首页 > 最新文献

2013 International Conference on IT Convergence and Security (ICITCS)最新文献

英文 中文
Attribute Relationship Evaluation Methodology for Big Data Security 大数据安全属性关系评价方法
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717808
Sung-Hwan Kim, Namuk Kim, Tai-Myung Chung
There has been an increasing interest in big data and big data security with the development of network technology and cloud computing. However, big data is not an entirely new technology but an extension of data mining. In this paper, we describe the background of big data, data mining and big data features, and propose attribute selection methodology for protecting the value of big data. Extracting valuable information is the main goal of analyzing big data which need to be protected. Therefore, relevance between attributes of a dataset is a very important element for big data analysis. We focus on two things. Firstly, attribute relevance in big data is a key element for extracting information. In this perspective, we studied on how to secure a big data through protecting valuable information inside. Secondly, it is impossible to protect all big data and its attributes. We consider big data as a single object which has its own attributes. We assume that a attribute which have a higher relevance is more important than other attributes.
随着网络技术和云计算的发展,人们对大数据和大数据安全越来越感兴趣。然而,大数据并不是一项全新的技术,而是数据挖掘的延伸。本文阐述了大数据产生的背景、数据挖掘和大数据的特征,提出了保护大数据价值的属性选择方法。提取有价值的信息是分析需要保护的大数据的主要目标。因此,数据集属性之间的相关性是大数据分析的一个非常重要的元素。我们关注两件事。首先,大数据中的属性相关性是提取信息的关键要素。从这个角度出发,我们研究了如何通过保护内部有价值的信息来保护大数据。其次,保护所有大数据及其属性是不可能的。我们认为大数据是一个单一的对象,它有自己的属性。我们假设相关性较高的属性比其他属性更重要。
{"title":"Attribute Relationship Evaluation Methodology for Big Data Security","authors":"Sung-Hwan Kim, Namuk Kim, Tai-Myung Chung","doi":"10.1109/ICITCS.2013.6717808","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717808","url":null,"abstract":"There has been an increasing interest in big data and big data security with the development of network technology and cloud computing. However, big data is not an entirely new technology but an extension of data mining. In this paper, we describe the background of big data, data mining and big data features, and propose attribute selection methodology for protecting the value of big data. Extracting valuable information is the main goal of analyzing big data which need to be protected. Therefore, relevance between attributes of a dataset is a very important element for big data analysis. We focus on two things. Firstly, attribute relevance in big data is a key element for extracting information. In this perspective, we studied on how to secure a big data through protecting valuable information inside. Secondly, it is impossible to protect all big data and its attributes. We consider big data as a single object which has its own attributes. We assume that a attribute which have a higher relevance is more important than other attributes.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"67 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
A P2P Network Booting Scheme Using a BitTorrent-Like Protocol 使用类似bittorrent协议的P2P网络启动方案
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717782
Wigi Vei A. Oliveros, C. Festin, R. Ocampo
Network booting is widely used today, mostly for thin-client computing, cluster computing, and operating system installation. Popular protocols like trivial file transfer protocol (TFTP) and hypertext transfer protocol (HTTP) are used to download operating system images. Network booting clients simultaneously downloading from a single server create a bottleneck at the server's link once the link capacity has been maximized. The result is a slowdown in the download time and the overall boot process. Several P2P network booting solutions exist, but they are implemented on top of a running operating system. In this paper, we propose a distributed downloading scheme at the network bootloader level using a BitTorrent-like protocol for network booting clients. We discuss the implementation of a new download protocol for iPXE, an open-source network bootloader, and evaluate the performance of TFTP, HTTP, and the proposed BitTorrent-like protocol by measuring their download times over varying file sizes and number of nodes. On 20 clients, simultaneously downloading a 500 MiB file using the proposed protocol resulted to a decrease in average download time of 51.6% compared to TFTP and 46.6% compared to HTTP.
