International Conference on Information Society (i-Society 2011)最新文献

筛选
英文 中文
Enabling exploratory search in UK PubMed Central: Enhancing information retrieval for the UK's biomedical and health research community 启用英国PubMed Central的探索性搜索:增强英国生物医学和健康研究界的信息检索
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978469
Ernest Ong
{"title":"Enabling exploratory search in UK PubMed Central: Enhancing information retrieval for the UK's biomedical and health research community","authors":"Ernest Ong","doi":"10.1109/I-SOCIETY18435.2011.5978469","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978469","url":null,"abstract":"Launched in 2007, UK PubMed Central (UKPMC) was originally released as a “mirror” of the US PubMed Central repository. The feedback from our users and our experience of running the service prompted the organisations comprising UK's principal funders of biomedical and health research to commission a new phase of development with aspirations to build the premier resource for biomedical and health research. This paper summarises the evolution of UKPMC and discusses the exploratory search facilities in the new web interface.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image observation on the modified ECB operations in Advanced Encryption Standard 高级加密标准中修改后的ECB操作的图像观察
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978449
Chi-Wu Huang, Ying-Hao Tu, Hsing-Chang Yeh, Shih-Hao Liu, C. Chang
{"title":"Image observation on the modified ECB operations in Advanced Encryption Standard","authors":"Chi-Wu Huang, Ying-Hao Tu, Hsing-Chang Yeh, Shih-Hao Liu, C. Chang","doi":"10.1109/I-SOCIETY18435.2011.5978449","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978449","url":null,"abstract":"This paper presents an image encryption instead of text to observe the modified ECB mode operations in AES processing. If a plaint image contains some groups of identical colors, then the encrypted cipher image may appear some kinds of patterns at the related areas. This is a limitation of AES in ECB mode. To overcome the limitation, a straight forward approach is to make those identical colors different or to remove them. For making those inputs different before encryption, three number sequences, which are the sequential number from counter output, the non-sequential number from accumulator output and the random numbers generated from cipher function itself, are added to the image inputs. By using the different numbers and the different ways of addition, the modifications result in obtaining seven modes of operation, and four of them were defined in NIST publications. To remove the identical inputs, image compression before encryption is used. Though by adding compression and decompression seems to make the whole process more complicated, yet the processing time decreases due to the shrinking file size after image compression. These two approaches to modify ECB operation work very well as shown in the experiments.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126253911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A repository of real-world examples for students and academics 为学生和学者提供的现实世界示例库
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978539
Bhaskar Choubey
{"title":"A repository of real-world examples for students and academics","authors":"Bhaskar Choubey","doi":"10.1109/I-SOCIETY18435.2011.5978539","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978539","url":null,"abstract":"This paper reports the development of an online repository of real world examples related to concepts taught in a typical undergraduate curricula. Designed as a moderated wiki, the repository allows academics to upload as well as download such examples for use in their teaching. Simultaneously, it provides a large database of applications to students to correlate with their studies. In addition, it also provides an insight into university curriculum for parents as well as general public.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web-based student modeling for learning multiple languages 用于学习多种语言的基于web的学生建模
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978484
M. Virvou, C. Troussas
{"title":"Web-based student modeling for learning multiple languages","authors":"M. Virvou, C. Troussas","doi":"10.1109/I-SOCIETY18435.2011.5978484","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978484","url":null,"abstract":"This paper describes the development of web-based student modeling, which aims to be useful in multiple language learning. Web services provide remote access to the system, which performs affective user modeling. The system holds student models, namely it creates a profile for every student and provides individualized help, via the advice generator component. The error diagnosis component is useful for evaluating students' errors and is performed for all the system's supported languages. Given that software applications that operate over the web are targeted to a wide range of users, we promote the adaptivity and individualization to each user that interacts with the application and we give students the possibility of learning multiple languages over the Web.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115504516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Axioms for vulnerability measurement of online social network profiles 在线社交网络档案的脆弱性度量公理
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978444
Sophia Alim, D. Neagu, M. Ridley
{"title":"Axioms for vulnerability measurement of online social network profiles","authors":"Sophia Alim, D. Neagu, M. Ridley","doi":"10.1109/I-SOCIETY18435.2011.5978444","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978444","url":null,"abstract":"The increase in online social network (OSN) usage has led to personal details known as attributes being readily displayed in online profiles. This can lead to the profile owners being vulnerable to social engineering attacks. Our vulnerability model is based upon a way to quantify the vulnerability of a profile and consists of three components. The individual vulnerability is determined by the presence of values for the profile attributes which may contribute towards the composite personal vulnerability via a weight based system. The relative vulnerability indicates the contribution of collective vulnerability of the profile's friends, whereas the absolute vulnerability is the overall composite vulnerability for the profile by considering the contributions of the individual and relative vulnerabilities. In this paper we introduce a set of axioms on probability dependent effect of profile attributes and probability change for OSN profiles. The research offers a formal background for future work on estimating how attribute changes for an OSN profile influence the individual vulnerability of the profile and validating this composite model.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124564132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Indexing of spatiotemporal Data: A comparison between sweep and z-order space filling curves 时空数据的索引:扫描和z阶空间填充曲线的比较
