首页 > 最新文献

2016 International Conference on Information and Communication Technology (ICICTM)最新文献

英文 中文
A conceptual model of virtual banking strategies in achieving customers' loyalty of Malaysian perceptive 马来西亚感知实现客户忠诚度的虚拟银行策略概念模型
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890796
Jacqueline Tham, A. Khin
There has been many studies carried out on virtual banking adoption, but studies carried out in Malaysia to enhance the virtual banking strategy adoption are limited. Therefore, the objective of this study is to conduct the conceptual model of virtual banking strategies and to find out the key determinants of virtual banking strategies in achieving customers' loyalty in Malaysian perceptive by using Technology Acceptance Model (TAM), Theory of Reasoned Action (TRA) and Diffusion of Innovation (DOI) theories to adopt virtual banking strategies to meet customers need with the advancement in payment system and technology. Results from pilot study shown that banking strategy which being used to test the independent variables in this study is significant in affecting customer loyalty among local banks in Malaysia and correlation test on Equation 1 and 2 suggest the instruments as a measure tool is well suited for this study. This research can be useful for future researchers in this virtual banking domain. However, result may differ with a larger sample size conducted for this study.
已经有很多关于虚拟银行采用的研究,但在马来西亚进行的关于提高虚拟银行策略采用的研究有限。因此,本研究的目的是通过技术接受模型(TAM)、理性行为理论(TRA)和创新扩散理论(DOI),进行虚拟银行策略的概念模型,找出虚拟银行策略在马来西亚感知中实现客户忠诚的关键决定因素,随着支付系统和技术的进步,采用虚拟银行策略来满足客户的需求。试点研究的结果表明,在本研究中用于测试自变量的银行策略在影响马来西亚当地银行的客户忠诚度方面具有重要意义,等式1和2的相关性测试表明,作为测量工具的工具非常适合本研究。本研究对未来虚拟银行领域的研究有一定的参考价值。然而,由于本研究的样本量较大,结果可能会有所不同。
{"title":"A conceptual model of virtual banking strategies in achieving customers' loyalty of Malaysian perceptive","authors":"Jacqueline Tham, A. Khin","doi":"10.1109/ICICTM.2016.7890796","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890796","url":null,"abstract":"There has been many studies carried out on virtual banking adoption, but studies carried out in Malaysia to enhance the virtual banking strategy adoption are limited. Therefore, the objective of this study is to conduct the conceptual model of virtual banking strategies and to find out the key determinants of virtual banking strategies in achieving customers' loyalty in Malaysian perceptive by using Technology Acceptance Model (TAM), Theory of Reasoned Action (TRA) and Diffusion of Innovation (DOI) theories to adopt virtual banking strategies to meet customers need with the advancement in payment system and technology. Results from pilot study shown that banking strategy which being used to test the independent variables in this study is significant in affecting customer loyalty among local banks in Malaysia and correlation test on Equation 1 and 2 suggest the instruments as a measure tool is well suited for this study. This research can be useful for future researchers in this virtual banking domain. However, result may differ with a larger sample size conducted for this study.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discovering “interesting” keyword patterns in Hadith chapter documents 在圣训章节文档中发现“有趣的”关键字模式
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890785
Zuraini Zainol, P. Nohuddin, Mohd T. Hamid Jaymes, S. Marzukhi
True Muslims around the world believe in Al Quran and Hadith. Al Quran is the principal religious text of Islam, a revelation from Allah. Hadith is also one of the fundamental sources of Islamic references and guidance for the Muslims after the Holy Book, Al-Quran. Hadith is referred to a report, statement, act, story, narration or discourse. Hadith, originally in Arabic, covers a wide range of issues among Muslims such as spiritual, economic, political and social, administration of inheritance of wealth, etc. Since Muslims come from many races and use different languages, Muslim scholars have translated the chapters into various languages so that Muslims around the world can understand the meaning of it. This paper investigates the frequent patterns that can be found in the chapters of Hadith. By using the technique of Association Rule Mining (ARM), frequent patterns and interesting relationships that can benefits Muslim scholars in making full use of Hadith in assisting them in their daily Islamic life and practice.
