首页 > 最新文献

2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

英文 中文
The semantic analysis method and algorithms of open tests answers on “cyber-2” pattern in the knowledge revival and evaluation systems 知识复兴与评价系统中“cyber-2”模式开放测试答案的语义分析方法与算法
Zurab Munjishvili, T. Munjishvili
Is given the identification and assessment of knowledge in the computer systems in scientific terms it is one of the interesting and in practical terms, the topical - The open type tests processing value. In the open-type tests the semantic analysis method and algorithms are written in natural language. Are introduces a semantic analyzer results. Semantic Analyzer represents by the author, designed to identify knowledge and one of the functional unit evaluation system of “cyber2”. The findings and recommendations are also given. In the programming package there are considered diagnosis, different kinds of help. Attention is paid on security problems. Program is written on VB.NET 2010, as a server is used SQL Server 2008 on the platform of Windows Server 2008.
在计算机系统中给出了识别和评价的知识,从科学的角度来说,它是一个有趣而又实用的课题——开放式试验的处理价值。在开放式测试中,语义分析方法和算法用自然语言编写。是介绍一个语义分析器的结果。以作者为代表的语义分析器,设计用于“cyber2”的知识识别和功能单元评价系统之一。本文还给出了研究结果和建议。在编程包中有考虑诊断,不同种类的帮助。关注安全问题。程序是用VB编写的。NET 2010作为服务器,在Windows server 2008平台下采用SQL server 2008。
{"title":"The semantic analysis method and algorithms of open tests answers on “cyber-2” pattern in the knowledge revival and evaluation systems","authors":"Zurab Munjishvili, T. Munjishvili","doi":"10.1109/INTELCIS.2015.7397195","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397195","url":null,"abstract":"Is given the identification and assessment of knowledge in the computer systems in scientific terms it is one of the interesting and in practical terms, the topical - The open type tests processing value. In the open-type tests the semantic analysis method and algorithms are written in natural language. Are introduces a semantic analyzer results. Semantic Analyzer represents by the author, designed to identify knowledge and one of the functional unit evaluation system of “cyber2”. The findings and recommendations are also given. In the programming package there are considered diagnosis, different kinds of help. Attention is paid on security problems. Program is written on VB.NET 2010, as a server is used SQL Server 2008 on the platform of Windows Server 2008.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80010650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Primitive printed Arabic Optical Character Recognition using statistical features 使用统计特征的原始印刷阿拉伯光学字符识别
Mohamed Dahi, N. Semary, M. Hadhoud
Due to the several forms of different Arabic font types, Arabic character recognition is still a challenge. Most literature works consider only one font per text what results in low recognition accuracy. This paper tends to enhance the accuracy of AOCR (Arabic Optical Character Recognition) by considering an automatic Optical Font Recognition (OFR) stage before going ahead with the traditional OCR stages. This has been achieved using SIFT (Scale Invariant Feature Transform) descriptors. First, a comparative study of four most recent algorithms of primitive OCR has been performed to evaluate the different features and classifiers utilized in their systems. Accordingly, a combining of statistical features have been proposed as well as selecting Random Forest Tree classifier for classification stage. The combination of the features are used to train the classifiers. As a result, each recognized text font is directed to a specific classifier tree. The proposed system was tested on a generated Primitive Arabic Characters Noise Free dataset (PAC-NF) containing 30000 samples. Experimental results achieved a promising character recognition accuracy of 99.8-100%.
