首页 > 最新文献

2018 4th International Conference on Computer and Technology Applications (ICCTA)最新文献

英文 中文
Urban activity summarization with geo-tagged social media data 城市活动总结与地理标记的社会媒体数据
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398648
Jing Jiang, Chunhui Wang, Yu Tian, Shaoyao Zhang, Yan Zhao
Information mining from large databases has become an important research topic for researchers in computer science and information technology. Data mining has been attractive to many researchers in different fields. Among these fields, urban activity summarization aims at modeling people's typical activities at different locations and time in a city. With the ever-increasing urbanization process, urban activity summarization is widely recognized as a crucial socioeconomic task. Previously, it was difficult to be done due to the lack of real-life geo-tagged social media (GTSM) data. In recent years, with the development of social media, such as tweeter and Weibo (widely used in China and similar with tweeter), there are sufficient acceptable data for solving this task. There are some progress made on the studies of geographical topics based on GTSM data, but their high computational costs and strong distributional assumptions prevent the release of GTSM data energy. In order to solve this problem, we propose a model of urban activity summarization. This model is based on the method of kernel density estimation to find out the spatiotemporal hot spots of people's activities and maximize the scarcity of GTSM data. Not only that, we have greatly reduced the time complexity by subdividing the space. Finally, we evaluate the validity of the model using the Weibo data, by comparing the results of the model prediction and the actual results, and give an answer to the proposed activities under a given time and place, as well as the recommendation of a given activity.
从大型数据库中挖掘信息已成为计算机科学与信息技术研究者的一个重要研究课题。数据挖掘已经吸引了许多不同领域的研究者。在这些领域中,城市活动总结旨在模拟人们在城市中不同地点和时间的典型活动。随着城市化进程的不断加快,城市活动总结被广泛认为是一项重要的社会经济任务。以前,由于缺乏真实的地理标记社交媒体(GTSM)数据,很难做到这一点。近年来,随着社交媒体的发展,如twitter和微博(在中国广泛使用,与twitter类似),有足够的可接受数据来解决这个问题。基于GTSM数据的地理主题研究取得了一定进展,但其高昂的计算成本和较强的分布假设阻碍了GTSM数据能量的释放。为了解决这一问题,我们提出了一个城市活动汇总模型。该模型基于核密度估计的方法,找出人们活动的时空热点,最大限度地利用GTSM数据的稀缺性。不仅如此,我们还通过细分空间大大降低了时间复杂度。最后,我们利用微博数据对模型的有效性进行评估,将模型预测结果与实际结果进行对比,并给出给定时间和地点下的建议活动,以及给定活动的推荐。
{"title":"Urban activity summarization with geo-tagged social media data","authors":"Jing Jiang, Chunhui Wang, Yu Tian, Shaoyao Zhang, Yan Zhao","doi":"10.1109/CATA.2018.8398648","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398648","url":null,"abstract":"Information mining from large databases has become an important research topic for researchers in computer science and information technology. Data mining has been attractive to many researchers in different fields. Among these fields, urban activity summarization aims at modeling people's typical activities at different locations and time in a city. With the ever-increasing urbanization process, urban activity summarization is widely recognized as a crucial socioeconomic task. Previously, it was difficult to be done due to the lack of real-life geo-tagged social media (GTSM) data. In recent years, with the development of social media, such as tweeter and Weibo (widely used in China and similar with tweeter), there are sufficient acceptable data for solving this task. There are some progress made on the studies of geographical topics based on GTSM data, but their high computational costs and strong distributional assumptions prevent the release of GTSM data energy. In order to solve this problem, we propose a model of urban activity summarization. This model is based on the method of kernel density estimation to find out the spatiotemporal hot spots of people's activities and maximize the scarcity of GTSM data. Not only that, we have greatly reduced the time complexity by subdividing the space. Finally, we evaluate the validity of the model using the Weibo data, by comparing the results of the model prediction and the actual results, and give an answer to the proposed activities under a given time and place, as well as the recommendation of a given activity.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Age prediction on face features via multiple classifiers 基于多分类器的人脸特征年龄预测
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398675
F. Mohamad, M. Iqtait, F. Alsuhimat
Human age recognition becomes increasingly important due to its beneficial employments alongside security and computer applications. Age prediction from face picture has a lot of challenges, such as insufficiency of training data and uncontrollable situation. In this research, we address these critical issues by introducing an improved age prediction algorithm using Active Appearance Models (AAM) and three classifiers, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Support Vector Regression (SVR) to improve the precision of age prediction based on the present methods. In this algorithm, the traits of the facial pictures are explicated as traits vectors by AAM model, and the classifiers are utilized to estimate the age. We were able to recognize that the accuracy of SVR algorithm is better than the accuracy of KNN and SVM classifiers.