全世界真正的穆斯林都相信《古兰经》和圣训。《古兰经》是伊斯兰教的主要宗教文本,是真主的启示。圣训也是继《古兰经》之后穆斯林参考和指导的基本来源之一。圣训指的是报告、陈述、行为、故事、叙述或话语。《圣训》原为阿拉伯语,内容广泛,涉及穆斯林的精神、经济、政治、社会、财富继承管理等问题。由于穆斯林来自许多种族,使用不同的语言,穆斯林学者将这些章节翻译成各种语言,以便世界各地的穆斯林都能理解其中的含义。本文研究了圣训章节中常见的模式。通过使用关联规则挖掘(ARM)技术,频繁的模式和有趣的关系可以使穆斯林学者充分利用圣训来协助他们的日常伊斯兰生活和实践。
{"title":"Discovering “interesting” keyword patterns in Hadith chapter documents","authors":"Zuraini Zainol, P. Nohuddin, Mohd T. Hamid Jaymes, S. Marzukhi","doi":"10.1109/ICICTM.2016.7890785","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890785","url":null,"abstract":"True Muslims around the world believe in Al Quran and Hadith. Al Quran is the principal religious text of Islam, a revelation from Allah. Hadith is also one of the fundamental sources of Islamic references and guidance for the Muslims after the Holy Book, Al-Quran. Hadith is referred to a report, statement, act, story, narration or discourse. Hadith, originally in Arabic, covers a wide range of issues among Muslims such as spiritual, economic, political and social, administration of inheritance of wealth, etc. Since Muslims come from many races and use different languages, Muslim scholars have translated the chapters into various languages so that Muslims around the world can understand the meaning of it. This paper investigates the frequent patterns that can be found in the chapters of Hadith. By using the technique of Association Rule Mining (ARM), frequent patterns and interesting relationships that can benefits Muslim scholars in making full use of Hadith in assisting them in their daily Islamic life and practice.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115577453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Proposed conceptual framework of Dengue Active Surveillance System (DASS) in Malaysia 马来西亚登革热主动监测系统(DASS)的概念框架建议
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890783
M. Othman, M. Danuri
This paper introduces Dengue Active Surveillance System (DASS) framework for an early warning system of the outbreak. Dengue and dengue hemorrhagic fever are emerging as major public health problems in most Asian countries such as Malaysia. Effective prevention and control programs will depend on improved surveillance. A new approach to active surveillance outlined with emphasis on the inter-epidemic period. The objective is to develop an early warning surveillance system (framework) that can predict epidemic dengue to improve current passive surveillance system available in Malaysia. Basically, the framework introduced data harvesting process from multiple sources as input, data pre-processing using data aggregator and filtering engine, storing large data in repository, analytic engine for analysis and processing the large data, and presentation of the information to the users. The data harvested from two major sources such as weather or flood information, and social media such as build development and dengue symptom using system API, SOAP and others. The data aggregator will aggregate the data from three different types of data such as structured, semi-structured and unstructured data to be stored into the semi-structured database such as MongoDB and NoSQL. The data parse to the filtering engine for filtering and cleaning the data sources using suitable keywords prior to store it in the large data repository. After that, the large data will be processed and analyzed using algorithm or mathematical calculation to determine the expected dengue cases. Then, the processed information will be presented to the users in a form of web or mobile application and other method, for example, short message service (SMS). Finally, the system accuracy will be evaluated based on the comparison study with the traditional passive system.
