Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703610
Motekoa Mokhitli, M. Kyobe
The performance of more frequent audits in real time or close to real time through continuous auditing improves the efficiency and effectiveness of internal audit functions and enhances the reliability of organizational information for decision making. However, the use of information technology by internal auditors for continuous auditing is still lagging. Previous studies provide a narrow focus that emphasizes internal auditor's attitude towards use of information technology for continuous auditing. In addition, internal auditor's competencies, the auditing environment and technological auditing tools are key factors that impede them from leveraging information technology for continuous auditing. The study draws from different theories to create a comprehensive conceptual model that includes the key factors. The model can enable a holistic examination of the factors that impede internal auditors from using information technology for continuous auditing,
{"title":"Examining Factors that Impede Internal Auditors from Leveraging Information Technology for Continuous Auditing","authors":"Motekoa Mokhitli, M. Kyobe","doi":"10.1109/ICTAS.2019.8703610","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703610","url":null,"abstract":"The performance of more frequent audits in real time or close to real time through continuous auditing improves the efficiency and effectiveness of internal audit functions and enhances the reliability of organizational information for decision making. However, the use of information technology by internal auditors for continuous auditing is still lagging. Previous studies provide a narrow focus that emphasizes internal auditor's attitude towards use of information technology for continuous auditing. In addition, internal auditor's competencies, the auditing environment and technological auditing tools are key factors that impede them from leveraging information technology for continuous auditing. The study draws from different theories to create a comprehensive conceptual model that includes the key factors. The model can enable a holistic examination of the factors that impede internal auditors from using information technology for continuous auditing,","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128792849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703521
Kennedy Chengeta, Serestina Viriri
In facial expression identification, algorithms with higher classification rates and lower computational costs are preferred. To achieve that, feature extraction and classification should be accurate and efficient. Feature extraction optimization involves selecting the optimal feature descriptor. Various algorithms in computer vision involve holistic, local and deep learning algorithms. Holistic algorithms analyze the whole facial image and includes algorithms like Linear Discriminant Analysis or fisherfaces, eigenfaces (PCA), Histograms of Oriented Gradients and Gray Level Co-occurrence Matrix (GLCM). Local feature descriptors involve using local facial components separately then aggregating them into a combined histogram. Local binary patterns (LBP), local directional patterns (LDP) and scale-invariant feature transform (SIFT) feature extraction algorithms have been successfully used in local feature extraction. Deep learning involves using convolutional neural networks for image analysis. The most popular models are AlexNet, VGG-Face and GoogleNet. The study evaluates computational accuracy and efficiency of the three forms of facial expression recognition namely holistic, local and deep learning algorithms. The JAFFE and CK+ datasets are used for analysis. Gabor Filters are used for preprocessing filtering of the images whilst Viola Jones OpenCV toolset is used for image visualization. The study concludes that local algorithms compete very well with deep learning algorithms in terms of accuracy but use less processing power than convolutional networks. For real time facial expression analysis with minimal processing power and need for quick response times, LBP algorithms are recommended.
在面部表情识别中,分类率高、计算成本低的算法是首选算法。为了实现这一目标,特征提取和分类必须准确高效。特征提取优化包括选择最优的特征描述符。计算机视觉中的各种算法包括整体、局部和深度学习算法。整体算法分析整个面部图像,包括线性判别分析或鱼面,特征面(PCA),定向梯度直方图和灰度共生矩阵(GLCM)等算法。局部特征描述符包括单独使用局部面部成分,然后将它们聚合成一个组合的直方图。局部二值模式(LBP)、局部方向模式(LDP)和尺度不变特征变换(SIFT)特征提取算法已成功应用于局部特征提取。深度学习涉及使用卷积神经网络进行图像分析。最受欢迎的型号是AlexNet、VGG-Face和GoogleNet。该研究评估了三种形式的面部表情识别算法的计算精度和效率,即整体、局部和深度学习算法。使用JAFFE和CK+数据集进行分析。Gabor过滤器用于图像的预处理过滤,而Viola Jones OpenCV工具集用于图像可视化。该研究得出结论,局部算法在准确性方面与深度学习算法竞争得很好,但比卷积网络使用更少的处理能力。对于具有最小处理能力和快速响应时间的实时面部表情分析,推荐使用LBP算法。