由于阿拉伯文有多种不同的字体类型,阿拉伯文字符识别仍然是一个挑战。大多数文献只考虑一种字体,导致识别精度较低。本文试图在传统光学字符识别阶段之前,考虑自动光学字体识别(OFR)阶段,以提高AOCR(阿拉伯语光学字符识别)的准确性。这是使用SIFT(尺度不变特征变换)描述符实现的。首先,对四种最新的原始OCR算法进行了比较研究,以评估其系统中使用的不同特征和分类器。在此基础上,提出了一种统计特征组合方法,并选择随机森林树分类器进行分类阶段。这些特征的组合被用来训练分类器。因此,每个被识别的文本字体被定向到一个特定的分类器树。在生成的包含30000个样本的原始阿拉伯字符无噪声数据集(PAC-NF)上对该系统进行了测试。实验结果表明,该方法的字符识别准确率为99.8-100%。
{"title":"Primitive printed Arabic Optical Character Recognition using statistical features","authors":"Mohamed Dahi, N. Semary, M. Hadhoud","doi":"10.1109/INTELCIS.2015.7397278","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397278","url":null,"abstract":"Due to the several forms of different Arabic font types, Arabic character recognition is still a challenge. Most literature works consider only one font per text what results in low recognition accuracy. This paper tends to enhance the accuracy of AOCR (Arabic Optical Character Recognition) by considering an automatic Optical Font Recognition (OFR) stage before going ahead with the traditional OCR stages. This has been achieved using SIFT (Scale Invariant Feature Transform) descriptors. First, a comparative study of four most recent algorithms of primitive OCR has been performed to evaluate the different features and classifiers utilized in their systems. Accordingly, a combining of statistical features have been proposed as well as selecting Random Forest Tree classifier for classification stage. The combination of the features are used to train the classifiers. As a result, each recognized text font is directed to a specific classifier tree. The proposed system was tested on a generated Primitive Arabic Characters Noise Free dataset (PAC-NF) containing 30000 samples. Experimental results achieved a promising character recognition accuracy of 99.8-100%.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88595271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of DNA-based Advanced Encryption Standard (AES) 基于dna的高级加密标准AES的设计
M. Sabry, M. Hashem, T. Nazmy, M. E. Khalifa
DNA cryptography is a new promising direction in cryptography research that emerged with the progress in DNA computing field. Traditional cryptographic systems have long legacy and are built on a strong mathematical and theoretical basis. So, an important perception needs to be developed that the DNA cryptography is not to negate the tradition, but to create a bridge between existing and new technology. The power of DNA computing will strengthen the existing security systems by opening up a new possibility of a hybrid cryptographic system. In our work, we are presenting the DNA-based design and implementation to “Advanced Encryption Standard” [AES]. We built our algorithm with all its specifications (data, algorithms operations and used functions) on DNA basis instead of bits. This aims at proving the possibility of building such a complex system on DNA basis in a way of making it a suitable candidate for implementation in biological environment or on DNA computers. Our algorithm kept the same security strength and robustness of the standard algorithm.
DNA密码学是随着DNA计算领域的发展而出现的一个新的密码学研究方向。传统的密码系统有着悠久的历史,建立在强大的数学和理论基础之上。因此,我们需要认识到,DNA密码学不是要否定传统,而是要在现有技术和新技术之间架起一座桥梁。DNA计算的力量将通过开辟混合密码系统的新可能性来加强现有的安全系统。在我们的工作中,我们提出了基于dna的设计和实现“高级加密标准”[AES]。我们以DNA为基础而不是以比特为基础构建算法及其所有规格(数据,算法操作和使用的函数)。其目的是证明在DNA基础上构建这样一个复杂系统的可能性,并使其适合在生物环境或DNA计算机上实现。该算法保持了与标准算法相同的安全强度和鲁棒性。
{"title":"Design of DNA-based Advanced Encryption Standard (AES)","authors":"M. Sabry, M. Hashem, T. Nazmy, M. E. Khalifa","doi":"10.1109/INTELCIS.2015.7397250","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397250","url":null,"abstract":"DNA cryptography is a new promising direction in cryptography research that emerged with the progress in DNA computing field. Traditional cryptographic systems have long legacy and are built on a strong mathematical and theoretical basis. So, an important perception needs to be developed that the DNA cryptography is not to negate the tradition, but to create a bridge between existing and new technology. The power of DNA computing will strengthen the existing security systems by opening up a new possibility of a hybrid cryptographic system. In our work, we are presenting the DNA-based design and implementation to “Advanced Encryption Standard” [AES]. We built our algorithm with all its specifications (data, algorithms operations and used functions) on DNA basis instead of bits. This aims at proving the possibility of building such a complex system on DNA basis in a way of making it a suitable candidate for implementation in biological environment or on DNA computers. Our algorithm kept the same security strength and robustness of the standard algorithm.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83723536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A preprocessing method for printed Tamil documents: Skew correction and textual classification 泰米尔语打印文档的预处理方法:偏斜校正和文本分类
M. Ramanan, A. Ramanan, E. Charles
