首页 > 最新文献

2013 5th International Conference on Information and Communication Technologies最新文献

英文 中文
Impact of automated short-answer marking on students' learning: IndusMarker, a case study 自动答题对学生学习的影响:industrusmarker的案例研究
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732782
R. Siddiqi
IndusMarker is an automated short-answer marking system based on structure-editing and structure-matching rather than extensive use of linguistic features analysis. Since IndusMarker cannot guarantee 100% human-system agreement rate, the use of IndusMarker has therefore been limited to conducting practice tests. It was expected that such a use of IndusMarker will lead to improvements in student learning and instructor-student interactions. The main aim of this paper is to verify these claims. The results indicate that such a use of IndusMarker leads to improvements in both student learning and instructor-student interactions. In addition, IndusMarker is also shown to give reasonably high human-system agreement rates even after the removal of all linguistic analysis features from the software.
industrusmarker是一个基于结构编辑和结构匹配的自动答题系统,而不是广泛使用语言特征分析。由于IndusMarker不能保证100%的人-系统一致性,因此,IndusMarker的使用仅限于进行实践测试。预计这样使用industrusmarker将导致学生学习和师生互动的改善。本文的主要目的是验证这些说法。结果表明,这样的使用IndusMarker导致学生学习和师生互动的改善。此外,即使在从软件中删除所有语言分析功能之后,industrusmarker也显示出相当高的人类系统一致性率。
{"title":"Impact of automated short-answer marking on students' learning: IndusMarker, a case study","authors":"R. Siddiqi","doi":"10.1109/ICICT.2013.6732782","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732782","url":null,"abstract":"IndusMarker is an automated short-answer marking system based on structure-editing and structure-matching rather than extensive use of linguistic features analysis. Since IndusMarker cannot guarantee 100% human-system agreement rate, the use of IndusMarker has therefore been limited to conducting practice tests. It was expected that such a use of IndusMarker will lead to improvements in student learning and instructor-student interactions. The main aim of this paper is to verify these claims. The results indicate that such a use of IndusMarker leads to improvements in both student learning and instructor-student interactions. In addition, IndusMarker is also shown to give reasonably high human-system agreement rates even after the removal of all linguistic analysis features from the software.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A proposed model of a color harmonizer application 一种颜色调和器应用的建议模型
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732780
Reema Qaiser Khan, W. Khan, Majid Kaleem, Ali Ahmed
Everything in this universe that the naked eye can perceive has color. Color impacts our lives in various ways; red color is perceived as danger or warning, blue color has a calming effect, whereas green color indicates approval. Soothing colors can relax the human body, whereas some colors may irritate the human eye. People with full color vision or with color vision deficiency (color blind), both struggle in selecting colors, for example, while designing a website, contrasting colored clothes, or choosing colors to paint the house. The issue that arises is whether the colors are in harmony; meaning if the colors complement each other and are not unappealing to the eye. In this paper we have proposed a model of a color harmonizer application, which will facilitate the user to harmonize colors according to color harmonies.
