首页 > 最新文献

International Journal of Computer Science and Applications最新文献

英文 中文
Quantifying the Impact of Flood Attack on Transport Layer Protocol 量化洪水攻击对传输层协议的影响
Q4 Computer Science Pub Date : 2014-12-31 DOI: 10.5121/IJCSA.2014.4607
S. Tyagi
As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation.
随着互联网和计算机的日益增长,对网络的攻击也日益增加。在本文中,我们介绍了有线网络,创建两个TCP源节点和一个攻击者节点(分布式拒绝服务)洪水类型攻击的攻击在源端TCP带宽的节点发送数据到目的地还通过路由器和测量的影响,拒绝服务攻击(DoS),有线网络数据包的源节点,节点将下降由于洪水的影响类型的拒绝服务攻击并使用NS-2南&显示了结果仿真中的Xgraph窗口。
{"title":"Quantifying the Impact of Flood Attack on Transport Layer Protocol","authors":"S. Tyagi","doi":"10.5121/IJCSA.2014.4607","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4607","url":null,"abstract":"As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"131 1","pages":"79-87"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73810552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parkinsons Disease Diagnosis Using Image Processing Techniques A Survey 应用图像处理技术诊断帕金森病综述
Q4 Computer Science Pub Date : 2014-12-31 DOI: 10.5121/IJCSA.2014.4605
A. Valli, G. Jiji
Clinical Diagnosis of Parkinson’s disease [PD] leads to errors, excessive medical costs, and provide insufficient services to the patients. There is no particular method or a test to detect the PD. The diagnosis of the Parkinson’s disease needs an accurate detection. Computer Aided Diagnosis (CAD) gives accurate results to detect the PD. These CAD can be embedded into a real time application for the early diagnosis of PD. Dopamine nerve terminals can be reduced in the brain parts such as Substantia nigra, Striatum, and other brain structures. This reduction which will lead to Parkinson’s disease. Dopamine Reduction gets automatically diagnosed by CAD and PD/normal patients can be found. For this, machine learning system (MLS)/CAD can be trained with the help of Artificial Neural Networks (ANN). Image processing techniques that are available to detect PD using MLS/CAD gets discussed in this paper.
帕金森氏病(PD)的临床诊断有误,医疗费用过高,对患者的服务不足。没有特定的方法或测试来检测PD。帕金森病的诊断需要精确的检测。计算机辅助诊断(CAD)对帕金森病的诊断结果准确。这些CAD可以嵌入到PD的早期诊断的实时应用程序中。多巴胺神经末梢在大脑部分如黑质、纹状体和其他大脑结构中会减少。这种减少会导致帕金森氏症。多巴胺减少被CAD和PD自动诊断/可以发现正常患者。为此,机器学习系统(MLS)/CAD可以借助人工神经网络(ANN)进行训练。本文讨论了利用MLS/CAD检测PD的图像处理技术。
{"title":"Parkinsons Disease Diagnosis Using Image Processing Techniques A Survey","authors":"A. Valli, G. Jiji","doi":"10.5121/IJCSA.2014.4605","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4605","url":null,"abstract":"Clinical Diagnosis of Parkinson’s disease [PD] leads to errors, excessive medical costs, and provide insufficient services to the patients. There is no particular method or a test to detect the PD. The diagnosis of the Parkinson’s disease needs an accurate detection. Computer Aided Diagnosis (CAD) gives accurate results to detect the PD. These CAD can be embedded into a real time application for the early diagnosis of PD. Dopamine nerve terminals can be reduced in the brain parts such as Substantia nigra, Striatum, and other brain structures. This reduction which will lead to Parkinson’s disease. Dopamine Reduction gets automatically diagnosed by CAD and PD/normal patients can be found. For this, machine learning system (MLS)/CAD can be trained with the help of Artificial Neural Networks (ANN). Image processing techniques that are available to detect PD using MLS/CAD gets discussed in this paper.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"57-67"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79921124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Insight View of Digital Forensics 数字取证的洞察力
Q4 Computer Science Pub Date : 2014-12-31 DOI: 10.5121/IJCSA.2014.4608
N. Kishore, Chetna Gupta, Dhvani Dawar
Crime and violence are inherent in our political and social system. With the moving pace of technology, the popularity of internet grows continuously, with not only changing our views of life, but also changing the way crime takes place all over the world. We need a technology that can be used to bring justice to those who are responsible for conducting attacks on computer systems across the globe. In this paper, we present various measures being taken in order to control and deal with the crime related to digital devices. This paper gives an insight of Digital Forensics and current situation of India in handling such type of crimes.