An Optical character recognition (OCR) consists of the phases: preprocessing and segmentation, feature extraction, classification and post-processing. This paper focuses on preprocessing and segmentation tasks which plays a major role in the subsequent processes of an OCR. The objective of preprocessing and segmentation is to improve the quality of the input image. In addition this phase removes unnecessary portions of the input image that would otherwise complicate the subsequent steps of OCR and reduce the overall recognition rate. Preprocessing and segmentation step consists many sub processes namely, image binarisation, noise removal, skew detection and correction, page segmentation, text or non-text classification, line segmentation, word segmentation and character segmentation. This paper proposes a new method to calculate the skew angle for skew correction. In addition this paper proposes a more accurate method to segment the input image as blocks and classify the blocks as text or non-text. The skew angle is calculated on the scanned document using Wiener filter, smearing technique and Radon transform. Document image is segmented into blocks using run length smearing algorithm and connected component analysis. Features such as basic, density and HOG are extracted from each block for text and non-text classification. The proposed methods are tested on 54 documents. The testing results show a recognition rate of 96.30% for skew detection and correction whereas the recognition rate is 99.18% for text or non-text classification with binary SVMs using RBF kernel.
光学字符识别(OCR)包括预处理和分割、特征提取、分类和后处理四个阶段。本文重点研究了在OCR后续处理中起主要作用的预处理和分割任务。预处理和分割的目的是为了提高输入图像的质量。此外,这一阶段删除了输入图像中不必要的部分,否则这些部分会使OCR的后续步骤复杂化并降低整体识别率。预处理和分割步骤包括许多子过程,即图像二值化,去噪,倾斜检测和校正,页面分割,文本或非文本分类,线分割,词分割和字符分割。本文提出了一种新的倾斜角度计算方法,用于倾斜校正。此外,本文还提出了一种更准确的方法,将输入图像分割为块,并将块分类为文本或非文本。利用维纳滤波、涂抹技术和Radon变换对扫描文档进行倾斜角度计算。采用行程涂抹算法和连通分量分析对文档图像进行分割。从每个块中提取基本特征、密度特征和HOG特征,用于文本和非文本分类。在54个文档上对所提出的方法进行了测试。测试结果表明,基于RBF核的二值支持向量机对文本和非文本分类的识别率为99.18%,而对歪斜检测和校正的识别率为96.30%。
{"title":"A preprocessing method for printed Tamil documents: Skew correction and textual classification","authors":"M. Ramanan, A. Ramanan, E. Charles","doi":"10.1109/INTELCIS.2015.7397266","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397266","url":null,"abstract":"An Optical character recognition (OCR) consists of the phases: preprocessing and segmentation, feature extraction, classification and post-processing. This paper focuses on preprocessing and segmentation tasks which plays a major role in the subsequent processes of an OCR. The objective of preprocessing and segmentation is to improve the quality of the input image. In addition this phase removes unnecessary portions of the input image that would otherwise complicate the subsequent steps of OCR and reduce the overall recognition rate. Preprocessing and segmentation step consists many sub processes namely, image binarisation, noise removal, skew detection and correction, page segmentation, text or non-text classification, line segmentation, word segmentation and character segmentation. This paper proposes a new method to calculate the skew angle for skew correction. In addition this paper proposes a more accurate method to segment the input image as blocks and classify the blocks as text or non-text. The skew angle is calculated on the scanned document using Wiener filter, smearing technique and Radon transform. Document image is segmented into blocks using run length smearing algorithm and connected component analysis. Features such as basic, density and HOG are extracted from each block for text and non-text classification. The proposed methods are tested on 54 documents. The testing results show a recognition rate of 96.30% for skew detection and correction whereas the recognition rate is 99.18% for text or non-text classification with binary SVMs using RBF kernel.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83115959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrated trusted protection technologies for industrial control systems 工业控制系统集成可靠保护技术
Jing-pei Wang, Liu Jie, Shengming Yang, Li Dan
Security vulnerabilities in industrial control systems (ICS) and its open interconnected trends lead to security risks escalating. The existed security protection technologies, with poor applicability, are hard to meet the special need of information security for ICS. In this paper, trusted protection theories and technologies for ICS were studied and an integrated trusted protection model was proposed. The proposed method protected data and system security of ICS from aspects of trusted computing platform, trusted data protection mechanism and trust management network. The trusted protection technologies were deployed on each of the three network layers of ICS according to differentiated resource and security requirements of each layer. Analysis and simulation results indicate the effectiveness and superiority of the proposed method. The establishing of trusted protection model assists realizing the systematic security protection for heterogeneous industrial control systems.
