首页 > 最新文献

Lahore Garrison University Research Journal of Computer Science and Information Technology最新文献

英文 中文
A Technique and Architectural Design for Criminal Detection based on Lombroso Theory Using Deep Learning 基于Lombroso理论的深度学习犯罪侦查技术与体系结构设计
Pub Date : 2020-09-25 DOI: 10.54692/lgurjcsit.2020.040398
Kiran Amjad, Prof Dr. Aftab Ahmad Malik, Dr. Sumet Mehta
Crimes and criminal activities are increasing day by day and there are no proper criteria to search, detect, identify, and predict these criminals. Despite various surveillance cameras in different areas still, crimes are at a peak. The police investigation department cannot efficiently detect the criminals in time. However, in many countries for the sake of public and private security, the initiation of security technologies has been employed for criminal identification or recognition with the help of footprint identification, fingerprint identification, facial recognition, or based on other suspicious activity detections through surveillance cameras. However, there are limited automated systems that can identify the criminals precisely and get the accurate or precise similarity between the recorded footage images with the criminals that already are available in the police criminal records. To make the police investigation department more effective, this research work presents the design of an automated criminal detection system for the prediction of criminals. The proposed system can predict criminals or possibilities of being criminal based on Lombrosso's Theory of Criminology about born criminals or the persons who look like criminals. A deep learning-based facial recognition approach was used that can detect or predict any person whether he is criminal, or not and that can also give the possibility of being criminal. For training, the ResNet50 model was used, which is based on CNN and SVM Classifiers for feature extracting from the dataset. Two different labeled based datasets were used, having different criminals and noncriminals images in the database. The proposed system could efficiently help the investigating officers in narrowing down the suspects' pool.
犯罪和犯罪活动日益增多,没有适当的标准来搜索、发现、识别和预测这些罪犯。尽管不同地区仍有各种监控摄像头,但犯罪活动仍处于高峰。警方侦查部门无法及时有效地发现犯罪分子。然而,在许多国家,出于公共和私人安全的考虑,安全技术的启动已被用于在足迹识别、指纹识别、面部识别或基于其他可疑活动检测的监控摄像机的帮助下进行犯罪识别或识别。然而,有有限的自动化系统,可以准确地识别罪犯,并获得准确或精确的相似性之间的录像图像与已经在警方犯罪记录中可用的罪犯。为了提高公安侦查部门的工作效率,本研究工作提出了一种预测犯罪分子的自动侦查系统的设计。该系统可以根据隆布罗索的犯罪学理论预测罪犯或成为罪犯的可能性,即天生的罪犯或看起来像罪犯的人。使用了一种基于深度学习的面部识别方法,可以检测或预测任何人是否犯罪,也可以提供犯罪的可能性。对于训练,使用ResNet50模型,该模型基于CNN和SVM分类器对数据集进行特征提取。使用了两个不同的基于标记的数据集,数据库中有不同的罪犯和非罪犯图像。该系统可以有效地帮助调查人员缩小嫌疑人的范围。
{"title":"A Technique and Architectural Design for Criminal Detection based on Lombroso Theory Using Deep Learning","authors":"Kiran Amjad, Prof Dr. Aftab Ahmad Malik, Dr. Sumet Mehta","doi":"10.54692/lgurjcsit.2020.040398","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040398","url":null,"abstract":"Crimes and criminal activities are increasing day by day and there are no proper criteria to search, detect, identify, and predict these criminals. Despite various surveillance cameras in different areas still, crimes are at a peak. The police investigation department cannot efficiently detect the criminals in time. However, in many countries for the sake of public and private security, the initiation of security technologies has been employed for criminal identification or recognition with the help of footprint identification, fingerprint identification, facial recognition, or based on other suspicious activity detections through surveillance cameras. However, there are limited automated systems that can identify the criminals precisely and get the accurate or precise similarity between the recorded footage images with the criminals that already are available in the police criminal records. To make the police investigation department more effective, this research work presents the design of an automated criminal detection system for the prediction of criminals. The proposed system can predict criminals or possibilities of being criminal based on Lombrosso's Theory of Criminology about born criminals or the persons who look like criminals. A deep learning-based facial recognition approach was used that can detect or predict any person whether he is criminal, or not and that can also give the possibility of being criminal. For training, the ResNet50 model was used, which is based on CNN and SVM Classifiers for feature extracting from the dataset. Two different labeled based datasets were used, having different criminals and noncriminals images in the database. The proposed system could efficiently help the investigating officers in narrowing down the suspects' pool.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Time Complexity of Color Camera Depth Map Hand Edge Closing Recognition Algorithm 彩色相机深度图手边缘闭合识别算法的时间复杂度
