首页 > 最新文献

2016 12th International Conference on Innovations in Information Technology (IIT)最新文献

英文 中文
Architectural design of a cloud-based reCAPTCHA service 基于云的reCAPTCHA服务的架构设计
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880041
H. Abubaker, K. Salah, H. Al-Muhairi, A. Bentiba
reCAPTCHA is a security measure that guards web applications against automated abuse by presenting a random auto-generated challenge to users to solve. These challenges have to be devised to be hard to be solved by computers, yet easy for humans. In this paper, we present an architectural design for a cloud-based reCAPTCHA service and discuss key design issues. These issues include the extraction of individual word images from the scanned pages, optical character recognition (OCR) initial words classification, handling multiple users at the cloud-based service side, and usability and readability. We also show how our design addresses these issues at the implementation phase. It is worth noting that our reCAPTCHA service is designed for the Arabic language, but the underlying proposed architecture and design principles can be applied to any other language.
reCAPTCHA是一种安全措施,通过向用户提供随机的自动生成的挑战来防止web应用程序被自动滥用。这些挑战必须设计成计算机难以解决,而人类容易解决。在本文中,我们提出了基于云的reCAPTCHA服务的架构设计,并讨论了关键的设计问题。这些问题包括从扫描页面中提取单个单词图像、光学字符识别(OCR)初始单词分类、在基于云的服务端处理多个用户以及可用性和可读性。我们还将展示我们的设计如何在实现阶段解决这些问题。值得注意的是,我们的reCAPTCHA服务是为阿拉伯语设计的,但是底层提出的体系结构和设计原则可以应用于任何其他语言。
{"title":"Architectural design of a cloud-based reCAPTCHA service","authors":"H. Abubaker, K. Salah, H. Al-Muhairi, A. Bentiba","doi":"10.1109/INNOVATIONS.2016.7880041","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880041","url":null,"abstract":"reCAPTCHA is a security measure that guards web applications against automated abuse by presenting a random auto-generated challenge to users to solve. These challenges have to be devised to be hard to be solved by computers, yet easy for humans. In this paper, we present an architectural design for a cloud-based reCAPTCHA service and discuss key design issues. These issues include the extraction of individual word images from the scanned pages, optical character recognition (OCR) initial words classification, handling multiple users at the cloud-based service side, and usability and readability. We also show how our design addresses these issues at the implementation phase. It is worth noting that our reCAPTCHA service is designed for the Arabic language, but the underlying proposed architecture and design principles can be applied to any other language.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Revolutionizing the healthcare of the future through nanomedicine: Opportunities and challenges 通过纳米医学革新未来的医疗保健:机遇与挑战
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880025
Hadeel Elayan, R. Shubair, Nawaf I. Almoosa
Nanotechnology refers to the design, production and application of structures, devices or systems at the incredibly small scale of atoms and molecules-the "nanoscale". As a result, this technology has the potential to remarkably affect the development of the healthcare sector by revolutionizing both the diagnostic and therapeutic approach of diseases. In this paper, current advances in modern medicine are presented and discussed. Drug delivery, gene delivery, immune system support and health monitoring are demonstrated as few examples of the many applications that uses nanotechnology in disease diagnosis. In addition, the technology of bionanosensors is presented to highlight their ability to sense the biochemical and biophysical signals associated with diseases at the molecular or cellular levels. Further, nanoparticles are demonstrated as essential building blocks of nanotechnology in which various types of materials are presented and characterized. Finally, the challenges and future trends associated with this developing technology are illustrated.
