首页 > 最新文献

2019 International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
Diversifying The Teaching Methods : Student’s Perceptions of Smart Learning 教学方法多元化:学生对智能学习的认知
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991089
E. Abulibdeh, A. A. Libdeh, Fuad A. Trayek, G. Murshidi
There is an increasing need for improving the e-learning systems and so integrating smart Applications into education is a useful communication tool in interactive educational environment for both learners and teachers. The introduction of smart Applications has revolutionized education by providing a smart learning environment creating a new style in learning known as smart learning. The main purpose of this study is to shed light on this new concept of learning and highlighting the attributes and features of smart classroom. It aims to investigate the student’s perception of smart learning and their extent of using different smart learning tools. The study was conducted at several Universities in the United Arab Emirates sampling 411 students enrolled in different programs.
人们对电子学习系统的需求日益增长,因此将智能应用程序集成到教育中是互动式教育环境中学习者和教师的有用交流工具。智能应用程序的引入提供了一个智能学习环境,创造了一种新的学习方式,即智能学习,从而彻底改变了教育。本研究的主要目的是阐明这种新的学习理念,突出智能课堂的属性和特征。它旨在调查学生对智能学习的看法以及他们使用不同智能学习工具的程度。这项研究是在阿拉伯联合酋长国的几所大学进行的,抽样了411名参加不同项目的学生。
{"title":"Diversifying The Teaching Methods : Student’s Perceptions of Smart Learning","authors":"E. Abulibdeh, A. A. Libdeh, Fuad A. Trayek, G. Murshidi","doi":"10.1109/ACIT47987.2019.8991089","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991089","url":null,"abstract":"There is an increasing need for improving the e-learning systems and so integrating smart Applications into education is a useful communication tool in interactive educational environment for both learners and teachers. The introduction of smart Applications has revolutionized education by providing a smart learning environment creating a new style in learning known as smart learning. The main purpose of this study is to shed light on this new concept of learning and highlighting the attributes and features of smart classroom. It aims to investigate the student’s perception of smart learning and their extent of using different smart learning tools. The study was conducted at several Universities in the United Arab Emirates sampling 411 students enrolled in different programs.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does Social Media Affects Users’ Well-Being 社交媒体会影响用户的幸福感吗
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991006
Walaa S. Mahmoud, Ajayeb S. Abu Daabes
Social media platforms are now considered as the most used tools that people used daily. The relationship between social media and well-being is driven by many implicit and explicit factors that are difficult to configure. There is a substantial agreement that using social media platforms have positive effects and dark sides on well-being along with many contradictions. This study is an attempt to understand social media effects on users’ well-being by a novel perception that avoids the linear perspectives of the digital world. This research proposes a digital chaos model to better understanding the full picture of the new chaotic life. This model presents the interplay of dynamic actions and factors between social media platforms and users’ well-being, which are complex, nonlinear and interactive factors.
社交媒体平台现在被认为是人们日常使用最多的工具。社交媒体和幸福感之间的关系是由许多难以配置的隐性和显性因素驱动的。人们普遍认为,使用社交媒体平台对幸福感有积极的影响,也有消极的一面,同时也存在许多矛盾。本研究试图通过一种新颖的感知来理解社交媒体对用户幸福感的影响,这种感知避免了数字世界的线性视角。本研究提出一个数字混沌模型,以更好地了解新的混沌生活的全貌。该模型展示了社交媒体平台与用户幸福感之间的动态行为和因素之间的相互作用,这是一个复杂的、非线性的、交互式的因素。
{"title":"Does Social Media Affects Users’ Well-Being","authors":"Walaa S. Mahmoud, Ajayeb S. Abu Daabes","doi":"10.1109/ACIT47987.2019.8991006","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991006","url":null,"abstract":"Social media platforms are now considered as the most used tools that people used daily. The relationship between social media and well-being is driven by many implicit and explicit factors that are difficult to configure. There is a substantial agreement that using social media platforms have positive effects and dark sides on well-being along with many contradictions. This study is an attempt to understand social media effects on users’ well-being by a novel perception that avoids the linear perspectives of the digital world. This research proposes a digital chaos model to better understanding the full picture of the new chaotic life. This model presents the interplay of dynamic actions and factors between social media platforms and users’ well-being, which are complex, nonlinear and interactive factors.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ischemic Stroke Identification by Using Watershed Segmentation and Textural and Statistical Features 基于分水岭分割和纹理统计特征的缺血性脑卒中识别
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991060
Mohammed Ajam, H. Kanaan, Lina el Khansa, M. Ayache
The algorithm presented in this paper identifies the ischemic stroke from CT brain images by extracting the textural and statistical features. Our algorithm starts by preprocessing of our CT images, and then image enhancement is performed. The brain CT images are segmented by Marker Controlled watershed. We obtained the Grey Level Co-occurrence matrix (GLCM) to extract the textural and statistical features. The experimental results showed that the over-segmentation due to noise is resolved by Marker controlled watershed. The textural and statistical features showed that the values of contrast, correlation, standard deviation and variance of normal CT images are less than those of abnormal CT images (contains ischemic stroke), where the values of homogeneity, energy and mean are bigger in normal CT images than those of abnormal CT images.
