首页 > 最新文献

2013 10th International Conference on Information Technology: New Generations最新文献

英文 中文
Characteristics of Social Network Fatigue 社交网络疲劳的特征
T. Ravindran, A. Chua, D. Goh
This paper examines the unique characteristics of 'fatigue' in the context of use of social networks to stay socially connected. Guided by literature on 'fatigue' from within the domains of clinical and occupational studies, the paper uses a combination of in-depth interviews and individual activity logs gathered from members of a selected Facebook community to investigate social network fatigue. Characteristics of the phenomenon are culled from individual user experiences giving rise to negative emotions and/ or a change in activity patterns in the course of use of social networks, so as to derive a working definition of fatigue in the context.
本文考察了在使用社交网络保持社交联系的背景下“疲劳”的独特特征。在临床和职业研究领域关于“疲劳”的文献指导下,本文结合了深度访谈和从选定的Facebook社区成员收集的个人活动日志来调查社交网络疲劳。这种现象的特征是从使用社交网络过程中产生负面情绪和/或活动模式变化的个人用户体验中剔除出来的,从而得出在这种情况下疲劳的工作定义。
{"title":"Characteristics of Social Network Fatigue","authors":"T. Ravindran, A. Chua, D. Goh","doi":"10.1109/ITNG.2013.66","DOIUrl":"https://doi.org/10.1109/ITNG.2013.66","url":null,"abstract":"This paper examines the unique characteristics of 'fatigue' in the context of use of social networks to stay socially connected. Guided by literature on 'fatigue' from within the domains of clinical and occupational studies, the paper uses a combination of in-depth interviews and individual activity logs gathered from members of a selected Facebook community to investigate social network fatigue. Characteristics of the phenomenon are culled from individual user experiences giving rise to negative emotions and/ or a change in activity patterns in the course of use of social networks, so as to derive a working definition of fatigue in the context.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126933598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Flow Control Mechanism for Wireless Network-on-Chip 无线片上网络的流量控制机制
Ling Wang, Zhen Wang, Yingtao Jiang
Network on chip (NoC) provides a network-based interconnect infrastructure that facilitates the communications among a slew of function cores in a modern System-on-chip (SoC) design. Apart from topology, switching technique and routing strategy adopted in an NoC, flow control scheme that regulates the packet injection rates is another determining factor that impacts the NoC efficiency. In this paper, we propose a Feedback-Based end-to-end congestion control scheme that supports Wireless NoC to make adjustment automatically' upon receiving a feedback message, the source node will adjust its packet size and transmission rate accordingly. Besides, an arbitration optimization strategy, fast-forward scheme is imported to assign higher priority to the downstream flits at the same input port and to the same next output port, thus lighten the resource waste caused by the rest communication tasks. Finally, simulation results indicate the superiority.
片上网络(NoC)提供了一种基于网络的互连基础设施,促进了现代片上系统(SoC)设计中大量功能核心之间的通信。除了NoC采用的拓扑结构、交换技术和路由策略外,流量控制方案是影响NoC效率的另一个决定因素。在本文中,我们提出了一种基于反馈的端到端拥塞控制方案,该方案支持无线NoC在收到反馈消息后自动调整,源节点将相应地调整其数据包大小和传输速率。此外,引入了一种仲裁优化策略——快进方案,将同一输入端口和同一下一个输出端口的下游flts分配给更高的优先级,从而减轻了其他通信任务造成的资源浪费。最后,仿真结果表明了该方法的优越性。
{"title":"Flow Control Mechanism for Wireless Network-on-Chip","authors":"Ling Wang, Zhen Wang, Yingtao Jiang","doi":"10.1109/ITNG.2013.81","DOIUrl":"https://doi.org/10.1109/ITNG.2013.81","url":null,"abstract":"Network on chip (NoC) provides a network-based interconnect infrastructure that facilitates the communications among a slew of function cores in a modern System-on-chip (SoC) design. Apart from topology, switching technique and routing strategy adopted in an NoC, flow control scheme that regulates the packet injection rates is another determining factor that impacts the NoC efficiency. In this paper, we propose a Feedback-Based end-to-end congestion control scheme that supports Wireless NoC to make adjustment automatically' upon receiving a feedback message, the source node will adjust its packet size and transmission rate accordingly. Besides, an arbitration optimization strategy, fast-forward scheme is imported to assign higher priority to the downstream flits at the same input port and to the same next output port, thus lighten the resource waste caused by the rest communication tasks. Finally, simulation results indicate the superiority.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Node Filtering and Face Routing for Sensor Network 传感器网络的节点滤波与面路由
L. Gewali, Umang Amatya
Greedy forward routing and face routing algorithms have been extensively used for sending messages in sensor networks. In this paper, we consider the problem of filtering redundant nodes in a sensor network as a pre-processing step for face routing. We propose an algorithm for identifying redundant nodes. We test the performance of proposed filtering algorithm on generated networks. The prototype algorithm for testing the proposed algorithms has been implemented in the Java programming language. Experimental investigation shows that the proposed filtering algorithms are effective in removing redundant nodes without compromising the network connectivity.
