Conference Program (word)

advertisement
CSE-11 Program
CSE -11 Conference, 19--21 December 2011,
Kalyon Hotel, Istanbul, Turkey
ICGST International conference on Computer Science and Engineering,
CSE-11 emphasizes on efficient research and development techniques
and provides a central forum for scientists, researchers, engineers and
vendors from different disciplines to exchange ideas, identify problems,
investigate relevant issues, share common interests, explore new
approaches, and initiate possible collaborative research and system
development. The CSE-11 significantly benefits a wide variety of
academic and industrial sectors.
1
CSE -11 Conference Program

From
8:30
9:30
10:40
Monday, 19 December 2011 (8:30 -- 17:30)
To
9:30
10:40
11:00
Subject
Registration
Opening Ceremony, Agenda Overview and Best Paper Award of AIML-11 Conference
First break
Keynote Speech on “INTELLIGENT WORKPIECE DETECTION ON CNC
10:50 11:30
MILLING MACHINE", J. Balic
“A study on the mechanism for growth process reproduction of
11:30 11:50 exhibition or performance tree shape robot”, Hong Seok Lim,
“PROPOSED UWB REAL-TIME POSITION TRACKING SYSTEM FOR
11:50 12:20 CARDIOLOGICAL IVUS CATHETER”, DIMITRIOS FOTIADIS,
12:20 13:00 Lunch Break
“Optimization of Urban Bus Gearbox Ratios for Minimization of Fuel
13:00 13:20 Consumption and Pollutant Emissions”, Roberto Melli,
13:20 13:40
13:40 14:00
14:00 14:20
14:20 14:40
“A Precise Shape Estimation in Occluded Region between Plural
Human Bodies for Shape Reconstruction based on Fast Level Set
Method”, Ikeshiro kazuo, Hiroki Imamura,
“Mobile augmented reality architecture for indoor area with
markerless tracking”, Jan Štafa, Jan Keller,
“Improved Context-Aware Saliency Using Local Search Window”,
Amr R. Abdel-Dayem
“Multi-Sensor Image Fusion Using Temporal Object Detection”,
Melih Altun,
P1131133748
P1161133729
P1111133718
P1151133731
P1141133756
P1151139820
P1151133713
14:40 15:00 Second Break
“INNOVATION OF MULTI FIBER COUPLING OF FUSED SILICA FIBER”,
15:00 15:20 Toto Saktioto,
“Suppression of Multitone Narrowband Interference for Orthogonal
15:20 15:40 Multi-carrier DS-CDMA System”, Ahmed El-Mahdy
15:40 16:00
16:00 17:00
P1171129661
P1181134766
“Lightweight and Distributed Wormhole Attack Detection for
Wireless Sensor Networks Based on Graph Neuron”, MONEER P1141133721
ALSHAIKH
Notes on LaTex Setup
2
 Tuesday, 20 December 2011 (9:00 -- 17:30)
From To
Subject
9:00
9:40
Keynote speech on “Emotions, Decisions, Cognition”, Ana Lilia
LAUREANO-CRUCES
9:40
10:00 Model” , Ana Lilia Laureano-Cruces,
10:00 10:20
10:20 10:40
Manuscript
“Visual Simplified Characters’ Emotion Emulator Implementing OCC
“GRASP Compared with other Heuristics to Find Minimal Reducts”,
Iris Iddaly Méndez-Gurrola
“Using Tailored Chaotic Sequences In 3D Watermarking”, Amira
E.Youssef
P1121138815
P1121137808
P1151143900
10:40 11:00 First break
“State Estimation for Linear Discrete-Time Systems with Uncertain
10:40 11:00 Parameters”, Mohamed F. Hassan
“Synchronization of the Hyperchaotic Lu System Using Feedback
11:00 11:20 Linearization Controllers”, Mohamed Zribi,
“Optimization of the Pulping Process: Polynomial vs. Neural Network
11:20 11:40 Models”, Wan Rosli Wan Daud
“USING FUZZY LOGIC TO SOLVE END EFFECTS OF HHT”,
11:40 12:00 Nghien Nguyen Ba,
“Pattern Matching Techniques: A Survey Study Conducted on Social
12:00 12:20 Security Numbers and Date of Births”, Cihan Varol,
12:20 13:00 Lunch Break
“Screening of Retinal disorders by the Detection of Microaneurisms
13:00 13:20 and Hemorrhage”, Nahed H. Solouma,
“A New Presentation Method of Nucleotide Sequences Minimizes
13:20 13:40 Storage Size and Processing Time”, Osama Fekry,
“Sequence Alignment Framework Using Parallel Particle Swarm
13:40 14:00 Optimization” , Amgad Kamal,
14:00 14:20
“Wavelet Neural Networks with a New Translation Vector
Initialization Approach for Multiclass Cancer Classification”, Zarita
Zainuddin,
P1111130668
P1111132678
P1111140861
P1121133705
P1121137802
P1151137803
P1161137804
P1161133742
P1121140859
14:20 14:40 Second Break
“Enhancing Particle Swarm Optimization for Feature Combination
14:40 15:00 Optimization”, Fang-Fang Wang, Li-Fei Chen, Kun-Huang Chen,
“Process Optimization Using Meta-heuristic Algorithms”, Hung-Chun
15:00 15:20 Lin, Prof. Chao-Ton Su, Fang-Fang Wang,
Knowledge Discovery from Support Vector Machines with Application
15:20 15:40 to Credit Screening, Yan-Cheng Chen, Chao-Ton Su,
15:40 16:00
16:00 17:00
Improving Text Sentiment Classification Performance by Balancing
Positive and Negative Features, Long-Sheng Chen, Chia-Wei Chang,
Chun-Chin Hsu,
LaTex Environment programming
3
P1121133730
P1121133726
P1121133727
P1121132687
 Wednesday, 21 December 2011 (9:00 -- 17:30)
From To
Subject
Manuscript
Keynote speech on “Software Engineering Models, Metrics and
Tools Research – Progress and Challenges”, Narayan C. Debnath
9:00
9:40
9:40
10:00 Ismail Biskri, Boucif AMAR BENSABER, Abdelghani Amazit, Adel Omar P1141133744
Impact of physical layer interference on HARQ in LTE technology,
10:00 10:20
Dahmane,
“Combinatory logic and language engineering” , Ismail Biskri, Boucif
P1121133746
AMAR BENSABER,
10:20 10:40 First break
“Modes detection of color histogram for color image segmentation”,
10:40 11:00 Halima REMMACH,
“Robust method to identify Adult Video based on Face and Skin
11:00 11:20 detection”, Hajar Bouirouga,
P1151133745
P1151132682
“Shaping optimal parameters selection for most favorable robustness
11:20 11:40 and imperceptibility in watermarking in the DWT domain”, Seddik
11:40 12:00
12:00 12:20
Hassene,
“Genetic Algorithm for Optimal PMU Placement in Contingency
Condition”, Houssem BEN ARIBIA,
« Management de projet logiciel selon le référentiel PMBOK
Modélisation et application à l’étude d’un projet de réseaux
informatiques », Safaa ERRIHANI,
P1151132703
P1111133717
P1141133720
12:20 13:00 Lunch Break
« Utilisation des HOS pour le Calcul du Filtre Optimal et de la
13:00 13:20 réduction du temps de Convergence en DMT », H. Bellahsene,
« Contribution au diagnostic des événements défaillants dans un
13 :20 13 :40 système dynamique hybride », Bellahsene Noura-Razika,
P1111133747
P1111134764
“Meteorological satellite images modeling using autoregressive
P1111133718
13 :40 14 :00 process”
P1111128655
14 :00 14 :20 “Multivariable PID Controller for Lateral Motion of Aircraft”
14:20 14:40 Second Break
Posters (Classification of Vertically Distributed Data using Directed Acyclic Graph,
14:40 15:20
15:20 15:40
P1111141872 Prof. Dr. Ahmed Khedr,)
“COMPARISON OF ALGORITHMS FOR DETECTING COMMUNITY
STRUCTURES IN NETWORKS”, B. Ardıl (Turkish)
“THE NETWORK SIMULATOR NS2”, Mehmet BİRLİK (Turkish)
15:40 16:00
16:00 17:00 Closing Session
Best Paper Award and Closing Session
4
P1141150085
P1141150086
ABSTRACTS
A development of the exhibition or performance tree shape robot
having agrowth reproduction function
Hong Seok Lim1*, Suk Yoon Jang1 and Young Jea Ahn1
1Intelligent Control Team, Incheon Intelligent Robotics Center 8F Incheon IT Tower, 592-5 Dowhadong, Namgu,
Incheon, Korea
limit75@paran.com, syjang@iit.or.kr, yjahn@iit.or.kr
Abstract
The tree shape robot is mainly applied at the exhibition or performance. In order to take the eyes of
the spectator, the moving function, reproducing the fast growth process of tree, is important function
of the tree shape robot. This paper proposed the mechanism to reproduce growth process of tree
shape robot which is used at the exhibition or performance. Proposed mechanism for growth process
of tree shape robot consists of a steel structure, spring, coil spring, pulley and wire actuated by power
cylinder. Using this mechanism, we manufacture the exhibition or performance tree shape robot with
a growth reproduction function and demonstrate capability of the manufactured prototype.
