Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603666
Muhammad Arslan, C. Cruz, D. Ginhac
Construction is one of the most hazardous industries because it involves dynamic interactions between workers and machinery on sites. The recent technological developments in indoor positioning technologies provide a huge volume of spatio-temporal data for studying dynamic interactions of moving objects. The results from such studies can be used for enhancing safety management strategies on sites by recognizing the mobility related workers` behaviors. For understanding workers` mobility behaviors to improve site safety, a system is proposed based on semantic trajectories and the Hidden Markov Models (HMMs). Firstly, the system captures raw spatio-temporal trajectories of workers using an Indoor Positioning System (IPS) and preprocess them for determining the important stay locations where the workers are spending the majority of their time. Then, these processed trajectories are transformed into semantic trajectories to establish an understanding of the meanings behind workers` mobility behaviors in terms of the building environment. Lastly, HMMs along with the Viterbi algorithm are used for categorizing different workers` mobility behaviors within the identified stay locations. The proposed system is tested using an indoor building environment and the results show that it holds a potential to identify high-risk workers` behaviors to improve site safety.
{"title":"Understanding Worker Mobility within the Stay Locations using HMMs on Semantic Trajectories","authors":"Muhammad Arslan, C. Cruz, D. Ginhac","doi":"10.1109/ICET.2018.8603666","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603666","url":null,"abstract":"Construction is one of the most hazardous industries because it involves dynamic interactions between workers and machinery on sites. The recent technological developments in indoor positioning technologies provide a huge volume of spatio-temporal data for studying dynamic interactions of moving objects. The results from such studies can be used for enhancing safety management strategies on sites by recognizing the mobility related workers` behaviors. For understanding workers` mobility behaviors to improve site safety, a system is proposed based on semantic trajectories and the Hidden Markov Models (HMMs). Firstly, the system captures raw spatio-temporal trajectories of workers using an Indoor Positioning System (IPS) and preprocess them for determining the important stay locations where the workers are spending the majority of their time. Then, these processed trajectories are transformed into semantic trajectories to establish an understanding of the meanings behind workers` mobility behaviors in terms of the building environment. Lastly, HMMs along with the Viterbi algorithm are used for categorizing different workers` mobility behaviors within the identified stay locations. The proposed system is tested using an indoor building environment and the results show that it holds a potential to identify high-risk workers` behaviors to improve site safety.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115102019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603661
Tehmina Amjad, Ali Daud, Sadia Khan, R. Abbasi, Faisal Imran
Finding the rising stars is an interesting problem and has been recently studied in various domains including academic networks. This study formulates the problem of rising stars prediction as a machine learning task. Classification models are applied and features are classified as co-authors, author, and venues. The impact of the categorization of these features is empirically analyzed. The experimentation is performed on data of Pakistani researchers retrieved from Web of Sciences ranging from 2008 to 2014. After collection of the dataset, feature sets are calculated and classification techniques are applied. The researchers predicted by the proposed method are compared with top researchers of Pakistan in 2016 and 2017. The proposed technique solves the problem of finding rising star researcher of Pakistan in the field of computer sciences based on authors’ contribution, mutual influence, and venue citations scores.
