首页 > 最新文献

2011 Third International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
KVM-based Detection of Rootkit Attacks 基于kvm的Rootkit攻击检测
Xingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, W. Dong, Xiaoshe Dong
The kernel-level Root kit brings operating system mortal security risk. The existing detection methods, which are based on host environment, have limitations such as high Root kit privileges, weak isolation capacity. If the detected system, which may includes Root kit, and the detection system are resided on guest and host environment respectively, those limitations can be resolved. The paper proposed a method of Root kit detection based on KVM (Kernel-based Virtual Machine) by using virtualization technology. This method adopts guest memory protection mechanism, which is based on protection of host page tables and trusted code segments, for static kernel code and data. As for dynamically allocated code and data in heap space, this method introduces integrity checking mechanism, which is based on threshold triggering of calling sequences of monitored functions. The experimental results showed that this method can prevent static code or data from Root kit attacking effectively, and also detect attacks to dynamically allocated code or data quickly.
内核级Root工具包带来了操作系统致命的安全风险。现有的基于主机环境的检测方法存在rootkit权限高、隔离能力弱等局限性。如果检测到的系统(可能包括根工具包)和检测系统分别位于客户机和主机环境中,则可以解决这些限制。本文利用虚拟化技术,提出了一种基于KVM (Kernel-based Virtual Machine)的rootkit检测方法。该方法对静态内核代码和数据采用基于主机页表和可信代码段保护的来宾内存保护机制。对于堆空间中动态分配的代码和数据,该方法引入了完整性检查机制,该机制基于被监控函数调用序列的阈值触发。实验结果表明,该方法可以有效地防止来自Root kit的静态代码或数据的攻击,并且可以快速检测到对动态分配的代码或数据的攻击。
{"title":"KVM-based Detection of Rootkit Attacks","authors":"Xingjun Zhang, Endong Wang, Long Xin, Zhongyuan Wu, W. Dong, Xiaoshe Dong","doi":"10.1109/INCoS.2011.111","DOIUrl":"https://doi.org/10.1109/INCoS.2011.111","url":null,"abstract":"The kernel-level Root kit brings operating system mortal security risk. The existing detection methods, which are based on host environment, have limitations such as high Root kit privileges, weak isolation capacity. If the detected system, which may includes Root kit, and the detection system are resided on guest and host environment respectively, those limitations can be resolved. The paper proposed a method of Root kit detection based on KVM (Kernel-based Virtual Machine) by using virtualization technology. This method adopts guest memory protection mechanism, which is based on protection of host page tables and trusted code segments, for static kernel code and data. As for dynamically allocated code and data in heap space, this method introduces integrity checking mechanism, which is based on threshold triggering of calling sequences of monitored functions. The experimental results showed that this method can prevent static code or data from Root kit attacking effectively, and also detect attacks to dynamically allocated code or data quickly.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126538670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Linked Open Data for Learning Object Discovery: Adaptive e-Learning Systems 学习对象发现的链接开放数据:自适应电子学习系统
Burasakorn Yoosooka, V. Wuwongse
This paper proposes a new approach to automatic retrieval of Learning Objects (LOs) from local or external LO repositories via Linked Open Data (LOD) principles. This approach dynamically selects the most appropriate LOs for an individual learning package in an adaptive e-Learning system based on the use of LO metadata, learner profiles, ontologies, and LOD principles. The approach has been designed to interlink the domain ontology with external open knowledge in the LOD cloud. SPARQL endpoints for datasets in the LOD cloud are also provided for instructors and learners to discover their desired LOs. Moreover, commonly known vocabularies such as Dublin Core (DC), IEEE Learning Object Metadata (IEEE LOM), Web Ontology Language (OWL), and Resource Description Framework (RDF) are employed to represent metadata and to link it with external LO repositories as well as DBpedia, the central hub of the LOD cloud. By using these techniques, the LOs and external knowledge can be exchangeable, shareable, and interoperable, resulting in an enhanced access to better learning resources. Based on the proposed approach, a prototype system has been developed and evaluated. It has been discovered that the system has yielded positive effects in terms of the learners' satisfaction.
