首页 > 最新文献

2009 International Conference on Emerging Technologies最新文献

英文 中文
Selecting a distribution function for optical attenuation in dense continental fog conditions 选择大陆浓雾条件下光学衰减的分布函数
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353185
M. S. Khan, M. S. Awan, E. Leitgeb, F. Nadeem, I. Hussain
Free Space Optics (FSO) is a broadband access technology finding numerous applications in next generation networks (NGN). The biggest disadvantage of this technology is its dependence on local weather conditions in the free-space atmospheric channel. This requires a thorough investigation of different attenuating factors and their influence on FSO transmissions. In this paper we analyze the behavior of dense continental fog on FSO links by investigating different probability distribution functions for measured optical attenuations. Several probability distributions are used; to observe reasonable probability distribution which best suits to describe the characteristics of FSO links under dense continental fog conditions. Further, Kolmogorov-Smirnov non-parametric test is used for goodness of fit of the selected probability distributions. The results of Kolmogorov-Smirnov test suggests that Wakeby probability distribution function is reasonable to describe the behavior of optical attenuation data measured in a dense continental fog environment.
自由空间光学(FSO)是一种宽带接入技术,在下一代网络(NGN)中有着广泛的应用。该技术最大的缺点是依赖于自由空间大气信道的当地天气条件。这需要对不同的衰减因素及其对FSO传输的影响进行彻底的研究。本文通过研究测量光衰减的不同概率分布函数,分析了大陆浓雾在自由通信链路上的行为。使用了几种概率分布;观察最适合描述大陆浓雾条件下FSO链路特性的合理概率分布。进一步,采用Kolmogorov-Smirnov非参数检验对所选概率分布的拟合优度进行检验。Kolmogorov-Smirnov检验结果表明,Wakeby概率分布函数可以较好地描述大陆浓雾环境下测量到的光学衰减数据的行为。
{"title":"Selecting a distribution function for optical attenuation in dense continental fog conditions","authors":"M. S. Khan, M. S. Awan, E. Leitgeb, F. Nadeem, I. Hussain","doi":"10.1109/ICET.2009.5353185","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353185","url":null,"abstract":"Free Space Optics (FSO) is a broadband access technology finding numerous applications in next generation networks (NGN). The biggest disadvantage of this technology is its dependence on local weather conditions in the free-space atmospheric channel. This requires a thorough investigation of different attenuating factors and their influence on FSO transmissions. In this paper we analyze the behavior of dense continental fog on FSO links by investigating different probability distribution functions for measured optical attenuations. Several probability distributions are used; to observe reasonable probability distribution which best suits to describe the characteristics of FSO links under dense continental fog conditions. Further, Kolmogorov-Smirnov non-parametric test is used for goodness of fit of the selected probability distributions. The results of Kolmogorov-Smirnov test suggests that Wakeby probability distribution function is reasonable to describe the behavior of optical attenuation data measured in a dense continental fog environment.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126944133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
New innovations in healthcare delivery and laparoscopic surgery in Pakistan 巴基斯坦在医疗服务和腹腔镜手术方面的新创新
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353213
Asif Zafar
Pakistan is a densely populated country with major rural urban disparity in healthcare delivery. Use of Information Technology to improve the efficiency of existing healthcare services of Pakistan in the form of Telemedicine has proved its role beyond any doubts. Its advantages include better utilization of healthcare resources, early intervention, provision of expert advice at remote sites and distance education. Telemedicine/E-Health training center at Holy Family Hospital has played the pioneering role in implementation of National Telemedicine initiatives and enhancing Human Resources component in the field by structured Training programs. Another initiative at the center is establishment of Virtual Trainer Lab (VTL) to improve Minimal Access Surgery (MAS) skills of the Post Graduate Trainees and young surgeons. MAS is an emerging technique in surgery which reduces post operative complications and has a better patient outcome. Shifting from traditional OPEN SURGERY to MAS needs training and orientation to this new technology. Training of these skills in operation theaters is not safe for patients. VTL is equipped with advance training tools like box trainers, virtual realty simulators and full procedural simulators to train young surgeons in those skills without harming the patient. This Lab is a way to fast and safe skill acquisition in controlled environment.