宇宙中肉眼所能感知的一切都是有颜色的。颜色以各种方式影响着我们的生活;红色被认为是危险或警告,蓝色有镇静作用,而绿色则表示赞同。舒缓的颜色可以让人放松,而有些颜色可能会刺激人的眼睛。有全色觉的人或有色觉缺陷(色盲)的人,在选择颜色时都会遇到困难,例如,在设计网站时,在对比颜色的衣服时,或者在选择颜色来粉刷房子时。出现的问题是颜色是否和谐;意思是,如果颜色相互补充,并不是不吸引人的眼睛。本文提出了一种色彩调和器的应用模型,便于用户根据色彩调和来进行色彩调和。
{"title":"A proposed model of a color harmonizer application","authors":"Reema Qaiser Khan, W. Khan, Majid Kaleem, Ali Ahmed","doi":"10.1109/ICICT.2013.6732780","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732780","url":null,"abstract":"Everything in this universe that the naked eye can perceive has color. Color impacts our lives in various ways; red color is perceived as danger or warning, blue color has a calming effect, whereas green color indicates approval. Soothing colors can relax the human body, whereas some colors may irritate the human eye. People with full color vision or with color vision deficiency (color blind), both struggle in selecting colors, for example, while designing a website, contrasting colored clothes, or choosing colors to paint the house. The issue that arises is whether the colors are in harmony; meaning if the colors complement each other and are not unappealing to the eye. In this paper we have proposed a model of a color harmonizer application, which will facilitate the user to harmonize colors according to color harmonies.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and development of wireless RTU and cybersecurity framework for SCADA system SCADA系统无线RTU和网络安全框架的设计与开发
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732781
Shakeel Durrani, Imran Jattala, J. Farooqi, Naila Shakeel, Mohsin Murad
The wave adoption of wireless over wire-line is a global phenomenon and the Oil & Gas industry is no exception. This paper presents a multi-tiered secure hardened Wireless Remote Terminal Unit (WRTU) for SCADA systems. The WRTU is based on ARM Coter-M4 Processor supported by GSM & Satellite modems, GPS, WiFi and Ethernet. WRTU can be interfaced to an array of standard industrial sensors, and actuators. WRTU has data acquisition, monitoring, and control capabilities. WRTU is an inexpensive device, using Commercial-of-The-Shelf (COTS) modules. WRTU is an easy to deploy (using existing public available infrastructure) device and `single device that does it all'. WRTU connects to the Control and Monitoring Centre (CMC) via GSM or Satellite modem. The CMC monitors and controls all peripherals of the WRTU, maintains a log of alerts, sensors information, set critical limits and provides geo-location of all WRTU s via its GIS portal. The CMC has a database to maintain all operational centric data, for report generation, historical analysis and forecasting. A multi-tiered cybersecurity framework has been designed to protect entire communication infrastructure. Cybersecurity is critically important for national security in todays connected world. Cybersecurity is of critical importance as most national security agencies want the introduction of cybersecurity into all new SCADA systems used in critical infrastructure.
无线电缆的普及是一个全球性的现象,石油和天然气行业也不例外。提出了一种适用于SCADA系统的多层安全强化无线远程终端单元(WRTU)。wtu基于ARM Coter-M4处理器,支持GSM和卫星调制解调器,GPS, WiFi和以太网。WRTU可以连接到一系列标准工业传感器和执行器。WRTU具有数据采集、监测和控制能力。WRTU是一种廉价的设备,使用商用货架(COTS)模块。WRTU是一种易于部署(使用现有的公共可用基础设施)的设备,并且“单一设备可以完成所有工作”。WRTU通过GSM或卫星调制解调器连接到控制和监测中心(CMC)。CMC监视和控制WRTU的所有外围设备,维护警报日志,传感器信息,设置关键限制,并通过其GIS门户提供所有WRTU的地理位置。CMC有一个数据库来维护所有以业务为中心的数据,用于生成报告、历史分析和预测。设计了一个多层网络安全框架,以保护整个通信基础设施。在当今互联世界,网络安全对国家安全至关重要。网络安全至关重要,因为大多数国家安全机构都希望在关键基础设施中使用的所有新的SCADA系统中引入网络安全。
{"title":"Design and development of wireless RTU and cybersecurity framework for SCADA system","authors":"Shakeel Durrani, Imran Jattala, J. Farooqi, Naila Shakeel, Mohsin Murad","doi":"10.1109/ICICT.2013.6732781","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732781","url":null,"abstract":"The wave adoption of wireless over wire-line is a global phenomenon and the Oil & Gas industry is no exception. This paper presents a multi-tiered secure hardened Wireless Remote Terminal Unit (WRTU) for SCADA systems. The WRTU is based on ARM Coter-M4 Processor supported by GSM & Satellite modems, GPS, WiFi and Ethernet. WRTU can be interfaced to an array of standard industrial sensors, and actuators. WRTU has data acquisition, monitoring, and control capabilities. WRTU is an inexpensive device, using Commercial-of-The-Shelf (COTS) modules. WRTU is an easy to deploy (using existing public available infrastructure) device and `single device that does it all'. WRTU connects to the Control and Monitoring Centre (CMC) via GSM or Satellite modem. The CMC monitors and controls all peripherals of the WRTU, maintains a log of alerts, sensors information, set critical limits and provides geo-location of all WRTU s via its GIS portal. The CMC has a database to maintain all operational centric data, for report generation, historical analysis and forecasting. A multi-tiered cybersecurity framework has been designed to protect entire communication infrastructure. Cybersecurity is critically important for national security in todays connected world. Cybersecurity is of critical importance as most national security agencies want the introduction of cybersecurity into all new SCADA systems used in critical infrastructure.