2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)最新文献

筛选
英文 中文
Accessibility of the cyprus Island municipal websites 塞浦路斯市政网站的可访问性
E. Iseri, K. Uyar, Ü. Ilhan
{"title":"Accessibility of the cyprus Island municipal websites","authors":"E. Iseri, K. Uyar, Ü. Ilhan","doi":"10.1109/CICN.2017.8319359","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319359","url":null,"abstract":"The accessibility of the websites is important for the persons with disabilities. In this study the accessibility of the 67 municipal websites, 28 in Turkish Cypriots-controlled area and 39 in Greek Cypriots-controlled area of the Cyprus Island were evaluated. The online tools European Internet Inclusion Initiative (EIII) Page Checker and AChecker based on the Web Content Accessibility Guidelines (WCAG) 2.0 published by the World Wide Web Consortium (W3C) were used for automated evaluation. The results of these tools showed that all surveyed websites have accessibility problems.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation of load sharing with fast voltage regulation in parallel connected cascaded power boost converters based on droop coefficients refreshing method 基于下垂系数刷新法的并联级联功率升压变换器负载共享快速稳压实现
Davood Ghaderi, M. Celebi
{"title":"Implementation of load sharing with fast voltage regulation in parallel connected cascaded power boost converters based on droop coefficients refreshing method","authors":"Davood Ghaderi, M. Celebi","doi":"10.1109/CICN.2017.8319384","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319384","url":null,"abstract":"Droop control has been widely implemented in Parallel structures of DC DC converters due to its inherent modularity and ease of implementation. In this kind of converters with resistive distribution lines, the P-V droop with boost converters is the most common method for load sharing. Current or load sharing is the most critical parameter in parallel operation of converters. Most of the methods to guarantee equal load sharing utilize some form of communication between the units. This increases the complexity and sensitivity to noise. The method that has been considered in this paper is P-V control option. P-V droop controls the dc current depending on the dc voltage. In this technique, per 10 microseconds, droop coefficients will be refreshing by sampling by load current. This circuit is simulated by MATLAB/SIMULINK and CADENCE for preparing to instruction and the results of the simulation confirmed the theoretical design. This design has implemented on a parallel structure with two blocks of cascaded boost converters at laboratory scales.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116916066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Diabetes prediction using ensemble perceptron algorithm 基于集成感知器算法的糖尿病预测
Roxana Mirshahvalad, Nastaran Asadi Zanjani
{"title":"Diabetes prediction using ensemble perceptron algorithm","authors":"Roxana Mirshahvalad, Nastaran Asadi Zanjani","doi":"10.1109/CICN.2017.8319383","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319383","url":null,"abstract":"Today, people's new way of life leads their eating habits towards fast-foods and ready-to-use products more than before. These foods contain large amounts of sugar and fat, which increase the number of people at risk of diabetes. Many people are required to get diabetes diagnosis by various blood tests regularly. These tests bring significant amounts of cost and take facilities and time when it comes to a large number of people. Machine learning algorithms can be used as computer aided systems to predict if a person is highly probable to have diabetes or not, in order to reduce huge number of people who require to take diagnosis blood tests, to save time and money. In this study, we proposed a learning algorithm which ensemble boosting algorithm with perceptron algorithm to improve performance of perceptron algorithm in prediction of undiagnosed patients. Proposed method is tested on three different publicly available datasets and compared with performance of perceptron algorithm. The results show that proposed algorithm outperform perceptron algorithm on average AUC basis.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Optical stegnography to enhance speed of analog transmission with security enhancement through image encryption 光学隐写技术通过对图像进行加密,提高模拟传输速度,增强安全性
Amanpreet Kaur, G. Soni
