in Greek Cypriots-controlled area of the Cyprus Island were evaluated. The online tools European Internet Inclusion Initiative (EIII) Page Checker and AChecker based on the Web Content Accessibility Guidelines (WCAG) 2.0 published by the World Wide Web Consortium (W3C) were used for automated evaluation. The results of these tools showed that all surveyed websites have accessibility problems.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of load sharing with fast voltage regulation in parallel connected cascaded power boost converters based on droop coefficients refreshing method","authors":"Davood Ghaderi, M. Celebi","doi":"10.1109/CICN.2017.8319384","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319384","url":null,"abstract":"Droop control has been widely implemented in Parallel structures of DC DC converters due to its inherent modularity and ease of implementation. In this kind of converters with resistive distribution lines, the P-V droop with boost converters is the most common method for load sharing. Current or load sharing is the most critical parameter in parallel operation of converters. Most of the methods to guarantee equal load sharing utilize some form of communication between the units. This increases the complexity and sensitivity to noise. The method that has been considered in this paper is P-V control option. P-V droop controls the dc current depending on the dc voltage. In this technique, per 10 microseconds, droop coefficients will be refreshing by sampling by load current. This circuit is simulated by MATLAB/SIMULINK and CADENCE for preparing to instruction and the results of the simulation confirmed the theoretical design. This design has implemented on a parallel structure with two blocks of cascaded boost converters at laboratory scales.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116916066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diabetes prediction using ensemble perceptron algorithm","authors":"Roxana Mirshahvalad, Nastaran Asadi Zanjani","doi":"10.1109/CICN.2017.8319383","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319383","url":null,"abstract":"Today, people's new way of life leads their eating habits towards fast-foods and ready-to-use products more than before. These foods contain large amounts of sugar and fat, which increase the number of people at risk of diabetes. Many people are required to get diabetes diagnosis by various blood tests regularly. These tests bring significant amounts of cost and take facilities and time when it comes to a large number of people. Machine learning algorithms can be used as computer aided systems to predict if a person is highly probable to have diabetes or not, in order to reduce huge number of people who require to take diagnosis blood tests, to save time and money. In this study, we proposed a learning algorithm which ensemble boosting algorithm with perceptron algorithm to improve performance of perceptron algorithm in prediction of undiagnosed patients. Proposed method is tested on three different publicly available datasets and compared with performance of perceptron algorithm. The results show that proposed algorithm outperform perceptron algorithm on average AUC basis.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optical stegnography to enhance speed of analog transmission with security enhancement through image encryption","authors":"Amanpreet Kaur, G. Soni","doi":"10.1109/cicn.2017.8319378","DOIUrl":"https://doi.org/10.1109/cicn.2017.8319378","url":null,"abstract":"Data transmission is the way through which data is sent from source to destination over a physical medium. In networking we use coaxial cable, twisted pair wires for transfer of data from source to destination. These medium of data transfer are slower in nature and data which is transferred may leak or lost during transmission and also there no security of data. To overcome these problems during transmission we use fibre optics. In fibre optics the data is transferred in the form of light beams so there it is less prone to leakage of data. It also uses some security mechanisms for secure transmission of data. The data which are transferred firstly encrypt and after that transferred to the destination in the form of light beams. In our proposed system we introduced encryption in fibre optics using image. Also various encryption algorithms have been proposed to make optical medium data secure, vulnerable and give concern to the security issues, challenges and also comparisons have been made between AES, DES and RSA algorithms to find the best one security algorithm, which has to be used in Optical medium for making Optical medium data secure and not to be hacked by attackers.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"13 23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combination of the symmetrical local threshold and the sobel edge detector for lane feature extraction","authors":"U. Ozgunalp","doi":"10.1109/cicn.2017.8319349","DOIUrl":"https://doi.org/10.1109/cicn.2017.8319349","url":null,"abstract":"In this paper, two of lane feature extractors are combined for better lane feature extraction. Namely; the Symmetrical local threshold (SLT) and the Sobel edge detector. The SLT is found to be one of the most robust lane marking feature extractor. However, it relies on the Dark-Light-Dark feature of the painted lane markings. However, in many cases there is no painted lane marking on one or two sides of the road border. Although, edge detector is not assumed to be as good as the SLT for the lane marking feature extraction, it has more advantage on detecting the road borders. Thus, even though many lane marking feature extractors are proposed in the literature, edge detectors are still popular method for lane detection. In this paper, a new approach to combine two of the feature extractors is proposed. With the proposed approach, while detecting painted lane markings accurately, it is possible to detect road borders and poorly painted road markings as well.