{"title":"Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP","authors":"Atif Shah, El-Sayed M. El-Alfy","doi":"10.1109/ICCSE1.2018.8374214","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374214","url":null,"abstract":"Image forensics is an active research area due to the large number of shared images online. These images can be easily manipulated with advanced image editing tools and the changes cannot be captured easily by bare human eyes. In this paper, a novel model is proposed based on features extracted from DCT coefficients and Multi-Scale LBP image transform to blindly detect image splicing, where two or more images are combined into one. The experiments were performed on two publicly available datasets CASIA v.1.0 and v2.0. Using k-fold cross validation, several performance measures were computed and compared with other state-of-the-art techniques. The proposed technique has demonstrated improved performance with more than 97.3% accuracy and 0.99 area under the ROC curve.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of DCT-Based Image Compression Using Trigonometric Functions","authors":"Mohammed Lotfi Hachemi, M. Omari, Mekki Baroudi","doi":"10.1109/ICCSE1.2018.8374212","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374212","url":null,"abstract":"With the explosion use of multimedia in this millennium, image compression became indispensable for information technology users. It is a class of techniques that comes to efficiently store and transmit images while maintaining the best possible quality. Several software and methods respond to this problem of compression by maintaining a good balance between compression ratio and reconstructed image quality. In this paper, we present an approach that uses trigonometric functions combined with the famous DCT transform. Our aim is to utilize the arcsine reductive property and explore it better to gain more compression. Our experimental results showed a clear enhancement over the original DCT. Moreover, our method outperforms JPEG and JPEG2000 regarding compression ratio as well as the PSNR.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D Rigid Registration of Cad Point-Clouds","authors":"Ammar Hattab, G. Taubin","doi":"10.1109/ICCSE1.2018.8373991","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8373991","url":null,"abstract":"In this paper, we introduce a new method for the rough alignment of point-clouds. We focus on a special type of point-clouds that is composed of simple geometric shapes like planes, cylinders, cones, etc. We call them 3D CAD point clouds. They are usually used in industrial and mechanical applications. The proposed method starts by detecting basic shapes in the point-clouds. And then using them to find the best transformation (rotation and translation) that aligns the point- clouds. Then, we run the fine alignment step using the iterative closest point method (ICP). We show several real-world examples of point-clouds before and after the alignment using this method. The results suggest that the proposed method works well in most cases given enough overlap between the point-clouds.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OS-DSS: Genetic-Skyline Based Decision Support System for Grocery Online Shopping","authors":"Samiha Brahimi, Reem Alzahrani, Raghad Almubarak","doi":"10.1109/ICCSE1.2018.8374219","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374219","url":null,"abstract":"In this paper, an efficient and effective decision support solution for online grocery shopping is proposed. The framework focuses on increasing user satisfaction in terms of delivery time and cost. The main idea for time reduction is to give multiple delivery tasks to the same deliverer and then manage his daily schedule in real time manner. This will also influence positively the delivery cost since orders to the same regions will be automatically grouped together. The system is composed of three main subsystems. First, the data generation sub-system,responsible of computing delivery cost estimates and preference deviation. Second, the deliverer selection sub- system, it utilizes skyline and Top-K user preference queries to shortlist the available deliverers according to their schedules and delivery cost, and then select the most suitable one. Finally, once the deliverer is selected, the scheduling sub-system will be responsible of providing the best path to the deliverer by applying genetic algorithm on a modified travelling salesman problem.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Ad-Hoc On-Demand Distance Vector Protocol in Wireless Sensor Networks: Working with What the Node Can Offer","authors":"Shaikha B. AlKhuder","doi":"10.1109/ICCSE1.2018.8374222","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374222","url":null,"abstract":"Wireless sensor networks (WSNs) are considered to be one of the most important technologies of the 21st century. As a result, WSNs have been used in numerous applications in industry, health monitoring, environmental monitoring, and other related fields. However, the unprotected nature of WSN protocols such as the Ad-hoc On-Demand Distance Vector (AODV) Protocol makes them prone to malicious attacks. One such attack is the replay attack. A single sensor node has limited computation and communication capabilities, but processing routing information through data structures with acceptable time and space complexity can lead to secure data acquisition and sensing. Sensor nodes have limited energy resources, so this attack can have a serious impact on network functionality. In this work, Bloom filters are used to identify the legitimacy of a packet. Sensor nodes will be able to distinguish between legitimate and replayed packets along a path, thus improving a node's decision as to whether it should transmit or discard the received packet.