首页 > 最新文献

2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)最新文献

英文 中文
A cache- and memory-aware mapping algorithm for big data applications 面向大数据应用的缓存和内存感知映射算法
T. Xu, V. Leppãnen
In this paper, we propose and investigate a task mapping algorithm for big data applications. As a critical resource, data are produced faster than ever before. Parallel programs that process these data on massive parallel systems are widely adopted. The task mapping algorithm however, has not been well optimized for these applications. We explore the characteristics of big data applications based on a shared cache/memory multicore processor. The latencies of cache and memory sub-systems are analysed. The proposed algorithm is designed to optimize the cache/memory latency, as well as intra-application latency. We introduce an efficient greedy algorithm to calculate the mapping result based on the congregate degree of nodes. Different numbers of search spaces are discussed and evaluated. Experiments are conducted based on synthetic simulation and running real applications on a full system simulation environment. Results confirmed the effectiveness of the proposed algorithm. Average execution time of five selected big data applications is reduced by 8% compared with the first fit algorithm.
本文提出并研究了一种面向大数据应用的任务映射算法。作为一种重要的资源,数据的生成速度比以往任何时候都要快。在大规模并行系统上处理这些数据的并行程序被广泛采用。然而,任务映射算法还没有针对这些应用程序进行很好的优化。我们探讨了基于共享缓存/内存多核处理器的大数据应用的特点。分析了高速缓存和存储子系统的时延。该算法旨在优化缓存/内存延迟以及应用程序内部延迟。引入了一种基于节点聚集度的高效贪心算法来计算映射结果。讨论并评估了不同数量的搜索空间。实验基于综合仿真,并在全系统仿真环境下运行实际应用。实验结果证实了该算法的有效性。所选5个大数据应用的平均执行时间比第一次拟合算法减少8%。
{"title":"A cache- and memory-aware mapping algorithm for big data applications","authors":"T. Xu, V. Leppãnen","doi":"10.1109/ICDIPC.2015.7323015","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323015","url":null,"abstract":"In this paper, we propose and investigate a task mapping algorithm for big data applications. As a critical resource, data are produced faster than ever before. Parallel programs that process these data on massive parallel systems are widely adopted. The task mapping algorithm however, has not been well optimized for these applications. We explore the characteristics of big data applications based on a shared cache/memory multicore processor. The latencies of cache and memory sub-systems are analysed. The proposed algorithm is designed to optimize the cache/memory latency, as well as intra-application latency. We introduce an efficient greedy algorithm to calculate the mapping result based on the congregate degree of nodes. Different numbers of search spaces are discussed and evaluated. Experiments are conducted based on synthetic simulation and running real applications on a full system simulation environment. Results confirmed the effectiveness of the proposed algorithm. Average execution time of five selected big data applications is reduced by 8% compared with the first fit algorithm.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of two way DF relaying with co-channel interference and channel estimation error 具有同信道干扰和信道估计误差的双向DF中继性能
A. El-Mahdy, Wassim Alexan, N. Ashraf
One of the major problems of wireless communication is the channel estimation error and co-channel interference, which causes degradation in the performance of the system. Cooperative communication is one of the most efficient techniques to enhance the performance of wireless systems in the presence of channel estimation error and co-channel interference. In this paper, the performance of decode and forward two-way relay network (TWRN) scheme is evaluated in presence of channel estimation error and co-channel interference. The performance is evaluated analytically in terms of a metric called signal-to-noise gap ratio, which measures the reduction in the signal-to-noise ratio due to channel estimation error and co-channel interference. The effect of different parameters on the performance of the two way relaying scheme is studied. It is that TWRN, cooperative communications not only enhance the BER performance but also reduce the effect of channel estimation error and/ or co-channel interference.