巴基斯坦是一个人口稠密的国家,在医疗保健服务方面城乡差距很大。利用信息技术以远程医疗的形式提高巴基斯坦现有保健服务的效率已证明其作用不容置疑。它的优势包括更好地利用医疗资源、早期干预、在远程地点提供专家咨询和远程教育。圣家医院的远程医疗/电子保健培训中心在实施国家远程医疗倡议和通过结构化培训计划加强该领域的人力资源组成部分方面发挥了先锋作用。中心的另一项举措是建立虚拟培训师实验室(VTL),以提高研究生培训生和年轻外科医生的最小接触手术(MAS)技能。MAS是一种新兴的外科技术,它减少了术后并发症,并有更好的患者预后。从传统的开放式手术到MAS的转变需要对这项新技术进行培训和指导。在手术室培训这些技能对患者来说是不安全的。VTL配备了先进的培训工具,如盒子训练器,虚拟现实模拟器和全程序模拟器,以培训年轻的外科医生在不伤害病人的情况下掌握这些技能。本实验室是一种在受控环境下快速、安全的技能习得方法。
{"title":"New innovations in healthcare delivery and laparoscopic surgery in Pakistan","authors":"Asif Zafar","doi":"10.1109/ICET.2009.5353213","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353213","url":null,"abstract":"Pakistan is a densely populated country with major rural urban disparity in healthcare delivery. Use of Information Technology to improve the efficiency of existing healthcare services of Pakistan in the form of Telemedicine has proved its role beyond any doubts. Its advantages include better utilization of healthcare resources, early intervention, provision of expert advice at remote sites and distance education. Telemedicine/E-Health training center at Holy Family Hospital has played the pioneering role in implementation of National Telemedicine initiatives and enhancing Human Resources component in the field by structured Training programs. Another initiative at the center is establishment of Virtual Trainer Lab (VTL) to improve Minimal Access Surgery (MAS) skills of the Post Graduate Trainees and young surgeons. MAS is an emerging technique in surgery which reduces post operative complications and has a better patient outcome. Shifting from traditional OPEN SURGERY to MAS needs training and orientation to this new technology. Training of these skills in operation theaters is not safe for patients. VTL is equipped with advance training tools like box trainers, virtual realty simulators and full procedural simulators to train young surgeons in those skills without harming the patient. This Lab is a way to fast and safe skill acquisition in controlled environment.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"52 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114042549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Pseudo Random Noise Generator's parameters for link analysis 用于链路分析的伪随机噪声发生器参数检测
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353143
H. A. Mustafa
This paper presents the method how the parameters of Pseudo Random Noise Generator (PRNG) can be detected. The parameters to be detected include the primitive polynomial and the initial seed of the PRNG. Different test vectors of scrambled sequences are generated by changing the parameters of Linear Feedback Shift Register (LFSR). The test vectors are then passed one by one through the detection algorithm which calculates the weight difference for a range of primitive trinomials. Subsequently, the weight difference is calculated between the alphabets over GF(2) of decoded periods of LFSR The maximum weight difference thus obtained for specific polynomial depicts the most probable primitive trinomial. The initial seed of LFSR is then found by fixing the trinomial and calculating the weight difference for a range of seeds. The correct initial seed is depicted by the maximum weight difference.