本文提出的算法通过提取脑CT图像的纹理特征和统计特征来识别脑缺血。我们的算法首先对CT图像进行预处理,然后进行图像增强。采用Marker - Controlled分水岭对脑CT图像进行分割。我们得到灰度共生矩阵(GLCM)来提取纹理和统计特征。实验结果表明,利用Marker控制的分水岭可以有效地解决噪声引起的过分割问题。纹理特征和统计特征表明,正常CT图像的对比度、相关性、标准差和方差值小于异常CT图像(含缺血性卒中),其中正常CT图像的均匀性、能量和平均值值大于异常CT图像。
{"title":"Ischemic Stroke Identification by Using Watershed Segmentation and Textural and Statistical Features","authors":"Mohammed Ajam, H. Kanaan, Lina el Khansa, M. Ayache","doi":"10.1109/ACIT47987.2019.8991060","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991060","url":null,"abstract":"The algorithm presented in this paper identifies the ischemic stroke from CT brain images by extracting the textural and statistical features. Our algorithm starts by preprocessing of our CT images, and then image enhancement is performed. The brain CT images are segmented by Marker Controlled watershed. We obtained the Grey Level Co-occurrence matrix (GLCM) to extract the textural and statistical features. The experimental results showed that the over-segmentation due to noise is resolved by Marker controlled watershed. The textural and statistical features showed that the values of contrast, correlation, standard deviation and variance of normal CT images are less than those of abnormal CT images (contains ischemic stroke), where the values of homogeneity, energy and mean are bigger in normal CT images than those of abnormal CT images.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127289536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Zero-Day Attack Detection and Prevention in Software-Defined Networks 软件定义网络中的零日攻击检测与防御
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991124
Huthifh Al-Rushdan, M. Shurman, Sharhabeel H. Alnabelsi, Q. Althebyan
The zero-day attack in networks exploits an undiscovered vulnerability, in order to affect/damage networks or programs. The term “zero-day” refers to the number of days available to the software or the hardware vendor to issue a patch for this new vulnerability. Currently, the best-known defense mechanism against the zero-day attacks focuses on detection and response, as a prevention effort, which typically fails against unknown or new vulnerabilities. To the best of our knowledge, this attack has not been widely investigated for Software-Defined Networks (SDNs). Therefore, in this work we are motivated to develop anew zero-day attack detection and prevention mechanism, which is designed and implemented for SDN using a modified sandbox tool, named Cuckoo. Our experiments results, under UNIX system, show that our proposed design successfully stops zero-day malwares by isolating the infected client, and thus, prevents these malwares from infesting other clients.