Pub Date : 2020-09-25 DOI: 10.54692/lgurjcsit.2020.040395
Shahan Yamin Siddiqui, , Ghanwa Batool, Muhammad Sohail Irshad, Hafiz Muhammad Usama, Muhammad Tariq Siddique, Bilal Shoaib, Sajid Farooq, , Arfa Hassan
The objective of this paper is to calculate the time complexity of the colored camera depth map hand edge closing algorithm of the hand gesture recognition technique. It has been identified as hand gesture recognition through human-computer interaction using color camera and depth map technique, which is used to find the time complexity of the algorithms using 2D minima methods, brute force, and plane sweep. Human-computer interaction is a very much essential component of most people's daily life. The goal of gesture recognition research is to establish a system that can classify specific human gestures and can make its use to convey information for the device control. These methods have different input types and different classifiers and techniques to identify hand gestures. This paper includes the algorithm of one of the hand gesture recognition “Color camera depth map hand edge recognition” algorithm and its time complexity and simulation on MATLAB.
本文的目的是计算手势识别技术中彩色相机深度图手边缘闭合算法的时间复杂度。它被确定为使用彩色相机和深度图技术通过人机交互进行手势识别,该技术用于使用2D最小方法,蛮力和平面扫描来发现算法的时间复杂度。人机交互是大多数人日常生活中必不可少的组成部分。手势识别研究的目标是建立一个能够对特定的人类手势进行分类的系统,并使其能够为设备控制传递信息。这些方法有不同的输入类型和不同的分类器和技术来识别手势。本文介绍了手势识别中的一种算法“彩色相机深度图手边缘识别”算法及其时间复杂度,并在MATLAB上进行了仿真。
{"title":"Time Complexity of Color Camera Depth Map Hand Edge Closing Recognition Algorithm","authors":"Shahan Yamin Siddiqui, , Ghanwa Batool, Muhammad Sohail Irshad, Hafiz Muhammad Usama, Muhammad Tariq Siddique, Bilal Shoaib, Sajid Farooq, , Arfa Hassan","doi":"10.54692/lgurjcsit.2020.040395","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040395","url":null,"abstract":"The objective of this paper is to calculate the time complexity of the colored camera depth map hand edge closing algorithm of the hand gesture recognition technique. It has been identified as hand gesture recognition through human-computer interaction using color camera and depth map technique, which is used to find the time complexity of the algorithms using 2D minima methods, brute force, and plane sweep. Human-computer interaction is a very much essential component of most people's daily life. The goal of gesture recognition research is to establish a system that can classify specific human gestures and can make its use to convey information for the device control. These methods have different input types and different classifiers and techniques to identify hand gestures. This paper includes the algorithm of one of the hand gesture recognition “Color camera depth map hand edge recognition” algorithm and its time complexity and simulation on MATLAB.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131203122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preservation of Privacy of Big Data Using Efficient Anonymization Technique 利用高效匿名化技术保护大数据隐私
Pub Date : 2020-09-25 DOI: 10.54692/lgurjcsit.2020.040399
Dr. Muhammad Rizwan
Big data needs to be retained private because of the increase in the amount of data. Data is generated from social networks, organizations and various other ways, which is known as big data. Big data requires large storage as well as high computational power. At every stage, the data needs to be protected. Privacy preservation plays an important role in keeping sensitive information protected and private from any attack. Data anonymization is one of the techniques to anonymize data to keep it private and protected, which includes suppression, generalization, and bucketization. It keeps personal and private data anonymous from being known by others. But when it is implemented on big data, these techniques cause a great loss of information and also fail in defense of the privacy of big data. Moreover, for the scenario of big data, the anonymization should not only focus on hiding but also on other aspects. This paper aims to provide a technique that uses slicing, suppression, and functional encryption together to achieve better privacy of big data with data anonymization.
