首页 > 最新文献

2016 12th International Conference on Innovations in Information Technology (IIT)最新文献

英文 中文
From the Internet of Things to the web of things — enabling by sensing as-a service 从物联网到物联网——通过感知即服务实现
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880055
S. Mathew, Yacine Atif, M. Barachi
Sensing as a Service (SenaaS) is emerging as a prominent element in the middleware linking together the Internet of Things (IoT) and the Web of Things (WoT) layers of future ubiquitous systems. An architecture framework is discussed in this paper whereby things are abstracted into services via embedded sensors which expose a thing as a service. The architecture acts as a blueprint to guide software architects realizing WoT applications. Web-enabled things are eventually appended into Web platforms such as Social Web platforms to drive data and services that are exposed by these things to interact with both other things and people, in order to materialize further the future social Web of Things. Research directions are discussed to illustrate the integration of SenaaS into the proposed WoT architectural framework.
传感即服务(SenaaS)正在成为连接未来无处不在系统的物联网(IoT)和物联网(WoT)层的中间件中的重要元素。本文讨论了一个架构框架,通过嵌入式传感器将事物抽象为服务,并将其作为服务公开。该体系结构作为指导软件架构师实现WoT应用程序的蓝图。支持Web的事物最终会被附加到Web平台(如社交Web平台)中,以驱动这些事物所暴露的数据和服务与其他事物和人进行交互,从而进一步实现未来的社交物联网。讨论了将SenaaS集成到拟议的WoT架构框架中的研究方向。
{"title":"From the Internet of Things to the web of things — enabling by sensing as-a service","authors":"S. Mathew, Yacine Atif, M. Barachi","doi":"10.1109/INNOVATIONS.2016.7880055","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880055","url":null,"abstract":"Sensing as a Service (SenaaS) is emerging as a prominent element in the middleware linking together the Internet of Things (IoT) and the Web of Things (WoT) layers of future ubiquitous systems. An architecture framework is discussed in this paper whereby things are abstracted into services via embedded sensors which expose a thing as a service. The architecture acts as a blueprint to guide software architects realizing WoT applications. Web-enabled things are eventually appended into Web platforms such as Social Web platforms to drive data and services that are exposed by these things to interact with both other things and people, in order to materialize further the future social Web of Things. Research directions are discussed to illustrate the integration of SenaaS into the proposed WoT architectural framework.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128143004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Overview of fingerprinting methods for local text reuse detection 本地文本重用检测的指纹方法概述
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880050
Leena Lulu, B. Belkhouche, S. Harous
We overview several local text reuse detection methods based on fingerprinting techniques. We first define the context of local text reuse and situate it within the general spectrum of information retrieval in order to pinpoint its particular applicability and challenges. After a brief description of the major text reuse detection approaches, we introduce the general principles of fingerprinting algorithms from an information retrieval perspective. Three classes of fingerprinting methods (overlap, non-overlap, and randomized) are surveyed. Specific algorithms, such as k-gram, winnowing, hailstorm, DCT and hash-breaking, are described. The performance and characteristics of these algorithms are summarized based on data from the literature.