信道估计误差和同信道干扰是无线通信的主要问题之一,会导致系统性能的下降。在存在信道估计误差和同信道干扰的情况下,协作通信是提高无线系统性能的最有效技术之一。在信道估计误差和同信道干扰存在的情况下,对译码转发双向中继网络(TWRN)方案的性能进行了评估。性能是根据一个称为信噪间隙比的指标来分析评估的,该指标衡量的是由于信道估计误差和共信道干扰导致的信噪比的降低。研究了不同参数对双向继电保护方案性能的影响。这是因为TWRN、协同通信不仅提高了误码率性能,而且减少了信道估计误差和/或同信道干扰的影响。
{"title":"Performance of two way DF relaying with co-channel interference and channel estimation error","authors":"A. El-Mahdy, Wassim Alexan, N. Ashraf","doi":"10.1109/ICDIPC.2015.7323010","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323010","url":null,"abstract":"One of the major problems of wireless communication is the channel estimation error and co-channel interference, which causes degradation in the performance of the system. Cooperative communication is one of the most efficient techniques to enhance the performance of wireless systems in the presence of channel estimation error and co-channel interference. In this paper, the performance of decode and forward two-way relay network (TWRN) scheme is evaluated in presence of channel estimation error and co-channel interference. The performance is evaluated analytically in terms of a metric called signal-to-noise gap ratio, which measures the reduction in the signal-to-noise ratio due to channel estimation error and co-channel interference. The effect of different parameters on the performance of the two way relaying scheme is studied. It is that TWRN, cooperative communications not only enhance the BER performance but also reduce the effect of channel estimation error and/ or co-channel interference.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121478178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of security in computer designated mode system 计算机指定模式系统的安全实现
S. F. Sabri, S. Daud, S. Sam, K. Kamardin, Nor’asnilawati Salleh
Computer Designated Mode (CDM) plays an important role during tracking ISRO's launch vehicle, GSLV D5. It allows tracking data to be transferred from Satish Dhawan Space Centre, India to Malaysia Space Centre, Malaysia. The data are used for real time tracking. This paper looks into the development of CDM that is based on functional requirement whereas the security measure is not considered at the moment. This paper explains the architecture of CDM and how the security will be implemented on the systems. RSA algorithm is chosen as the encryption technique which will be applied in the system. Simulation result shows that this technique is feasible for the mentioned implementation.
计算机指定模式(CDM)在印度空间研究组织(ISRO)的GSLV D5运载火箭跟踪过程中起着重要作用。它允许跟踪数据从印度的萨迪什达万航天中心传输到马来西亚的马来西亚航天中心。这些数据用于实时跟踪。本文研究了基于功能需求的CDM的发展,而目前没有考虑到安全措施。本文阐述了CDM的体系结构以及如何在系统上实现其安全性。本文选择RSA算法作为加密技术应用于系统中。仿真结果表明,该技术在上述实现中是可行的。
{"title":"Implementation of security in computer designated mode system","authors":"S. F. Sabri, S. Daud, S. Sam, K. Kamardin, Nor’asnilawati Salleh","doi":"10.1109/ICDIPC.2015.7323017","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323017","url":null,"abstract":"Computer Designated Mode (CDM) plays an important role during tracking ISRO's launch vehicle, GSLV D5. It allows tracking data to be transferred from Satish Dhawan Space Centre, India to Malaysia Space Centre, Malaysia. The data are used for real time tracking. This paper looks into the development of CDM that is based on functional requirement whereas the security measure is not considered at the moment. This paper explains the architecture of CDM and how the security will be implemented on the systems. RSA algorithm is chosen as the encryption technique which will be applied in the system. Simulation result shows that this technique is feasible for the mentioned implementation.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology 物联网(IoT)数字取证调查模型:自上而下的取证方法方法论
Sundresan Perumal, N. Norwawi, V. Raman
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, internet of things (IoT) is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices including smart objects, is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid. The main research challenge in Internet of things (IoT) for the forensic investigators is based size of the objects of forensic interest, relevancy, blurry network boundaries and edgeless networks, especially on method for conducting the investigation. The aim of this paper is to identify the best approach by designing a novel model to conduct the investigation situations for digital forensic professionals and experts. There was existing research works which introduce models for identifying the objects of forensics interest in investigations, but there were no rigorous testing for accepting the approach. Currently in this work, an integrated model is designed based on triage model and 1-2-3 zone model for volatile based data preservation.
