首页 > 最新文献

2013 10th International Conference on Information Technology: New Generations最新文献

英文 中文
Analysis of Classical and Quantum Resources for the Quantum Linear Systems Algorithm 量子线性系统算法的经典资源和量子资源分析
Jon Inouye
The quantum algorithm by Harrow, Hassidim, and Lloyd solves a system of N linear equations and achieves exponential speedup over classical algorithms under certain conditions. The advantage to the algorithm is that log(N) rather than N registers are required. Given an N x N matrix A and vectors x and b, the quantum algorithm seeks to find x such that Ax = b. By representing vector b as a superposition of quantum states |b>, quantum phase estimation is used to find the corresponding eigenvalues of A. Applying the inverse Fourier transform, we solve for |x> such that |x> = A-1|b>. We model the algorithm using a quantum circuit diagram, with data qubits encoded using the Steane code for fault tolerant quantum phase estimation. Fresh ancilla for error correction are provided using an oracular pipelined ancilla architecture. We then analyze the classical and quantum resources needed for implementation. The significance of this case study is to examine how classical and quantum resources interact in implementing this algorithm. The issues raised in this analysis, such as fault tolerant phase estimation using pipelined ancilla, garbage collection, and the preparation of I/O registers to this architecture, will be explored in more detail in future research.
Harrow, Hassidim和Lloyd的量子算法解决了N个线性方程组,并在一定条件下实现了比经典算法指数级的加速。该算法的优点是需要log(N)而不是N个寄存器。给定一个N x N矩阵A和向量x和b,量子算法寻求找到x使Ax = b。通过将向量b表示为量子态的叠加|b>,量子相位估计用于找到A的相应特征值。应用傅里叶反变换,我们求解出|x>使得|x> = A-1|b>。我们使用量子电路图对算法进行建模,数据量子比特使用Steane编码进行容错量子相位估计。使用神谕式流水线辅助结构提供用于纠错的新辅助。然后我们分析了实现所需的经典资源和量子资源。本案例研究的意义在于研究经典资源和量子资源在实现该算法时如何相互作用。本分析中提出的问题,如使用流水线辅助设备进行容错阶段估计、垃圾收集和为该体系结构准备I/O寄存器,将在未来的研究中进行更详细的探讨。
{"title":"Analysis of Classical and Quantum Resources for the Quantum Linear Systems Algorithm","authors":"Jon Inouye","doi":"10.1109/ITNG.2013.117","DOIUrl":"https://doi.org/10.1109/ITNG.2013.117","url":null,"abstract":"The quantum algorithm by Harrow, Hassidim, and Lloyd solves a system of N linear equations and achieves exponential speedup over classical algorithms under certain conditions. The advantage to the algorithm is that log(N) rather than N registers are required. Given an N x N matrix A and vectors x and b, the quantum algorithm seeks to find x such that Ax = b. By representing vector b as a superposition of quantum states |b>, quantum phase estimation is used to find the corresponding eigenvalues of A. Applying the inverse Fourier transform, we solve for |x> such that |x> = A-1|b>. We model the algorithm using a quantum circuit diagram, with data qubits encoded using the Steane code for fault tolerant quantum phase estimation. Fresh ancilla for error correction are provided using an oracular pipelined ancilla architecture. We then analyze the classical and quantum resources needed for implementation. The significance of this case study is to examine how classical and quantum resources interact in implementing this algorithm. The issues raised in this analysis, such as fault tolerant phase estimation using pipelined ancilla, garbage collection, and the preparation of I/O registers to this architecture, will be explored in more detail in future research.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Ophthalmologist's Tool for Predicting Deterioration in Patients with Accommodative Esotropia 预测调节性内斜视恶化的眼科医生工具
Susan P. Imberman, Sarah Zelikovitz, Irene Ludwig
The work described in this paper applies machine learning techniques, to a database of accommodative esotropic patients. Accommodative esotropia is an eye disease that when left untreated leads to blindness. Patients whose muscles deteriorate most often need corrective surgery in order to prevent this, since less invasive methods of treatment tend to fail in these patients. It is often difficult for physicians to determine apriori which patients will deteriorate enough to require surgery. Using a learn and prune methodology, decision tree analysis of accommodative esotropic patients led to the discovery of two conjunctive variables that predicted deterioration. The use of these variables produced better predictions, and gave insight to domain experts.
