Pub Date : 2015-11-05DOI: 10.1109/ITECHA.2015.7317399
Sergey Shaydullin, Andrey Turkin, Nikolay Chelyshev
In many applications of computer vision one must deal with images that are distorted by noise which level cannot be estimated exactly. In this work we discuss a template matching framework which uses optimal nonlinear distortion-tolerant filtering technique and can be applied for noisy images. In this paper we assess the accuracy of this framework under conditions of uncertainty in level of noise.
{"title":"Template matching for noisy images","authors":"Sergey Shaydullin, Andrey Turkin, Nikolay Chelyshev","doi":"10.1109/ITECHA.2015.7317399","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317399","url":null,"abstract":"In many applications of computer vision one must deal with images that are distorted by noise which level cannot be estimated exactly. In this work we discuss a template matching framework which uses optimal nonlinear distortion-tolerant filtering technique and can be applied for noisy images. In this paper we assess the accuracy of this framework under conditions of uncertainty in level of noise.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115151027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITECHA.2015.7317404
A. Osanlou, R. Earnshaw, P. Excell, R. Osanlou, O. Osanlou, E. Osanlou
The use of internet based communication has promising applications for healthcare. Information sourced from social media has the potential to transform medical research and the construction of Public health policies. Wireless technologies give healthcare providers the opportunity to monitor patients in the community reducing costly hospital stays and enabling earlier disease intervention. Whilst increased access to health information can empower patients, reliability of information is a problem due to lack of quality assurance. Furthermore patients are at risk of receiving incorrect or out of context information and having their confidentiality breached for commercial purposes. Main internet based communication trends and challenges impacting the healthcare sector are reviewed.
{"title":"Internet based communication in healthcare","authors":"A. Osanlou, R. Earnshaw, P. Excell, R. Osanlou, O. Osanlou, E. Osanlou","doi":"10.1109/ITECHA.2015.7317404","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317404","url":null,"abstract":"The use of internet based communication has promising applications for healthcare. Information sourced from social media has the potential to transform medical research and the construction of Public health policies. Wireless technologies give healthcare providers the opportunity to monitor patients in the community reducing costly hospital stays and enabling earlier disease intervention. Whilst increased access to health information can empower patients, reliability of information is a problem due to lack of quality assurance. Furthermore patients are at risk of receiving incorrect or out of context information and having their confidentiality breached for commercial purposes. Main internet based communication trends and challenges impacting the healthcare sector are reviewed.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121365721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITECHA.2015.7317447
A. Abou Almal, H. Alhassan, R. Abd‐Alhameed, S. Jones, H. AlAhmad
In this paper, seventeen years of radiosonde meteorological data from 1997-2013 are analyzed for the subtropical Arabian Gulf region. The upper air refractivity, Nh, and vertical refractivity gradient, ΔN, are determined in the low troposphere using existing linear and exponential relationships in the literature. The study focusses on three layer heights at 65 m, 100 m and 1 km above ground level. The height coefficient parameter of the ITU exponential model has been investigated for each component in each layer, and considerable variation in this value is observed for each case. Correlation between the components of Ns with both Nh and ΔN are studied for each atmospheric layer.
{"title":"Investigation of height coefficient in Arabian Gulf","authors":"A. Abou Almal, H. Alhassan, R. Abd‐Alhameed, S. Jones, H. AlAhmad","doi":"10.1109/ITECHA.2015.7317447","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317447","url":null,"abstract":"In this paper, seventeen years of radiosonde meteorological data from 1997-2013 are analyzed for the subtropical Arabian Gulf region. The upper air refractivity, Nh, and vertical refractivity gradient, ΔN, are determined in the low troposphere using existing linear and exponential relationships in the literature. The study focusses on three layer heights at 65 m, 100 m and 1 km above ground level. The height coefficient parameter of the ITU exponential model has been investigated for each component in each layer, and considerable variation in this value is observed for each case. Correlation between the components of Ns with both Nh and ΔN are studied for each atmospheric layer.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITECHA.2015.7317374
Hussain Alshamrani, B. Ghita, David Lancaster
In spite of significant ongoing research, the Border gateway protocol (BGP) still encompasses conceptual vulnerability issues regarding impersonating the ownership of IP prefixes for ASes (Autonomous Systems). In this context, a number of research studies focused on securing BGP through historical-based and statistical-based behavioural models. This paper proposes a novel algorithm aiming to track the behaviour of BGP edge routers and detect IP prefix hijacks based on a typical signature. The algorithm parses the BGP advertisements in order to detect the apparent relocation of specific IP prefixes, either in the same or in different regions. The algorithm aims to identify IP prefixes by multiple independent ASes. The method differs from routing consistency monitoring, which faces difficulties detecting events at the edge of the BGP infrastructure. Based on the RIRs' database, the algorithm can detect national and cross-border IP prefix hijacks very quick. However, 5 results out of 16 were not accurate therefore the algorithm has some false positives and needs further improvement to be done in future.