Keywords: tree shape robot, growth reproduction
Optimization of Urban Bus Gearbox Ratios for Minimization of Fuel
Consumption and Pollutant Emissions
Romano Impero Abenavoli and Roberto Melli
Dipartimento di Ingegneria Meccanica e Aerospaziale, Universita’ di Roma "La Sapienza", Roma,
Italy
( e-mail: romano.imperoabenavoli@uniroma1.it, roberto.melli@uniroma1.it).
http://www.dima.uniroma1.it/dima/
Henryk Kormanski and Krystyna Rudzinska
Faculty of Electronics, Telecommunication & Informatics, Gdansk University of Technology, Gdansk,
Poland
( e-mail: korman@eti.pg.gda.pl, rudko@eti.pg.gda.pl ).
http://www.eti.pg.gda.pl/
Abstract
The paper discusses methodology of optimal gearbox ratios selection and its application to urban
buses for better fuel consumption minimization and/or pollutant emission reduction. Specific urban
traffic conditions allow designers of power trains to select gearbox ratios so that mass transportation
buses will be more ecological and energy–efficient maintaining the same bus drivability. The paper
presents a method for determining the gearbox ratios based on a numerical algorithms of nonlinear
programming, which cooperate with simulation procedures. They consist of three software modules:
“Model of bus motion”, “Power train model” and “Model of constraints”. The analysis of the results
shows that the methodology presented in this paper is effective and reliable. Fuel consumption and
the pollutant emissions may be decreased from 7% to 15%, without worsening the bus drivability,
only by gearbox optimization.
Keywords: Optimization, Modeling, Design of gearbox with a discrete set of ratios, Fuel consumption
/ pollutant emissions minimization, City bus motion simulation.
5
Lightweight and Distributed Wormhole Attack Detection for Wireless
Sensor Networks Based on Graph Neuron
M. Alshaikh, A. Khan
Faculty of Information Technology, Monash University
, Melbourne, Australia
maals4@student.Monash.edu Asad.khan@Monash.edu,
Abstract
Wormhole attack is a very serious issue as it threatens damage routing protocol functionality.
Wormhole attack is also difficult to detect. Many studies have attempted to deal with wormhole
attack detection, yet existing wormhole detection techniques remain ineffective because they either
do not consider the resource constraints of WSNs or require special hardware. Hence, we attempted
to design a distributed wormhole detection technique, implanted using GN theory.This paper
proposed a distributed wormhole detection technique.The proposed detection technique utilises a
GN algorithm to detect the attack tunnel. The network legal connectivity is represented as patterns.
Then the network will be monitored by the GN application to detect any change in its legal
connectivity graphs, which would indicate an attack. The system assumptions and network
architecture for this detection technique were carefully developed to achieve better detection
accuracy for the network than did previous attempts to improve WSN security. The results of the
simulation demonstrate that our proposed detection technique enjoys reasonable accuracy.
Keywords: Wireless Sensor Networks (WSNs) , Graph Neuron(GN), Wormhole Attacks.
Impact of physical layer interference on HARQ in LTE technology
A. Amazit1, B. Amar Bensaber1, A. Dahmane2 , I. Biskri1
1Laboratoire de Mathématiques et Informatique Appliquées (LAMIA)
Department of Mathematics and Computer Science
2Electrical and Computer Engineering Department
University of Quebec at Trois-Rivières, Canada
3351 Bd des Forges C.P 500
Trois Rivières, G9A 5H7 - Qc – Canada
[Amazita ,Bensaber, Dahmane, Biskri]@uqtr.ca
http://www.uqtr.ca
Abstract
In this paper, we present a study of the impact of physical layer interference on the MAC layer
operations in Long Term Evolution (LTE), in particular, on Hybrid Automatic Repeat Request (HARQ)
acknowledgment mechanism. Our work consists of a campaign of tests that verify the impact and the
utility of HARQ technology on the throughput, the transmission time and the number of packets
versus the error rate. This work would pave the way for further research in this technology in order to
improve the interaction between the most important layers, physical and Medium Access Control
(MAC). Many results of the simulation using Opnet Modeler Wireless are presented1. The results
obtained are very satisfactory and confirm that the mobility factor plays an important role in traffic
exchanged between the nodes causing the packet loss due to collisions, obstacles and other factors
caused by node mobility. To address this problem, HARQ protocol occurs in the retransmission of lost
packets in an efficient manner that does not disrupt the response time or traffic between nodes.
Keywords: LTE, HARQ, QOS, Interference, MAC layer.
6
Multi-Sensor Image Fusion Using Temporal Object Detection
M. Altun, M. Celenk
School of Electrical Engineering and Computer Science
Stocker Center, Ohio University, Athens, OH, 45701 USA
[ma231709, celenk]@ohio.edu
http://www.ohio.edu/
Abstract
This paper describes a new approach to surveillance video content enhancement using multi-spectral
image data fusion. Multi-spectral video in this context consists of the visual and infrared (IR) bands.
The method takes an unprecedented approach to visual and IR information integration by calculating
the estimated background in both bands and detecting changes in the scene under surveillance. The
foreground regions are then selected as candidate regions for image fusion at the decision level,
which is performed by comparing the edges detected in the foreground with the ones detected in the
estimated background. This allows the method to determine the regions which are occluded; hence,
recovery is sought via information available in IR images. The idea behind this approach is to use IR
information only where necessary and preserve visual information in all other regions. To highlight
the objects of interest foreground regions in the IR frames are clustered and marked with bounding
boxes in the resultant fused image.