本文所描述的工作将机器学习技术应用于适应性内敛患者的数据库。适应性内斜视是一种眼病,如果不及时治疗会导致失明。肌肉恶化的患者通常需要矫正手术来预防这种情况,因为在这些患者中,侵入性较小的治疗方法往往会失败。医生通常很难事先确定哪些病人会恶化到需要手术的程度。使用学习和修剪方法,对适应性内倾患者进行决策树分析,发现了预测恶化的两个联合变量。这些变量的使用产生了更好的预测,并为领域专家提供了洞察力。
{"title":"An Ophthalmologist's Tool for Predicting Deterioration in Patients with Accommodative Esotropia","authors":"Susan P. Imberman, Sarah Zelikovitz, Irene Ludwig","doi":"10.1109/ITNG.2013.114","DOIUrl":"https://doi.org/10.1109/ITNG.2013.114","url":null,"abstract":"The work described in this paper applies machine learning techniques, to a database of accommodative esotropic patients. Accommodative esotropia is an eye disease that when left untreated leads to blindness. Patients whose muscles deteriorate most often need corrective surgery in order to prevent this, since less invasive methods of treatment tend to fail in these patients. It is often difficult for physicians to determine apriori which patients will deteriorate enough to require surgery. Using a learn and prune methodology, decision tree analysis of accommodative esotropic patients led to the discovery of two conjunctive variables that predicted deterioration. The use of these variables produced better predictions, and gave insight to domain experts.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of Static and Dynamic Android Anti-virus Strategies 静态和动态Android反病毒策略研究
Yan Ma, M. Sharbaf
Nowadays e-commerce is being substituted by m-commerce with the strong push from smart phone. Android phone, iPhone, BlackBerry and Windows Phone are typical smart phone models. According to comScore [1] Android takes more than 50% and iPhones takes more than 31% of smart phone market share in US in 2012. This research paper focuses on Anti-Virus strategies on Android platform because it is the most popular smart phone platform, it is an open-source environment, and it has more applications than Apple Store. The anti-virus strategies will be introduced in two categories with three samples: static analysis and dynamic analysis. Detail descriptions about Stowaway, AASandbox and Droidbox are provided. The analyses of their advantages/disadvantages are followed. The research paper is focused to develop an outline of Android anti-virus strategies to individuals, government agencies and private sectors that are interested in and help you to decide which anti-virus application to choose.
如今,在智能手机的强力推动下,电子商务正在被移动商务所取代。安卓手机、iPhone、黑莓和Windows phone都是典型的智能手机型号。根据comScore[1]的数据,2012年,Android和iphone在美国智能手机市场的份额分别超过50%和31%。由于Android平台是目前最流行的智能手机平台,它是一个开源环境,并且它比Apple Store拥有更多的应用程序,所以本文主要研究Android平台上的反病毒策略。反病毒策略将分为两类,三个样本:静态分析和动态分析。详细介绍了偷渡者,asandbox和Droidbox。接着分析了它们的优点/缺点。该研究报告的重点是为个人、政府机构和私营部门提供Android反病毒策略大纲,并帮助您决定选择哪种反病毒应用程序。
{"title":"Investigation of Static and Dynamic Android Anti-virus Strategies","authors":"Yan Ma, M. Sharbaf","doi":"10.1109/ITNG.2013.62","DOIUrl":"https://doi.org/10.1109/ITNG.2013.62","url":null,"abstract":"Nowadays e-commerce is being substituted by m-commerce with the strong push from smart phone. Android phone, iPhone, BlackBerry and Windows Phone are typical smart phone models. According to comScore [1] Android takes more than 50% and iPhones takes more than 31% of smart phone market share in US in 2012. This research paper focuses on Anti-Virus strategies on Android platform because it is the most popular smart phone platform, it is an open-source environment, and it has more applications than Apple Store. The anti-virus strategies will be introduced in two categories with three samples: static analysis and dynamic analysis. Detail descriptions about Stowaway, AASandbox and Droidbox are provided. The analyses of their advantages/disadvantages are followed. The research paper is focused to develop an outline of Android anti-virus strategies to individuals, government agencies and private sectors that are interested in and help you to decide which anti-virus application to choose.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125930439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Benchmarking Algorithm to Determine Maximum Stability Data Gathering Trees for Wireless Mobile Sensor Networks 一种确定无线移动传感器网络最大稳定性数据采集树的基准算法
N. Meghanathan, Philip Mumford