物联网(IoT)是现有互联网基础设施内唯一可识别的嵌入式计算设备的互连。通常,物联网(IoT)有望提供超越机器对机器通信(M2M)的设备、系统和服务的高级连接,并涵盖各种协议、领域和应用程序。包括智能对象在内的这些嵌入式设备的互连预计将在几乎所有领域迎来自动化,同时也使智能电网等高级应用成为可能。物联网(IoT)对法医调查人员的主要研究挑战是基于法医感兴趣对象的大小,相关性,模糊的网络边界和无边界网络,特别是进行调查的方法。本文的目的是通过设计一种新颖的模型来确定最佳方法,以进行数字法医专业人员和专家的调查情况。现有的研究工作引入了识别调查中法医感兴趣的对象的模型,但没有严格的测试来接受这种方法。目前,本文在分诊模型和1-2-3区域模型的基础上,设计了一种基于易失性的数据保存集成模型。
{"title":"Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology","authors":"Sundresan Perumal, N. Norwawi, V. Raman","doi":"10.1109/ICDIPC.2015.7323000","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323000","url":null,"abstract":"The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, internet of things (IoT) is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices including smart objects, is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid. The main research challenge in Internet of things (IoT) for the forensic investigators is based size of the objects of forensic interest, relevancy, blurry network boundaries and edgeless networks, especially on method for conducting the investigation. The aim of this paper is to identify the best approach by designing a novel model to conduct the investigation situations for digital forensic professionals and experts. There was existing research works which introduce models for identifying the objects of forensics interest in investigations, but there were no rigorous testing for accepting the approach. Currently in this work, an integrated model is designed based on triage model and 1-2-3 zone model for volatile based data preservation.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"44 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123376000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
The effect of culture on the consumers' assessment of advertisements on social networking sites; Cross-cultural analysis 文化对消费者对社交网站广告评价的影响跨文化分析
Hossam Deraz, G. Awuah, Desalegn Abraha
Do consumers of the same brand from different culture have the same perceptions while assessing the advertisements on Social Networking Sites' (SNSAs)? To answer this question, the data for this study were collected from brand communities' consumers (BCCs) on SNSs. 278 respondents from three different cultural backgrounds (Egyptians, Dutch and British) answered the questionnaires. Five main variables to collect the consumers' assessment of SNSAs were tested (information value, entertainment value, credibility value, interactivity value, and irritation value). Based on the empirical findings, the three groups perceived five of the six variables with significant difference F ratios. Consequently, their perception of the entertainment value of SNSAs has no significant differences between the three groups. Based on the cross-cultural theory, the findings of this study have some agreements and some contradictions, especially the influences of power distance and uncertainly avoidance. Moreover, the researchers used the Oneway analysis of variance (ANOVA) with Post Hoc tests to compare between the assessments of the three groups.