犯罪和暴力是我们的政治和社会制度所固有的。随着科技的发展,互联网的普及程度不断提高,不仅改变了我们的人生观,也改变了世界各地犯罪发生的方式。我们需要一种技术,可以用来将那些对全球计算机系统进行攻击的人绳之以法。在本文中,我们提出了各种措施,以控制和处理与数字设备有关的犯罪。本文介绍了数字取证和印度处理此类犯罪的现状。
{"title":"An Insight View of Digital Forensics","authors":"N. Kishore, Chetna Gupta, Dhvani Dawar","doi":"10.5121/IJCSA.2014.4608","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4608","url":null,"abstract":"Crime and violence are inherent in our political and social system. With the moving pace of technology, the popularity of internet grows continuously, with not only changing our views of life, but also changing the way crime takes place all over the world. We need a technology that can be used to bring justice to those who are responsible for conducting attacks on computer systems across the globe. In this paper, we present various measures being taken in order to control and deal with the crime related to digital devices. This paper gives an insight of Digital Forensics and current situation of India in handling such type of crimes.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"89-96"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82245401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of Retinal Vessels, Into Arteries And Veins - A Survey 视网膜血管分为动脉和静脉的分类综述
Q4 Computer Science Pub Date : 2014-12-31 DOI: 10.5121/IJCSA.2014.4606
S. Maheswari, Anandhi S.V
{"title":"Classification of Retinal Vessels, Into Arteries And Veins - A Survey","authors":"S. Maheswari, Anandhi S.V","doi":"10.5121/IJCSA.2014.4606","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4606","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"35 1","pages":"69-78"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72585731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Path Selection and Data Transmission Using Queue in Open Shortest Path First 开放最短路径优先中基于队列的有效路径选择与数据传输
Q4 Computer Science Pub Date : 2014-11-01 DOI: 10.14355/IJCSA.2014.0304.01
J. Kavitha, S. Palaniammal
In network, information apportioning occurs between one communication points to another using TCP protocol. The collected data are shared among many users via Single Router or Access Point (AP). During routing, traffic is occurred in the network and that is known as Random Early Detection (RED). In order to overcome this, an alternative path must be preferred by using Alternative Path Selection method which utilizes the Queue Process (FIFO). In case the queue is full, it chooses an alternative queue by using channel sensing mode of path selection. Here, we use OSPF (Open Shortest Path First) which selects the shortest path in short period of time and also it delivers the data to the particular destination. However, delay is reduced in OSPF. Hence, efficiency and overall network lifetime is increased. Finally, the network performance is evaluated.
在网络中,使用TCP协议在一个通信点与另一个通信点之间进行信息分配。收集的数据通过单个路由器或接入点(AP)在许多用户之间共享。在路由过程中,网络中发生流量,称为RED (Random Early Detection)。为了克服这一点,必须使用利用队列处理(FIFO)的备选路径选择方法来优选备选路径。在队列已满的情况下,采用路径选择的通道感知模式,选择一个备选队列。在这里,我们使用OSPF(开放最短路径优先),它在短时间内选择最短的路径,并将数据传递到特定的目的地。但是,OSPF可以减少延迟。因此,提高了效率和整体网络生命周期。最后,对网络性能进行了评估。
{"title":"Efficient Path Selection and Data Transmission Using Queue in Open Shortest Path First","authors":"J. Kavitha, S. Palaniammal","doi":"10.14355/IJCSA.2014.0304.01","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0304.01","url":null,"abstract":"In network, information apportioning occurs between one communication points to another using TCP protocol. The collected data are shared among many users via Single Router or Access Point (AP). During routing, traffic is occurred in the network and that is known as Random Early Detection (RED). In order to overcome this, an alternative path must be preferred by using Alternative Path Selection method which utilizes the Queue Process (FIFO). In case the queue is full, it chooses an alternative queue by using channel sensing mode of path selection. Here, we use OSPF (Open Shortest Path First) which selects the shortest path in short period of time and also it delivers the data to the particular destination. However, delay is reduced in OSPF. Hence, efficiency and overall network lifetime is increased. Finally, the network performance is evaluated.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"8 1","pages":"139"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75723235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion Detection System Using Feature Selection and Classification Technique 基于特征选择和分类技术的入侵检测系统
Q4 Computer Science Pub Date : 2014-11-01 DOI: 10.14355/IJCSA.2014.0304.02
S. Balakrishnan, Venkatalakshmi K, K. A
