首页 > 最新文献

2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

英文 中文
An optimized scheme for vertical fragmentation, allocation and replication of a distributed database 分布式数据库垂直分片、分配和复制的优化方案
Ahmed E. Abdel Raouf, N. Badr, M. Tolba
Distributed databases have become the most essential technology for recent business organizations. One of the main issues of the distributed database management system (DDBMS) is the distributed database design. The performance and efficiency of a distributed database design largely depend on the fragmentation of global relations. It also depends on the allocation and replication of those fragments to several sites of the network. Earlier approaches suggest vertical fragmentation solutions based on the frequency of the user queries. However, these approaches have the limitation of higher complexity and availability of the frequency of user queries at the initial stage of the database design, iterative binary partitioning in case of n-ary partitioning which will increase the complexity and predetermined threshold value that is used to enhance the results, as well as the problem of more computation. Consequently in this paper, we present a vertical fragmentation, allocation and replication scheme of a distributed database called (VFAR). The proposed scheme partitions the distributed database relations vertically at the initial stage of distributed database design, without the need for the frequency of user queries which are not available at this stage. It also allocates and replicates the resulted fragments to the sites of the distributed database, using manipulates and read operations of each site to each fragment. Experimental results showed that firstly; the proposed scheme reduces the overheads and the complexity of complicated computations of previous vertical partitioning approaches. Secondly, it solves the problem of the frequency of the user queries that are not available at the initial stage. Thirdly, it solves the problem of iterative binary partitioning in the case of n-ary partitioning by generating all fragments of one iteration. Finally, it gets the optimal results without the need to determine a threshold value that is used to enhance the results.
分布式数据库已经成为当今商业组织最基本的技术。分布式数据库管理系统(DDBMS)的主要问题之一是分布式数据库的设计。分布式数据库设计的性能和效率在很大程度上取决于全局关系的碎片化。它还取决于这些片段在网络的几个站点上的分配和复制。早期的方法建议基于用户查询频率的垂直碎片化解决方案。然而,这些方法在数据库设计的初始阶段具有较高的复杂性和用户查询频率的可用性,在n-ary分区情况下迭代二进制分区会增加复杂性和用于增强结果的预定阈值,以及计算量较大的问题。因此,在本文中,我们提出了一个分布式数据库(VFAR)的垂直分片、分配和复制方案。该方案在分布式数据库设计的初始阶段对分布式数据库关系进行垂直分区,而不需要用户查询的频率,这在这个阶段是不可用的。它还将结果片段分配并复制到分布式数据库的站点,使用每个站点对每个片段的操作和读取操作。实验结果表明:首先;该方案降低了以往垂直划分方法的开销和复杂计算的复杂性。其次,它解决了用户查询在初始阶段不可用的频率问题。第三,通过生成一次迭代的所有片段,解决了n元划分情况下的迭代二叉划分问题。最后,它可以获得最佳结果,而不需要确定用于增强结果的阈值。
{"title":"An optimized scheme for vertical fragmentation, allocation and replication of a distributed database","authors":"Ahmed E. Abdel Raouf, N. Badr, M. Tolba","doi":"10.1109/INTELCIS.2015.7397268","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397268","url":null,"abstract":"Distributed databases have become the most essential technology for recent business organizations. One of the main issues of the distributed database management system (DDBMS) is the distributed database design. The performance and efficiency of a distributed database design largely depend on the fragmentation of global relations. It also depends on the allocation and replication of those fragments to several sites of the network. Earlier approaches suggest vertical fragmentation solutions based on the frequency of the user queries. However, these approaches have the limitation of higher complexity and availability of the frequency of user queries at the initial stage of the database design, iterative binary partitioning in case of n-ary partitioning which will increase the complexity and predetermined threshold value that is used to enhance the results, as well as the problem of more computation. Consequently in this paper, we present a vertical fragmentation, allocation and replication scheme of a distributed database called (VFAR). The proposed scheme partitions the distributed database relations vertically at the initial stage of distributed database design, without the need for the frequency of user queries which are not available at this stage. It also allocates and replicates the resulted fragments to the sites of the distributed database, using manipulates and read operations of each site to each fragment. Experimental results showed that firstly; the proposed scheme reduces the overheads and the complexity of complicated computations of previous vertical partitioning approaches. Secondly, it solves the problem of the frequency of the user queries that are not available at the initial stage. Thirdly, it solves the problem of iterative binary partitioning in the case of n-ary partitioning by generating all fragments of one iteration. Finally, it gets the optimal results without the need to determine a threshold value that is used to enhance the results.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"44 1","pages":"506-513"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84612180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Efficient breast cancer detection using sequential feature selection techniques 使用序列特征选择技术的高效乳腺癌检测