工业控制系统的安全漏洞及其开放互联的趋势导致安全风险不断升级。现有的安全防护技术适用性差,难以满足工业控制系统对信息安全的特殊需求。本文研究了集成控制系统的可信保护理论和技术,提出了集成的可信保护模型。该方法从可信计算平台、可信数据保护机制和信任管理网络等方面对ICS的数据和系统安全进行了保护。根据不同的资源和安全需求,在ICS的三个网络层中分别部署可信防护技术。分析和仿真结果表明了该方法的有效性和优越性。建立可信保护模型有助于实现异构工业控制系统的系统安全保护。
{"title":"Integrated trusted protection technologies for industrial control systems","authors":"Jing-pei Wang, Liu Jie, Shengming Yang, Li Dan","doi":"10.1109/INTELCIS.2015.7397254","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397254","url":null,"abstract":"Security vulnerabilities in industrial control systems (ICS) and its open interconnected trends lead to security risks escalating. The existed security protection technologies, with poor applicability, are hard to meet the special need of information security for ICS. In this paper, trusted protection theories and technologies for ICS were studied and an integrated trusted protection model was proposed. The proposed method protected data and system security of ICS from aspects of trusted computing platform, trusted data protection mechanism and trust management network. The trusted protection technologies were deployed on each of the three network layers of ICS according to differentiated resource and security requirements of each layer. Analysis and simulation results indicate the effectiveness and superiority of the proposed method. The establishing of trusted protection model assists realizing the systematic security protection for heterogeneous industrial control systems.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90462971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Epidemiological modeling of network worm infections and countermeasures 网络蠕虫感染的流行病学建模与对策
K. Shahzad, Steve Woodhead
Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed and the continuous discovery of wormable vulnerabilities. Mathematical models for worm propagation can help us to understand the epidemiology of worm outbreaks and to devise effective defense mechanisms. In this paper, we report the epidemiological modeling and analysis of worm propagation and a distributed worm detection and prevention countermeasure. The work is based on the Slammer and Witty worm characteristics and employs the widely used Susceptible-Infected biological model. The epidemiological modeling shows that the SI model can be used to represent the virulence of random scanning worms and to quantify the effectiveness of worm countermeasures.