{"title":"A Review of Local, Holistic and Deep Learning Approaches in Facial Expressions Recognition","authors":"Kennedy Chengeta, Serestina Viriri","doi":"10.1109/ICTAS.2019.8703521","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703521","url":null,"abstract":"In facial expression identification, algorithms with higher classification rates and lower computational costs are preferred. To achieve that, feature extraction and classification should be accurate and efficient. Feature extraction optimization involves selecting the optimal feature descriptor. Various algorithms in computer vision involve holistic, local and deep learning algorithms. Holistic algorithms analyze the whole facial image and includes algorithms like Linear Discriminant Analysis or fisherfaces, eigenfaces (PCA), Histograms of Oriented Gradients and Gray Level Co-occurrence Matrix (GLCM). Local feature descriptors involve using local facial components separately then aggregating them into a combined histogram. Local binary patterns (LBP), local directional patterns (LDP) and scale-invariant feature transform (SIFT) feature extraction algorithms have been successfully used in local feature extraction. Deep learning involves using convolutional neural networks for image analysis. The most popular models are AlexNet, VGG-Face and GoogleNet. The study evaluates computational accuracy and efficiency of the three forms of facial expression recognition namely holistic, local and deep learning algorithms. The JAFFE and CK+ datasets are used for analysis. Gabor Filters are used for preprocessing filtering of the images whilst Viola Jones OpenCV toolset is used for image visualization. The study concludes that local algorithms compete very well with deep learning algorithms in terms of accuracy but use less processing power than convolutional networks. For real time facial expression analysis with minimal processing power and need for quick response times, LBP algorithms are recommended.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"85 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703620
George Obaido, Abejide Ade-Ibijola, Hima Vadapalli
In the software industry, Structured Query Language (SQL) remains a highly sought-after skill required by most employers. SQL is widely adopted as the preferred declarative language to manipulate data in relational databases. However, the process of comprehending written and new queries turns out to be difficult, especially for novices. To address this problem, a plethora of tools have been developed to assist a novice understand queries using different approaches via visualisation and narration. This paper describes a SQL Narrator designed using a Context-free Grammar that reads and generates narrations for queries using predefined templates. The SQL Narrator is able to narrate nested queries cascaded with balanced parentheses. The generated narrations can be used in assisting students to comprehend nested SQL queries in learning environments. A survey conducted on 161 participants showed that 98.1% agreed that they were able to understand nested queries using our SQL Narrator.
{"title":"Generating Narrations of Nested SQL Queries Using Context-free Grammars","authors":"George Obaido, Abejide Ade-Ibijola, Hima Vadapalli","doi":"10.1109/ICTAS.2019.8703620","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703620","url":null,"abstract":"In the software industry, Structured Query Language (SQL) remains a highly sought-after skill required by most employers. SQL is widely adopted as the preferred declarative language to manipulate data in relational databases. However, the process of comprehending written and new queries turns out to be difficult, especially for novices. To address this problem, a plethora of tools have been developed to assist a novice understand queries using different approaches via visualisation and narration. This paper describes a SQL Narrator designed using a Context-free Grammar that reads and generates narrations for queries using predefined templates. The SQL Narrator is able to narrate nested queries cascaded with balanced parentheses. The generated narrations can be used in assisting students to comprehend nested SQL queries in learning environments. A survey conducted on 161 participants showed that 98.1% agreed that they were able to understand nested queries using our SQL Narrator.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130947960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703619
Olufisayo S. Ekundayo, Serestina Viriri
Facial expression is one of the profound nonverbal channels through which human emotion state is communicated, its automation involves analysis and recognition of facial features. Facial Expression Recognition (FER) is categorized as behavioral biometrics, and also applicable in the field of computer vision and human computer interaction. Variations in the nature of the images to be processed; head pose, image background, light intensity and occlusion are some of the sources of the challenges with facial expression recognition system. Achieving a robust automatic facial expression recognition system invariant to the aforementioned challenges, is the goal of this research area. This paper presents an analysis of major feature extraction and classification methods, their performances in terms of accuracy and their respective limitations.