With the growth of Internet, there has been a tremendous increases in the number of attacks and therefore Intrusion Detection Systems (IDS’s) has become a main stream of information security. The purpose of IDS is to help the computer systems to deal with attacks. This anomaly detection system creates a database of normal behaviour and deviations from the normal behaviour to trigger during the occurrence of intrusions. Based on the source of data, IDS is classified into Host based IDS and Network based IDS. In network based IDS, the individual packets flowing through the network are analyzed where as in host based IDS the activities on the single computer or host are analyzed. The feature selection used in IDS helps to reduce the classification time. In this paper, the IDS for detecting the attacks effectively has been proposed and implemented. For this purpose, a new feature selection algorithm called Optimal Feature Selection algorithm based on Information Gain Ratio has been proposed and implemented. This feature selection algorithm selects optimal number of features from KDD Cup dataset. In addition, two classification techniques namely Support Vector Machine and Rule Based Classification have been used for effective classification of the data set. This system is very efficient in detecting DoS attacks and effectively reduces the false alarm rate. The proposed feature selection and classification algorithms enhance the performance of the IDS in detecting the attacks.
随着互联网的发展,攻击的数量急剧增加,入侵检测系统(IDS)已成为信息安全的主流。IDS的目的是帮助计算机系统处理攻击。该异常检测系统创建一个正常行为和偏离正常行为的数据库,以便在入侵发生时触发。根据数据来源的不同,入侵检测分为基于主机的入侵检测和基于网络的入侵检测。在基于网络的入侵检测中,分析流经网络的单个数据包,而在基于主机的入侵检测中,分析单个计算机或主机上的活动。IDS中使用的特征选择有助于减少分类时间。本文提出并实现了有效检测攻击的IDS。为此,提出并实现了一种新的特征选择算法——基于信息增益比的最优特征选择算法。该特征选择算法从KDD Cup数据集中选择最优数量的特征。此外,采用支持向量机和基于规则的分类两种分类技术对数据集进行了有效的分类。该系统能够有效检测DoS攻击,有效降低误报率。所提出的特征选择和分类算法提高了入侵检测系统检测攻击的性能。
{"title":"Intrusion Detection System Using Feature Selection and Classification Technique","authors":"S. Balakrishnan, Venkatalakshmi K, K. A","doi":"10.14355/IJCSA.2014.0304.02","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0304.02","url":null,"abstract":"With the growth of Internet, there has been a tremendous increases in the number of attacks and therefore Intrusion Detection Systems (IDS’s) has become a main stream of information security. The purpose of IDS is to help the computer systems to deal with attacks. This anomaly detection system creates a database of normal behaviour and deviations from the normal behaviour to trigger during the occurrence of intrusions. Based on the source of data, IDS is classified into Host based IDS and Network based IDS. In network based IDS, the individual packets flowing through the network are analyzed where as in host based IDS the activities on the single computer or host are analyzed. The feature selection used in IDS helps to reduce the classification time. In this paper, the IDS for detecting the attacks effectively has been proposed and implemented. For this purpose, a new feature selection algorithm called Optimal Feature Selection algorithm based on Information Gain Ratio has been proposed and implemented. This feature selection algorithm selects optimal number of features from KDD Cup dataset. In addition, two classification techniques namely Support Vector Machine and Rule Based Classification have been used for effective classification of the data set. This system is very efficient in detecting DoS attacks and effectively reduces the false alarm rate. The proposed feature selection and classification algorithms enhance the performance of the IDS in detecting the attacks.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"145"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79742387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An Approach to Decrease Dimensions of Drift Hetero-Bopolar Transistors 减小漂移异极晶体管尺寸的方法
Q4 Computer Science Pub Date : 2014-10-31 DOI: 10.5121/IJCSA.2014.4503
P. E.L, Bulaeva E.A
In this paper based on recently introduced approach we formulated some recommendations to optimize manufacture drift bipolar transistor to decrease their dimensions and to decrease local overheats during functioning. The approach based on manufacture a heterostructure, doping required parts of the heterostructure by dopant diffusion or by ion implantation and optimization of annealing of dopant and/or radiation defects. The optimization gives us possibility to increase homogeneity of distributions of concentrations of dopants in emitter and collector and specific inhomogenous of concentration of dopant in base and at the same time to increase sharpness of p-n-junctions, which have been manufactured framework the transistor. We obtain dependences of optimal annealing time on several parameters. We also introduced an analytical approach to model nonlinear physical processes (such as massand heat transport) in inhomogenous media with time-varying parameters.
