首页 > 最新文献

2010 International Conference on Advances in ICT for Emerging Regions (ICTer)最新文献

英文 中文
Towards designing a routing protocol for opportunistic networks 为机会网络设计路由协议
Pub Date : 2010-11-22 DOI: 10.4038/ICTER.V4I3.4678
Thabotharan Kathiravelu, N. Ranasinghe, A. Pears
Intermittently connected opportunistic networks experience frequent disconnections and shorter contact durations. Therefore routing of messages towards their destinations needs to be handled from various points of view. Predictability and connectedness are two information which can be determined by participating mobile nodes of an opportunistic content distribution network using their past contacts. Epidemic or probabilistic routing protocols do not fully utilize these information to route messages towards their destinations. In this paper we describe the routing algorithm, implementation details, experiment design and the performance validation of a new, adaptive routing protocol which utilizes the predictability and connectedness information to route messages efficiently. Simulation based comparative studies show that the proposed routing protocol outperforms existing Epidemic and probabilistic routing protocols in delivering messages.
间歇性连接的机会网络经历频繁的断开和较短的接触持续时间。因此,需要从不同的角度处理到目的地的消息路由。可预测性和连通性是两个信息,这两个信息可以通过机会主义内容分发网络的参与移动节点利用他们过去的联系来确定。流行或概率路由协议没有充分利用这些信息将邮件路由到目的地。本文描述了一种新的自适应路由协议的路由算法、实现细节、实验设计和性能验证,该协议利用可预测性和连通性信息有效地路由消息。仿真对比研究表明,所提出的路由协议在传递消息方面优于现有的流行病路由协议和概率路由协议。
{"title":"Towards designing a routing protocol for opportunistic networks","authors":"Thabotharan Kathiravelu, N. Ranasinghe, A. Pears","doi":"10.4038/ICTER.V4I3.4678","DOIUrl":"https://doi.org/10.4038/ICTER.V4I3.4678","url":null,"abstract":"Intermittently connected opportunistic networks experience frequent disconnections and shorter contact durations. Therefore routing of messages towards their destinations needs to be handled from various points of view. Predictability and connectedness are two information which can be determined by participating mobile nodes of an opportunistic content distribution network using their past contacts. Epidemic or probabilistic routing protocols do not fully utilize these information to route messages towards their destinations. In this paper we describe the routing algorithm, implementation details, experiment design and the performance validation of a new, adaptive routing protocol which utilizes the predictability and connectedness information to route messages efficiently. Simulation based comparative studies show that the proposed routing protocol outperforms existing Epidemic and probabilistic routing protocols in delivering messages.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Adaptation analysis of Agile Project Management for managing IT projects in Sri Lanka 敏捷项目管理对斯里兰卡IT项目管理的适应性分析
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643278
D. Jayawardena, L. Ekanayake
The dynamic business environment today has created immense pressure on the delivery of IT projects. Traditional methods of managing projects are no longer applicable and effective to manage certain IT projects as they are unable to cope with the rapid organizational and business level changes. Agile project management has caught the attention of many project managers as a means of facing these challenges and to overcome the limitations of managing IT projects. This study reports the results of an adaptation analysis done on Agile Project Management in managing IT projects in Sri Lanka. The awareness level of agile project management and what factors affect the awareness are discussed in this study. The agile project management implementation challenges and recommendations discussed in this study will help Sri Lankan organizations to successfully adopt agile project management.