Taha M. Mohamed
Breast cancer is one of the most dangerous cancers in the world especially in the Arab countries and Egypt. Due to the large spreading of the disease, automatic recognition systems can help physicians to classify the tumors as benign or malignant. However, performing a lot of pathological analysis consumes time and money. In this paper, we propose an algorithm for decreasing the number of features required to detect the tumor. Two classifiers are chosen to test the classification accuracy; linear and quadratic. The experimental results show that, there are strong correlations between the features in the data set. When using the sequential feature selection algorithm, results show that, discarding more than 50% of the features has no significant loss on classification accuracy when using the quadratic discriminate classifier. Additionally, only four PCA components can be used with the same accuracy as using nine components when being classified by the linear discriminate classifier. Additionally, the outliers in the data set have no notable effect on the classification accuracy. The data set is proved to be homogenous using the k-means clustering algorithm.
乳腺癌是世界上最危险的癌症之一,尤其是在阿拉伯国家和埃及。由于这种疾病的广泛传播,自动识别系统可以帮助医生将肿瘤分类为良性或恶性。然而,进行大量的病理分析需要耗费时间和金钱。在本文中,我们提出了一种算法来减少检测肿瘤所需的特征数量。选择两种分类器来测试分类精度;线性的和二次的。实验结果表明,数据集中的特征之间存在很强的相关性。当使用顺序特征选择算法时,结果表明,使用二次判别分类器时,丢弃50%以上的特征对分类精度没有明显损失。此外,当被线性判别分类器分类时,仅使用四个PCA分量就可以获得与使用九个分量相同的精度。此外,数据集中的异常值对分类精度没有显著影响。利用k均值聚类算法证明了数据集是齐次的。
{"title":"Efficient breast cancer detection using sequential feature selection techniques","authors":"Taha M. Mohamed","doi":"10.1109/INTELCIS.2015.7397261","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397261","url":null,"abstract":"Breast cancer is one of the most dangerous cancers in the world especially in the Arab countries and Egypt. Due to the large spreading of the disease, automatic recognition systems can help physicians to classify the tumors as benign or malignant. However, performing a lot of pathological analysis consumes time and money. In this paper, we propose an algorithm for decreasing the number of features required to detect the tumor. Two classifiers are chosen to test the classification accuracy; linear and quadratic. The experimental results show that, there are strong correlations between the features in the data set. When using the sequential feature selection algorithm, results show that, discarding more than 50% of the features has no significant loss on classification accuracy when using the quadratic discriminate classifier. Additionally, only four PCA components can be used with the same accuracy as using nine components when being classified by the linear discriminate classifier. Additionally, the outliers in the data set have no notable effect on the classification accuracy. The data set is proved to be homogenous using the k-means clustering algorithm.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"11 1","pages":"458-464"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86139010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of DNA-based Advanced Encryption Standard (AES) 基于dna的高级加密标准AES的设计
M. Sabry, M. Hashem, T. Nazmy, M. E. Khalifa
DNA cryptography is a new promising direction in cryptography research that emerged with the progress in DNA computing field. Traditional cryptographic systems have long legacy and are built on a strong mathematical and theoretical basis. So, an important perception needs to be developed that the DNA cryptography is not to negate the tradition, but to create a bridge between existing and new technology. The power of DNA computing will strengthen the existing security systems by opening up a new possibility of a hybrid cryptographic system. In our work, we are presenting the DNA-based design and implementation to “Advanced Encryption Standard” [AES]. We built our algorithm with all its specifications (data, algorithms operations and used functions) on DNA basis instead of bits. This aims at proving the possibility of building such a complex system on DNA basis in a way of making it a suitable candidate for implementation in biological environment or on DNA computers. Our algorithm kept the same security strength and robustness of the standard algorithm.