纳米技术指的是在极小的原子和分子尺度上(即“纳米尺度”)设计、生产和应用结构、装置或系统。因此,这项技术有可能通过彻底改变疾病的诊断和治疗方法,显著影响医疗保健部门的发展。本文介绍和讨论了现代医学的最新进展。药物传递、基因传递、免疫系统支持和健康监测是在疾病诊断中使用纳米技术的许多应用中的几个例子。此外,介绍了生物传感器技术,以突出其在分子或细胞水平上感知与疾病相关的生化和生物物理信号的能力。此外,纳米粒子被证明是纳米技术的基本组成部分,在纳米技术中,各种类型的材料被呈现和表征。最后,说明了与该发展技术相关的挑战和未来趋势。
{"title":"Revolutionizing the healthcare of the future through nanomedicine: Opportunities and challenges","authors":"Hadeel Elayan, R. Shubair, Nawaf I. Almoosa","doi":"10.1109/INNOVATIONS.2016.7880025","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880025","url":null,"abstract":"Nanotechnology refers to the design, production and application of structures, devices or systems at the incredibly small scale of atoms and molecules-the \"nanoscale\". As a result, this technology has the potential to remarkably affect the development of the healthcare sector by revolutionizing both the diagnostic and therapeutic approach of diseases. In this paper, current advances in modern medicine are presented and discussed. Drug delivery, gene delivery, immune system support and health monitoring are demonstrated as few examples of the many applications that uses nanotechnology in disease diagnosis. In addition, the technology of bionanosensors is presented to highlight their ability to sense the biochemical and biophysical signals associated with diseases at the molecular or cellular levels. Further, nanoparticles are demonstrated as essential building blocks of nanotechnology in which various types of materials are presented and characterized. Finally, the challenges and future trends associated with this developing technology are illustrated.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Overview of ICT in the advancement of electric vehicle penetration: Overview of vehicle grid communication system and charging infrastructure and a case study of economic and environmental benefits of electric vehicles in Nebraska 信息通信技术在推进电动汽车普及中的概述:内布拉斯加州汽车电网通信系统和充电基础设施概述以及电动汽车的经济和环境效益案例研究
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880031
Alan Alahmad, A. Rayyan, Fares Al Juheshi, H. Sharif, M. Alahmad, K. Shuaib, Mohammad Abdul-Hafez, N. A. Aljuhaishi
Information and communication technology (ICT) plays a key role in our society, making management and planning easier across sectors. ICT can also help users during times of transition to promote a newer technology in an industry, such as transportation, and aid in GHG reductions by its enabling technologies. Battery electric vehicles (BEV) emit less CO2 than conventional vehicles, offering a way to lower fuel emissions. The sales of BEVs have shown a strong growth trend in the U.S., but continued use depends on effective ICT based enabling technologies to link BEVs with its environment to provide information such as real-time battery charge levels, location of nearest charging infrastructure, route options to optimize battery performance and energy price in a given area within the BEVs vehicle grid communication (VGC) infrastructure. In an effort to build BEV charging infrastructure aided by ICT enabling technologies to promote and deploy BEV, a case study is presented in which 24 BEVs and 35 Chargepoint charging stations are deployed across communities in Nebraska. Data analysis is used to gain insight into charging times, user charging habits, economic and environmental saving, information that can be used by ICT enabling technologies to optimize the user experience, smart grid operation and wide spread adoption of BEVs.
信息和通信技术(ICT)在我们的社会中发挥着关键作用,使跨部门的管理和规划更容易。信息通信技术还可以在过渡时期帮助用户在运输等行业推广新技术,并通过其使能技术帮助减少温室气体排放。纯电动汽车(BEV)比传统汽车排放更少的二氧化碳,提供了一种降低燃料排放的方法。电动汽车的销售在美国呈现出强劲的增长趋势,但持续使用取决于有效的基于ICT的使能技术,将电动汽车与环境联系起来,以提供实时电池充电水平、最近充电基础设施的位置、优化电池性能的路线选择以及给定区域内电动汽车电网通信(VGC)基础设施内的能源价格等信息。为了在信息通信技术的帮助下建立电动汽车充电基础设施,以促进和部署电动汽车,本文提出了一个案例研究,其中在内布拉斯加州的社区部署了24辆电动汽车和35个充电点充电站。数据分析用于深入了解充电时间、用户充电习惯、经济和环境节约、信息通信技术可用于优化用户体验的信息、智能电网运行和电动汽车的广泛采用。
{"title":"Overview of ICT in the advancement of electric vehicle penetration: Overview of vehicle grid communication system and charging infrastructure and a case study of economic and environmental benefits of electric vehicles in Nebraska","authors":"Alan Alahmad, A. Rayyan, Fares Al Juheshi, H. Sharif, M. Alahmad, K. Shuaib, Mohammad Abdul-Hafez, N. A. Aljuhaishi","doi":"10.1109/INNOVATIONS.2016.7880031","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880031","url":null,"abstract":"Information and communication technology (ICT) plays a key role in our society, making management and planning easier across sectors. ICT can also help users during times of transition to promote a newer technology in an industry, such as transportation, and aid in GHG reductions by its enabling technologies. Battery electric vehicles (BEV) emit less CO2 than conventional vehicles, offering a way to lower fuel emissions. The sales of BEVs have shown a strong growth trend in the U.S., but