Keywords: Image Fusion, Video Content Enhancement, Edge Detection, Adaptive Background
Extraction, Surveillance, Occlusion Detection
A Precise Shape Estimation in Occluded Region among Group of Human
Bodies for Shape Reconstruction relying on Fast Level Set Method
KazuoIkeshiro, YoshinobuHagiwara, Hiroki Imamura,Yongwoon Choi
Graduate School Information Science Soka University
1-236, Tangi-cho, Hachiouji City, Tokyo, Japan
[e10d5201,yhagi,imamura,choi]@soka.ac.jp
Abstract
A conventional method, based on Fast Level Set Method (FLSM) for reconstruction of shapes of plural
human bodies in occlusion that occurs between plural human bodies, reconstructs shape that is quite
different from actual shape in case that human pose changes in occludedregion. Therefore we
propose a method based on FLSM, which can precisely estimate shapes of plural human bodies even
if human pose changes in occludedregion. In this method, we extract shape of each human body
before occurring of occlusion using FLSM and obtain shape parts of it. In case of occurring of
occlusion, we estimate a pose of each human body, and achieve precise estimation of shape of each
human body by restructuring shape of each human body from estimated pose using the shape parts.
Keywords:Fast Level Set Method, Occlusion, Shape Estimation.
7
Manufacturing of porous materials for dental applications through SLM
F. Cardaropoli, V. Alfieri, F. Caiazzo, V. Sergi
Dept. of Industrial Engineering, University of Salerno, Via Ponte Don Melillo, 84084, Fisciano, Italy
[fcardaro, valfieri, f.caiazzo, sergi]@unisa.it
Abstract
The paper discusses the possibility of manufacturing dental implants through Selective Laser Melting
(SLM) of a Ti-6Al-4V alloy powder. This alloy is widely used in biomedical applications due to high
biocompatibility. SLM allows to obtain components with peculiar characteristics in terms of porosity
gradient, roughness, customized geometry, and mechanical properties. Influence of input process
parameters on porosity and analyses SLM capabilities in implant dentistry has been focused. Porosity
is a key parameter in implant dentistry as it affects stiffness, which is related to Young’s modulus. Ti6Al-4V bulk material presents a Young’s modulus of 110 GPa, whereas bone one ranges from 10 to 26
GPa. The relative difference of mechanical properties causes the phenomenon of stress shielding,
which has a detrimental effect on the longevity of the implant. Total porosity is important in reducing
the effective modulus of porous metals. Specimens obtained during experimental phase have been
examined in terms of porosity (in inverse ratio to relative density), microstructure, microhardness and
roughness. According to test results discussed in this paper, SLM is proved to be an efficient
technology for the construction of dental implants, because components with adequate properties
can be obtained changing processing parameters. Other fabrication techniques fail to produce the
desired features.
Keywords: Selective Laser Melting, Biomaterials, Dental implants, Ti-6Al-4V, Porosity.
Proposed UWB Real-Time Position Tracking System for a Cardiological
IVUS catheter
D. Fotiadis, A. Astaras, P. Bamidis, K. Papathanasiou, A. Kalfas
Aristotle University of Thessaloniki, School of Medicine, Laboratory of Medical Informatics,
Thessaloniki, Greece
[dfotiadis, astaras, bamidis]@med.auth.gr, kostasp@physics.auth.gr, akalfas@auth.gr
http://lomiweb.med.auth.gr
Abstract
Precise determination of the position of a medical device inside the human body, specifically the tip
of an Intravascular Ultrasound (IVUS) catheter, is a process currently relying primarily on angiography
techniques. The injection of a radio-opaque contrast agent into the bloodstream and subsequent use
of contrast-enhanced Xray imaging is still the most common technique used by medical staff to track
the exact position of the IVUS catheter inside the human body. This position tracking methodology
has numerous shortcomings and imposes unnecessary risks on the patient, as compared to a new
technology and associated methodology proposed in this paper. In the first part, a position tracking
technology survey is presented, followed by the details of the proposed Ultra Wideband (UWB)
methodology, a discussion of its advantages and disadvantages, as well as the definition of a
development roadmap.
Keywords: IVUS, UWB, SoC integration, Position Tracking, Precision Ranging.
8
Sequence Alignment Framework relying on Parallel Particle Swarm
Optimization
Amgad Kamal1, Ahmed Sayed2, Mohsen Mahroos3,4 and Amin Nassar4
1Valeo InterBranchAutomative Software, Smart Village, Cairo, Egypt
2Varkon Semiconductors, Cairo, Egypt
3 Umm Al-Qura University, Makkah, Saudi Arabia
4Cairo University, Giza, Egypt
amgad085@gmail.com, asayed@varkonsemi.com, mmmahroos@uqu.edu.sa, aminassar@gawab.com
Abstract
Any biological study that compares two or more biological sequences in either an explicit or implicit
manner performs the foundational procedure of sequence alignment to reason about which positions
within these sequences are homologous; i.e. to find similarity regions between biological sequences.
Such similarities facilitate the derivation of inferences about gene functionality and ancestry if
compared to previously analyzed and characterized sequences, which can very well identify the
susceptibility to certain diseases. With the great advent of parallel computing machines and
architectures, it is a normal extension to develop parallelalgorithms and tools to perform sequence
alignment with increased accuracy. In this paper, we propose a framework for sequence alignment
relying on parallel computing of the particle swarm optimization(PSO) algorithm. We discuss the
Benefits of the new framework with respect to the accuracy and scalability of the parallel PSO
algorithm while scanning the relevant parameters involved.
Keywords: sequence alignment; parallel programming; particle swarm optimization; message passing
interface; cluster computing; bioinformatics
Using Fuzzy Logic to Solve End Effects of Hilbert Huang Transform
J. Kokes, N.B. Nghien
Dept. of Automatic control and Engineering Informatics, Czech Technical University in Prague, Czech
Republic
[josef.kokes, nghien76]@fs.cvut.cz
http://www.fs.cvut.cz
Abstract
Hilbert-Huang Transform (HHT), proposed by N. E. Huang in 1998, is a novel algorithm for nonlinear
and non-stationary signal processing. However, it suffers from end effects problem. In this paper, we
propose to apply Fuzzy Logic for predicting extended data at both end-sides of original data before
executing Empirical Mode Decomposition (EMD) process to solve end effects problem. Our
simulations showed that the method gives better result than other known methods.
Keywords: HHT; EMD; IMF; Fuzzy Logic.
9
Utilisation des HOS pour le Calcul du Filtre Optimal et de la reduction
du temps de Convergence en DMT
H. Bellahsene, I. F. E. Fatani
Departement TCSN, Faculte SNV, Universite de A/Mira Bejaia 06000, Algerie
[bellahsene_ho]@yahoo.fr,
http://www.univ-bejaia.dz
Abstract
Nous synthetisons dans cet article l’evolution de l’egalisation classique vers l’egalisation par reduction
de canal. Nous appliquons le calcul du maximum de kurtosis pour retrouver le filtre TEQ (Timedomain EQualizer) optimal ainsi que le delai de synchronization dans l’algorithme du MSSNR
(Maximum
Shortening Signal to Noise Ratio). Nous comparons le filtre optimal retrouve par d’autres methodes et
celui determine par la methode du maximum du kurtosis. Nous arrivons par utilisation des fonctions
statistiques notamment gamma, a reduire de maniere consequente le delai de convergence au prix de
la stabilite de l’algorithme.1
Keywords: Communications multiporteuses, HOS, kurtosis, TEQ (Time-domaine EQalizer), DMT,
fonction Gamma
Improving Text Sentiment Classification Performance by Balancing
Positive and Negative Features
Long-Sheng Chen*1, Chun-Chin Hsu2, Chia-Wei Chang1
*Department of Information Management, Chaoyang University of Technology, Taichung City,
Taiwan.
2
Department of Department of Industrial Engineering and Management, Chaoyang University of
Technology,
Taichung City, Taiwan.
