Alejandra Jiménez, Santiago Jiménez, Pablo Lozada Yánez, Cristhy Jiménez Granizo
A Greenhouse is an indoor covered place where plants are grown and cultivated. In the agriculture field, the crops into greenhouse are highly used due that they provide a little micro-environment that can be easier controlled. At this same context, there are some important parameters that should be monitored at a greenhouse in order to achieve good results at the end of the agricultural production. Two of these parameters are precisely the temperature and humidity that are been commonly measured with manual methods. The wireless sensors networks (WSN) are defined as the collection of sensor nodes that perform a specific task and they are representing one of the technological solutions to automatize and improve the management of crops. This paper summarizes the work carried out to provide an efficient control mechanism of microclimate into greenhouses through the implementation of an infrastructure of Wireless Sensors Network to control environmental parameters. It was possible to probe the effectiveness of this mechanism through the comparative analysis of measures taken using both (1) traditional manual mechanism and (2) automatized with sensors mechanism. A crop of tomato was selected as a case study in which a physic network topology was deployed. Additionally, a management data application was developed taking into account usability parameters in order to create a tool easily accepted by the future users.
{"title":"Wireless Sensors Network in the Efficient Management of Greenhouse Crops","authors":"Alejandra Jiménez, Santiago Jiménez, Pablo Lozada Yánez, Cristhy Jiménez Granizo","doi":"10.1109/ITNG.2012.136","DOIUrl":"https://doi.org/10.1109/ITNG.2012.136","url":null,"abstract":"A Greenhouse is an indoor covered place where plants are grown and cultivated. In the agriculture field, the crops into greenhouse are highly used due that they provide a little micro-environment that can be easier controlled. At this same context, there are some important parameters that should be monitored at a greenhouse in order to achieve good results at the end of the agricultural production. Two of these parameters are precisely the temperature and humidity that are been commonly measured with manual methods. The wireless sensors networks (WSN) are defined as the collection of sensor nodes that perform a specific task and they are representing one of the technological solutions to automatize and improve the management of crops. This paper summarizes the work carried out to provide an efficient control mechanism of microclimate into greenhouses through the implementation of an infrastructure of Wireless Sensors Network to control environmental parameters. It was possible to probe the effectiveness of this mechanism through the comparative analysis of measures taken using both (1) traditional manual mechanism and (2) automatized with sensors mechanism. A crop of tomato was selected as a case study in which a physic network topology was deployed. Additionally, a management data application was developed taking into account usability parameters in order to create a tool easily accepted by the future users.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133682217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human Gait: HG recognition method based on wavelet transformation is proposed. Using Chinese Academy of Sciences (CASIA), the proposed method is evaluated and is compared to the conventional HG recognition method without utilizing wavelet transformation. In particular, two preprocessing methods, model based and model free methods are attempted for the proposed HG recognition. Also 2D Discrete Wavelet Transform (DWT), and 2D lifting Wavelet Transform (LWT) level 1 decomposition are features in the proposed HG recognition method. Haar base function of wavelet transformation is also used for feature extraction in the proposed method. Experimental results with CASIA database show x % improvement in terms of correct classification performance in comparison to the conventional method.
{"title":"Gait Recognition Method Based on Wavelet Transformation and its Evaluation with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait Recognition Dataset","authors":"K. Arai, Rosa Andrie","doi":"10.1109/ITNG.2012.164","DOIUrl":"https://doi.org/10.1109/ITNG.2012.164","url":null,"abstract":"Human Gait: HG recognition method based on wavelet transformation is proposed. Using Chinese Academy of Sciences (CASIA), the proposed method is evaluated and is compared to the conventional HG recognition method without utilizing wavelet transformation. In particular, two preprocessing methods, model based and model free methods are attempted for the proposed HG recognition. Also 2D Discrete Wavelet Transform (DWT), and 2D lifting Wavelet Transform (LWT) level 1 decomposition are features in the proposed HG recognition method. Haar base function of wavelet transformation is also used for feature extraction in the proposed method. Experimental results with CASIA database show x % improvement in terms of correct classification performance in comparison to the conventional method.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images which are embedded in circulation images is evaluated with the Root Mean Square difference between the original secret image and extracted one from the circulation images. Mean while the conventional Multi- Resolution Analysis (MRA) based data hiding is attempted with a variety of parameters, level of MRA and the frequency component location of which secret image is replaced to it and is compared to the proposed method. It is found that the proposed data hiding method is superior to the conventional method. Also the conventional data hiding method is not robust against circulation image processing.