在传感器网络中,贪婪前向路由和人脸路由算法被广泛用于发送消息。本文考虑了传感器网络中冗余节点的滤波问题,并将其作为人脸路由的预处理步骤。提出了一种识别冗余节点的算法。我们在生成的网络上测试了所提出的过滤算法的性能。在Java编程语言中实现了用于测试所提出算法的原型算法。实验结果表明,所提出的过滤算法在不影响网络连通性的情况下,能够有效地去除冗余节点。
{"title":"Node Filtering and Face Routing for Sensor Network","authors":"L. Gewali, Umang Amatya","doi":"10.1109/ITNG.2013.106","DOIUrl":"https://doi.org/10.1109/ITNG.2013.106","url":null,"abstract":"Greedy forward routing and face routing algorithms have been extensively used for sending messages in sensor networks. In this paper, we consider the problem of filtering redundant nodes in a sensor network as a pre-processing step for face routing. We propose an algorithm for identifying redundant nodes. We test the performance of proposed filtering algorithm on generated networks. The prototype algorithm for testing the proposed algorithms has been implemented in the Java programming language. Experimental investigation shows that the proposed filtering algorithms are effective in removing redundant nodes without compromising the network connectivity.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130213357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Usability of Interactive Digital Television Applications 交互式数字电视应用的可用性评估
Andrés F. Solano, C. Collazos, Cristian Rusu, Luis Merchán
The evaluation of the usability of an interactive system is one of the most important steps in the user-centered design approach. Usability evaluation methods are quite diverse and many of them may be used to evaluate Interactive Digital Television (iTV) applications. Questions arise when deciding which method and/or combination of methods give more (relevant) information. Three iTV applications have been evaluated, applying several usability evaluation methods. Based on the effectiveness and efficiency of these methods, this paper proposes a methodology to evaluate the usability of iTV applications.
交互式系统的可用性评估是以用户为中心的设计方法中最重要的步骤之一。可用性评估方法多种多样,其中许多方法可用于评估交互式数字电视(iTV)应用程序。在决定哪种方法和/或方法组合提供更多(相关)信息时,问题就出现了。应用几种可用性评估方法,对三个iTV应用程序进行了评估。基于这些方法的有效性和效率,本文提出了一种可用性评价方法。
{"title":"Evaluating the Usability of Interactive Digital Television Applications","authors":"Andrés F. Solano, C. Collazos, Cristian Rusu, Luis Merchán","doi":"10.1109/ITNG.2013.24","DOIUrl":"https://doi.org/10.1109/ITNG.2013.24","url":null,"abstract":"The evaluation of the usability of an interactive system is one of the most important steps in the user-centered design approach. Usability evaluation methods are quite diverse and many of them may be used to evaluate Interactive Digital Television (iTV) applications. Questions arise when deciding which method and/or combination of methods give more (relevant) information. Three iTV applications have been evaluated, applying several usability evaluation methods. Based on the effectiveness and efficiency of these methods, this paper proposes a methodology to evaluate the usability of iTV applications.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134443597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forecasting Wet Land Rice Production for Food Security 面向粮食安全的湿地水稻产量预测
Abdollahian M, Lasmini L
Rice is one of the major crops feeding the world population and is one of the most substantial ingredients in the food security chain. Therefore, a reliable forecast of rice production would have a predominant impact on assessing the world food security. In this paper we develop models to forecast the wet land rice production in two provinces of Indonesia. The four-monthly data are used to construct and develop the forecasting models. To forecast the rice production, we first forecast the harvested area and the yield. We then use a mathematical model to estimate the rice production in terms of the harvested area and yield. The proposed models are used to forecast the recorded data. The error of the forecasted data are analysed to assess the efficacy of the models. The analysis of the errors shows that ARIMA(p, q, d)) and Bayesian models are the best models for forecasting harvested area and yield. However, the results clearly indicate that the optimal model for one province it not necessarily the best model for the other province.