本文介绍了伪随机噪声发生器(PRNG)参数的检测方法。要检测的参数包括PRNG的原始多项式和初始种子。通过改变线性反馈移位寄存器(LFSR)的参数,生成不同的置乱序列测试向量。然后通过检测算法逐个传递测试向量,该算法计算一组原始三项式的权重差。随后,在LFSR解码周期的GF(2)上计算字母表之间的权重差,从而获得特定多项式的最大权重差描述了最可能的原始三项式。然后通过固定三叉项并计算一系列种子的权重差来找到LFSR的初始种子。正确的初始种子由最大重量差表示。
{"title":"Detection of Pseudo Random Noise Generator's parameters for link analysis","authors":"H. A. Mustafa","doi":"10.1109/ICET.2009.5353143","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353143","url":null,"abstract":"This paper presents the method how the parameters of Pseudo Random Noise Generator (PRNG) can be detected. The parameters to be detected include the primitive polynomial and the initial seed of the PRNG. Different test vectors of scrambled sequences are generated by changing the parameters of Linear Feedback Shift Register (LFSR). The test vectors are then passed one by one through the detection algorithm which calculates the weight difference for a range of primitive trinomials. Subsequently, the weight difference is calculated between the alphabets over GF(2) of decoded periods of LFSR The maximum weight difference thus obtained for specific polynomial depicts the most probable primitive trinomial. The initial seed of LFSR is then found by fixing the trinomial and calculating the weight difference for a range of seeds. The correct initial seed is depicted by the maximum weight difference.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards emotionally-personalized computing: Dynamic prediction of student mental states from self-manipulatory body movements 迈向情绪个人化计算:自我操控身体动作对学生心理状态的动态预测
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353167
Abdul Rehman Abbasi, N. Afzulpurkar, T. Uno
An emotionally-personalized computer that could empathize a student, learning through a tutorial or a software program, would be an excellent application of affective computing. Towards development of this potentially beneficial technology, we describe two related evaluations of a student mental state prediction model that not only predicts student's mental state from his/her visually observable behavior but also detects his/her personality. In the first set of evaluations, we model the assumed cause-effect relationships between student's mental states and the body gestures using a two-layered dynamic Bayesian network (DBN). We used the data obtained earlier from four students, in a highly-contextualized interaction, i.e. students attending a classroom lecture. We train and test this DBN using data from each individual student. A maximum a posteriori classifier based on the DBN model gives an average accuracy of 87.6% over all four individual student cases. In the second set of evaluations, we extend the model to a three-layered DBN by including the personality attribute in the network, and then, we train the network using data from all four students. At test time, the network successfully detects the personality of each test student. The results demonstrate the feasibility of our approach.
一台具有情感个性化的计算机,能够与学生感同身受,通过教程或软件程序学习,将是情感计算的一个极好的应用。为了开发这种潜在的有益技术,我们描述了对学生心理状态预测模型的两个相关评估,该模型不仅可以从学生的视觉观察行为中预测学生的心理状态,还可以检测他/她的个性。在第一组评估中,我们使用双层动态贝叶斯网络(DBN)对学生心理状态与肢体动作之间的因果关系进行建模。我们使用了之前从四个学生那里获得的数据,在一个高度情境化的互动中,即学生参加课堂讲座。我们使用每个学生的数据来训练和测试这个DBN。基于DBN模型的最大后验分类器在所有四个学生案例中平均准确率为87.6%。在第二组评估中,我们通过在网络中包含人格属性将模型扩展到三层DBN,然后,我们使用来自所有四个学生的数据来训练网络。在测试时,该网络成功地检测到每个测试学生的个性。结果证明了该方法的可行性。
{"title":"Towards emotionally-personalized computing: Dynamic prediction of student mental states from self-manipulatory body movements","authors":"Abdul Rehman Abbasi, N. Afzulpurkar, T. Uno","doi":"10.1109/ICET.2009.5353167","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353167","url":null,"abstract":"An emotionally-personalized computer that could empathize a student, learning through a tutorial or a software program, would be an excellent application of affective computing. Towards development of this potentially beneficial technology, we describe two related evaluations of a student mental state prediction model that not only predicts student's mental state from his/her visually observable behavior but also detects his/her personality. In the first set of evaluations, we model the assumed cause-effect relationships between student's mental states and the body gestures using a two-layered dynamic Bayesian network (DBN). We used the data obtained earlier from four students, in a highly-contextualized interaction, i.e. students attending a classroom lecture. We train and test this DBN using data from each individual student. A maximum a posteriori classifier based on the DBN model gives an average accuracy of 87.6% over all four individual student cases. In the second set of evaluations, we extend the model to a three-layered DBN by including the personality attribute in the network, and then, we train the network using data from all four students. At test time, the network successfully detects the personality of each test student. The results demonstrate the feasibility of our approach.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134389789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monitoring software evolution using multiple types of changes 使用多种类型的变更监视软件演进