当今动态的业务环境给IT项目的交付带来了巨大的压力。传统的项目管理方法不再适用于管理某些IT项目,因为它们无法应对组织和业务层面的快速变化。敏捷项目管理作为应对这些挑战和克服管理IT项目的局限性的一种手段,已经引起了许多项目经理的注意。本研究报告了对敏捷项目管理在斯里兰卡管理IT项目的适应性分析结果。本研究探讨了敏捷项目管理的意识水平以及影响意识的因素。本研究中讨论的敏捷项目管理实施的挑战和建议将帮助斯里兰卡组织成功地采用敏捷项目管理。
{"title":"Adaptation analysis of Agile Project Management for managing IT projects in Sri Lanka","authors":"D. Jayawardena, L. Ekanayake","doi":"10.1109/ICTER.2010.5643278","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643278","url":null,"abstract":"The dynamic business environment today has created immense pressure on the delivery of IT projects. Traditional methods of managing projects are no longer applicable and effective to manage certain IT projects as they are unable to cope with the rapid organizational and business level changes. Agile project management has caught the attention of many project managers as a means of facing these challenges and to overcome the limitations of managing IT projects. This study reports the results of an adaptation analysis done on Agile Project Management in managing IT projects in Sri Lanka. The awareness level of agile project management and what factors affect the awareness are discussed in this study. The agile project management implementation challenges and recommendations discussed in this study will help Sri Lankan organizations to successfully adopt agile project management.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130326979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of user scheduling schemes in next generation wireless systems with MIMO links 具有MIMO链路的下一代无线系统中用户调度方案的性能分析
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643273
Charles Kabiri, Wang Desheng
Future wireless communication systems like 3GPP Long Term Evolution are required to support extreme high speed packet data transmission. Due to the limitation of available spectrum resource, high spectrum efficiency technologies are needed to be explored for different OSI layers. Over last decades, many technologies have been investigated to achieve this target. Multiple-input multiple-output (MIMO) system and channel-aware scheduling are two promising schemes proposed for that achievement. In this paper, we investigate the impact of MIMO and scheduling in the increasing of the system throughput of next generation mobile wireless systems when transmitting on different channels for several transmission modes. A cross-layer approach in resource allocation and scheduling schemes is emphasized.
未来的无线通信系统,如3GPP长期演进,需要支持极高速分组数据传输。由于可用频谱资源的限制,需要针对不同的OSI层探索高频谱效率的技术。在过去的几十年里,人们研究了许多技术来实现这一目标。多输入多输出(MIMO)系统和信道感知调度是实现这一目标的两种有前途的方案。本文研究了MIMO和调度对下一代移动无线系统在不同信道、不同传输模式下提高系统吞吐量的影响。强调了资源分配和调度方案的跨层方法。
{"title":"Performance analysis of user scheduling schemes in next generation wireless systems with MIMO links","authors":"Charles Kabiri, Wang Desheng","doi":"10.1109/ICTER.2010.5643273","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643273","url":null,"abstract":"Future wireless communication systems like 3GPP Long Term Evolution are required to support extreme high speed packet data transmission. Due to the limitation of available spectrum resource, high spectrum efficiency technologies are needed to be explored for different OSI layers. Over last decades, many technologies have been investigated to achieve this target. Multiple-input multiple-output (MIMO) system and channel-aware scheduling are two promising schemes proposed for that achievement. In this paper, we investigate the impact of MIMO and scheduling in the increasing of the system throughput of next generation mobile wireless systems when transmitting on different channels for several transmission modes. A cross-layer approach in resource allocation and scheduling schemes is emphasized.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114491701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical machine translation of systems for Sinhala - Tamil 僧伽罗语-泰米尔语系统的统计机器翻译
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643268
S. Sripirakas, A. Weerasinghe, D. Herath
One of the most promising and leading machine translation strategies would be Statistical Translation Approach. Being pertinent even to structurally dissimilar language pairs, it has confirmed its suitability for large text translation. Rising demand is present for automatic translation between Sinhala and Tamil for quite a lot of decades. Statistical approach is the best preference to resolve the unavailability of a machine translation tool for the languages concerned. Because of language similarity, statistical approach could thrive agreeably, exclusive of more concern on linguistic knowledge. A basic translation system has been modelled and implemented in this research, with the preparation of parallel corpora from parliament order papers. This paper demonstrates only the preliminary system runs of the research, devoid of various parameter refinements and actual design and evaluation strategies. Language Model, Translation Model and Decoder Configurations are done consistent with recent literature. To facilitate the improvement of output quality, MERT technique is integrated to tune the decoder. To stay away from sole dependence on BLEU, two other automatic metrics namely TER and NIST are utilised for the evaluation in different aspects. In addition, directions to future research are also recognized and specified for the refinements of this system.
