2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)最新文献

筛选
英文 中文
The Impact of Social Media Networking (SMN) towards business environment in Sri Lanka 社会媒体网络(SMN)对斯里兰卡商业环境的影响
S. Thelijjagoda, T. Hennayake
{"title":"The Impact of Social Media Networking (SMN) towards business environment in Sri Lanka","authors":"S. Thelijjagoda, T. Hennayake","doi":"10.1109/ICTER.2015.7377690","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377690","url":null,"abstract":"“Social Media Networking (SMN)” is one of most popular web concepts mainly used for interaction and entertainment purposes. Today world leading business organizations apply SMN for business activities as a value added service. Purpose of the research project is to identify SMN trends which are popular among Sri Lankan business environment and to identify benefits those organizations gain from it. Also to evaluate the value of using SMN Trends in Sri Lankan business environment and to encourage conservative Sri Lankan businesses to use SMN trends as value added services. This is an exploratory study which leads to pattern identification, a model development and hypothesizes formulation. Thus, data gathered from three samples; Purely, Partially and None SMN Based Organizations using stratified random sampling technique. For data analysis cross tabulation, chi square test, frequency and descriptive statistical techniques were used. Results conclude organizations' SMN Usage Pattern is directly effecting to its Business success. Higher percentage of successful businesses is Partially SMN Based Organizations which use SMN as a supporting service. Research results illustrates there is 10% of SMN Impact to the total Revenue Impact factors and 25% of SMN Impact to SMN Using Activities in Partially SMN Based Organizations.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122610880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Location aware security for smart mobile devices 智能移动设备的位置感知安全性
Dinusha N. Amerasinghe, M. Walpola
{"title":"Location aware security for smart mobile devices","authors":"Dinusha N. Amerasinghe, M. Walpola","doi":"10.1109/ICTER.2015.7377688","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377688","url":null,"abstract":"Smartphones and related mobile computing device usage is increasing exponentially. People see their Smartphones as being more personal than any other device, hence they tend to store sensitive information such as credit card details, user credentials on these devices. One of the main shortcomings of technology for these devices is security, due to the inherent mobile nature of these devices, the security controls that apply to PC's aren't suitable for these types of devices. Malware targeting mobile devices are very complex, they tend to exploit a number of shortcomings of these devices. We analyze the current security trends for smartphones and propose a location context aware security mechanism, which takes into account the connectivity issues and the limited processing capabilities of mobile devices. A prototype implementation is provided for Android and the results of this implementation is presented.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audio transporters for unrevealed communication 用于秘密通信的音频传送器
D. Eranga, H. Weerasinghe
{"title":"Audio transporters for unrevealed communication","authors":"D. Eranga, H. Weerasinghe","doi":"10.1109/ICTER.2015.7377700","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377700","url":null,"abstract":"Through the speedy expansion of information and communication technologies are constantly increasing demands to accomplish extreme safety and reliability in these areas. This is a current and highly debated issue and there is evidence the fact that such a situation will persist. Steganography has been introduced as a result of that research. Steganography is the art or fashion of concealing a message, image, or file within another source. Very effective tool to ensure the information concealment is also cryptography which compared Steganography uses a different mathematical principle of security classified information. Currently, the coupling of the two techniques is making very high degree of security and a number of programs available software tools specially for images, implementing just such combined information security. This research uses audio file format as carrier. Audio files are very sensitive and very big challenge to change inside without affecting its original quality. Research objectives are confidentiality, authentication, increase hidden data size, integrity, destroy the hidden message, assure unapparent perceptual transparency of audio file (Cover object) and the object containing secret messages and send/receive audio files. This system is called AudiSteg v1.0 and suitable for safe and careful preservation of sensitive records.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of things (IoT): Technologies and applications 物联网(IoT):技术和应用
Simon Jiang