{"title":"Data Hiding Method Based on Dyadic Wavelet Transformation Improving Invisibility of Secret Images on Circulation Images by Means of Run-Length Coding with Permutation Matrix Based on Random Number","authors":"K. Arai","doi":"10.1109/ITNG.2012.163","DOIUrl":"https://doi.org/10.1109/ITNG.2012.163","url":null,"abstract":"An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images which are embedded in circulation images is evaluated with the Root Mean Square difference between the original secret image and extracted one from the circulation images. Mean while the conventional Multi- Resolution Analysis (MRA) based data hiding is attempted with a variety of parameters, level of MRA and the frequency component location of which secret image is replaced to it and is compared to the proposed method. It is found that the proposed data hiding method is superior to the conventional method. Also the conventional data hiding method is not robust against circulation image processing.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116229370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thiago Catoto Dias, André Luiz de Souza Fatala, Arnaldo de Moraes Pereira
This investigation proposes the creation of a Web Store, using Social Networks for increasing reliability and customer confidence. A social engine, developed by the authors, provides a simple and intuitive way to create a Web Store on the cloud. The concept was tested with a Usability Test, by the Research and Development Department of Magazine Luiza (one of the larger Retailer/E-retailer in Brazil). The initial results are promising and the Company is operating it as an in-house basis, in order to probe the concept. It is expected that this way the trust in the Magazine E-commerce operation will attain a higher confidence degree and thus get a larger share of the Brazilian market.
{"title":"Social Engine Web Store: Create Your Web Store and Publish It on Your Social Network","authors":"Thiago Catoto Dias, André Luiz de Souza Fatala, Arnaldo de Moraes Pereira","doi":"10.1109/ITNG.2012.73","DOIUrl":"https://doi.org/10.1109/ITNG.2012.73","url":null,"abstract":"This investigation proposes the creation of a Web Store, using Social Networks for increasing reliability and customer confidence. A social engine, developed by the authors, provides a simple and intuitive way to create a Web Store on the cloud. The concept was tested with a Usability Test, by the Research and Development Department of Magazine Luiza (one of the larger Retailer/E-retailer in Brazil). The initial results are promising and the Company is operating it as an in-house basis, in order to probe the concept. It is expected that this way the trust in the Magazine E-commerce operation will attain a higher confidence degree and thus get a larger share of the Brazilian market.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. G. Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato, Gerson Pereira Domingues, Felipe D'Oliveira
This paper presents a proposal for development of a system to map the violence that occurs at São Paulo City in real time, one of the most important Brazilian capitals. This solution must be available in a social network. The application is developed for mobile and uses the Android Platform. Its function is to assist users in their navigability in the city, warning them about points of risk to make people drive more safely. Elements were considered in this research as distance calculation, creation of risk points on the city map, a list of automation risk points automatically and a warning of approaching danger point. With the popularity of mobile devices using the Android Platform and due to the number of occurrences of violence happening in the cities it was found that there is a large market that can be achieved with the development of this platform to address applications - or reduce - this problem.