来自不同文化的同一品牌的消费者在评估社交网站广告时是否有相同的看法?为了回答这个问题,本研究的数据是从社交网站上的品牌社区消费者(bcc)中收集的。来自三种不同文化背景(埃及人、荷兰人和英国人)的278名受访者回答了调查问卷。我们测试了收集消费者对社交媒体评价的五个主要变量(信息价值、娱乐价值、可信度价值、交互性价值和刺激价值)。根据实证研究结果,三组感知到六个变量中有五个具有显著差异的F比率。因此,他们对sns娱乐价值的感知在三组之间没有显著差异。基于跨文化理论,本研究的结果既有一致之处,也有矛盾之处,尤其是权力距离和不确定性回避的影响。此外,研究人员使用单向方差分析(ANOVA)和事后检验来比较三组之间的评估。
{"title":"The effect of culture on the consumers' assessment of advertisements on social networking sites; Cross-cultural analysis","authors":"Hossam Deraz, G. Awuah, Desalegn Abraha","doi":"10.1109/ICDIPC.2015.7323018","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323018","url":null,"abstract":"Do consumers of the same brand from different culture have the same perceptions while assessing the advertisements on Social Networking Sites' (SNSAs)? To answer this question, the data for this study were collected from brand communities' consumers (BCCs) on SNSs. 278 respondents from three different cultural backgrounds (Egyptians, Dutch and British) answered the questionnaires. Five main variables to collect the consumers' assessment of SNSAs were tested (information value, entertainment value, credibility value, interactivity value, and irritation value). Based on the empirical findings, the three groups perceived five of the six variables with significant difference F ratios. Consequently, their perception of the entertainment value of SNSAs has no significant differences between the three groups. Based on the cross-cultural theory, the findings of this study have some agreements and some contradictions, especially the influences of power distance and uncertainly avoidance. Moreover, the researchers used the Oneway analysis of variance (ANOVA) with Post Hoc tests to compare between the assessments of the three groups.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A review of enterprise content management (ECM): Growth and maturation of ECM from the year 2001 to 2011 企业内容管理(ECM)研究综述:2001 - 2011年ECM的成长与成熟
Lumka Thami P. Salamntu, Lisa F. Seymour
Managing information and content in organisations can be a challenging task hence the implementation of the Enterprise Content Management (ECM) systems. ECM can be classified as integrated approach to information management. The ECM concept has received much attention from the practitioners and vendors perspective but ECM research is still an emerging field in Information Systems (IS) research. ECM research is approximately more than one decade but it only received little consideration from scholars and a lot of attention from industries. This paper will provide an in-depth review of the ECM literature mainly its implementation and the benefits associated with it. When looking at the four ECM dimensions, research indicates that the majority of the literature focuses on content mainly on the information and system views. However, ECM research still lacks consistency and well accepted definitions as it is a concept that is still evolving. Most of the literature consists of case studies and most frequent contribution in field studies with a promising trend towards contributing theory. This is a comprehensive analysis of the ECM literature across a number of sources and offers an important insight about the directions of the ECM research.
管理组织中的信息和内容可能是一项具有挑战性的任务,因此实施企业内容管理(ECM)系统。ECM可以归类为信息管理的综合方法。ECM的概念受到了实践者和供应商的广泛关注,但ECM研究在信息系统(is)研究中仍是一个新兴领域。ECM的研究大约有十多年的历史,但很少受到学者的重视,而工业界的关注却很多。本文将对ECM文献进行深入的回顾,主要是它的实施和与之相关的好处。在考察四个ECM维度时,研究表明,大多数文献关注的内容主要集中在信息和系统视图上。然而,ECM研究仍然缺乏一致性和被广泛接受的定义,因为它是一个仍在发展的概念。文献以案例研究为主,是实地研究中最常见的贡献,有向贡献理论发展的趋势。这是对多个来源的ECM文献的全面分析,并提供了关于ECM研究方向的重要见解。