{"title":"Internet of things (IoT): Technologies and applications","authors":"Simon Jiang","doi":"10.1109/ICTER.2015.7377657","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377657","url":null,"abstract":"All of the analysis report pointed out the total connected things will reach 50 billion in 2020. So the internet of things (IoT) is major and big market for semiconductor and IC design. IoT is a big trend and there are many opportunities to create a new product, project and research. I talk about the emerging technology in IoT and wearable device market. One important of challenge is low power. Therefore, the power efficiency is the new battleground in IoT. And then, one of another important is security function. So choose an embedded microprocessor is very important for IoT or wearable device. I give a brief description of Andes CPU and it is suitable in IoT solution. Finally, Andes CPU has successful in IoT and wearable device market, a lot of products were made by IoT companies from Andes CPU licensed and these products will be displayed, especially in mobile and communication applications.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Real-time natural language processing for crowdsourced road traffic alerts 用于众包道路交通警报的实时自然语言处理
C. D. Athuraliya, M. K. H. Gunasekara, S. Perera, Sriskandarajah Suhothayan
{"title":"Real-time natural language processing for crowdsourced road traffic alerts","authors":"C. D. Athuraliya, M. K. H. Gunasekara, S. Perera, Sriskandarajah Suhothayan","doi":"10.1109/ICTER.2015.7377667","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377667","url":null,"abstract":"Out of many issues we face in transportation today, road traffic has become the most crucial issue that directly affects our lives and economy. Despite of many implemented and progressing solutions, this issue seems to be remaining in a significant level in many countries and regions. Instead of fully relying on solutions provided by the authorities, public has come up with different approaches to deal with this problem. In this study we are focusing on one such solution which effectively uses a popular social networking service, Twitter. But still this crowdsourced traffic alert service has a limitation due to its nature; the natural language representation. We are trying to cope with this limitation by introducing a real time natural language processing solution to generate machine readable road traffic alerts. We observe many potentials of transforming this raw data into a machine readable format. An architecture that can effectively capture, transform and present this data has been proposed in this study and it has been implemented in a prototype level to demonstrate the uses of such a model. We expect to see extended models that can handle similar issues in future by combining multiple fields of information technology.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Video event classification and anomaly identification using spectral clustering 基于光谱聚类的视频事件分类与异常识别
W. S. K. Fernando, P. Perera, H. Herath, M. Ekanayake, G. Godaliyadda, J. Wijayakulasooriya
{"title":"Video event classification and anomaly identification using spectral clustering","authors":"W. S. K. Fernando, P. Perera, H. Herath, M. Ekanayake, G. Godaliyadda, J. Wijayakulasooriya","doi":"10.1109/ICTER.2015.7377661","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377661","url":null,"abstract":"This paper proposes a spectral clustering based methodology to classify video events and to detect anomalies. Feature trajectories from objects in a video are modelled, compared and clustered in order to classify the detected object events. Principles of normalized spectral clustering are used with modifications to affinity structure. A novel method for determining spectral clustering parameters based on Eigen structure of the affinity matrix is introduced. Employment of unsupervised learning for event classification is made possible by the proposed successive cluster identity labelling algorithm. A mechanism to identify abnormal events under the context is also introduced. The effectiveness and the robustness of the proposed methodology are demonstrated through experiments conducted on video streams focusing on human motion patterns.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Facial index based automated composite tool 基于面部索引的自动合成工具
L. Sivaneasharajah, M. Perera, P. Jayasekara, J. Perera, D. Karunaratne, K. Sandaruwan, R. Rajapakse
{"title":"Facial index based automated composite tool","authors":"L. Sivaneasharajah, M. Perera, P. Jayasekara, J. Perera, D. Karunaratne, K. Sandaruwan, R. Rajapakse","doi":"10.1109/ICTER.2015.7377711","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377711","url":null,"abstract":"A facial composite is a graphical representation of a human face according to eyewitnesses' description. The failure rate of suspect identification through facial composite sketch has been declared as 92.86% in the year 2014 in Sri Lanka. In order to overcome this situation an automated image processing based software solution will be introduced which includes 2D facial feature templates created for the first time targeting the local population. The aforementioned templates will be based on facial indexes, both used in previous similar research studies and newly defined indexes suited for the current study.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130935405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Citation network based framework for ranking academic Publications and venues 基于引文网络的学术出版物和场所排名框架