寻找冉冉升起的新星是一个有趣的问题,最近在包括学术网络在内的各个领域都有研究。本研究将新星预测问题表述为一个机器学习任务。应用分类模型,并将特征分类为共同作者、作者和场所。对这些特征分类的影响进行了实证分析。实验是在2008 - 2014年从Web of Sciences检索到的巴基斯坦研究人员数据上进行的。收集数据集后,计算特征集并应用分类技术。通过该方法预测的研究人员与2016年和2017年巴基斯坦顶尖研究人员进行了比较。该技术解决了基于作者贡献、相互影响和地点引用分数来寻找巴基斯坦计算机科学领域新星研究员的问题。
{"title":"Prediction of Rising Stars from Pakistani Research Communities","authors":"Tehmina Amjad, Ali Daud, Sadia Khan, R. Abbasi, Faisal Imran","doi":"10.1109/ICET.2018.8603661","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603661","url":null,"abstract":"Finding the rising stars is an interesting problem and has been recently studied in various domains including academic networks. This study formulates the problem of rising stars prediction as a machine learning task. Classification models are applied and features are classified as co-authors, author, and venues. The impact of the categorization of these features is empirically analyzed. The experimentation is performed on data of Pakistani researchers retrieved from Web of Sciences ranging from 2008 to 2014. After collection of the dataset, feature sets are calculated and classification techniques are applied. The researchers predicted by the proposed method are compared with top researchers of Pakistan in 2016 and 2017. The proposed technique solves the problem of finding rising star researcher of Pakistan in the field of computer sciences based on authors’ contribution, mutual influence, and venue citations scores.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129843670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603596
Saqib Iqbal, G. F. Siddiqui, M. Zafar Iqbal
Trust modeling has received a remarkable attention in recent research. It is a decision making procedure which quantifies the major concern in information exchange, social exchange, and cognitive motivation. Trust has temporal behavior and it grows and declines on the basis of some cogitative parameters. Current study is based on psychological approach through which complicated relationships among different individuals can be model. In this study, we have proposed a computation cognitive trust model between pet and owner using difference equations. Results revels that proposed model have similar response as the assumptions was made. Moreover results were also obtained using simulation language.
{"title":"Modelling Trust Developing Procedure between Pet and Owner","authors":"Saqib Iqbal, G. F. Siddiqui, M. Zafar Iqbal","doi":"10.1109/ICET.2018.8603596","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603596","url":null,"abstract":"Trust modeling has received a remarkable attention in recent research. It is a decision making procedure which quantifies the major concern in information exchange, social exchange, and cognitive motivation. Trust has temporal behavior and it grows and declines on the basis of some cogitative parameters. Current study is based on psychological approach through which complicated relationships among different individuals can be model. In this study, we have proposed a computation cognitive trust model between pet and owner using difference equations. Results revels that proposed model have similar response as the assumptions was made. Moreover results were also obtained using simulation language.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603630
Sidra Nasir, Muhammad Asif, S. Ullah
When we use the term "electric Grid", it means that a network that consists of power generation stations, high voltage transmission lines and lines that are used to distribute energy to customers. But with the increasing demand of energy these power stations and their infrastructure is unable to fulfill customer’s demand. The Smart grid is possibly a good solution to fulfill energy needs because it allows the incorporation of renewable energy resources, smart meters and user’s interaction and communication with the grid. This study aimed at introducing the idea of Smart Grid in the society to fulfill energy needs by using the Diffusion of Innovation theory. This study ends up concluding that adoption rate is based on different attributes: age, gender, education level, income, residence and work status. According to our results it is recommend that implementation of Smart Grid is helpful in a developing society for fulfillment of energy needs but first step is awareness of Smart Grid idea in the society and our research is an ultimate source for this purpose.
{"title":"An Agent Based Model for Diffusion of Smart Grid Technology in the Society","authors":"Sidra Nasir, Muhammad Asif, S. Ullah","doi":"10.1109/ICET.2018.8603630","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603630","url":null,"abstract":"When we use the term \"electric Grid\", it means that a network that consists of power generation stations, high voltage transmission lines and lines that are used to distribute energy to customers. But with the increasing demand of energy these power stations and their infrastructure is unable to fulfill customer’s demand. The Smart grid is possibly a good solution to fulfill energy needs because it allows the incorporation of renewable energy resources, smart meters and user’s interaction and communication with the grid. This study aimed at introducing the idea of Smart Grid in the society to fulfill energy needs by using the Diffusion of Innovation theory. This study ends up concluding that adoption rate is based on different attributes: age, gender, education level, income, residence and work status. According to our results it is recommend that implementation of Smart Grid is helpful in a developing society for fulfillment of energy needs but first step is awareness of Smart Grid idea in the society and our research is an ultimate source for this purpose.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603654
M. F. Shafique, Hassan Kamran, Hafsa Arshad, Hasan Ali Khattak
Energy consumption in the residential sector has been increasing from the last fifty years. Due to present circumstances like global warming, saving energy becomes the debating topic, many experiments about conserving energy has been presented. But providing details to residents about their daily life energy consumption becomes a feasible solution to advertise the concept of save energy in homes. In this paper, a home monitoring system using wireless sensor network is represented. The author proposed and implemented a wireless power slave sensor network and experiment its energy saving efficiency and accuracy.
