首页 > 最新文献

2013 9th International Conference on Innovations in Information Technology (IIT)最新文献

英文 中文
Supporting environmental awareness using mobile clients 利用移动客户端支持环保意识
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544398
Azza Al Houqani, H. Hildmann, S. Nicolas, F. Saffre
We present an android application for mobile clients, which is designed to raise awareness for - and support the reduction of - the individual consumption of natural resources like water and electricity. The presented implementation is interfacing with existing services offered by the utility provides in the emirate of Abu Dhabi and provides a number of functionalities. Climate change and the detrimental effect it has on life everywhere on the planet is receiving increasing attention. There is an urgent need to raise awareness for a number of environmental issues. The ambitious sustainability targets set forth in the Abu Dhabi 2030 vision clearly acknowledges the relevance of preserving our environment. This paper presents a functioning and feasible contribution to this effort.
我们为移动客户端提供了一个android应用程序,旨在提高人们对个人自然资源(如水和电)消耗的认识,并支持减少这种消耗。本文提供的实现与阿布扎比酋长国的公用事业公司提供的现有服务相连接,并提供了许多功能。气候变化及其对地球各地生命的不利影响正受到越来越多的关注。迫切需要提高人们对一些环境问题的认识。阿布扎比2030愿景中提出的雄心勃勃的可持续发展目标明确承认保护环境的重要性。本文提出了对这一努力的有效和可行的贡献。
{"title":"Supporting environmental awareness using mobile clients","authors":"Azza Al Houqani, H. Hildmann, S. Nicolas, F. Saffre","doi":"10.1109/INNOVATIONS.2013.6544398","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544398","url":null,"abstract":"We present an android application for mobile clients, which is designed to raise awareness for - and support the reduction of - the individual consumption of natural resources like water and electricity. The presented implementation is interfacing with existing services offered by the utility provides in the emirate of Abu Dhabi and provides a number of functionalities. Climate change and the detrimental effect it has on life everywhere on the planet is receiving increasing attention. There is an urgent need to raise awareness for a number of environmental issues. The ambitious sustainability targets set forth in the Abu Dhabi 2030 vision clearly acknowledges the relevance of preserving our environment. This paper presents a functioning and feasible contribution to this effort.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information technology and the smart grid - A pathway to conserve energy in buildings 信息技术和智能电网——建筑节能的途径
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544394
M. Alahmad, Yuye Peng, E. Sordiashie, L. El Chaar, N. Aljuhaishi, H. Sharif
Through combining Information and Communication Technologies (ICT), advanced instrumentation, system intelligence, and information on the end user, the smart grid will increase building energy efficiency and conservation. Demand Side Management (DSM) programs serve as an aid in energy conservation and management strategies as well as in the collection of real-time consumption information data. Specifically, as proposed in this paper, real-time, fine-grain consumption data at the point of use in buildings can be used by building energy managers, utilities, and the end user for planning, load forecasting, and feedback for providing information that may lead to end user behavior change. This paper focuses on the development of node-level very short time load forecasting (NL-VSTLF), and specifically on a framework for the utilization of real-time data at the point of use for advancing research in the area of building-very short term load forecasting. This proposed framework will be the foundation for variable one minute to hourly and daily load forecasting using an aggregate of all active nodes in real-time.