水稻是养活世界人口的主要作物之一,也是粮食安全链中最重要的成分之一。因此,对水稻产量的可靠预测将对评估世界粮食安全产生重大影响。本文建立了印度尼西亚两个省的旱地水稻产量预测模型。利用4个月的数据构建和发展预测模型。为了预测水稻产量,我们首先预测收获面积和产量。然后,我们使用一个数学模型来估计水稻的收获面积和产量。所提出的模型用于预测记录数据。对预测数据的误差进行了分析,以评价模型的有效性。误差分析表明,ARIMA(p, q, d))和贝叶斯模型是预测收获面积和产量的最佳模型。然而,结果清楚地表明,一个省的最优模型不一定是另一个省的最佳模型。
{"title":"Forecasting Wet Land Rice Production for Food Security","authors":"Abdollahian M, Lasmini L","doi":"10.1109/ITNG.2013.92","DOIUrl":"https://doi.org/10.1109/ITNG.2013.92","url":null,"abstract":"Rice is one of the major crops feeding the world population and is one of the most substantial ingredients in the food security chain. Therefore, a reliable forecast of rice production would have a predominant impact on assessing the world food security. In this paper we develop models to forecast the wet land rice production in two provinces of Indonesia. The four-monthly data are used to construct and develop the forecasting models. To forecast the rice production, we first forecast the harvested area and the yield. We then use a mathematical model to estimate the rice production in terms of the harvested area and yield. The proposed models are used to forecast the recorded data. The error of the forecasted data are analysed to assess the efficacy of the models. The analysis of the errors shows that ARIMA(p, q, d)) and Bayesian models are the best models for forecasting harvested area and yield. However, the results clearly indicate that the optimal model for one province it not necessarily the best model for the other province.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114070596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Path-Finding Algorithm for Ground Multiple Sensor Nodes Detection of Quad-rotor-typed UAV 四旋翼型无人机地面多传感器节点检测寻路算法
Hanshang Li, Ling Wang, S. Pang, Massood Towhidnejad
Quad-rotor-typed UAV can perform multiple targets detection effectively by its controllability and agility. In this study, the ground multiple targets detection with stochastic distances between the different targets is considered. A target position is described as a two-dimensional coordinate. The all positions' coordinates and the start-point coordinate of UAV are the sources of the algorithm. After some calculating, the algorithm should direct the UAV fly over all targets with the shortest flight line. The algorithm produces an anticipated flight plan based on genetic algorithm, and considered the characteristics of quadrotor. It has a high performance in environment with few interference factors and can be used in a quad-rotor-typed UAV without GPS or any other polarizing means.
四旋翼无人机具有良好的可控性和敏捷性,能够有效地执行多目标探测任务。本研究考虑了目标间距离随机的地面多目标检测问题。目标位置被描述为一个二维坐标。该算法以无人机的所有位置坐标和起始点坐标为源。经过一定的计算,该算法应使无人机以最短的飞行路线飞越所有目标。该算法基于遗传算法生成预期飞行计划,并考虑了四旋翼飞行器的特点。它在环境中具有高性能,干扰因素少,可以在没有GPS或任何其他偏光手段的四旋翼型无人机中使用。
{"title":"Path-Finding Algorithm for Ground Multiple Sensor Nodes Detection of Quad-rotor-typed UAV","authors":"Hanshang Li, Ling Wang, S. Pang, Massood Towhidnejad","doi":"10.1109/ITNG.2013.80","DOIUrl":"https://doi.org/10.1109/ITNG.2013.80","url":null,"abstract":"Quad-rotor-typed UAV can perform multiple targets detection effectively by its controllability and agility. In this study, the ground multiple targets detection with stochastic distances between the different targets is considered. A target position is described as a two-dimensional coordinate. The all positions' coordinates and the start-point coordinate of UAV are the sources of the algorithm. After some calculating, the algorithm should direct the UAV fly over all targets with the shortest flight line. The algorithm produces an anticipated flight plan based on genetic algorithm, and considered the characteristics of quadrotor. It has a high performance in environment with few interference factors and can be used in a quad-rotor-typed UAV without GPS or any other polarizing means.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127076893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Teaching and Learning Strategies for Programming-intensive Courses 编程密集课程的在线教学策略
V. Gudivada, R. Agrawal, Chunbo Chu
Using the general guidelines for online teaching and learning as a backdrop, we have investigated best practices that are effective specifically in the context of computer science courses that involve extensive programming and hands-on laboratory explorations. In this paper, we describe our preliminary effort in this direction. More specifically, we describe the strategy we have used in planning, designing, developing, delivering, and assessing the best practices for a course in programming languages.