continued use depends on effective ICT based enabling technologies to link BEVs with its environment to provide information such as real-time battery charge levels, location of nearest charging infrastructure, route options to optimize battery performance and energy price in a given area within the BEVs vehicle grid communication (VGC) infrastructure. In an effort to build BEV charging infrastructure aided by ICT enabling technologies to promote and deploy BEV, a case study is presented in which 24 BEVs and 35 Chargepoint charging stations are deployed across communities in Nebraska. Data analysis is used to gain insight into charging times, user charging habits, economic and environmental saving, information that can be used by ICT enabling technologies to optimize the user experience, smart grid operation and wide spread adoption of BEVs.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132413961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Authentication enhancement techniques for BAC in 2G E-passport 2G电子护照中BAC认证增强技术
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880040
Nermeen M. Abdal-Ghafour, Ayman A. Abdel-Hamid, M. Nasr, S. Khamis
Electronic passport is one of the hottest research fields nowadays due to reported different attacks against various countries. Several attacks such as brute force attack, guessing machine readable zone's information are performed on Basic Access Control Protocol (BAC) due to its low entropy. This paper presents two proposed authentication enhancement techniques for seed key of BAC. The first proposed enhancement technique depends on a password provided by the citizen as input to the inspection system at the border during the verification process. The second proposed enhancement technique depends on extracting minutiae features from a scanned citizen's fingerprint to increase strength of seed key. Performance evaluation experiments for proposed enhancement techniques are conducted using MATLAB proving that the proposed techniques enhance authentication procedures of BAC and increase entropy of seed key with minimum additional delay. A facial recognition database and fingerprint recognition database are tested proving the strength of proposed techniques against cracking.
电子护照是当今最热门的研究领域之一,因为报道了针对不同国家的不同攻击。基于基本访问控制协议(BAC)的低熵特性,可以进行暴力攻击、猜测机读区信息等多种攻击。本文提出了两种针对BAC种子密钥的认证增强技术。第一种建议的增强技术依赖于公民在验证过程中提供的密码,作为边境检查系统的输入。第二种增强技术是通过提取被扫描公民指纹的细微特征来提高种子密钥的强度。利用MATLAB对所提出的增强技术进行了性能评估实验,证明了所提出的技术以最小的额外延迟增强了BAC的认证过程并增加了种子密钥的熵。对人脸识别数据库和指纹识别数据库进行了测试,证明了所提技术的抗破解能力。
{"title":"Authentication enhancement techniques for BAC in 2G E-passport","authors":"Nermeen M. Abdal-Ghafour, Ayman A. Abdel-Hamid, M. Nasr, S. Khamis","doi":"10.1109/INNOVATIONS.2016.7880040","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880040","url":null,"abstract":"Electronic passport is one of the hottest research fields nowadays due to reported different attacks against various countries. Several attacks such as brute force attack, guessing machine readable zone's information are performed on Basic Access Control Protocol (BAC) due to its low entropy. This paper presents two proposed authentication enhancement techniques for seed key of BAC. The first proposed enhancement technique depends on a password provided by the citizen as input to the inspection system at the border during the verification process. The second proposed enhancement technique depends on extracting minutiae features from a scanned citizen's fingerprint to increase strength of seed key. Performance evaluation experiments for proposed enhancement techniques are conducted using MATLAB proving that the proposed techniques enhance authentication procedures of BAC and increase entropy of seed key with minimum additional delay. A facial recognition database and fingerprint recognition database are tested proving the strength of proposed techniques against cracking.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Social desirability bias in software piracy research: Evidence from pilot studies 软件盗版研究中的社会期望偏差:来自试点研究的证据
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880052
M. Gergely, V. Rao
Social desirability bias (SDB) is the under-or over-reporting of behaviors by a respondent in order to appear more acceptable, or gain the approval of others. The presence of SDB in studies of software piracy behavior has been suspected for long. However, few studies have explicitly addressed this issue in detail. In the current article, results from a set of pilot studies are reported. These pilot studies compare software piracy behavior in experimental studies to responses of intentions to pirate in paper-based scenarios, under equivalent conditions. The comparisons provide valuable preliminary insights into the understanding of SDB in software piracy, and suggest the need to account for SDB research in software piracy studies.