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study on Shadow Detection Methods Based on Features","authors":"Suhaib Musleh, M. Sarfraz, L. Niepel","doi":"10.1109/ICCSE1.2018.8373992","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8373992","url":null,"abstract":"Shadow detection from images is an important and sensitive process before the removal process. Many methods, in the current literature, have been presented for shadow detection based on different classes of features. In this paper, we highlight some existing shadow detection methods based on different techniques and features: pixel intensity values, chromaticity, object geometrical properties, and illumination direction of the light source. We evaluate each method by introducing the features it used, summarizing algorithm work, and showing the experimental results. The paper also highlights the weakness and strengths of each method. Strengths will guide researchers to the proper use of each method on the suitable application. On the other hand, weakness will give them the opportunity for further study and improvement, or developing alternative approaches for any of those methods.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114161274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dates Maturity Status and Classification Using Image Processing","authors":"T. Najeeb, M. Safar","doi":"10.1109/ICCSE1.2018.8374209","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374209","url":null,"abstract":"Fields such as food industry. The main objective of this work is to develop an automated system that helps dates fruit agricultural industry to provide a better quality that satisfies consumers and on the other hand, to reduce the potential economic loses. Also, improvements in dates fruit agricultural industry help in providing an appropriate food quantity for people. The proposed system is developed to identify different dates fruit maturity status and classify their categories. The system used the different dates fruit features such as color, size and skin texture. The developed system counts the number of harvested fruits and labels them. Also, dates category is classified by the system by extracting the object's color or comparing the objects sizes. Finally, defects can be identified by detecting the cold areas in thermal images. The results showed that the developed system is helpful and could improve the dates fruit agricultural industry quality.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114452651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haidy H. Al-Leythi, Z. Mohammed, Detlef Hummes, G. Hussain, C. Caironi, B. Fruth
{"title":"Motor Watch - Motor Fault Signature Analysis","authors":"Haidy H. Al-Leythi, Z. Mohammed, Detlef Hummes, G. Hussain, C. Caironi, B. Fruth","doi":"10.1109/ICCSE1.2018.8374218","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374218","url":null,"abstract":"Induction motors (IM) are the major components in process industry. Any type of fault in IMs may lead to process interruption and economic losses. The objective of Motor Watch is to develop a unique method for online monitoring of induction motor, with different simulated failures on the mechanical part. The mechanical distortion is studied are shaft misalignment and unbalance. The main idea is to detect and analyze the fingerprints of various types of faults through an online monitoring system. The paper proposes detection and monitoring of distortions such as vibration and motor speed analysis. Through online monitoring, decisions can be made in real time after early detection of faults and notify the maintenance team for rectification or immediate actions.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125768056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Latifah Almukhaizeem, Nourah Almatar, M. Sarfraz, M. Sarfraz
{"title":"An Elegant and Efficient Database Design for Home-Based Restaurants","authors":"Latifah Almukhaizeem, Nourah Almatar, M. Sarfraz, M. Sarfraz","doi":"10.1109/ICCSE1.2018.8373998","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8373998","url":null,"abstract":"This work is to build and design a database for a home-based restaurant and transform a current business from their paper-based system into an efficient computerized one so as to ease and automate the process of administrative and managerial activities. We initiated the goal of building a database by surveying eleven small restaurants in order to gather the requirements needed to design the database system. This is followed by subsequent phases of planning, analyzing, and designing the database in a comprehensive manner. We evaluate various technologies for implementation of the database and decide upon the most advantageous option to build the new database system for home-based restaurants.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121237438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Tropos for Web-Based Multi-Agent eBookstore","authors":"Amira Hosni., H.S. Bedor, Waleed Hassanin","doi":"10.1109/ICCSE1.2018.8374205","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374205","url":null,"abstract":"Web-based multi-agents system development is very critical; considering data size, interactivity, reliability, response time ... etc. This paper approves and motivates Tropos methodology to develop such systems. First, an e-bookstore multi- agents web-based system was developed applying Tropos. The implementation is using The Foundation of Intelligent Physical Agent (FIPA) for communication between agents which also consider as an intelligent agent. Second the performance metrics of the developed systems are analyzed using the Amazon dataset.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}