[lschen, cchsu, s9814628]@cyut.edu.tw
1
Abstract
To effectively identify Internet users’ sentiments, this study aims to propose a novel feature selection
strategy called Category Features Oriented (CFO) method which equally selects features from both
positive and negative sentiments. Moreover, support vector machines (SVM) have been employed to
construct classifiers for identifying bloggers’ sentiments. Finally, one case study from real world blogs
will be provided to illustrate the effectiveness of our proposed CFO approach. Compared with
traditional methods including Information Gain (IG) and Fisher linear discriminant analysis (FLDA),
experimental results indicated that the proposed method can improve sentiment classification
performance.
Keywords: Feature selection, Sentiment Classification, Support vector machines, Text mining
10
Process Optimization Relying on Meta-Heuristic Approach
Hung-Chun Lin, Fang-Fang Wang, Chao-Ton Su
Department of Industry Engineering and Engineering Management, National Tsing Hua University
101, Sec. 2, Kuang-Fu Rd., Hsinchu, Taiwan 30013, R.O.C.
d9534801@oz.nthu.edu.tw, fangfang7276@hotmail.com, ctsu@mx.nthu.edu.tw
http://www.ie.nthu.edu.tw/su/
Abstract
For parameter design, Taguchi methods have been widely used in industry. When parameters are
continuous values, nevertheless, Taguchi methods cannot obtain real optimal parameter
combinations. Besides, traditional optimization methods begin from one point in a search area and
then move sequentially to achieve a better solution, thereby operating rather locally and becoming
highly prone to plummeting inside a local optimum. This study aims to discuss how to combine metaheuristic algorithms to deal with parameter design problems. A real example is presented to illustrate
proposed approach’s effectiveness.
Keywords: Meta-heuristic algorithms, quality engineering, Taguchi methods, parameter design.
Knowledge Discovery from Support Vector Machines with
Application to Credit Screening
Yan-Cheng Chen and Chao-Ton Su
Department of Industry Engineering and Engineering Management, National Tsing Hua University
101, Sec. 2, Kuang-Fu Rd., Hsinchu, Taiwan 30013, R.O.C.
d9534818@oz.nthu.edu.tw, ctsu@mx.nthu.edu.tw
http://www.ie.nthu.edu.tw/su/
Abstract
Support vector machines (SVMs) are state-of–the-art tools used to address issues pertinent to
classification. The explanation capabilities of SVMs are also their main weakness, which is why SVMs
are typically regarded as incomprehensible black box models. We propose a rule extraction algorithm
from SVMs, in which a kernel-based clustering algorithm approach integrates all support vectors and
genetic algorithms into the extracted rule sets. Measurements of accuracy and comprehensibility
were utilized to evaluate the performance of our proposed method on the credit screening data sets.
Finally, the results indicated the practicality of the proposed method on the credit screening data
sets.
Keywords: Rule extraction, Support vector machines, Genetic algorithms, Credit screening.
11
Enhancing Particle Swarm Optimization for Feature Combination
Optimization
Li-Fei Chena, Kun-Huang Chenb and Fang-Fang Wangb
a Graduate Program of Business Management, Fu-Jen Catholic University, Taipei, Taiwan
b Department of Industrial Engineering and Engineering Management, National Tsing Hua University,
Hsinchu,
Taiwan
E-mail: 075033@mail.fju.edu.tw,d9534809@oz.nthu.edu.tw,d9634816@oz.nthu.edu.tw
Abstract
Searching for an optimal feature combination from a high-dimensional feature space is an NPcomplete problem. Traditional optimization algorithms are inefficient when solving large-scale feature
selection problems. Therefore, meta-heuristic algorithms are extensively adopted to solve the feature
selection problem efficiently. This study proposes an enhanced particle swarm optimization (PSO)
algorithm to avoid local optimal problem. The data sets collected from UCI machine learning
databases are used to evaluate the effectiveness of the proposed approach. Classification results
show that our proposed approach outperforms both genetic algorithms and sequential search
algorithms.
Keyword: Feature combination optimization, particle swarm optimization, sequential search
algorithms
Pattern Matching Techniques: A Survey Study Conducted on Social
Security Numbers and Date of Births
C. Varol
Computer Science Department, Sam Houston State University,
1803 Ave I, AB1 214, Huntsville, TX, 77341
cvarol@shsu.edu,
http://cs.shsu.edu/Faculty/varol.htm
Abstract
With increasing information re-produced each year, the quality of the data is subject to damage.
Variations and errors in Social Security Numbers (SSNs) and date of births (DOBs) make business
decisions problematic to be applied. In this survey paper, the sources of errors in SSNs and DOBs are
discussed and also the pattern matching techniques that can be useful to fix the problems are
evaluated. At the end, the algorithms are compared in terms of their efficiency and correction rates in
SSNs and DOBs prediction. Jaro algorithm provided the highest correction and precision rates among
all pattern matching algorithms for the SSNs and DOBs.
Keywords: data quality, date of birth, pattern matching, social security number, string matching
12
Robust Identification of Adult Video based on Face and Skin Detection
Hajar BOUIROUGA1, Sanaa EL FKIHI2, Abdelilah JILBAB3 and Driss ABOUTAJDINE4
LRIT, unité associée au CNRST,FSR, University Mohammed V Agdal,Rabat, Morocco1,4
ENSIAS, Mohammed V University Souissi Rabat, Morocco2
ENSET, Madinat Al Irfane Rabat-Instituts Rabat, Morocco3
Abstract
Extracting high level characteristics is an important field in video indexing and retrieving. Our work
proposes a method for identifying video adult. The proposed algorithm includes the detection of the
human face based on the colour and motion information, skin colour races, backgrounds and faces'
sizes. Besides, the proposal takes into account the object motion, skin and non skin areas as well.
Experimental results demonstrate the successfulness of the algorithm used and its capability in
recognition of adult video.
Keywords: Skin detection, classification, adult videos, face detection, neural network.
Shaping optimal parameters selection for most favorable robustness
and imperceptibility in watermarking in the DWT domain
Hassène Seddik and Ezzeddine Ben Braiek
ESSTT, 5 Av. Taha Hussein, 1008, Tunis, Tunisie
E-mails, hassene.seddik@esstt.rnu.tn and Ezzedine.BenBraiek@esstt.rnu.tn
Abstract
The widespread of new image technologies and data exchanges has created the need for new
techniques able to insure copyright protection and data owner identification. Considering the
deficiencies of steganographie and cryptography, watermarking is nowadays a new technique that
provides an efficient mean for resolving these problems. Watermark embedding techniques depend
on the representation domain of the image (spatial, frequency, and multiresolution). Every domain
has its specific advantages and limitations. Moreover, each technique in a chosen domain is found to
be robust to specific sets of attack types. The ultimate goal of each technique is to allow the
embedded watermark to be invisible and robust against a wide range of attacks. The most damaging
unintentional attacks are compression techniques. Many of these last techniques are based on the
new coding procedures using Multiresolution domain. In order to develop a watermarking technique
robust against large sets of attacks, we must exploit this domain to overcome these attacks
constraints. In this paper, a study is developed considering all the parameters contributing in the
watermarking scheme. An optimal point allowing robustness and imperceptibility of the embedded
watermark is established. Using these optimized parameters any technique based on the
multiresolution domain can reach the maximum of imperceptibility and robustness. These results can
immediately be injected in previous algorithms to improve their results or to build new techniques
outputting directly better results.
Keywords: robust Image watermarking, wavelet transform, Stirmark, parameters optimization.