以在线教学的一般指导原则为背景,我们研究了在计算机科学课程中特别有效的最佳实践,这些课程涉及广泛的编程和动手实验探索。在本文中,我们描述了我们在这个方向上的初步努力。更具体地说,我们描述了我们在计划、设计、开发、交付和评估编程语言课程的最佳实践时使用的策略。
{"title":"Online Teaching and Learning Strategies for Programming-intensive Courses","authors":"V. Gudivada, R. Agrawal, Chunbo Chu","doi":"10.1109/ITNG.2013.142","DOIUrl":"https://doi.org/10.1109/ITNG.2013.142","url":null,"abstract":"Using the general guidelines for online teaching and learning as a backdrop, we have investigated best practices that are effective specifically in the context of computer science courses that involve extensive programming and hands-on laboratory explorations. In this paper, we describe our preliminary effort in this direction. More specifically, we describe the strategy we have used in planning, designing, developing, delivering, and assessing the best practices for a course in programming languages.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
White Box AES Using Intel's New AES Instructions 使用英特尔新AES指令的白盒AES
S. Gueron
White box cryptography deals with content protection scenarios where software decrypts some contents, using a secret key (embedded in the code in some obfuscated way), while the adversary has access to the code and its execution. Obviously, performance is slowed down by the obfuscation overheads. This paper demonstrates a method for using Intel's New AES Instructions to write decryption code without directly using the cipher key or any of the round keys in a register (or in memory). Such implementation can enjoy some of the performance benefits that the AES instructions offer. We show an example where it is more than 2.5 times faster than a lookup table based alternative.
白盒密码学处理内容保护场景,其中软件使用秘密密钥(以某种模糊的方式嵌入代码中)解密某些内容,而攻击者可以访问代码及其执行。显然,混淆开销降低了性能。本文演示了一种使用英特尔的新AES指令编写解密代码的方法,而无需直接使用密码密钥或寄存器(或内存)中的任何轮密钥。这样的实现可以享受AES指令提供的一些性能优势。我们展示了一个示例,其中它比基于查找表的替代方案快2.5倍以上。
{"title":"White Box AES Using Intel's New AES Instructions","authors":"S. Gueron","doi":"10.1109/ITNG.2013.64","DOIUrl":"https://doi.org/10.1109/ITNG.2013.64","url":null,"abstract":"White box cryptography deals with content protection scenarios where software decrypts some contents, using a secret key (embedded in the code in some obfuscated way), while the adversary has access to the code and its execution. Obviously, performance is slowed down by the obfuscation overheads. This paper demonstrates a method for using Intel's New AES Instructions to write decryption code without directly using the cipher key or any of the round keys in a register (or in memory). Such implementation can enjoy some of the performance benefits that the AES instructions offer. We show an example where it is more than 2.5 times faster than a lookup table based alternative.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121021339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blind Certificates for Secure Electronic Voting 安全电子投票的盲证书
Víctor Mateu, F. Sebé, M. Valls
Blind signature-based electronic voting is the simplest paradigm for implementing remote voting platforms due to the fact that it does not employ complicated zero-knowledge proofs. Unfortunately, the existence of a trusted entity (the "Authentication Server") that, in case of corruption, would be able to cast indistinguishable fake votes reduces the acceptance of the paradigm in non fully trusted environments. Trust on the system can be increased by splitting this entity into of a set of parties that are unlikely to collaborate in a dishonest manner. Nevertheless, this technique increases the risk of failure of some of them causing a service interruption during the voting period. Better fault tolerance is provided by proposals which permit to anticipate the interaction with the distributed authentication server before the voting period begins, so that, in case of failure, there is a broad time margin for system restoration. Previous proposals following this approach have been proven to be cryptographically weak or just provide individual verifiability. In this paper, a system that employs blind certificates is presented. Unlike previous proposals, it provides universal verifiability and permits to detect double voting without putting voters' privacy at risk.