网络引导目前被广泛使用,主要用于瘦客户机计算、集群计算和操作系统安装。像普通文件传输协议(TFTP)和超文本传输协议(HTTP)这样的流行协议用于下载操作系统映像。一旦链接容量达到最大值,同时从单个服务器下载的网络引导客户机就会在服务器的链接上产生瓶颈。其结果是下载时间和整个启动过程变慢。存在几种P2P网络启动解决方案,但它们都是在运行中的操作系统之上实现的。在本文中,我们提出了一种分布式下载方案,在网络引导加载程序级别使用类似bittorrent的网络引导客户端协议。我们讨论了iPXE(一个开源网络引导加载程序)的新下载协议的实现,并通过测量它们在不同文件大小和节点数量上的下载时间来评估TFTP, HTTP和提议的BitTorrent-like协议的性能。在20个客户端上,使用该协议同时下载一个500 MiB文件,平均下载时间比TFTP减少51.6%,比HTTP减少46.6%。
{"title":"A P2P Network Booting Scheme Using a BitTorrent-Like Protocol","authors":"Wigi Vei A. Oliveros, C. Festin, R. Ocampo","doi":"10.1109/ICITCS.2013.6717782","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717782","url":null,"abstract":"Network booting is widely used today, mostly for thin-client computing, cluster computing, and operating system installation. Popular protocols like trivial file transfer protocol (TFTP) and hypertext transfer protocol (HTTP) are used to download operating system images. Network booting clients simultaneously downloading from a single server create a bottleneck at the server's link once the link capacity has been maximized. The result is a slowdown in the download time and the overall boot process. Several P2P network booting solutions exist, but they are implemented on top of a running operating system. In this paper, we propose a distributed downloading scheme at the network bootloader level using a BitTorrent-like protocol for network booting clients. We discuss the implementation of a new download protocol for iPXE, an open-source network bootloader, and evaluate the performance of TFTP, HTTP, and the proposed BitTorrent-like protocol by measuring their download times over varying file sizes and number of nodes. On 20 clients, simultaneously downloading a 500 MiB file using the proposed protocol resulted to a decrease in average download time of 51.6% compared to TFTP and 46.6% compared to HTTP.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123787445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Thin-Thick Client Collaboration for Optimizing Task Scheduling in Mobile Cloud Computing 面向移动云计算任务调度优化的瘦-厚客户端协作
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717795
Pham Phuoc Hung, Tuan-Anh Bui, E. Huh
Although the convergence of the two emerging trends: cloud computing and mobile computing can somehow compensate the shortage of hardware capability in mobile devices by offloading requested work to the cloud, most of the research studies are not yet efficient in making cloud usage experience as painless as possible, especially when access to cloud becomes expensive. We propose in this paper an architecture based on a collaboration of thin-thick clients and clouds that focuses on providing an effective task scheduling which can boost up the processing time in the mobile cloud platform while considering the network bandwidth and cost for cloud service usage. Experimental results show the significantly improved efficiency of the task scheduling in bringing desired processing time corresponding to the money paid by customers.
尽管云计算和移动计算这两种新兴趋势的融合可以通过将请求的工作转移到云上,在某种程度上弥补移动设备硬件能力的不足,但大多数研究还不能有效地使云使用体验尽可能轻松,特别是在访问云变得昂贵的情况下。本文提出了一种基于薄厚客户端和云协作的架构,该架构的重点是在考虑网络带宽和云服务使用成本的同时,提供有效的任务调度,从而提高移动云平台的处理时间。实验结果表明,任务调度的效率得到了显著提高,顾客支付的费用对应所需的处理时间。
{"title":"A Thin-Thick Client Collaboration for Optimizing Task Scheduling in Mobile Cloud Computing","authors":"Pham Phuoc Hung, Tuan-Anh Bui, E. Huh","doi":"10.1109/ICITCS.2013.6717795","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717795","url":null,"abstract":"Although the convergence of the two emerging trends: cloud computing and mobile computing can somehow compensate the shortage of hardware capability in mobile devices by offloading requested work to the cloud, most of the research studies are not yet efficient in making cloud usage experience as painless as possible, especially when access to cloud becomes expensive. We propose in this paper an architecture based on a collaboration of thin-thick clients and clouds that focuses on providing an effective task scheduling which can boost up the processing time in the mobile cloud platform while considering the network bandwidth and cost for cloud service usage. Experimental results show the significantly improved efficiency of the task scheduling in bringing desired processing time corresponding to the money paid by customers.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"14 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Key Exchange Protocol on Thompson Groups 一种新的Thompson组密钥交换协议
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717780
Hongxin Ma, Yingjue Fang, Xiaofeng Wang
By analyzing a key agreement protocol based on conjugacy and discrete logarithm problems proposed by Sakalauskas et al., we find that this protocol is vulnerable to linear attack. Then, an improved protocol on Thompson groups is proposed. The security of the new protocol is guaranteed by the uniqueness of inverse elements of a group, hiding property of hash function, discrete logarithm problem, and conjugacy search problem.