{"title":"Home Energy Monitoring System using Wireless Sensor Network","authors":"M. F. Shafique, Hassan Kamran, Hafsa Arshad, Hasan Ali Khattak","doi":"10.1109/ICET.2018.8603654","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603654","url":null,"abstract":"Energy consumption in the residential sector has been increasing from the last fifty years. Due to present circumstances like global warming, saving energy becomes the debating topic, many experiments about conserving energy has been presented. But providing details to residents about their daily life energy consumption becomes a feasible solution to advertise the concept of save energy in homes. In this paper, a home monitoring system using wireless sensor network is represented. The author proposed and implemented a wireless power slave sensor network and experiment its energy saving efficiency and accuracy.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123747378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603602
Fayyaz Ali, Shah Khusro
Delay in a cricket match due to rain interruption or bad light is the most hated in the cricket arena in limited overs game (50 overs or 20 overs games). A complete washout of the match is an unsolvable phenomenon but the problem of restarting the match to be played with reduced number of overs has to be solved. Several different scenarios are faced in this context for which the Duckworth Lewis (D/L) or the new version Duckworth Lewis Stern (DLS) method is used to solve the problem of resetting the targets for the chasing team (team batting second). The D/L method uses two factors; the remaining number of overs and wickets, which yields to certain problems. There is not much that can be done with the number of overs remaining but the number of wickets remaining can be handled much more efficiently to reset the scores. In this article we are presenting a simple yet useful method that not only take into account the number of remaining wickets (batsmen) but also their quality (in terms of their career rating points and their ranking). Experiments are performed with the proposed method which shows the acceptability of our proposed solution.
{"title":"Player Ranking: A Solution to the Duckworth/ Lewis Method Problems","authors":"Fayyaz Ali, Shah Khusro","doi":"10.1109/ICET.2018.8603602","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603602","url":null,"abstract":"Delay in a cricket match due to rain interruption or bad light is the most hated in the cricket arena in limited overs game (50 overs or 20 overs games). A complete washout of the match is an unsolvable phenomenon but the problem of restarting the match to be played with reduced number of overs has to be solved. Several different scenarios are faced in this context for which the Duckworth Lewis (D/L) or the new version Duckworth Lewis Stern (DLS) method is used to solve the problem of resetting the targets for the chasing team (team batting second). The D/L method uses two factors; the remaining number of overs and wickets, which yields to certain problems. There is not much that can be done with the number of overs remaining but the number of wickets remaining can be handled much more efficiently to reset the scores. In this article we are presenting a simple yet useful method that not only take into account the number of remaining wickets (batsmen) but also their quality (in terms of their career rating points and their ranking). Experiments are performed with the proposed method which shows the acceptability of our proposed solution.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132281223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603557
Bilal Khalid Dar, M. Ali Shah, Huniya Shahid, A. Naseem
Accident and emergencies are unpredictable. In case of accidents, human intervention causes time delay and it can result in many problems, even human life loss. In this regard, IoT offers a lot of benefits. The main purpose of IoT based disaster management system is to provide aid in an emergency system with minimum delay. Cloud computing plays a vital role in IoT. It provides storage, management, and processing of a large amount of data. As a large amount of data is processed on the cloud, the overall processing time increase due to transferring and processing delay. Here, Fog Computing comes into play as it provides processing at the edge of the network. it provides many advantages such as reduced latency, mobility, geographical distribution, real-time interactions etc. the purpose of this paper is to exploit the advantages of fog computing to develop a fog-based accident detection and emergency response system, which employs Android device sensors to detect an accident emergency, accident location and create an action plan to handle the emergency timely. We evaluated our approach with the help of iFogSim which is an open source toolkit for simulating fog technologies along with IoT and cloud. The results achieved after simulation are promising and illustrate that fog provides superior results in comparison to the cloud.