DNA密码学是随着DNA计算领域的发展而出现的一个新的密码学研究方向。传统的密码系统有着悠久的历史,建立在强大的数学和理论基础之上。因此,我们需要认识到,DNA密码学不是要否定传统,而是要在现有技术和新技术之间架起一座桥梁。DNA计算的力量将通过开辟混合密码系统的新可能性来加强现有的安全系统。在我们的工作中,我们提出了基于dna的设计和实现“高级加密标准”[AES]。我们以DNA为基础而不是以比特为基础构建算法及其所有规格(数据,算法操作和使用的函数)。其目的是证明在DNA基础上构建这样一个复杂系统的可能性,并使其适合在生物环境或DNA计算机上实现。该算法保持了与标准算法相同的安全强度和鲁棒性。
{"title":"Design of DNA-based Advanced Encryption Standard (AES)","authors":"M. Sabry, M. Hashem, T. Nazmy, M. E. Khalifa","doi":"10.1109/INTELCIS.2015.7397250","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397250","url":null,"abstract":"DNA cryptography is a new promising direction in cryptography research that emerged with the progress in DNA computing field. Traditional cryptographic systems have long legacy and are built on a strong mathematical and theoretical basis. So, an important perception needs to be developed that the DNA cryptography is not to negate the tradition, but to create a bridge between existing and new technology. The power of DNA computing will strengthen the existing security systems by opening up a new possibility of a hybrid cryptographic system. In our work, we are presenting the DNA-based design and implementation to “Advanced Encryption Standard” [AES]. We built our algorithm with all its specifications (data, algorithms operations and used functions) on DNA basis instead of bits. This aims at proving the possibility of building such a complex system on DNA basis in a way of making it a suitable candidate for implementation in biological environment or on DNA computers. Our algorithm kept the same security strength and robustness of the standard algorithm.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"6 1","pages":"390-397"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83723536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Primitive printed Arabic Optical Character Recognition using statistical features 使用统计特征的原始印刷阿拉伯光学字符识别
Mohamed Dahi, N. Semary, M. Hadhoud
Due to the several forms of different Arabic font types, Arabic character recognition is still a challenge. Most literature works consider only one font per text what results in low recognition accuracy. This paper tends to enhance the accuracy of AOCR (Arabic Optical Character Recognition) by considering an automatic Optical Font Recognition (OFR) stage before going ahead with the traditional OCR stages. This has been achieved using SIFT (Scale Invariant Feature Transform) descriptors. First, a comparative study of four most recent algorithms of primitive OCR has been performed to evaluate the different features and classifiers utilized in their systems. Accordingly, a combining of statistical features have been proposed as well as selecting Random Forest Tree classifier for classification stage. The combination of the features are used to train the classifiers. As a result, each recognized text font is directed to a specific classifier tree. The proposed system was tested on a generated Primitive Arabic Characters Noise Free dataset (PAC-NF) containing 30000 samples. Experimental results achieved a promising character recognition accuracy of 99.8-100%.
由于阿拉伯文有多种不同的字体类型,阿拉伯文字符识别仍然是一个挑战。大多数文献只考虑一种字体,导致识别精度较低。本文试图在传统光学字符识别阶段之前,考虑自动光学字体识别(OFR)阶段,以提高AOCR(阿拉伯语光学字符识别)的准确性。这是使用SIFT(尺度不变特征变换)描述符实现的。首先,对四种最新的原始OCR算法进行了比较研究,以评估其系统中使用的不同特征和分类器。在此基础上,提出了一种统计特征组合方法,并选择随机森林树分类器进行分类阶段。这些特征的组合被用来训练分类器。因此,每个被识别的文本字体被定向到一个特定的分类器树。在生成的包含30000个样本的原始阿拉伯字符无噪声数据集(PAC-NF)上对该系统进行了测试。实验结果表明,该方法的字符识别准确率为99.8-100%。
{"title":"Primitive printed Arabic Optical Character Recognition using statistical features","authors":"Mohamed Dahi, N. Semary, M. Hadhoud","doi":"10.1109/INTELCIS.2015.7397278","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397278","url":null,"abstract":"Due to the several forms of different Arabic font types, Arabic character recognition is still a challenge. Most literature works consider only one font per text what results in low recognition accuracy. This paper tends to enhance the accuracy of AOCR (Arabic Optical Character Recognition) by considering an automatic Optical Font Recognition (OFR) stage before going ahead with the traditional OCR stages. This has been achieved using SIFT (Scale Invariant Feature Transform) descriptors. First, a comparative study of four most recent algorithms of primitive OCR has been performed to evaluate the different features and classifiers utilized in their systems. Accordingly, a combining of statistical features have been proposed as well as selecting Random Forest Tree classifier for classification stage. The combination of the features are used to train the classifiers. As a result, each recognized text font is directed to a specific classifier tree. The proposed system was tested on a generated Primitive Arabic Characters Noise Free dataset (PAC-NF) containing 30000 samples. Experimental results achieved a promising character recognition accuracy of 99.8-100%.