快速传播的网络蠕虫由于其毒性、速度和不断发现的蠕虫漏洞,继续对互联网构成威胁。蠕虫传播的数学模型可以帮助我们了解蠕虫爆发的流行病学和设计有效的防御机制。本文报道了蠕虫传播的流行病学建模和分析,以及一种分布式蠕虫检测和预防对策。这项工作是基于Slammer和Witty蠕虫的特征,并采用了广泛使用的易感感染生物学模型。流行病学模型表明,SI模型可以用来表示随机扫描蠕虫的毒力和量化蠕虫对策的有效性。
{"title":"Epidemiological modeling of network worm infections and countermeasures","authors":"K. Shahzad, Steve Woodhead","doi":"10.1109/INTELCIS.2015.7397288","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397288","url":null,"abstract":"Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed and the continuous discovery of wormable vulnerabilities. Mathematical models for worm propagation can help us to understand the epidemiology of worm outbreaks and to devise effective defense mechanisms. In this paper, we report the epidemiological modeling and analysis of worm propagation and a distributed worm detection and prevention countermeasure. The work is based on the Slammer and Witty worm characteristics and employs the widely used Susceptible-Infected biological model. The epidemiological modeling shows that the SI model can be used to represent the virulence of random scanning worms and to quantify the effectiveness of worm countermeasures.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81918426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ArSL keyboard for android android的ArSL键盘
M. El-Gayyar, Amira Ibrahim, Ahmed Sallam
Despite the efforts of many organizations and governments, deaf people still forming a closed community isolated from the public society. The only way to communicate in a deaf community is the use of Sign Language. In fact, for deaf individuals, Sign Language is the main communication barrier with hearing people; either one side needs to learn the language of the other or they have to depend on a third-party interpreter. With technological advances, there have been many attempts to build a feasible bridge to connect deaf communities with the public. However, most of the developed techniques are complex and need special and expensive equipment which is not affordable for deaf people, especially in Arabic countries where deaf represents a significant proportion of the population mostly of medium and poor classes. Fortunately, mobile devices reached all hands recently creating a good opportunity to build a simple viable solution. Thus, we have developed an Android mobile application to support the Arabic Sign Language. Inspired by Chinese keyboards, we have embedded the language signs as a font to build a user-friendly keyboard. It helps a deaf person to construct Arabic Sign Language sentences and to ask the application to convert them into standard Arabic text or speech. Moreover, the application works the other way around and translates from standard Arabic to Arabic Sign Language forming a simple mechanism for seamless communications between hearing and deaf people. Finally, we have tested our solution with a number of volunteers from deaf and hearing communities and the results were promising.
尽管许多组织和政府做出了努力,但聋人仍然是一个孤立于公共社会之外的封闭群体。在聋人社区里唯一的交流方式就是使用手语。事实上,对于聋人来说,手语是他们与正常人交流的主要障碍;任何一方都需要学习另一方的语言,或者他们必须依赖第三方翻译。随着技术的进步,已经有许多尝试建立一座可行的桥梁,将聋人社区与公众联系起来。然而,大多数已开发的技术都很复杂,需要特殊和昂贵的设备,聋哑人负担不起,特别是在聋哑人占人口很大比例的阿拉伯国家,其中大多数是中等和贫困阶层。幸运的是,最近移动设备普及,这为构建简单可行的解决方案创造了良机。因此,我们开发了一个Android移动应用程序来支持阿拉伯手语。受中国键盘的启发,我们嵌入了语言符号作为字体,以建立一个用户友好的键盘。它可以帮助聋哑人构建阿拉伯手语句子,并要求应用程序将其转换为标准的阿拉伯语文本或语音。此外,该应用程序还可以反过来工作,将标准阿拉伯语翻译成阿拉伯手语,形成一种简单的机制,使听力正常的人和聋人之间进行无缝通信。最后,我们在一些聋人和听力健全社区的志愿者身上测试了我们的解决方案,结果很有希望。
{"title":"The ArSL keyboard for android","authors":"M. El-Gayyar, Amira Ibrahim, Ahmed Sallam","doi":"10.1109/INTELCIS.2015.7397264","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397264","url":null,"abstract":"Despite the efforts of many organizations and governments, deaf people still forming a closed community isolated from the public society. The only way to communicate in a deaf community is the use of Sign Language. In fact, for deaf individuals, Sign Language is the main communication barrier with hearing people; either one side needs to learn the language of the other or they have to depend on a third-party interpreter. With technological advances, there have been many attempts to build a feasible bridge to connect deaf communities with the public. However, most of the developed techniques are complex and need special and expensive equipment which is not affordable for deaf people, especially in Arabic countries where deaf represents a significant proportion of the population mostly of medium and poor classes. Fortunately, mobile devices reached all hands recently creating a good opportunity to build a simple viable solution. Thus, we have developed an Android mobile application to support the Arabic Sign Language. Inspired by Chinese keyboards, we have embedded the language signs as a font to build a user-friendly keyboard. It helps a deaf person to construct Arabic Sign Language sentences and to ask the application to convert them into standard Arabic text or speech. Moreover, the application works the other way around and translates from standard Arabic to Arabic Sign Language forming a simple mechanism for seamless communications between hearing and deaf people. Finally, we have tested our solution with a number of volunteers from deaf and hearing communities and the results were promising.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81392221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparing ontology-based and Item response theory in computer adaptive test 基于本体理论与项目反应理论在计算机自适应测试中的比较
E. Khater, A. Hegazy, M. E. Shehab
Adaptive e-learning is concerning about students' skills and preferences. A few researches concerning about adaptive examination systems. Ontologies can be used in e-learning systems to organize and describe knowledge and to support content management. Combining ontology with CAT systems helps to control the exam content regarding content semantics. This paper propose an ontology based adaptive Comparing system's results with IRT results -The CAT major model- provide an exact information about how far the system is reliable regarding the IRT.
