首页 > 最新文献

2014 6th International Conference on Computer Science and Information Technology (CSIT)最新文献

英文 中文
Improved form navigation on mobile devices 改进了移动设备上的表单导航
Karim El Batran, Mark D. Dunlop
In this paper a study was done regarding improving form control and navigation on mobile devices. An observational study of census counters for the Egyptian Agricultural Survey was conducted. This country-wide survey is currently conducted by professional counters using large (100×35 cm double sided) complex paper forms that require manual transcription. Computerization would be beneficial in terms of accuracy and duplication of effort. However there are considerable challenges in reducing the size of the forms to fit mobile devices. Furthermore counters typically have low technological experience. Based on our observations we developed two prototypes: one using traditional form tabs, the other pan-and-zooming. Results from initial user tests showed the pan-and-zoom interface was both faster and had a lower perceived effort.
本文就如何改进移动设备上的表单控制和导航进行了研究。对埃及农业调查的人口普查计数器进行了观察性研究。这项全国范围的调查目前由专业柜台进行,使用大型(100×35厘米双面)复杂的纸质表格,需要人工抄写。计算机化在准确性和重复工作方面是有益的。然而,在减少表单尺寸以适应移动设备方面存在相当大的挑战。此外,柜台通常缺乏技术经验。根据我们的观察,我们开发了两个原型:一个使用传统的表单选项卡,另一个使用平移和缩放。最初用户测试的结果显示,平移和缩放界面既更快,又更省力。
{"title":"Improved form navigation on mobile devices","authors":"Karim El Batran, Mark D. Dunlop","doi":"10.1109/CSIT.2014.6805985","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805985","url":null,"abstract":"In this paper a study was done regarding improving form control and navigation on mobile devices. An observational study of census counters for the Egyptian Agricultural Survey was conducted. This country-wide survey is currently conducted by professional counters using large (100×35 cm double sided) complex paper forms that require manual transcription. Computerization would be beneficial in terms of accuracy and duplication of effort. However there are considerable challenges in reducing the size of the forms to fit mobile devices. Furthermore counters typically have low technological experience. Based on our observations we developed two prototypes: one using traditional form tabs, the other pan-and-zooming. Results from initial user tests showed the pan-and-zoom interface was both faster and had a lower perceived effort.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"380 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on security in Cognitive Radio networks 认知无线电网络安全研究进展
M. Khasawneh, A. Agarwal
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.
为了适应频谱需求的稳定增长,引入了认知无线电(CR)。在CR网络中,允许未授权用户(secondary user, su)在授权用户(primary user, pu)处于非活动状态时动态访问该频段。迄今为止,在认知无线电系统中很少受到关注的一个重要技术领域是无线安全。在认知无线电系统中引入了新的安全威胁和挑战,提供强大的安全性可能是使认知无线电成为长期商业可行概念的最困难的方面。本文讨论了认知无线网络中的主要挑战、安全攻击及其缓解技术。显示的攻击是基于攻击所操作的协议层组织的。
{"title":"A survey on security in Cognitive Radio networks","authors":"M. Khasawneh, A. Agarwal","doi":"10.1109/CSIT.2014.6805980","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805980","url":null,"abstract":"Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115556762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Development of a haptic feedback subsystem 触觉反馈子系统的开发
Abdouslam M. Bashir, A. Betteridge
This paper describes the components and highlights some specifications of a device that allows several combinations of immersed or desktop vision feedback devices to be integrated with a three degree-of-freedom force-feedback device previously known as the `Reactabot™' and currently known as the `Visitact'. The Visitact is a haptic display robot that provides and receives kinaesthetic information from the user, who can touch and manipulate a surrogate object, and feel external forces exerted upon it by obstructions, within a virtual environment. In essence, the Visitact allows a combination of various immersed or desktop visual solutions to be integrated with a three degree-of-freedom force-feedback device. The mechanical interface senses the forces applied by the user and the haptic control system generates a reaction force that moves the surrogate object in the direction of the applied force. The surrogate object can be accelerated up to ±2g (approximately 20m/s2) sustain forces up to 20N, with a virtual mass in the range 0.7- 4 kg. The device provides force feedback over a large proportion of the user's workspace and enables virtual objects to take on user-specified physical properties such as mass, gravity, weight and drag, and was implemented with force/velocity control to allow the robot to interact with an operator, and to share the same working volume. Two techniques are used during a Visitact session. The user, who is normally sitting, holds the surrogate object and either sees a virtual or augmented representation of it on a computer screen, or through a head mounted display. Currently the Visitact is upgraded to work as a six degree of freedom force feedback device. An attempt to extend the device to serve 6- degree of freedom is briefly described.