本文介绍了登革热主动监测系统(DASS)框架作为登革热疫情早期预警系统。在马来西亚等大多数亚洲国家,登革热和登革出血热正在成为主要的公共卫生问题。有效的预防和控制方案将取决于改进的监测。概述了一种新的主动监测方法,重点放在流行病间期。目标是开发一个能够预测登革热流行的早期预警监测系统(框架),以改进马来西亚现有的被动监测系统。该框架主要介绍了从多个数据源获取数据作为输入,使用数据聚合器和过滤引擎对数据进行预处理,将大数据存储在存储库中,使用分析引擎对大数据进行分析和处理,并将信息呈现给用户。从两个主要来源(如天气或洪水信息)和社会媒体(如使用系统API、SOAP和其他工具的构建开发和登革热症状)收集的数据。数据聚合器将结构化、半结构化和非结构化三种不同类型的数据进行聚合,存储到MongoDB和NoSQL等半结构化数据库中。数据解析到过滤引擎,使用合适的关键字过滤和清理数据源,然后将其存储在大型数据存储库中。之后,将使用算法或数学计算对大数据进行处理和分析,以确定预计的登革热病例。然后,处理后的信息将以web或移动应用程序的形式以及其他方式呈现给用户,例如短信服务(SMS)。最后,通过与传统被动系统的对比研究,对系统的精度进行评估。
{"title":"Proposed conceptual framework of Dengue Active Surveillance System (DASS) in Malaysia","authors":"M. Othman, M. Danuri","doi":"10.1109/ICICTM.2016.7890783","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890783","url":null,"abstract":"This paper introduces Dengue Active Surveillance System (DASS) framework for an early warning system of the outbreak. Dengue and dengue hemorrhagic fever are emerging as major public health problems in most Asian countries such as Malaysia. Effective prevention and control programs will depend on improved surveillance. A new approach to active surveillance outlined with emphasis on the inter-epidemic period. The objective is to develop an early warning surveillance system (framework) that can predict epidemic dengue to improve current passive surveillance system available in Malaysia. Basically, the framework introduced data harvesting process from multiple sources as input, data pre-processing using data aggregator and filtering engine, storing large data in repository, analytic engine for analysis and processing the large data, and presentation of the information to the users. The data harvested from two major sources such as weather or flood information, and social media such as build development and dengue symptom using system API, SOAP and others. The data aggregator will aggregate the data from three different types of data such as structured, semi-structured and unstructured data to be stored into the semi-structured database such as MongoDB and NoSQL. The data parse to the filtering engine for filtering and cleaning the data sources using suitable keywords prior to store it in the large data repository. After that, the large data will be processed and analyzed using algorithm or mathematical calculation to determine the expected dengue cases. Then, the processed information will be presented to the users in a form of web or mobile application and other method, for example, short message service (SMS). Finally, the system accuracy will be evaluated based on the comparison study with the traditional passive system.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124571630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Queue analysis at toll plazas (inbound): A basic model for traffic systems towards a study of the effect on toll plazas with different arrival patterns 收费广场(入站)排队分析:研究不同到达模式对收费广场影响的交通系统基本模型
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890766
Khairani Abdul Majid, Zaharin Yusoff, A. Jemain
In studying traffic congestions at toll plazas, a basic model for traffic systems is introduced, which will hopefully contribute towards a longer term solution with the means for explaining and predicting congestions. It is targeted that this can then be followed by a more specific operations research approach, based on a simulation and queuing theory model, with a study on different arrival patterns, generating queue models, and constructing a Markov chain from the queuing systems, which would then provide a better insight towards a more sustainable solution.
在研究收费广场的交通拥堵时,引入了一个交通系统的基本模型,该模型有望为解释和预测交通拥堵提供长期解决方案。我们的目标是,接下来可以采用更具体的运筹学方法,基于模拟和排队理论模型,研究不同的到达模式,生成队列模型,并从排队系统构建马尔可夫链,这将为更可持续的解决方案提供更好的见解。
{"title":"Queue analysis at toll plazas (inbound): A basic model for traffic systems towards a study of the effect on toll plazas with different arrival patterns","authors":"Khairani Abdul Majid, Zaharin Yusoff, A. Jemain","doi":"10.1109/ICICTM.2016.7890766","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890766","url":null,"abstract":"In studying traffic congestions at toll plazas, a basic model for traffic systems is introduced, which will hopefully contribute towards a longer term solution with the means for explaining and predicting congestions. It is targeted that this can then be followed by a more specific operations research approach, based on a simulation and queuing theory model, with a study on different arrival patterns, generating queue models, and constructing a Markov chain from the queuing systems, which would then provide a better insight towards a more sustainable solution.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Vision-based egg grade classifier 基于视觉的鸡蛋分级器
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890772
Mohd Zin Zalhan, Sameon Sera Syarmila, Ismail Mohd Nazri, Ismail Mohd Taha
Digital image processing techniques (DIP) have been widely used in various types of application recently. A variety of these techniques are now being used in many types of application area such as object classification, intelligent system, robotics, biometrics system, medical visualization, military, law enforcement, image enhancement and restoration, industrial inspection, artistic effect and human computer interfaces. This paper proposes the implementation of digital image processing techniques to classify three different categories of commercial eggs. The proposed system consists of the study on different types and sizes of commercial eggs, real size measurement of these eggs using Coordinate Measure Machine (CMM) and camera, classification algorithm and the development of vision based egg classification system. Image processing techniques such as image filtering and image enhancements have been applied in the system. Results have shown that the proposed system has been able to successfully classify three categories of commercial eggs with accuracy of more than 96%.