The high-level contribution of this paper is the design of a benchmarking algorithm to determine a sequence of the longest-living stable data gathering trees for wireless mobile sensor networks (MSNs) such that the number of tree discoveries is the theoretical global minimum. Referred to as the Max. Stability-DG algorithm, the algorithm assumes the availability of the complete knowledge of future topology changes, and operates according to a greedy strategy: Whenever a new data gathering tree is needed at time instant t, determine a spanning tree that will exist for the longest time since t and derive a data gathering tree by conducting a Breadth First Search on the spanning tree. We prove the correctness of the Max. Stability-DG algorithm that it indeed determines the sequence of longest living stable data gathering trees. Since the Max. Stability-DG trees are based on spanning trees covering the entire network of live sensor nodes, the average lifetime and the number of tree discoveries incurred for the Max. Stability-DG trees will serve respectively as the upper bound and lower bound for any network-wide communication topology determined using any other algorithm for mobile sensor networks.
本文的高级贡献是设计了一种基准算法,用于确定无线移动传感器网络(msn)的寿命最长的稳定数据收集树序列,从而使树发现的数量成为理论上的全局最小值。被称为Max。Stability-DG算法,该算法假设未来拓扑变化的完整知识是可用的,并根据贪婪策略进行操作:每当在时刻t需要新的数据收集树时,确定一棵自t以来存在时间最长的生成树,并通过对生成树进行广度优先搜索来导出数据收集树。我们证明了Max的正确性。稳定性- dg算法,它确实决定了寿命最长的稳定数据收集树的序列。从Max开始。稳定性- dg树是基于生成树覆盖整个网络的活动传感器节点,平均寿命和发现树的数量导致的最大值。稳定性- dg树将分别作为使用任何其他移动传感器网络算法确定的任何网络范围通信拓扑的上界和下界。
{"title":"A Benchmarking Algorithm to Determine Maximum Stability Data Gathering Trees for Wireless Mobile Sensor Networks","authors":"N. Meghanathan, Philip Mumford","doi":"10.1109/ITNG.2013.83","DOIUrl":"https://doi.org/10.1109/ITNG.2013.83","url":null,"abstract":"The high-level contribution of this paper is the design of a benchmarking algorithm to determine a sequence of the longest-living stable data gathering trees for wireless mobile sensor networks (MSNs) such that the number of tree discoveries is the theoretical global minimum. Referred to as the Max. Stability-DG algorithm, the algorithm assumes the availability of the complete knowledge of future topology changes, and operates according to a greedy strategy: Whenever a new data gathering tree is needed at time instant t, determine a spanning tree that will exist for the longest time since t and derive a data gathering tree by conducting a Breadth First Search on the spanning tree. We prove the correctness of the Max. Stability-DG algorithm that it indeed determines the sequence of longest living stable data gathering trees. Since the Max. Stability-DG trees are based on spanning trees covering the entire network of live sensor nodes, the average lifetime and the number of tree discoveries incurred for the Max. Stability-DG trees will serve respectively as the upper bound and lower bound for any network-wide communication topology determined using any other algorithm for mobile sensor networks.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Random Cluster Sampling on X-Machines Test Cases x - machine测试用例的随机聚类抽样
Yasir Imtiaz Khan, Sadia Kausar
Software testing is considered one of the most expensive and critical phases of the software development. Formal testing approaches are extensively used for verifying the conformance of implementations to a given specification. These formal approaches usually generate a large amount of input test data which is costly in terms of time and effort. Techniques for reducing test input data are thus of the utmost importance. The contribution of this paper is to propose a framework for the reduction of test input data generated by a formal testing approach based on X-Machines. To achieve these objectives we have applied a well known statistical approach called Random Cluster Sampling on the test case set generated by a formal approach X-Machines. To exemplify our technique we have generated a test set for an X-Machine Microwave oven specification and then drew a sample from the test set by using the Random Cluster sampling technique. Based on the tolerated fault rate we have extracted conclusion about the accuracy of implementation.