{"title":"Detecting IP prefix hijacking using data reduction-based and Binary Search Algorithm","authors":"Hussain Alshamrani, B. Ghita, David Lancaster","doi":"10.1109/ITECHA.2015.7317374","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317374","url":null,"abstract":"In spite of significant ongoing research, the Border gateway protocol (BGP) still encompasses conceptual vulnerability issues regarding impersonating the ownership of IP prefixes for ASes (Autonomous Systems). In this context, a number of research studies focused on securing BGP through historical-based and statistical-based behavioural models. This paper proposes a novel algorithm aiming to track the behaviour of BGP edge routers and detect IP prefix hijacks based on a typical signature. The algorithm parses the BGP advertisements in order to detect the apparent relocation of specific IP prefixes, either in the same or in different regions. The algorithm aims to identify IP prefixes by multiple independent ASes. The method differs from routing consistency monitoring, which faces difficulties detecting events at the edge of the BGP infrastructure. Based on the RIRs' database, the algorithm can detect national and cross-border IP prefix hijacks very quick. However, 5 results out of 16 were not accurate therefore the algorithm has some false positives and needs further improvement to be done in future.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114380518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITechA.2015.7317398
Mahdi H. Miraz, Maaruf Ali, P. Excell, R. Picking
The current prominence and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) are extensively reviewed and a summary survey report is presented. The analysis clearly distinguishes between IoT and IoE which are wrongly considered to be the same by many people. Upon examining the current advancement in the fields of IoT, IoE and IoNT, the paper presents scenarios for the possible future expansion of their applications.
{"title":"A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)","authors":"Mahdi H. Miraz, Maaruf Ali, P. Excell, R. Picking","doi":"10.1109/ITechA.2015.7317398","DOIUrl":"https://doi.org/10.1109/ITechA.2015.7317398","url":null,"abstract":"The current prominence and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) are extensively reviewed and a summary survey report is presented. The analysis clearly distinguishes between IoT and IoE which are wrongly considered to be the same by many people. Upon examining the current advancement in the fields of IoT, IoE and IoNT, the paper presents scenarios for the possible future expansion of their applications.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114577476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITECHA.2015.7317379
Mabrouka Abuhmida, K. Radhakrishnan, I. Wells
Location based protocols use the information of node's position to route the data. Routing the data in this case does not mean choosing the shortest path. It means choosing the available path based on the location information, this is one of the reasons that these protocols may fail the routing task in mobile Ad-hoc Networks (MANET) where the mobility of the nodes and the dynamic topology makes the routing task more difficult. Alternatively, the ANT colony optimization (ACO) based protocols will successfully find the shortest path to any desired destination in a MANET. To achieve reliable routing in MANET, these protocols extensively uses the control packets, consequently this will this will increase the network overhead. In this paper we present performance evaluation of ANTMANET, which is a novel MANET routing protocol based on the ACO algorithm. It utilizes the location information to minimize the search areas, which have great impact on improving the network overhead. It is observed that our bio-inspired protocol has outperformed AODV and LANMAR on different evaluation criteria such as delay, network overhead, while using the random-waypoint max-speed mobility model.
{"title":"Evaluating the performance of ANTMANET protocol for MANET","authors":"Mabrouka Abuhmida, K. Radhakrishnan, I. Wells","doi":"10.1109/ITECHA.2015.7317379","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317379","url":null,"abstract":"Location based protocols use the information of node's position to route the data. Routing the data in this case does not mean choosing the shortest path. It means choosing the available path based on the location information, this is one of the reasons that these protocols may fail the routing task in mobile Ad-hoc Networks (MANET) where the mobility of the nodes and the dynamic topology makes the routing task more difficult. Alternatively, the ANT colony optimization (ACO) based protocols will successfully find the shortest path to any desired destination in a MANET. To achieve reliable routing in MANET, these protocols extensively uses the control packets, consequently this will this will increase the network overhead. In this paper we present performance evaluation of ANTMANET, which is a novel MANET routing protocol based on the ACO algorithm. It utilizes the location information to minimize the search areas, which have great impact on improving the network overhead. It is observed that our bio-inspired protocol has outperformed AODV and LANMAR on different evaluation criteria such as delay, network overhead, while using the random-waypoint max-speed mobility model.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITECHA.2015.7317459
Cerys Alonso
There is an inherent message or story in handmade objects, which is defined by the maker's interaction. Its narrative is due in part to the physical and emotional relationship of the craftsperson, the degree of imperfection from the human touch, and it is fused with the significance placed on the object by the owner. This layering of stories and associated memories continues throughout the life of the item. Human touch stores memories: caused by repetition of use, leaving the marks of events as well as the people and places attached to them. This paper examines the significance of the maker's narrative within the Crafts, specifically within the field of Jewellery and how this can be amplified through embedded digital technologies. The paper explores the link between Human Computer Interaction and Craft through the interaction, emotional investment and embedded narrative from the perspective of maker and owner.