通过结合信息和通信技术(ICT)、先进的仪器仪表、系统智能和终端用户信息,智能电网将提高建筑能效和节约能源。需求侧管理(DSM)项目在能源节约和管理策略以及收集实时消费信息数据方面起到辅助作用。具体来说,正如本文所提出的,建筑物中使用点的实时、细粒度消耗数据可以被建筑能源管理人员、公用事业公司和最终用户用于规划、负荷预测和反馈,以提供可能导致最终用户行为改变的信息。本文重点研究节点级极短时间负荷预测(NL-VSTLF)的发展,特别是在使用点上利用实时数据的框架,以推进建筑极短负荷预测领域的研究。该框架将成为实时使用所有活动节点的集合进行一分钟到每小时和每日可变负荷预测的基础。
{"title":"Information technology and the smart grid - A pathway to conserve energy in buildings","authors":"M. Alahmad, Yuye Peng, E. Sordiashie, L. El Chaar, N. Aljuhaishi, H. Sharif","doi":"10.1109/INNOVATIONS.2013.6544394","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544394","url":null,"abstract":"Through combining Information and Communication Technologies (ICT), advanced instrumentation, system intelligence, and information on the end user, the smart grid will increase building energy efficiency and conservation. Demand Side Management (DSM) programs serve as an aid in energy conservation and management strategies as well as in the collection of real-time consumption information data. Specifically, as proposed in this paper, real-time, fine-grain consumption data at the point of use in buildings can be used by building energy managers, utilities, and the end user for planning, load forecasting, and feedback for providing information that may lead to end user behavior change. This paper focuses on the development of node-level very short time load forecasting (NL-VSTLF), and specifically on a framework for the utilization of real-time data at the point of use for advancing research in the area of building-very short term load forecasting. This proposed framework will be the foundation for variable one minute to hourly and daily load forecasting using an aggregate of all active nodes in real-time.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identity management framework for cloud networking infrastructure 用于云网络基础设施的身份管理框架
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544386
R. Dhungana, A. Mohammad, A. Sharma, I. Schoen
The Cloud Networking(CloNe) infrastructure provisions elastic, secure, and on-demand virtualized network resources to the end user. It incorporates the Network-as-a-Service(NaaS) provisioning model, which enhances network-level scalability, throughput, and performance. In this paper, we extend the CloNe architecture by designing, deploying, and integrating an identity management framework, customized for the CloNe infrastructure. The identity management framework proposed in this paper, is based on the User Managed Access(UMA) protocol. The framework supports authentication, authorization, and identity management of entities in the CloNe infrastructure. Furthermore it enables federated identity management and management of access control policies across different infrastructure providers.
Cloud Networking(CloNe)基础架构为最终用户提供弹性、安全、按需的虚拟化网络资源。它集成了网络即服务(NaaS)供应模型,该模型增强了网络级别的可伸缩性、吞吐量和性能。在本文中,我们通过设计、部署和集成为CloNe基础设施定制的身份管理框架来扩展CloNe体系结构。本文提出的身份管理框架是基于用户管理访问(UMA)协议的。该框架支持对CloNe基础架构中的实体进行身份验证、授权和身份管理。此外,它支持跨不同基础设施提供者的联合身份管理和访问控制策略管理。
{"title":"Identity management framework for cloud networking infrastructure","authors":"R. Dhungana, A. Mohammad, A. Sharma, I. Schoen","doi":"10.1109/INNOVATIONS.2013.6544386","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544386","url":null,"abstract":"The Cloud Networking(CloNe) infrastructure provisions elastic, secure, and on-demand virtualized network resources to the end user. It incorporates the Network-as-a-Service(NaaS) provisioning model, which enhances network-level scalability, throughput, and performance. In this paper, we extend the CloNe architecture by designing, deploying, and integrating an identity management framework, customized for the CloNe infrastructure. The identity management framework proposed in this paper, is based on the User Managed Access(UMA) protocol. The framework supports authentication, authorization, and identity management of entities in the CloNe infrastructure. Furthermore it enables federated identity management and management of access control policies across different infrastructure providers.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An empirical study on the robustness of a fragile watermark for relational databases 关系型数据库脆弱水印鲁棒性的实证研究
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544423
I. Kamel, Waheeb Yaqub, K. Kamel
Databases most often contain critical information. Unauthorized changes to databases can have serious consequences and may result in significant losses for the organization. This paper presents a viable solution for protecting the integrity of the data stored in relational databases using fragile watermarking. Prior techniques introduce distortions to the watermarked values and thus cannot be applied to all attributes. Our technique protects relational tables by reordering tuples relative to each other according to a secrete value (watermark). This paper introduces empirical study on the effect of data distribution and other data measures like the mean and standard deviation on the attack detection rates. A study on the cost, in terms of the execution time, of the proposed watermark insertion and data verification algorithms is also presented.
