2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)最新文献

筛选
英文 中文
Intention to use biometrie systems among international students in Cyprus 有意在塞浦路斯的国际学生中使用生物识别系统
Issa Djeni, Meryem Erbilek
{"title":"Intention to use biometrie systems among international students in Cyprus","authors":"Issa Djeni, Meryem Erbilek","doi":"10.1109/CICN.2017.8319391","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319391","url":null,"abstract":"In biometrie authentication system the false acceptance rate (FAR) and false rejection rate (FRR) are two signifieant performanee metries used to illustrate the seeurities level of the system. All the biometric systems do not have an equal FAR and FRR. De facto, some biometric technologies are mathematically more vulnerable than the others. These disparities affect the behavioral intention toward biometric technology. This research aims to investigate the factors affecting the intention to use biometric system among international students staying on campus and those enrolled in graduate course in biometric system engineering. To address this problem, a proposed technology acceptance model will be tested empirically with 98 international students in two universities in Cyprus. The results of these studies have shown that among privacy concerns, biometrics system quality and personal innovativeness in IT, only performance expectancy and perceived securities are the main drivers of biometric system adoption. Additionally, the attendance of biometric course does affect the intention to use. The predictors investigated account for 40% of behavioral intentions. These findings could be extended to the intention to use biometric system in developing countries with infrastructure similar to Cyprus. Finally, organizations planning to use biometric in the future should carry out a non-professional training on how biometric system works.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133738065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Store products recognition and counting system using computer vision 店内产品识别与计数系统采用计算机视觉
Muhanad H. Algburi, S. Albayrak
{"title":"Store products recognition and counting system using computer vision","authors":"Muhanad H. Algburi, S. Albayrak","doi":"10.1109/CICN.2017.8319389","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319389","url":null,"abstract":"The aim of this study is to recognize products in a store shelves image using Speed Up Robust Features (SURF) and color histogram. This combination helps to provide more accuracy in categorizing the products to help the owners to avoid problems like out of stock and products misplacement. The results of the detection are stored in a database to make in much easier and faster to process this information later in order to create a custom service as requested by the owners. The accuracy of the used algorithm is demonstrated using two scenarios, the first scenario uses one model image for each product while the second one uses three model images for each product. The results illustrate a huge improvement in the results accuracy by providing more model images for each product.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"67 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131921872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission 实现了基于逻辑密钥层次的Diffie-Hellman密钥交换方法,实现了安全广播传输
H. Bodur, R. Kara
{"title":"Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission","authors":"H. Bodur, R. Kara","doi":"10.1109/CICN.2017.8319374","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319374","url":null,"abstract":"With the rapid growth of the internet, broadcast communication has become an important issue for many different areas and applications. The broadcast communication allows a source to send messages to all or certain group of the users connected to the source. Secure encryption algorithms are often used to ensure that message transmission is secure Today's encryption algorithms, regarded as reliable, include Diffie-Hellman key exchange. In this study, the creation of a common secret key value from the root node to the user is considered and compared with other methods by applying Diffie-Hellman key exchange on Logical Key Hierarchy (LKH) which is a broadcast communication scheme.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Thresholding neural network (TNN) with smooth sigmoid based shrinkage (SSBS) function for image de-noising 基于平滑s形收缩(SSBS)函数的阈值神经网络(TNN)用于图像去噪
Noorbakhsh Amiri Golilarz, H. Demirel
{"title":"Thresholding neural network (TNN) with smooth sigmoid based shrinkage (SSBS) function for image de-noising","authors":"Noorbakhsh Amiri Golilarz, H. Demirel","doi":"10.1109/CICN.2017.8319358","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319358","url":null,"abstract":"In this paper we proposed a new method for noise removal in wavelet domain. In this method we developed a thresholding neural network (TNN) by using a new type of smooth nonlinear thresholding function as its activation function. With respect to this function gradient based adaptive learning algorithm becomes more efficient in finding the optimal threshold to obtain least mean square (LMS) or minimum mean square error (MMSE). Experimental results shows that TNN with adaptive learning algorithm (TNN based nonlinear adaptive filtering) outperforms some other alternative methods in image de-noising in terms of obtaining higher peak signal to noise ratio (PSNR) and visual quality. The proposed method achieves up to 3.48 dB improvement over the state-of-the-art for de-noising Cameraman image.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"582 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127737725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Fuzzy SVM for 3D facial expression classification using sequential forward feature selection 基于序列前向特征选择的模糊支持向量机三维面部表情分类
Payam Zarbakhsh, H. Demirel
{"title":"Fuzzy SVM for 3D facial expression classification using sequential forward feature selection","authors":"Payam Zarbakhsh, H. Demirel","doi":"10.1109/CICN.2017.8319371","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319371","url":null,"abstract":"Facial expression detection is one of the emerging topics in computer vision. In this study, three-dimensional (3D) facial expression classification has been addressed. Firstly, a large set of features based on pair-wise distances of points in face model are extracted. The multi-class problem of facial expression detection is divided into 15 one-versus-one two-class classifiers. Sequential forward feature selection (SFFS) algorithm based on Naive Bayesian error rate is applied to select the most discriminative features. In the last step, a two level fuzzy SVM (FSVM) classifier is utilized in optimum low-dimensional feature space to detect multi-class labels of six basic expressions including anger, disgust, fear, happiness, surprise and sadness. Experiments conducted on BU-3DFE data set have proved that the performance of proposed algorithm is comparable with recent studies in this field.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126794765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Testing of algorithms for anomaly detection in Big data using apache spark 使用apache spark测试大数据异常检测算法
S. Lighari, D. Hussain