{"title":"Facial Expression Recognition: A Review of Methods, Performances and Limitations","authors":"Olufisayo S. Ekundayo, Serestina Viriri","doi":"10.1109/ICTAS.2019.8703619","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703619","url":null,"abstract":"Facial expression is one of the profound nonverbal channels through which human emotion state is communicated, its automation involves analysis and recognition of facial features. Facial Expression Recognition (FER) is categorized as behavioral biometrics, and also applicable in the field of computer vision and human computer interaction. Variations in the nature of the images to be processed; head pose, image background, light intensity and occlusion are some of the sources of the challenges with facial expression recognition system. Achieving a robust automatic facial expression recognition system invariant to the aforementioned challenges, is the goal of this research area. This paper presents an analysis of major feature extraction and classification methods, their performances in terms of accuracy and their respective limitations.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703634
Prashaan Pillay, Serestina Viriri
The emergence of facial recognition technology is an appealing solution to address the many present-day needs for verification of identity claims. The application of such technology has become publicly available and has proved its effectiveness as an added layer of security through native applications. Until now, there has been no previous attempt at bringing this solution to a web-based platform supporting real time classification. With frequent reports of websites being exploited and databases being leaked, there is an urgent need for an intelligent security mechanism to overlay the current traditional authentication methods, including usernames and passwords. This paper investigates the possibility of unobtrusive, continuous authentication for web applications based on facial data collected using WebAssembly driven detection algorithms. This novel detection technique has proved the viability to perform real-time image processing on the web with the possibility of achieving near native speeds. This is accompanied with a competitive server side facial recognition rate of 91.67% achieved on the Labeled Faces in the Wild dataset.
{"title":"Foresight: Real Time Facial Detection and Recognition Using WebAssembly and Localized Deep Neural Networks","authors":"Prashaan Pillay, Serestina Viriri","doi":"10.1109/ICTAS.2019.8703634","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703634","url":null,"abstract":"The emergence of facial recognition technology is an appealing solution to address the many present-day needs for verification of identity claims. The application of such technology has become publicly available and has proved its effectiveness as an added layer of security through native applications. Until now, there has been no previous attempt at bringing this solution to a web-based platform supporting real time classification. With frequent reports of websites being exploited and databases being leaked, there is an urgent need for an intelligent security mechanism to overlay the current traditional authentication methods, including usernames and passwords. This paper investigates the possibility of unobtrusive, continuous authentication for web applications based on facial data collected using WebAssembly driven detection algorithms. This novel detection technique has proved the viability to perform real-time image processing on the web with the possibility of achieving near native speeds. This is accompanied with a competitive server side facial recognition rate of 91.67% achieved on the Labeled Faces in the Wild dataset.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121729169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703605
S. Lehong, J. V. Biljon, I. Sanders
Students in the open-distance and electronic learning (ODeL) environment often work in isolation and face challenges in accessing knowledge resources, especially when conducting research. To support these students in succeeding with their studies, the learning management system (LMS) needs to be usable; this implies the attributes of effectiveness, efficiency and user satisfaction. The purpose of this study is to propose usability guidelines specifically focused on the requirements for a learning management system in the context of ODeL honours research projects. The study is novel in exploring the supervisors' view of the usability requirements of the LMS. Based on a pragmatic worldview, this study is guided by the design science research (DSR) methodology. The initial set of usability requirements was abstracted from the literature and used as the basis for the LMS evaluation. Usability testing of the LMS was followed by heuristic evaluation, post-test questionnaire and interviews. All evaluations were done with the supervisors as participants. The contribution of the study is the refined usability guidelines based on the triangulation of the findings from the different usability evaluations conducted on the same ODeL LMS.
{"title":"Open-distance electronic learning environments: Supervisors' views on usability","authors":"S. Lehong, J. V. Biljon, I. Sanders","doi":"10.1109/ICTAS.2019.8703605","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703605","url":null,"abstract":"Students in the open-distance and electronic learning (ODeL) environment often work in isolation and face challenges in accessing knowledge resources, especially when conducting research. To support these students in succeeding with their studies, the learning management system (LMS) needs to be usable; this implies the attributes of effectiveness, efficiency and user satisfaction. The purpose of this study is to propose usability guidelines specifically focused on the requirements for a learning management system in the context of ODeL honours research projects. The study is novel in exploring the supervisors' view of the usability requirements of the LMS. Based on a pragmatic worldview, this study is guided by the design science research (DSR) methodology. The initial set of usability requirements was abstracted from the literature and used as the basis for the LMS evaluation. Usability testing of the LMS was followed by heuristic evaluation, post-test questionnaire and interviews. All evaluations were done with the supervisors as participants. The contribution of the study is the refined usability guidelines based on the triangulation of the findings from the different usability evaluations conducted on the same ODeL LMS.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125367838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703635
M. Mujinga
The main objective of this paper is to present empirical findings on the quality of service offered by retail banks in South Africa. The SERVQUAL model that measure service quality based on customers' perceptions and expectations that are analysed using gap analysis. The gap analysis findings based on 184 retail banking customers shows that there is need for improvement across all five dimensions of service quality. Further inferential statistical analyses revealed that the mean gap differences among different demographic groups are statistically insignificant. These results show that to improve on service quality and reduce the negative gaps, financial institutions need to improve the overall quality of service without focusing on specific demographic groups of customers. Three of the five dimensions reliability, responsiveness, and empathy, have higher gaps compared to tangibles and assurance.