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353135
Shafqat Ali, O. Maqbool
Software systems require gradual changes to survive in an environment where they are implemented. Several reasons are a cause of change in software e.g. error fixing, enhancement in functionality, performance improvement. This behaviour of gradual change in software is known as software evolution. The study of software evolution is an active area of research. Researchers have monitored software evolution in different ways. The method of monitoring evolution is a key point, because different methods may reflect different evolutionary picture of software. In this paper, we studied changes that occurred in software systems for software evolution. Our experimental study focuses on three different types of changes i.e. addition, deletion and modification, and is helpful for detailed analysis of software evolution. Furthermore, on the basis of different type of changes, we investigated Lehman's 5th Law (Conservation of Familiarity) for small scale open source software systems. Our experimental study shows that different measures reflect different evolutionary picture of the software systems.
软件系统需要渐进的变化才能在实现它们的环境中生存。有几个原因会导致软件的变化,例如修复错误、增强功能、改进性能。软件中这种逐渐变化的行为被称为软件进化。软件进化的研究是一个活跃的研究领域。研究人员以不同的方式监测软件的进化。监控进化的方法是一个关键点,因为不同的方法可能反映不同的软件进化图像。在本文中,我们研究了软件系统中发生的变化。我们的实验研究侧重于三种不同类型的变化,即添加、删除和修改,这有助于详细分析软件的进化。此外,基于不同类型的变化,我们研究了小规模开源软件系统的雷曼第五定律(熟悉度守恒)。我们的实验研究表明,不同的度量反映了不同的软件系统的进化图景。
{"title":"Monitoring software evolution using multiple types of changes","authors":"Shafqat Ali, O. Maqbool","doi":"10.1109/ICET.2009.5353135","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353135","url":null,"abstract":"Software systems require gradual changes to survive in an environment where they are implemented. Several reasons are a cause of change in software e.g. error fixing, enhancement in functionality, performance improvement. This behaviour of gradual change in software is known as software evolution. The study of software evolution is an active area of research. Researchers have monitored software evolution in different ways. The method of monitoring evolution is a key point, because different methods may reflect different evolutionary picture of software. In this paper, we studied changes that occurred in software systems for software evolution. Our experimental study focuses on three different types of changes i.e. addition, deletion and modification, and is helpful for detailed analysis of software evolution. Furthermore, on the basis of different type of changes, we investigated Lehman's 5th Law (Conservation of Familiarity) for small scale open source software systems. Our experimental study shows that different measures reflect different evolutionary picture of the software systems.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130984752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Automated optimum test case generation using web navigation graphs 使用web导航图自动生成最佳测试用例
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353134
Ahmad Shahzad, Sajjad Raza, M. Azam, K. Bilal, Inam-ul-Haq, S. Shamail
Increased diversity and complexity of software systems derived the need for test automation. Test Automation is the use of software for automatic execution of tests, comparison of results with expected outcome, setting up preconditions for test and test reporting functions. Model based testing is a test automation approach that generates and maintains more useful and flexible tests from explicit descriptions of the application. Graph theory techniques have been an important part of model based testing and several graph theory techniques have been proposed in the literature. We used a famous graph theory technique called maximum network flows for generating minimum number of test cases covering all features of a system. We used a web based case study to describe the working of the proposed optimum path finding algorithm. We found certain constraints on web navigation graph in order to completely reflect the system in the form of a graph. The resulting web navigation graph is given as input to the algorithm that we implemented, that returns the optimal test cases for the web application system. We then graphically showed the optimality and feature coverage of the algorithm with respect to the case study.