软件测试被认为是软件开发中最昂贵和最关键的阶段之一。正式的测试方法被广泛用于验证实现与给定规范的一致性。这些形式化的方法通常会产生大量的输入测试数据,这在时间和精力上都是昂贵的。因此,减少测试输入数据的技术是至关重要的。本文的贡献是提出了一个框架,用于减少由基于X-Machines的正式测试方法生成的测试输入数据。为了实现这些目标,我们在正式方法X-Machines生成的测试用例集上应用了一种众所周知的称为随机集群抽样的统计方法。为了举例说明我们的技术,我们为X-Machine微波炉规格生成了一个测试集,然后使用随机聚类抽样技术从测试集中抽取样本。根据可容忍故障率得出了执行准确性的结论。
{"title":"Random Cluster Sampling on X-Machines Test Cases","authors":"Yasir Imtiaz Khan, Sadia Kausar","doi":"10.1109/ITNG.2013.50","DOIUrl":"https://doi.org/10.1109/ITNG.2013.50","url":null,"abstract":"Software testing is considered one of the most expensive and critical phases of the software development. Formal testing approaches are extensively used for verifying the conformance of implementations to a given specification. These formal approaches usually generate a large amount of input test data which is costly in terms of time and effort. Techniques for reducing test input data are thus of the utmost importance. The contribution of this paper is to propose a framework for the reduction of test input data generated by a formal testing approach based on X-Machines. To achieve these objectives we have applied a well known statistical approach called Random Cluster Sampling on the test case set generated by a formal approach X-Machines. To exemplify our technique we have generated a test set for an X-Machine Microwave oven specification and then drew a sample from the test set by using the Random Cluster sampling technique. Based on the tolerated fault rate we have extracted conclusion about the accuracy of implementation.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115937573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Alternative Representation of Aspects 方面的替代表示法
S. Al-Fedaghi
According to current views, object-oriented analysis and design focus mostly on system functionality, resulting in difficulties in maintenance and contradictions of the main principles of object orientation. Aspect-oriented software development proposes early specification of nonfunctional requirements. Many works have integrated an aspect-oriented approach into object-oriented modeling, for example, interdependent concern behavior is modeled using extended UML2 activity models. Without loss of generality, we suggest utilizing a new flow-based approach for describing a conceptual integrated picture, using an extended activity digram as a sample case to illustrate our proposed methodology.
根据目前的观点,面向对象的分析和设计主要集中在系统的功能上,这导致了维护的困难和面向对象的主要原则的矛盾。面向方面的软件开发建议非功能需求的早期规范。许多工作已经将面向方面的方法集成到面向对象的建模中,例如,使用扩展的UML2活动模型对相互依赖的关注行为进行建模。在不丧失一般性的情况下,我们建议使用一种新的基于流的方法来描述概念性集成图,使用扩展的活动图作为示例案例来说明我们提出的方法。
{"title":"Alternative Representation of Aspects","authors":"S. Al-Fedaghi","doi":"10.1109/ITNG.2013.45","DOIUrl":"https://doi.org/10.1109/ITNG.2013.45","url":null,"abstract":"According to current views, object-oriented analysis and design focus mostly on system functionality, resulting in difficulties in maintenance and contradictions of the main principles of object orientation. Aspect-oriented software development proposes early specification of nonfunctional requirements. Many works have integrated an aspect-oriented approach into object-oriented modeling, for example, interdependent concern behavior is modeled using extended UML2 activity models. Without loss of generality, we suggest utilizing a new flow-based approach for describing a conceptual integrated picture, using an extended activity digram as a sample case to illustrate our proposed methodology.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"32 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120986227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Attack Scenario Prediction Methodology 攻击场景预测方法
Seraj Fayyad, C. Meinel
Intrusion detection system generates significant data about malicious activities run against network. Generated data by IDS are stored in IDS database. This data represent attacks scenarios history against network. Main goal of IDS system is to enhance network defense technologies. Other techniques are also used to enhance the defense of network such as Attack graph. Network attack graph are used for many goals such as attacker next attack step prediction. In this paper we propose a real time prediction methodology for predicting most possible attack steps and attack scenarios. Proposed methodology benefits from attacks history against network and from attack graph source data. it comes without considerable computation overload such as checking of attack plans library. It provides parallel prediction for parallel attack scenarios.