网络中的零日攻击利用未被发现的漏洞,以影响/破坏网络或程序。术语“零日”指的是软件或硬件供应商为这个新漏洞发布补丁的可用天数。目前,最著名的针对零日攻击的防御机制侧重于检测和响应,作为一种预防工作,它通常无法应对未知或新的漏洞。据我们所知,这种针对软件定义网络(sdn)的攻击还没有得到广泛的研究。因此,在这项工作中,我们有动力开发新的零日攻击检测和预防机制,该机制使用改进的沙盒工具Cuckoo为SDN设计和实现。我们在UNIX系统下的实验结果表明,我们提出的设计通过隔离被感染的客户端成功地阻止了零日恶意软件,从而防止了这些恶意软件感染其他客户端。
{"title":"Zero-Day Attack Detection and Prevention in Software-Defined Networks","authors":"Huthifh Al-Rushdan, M. Shurman, Sharhabeel H. Alnabelsi, Q. Althebyan","doi":"10.1109/ACIT47987.2019.8991124","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991124","url":null,"abstract":"The zero-day attack in networks exploits an undiscovered vulnerability, in order to affect/damage networks or programs. The term “zero-day” refers to the number of days available to the software or the hardware vendor to issue a patch for this new vulnerability. Currently, the best-known defense mechanism against the zero-day attacks focuses on detection and response, as a prevention effort, which typically fails against unknown or new vulnerabilities. To the best of our knowledge, this attack has not been widely investigated for Software-Defined Networks (SDNs). Therefore, in this work we are motivated to develop anew zero-day attack detection and prevention mechanism, which is designed and implemented for SDN using a modified sandbox tool, named Cuckoo. Our experiments results, under UNIX system, show that our proposed design successfully stops zero-day malwares by isolating the infected client, and thus, prevents these malwares from infesting other clients.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrating the use of iPad in the Teaching-Learning Process: A Pilot Study from UAE iPad在教学过程中的整合使用:阿联酋的试点研究
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991125
Z. Shanaa, E. Abulibdeh
This study aimed at exploring the effect of using iPads on the academic achievement of grade 10 students in ICT class at a Private School in Abu Dhabi, in the United Arab Emirates, and to compare their results with their peers who study the same subject using traditional educational methods. The study was conducted during the second semester of the school year 2017/2018 and the sample consisted of two groups: the control group (42 students) who were taught using the traditional method, and the experimental group (42 students) who were taught using the iPad. An achievement pre and post-tests were given to the two groups, data were statically analyzed and discussed. The study results have shown statistical difference in the achievement of the experimental group indicating that using the iPad in learning has a positive effect on the academic achievement of grade 10 students compared to those who learned by the traditional method.
本研究旨在探讨使用ipad对阿拉伯联合酋长国阿布扎比一所私立学校ICT班10年级学生学业成绩的影响,并将他们的成绩与使用传统教育方法学习同一学科的同龄人进行比较。该研究在2017/2018学年的第二学期进行,样本包括两组:使用传统方法教学的对照组(42名学生)和使用iPad教学的实验组(42名学生)。对两组进行了成绩前、后测试,对数据进行了统计分析和讨论。研究结果显示实验组的成绩有统计学差异,表明在学习中使用iPad对10年级学生的学习成绩比使用传统方法的学生有积极的影响。
{"title":"Integrating the use of iPad in the Teaching-Learning Process: A Pilot Study from UAE","authors":"Z. Shanaa, E. Abulibdeh","doi":"10.1109/ACIT47987.2019.8991125","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991125","url":null,"abstract":"This study aimed at exploring the effect of using iPads on the academic achievement of grade 10 students in ICT class at a Private School in Abu Dhabi, in the United Arab Emirates, and to compare their results with their peers who study the same subject using traditional educational methods. The study was conducted during the second semester of the school year 2017/2018 and the sample consisted of two groups: the control group (42 students) who were taught using the traditional method, and the experimental group (42 students) who were taught using the iPad. An achievement pre and post-tests were given to the two groups, data were statically analyzed and discussed. The study results have shown statistical difference in the achievement of the experimental group indicating that using the iPad in learning has a positive effect on the academic achievement of grade 10 students compared to those who learned by the traditional method.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"14 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of Two Algorithms for Arbitrary Shapes Clustering 任意形状聚类两种算法的性能比较
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991143
Mariam Khader, Ghazi Al-Naymat
Discovering clusters with arbitrary shapes has attracted a large number of researchers, due to its importance in analyzing real-world datasets. DENCLUE is an efficient density-based algorithm that provides a compact mathematical definition of clusters with arbitrary shapes. Several variants of DENCLUE have been proposed to enhance its performance, including DENCLUE 2.0. This study aims to discuss the difference between the two variants, DENCLUE 1.0 and DENCLUE 2.0. This will allow for future improvements on both variants and determining the best variant for specific types of datasets. The Adjusted Rand Index measure is used to evaluate the difference between the clustering results of both algorithms. The experimental results conclude that DECNLUE 1.0 outperforms DENCLUE 2.0 in discovering clusters with arbitrary shapes. Specifically, in datasets that contain clusters with multiple modes.