由于数据量的增加,大数据需要保持私有。数据是从社交网络、组织和各种其他方式产生的,这被称为大数据。大数据需要大的存储空间和高的计算能力。在每个阶段,都需要保护数据。隐私保护在保护敏感信息免受任何攻击方面发挥着重要作用。数据匿名化是对数据进行匿名化以保持其私密性和受保护的技术之一,包括抑制、泛化和分类。它使个人和私人数据保持匿名,不被其他人知道。但在大数据上实施时,这些技术造成了很大的信息丢失,也无法保护大数据的隐私。此外,对于大数据场景,匿名化不仅要关注隐藏,还要关注其他方面。本文旨在提供一种将切片、抑制和功能加密相结合的技术,通过数据匿名化来实现更好的大数据隐私。
{"title":"Preservation of Privacy of Big Data Using Efficient Anonymization Technique","authors":"Dr. Muhammad Rizwan","doi":"10.54692/lgurjcsit.2020.040399","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040399","url":null,"abstract":"Big data needs to be retained private because of the increase in the amount of data. Data is generated from social networks, organizations and various other ways, which is known as big data. Big data requires large storage as well as high computational power. At every stage, the data needs to be protected. Privacy preservation plays an important role in keeping sensitive information protected and private from any attack. Data anonymization is one of the techniques to anonymize data to keep it private and protected, which includes suppression, generalization, and bucketization. It keeps personal and private data anonymous from being known by others. But when it is implemented on big data, these techniques cause a great loss of information and also fail in defense of the privacy of big data. Moreover, for the scenario of big data, the anonymization should not only focus on hiding but also on other aspects. This paper aims to provide a technique that uses slicing, suppression, and functional encryption together to achieve better privacy of big data with data anonymization.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121926061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Step Towards the Development of Socio-cognitive Agent 社会认知主体发展的一步
Pub Date : 2020-09-25 DOI: 10.54692/lgurjcsit.2020.040396
Asma Kanwal, Wajahat Mahmood Qazi, Muhammad Atif Altaf, Atifa Athar, Mahmood Hussain, Syed Tanweer Shah Bukhari, Abeo Timothy Apasiba
The embodiment of consciousness in socio-cognitive agents play a significant role in their acceptance as co-partners. Man-machine social interaction’s success is based on the agent’s generated believable behaviors. In this regard, such an agent needs to generate realistic beliefs, intentions, goals, self-regulation, verbal, and non-verbal communication (including gestures) according to the context of ongoing interaction is very important. This study hypothesizes that the implementation of the Theory of mind (TOM) may allow the agent to change its intentions, beliefs, and desires by predicting the existing perspective and mental states of the other agents involved in the given social interaction. To study the complexity of dynamics in a social context we have taken the case study of the ‘paper-scissor-rock’ game and developed a cognitive agent capable of using gestures for non-verbal communication following the Theory of mind. This work is in progress and is being developed on the iCub robot simulation. We have used tapped delay line neural networks as the basis for reinforcement learning and strategic planning. This paper will report the cognitive model, neural network initial results obtained.
意识在社会认知主体中的体现在他们作为合作伙伴的接受中起着重要的作用。人机社会互动的成功建立在智能体产生可信行为的基础上。在这方面,这样的agent需要根据正在进行的交互的上下文产生现实的信念、意图、目标、自我调节、语言和非语言交流(包括手势)是非常重要的。本研究假设心理理论(TOM)的实施可能允许行为人通过预测参与特定社会互动的其他行为人的现有观点和心理状态来改变其意图、信念和欲望。为了研究社会背景下动态的复杂性,我们以“剪刀布-石头”游戏为例,根据心智理论开发了一种能够使用手势进行非语言交流的认知代理。这项工作正在进行中,并正在对iCub机器人进行模拟开发。我们使用抽头延迟线神经网络作为强化学习和策略规划的基础。本文将报告认知模型、神经网络初步获得的结果。
{"title":"A Step Towards the Development of Socio-cognitive Agent","authors":"Asma Kanwal, Wajahat Mahmood Qazi, Muhammad Atif Altaf, Atifa Athar, Mahmood Hussain, Syed Tanweer Shah Bukhari, Abeo Timothy Apasiba","doi":"10.54692/lgurjcsit.2020.040396","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040396","url":null,"abstract":"The embodiment of consciousness in socio-cognitive agents play a significant role in their acceptance as co-partners. Man-machine social interaction’s success is based on the agent’s generated believable behaviors. In this regard, such an agent needs to generate realistic beliefs, intentions, goals, self-regulation, verbal, and non-verbal communication (including gestures) according to the context of ongoing interaction is very important. This study hypothesizes that the implementation of the Theory of mind (TOM) may allow the agent to change its intentions, beliefs, and desires by predicting the existing perspective and mental states of the other agents involved in the given social interaction. To study the complexity of dynamics in a social context we have taken the case study of the ‘paper-scissor-rock’ game and developed a cognitive agent capable of using gestures for non-verbal communication following the Theory of mind. This work is in progress and is being developed on the iCub robot simulation. We have used tapped delay line neural networks as the basis for reinforcement learning and strategic planning. This paper will report the cognitive model, neural network initial results obtained.