本文描述了该设备的组件,并强调了该设备的一些规格,该设备允许浸入式或桌面视觉反馈设备的几种组合与以前称为“Reactabot™”的三自由度力反馈设备集成,目前称为“Visitact”。Visitact是一个触觉显示机器人,它提供和接收来自用户的动觉信息,用户可以触摸和操纵代理对象,并在虚拟环境中感受到障碍物施加在它身上的外力。从本质上讲,Visitact允许将各种浸入式或桌面视觉解决方案与三自由度力反馈设备集成在一起。机械界面感知用户施加的力,触觉控制系统产生反作用力,使代理物体朝着施加力的方向移动。代理物体可以加速到±2g(约20m/s2),承受高达20N的力,虚拟质量在0.7- 4kg之间。该设备在用户工作空间的很大一部分上提供力反馈,使虚拟物体能够承担用户指定的物理属性,如质量、重力、重量和阻力,并通过力/速度控制实现,使机器人能够与操作员交互,并共享相同的工作体积。在访问期间使用了两种技术。用户通常坐着,拿着代理对象,在计算机屏幕上或通过头戴式显示器看到它的虚拟或增强表示。目前Visitact已升级为六自由度力反馈装置。简要描述了将该装置扩展到服务于6个自由度的尝试。
{"title":"Development of a haptic feedback subsystem","authors":"Abdouslam M. Bashir, A. Betteridge","doi":"10.1109/CSIT.2014.6805976","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805976","url":null,"abstract":"This paper describes the components and highlights some specifications of a device that allows several combinations of immersed or desktop vision feedback devices to be integrated with a three degree-of-freedom force-feedback device previously known as the `Reactabot™' and currently known as the `Visitact'. The Visitact is a haptic display robot that provides and receives kinaesthetic information from the user, who can touch and manipulate a surrogate object, and feel external forces exerted upon it by obstructions, within a virtual environment. In essence, the Visitact allows a combination of various immersed or desktop visual solutions to be integrated with a three degree-of-freedom force-feedback device. The mechanical interface senses the forces applied by the user and the haptic control system generates a reaction force that moves the surrogate object in the direction of the applied force. The surrogate object can be accelerated up to ±2g (approximately 20m/s2) sustain forces up to 20N, with a virtual mass in the range 0.7- 4 kg. The device provides force feedback over a large proportion of the user's workspace and enables virtual objects to take on user-specified physical properties such as mass, gravity, weight and drag, and was implemented with force/velocity control to allow the robot to interact with an operator, and to share the same working volume. Two techniques are used during a Visitact session. The user, who is normally sitting, holds the surrogate object and either sees a virtual or augmented representation of it on a computer screen, or through a head mounted display. Currently the Visitact is upgraded to work as a six degree of freedom force feedback device. An attempt to extend the device to serve 6- degree of freedom is briefly described.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116173725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic vs. particle swarm optimization techniques for traffic light signals timing 交通信号灯定时的遗传与粒子群优化技术
Rami K. Abushehab, Baker K. Abdalhaq, Badie Sartawi
A good controlling for the traffic lights on the network road may solve the traffic congestion in the cities. This paper deals with the optimization of traffic light signals timing. We used four different heuristic optimization techniques, three types of Genetic algorithm and particle of swarm algorithm. Techniques were applied on a case study of network road which contains 13 traffic lights. We used SUMO (Simulation of Urban MObility) to simulate the network. Heuristic optimization techniques themselves need to be calibrated. Calibrating them using the real problem is time consuming because simulation is computation demanding. We tried to calibrate them using a function that is assumed to have similar response surface but lighter computation demand, then use the calibrated technique to optimize the traffic light signals timing. After some comparing processes of optimization results, we discovered that one type of GA and PS at determined parameters are more suitable to produce the minimum total travel time.