人类的年龄识别变得越来越重要,因为它与安全和计算机应用一起有益的就业。人脸图像年龄预测存在训练数据不足、情况不可控等问题。在本研究中,我们通过引入一种改进的年龄预测算法来解决这些关键问题,该算法使用主动外观模型(AAM)和支持向量机(SVM)、k -最近邻(KNN)和支持向量回归(SVR)三种分类器来提高年龄预测的精度。该算法通过AAM模型将人脸图像的特征表示为特征向量,并利用分类器进行年龄估计。我们可以认识到,SVR算法的准确率优于KNN和SVM分类器的准确率。
{"title":"Age prediction on face features via multiple classifiers","authors":"F. Mohamad, M. Iqtait, F. Alsuhimat","doi":"10.1109/CATA.2018.8398675","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398675","url":null,"abstract":"Human age recognition becomes increasingly important due to its beneficial employments alongside security and computer applications. Age prediction from face picture has a lot of challenges, such as insufficiency of training data and uncontrollable situation. In this research, we address these critical issues by introducing an improved age prediction algorithm using Active Appearance Models (AAM) and three classifiers, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Support Vector Regression (SVR) to improve the precision of age prediction based on the present methods. In this algorithm, the traits of the facial pictures are explicated as traits vectors by AAM model, and the classifiers are utilized to estimate the age. We were able to recognize that the accuracy of SVR algorithm is better than the accuracy of KNN and SVM classifiers.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using classification techniques to predict gold price movement 运用分类技术预测黄金价格走势
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398669
Wedad Ahmed Al-Dhuraibi, J. Ali
In our day to day life, predictability of gold's price is significant in many domains such as economics, trading, investment, and financial and political environments. Better investment decision could be made when gold price values are accurately predicted. The main objective of this research is to forecasts whether the price of gold will rise or decline in the near future. Decision Tree, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Linear Regression are all different classification algorithms that have been used in this paper to predict the gold price movement direction. The performance of each of these algorithms has been investigated while using the Rapidminer software.
在我们的日常生活中,黄金价格的可预测性在经济、贸易、投资、金融和政治环境等许多领域都很重要。当黄金价格被准确预测时,可以做出更好的投资决策。本研究的主要目的是预测黄金价格在不久的将来是上涨还是下跌。决策树(Decision Tree)、支持向量机(SVM)、k近邻(KNN)和线性回归(Linear Regression)都是本文中用于预测金价走势的不同分类算法。在使用Rapidminer软件时,对每种算法的性能进行了研究。
{"title":"Using classification techniques to predict gold price movement","authors":"Wedad Ahmed Al-Dhuraibi, J. Ali","doi":"10.1109/CATA.2018.8398669","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398669","url":null,"abstract":"In our day to day life, predictability of gold's price is significant in many domains such as economics, trading, investment, and financial and political environments. Better investment decision could be made when gold price values are accurately predicted. The main objective of this research is to forecasts whether the price of gold will rise or decline in the near future. Decision Tree, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Linear Regression are all different classification algorithms that have been used in this paper to predict the gold price movement direction. The performance of each of these algorithms has been investigated while using the Rapidminer software.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125328431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improving accuracy of CADx system by hybrid PCA and backpropagation 利用混合主成分分析和反向传播提高CADx系统精度
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398681
H. S. Harba, E. Harba, S. Hussein, M. Farttoos
Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when combined principal component analysis and feed forward back propagation neural network. This work has investigated the ability to improve the CAD system in order to use in detection abnormality even with low cost diagnosis methods (such as mammogram images or X-ray). The results show that the reduction of correlated details within the training data by using the PCA method can enhance the recognition performance. The performance of the neural network diagnostic to discriminate the normal cases from cancerous cases, evaluated by using recognition analysis show a high accuracy in detection. The proposed approach can be considered as a potential tool for diagnosis breast cancer from x-ray and mammography images and prediction for non-experts and clinicians.