软件系统的多样性和复杂性的增加导致了测试自动化的需要。测试自动化是使用软件自动执行测试,将结果与预期结果进行比较,为测试和测试报告功能设置前提条件。基于模型的测试是一种测试自动化方法,它根据应用程序的显式描述生成并维护更有用、更灵活的测试。图论技术是基于模型的测试的重要组成部分,文献中提出了几种图论技术。我们使用了一种著名的图论技术,称为最大网络流,用于生成覆盖系统所有特征的最小数量的测试用例。我们使用基于web的案例研究来描述所提出的最优寻径算法的工作原理。为了以图的形式完整地反映系统,我们对web导航图进行了一定的约束。生成的web导航图作为我们实现的算法的输入,返回web应用系统的最佳测试用例。然后,我们以图形方式显示了该算法相对于案例研究的最优性和特征覆盖率。
{"title":"Automated optimum test case generation using web navigation graphs","authors":"Ahmad Shahzad, Sajjad Raza, M. Azam, K. Bilal, Inam-ul-Haq, S. Shamail","doi":"10.1109/ICET.2009.5353134","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353134","url":null,"abstract":"Increased diversity and complexity of software systems derived the need for test automation. Test Automation is the use of software for automatic execution of tests, comparison of results with expected outcome, setting up preconditions for test and test reporting functions. Model based testing is a test automation approach that generates and maintains more useful and flexible tests from explicit descriptions of the application. Graph theory techniques have been an important part of model based testing and several graph theory techniques have been proposed in the literature. We used a famous graph theory technique called maximum network flows for generating minimum number of test cases covering all features of a system. We used a web based case study to describe the working of the proposed optimum path finding algorithm. We found certain constraints on web navigation graph in order to completely reflect the system in the form of a graph. The resulting web navigation graph is given as input to the algorithm that we implemented, that returns the optimal test cases for the web application system. We then graphically showed the optimality and feature coverage of the algorithm with respect to the case study.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124144560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of password login phishing based protocols for security improvements 分析基于密码登录的网络钓鱼协议的安全性改进
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353144
S. Khayal, A. Khan, N. Bibi, T. Ashraf
Password is a key to secret authentication data and is most widely used for security purposes therefore it is open to attacks such as phishing attack. Phishing is a form of internet fraud, which phisher applies to steal online consumer's personal identity data and financial account credentials. In this paper, we analyze a technique of password hashing, to compute secure passwords. Using this mechanism, we can obtain hash value by applying a cryptographic hash function to a string consisting of the submitted password and, usually, another value known as a salt. The salt value consists of current parameters of the system and prevents attackers from building a list of hash values for common passwords. MD5 and SHA1 are frequently used cryptographic hash functions. We implemented these algorithms and found that SHA-1 is more secure but slow in execution as SHA-1 includes more rounds than MD5 in calculating hashes.