{"title":"Retail banking service quality measurement: SERVQUAL gap analysis","authors":"M. Mujinga","doi":"10.1109/ICTAS.2019.8703635","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703635","url":null,"abstract":"The main objective of this paper is to present empirical findings on the quality of service offered by retail banks in South Africa. The SERVQUAL model that measure service quality based on customers' perceptions and expectations that are analysed using gap analysis. The gap analysis findings based on 184 retail banking customers shows that there is need for improvement across all five dimensions of service quality. Further inferential statistical analyses revealed that the mean gap differences among different demographic groups are statistically insignificant. These results show that to improve on service quality and reduce the negative gaps, financial institutions need to improve the overall quality of service without focusing on specific demographic groups of customers. Three of the five dimensions reliability, responsiveness, and empathy, have higher gaps compared to tangibles and assurance.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125223443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703636
Paulus Swartz, A. D. Veiga, N. Martins
Owing to the growth of technological advancements and the enactment of comprehensive data privacy legislation, organisations must meet the requirements of privacy laws. Organisations must incorporate the protection of personal information in their strategic planning and govern it across the organisation. The purpose of this paper is to propose a conceptual privacy governance framework. This is done by comparing existing privacy governance frameworks and proposing a consolidated framework that incorporates a comprehensive set of privacy components that can assist management in governing privacy across an organisation. Such a framework can serve as a point of reference to assist organisations in obtaining the support of senior management, establishing clear processes and delegating responsibilities to individuals, utilising existing standards, and establishing monitoring and audit practices. The privacy governance framework can help to reinforce privacy protection, enhance the organisation's reputation, foster a culture of privacy and ensure compliance with privacy regulatory requirements.
{"title":"A conceptual privacy governance framework","authors":"Paulus Swartz, A. D. Veiga, N. Martins","doi":"10.1109/ICTAS.2019.8703636","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703636","url":null,"abstract":"Owing to the growth of technological advancements and the enactment of comprehensive data privacy legislation, organisations must meet the requirements of privacy laws. Organisations must incorporate the protection of personal information in their strategic planning and govern it across the organisation. The purpose of this paper is to propose a conceptual privacy governance framework. This is done by comparing existing privacy governance frameworks and proposing a consolidated framework that incorporates a comprehensive set of privacy components that can assist management in governing privacy across an organisation. Such a framework can serve as a point of reference to assist organisations in obtaining the support of senior management, establishing clear processes and delegating responsibilities to individuals, utilising existing standards, and establishing monitoring and audit practices. The privacy governance framework can help to reinforce privacy protection, enhance the organisation's reputation, foster a culture of privacy and ensure compliance with privacy regulatory requirements.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122627218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703608
Emmanuel U. Ogbodo, D. Dorrell, A. Abu-Mahfouz
The conventional smart grid (SG) uses static radio resource allocation (RRA) techniques to allocate resources to sensor nodes and communication devices in the SG network. Cognitive radio sensor Networks (CRSNs) based SGs uses dynamic RRA for resource allocation to CRSN nodes. However, the challenges associated with sensor nodes in an SG network are: energy or power constraints; poor quality of service (QoS); interference; delay; and problem of spectrum inefficiency. Thus, improvements in resource allocation criteria, such as energy efficiency, appreciable throughput, QoS guarantee, fairness, priority, interference mitigation, etc., will help in circumventing these problems in CRSN-based SGs. Hence, in this work, a new topology and algorithm for improved RRA and QoS guaranteed network connectivity in CRSN-based SGs are proposed. Bit error probability and latency are the metrics used for the investigation of the improved RRA and guaranteed network. The simulation result confirms that the improved model has a very low latency and low error rate at a given signal-to-noise ratio (SNR) compare to the conventional sensor network which has high latency and high error rate at a given SNR.
