首页 > 最新文献

2013 10th International Conference on Information Technology: New Generations最新文献

英文 中文
Evaluating the Usability of Interactive Digital Television Applications 交互式数字电视应用的可用性评估
Andrés F. Solano, C. Collazos, Cristian Rusu, Luis Merchán
The evaluation of the usability of an interactive system is one of the most important steps in the user-centered design approach. Usability evaluation methods are quite diverse and many of them may be used to evaluate Interactive Digital Television (iTV) applications. Questions arise when deciding which method and/or combination of methods give more (relevant) information. Three iTV applications have been evaluated, applying several usability evaluation methods. Based on the effectiveness and efficiency of these methods, this paper proposes a methodology to evaluate the usability of iTV applications.
交互式系统的可用性评估是以用户为中心的设计方法中最重要的步骤之一。可用性评估方法多种多样,其中许多方法可用于评估交互式数字电视(iTV)应用程序。在决定哪种方法和/或方法组合提供更多(相关)信息时,问题就出现了。应用几种可用性评估方法,对三个iTV应用程序进行了评估。基于这些方法的有效性和效率,本文提出了一种可用性评价方法。
{"title":"Evaluating the Usability of Interactive Digital Television Applications","authors":"Andrés F. Solano, C. Collazos, Cristian Rusu, Luis Merchán","doi":"10.1109/ITNG.2013.24","DOIUrl":"https://doi.org/10.1109/ITNG.2013.24","url":null,"abstract":"The evaluation of the usability of an interactive system is one of the most important steps in the user-centered design approach. Usability evaluation methods are quite diverse and many of them may be used to evaluate Interactive Digital Television (iTV) applications. Questions arise when deciding which method and/or combination of methods give more (relevant) information. Three iTV applications have been evaluated, applying several usability evaluation methods. Based on the effectiveness and efficiency of these methods, this paper proposes a methodology to evaluate the usability of iTV applications.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134443597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Similarity Search Problem Research on Multi-dimensional Data Sets 多维数据集的相似搜索问题研究
Yong Shi, Brian Graham
In this paper, we present our continuous work on designing an algorithm to find nearest neighbors to given queries. In our previous work, we analyze the situation that there are multiple queries with different level of importance, and define a weight for each query point. We also propose an algorithm to find nearest neighbors to multiple queries with weights and enhanced our algorithm based on query point distribution. In this paper we analyze the data distribution on various dimensions, and apply the shrinking concept for the improvement and enhancement of our multi-query search approach.
在本文中,我们展示了我们在设计一种算法来找到给定查询的最近邻居方面的持续工作。在之前的工作中,我们分析了存在多个重要程度不同的查询的情况,并为每个查询点定义了权重。我们还提出了一种带权重的多查询最近邻算法,并基于查询点分布对算法进行了改进。本文分析了数据在各个维度上的分布,并应用收缩的概念来改进和增强我们的多查询搜索方法。
{"title":"Similarity Search Problem Research on Multi-dimensional Data Sets","authors":"Yong Shi, Brian Graham","doi":"10.1109/ITNG.2013.72","DOIUrl":"https://doi.org/10.1109/ITNG.2013.72","url":null,"abstract":"In this paper, we present our continuous work on designing an algorithm to find nearest neighbors to given queries. In our previous work, we analyze the situation that there are multiple queries with different level of importance, and define a weight for each query point. We also propose an algorithm to find nearest neighbors to multiple queries with weights and enhanced our algorithm based on query point distribution. In this paper we analyze the data distribution on various dimensions, and apply the shrinking concept for the improvement and enhancement of our multi-query search approach.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped Domain 关于l形域上有限元法最优误差估计的若干问题
T. Kinoshita, M. Nakao
In the a priori L2 error analysis of the finite element method (FEM), the Aubin-Nitsche trick is often used. Usually, the convergence order of the L2 error estimates by the Aubin-Nitsche trick is one order higher than the H01 error estimates. As is well known, the convergence order obtained by this technique depends on the shape of the domain because it is dependent on the regularity of solutions for the associated dual problem on the same domain. In this paper, we introduce a technique for getting the optimal order L2 error estimates on the L-shaped domain without Aubin-Nitsche trick. From the numerical evidence based on the guaranteed computations, we could still expect that such a domain dependency is not essential.