入侵检测系统能够生成针对网络运行的恶意活动的重要数据。IDS生成的数据存储在IDS数据库中。这些数据代表了针对网络的攻击场景历史。入侵检测系统的主要目标是提高网络防御技术。另外还采用了攻击图等技术来增强网络的防御能力。网络攻击图用于预测攻击者下一步的攻击步骤等目标。在本文中,我们提出了一种实时预测方法来预测最可能的攻击步骤和攻击场景。本文提出的方法得益于对网络的攻击历史和攻击图源数据。它没有相当大的计算过载,如检查攻击计划库。它为并行攻击场景提供并行预测。
{"title":"Attack Scenario Prediction Methodology","authors":"Seraj Fayyad, C. Meinel","doi":"10.1109/ITNG.2013.16","DOIUrl":"https://doi.org/10.1109/ITNG.2013.16","url":null,"abstract":"Intrusion detection system generates significant data about malicious activities run against network. Generated data by IDS are stored in IDS database. This data represent attacks scenarios history against network. Main goal of IDS system is to enhance network defense technologies. Other techniques are also used to enhance the defense of network such as Attack graph. Network attack graph are used for many goals such as attacker next attack step prediction. In this paper we propose a real time prediction methodology for predicting most possible attack steps and attack scenarios. Proposed methodology benefits from attacks history against network and from attack graph source data. it comes without considerable computation overload such as checking of attack plans library. It provides parallel prediction for parallel attack scenarios.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Boundary Value Analysis Tool - Design and Description 边界值分析工具的设计与描述
N. Debnath, Adam Kruger, M. Alexander
The design and description of a software testing tool utilizing the boundary value analysis is presented. The tool initially generates the test cases using the specifications of three selected functions and then automatically executes the test cases on these functions to evaluate correctness. The proposed tool uses the implementations of the triangle, next date and commission functions for the correctness evaluation. The potential application of the tool is also outlined.
介绍了一种基于边界值分析的软件测试工具的设计和描述。该工具最初使用三个选定函数的说明生成测试用例,然后在这些函数上自动执行测试用例以评估正确性。提出的工具使用三角形、下一个日期和委托函数的实现来进行正确性评估。本文还概述了该工具的潜在应用。
{"title":"A Boundary Value Analysis Tool - Design and Description","authors":"N. Debnath, Adam Kruger, M. Alexander","doi":"10.1109/ITNG.2013.20","DOIUrl":"https://doi.org/10.1109/ITNG.2013.20","url":null,"abstract":"The design and description of a software testing tool utilizing the boundary value analysis is presented. The tool initially generates the test cases using the specifications of three selected functions and then automatically executes the test cases on these functions to evaluate correctness. The proposed tool uses the implementations of the triangle, next date and commission functions for the correctness evaluation. The potential application of the tool is also outlined.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128212850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perception and Use of Social Networking Sites among Undergraduate Students in Kuwait 科威特大学生对社交网站的认知与使用
Samir N. Hamade
Social networking is increasingly attracting the attention and interest of academics and researchers in the US and Europe. However, there is little research done outside these areas, especially in the Middle East and Arab countries. This paper aims to assess the perception and use of social networking sites (SNS) among university students in the state of Kuwait, and study their positive and negative impacts. The results showed a heavy use of Twitter and Facebook among university students who were viewing their sites more frequently than posting. The most positive impacts were better relation with family and friends and more involvement in social, political and cultural activities. Neglecting study/work and the time consumed are the two major drawbacks. The findings showed some lack of experience with social networking beyond entertainment, which confirms the need to educate students on the benefits of SNS and the quality of information found on these sites. Privacy issues should also be raised since the majority of students (70%) had uncontrolled accounts.