发现具有任意形状的簇吸引了大量的研究人员,因为它在分析现实世界的数据集方面很重要。DENCLUE是一种高效的基于密度的算法,它提供了具有任意形状的聚类的紧凑数学定义。已经提出了DENCLUE的几个变体来增强其性能,包括DENCLUE 2.0。本研究旨在讨论DENCLUE 1.0和DENCLUE 2.0这两个变体之间的差异。这将允许未来对两个变体进行改进,并为特定类型的数据集确定最佳变体。使用调整后的Rand指数度量来评估两种算法聚类结果之间的差异。实验结果表明,DENCLUE 1.0在发现任意形状的簇方面优于DENCLUE 2.0。具体来说,在包含具有多个模式的集群的数据集中。
{"title":"Performance Comparison of Two Algorithms for Arbitrary Shapes Clustering","authors":"Mariam Khader, Ghazi Al-Naymat","doi":"10.1109/ACIT47987.2019.8991143","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991143","url":null,"abstract":"Discovering clusters with arbitrary shapes has attracted a large number of researchers, due to its importance in analyzing real-world datasets. DENCLUE is an efficient density-based algorithm that provides a compact mathematical definition of clusters with arbitrary shapes. Several variants of DENCLUE have been proposed to enhance its performance, including DENCLUE 2.0. This study aims to discuss the difference between the two variants, DENCLUE 1.0 and DENCLUE 2.0. This will allow for future improvements on both variants and determining the best variant for specific types of datasets. The Adjusted Rand Index measure is used to evaluate the difference between the clustering results of both algorithms. The experimental results conclude that DECNLUE 1.0 outperforms DENCLUE 2.0 in discovering clusters with arbitrary shapes. Specifically, in datasets that contain clusters with multiple modes.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Note about Bias in Bayesian Genetic Algorithms for Discrete Missing Values Imputation 关于离散缺失值估算贝叶斯遗传算法偏差的注意事项
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991024
Hazem Migdady, Hussam Alrabaiah, Mohammad Al-Talib
A Genetic Algorithm is a sophisticated searching technique that finds the best possible solution in the solution space. The search process is driven by a fitness function which measures the fitness level of a candidate solution. The chosen fitness function varies according to the problem being solved. However, any fitness function should satisfy some conditions. In the Bayesian genetic algorithm for missing values imputation we noted that the used fitness function performs poorly when be applied with datasets that contain missing values, since such datasets hold a level of bias which would adversely affect the efficiency of the entire searching process. In this paper we mentioned that some assumptions should hold in order to apply the technique of Bayesian genetic algorithm efficiently.
遗传算法是一种在解空间中寻找最佳可能解的复杂搜索技术。搜索过程由一个适应度函数驱动,该函数测量候选解的适应度水平。所选择的适应度函数根据所要解决的问题而变化。然而,任何适应度函数都必须满足一定的条件。在缺失值输入的贝叶斯遗传算法中,我们注意到所使用的适应度函数在应用于包含缺失值的数据集时表现不佳,因为这些数据集具有一定程度的偏差,这将对整个搜索过程的效率产生不利影响。为了有效地应用贝叶斯遗传算法技术,我们提出了一些假设。
{"title":"Note about Bias in Bayesian Genetic Algorithms for Discrete Missing Values Imputation","authors":"Hazem Migdady, Hussam Alrabaiah, Mohammad Al-Talib","doi":"10.1109/ACIT47987.2019.8991024","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991024","url":null,"abstract":"A Genetic Algorithm is a sophisticated searching technique that finds the best possible solution in the solution space. The search process is driven by a fitness function which measures the fitness level of a candidate solution. The chosen fitness function varies according to the problem being solved. However, any fitness function should satisfy some conditions. In the Bayesian genetic algorithm for missing values imputation we noted that the used fitness function performs poorly when be applied with datasets that contain missing values, since such datasets hold a level of bias which would adversely affect the efficiency of the entire searching process. In this paper we mentioned that some assumptions should hold in order to apply the technique of Bayesian genetic algorithm efficiently.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Techniques For Face Verification: Literature Review 人脸验证技术:文献综述
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8990975
Ghaliya Alfarsi, J. Jabbar, R. M. Tawafak, A. Alsidiri, M. Alsinani