近年来,医学图像在各种疾病的诊断和检测中发挥了重要作用。医学成像可以提供一种直接可视化的手段,通过观察人体,注意到不同生物和物理参数相关的微小解剖变化和生物学过程。为了实现更准确、更可靠的诊断,目前已经建立了各种计算机辅助检测(CAD)和计算机辅助诊断(CADx)方法来帮助医学图像的解释。计算机辅助设计已成为诊断放射学和医学影像学的许多主要研究课题之一。本文研究了主成分分析与前馈-反向传播神经网络相结合对CAD系统检测精度的提高。这项工作研究了改进CAD系统的能力,以便使用低成本的诊断方法(如乳房x线照片或x射线)来检测异常。结果表明,利用主成分分析方法对训练数据中的相关细节进行约简,可以提高识别性能。通过识别分析,评价了神经网络对正常病例和癌变病例的诊断性能,显示出较高的检测准确率。所提出的方法可以被认为是一个潜在的工具,从x线和乳房x光图像诊断乳腺癌和预测非专家和临床医生。
{"title":"Improving accuracy of CADx system by hybrid PCA and backpropagation","authors":"H. S. Harba, E. Harba, S. Hussein, M. Farttoos","doi":"10.1109/CATA.2018.8398681","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398681","url":null,"abstract":"Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when combined principal component analysis and feed forward back propagation neural network. This work has investigated the ability to improve the CAD system in order to use in detection abnormality even with low cost diagnosis methods (such as mammogram images or X-ray). The results show that the reduction of correlated details within the training data by using the PCA method can enhance the recognition performance. The performance of the neural network diagnostic to discriminate the normal cases from cancerous cases, evaluated by using recognition analysis show a high accuracy in detection. The proposed approach can be considered as a potential tool for diagnosis breast cancer from x-ray and mammography images and prediction for non-experts and clinicians.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122524808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building energy management saving by considering lighting system optimization via ANOVA method 基于方差分析的考虑照明系统优化的建筑节能管理
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398685
Z. Bohari, R. Ghazali, N. N. Atira, M. F. Sulaima, A. A. Rahman, M. K. Nor
This paper suggests on a study of building energy saving by using Analysis of Variance (ANOVA) system to analyze the reduction of energy consumption. This research is significant to reduce the impact of climate change via energy management. In this project, lighting system in UTeM's library is emphasized. The purpose of this research is to investigate the energy demand and determine the possibility of the aspect of energy saving by optimizing current lighting system. Data then used to investigate and analyze the data of total power consumption in the building and analyzed the saving using ANOVA method. This is to identify the best way for improving the energy performance and reporting them. The Analysis of Variance is the method that was suggested in this project; where the MATLAB and EXCEL are applied in analyzing the data and explored to understand the technique and flow of the software. The result proved that ANOVA method is among suitable method to analyze energy saving with more accurate and simple approach.
本文建议采用方差分析(ANOVA)系统对建筑节能进行分析。本研究对通过能源管理减少气候变化的影响具有重要意义。在这个项目中,重点介绍了东京科技大学图书馆的照明系统。本研究的目的是调查能源需求,并确定节能方面的可能性,通过优化现有的照明系统。然后利用数据对建筑总能耗数据进行调查分析,并采用方差分析方法对节能进行分析。这是为了确定改善能源表现的最佳方式并进行报告。方差分析是本项目提出的方法;其中运用MATLAB和EXCEL对数据进行分析,探索了解软件的技术和流程。结果表明,方差分析方法是一种较为准确、简便的节能分析方法。
{"title":"Building energy management saving by considering lighting system optimization via ANOVA method","authors":"Z. Bohari, R. Ghazali, N. N. Atira, M. F. Sulaima, A. A. Rahman, M. K. Nor","doi":"10.1109/CATA.2018.8398685","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398685","url":null,"abstract":"This paper suggests on a study of building energy saving by using Analysis of Variance (ANOVA) system to analyze the reduction of energy consumption. This research is significant to reduce the impact of climate change via energy management. In this project, lighting system in UTeM's library is emphasized. The purpose of this research is to investigate the energy demand and determine the possibility of the aspect of energy saving by optimizing current lighting system. Data then used to investigate and analyze the data of total power consumption in the building and analyzed the saving using ANOVA method. This is to identify the best way for improving the energy performance and reporting them. The Analysis of Variance is the method that was suggested in this project; where the MATLAB and EXCEL are applied in analyzing the data and explored to understand the technique and flow of the software. The result proved that ANOVA method is among suitable method to analyze energy saving with more accurate and simple approach.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128925246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile application review classification for the Indonesian language using machine learning approach 使用机器学习方法对印尼语进行移动应用审查分类
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398667
Yudo Ekanata, I. Budi
The number of user reviews for a mobile app can reach thousands so it will take a lot of time for app developers to sort through and find information that is important for further app development. Therefore, this study aims to automatically classify mobile application user reviews. Automatic classification conducted in this study is using machine learning approach. The features extracted from user review are unigram, bigram, star rating, review length, as well as the ratio of the number of words with positive and negative sentiment. For classification algorithms, we used Naïve Bayes, Support Vector Machine, Logistic Regression and Decision Tree. The experiment result shows that Logistic Regression gives the best F-Measure of 85% when combined with unigram plus sentence length and sentiment score. Unigram was proven as the most important feature since the additional features like sentence length and sentiment score only increased the F-measure around 1%. Bigram and star rating has negative impact on the classifier performance.