{"title":"Testing of algorithms for anomaly detection in Big data using apache spark","authors":"S. Lighari, D. Hussain","doi":"10.1109/CICN.2017.8319364","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319364","url":null,"abstract":"The constant upsurge in the size of networks and the data massively produced by them has made the data analysis very challenging principally the data attaining the boundaries of big data and it becomes even more difficult to detect intrusions in the case of big data. In this era, the experts find very limited tools and methods to analyze big data for security reasons. Either we need to device new tools or we can use existing tools in a novel manner to achieve the purpose of big data security analysis. In this paper, we are using apache spark a big data tool for analyzing the big dataset for anomaly detection. The anomaly detection is performed by using different machine learning algorithms like Logistic regression, Support vector machine, Naïve bayes, Decision trees, Random forest, and Kmeans. More or less all the aforementioned algorithms are capable to detect anomalies in big data but we need to know how efficiently each performs. The main objective of this investigation is to find the most efficient algorithm in the context of anomaly detection. In this regard, we set to compare their training time, prediction time, and the rate of accuracy. The analysis was implemented on Kddcup99 dataset. Although this dataset is of size in megabytes but it meets our purpose here for big data security analytics.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116275258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Improved antlion optimization algorithm via tournament selection 通过比赛选择改进了antlion优化算法
Haydar Kiliç, U. Yuzgec
{"title":"Improved antlion optimization algorithm via tournament selection","authors":"Haydar Kiliç, U. Yuzgec","doi":"10.1109/CICN.2017.8319385","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319385","url":null,"abstract":"From the measurement point of view, it is observed that antlion optimization algorithm (ALO) runs slower than other heuristic algorithms and it needs to be improved in terms of optimality and accuracy. For this reason, improved antlion optimization algorithm via tournament selection (IALOT) is presented in this study. IALOT, ALO, particle swarm optimization (PSO) and artificial bee colony (ABC) algorithms have been evaluated using benchmark test functions such as time, optimality, accuracy, CPU time, number of function evaluations (NFE), mean best solution and standard deviation. In summary, elite antlion selection, random walks, and other parts of the antlion optimization algorithm have been developed. As a result, the IALOT algorithm has shown better results than ALO algorithm.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130391713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image de-noising using un-decimated wavelet transform (UWT) with soft thresholding technique 基于软阈值技术的非抽取小波变换图像去噪方法
Noorbakhsh Amiri Golilarz, H. Demirel
{"title":"Image de-noising using un-decimated wavelet transform (UWT) with soft thresholding technique","authors":"Noorbakhsh Amiri Golilarz, H. Demirel","doi":"10.1109/CICN.2017.8319347","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319347","url":null,"abstract":"Noise can affect an image in a negative way and it can destroy some important details and features of image as well, so we need to dispose the noise to retain significant characteristics of image. This noise removing is very useful in improving the visually of image which leads to improved analysis process. In this paper we introduced a new technique for image de-noising in wavelet domain which uses soft thresholding function. De-noising based on un-decimated wavelet transform (UWT) using soft threshold function results in acquiring better visual quality and PSNR values in comparison with alternative techniques in the field of image de-noising in wavelet domain.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126521649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Artificial neural networks for predicting the racing time of cross-country skiers from survey-based data 基于调查数据预测越野滑雪运动员比赛时间的人工神经网络
F. Abut, M. Akay, S. Daneshvar, D. Heil
{"title":"Artificial neural networks for predicting the racing time of cross-country skiers from survey-based data","authors":"F. Abut, M. Akay, S. Daneshvar, D. Heil","doi":"10.1109/CICN.2017.8319368","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319368","url":null,"abstract":"This paper proposes for the first time in literature to use machine learning methods and survey-based data for predicting the racing times of cross-country skiers. Particularly, three popular types of artificial neural networks (ANN) including Multilayer Feed-Forward Artificial Neural Network (MFANN), General Regression Neural Network (GRNN) and Radial Basis Function Neural Network (RBFNN) have been used for model development. The utilized dataset is made up of samples related to 370 cross-country skiers with heterogeneous properties, and includes physiological variables such as gender, age, height, weight and body mass index (BMI) along with a rich set of survey-based data. The results reveal that in general, the three ANN-based methods show comparable performance, and can be categorized as feasible tools to predict the racing time of cross-country skiers with acceptable error rates. Furthermore, significant advantages such as the non-exercise-based usage and the applicability to a broader range of cross-country skiers make the prediction models proposed in this study easy-to-use and more valuable.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of source data vulnerability to reproduction in Android applications 评估源数据在Android应用程序中的复制漏洞
M. Shafi, Muhammad Israr, Muhammad Sohail Khan, M. I. Khattak, Togeer Ali Syed
{"title":"Assessment of source data vulnerability to reproduction in Android applications","authors":"M. Shafi, Muhammad Israr, Muhammad Sohail Khan, M. I. Khattak, Togeer Ali Syed","doi":"10.1109/CICN.2017.8319369","DOIUrl":"https://doi.org/10.1109/CICN.2017.8319369","url":null,"abstract":"The vast distribution of smartphone applications and the data resident on the phone (in case of offline applications) makes the data more vulnerable to theft and reproduction. This exposure of data not only affects the intellectual property but also exposes the smartphone users to spam and illegal use of private data. This paper analyzes the offline Android applications with sizable databases such as dictionaries to assess the level of security they have against data theft/reproduction. 200 dictionaries were downloaded from Google Play Store to assess the level of security they provide against data theft/reproduction. Alarmingly, it was found that most of the applications have no encryption and the data is just few clicks away from reproduction while others are encrypted but the encryption schemes are so naïve and could easily be decrypted. Only few applications were found to have robust encryption making it hard to reproduce the data.","PeriodicalId":339750,"journal":{"name":"2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117018996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信