本文综述了几种基于指纹技术的本地文本重用检测方法。我们首先定义了本地文本重用的上下文,并将其置于信息检索的一般范围内,以便确定其特定的适用性和挑战。在简要描述了主要的文本重用检测方法之后,我们从信息检索的角度介绍了指纹识别算法的一般原理。调查了三种类型的指纹识别方法(重叠、非重叠和随机)。具体的算法,如k-gram,簸扬,冰雹,DCT和哈希分解,描述。根据文献数据对这些算法的性能和特点进行了总结。
{"title":"Overview of fingerprinting methods for local text reuse detection","authors":"Leena Lulu, B. Belkhouche, S. Harous","doi":"10.1109/INNOVATIONS.2016.7880050","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880050","url":null,"abstract":"We overview several local text reuse detection methods based on fingerprinting techniques. We first define the context of local text reuse and situate it within the general spectrum of information retrieval in order to pinpoint its particular applicability and challenges. After a brief description of the major text reuse detection approaches, we introduce the general principles of fingerprinting algorithms from an information retrieval perspective. Three classes of fingerprinting methods (overlap, non-overlap, and randomized) are surveyed. Specific algorithms, such as k-gram, winnowing, hailstorm, DCT and hash-breaking, are described. The performance and characteristics of these algorithms are summarized based on data from the literature.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125865516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A reconfigurable cylindrical dielectric resonator antenna for WiMAX/WLAN applications 用于WiMAX/WLAN应用的可重构圆柱形介电谐振器天线
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880018
Massinissa Belazzoug, Salih Aidel, I. Messaoudene, B. Hammache, Farouk Chetouah, Youcef Braham Chaouche
The main objective of the present study is to achieve the reconfigurability of a cylindrical dielectric resonator antenna (CDRA). The CDRA is excited with two different modes; the HEMjjg mode is excited via an aperture etched on the ground under the center of the CDRA, where the TM01δ mode is excited from an etched slot under the side of the CDRA, the reconflgurabilty is realized using two PIN diodes. Two different cases of PIN diode (D1-ON/D2-OFF and vice versa) are investigated and analyzed. The proposed cylindrical dielectric resonator antenna (CDRA) can provides two bands around 3.77 GHz and 5.5 GHz with a reflection coefficient below than −10dB which is appropriate for WiMAX and WLAN applications, respectively. The antenna gain is stable in the two bands 3.77GHz/5.5GHz with 3.8 dBi and 4.43dBi, respectively. The simulation is performed using two simulators; the CST Microwave Studio and the HFSS Ansoft package.
本研究的主要目的是实现圆柱形介质谐振器天线的可重构性。CDRA有两种不同的激励模式;HEMjjg模式通过CDRA中心下方的蚀刻孔激发,TM01δ模式从CDRA侧面的蚀刻槽激发,通过两个PIN二极管实现可再聚性。对两种不同的PIN二极管(D1-ON/D2-OFF,反之亦然)进行了研究和分析。所提出的圆柱形介质谐振器天线(CDRA)可以提供3.77 GHz和5.5 GHz两个频段,反射系数低于- 10dB,分别适用于WiMAX和WLAN应用。天线增益在3.77GHz/5.5GHz两个频段稳定,分别为3.8 dBi和4.43dBi。采用两个模拟器进行仿真;CST Microwave Studio和HFSS Ansoft软件包。
{"title":"A reconfigurable cylindrical dielectric resonator antenna for WiMAX/WLAN applications","authors":"Massinissa Belazzoug, Salih Aidel, I. Messaoudene, B. Hammache, Farouk Chetouah, Youcef Braham Chaouche","doi":"10.1109/INNOVATIONS.2016.7880018","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880018","url":null,"abstract":"The main objective of the present study is to achieve the reconfigurability of a cylindrical dielectric resonator antenna (CDRA). The CDRA is excited with two different modes; the HEMjjg mode is excited via an aperture etched on the ground under the center of the CDRA, where the TM01δ mode is excited from an etched slot under the side of the CDRA, the reconflgurabilty is realized using two PIN diodes. Two different cases of PIN diode (D1-ON/D2-OFF and vice versa) are investigated and analyzed. The proposed cylindrical dielectric resonator antenna (CDRA) can provides two bands around 3.77 GHz and 5.5 GHz with a reflection coefficient below than −10dB which is appropriate for WiMAX and WLAN applications, respectively. The antenna gain is stable in the two bands 3.77GHz/5.5GHz with 3.8 dBi and 4.43dBi, respectively. The simulation is performed using two simulators; the CST Microwave Studio and the HFSS Ansoft package.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Capstone project on speech morphing: A highlight to undergraduate education on signal processing 语音变形的顶点项目:信号处理本科教育的一个亮点
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880024
L. Weruaga, Abdulqader Mahmoud, R. Shubair
Signal processing is a core discipline in electrical and computer engineering (ECE). The mathematical language adopted in the classroom and the laboratory support, usually limited to verification, pose the risk of hiding the enormous practical connotations of the discipline. This paper suggests to strengthen the bridge between theory and practice by means of selected capstone projects, designed according to constructivist principles. The project detailed in this paper tackles a large number of fundamental aspects of the discipline through a storyline that captivates the student during its execution.