手机应用的用户评论数量可能达到数千条,所以应用开发者需要花费大量时间来整理和寻找对进一步开发应用很重要的信息。因此,本研究旨在对移动应用用户评论进行自动分类。本研究采用机器学习方法进行自动分类。从用户评论中提取的特征有uniggram、biggram、星级、评论长度以及正面和负面情绪的字数之比。对于分类算法,我们使用Naïve贝叶斯,支持向量机,逻辑回归和决策树。实验结果表明,Logistic回归与单字母组合、句子长度和情感评分相结合,F-Measure的最佳值为85%。uniggram被证明是最重要的特征,因为像句子长度和情感得分这样的附加特征只增加了大约1%的f测量值。双图和星级对分类器的性能有负面影响。
{"title":"Mobile application review classification for the Indonesian language using machine learning approach","authors":"Yudo Ekanata, I. Budi","doi":"10.1109/CATA.2018.8398667","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398667","url":null,"abstract":"The number of user reviews for a mobile app can reach thousands so it will take a lot of time for app developers to sort through and find information that is important for further app development. Therefore, this study aims to automatically classify mobile application user reviews. Automatic classification conducted in this study is using machine learning approach. The features extracted from user review are unigram, bigram, star rating, review length, as well as the ratio of the number of words with positive and negative sentiment. For classification algorithms, we used Naïve Bayes, Support Vector Machine, Logistic Regression and Decision Tree. The experiment result shows that Logistic Regression gives the best F-Measure of 85% when combined with unigram plus sentence length and sentiment score. Unigram was proven as the most important feature since the additional features like sentence length and sentiment score only increased the F-measure around 1%. Bigram and star rating has negative impact on the classifier performance.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133686355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computer mathematical modeling of wave processes 波浪过程的计算机数学模拟
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398645
S. Zhuzbayev, D. Sabitova, B. Sarsenov
This work is devoted to computer modeling of wave processes. As an example, we took an ideal elastic body with distributed transient normal load. A mathematical model of the wave process has been constructed, a method has been determined to analyse wave propagation. We have defined the point scheme and selected the pattern. The conditions have been determined for the interior, boundary and corner points of the area. A software had been developed and the result of calculations was checked. Oscillograms of longitudinal velocities and normal stresses, as well as isolines of normal stresses have been obtained.
这项工作致力于波浪过程的计算机模拟。以具有分布瞬态法向载荷的理想弹性体为例。建立了波浪过程的数学模型,确定了一种分析波浪传播的方法。我们已经定义了点方案并选择了图案。区域内部、边界和角点的条件已经确定。开发了一个软件,并对计算结果进行了校核。得到了纵向速度和正应力的示波图,以及正应力的等值线。
{"title":"Computer mathematical modeling of wave processes","authors":"S. Zhuzbayev, D. Sabitova, B. Sarsenov","doi":"10.1109/CATA.2018.8398645","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398645","url":null,"abstract":"This work is devoted to computer modeling of wave processes. As an example, we took an ideal elastic body with distributed transient normal load. A mathematical model of the wave process has been constructed, a method has been determined to analyse wave propagation. We have defined the point scheme and selected the pattern. The conditions have been determined for the interior, boundary and corner points of the area. A software had been developed and the result of calculations was checked. Oscillograms of longitudinal velocities and normal stresses, as well as isolines of normal stresses have been obtained.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image based authentication using zero-knowledge protocol 使用零知识协议的基于图像的身份验证
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398683
Zarina Mohamad, Lim Yan Thong, Aznida Hayati Zakaria, W. S. W. Awang
One of the most critical concerns in information security today is user authentication. There is a great security when using the text-based strong password schemes but often remembering those good passwords is very hard and users writing them down on a piece of paper or saving inside the smart phone. There is an alternative solution to the text-based authentication which is the Graphical User Authentication (GUA) or simply image-based Password based on the fact that humans tend to memorize images better. This type of approach allows users to create and remember passwords easily. However, one big issues that is plaguing GUA is shoulder surfing attack that can capture the users mouse clicks and eavesdropping. In this paper, a new algorithm that using zero-knowledge protocol as the solution to solving the eavesdropping and shoulder surfing attack to provide better system security. In zero-knowledge protocol, users prove that they know the graphical password without sending it. In other words, the user does not send the password to the verifier or reveal it to the people nearby. Hackers who try to eavesdrop the password will be failed since the password is not sent over the insecure channel such as Internet nor reveal. Therefore it is a secured approach to prevent interception by unwanted parties or adversary. The result that is going to be yielded in this project is a secured authentication approach which is user-friendly.