良好的网络道路交通灯控制可以解决城市交通拥堵问题。本文主要研究交通信号灯配时的优化问题。我们使用了四种不同的启发式优化技术,三种类型的遗传算法和群体粒子算法。本文以包含13个红绿灯的路网道路为例,对技术进行了应用。我们使用SUMO (Simulation of Urban MObility)来模拟网络。启发式优化技术本身需要校准。使用实际问题校准它们非常耗时,因为模拟需要大量的计算。我们尝试使用一个假设具有相似响应面但计算量较轻的函数来校准它们,然后使用校准技术来优化交通灯信号定时。经过对优化结果的比较,我们发现在确定的参数下,有一种遗传算法和PS算法更适合产生最小的总行程时间。
{"title":"Genetic vs. particle swarm optimization techniques for traffic light signals timing","authors":"Rami K. Abushehab, Baker K. Abdalhaq, Badie Sartawi","doi":"10.1109/CSIT.2014.6805975","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805975","url":null,"abstract":"A good controlling for the traffic lights on the network road may solve the traffic congestion in the cities. This paper deals with the optimization of traffic light signals timing. We used four different heuristic optimization techniques, three types of Genetic algorithm and particle of swarm algorithm. Techniques were applied on a case study of network road which contains 13 traffic lights. We used SUMO (Simulation of Urban MObility) to simulate the network. Heuristic optimization techniques themselves need to be calibrated. Calibrating them using the real problem is time consuming because simulation is computation demanding. We tried to calibrate them using a function that is assumed to have similar response surface but lighter computation demand, then use the calibrated technique to optimize the traffic light signals timing. After some comparing processes of optimization results, we discovered that one type of GA and PS at determined parameters are more suitable to produce the minimum total travel time.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114202708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An analytical model for estimating execution cost of 1D array expressions 一维阵列表达式执行成本估算的解析模型
Y. Gdura
Compiler writers have developed various techniques, such as constant folding, subexpression elimination, loop transformation and vectorization, to help compilers in code optimization for performance improvement. Yet, they have been far less successful in developing techniques or cost models that compilers can rely on to simplify parallel programming and tune the performance of parallel applications automatically. This paper is the first of two-phase study to develop an analytical model that can be used to estimate the cost for sequential and parallel execution of array expressions on multicore architectures. While this paper discuss the possibility of developing a cost model to estimate the sequential execution of array expressions on a single CPU, the second part of the investigation shall focus on developing a model to estimate parallel execution of arrays on multicore platforms. The model presented in this paper is expected to be used by programming language compilers as complement component with the other model to estimate and subsequently decide whether to parallelize individual array expressions or not. The preliminary results which are presented here show that this model can give a satisfactory evaluation and high-precision estimation for the cost of executing a regular array expression on a single core processor.