{"title":"System Development for Violence Mapping in a Social Network in Real Time","authors":"C. G. Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato, Gerson Pereira Domingues, Felipe D'Oliveira","doi":"10.1109/ITNG.2012.51","DOIUrl":"https://doi.org/10.1109/ITNG.2012.51","url":null,"abstract":"This paper presents a proposal for development of a system to map the violence that occurs at São Paulo City in real time, one of the most important Brazilian capitals. This solution must be available in a social network. The application is developed for mobile and uses the Android Platform. Its function is to assist users in their navigability in the city, warning them about points of risk to make people drive more safely. Elements were considered in this research as distance calculation, creation of risk points on the city map, a list of automation risk points automatically and a warning of approaching danger point. With the popularity of mobile devices using the Android Platform and due to the number of occurrences of violence happening in the cities it was found that there is a large market that can be achieved with the development of this platform to address applications - or reduce - this problem.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to design and develop a dynamic vocalization interface as telephone agent assistant. This interface uses tools such as, speech-to-text and text-to-speech software to translate the users' requests using a telephone. It consists of a number of libraries for recognition of multiple languages. This application aims for non-native individuals or groups who have accents and therefore have difficulties to utilize the speech recognition applications effectively. Since, the speech recognition engines utilized in telephone systems are generally developed for native language speakers. Although recent speech recognition systems have very intelligent speech recognition engine which can be tuned to any specific accent. They are not good candidates for the service industry, since a variety of users with a variety of accents use these applications for very short period of time and the speech recognition engines of these applications do not have enough time to adapt to many varieties of accents or pronunciations. In this paper, we develop a dynamic vocalization interface which can overcome this shortcoming and allows users with a variety of accents to effectively use the automated telephone systems and request services for their daily requirements. This application can also be utilized in various domains such as: health care, automobile industries to facilitate easier human to computer interactions.
{"title":"Development of Dynamic Vocalization Customer Service Software for Multiple Languages for Telephone Environment","authors":"S. Makki, Charles Williams","doi":"10.1109/ITNG.2012.137","DOIUrl":"https://doi.org/10.1109/ITNG.2012.137","url":null,"abstract":"This paper aims to design and develop a dynamic vocalization interface as telephone agent assistant. This interface uses tools such as, speech-to-text and text-to-speech software to translate the users' requests using a telephone. It consists of a number of libraries for recognition of multiple languages. This application aims for non-native individuals or groups who have accents and therefore have difficulties to utilize the speech recognition applications effectively. Since, the speech recognition engines utilized in telephone systems are generally developed for native language speakers. Although recent speech recognition systems have very intelligent speech recognition engine which can be tuned to any specific accent. They are not good candidates for the service industry, since a variety of users with a variety of accents use these applications for very short period of time and the speech recognition engines of these applications do not have enough time to adapt to many varieties of accents or pronunciations. In this paper, we develop a dynamic vocalization interface which can overcome this shortcoming and allows users with a variety of accents to effectively use the automated telephone systems and request services for their daily requirements. This application can also be utilized in various domains such as: health care, automobile industries to facilitate easier human to computer interactions.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124840616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Model Driven Engineering (MDE) and Component Based Software Development (CBSD) are promising approaches to deal with the increasing complexity of Distributed Real-Time Critical Embedded Systems. On one hand, the functionality complexity of embedded systems is rapidly growing. On the other hand, extra-functional properties (EFP) must be taken into account and resource consumption must be optimized due to limited resources. However, EFP are not independent and impact each other. This paper introduces concepts and mechanisms that allow to model security specifications and derive automatically the corresponding security implementations by transforming the original component model into a secured one taking into account sensitive data flow in the system. The resulted architecture ensures security requirements by construction and is expressed in the original meta model, therefore, it enables using the same timing analysis and synthesis as with the original component model.