社会期望偏差(Social desirability bias, SDB)是指被调查者为了表现得更容易被接受或获得他人的认可而低估或夸大自己的行为。长期以来,人们一直怀疑SDB在软件盗版行为研究中的存在。然而,很少有研究明确地详细讨论这个问题。在本文中,报告了一组试点研究的结果。这些试点研究将实验研究中的软件盗版行为与同等条件下基于纸张的场景中的盗版意图反应进行了比较。这些比较为理解软件盗版中的SDB提供了有价值的初步见解,并建议在软件盗版研究中考虑SDB研究的必要性。
{"title":"Social desirability bias in software piracy research: Evidence from pilot studies","authors":"M. Gergely, V. Rao","doi":"10.1109/INNOVATIONS.2016.7880052","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880052","url":null,"abstract":"Social desirability bias (SDB) is the under-or over-reporting of behaviors by a respondent in order to appear more acceptable, or gain the approval of others. The presence of SDB in studies of software piracy behavior has been suspected for long. However, few studies have explicitly addressed this issue in detail. In the current article, results from a set of pilot studies are reported. These pilot studies compare software piracy behavior in experimental studies to responses of intentions to pirate in paper-based scenarios, under equivalent conditions. The comparisons provide valuable preliminary insights into the understanding of SDB in software piracy, and suggest the need to account for SDB research in software piracy studies.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Challenges and opportunities for underwater sensor networks 水下传感器网络的挑战与机遇
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880021
A. Sheikh, Emad A. Felemban, Muhamad Felemban, Saad B. Qaisar
Wireless sensor networks (WSN) are distributed event-based systems comprising of tiny nodes capable of sensing the environmental phenomena with a limited battery, low pro­cessing power and short-range radio for communication. Most of the applications of sensor network are concerned with sensing scalar sensor such as temperature, pressure, humidity, or location of objects that can be conveyed through low-bandwidth and delay-tolerant data streams. More than a decade's research has matured communication protocols, sensor technology, bandwidth, energy efficiency and lifetime of traditional WSNs. The recent interest in underwater wireless sensor networks (UWSN) has resulted in various technological advances in the domain as well however, these advances have faced many challenges that are not seen in traditional WSNs. This paper discusses the technical challenges and available technologies that can be used to establish an underwater sensor network solution for applications such as monitoring of coral reefs.
无线传感器网络(WSN)是一种基于事件的分布式系统,由能够感知环境现象的微小节点组成,使用有限的电池,低处理功率和短距离无线电进行通信。传感器网络的大多数应用都与传感标量传感器有关,例如温度、压力、湿度或物体的位置,这些传感器可以通过低带宽和容忍延迟的数据流传输。经过十多年的研究,传统无线传感器网络的通信协议、传感器技术、带宽、能效和寿命等方面已经趋于成熟。近年来,人们对水下无线传感器网络(UWSN)的兴趣导致了该领域的各种技术进步,然而,这些进步也面临着传统无线传感器网络所没有的许多挑战。本文讨论了可用于建立水下传感器网络解决方案的技术挑战和可用技术,用于监测珊瑚礁等应用。
{"title":"Challenges and opportunities for underwater sensor networks","authors":"A. Sheikh, Emad A. Felemban, Muhamad Felemban, Saad B. Qaisar","doi":"10.1109/INNOVATIONS.2016.7880021","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880021","url":null,"abstract":"Wireless sensor networks (WSN) are distributed event-based systems comprising of tiny nodes capable of sensing the environmental phenomena with a limited battery, low pro­cessing power and short-range radio for communication. Most of the applications of sensor network are concerned with sensing scalar sensor such as temperature, pressure, humidity, or location of objects that can be conveyed through low-bandwidth and delay-tolerant data streams. More than a decade's research has matured communication protocols, sensor technology, bandwidth, energy efficiency and lifetime of traditional WSNs. The recent interest in underwater wireless sensor networks (UWSN) has resulted in various technological advances in the domain as well however, these advances have faced many challenges that are not seen in traditional WSNs. This paper discusses the technical challenges and available technologies that can be used to establish an underwater sensor network solution for applications such as monitoring of coral reefs.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Watermarking for protected fingerprint authentication 用于受保护指纹认证的水印
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880039
Naima Bousnina, S. Ghouzali, M. Lafkih, Ohoud Nafea, M. Mikram, Wadood Abdul, D. Aboutajdine
This paper presents a spatial biometric watermarking scheme for multimodal authentication system. This method embeds the face features (watermark) into the fingerprint image (cover) via a generated secret key to locate the pixels to be watermarked while preserving the fingerprint minutia points. The face features are extracted using Orthogonal Locality Preserving Projections technique. The proposed scheme has the advantage that in addition to fingerprint matching, the recovered watermark during the decoding can be used to establish the authenticity of the fingerprint and the user. The experimental results obtained using the ORL face database and FVC2002 DB2 fingerprint database have showed that the fingerprint-face based multimodal authentication system has good performance accuracy.