当今信息安全中最重要的问题之一是用户身份验证。使用基于文本的强密码方案具有很高的安全性,但通常很难记住这些好的密码,用户将它们写在一张纸上或保存在智能手机内。除了基于文本的身份验证之外,还有一种替代解决方案,即图形用户身份验证(GUA)或基于图像的密码,因为人类倾向于更好地记住图像。这种方法使用户可以轻松地创建和记住密码。然而,困扰GUA的一个大问题是可以捕获用户的鼠标点击和窃听的肩部冲浪攻击。本文提出了一种利用零知识协议作为解决窃听和肩冲浪攻击的新算法,以提供更好的系统安全性。在零知识协议中,用户无需发送图形密码即可证明他们知道图形密码。换句话说,用户不会将密码发送给验证者,也不会将密码透露给附近的人。因为密码不会通过互联网等不安全的渠道发送,也不会泄露,所以想要窃听密码的黑客将会失败。因此,它是一种安全的方法,以防止不受欢迎的方或对手拦截。在这个项目中将要产生的结果是一个安全的身份验证方法,这是用户友好的。
{"title":"Image based authentication using zero-knowledge protocol","authors":"Zarina Mohamad, Lim Yan Thong, Aznida Hayati Zakaria, W. S. W. Awang","doi":"10.1109/CATA.2018.8398683","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398683","url":null,"abstract":"One of the most critical concerns in information security today is user authentication. There is a great security when using the text-based strong password schemes but often remembering those good passwords is very hard and users writing them down on a piece of paper or saving inside the smart phone. There is an alternative solution to the text-based authentication which is the Graphical User Authentication (GUA) or simply image-based Password based on the fact that humans tend to memorize images better. This type of approach allows users to create and remember passwords easily. However, one big issues that is plaguing GUA is shoulder surfing attack that can capture the users mouse clicks and eavesdropping. In this paper, a new algorithm that using zero-knowledge protocol as the solution to solving the eavesdropping and shoulder surfing attack to provide better system security. In zero-knowledge protocol, users prove that they know the graphical password without sending it. In other words, the user does not send the password to the verifier or reveal it to the people nearby. Hackers who try to eavesdrop the password will be failed since the password is not sent over the insecure channel such as Internet nor reveal. Therefore it is a secured approach to prevent interception by unwanted parties or adversary. The result that is going to be yielded in this project is a secured authentication approach which is user-friendly.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131279206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards more effective gamification: Does deploying semiotics help design better perceivable badges? 走向更有效的游戏化:运用符号学是否有助于设计更好的可感知徽章?
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398670
Amir Matallaoui
Context: By definition, gamification is the application of game design elements in non-game contexts. This deployment of gamification usually induces a further layer of complexity on top of the current task. Thus, to minimize the caused cognitive load, we argue that taking account of the gamification aesthetics is as important as deploying different and elaborated gamification mechanics. Objective: In this paper, we deal with the cognitive overload made by the deployment of gamification in serious contexts such as education, health and work. We thereby emphasize on the importance of applying established design theories such as semiotics (the signs theory) in reducing the caused cognitive load. Method: We have therefore designed a quantitative study, to which we have invited participants with different ages and backgrounds. The study consists of a series of puzzles (taken from a prior study of ours), to which two achievement systems with different badges (icons) were designed. The participants have afterwards to answer various weighted questions related to their perceptions of both achievement systems. Hypothesis: In this work, we argue that badges, whose icon design takes consideration of the signs theory are better perceived than badges, whose design did not follow this theory.