{"title":"Optical stegnography to enhance speed of analog transmission with security enhancement through image encryption","authors":"Amanpreet Kaur, G. Soni","doi":"10.1109/cicn.2017.8319378","DOIUrl":"https://doi.org/10.1109/cicn.2017.8319378","url":null,"abstract":"Data transmission is the way through which data is sent from source to destination over a physical medium. In networking we use coaxial cable, twisted pair wires for transfer of data from source to destination. These medium of data transfer are slower in nature and data which is transferred may leak or lost during transmission and also there no security of data. To overcome these problems during transmission we use fibre optics. In fibre optics the data is transferred in the form of light beams so there it is less prone to leakage of data. It also uses some security mechanisms for secure transmission of data. The data which are transferred firstly encrypt and after that transferred to the destination in the form of light beams. In our proposed system we introduced encryption in fibre optics using image. Also various encryption algorithms have been proposed to make optical medium data secure, vulnerable and give concern to the security issues, challenges and also comparisons have been made between AES, DES and RSA algorithms to find the best one security algorithm, which has to be used in Optical medium for making Optical medium data secure and not to be hacked by attackers.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"13 23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combination of the symmetrical local threshold and the sobel edge detector for lane feature extraction 结合对称局部阈值和索贝尔边缘检测器进行车道特征提取
U. Ozgunalp
{"title":"Combination of the symmetrical local threshold and the sobel edge detector for lane feature extraction","authors":"U. Ozgunalp","doi":"10.1109/cicn.2017.8319349","DOIUrl":"https://doi.org/10.1109/cicn.2017.8319349","url":null,"abstract":"In this paper, two of lane feature extractors are combined for better lane feature extraction. Namely; the Symmetrical local threshold (SLT) and the Sobel edge detector. The SLT is found to be one of the most robust lane marking feature extractor. However, it relies on the Dark-Light-Dark feature of the painted lane markings. However, in many cases there is no painted lane marking on one or two sides of the road border. Although, edge detector is not assumed to be as good as the SLT for the lane marking feature extraction, it has more advantage on detecting the road borders. Thus, even though many lane marking feature extractors are proposed in the literature, edge detectors are still popular method for lane detection. In this paper, a new approach to combine two of the feature extractors is proposed. With the proposed approach, while detecting painted lane markings accurately, it is possible to detect road borders and poorly painted road markings as well.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Metric based detection of refused bequest code smell 基于度量的被拒绝遗赠代码气味检测
B. M. Merzah, Y. E. Selçuk
{"title":"Metric based detection of refused bequest code smell","authors":"B. M. Merzah, Y. E. Selçuk","doi":"10.1109/CICN.2017.8319355","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319355","url":null,"abstract":"The concept of code smell was introduced as a signs of internal design flaws within the software. Code smells detection has become a mandatory technique to detect code issues that may affect negatively on the software quality by causing problems for further development and maintenance. Accordingly, the consensus is that all types of code smells need to be refactored to deny or diminish such issues. The refactoring techniques can get rid of particular design flaws or principle violations, and restore the code fragment that present a smell, to an acceptable quality level. In the context of object-oriented systems, the concept of inheritance has been known as a key feature proposed to increase the amount of software reusability. However, using inheritance is not always the best solution, particularly if it is utilized in improper cases where other types of relationships would be more appropriate. One of the particular issues that violate inheritance principles is the Refused Bequest code smell. It is related to an inheritance hierarchy where a subclass does not obligate the interface inherited from its parent class. Some studies, mentioned in Section 2, had been made to detect the Refused Bequest smell. In this paper we present a new detection strategy by computing the similarity between common methods of the base class with the overridden methods of the sub-class, and then by calculating the average of these values for the given sub-class. That average value is defined as a new metric in our detection mechanism.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new dynamic secured IEEE 802.11e AES based system 一种新的基于IEEE 802.11e AES的动态安全系统
Moustafa Mamdouh, R. Sadek, Hussein El Ghoz, Yousry El Far