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126055919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Tuberculosis using Hybrid Features from Chest Radiographs 利用胸片混合特征检测肺结核
Pub Date : 2020-09-25 DOI: 10.54692/lgurjcsit.2020.040397
Maham Mehr Awan, Ayesha Fatima, Kinza Mehr Awan
Tuberculosis is a contagious disease, but it’s diagnosis is still a difficult and challenging task as it is considered a big threat everywhere on the planet. Literature shows that underdeveloped countries widely use chest radiographs (X ray images) for the diagnosis of tuberculosis. Low accuracy of results and high cost are the two main reasons due to which most of the available methods are not useful for radiologists. In our research, we proposed a detection technique in which features extraction is performed on the basis of their texture, intensity and shape. For evaluating the performance of our proposed methodology, Montgomery Country (MC) dataset is used. It is a publically available data set which consists of 138 CXRs; among them, 80 CXRs are normal and 58 CXRs are malignant. The results of the proposed technique have outperformed state of the art methodologies on the MC dataset as it has shown 81.16% accuracy.
结核病是一种传染性疾病,但它的诊断仍然是一项艰巨而具有挑战性的任务,因为它被认为是地球上任何地方的一大威胁。文献显示,欠发达国家广泛使用胸片(X线图像)诊断结核病。结果准确性低和成本高是导致大多数现有方法对放射科医生无效的两个主要原因。在我们的研究中,我们提出了一种基于特征的纹理、强度和形状进行特征提取的检测技术。为了评估我们提出的方法的性能,使用了蒙哥马利国家(MC)数据集。这是一个公开可用的数据集,由138个cxr组成;其中正常80例,恶性58例。在MC数据集上,所提出的技术的结果优于目前最先进的方法,因为它显示出81.16%的准确率。
{"title":"Detection of Tuberculosis using Hybrid Features from Chest Radiographs","authors":"Maham Mehr Awan, Ayesha Fatima, Kinza Mehr Awan","doi":"10.54692/lgurjcsit.2020.040397","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040397","url":null,"abstract":"Tuberculosis is a contagious disease, but it’s diagnosis is still a difficult and challenging task as it is considered a big threat everywhere on the planet. Literature shows that underdeveloped countries widely use chest radiographs (X ray images) for the diagnosis of tuberculosis. Low accuracy of results and high cost are the two main reasons due to which most of the available methods are not useful for radiologists. In our research, we proposed a detection technique in which features extraction is performed on the basis of their texture, intensity and shape. For evaluating the performance of our proposed methodology, Montgomery Country (MC) dataset is used. It is a publically available data set which consists of 138 CXRs; among them, 80 CXRs are normal and 58 CXRs are malignant. The results of the proposed technique have outperformed state of the art methodologies on the MC dataset as it has shown 81.16% accuracy.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usability Analysis of University Websites in Pakistan 巴基斯坦大学网站可用性分析
Pub Date : 2020-06-25 DOI: 10.54692/lgurjcsit.2020.0402131
Jawad Hassan
Usability analysis of a website determines how easy it is for the user to navigate between the pages, find information of interest, and his overall experience of the usage. Good website design is focused on the user experience. Usability is one of the major factors deciding the product's value. It can decide what value the product holds for its user hence the importance of website usability cannot be ignored. In this research, we have used different, manual, and automated heuristic evaluation methods to determine the usability of different Pakistani University websites. Our main goal is to provide some insight on the usability of these University websites as no such work has been done in the past on this. We evaluate a system based on heuristic evaluation and usability standards to measure its score. We also conducted an online survey on University students to get their feedback on their University website. We concluded that the user experience of most of the University websites in Pakistan fails from the usability perspective and students usually have to face a hard time finding the relevantinformation.