近年来,数字图像处理技术(DIP)在各种应用中得到了广泛的应用。各种各样的这些技术现在被用于许多类型的应用领域,如物体分类、智能系统、机器人、生物识别系统、医疗可视化、军事、执法、图像增强和恢复、工业检测、艺术效果和人机界面。本文提出了利用数字图像处理技术对三种不同种类的商品鸡蛋进行分类。该系统包括对商品鸡蛋的不同类型和大小的研究,利用坐标测量机(CMM)和相机对商品鸡蛋进行实际尺寸测量,分类算法和基于视觉的鸡蛋分类系统的开发。该系统采用了图像滤波和图像增强等图像处理技术。结果表明,该系统能够成功地对三类商品卵子进行分类,准确率超过96%。
{"title":"Vision-based egg grade classifier","authors":"Mohd Zin Zalhan, Sameon Sera Syarmila, Ismail Mohd Nazri, Ismail Mohd Taha","doi":"10.1109/ICICTM.2016.7890772","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890772","url":null,"abstract":"Digital image processing techniques (DIP) have been widely used in various types of application recently. A variety of these techniques are now being used in many types of application area such as object classification, intelligent system, robotics, biometrics system, medical visualization, military, law enforcement, image enhancement and restoration, industrial inspection, artistic effect and human computer interfaces. This paper proposes the implementation of digital image processing techniques to classify three different categories of commercial eggs. The proposed system consists of the study on different types and sizes of commercial eggs, real size measurement of these eggs using Coordinate Measure Machine (CMM) and camera, classification algorithm and the development of vision based egg classification system. Image processing techniques such as image filtering and image enhancements have been applied in the system. Results have shown that the proposed system has been able to successfully classify three categories of commercial eggs with accuracy of more than 96%.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Interactive evaluation system for Final Year Project (FYP) 最后一年项目(FYP)互动评估系统
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890801
R. Chik, Muhammad Rafi’i
The goals of this system is to develop an automated and interactive evaluation system to assist Final Year Project (FYP) assessors during the events of project evaluations. The system will enable the assessors to key in the student's marks into the application and the results will be produced automatically by the system in real time. This could support a paper-less process and environment. The system was developed using PHP and testing was done to gather user's response towards the proposed system. Results from the user testing show a favorable results toward the proposed system which means the system is able to do what is supposed to do. The proposed system has met the user requirements although more improvements could be introduced which will be taken into consideration for future work in this research.
该系统的目标是开发一个自动化和交互式评估系统,以协助最后一年项目(FYP)评估人员在项目评估过程中进行评估。该系统将允许评估人员将学生的分数输入到应用程序中,结果将由系统实时自动生成。这可以支持无纸化流程和环境。该系统是使用PHP开发的,并进行了测试,以收集用户对拟议系统的响应。用户测试的结果显示了对提议系统的有利结果,这意味着系统能够做应该做的事情。提出的系统已经满足了用户的需求,但还可以引入更多的改进,这将在本研究的未来工作中加以考虑。
{"title":"Interactive evaluation system for Final Year Project (FYP)","authors":"R. Chik, Muhammad Rafi’i","doi":"10.1109/ICICTM.2016.7890801","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890801","url":null,"abstract":"The goals of this system is to develop an automated and interactive evaluation system to assist Final Year Project (FYP) assessors during the events of project evaluations. The system will enable the assessors to key in the student's marks into the application and the results will be produced automatically by the system in real time. This could support a paper-less process and environment. The system was developed using PHP and testing was done to gather user's response towards the proposed system. Results from the user testing show a favorable results toward the proposed system which means the system is able to do what is supposed to do. The proposed system has met the user requirements although more improvements could be introduced which will be taken into consideration for future work in this research.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models 运用Nonaka和Endsley模型建立基于知识的态势感知框架
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890775
W. Yusof, O. Zakaria, Zuraini Zainol
Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can assist our research in terms of collecting and transforming appropriate tacit knowledge into enhancing the existing explicit knowledge. The existing explicit knowledge can be found from training module (doctrines) or any relevant documents. However, tacit knowledge is not easily extracted due to being stored implicitly into the mind of the experienced staff. Therefore, this paper explains the structured way on how to collect appropriate tacit knowledge from the experienced staff.