适应性电子学习关注的是学生的技能和偏好。关于适应性考试系统的一些研究。本体可以在电子学习系统中用于组织和描述知识,并支持内容管理。将本体与CAT系统相结合,有助于在内容语义上对考试内容进行控制。本文提出了一种基于本体的自适应比较系统结果与IRT结果- CAT主模型-提供了关于系统在IRT方面的可靠程度的准确信息。
{"title":"Comparing ontology-based and Item response theory in computer adaptive test","authors":"E. Khater, A. Hegazy, M. E. Shehab","doi":"10.1109/INTELCIS.2015.7397220","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397220","url":null,"abstract":"Adaptive e-learning is concerning about students' skills and preferences. A few researches concerning about adaptive examination systems. Ontologies can be used in e-learning systems to organize and describe knowledge and to support content management. Combining ontology with CAT systems helps to control the exam content regarding content semantics. This paper propose an ontology based adaptive Comparing system's results with IRT results -The CAT major model- provide an exact information about how far the system is reliable regarding the IRT.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83877123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized cooperative trajectory planning for multiple UAVs in dynamic and uncertain environments 动态不确定环境下多无人机分散协同轨迹规划
Yu Zhang, Jingzhao Yang, S. Chen, J. Chen
This paper studies the problem of planning collision-free dynamically feasible trajectories for a team of autonomous unmanned aerial vehicles (UAVs) in real-time, where the UAVs try to fly through a complex 3-D environment to reach their specified destinations. First, the cooperative trajectory planning problem is mathematically formulated as a decentralized receding horizon optimal control problem (DRH-OCP). Second, a decentralized coordination strategy for multi-vehicle real-time trajectory planning is designed by effectively combining the benefits of inverse dynamics optimization method and receding horizon optimal control technique. This coordination strategy mainly features that each vehicle only solves a sub-problem for its own plan and vehicles in the team make plans in parallel. Finally, simulation results show the feasibility of the proposed planning strategies.