网站的可用性分析决定了用户在页面之间导航、查找感兴趣的信息以及总体使用体验的难易程度。好的网站设计注重用户体验。可用性是决定产品价值的主要因素之一。它可以决定产品对用户的价值,因此网站可用性的重要性不容忽视。在这项研究中,我们使用了不同的、手动的和自动的启发式评估方法来确定不同巴基斯坦大学网站的可用性。我们的主要目标是提供一些关于这些大学网站可用性的见解,因为过去没有这样的工作。我们基于启发式评估和可用性标准来评估系统以衡量其得分。我们还对大学生进行了一项在线调查,以获得他们在大学网站上的反馈。我们得出的结论是,从可用性的角度来看,巴基斯坦大多数大学网站的用户体验都是失败的,学生通常不得不面对寻找相关信息的困难。
{"title":"Usability Analysis of University Websites in Pakistan","authors":"Jawad Hassan","doi":"10.54692/lgurjcsit.2020.0402131","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402131","url":null,"abstract":"Usability analysis of a website determines how easy it is for the user to navigate between the pages, find information of interest, and his overall experience of the usage. Good website design is focused on the user experience. Usability is one of the major factors deciding the product's value. It can decide what value the product holds for its user hence the importance of website usability cannot be ignored. In this research, we have used different, manual, and automated heuristic evaluation methods to determine the usability of different Pakistani University websites. Our main goal is to provide some insight on the usability of these University websites as no such work has been done in the past on this. We evaluate a system based on heuristic evaluation and usability standards to measure its score. We also conducted an online survey on University students to get their feedback on their University website. We concluded that the user experience of most of the University websites in Pakistan fails from the usability perspective and students usually have to face a hard time finding the relevantinformation.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129764219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications of Internet of Vehicle(IoV): A Survey 车联网(IoV)的应用综述
Pub Date : 2020-06-25 DOI: 10.54692/lgurjcsit.2020.0402134
Irshad Ahmed Sumra
Due to the fast advancement in the field of communication and computation technology, the Internet of Vehicle (IoV) attracts most of the researchers to contribute in this area of research. In the recent research on the Internet of Vehicle (IoV) technology, IoV becomes one of the major active and famous research areas in the technology of networks, especially in transportation. It provides an Intelligent Transportation System (ITS)and it resolves traffic and driving problems by using advanced communication and information technology. Inthe implementation of IoV, the different actuators, sensors, personal gadgets are required so that the vehicles communicate with each other. In this paper, it will provide the comprehensive survey on applications of IoV and also discuss in detail IoVnetwork model, the required technologies for the creation of IoV, the various applications which are based on existing technologies and the features of research in IoV area and Vehicular Sensor Network (VSN's) based effective and security-oriented applications. The key objective of these applications is to reduce fuel consumption and furthermore to provide a supportin saving the life of drivers andpedestrians.
由于通信和计算技术的快速发展,车联网吸引了众多研究人员在这一领域进行研究。在近年来对车联网(IoV)技术的研究中,车联网技术成为网络技术特别是交通领域最活跃和著名的研究领域之一。它提供了一个智能交通系统(ITS),并通过使用先进的通信和信息技术来解决交通和驾驶问题。在车联网的实施中,需要不同的执行器、传感器、个人设备,以便车辆相互通信。本文将对车联网的应用进行全面的综述,并详细讨论车联网网络模型、创建车联网所需的技术、基于现有技术的各种应用、车联网领域的研究特点以及基于有效和安全的车联网应用。这些应用的主要目标是减少燃料消耗,并进一步提供支持,以挽救司机和行人的生命。
{"title":"Applications of Internet of Vehicle(IoV): A Survey","authors":"Irshad Ahmed Sumra","doi":"10.54692/lgurjcsit.2020.0402134","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402134","url":null,"abstract":"Due to the fast advancement in the field of communication and computation technology, the Internet of Vehicle (IoV) attracts most of the researchers to contribute in this area of research. In the recent research on the Internet of Vehicle (IoV) technology, IoV becomes one of the major active and famous research areas in the technology of networks, especially in transportation. It provides an Intelligent Transportation System (ITS)and it resolves traffic and driving problems by using advanced communication and information technology. Inthe implementation of IoV, the different actuators, sensors, personal gadgets are required so that the vehicles communicate with each other. In this paper, it will provide the comprehensive survey on applications of IoV and also discuss in detail IoVnetwork model, the required technologies for the creation of IoV, the various applications which are based on existing technologies and the features of research in IoV area and Vehicular Sensor Network (VSN's) based effective and security-oriented applications. The key objective of these applications is to reduce fuel consumption and furthermore to provide a supportin saving the life of drivers andpedestrians.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133188778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cognitive Modelling for User Interface Design in HCI: A Comparative Analysis on Cognitive Models 人机交互中用户界面设计的认知模型:认知模型的比较分析