{"title":"Fog Computing based Automated Accident Detection and Emergency Response System using Android Smartphone","authors":"Bilal Khalid Dar, M. Ali Shah, Huniya Shahid, A. Naseem","doi":"10.1109/ICET.2018.8603557","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603557","url":null,"abstract":"Accident and emergencies are unpredictable. In case of accidents, human intervention causes time delay and it can result in many problems, even human life loss. In this regard, IoT offers a lot of benefits. The main purpose of IoT based disaster management system is to provide aid in an emergency system with minimum delay. Cloud computing plays a vital role in IoT. It provides storage, management, and processing of a large amount of data. As a large amount of data is processed on the cloud, the overall processing time increase due to transferring and processing delay. Here, Fog Computing comes into play as it provides processing at the edge of the network. it provides many advantages such as reduced latency, mobility, geographical distribution, real-time interactions etc. the purpose of this paper is to exploit the advantages of fog computing to develop a fog-based accident detection and emergency response system, which employs Android device sensors to detect an accident emergency, accident location and create an action plan to handle the emergency timely. We evaluated our approach with the help of iFogSim which is an open source toolkit for simulating fog technologies along with IoT and cloud. The results achieved after simulation are promising and illustrate that fog provides superior results in comparison to the cloud.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603633
Z. Ashraf, Muhammad Yousaf
The fast growth of the Internet has resulted in IPv4 addresses depletion. Internet Service Providers (ISPs) are trying to replace their IPv4 networks with IPv6 gradually. IPv6 was launched with new features like simpler header format, larger address space, efficient routing and built-in security. IPv4-IPv6 transition process has been slow therefore both versions of IP are expected to co-exist for some time. As IPv4 and IPv6 are not compatible to each other, therefore packet traversing and routing has to face challenges. Tunneling is a temporary solution which is used to resolve packet traversing. This research presents the behavioral analysis of Open Shortest Path First (OSPFv3) through several IPv6 tunneling protocols (6in4, 6to4, ISATAP & GRE) over large scale IPv4 network. The performance of OSPFv3 is measured through route summarization over hybrid IPv4-IPv6 network on the basis of numerous parameters like convergence & re-convergence time, round trip time, response time, tunnel overhead and protocol traffic statistics.
{"title":"Optimized Convergence of OSPFv3 in Large Scale Hybrid IPv4-IPv6 Network","authors":"Z. Ashraf, Muhammad Yousaf","doi":"10.1109/ICET.2018.8603633","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603633","url":null,"abstract":"The fast growth of the Internet has resulted in IPv4 addresses depletion. Internet Service Providers (ISPs) are trying to replace their IPv4 networks with IPv6 gradually. IPv6 was launched with new features like simpler header format, larger address space, efficient routing and built-in security. IPv4-IPv6 transition process has been slow therefore both versions of IP are expected to co-exist for some time. As IPv4 and IPv6 are not compatible to each other, therefore packet traversing and routing has to face challenges. Tunneling is a temporary solution which is used to resolve packet traversing. This research presents the behavioral analysis of Open Shortest Path First (OSPFv3) through several IPv6 tunneling protocols (6in4, 6to4, ISATAP & GRE) over large scale IPv4 network. The performance of OSPFv3 is measured through route summarization over hybrid IPv4-IPv6 network on the basis of numerous parameters like convergence & re-convergence time, round trip time, response time, tunnel overhead and protocol traffic statistics.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122839772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603644
Muhammad Zeeshan Khan, Summra Saleem, Muhammad A. Hassan, Muhammad Usman Ghanni Khan
Soccer video event identification has been an interesting task in research community during past few decades. Numerous machine learning techniques and C2D (Convolution 2-dimensional) have been used for this problem, but C3D has not been implemented for this task. By taking advantage from C3D (Convolution 3-dimensional), to completely exploit spatio-temporal relation, deep convolution network is developed to highlight distinct video events in proposed research work. Initially, we detect soccer video event marks by pixel differencing and edge change ratio. After this semantic features of segmented frames are extracted followed by CNN to map soccer event categories: Corner, Shoot, Goal Attempt, Penalty Kick. Because no effective and suitable dataset is available, we categorized soccer videos into four classes and developed soccer videos dataset for training CNN network. Evaluation results on soccer match clips generated results with high efficiency.