{"title":"A new dynamic secured IEEE 802.11e AES based system","authors":"Moustafa Mamdouh, R. Sadek, Hussein El Ghoz, Yousry El Far","doi":"10.1109/CICN.2017.8319365","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319365","url":null,"abstract":"In computer networks, the network resources are shared among different applications based on a Quality of Service (QoS) priority scheme. Enhanced Distribution Channel Access (EDCA) is effectively based on Distributed Coordination Function (DCF) with four priorities (Background — Best Effort — Video — Voice), which decreases the congestion in the network. This paper proposes a novel technique of context aware Advanced Encryption Standard (AES) algorithm Cipher Block Chaining (CBC) as a general mode for IEEE 802.11e. This algorithm is based on the selection of some different parameters of AES according to the type of the received application, due to parameters variation an enhancement in the system security is observed. Results are obtained by merging both MATLAB and OPNET modeler to evaluate the network performance among several critical metrics.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132619268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A physiotherapy application with MS kinect for patients with shoulder joint, muscle and tendon damage MS kinect用于肩关节、肌肉和肌腱损伤患者的物理治疗应用
Burakhan Çubukçu, Uğur Yüzgeç
{"title":"A physiotherapy application with MS kinect for patients with shoulder joint, muscle and tendon damage","authors":"Burakhan Çubukçu, Uğur Yüzgeç","doi":"10.1109/CICN.2017.8319390","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319390","url":null,"abstract":"Patients with undergone traditional physiotherapy have some problems, especially in terms of transportation and doing correct exercise. Nowadays telerehabilitation is becoming a popular method to reduce these problems and to help with treatment. MS Kinect is also one of the effective equipments in telerehabilitation. In this study, the problems of physically treated patients and studies using MS Kinect for this disease were examined. A physiotherapy application was developed with MS Kinect for shoulder joint, muscle and tendon damaged patients. In this application, six exercises have been selected for patients with shoulder joint, muscle and tendon damage. Thanks to the developed physiotherapy application with MS Kinect, the patients can do their exercises with highest accuracy.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129354212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Control humanoid robot using intelligent optimization algorithms fusion with fourier series 采用傅立叶级数融合的智能优化算法控制仿人机器人
E. Abedi, Pooya Alamirpour, Roxana Mirshahvalad
{"title":"Control humanoid robot using intelligent optimization algorithms fusion with fourier series","authors":"E. Abedi, Pooya Alamirpour, Roxana Mirshahvalad","doi":"10.1109/CICN.2017.8319381","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319381","url":null,"abstract":"Robot walking on two feet is a complex motion. Researchers are trying to improve biped robots walking in case of walking speed. The analysis of biped walking patterns is used to obtain more detailed information in this field. Several researches have been done to achieve this purpose and the equation of walking trajectory is one of them. This article will introduce a new algorithm in which an evolutionary computing, based on learning automata along with a continual action on control signals of humanoid robot's motion, showing the success of the proposed method as the result to be used for optimizing the parameters of Truncated Fourier Series (TFS) after being compared with the results of Genetic Algorithm (GA) implementation. It is notable that the conditions of the experiment for these two algorithms are considered to be identical.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125297704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A planar UWB antenna with tripple notched bands 三陷波带的平面超宽带天线
M. I. Khattak, Muhammad Irshad Khan, A. Najam, Mohammad Saleem, M. Shafi
{"title":"A planar UWB antenna with tripple notched bands","authors":"M. I. Khattak, Muhammad Irshad Khan, A. Najam, Mohammad Saleem, M. Shafi","doi":"10.1109/CICN.2017.8319344","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319344","url":null,"abstract":"This paper presents a rectangular planar monopole antenna with triple stop bands for ultra-wide band Applications. The antenna is compact size (24mm × 24mm × 1.6mm) and is covering the entire UWB band with VSWR < 2 except the band of WiMAX range from 3.07–4.73 GHz, the WLAN band range from 5.14–5.97 GHz and the ITU frequency band range from of 7.92–8.61 GHz. The three slots are added to this antenna to stop various bands. Different shaped slots i.e. inverted Z, C and U are introduced in radiating element to stop WiMAX, WLAN and ITU respectively. The antenna is simulated using High Frequency Structure Simulator (HFSS) using FR4 as a substrate.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信