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metric based detection of refused bequest code smell","authors":"B. M. Merzah, Y. E. Selçuk","doi":"10.1109/CICN.2017.8319355","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319355","url":null,"abstract":"The concept of code smell was introduced as a signs of internal design flaws within the software. Code smells detection has become a mandatory technique to detect code issues that may affect negatively on the software quality by causing problems for further development and maintenance. Accordingly, the consensus is that all types of code smells need to be refactored to deny or diminish such issues. The refactoring techniques can get rid of particular design flaws or principle violations, and restore the code fragment that present a smell, to an acceptable quality level. In the context of object-oriented systems, the concept of inheritance has been known as a key feature proposed to increase the amount of software reusability. However, using inheritance is not always the best solution, particularly if it is utilized in improper cases where other types of relationships would be more appropriate. One of the particular issues that violate inheritance principles is the Refused Bequest code smell. It is related to an inheritance hierarchy where a subclass does not obligate the interface inherited from its parent class. Some studies, mentioned in Section 2, had been made to detect the Refused Bequest smell. In this paper we present a new detection strategy by computing the similarity between common methods of the base class with the overridden methods of the sub-class, and then by calculating the average of these values for the given sub-class. That average value is defined as a new metric in our detection mechanism.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moustafa Mamdouh, R. Sadek, Hussein El Ghoz, Yousry El Far
{"title":"A new dynamic secured IEEE 802.11e AES based system","authors":"Moustafa Mamdouh, R. Sadek, Hussein El Ghoz, Yousry El Far","doi":"10.1109/CICN.2017.8319365","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319365","url":null,"abstract":"In computer networks, the network resources are shared among different applications based on a Quality of Service (QoS) priority scheme. Enhanced Distribution Channel Access (EDCA) is effectively based on Distributed Coordination Function (DCF) with four priorities (Background — Best Effort — Video — Voice), which decreases the congestion in the network. This paper proposes a novel technique of context aware Advanced Encryption Standard (AES) algorithm Cipher Block Chaining (CBC) as a general mode for IEEE 802.11e. This algorithm is based on the selection of some different parameters of AES according to the type of the received application, due to parameters variation an enhancement in the system security is observed. Results are obtained by merging both MATLAB and OPNET modeler to evaluate the network performance among several critical metrics.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132619268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A physiotherapy application with MS kinect for patients with shoulder joint, muscle and tendon damage","authors":"Burakhan Çubukçu, Uğur Yüzgeç","doi":"10.1109/CICN.2017.8319390","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319390","url":null,"abstract":"Patients with undergone traditional physiotherapy have some problems, especially in terms of transportation and doing correct exercise. Nowadays telerehabilitation is becoming a popular method to reduce these problems and to help with treatment. MS Kinect is also one of the effective equipments in telerehabilitation. In this study, the problems of physically treated patients and studies using MS Kinect for this disease were examined. A physiotherapy application was developed with MS Kinect for shoulder joint, muscle and tendon damaged patients. In this application, six exercises have been selected for patients with shoulder joint, muscle and tendon damage. Thanks to the developed physiotherapy application with MS Kinect, the patients can do their exercises with highest accuracy.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129354212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control humanoid robot using intelligent optimization algorithms fusion with fourier series","authors":"E. Abedi, Pooya Alamirpour, Roxana Mirshahvalad","doi":"10.1109/CICN.2017.8319381","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319381","url":null,"abstract":"Robot walking on two feet is a complex motion. Researchers are trying to improve biped robots walking in case of walking speed. The analysis of biped walking patterns is used to obtain more detailed information in this field. Several researches have been done to achieve this purpose and the equation of walking trajectory is one of them. This article will introduce a new algorithm in which an evolutionary computing, based on learning automata along with a continual action on control signals of humanoid robot's motion, showing the success of the proposed method as the result to be used for optimizing the parameters of Truncated Fourier Series (TFS) after being compared with the results of Genetic Algorithm (GA) implementation. It is notable that the conditions of the experiment for these two algorithms are considered to be identical.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125297704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. I. Khattak, Muhammad Irshad Khan, A. Najam, Mohammad Saleem, M. Shafi
{"title":"A planar UWB antenna with tripple notched bands","authors":"M. I. Khattak, Muhammad Irshad Khan, A. Najam, Mohammad Saleem, M. Shafi","doi":"10.1109/CICN.2017.8319344","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319344","url":null,"abstract":"This paper presents a rectangular planar monopole antenna with triple stop bands for ultra-wide band Applications. The antenna is compact size (24mm × 24mm × 1.6mm) and is covering the entire UWB band with VSWR < 2 except the band of WiMAX range from 3.07–4.73 GHz, the WLAN band range from 5.14–5.97 GHz and the ITU frequency band range from of 7.92–8.61 GHz. The three slots are added to this antenna to stop various bands. Different shaped slots i.e. inverted Z, C and U are introduced in radiating element to stop WiMAX, WLAN and ITU respectively. The antenna is simulated using High Frequency Structure Simulator (HFSS) using FR4 as a substrate.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}