到目前为止,还没有一个基于知识的框架来结合Nonaka和Endsley两种模型来研究情境感知。这些模型可以帮助我们的研究收集和转化适当的隐性知识,以增强现有的显性知识。现有的显性知识可以从培训模块(学说)或任何相关文件中找到。然而,隐性知识被隐性地储存在有经验的员工的头脑中,不容易被提取出来。因此,本文阐述了如何从有经验的员工那里收集合适的隐性知识的结构化方法。
{"title":"Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models","authors":"W. Yusof, O. Zakaria, Zuraini Zainol","doi":"10.1109/ICICTM.2016.7890775","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890775","url":null,"abstract":"Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can assist our research in terms of collecting and transforming appropriate tacit knowledge into enhancing the existing explicit knowledge. The existing explicit knowledge can be found from training module (doctrines) or any relevant documents. However, tacit knowledge is not easily extracted due to being stored implicitly into the mind of the experienced staff. Therefore, this paper explains the structured way on how to collect appropriate tacit knowledge from the experienced staff.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"12 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120894263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A review on License Plate Recognition system algorithms 车牌识别系统算法综述
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890782
Muayad Ali Hamood Bakhtan, Munaisyah Abdullah, Aedah Abd Rahman
License plate recognition(LPR)system contributed to facilitate the human work and make it easier. It is an image processing technology, which uses number plate to identify the vehicles. This paper aims to investigate in the existing LPR research by categorizing existing methods by analyzing the pros/cons of these features, and comparing them in terms of the algorithms that involve and recognition performance. We focus on the recent studies and their limitations, since each country has a different environment and format of licence plate.
车牌识别(LPR)系统为人类的工作提供了便利和方便。它是一种图像处理技术,利用车牌识别车辆。本文旨在通过对现有的LPR研究方法进行分类,分析这些特征的优缺点,并在涉及的算法和识别性能方面进行比较,对现有的LPR研究方法进行研究。由于每个国家都有不同的环境和车牌格式,我们将重点关注最近的研究及其局限性。
{"title":"A review on License Plate Recognition system algorithms","authors":"Muayad Ali Hamood Bakhtan, Munaisyah Abdullah, Aedah Abd Rahman","doi":"10.1109/ICICTM.2016.7890782","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890782","url":null,"abstract":"License plate recognition(LPR)system contributed to facilitate the human work and make it easier. It is an image processing technology, which uses number plate to identify the vehicles. This paper aims to investigate in the existing LPR research by categorizing existing methods by analyzing the pros/cons of these features, and comparing them in terms of the algorithms that involve and recognition performance. We focus on the recent studies and their limitations, since each country has a different environment and format of licence plate.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Anomaly-based NIDS: A review of machine learning methods on malware detection 基于异常的NIDS:恶意软件检测的机器学习方法综述
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890812
Raffie Z.A Mohd, M. Zuhairi, Akimi Z.A Shadil, H. Dao
The increasing amount of network traffic threat may originates from various sources, that can led to a higher probability for an organization to be exposed to intruder. Security mechanism such as Intrusion Detection System (IDS) is significant to alleviate such issue. Despite the ability of IDS to detect, some of the anomaly traffic may not be effectively detected. As such, it is vital the IDS algorithm to be reliable and can provide high detection accuracy, reducing as much as possible threats from the network. Nonetheless, every security mechanism has its weaknesses that can be exploited by intruders. Many research works exists, that attempts to address the issue using various methods. This paper discusses a hybrid approach to network IDS, which can minimize the malicious traffic in the network by using machine learning. The paper also provides a review of the available methods to further improve Anomaly-based Network Intrusion Detection System.