{"title":"Modeling Security Aspects in Distributed Real-Time Component-Based Embedded Systems","authors":"Mehrdad Saadatmand, Thomas Leveque","doi":"10.1109/ITNG.2012.103","DOIUrl":"https://doi.org/10.1109/ITNG.2012.103","url":null,"abstract":"Model Driven Engineering (MDE) and Component Based Software Development (CBSD) are promising approaches to deal with the increasing complexity of Distributed Real-Time Critical Embedded Systems. On one hand, the functionality complexity of embedded systems is rapidly growing. On the other hand, extra-functional properties (EFP) must be taken into account and resource consumption must be optimized due to limited resources. However, EFP are not independent and impact each other. This paper introduces concepts and mechanisms that allow to model security specifications and derive automatically the corresponding security implementations by transforming the original component model into a secured one taking into account sensitive data flow in the system. The resulted architecture ensures security requirements by construction and is expressed in the original meta model, therefore, it enables using the same timing analysis and synthesis as with the original component model.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An automatic anomalous human behaviour detection is one of the goals of smart surveillance systems' domain of research. The automatic detection addresses several human factor issues underlying the existing surveillance systems. To create such a detection system, contextual information needs to be considered. This is because context is required in order to understand human behaviour. Unfortunately, the use of contextual information is still limited in the automatic anomalous human behaviour detection approaches. This paper proposes a context space model which has two benefits: (a) It provides guidelines for the system designers to select information which can be used to describe context, (b) It enables a system to distinguish between different contexts. A comparative analysis is conducted between a context-based system which employs the proposed context space model and a system which is implemented based on one of the existing approaches. The comparison is applied on a scenario constructed using video clips from CAVIAR dataset. The results show that the context-based system outperforms the other system. This is because the context space model allows the system to consider knowledge learned from the relevant context only.
{"title":"A Context Space Model for Detecting Anomalous Behaviour in Video Surveillance","authors":"A. Wiliem, V. Madasu, W. Boles, P. Yarlagadda","doi":"10.1109/ITNG.2012.11","DOIUrl":"https://doi.org/10.1109/ITNG.2012.11","url":null,"abstract":"An automatic anomalous human behaviour detection is one of the goals of smart surveillance systems' domain of research. The automatic detection addresses several human factor issues underlying the existing surveillance systems. To create such a detection system, contextual information needs to be considered. This is because context is required in order to understand human behaviour. Unfortunately, the use of contextual information is still limited in the automatic anomalous human behaviour detection approaches. This paper proposes a context space model which has two benefits: (a) It provides guidelines for the system designers to select information which can be used to describe context, (b) It enables a system to distinguish between different contexts. A comparative analysis is conducted between a context-based system which employs the proposed context space model and a system which is implemented based on one of the existing approaches. The comparison is applied on a scenario constructed using video clips from CAVIAR dataset. The results show that the context-based system outperforms the other system. This is because the context space model allows the system to consider knowledge learned from the relevant context only.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129983624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Topic - based search provides a promising paradigm for formulating complex semantic queries and representing results on the semantic web. A challenge for the application of the paradigm is the complexity of providing topic - based search services through application programming interfaces (API) and web services. In this paper topic specific search is done on domain like plants and animals. Using the ontology of animal and plant kingdom, the search engine is trained for topic based searching by constructing XML file for various plants and animals. Several images of plants and animals are crawled and classified into the various categories of animals and plants. The search results include the detail information of animal or plant searched along with the image of that category. An additional image filtering tool is designed to narrow down search results according to the user need.
{"title":"Semantic Web: A Topic Specific Search","authors":"K. Dharavath, S. Saritha","doi":"10.1109/ITNG.2012.29","DOIUrl":"https://doi.org/10.1109/ITNG.2012.29","url":null,"abstract":"Topic - based search provides a promising paradigm for formulating complex semantic queries and representing results on the semantic web. A challenge for the application of the paradigm is the complexity of providing topic - based search services through application programming interfaces (API) and web services. In this paper topic specific search is done on domain like plants and animals. Using the ontology of animal and plant kingdom, the search engine is trained for topic based searching by constructing XML file for various plants and animals. Several images of plants and animals are crawled and classified into the various categories of animals and plants. The search results include the detail information of animal or plant searched along with the image of that category. An additional image filtering tool is designed to narrow down search results according to the user need.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129117761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original "1-out-of-n" ring signature. For instance, "t-out-of-n" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification.
{"title":"Security Analysis Concerning the Random Numbers of Threshold Ring Signatures","authors":"Kaibin Huang, R. Tso","doi":"10.1109/ITNG.2012.95","DOIUrl":"https://doi.org/10.1109/ITNG.2012.95","url":null,"abstract":"Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original \"1-out-of-n\" ring signature. For instance, \"t-out-of-n\" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}