数据库通常包含关键信息。对数据库进行未经授权的更改可能会产生严重的后果,并可能给组织造成重大损失。本文提出了一种利用脆弱水印保护关系数据库中数据完整性的可行方案。先前的技术引入了对水印值的扭曲,因此不能应用于所有属性。我们的技术通过根据秘密值(水印)对元组进行相对重排序来保护关系表。本文对数据分布和其他数据度量如均值和标准差对攻击检测率的影响进行了实证研究。从执行时间的角度研究了所提出的水印插入和数据验证算法的代价。
{"title":"An empirical study on the robustness of a fragile watermark for relational databases","authors":"I. Kamel, Waheeb Yaqub, K. Kamel","doi":"10.1109/INNOVATIONS.2013.6544423","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544423","url":null,"abstract":"Databases most often contain critical information. Unauthorized changes to databases can have serious consequences and may result in significant losses for the organization. This paper presents a viable solution for protecting the integrity of the data stored in relational databases using fragile watermarking. Prior techniques introduce distortions to the watermarked values and thus cannot be applied to all attributes. Our technique protects relational tables by reordering tuples relative to each other according to a secrete value (watermark). This paper introduces empirical study on the effect of data distribution and other data measures like the mean and standard deviation on the attack detection rates. A study on the cost, in terms of the execution time, of the proposed watermark insertion and data verification algorithms is also presented.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Portable wireless biomedical temperature monitoring system: Architecture and implementation 便携式无线生物医学温度监测系统:架构与实现
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544400
B. Mohammad, H. Elgabra, R. Ashour, H. Saleh
This paper demonstrates the design and implementation of a portable embedded system targeting continuous temperature monitoring with wireless interface capability. Our main motive is to provide a solution for monitoring babies', disable or elderly population body temperature and initiate immediate alarm in case of hazardous cases. Such cases include overheating (fever), under heating, and a high temperature change over a predefined time period. The advantage of the system is its effectiveness as preventive measure against febrile seizures or any other fever condition. The system is extended for interfacing with other devices such as cell phones to enable remote monitoring; an android application to showcase the concept was developed. The system architecture consist of temperature sensors, LCD screen, Bluetooth interface, memory, a sound buzzer all controlled by a single microcontroller core. Even though the system is concentrated on temperature monitoring but the architecture can be expanded to monitor other vital signs like pulse rate, Oxygen saturation or any other interested parameter.
本文介绍了一种具有无线接口功能的便携式嵌入式温度连续监测系统的设计与实现。我们的主要动机是提供一个解决方案,监测婴儿、残疾人或老年人的体温,并在发生危险情况时立即报警。这些情况包括过热(发烧),加热不足,以及在预定义的时间段内高温变化。该系统的优点是其有效的预防措施,以防止热痉挛或任何其他发烧情况。该系统被扩展为与其他设备(如移动电话)接口,以实现远程监控;开发了一个android应用程序来展示这一概念。系统架构由温度传感器、液晶屏、蓝牙接口、存储器、蜂鸣器等组成,全部由单片机核心控制。尽管该系统专注于温度监测,但该架构可以扩展到监测其他生命体征,如脉搏率、氧饱和度或任何其他感兴趣的参数。
{"title":"Portable wireless biomedical temperature monitoring system: Architecture and implementation","authors":"B. Mohammad, H. Elgabra, R. Ashour, H. Saleh","doi":"10.1109/INNOVATIONS.2013.6544400","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544400","url":null,"abstract":"This paper demonstrates the design and implementation of a portable embedded system targeting continuous temperature monitoring with wireless interface capability. Our main motive is to provide a solution for monitoring babies', disable or elderly population body temperature and initiate immediate alarm in case of hazardous cases. Such cases include overheating (fever), under heating, and a high temperature change over a predefined time period. The advantage of the system is its effectiveness as preventive measure against febrile seizures or any other fever condition. The system is extended for interfacing with other devices such as cell phones to enable remote monitoring; an android application to showcase the concept was developed. The system architecture consist of temperature sensors, LCD screen, Bluetooth interface, memory, a sound buzzer all controlled by a single microcontroller core. Even though the system is concentrated on temperature monitoring but the architecture can be expanded to monitor other vital signs like pulse rate, Oxygen saturation or any other interested parameter.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115238689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Protein-protein Interaction Prediction using Arabic semantic analysis 利用阿拉伯语语义分析预测蛋白质-蛋白质相互作用
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544426
Nazar Zaki, A. A. Dhaheri, Kalthoom A Alawar, Saad Harous
Scientists are still far from unraveling the molecular mechanisms of most relevant diseases such as cancer and diabetes. A better understanding of protein interactions could provide a clue about the molecular mechanism of the processes leading to such diseases. Novel methodologies to understand diseases through their primary protein interactions are highly desired. In this paper we propose a simple method to predict protein-protein interaction based on Arabic semantic analysis model. The Arabic semantic model is an effective feature extraction method based on natural language processing. Two protein sequences may interact if they contain similar or related Arabic words. The semantic meaning will most likely provide us with a clue on how or why two proteins interact. To evaluate the ability of the proposed method to distinguish between “interacted” and “non-interacted” proteins pairs, we applied it on a dataset of 200 protein pairs from the available yeast saccharomyces cerevisiae protein interaction. The proposed method managed to get 100% sensitivity, 0.84% sensitivity and 92% overall accuracy. The method also showed moderate improvement over the existing well-known methods for PPI prediction such as PPI-PS and PIPE.