越来越多的网络流量威胁可能来自各种来源,这可能导致组织暴露于入侵者的可能性更高。入侵检测系统(IDS)等安全机制对缓解这一问题具有重要意义。尽管IDS具有检测能力,但可能无法有效检测到一些异常流量。因此,至关重要的是,IDS算法是可靠的,可以提供高检测精度,尽可能减少来自网络的威胁。尽管如此,每一种安全机制都有其可被入侵者利用的弱点。存在许多研究工作,试图用各种方法解决这个问题。本文讨论了一种混合的网络入侵检测方法,该方法可以利用机器学习来减少网络中的恶意流量。本文还对进一步改进基于异常的网络入侵检测系统的现有方法进行了综述。
{"title":"Anomaly-based NIDS: A review of machine learning methods on malware detection","authors":"Raffie Z.A Mohd, M. Zuhairi, Akimi Z.A Shadil, H. Dao","doi":"10.1109/ICICTM.2016.7890812","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890812","url":null,"abstract":"The increasing amount of network traffic threat may originates from various sources, that can led to a higher probability for an organization to be exposed to intruder. Security mechanism such as Intrusion Detection System (IDS) is significant to alleviate such issue. Despite the ability of IDS to detect, some of the anomaly traffic may not be effectively detected. As such, it is vital the IDS algorithm to be reliable and can provide high detection accuracy, reducing as much as possible threats from the network. Nonetheless, every security mechanism has its weaknesses that can be exploited by intruders. Many research works exists, that attempts to address the issue using various methods. This paper discusses a hybrid approach to network IDS, which can minimize the malicious traffic in the network by using machine learning. The paper also provides a review of the available methods to further improve Anomaly-based Network Intrusion Detection System.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Determining an appropriate search grid pattern and positioning it for search and rescue operations (SAR) in forest areas 确定合适的搜索网格模式,并为森林地区的搜救行动(SAR)定位
Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890767
N. Zailan, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff, Syahaneim Marzuki
Search and Rescue (SAR) is an operation conducted to find and return to safety the survivors of an emergency incident, where the search may have to be conducted in difficult areas such as in mountains, deserts, forests or at sea. A SAR operation typically requires a search grid for the identified search area, and a search pattern to conduct a search that covers the grid, together forming a search grid pattern. There is also a need to position the search grid pattern at the actual search area in order to place the search team members for them to conduct the search pattern accordingly. This paper presents a study on determining an appropriate search grid pattern for forest areas and a technique to position it at the search area.
搜索和救援(SAR)是为寻找紧急事件幸存者并使其返回安全地点而进行的一项行动,其中搜索可能必须在山区、沙漠、森林或海上等困难地区进行。SAR操作通常需要确定搜索区域的搜索网格,以及进行覆盖网格的搜索的搜索模式,共同形成搜索网格模式。还需要将搜索网格模式定位在实际搜索区域,以便放置搜索小组成员,以便他们相应地进行搜索模式。本文研究了确定适合森林区域的搜索网格模式及其在搜索区域的定位技术。
{"title":"Determining an appropriate search grid pattern and positioning it for search and rescue operations (SAR) in forest areas","authors":"N. Zailan, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff, Syahaneim Marzuki","doi":"10.1109/ICICTM.2016.7890767","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890767","url":null,"abstract":"Search and Rescue (SAR) is an operation conducted to find and return to safety the survivors of an emergency incident, where the search may have to be conducted in difficult areas such as in mountains, deserts, forests or at sea. A SAR operation typically requires a search grid for the identified search area, and a search pattern to conduct a search that covers the grid, together forming a search grid pattern. There is also a need to position the search grid pattern at the actual search area in order to place the search team members for them to conduct the search pattern accordingly. This paper presents a study on determining an appropriate search grid pattern for forest areas and a technique to position it at the search area.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121371584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 International Conference on Information and Communication Technology (ICICTM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1