在有限元法(FEM)的先验L2误差分析中,经常使用Aubin-Nitsche技巧。通常,通过Aubin-Nitsche技巧估计的L2误差的收敛阶比H01误差估计高一个阶。众所周知,该方法的收敛阶取决于区域的形状,因为它依赖于同一区域上相关对偶问题解的正则性。本文介绍了一种在l形域上不使用Aubin-Nitsche技巧获得最优阶L2误差估计的方法。从基于保证计算的数值证据来看,我们仍然可以期望这样的领域依赖不是必需的。
{"title":"Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped Domain","authors":"T. Kinoshita, M. Nakao","doi":"10.1109/ITNG.2013.30","DOIUrl":"https://doi.org/10.1109/ITNG.2013.30","url":null,"abstract":"In the a priori L2 error analysis of the finite element method (FEM), the Aubin-Nitsche trick is often used. Usually, the convergence order of the L2 error estimates by the Aubin-Nitsche trick is one order higher than the H01 error estimates. As is well known, the convergence order obtained by this technique depends on the shape of the domain because it is dependent on the regularity of solutions for the associated dual problem on the same domain. In this paper, we introduce a technique for getting the optimal order L2 error estimates on the L-shaped domain without Aubin-Nitsche trick. From the numerical evidence based on the guaranteed computations, we could still expect that such a domain dependency is not essential.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130649059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node Filtering and Face Routing for Sensor Network 传感器网络的节点滤波与面路由
L. Gewali, Umang Amatya
Greedy forward routing and face routing algorithms have been extensively used for sending messages in sensor networks. In this paper, we consider the problem of filtering redundant nodes in a sensor network as a pre-processing step for face routing. We propose an algorithm for identifying redundant nodes. We test the performance of proposed filtering algorithm on generated networks. The prototype algorithm for testing the proposed algorithms has been implemented in the Java programming language. Experimental investigation shows that the proposed filtering algorithms are effective in removing redundant nodes without compromising the network connectivity.
在传感器网络中,贪婪前向路由和人脸路由算法被广泛用于发送消息。本文考虑了传感器网络中冗余节点的滤波问题,并将其作为人脸路由的预处理步骤。提出了一种识别冗余节点的算法。我们在生成的网络上测试了所提出的过滤算法的性能。在Java编程语言中实现了用于测试所提出算法的原型算法。实验结果表明,所提出的过滤算法在不影响网络连通性的情况下,能够有效地去除冗余节点。
{"title":"Node Filtering and Face Routing for Sensor Network","authors":"L. Gewali, Umang Amatya","doi":"10.1109/ITNG.2013.106","DOIUrl":"https://doi.org/10.1109/ITNG.2013.106","url":null,"abstract":"Greedy forward routing and face routing algorithms have been extensively used for sending messages in sensor networks. In this paper, we consider the problem of filtering redundant nodes in a sensor network as a pre-processing step for face routing. We propose an algorithm for identifying redundant nodes. We test the performance of proposed filtering algorithm on generated networks. The prototype algorithm for testing the proposed algorithms has been implemented in the Java programming language. Experimental investigation shows that the proposed filtering algorithms are effective in removing redundant nodes without compromising the network connectivity.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130213357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breast Cancer Segmentation Using Bacterial Foraging Algorithm 基于细菌觅食算法的乳腺癌分割
R. Dubey, Sujata Bhatia, M. Hanmandlu, S. Vasikarla
A new multilevel thresholding technique using bacterial foraging is proposed for the first time for the segmentation of masses in digital mammograms. The optimal thresholds are found by maximizing Kapur's entropy and also Otsu's thresholding function using BF algorithm. The performance of the proposed algorithm has been evaluated on 20 malignant mammogram images and the results are promising.