Pub Date : 2020-06-25 DOI: 10.54692/lgurjcsit.2020.0402138
Sundas Munir
This research aims to elaborate the cognition in the field of human-computer interaction, also acknowledges the cognitive modeling and human behavior processes. Cognitive modeling is a field of Human-Computer Interaction (HCI) which is used to design more efficient human interactive systems. It is used to model the interactive system in such a way that analysts can determine methods that users will interact with the system and also be used to understand the different processes of cognitive human behaviors. Hierarchal task analysis is a task to goal-based model, in which analyst selects the actions and tasks to perform. GOMS is a cognitive knowledge of the human information processing model in HCI that describes the user's cognitive architecture based on four components. The linguistic and grammatical model is a syntactical model in which languages and syntax are designed for the user for system communication in an interactive system. Cognitive human behavior processes are also described to understand the mutual coordination of cognition processes and cognitivemodels in designing an interactive system. Problem-solving is a cognitive process of the human mind to search for a problem and explore the possible solutions for that problem. Decision making is also a cognitive process of human behaviour in which human chooses an action from other alternatives based on certain criteria.
本研究旨在阐述人机交互领域的认知,并承认认知建模和人类行为过程。认知建模是人机交互(HCI)的一个领域,用于设计更高效的人机交互系统。它被用来对交互系统建模,使分析人员能够确定用户将与系统交互的方法,并用于理解认知人类行为的不同过程。分层任务分析是一种基于任务到目标的模型,在该模型中,分析人员选择要执行的操作和任务。GOMS是HCI中人类信息处理模型的认知知识,它描述了基于四个组件的用户认知架构。语言和语法模型是一种句法模型,在这种模型中,语言和语法是为用户设计的,以便在交互式系统中进行系统通信。在设计交互系统时,还描述了人类认知行为过程,以了解认知过程和认知模型之间的相互协调。解决问题是人类思维寻找问题并探索问题可能解决方案的认知过程。决策也是人类行为的一个认知过程,在这个过程中,人类根据一定的标准从其他选项中选择一种行动。
{"title":"Cognitive Modelling for User Interface Design in HCI: A Comparative Analysis on Cognitive Models","authors":"Sundas Munir","doi":"10.54692/lgurjcsit.2020.0402138","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402138","url":null,"abstract":"This research aims to elaborate the cognition in the field of human-computer interaction, also acknowledges the cognitive modeling and human behavior processes. Cognitive modeling is a field of Human-Computer Interaction (HCI) which is used to design more efficient human interactive systems. It is used to model the interactive system in such a way that analysts can determine methods that users will interact with the system and also be used to understand the different processes of cognitive human behaviors. Hierarchal task analysis is a task to goal-based model, in which analyst selects the actions and tasks to perform. GOMS is a cognitive knowledge of the human information processing model in HCI that describes the user's cognitive architecture based on four components. The linguistic and grammatical model is a syntactical model in which languages and syntax are designed for the user for system communication in an interactive system. Cognitive human behavior processes are also described to understand the mutual coordination of cognition processes and cognitivemodels in designing an interactive system. Problem-solving is a cognitive process of the human mind to search for a problem and explore the possible solutions for that problem. Decision making is also a cognitive process of human behaviour in which human chooses an action from other alternatives based on certain criteria.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125856104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Internet of Things for Smart City and Environmental Solutions 物联网在智慧城市和环境解决方案中的应用
Pub Date : 2020-06-25 DOI: 10.54692/lgurjcsit.2020.0402137
Afrozah Nadeem
Internet of Things (IoT) is the latest concept and considered the essential infrastructure for smart cities. However, IoT is allowing smart cities to take the initiative of starting different projects and its deployment all over the world. For Information & Communication Technologies (ICT) solutions, IoT is a compatible way to combine the numerous sensors. Communication of the Internet of Things is the soul of the smart cities. The scopeof IoT in smart cities is connected and deployed with over 50 billion objects this year and more in the future too. This paper deals with concern regarding IoT globally and a detailed review of the idea of IoT with the smart city encouragement and its applications. Furthermore, the paper presents the main gap, instability, and challenges of implementing the IoT with smart cities on technological standards.