提出了一种用于多模态认证系统的空间生物特征水印方案。该方法通过生成密钥将人脸特征(水印)嵌入到指纹图像(封面)中,在保留指纹细节点的同时定位待水印的像素点。采用正交局域保持投影技术提取人脸特征。该方案的优点是除了指纹匹配之外,解码过程中恢复的水印还可以用来建立指纹和用户的真实性。使用ORL人脸数据库和FVC2002 DB2指纹数据库进行的实验结果表明,基于指纹-人脸的多模态认证系统具有良好的性能准确性。
{"title":"Watermarking for protected fingerprint authentication","authors":"Naima Bousnina, S. Ghouzali, M. Lafkih, Ohoud Nafea, M. Mikram, Wadood Abdul, D. Aboutajdine","doi":"10.1109/INNOVATIONS.2016.7880039","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880039","url":null,"abstract":"This paper presents a spatial biometric watermarking scheme for multimodal authentication system. This method embeds the face features (watermark) into the fingerprint image (cover) via a generated secret key to locate the pixels to be watermarked while preserving the fingerprint minutia points. The face features are extracted using Orthogonal Locality Preserving Projections technique. The proposed scheme has the advantage that in addition to fingerprint matching, the recovered watermark during the decoding can be used to establish the authenticity of the fingerprint and the user. The experimental results obtained using the ORL face database and FVC2002 DB2 fingerprint database have showed that the fingerprint-face based multimodal authentication system has good performance accuracy.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130725848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lightweight encryption algorithm in wireless body area network for e-health monitoring 面向电子健康监测的无线体域网络轻量级加密算法
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880042
Azza Zayed Alshamsi, E. Barka, M. Serhani
There is an increase in the diseases of the circulatory system in United Arab Emirates, which makes it the first leading cause of death. Therefore, there is a high demand for a continuous care that can be achieved by adopting an emerging technology of e-Health monitoring systems using Wireless Body Area Network (WBAN) that can collect patient's data. Since patient's data is private that makes securing the WBAN is essential. In this paper there is a proposed design architecture to secure data transmission from WBAN sensor to mobile in e-Health monitoring system by encrypting the vital signs of a patient using Lightweight Encryption Algorithm (LEA).
阿拉伯联合酋长国的循环系统疾病有所增加,使其成为第一大死亡原因。因此,通过采用可收集患者数据的无线体域网络(WBAN)电子健康监测系统的新兴技术,对持续护理的需求很高。由于患者的数据是私人的,因此确保无线宽带网络的安全至关重要。本文提出了一种采用轻量级加密算法(LEA)对患者生命体征进行加密的设计架构,以保证电子健康监测系统中WBAN传感器到移动设备的数据传输安全。
{"title":"Lightweight encryption algorithm in wireless body area network for e-health monitoring","authors":"Azza Zayed Alshamsi, E. Barka, M. Serhani","doi":"10.1109/INNOVATIONS.2016.7880042","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880042","url":null,"abstract":"There is an increase in the diseases of the circulatory system in United Arab Emirates, which makes it the first leading cause of death. Therefore, there is a high demand for a continuous care that can be achieved by adopting an emerging technology of e-Health monitoring systems using Wireless Body Area Network (WBAN) that can collect patient's data. Since patient's data is private that makes securing the WBAN is essential. In this paper there is a proposed design architecture to secure data transmission from WBAN sensor to mobile in e-Health monitoring system by encrypting the vital signs of a patient using Lightweight Encryption Algorithm (LEA).","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Review of personalized language learning systems 个性化语言学习系统的回顾
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880051
Heba M. Ismail, S. Harous, B. Belkhouche
This study reviews published scientific literature on personalized language learning systems. The focus is threefold: 1) present a review and categorization framework that can be used to analyze and classify personalized language learning systems, 2) analyze recent work in personalized language learning systems and organize them under the proposed framework, 3) identify current trends, challenges and open research questions in the field. Our review led us to propose a review and classification scheme with two dimensions each with a few sub-elements: language learning dimension and technical dimension. The reviewed articles indicate that recent language personalization systems increasingly introduce Artificial Intelligence and focus on cognitive-based personalization. Findings also suggest that language personalization systems may improve by incorporating more complex adaptive learner's model and more complex contextual language learning tasks.