信号处理是电子与计算机工程(ECE)中的一门核心学科。课堂上采用的数学语言和实验室支持通常仅限于验证,这可能会隐藏该学科的巨大实践内涵。本文建议通过选择符合建构主义原则的顶点项目,加强理论与实践之间的桥梁。本文详细介绍的项目通过一个故事情节处理了该学科的大量基本方面,在执行过程中吸引了学生。
{"title":"Capstone project on speech morphing: A highlight to undergraduate education on signal processing","authors":"L. Weruaga, Abdulqader Mahmoud, R. Shubair","doi":"10.1109/INNOVATIONS.2016.7880024","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880024","url":null,"abstract":"Signal processing is a core discipline in electrical and computer engineering (ECE). The mathematical language adopted in the classroom and the laboratory support, usually limited to verification, pose the risk of hiding the enormous practical connotations of the discipline. This paper suggests to strengthen the bridge between theory and practice by means of selected capstone projects, designed according to constructivist principles. The project detailed in this paper tackles a large number of fundamental aspects of the discipline through a storyline that captivates the student during its execution.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123354852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic enterprise service bus for cultural heritage 面向文化遗产的语义企业服务总线
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880044
A. Capodieci, L. Mainetti, S. Carrozzo
The problem of data flooding is becoming more and more important, and it is necessary to find a way to access relevant information and to collect information and data from different data sources. In the field of cultural heritage, users need to be able to find and extract information from databases of specific contexts (paintings, inscriptions, churches, old coins, etc.). The problem is that each of these databases has a different data model. A project created to solve this problem is Europeana, which aims to bring together data from different providers (museums, libraries or other entities) in a single dataset. This paper aims to propose an architecture for a heterogeneous data sources system for the integration of structured/semi-structured data sources, enabling the information content to be more accessible and searchable for users. The data integration model proposed in this paper aims to exploit the method of "schema matching", using ontology-based data integration techniques by automating the integration process.
数据泛滥的问题变得越来越重要,有必要找到一种获取相关信息的方法,并从不同的数据源中收集信息和数据。在文化遗产领域,用户需要能够从特定语境(绘画、碑文、教堂、古钱币等)的数据库中查找和提取信息。问题是这些数据库中的每一个都有不同的数据模型。为解决这个问题而创建的一个项目是Europeana,它旨在将来自不同提供者(博物馆、图书馆或其他实体)的数据汇集到一个数据集中。本文旨在提出一种异构数据源系统的体系结构,实现结构化/半结构化数据源的集成,使信息内容更易于用户访问和搜索。本文提出的数据集成模型旨在利用“模式匹配”的方法,采用基于本体的数据集成技术,实现集成过程的自动化。
{"title":"Semantic enterprise service bus for cultural heritage","authors":"A. Capodieci, L. Mainetti, S. Carrozzo","doi":"10.1109/INNOVATIONS.2016.7880044","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880044","url":null,"abstract":"The problem of data flooding is becoming more and more important, and it is necessary to find a way to access relevant information and to collect information and data from different data sources. In the field of cultural heritage, users need to be able to find and extract information from databases of specific contexts (paintings, inscriptions, churches, old coins, etc.). The problem is that each of these databases has a different data model. A project created to solve this problem is Europeana, which aims to bring together data from different providers (museums, libraries or other entities) in a single dataset. This paper aims to propose an architecture for a heterogeneous data sources system for the integration of structured/semi-structured data sources, enabling the information content to be more accessible and searchable for users. The data integration model proposed in this paper aims to exploit the method of \"schema matching\", using ontology-based data integration techniques by automating the integration process.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IEFP: An application layer protocol for Islamic electronic fatawa management and security IEFP:用于伊斯兰电子法令管理和安全的应用层协议
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880037
E. Taqieddin, Yarub A. Wahsheh
With the unfortunate increase of terrorist attacks and the attempts to tarnish the real image of Islam, irresponsible Islamic legal decisions (Fatwas) are used to mislead some Muslims and Non-Muslims to make incorrect conclusions. The widespread of communication technologies opens a huge challenge of E-Fatawa management. In this study, we present a novel application layer protocol for electronic Fatwas to meet the need for management rules to prevent irresponsible Fatwas. We propose a global structure for E-Fatawa with security services that guarantee, Mufti authentication, data integrity and non-repudiation. A proof of concept implementation shows that the protocol is easy to implement, feasible in terms of delay and key management, and protocol messages are flexible to be encoded in other application layer protocols.