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116518186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure user authentication in cloud computing 云计算中的安全用户认证
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732775
Zeeshan Javaid, Imran Ijaz
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
云计算这个时代的工业大片提供了一系列的好处,但由于客户的快速增长,使用不同的政策,面临着许多问题。随着时间的推移,人们对云的安全性和性能提出了许多问题,许多问题是由于云服务器的认证过程薄弱和凭证在公共互联网上公开传播而导致认证过程被泄露而引起的。为了克服这些漏洞,许多新的身份验证方案不断出现和变化。该工作提出了一种隐藏公共互联网上身份验证凭证传输的模型。
{"title":"Secure user authentication in cloud computing","authors":"Zeeshan Javaid, Imran Ijaz","doi":"10.1109/ICICT.2013.6732775","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732775","url":null,"abstract":"Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114073250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving the quality of streaming video through dynamic chrominance adjustment 通过动态色度调整提高流媒体视频的质量
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732783
R. Siddiqi
Usage of streaming video over the Internet and mobile networks has become quite common due to its convenience and low cost. In all the uses of streaming video over networks that do not guarantee bandwidths, the major challenge is to maintain acceptable video viewing experience in case of a network congestion. This paper presents a technique that has the potential to solve this challenge, at least to a certain extent. The proposed technique dynamically adjusts the chrominance level of the video images to fit the available bandwidth. Analysis of the results indicates that dynamic chrominance adjustment does improve the viewing quality of the streaming video significantly.
由于其便利性和低成本,在互联网和移动网络上使用流媒体视频已经变得相当普遍。在所有不保证带宽的网络流视频使用中,主要的挑战是在网络拥塞的情况下保持可接受的视频观看体验。本文提出了一种技术,至少在一定程度上有可能解决这一挑战。提出的技术动态调整视频图像的色度水平,以适应可用带宽。分析结果表明,动态色度调整确实显著提高了流媒体视频的观看质量。
{"title":"Improving the quality of streaming video through dynamic chrominance adjustment","authors":"R. Siddiqi","doi":"10.1109/ICICT.2013.6732783","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732783","url":null,"abstract":"Usage of streaming video over the Internet and mobile networks has become quite common due to its convenience and low cost. In all the uses of streaming video over networks that do not guarantee bandwidths, the major challenge is to maintain acceptable video viewing experience in case of a network congestion. This paper presents a technique that has the potential to solve this challenge, at least to a certain extent. The proposed technique dynamically adjusts the chrominance level of the video images to fit the available bandwidth. Analysis of the results indicates that dynamic chrominance adjustment does improve the viewing quality of the streaming video significantly.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127177627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business process modeling and decision model integration 业务流程建模和决策模型集成
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732789
Eram Abbasi, K. Abbasi
Business Process Modeling (BPM) is a technique used to model business processes and helps in better understanding of these processes. BPM helps in improving organizational efficiency by either helping in making the business processes more efficient or even helps in automation of the business processes. There are many BPM techniques used till date but none of these techniques being used supports the decision making requirements for an organization. To address this problem the paper suggests a model that can help integrate decision making with the prevailing Business Process Models. The paper firstly reviews foundations of Business Process Modeling (BPM) and the Decision Model (DM) to establish the basis for the conceptual understanding of BPM and DM. With these theoretical bases, then a model has been proposed where the Decision Model has been integrated with the Business Process Model to meet the decision making needs for the decision makers. Finally, the implications of this model are discussed with directions for further research.