{"title":"A review of enterprise content management (ECM): Growth and maturation of ECM from the year 2001 to 2011","authors":"Lumka Thami P. Salamntu, Lisa F. Seymour","doi":"10.1109/ICDIPC.2015.7323002","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323002","url":null,"abstract":"Managing information and content in organisations can be a challenging task hence the implementation of the Enterprise Content Management (ECM) systems. ECM can be classified as integrated approach to information management. The ECM concept has received much attention from the practitioners and vendors perspective but ECM research is still an emerging field in Information Systems (IS) research. ECM research is approximately more than one decade but it only received little consideration from scholars and a lot of attention from industries. This paper will provide an in-depth review of the ECM literature mainly its implementation and the benefits associated with it. When looking at the four ECM dimensions, research indicates that the majority of the literature focuses on content mainly on the information and system views. However, ECM research still lacks consistency and well accepted definitions as it is a concept that is still evolving. Most of the literature consists of case studies and most frequent contribution in field studies with a promising trend towards contributing theory. This is a comprehensive analysis of the ECM literature across a number of sources and offers an important insight about the directions of the ECM research.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Job attitude and adoption of Advanced Printing Technology in Modern & Outmoded printing presses in Bangladesh 孟加拉国现代和老式印刷机的工作态度和先进印刷技术的采用
Md. Akram Hossain, M. Hasan, Md. Rakibul Hasan
The purposes of this study are to analyze - (1) the dissimilarities in job attitude of modern technology enabled (web-fed printing press) and outmoded (sheet-fed printing press) printing press workers; and (2) the factors influencing outmoded printing press workers intention to adopt Advanced Printing Technology (APT) in Bangladesh. Nine variables are selected based on literature review to measure the job attitude. On the other hand, five constructs/latent variables (measured by 17 observed variables) derived from UTAUT model are used to measure the “Behavioral Intention” of the workers. 496 workers are surveyed in this study. Discriminant analysis is used to analyze the dissimilarities and PLS-SEM (Partial Least Square-Structural Equation Modelling) is applied to assess the “Behavioral Intention”. Two groups of workers are significantly different in terms of the six dimensions (mental stress, physical stress, readiness of the printing machines, work flexibility, workplace safety, and working environment) of job attitude. On the other hand, Personal Innovativeness (PI), Performance Expectancy (PE), Effort Expectancy (EE), and Social Influence (SI) have significantly affected the Behavioral Intention (BI) of the workers to adopt APT. But Facilitating Condition (FC) does not affect the BI significantly. Arranging adequate institutional training/educational program on APT arranged for the workers and enormous investments made by both public and private sector can make the facilitating condition of printing industry in Bangladesh more favorable and adaptable.
本研究的目的在于分析:(1)现代科技驱动型(卷筒纸印刷机)与过时型(单张纸印刷机)印刷工人工作态度的差异;(2)影响孟加拉国老式印刷机工人采用先进印刷技术(APT)意愿的因素。在文献综述的基础上,选择了9个变量来衡量工作态度。另一方面,采用UTAUT模型衍生的5个构式/潜变量(由17个观察变量测量)来测量工人的“行为意向”。本研究调查了496名员工。采用判别分析分析差异,采用PLS-SEM(偏最小二乘结构方程模型)评估“行为意向”。两组工人在工作态度的六个维度(精神压力、身体压力、印刷机准备情况、工作灵活性、工作场所安全性和工作环境)上存在显著差异。另一方面,个人创新(PI)、绩效期望(PE)、努力期望(EE)和社会影响(SI)显著影响了员工采用APT的行为意向(BI),而促进条件(FC)对行为意向的影响不显著。为工人安排充分的APT制度培训/教育计划,以及公共和私营部门的大量投资,可以使孟加拉国印刷业的便利条件更加有利和适应性强。
{"title":"Job attitude and adoption of Advanced Printing Technology in Modern & Outmoded printing presses in Bangladesh","authors":"Md. Akram Hossain, M. Hasan, Md. Rakibul Hasan","doi":"10.1109/ICDIPC.2015.7323024","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323024","url":null,"abstract":"The purposes of this study are to analyze - (1) the dissimilarities in job attitude of modern technology enabled (web-fed printing press) and outmoded (sheet-fed printing press) printing press workers; and (2) the factors influencing outmoded printing press workers intention to adopt Advanced Printing Technology (APT) in Bangladesh. Nine variables are selected based on literature review to measure the job attitude. On the other hand, five constructs/latent variables (measured by 17 observed variables) derived from UTAUT model are used to measure the “Behavioral Intention” of the workers. 