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"567-571"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88595271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Integrated trusted protection technologies for industrial control systems 工业控制系统集成可靠保护技术
Jing-pei Wang, Liu Jie, Shengming Yang, Li Dan
Security vulnerabilities in industrial control systems (ICS) and its open interconnected trends lead to security risks escalating. The existed security protection technologies, with poor applicability, are hard to meet the special need of information security for ICS. In this paper, trusted protection theories and technologies for ICS were studied and an integrated trusted protection model was proposed. The proposed method protected data and system security of ICS from aspects of trusted computing platform, trusted data protection mechanism and trust management network. The trusted protection technologies were deployed on each of the three network layers of ICS according to differentiated resource and security requirements of each layer. Analysis and simulation results indicate the effectiveness and superiority of the proposed method. The establishing of trusted protection model assists realizing the systematic security protection for heterogeneous industrial control systems.
工业控制系统的安全漏洞及其开放互联的趋势导致安全风险不断升级。现有的安全防护技术适用性差,难以满足工业控制系统对信息安全的特殊需求。本文研究了集成控制系统的可信保护理论和技术,提出了集成的可信保护模型。该方法从可信计算平台、可信数据保护机制和信任管理网络等方面对ICS的数据和系统安全进行了保护。根据不同的资源和安全需求,在ICS的三个网络层中分别部署可信防护技术。分析和仿真结果表明了该方法的有效性和优越性。建立可信保护模型有助于实现异构工业控制系统的系统安全保护。
{"title":"Integrated trusted protection technologies for industrial control systems","authors":"Jing-pei Wang, Liu Jie, Shengming Yang, Li Dan","doi":"10.1109/INTELCIS.2015.7397254","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397254","url":null,"abstract":"Security vulnerabilities in industrial control systems (ICS) and its open interconnected trends lead to security risks escalating. The existed security protection technologies, with poor applicability, are hard to meet the special need of information security for ICS. In this paper, trusted protection theories and technologies for ICS were studied and an integrated trusted protection model was proposed. The proposed method protected data and system security of ICS from aspects of trusted computing platform, trusted data protection mechanism and trust management network. The trusted protection technologies were deployed on each of the three network layers of ICS according to differentiated resource and security requirements of each layer. Analysis and simulation results indicate the effectiveness and superiority of the proposed method. The establishing of trusted protection model assists realizing the systematic security protection for heterogeneous industrial control systems.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"26 1","pages":"418-423"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90462971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Epidemiological modeling of network worm infections and countermeasures 网络蠕虫感染的流行病学建模与对策
K. Shahzad, Steve Woodhead
Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed and the continuous discovery of wormable vulnerabilities. Mathematical models for worm propagation can help us to understand the epidemiology of worm outbreaks and to devise effective defense mechanisms. In this paper, we report the epidemiological modeling and analysis of worm propagation and a distributed worm detection and prevention countermeasure. The work is based on the Slammer and Witty worm characteristics and employs the widely used Susceptible-Infected biological model. The epidemiological modeling shows that the SI model can be used to represent the virulence of random scanning worms and to quantify the effectiveness of worm countermeasures.
