This paper presents a more general approach to the evolution of the resonant frequency according ... more This paper presents a more general approach to the evolution of the resonant frequency according to the radius of the circular patch antenna. Transmission line theory and the resonator model are adopted to analyze the operating frequencies of the proposed antenna. A uniplanar corner-fed patch antenna is presented with single-point microstrip feed and single layer substrate. We used HFSS (high frequency structured simulator) software for simulation of antenna and to find out the results. We keep changing the design of antenna as our motive was to achieve miniature antenna with better results than conventional antenna's. Patch radius decreases as the resonant frequency increases (3.06 mm at 18.31 GHz and 2.51 mm at 19.35 GHz). The results obtained in this design compare favorably with results obtained from manual computation of the same parameters and these agree with other designs such as the rectangular patch.
Objects detection and tracking is a key function for many applications like video surveillance, r... more Objects detection and tracking is a key function for many applications like video surveillance, robotic, intelligent transportation systems,...etc. This problem is widely treated in the literature in terms of sensors (video cameras, laser range finder, Radar) and methodologies. This paper proposes a new approach for detecting and tracking objects using stereo vision with linear cameras. After the matching process applied
This paper proposes a facial expression recognition method based on a novel facial decomposition.... more This paper proposes a facial expression recognition method based on a novel facial decomposition. First, seven regions of interest (ROI), representing the main components of face (left eyebrow, right eyebrow, left eye, right eye, between eyebrows, nose and mouth), are extracted using facial landmarks detected by IntraFace algorithm. Then, different local descriptors, such as LBP, CLBP, LTP and Dynamic LTP, are used to extract features. Finally, feature vector, representing face image, is fed into a multiclass support vector machine to achieve the recognition task. Experimental results on two public datasets show that the proposed method outperforms state of the art methods based on other facial decompositions.
This paper presents a novel LBP-like descriptor for texture representation. The proposed method, ... more This paper presents a novel LBP-like descriptor for texture representation. The proposed method, referred to as attractive-and-repulsive decoded gradient contours (ARDGC), consists in dividing local features into two distinct categories, attractive and repulsive decoded gradient contours (ADGC and RDGC) thanks to the flexibility of attractive-repulsive characteristics of pixels in a 3 × 3 grayscale image patch. Unlike some existing methods which are based on pairwise comparison of adjacent pixels, the essence of the proposed ARDGC model is to encode the differences between local intensity values within triplets of pixels, along a route traced along the periphery of the 3 × 3 square neighborhood. In order to increase the robustness of the proposed operator, a new triplet, formed in addition to the central pixel, by the average local and average global gray levels, is incorporated in the modeling of ADGC and RDGC. The final multi-scale attractive-and-repulsive decoded gradient contours ARDGC descriptor is obtained by linear concatenation of ADGC and RDGC. Extensive experimental results on nine representative texture databases show that the proposed ARDGC descriptor demonstrates superior performance to 30 recent state-of-the-art LBP variants.
It is acknowledged in security field that intrusion detection systems are a powerful way to detec... more It is acknowledged in security field that intrusion detection systems are a powerful way to detect intrusions in a computer network. Nevertheless, the network traffic used to construct an IDS is huge with useless and unnecessary information. To address this issue, we should retain just the relevant information using a feature extraction method. The most popular technique used in detection intrusions area is Principal Component Analysis (PCA). However, PCA is sensitive to noise and outliers and it is limited to linear principal components. In this paper, we have proposed a new variant of the Nonlinear Fuzzy Robust PCA (NFRPCA) using the two well-known datasets KDDcup99 and NSL-KDD. Experimental results demonstrated that the new NFRPCA gives a promising performance in comparison to NFRPCA and PCA.