13
INNOVATION OF MULTI FIBER COUPLING OF FUSED SILICA FIBER
Saktioto1,2, D. Irawan1,M. Hamdi1,2, Defrianto2, J.Ali1
1Institute of Advanced Photonics Science, Faculty of Science, Universiti Teknologi Malaysia
Johor, Malaysia.
2Physics Dept, Math and Sciences Faculty, University of Riau, Pekanbaru, Indonesia
saktioto@yahoo.com
Abstract
This paper presents the estimation of normalized coupling power among multi coupled fibers. Power
transfer between the fibers has been determined based on coupled mode theory using Transfer
Matrix Method. Theoretical calculation has shown that power in a fiber is no longer to be completely
transferred to other M fibers (M>3). This is caused by the coupling coefficient between them. The
coupled power or coupling ratio among M fibers can be controlled by maintaining the coupling
parameters. Experimentally, the change of coupling ratio is investigated, and theoretically by applying
dc voltage to the coupling region of fiber coupler. In three dimension, the coupling power distribution
shows that strongly depends on the coupling coefficient and coupling length. However, by knowing
the coupling power parameters, the fiber coupler of MXN fibers are easier to be fabricated and more
applicable in optical network system.
Keywords: Coupling power, Coupling coefficient, Single Mode Fiber, Coupling ratio.
Genetic Algorithm for Optimal PMU Placement in Contingency
Condition
Houssem BEN ARIBIA, Nizar DERBEL, Hsan HADJ ABDALLAH and Abderrazak OUALI
Ecole Nationale d'Ingénieurs de Sfax, BP W, 3038, Sfax - Tunisie
houssem_ben_aribia@yahoo.fr, dernizar@yahoo.fr, hsan.haj@enis.rnu.tn,
abderrazak.ouali@enis.rnu.tn
Abstract
This paper presents a novel approach to optimal placement PMUs in normal and contingency
conditions. At first, an optimal measurement set is determined to achieve full network observability
and maximizing the redundancy index. Then, we proposed two methods for solving the problem in
contingency condition (failure of one or more PMU). A genetic algorithm is used as an optimization
tool to obtain the minimal number of PMUs and their corresponding locations. The proposed method
is tested on three systems and the results are compared with other techniques. The simulation results
ensure the complete system observability and demonstrate the effectiveness of the proposed
approach.
Keywords: Phasor Measurement Unit, optimal placement, complete system observability, genetic
algorithm.
14
Management de projet logiciel selon le référentiel PMBOK
Modélisation et application à l’étude d’un projet de réseaux
informatiques
S.ERRIHANI, S.ELFEZAZI, K.BENHIDA
ERGI, EST Safi Université Cadi Ayyad, Maroc
safaa.errihani@gmail.com, selfezazi@gmail.com, kbenhida@gmail.com
+212670234965, +212668853561, +212663098950
Résumé:
Le management de projet apporte un avantage permanent dans le cadre de la dynamique des
organisations actuelles. Il a évolué pour devenir aujourd’hui une fonction clé pour la réussite de tout
projet. D’ailleurs le PMI (Project Management Institute) propose déjà plusieurs versions de son guide
du Corpus des connaissances en management de projet logiciel (Guide PMBOK : Project Management
Body Of Knowledge). Ainsi, ce guide est en phase de devenir un outil indispensable pour les praticiens
dans l'ensemble des organisations et des secteurs d'activité. L’axe principal de la communication est
réservé à l’analyse et la modélisation du PMBOK qui englobe l’ensemble des procédures et processus
capables de réussir un projet technique. Rappelons que Le PMBOK définit le management de projet
en termes d’intégration, de contenu, de délais, de coût, de management de la qualité, de
management des ressources humaines, de communication, de risque et d’approvisionnement. Nous
nous sommes aussi intéressés dans le cadre de ce travail à l’étude de l’application de l’ensemble de
ces domaines de connaissances dans un projet réel de mise en place d’une politique de sécurité
informatique et de réhabilitation du réseau local d’une entreprise.
Mots clé: Management de projet, PMBOK, Modélisation, UML, réseaux informatiques.
Contribution au diagnostic des événements défaillants dans un
système dynamique hybride
Bellahsene Hatem Noura Razika*, Mostefai Mohamed**, Aktouf Oum El Kheir***
*Laboratoire LTII, université A.Mira Béjaia
**Laboratoire d’automatique, université de Setif
*** Laboratoire LCIS, INPG Grenoble
e-mail : hatemnora@yahoo.fr, prof_elec@ymail.com
Abstract
A dynamic hybrid system is described by a set of continuous variables and a set of discreet events
interacting mutually. The reality imposes to take into account the failures of constituents
(components) or the uncertainties on the knowledge of the system. The ceaseless increase of the
complexity of the automatic systems made so that the task of the surveillance becomes more and
more less easy. Therefore, the systems can work in several modes. Some of these modes correspond
to a normal functioning and the others represent failing modes. In this article, we are interested in
the evaluation of the probability of occurrence of the failing events in a hybrid dynamic system. We
propose for it, a valuation method based on the knowledge in priori of the system, at least from the
point of view of the state of its components in normal functioning (closed or opened, put out or lit,
etc.). To validate our proposition, we applied her to the benchmark used by various authors for the
calculation of the dynamic reliability. Our objective thus is to estimate the probability of occurrence of
both events dreaded by the test case: the drying out and the overflowing of a reservoir. This example
has for main interest to bring to light the problems of the safety of functioning of the systems.
15
Keywords: Diagnosis, dynamic hybrid systems. Reliability
Suppression of Multitone Narrowband Interference for Orthogonal
Multicarrier DS-CDMA System
Ashraf Samy, Ahmed El-Mahdy
Post-Graduate student in MTC, Prof. in Information Engineering & Technology, German University in
Cairo
Cairo, Egypt
Ashraf166284@yahoo.com,
Ahmed.elmahdy@guc.edu.eg
Abstract
In this paper, the performance of a multicarrier direct sequence code division multiple access (MCDSCDMA) system equipped with a suppression filter is analyzed. A Double sided filter is used in the MCDS-CDMA receiver for suppressing the intended multitone narrowband interference (NBI) over a
Rayleigh fading channel. The effect of suppression filter coefficients, MC-DS-CDMA system
parameters, and the NBI parameters on the performance of the system is studied. The analysis shows
that the suppression filter can improve the MC-CDMA system performance significantly, and then
increases the MC-CDMA system capacity.
Keywords: Multicarrier CDMA; narrowband interference; suppression filter.
Improved Context-Aware Saliency Detection Using Local Search
Window
Shanshan Wang and Amr Abdel-Dayem
Department of Mathematics and Computer Science,Laurentian University,Ramsey Lake Road,
Sudbury,Canada
[sx2_wang, aabdeldayem]@cs.laurentian.ca
Abstract
In recent years, content-aware image retargeting has been an active research topic with the rapid
growth of mobile devices. Retargeting techniques usually begin with computing an importance map,
which represents the image regions that draw the human attention. Saliency map is highly considered
as a vital component of the importance map to preserve the attended regions of the input image
after resizing. Context-aware saliency detection has recently emerged as a promising direction in
producing accurate maps. However, its high computational complexity, severely, limits its use in
practical applications. In this paper, we propose the use of a local search window to limit the search
space, when looking for similar patches within the image. Experimental study over a set of 86
benchmark images showed that the proposed approach significantly reduces the running time, while,
at the same time, produces accurate results compared to the original Context-aware saliency
detection algorithm. Moreover, we conducted a set of experiments to empirically set the size of the
proposed search window.
Keywords: Image retargeting, Seam carving, Visual attention, Saliency map.
