{"title":"Proceedings of the 4th International Workshop on Software Engineering Education for the Next Generation","authors":"","doi":"10.1145/3528231","DOIUrl":"https://doi.org/10.1145/3528231","url":null,"abstract":"","PeriodicalId":59618,"journal":{"name":"下一代","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82363144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gender Schematization in Adolescents: Differences Based on Rearing in Single-Parent and Intact Families","authors":"M. Slavkin","doi":"10.4324/9781315786124-8","DOIUrl":"https://doi.org/10.4324/9781315786124-8","url":null,"abstract":"","PeriodicalId":59618,"journal":{"name":"下一代","volume":"197 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89011850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Young Adults Perceive Parental Divorce: The Role of Their Relationships with Their Fathers and Mothers","authors":"S. Shulman, M. Scharf, Daniel Lumer, Offer Maurer","doi":"10.4324/9781315786124-2","DOIUrl":"https://doi.org/10.4324/9781315786124-2","url":null,"abstract":"","PeriodicalId":59618,"journal":{"name":"下一代","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81277527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-24DOI: 10.4324/9781315786124-11
Anna L. Christopoulos
{"title":"Relationships Between Parents' Marital Status and University Students' Mental Health, Views of Mothers and Views of Fathers: A Study in Bulgaria","authors":"Anna L. Christopoulos","doi":"10.4324/9781315786124-11","DOIUrl":"https://doi.org/10.4324/9781315786124-11","url":null,"abstract":"","PeriodicalId":59618,"journal":{"name":"下一代","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82290473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857585
Ajay Sharma, Monika Bhalla, Kriti Baweja
In order to do business it becomes a necesssity to share sensitive piece of information with certain not so trusted agents otherwise known as outsourcing of data or work. This sharing of data cannot be avoided but the process of it not getting leaked is major point of concern from Data Security point of view. In this paper we have tried to suggest a cumulative method of strategies to protect Sensitive data from getting into wrong hands and to identify guilty agents.
{"title":"Extrusion prevention content monitoring filtering system","authors":"Ajay Sharma, Monika Bhalla, Kriti Baweja","doi":"10.1109/INCITE.2016.7857585","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857585","url":null,"abstract":"In order to do business it becomes a necesssity to share sensitive piece of information with certain not so trusted agents otherwise known as outsourcing of data or work. This sharing of data cannot be avoided but the process of it not getting leaked is major point of concern from Data Security point of view. In this paper we have tried to suggest a cumulative method of strategies to protect Sensitive data from getting into wrong hands and to identify guilty agents.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"190 1","pages":"37-39"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74182211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857586
R. Malik, Praveen Kumar, Amit Verma, S. Rawat
In this work, we are proposing the designing and development of a camera based attendance system that could scan the faces of multiple students and could be a successor to all the biometric devices that are being used till date. Human face is a dynamic thing and has high degree of variability so we need speed and accuracy to detect face structures of the students. The processing of the system would include registering students by capturing their pictures and then using those for marking attendance. Continuous estimation is needed to get high accuracy in such a system. This paper initially introduces our system and finally evidence will be provided to support our system. This system can be also used in online examination for authentication of the identity of the student giving the examination.
{"title":"Prototype model for an intelligent attendance system based on facial identification","authors":"R. Malik, Praveen Kumar, Amit Verma, S. Rawat","doi":"10.1109/INCITE.2016.7857586","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857586","url":null,"abstract":"In this work, we are proposing the designing and development of a camera based attendance system that could scan the faces of multiple students and could be a successor to all the biometric devices that are being used till date. Human face is a dynamic thing and has high degree of variability so we need speed and accuracy to detect face structures of the students. The processing of the system would include registering students by capturing their pictures and then using those for marking attendance. Continuous estimation is needed to get high accuracy in such a system. This paper initially introduces our system and finally evidence will be provided to support our system. This system can be also used in online examination for authentication of the identity of the student giving the examination.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"67 1","pages":"40-43"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80025628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857626
Shivali, Ekta Sharma, P. Mahapatra, Amit Doegar
Image thresholding is a critical task of image segmentation. Selection of the optimal value of the threshold is the most important task for image thresholding. The better the value of threshold better is the quality of segmentation. In this paper, recent swarm intelligence technique (fireworks algorithm) has been used for image thresholding. Fireworks algorithm is used to maximize two functions, namely Kapur and Otsu. Results show that quality of segmentation is better in case of Firewok-Otsu than Firework-Kapur. Comparison of results has been done on the basis of PSNR value.