编译器编写者开发了各种技术,如常量折叠、子表达式消除、循环转换和向量化,以帮助编译器优化代码以提高性能。然而,他们在开发技术或成本模型方面远没有那么成功,编译器可以依赖这些技术或成本模型来简化并行编程,并自动调整并行应用程序的性能。本文是两阶段研究的第一阶段,旨在开发一个分析模型,该模型可用于估计在多核架构上顺序和并行执行数组表达式的成本。虽然本文讨论了开发成本模型来估计单个CPU上数组表达式的顺序执行的可能性,但研究的第二部分将侧重于开发一个模型来估计多核平台上数组的并行执行。本文提出的模型有望被编程语言编译器用作与其他模型的补充组件,以估计并随后决定是否并行化单个数组表达式。本文给出的初步结果表明,该模型可以对在单核处理器上执行正则数组表达式的成本给出满意的评估和高精度的估计。
{"title":"An analytical model for estimating execution cost of 1D array expressions","authors":"Y. Gdura","doi":"10.1109/CSIT.2014.6805991","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805991","url":null,"abstract":"Compiler writers have developed various techniques, such as constant folding, subexpression elimination, loop transformation and vectorization, to help compilers in code optimization for performance improvement. Yet, they have been far less successful in developing techniques or cost models that compilers can rely on to simplify parallel programming and tune the performance of parallel applications automatically. This paper is the first of two-phase study to develop an analytical model that can be used to estimate the cost for sequential and parallel execution of array expressions on multicore architectures. While this paper discuss the possibility of developing a cost model to estimate the sequential execution of array expressions on a single CPU, the second part of the investigation shall focus on developing a model to estimate parallel execution of arrays on multicore platforms. The model presented in this paper is expected to be used by programming language compilers as complement component with the other model to estimate and subsequently decide whether to parallelize individual array expressions or not. The preliminary results which are presented here show that this model can give a satisfactory evaluation and high-precision estimation for the cost of executing a regular array expression on a single core processor.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114425581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless sensors network and acknowledgement technique based ZigBee system 基于无线传感器网络和识别技术的ZigBee系统
Firas S. Al-Sharbaty
The attractive features of wireless sensors based ZigBee and IEEE 802.15.4 standard such low cost, flexibility, scalability, and multiple usages contribute to spread it in many trends. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations.
基于ZigBee和IEEE 802.15.4标准的无线传感器具有低成本、灵活性、可扩展性和多用途等吸引人的特点,这有助于它在许多趋势中得到推广。本文研究的无线传感器网络包括固定无线传感器网络和移动无线传感器网络,并采用网状和树形拓扑结构进行处理。本文利用确认技术的作用来寻找更好的无线传感器网络吞吐量和端到端时延。结果表明,根据网络拓扑类型和传感器状态(固定或移动)的不同,识别技术对网络性能有不同的影响。在树形拓扑和网状拓扑中,对于移动站和固定站,确认的使用在吞吐量和端到端延迟方面具有更好的性能。
{"title":"Wireless sensors network and acknowledgement technique based ZigBee system","authors":"Firas S. Al-Sharbaty","doi":"10.1109/CSIT.2014.6805982","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805982","url":null,"abstract":"The attractive features of wireless sensors based ZigBee and IEEE 802.15.4 standard such low cost, flexibility, scalability, and multiple usages contribute to spread it in many trends. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128842312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Robust image watermarking based on Dual Intermediate Significant Bit (DISB) 基于双中间有效位的鲁棒图像水印
G. N. Mohammed, A. Yasin, A. Zeki
The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely conflict. In this study, the method focuses on the robustness against chosen attacks for the watermarked image based on Dual Intermediate Significant Bit (DISB) model. This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem which derived and applied in this study. The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image which proved that proposed method is better as compared with the Least Significant Bit (LSB) after embedding two bits. The best values investigated when the Peak Signal to Noise Ratio (PSNR) is equal or more than 30db, and finding the best Normalized Cross Correlation (NCC) to evaluate the image resistance against attacks. The best values investigated when the two embedded bits are k1=4 and k2=6.