本文提出了一种通过链接开放数据(LOD)原则从本地或外部学习对象存储库中自动检索学习对象的新方法。该方法基于LO元数据、学习者概要、本体和LOD原则的使用,动态地为自适应电子学习系统中的单个学习包选择最合适的LO。该方法旨在将领域本体与LOD云中的外部开放知识互连起来。还为教师和学习者提供了LOD云中数据集的SPARQL端点,以发现他们想要的LOD。此外,还使用了都柏林核心(DC)、IEEE学习对象元数据(IEEE LOM)、Web本体语言(OWL)和资源描述框架(RDF)等常用词汇表来表示元数据,并将其与外部LO存储库以及LOD云的中心集线器DBpedia链接起来。通过使用这些技术,LOs和外部知识可以交换、共享和互操作,从而增强对更好的学习资源的访问。基于所提出的方法,开发了一个原型系统并进行了评估。研究发现,该系统对学习者的满意度产生了积极的影响。
{"title":"Linked Open Data for Learning Object Discovery: Adaptive e-Learning Systems","authors":"Burasakorn Yoosooka, V. Wuwongse","doi":"10.1504/IJKL.2012.051685","DOIUrl":"https://doi.org/10.1504/IJKL.2012.051685","url":null,"abstract":"This paper proposes a new approach to automatic retrieval of Learning Objects (LOs) from local or external LO repositories via Linked Open Data (LOD) principles. This approach dynamically selects the most appropriate LOs for an individual learning package in an adaptive e-Learning system based on the use of LO metadata, learner profiles, ontologies, and LOD principles. The approach has been designed to interlink the domain ontology with external open knowledge in the LOD cloud. SPARQL endpoints for datasets in the LOD cloud are also provided for instructors and learners to discover their desired LOs. Moreover, commonly known vocabularies such as Dublin Core (DC), IEEE Learning Object Metadata (IEEE LOM), Web Ontology Language (OWL), and Resource Description Framework (RDF) are employed to represent metadata and to link it with external LO repositories as well as DBpedia, the central hub of the LOD cloud. By using these techniques, the LOs and external knowledge can be exchangeable, shareable, and interoperable, resulting in an enhanced access to better learning resources. Based on the proposed approach, a prototype system has been developed and evaluated. It has been discovered that the system has yielded positive effects in terms of the learners' satisfaction.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131209054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multi-authority Attribute-Based Signature 多授权机构基于属性的签名
Dan Cao, Bao-kang Zhao, Xiaofeng Wang, Jinshu Su, Guofei Ji
Attribute-based signature (ABS) is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messaging systems. But these applications may require a user to obtain attributes from different authorities, which calls for a multi-authority ABS scheme. In addition, multiple authorities can distribute the trust to all authorities, instead of concerning on a single attribute authority. In this paper, we propose a multi-authority ABS scheme, supporting complex policies, expressing AND, OR, and threshold conditions. We use a central authority to assure the usability of attribute keys a user getting from different attribute authorities. To prevent collusion attacks, we adopt a unique global identity (GID) for a user to bind his attribute keys and identity together. And a secret key from the central authority help the verification be independent of the user's identity. So our scheme can fit the requirements of real applications, and also distribute the trust to all authorities in the system.