科学家们还远远没有解开大多数相关疾病(如癌症和糖尿病)的分子机制。对蛋白质相互作用的更好理解可以为导致这些疾病的过程的分子机制提供线索。迫切需要通过主要蛋白质相互作用来理解疾病的新方法。本文提出了一种基于阿拉伯语语义分析模型的蛋白质相互作用预测方法。阿拉伯语语义模型是一种有效的基于自然语言处理的特征提取方法。如果两个蛋白质序列包含相似或相关的阿拉伯语单词,它们可能会相互作用。语义意义很可能为我们提供两种蛋白质如何或为什么相互作用的线索。为了评估所提出的方法区分“相互作用”和“非相互作用”蛋白质对的能力,我们将其应用于来自酵母、酿酒酵母蛋白质相互作用的200对蛋白质对的数据集。该方法的灵敏度为100%,灵敏度为0.84%,总准确度为92%。该方法也比现有的PPI- ps和PIPE等已知的PPI预测方法有适度的改进。
{"title":"Protein-protein Interaction Prediction using Arabic semantic analysis","authors":"Nazar Zaki, A. A. Dhaheri, Kalthoom A Alawar, Saad Harous","doi":"10.1109/INNOVATIONS.2013.6544426","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544426","url":null,"abstract":"Scientists are still far from unraveling the molecular mechanisms of most relevant diseases such as cancer and diabetes. A better understanding of protein interactions could provide a clue about the molecular mechanism of the processes leading to such diseases. Novel methodologies to understand diseases through their primary protein interactions are highly desired. In this paper we propose a simple method to predict protein-protein interaction based on Arabic semantic analysis model. The Arabic semantic model is an effective feature extraction method based on natural language processing. Two protein sequences may interact if they contain similar or related Arabic words. The semantic meaning will most likely provide us with a clue on how or why two proteins interact. To evaluate the ability of the proposed method to distinguish between “interacted” and “non-interacted” proteins pairs, we applied it on a dataset of 200 protein pairs from the available yeast saccharomyces cerevisiae protein interaction. The proposed method managed to get 100% sensitivity, 0.84% sensitivity and 92% overall accuracy. The method also showed moderate improvement over the existing well-known methods for PPI prediction such as PPI-PS and PIPE.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124811158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attitude towards Robot Assisted Surgery: UAE context 对机器人辅助手术的态度:阿联酋背景
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544414
M. Zineddine, N. Arafa
Information and communication technology (ICT) has become a core part of every business. Industries form all areas have been taking advantage of ICT. Healthcare sector is no exception. Robots have been playing a pivotal role in assisting surgeons in many types of surgeries in the recent years. Robotic assisted surgery led to the possibility of remote procedures by surgeons on remote patients. This study investigates the perception of patients towards the use of Robots in surgery locally and remotely. A survey method was adopted in this research. Data reveals that the majority of respondents from a random sample (140 participants) believe that the use of robots during surgeries is neither safe and controllable, nor beneficial. The acceptance of the use of this surgical technology in all cases is still questionable within this research sample.