随着恐怖袭击事件的不幸增加和抹黑伊斯兰真实形象的企图,不负责任的伊斯兰法律判决(Fatwas)被用来误导一些穆斯林和非穆斯林做出错误的结论。通信技术的普及给E-Fatawa的管理带来了巨大的挑战。在本研究中,我们提出了一种新的电子Fatwas应用层协议,以满足管理规则的需要,以防止不负责任的Fatwas。我们为E-Fatawa提出了一个具有安全服务保证的全球结构,Mufti认证,数据完整性和不可否认性。概念验证实现表明,该协议易于实现,在延迟和密钥管理方面可行,并且协议消息可以灵活地编码到其他应用层协议中。
{"title":"IEFP: An application layer protocol for Islamic electronic fatawa management and security","authors":"E. Taqieddin, Yarub A. Wahsheh","doi":"10.1109/INNOVATIONS.2016.7880037","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880037","url":null,"abstract":"With the unfortunate increase of terrorist attacks and the attempts to tarnish the real image of Islam, irresponsible Islamic legal decisions (Fatwas) are used to mislead some Muslims and Non-Muslims to make incorrect conclusions. The widespread of communication technologies opens a huge challenge of E-Fatawa management. In this study, we present a novel application layer protocol for electronic Fatwas to meet the need for management rules to prevent irresponsible Fatwas. We propose a global structure for E-Fatawa with security services that guarantee, Mufti authentication, data integrity and non-repudiation. A proof of concept implementation shows that the protocol is easy to implement, feasible in terms of delay and key management, and protocol messages are flexible to be encoded in other application layer protocols.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure kNN queries over outsourced spatial data for location-based services 基于位置服务的外包空间数据的安全kNN查询
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880038
Ayesha M. Talha, I. Kamel, Z. Aghbari
Cloud computing allows data owners to outsource their databases, eliminating the need for costly storage and computational resources. The key is to maintain data confidentiality with respect to third-party service providers along with providing query results in real-time to authorized users. In this paper, a transformation and encryption approach is proposed for spatial databases, where the service provider executes queries and returns results to the users. First, the approach uses the space-filling Hilbert curve to map each spatial point in the multidimensional space to a one-dimensional space. Next, the order-preserving encryption technique is applied to the transformed spatial data. The user issues spatial kNN queries to the service provider based on the Hilbert values and then uses the encryption key to decrypt the query response returned. Experiments are conducted to show that this approach reduces the query communication cost between the authorized user and the service provider.