496 workers are surveyed in this study. Discriminant analysis is used to analyze the dissimilarities and PLS-SEM (Partial Least Square-Structural Equation Modelling) is applied to assess the “Behavioral Intention”. Two groups of workers are significantly different in terms of the six dimensions (mental stress, physical stress, readiness of the printing machines, work flexibility, workplace safety, and working environment) of job attitude. On the other hand, Personal Innovativeness (PI), Performance Expectancy (PE), Effort Expectancy (EE), and Social Influence (SI) have significantly affected the Behavioral Intention (BI) of the workers to adopt APT. But Facilitating Condition (FC) does not affect the BI significantly. Arranging adequate institutional training/educational program on APT arranged for the workers and enormous investments made by both public and private sector can make the facilitating condition of printing industry in Bangladesh more favorable and adaptable.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133291077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optical axis adjustment of laser beam transmission system 激光束传输系统的光轴调节
T. Tsujimura, K. Izumi, Koichi Yoshida
This paper studies the laser beam alignment method for free space optical communication. Distributed control system is designed to administer laser beam direction for stable bilateral optical transmission system. Strategic process is proposed to keep optical line connected, as well as the initial adjustment procedure of the laser beam. Analytic and statistic estimation methods of the laser beam alignment are investigated based on the Gaussian beam optics. Computer simulation evaluates the accuracy of the proposed estimation methods, and experiments disclose that the methods help us to find the optical axis of laser beam and to adjust it to the receiver mounted on the remote FSO equipment.
研究了自由空间光通信中的激光束对准方法。针对稳定的双边光传输系统,设计了分布式控制系统来控制激光束方向。提出了保持光纤连接的策略过程,以及激光束的初始调整过程。研究了基于高斯光束光学的激光光束准直的分析和统计估计方法。计算机仿真验证了所提估计方法的准确性,实验表明,所提估计方法可以帮助我们找到激光束的光轴,并将其调整到安装在远程FSO设备上的接收器上。
{"title":"Optical axis adjustment of laser beam transmission system","authors":"T. Tsujimura, K. Izumi, Koichi Yoshida","doi":"10.1109/ICDIPC.2015.7322999","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7322999","url":null,"abstract":"This paper studies the laser beam alignment method for free space optical communication. Distributed control system is designed to administer laser beam direction for stable bilateral optical transmission system. Strategic process is proposed to keep optical line connected, as well as the initial adjustment procedure of the laser beam. Analytic and statistic estimation methods of the laser beam alignment are investigated based on the Gaussian beam optics. Computer simulation evaluates the accuracy of the proposed estimation methods, and experiments disclose that the methods help us to find the optical axis of laser beam and to adjust it to the receiver mounted on the remote FSO equipment.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128323121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Leveraging cloud services to spark innovation, privacy and security in Kuwait hospitals 利用云服务激发科威特医院的创新、隐私和安全
Esraa Omran, Tyrone Grandison, Salah Al Sharhan
Kuwait is aspiring to be amongst the top countries in the world in the provision of healthcare services to its people. To do this, issues surrounding information availability, data security, and data privacy must be addressed. Hospitals struggle with providing access to (possibly sensitive and critical) data at the right levels, at the right time, while ensuring seamless service. In this paper, we propose a cloud-based system for hospitals and healthcare institutions in Kuwait that takes steps towards solving these issues.
