2013 23rd International Conference on Computer Theory and Applications (ICCTA)最新文献

筛选
英文 中文
Improved Classification of Arabic Unstructured Documents Based on Automated Domain Dictionary Construction 基于自动领域词典构建的阿拉伯语非结构化文档改进分类
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529514
W. Aly, M. Youssef, Wafaa Hanna Sharaby, Hany Atef Kelleny
{"title":"Improved Classification of Arabic Unstructured Documents Based on Automated Domain Dictionary Construction","authors":"W. Aly, M. Youssef, Wafaa Hanna Sharaby, Hany Atef Kelleny","doi":"10.1109/ICCTA32607.2013.9529514","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529514","url":null,"abstract":"This paper aims at developing a system that is capable of dealing with Arabic unstructured documents. It aims at classifying these documents by constructing a new automated Domain-Based Dictionary (ADDC) algorithm and a classifier algorithm. The proposed system will explore the received Arabic documents, identify them, index them, and then based on their contents classify them automatically. In three consecutive stages, in the first stage this system will develop domain-based automated dictionaries which correspond to the input set of classified documents; it will explore, tokenize and apply preprocessing techniques on these classified documents, which would in turn be processed by the ADDC algorithm to ultimately generate the targeted dictionaries as an initial stage. In the second stage, a set of unclassified Arabic documents is preprocessed yielding processed documents, which would be calculated subsequently via normalized term weighting technique together with the previously generated dictionaries. In the third stage, a new developed classifier algorithm will be operated on the output documents of the previous two stages to classify the Arabic data set. It was found that the proposed system achieved general accuracy about 95%.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117152020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving QoS of IPTV over WiMAX Networks 改进WiMAX网络上IPTV的QoS
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529804
Mohamed Mohamed, Mohey. E. Abou-ElSeoud, Hegazi. Ibrahim
{"title":"Improving QoS of IPTV over WiMAX Networks","authors":"Mohamed Mohamed, Mohey. E. Abou-ElSeoud, Hegazi. Ibrahim","doi":"10.1109/ICCTA32607.2013.9529804","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529804","url":null,"abstract":"Real-time services such as IPTV are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are being extended over wireless networks. Although some of the existing wireless technologies can support some low-bandwidth applications, the bandwidth demands of many multimedia applications exceed the capacity of these technologies. The IEEE 802.16-based WiMAX promises to be one of the wireless access technologies capable of supporting very high bandwidth applications. In this paper, we explored and provide a good empirical values for system level WiMAX parameters by quantifying network performance using such video-rich services and get improved QoS for video transmission by measuring routing metrics parameters according to distance, modulation and power variation and discuss which system satisfy quality requirements along two transfer location modeled by network simulator, OPNET Modeler 14.5.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Backstepping Fuzzy Control for Nonholonomic Mobile Robot 非完整移动机器人的优化反演模糊控制
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529703
A. F. Amer, E. Sallam, I. Sultan
{"title":"Optimized Backstepping Fuzzy Control for Nonholonomic Mobile Robot","authors":"A. F. Amer, E. Sallam, I. Sultan","doi":"10.1109/ICCTA32607.2013.9529703","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529703","url":null,"abstract":"This paper proposes a tracking control method for nonholonomic mobile robots (NMRs) by using an optimized backstepping fuzzy control. Unlike previous backstepping controllers for wheeled mobile robots, an optimized backstepping fuzzy control structure is based on a backstepping technique to ensure stabilization of the mobile robots position and orientation around the desired trajectory, the kinematics and dynamics of the mobile robot are considered, the parameters of the nonlinear controller are optimized by using genetic algorithm to get accurate values, also the scaling factor of the fuzzy controller is optimized. In addition, numerical simulations for various reference trajectories show the validity of the proposed scheme.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133869497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Analysis of Virtualized Multi-Service Cloud Data Centers with Automatic Server Consolidation and Prescribed Service Level Agreements 具有自动服务器整合和规定服务水平协议的虚拟化多服务云数据中心建模与分析
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529798
M. Mashaly, P. Kuehn