本文在现有方法的基础上,提出了一些优化漂移双极晶体管制造的建议,以减小其尺寸和减少工作过程中的局部过热。该方法基于制造异质结构,通过掺杂剂扩散或离子注入来掺杂所需的异质结构部分,并优化掺杂剂和/或辐射缺陷的退火。该优化方法使我们有可能提高发射极和集电极中掺杂浓度分布的均匀性和基极中掺杂浓度的特定不均匀性,同时提高已制成晶体管骨架的pn结的清晰度。我们得到了最优退火时间与几个参数的关系。我们还介绍了一种分析方法来模拟具有时变参数的非均匀介质中的非线性物理过程(如质量和热量传递)。
{"title":"An Approach to Decrease Dimensions of Drift Hetero-Bopolar Transistors","authors":"P. E.L, Bulaeva E.A","doi":"10.5121/IJCSA.2014.4503","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4503","url":null,"abstract":"In this paper based on recently introduced approach we formulated some recommendations to optimize manufacture drift bipolar transistor to decrease their dimensions and to decrease local overheats during functioning. The approach based on manufacture a heterostructure, doping required parts of the heterostructure by dopant diffusion or by ion implantation and optimization of annealing of dopant and/or radiation defects. The optimization gives us possibility to increase homogeneity of distributions of concentrations of dopants in emitter and collector and specific inhomogenous of concentration of dopant in base and at the same time to increase sharpness of p-n-junctions, which have been manufactured framework the transistor. We obtain dependences of optimal annealing time on several parameters. We also introduced an analytical approach to model nonlinear physical processes (such as massand heat transport) in inhomogenous media with time-varying parameters.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"98 1","pages":"25-51"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76452514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents. 网络安全事件自适应可理解优先级的概念与实践评估。
Q4 Computer Science Pub Date : 2014-10-31 DOI: 10.5121/IJCSA.2014.4508
Leonard Renners, Felix Heine, Carsten Kleiner, G. Rodosek
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has discovered that DoS attacks can easily be launched by injecting malevolent management frames into the WiMAX network based on the Privacy and Key ManagementReSPonse (PKM-RSP) and Automatic Repeat ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks and enhance the security level in the network.
全球微波接入互操作性(WiMAX)是一种新的通信技术,它弥补了固定和移动接入之间的鸿沟,并为两种类型的用户提供相同的服务质量(QoS)。一般来说,由于没有任何明确的防线,WiMAX更容易受到内部和外部攻击。选择将数据包传输到基站(BS)的移动用户站(mss)容易受到像洪水一样的拒绝服务(DoS)攻击。最近的研究发现,通过向基于隐私和密钥管理响应(PKM-RSP)和自动重复请求(ARQ)重置消息的WiMAX网络中注入恶意管理框架,可以很容易地发起DoS攻击。本文提出了一种减轻泛洪攻击,提高网络安全水平的算法。
{"title":"Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents.","authors":"Leonard Renners, Felix Heine, Carsten Kleiner, G. Rodosek","doi":"10.5121/IJCSA.2014.4508","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4508","url":null,"abstract":"Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has discovered that DoS attacks can easily be launched by injecting malevolent management frames into the WiMAX network based on the Privacy and Key ManagementReSPonse (PKM-RSP) and Automatic Repeat ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks and enhance the security level in the network.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"95 1","pages":"99-112"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74969406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment Of Wind Resource And Production In Oran, Algeria 阿尔及利亚奥兰风电资源及产量评价
Q4 Computer Science Pub Date : 2014-10-31 DOI: 10.5121/IJCSA.2014.4504
Zakaria BOUZID, N. Ghellai, M. Belarbi
{"title":"Assessment Of Wind Resource And Production In Oran, Algeria","authors":"Zakaria BOUZID, N. Ghellai, M. Belarbi","doi":"10.5121/IJCSA.2014.4504","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4504","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"54 1","pages":"53-60"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91110499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Mixed reality for diving and underwater tasks using Remotely Operated Vehicles 分布式混合现实潜水和水下任务使用远程操作车辆
Q4 Computer Science Pub Date : 2014-10-01 DOI: 10.5121/ijcsa.2014.4501