信息和通信技术(ICT)已成为每个企业的核心部分。各行各业都在利用信息通信技术。医疗保健行业也不例外。近年来,机器人在协助外科医生进行多种手术方面发挥着关键作用。机器人辅助手术使得外科医生对远程病人进行远程手术成为可能。本研究调查了患者对在本地和远程手术中使用机器人的看法。本研究采用调查法。数据显示,随机抽样(140名参与者)的大多数受访者认为,在手术中使用机器人既不安全,也不可控,也无益。在本研究样本中,接受这种手术技术在所有情况下的使用仍然存在问题。
{"title":"Attitude towards Robot Assisted Surgery: UAE context","authors":"M. Zineddine, N. Arafa","doi":"10.1109/INNOVATIONS.2013.6544414","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544414","url":null,"abstract":"Information and communication technology (ICT) has become a core part of every business. Industries form all areas have been taking advantage of ICT. Healthcare sector is no exception. Robots have been playing a pivotal role in assisting surgeons in many types of surgeries in the recent years. Robotic assisted surgery led to the possibility of remote procedures by surgeons on remote patients. This study investigates the perception of patients towards the use of Robots in surgery locally and remotely. A survey method was adopted in this research. Data reveals that the majority of respondents from a random sample (140 participants) believe that the use of robots during surgeries is neither safe and controllable, nor beneficial. The acceptance of the use of this surgical technology in all cases is still questionable within this research sample.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120991220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A path generation algorithm for mobile sinks in wireless sensor networks 无线传感器网络中移动sink的路径生成算法
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544412
E. Taqieddin, O. Banimelhem, I. Shatnawi
With the energy constraints present in wireless sensor networks, it is essential to find energy-efficient approaches that would result in enhanced network lifetime. One approach is to exploit the sink mobility, by moving it randomly or through a predefined path, to the vicinity of the sensor nodes. By doing so, the communication distance will be reduced, leading to a reduction in the consumed transmission energy. In this paper, a path generation algorithm based on the Principal Component Analysis is presented. The main goal is to find a fixed path for a single mobile sink with the minimum average distance to the sensor nodes. Simulation results indicate that this approach leads to extended network lifetime and results in an increased average energy per live node.
由于无线传感器网络存在能量限制,因此必须找到能够提高网络寿命的节能方法。一种方法是利用sink的移动性,通过随机移动它或通过预定义的路径,到传感器节点附近。通过这样做,通信距离将缩短,从而导致消耗的传输能量减少。本文提出了一种基于主成分分析的路径生成算法。主要目标是为单个移动接收器找到一条固定路径,使其与传感器节点的平均距离最小。仿真结果表明,该方法延长了网络生存期,提高了每个活动节点的平均能量。
{"title":"A path generation algorithm for mobile sinks in wireless sensor networks","authors":"E. Taqieddin, O. Banimelhem, I. Shatnawi","doi":"10.1109/INNOVATIONS.2013.6544412","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544412","url":null,"abstract":"With the energy constraints present in wireless sensor networks, it is essential to find energy-efficient approaches that would result in enhanced network lifetime. One approach is to exploit the sink mobility, by moving it randomly or through a predefined path, to the vicinity of the sensor nodes. By doing so, the communication distance will be reduced, leading to a reduction in the consumed transmission energy. In this paper, a path generation algorithm based on the Principal Component Analysis is presented. The main goal is to find a fixed path for a single mobile sink with the minimum average distance to the sensor nodes. Simulation results indicate that this approach leads to extended network lifetime and results in an increased average energy per live node.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Developing visual haptic application for learning Jawi handwriting skills 开发用于学习java书写技巧的视觉触觉应用程序
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544410
M. M. Amin, Halimah Badioze Zaman, A. Ahmad
The visual haptic approach is considered as a very promising potential to aid primary school pupils in teaching and learning method of Jawi handwriting skills. An effort to help pupils in learning Jawi handwriting skills has prompted this study. This paper explores the related literatures and previous studies on visual haptic in handwriting. It also summarizes the findings of the preliminary study on the current approach of teaching and learning of Jawi handwriting skills, and the potential of the visual haptic approach in the Malaysian educational setting. This paper also discusses two main phases involved in this study, which are the development and the usability testing of Visual Haptic Jawi (HV-Jawi). The proposed conceptual framework hopefully can be a guide in developing a visual haptic application such as HV-Jawi.