业务流程建模(BPM)是一种用于为业务流程建模并帮助更好地理解这些流程的技术。BPM通过帮助提高业务流程的效率,甚至帮助实现业务流程的自动化,来帮助提高组织效率。到目前为止,已经使用了许多BPM技术,但是这些技术都不支持组织的决策制定需求。为了解决这个问题,本文提出了一个可以帮助将决策制定与流行的业务流程模型集成的模型。本文首先回顾了业务流程建模(BPM)和决策模型(DM)的基础,建立了对BPM和DM概念理解的基础,在此基础上,提出了一个将决策模型与业务流程模型相结合的模型,以满足决策者的决策需求。最后,对该模型的意义进行了讨论,并提出了进一步研究的方向。
{"title":"Business process modeling and decision model integration","authors":"Eram Abbasi, K. Abbasi","doi":"10.1109/ICICT.2013.6732789","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732789","url":null,"abstract":"Business Process Modeling (BPM) is a technique used to model business processes and helps in better understanding of these processes. BPM helps in improving organizational efficiency by either helping in making the business processes more efficient or even helps in automation of the business processes. There are many BPM techniques used till date but none of these techniques being used supports the decision making requirements for an organization. To address this problem the paper suggests a model that can help integrate decision making with the prevailing Business Process Models. The paper firstly reviews foundations of Business Process Modeling (BPM) and the Decision Model (DM) to establish the basis for the conceptual understanding of BPM and DM. With these theoretical bases, then a model has been proposed where the Decision Model has been integrated with the Business Process Model to meet the decision making needs for the decision makers. Finally, the implications of this model are discussed with directions for further research.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127392694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Which web browser work best for detecting phishing 哪种浏览器最适合检测网络钓鱼
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732784
Noman Mazher, I. Ashraf, A. Altaf
Phishing is the technique of social engineering in which important information are hijacked. To prevent phishing the easiest way is to blacklist such web sites which are suspicious;, but there are many new phished websites that are not blacklisted. To protect users from those phishing sites many ways are available; one of those is to implement security toolbar in web browser. Nowaday every modern web browser has its own implicit security toolbar. Our research is based on the evaluation of toolbars attached with Internet Explorer, Mozilla Firefox and Google Chrome. In our experiment we appraised toolbars attached with these most popular web browsers. Results evaluation showed that Google Chrome provides best security against phishing websites.
网络钓鱼是一种劫持重要信息的社会工程技术。要防止网络钓鱼,最简单的方法是将这些可疑的网站列入黑名单,但有许多新的网络钓鱼网站没有被列入黑名单。为了保护用户免受这些网络钓鱼网站的侵害,有许多方法可用;其中之一就是在浏览器中实现安全工具栏。如今,每个现代网络浏览器都有自己的隐式安全工具栏。我们的研究是基于对Internet Explorer、Mozilla Firefox和Google Chrome附带的工具栏的评估。在我们的实验中,我们评估了这些最流行的网络浏览器附带的工具栏。结果评估显示,谷歌浏览器提供了针对网络钓鱼网站的最佳安全性。
{"title":"Which web browser work best for detecting phishing","authors":"Noman Mazher, I. Ashraf, A. Altaf","doi":"10.1109/ICICT.2013.6732784","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732784","url":null,"abstract":"Phishing is the technique of social engineering in which important information are hijacked. To prevent phishing the easiest way is to blacklist such web sites which are suspicious;, but there are many new phished websites that are not blacklisted. To protect users from those phishing sites many ways are available; one of those is to implement security toolbar in web browser. Nowaday every modern web browser has its own implicit security toolbar. Our research is based on the evaluation of toolbars attached with Internet Explorer, Mozilla Firefox and Google Chrome. In our experiment we appraised toolbars attached with these most popular web browsers. Results evaluation showed that Google Chrome provides best security against phishing websites.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127760869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Real time finger counting and virtual drawing using color detection and shape recognition 使用颜色检测和形状识别的实时手指计数和虚拟绘图
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732776
G. Narejo, Shahyan Pervez Bharucha
In this paper we have provided a cheap method for counting open fingers and virtual drawing in real time using color detection and shape detection algorithms. These algorithms don't require training and database. Our method for finger counting detects the circular markers having a specified color visible on the inner side of the fingers by using color detection and shape recognition operations on the real time captured image and then counts the markers visible. The count can be further used as an input for other medium using communication methods. Different schemes are also defined using the combination of colors and hands used to generate desired output signals. The method devised for virtual drawing detects the circular specific colored marker on a stylus or finger using color detection and shape recognition. The position of the marker is marked and then plotted using the points marked in the previous frames which results in the pattern tracking the marker's movement. The development of both applications is done using Matlab as the developing environment using a normal A4-Tech webcam and run on Dell latitude D630 laptop with Intel® Core™2 Duo processor, Ram 2.00GB.