科威特渴望在向其人民提供保健服务方面跻身世界前列。为此,必须解决与信息可用性、数据安全性和数据隐私相关的问题。医院努力在适当的时间、适当的级别提供对(可能是敏感和关键的)数据的访问,同时确保无缝服务。在本文中,我们为科威特的医院和医疗机构提出了一个基于云的系统,该系统采取措施解决这些问题。
{"title":"Leveraging cloud services to spark innovation, privacy and security in Kuwait hospitals","authors":"Esraa Omran, Tyrone Grandison, Salah Al Sharhan","doi":"10.1109/ICDIPC.2015.7323007","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323007","url":null,"abstract":"Kuwait is aspiring to be amongst the top countries in the world in the provision of healthcare services to its people. To do this, issues surrounding information availability, data security, and data privacy must be addressed. Hospitals struggle with providing access to (possibly sensitive and critical) data at the right levels, at the right time, while ensuring seamless service. In this paper, we propose a cloud-based system for hospitals and healthcare institutions in Kuwait that takes steps towards solving these issues.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124823939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multimedia data mining using deep learning 使用深度学习的多媒体数据挖掘
Peter Wlodarczak, J. Soar, Mustafa A. Ally
Due to the large amounts of Multimedia data on the Internet, Multimedia mining has become a very active area of research. Multimedia mining is a form of data mining. Data mining uses algorithms to segment data to identify useful patterns and to make predictions. Despite the successes in many areas, data mining remains a challenging task. In the past, multimedia mining was one of the fields where the results were often not satisfactory. Multimedia Data Mining extracts relevant data from multimedia files such as audio, video and still images to perform similarity searches, identify associations, entity resolution and for classification. As the mining techniques have matured, new techniques were developed. A lot of progress has been made in areas such as visual data mining and natural language processing using deep learning techniques. Deep learning is a branch of machine learning and has been used among other on Smartphones for face recognition and voice commands. Deep learners are a type of artificial neural networks with multiple data processing layers that learn representations by increasing the level of abstraction from one layer to the next. These methods have improved the state-of-the-art in multimedia mining, in speech recognition, visual object recognition, natural language processing and other areas such as genome mining and predicting the efficacy of drug molecules. This paper describes some of the deep learning techniques that have been used in recent research for multimedia data mining.
由于互联网上大量的多媒体数据,多媒体挖掘已经成为一个非常活跃的研究领域。多媒体挖掘是数据挖掘的一种形式。数据挖掘使用算法来分割数据,以识别有用的模式并进行预测。尽管在许多领域取得了成功,但数据挖掘仍然是一项具有挑战性的任务。过去,多媒体挖掘一直是研究成果不理想的领域之一。多媒体数据挖掘从音频、视频和静态图像等多媒体文件中提取相关数据,进行相似性搜索、关联识别、实体解析和分类。随着采矿技术的成熟,新技术不断发展。在使用深度学习技术的视觉数据挖掘和自然语言处理等领域取得了很大进展。深度学习是机器学习的一个分支,已经在智能手机上用于人脸识别和语音命令。深度学习者是一种具有多个数据处理层的人工神经网络,通过从一层增加到下一层的抽象级别来学习表征。这些方法提高了多媒体挖掘、语音识别、视觉对象识别、自然语言处理以及基因组挖掘和药物分子疗效预测等领域的技术水平。本文介绍了最近多媒体数据挖掘研究中使用的一些深度学习技术。
{"title":"Multimedia data mining using deep learning","authors":"Peter Wlodarczak, J. Soar, Mustafa A. Ally","doi":"10.1109/ICDIPC.2015.7323027","DOIUrl":"https://doi.org/10.1109/ICDIPC.2015.7323027","url":null,"abstract":"Due to the large amounts of Multimedia data on the Internet, Multimedia mining has become a very active area of research. Multimedia mining is a form of data mining. Data mining uses algorithms to segment data to identify useful patterns and to make predictions. Despite the successes in many areas, data mining remains a challenging task. In the past, multimedia mining was one of the fields where the results were often not satisfactory. Multimedia Data Mining extracts relevant data from multimedia files such as audio, video and still images to perform similarity searches, identify associations, entity resolution and for classification. As the mining techniques have matured, new techniques were developed. A lot of progress has been made in areas such as visual data mining and natural language processing using deep learning techniques. Deep learning is a branch of machine learning and has been used among other on Smartphones for face recognition and voice commands. Deep learners are a type of artificial neural networks with multiple data processing layers that learn representations by increasing the level of abstraction from one layer to the next. These methods have improved the state-of-the-art in multimedia mining, in speech recognition, visual object recognition, natural language processing and other areas such as genome mining and predicting the efficacy of drug molecules. This paper describes some of the deep learning techniques that have been used in recent research for multimedia data mining.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1