密码是保密身份验证数据的关键,最广泛地用于安全目的,因此它很容易受到网络钓鱼等攻击。网络钓鱼是网络诈骗的一种形式,其目的是窃取网上消费者的个人身份信息和金融账户凭证。本文分析了一种计算安全密码的密码哈希技术。使用这种机制,我们可以通过将加密散列函数应用于由提交的密码和通常称为salt的另一个值组成的字符串来获得散列值。盐值由系统的当前参数组成,防止攻击者为常用密码构建哈希值列表。MD5和SHA1是常用的加密散列函数。我们实现了这些算法,发现SHA-1更安全,但执行速度较慢,因为SHA-1在计算哈希时比MD5包含更多的轮数。
{"title":"Analysis of password login phishing based protocols for security improvements","authors":"S. Khayal, A. Khan, N. Bibi, T. Ashraf","doi":"10.1109/ICET.2009.5353144","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353144","url":null,"abstract":"Password is a key to secret authentication data and is most widely used for security purposes therefore it is open to attacks such as phishing attack. Phishing is a form of internet fraud, which phisher applies to steal online consumer's personal identity data and financial account credentials. In this paper, we analyze a technique of password hashing, to compute secure passwords. Using this mechanism, we can obtain hash value by applying a cryptographic hash function to a string consisting of the submitted password and, usually, another value known as a salt. The salt value consists of current parameters of the system and prevents attackers from building a list of hash values for common passwords. MD5 and SHA1 are frequently used cryptographic hash functions. We implemented these algorithms and found that SHA-1 is more secure but slow in execution as SHA-1 includes more rounds than MD5 in calculating hashes.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"454 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124307367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of indexing techniques in Data warehousing 数据仓库中索引技术的性能分析
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353202
Shawana Jamil, Rashda Ibrahim
The explosive growth of information in recent years has brought up a new question/challenge of disseminating information from a huge plethora of data. This has led to an upscale development of interest in Data warehousing. Different indexing techniques have been developed which are being used for fast data retrieval in Data warehouse environment, but it is quite difficult to find an appropriate technique for a specific query type. So an investigation is needed to find an indexing technique for a specific query type. The objective of this paper is to compare indexing technique and to identify the factors which are to be considered in selecting a proper indexing technique for data warehouse applications, and to evaluate indexing techniques on the basis of different types of data warehouse queries. This paper focuses on the performance evaluation of three data warehouse queries with three different indexing techniques and to observe the impact of variable size data with respect to time and space complexity.
近年来信息的爆炸式增长带来了从海量数据中传播信息的新问题/挑战。这导致了对数据仓库兴趣的高度发展。为了在数据仓库环境中实现快速的数据检索,已经开发了不同的索引技术,但是很难找到适合特定查询类型的索引技术。因此,需要进行调查以找到针对特定查询类型的索引技术。本文的目的是比较索引技术,确定为数据仓库应用程序选择合适的索引技术时应考虑的因素,并根据不同类型的数据仓库查询对索引技术进行评估。本文主要关注使用三种不同索引技术的三种数据仓库查询的性能评估,并观察可变大小数据对时间和空间复杂性的影响。
{"title":"Performance analysis of indexing techniques in Data warehousing","authors":"Shawana Jamil, Rashda Ibrahim","doi":"10.1109/ICET.2009.5353202","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353202","url":null,"abstract":"The explosive growth of information in recent years has brought up a new question/challenge of disseminating information from a huge plethora of data. This has led to an upscale development of interest in Data warehousing. Different indexing techniques have been developed which are being used for fast data retrieval in Data warehouse environment, but it is quite difficult to find an appropriate technique for a specific query type. So an investigation is needed to find an indexing technique for a specific query type. The objective of this paper is to compare indexing technique and to identify the factors which are to be considered in selecting a proper indexing technique for data warehouse applications, and to evaluate indexing techniques on the basis of different types of data warehouse queries. This paper focuses on the performance evaluation of three data warehouse queries with three different indexing techniques and to observe the impact of variable size data with respect to time and space complexity.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114531996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Selecting predicate logic for knowledge representation by comparative study of knowledge representation schemes 通过对知识表示方案的比较研究,选择谓词逻辑进行知识表示
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353207
Amjad Ali, M. Khan
In Artificial Intelligence, knowledge representation is a combination of data structures and interpretive procedures that leads to knowledgeable behavior. Therefore, it is required to investigate such knowledge representation technique in which knowledge can be easily and efficiently represented in computer. This research paper compares various knowledge representation techniques and proves that predicate logic is a more efficient and more accurate knowledge representation scheme. The algorithm in this paper splits the English text/sentences into phrases/constituents and then represents these in predicate logic. This algorithm also generates the original sentences from the representation in order to check the accuracy of representation. The algorithm has been tested on real text/sentences of English. The algorithm has achieved an accuracy of 80%. If the text is in simple discourse units, then the algorithm accurately represents it in predicate logic. The algorithm also accurately retrieves the original text/sentences from such representation.
