14 research outputs found

    Optimizing community detection in social networks using antlion and K-median

    Get PDF
    Antlion Optimization (ALO) is one of the latest population based optimization methods that proved its good performance in a variety of applications. The ALO algorithm copies the hunting mechanism of antlions to ants in nature. Community detection in social networks is conclusive to understanding the concepts of the networks. Identifying network communities can be viewed as a problem of clustering a set of nodes into communities. k-median clustering is one of the popular techniques that has been applied in clustering. The problem of clustering network can be formalized as an optimization problem where a qualitatively objective function that captures the intuition of a cluster as a set of nodes with better in ternal connectivity than external connectivity is selected to be optimized. In this paper, a mixture antlion optimization and k-median for solving the community detection problem is proposed and named as K-median Modularity ALO. Experimental results which are applied on real life networks show the ability of the mixture antlion optimization and k-median to detect successfully an optimized community structure based on putting the modularity as an objective function

    Local Entropy and Standard Deviation for Facial Expressions Recognition in Thermal Imaging

    Get PDF
    Emotional reactions are the best way to express human attitude and thermal imaging mainly used to utilize detection of temperature variations as in detecting spatial and temporal variation in the water status of grapevine. By merging the two facts this paper presents the Discrete Cosine Transform (DCT) with Local Entropy (LE) and Local Standard Deviation (LSD) features as an efficient filters for investigating human emotional state in thermal images. Two well known classifiers, K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) were combined with the earlier features and applied over a database with variant illumination, as well as occlusion by glasses and poses to generate a recognition model of facial expressions in thermal images. KNN based on DCT and LE gives the best accuracy compared with other classifier and features results

    Antlion optimization and boosting classifier for spam email detection

    Get PDF
    Spam emails are not necessary, though they are harmful as they include viruses and spyware, so there is an emerging need for detecting spam emails. Several methods for detecting spam emails were suggested based on the methods of machine learning, which were submitted to reduce non relevant emails and get results of high precision for spam email classification. In this work, a new predictive method is submitted based on antlion optimization (ALO) and boosting termed as ALO-Boosting for solving spam emails problem. ALO is a computational model imitates the preying technicality of antlions to ants in the life cycle. Where ALO was utilized to modify the actual place of the population in the separate seeking area, thus obtaining the optimum feature subset for the better classification submit based on boosting classifier. Boosting classifier is a classification algorithm that points to a group of algorithms which modifies soft learners into powerful learners. The proposed procedure is compared against support vector machine (SVM), k-nearest neighbours algorithm (KNN), and bootstrap aggregating (Bagging) on spam email datasets in a set of implementation measures. The experimental outcomes show the ability of the proposed method to successfully detect optimum features with the smallest value of selected features and a high precision of measures for spam email classification based on boosting classifier

    A robust 3D mesh watermarking algorithm utilizing fuzzy C-Means clustering

    Get PDF
    A new robust 3D watermarking algorithm utilizing Fuzzy C-Means (FCM) clustering technique is presented. FCM clusters 3D mesh vertices into suitable and unsuitable choices to insert the watermark without occasioning visible deformation, and also it is tough for the attacker to determine places of the watermark insertion. Two watermarking processes are offered to insert the watermark into 3D mesh models. The first process utilizes topical statistical measurements like average and standard deviation in order to alter the values of vertices to secret watermark data into 3D mesh models, however, the second process utilizes a jumbled insertion planning to insert the watermark inside 3D mesh models utilizing the topical statistical measurements and altering 3D mesh vertices together. Simulation results show that the proposed algorithm is robust. The watermarked 3D mesh models are resistant to several attacks like similarity transforms, noise addition, cropping and mesh smoothing

    Signature identification and verification systems: a comparative study on the online and offline techniques

    No full text
    Handwritten signature identification and verification has become an active area of research in recent years. Handwritten signature identification systems are used for identifying the user among all users enrolled in the system while handwritten signature verification systems are used for authenticating a user by comparing a specific signature with his signature that is stored in the system. This paper presents a review for commonly used methods for preprocessing, feature extraction and classification techniques in signature identification and verification systems, in addition to a comparison between the systems implemented in the literature for identification techniques and verification techniques in online and offline systems with taking into consideration the datasets used and results for each system
    corecore