{"title":"Image thresholding based on swarm intelligence technique for image segmentation","authors":"Shivali, Ekta Sharma, P. Mahapatra, Amit Doegar","doi":"10.1109/INCITE.2016.7857626","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857626","url":null,"abstract":"Image thresholding is a critical task of image segmentation. Selection of the optimal value of the threshold is the most important task for image thresholding. The better the value of threshold better is the quality of segmentation. In this paper, recent swarm intelligence technique (fireworks algorithm) has been used for image thresholding. Fireworks algorithm is used to maximize two functions, namely Kapur and Otsu. Results show that quality of segmentation is better in case of Firewok-Otsu than Firework-Kapur. Comparison of results has been done on the basis of PSNR value.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"8 1","pages":"251-255"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84172813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857637
W. Isaac, Abdullah Na
Smart agriculture requires a reliable, real-time, and on-site characterization of soil properties. In the characterization of soil, nitrogen is the most important nutrient. Although many techniques have been developed for soil nitrogen estimation over the last few decades, on-site measurement in real-time still poses problems. Spectroscopic techniques are among the ones most utilized for this purpose and near infrared spectroscopy is the most convenient method so far. In this work, a discrete wavelength near infrared spectroscopic device is developed and tested. Calibration is done using partial least squares regression method. The on-field testing versus laboratory testing shows a high value of coefficient of determination.
{"title":"On-the-go soil nitrogen sensor based on near infrared spectroscopy","authors":"W. Isaac, Abdullah Na","doi":"10.1109/INCITE.2016.7857637","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857637","url":null,"abstract":"Smart agriculture requires a reliable, real-time, and on-site characterization of soil properties. In the characterization of soil, nitrogen is the most important nutrient. Although many techniques have been developed for soil nitrogen estimation over the last few decades, on-site measurement in real-time still poses problems. Spectroscopic techniques are among the ones most utilized for this purpose and near infrared spectroscopy is the most convenient method so far. In this work, a discrete wavelength near infrared spectroscopic device is developed and tested. Calibration is done using partial least squares regression method. The on-field testing versus laboratory testing shows a high value of coefficient of determination.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"111 1","pages":"312-315"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82239375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/INCITE.2016.7857587
Anshika Chaturvedi, Praveen Kumar, S. Rawat
In this paper, a PIR based security system which saves the power consumption and the memory space of the recording system has been proposed. Passive Infrared Radiation (PIR) sensor detects the change in infrared radiation of warm blooded moving object in its feasible detection range. Once the system gets adapted to the environment in first few initial seconds, then any change in the level of infrared radiations surrounding him will pass on the signal to microcontroller of the system that will in turn trigger the alarm for immediate saviour action and switches on the camera through relay to start recording the motion and corresponding activities of the intruder an save it in the system for later surveillance and an evidence against some criminal activity which might happen or for any breakage of the law. A software installed in the system will highlight the intruder face and help camera to focus on his motion specifically and guide his own motion according to his movements and an email message will be sent to the owner of the shop to alert him about the situation in addition to detecting the webcam connection and starting and saving the video simultaneously. Once the intruder moves out of detection range of the sensor, the webcam and light gets turn OFF. The software repeats the process. Thereby saving the power consumption and the memory space of the recording system as the webcam will only get turned ON when PIR sensors detects someone. As a result, the system starts recording only when the webcam is turned ON, hence saving memory space.
{"title":"Proposed noval security system based on passive infrared sensor","authors":"Anshika Chaturvedi, Praveen Kumar, S. Rawat","doi":"10.1109/INCITE.2016.7857587","DOIUrl":"https://doi.org/10.1109/INCITE.2016.7857587","url":null,"abstract":"In this paper, a PIR based security system which saves the power consumption and the memory space of the recording system has been proposed. Passive Infrared Radiation (PIR) sensor detects the change in infrared radiation of warm blooded moving object in its feasible detection range. Once the system gets adapted to the environment in first few initial seconds, then any change in the level of infrared radiations surrounding him will pass on the signal to microcontroller of the system that will in turn trigger the alarm for immediate saviour action and switches on the camera through relay to start recording the motion and corresponding activities of the intruder an save it in the system for later surveillance and an evidence against some criminal activity which might happen or for any breakage of the law. A software installed in the system will highlight the intruder face and help camera to focus on his motion specifically and guide his own motion according to his movements and an email message will be sent to the owner of the shop to alert him about the situation in addition to detecting the webcam connection and starting and saving the video simultaneously. Once the intruder moves out of detection range of the sensor, the webcam and light gets turn OFF. The software repeats the process. Thereby saving the power consumption and the memory space of the recording system as the webcam will only get turned ON when PIR sensors detects someone. As a result, the system starts recording only when the webcam is turned ON, hence saving memory space.","PeriodicalId":59618,"journal":{"name":"下一代","volume":"26 1","pages":"44-47"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82620651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}