对于任何一种水印系统,最重要的要求应该是对可能的攻击具有鲁棒性和水印图像的质量。在大多数应用中,嵌入水印的水印算法必须对可能的攻击具有鲁棒性,并尽可能地保持宿主媒体的质量。这两种需求之间的关系是完全冲突的。在本研究中,该方法重点研究了基于双中间有效位(DISB)模型的水印图像对选择攻击的鲁棒性。该方法需要在原始图像的每个像素中嵌入两个比特,同时改变其他六个比特,从而直接同化原始像素。在这种情况下,当两个隐藏位等于或不等于原始位时,需要使用数学方程来解决这一问题,本文推导并应用了这一问题。结果表明,在关注水印图像的高质量时,所提模型产生的水印图像比我们之前的方法具有鲁棒性,这证明了所提方法比嵌入两个比特后的最小有效位(LSB)方法更好。研究峰值信噪比(PSNR)等于或大于30db时的最佳值,并找到最佳归一化相互关系(NCC)来评估图像对攻击的抵抗能力。当两个嵌入位分别为k1=4和k2=6时,所研究的最佳值。
{"title":"Robust image watermarking based on Dual Intermediate Significant Bit (DISB)","authors":"G. N. Mohammed, A. Yasin, A. Zeki","doi":"10.1109/CSIT.2014.6805973","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805973","url":null,"abstract":"The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely conflict. In this study, the method focuses on the robustness against chosen attacks for the watermarked image based on Dual Intermediate Significant Bit (DISB) model. This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem which derived and applied in this study. The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image which proved that proposed method is better as compared with the Least Significant Bit (LSB) after embedding two bits. The best values investigated when the Peak Signal to Noise Ratio (PSNR) is equal or more than 30db, and finding the best Normalized Cross Correlation (NCC) to evaluate the image resistance against attacks. The best values investigated when the two embedded bits are k1=4 and k2=6.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using decision tree classification to assist in the prediction of Alzheimer's disease 利用决策树分类辅助阿尔茨海默病的预测
Dana AL-Dlaeen, A. Alashqur
Alzheimer's disease is one of the most common forms of dementia affecting millions of senior people worldwide. In this paper, we develop an Alzheimer's disease prediction model that can assist medical professionals in predicting the status of the disease based on medical data about patients. The sample medical data we use has five important attributes, namely, gender, age, genetic causes, brain injury, and vascular disease. The sample also contains values for seventeen different patients that represent seventeen medical cases. We perform decision tree induction to create a decision tree that corresponds to the sample data. We base our selection of nodes in the tree on the Entropy or Information Gain computed for each attribute. At each level of the tree, the right attribute is chosen as a splitting attribute if it gives us the highest Information Gain.
阿尔茨海默病是最常见的痴呆症之一,影响着全世界数百万老年人。在本文中,我们开发了一个阿尔茨海默病预测模型,可以帮助医疗专业人员根据患者的医疗数据预测疾病的状态。我们使用的样本医疗数据有五个重要属性,即性别、年龄、遗传原因、脑损伤和血管疾病。该样本还包含代表17个医疗案例的17个不同患者的值。我们执行决策树归纳来创建一个与样本数据对应的决策树。我们根据每个属性计算的熵或信息增益来选择树中的节点。在树的每一层,如果正确的属性能给我们提供最高的信息增益,就选择它作为分割属性。
{"title":"Using decision tree classification to assist in the prediction of Alzheimer's disease","authors":"Dana AL-Dlaeen, A. Alashqur","doi":"10.1109/CSIT.2014.6805989","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805989","url":null,"abstract":"Alzheimer's disease is one of the most common forms of dementia affecting millions of senior people worldwide. In this paper, we develop an Alzheimer's disease prediction model that can assist medical professionals in predicting the status of the disease based on medical data about patients. The sample medical data we use has five important attributes, namely, gender, age, genetic causes, brain injury, and vascular disease. The sample also contains values for seventeen different patients that represent seventeen medical cases. We perform decision tree induction to create a decision tree that corresponds to the sample data. We base our selection of nodes in the tree on the Entropy or Information Gain computed for each attribute. At each level of the tree, the right attribute is chosen as a splitting attribute if it gives us the highest Information Gain.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Automatic Face Reconstruction system 自动人脸重建系统
Nur Nazihah Rahim, Nur Azrin Abd Malek, A. Zeki, Adamu I. Abubakar
A face can be sketch by freehand based on the evidence of an eyewitness description which is necessary for the Detectives to tract the looks of the offender. This process is slow; moreover there are some factors which cannot be assumed by the artist, including weight, hair color and length, and eye color. However, if this process is conducted correctly, the result should bear a striking resemblance to the individual. As with composite drawings, an image of the resulting face can then be distributed among law enforcement personnel or to the general public. The reconstructed face should be photographed in such a way that there is no perspective distortion. This paper presents Face Reconstruction for Identification that approach is relatively same with the sketching by freehand. However, this system will reconstruction and generate the face automatically. This will create an effectiveness and efficiency in identifying and recognize the offender.