通过分析Sakalauskas等人提出的基于共轭和离散对数问题的密钥协议,我们发现该协议容易受到线性攻击。然后,提出了一种改进的汤普森群协议。利用群逆元素的唯一性、哈希函数的隐蔽性、离散对数问题和共轭搜索问题保证了协议的安全性。
{"title":"A New Key Exchange Protocol on Thompson Groups","authors":"Hongxin Ma, Yingjue Fang, Xiaofeng Wang","doi":"10.1109/ICITCS.2013.6717780","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717780","url":null,"abstract":"By analyzing a key agreement protocol based on conjugacy and discrete logarithm problems proposed by Sakalauskas et al., we find that this protocol is vulnerable to linear attack. Then, an improved protocol on Thompson groups is proposed. The security of the new protocol is guaranteed by the uniqueness of inverse elements of a group, hiding property of hash function, discrete logarithm problem, and conjugacy search problem.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Task- and Role-Based Access Control with Multi-Constraints for a Medical Workflow System 结合基于任务和角色的多约束访问控制的医疗工作流系统
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717814
Ivy Joy G. Mallare, S. Pancho-Festin
We investigate the effects of combining Task and Role-based access control models for a medical workflow system. Although Role-based Access Control (RBAC) models provide a generalized approach to access control, it cannot cope with the growing complexity of modern health care systems that require dynamic authorizations. Task-based Access Control (TBAC ) can help address the need for dynamic authorizations but TBAC alone cannot address healthcare access control requirements. Roles and tasks together can form a much flexible access control than roles or tasks alone. We studied the integration of TBAC and RBAC for a workflow system. Moreover, we applied multiple constraints on users, roles, and tasks.
我们研究了结合任务和基于角色的访问控制模型对医疗工作流系统的影响。尽管基于角色的访问控制(RBAC)模型提供了一种通用的访问控制方法,但它无法应对需要动态授权的现代医疗保健系统日益增长的复杂性。基于任务的访问控制(TBAC)有助于满足动态授权的需求,但仅凭TBAC无法满足医疗保健访问控制需求。角色和任务结合起来可以形成比单独使用角色或任务更灵活的访问控制。我们研究了工作流系统中TBAC和RBAC的集成。此外,我们对用户、角色和任务应用了多个约束。
{"title":"Combining Task- and Role-Based Access Control with Multi-Constraints for a Medical Workflow System","authors":"Ivy Joy G. Mallare, S. Pancho-Festin","doi":"10.1109/ICITCS.2013.6717814","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717814","url":null,"abstract":"We investigate the effects of combining Task and Role-based access control models for a medical workflow system. Although Role-based Access Control (RBAC) models provide a generalized approach to access control, it cannot cope with the growing complexity of modern health care systems that require dynamic authorizations. Task-based Access Control (TBAC ) can help address the need for dynamic authorizations but TBAC alone cannot address healthcare access control requirements. Roles and tasks together can form a much flexible access control than roles or tasks alone. We studied the integration of TBAC and RBAC for a workflow system. Moreover, we applied multiple constraints on users, roles, and tasks.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132219091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Robust Certificateless Signature Scheme without Bilinear Pairings 无双线性对的鲁棒无证书签名方案
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717878
Kuo-Hui Yeh, Kuo-Yu Tsai, Ren-Zong Kuo, Tzong-Chen Wu
During these years, the research field of certificateless signature (CLS) scheme without bilinear pairings is promptly investigated as the key escrow problem in identity-based cryptography can be solved via this concept. In this paper, we demonstrate that a certificateless signature scheme proposed by Gong and Li cannot fulfil its security claims. The authors argued that their proposed certificateless signature scheme is able to resist to the type of super adversary. However, this security argument can be improved. We present a series of attack processes to point out that Gong and Li's scheme is insecure against a super type I ad-versary. A remedy mechanism is then proposed to provide the security enhancement .