16
Synchronization of the Hyperchaotic Lü System Using Feedback
Linearization Controllers
M. Zribi N. Smaoui and H. Salim
Department of Electrical Engineering,
Kuwait University,
P.O. Box 5969, Safat, 13060, Kuwait
Abstract
This paper deals with the synchronization of hyperchaotic Lü systems. Feedback linearization
controllers are proposed to synchronize two identical hyperchaotic Lü systems. The asymptotic
convergence of the errors to zero between the states of the master and the slave systems is proved.
Simulations results are presented to illustrate the developed theory; they indicate that the proposed
control schemes work well. In addition, the proposed synchronization schemes are applied to the
secure communications field; the simulation results indicate that the proposed schemes are e_ective.
Keywords: hyperchaos, Lü System, synchronization, Feedback Linearization, Secure communication.
Mode Detection of Color Histogram and Merging Algorithm by SpatialColor Compactness Degree Analysis
H. Remmach1,2, A. Mouradi2, A. Sbihi1, L. Macaire3, O. Losson3
1LASTID, Ibn Tofail University, Faculty of Sciences, Kenitra-Morocco
h.remmach@gmail.com, sbihi@ensat.ac.ma
2 LBBE, Ibn Tofail University, Faculty of Sciences, Kenitra-Morocco
mouradi14@gmail.com
3LAGIS , University of science and technology, Lille1-France
[ludovic.macaire, olivier.losson]@univ-lille1.fr
Abstract
This article presents a new approach for color image segmentation based on pixel classification. The
classes of pixels are constructed by detecting the modes of the color histogram, namely the areas of
color space with a high density of probability. The application of watersheds on the color histogram
leads to an over-partitioning of the color plane, which can be processed by mode merging algorithm
based on mode adjacency graph analysis. The over-partitioning modes of the color histogram are
merged respecting the correspondence between modes of the histogram and significant regions of
the image. For that we consider the spatial-color compactness degree of the pixels corresponding to
two adjacent modes as a merging criterion.
Keywords: modes detection, Color histogram, Mathematical morphology, Adjacency graph, spatial
color compactness.
17
Combinatory logic and language engineering
1
I. Biskri1, A. Joly1 and B.A. Bensaber1
LAMIA, Département de Mathématiques et Informatique, Université du Québec à Trois-Rivières
C.P. 500, Trois-Rivières (QC) G9A 5H7, Canada
[ismail.biskri; adam.joly; Bensaber]@uqtr.ca
http://www.uqtr.ca
Abstract
The combinatory logic was developed to logically analyze Russell’s paradoxes and the concept of
substitution. It is a free variable logic. it avoids the telescoping of variables (with the same identifier)
in complex systems. This logic has emerged as a formal tool that allows providing functional semantic
representations of texts. It operates in typed applicative framework in which functions operate on
arguments. In our paper, we will show how the combinatory logic can contribute to the development
of softwares for the processing of natural languages.
Keywords: Combinatory logic, language engineering.
Screening of Retinal disorders by the Detection of Microaneurisms and
Hemorrhage
Nahed Solouma, Ph.D. and Amro El-Dib, MD.
National Institute of Laser Enhanced Sciences (NILES), Cairo University, Giza – Egypt
nsolouma@niles.edu.eg , dramreldib@yahoo.com
www.niles.cu.edu.eg
Abstract
Retinal disorders are among the most dangerous diseases because many of them may lead to
blindness if not early diagnosed and managed. Medical screening is very important as it allows the
early diagnosis of the disease. Only ophthalmologists who have enough experience can differentiate
between normal and abnormal retinas at the early stages of the disease. So, screening routines of the
retina are very expensive and rarely to be done. In this work we provide a computer-aided screening
system for the retinal disorders. The system could be used easily by the young physicians as it can
automatically detect the early symptoms of abnormalities such as microaneurysms, hemorrhage and
exudates. Using newly proposed image processing algorithms, we implemented a screening method
based on the experience of the ophthalmology experts.
Keywords: Computer-aided diagnosis, hemorrhage, microaneurysm detection.
18
A New Presentation Method of Nucleotide Sequences Minimizes
Storage Size and Processing Time
Nahed H. Solouma and Osama Fekry
National Institute of Laser Enhanced Science (NILES) – Cairo university, Giza, Egypt.
nsolouma@niles.edu.eg , osama.f.alblah@niles.edu.eg
http://www.niles.cu.edu.eg
Abstract
The biological databases have a vast amount of data representing the sequences of genomes, genes
and proteins of different species. Another related and/or deduced information such as protein
structures and protein-protein interactions are also present. The number of sequences and the
related information are drastically increasing. This deluge of data creates great challenges to
computer scientists to store and process the so long sequences efficiently. We proposed a new
method for nucleotide sequence encoding. Our encoding method is based on the fact that there are
only four nucleotide bases i.e. four different states. Any sequence can be segmented to four-bases
segments and hence, we have only 256 combinations to represent any sequence. The code of any
sequence is thus a sequence of numbers ranging from 0- 255. We named the new sequence code as
4-into-1 code. Many sequences were encoded using the proposed encoding method which saves 75%
of the storage capacity. The most common sequence analysis algorithms were modified and
redesigned to be suitable for the application to the 4-into-1 codes. Surprisingly, the computation
complexity and hence the calculation time are greatly reduced using our proposed methods. Using
the 4-into-1 code, the computation complexity of the dot plots and global sequence alignment are
reduced to one sixteenth of its original complexity. Dynamic programming can be efficiently applied
to the 4-into-1 code for local sequence alignment. The palindrome regions in a sequence are easily
obtained using the 4- into-1 code. The 4-into-1 code can be used to numerically represent the
nucleotide sequence and hence, signal processing algorithms can be applied efficiently.
Keywords: Compression, Nucleotide sequences, numerical representation.
Intelligent Workpiece Detection on CNC Milling Machine
J. Balic, F. Cus, S. Klancnik
University of Maribor, Faculty of Mechanical Engineering, Smetanova 17, SI-2000, Maribor, Slovenia
[joze.balic]@uni-mb.si
http://www.uni-mb.si
Abstract
In this paper, system for optical determining the workpiece origin on the CNC (Computer Numerical
Control) machine is presented. Similar high sophisticated systems are commercially available but in
most cases they are very expensive and so their purchase is economically unjustified. The purpose of
our research is to develop an inexpensive system for non-contact determination of the workpiece
origin, which is also sufficiently precise for practical use. The system is implemented on a three-axis
CNC milling machine, which is primarily designed for good machinability materials. Calibration
procedure using feed-forward neural networks was developed. With this method the calibration
procedure is simplified and the mathematical derivation of camera model is avoided. Learned neural
network represents the camera calibration model. After neural network learning is complete, we can
begin using the system for determining the workpiece origin. This developed system was through a
number of tests proved to be reliable and suitable for use in practice. In the paper, working of system
is illustrated with a practical example, which confirms the effectiveness of the implemented system in
actual use on machine.
Keywords: Neural networks, Image Processing, Milling, Workpiece Detection.
19
Wavelet Neural Networks with a New Translation Vector Initialization
Approach for Multiclass Cancer Classification
Zarita Zainuddin, Ong Pauline
School of Mathematical Sciences, Universiti Sains Malaysia, 11800 USM, Penang, Malaysia.
zarita@cs.usm.my, ong.p@usm.my
http://math.usm.my/
Abstract
The generalization capability of wavelet neural networks (WNNs) is sensitively influenced by the
network topology, particularly the location and the number of translation vectors. In this paper, a
new translation vector initialization approach – specifically, the modified point symmetry-based fuzzy
C-means (MPSDFCM) was employed in selecting the translation vectors of WNNs, where its
effectiveness was demonstrated in the multiclass cancer classification using the microarray gene
expression profiles. Comparative studies showed that the proposed methodology possessed superior
predictive capability as opposed to other initialization approaches, in terms of prediction accuracy,
sensitivity and specificity.