In this letter, we present a novel compact coplanar waveguide-fed CPW-Fed printed monopole antenn... more In this letter, we present a novel compact coplanar waveguide-fed CPW-Fed printed monopole antenna for super high Ultra Wide Band (UWB) communication applications. To obtain UWB and to have an effect on the improvement of the bandwidth of the antenna, two modifications are introduced, the first one is to print two symmetric semi-elliptical shaped in the same side with the radiating element and the second one is to modify the triangular patch antenna to be semi-circular triangular antenna. The bandwidth of the proposed antenna is from 4.9-25 GHz. The average gain of the proposed structure is 4 dBi. Both the CST microwave and HFSS 3-D EM solver are implemented for design and simulation. To validate the obtained transient analysis results, the prototype of the proposed design is fabricated, tested and measured. The experimental results show an acceptable agreement with the simulation.
One of the most commonly problem in the field of network intrusion detection system is the tremen... more One of the most commonly problem in the field of network intrusion detection system is the tremendous number of redundant and irrelevant information used to build an intrusion detection system. In order to overcome this problem, we have used and compared two dimensionality reduction methods namely PCA and Fuzzy PCA which allows us to keeping just the most relevant information from the network traffic data. Then, we have applied K nearest Neighbour algorithm in order to classify the test samples of connections into a normal or attack category. The conducted experiments were made by using KDDcup99 dataset. The results obtained reveal that Fuzzy PCA method outperforms PCA in detecting U2R and DoS (Denial of Service) attacks.
Learning plays a very important role in the evolution of human knowledge; in teaching area, teach... more Learning plays a very important role in the evolution of human knowledge; in teaching area, teachers notice more and more that the learning level is getting down, on the other hand learners are unable to use their knowledge in new situation in an effective way, they claim themselves did not have a good learning or they have misunderstood the course. However, to solve this matter, we believe that the teachers have to transfer their knowledge to the learners in an easy way, which will help the learners to use them in an effective way? In this document we will propose three levels of knowledge structuring that result: the learning strategies to facilitate comprehension and evaluation strategies to make sure of the result outcome. Those levels of structuring and those strategies can be used in digital and classical systems of training.
This paper presents a more general approach to the evolution of the resonant frequency according ... more This paper presents a more general approach to the evolution of the resonant frequency according to the radius of the circular patch antenna. Transmission line theory and the resonator model are adopted to analyze the operating frequencies of the proposed antenna. A uniplanar corner-fed patch antenna is presented with single-point microstrip feed and single layer substrate. We used HFSS (high frequency structured simulator) software for simulation of antenna and to find out the results. We keep changing the design of antenna as our motive was to achieve miniature antenna with better results than conventional antenna's. Patch radius decreases as the resonant frequency increases (3.06 mm at 18.31 GHz and 2.51 mm at 19.35 GHz). The results obtained in this design compare favorably with results obtained from manual computation of the same parameters and these agree with other designs such as the rectangular patch.
Objects detection and tracking is a key function for many applications like video surveillance, r... more Objects detection and tracking is a key function for many applications like video surveillance, robotic, intelligent transportation systems,...etc. This problem is widely treated in the literature in terms of sensors (video cameras, laser range finder, Radar) and methodologies. This paper proposes a new approach for detecting and tracking objects using stereo vision with linear cameras. After the matching process applied
This paper proposes a facial expression recognition method based on a novel facial decomposition.... more This paper proposes a facial expression recognition method based on a novel facial decomposition. First, seven regions of interest (ROI), representing the main components of face (left eyebrow, right eyebrow, left eye, right eye, between eyebrows, nose and mouth), are extracted using facial landmarks detected by IntraFace algorithm. Then, different local descriptors, such as LBP, CLBP, LTP and Dynamic LTP, are used to extract features. Finally, feature vector, representing face image, is fed into a multiclass support vector machine to achieve the recognition task. Experimental results on two public datasets show that the proposed method outperforms state of the art methods based on other facial decompositions.