社交网络正日益引起欧美学者和研究人员的关注和兴趣。然而,在这些地区之外,特别是在中东和阿拉伯国家,很少有研究。本文旨在评估科威特大学生对社交网站(SNS)的认知和使用情况,并研究其积极和消极影响。调查结果显示,大学生大量使用Twitter和Facebook,他们浏览网站的频率高于发帖的频率。最积极的影响是与家人和朋友的关系更好,更多地参与社会、政治和文化活动。忽视学习/工作和浪费时间是两个主要的缺点。调查结果显示,除了娱乐之外,一些学生缺乏使用社交网络的经验,这证实了教育学生了解社交网络的好处和这些网站上发现的信息质量的必要性。隐私问题也应该提出,因为大多数学生(70%)有不受控制的账户。
{"title":"Perception and Use of Social Networking Sites among Undergraduate Students in Kuwait","authors":"Samir N. Hamade","doi":"10.1109/ITNG.2013.67","DOIUrl":"https://doi.org/10.1109/ITNG.2013.67","url":null,"abstract":"Social networking is increasingly attracting the attention and interest of academics and researchers in the US and Europe. However, there is little research done outside these areas, especially in the Middle East and Arab countries. This paper aims to assess the perception and use of social networking sites (SNS) among university students in the state of Kuwait, and study their positive and negative impacts. The results showed a heavy use of Twitter and Facebook among university students who were viewing their sites more frequently than posting. The most positive impacts were better relation with family and friends and more involvement in social, political and cultural activities. Neglecting study/work and the time consumed are the two major drawbacks. The findings showed some lack of experience with social networking beyond entertainment, which confirms the need to educate students on the benefits of SNS and the quality of information found on these sites. Privacy issues should also be raised since the majority of students (70%) had uncontrolled accounts.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128496753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Case Study on the Construction of Application Ontologies 应用本体构建的案例研究
Luis Eduardo Santos, R. Girardi, P. Novais
Appropriate techniques for the development of application ontologies are needed and GAODT ("Goal-Oriented Application Ontology Development Technique") technique described in this article contributes to this purpose. GAODT translates the goals and facts in natural language expressing the requirements of a knowledge-based system into rules and facts in first-order logic. Next, this knowledge base is mapped to an application ontology. GAODT was evaluated through the development of a case study on the construction of the application ontology of a knowledge-based system for the domain of Intestate Succession. A software tool to support the application of GAODT was also developed.
开发应用程序本体需要适当的技术,本文中描述的GAODT(“面向目标的应用程序本体开发技术”)技术有助于实现这一目的。GAODT将表达基于知识的系统需求的自然语言中的目标和事实转换为一阶逻辑中的规则和事实。接下来,将此知识库映射到应用程序本体。通过对无遗嘱继承领域基于知识的系统应用本体构建的案例研究,对GAODT进行了评估。开发了支持GAODT应用的软件工具。
{"title":"A Case Study on the Construction of Application Ontologies","authors":"Luis Eduardo Santos, R. Girardi, P. Novais","doi":"10.1109/ITNG.2013.95","DOIUrl":"https://doi.org/10.1109/ITNG.2013.95","url":null,"abstract":"Appropriate techniques for the development of application ontologies are needed and GAODT (\"Goal-Oriented Application Ontology Development Technique\") technique described in this article contributes to this purpose. GAODT translates the goals and facts in natural language expressing the requirements of a knowledge-based system into rules and facts in first-order logic. Next, this knowledge base is mapped to an application ontology. GAODT was evaluated through the development of a case study on the construction of the application ontology of a knowledge-based system for the domain of Intestate Succession. A software tool to support the application of GAODT was also developed.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"129 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134239324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2013 10th International Conference on Information Technology: New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1