{"title":"Learning Deep C3D Features For Soccer Video Event Detection","authors":"Muhammad Zeeshan Khan, Summra Saleem, Muhammad A. Hassan, Muhammad Usman Ghanni Khan","doi":"10.1109/ICET.2018.8603644","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603644","url":null,"abstract":"Soccer video event identification has been an interesting task in research community during past few decades. Numerous machine learning techniques and C2D (Convolution 2-dimensional) have been used for this problem, but C3D has not been implemented for this task. By taking advantage from C3D (Convolution 3-dimensional), to completely exploit spatio-temporal relation, deep convolution network is developed to highlight distinct video events in proposed research work. Initially, we detect soccer video event marks by pixel differencing and edge change ratio. After this semantic features of segmented frames are extracted followed by CNN to map soccer event categories: Corner, Shoot, Goal Attempt, Penalty Kick. Because no effective and suitable dataset is available, we categorized soccer videos into four classes and developed soccer videos dataset for training CNN network. Evaluation results on soccer match clips generated results with high efficiency.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICET.2018.8603616
Waqar Ali, Tanveer Ahmed, Zobia Rehman, A. Rehman, M. Slaman
Plagiarism, intellectual theft, and copyright violation are the most important problems for researchers and academic organizations such as universities. The famous publicly available Plagiarism Detection (PD) tools are Turnitin, APlagramme, Plagscan, and Aplag and these tools use to overcome plagiarism problems. However, these tools mainly work for English, Persian and Arabic languages. Copyright and intellectual document have written in every language of the world and many South Asian countries including Pakistan and India, a huge amount of academic content is available in the Urdu language. Unfortunately, due to resources scarcity and less concentration of researcher There is no enough work has been done in Urdu PD. Capturing of plagiarism in Urdu is presented in this paper. Most existing Urdu PD systems fail to identify paraphrase plagiarism in comparison between suspicious and source text document. However, the proposed system is able to identify different types of plagiarism like sentence reordering, inert/delete inter-textual similarity and near copy similarity. The proposed system is based on a distance measuring method, structural alignment algorithm, and vector space model. The system performance is evaluated using machine learning classifiers i.e. Support Vector Machine and Naïve Bayes. The experimental results demonstrated that performance of the proposed method is improved as compared to other existing model i.e. cosine method, simple Jaccard measure.
{"title":"Detection of Plagiarism in Urdu Text Documents","authors":"Waqar Ali, Tanveer Ahmed, Zobia Rehman, A. Rehman, M. Slaman","doi":"10.1109/ICET.2018.8603616","DOIUrl":"https://doi.org/10.1109/ICET.2018.8603616","url":null,"abstract":"Plagiarism, intellectual theft, and copyright violation are the most important problems for researchers and academic organizations such as universities. The famous publicly available Plagiarism Detection (PD) tools are Turnitin, APlagramme, Plagscan, and Aplag and these tools use to overcome plagiarism problems. However, these tools mainly work for English, Persian and Arabic languages. Copyright and intellectual document have written in every language of the world and many South Asian countries including Pakistan and India, a huge amount of academic content is available in the Urdu language. Unfortunately, due to resources scarcity and less concentration of researcher There is no enough work has been done in Urdu PD. Capturing of plagiarism in Urdu is presented in this paper. Most existing Urdu PD systems fail to identify paraphrase plagiarism in comparison between suspicious and source text document. However, the proposed system is able to identify different types of plagiarism like sentence reordering, inert/delete inter-textual similarity and near copy similarity. The proposed system is based on a distance measuring method, structural alignment algorithm, and vector space model. The system performance is evaluated using machine learning classifiers i.e. Support Vector Machine and Naïve Bayes. The experimental results demonstrated that performance of the proposed method is improved as compared to other existing model i.e. cosine method, simple Jaccard measure.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130894540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}