快速传播的网络蠕虫由于其毒性、速度和不断发现的蠕虫漏洞,继续对互联网构成威胁。蠕虫传播的数学模型可以帮助我们了解蠕虫爆发的流行病学和设计有效的防御机制。本文报道了蠕虫传播的流行病学建模和分析,以及一种分布式蠕虫检测和预防对策。这项工作是基于Slammer和Witty蠕虫的特征,并采用了广泛使用的易感感染生物学模型。流行病学模型表明,SI模型可以用来表示随机扫描蠕虫的毒力和量化蠕虫对策的有效性。
{"title":"Epidemiological modeling of network worm infections and countermeasures","authors":"K. Shahzad, Steve Woodhead","doi":"10.1109/INTELCIS.2015.7397288","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397288","url":null,"abstract":"Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed and the continuous discovery of wormable vulnerabilities. Mathematical models for worm propagation can help us to understand the epidemiology of worm outbreaks and to devise effective defense mechanisms. In this paper, we report the epidemiological modeling and analysis of worm propagation and a distributed worm detection and prevention countermeasure. The work is based on the Slammer and Witty worm characteristics and employs the widely used Susceptible-Infected biological model. The epidemiological modeling shows that the SI model can be used to represent the virulence of random scanning worms and to quantify the effectiveness of worm countermeasures.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"22 1","pages":"628-633"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81918426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ArSL keyboard for android android的ArSL键盘
M. El-Gayyar, Amira Ibrahim, Ahmed Sallam
Despite the efforts of many organizations and governments, deaf people still forming a closed community isolated from the public society. The only way to communicate in a deaf community is the use of Sign Language. In fact, for deaf individuals, Sign Language is the main communication barrier with hearing people; either one side needs to learn the language of the other or they have to depend on a third-party interpreter. With technological advances, there have been many attempts to build a feasible bridge to connect deaf communities with the public. However, most of the developed techniques are complex and need special and expensive equipment which is not affordable for deaf people, especially in Arabic countries where deaf represents a significant proportion of the population mostly of medium and poor classes. Fortunately, mobile devices reached all hands recently creating a good opportunity to build a simple viable solution. Thus, we have developed an Android mobile application to support the Arabic Sign Language. Inspired by Chinese keyboards, we have embedded the language signs as a font to build a user-friendly keyboard. It helps a deaf person to construct Arabic Sign Language sentences and to ask the application to convert them into standard Arabic text or speech. Moreover, the application works the other way around and translates from standard Arabic to Arabic Sign Language forming a simple mechanism for seamless communications between hearing and deaf people. Finally, we have tested our solution with a number of volunteers from deaf and hearing communities and the results were promising.
尽管许多组织和政府做出了努力,但聋人仍然是一个孤立于公共社会之外的封闭群体。在聋人社区里唯一的交流方式就是使用手语。事实上,对于聋人来说,手语是他们与正常人交流的主要障碍;任何一方都需要学习另一方的语言,或者他们必须依赖第三方翻译。随着技术的进步,已经有许多尝试建立一座可行的桥梁,将聋人社区与公众联系起来。然而,大多数已开发的技术都很复杂,需要特殊和昂贵的设备,聋哑人负担不起,特别是在聋哑人占人口很大比例的阿拉伯国家,其中大多数是中等和贫困阶层。幸运的是,最近移动设备普及,这为构建简单可行的解决方案创造了良机。因此,我们开发了一个Android移动应用程序来支持阿拉伯手语。受中国键盘的启发,我们嵌入了语言符号作为字体,以建立一个用户友好的键盘。它可以帮助聋哑人构建阿拉伯手语句子,并要求应用程序将其转换为标准的阿拉伯语文本或语音。此外,该应用程序还可以反过来工作,将标准阿拉伯语翻译成阿拉伯手语,形成一种简单的机制,使听力正常的人和聋人之间进行无缝通信。最后,我们在一些聋人和听力健全社区的志愿者身上测试了我们的解决方案,结果很有希望。
{"title":"The ArSL keyboard for android","authors":"M. El-Gayyar, Amira Ibrahim, Ahmed Sallam","doi":"10.1109/INTELCIS.2015.7397264","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397264","url":null,"abstract":"Despite the efforts of many organizations and governments, deaf people still forming a closed community isolated from the public society. The only way to communicate in a deaf community is the use of Sign Language. In fact, for deaf individuals, Sign Language is the main communication barrier with hearing people; either one side needs to learn the language of the other or they have to depend on a third-party interpreter. With technological advances, there have been