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978495
P. Kilimci, O. Kalipsiz
{"title":"Indexing of spatiotemporal Data: A comparison between sweep and z-order space filling curves","authors":"P. Kilimci, O. Kalipsiz","doi":"10.1109/I-SOCIETY18435.2011.5978495","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978495","url":null,"abstract":"Storing constantly changing spatial and temporal (spatio-temporal) features requires multi-dimensional data support in data management applications. That necessitates allocation of large amount of data storage in computer systems. Commonly, relational database management systems (RDBMS) are used for managing those data. However, an algorithm should be implemented to map multi-dimensional data to one-dimensional data in RDBMS. We found that a group of researchers worked on this problem and solved with SPIT (Space-Partitioning with Indexes on Time) approach [Mallett 2004]. SPIT partitions space according to sweep-space filling curve and the researchers argue that using sweep-space filling curve puts lesser demands on I/O than z-order space filling curve. Accordingly, researchers suggest using the former method for storing and indexing of spatio-temporal data. In this paper, we present the results of a series of experiments where we partitioned space by z-order space filling curve and used a sliding window technique for tracking of moving objects. We suggest that in the cases where the tracked objects are close to each other, we can obtain better performance from z-order partitioning than sweep-space filling curve by using sliding window technique for tracking of moving objects.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance of Serial Concatenated Convolutional Codes on faded channels 串行级联卷积码在衰落信道上的性能
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978448
S. Ghauri, M. S. Javaid, Hanan Adeel, Hasan Humayun
{"title":"Performance of Serial Concatenated Convolutional Codes on faded channels","authors":"S. Ghauri, M. S. Javaid, Hanan Adeel, Hasan Humayun","doi":"10.1109/I-SOCIETY18435.2011.5978448","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978448","url":null,"abstract":"An analysis of performance of Serially Concatenated Convolutional Codes (SCCC) is evaluated on Additive White Gaussian Noise model channel, which is used as a basis, and actions of SCCC on Raleigh flat slow and flat fast faded channels are evaluated in this research work. In DCS the SCCC are utilized to reduce the bit error rates. SCCC encoder consists of RSCC. The major thrust is iterative decoding. This research has utilized BCJR and TDA decoding algorithms. This research analyzed SCCC with interleaved scheme. The BPSK modulation was considered. Performance metric for SCCC over Memory less AWGN channel, and memory based channels i.e. Rayleigh slow and fast Faded Channel is BER verses SNR.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An evaluation of Brazilian Transparency Portal and how to improve it 对巴西透明门户网站的评价及改进方法
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978471
Giovanni Bogéa Viana, Maria Beatriz Felgar de Toledo
{"title":"An evaluation of Brazilian Transparency Portal and how to improve it","authors":"Giovanni Bogéa Viana, Maria Beatriz Felgar de Toledo","doi":"10.1109/I-SOCIETY18435.2011.5978471","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978471","url":null,"abstract":"This article presents an overview of a major e-government site in Brazil, the Transparency Portal, and makes a comparison with electronic government of some other countries, in order to assess the degree of accessibility of each site. A survey with entities, NGOs and ordinary users is also presented, and aims at evaluating the Transparency Portal according to criteria such as navigation and ease of use. An architecture is then proposed to improve the Brazilian site, making it easier to use and accessible to a greater number of citizens (regardless of educational level and specific needs) as well as to turn its data more relevant for government and society.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128653617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Visual clustering in web search: An effective approach 网页搜索中的视觉聚类:一种有效的方法
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978504
Hoda Badesh, J. Blustein
{"title":"Visual clustering in web search: An effective approach","authors":"Hoda Badesh, J. Blustein","doi":"10.1109/I-SOCIETY18435.2011.5978504","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978504","url":null,"abstract":"Presenting search results as a list of hits can be ineffective in assisting users to find relevant documents and discover varied topics among search results. Visualization can assist users to find relevant documents and make the search interface more effective. This paper presents a Data Mountain Search Results Presentation Interface (DMSRPI). The interface is intended to improve the effectiveness in how users search the Web and find relevant information. A user study is yet to be conducted for evaluating the DMSRPI.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Chaos based improvement of the security of ZigBee and Wi-Fi networks used for industrial controls 基于混沌的工业控制ZigBee和Wi-Fi网络安全性改进
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978525
B. Bakhache, Kassem Ahmad, S. El Assad
{"title":"Chaos based improvement of the security of ZigBee and Wi-Fi networks used for industrial controls","authors":"B. Bakhache, Kassem Ahmad, S. El Assad","doi":"10.1109/I-SOCIETY18435.2011.5978525","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978525","url":null,"abstract":"Wi-Fi and Zigbee networks are widely deployed in wireless industrial control and monitoring applications. The security protocols used in these wireless networks rely on stream cipher to encrypt data before being transmitted. These protocols are secure but they don't respect the real-time requirement of industrial control. Chaotic systems are able to produce stream cipher with higher randomicity, which looks like stochastic noise. Based on two perturbed piecewise linear chaotic map (PWLCM), we propose a new high speed chaotic cryptographic scheme. It requires a little memory capacity, and also appears to be very secure. The proposed generator is easily realized and succeeds all the statistical tests. In this paper, we will explain briefly the design of our proposed generator and show its efficiency through encryption tests.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121306923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信