基于属性的签名(ABS)是一种新的加密原语,签名者可以用自己的属性对消息进行签名,验证者只能知道签名者是否拥有满足其策略的属性。此外,任何不具备满足策略属性的用户都无法伪造签名。ABS有许多应用程序,例如匿名身份验证和基于属性的消息传递系统。但是这些应用程序可能需要用户从不同的权威机构获取属性,这就需要多权威机构ABS方案。此外,多个权威机构可以将信任分发给所有权威机构,而不是只关注单个属性权威机构。在本文中,我们提出了一个多权威ABS方案,支持复杂的策略,表达AND, OR和阈值条件。我们使用中央权威来确保用户从不同的属性权威获得的属性键的可用性。为了防止合谋攻击,我们采用唯一的全局标识(GID)将用户的属性键和身份绑定在一起。来自中央权威机构的密钥帮助验证独立于用户的身份。因此,我们的方案既能满足实际应用的要求,又能将信任分配给系统中的所有权威机构。
{"title":"Multi-authority Attribute-Based Signature","authors":"Dan Cao, Bao-kang Zhao, Xiaofeng Wang, Jinshu Su, Guofei Ji","doi":"10.1109/INCoS.2011.122","DOIUrl":"https://doi.org/10.1109/INCoS.2011.122","url":null,"abstract":"Attribute-based signature (ABS) is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messaging systems. But these applications may require a user to obtain attributes from different authorities, which calls for a multi-authority ABS scheme. In addition, multiple authorities can distribute the trust to all authorities, instead of concerning on a single attribute authority. In this paper, we propose a multi-authority ABS scheme, supporting complex policies, expressing AND, OR, and threshold conditions. We use a central authority to assure the usability of attribute keys a user getting from different attribute authorities. To prevent collusion attacks, we adopt a unique global identity (GID) for a user to bind his attribute keys and identity together. And a secret key from the central authority help the verification be independent of the user's identity. So our scheme can fit the requirements of real applications, and also distribute the trust to all authorities in the system.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132345403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Fast Parallel Computation of Tate Pairing Tate配对的快速并行计算
Zhitu Su, Chun-hui Sun, Hui Li, Jianfeng Ma, K. Fan
In pairing-based cryptography, Miller's algorithm plays a key role in the calculation of pairing. Currently, most of the optimizations of Miller's algorithm are of serial structure. In this paper, we propose a parallel method for efficiently computing pairing. Our method can be applied to super singular elliptic curves and ordinary elliptic curves which are suitable for pairing-based cryptography. Compared with general version of Miller's algorithm, our method has a gain of around 50.0%.
在基于配对的密码学中,米勒算法在配对计算中起着关键作用。目前,米勒算法的大多数优化都是串行结构的。本文提出了一种高效计算配对的并行方法。该方法适用于适合于基于配对密码的超奇异椭圆曲线和普通椭圆曲线。与一般版本的米勒算法相比,我们的方法的增益在50.0%左右。
{"title":"Fast Parallel Computation of Tate Pairing","authors":"Zhitu Su, Chun-hui Sun, Hui Li, Jianfeng Ma, K. Fan","doi":"10.1109/INCoS.2011.93","DOIUrl":"https://doi.org/10.1109/INCoS.2011.93","url":null,"abstract":"In pairing-based cryptography, Miller's algorithm plays a key role in the calculation of pairing. Currently, most of the optimizations of Miller's algorithm are of serial structure. In this paper, we propose a parallel method for efficiently computing pairing. Our method can be applied to super singular elliptic curves and ordinary elliptic curves which are suitable for pairing-based cryptography. Compared with general version of Miller's algorithm, our method has a gain of around 50.0%.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134389075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Exploratory Social Network Analysis of Academic Research Networks 学术研究网络的探索性社会网络分析
S. T. Marín, N. Bessis, M. R. Martínez-Torres, Florian Franc, F. Barrero, F. Xhafa
For several decades, academics around the world have been collaborating with the view to support the development of their research domain. Having said that, the majority of scientific and technological policies try to encourage the creation of strong inter-related research groups in order to improve the efficiency of research outcomes and subsequently research funding allocation. In this paper, we attempt to highlight and thus, to demonstrate how these collaborative networks are developing in practice. To achieve this, we have developed an automated tool for extracting data about joint article publications and analyzing them from the perspective of social network analysis. In this case study, we have limited data from works published in 2010 by England academic and research institutions. The outcomes of this work can help policy makers in realising the current status of research collaborative networks in England.