本文研究了一组自主无人机(uav)在复杂的三维环境中飞行以到达指定目的地的实时无碰撞动态可行轨迹规划问题。首先,将协同轨迹规划问题在数学上表述为分散后退地平线最优控制问题(DRH-OCP)。其次,结合逆动力学优化方法和后退地平线最优控制技术的优点,设计了多车实时轨迹规划的分散协调策略;这种协调策略的主要特点是每辆车只解决自己计划的一个子问题,车队中的车辆并行制定计划。最后,仿真结果验证了所提规划策略的可行性。
{"title":"Decentralized cooperative trajectory planning for multiple UAVs in dynamic and uncertain environments","authors":"Yu Zhang, Jingzhao Yang, S. Chen, J. Chen","doi":"10.1109/INTELCIS.2015.7397248","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397248","url":null,"abstract":"This paper studies the problem of planning collision-free dynamically feasible trajectories for a team of autonomous unmanned aerial vehicles (UAVs) in real-time, where the UAVs try to fly through a complex 3-D environment to reach their specified destinations. First, the cooperative trajectory planning problem is mathematically formulated as a decentralized receding horizon optimal control problem (DRH-OCP). Second, a decentralized coordination strategy for multi-vehicle real-time trajectory planning is designed by effectively combining the benefits of inverse dynamics optimization method and receding horizon optimal control technique. This coordination strategy mainly features that each vehicle only solves a sub-problem for its own plan and vehicles in the team make plans in parallel. Finally, simulation results show the feasibility of the proposed planning strategies.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89422772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MOOCs in universities: Intelligent model for delivering online learning content 大学mooc:提供在线学习内容的智能模式
G. Sammour, A. Al-Zoubi, A. Gladun, K. Khala, Jeanne Schreurs
A massive open online course (MOOC) is a model for delivering learning content online to any person who wants to take a course, with no conditions on attendance. Unlike traditional courses, MOOCs require additional skills, provided by videographers, instructional designers, IT specialists and platform specialists. Over the past few years several Universities facilitated partnership with MOOCs providers and are building MOOC courses, to serve as e-learning versions of their courses. Despite all the advantages offered by the MOOC courses, the current statistics show that only a very limited number of registered learners are completing the course. And the vast majority are stopping learning at an early stage. The main reason can be found in the lack of motivation of the students to pass the exams to become a certificate, because universities do not accept the certificates for credits. The aim of this paper is to study the readiness of students to take MOOC courses on one hand and the acceptance of MOOC courses in Universities. A study is conducted on two Universities, Hasselt University, Belgium and Princess Sumaya University for Technology, Jordan. The results of the study are promising, as they suggest that such virtual study programs are accepted in both Universities. However, professors in both Universities elucidate concerns on accepting the equivalence of the MOOC courses to their own courses.
大规模在线开放课程(MOOC)是一种向任何想要参加课程的人提供在线学习内容的模式,没有出勤条件。与传统课程不同,mooc需要额外的技能,由视频摄影师、教学设计师、IT专家和平台专家提供。在过去的几年里,几所大学促进了与MOOC提供商的合作,并正在构建MOOC课程,作为其课程的电子学习版本。尽管MOOC课程提供了很多优势,但目前的统计数据显示,只有非常有限的注册学习者完成了课程。而且绝大多数人在早期阶段就停止了学习。主要原因是学生缺乏通过考试成为证书的动力,因为大学不接受学分证书。本文的目的一方面是研究学生对MOOC课程的准备情况,另一方面是研究大学对MOOC课程的接受程度。一项研究是在两所大学,比利时哈瑟尔特大学和约旦苏马亚公主理工大学进行的。这项研究的结果是有希望的,因为它们表明这种虚拟学习计划在两所大学都被接受。然而,两所大学的教授都对接受MOOC课程与他们自己的课程的等效性表示担忧。
{"title":"MOOCs in universities: Intelligent model for delivering online learning content","authors":"G. Sammour, A. Al-Zoubi, A. Gladun, K. Khala, Jeanne Schreurs","doi":"10.1109/INTELCIS.2015.7397216","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397216","url":null,"abstract":"A massive open online course (MOOC) is a model for delivering learning content online to any person who wants to take a course, with no conditions on attendance. Unlike traditional courses, MOOCs require additional skills, provided by videographers, instructional designers, IT specialists and platform specialists. Over the past few years several Universities facilitated partnership with MOOCs providers and are building MOOC courses, to serve as e-learning versions of their courses. Despite all the advantages offered by the MOOC courses, the current statistics show that only a very limited number of registered learners are completing the course. And the vast majority are stopping learning at an early stage. The main reason can be found in the lack of motivation of the students to pass the exams to become a certificate, because universities do not accept the certificates for credits. The aim of this paper is to study the readiness of students to take MOOC courses on one hand and the acceptance of MOOC courses in Universities. A study is conducted on two Universities, Hasselt University, Belgium and Princess Sumaya University for Technology, Jordan. The results of the study are promising, as they suggest that such virtual study programs are accepted in both Universities. However, professors in both Universities elucidate concerns on accepting the equivalence of the MOOC courses to their own courses.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79395708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1