统计翻译方法是最有前途和领先的机器翻译策略之一。它甚至适用于结构不同的语言对,证实了它在大文本翻译中的适用性。几十年来,对僧伽罗语和泰米尔语之间自动翻译的需求不断上升。统计方法是解决有关语言的机器翻译工具不可用性的最佳选择。由于语言的相似性,统计方法可以很好地发展,而不需要更多地关注语言知识。一个基本的翻译系统已经在本研究中建模和实施,并从议会命令文件中准备平行语料库。本文仅展示了研究的初步系统运行,缺乏各种参数的细化和实际的设计和评估策略。语言模型、翻译模型和解码器配置均与近期文献一致。为了提高输出质量,采用MERT技术对解码器进行调优。为了避免完全依赖BLEU,另外两个自动指标即TER和NIST用于不同方面的评估。此外,还对未来的研究方向进行了确认,并为该系统的改进指明了方向。
{"title":"Statistical machine translation of systems for Sinhala - Tamil","authors":"S. Sripirakas, A. Weerasinghe, D. Herath","doi":"10.1109/ICTER.2010.5643268","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643268","url":null,"abstract":"One of the most promising and leading machine translation strategies would be Statistical Translation Approach. Being pertinent even to structurally dissimilar language pairs, it has confirmed its suitability for large text translation. Rising demand is present for automatic translation between Sinhala and Tamil for quite a lot of decades. Statistical approach is the best preference to resolve the unavailability of a machine translation tool for the languages concerned. Because of language similarity, statistical approach could thrive agreeably, exclusive of more concern on linguistic knowledge. A basic translation system has been modelled and implemented in this research, with the preparation of parallel corpora from parliament order papers. This paper demonstrates only the preliminary system runs of the research, devoid of various parameter refinements and actual design and evaluation strategies. Language Model, Translation Model and Decoder Configurations are done consistent with recent literature. To facilitate the improvement of output quality, MERT technique is integrated to tune the decoder. To stay away from sole dependence on BLEU, two other automatic metrics namely TER and NIST are utilised for the evaluation in different aspects. In addition, directions to future research are also recognized and specified for the refinements of this system.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123164755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
E-governance service delivery - an assessment of Community Information Centre Model in India 电子政务服务交付——对印度社区信息中心模式的评估
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643274
M. Saeed, Jugal Bharali, A. Bhowal
There exists relationship between the Governance and Information & Communication Technology [ICT]. For the digital revolution in the rural areas in developing countries like India, governmental intervention was done in the form implementation of a Community Information Centre Model [CIC] of ICT project to reach the people. Hence, an assessment of e-governance through CIC Model was done. The scope of the study was to analyse the activities of CICs in one of the districts in India. The district has its rural and tribal character and unique distinction of ISO 9001:2000 certificate for integrated citizen centric services.
治理与信息通信技术之间存在着一定的关系。对于印度等发展中国家农村地区的数位革命,政府介入的方式是实施资讯及通讯科技(ICT)项目的社区资讯中心模式(Community Information Centre Model [CIC])。因此,通过CIC模型对电子政务进行了评估。这项研究的范围是分析在印度一个地区的中央行政中心的活动。该地区具有农村和部落特色,并通过了ISO 9001:2000认证,以综合市民为中心的服务。
{"title":"E-governance service delivery - an assessment of Community Information Centre Model in India","authors":"M. Saeed, Jugal Bharali, A. Bhowal","doi":"10.1109/ICTER.2010.5643274","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643274","url":null,"abstract":"There exists relationship between the Governance and Information & Communication Technology [ICT]. For the digital revolution in the rural areas in developing countries like India, governmental intervention was done in the form implementation of a Community Information Centre Model [CIC] of ICT project to reach the people. Hence, an assessment of e-governance through CIC Model was done. The scope of the study was to analyse the activities of CICs in one of the districts in India. The district has its rural and tribal character and unique distinction of ISO 9001:2000 certificate for integrated citizen centric services.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130522002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On cloud computing deployment architecture 云计算部署架构
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643276
Madhukara Phatak, V. Kamalesh
Cloud computing is the provision of providing dynamically scalable and often virtualized resources as a service over the Internet. It is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort and cloud provider interaction. Enterprises across the world are moving their business infrastructure from on-premise to the cloud. The lack of reliability and inter-portability in the current cloud deployment architecture makes this transition much slower than expected. The most of existing cloud providers are using 2-tiered cloud deployment architecture. This paper presents a 3-tiered cloud deployment architecture which ensures the improved reliability and inter-portability in the cloud environment.