首次提出了一种新的基于细菌觅食的多层阈值分割技术,用于数字乳房x光片中肿块的分割。利用BF算法通过最大化Kapur的熵和Otsu的阈值函数来找到最优阈值。在20张恶性乳房x光图像上对该算法的性能进行了评估,结果令人满意。
{"title":"Breast Cancer Segmentation Using Bacterial Foraging Algorithm","authors":"R. Dubey, Sujata Bhatia, M. Hanmandlu, S. Vasikarla","doi":"10.1109/ITNG.2013.88","DOIUrl":"https://doi.org/10.1109/ITNG.2013.88","url":null,"abstract":"A new multilevel thresholding technique using bacterial foraging is proposed for the first time for the segmentation of masses in digital mammograms. The optimal thresholds are found by maximizing Kapur's entropy and also Otsu's thresholding function using BF algorithm. The performance of the proposed algorithm has been evaluated on 20 malignant mammogram images and the results are promising.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125361807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Teaching Students to Design and Implement Social Networks Using MVC as a Capstone Experience 教学生使用MVC作为顶点体验来设计和实现社交网络
A. Shaw
Undergraduate CS courses involve a range of design and development experiences which are often brought together in a comprehensive way as a capstone project in a student's senior year. The goal of a capstone experience is to help students demonstrate that they can integrate various CS skills they have been taught in a practical way. The importance of being able to apply what a student has learned in a practical way as a student prepares to graduate and enter the workforce cannot be overstated. We have developed a Capstone Course project where students build a social networking application using ASP.NET MVC to integrate skills learned in Programming Principles, Software Engineering, Database Design and Web Design courses. And we believe this type of project can serve as a model that can be applied in many different schools and contexts. Because the MVC pattern is used, each part of the system is modular, with the model, the view and the controller requiring different sets of skills. Students can apply their skills to implementing the entire framework themselves as it is presented to them, or they can redesign portions of the framework and integrate their redesign into the original architecture. Either way, students experience the integration of a wide variety of skills in a compelling way since they are doing so while building a social networking application that they can test on their friends.
本科计算机科学课程包括一系列设计和开发经验,这些经验通常在学生大四的时候以一种全面的方式汇集在一起,作为一个顶点项目。顶点体验的目标是帮助学生证明他们能够以实用的方式整合他们所学的各种计算机科学技能。在学生准备毕业和进入职场的过程中,能够以一种实际的方式应用学生所学知识的重要性怎么强调都不为过。我们开发了一个顶点课程项目,让学生使用ASP构建一个社交网络应用程序。NET MVC整合了在编程原理、软件工程、数据库设计和网页设计课程中学到的技能。我们相信这种类型的项目可以作为一种模式,可以应用于许多不同的学校和环境。由于使用了MVC模式,系统的每个部分都是模块化的,模型、视图和控制器需要不同的技能集。学生可以应用他们的技能来实现呈现给他们的整个框架,或者他们可以重新设计框架的一部分,并将他们的重新设计集成到原始体系结构中。无论哪种方式,学生都以一种引人注目的方式体验到各种技能的整合,因为他们是在构建一个可以在朋友身上测试的社交网络应用程序时这样做的。
{"title":"Teaching Students to Design and Implement Social Networks Using MVC as a Capstone Experience","authors":"A. Shaw","doi":"10.1109/ITNG.2013.137","DOIUrl":"https://doi.org/10.1109/ITNG.2013.137","url":null,"abstract":"Undergraduate CS courses involve a range of design and development experiences which are often brought together in a comprehensive way as a capstone project in a student's senior year. The goal of a capstone experience is to help students demonstrate that they can integrate various CS skills they have been taught in a practical way. The importance of being able to apply what a student has learned in a practical way as a student prepares to graduate and enter the workforce cannot be overstated. We have developed a Capstone Course project where students build a social networking application using ASP.NET MVC to integrate skills learned in Programming Principles, Software Engineering, Database Design and Web Design courses. And we believe this type of project can serve as a model that can be applied in many different schools and contexts. Because the MVC pattern is used, each part of the system is modular, with the model, the view and the controller requiring different sets of skills. Students can apply their skills to implementing the entire framework themselves as it is presented to them, or they can redesign portions of the framework and integrate their redesign into the original architecture. Either way, students experience the integration of a wide variety of skills in a compelling way since they are doing so while building a social networking application that they can test on their friends.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1997 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125590101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
White Box AES Using Intel's New AES Instructions 使用英特尔新AES指令的白盒AES
S. Gueron
White box cryptography deals with content protection scenarios where software decrypts some contents, using a secret key (embedded in the code in some obfuscated way), while the adversary has access to the code and its execution. Obviously, performance is slowed down by the obfuscation overheads. This paper demonstrates a method for using Intel's New AES Instructions to write decryption code without directly using the cipher key or any of the round keys in a register (or in memory). Such implementation can enjoy some of the performance benefits that the AES instructions offer. We show an example where it is more than 2.5 times faster than a lookup table based alternative.