{"title":"The narrative of Craft: Digital capabilities within traditional stories","authors":"Cerys Alonso","doi":"10.1109/ITECHA.2015.7317459","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317459","url":null,"abstract":"There is an inherent message or story in handmade objects, which is defined by the maker's interaction. Its narrative is due in part to the physical and emotional relationship of the craftsperson, the degree of imperfection from the human touch, and it is fused with the significance placed on the object by the owner. This layering of stories and associated memories continues throughout the life of the item. Human touch stores memories: caused by repetition of use, leaving the marks of events as well as the people and places attached to them. This paper examines the significance of the maker's narrative within the Crafts, specifically within the field of Jewellery and how this can be amplified through embedded digital technologies. The paper explores the link between Human Computer Interaction and Craft through the interaction, emotional investment and embedded narrative from the perspective of maker and owner.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126438898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITECHA.2015.7317431
Maria Dzhigan, N. Danielyan, Denise Oram
This paper considers the educational process in the network society. The educational process is based on the usage of network technologies and modern computer networks. The definitions of active and passive students are introduced. The positive and negative phenomena in the network society are discussed.
{"title":"Education in the network society","authors":"Maria Dzhigan, N. Danielyan, Denise Oram","doi":"10.1109/ITECHA.2015.7317431","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317431","url":null,"abstract":"This paper considers the educational process in the network society. The educational process is based on the usage of network technologies and modern computer networks. The definitions of active and passive students are introduced. The positive and negative phenomena in the network society are discussed.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131947670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITECHA.2015.7317430
Olga Dzhigan, N. Danielyan, Denise Oram
Philosophic aspects of using network engineering and reflection of the emerging risks associated with them are considered in this paper. The author's current research is on the influence of social networks, the Internet, and virtual reality on the development of personalities, and interpersonal communications in the modern network society.
{"title":"Philosophy of social network engineering","authors":"Olga Dzhigan, N. Danielyan, Denise Oram","doi":"10.1109/ITECHA.2015.7317430","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317430","url":null,"abstract":"Philosophic aspects of using network engineering and reflection of the emerging risks associated with them are considered in this paper. The author's current research is on the influence of social networks, the Internet, and virtual reality on the development of personalities, and interpersonal communications in the modern network society.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131737843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.1109/ITECHA.2015.7317460
N. Danielyan, Denise Oram, V. Grout
This paper provides a philosophical analysis of Internet technologies from the perspective of the constructivism theory. Research shows that the active role of cognition is the most important aspect of the constructivism paradigm as a methodology for analyzing this type of technology. This reinforces the importance for Internet technologies to be explored as a qualitatively new sphere of human creative and constructive activities. Constructive realism can be seen to be the most appropriate approach when considering modern technological development, and characterizes the period of Internet technologies formation and progress. It reinforces the need to clarify features and to analyze the influence these technologies have on social reality and consequently to research new approaches to humanism. Humanism being understood as revealing transformations of social values and the meaning of human life from the perspective of Internet technological development; to research the development of new social and cultural standards, and the transformation of “old” traditional ones.
{"title":"Spatial cognition and philosophical issues of internet technologies","authors":"N. Danielyan, Denise Oram, V. Grout","doi":"10.1109/ITECHA.2015.7317460","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317460","url":null,"abstract":"This paper provides a philosophical analysis of Internet technologies from the perspective of the constructivism theory. Research shows that the active role of cognition is the most important aspect of the constructivism paradigm as a methodology for analyzing this type of technology. This reinforces the importance for Internet technologies to be explored as a qualitatively new sphere of human creative and constructive activities. Constructive realism can be seen to be the most appropriate approach when considering modern technological development, and characterizes the period of Internet technologies formation and progress. It reinforces the need to clarify features and to analyze the influence these technologies have on social reality and consequently to research new approaches to humanism. Humanism being understood as revealing transformations of social values and the meaning of human life from the perspective of Internet technological development; to research the development of new social and cultural standards, and the transformation of “old” traditional ones.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132972184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}