Keywords: Bioinformatics, Fuzzy C-Means, Microarray, Wavelet Neural Networks
Optimization of the Pulping Process: Polynomial vs. Neural Network
Models
1
Wan Rosli Wan Daud1*, Zarita Zainuddin2, Ong Pauline2, Amran Shafie1
Bioresource, Paper and Coating Division, School of Industrial Technology, Universiti Sains Malaysia,
11800 USM,
Penang, Malaysia.
2
School of Mathematical Sciences, Universiti Sains Malaysia, 11800 USM, Penang Malaysia.
wanrosli@usm.my, zarita@cs.usm.my, ong.pauline@hotmail.com
http://www.indtech.usm.my/
Abstract
Optimization of the experimental conditions for cost efficiency and time saving purposes is highly
sought for an economically viable pulping process. In this paper, the integration of the polynomial
model and wavelet neural networks (WNNs) in exploring the influence of the pulping variables (viz.
cooking temperature and time, ethanol and sodium hydroxide concentration) on the resulting pulp
and paper properties, i.e., screened yield, kappa number, tensile index and tear index during the
pulping of the oil palm fronds was examined. Performance assessment signified that the WNNs
demonstrated superior predictive capability than the polynomial model, where the former reproduce
the experimental results with errors less than 6%, and preserve satisfactory determination coefficient.
Keywords: Organosolv, palm fronds, pulping, response surface methodology, wavelet neural
networks.
20
Classification of Vertically Distributed Data using Directed
Acyclic Graph
*Ahmed M. Khedr, **Ibrahim A. Attiya
* Computer Science Department, Faculty of Science, Sharjah University, Sharjah, UAE
** Mathematics Department, Faculty of Science, Zagazig University, Zagazig, Egypt
akhedr@sharjah.ac.ae, ibrahimateya@yahoo.com
Abstract
Most developed learning algorithms are designed for environments in which all the relevant data is
stored at single computer site. With increasingly data volume and appearing of internet and high
speed networks, the relevant dataset can be stored in geographically distributed databases that are
connected by communication networks. These databases cannot be moved to other network sites
due to communication costs, security, size, privacy, or data-ownership considerations. In this paper,
using directed acyclic graph (DAG), we propose a new k-nearest neighbors classifier (k-NN classifier)
algorithm for situational input stored in geographically distributed databases. We show that it is
possible to perform global computation in a reasonably secure manner for vertically partitioned
databases. The computation is completed by only exchanging a few local summaries among the
databases. An empirical validation of our results is also presented in the paper.
Keywords: Data Privacy, Directed acyclic graph, Nearest Neighbor Classifier, Vertically distributed
Databases.
Qualitative State Estimation from corrupted Data with Uncertain
Parameters
Mohamed F. Hassan
Hala A. Mourad
Electrical Engineering Department, College of
Engineering, Kuwait University, 13060 Kuwait (phone:
+965-2498-7634; fax: +965-2481-7451; e-mail:
m.f.hassan47@gmail.com & m.fahim@ku.edu.kw )
Abstract
In this paper, an estimator is developed to estimate the states of linear stochastic discrete-time
dynamical systems with uncertain parameters. The system model and the measurements are
assumed to be corrupted by uncorrelated zero mean white Gaussian noise sequences. The
parameters of the system are assumed to be uncertain. The proposed approach is based on Kalman
filter. Although the developed state estimator uses the nominal values of the system parameters; it
showed to be stable, robust and gives satisfactory results. The effectiveness of the theoretical
derivation of the developed estimator is illustrated via simulation examples and a DC Motor
application.
Keywords: Discrete-time systems, linear systems, nonlinear systems, stability, state estimation,
stochastic systems.
21
Visual Simplified Characters’ Emotion Emulator
Implementing OCC Model
Ana Lilia Laureano-Cruces1,2,3, Laura Hernández-Domínguez2, Martha Mora-Torres2, Juan-Manuel
Torres-Moreno3
1 Departamento de Sistemas, Universidad Autónoma Metropolitana – Azcapotzalco,
San Pablo 180, CP.02200. México, DF.
2 Posgrado en Ciencia e Ingeniería de la Computación, Universidad Nacional Autónoma de
México,
Edif. Anexo IIMAS, 3er piso, Ciudad Universitaria, Coyoacán, México, D.F. C.P. 04510
clc@correo.azc.uam.mx (lili94@exalumno.unam.mx)
laudobla@gmail.com, kabhun@yahoo.com.mx
3 Laboratoire Informatique d'Avignon / Université d'Avignon et des Pays de Vaucluse
BP 91228, 84911 Avignon Cedex 9, France
juan-manuel.torres@univ-avignon.fr
Abstract
In this paper, we present a visual emulator of the emotions seen in characters in stories. This system
is based on a simplified view of the cognitive structure of emotions proposed by Ortony, Clore and
Collins. The goal of this paper is to provide a visual platform that allows us to observe changes in the
characters’ different emotions, and the intricate interrelationships between: 1) each character’s
emotions, 2) their affective relationships and actions, 3) The events that take place in the
development of a plot, and 4) the objects of desire that make up the emotional map of any story. This
tool was tested on stories with a contrasting variety of emotional and affective environments:
Othello, Twilight, and Harry Potter, behaving sensibly and in keeping with the atmosphere in which
the characters were immersed.
Keywords: synthetic emotions, OCC model, emotional environment, intelligent interfaces, decisionmaking process.
GRASP Compared with other Heuristics to Find Minimal Reducts
Iris Iddaly Méndez-Gurrola1,2,3, Javier Ramírez-Rodríguez2,4,6, Ana Lilia Laureano-Cruces2,4,6Jorge M.
A. Sánchez de Antuñano Barranco2,3,5
1
Universidad Autónoma Metropolitana, Unidad Cuajimalpa.
Departamento de Matemáticas Aplicadas y Sistemas
2
Universidad Autónoma Metropolitana, Unidad Azcapotzalco.
3
Posgrado en Diseño, Nuevas Tecnologías
4
Departamento de Sistemas
5
Departamento de Investigación y Conocimiento para el Diseño
Av. San Pablo 180, Col. Reynosa Tamaulipas, Del. Azcapotzalco, México, D.F.
iddalym@yahoo.com.mx, [jararo, clc, jsab]@correo.azc.uam.mx
6
LaboratoireInformatiqued'Avignon et des Pays de Vaucluse / Universitéd'A vignon
BP 91228, 84911 Avignon Cedex 9, FRANCE
Abstract
In this paper we show some modifications to the programming of a GRASP algorithm [4], and how this
algorithm can generate good or equal results compared with other algorithms to find reducts in an
information system.The algorithm was used in four datasets of different dimensions and results are
compared against other techniques.
Keywords:rough sets, reduct, GRASP algorithm.