Dineshi Peiris, R. Weerasinghe
{"title":"Citation network based framework for ranking academic Publications and venues","authors":"Dineshi Peiris, R. Weerasinghe","doi":"10.1109/ICTER.2015.7377681","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377681","url":null,"abstract":"Impact of Publication venues are the key consideration for researchers who aim for maximum possible visibility for their work. The number of publication venues has been increasing yearly, making it difficult for researchers to get an idea about publication venues. Most of the existing methods use citation count as the metric to measure the reputation of publication venues which does not take into account the quality of citations. If publication venue ranking scores are measured successfully, then the researchers can take their own decision about a particular publication venue much quicker and easier based on this mechanism. We propose a novel approach for ranking publication venues by considering publication history. Our approach is completely based on the citation network represented by the publications. In our publication ranking method, there are many aspects that contribute to the importance of a publication, including the citations it has received, the quality of the citing publications, the time metric and its authors. The experimental results show that our publication ranking method reduces the bias against more recent publications, which only have a few or zero citations.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126148394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Context-aware sentiment classification 上下文感知的情感分类
Buddhika Kasthuriarachchy, K. de Zoysa, H. Premarathne
{"title":"Context-aware sentiment classification","authors":"Buddhika Kasthuriarachchy, K. de Zoysa, H. Premarathne","doi":"10.1109/ICTER.2015.7377709","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377709","url":null,"abstract":"Sentiment Analysis is a growing research area of Natural Language Processing which aims at identifying positive and negative opinions and emotions from a textual data. Presently. Sentiment Analysis research works range from document level classification to sentence-level. phrase-level or aspect/feature level analysis. Context-awareness is of key important for sentiment classification since particular evaluation phrase in one context may express a positive sentiment while in another context it may express a negative sentiment. For example, the adjective \"unpredictable\" may have a negative orientation in an automotive review, in a phrase such as \"unpredictable steering\", but it could have a positive orientation in a movie review, in a phrase such as \"unpredictable plot\". Further, not only the context of the documents is important but also the domain of the feature or aspect that we evaluate plays an important role. Hotel reviews may contain \"hot water\", which has a positive semantic orientation, whereas \"hot room\" has a negative orientation. Thus, contextual polarity plays a vital role in sentiment classification.","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of Consumer Health Informatics as an employer strategy to improve productivity 使用消费者健康信息学作为雇主提高生产力的策略
M. Fernando, T. Sahama, Colin J. Fidge, P. Hewagamage
{"title":"Use of Consumer Health Informatics as an employer strategy to improve productivity","authors":"M. Fernando, T. Sahama, Colin J. Fidge, P. Hewagamage","doi":"10.1109/ICTER.2015.7377708","DOIUrl":"https://doi.org/10.1109/ICTER.2015.7377708","url":null,"abstract":"Employee population health performance management has become a critical factor for organisational productivity. The WHO report titled “Healthy Workplace Framework and Model” indicates that the most successful and competitive organisations are those that have the most physically and mentally healthy employees. This concept has prompted organisations throughout the world to search for strategies that will reduce productivity loss related to employee health impairments and improve the impact of their employee health promotion programs. This extended abstract explains an ongoing research study, investigating the ability to use Consumer Health Informatics (CHI) applications for organisational population health performance management, directed toward organisational productivity and considering the key stakeholders (employers and employees).","PeriodicalId":142561,"journal":{"name":"2015 Fifteenth International Conference on Advances in ICT for Emerging Regions (ICTer)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信