This paper presents a novel LBP-like descriptor for texture representation. The proposed method, ... more This paper presents a novel LBP-like descriptor for texture representation. The proposed method, referred to as attractive-and-repulsive decoded gradient contours (ARDGC), consists in dividing local features into two distinct categories, attractive and repulsive decoded gradient contours (ADGC and RDGC) thanks to the flexibility of attractive-repulsive characteristics of pixels in a 3 × 3 grayscale image patch. Unlike some existing methods which are based on pairwise comparison of adjacent pixels, the essence of the proposed ARDGC model is to encode the differences between local intensity values within triplets of pixels, along a route traced along the periphery of the 3 × 3 square neighborhood. In order to increase the robustness of the proposed operator, a new triplet, formed in addition to the central pixel, by the average local and average global gray levels, is incorporated in the modeling of ADGC and RDGC. The final multi-scale attractive-and-repulsive decoded gradient contours ARDGC descriptor is obtained by linear concatenation of ADGC and RDGC. Extensive experimental results on nine representative texture databases show that the proposed ARDGC descriptor demonstrates superior performance to 30 recent state-of-the-art LBP variants.
It is acknowledged in security field that intrusion detection systems are a powerful way to detec... more It is acknowledged in security field that intrusion detection systems are a powerful way to detect intrusions in a computer network. Nevertheless, the network traffic used to construct an IDS is huge with useless and unnecessary information. To address this issue, we should retain just the relevant information using a feature extraction method. The most popular technique used in detection intrusions area is Principal Component Analysis (PCA). However, PCA is sensitive to noise and outliers and it is limited to linear principal components. In this paper, we have proposed a new variant of the Nonlinear Fuzzy Robust PCA (NFRPCA) using the two well-known datasets KDDcup99 and NSL-KDD. Experimental results demonstrated that the new NFRPCA gives a promising performance in comparison to NFRPCA and PCA.
In this letter, we present a novel compact coplanar waveguide-fed CPW-Fed printed monopole antenn... more In this letter, we present a novel compact coplanar waveguide-fed CPW-Fed printed monopole antenna for super high Ultra Wide Band (UWB) communication applications. To obtain UWB and to have an effect on the improvement of the bandwidth of the antenna, two modifications are introduced, the first one is to print two symmetric semi-elliptical shaped in the same side with the radiating element and the second one is to modify the triangular patch antenna to be semi-circular triangular antenna. The bandwidth of the proposed antenna is from 4.9-25 GHz. The average gain of the proposed structure is 4 dBi. Both the CST microwave and HFSS 3-D EM solver are implemented for design and simulation. To validate the obtained transient analysis results, the prototype of the proposed design is fabricated, tested and measured. The experimental results show an acceptable agreement with the simulation.
One of the most commonly problem in the field of network intrusion detection system is the tremen... more One of the most commonly problem in the field of network intrusion detection system is the tremendous number of redundant and irrelevant information used to build an intrusion detection system. In order to overcome this problem, we have used and compared two dimensionality reduction methods namely PCA and Fuzzy PCA which allows us to keeping just the most relevant information from the network traffic data. Then, we have applied K nearest Neighbour algorithm in order to classify the test samples of connections into a normal or attack category. The conducted experiments were made by using KDDcup99 dataset. The results obtained reveal that Fuzzy PCA method outperforms PCA in detecting U2R and DoS (Denial of Service) attacks.
Learning plays a very important role in the evolution of human knowledge; in teaching area, teach... more Learning plays a very important role in the evolution of human knowledge; in teaching area, teachers notice more and more that the learning level is getting down, on the other hand learners are unable to use their knowledge in new situation in an effective way, they claim themselves did not have a good learning or they have misunderstood the course. However, to solve this matter, we believe that the teachers have to transfer their knowledge to the learners in an easy way, which will help the learners to use them in an effective way? In this document we will propose three levels of knowledge structuring that result: the learning strategies to facilitate comprehension and evaluation strategies to make sure of the result outcome. Those levels of structuring and those strategies can be used in digital and classical systems of training.
Uploads