近年来,由于基于身份的密码学中的密钥托管问题可以通过无证书签名(CLS)这一概念得到解决,因此对无证书签名(CLS)方案的研究领域展开了迅速的研究。在本文中,我们证明了Gong和Li提出的无证书签名方案不能满足其安全性要求。作者认为,他们提出的无证书签名方案能够抵抗超级对手的攻击。然而,这种安全性论证可以得到改进。我们提出了一系列的攻击过程,指出Gong和Li的方案对超级I型攻击是不安全的。然后提出了一种补救机制来提供安全性增强。
{"title":"Robust Certificateless Signature Scheme without Bilinear Pairings","authors":"Kuo-Hui Yeh, Kuo-Yu Tsai, Ren-Zong Kuo, Tzong-Chen Wu","doi":"10.1109/ICITCS.2013.6717878","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717878","url":null,"abstract":"During these years, the research field of certificateless signature (CLS) scheme without bilinear pairings is promptly investigated as the key escrow problem in identity-based cryptography can be solved via this concept. In this paper, we demonstrate that a certificateless signature scheme proposed by Gong and Li cannot fulfil its security claims. The authors argued that their proposed certificateless signature scheme is able to resist to the type of super adversary. However, this security argument can be improved. We present a series of attack processes to point out that Gong and Li's scheme is insecure against a super type I ad-versary. A remedy mechanism is then proposed to provide the security enhancement .","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Implementing Decision Tree Fuzzy Rules in Clinical Decision Support System after Comparing with Fuzzy Based and Neural Network Based Systems 临床决策支持系统中决策树模糊规则的实现与基于模糊和神经网络系统的比较
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717845
P. K. Anooj
As people have interests in their health recently, development of medical domain application has been one of the most active research areas. One example of medical domain application is detection system for heart disease based on computer-aided diagnosis methods, were the data are obtained from some other sources and are evaluated based on computer based applications. At the earlier time, the use of computer is to build knowledge based clinical decision support system which uses knowledge from medical experts and transfers this knowledge into computer algorithms manually. This process is time consuming and really depends on medical expert's opinion which may be subjective. To handle this problem, machine learning techniques have been developed to gain knowledge automatically from examples or raw data. Here, a weighted fuzzy rule-based clinical decision support system (CDSS) is presented for the diagnosis of heart disease, automatically obtaining the knowledge from the patient's clinical data. The proposed clinical decision support system for risk prediction of heart patients consists of two phases, (1) automated approach for generation of weighted fuzzy rules, and (2) developing a fuzzy rule-based decision support system. In the first phase, we have used the mining technique, attribute selection and attribute weightage method to obtain the weighted fuzzy rules. Then, the fuzzy system is constructed in accordance with the weighted fuzzy rules and chosen attributes. Finally, the experimentation is carried out on the proposed system using the datasets obtained from the UCI repository and the performance of the system is compared with the neural network-based system utilizing accuracy, sensitivity and specificity.
近年来,随着人们对自身健康的关注,医学领域应用的开发成为最活跃的研究领域之一。医学领域应用的一个例子是基于计算机辅助诊断方法的心脏病检测系统,该系统从其他来源获得数据并基于基于计算机的应用程序进行评估。在早期,利用计算机构建基于知识的临床决策支持系统,利用医学专家的知识,人工将这些知识转化为计算机算法。这个过程是耗时的,而且实际上取决于医学专家的意见,这可能是主观的。为了解决这个问题,机器学习技术已经被开发出来,可以从示例或原始数据中自动获取知识。本文提出了一种基于加权模糊规则的心脏病诊断临床决策支持系统(CDSS),该系统可以自动从患者的临床数据中获取知识。本文提出的心脏病患者风险预测临床决策支持系统包括两个阶段,即(1)加权模糊规则自动生成方法和(2)基于模糊规则的决策支持系统开发。在第一阶段,我们使用了挖掘技术、属性选择和属性权重法来获得加权模糊规则。然后,根据加权模糊规则和选择的属性构造模糊系统。最后,利用UCI知识库中的数据集对所提出的系统进行了实验,并在准确性、灵敏度和特异性方面与基于神经网络的系统进行了比较。
{"title":"Implementing Decision Tree Fuzzy Rules in Clinical Decision Support System after Comparing with Fuzzy Based and Neural Network Based Systems","authors":"P. K. Anooj","doi":"10.1109/ICITCS.2013.6717845","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717845","url":null,"abstract":"As people have interests in their health recently, development of medical domain application has been one of the most active research areas. One example of medical domain application is detection system for heart disease based on computer-aided diagnosis methods, were the data are obtained from some other sources and are evaluated based on computer based applications. At the earlier time, the use of computer is to build knowledge based clinical decision support system which uses knowledge from medical experts and transfers this knowledge into computer algorithms manually. This process is time consuming and really depends on medical expert's opinion which