物联网(IoT)是最新的概念,被认为是智慧城市的基本基础设施。然而,物联网使智慧城市能够主动启动不同的项目并在全球范围内部署。对于信息和通信技术(ICT)解决方案,物联网是一种结合众多传感器的兼容方式。物联网的通信是智慧城市的灵魂。智慧城市的物联网范围在今年连接和部署了超过500亿个物体,未来还会有更多。本文讨论了全球对物联网的关注,并详细回顾了物联网的概念与智慧城市的鼓励及其应用。此外,本文还介绍了在技术标准上实现智慧城市物联网的主要差距、不稳定性和挑战。
{"title":"Application of Internet of Things for Smart City and Environmental Solutions","authors":"Afrozah Nadeem","doi":"10.54692/lgurjcsit.2020.0402137","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402137","url":null,"abstract":"Internet of Things (IoT) is the latest concept and considered the essential infrastructure for smart cities. However, IoT is allowing smart cities to take the initiative of starting different projects and its deployment all over the world. For Information & Communication Technologies (ICT) solutions, IoT is a compatible way to combine the numerous sensors. Communication of the Internet of Things is the soul of the smart cities. The scopeof IoT in smart cities is connected and deployed with over 50 billion objects this year and more in the future too. This paper deals with concern regarding IoT globally and a detailed review of the idea of IoT with the smart city encouragement and its applications. Furthermore, the paper presents the main gap, instability, and challenges of implementing the IoT with smart cities on technological standards.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131713327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operating Systems for the Internet of Things:A Survey 物联网操作系统:调查
Pub Date : 2020-06-25 DOI: 10.54692/lgurjcsit.2020.0402135
Anum Ali
Machine-to-Machine (M2M) is an ecosystem that is used to describe any technology deploying and creating a network of devices to perform actions and exchange information. This new class of communicating devices have very diverse traffic characteristics and pose unique challenges. This paper surveys the state-of-the-art operating system technologies, architectures and available networking stack protocols on it, and explore their potential to support the growth of related applications. Moreover, the diversity of applications and the Internet of Things (IoT) devices also necessitate the investigation of middleware framework and specifications to cater to the currently existing challenges. Therefore, we also discuss different challenges and issues in developing rich applications by using available operating systems. The paper concludes after providing recommendations for future enhancement in existing operating systems.
机器对机器(M2M)是一个生态系统,用于描述部署和创建设备网络以执行操作和交换信息的任何技术。这种新型通信设备具有非常多样化的流量特性,并提出了独特的挑战。本文调查了最新的操作系统技术、体系结构和可用的网络堆栈协议,并探讨了它们支持相关应用程序增长的潜力。此外,应用程序和物联网(IoT)设备的多样性也需要对中间件框架和规范进行研究,以适应当前存在的挑战。因此,我们还讨论了通过使用可用的操作系统开发富应用程序的不同挑战和问题。最后,本文为现有操作系统的未来增强提供了建议。
{"title":"Operating Systems for the Internet of Things:A Survey","authors":"Anum Ali","doi":"10.54692/lgurjcsit.2020.0402135","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402135","url":null,"abstract":"Machine-to-Machine (M2M) is an ecosystem that is used to describe any technology deploying and creating a network of devices to perform actions and exchange information. This new class of communicating devices have very diverse traffic characteristics and pose unique challenges. This paper surveys the state-of-the-art operating system technologies, architectures and available networking stack protocols on it, and explore their potential to support the growth of related applications. Moreover, the diversity of applications and the Internet of Things (IoT) devices also necessitate the investigation of middleware framework and specifications to cater to the currently existing challenges. Therefore, we also discuss different challenges and issues in developing rich applications by using available operating systems. The paper concludes after providing recommendations for future enhancement in existing operating systems.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Lahore Garrison University Research Journal of Computer Science and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1