几十年来,世界各地的学者一直在与该观点合作,以支持其研究领域的发展。话虽如此,大多数科学和技术政策都试图鼓励建立强大的相互关联的研究小组,以提高研究成果的效率,从而提高研究经费的分配。在本文中,我们试图强调并因此展示这些协作网络是如何在实践中发展的。为了实现这一目标,我们开发了一个自动化工具,用于提取联合文章发表的数据,并从社会网络分析的角度对其进行分析。在这个案例研究中,我们从2010年英国学术和研究机构发表的作品中获得了有限的数据。这项工作的结果可以帮助政策制定者认识到英国研究合作网络的现状。
{"title":"An Exploratory Social Network Analysis of Academic Research Networks","authors":"S. T. Marín, N. Bessis, M. R. Martínez-Torres, Florian Franc, F. Barrero, F. Xhafa","doi":"10.1109/INCOS.2011.49","DOIUrl":"https://doi.org/10.1109/INCOS.2011.49","url":null,"abstract":"For several decades, academics around the world have been collaborating with the view to support the development of their research domain. Having said that, the majority of scientific and technological policies try to encourage the creation of strong inter-related research groups in order to improve the efficiency of research outcomes and subsequently research funding allocation. In this paper, we attempt to highlight and thus, to demonstrate how these collaborative networks are developing in practice. To achieve this, we have developed an automated tool for extracting data about joint article publications and analyzing them from the perspective of social network analysis. In this case study, we have limited data from works published in 2010 by England academic and research institutions. The outcomes of this work can help policy makers in realising the current status of research collaborative networks in England.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134314146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Introduction of Acquiring Method for Agents' Actions with Simple Ant Colony Optimization in RoboCup Rescue Simulation System 机器人世界杯救援仿真系统中简单蚁群优化agent动作获取方法的介绍
Hisayuki Sasaoka
This paper has presented acquiring method for agents' actions using Ant Colony Optimization (ACO) in multi-agent system. ACO is one of powerful meta-heuristics algorithms and some researchers have reported the effectiveness of some applications with the algorithm [1-4]. I have developed fire brigade agents using proposed method in RoboCup rescue simulation system. The final goal of this research is an achievement of co-operations for hetero-agent in multi-agent systems. Then this research for implementation for fire brigade agents in my team is the first step of this goal.
提出了一种基于蚁群算法的多智能体系统中智能体动作获取方法。蚁群算法是一种强大的元启发式算法,一些研究人员已经报道了该算法在一些应用中的有效性[1-4]。在机器人世界杯救援模拟系统中,利用所提出的方法开发了消防队员。本研究的最终目标是实现多智能体系统中不同智能体之间的协作。而本次针对我所在团队的消防队员实施的研究就是实现这一目标的第一步。
{"title":"Introduction of Acquiring Method for Agents' Actions with Simple Ant Colony Optimization in RoboCup Rescue Simulation System","authors":"Hisayuki Sasaoka","doi":"10.1109/INCoS.2011.105","DOIUrl":"https://doi.org/10.1109/INCoS.2011.105","url":null,"abstract":"This paper has presented acquiring method for agents' actions using Ant Colony Optimization (ACO) in multi-agent system. ACO is one of powerful meta-heuristics algorithms and some researchers have reported the effectiveness of some applications with the algorithm [1-4]. I have developed fire brigade agents using proposed method in RoboCup rescue simulation system. The final goal of this research is an achievement of co-operations for hetero-agent in multi-agent systems. Then this research for implementation for fire brigade agents in my team is the first step of this goal.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Based Crypto-biometric Key Generation 基于图像的密码生物识别密钥生成
M. Ogiela, L. Ogiela
Identity requirements in information systems can be satisfied by the integration of biometric technologies with cryptography algorithms. In this field, one of the most important areas is the generation of strong cryptographic keys produced from many kinds of biometrics. This paper describes some solutions within this scope focusing on an efficient approach to generating cryptographic keys from visual patterns containing personal information. Generated cryptographic key may be identified by user features, and used by particular persons. In particular, key generation using palm images and coronary vessels will be presented.