根据目击者描述的证据,可以徒手勾勒出一张人脸,这对侦探追踪罪犯的长相是必要的。这个过程是缓慢的;此外,还有一些因素是艺术家无法假设的,包括体重,头发的颜色和长度,以及眼睛的颜色。然而,如果这个过程正确地进行,结果应该与个人惊人地相似。与合成图一样,生成的人脸图像可以分发给执法人员或公众。重建的脸应该以这样一种方式拍摄,没有透视失真。本文提出了一种与徒手写生相对相同的人脸重建识别方法。然而,该系统将自动重建和生成人脸。这将在识别和识别罪犯方面产生效力和效率。
{"title":"Automatic Face Reconstruction system","authors":"Nur Nazihah Rahim, Nur Azrin Abd Malek, A. Zeki, Adamu I. Abubakar","doi":"10.1109/CSIT.2014.6806002","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6806002","url":null,"abstract":"A face can be sketch by freehand based on the evidence of an eyewitness description which is necessary for the Detectives to tract the looks of the offender. This process is slow; moreover there are some factors which cannot be assumed by the artist, including weight, hair color and length, and eye color. However, if this process is conducted correctly, the result should bear a striking resemblance to the individual. As with composite drawings, an image of the resulting face can then be distributed among law enforcement personnel or to the general public. The reconstructed face should be photographed in such a way that there is no perspective distortion. This paper presents Face Reconstruction for Identification that approach is relatively same with the sketching by freehand. However, this system will reconstruction and generate the face automatically. This will create an effectiveness and efficiency in identifying and recognize the offender.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Elaboration of a model for an indexed base for teaching Arabic language to disabled people 为残疾人阿拉伯语教学编制索引库模型
A. Boudhief, M. Maraoui, M. Zrigui
In this paper we carried out a bibliographic research concerning distance learning, pedagogical indexing and integration of accessibility in e-Learning platforms. Then, to achieve the goals we have chosen “IMS AccessForALL” as standard to realize our model. The model that we realized is consistent with the standard followed. We also taken into consideration the guidelines of the WAI (Web accessibility Initiative) presented in WCAG. Finally, for the step of indexing, we started with the creation of the XML schema, then the indexation of resources in the true sense of the term.
本文对电子学习平台中的远程学习、教学标引和可及性整合进行了文献研究。然后,为了实现目标,我们选择了“IMS AccessForALL”作为标准来实现我们的模型。我们实现的模型与所遵循的标准是一致的。我们亦考虑了“无障碍网页倡议”(WAI)的指引。最后,对于索引步骤,我们从创建XML模式开始,然后是真正意义上的资源索引。
{"title":"Elaboration of a model for an indexed base for teaching Arabic language to disabled people","authors":"A. Boudhief, M. Maraoui, M. Zrigui","doi":"10.1109/CSIT.2014.6805987","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805987","url":null,"abstract":"In this paper we carried out a bibliographic research concerning distance learning, pedagogical indexing and integration of accessibility in e-Learning platforms. Then, to achieve the goals we have chosen “IMS AccessForALL” as standard to realize our model. The model that we realized is consistent with the standard followed. We also taken into consideration the guidelines of the WAI (Web accessibility Initiative) presented in WCAG. Finally, for the step of indexing, we started with the creation of the XML schema, then the indexation of resources in the true sense of the term.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 6th International Conference on Computer Science and Information Technology (CSIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1