may be subjective. To handle this problem, machine learning techniques have been developed to gain knowledge automatically from examples or raw data. Here, a weighted fuzzy rule-based clinical decision support system (CDSS) is presented for the diagnosis of heart disease, automatically obtaining the knowledge from the patient's clinical data. The proposed clinical decision support system for risk prediction of heart patients consists of two phases, (1) automated approach for generation of weighted fuzzy rules, and (2) developing a fuzzy rule-based decision support system. In the first phase, we have used the mining technique, attribute selection and attribute weightage method to obtain the weighted fuzzy rules. Then, the fuzzy system is constructed in accordance with the weighted fuzzy rules and chosen attributes. Finally, the experimentation is carried out on the proposed system using the datasets obtained from the UCI repository and the performance of the system is compared with the neural network-based system utilizing accuracy, sensitivity and specificity.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Approach to Identify Levels of Reflection Using Latent Semantic Analysis 一种利用潜在语义分析识别反射层次的方法
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717800
G. Cheng, J. Chau
This paper reports and discusses on the initial stage of developing an educational tool to support Chinese undergraduate students in reflecting on their English language (L2) learning experience. By using a classification framework called A-S-E-R and Latent Semantic Analysis, we developed a digital tool to automatically classify reflective L2 learning skills into different elements and hierarchical levels. This paper begins by presenting the background and objectives of the study, followed by the details of method and results. Preliminary findings show that the tool performed satisfactorily on our testing data and the computer-generated reflection ratings were comparable to human ratings.
本文报道并讨论了开发一种教育工具的初始阶段,以支持中国本科生反思他们的英语语言(L2)学习经验。通过使用称为a - s - e - r和潜在语义分析的分类框架,我们开发了一个数字工具,可以自动将反思性第二语言学习技能分类为不同的元素和层次。本文首先介绍了研究的背景和目的,然后详细介绍了研究的方法和结果。初步结果表明,该工具在我们的测试数据上表现令人满意,计算机生成的反射评级与人类评级相当。
{"title":"An Approach to Identify Levels of Reflection Using Latent Semantic Analysis","authors":"G. Cheng, J. Chau","doi":"10.1109/ICITCS.2013.6717800","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717800","url":null,"abstract":"This paper reports and discusses on the initial stage of developing an educational tool to support Chinese undergraduate students in reflecting on their English language (L2) learning experience. By using a classification framework called A-S-E-R and Latent Semantic Analysis, we developed a digital tool to automatically classify reflective L2 learning skills into different elements and hierarchical levels. This paper begins by presenting the background and objectives of the study, followed by the details of method and results. Preliminary findings show that the tool performed satisfactorily on our testing data and the computer-generated reflection ratings were comparable to human ratings.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework for Energy Monitoring and Management System for Educational Institutions 教育机构能源监测与管理系统框架
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717774
Ahmad A. Al-Daraiseh, E. El-Qawasmeh, N. Shah
Excessive utilization of Heating, Ventilation and Air Conditioning (HVAC), and Information and Communication Technology (ICT) equipment in Higher Education Institutes (HEI) in addition to variation in occupancy patterns are the main reasons behind the ever increasing level of energy consumption in such environments. Reducing energy consumption while maintaining the comfort level of students and staff is a very challenging task. In this research we attempt to solve this dilemma by developing a framework that utilizes ICT to monitor and manage energy consumption in HEI. The system monitors electrical equipment individually and also collects environmental parameters such as temperature, humidity and occupancy to optimize energy consumption. At King Saud University (KSU) we implemented the first phase of the system by using wireless sensors that measure energy consumption of any electrical device once every 10 second. Energy consumption data is then displayed to building managers, students and staff to create awareness. It was also utilized to generate situation specific advice. In addition to the unique design, the novelty of this work stems from the utilization of timetable and event management systems, which we believe was never used before in developing such systems.