基于盲签名的电子投票是实现远程投票平台最简单的范例,因为它不使用复杂的零知识证明。不幸的是,一个可信实体(“身份验证服务器”)的存在,在腐败的情况下,将能够投出无法区分的假选票,这降低了在非完全信任环境中对范式的接受度。通过将这个实体分成一组不太可能以不诚实的方式合作的各方,可以增加对系统的信任。然而,这种技术增加了其中一些在投票期间导致服务中断的失败风险。提案提供了更好的容错性,允许在投票周期开始之前预测与分布式身份验证服务器的交互,因此,在发生故障的情况下,有很长的时间来恢复系统。先前采用这种方法的提议已被证明在密码学上很弱,或者只是提供个人可验证性。本文提出了一种采用盲证书的认证系统。与之前的提案不同,它提供了普遍的可验证性,并允许在不危及选民隐私的情况下检测重复投票。
{"title":"Blind Certificates for Secure Electronic Voting","authors":"Víctor Mateu, F. Sebé, M. Valls","doi":"10.1109/ITNG.2013.11","DOIUrl":"https://doi.org/10.1109/ITNG.2013.11","url":null,"abstract":"Blind signature-based electronic voting is the simplest paradigm for implementing remote voting platforms due to the fact that it does not employ complicated zero-knowledge proofs. Unfortunately, the existence of a trusted entity (the \"Authentication Server\") that, in case of corruption, would be able to cast indistinguishable fake votes reduces the acceptance of the paradigm in non fully trusted environments. Trust on the system can be increased by splitting this entity into of a set of parties that are unlikely to collaborate in a dishonest manner. Nevertheless, this technique increases the risk of failure of some of them causing a service interruption during the voting period. Better fault tolerance is provided by proposals which permit to anticipate the interaction with the distributed authentication server before the voting period begins, so that, in case of failure, there is a broad time margin for system restoration. Previous proposals following this approach have been proven to be cryptographically weak or just provide individual verifiability. In this paper, a system that employs blind certificates is presented. Unlike previous proposals, it provides universal verifiability and permits to detect double voting without putting voters' privacy at risk.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
3D Visualization of Space Distribution of Electrical Characteristics in Compound Structures Reconstructed by General Ray Method 一般射线法重建复合结构电特性空间分布的三维可视化
A. Grebénnikov
The adequate 3D visualization is important part of computer simulation systems for recognition of material structures, particularly, in identification of electrical properties of materials by Electrical Tomography. To identify distribution of electrical permittivity inside some space structures we apply General Ray (GR) method and fast algorithm constructed by the author before for the plane case. For this we consider the space domain as assemblage of plane slices. Computer simulation of this 3D scheme is realized as MATLAB software and justified by numerical experiments on examples, related with Electrical Tomography.
充分的三维可视化是识别材料结构的计算机仿真系统的重要组成部分,特别是在通过电断层扫描识别材料的电性能方面。为了确定某些空间结构内部的介电常数分布,我们对平面情况采用了作者之前构造的广义射线法和快速算法。为此,我们把空间域看作是平面片的集合。利用MATLAB软件实现了该方案的计算机仿真,并通过与电断层成像相关的算例进行了数值实验验证。
{"title":"3D Visualization of Space Distribution of Electrical Characteristics in Compound Structures Reconstructed by General Ray Method","authors":"A. Grebénnikov","doi":"10.1109/ITNG.2013.115","DOIUrl":"https://doi.org/10.1109/ITNG.2013.115","url":null,"abstract":"The adequate 3D visualization is important part of computer simulation systems for recognition of material structures, particularly, in identification of electrical properties of materials by Electrical Tomography. To identify distribution of electrical permittivity inside some space structures we apply General Ray (GR) method and fast algorithm constructed by the author before for the plane case. For this we consider the space domain as assemblage of plane slices. Computer simulation of this 3D scheme is realized as MATLAB software and justified by numerical experiments on examples, related with Electrical Tomography.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"s3-39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130161260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 10th International Conference on Information Technology: New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1