云计算是指通过Internet提供动态可伸缩的、通常是虚拟化的资源作为服务。它是一种模型,支持对可配置计算资源的共享池进行方便的按需网络访问,这些资源可以通过最少的管理工作和云提供商交互来快速配置和释放。世界各地的企业正在将其业务基础设施从本地迁移到云。当前的云部署架构缺乏可靠性和可移植性,这使得这种转变比预期的要慢得多。大多数现有的云提供商都在使用两层云部署架构。本文提出了一种三层云部署架构,保证了云环境下的可靠性和互移植性。
{"title":"On cloud computing deployment architecture","authors":"Madhukara Phatak, V. Kamalesh","doi":"10.1109/ICTER.2010.5643276","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643276","url":null,"abstract":"Cloud computing is the provision of providing dynamically scalable and often virtualized resources as a service over the Internet. It is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort and cloud provider interaction. Enterprises across the world are moving their business infrastructure from on-premise to the cloud. The lack of reliability and inter-portability in the current cloud deployment architecture makes this transition much slower than expected. The most of existing cloud providers are using 2-tiered cloud deployment architecture. This paper presents a 3-tiered cloud deployment architecture which ensures the improved reliability and inter-portability in the cloud environment.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130431245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Virtual learning model for metaverses 元数据库的虚拟学习模型
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643267
P. D. Ariyadewa, W.V. Wathsala, V. Pradeepan, R.P.D.D.T. Perera, D. Atukorale
Virtual learning environments have been increasingly utilized in the domain of eLearning recently. Virtual worlds such as SecondLife and OpenSimulator have opened up great opportunities in this front. The major issue with virtual worlds with respect to education is lack of models that consistently describe the entire learning process. Most of the prior work was focused on building tools to extend real world learning tasks to virtual worlds rather than building virtual world based learning models which consistently describe the virtual world based learning itself. The ongoing work presented here is focused on filling the void in virtual world based learning models.
近年来,虚拟学习环境在电子学习领域得到了越来越多的应用。像SecondLife和OpenSimulator这样的虚拟世界在这方面提供了巨大的机会。与教育相关的虚拟世界的主要问题是缺乏一致地描述整个学习过程的模型。大多数先前的工作都集中在构建工具来将现实世界的学习任务扩展到虚拟世界,而不是构建基于虚拟世界的学习模型,以一致地描述基于虚拟世界的学习本身。这里正在进行的工作主要是填补基于虚拟世界的学习模型的空白。
{"title":"Virtual learning model for metaverses","authors":"P. D. Ariyadewa, W.V. Wathsala, V. Pradeepan, R.P.D.D.T. Perera, D. Atukorale","doi":"10.1109/ICTER.2010.5643267","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643267","url":null,"abstract":"Virtual learning environments have been increasingly utilized in the domain of eLearning recently. Virtual worlds such as SecondLife and OpenSimulator have opened up great opportunities in this front. The major issue with virtual worlds with respect to education is lack of models that consistently describe the entire learning process. Most of the prior work was focused on building tools to extend real world learning tasks to virtual worlds rather than building virtual world based learning models which consistently describe the virtual world based learning itself. The ongoing work presented here is focused on filling the void in virtual world based learning models.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123831330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Chaos theory based cryptography in digital image distribution 基于混沌理论的数字图像分布密码学
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643275
M.H.P. Ranmuthugala, C. Gamage
The amount of visual information available in digital format has grown exponentially in recent years due to the wide availability of digital equipments, changes in the way people socially interact by setting up community web pages, wide spread use of the Internet in all types of personal and business activities, pay-after-trial services of digital multimedia and developments in high speed transmission of digital images with high reliability. However, the wide accessibility of the Internet and its connected hosts and availability of technology to capture network traffic or penetrate hosts have made digital images vulnerable to unauthorized access while in storage and during transmission over a network. Hence users of the Internet and application that use or process digital images need to address security issues to protect commercial value of images and also ensure user privacy and other issues. The objective of the research presented in this paper focused on proposing an image encryption technique which is capable of encrypting an image effectively and securely with a predefined visibility level. The stipulated objective is achieved by employing 2D chaotic map called the Kaplan-Yorke map.