many attempts to build a feasible bridge to connect deaf communities with the public. However, most of the developed techniques are complex and need special and expensive equipment which is not affordable for deaf people, especially in Arabic countries where deaf represents a significant proportion of the population mostly of medium and poor classes. Fortunately, mobile devices reached all hands recently creating a good opportunity to build a simple viable solution. Thus, we have developed an Android mobile application to support the Arabic Sign Language. Inspired by Chinese keyboards, we have embedded the language signs as a font to build a user-friendly keyboard. It helps a deaf person to construct Arabic Sign Language sentences and to ask the application to convert them into standard Arabic text or speech. Moreover, the application works the other way around and translates from standard Arabic to Arabic Sign Language forming a simple mechanism for seamless communications between hearing and deaf people. Finally, we have tested our solution with a number of volunteers from deaf and hearing communities and the results were promising.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"11 1","pages":"481-486"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81392221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparing ontology-based and Item response theory in computer adaptive test 基于本体理论与项目反应理论在计算机自适应测试中的比较
E. Khater, A. Hegazy, M. E. Shehab
Adaptive e-learning is concerning about students' skills and preferences. A few researches concerning about adaptive examination systems. Ontologies can be used in e-learning systems to organize and describe knowledge and to support content management. Combining ontology with CAT systems helps to control the exam content regarding content semantics. This paper propose an ontology based adaptive Comparing system's results with IRT results -The CAT major model- provide an exact information about how far the system is reliable regarding the IRT.
适应性电子学习关注的是学生的技能和偏好。关于适应性考试系统的一些研究。本体可以在电子学习系统中用于组织和描述知识,并支持内容管理。将本体与CAT系统相结合,有助于在内容语义上对考试内容进行控制。本文提出了一种基于本体的自适应比较系统结果与IRT结果- CAT主模型-提供了关于系统在IRT方面的可靠程度的准确信息。
{"title":"Comparing ontology-based and Item response theory in computer adaptive test","authors":"E. Khater, A. Hegazy, M. E. Shehab","doi":"10.1109/INTELCIS.2015.7397220","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397220","url":null,"abstract":"Adaptive e-learning is concerning about students' skills and preferences. A few researches concerning about adaptive examination systems. Ontologies can be used in e-learning systems to organize and describe knowledge and to support content management. Combining ontology with CAT systems helps to control the exam content regarding content semantics. This paper propose an ontology based adaptive Comparing system's results with IRT results -The CAT major model- provide an exact information about how far the system is reliable regarding the IRT.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"84 1","pages":"187-195"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83877123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized cooperative trajectory planning for multiple UAVs in dynamic and uncertain environments 动态不确定环境下多无人机分散协同轨迹规划
Yu Zhang, Jingzhao Yang, S. Chen, J. Chen
This paper studies the problem of planning collision-free dynamically feasible trajectories for a team of autonomous unmanned aerial vehicles (UAVs) in real-time, where the UAVs try to fly through a complex 3-D environment to reach their specified destinations. First, the cooperative trajectory planning problem is mathematically formulated as a decentralized receding horizon optimal control problem (DRH-OCP). Second, a decentralized coordination strategy for multi-vehicle real-time trajectory planning is designed by effectively combining the benefits of inverse dynamics optimization method and receding horizon optimal control technique. This coordination strategy mainly features that each vehicle only solves a sub-problem for its own plan and vehicles in the team make plans in parallel. Finally, simulation results show the feasibility of the proposed planning strategies.