将生物识别技术与密码算法相结合,可以满足信息系统中的身份需求。在这一领域中,最重要的一个领域是利用多种生物特征生成强密钥。本文描述了这个范围内的一些解决方案,重点介绍了从包含个人信息的视觉模式生成加密密钥的有效方法。生成的加密密钥可以由用户特征识别,并由特定的人使用。特别是,将介绍使用手掌图像和冠状血管生成密钥。
{"title":"Image Based Crypto-biometric Key Generation","authors":"M. Ogiela, L. Ogiela","doi":"10.1109/INCoS.2011.102","DOIUrl":"https://doi.org/10.1109/INCoS.2011.102","url":null,"abstract":"Identity requirements in information systems can be satisfied by the integration of biometric technologies with cryptography algorithms. In this field, one of the most important areas is the generation of strong cryptographic keys produced from many kinds of biometrics. This paper describes some solutions within this scope focusing on an efficient approach to generating cryptographic keys from visual patterns containing personal information. Generated cryptographic key may be identified by user features, and used by particular persons. In particular, key generation using palm images and coronary vessels will be presented.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Study on Information Recommendation Systems for Continuous Use 面向连续使用的信息推荐系统研究
H. Shoji, Hiroo Inamura, A. Ogino
Most of traditional studies on information recommendation systems aim at recommending highly satisfactory information in a one-time or small number of uses of a system or service, and never take it into account that the user would feel tired of the same system or service after they have used it many times over. This study has modeled the human nature of being tired of the same thing and enabled the measurement of the degree of such boredom. This time, the study has implemented an information recommendation system that has features to (1) visualize the degree of the user's boredom and (2) recommend information that can reduce it. Then, an evaluation experiment was conducted using a system developed. The result of an evaluation experiment shows that the@system@can get the user less bored and more satisfied when used continuously.
传统对信息推荐系统的研究,大多着眼于在对某一系统或服务的一次或少量使用中,推荐令人非常满意的信息,而没有考虑到用户多次使用后对同一系统或服务的厌倦。这项研究模拟了人类对同一件事感到厌倦的本性,并使这种厌倦程度的测量成为可能。这一次,该研究实现了一个信息推荐系统,该系统具有以下功能:(1)可视化用户的无聊程度;(2)推荐可以减少用户无聊程度的信息。然后利用开发的系统进行了评价实验。评价实验结果表明,在连续使用的情况下,该“系统”可以减少用户的无聊感,提高用户的满意度。
{"title":"A Study on Information Recommendation Systems for Continuous Use","authors":"H. Shoji, Hiroo Inamura, A. Ogino","doi":"10.1109/INCoS.2011.40","DOIUrl":"https://doi.org/10.1109/INCoS.2011.40","url":null,"abstract":"Most of traditional studies on information recommendation systems aim at recommending highly satisfactory information in a one-time or small number of uses of a system or service, and never take it into account that the user would feel tired of the same system or service after they have used it many times over. This study has modeled the human nature of being tired of the same thing and enabled the measurement of the degree of such boredom. This time, the study has implemented an information recommendation system that has features to (1) visualize the degree of the user's boredom and (2) recommend information that can reduce it. Then, an evaluation experiment was conducted using a system developed. The result of an evaluation experiment shows that the@system@can get the user less bored and more satisfied when used continuously.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Medical Imaging Diagnosis Support System with Sound Effects 具有声音效果的医学影像诊断支持系统的开发
Tsuneo Kagawa, Hideki Kudo, S. Tanoue, H. Kiyosue, H. Mori, Hiroaki Nishino, K. Utsumiya
Recently, Computer Aided Diagnosis (CAD) has become one of the most important for medical activity. The more exact and various CAD become, the larger amount of medical images are provided. Furthermore, these images becomes high definition. Radiologists have to cost their time and efforts to investigate these medical images. It is strongly required to reduce their burden without debasing the quality of imaging diagnosis. In this paper, we propose the technique to generate sound information based on the image features and discuss their effects for diagnosis. Generating sound effects helps for attention rousing and the fatigue reduction for medical imaging diagnosis.