近年来,由于数字设备的广泛使用,人们建立社区网页的社会互动方式的改变,互联网在各种个人和商业活动中的广泛使用,数字多媒体的试用后付费服务以及高可靠性数字图像高速传输的发展,以数字形式提供的视觉信息量呈指数级增长。然而,互联网及其连接的主机的广泛可访问性以及捕获网络流量或渗透主机的技术的可用性使得数字图像在存储和通过网络传输期间容易受到未经授权的访问。因此,使用或处理数字图像的互联网用户和应用程序需要解决安全问题,以保护图像的商业价值,并确保用户隐私等问题。本文研究的目的是提出一种图像加密技术,该技术能够在预定义的可见性级别下有效安全地加密图像。所规定的目标是通过使用二维混沌地图称为卡普兰-约克地图。
{"title":"Chaos theory based cryptography in digital image distribution","authors":"M.H.P. Ranmuthugala, C. Gamage","doi":"10.1109/ICTER.2010.5643275","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643275","url":null,"abstract":"The amount of visual information available in digital format has grown exponentially in recent years due to the wide availability of digital equipments, changes in the way people socially interact by setting up community web pages, wide spread use of the Internet in all types of personal and business activities, pay-after-trial services of digital multimedia and developments in high speed transmission of digital images with high reliability. However, the wide accessibility of the Internet and its connected hosts and availability of technology to capture network traffic or penetrate hosts have made digital images vulnerable to unauthorized access while in storage and during transmission over a network. Hence users of the Internet and application that use or process digital images need to address security issues to protect commercial value of images and also ensure user privacy and other issues. The objective of the research presented in this paper focused on proposing an image encryption technique which is capable of encrypting an image effectively and securely with a predefined visibility level. The stipulated objective is achieved by employing 2D chaotic map called the Kaplan-Yorke map.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Myanmar language search engine 缅甸语搜索引擎
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643269
Pann Yu Mon, Y. Mikami
With the enormous growth of the World Wide Web, search engines play a critical role in retrieving information from the borderless Web. Although many search engines are available for the major languages, but they are not much proficient for the less computerized languages including Myanmar. The main reason is that those search engines are not considering the specific features of those languages. A search engine which is capable of searching the Web documents written in those languages is highly needed, especially when more and more Web sites are coming up with localized content in multiple languages. In this study, the design and the architecture of language specific search engine for Myanmar language is proposed. The main features of the system are, (1) it can search the multiple encodings of the Myanmar Web page, (2) it is designed to comply with the specific features of the Myanmar language. Finally the experiment has been done to prove whether it meets the design requirements.