{"title":"Modeling and Analysis of Virtualized Multi-Service Cloud Data Centers with Automatic Server Consolidation and Prescribed Service Level Agreements","authors":"M. Mashaly, P. Kuehn","doi":"10.1109/ICCTA32607.2013.9529798","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529798","url":null,"abstract":"Cloud Data Centers (CDC) are developing rapidly and will have a major impact on IT infrastructures in the future for reasons of their low ramp-up costs and service delivery/support capabilities for the users. In this paper CDCs with multi-service application classes are considered which are operated under an automatic server consolidation based on parallel hysteresis methods for server activations/deactivations which have been reported on our previous work. Each class is subjected to an individual SLA, e.g., for the average service delay for non-real-time services or for delay percentiles for services with strict response time constraints, and probabilities for service rejection (loss) or migration. Operation of a CDC is modeled by Finite State Machine (FSM) – controlled queuing systems for each class of cloud services which are analyzed exactly under Markovian assumptions to receive averages and percentiles of response times and probabilities of loss or migration. The method is novel as it minimizes the energy consumption for servers by an automatic server consolidation strategy while guaranteeing the negotiated SLAs. The method is based on a worst case boundary consideration for the delays of arriving service requests and can be useful to understand the parametric influences and to assess the energy saving gains for multi-tier CDCs.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECG Signal Compression Using A Proposed Inverse Technique 一种基于逆技术的心电信号压缩方法
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529704
H. Adel, O. Zahran, T. Taha, W. Al-Nuaimy, S. El-Halafawy, S. El-Rabaie, F. El-Samie
{"title":"ECG Signal Compression Using A Proposed Inverse Technique","authors":"H. Adel, O. Zahran, T. Taha, W. Al-Nuaimy, S. El-Halafawy, S. El-Rabaie, F. El-Samie","doi":"10.1109/ICCTA32607.2013.9529704","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529704","url":null,"abstract":"In this paper, a new electrocardiogram (ECG) data compression algorithm is proposed. The algorithm mainly performs a preprocessing operation to convert the 1-D ECG into 2-D array. This preprocessing operation includesdetecting the QRS complex, and then alignment and period sorting are used to convert the ECG signal into a matrix. Normalization is performed to scale the values of the matrix and make a gray scale image due to the 2-D ECG. Then, the algorithm applies decimation for ECG compression. The reconstruction of the original ECG signals can be performed using inverse interpolation techniques such as the linear minimum mean square error (LMMSE), the maximum entropy, and the regularization theory.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131105585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Processing of Corneal Images With A Cepstral Approach 用倒谱法处理角膜图像
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529605
Nahed Tawfik, Mahmoud Fakhr El Din, M. Dessouky, F. E. El-Samie
{"title":"Processing of Corneal Images With A Cepstral Approach","authors":"Nahed Tawfik, Mahmoud Fakhr El Din, M. Dessouky, F. E. El-Samie","doi":"10.1109/ICCTA32607.2013.9529605","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529605","url":null,"abstract":"The Mel-Frequency Cepstral Coefficients (MFCCs) feature extraction approach can be used for corneal pattern recognition, and hence in the diagnosis of corneal diseases. In this method, cepstral features are extracted from a group of corneal images. Images are first transformed to 1-D signals by lexicographic ordering, and then MFCCs and polynomial shaping coefficients are extracted to form a database of features, which can be used to train a neural network. With the same method used in the training phase, features are extracted from a new group of images. These features can be tested with the neural network. Different transform domains can be used for this purpose. Experimental results show that the Discrete Cosine Transform (DCT) is the most suitable domain for feature extraction. The method in this paper is limited to feature extraction for pattern recognition and the automatic diagnosis case is left for future work.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"676 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116105562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Deployment Schemes of Wireless Sensor Networks 无线传感器网络的高效部署方案
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529489
M. Madkour, S. Soliman, M. Dessouky, F. El-Samie
{"title":"Efficient Deployment Schemes of Wireless Sensor Networks","authors":"M. Madkour, S. Soliman, M. Dessouky, F. El-Samie","doi":"10.1109/ICCTA32607.2013.9529489","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529489","url":null,"abstract":"Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed Information in an energy efficient way since the energy is limited. In order to meet useful performance guarantees, efficient energy deployment strategies should be considered. This paper compares between random sensor deployment schemes based on fuzzy logics and a fixed node deployment scheme. Simulation results show that the random deployment scheme gives a better performance compared to the fixed scheme in terms of the number of nodes required to sense event in the sensor field.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collective Behavior of Robots Swarm 机器人群的集体行为