白盒密码学处理内容保护场景,其中软件使用秘密密钥(以某种模糊的方式嵌入代码中)解密某些内容,而攻击者可以访问代码及其执行。显然,混淆开销降低了性能。本文演示了一种使用英特尔的新AES指令编写解密代码的方法,而无需直接使用密码密钥或寄存器(或内存)中的任何轮密钥。这样的实现可以享受AES指令提供的一些性能优势。我们展示了一个示例,其中它比基于查找表的替代方案快2.5倍以上。
{"title":"White Box AES Using Intel's New AES Instructions","authors":"S. Gueron","doi":"10.1109/ITNG.2013.64","DOIUrl":"https://doi.org/10.1109/ITNG.2013.64","url":null,"abstract":"White box cryptography deals with content protection scenarios where software decrypts some contents, using a secret key (embedded in the code in some obfuscated way), while the adversary has access to the code and its execution. Obviously, performance is slowed down by the obfuscation overheads. This paper demonstrates a method for using Intel's New AES Instructions to write decryption code without directly using the cipher key or any of the round keys in a register (or in memory). Such implementation can enjoy some of the performance benefits that the AES instructions offer. We show an example where it is more than 2.5 times faster than a lookup table based alternative.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121021339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hardware Multi-processor Design for Highly-Demanding Applications 高要求应用的硬件多处理器设计
L. Józwiak, Y. Jan
This paper focuses on mastering the architecture development of hardware multi-processors for modern highly demanding applications. It presents the results of our analysis of the main issues to be addressed when designing multi-processors for such applications, and discusses our new multi-processor design method which developed to address these issues. We implemented the method in the form of an automatic design exploration tool. Using this tool we performed a large set of design experiments. The experiments demonstrated that without adequately addressing of the discussed design issues it is virtually impossible to construct high-quality hardware multi-processors, and that our design method adequately addresses them.
本文的重点是掌握现代高要求应用的硬件多处理器的体系结构开发。本文介绍了针对此类应用设计多处理器时需要解决的主要问题的分析结果,并讨论了我们为解决这些问题而开发的新的多处理器设计方法。我们以自动设计探索工具的形式实现了该方法。使用这个工具,我们进行了大量的设计实验。实验表明,如果没有充分解决所讨论的设计问题,实际上不可能构建高质量的硬件多处理器,并且我们的设计方法充分解决了这些问题。
{"title":"Hardware Multi-processor Design for Highly-Demanding Applications","authors":"L. Józwiak, Y. Jan","doi":"10.1109/ITNG.2013.33","DOIUrl":"https://doi.org/10.1109/ITNG.2013.33","url":null,"abstract":"This paper focuses on mastering the architecture development of hardware multi-processors for modern highly demanding applications. It presents the results of our analysis of the main issues to be addressed when designing multi-processors for such applications, and discusses our new multi-processor design method which developed to address these issues. We implemented the method in the form of an automatic design exploration tool. Using this tool we performed a large set of design experiments. The experiments demonstrated that without adequately addressing of the discussed design issues it is virtually impossible to construct high-quality hardware multi-processors, and that our design method adequately addresses them.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the Efficiency and Effectiveness of Penetration Test Automation 提高渗透测试自动化的效率和有效性
Kevin P. Haubris, Joshua J. Pauli
During a penetration test there is many different tools used for every step of the test. These steps are done for every penetration test that a company performs. The tools used are focused towards a specific area of the penetration test that range from information gathering to exploitation. This paper introduces scripting certain tools that are used often to make the process more efficient and effective for both the tester and the customer.