M. Chouiten, Christophe Domingues, Jean-Yves Didier, S. Otmane, M. Mallem
Taking advantage of state of the art underwater vehicles and current networking capabilities, the visionary double objective of this work is to “open to people connected to the Internet, an access to ocean depths anytime, anywhere.” Today, these people can just perceive the changing surface of the sea from the shores, but ignore almost everything on what is hidden. If they could explore seabed and become knowledgeable, they would get involved in finding alternative solutions for our vital terrestrial problems – pollution, climate changes, destruction of biodiversity and exhaustion of Earth resources. The second objective is to assist professionals of underwater world in performing their tasks by augmenting the perception of the scene and offering automated actions such as wildlife monitoring and counting. The introduction of Mixed Reality and Internet in aquatic activities constitutes a technological breakthrough when compared with the status of existing related technologies. Through Internet, anyone, anywhere, at any moment will be naturally able to dive in real-time using a Remote Operated Vehicle (ROV) in the most remarkable sites around the world. The heart of this work is focused on Mixed Reality. The main challenge is to reach real time display of digital video stream to web users, by mixing 3D entities (objects or pre-processed underwater terrain surfaces), with 2D videos of live images collected in real time by a teleoperated ROV.
利用最先进的水下航行器和当前的网络能力,这项工作的双重目标是“向连接到互联网的人们开放,随时随地进入海洋深处”。今天,这些人只能从海岸上看到海面的变化,但几乎忽略了隐藏的一切。如果他们能够探索海底并变得有知识,他们将参与寻找解决我们重要的陆地问题的替代办法- -污染、气候变化、生物多样性的破坏和地球资源的枯竭。第二个目标是通过增强对场景的感知和提供诸如野生动物监测和计数等自动化操作来帮助水下世界的专业人员执行任务。与现有相关技术的现状相比,混合现实和互联网在水上活动中的引入是一种技术突破。通过互联网,任何人、任何地点、任何时间都可以使用遥控潜水器(ROV)在世界上最著名的地点进行实时潜水。这项工作的核心是集中在混合现实。主要的挑战是通过将3D实体(物体或预处理的水下地形表面)与远程遥控ROV实时收集的实时图像的2D视频混合在一起,向网络用户实时显示数字视频流。
{"title":"Distributed Mixed reality for diving and underwater tasks using Remotely Operated Vehicles","authors":"M. Chouiten, Christophe Domingues, Jean-Yves Didier, S. Otmane, M. Mallem","doi":"10.5121/ijcsa.2014.4501","DOIUrl":"https://doi.org/10.5121/ijcsa.2014.4501","url":null,"abstract":"Taking advantage of state of the art underwater vehicles and current networking capabilities, the \u0000visionary double objective of this work is to “open to people connected to the Internet, an access to \u0000ocean depths anytime, anywhere.” Today, these people can just perceive the changing surface of the sea \u0000from the shores, but ignore almost everything on what is hidden. If they could explore seabed and \u0000become knowledgeable, they would get involved in finding alternative solutions for our vital terrestrial \u0000problems – pollution, climate changes, destruction of biodiversity and exhaustion of Earth resources. \u0000The second objective is to assist professionals of underwater world in performing their tasks by \u0000augmenting the perception of the scene and offering automated actions such as wildlife monitoring and \u0000counting. The introduction of Mixed Reality and Internet in aquatic activities constitutes a technological \u0000breakthrough when compared with the status of existing related technologies. Through Internet, \u0000anyone, anywhere, at any moment will be naturally able to dive in real-time using a Remote Operated \u0000Vehicle (ROV) in the most remarkable sites around the world. The heart of this work is focused on \u0000Mixed Reality. The main challenge is to reach real time display of digital video stream to web users, by \u0000mixing 3D entities (objects or pre-processed underwater terrain surfaces), with 2D videos of live \u0000images collected in real time by a teleoperated ROV.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"11 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78593728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Computer Science and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1