本研究回顾了已发表的关于个性化语言学习系统的科学文献。重点是三个方面:1)提出一个可用于分析和分类个性化语言学习系统的审查和分类框架,2)分析个性化语言学习系统的最新工作并在提议的框架下组织它们,3)确定当前趋势,挑战和开放的研究问题。我们的回顾使我们提出了一个回顾和分类方案,每个维度都有几个子元素:语言学习维度和技术维度。综述表明,最近的语言个性化系统越来越多地引入人工智能,并侧重于基于认知的个性化。研究结果还表明,结合更复杂的适应性学习者模型和更复杂的上下文语言学习任务,语言个性化系统可能会得到改善。
{"title":"Review of personalized language learning systems","authors":"Heba M. Ismail, S. Harous, B. Belkhouche","doi":"10.1109/INNOVATIONS.2016.7880051","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880051","url":null,"abstract":"This study reviews published scientific literature on personalized language learning systems. The focus is threefold: 1) present a review and categorization framework that can be used to analyze and classify personalized language learning systems, 2) analyze recent work in personalized language learning systems and organize them under the proposed framework, 3) identify current trends, challenges and open research questions in the field. Our review led us to propose a review and classification scheme with two dimensions each with a few sub-elements: language learning dimension and technical dimension. The reviewed articles indicate that recent language personalization systems increasingly introduce Artificial Intelligence and focus on cognitive-based personalization. Findings also suggest that language personalization systems may improve by incorporating more complex adaptive learner's model and more complex contextual language learning tasks.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Identifying roles of fishing ports using multi-source data aggregation 使用多源数据聚合识别渔港角色
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880043
W. W. Hsu, Hao-Hsun Wang, Min-Ruey You, Minjaro Lu, Hsin-Yu Tsai
Managing and maintaining fishing ports is crucial for fishing activities. With the lack of budget and labor force, some fishing ports face the brink of being shut down. A first choice for demolishing would be fishing ports with low utilization, but this does not mean the port is totally useless. When severe weather condition, i.e., typhoons, is in the proximity of the coastal line, offshore fishing vessels will return to dock in ports for safety. When major ports are fully docked, some of the minor ports or less active ports will be chosen as the haven. These ports are seldom used and lowly utilized, but should still be maintained for safety issues as they serve as a sanctuary for extreme weather conditions. This research uses big data aggregation approach to identify haven ports by processing fishing vessel states using collected voy­age data recorder (VDR) records and correlates this information with the typhoon information data source.
管理和维护渔港对渔业活动至关重要。由于缺乏预算和劳动力,一些渔港面临关闭的边缘。拆除的首选是利用率低的渔港,但这并不意味着港口完全无用。当恶劣天气(例如台风)接近海岸线时,远洋渔船会返回港口停靠,以确保安全。当主要港口完全靠岸时,将选择一些次要港口或不太活跃的港口作为避风港。这些港口很少使用,利用率也很低,但出于安全考虑,仍应保留,因为它们是极端天气条件下的避难所。本研究采用大数据聚合的方法,利用收集到的航次数据记录仪(VDR)记录对渔船状态进行处理,从而识别避风港口,并将这些信息与台风信息数据源相关联。
{"title":"Identifying roles of fishing ports using multi-source data aggregation","authors":"W. W. Hsu, Hao-Hsun Wang, Min-Ruey You, Minjaro Lu, Hsin-Yu Tsai","doi":"10.1109/INNOVATIONS.2016.7880043","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880043","url":null,"abstract":"Managing and maintaining fishing ports is crucial for fishing activities. With the lack of budget and labor force, some fishing ports face the brink of being shut down. A first choice for demolishing would be fishing ports with low utilization, but this does not mean the port is totally useless. When severe weather condition, i.e., typhoons, is in the proximity of the coastal line, offshore fishing vessels will return to dock in ports for safety. When major ports are fully docked, some of the minor ports or less active ports will be chosen as the haven. These ports are seldom used and lowly utilized, but should still be maintained for safety issues as they serve as a sanctuary for extreme weather conditions. This research uses big data aggregation approach to identify haven ports by processing fishing vessel states using collected voy­age data recorder (VDR) records and correlates this information with the typhoon information data source.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 12th International Conference on Innovations in Information Technology (IIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1