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529510
N. Hassan
{"title":"Collective Behavior of Robots Swarm","authors":"N. Hassan","doi":"10.1109/ICCTA32607.2013.9529510","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529510","url":null,"abstract":"a great interest has evolved recently in the study and synthesis of cooperative robots with decentralized control. The basic problem is the development of efficient algorithms that could be inspired from the behavior of social insects. This paper develops from different perspective; the theory of decentralized discrete control systems. This leads to a little increase in the computational complexity in each individual, still non-intelligent, robot. Swarm intelligence appears as a result of the mutual control signals that replace coordination signals in usual centralized control systems. The study of asymptotic stability and the convergence to the global goal follows directly from the stability of algorithms derived within system theory and are reached stepwise in an efficient way. Through the paper we derive the necessary algorithms and procedures and finally we introduce the experimental results that validate the developed theory.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122038805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Association and Classification Analysis in Retail Case Study 零售案例研究中的关联与分类分析
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529677
Ahmed H. Kopap, Essam Elfakharany
{"title":"Association and Classification Analysis in Retail Case Study","authors":"Ahmed H. Kopap, Essam Elfakharany","doi":"10.1109/ICCTA32607.2013.9529677","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529677","url":null,"abstract":"Data mining has become increasingly commonplace and is used in a variety of domains. Data mining have various applications which affect in several fields of human. Such fields use data mining widely to enhance researches, increase sales, decrease costs and understand customer’s behavior. This study proposes a new framework based on data mining algorithms for the giant fashion Retail Companies. Our aim is to make it easy for an organization uses business intelligence capabilities, including reporting, visualizations, integration and data mining by discussing the difference between widely used algorithms in data mining and how it can be used in the retail field especially classification and association analysis. Data Mining is really a multidisciplinary area focusing on methodologies for extracting valuable knowledge from database understanding of customer’s behavior. The main goal of the paper is to illustrate the importance of optimization methods used in the data mining process, as well as the specific predictive models and how they work in this field. The study reinforces and demonstrates the validity and efficiency data mining techniques can play and their important role in both small and large data sample datasets which provide additional empirical evidence regarding to merits of data mining techniques in retail.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rough Based Granular Computing Approach for Making Treatment Decisions of Hepatitis C 基于粗粒度计算的丙型肝炎治疗决策方法
2013 23rd International Conference on Computer Theory and Applications (ICCTA) Pub Date : 2013-10-29 DOI: 10.1109/ICCTA32607.2013.9529777
F. Badria, M. Eissa, Mohammed M Elmogy, M. Hashem
{"title":"Rough Based Granular Computing Approach for Making Treatment Decisions of Hepatitis C","authors":"F. Badria, M. Eissa, Mohammed M Elmogy, M. Hashem","doi":"10.1109/ICCTA32607.2013.9529777","DOIUrl":"https://doi.org/10.1109/ICCTA32607.2013.9529777","url":null,"abstract":"Hepatitis C virus is a massive health issue affecting significant portions of the world’s population. Applying data pre-processing, feature reduction techniques and generating rules based on the selected features for classification tasks are considered as important steps in the knowledge discovery area in databases. Medical experts analyze the generated rules to find out the most significant rules to apply in order to classify unseen real life cases. This paper highlights a rough set as a powerful analysis tool based on granular computing framework to identify the most relevant attributes, generate a set of reducts which consist of a minimal set of attributes and induce a set of rules for classifying studied cases for testing new drugs for HCV treatment . The experimental results obtained, show that the overall classification accuracy offered by the proposed approach is highly based on generated rules during Hepatitis C treatment.","PeriodicalId":405465,"journal":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126359113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信