2013 5th International Conference on Information and Communication Technologies最新文献

筛选
英文 中文
Impact of automated short-answer marking on students' learning: IndusMarker, a case study 自动答题对学生学习的影响:industrusmarker的案例研究
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732782
R. Siddiqi
{"title":"Impact of automated short-answer marking on students' learning: IndusMarker, a case study","authors":"R. Siddiqi","doi":"10.1109/ICICT.2013.6732782","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732782","url":null,"abstract":"IndusMarker is an automated short-answer marking system based on structure-editing and structure-matching rather than extensive use of linguistic features analysis. Since IndusMarker cannot guarantee 100% human-system agreement rate, the use of IndusMarker has therefore been limited to conducting practice tests. It was expected that such a use of IndusMarker will lead to improvements in student learning and instructor-student interactions. The main aim of this paper is to verify these claims. The results indicate that such a use of IndusMarker leads to improvements in both student learning and instructor-student interactions. In addition, IndusMarker is also shown to give reasonably high human-system agreement rates even after the removal of all linguistic analysis features from the software.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A proposed model of a color harmonizer application 一种颜色调和器应用的建议模型
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732780
Reema Qaiser Khan, W. Khan, Majid Kaleem, Ali Ahmed
{"title":"A proposed model of a color harmonizer application","authors":"Reema Qaiser Khan, W. Khan, Majid Kaleem, Ali Ahmed","doi":"10.1109/ICICT.2013.6732780","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732780","url":null,"abstract":"Everything in this universe that the naked eye can perceive has color. Color impacts our lives in various ways; red color is perceived as danger or warning, blue color has a calming effect, whereas green color indicates approval. Soothing colors can relax the human body, whereas some colors may irritate the human eye. People with full color vision or with color vision deficiency (color blind), both struggle in selecting colors, for example, while designing a website, contrasting colored clothes, or choosing colors to paint the house. The issue that arises is whether the colors are in harmony; meaning if the colors complement each other and are not unappealing to the eye. In this paper we have proposed a model of a color harmonizer application, which will facilitate the user to harmonize colors according to color harmonies.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and development of wireless RTU and cybersecurity framework for SCADA system SCADA系统无线RTU和网络安全框架的设计与开发
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732781
Shakeel Durrani, Imran Jattala, J. Farooqi, Naila Shakeel, Mohsin Murad
{"title":"Design and development of wireless RTU and cybersecurity framework for SCADA system","authors":"Shakeel Durrani, Imran Jattala, J. Farooqi, Naila Shakeel, Mohsin Murad","doi":"10.1109/ICICT.2013.6732781","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732781","url":null,"abstract":"The wave adoption of wireless over wire-line is a global phenomenon and the Oil & Gas industry is no exception. This paper presents a multi-tiered secure hardened Wireless Remote Terminal Unit (WRTU) for SCADA systems. The WRTU is based on ARM Coter-M4 Processor supported by GSM & Satellite modems, GPS, WiFi and Ethernet. WRTU can be interfaced to an array of standard industrial sensors, and actuators. WRTU has data acquisition, monitoring, and control capabilities. WRTU is an inexpensive device, using Commercial-of-The-Shelf (COTS) modules. WRTU is an easy to deploy (using existing public available infrastructure) device and `single device that does it all'. WRTU connects to the Control and Monitoring Centre (CMC) via GSM or Satellite modem. The CMC monitors and controls all peripherals of the WRTU, maintains a log of alerts, sensors information, set critical limits and provides geo-location of all WRTU s via its GIS portal. The CMC has a database to maintain all operational centric data, for report generation, historical analysis and forecasting. A multi-tiered cybersecurity framework has been designed to protect entire communication infrastructure. Cybersecurity is critically important for national security in todays connected world. Cybersecurity is of critical importance as most national security agencies want the introduction of cybersecurity into all new SCADA systems used in critical infrastructure.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116518186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure user authentication in cloud computing 云计算中的安全用户认证
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732775
Zeeshan Javaid, Imran Ijaz
{"title":"Secure user authentication in cloud computing","authors":"Zeeshan Javaid, Imran Ijaz","doi":"10.1109/ICICT.2013.6732775","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732775","url":null,"abstract":"Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114073250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving the quality of streaming video through dynamic chrominance adjustment 通过动态色度调整提高流媒体视频的质量
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732783
R. Siddiqi