云计算允许数据所有者将其数据库外包,从而消除了对昂贵的存储和计算资源的需求。关键是要维护第三方服务提供商的数据机密性,同时向授权用户实时提供查询结果。本文提出了一种空间数据库的转换和加密方法,其中服务提供者执行查询并将结果返回给用户。首先,该方法利用空间填充希尔伯特曲线将多维空间中的每个空间点映射到一维空间。其次,将保序加密技术应用于变换后的空间数据。用户根据Hilbert值向服务提供者发出空间kNN查询,然后使用加密密钥对返回的查询响应进行解密。实验结果表明,该方法降低了授权用户与服务提供者之间的查询通信成本。
{"title":"Secure kNN queries over outsourced spatial data for location-based services","authors":"Ayesha M. Talha, I. Kamel, Z. Aghbari","doi":"10.1109/INNOVATIONS.2016.7880038","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880038","url":null,"abstract":"Cloud computing allows data owners to outsource their databases, eliminating the need for costly storage and computational resources. The key is to maintain data confidentiality with respect to third-party service providers along with providing query results in real-time to authorized users. In this paper, a transformation and encryption approach is proposed for spatial databases, where the service provider executes queries and returns results to the users. First, the approach uses the space-filling Hilbert curve to map each spatial point in the multidimensional space to a one-dimensional space. Next, the order-preserving encryption technique is applied to the transformed spatial data. The user issues spatial kNN queries to the service provider based on the Hilbert values and then uses the encryption key to decrypt the query response returned. Experiments are conducted to show that this approach reduces the query communication cost between the authorized user and the service provider.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130748673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A framework for building undergraduate student research skills through an independent engineering study course 通过独立的工程学习课程培养本科生研究技能的框架
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880026
R. Shubair, Hadeel Elayan, M. AlHajri, A. Goian
This paper presents a framework for the undergraduate research experience that Electrical and Computer Engineering (ECE) Senior Undergraduate students at Khalifa University, UAE pursue through a fourth-year technical elective course entitled Independent Study that is one-semester long. This course is an excellent example of self-directed learning as one of the most influential educational experiences that students might get involved in. Through this Independent Study course, the student has the opportunity to work individually and independently on an engineering research project, at an undergraduate level, under the supervision of an ECE faculty member. The faculty member acts as the research project academic supervisor. He provides guidance, gives technical advice, helps in setting milestone, defines a road-map, agrees on deliverables, verifies the objectives are met and outcomes are achieved, and finally evaluates the student performance upon the completion of the Independent Study project, by the end of the semester. The successful delivery of the Independent Engineering Study course at the undergraduate level is demonstrated through two real case studies, which involved state-of-the-art research on two prominent topics: "In Vivo Wireless Body Communication" and "Novel Localization Methods in Wireless Sensor Networks".
本文介绍了阿联酋哈利法大学电气与计算机工程(ECE)大四本科生通过一学期的四年制技术选修课程“独立研究”进行本科研究经验的框架。这门课程是自主学习的一个很好的例子,是学生可能参与的最有影响力的教育经历之一。通过这门独立学习课程,学生有机会在欧洲经委会教员的监督下,在本科阶段独立地从事工程研究项目。教员担任研究项目学术指导。他提供指导,提供技术建议,帮助设定里程碑,定义路线图,同意可交付成果,验证目标的实现和结果的实现,并在学期结束时评估学生完成独立研究项目的表现。独立工程研究课程在本科阶段的成功交付是通过两个真实的案例研究来展示的,这两个案例研究涉及了两个突出主题的最新研究:“体内无线身体通信”和“无线传感器网络中的新型定位方法”。
{"title":"A framework for building undergraduate student research skills through an independent engineering study course","authors":"R. Shubair, Hadeel Elayan, M. AlHajri, A. Goian","doi":"10.1109/INNOVATIONS.2016.7880026","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880026","url":null,"abstract":"This paper presents a framework for the undergraduate research experience that Electrical and Computer Engineering (ECE) Senior Undergraduate students at Khalifa University, UAE pursue through a fourth-year technical elective course entitled Independent Study that is one-semester long. This course is an excellent example of self-directed learning as one of the most influential educational experiences that students might get involved in. Through this Independent Study course, the student has the opportunity to work individually and independently on an engineering research project, at an undergraduate level, under the supervision of an ECE faculty member. The faculty member acts as the research project academic supervisor. He provides guidance, gives technical advice, helps in setting milestone, defines a road-map, agrees on deliverables, verifies the objectives are met and outcomes are achieved, and finally evaluates the student performance upon the completion of the Independent Study project, by the end of the semester. The successful delivery of the Independent Engineering Study course at the undergraduate level is demonstrated through two real case studies, which involved state-of-the-art research on two prominent topics: \"In Vivo Wireless Body Communication\" and \"Novel Localization Methods in Wireless Sensor Networks\".","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facial features monitoring for real time drowsiness detection 面部特征监测实时睡意检测
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880030
B. Manu
This paper describes an efficient method for drowsiness detection by three well defined phases. These three phases are facial features detection using Viola Jones, the eye tracking and yawning detection. Once the face is detected, the system is made illumination invariant by segmenting the skin part alone and considering only the chromatic components to reject most of the non face image backgrounds based on skin color. The tracking of eyes and yawning detection are done by correlation coefficient template matching. The feature vectors from each of the above phases are concatenated and a binary linear support vector machine classifier is used to classify the consecutive frames into fatigue and nonfatigue states and sound an alarm for the former, if it is above the threshold time. Extensive real time experiments prove that the proposed method is highly efficient in finding the drowsiness and alerting the driver.