在本文中,我们提供了一种廉价的方法来计数张开的手指和虚拟绘图的实时使用颜色检测和形状检测算法。这些算法不需要训练和数据库。我们的手指计数方法通过对实时捕获的图像进行颜色检测和形状识别操作,检测手指内侧具有指定颜色的圆形标记,然后对可见标记进行计数。该计数可以进一步用作使用通信方法的其他媒介的输入。不同的方案也定义使用颜色和手的组合,用于产生所需的输出信号。所设计的虚拟绘图方法利用颜色检测和形状识别对手写笔或手指上的圆形特定彩色标记进行检测。标记标记的位置,然后使用前几帧中标记的点绘制,从而使图案跟踪标记的运动。这两个应用程序的开发都是使用Matlab作为开发环境,使用普通的A4-Tech网络摄像头,并在带有英特尔®酷睿™2双核处理器的戴尔latitude D630笔记本电脑上运行,Ram 2.00GB。
{"title":"Real time finger counting and virtual drawing using color detection and shape recognition","authors":"G. Narejo, Shahyan Pervez Bharucha","doi":"10.1109/ICICT.2013.6732776","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732776","url":null,"abstract":"In this paper we have provided a cheap method for counting open fingers and virtual drawing in real time using color detection and shape detection algorithms. These algorithms don't require training and database. Our method for finger counting detects the circular markers having a specified color visible on the inner side of the fingers by using color detection and shape recognition operations on the real time captured image and then counts the markers visible. The count can be further used as an input for other medium using communication methods. Different schemes are also defined using the combination of colors and hands used to generate desired output signals. The method devised for virtual drawing detects the circular specific colored marker on a stylus or finger using color detection and shape recognition. The position of the marker is marked and then plotted using the points marked in the previous frames which results in the pattern tracking the marker's movement. The development of both applications is done using Matlab as the developing environment using a normal A4-Tech webcam and run on Dell latitude D630 laptop with Intel® Core™2 Duo processor, Ram 2.00GB.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124444006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using predictive analytics to forecast drone attacks in Pakistan 使用预测分析来预测巴基斯坦的无人机袭击
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732785
U. Afzal, Tariq Mahmood
Drones are autonomous aircrafts employed in conditions where manned flight is perilous. Drone-based attacks are made in Northern Pakistan with the intention of eliminating terrorists (in the context of US-led war of terror). In June 2004, the first drone strike killed one militant and four civilians; since then hundreds of attacks have killed thousands of people including accidental deaths of innocent children and women. To gauge the impact of future drone attacks, we apply time series forecasting on drone attack data to predict the frequency of different types of future attacks. On a reliable drone attack data set, we use IBM SPSS tool to learn four predictive models: 1) number of drone attacks, 2) number of militant casualties, 3) number of civilian casualties, and 4) number of injuries. Over our actual dataset, the prediction accuracy is maximized when we allow SPSS to automatically select the forecasting algorithm, as compared to a manual selection and configuration. We use automated selection to predict our four types of data for the six months, July 2013 till December 2013.