22
Using Tailored Chaotic Sequences In 3D Watermarking
Amira E.Youssef, Walaa Sheta
a Informatics
Research Institute, City for Scientific Research and Technology Applications (MuCSAT), Alexandria 21934,
Egypt
Abstract
We survey the basics of watermarking and the history of chaos and its properties. There are a lot of methods for
the chaotic sequences generation, our proposed method we choose to use the geometry based spatial watermarking
where we modify the positions of verticies. The methods in this approach make changes in the position of the
vertices to satisfy some requirements specially defined for each watermark bit. Our aim is to make a secure
watermark that doesn't affect the quality of our 3D model. The security of the watermark is based on the chaotic
secret generated and embedded in the 3D model. The chaotic sequence itself has several secret keys that if not
known the watermark can't be detected. Apart from the sequence security we depend on the hiding position and
chosen threshold that are tailored for each model for more secrecy.
Keywords: 3d watermarking, Chaos, Chaotic maps, Random sequences
Mobile Augmented Reality Architecture for Indoor Arena with Markerless
Tracking
J. Keller, J. Štafa, L. Čegan
Faculty of Electrical Engineering and Informatics, University of Pardubice, Studentská 95, 530 02
Pardubice,
Czech Republic
jan.keller@student.upce.cz, jan.stafa@student.upce.cz, lukas.cegan@upce.cz
http://www.upce.cz/fei
Abstract
In this paper, we introduce a prototype of an augmented reality platform for accessing contextual
information in real time using an indoors location system. Using this platform, object and
environment can be augmented with related information, and queried and restricted by the location
and view direction. We designed our own solution of an indoor location system based on a signal
measurement of Wi-Fi devices (Access Points) in local network. For the best accurate projection of
contextual data and models, without the need to use markers, we use algorithms for edge detection
and object recognition. All of these techniques together serve for rendering information in real-time
as accurately as possible.
Keywords: Augmented reality, Indoor location, Real-time edge detection, Markerless object
recognition.
23
AĞ SİMÜLATÖRÜ (NS2)
Mehmet BİRLİK
Okan Üniversitesi
Fenbilimleri Enstitüsü Bilgisayar Mühendisliği Bölümü
mehmet.birlik@altraoptik.com.tr
Abstract
Ns is a discrete event simulator targeted at networking research. Ns provides substantial support for
simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite)
networks. Ns began as a variant of the REAL network simulator in 1989 and has evolved substantially
over the past few years. In 1995 ns development was supported by DARPA through the VINT project
at LBL, Xerox PARC, UCB, and USC/ISI. Currently ns development is supported through DARPA with
SAMAN and through NSF with CONSER, both in collaboration with other researchers including ACIRI.
Ns has always included substantial contributions from other researchers, including wireless code from
the UCB Daedelus and CMU Monarch projects and Sun Microsystems. NS2 is an open source tool that
presents endless rights to the users. It provides you to add a new protocol, test it over the network
and analys the graphical outputs of the ns2. What you need is knowledge of C++ and tcl script. This
project covers the creating new queuing algorithm, adding it to ns2 platform, using it over the
network and analysing the graphical outputs of the ns2. The most important step is evaluating the
outputs of the network simulation. According to these results we decide whether the protocols
performs the desired tasks or not.
Keywords : Ns, Ns2, Ns2 Queuing protocol, adding new protocol to Ns2.
Ağlarda Topluluk Yapılarının Algılanma Algoritmaları
B. Ardıl
Bilgisayar Mühendisliği Bölümü, Okan Üniversitei, Istanbul, Turkey
boraardil@gmail.com
Özet
Ağlarda topluluk yapılarının algılanması, bilgisayar bilimlerinden, sosyal bilimlerden ve diğer
disiplinlerden birçok araştırmacının üzerinde çalıştığı güncel bir konudur. Bu amaçla, günümüze kadar
farklı birçok algoritma denenmiştir. Bu çalışmada topluluk yapılarının belirlenmesinde kullanılan
algoritmalardan öne çıkanlar tanıtılacak, özellikle zaman karmaşıklığı ve ölçeklenebilirlik
problemlerine ne kadar çözüm olabildikleri, hızları ve güvenilirlikleri irdelenecektir.
Anahtar Kelimeler: Ağlar, topluluk yapıları, çizge madenciliği, algoritmalar.
24
Multivariable PID Controller for Lateral Motion of Aircraft
A. Maddi, A. Guessoum and D. Berkani
LATSI Laboratory, Department of Electronics, University of Blida, Algeria
a_maddi@hotmail.com
Abstract
The aim of this paper is to provide a practical example to the Proportional-Integral-Derivative (PID)
controller. This method includes a description and some discussion of the effects PID parameters. This
method is developed and applied to a lateral motion of aircraft, in order to determine the lateral and
directional control angles required for trim under steady turns and sideslips. This study also based on
the directional and lateral static stability derivatives of the aircraft.
Keywords: Aircraft, lateral motion, stability, sideslip angle, PID control.
Meteorological satellite images modeling using autoregressive process
L. Sadouki *, B. Haddad **, D. Kemikem **
* Institute of Electrical and Electronic Engineering, University M'Hamed Bougara of
Boumerdes(UMBB),
Independence Avenue, 35000 Boumerdes, Algeria
** Laboratory of Image Processing and Radiation, Faculty of Computer Science and Electronics,
University of Sciences and Technology Houari Boumediene (USTHB),
PObox 32 El Alia, Bab Ezzouar, Algiers, Algeria
, h_boualem@hotmail.com, kemikemds@yahoo.frsdkleila@yahoo.fr
http://www.umbb.dz, http://www.usthb.dz
Abstract
The objective of this work is a modeling of the satellite images precipitations (or rainfalls) that are
useful for hydrologic applications and an investigation on a possible different description of
precipitations over the sea and on the continent are attempted in the satellite images concerning the
Mediterranean region. The model used in this paper is the autoregressive process AR (p), where p is
its order. This model makes possible the description of a series of 2208 satellite images, recorded
during a period of 3 months via the IR03.9 Meteosat channel. To conduct a detailed study of the
phenomenon, a scanning area of 20×50 pixels in the two areas (sea and continent) is adapted to
examine all precipitation areas on the images, using a window (5×5 pixels) and a pixel-by- pixel
processes. The order of the AR model found in this paper, for the Mediterranean region, is “1”, which
is invariant in time and space.
Keywords: Images, Modeling, precipitations, rainfalls, Meteosat, Autoregressive, Satellite.
25
Control of Redundant Robot and Singularities Avoidance based ANFIS
Network
*M. BENZAOUI, ** H. CHEKIREB and ** M. TADJINE
*Dpt de l’électrotechnique et de l’automatique
Institue de génie électrique et électronique Université M’hamed Bougara,
Boumerdès, avenue de l’Indépendance35000 Boumerdès, Algeria
**Laboratoire de Commande des Processus. Dpt de Génie Electrique, ENP
BP 182, 10 avenue Hassan Badi, 16200 El-harrach Alger, Algeria
Email: benzaouimess@mail.com, chekireb@yahoo.fr
Abstract
In this work we exploit an ANFIS network to achieve the singularities avoidance of a redundant robot.
This latter must carry out a trajectory tracking in the Cartesian space near a singularity point. The
singularity avoidance without affecting trajectory tracking is involved via self-motion method. The
analytical determination of this self motion is obtained on the optimization of scalar function
depending on the robot manipulability measure. In view to reduce the on line cumbersome
computations due to the analytical method, a learning network based ANFIS is used to generate this
self-motion. The learning process uses the input-output data coming from the analytical self-motion.
The two methods of avoiding singularity (based on analytical method and on ANFIS one) are tested in
the case of 3 dof planar robot performing, in Cartesian space, a trajectory near a singular point. The
obtained results show that the proposed criteria ensure a good control when the robot operates near
a singularity point.
Keywords: redundant robot, singularity avoidance, self-motion. adaptive neuro fuzzy inference
system (ANFIS).
26
Download