在渗透测试期间,测试的每个步骤都使用许多不同的工具。公司执行的每个渗透测试都要执行这些步骤。所使用的工具侧重于渗透测试的特定领域,范围从信息收集到利用。本文介绍了编写脚本的某些工具,这些工具经常用于使测试人员和客户的过程更加高效和有效。
{"title":"Improving the Efficiency and Effectiveness of Penetration Test Automation","authors":"Kevin P. Haubris, Joshua J. Pauli","doi":"10.1109/ITNG.2013.135","DOIUrl":"https://doi.org/10.1109/ITNG.2013.135","url":null,"abstract":"During a penetration test there is many different tools used for every step of the test. These steps are done for every penetration test that a company performs. The tools used are focused towards a specific area of the penetration test that range from information gathering to exploitation. This paper introduces scripting certain tools that are used often to make the process more efficient and effective for both the tester and the customer.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122165017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Forecasting Wet Land Rice Production for Food Security 面向粮食安全的湿地水稻产量预测
Abdollahian M, Lasmini L
Rice is one of the major crops feeding the world population and is one of the most substantial ingredients in the food security chain. Therefore, a reliable forecast of rice production would have a predominant impact on assessing the world food security. In this paper we develop models to forecast the wet land rice production in two provinces of Indonesia. The four-monthly data are used to construct and develop the forecasting models. To forecast the rice production, we first forecast the harvested area and the yield. We then use a mathematical model to estimate the rice production in terms of the harvested area and yield. The proposed models are used to forecast the recorded data. The error of the forecasted data are analysed to assess the efficacy of the models. The analysis of the errors shows that ARIMA(p, q, d)) and Bayesian models are the best models for forecasting harvested area and yield. However, the results clearly indicate that the optimal model for one province it not necessarily the best model for the other province.
水稻是养活世界人口的主要作物之一,也是粮食安全链中最重要的成分之一。因此,对水稻产量的可靠预测将对评估世界粮食安全产生重大影响。本文建立了印度尼西亚两个省的旱地水稻产量预测模型。利用4个月的数据构建和发展预测模型。为了预测水稻产量,我们首先预测收获面积和产量。然后,我们使用一个数学模型来估计水稻的收获面积和产量。所提出的模型用于预测记录数据。对预测数据的误差进行了分析,以评价模型的有效性。误差分析表明,ARIMA(p, q, d))和贝叶斯模型是预测收获面积和产量的最佳模型。然而,结果清楚地表明,一个省的最优模型不一定是另一个省的最佳模型。
{"title":"Forecasting Wet Land Rice Production for Food Security","authors":"Abdollahian M, Lasmini L","doi":"10.1109/ITNG.2013.92","DOIUrl":"https://doi.org/10.1109/ITNG.2013.92","url":null,"abstract":"Rice is one of the major crops feeding the world population and is one of the most substantial ingredients in the food security chain. Therefore, a reliable forecast of rice production would have a predominant impact on assessing the world food security. In this paper we develop models to forecast the wet land rice production in two provinces of Indonesia. The four-monthly data are used to construct and develop the forecasting models. To forecast the rice production, we first forecast the harvested area and the yield. We then use a mathematical model to estimate the rice production in terms of the harvested area and yield. The proposed models are used to forecast the recorded data. The error of the forecasted data are analysed to assess the efficacy of the models. The analysis of the errors shows that ARIMA(p, q, d)) and Bayesian models are the best models for forecasting harvested area and yield. However, the results clearly indicate that the optimal model for one province it not necessarily the best model for the other province.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114070596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 10th International Conference on Information Technology: New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1