随着万维网的飞速发展,搜索引擎在从无边界的网络中检索信息方面起着至关重要的作用。虽然许多搜索引擎都可以用于主要语言,但对于包括缅甸语在内的计算机化程度较低的语言,他们并不精通。主要原因是这些搜索引擎没有考虑到这些语言的具体特性。一个能够搜索用这些语言编写的Web文档的搜索引擎是非常需要的,特别是当越来越多的Web站点以多种语言提供本地化内容时。在本研究中,提出了针对缅甸语的特定语言搜索引擎的设计和架构。该系统的主要特点有:(1)能够对缅甸语网页的多种编码进行检索;(2)符合缅甸语的具体特点。最后进行了实验验证,验证其是否满足设计要求。
{"title":"Myanmar language search engine","authors":"Pann Yu Mon, Y. Mikami","doi":"10.1109/ICTER.2010.5643269","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643269","url":null,"abstract":"With the enormous growth of the World Wide Web, search engines play a critical role in retrieving information from the borderless Web. Although many search engines are available for the major languages, but they are not much proficient for the less computerized languages including Myanmar. The main reason is that those search engines are not considering the specific features of those languages. A search engine which is capable of searching the Web documents written in those languages is highly needed, especially when more and more Web sites are coming up with localized content in multiple languages. In this study, the design and the architecture of language specific search engine for Myanmar language is proposed. The main features of the system are, (1) it can search the multiple encodings of the Myanmar Web page, (2) it is designed to comply with the specific features of the Myanmar language. Finally the experiment has been done to prove whether it meets the design requirements.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A language independent algorithm to send secret messages using steganography 使用隐写术发送秘密消息的独立于语言的算法
Pub Date : 2010-11-22 DOI: 10.1109/ICTER.2010.5643277
V. Ganeshkumar, R. Koggalage
The radical growth of internet & cybercrime during the last few years has forced us to think about how to improve information security efficiently during communication. Protecting the information during communication via the internet is the major challenge against eavesdropper. Encryption is a widely used technique to ensure secure communication; however, sending encrypted messages often draws an eavesdropper's attention. Steganography is a method of writing secret messages in a way that nobody, except for the sender and the recipient, suspects the existence of a hidden message. In this paper a new steganographic technique is proposed to transmit concealed messages in multi-language or combination of languages, which can be represented in Unicode. Use of inter-character spacing technique is proposed as the steganographic technique and a prototype implementation has been done with Rich Text Format (RTF) documents. An additional optimized compression technique is also proposed with enhanced user defined codes, to support Unicode language. Another advantage is that the secret message (hidden) can be in a different language than which is transmitted through the communication channel.
在过去的几年里,互联网和网络犯罪的急剧增长迫使我们思考如何在通信过程中有效地提高信息安全。保护互联网通信中的信息安全是防止窃听的主要挑战。加密是一种广泛使用的确保通信安全的技术;然而,发送加密信息往往会引起窃听者的注意。隐写术是一种书写秘密信息的方法,除了发送者和接收者之外,没有人会怀疑隐藏信息的存在。本文提出了一种新的隐写技术,用于多语言或多语言组合的隐写信息传输,这些隐写信息可以用Unicode表示。提出了使用字符间间距技术作为隐写技术,并对富文本格式(RTF)文档进行了原型实现。为了支持Unicode语言,还提出了一种额外的优化压缩技术,增强了用户自定义代码。另一个优点是秘密消息(隐藏)可以使用不同于通过通信通道传输的语言。
{"title":"A language independent algorithm to send secret messages using steganography","authors":"V. Ganeshkumar, R. Koggalage","doi":"10.1109/ICTER.2010.5643277","DOIUrl":"https://doi.org/10.1109/ICTER.2010.5643277","url":null,"abstract":"The radical growth of internet & cybercrime during the last few years has forced us to think about how to improve information security efficiently during communication. Protecting the information during communication via the internet is the major challenge against eavesdropper. Encryption is a widely used technique to ensure secure communication; however, sending encrypted messages often draws an eavesdropper's attention. Steganography is a method of writing secret messages in a way that nobody, except for the sender and the recipient, suspects the existence of a hidden message. In this paper a new steganographic technique is proposed to transmit concealed messages in multi-language or combination of languages, which can be represented in Unicode. Use of inter-character spacing technique is proposed as the steganographic technique and a prototype implementation has been done with Rich Text Format (RTF) documents. An additional optimized compression technique is also proposed with enhanced user defined codes, to support Unicode language. Another advantage is that the secret message (hidden) can be in a different language than which is transmitted through the communication channel.","PeriodicalId":412613,"journal":{"name":"2010 International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2010 International Conference on Advances in ICT for Emerging Regions (ICTer)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1