视觉触觉法被认为是一种非常有潜力的辅助小学生教与学爪哇文书写技巧的方法。为了帮助学生学习爪哇语的书写技巧,促使了这项研究。本文对笔迹视觉触觉的相关文献和前人研究进行了综述。本文还总结了目前爪哇文书写技能教学方法的初步研究结果,以及视觉触觉方法在马来西亚教育环境中的潜力。本文还讨论了本研究涉及的两个主要阶段,即视觉触觉java语言的开发和可用性测试。所提出的概念框架有望为开发视觉触觉应用程序(如hv - java)提供指导。
{"title":"Developing visual haptic application for learning Jawi handwriting skills","authors":"M. M. Amin, Halimah Badioze Zaman, A. Ahmad","doi":"10.1109/INNOVATIONS.2013.6544410","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544410","url":null,"abstract":"The visual haptic approach is considered as a very promising potential to aid primary school pupils in teaching and learning method of Jawi handwriting skills. An effort to help pupils in learning Jawi handwriting skills has prompted this study. This paper explores the related literatures and previous studies on visual haptic in handwriting. It also summarizes the findings of the preliminary study on the current approach of teaching and learning of Jawi handwriting skills, and the potential of the visual haptic approach in the Malaysian educational setting. This paper also discusses two main phases involved in this study, which are the development and the usability testing of Visual Haptic Jawi (HV-Jawi). The proposed conceptual framework hopefully can be a guide in developing a visual haptic application such as HV-Jawi.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123935358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi watermarking algorithm based on DCT and hash functions for color satellite images 基于DCT和哈希函数的彩色卫星图像多重水印算法
Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544389
A. Kunhu, H. Al-Ahmad
This paper deals with a multi watermarking algorithm which embeds robust ownership watermark and fragile authentication information into satellite images to protect the copyright ownership and integrity of the images. This new watermarking technique is totally blind and does not require the original satellite image for the extraction process of the embedded information. The robust watermark is embedded first in the discrete cosine transform (DCT) and the second hash authentication code is embedded in the spatial domain. The new technique offers high peak signal to noise ratio (PSNR) and similarity structure index measure (SSIM) values. The technique was successfully tested on a variety of satellite images. The fragile watermark is sensitive to any slight tampering and can locate the area of the editing. The robust watermark survived many intentional and non intentional attacks.
本文研究了在卫星图像中嵌入鲁棒所有权水印和脆弱认证信息的多重水印算法,以保护图像的版权所有权和完整性。这种新的水印技术是完全盲的,不需要原始卫星图像进行嵌入信息的提取。鲁棒水印首先嵌入到离散余弦变换(DCT)中,第二个哈希认证码嵌入到空间域中。新技术提供了较高的峰值信噪比(PSNR)和相似结构指数测量值(SSIM)。这项技术已经成功地在各种卫星图像上进行了测试。脆弱的水印对任何轻微的篡改都很敏感,并且可以定位编辑的区域。鲁棒水印能够经受住许多有意和无意的攻击。
{"title":"Multi watermarking algorithm based on DCT and hash functions for color satellite images","authors":"A. Kunhu, H. Al-Ahmad","doi":"10.1109/INNOVATIONS.2013.6544389","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544389","url":null,"abstract":"This paper deals with a multi watermarking algorithm which embeds robust ownership watermark and fragile authentication information into satellite images to protect the copyright ownership and integrity of the images. This new watermarking technique is totally blind and does not require the original satellite image for the extraction process of the embedded information. The robust watermark is embedded first in the discrete cosine transform (DCT) and the second hash authentication code is embedded in the spatial domain. The new technique offers high peak signal to noise ratio (PSNR) and similarity structure index measure (SSIM) values. The technique was successfully tested on a variety of satellite images. The fragile watermark is sensitive to any slight tampering and can locate the area of the editing. The robust watermark survived many intentional and non intentional attacks.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122491371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2013 9th International Conference on Innovations in Information Technology (IIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1