The aims of this research are to conduct a survey on face verification techniques and to discuss the methods that they used and which one was the optimal and for what it is the best. We searched for articles and review papers related to face verification techniques. Ten papers were selected based on the year of publication and the techniques used. The techniques were studied and a summary report of the techniques used is created. We also suggest merging two techniques that may increase accuracy and effectiveness of verification. A summary report of various techniques by researchers is created. An approach by merging two techniques included in the summary report is suggested to enhance verification. The presence of variable illumination, pretense, facial look, growing old and other unsystematic reasons regularly cause identification errors to occur. Moreover increase in level of controlling and executing of the face verification methods is not only difficult even though it is a critical sense of function. Face verification has a huge contribution in different types of media purposes, like security access control, monitoring and control, retrieval of images, etc. They are used in many domains such as banks, airplanes, police areas and others. Several methods have proved to be the best to show a potential move towards the development of performance achieved since more than prompt and verification.
本研究的目的是对面部验证技术进行调查,并讨论他们使用的方法,哪一种是最佳的,对于什么是最好的。我们检索了与人脸验证技术相关的文章和综述论文。根据发表年份和使用的技术选择了10篇论文。对这些技术进行了研究,并创建了所用技术的摘要报告。我们还建议合并两种技术,以提高验证的准确性和有效性。研究人员创建了各种技术的总结报告。建议采用合并摘要报告中所包括的两种技术的方法来加强核查。光照变化、伪装、面部表情、变老和其他非系统原因的存在经常导致识别错误的发生。此外,人脸验证方法的控制和执行水平的提高不仅是困难的,即使它是一个关键的功能。人脸验证在不同类型的媒体用途中有着巨大的贡献,如安全访问控制、监控、图像检索等。它们被用于许多领域,如银行、飞机、警察等。有几种方法已被证明是最好的,以显示一个潜在的举动,朝着发展的业绩,自取得了更多的提示和核查。
{"title":"Techniques For Face Verification: Literature Review","authors":"Ghaliya Alfarsi, J. Jabbar, R. M. Tawafak, A. Alsidiri, M. Alsinani","doi":"10.1109/ACIT47987.2019.8990975","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990975","url":null,"abstract":"The aims of this research are to conduct a survey on face verification techniques and to discuss the methods that they used and which one was the optimal and for what it is the best. We searched for articles and review papers related to face verification techniques. Ten papers were selected based on the year of publication and the techniques used. The techniques were studied and a summary report of the techniques used is created. We also suggest merging two techniques that may increase accuracy and effectiveness of verification. A summary report of various techniques by researchers is created. An approach by merging two techniques included in the summary report is suggested to enhance verification. The presence of variable illumination, pretense, facial look, growing old and other unsystematic reasons regularly cause identification errors to occur. Moreover increase in level of controlling and executing of the face verification methods is not only difficult even though it is a critical sense of function. Face verification has a huge contribution in different types of media purposes, like security access control, monitoring and control, retrieval of images, etc. They are used in many domains such as banks, airplanes, police areas and others. Several methods have proved to be the best to show a potential move towards the development of performance achieved since more than prompt and verification.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bee Hive Monitor 蜂箱监测器
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8990982
A. Shaout, Nathan Schmidt
This paper will cover a project for a device that will monitor a beehive and give a status of the health and productivity of the hive to the beekeeper. Bee keeping is a very large industry with approximately 2.44 million bee colonies in the US. Bees are vital to our food supply. The value of pollination by bees in the US alone is estimated to be worth $16 billon. A phenomenon known as Colony Collapse Disorder (CCD) has brought significant loss to honeybee colonies. If a hive experiences CCD most of the bees will leave the hive for no apparent reason. It is imperative to understand a hive’s health and activities for a beekeeper to take care of the bees effectively. The system in this paper takes readings from inside the hive such as temperature, humidity, and noise. A camera is mounted on the outside of the hive to monitor bee activity and keep track of the activity at the beehive entrance. All this data is interpreted by algorithms that alert the beekeeper on the health of the hive. Some of these algorithms use machine learning to determine the health of the hive. This paper reviews various project currently in the market for beehive monitoring as well as a literature review of some of the research in bee monitoring systems.