传统的智能电网采用静态无线电资源分配(RRA)技术,将资源分配给SG网络中的传感器节点和通信设备。基于认知无线传感器网络(Cognitive radio sensor Networks, CRSNs)的认知无线传感器网络(SGs)采用动态RRA对CRSN节点进行资源分配。然而,与SG网络中的传感器节点相关的挑战是:能量或功率限制;服务质量差(QoS);干扰;延迟;以及频谱效率低下的问题。因此,改进资源分配标准,如能源效率、可观的吞吐量、QoS保证、公平性、优先级、干扰缓解等,将有助于在基于crsn的SGs中规避这些问题。因此,本文提出了一种新的拓扑结构和算法,用于改进基于crsn的SGs中RRA和QoS保证的网络连通性。误码率和延迟是研究改进RRA和保证网络的指标。仿真结果表明,与传统传感器网络在一定信噪比下具有较高的延迟和错误率相比,改进后的模型在一定信噪比下具有很低的延迟和错误率。
{"title":"Improved Resource Allocation and Network Connectivity in CRSN Based Smart Grid for Efficient Grid Automation","authors":"Emmanuel U. Ogbodo, D. Dorrell, A. Abu-Mahfouz","doi":"10.1109/ICTAS.2019.8703608","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703608","url":null,"abstract":"The conventional smart grid (SG) uses static radio resource allocation (RRA) techniques to allocate resources to sensor nodes and communication devices in the SG network. Cognitive radio sensor Networks (CRSNs) based SGs uses dynamic RRA for resource allocation to CRSN nodes. However, the challenges associated with sensor nodes in an SG network are: energy or power constraints; poor quality of service (QoS); interference; delay; and problem of spectrum inefficiency. Thus, improvements in resource allocation criteria, such as energy efficiency, appreciable throughput, QoS guarantee, fairness, priority, interference mitigation, etc., will help in circumventing these problems in CRSN-based SGs. Hence, in this work, a new topology and algorithm for improved RRA and QoS guaranteed network connectivity in CRSN-based SGs are proposed. Bit error probability and latency are the metrics used for the investigation of the improved RRA and guaranteed network. The simulation result confirms that the improved model has a very low latency and low error rate at a given signal-to-noise ratio (SNR) compare to the conventional sensor network which has high latency and high error rate at a given SNR.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121699168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703631
A. Henney, W. Tucker
This paper reports on an experimental open source video relay service prototype that helps Deaf people communicate with hearing people by accessing a third party sign language interpreter on a mobile device. Deaf people are disadvantaged in many ways when communicating with the hearing world in real world scenarios, such as hospital visits and in cases of emergency. When possible, Deaf people can enlist the assistance of a family member, community worker or sign language interpreter to assist with such scenarios, however this assistance is pre-arranged and Deaf people would prefer on-the-fly assistance. Our application will assist Deaf people to contact any available sign language interpreter to facilitate communication between the Deaf person and a hearing person using a split screen model, effectively creating a three-way conversation between the Deaf person, the hearing person and the sign language interpreter. The prototype was developed using the WebRTC platform, with JavaScript for browser operability and hardware platform independence. Our hope is that the research can be used to persuade mobile network operators of the need for free or heavily discounted data connection to relay services for Deaf mobile customers.
{"title":"Video Relay Service for Deaf people using WebRTC","authors":"A. Henney, W. Tucker","doi":"10.1109/ICTAS.2019.8703631","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703631","url":null,"abstract":"This paper reports on an experimental open source video relay service prototype that helps Deaf people communicate with hearing people by accessing a third party sign language interpreter on a mobile device. Deaf people are disadvantaged in many ways when communicating with the hearing world in real world scenarios, such as hospital visits and in cases of emergency. When possible, Deaf people can enlist the assistance of a family member, community worker or sign language interpreter to assist with such scenarios, however this assistance is pre-arranged and Deaf people would prefer on-the-fly assistance. Our application will assist Deaf people to contact any available sign language interpreter to facilitate communication between the Deaf person and a hearing person using a split screen model, effectively creating a three-way conversation between the Deaf person, the hearing person and the sign language interpreter. The prototype was developed using the WebRTC platform, with JavaScript for browser operability and hardware platform independence. Our hope is that the research can be used to persuade mobile network operators of the need for free or heavily discounted data connection to relay services for Deaf mobile customers.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126943424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}