在人工智能中,知识表示是数据结构和导致知识行为的解释过程的组合。因此,需要研究一种能够方便、高效地在计算机中表示知识的知识表示技术。本文通过对各种知识表示技术的比较,证明了谓词逻辑是一种更高效、更准确的知识表示方案。本文的算法将英语文本/句子分割成短语/成分,然后用谓词逻辑表示。该算法还从表示中生成原始句子,以检验表示的准确性。该算法已经在真实的英语文本/句子中进行了测试。该算法的准确率达到80%。如果文本是在简单的话语单元中,那么该算法在谓词逻辑中准确地表示它。该算法还可以准确地从这种表示中检索原始文本/句子。
{"title":"Selecting predicate logic for knowledge representation by comparative study of knowledge representation schemes","authors":"Amjad Ali, M. Khan","doi":"10.1109/ICET.2009.5353207","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353207","url":null,"abstract":"In Artificial Intelligence, knowledge representation is a combination of data structures and interpretive procedures that leads to knowledgeable behavior. Therefore, it is required to investigate such knowledge representation technique in which knowledge can be easily and efficiently represented in computer. This research paper compares various knowledge representation techniques and proves that predicate logic is a more efficient and more accurate knowledge representation scheme. The algorithm in this paper splits the English text/sentences into phrases/constituents and then represents these in predicate logic. This algorithm also generates the original sentences from the representation in order to check the accuracy of representation. The algorithm has been tested on real text/sentences of English. The algorithm has achieved an accuracy of 80%. If the text is in simple discourse units, then the algorithm accurately represents it in predicate logic. The algorithm also accurately retrieves the original text/sentences from such representation.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116909367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Comparing the cloud attenuation for different optical wavelengths 比较不同波长下云的衰减
Pub Date : 2009-12-11 DOI: 10.1109/ICET.2009.5353121
F. Nadeem, M. S. Awan, E. Leitgeb, M. S. Khan, S. Muhammed, G. Kandus
Free Space Optics (FSO) has the tremendous potential to provide multi-gigabits-per-second transmission links for future aerospace applications. However, the widespread growth of the technology is hampered by reduced availability issues related to weather influences on the link. Among different weather attenuations, clouds play an important role by causing link outage up to several hours. In this paper the cloud attenuations by different optical wavelengths are compared on the basis of Mie scattering theory so that the optical wavelengths having high immunity to cloud attenuations can be selected for optical wireless communication links.
自由空间光学(FSO)具有为未来航空航天应用提供每秒多千兆传输链路的巨大潜力。然而,该技术的广泛发展受到与天气影响有关的可用性降低问题的阻碍。在不同的天气衰减中,云起着重要的作用,它会导致长达数小时的链路中断。本文在米氏散射理论的基础上,比较了不同波长的光对云的衰减,从而为无线光通信链路选择对云衰减具有较高抗扰度的光波长。
{"title":"Comparing the cloud attenuation for different optical wavelengths","authors":"F. Nadeem, M. S. Awan, E. Leitgeb, M. S. Khan, S. Muhammed, G. Kandus","doi":"10.1109/ICET.2009.5353121","DOIUrl":"https://doi.org/10.1109/ICET.2009.5353121","url":null,"abstract":"Free Space Optics (FSO) has the tremendous potential to provide multi-gigabits-per-second transmission links for future aerospace applications. However, the widespread growth of the technology is hampered by reduced availability issues related to weather influences on the link. Among different weather attenuations, clouds play an important role by causing link outage up to several hours. In this paper the cloud attenuations by different optical wavelengths are compared on the basis of Mie scattering theory so that the optical wavelengths having high immunity to cloud attenuations can be selected for optical wireless communication links.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2009 International Conference on Emerging Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1