近年来,计算机辅助诊断(CAD)已成为医疗活动的重要手段之一。计算机辅助设计越精确、种类越多,提供的医学图像就越多。此外,这些图像变得高清晰度。放射科医生不得不花费时间和精力来调查这些医学图像。强烈要求在不降低影像学诊断质量的情况下减轻他们的负担。本文提出了一种基于图像特征生成声音信息的技术,并讨论了其在诊断中的作用。在医学影像诊断中,产生声音效果有助于引起注意,减轻疲劳。
{"title":"Development of Medical Imaging Diagnosis Support System with Sound Effects","authors":"Tsuneo Kagawa, Hideki Kudo, S. Tanoue, H. Kiyosue, H. Mori, Hiroaki Nishino, K. Utsumiya","doi":"10.1109/INCoS.2011.75","DOIUrl":"https://doi.org/10.1109/INCoS.2011.75","url":null,"abstract":"Recently, Computer Aided Diagnosis (CAD) has become one of the most important for medical activity. The more exact and various CAD become, the larger amount of medical images are provided. Furthermore, these images becomes high definition. Radiologists have to cost their time and efforts to investigate these medical images. It is strongly required to reduce their burden without debasing the quality of imaging diagnosis. In this paper, we propose the technique to generate sound information based on the image features and discuss their effects for diagnosis. Generating sound effects helps for attention rousing and the fatigue reduction for medical imaging diagnosis.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121714242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CC-LO: A New Type of Learning Object for the Virtualization of Live Collaborative Sessions CC-LO:实时协作会话虚拟化的一种新型学习对象
S. Caballé, N. Mora, I. Dunwell, D. Gañán
On-line collaborative learning is a mature research field that benefits from collaborative activities which can increase learning efficacy. However, collaborative learning approaches are still not beneficial in every e-learning experience because they require people's presence and collaboration is many times difficult to achieve. It is remarkable that collaborative learning resources still suffer from endemic problems, such as the lack of authentic interactivity, user empowerment, social identity and challenge, thus having a negative effect in learner motivation and engagement. To overcome these and other limitations and deficiencies, we propose a new type of learning object named Complex Collaborative Learning Objects to support the virtualization of collaborative sessions with the aim to leverage the knowledge elicited during live sessions of collaborative learning, which are augmented with author-generated information, in order to produce interactive and attractive resources to be played by learners. In order to improve social engagement, during the CC-LO execution, a VCS is animated so learners can observe how avatars discuss and collaborate, how discussion threads grow and how knowledge is been constructed, refined and consolidated. Furthermore, learners can interact with the CC-LO to modify some parameters observing the consequences and assessing their understanding. The research reported in this paper is currently undertaken within a FP7 European project called ALICE.
在线协作学习是一个成熟的研究领域,它得益于协作活动可以提高学习效能。然而,协作学习方法在每个电子学习体验中仍然不是有益的,因为它们需要人们在场,而协作是很难实现的。值得注意的是,协作学习资源仍然存在一些地方性问题,如缺乏真正的互动性、用户授权、社会认同和挑战,从而对学习者的动机和参与产生负面影响。为了克服这些限制和不足,我们提出了一种新型的学习对象,称为复杂协作学习对象(Complex Collaborative learning Objects),以支持协作学习的虚拟化,目的是利用在协作学习的实时会话中获得的知识,并通过作者生成的信息进行增强,以产生交互式的、有吸引力的资源供学习者使用。为了提高社交参与度,在CC-LO执行过程中,VCS是动画的,因此学习者可以观察虚拟角色如何讨论和协作,讨论线程如何发展以及知识如何构建,提炼和巩固。此外,学习者可以与CC-LO交互来修改一些参数,观察结果并评估他们的理解。本文中报告的研究目前是在一个名为ALICE的FP7欧洲项目中进行的。
{"title":"CC-LO: A New Type of Learning Object for the Virtualization of Live Collaborative Sessions","authors":"S. Caballé, N. Mora, I. Dunwell, D. Gañán","doi":"10.1109/INCOS.2011.59","DOIUrl":"https://doi.org/10.1109/INCOS.2011.59","url":null,"abstract":"On-line collaborative learning is a mature research field that benefits from collaborative activities which can increase learning efficacy. However, collaborative learning approaches are still not beneficial in every e-learning experience because they require people's presence and collaboration is many times difficult to achieve. It is remarkable that collaborative learning resources still suffer from endemic problems, such as the lack of authentic interactivity, user empowerment, social identity and challenge, thus having a negative effect in learner motivation and engagement. To overcome these and other limitations and deficiencies, we propose a new type of learning object named Complex Collaborative Learning Objects to support the virtualization of collaborative sessions with the aim to leverage the knowledge elicited during live sessions of collaborative learning, which are augmented with author-generated information, in order to produce interactive and attractive resources to be played by learners. In order to improve social engagement, during the CC-LO execution, a VCS is animated so learners can observe how avatars discuss and collaborate, how discussion threads grow and how knowledge is been constructed, refined and consolidated. Furthermore, learners can interact with the CC-LO to modify some parameters observing the consequences and assessing their understanding. The research reported in this paper is currently undertaken within a FP7 European project called ALICE.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128344954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 Third International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1