本文将介绍一种设备的项目,该设备将监测蜂箱并向养蜂人提供蜂箱的健康和生产力状态。养蜂是一个非常大的产业,在美国大约有244万个蜂群。蜜蜂对我们的食物供应至关重要。据估计,仅在美国,蜜蜂授粉的价值就高达160亿美元。一种被称为蜂群衰竭失调(CCD)的现象给蜂群带来了重大损失。如果一个蜂箱发生CCD,大多数蜜蜂会无缘无故地离开蜂箱。了解蜂箱的健康状况和活动对养蜂人有效地照顾蜜蜂是至关重要的。本文中的系统从蜂箱内部读取温度、湿度和噪音等数据。在蜂箱的外部安装了一个摄像头来监控蜜蜂的活动,并在蜂箱的入口处跟踪蜜蜂的活动。所有这些数据都由算法解释,提醒养蜂人蜂箱的健康状况。其中一些算法使用机器学习来确定蜂巢的健康状况。本文综述了目前市场上蜂窝监测的各种项目,并对蜜蜂监测系统的一些研究进行了文献综述。
{"title":"Bee Hive Monitor","authors":"A. Shaout, Nathan Schmidt","doi":"10.1109/ACIT47987.2019.8990982","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8990982","url":null,"abstract":"This paper will cover a project for a device that will monitor a beehive and give a status of the health and productivity of the hive to the beekeeper. Bee keeping is a very large industry with approximately 2.44 million bee colonies in the US. Bees are vital to our food supply. The value of pollination by bees in the US alone is estimated to be worth $16 billon. A phenomenon known as Colony Collapse Disorder (CCD) has brought significant loss to honeybee colonies. If a hive experiences CCD most of the bees will leave the hive for no apparent reason. It is imperative to understand a hive’s health and activities for a beekeeper to take care of the bees effectively. The system in this paper takes readings from inside the hive such as temperature, humidity, and noise. A camera is mounted on the outside of the hive to monitor bee activity and keep track of the activity at the beehive entrance. All this data is interpreted by algorithms that alert the beekeeper on the health of the hive. Some of these algorithms use machine learning to determine the health of the hive. This paper reviews various project currently in the market for beehive monitoring as well as a literature review of some of the research in bee monitoring systems.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130265951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobility prediction as a time function for mobile networks in 3-D space: A Framework 移动网络在三维空间中的时间函数预测:一个框架
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991022
M. Al-Hattab, Nuha Hamada
Mobility prediction has attracted increasing interest in recent years, as correct and accurate prediction can lead to efficient data delivery and provide the user with high quality of service. Moreover, it enables the network to plan for future tasks in the suitable time. In this paper, we present a framework for a prediction scheme that predict the future mobility of mobile networks in three-dimensional space using polynomial regression and provide a time-space mapping to produce a time function for the three components of the trajectory for the node
近年来,移动预测引起了越来越多的关注,因为正确和准确的预测可以导致高效的数据传递并为用户提供高质量的服务。此外,它使网络能够在适当的时间规划未来的任务。在本文中,我们提出了一个预测方案框架,该方案使用多项式回归来预测移动网络在三维空间中的未来移动性,并提供了一个时空映射来为节点的轨迹的三个组成部分生成时间函数
{"title":"Mobility prediction as a time function for mobile networks in 3-D space: A Framework","authors":"M. Al-Hattab, Nuha Hamada","doi":"10.1109/ACIT47987.2019.8991022","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991022","url":null,"abstract":"Mobility prediction has attracted increasing interest in recent years, as correct and accurate prediction can lead to efficient data delivery and provide the user with high quality of service. Moreover, it enables the network to plan for future tasks in the suitable time. In this paper, we present a framework for a prediction scheme that predict the future mobility of mobile networks in three-dimensional space using polynomial regression and provide a time-space mapping to produce a time function for the three components of the trajectory for the node","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1