高等教育机构(HEI)的供暖、通风和空调(HVAC)以及信息和通信技术(ICT)设备的过度使用以及占用模式的变化是此类环境中能源消耗水平不断增加的主要原因。在保持学生和员工舒适度的同时减少能源消耗是一项非常具有挑战性的任务。在本研究中,我们试图通过开发一个利用信息通信技术监测和管理高等学校能源消耗的框架来解决这一困境。该系统对电气设备进行单独监控,并收集环境参数,如温度、湿度和占用率,以优化能源消耗。在沙特国王大学(KSU),我们通过使用无线传感器实现了该系统的第一阶段,该传感器每10秒测量一次任何电气设备的能耗。然后将能耗数据展示给大楼管理人员、学生和员工,以提高他们的意识。它还被用来提出具体情况的咨询意见。除了独特的设计之外,这项工作的新颖性源于对时间表和事件管理系统的使用,我们认为在开发此类系统之前从未使用过这些系统。
{"title":"A Framework for Energy Monitoring and Management System for Educational Institutions","authors":"Ahmad A. Al-Daraiseh, E. El-Qawasmeh, N. Shah","doi":"10.1109/ICITCS.2013.6717774","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717774","url":null,"abstract":"Excessive utilization of Heating, Ventilation and Air Conditioning (HVAC), and Information and Communication Technology (ICT) equipment in Higher Education Institutes (HEI) in addition to variation in occupancy patterns are the main reasons behind the ever increasing level of energy consumption in such environments. Reducing energy consumption while maintaining the comfort level of students and staff is a very challenging task. In this research we attempt to solve this dilemma by developing a framework that utilizes ICT to monitor and manage energy consumption in HEI. The system monitors electrical equipment individually and also collects environmental parameters such as temperature, humidity and occupancy to optimize energy consumption. At King Saud University (KSU) we implemented the first phase of the system by using wireless sensors that measure energy consumption of any electrical device once every 10 second. Energy consumption data is then displayed to building managers, students and staff to create awareness. It was also utilized to generate situation specific advice. In addition to the unique design, the novelty of this work stems from the utilization of timetable and event management systems, which we believe was never used before in developing such systems.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124196487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Speaker Dependent Real-Time Vowel Recognition Algorithm for Lip Sync in Digital Contents 基于说话人的数字内容口型同步实时元音识别算法
Pub Date : 2013-12-01 DOI: 10.1109/ICITCS.2013.6717887
Sun-Min Hwang, Bok-Hee Song, Han-Hyung Yun
Previous results of researches related speech recognition, especially vowel recognitions, can be applied for synchronizing the mouth movement with a dialogue in digital contents such as animations and e-learning contents. Since the mouth movement of objects has to be synchronized with a dialogue exactly, lip-sync is one of tedious works for animators and a time consuming work. The mismatch or artificialness between mouth shape of characters and speaking reduces the immersion in the contents. This paper proposes a new technique to automatically perform lip synching for a computer generated character to match a real speech or a dialogue using real time vowel recognition with the formant analysis. The proposed algorithm should be one of speaker dependent speech recognition since our concern is only for a certain voice actor related a certain character. The result shows that the vowels are recognized from a voice actor' speech with real time and the average of the recognition ratio is 97.3%.
以往的语音识别研究成果,特别是元音识别,可以应用于动画和电子学习内容等数字内容中与对话同步的口型运动。由于物体的嘴部运动必须与对话完全同步,因此对口型是动画师的乏味工作之一,也是一项耗时的工作。人物的嘴型和说话之间的不匹配或不人工化降低了对内容的沉浸感。本文提出了一种利用实时元音识别和构音分析对计算机生成的角色进行假唱以匹配真实语音或对话的新技术。由于我们所关注的只是与某一角色相关的某一声优,所提出的算法应该是一种依赖于说话人的语音识别算法。结果表明,该方法能够实时识别声优语音中的元音,平均识别率为97.3%。
{"title":"Speaker Dependent Real-Time Vowel Recognition Algorithm for Lip Sync in Digital Contents","authors":"Sun-Min Hwang, Bok-Hee Song, Han-Hyung Yun","doi":"10.1109/ICITCS.2013.6717887","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717887","url":null,"abstract":"Previous results of researches related speech recognition, especially vowel recognitions, can be applied for synchronizing the mouth movement with a dialogue in digital contents such as animations and e-learning contents. Since the mouth movement of objects has to be synchronized with a dialogue exactly, lip-sync is one of tedious works for animators and a time consuming work. The mismatch or artificialness between mouth shape of characters and speaking reduces the immersion in the contents. This paper proposes a new technique to automatically perform lip synching for a computer generated character to match a real speech or a dialogue using real time vowel recognition with the formant analysis. The proposed algorithm should be one of speaker dependent speech recognition since our concern is only for a certain voice actor related a certain character. The result shows that the vowels are recognized from a voice actor' speech with real time and the average of the recognition ratio is 97.3%.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127693240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 International Conference on IT Convergence and Security (ICITCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1