本文描述了一种通过三个明确的阶段来检测睡意的有效方法。这三个阶段分别是面部特征检测使用维奥拉·琼斯,眼动追踪和打哈欠检测。一旦检测到人脸,该系统通过单独分割皮肤部分,只考虑颜色分量,从而根据肤色拒绝大部分非人脸图像背景,从而实现光照不变性。通过相关系数模板匹配实现眼睛跟踪和哈欠检测。将上述每个阶段的特征向量进行连接,并使用二元线性支持向量机分类器将连续帧分为疲劳和非疲劳状态,如果超过阈值时间,则对前者发出警报。大量的实时实验证明,该方法能够有效地发现驾驶员的困倦状态并提醒驾驶员。
{"title":"Facial features monitoring for real time drowsiness detection","authors":"B. Manu","doi":"10.1109/INNOVATIONS.2016.7880030","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880030","url":null,"abstract":"This paper describes an efficient method for drowsiness detection by three well defined phases. These three phases are facial features detection using Viola Jones, the eye tracking and yawning detection. Once the face is detected, the system is made illumination invariant by segmenting the skin part alone and considering only the chromatic components to reject most of the non face image backgrounds based on skin color. The tracking of eyes and yawning detection are done by correlation coefficient template matching. The feature vectors from each of the above phases are concatenated and a binary linear support vector machine classifier is used to classify the consecutive frames into fatigue and nonfatigue states and sound an alarm for the former, if it is above the threshold time. Extensive real time experiments prove that the proposed method is highly efficient in finding the drowsiness and alerting the driver.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"19 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
New model of emergency communication for disaster relief in remote areas 偏远地区救灾应急通信新模式
Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880019
A. E. Aburawi, S. Salic, M. Krampell
Even in the 21st century, modern communication technology is still affected by natural disasters and political turmoil which threaten people's lives and make the Internet or mobile phone networks unavailable for use. This work is based on constructive research which resulted in a proof of concept system that uses shortwave radio technology to provide a oneway communication system. A message that a user writes on their smartphone, which is connected to a small preset transmitter, is sent out to a receiver in another part of the world where the message can then be posted on the Internet. This system is a cheaper alternative to other shortwave radio transmitters, and has potential for improvement.
即使在21世纪,现代通信技术仍然受到自然灾害和政治动荡的影响,威胁着人们的生命,使互联网或移动电话网络无法使用。这项工作是基于建设性的研究,结果是一个概念验证系统,使用短波无线电技术提供单向通信系统。用户在智能手机上写的信息与一个小型预设发射器相连,然后被发送到世界另一端的接收器,然后该信息可以在互联网上发布。与其他短波无线电发射机相比,该系统是一种更便宜的选择,并且有改进的潜力。
{"title":"New model of emergency communication for disaster relief in remote areas","authors":"A. E. Aburawi, S. Salic, M. Krampell","doi":"10.1109/INNOVATIONS.2016.7880019","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880019","url":null,"abstract":"Even in the 21st century, modern communication technology is still affected by natural disasters and political turmoil which threaten people's lives and make the Internet or mobile phone networks unavailable for use. This work is based on constructive research which resulted in a proof of concept system that uses shortwave radio technology to provide a oneway communication system. A message that a user writes on their smartphone, which is connected to a small preset transmitter, is sent out to a receiver in another part of the world where the message can then be posted on the Internet. This system is a cheaper alternative to other shortwave radio transmitters, and has potential for improvement.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 12th International Conference on Innovations in Information Technology (IIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1