本文研究了一组自主无人机(uav)在复杂的三维环境中飞行以到达指定目的地的实时无碰撞动态可行轨迹规划问题。首先,将协同轨迹规划问题在数学上表述为分散后退地平线最优控制问题(DRH-OCP)。其次,结合逆动力学优化方法和后退地平线最优控制技术的优点,设计了多车实时轨迹规划的分散协调策略;这种协调策略的主要特点是每辆车只解决自己计划的一个子问题,车队中的车辆并行制定计划。最后,仿真结果验证了所提规划策略的可行性。
{"title":"Decentralized cooperative trajectory planning for multiple UAVs in dynamic and uncertain environments","authors":"Yu Zhang, Jingzhao Yang, S. Chen, J. Chen","doi":"10.1109/INTELCIS.2015.7397248","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397248","url":null,"abstract":"This paper studies the problem of planning collision-free dynamically feasible trajectories for a team of autonomous unmanned aerial vehicles (UAVs) in real-time, where the UAVs try to fly through a complex 3-D environment to reach their specified destinations. First, the cooperative trajectory planning problem is mathematically formulated as a decentralized receding horizon optimal control problem (DRH-OCP). Second, a decentralized coordination strategy for multi-vehicle real-time trajectory planning is designed by effectively combining the benefits of inverse dynamics optimization method and receding horizon optimal control technique. This coordination strategy mainly features that each vehicle only solves a sub-problem for its own plan and vehicles in the team make plans in parallel. Finally, simulation results show the feasibility of the proposed planning strategies.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"4 1","pages":"377-382"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89422772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MOOCs in universities: Intelligent model for delivering online learning content 大学mooc:提供在线学习内容的智能模式
G. Sammour, A. Al-Zoubi, A. Gladun, K. Khala, Jeanne Schreurs
A massive open online course (MOOC) is a model for delivering learning content online to any person who wants to take a course, with no conditions on attendance. Unlike traditional courses, MOOCs require additional skills, provided by videographers, instructional designers, IT specialists and platform specialists. Over the past few years several Universities facilitated partnership with MOOCs providers and are building MOOC courses, to serve as e-learning versions of their courses. Despite all the advantages offered by the MOOC courses, the current statistics show that only a very limited number of registered learners are completing the course. And the vast majority are stopping learning at an early stage. The main reason can be found in the lack of motivation of the students to pass the exams to become a certificate, because universities do not accept the certificates for credits. The aim of this paper is to study the readiness of students to take MOOC courses on one hand and the acceptance of MOOC courses in Universities. A study is conducted on two Universities, Hasselt University, Belgium and Princess Sumaya University for Technology, Jordan. The results of the study are promising, as they suggest that such virtual study programs are accepted in both Universities. However, professors in both Universities elucidate concerns on accepting the equivalence of the MOOC courses to their own courses.
大规模在线开放课程(MOOC)是一种向任何想要参加课程的人提供在线学习内容的模式,没有出勤条件。与传统课程不同,mooc需要额外的技能,由视频摄影师、教学设计师、IT专家和平台专家提供。在过去的几年里,几所大学促进了与MOOC提供商的合作,并正在构建MOOC课程,作为其课程的电子学习版本。尽管MOOC课程提供了很多优势,但目前的统计数据显示,只有非常有限的注册学习者完成了课程。而且绝大多数人在早期阶段就停止了学习。主要原因是学生缺乏通过考试成为证书的动力,因为大学不接受学分证书。本文的目的一方面是研究学生对MOOC课程的准备情况,另一方面是研究大学对MOOC课程的接受程度。一项研究是在两所大学,比利时哈瑟尔特大学和约旦苏马亚公主理工大学进行的。这项研究的结果是有希望的,因为它们表明这种虚拟学习计划在两所大学都被接受。然而,两所大学的教授都对接受MOOC课程与他们自己的课程的等效性表示担忧。
{"title":"MOOCs in universities: Intelligent model for delivering online learning content","authors":"G. Sammour, A. Al-Zoubi, A. Gladun, K. Khala, Jeanne Schreurs","doi":"10.1109/INTELCIS.2015.7397216","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397216","url":null,"abstract":"A massive open online course (MOOC) is a model for delivering learning content online to any person who wants to take a course, with no conditions on attendance. Unlike traditional courses, MOOCs require additional skills, provided by videographers, instructional designers, IT specialists and platform specialists. Over the past few years several Universities facilitated partnership with MOOCs providers and are building MOOC courses, to serve as e-learning versions of their courses. Despite all the advantages offered by the MOOC courses, the current statistics show that only a very limited number of registered learners are completing the course. And the vast majority are stopping learning at an early stage. The main reason can be found in the lack of motivation of the students to pass the exams to become a certificate, because universities do not accept the certificates for credits. The aim of this paper is to study the readiness of students to take MOOC courses on one hand and the acceptance of MOOC courses in Universities. A study is conducted on two Universities, Hasselt University, Belgium and Princess Sumaya University for Technology, Jordan. The results of the study are promising, as they suggest that such virtual study programs are accepted in both Universities. However, professors in both Universities elucidate concerns on accepting the equivalence of the MOOC courses to their own courses.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"118 1","pages":"167-171"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79395708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1