无人机是在载人飞行危险的情况下使用的自主飞行器。以无人机为基础的袭击是在巴基斯坦北部进行的,目的是消灭恐怖分子(在美国领导的恐怖战争背景下)。2004年6月,第一次无人机袭击造成一名武装分子和四名平民死亡;自那时以来,数百次袭击造成数千人死亡,包括无辜儿童和妇女的意外死亡。为了衡量未来无人机攻击的影响,我们对无人机攻击数据应用时间序列预测来预测未来不同类型攻击的频率。在一个可靠的无人机袭击数据集上,我们使用IBM SPSS工具学习了四个预测模型:1)无人机袭击次数,2)武装分子伤亡人数,3)平民伤亡人数,4)受伤人数。在我们的实际数据集上,与手动选择和配置相比,当我们允许SPSS自动选择预测算法时,预测准确性最大化。我们使用自动选择来预测2013年7月至2013年12月这六个月的四种数据。
{"title":"Using predictive analytics to forecast drone attacks in Pakistan","authors":"U. Afzal, Tariq Mahmood","doi":"10.1109/ICICT.2013.6732785","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732785","url":null,"abstract":"Drones are autonomous aircrafts employed in conditions where manned flight is perilous. Drone-based attacks are made in Northern Pakistan with the intention of eliminating terrorists (in the context of US-led war of terror). In June 2004, the first drone strike killed one militant and four civilians; since then hundreds of attacks have killed thousands of people including accidental deaths of innocent children and women. To gauge the impact of future drone attacks, we apply time series forecasting on drone attack data to predict the frequency of different types of future attacks. On a reliable drone attack data set, we use IBM SPSS tool to learn four predictive models: 1) number of drone attacks, 2) number of militant casualties, 3) number of civilian casualties, and 4) number of injuries. Over our actual dataset, the prediction accuracy is maximized when we allow SPSS to automatically select the forecasting algorithm, as compared to a manual selection and configuration. We use automated selection to predict our four types of data for the six months, July 2013 till December 2013.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Predictive activation for localization using minimal data-fusion in MANETs 基于最小数据融合的预测激活定位
Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732778
T. Saeed, S. Khan, U. Tariq, Z. Khan
We propose a unique localization algorithm for MANETs: the mobile infrastructure-less networks with support of static underlying wireless sensor network nodes. The algorithm has been designed with two stages for localizing the MANET. The first stage is the naive activation stage which acts as the bootstrap for the prediction stage. The predictive minimal energy consumption algorithm incorporates the information from the measured TOA (Time Of Arrival) to locate the mobile nodes. The experimental results and comparative analysis show that our system provides accurate localization of linearly moving MANET's using low power consumption of the underlying wireless sensor networks.
我们提出了一种独特的定位算法用于manet:支持静态底层无线传感器网络节点的无移动基础设施网络。该算法被设计为两个阶段,用于定位MANET。第一阶段是朴素激活阶段,作为预测阶段的引导。预测最小能耗算法结合实测TOA(到达时间)信息来定位移动节点。实验结果和对比分析表明,该系统利用底层无线传感器网络的低功耗,提供了线性移动MANET的精确定位。
{"title":"Predictive activation for localization using minimal data-fusion in MANETs","authors":"T. Saeed, S. Khan, U. Tariq, Z. Khan","doi":"10.1109/ICICT.2013.6732778","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732778","url":null,"abstract":"We propose a unique localization algorithm for MANETs: the mobile infrastructure-less networks with support of static underlying wireless sensor network nodes. The algorithm has been designed with two stages for localizing the MANET. The first stage is the naive activation stage which acts as the bootstrap for the prediction stage. The predictive minimal energy consumption algorithm incorporates the information from the measured TOA (Time Of Arrival) to locate the mobile nodes. The experimental results and comparative analysis show that our system provides accurate localization of linearly moving MANET's using low power consumption of the underlying wireless sensor networks.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"129 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130031275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 5th International Conference on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1