情境:根据定义,游戏化是指在非游戏情境中应用游戏设计元素。这种游戏化的部署通常会在当前任务的基础上增加一层复杂性。因此,为了最小化所导致的认知负荷,我们认为考虑游戏化美学与部署不同且详细的游戏化机制同样重要。目的:在本文中,我们处理在教育、健康和工作等严重环境中部署游戏化所造成的认知超载。因此,我们强调应用已建立的设计理论,如符号学(符号理论)在减少引起的认知负荷方面的重要性。方法:因此,我们设计了一个定量研究,我们邀请了不同年龄和背景的参与者。该研究由一系列谜题组成(取自我们之前的研究),其中设计了两个带有不同徽章(图标)的成就系统。之后,参与者必须回答与他们对两种成就系统的看法有关的各种加权问题。假设:在这项工作中,我们认为徽章的图标设计考虑了符号理论比徽章的设计没有遵循这一理论更好的感知。
{"title":"Towards more effective gamification: Does deploying semiotics help design better perceivable badges?","authors":"Amir Matallaoui","doi":"10.1109/CATA.2018.8398670","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398670","url":null,"abstract":"Context: By definition, gamification is the application of game design elements in non-game contexts. This deployment of gamification usually induces a further layer of complexity on top of the current task. Thus, to minimize the caused cognitive load, we argue that taking account of the gamification aesthetics is as important as deploying different and elaborated gamification mechanics. Objective: In this paper, we deal with the cognitive overload made by the deployment of gamification in serious contexts such as education, health and work. We thereby emphasize on the importance of applying established design theories such as semiotics (the signs theory) in reducing the caused cognitive load. Method: We have therefore designed a quantitative study, to which we have invited participants with different ages and backgrounds. The study consists of a series of puzzles (taken from a prior study of ours), to which two achievement systems with different badges (icons) were designed. The participants have afterwards to answer various weighted questions related to their perceptions of both achievement systems. Hypothesis: In this work, we argue that badges, whose icon design takes consideration of the signs theory are better perceived than badges, whose design did not follow this theory.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"123 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132482958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved SIFT algorithm based on adaptive contrast threshold 基于自适应对比度阈值的改进SIFT算法
Pub Date : 2018-05-01 DOI: 10.1109/CATA.2018.8398673
Jianpeng Xu, Sheng Lin, Aoxue Teng
How to adjust the feature points number adaptively according to the images in different scenes is one of the key issues in improving detection efficiency. In this paper, an improved SIFT algorithm based on adaptive contrast threshold was proposed. Firstly, back propagation neural network and analytic hierarchy process were used to analyze the mathematical models of feature points number, image information and SIFT contrast threshold in different scenes from the perspective of image complexity, so as to realize the dynamic adjustability of contrast threshold. Then, a new SIFT algorithm framework was constructed by using the adaptive control module based on the mathematical model, and ultimately the number of feature points was coordinated. Compared with the two existing algorithms, the experimental data verified that the proposed algorithm had higher efficiency and accuracy, and that it realized the efficient control of feature point number in multi-scene.
如何根据不同场景下的图像自适应调整特征点的数量是提高检测效率的关键问题之一。本文提出了一种基于自适应对比度阈值的改进SIFT算法。首先,从图像复杂度的角度出发,利用反向传播神经网络和层次分析法,分析不同场景下特征点数、图像信息和SIFT对比度阈值的数学模型,实现对比度阈值的动态可调;然后,利用基于数学模型的自适应控制模块构建新的SIFT算法框架,最终实现特征点数量的协调;与现有的两种算法相比,实验数据验证了本文算法具有更高的效率和精度,实现了多场景下特征点数量的有效控制。
{"title":"Improved SIFT algorithm based on adaptive contrast threshold","authors":"Jianpeng Xu, Sheng Lin, Aoxue Teng","doi":"10.1109/CATA.2018.8398673","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398673","url":null,"abstract":"How to adjust the feature points number adaptively according to the images in different scenes is one of the key issues in improving detection efficiency. In this paper, an improved SIFT algorithm based on adaptive contrast threshold was proposed. Firstly, back propagation neural network and analytic hierarchy process were used to analyze the mathematical models of feature points number, image information and SIFT contrast threshold in different scenes from the perspective of image complexity, so as to realize the dynamic adjustability of contrast threshold. Then, a new SIFT algorithm framework was constructed by using the adaptive control module based on the mathematical model, and ultimately the number of feature points was coordinated. Compared with the two existing algorithms, the experimental data verified that the proposed algorithm had higher efficiency and accuracy, and that it realized the efficient control of feature point number in multi-scene.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127075055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 4th International Conference on Computer and Technology Applications (ICCTA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1