{"title":"Improving the quality of streaming video through dynamic chrominance adjustment","authors":"R. Siddiqi","doi":"10.1109/ICICT.2013.6732783","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732783","url":null,"abstract":"Usage of streaming video over the Internet and mobile networks has become quite common due to its convenience and low cost. In all the uses of streaming video over networks that do not guarantee bandwidths, the major challenge is to maintain acceptable video viewing experience in case of a network congestion. This paper presents a technique that has the potential to solve this challenge, at least to a certain extent. The proposed technique dynamically adjusts the chrominance level of the video images to fit the available bandwidth. Analysis of the results indicates that dynamic chrominance adjustment does improve the viewing quality of the streaming video significantly.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127177627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business process modeling and decision model integration 业务流程建模和决策模型集成
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732789
Eram Abbasi, K. Abbasi
{"title":"Business process modeling and decision model integration","authors":"Eram Abbasi, K. Abbasi","doi":"10.1109/ICICT.2013.6732789","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732789","url":null,"abstract":"Business Process Modeling (BPM) is a technique used to model business processes and helps in better understanding of these processes. BPM helps in improving organizational efficiency by either helping in making the business processes more efficient or even helps in automation of the business processes. There are many BPM techniques used till date but none of these techniques being used supports the decision making requirements for an organization. To address this problem the paper suggests a model that can help integrate decision making with the prevailing Business Process Models. The paper firstly reviews foundations of Business Process Modeling (BPM) and the Decision Model (DM) to establish the basis for the conceptual understanding of BPM and DM. With these theoretical bases, then a model has been proposed where the Decision Model has been integrated with the Business Process Model to meet the decision making needs for the decision makers. Finally, the implications of this model are discussed with directions for further research.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127392694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Which web browser work best for detecting phishing 哪种浏览器最适合检测网络钓鱼
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732784
Noman Mazher, I. Ashraf, A. Altaf
{"title":"Which web browser work best for detecting phishing","authors":"Noman Mazher, I. Ashraf, A. Altaf","doi":"10.1109/ICICT.2013.6732784","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732784","url":null,"abstract":"Phishing is the technique of social engineering in which important information are hijacked. To prevent phishing the easiest way is to blacklist such web sites which are suspicious;, but there are many new phished websites that are not blacklisted. To protect users from those phishing sites many ways are available; one of those is to implement security toolbar in web browser. Nowaday every modern web browser has its own implicit security toolbar. Our research is based on the evaluation of toolbars attached with Internet Explorer, Mozilla Firefox and Google Chrome. In our experiment we appraised toolbars attached with these most popular web browsers. Results evaluation showed that Google Chrome provides best security against phishing websites.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127760869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Real time finger counting and virtual drawing using color detection and shape recognition 使用颜色检测和形状识别的实时手指计数和虚拟绘图
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732776
G. Narejo, Shahyan Pervez Bharucha
{"title":"Real time finger counting and virtual drawing using color detection and shape recognition","authors":"G. Narejo, Shahyan Pervez Bharucha","doi":"10.1109/ICICT.2013.6732776","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732776","url":null,"abstract":"In this paper we have provided a cheap method for counting open fingers and virtual drawing in real time using color detection and shape detection algorithms. These algorithms don't require training and database. Our method for finger counting detects the circular markers having a specified color visible on the inner side of the fingers by using color detection and shape recognition operations on the real time captured image and then counts the markers visible. The count can be further used as an input for other medium using communication methods. Different schemes are also defined using the combination of colors and hands used to generate desired output signals. The method devised for virtual drawing detects the circular specific colored marker on a stylus or finger using color detection and shape recognition. The position of the marker is marked and then plotted using the points marked in the previous frames which results in the pattern tracking the marker's movement. The development of both applications is done using Matlab as the developing environment using a normal A4-Tech webcam and run on Dell latitude D630 laptop with Intel® Core™2 Duo processor, Ram 2.00GB.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124444006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using predictive analytics to forecast drone attacks in Pakistan 使用预测分析来预测巴基斯坦的无人机袭击
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732785
U. Afzal, Tariq Mahmood
{"title":"Using predictive analytics to forecast drone attacks in Pakistan","authors":"U. Afzal, Tariq Mahmood","doi":"10.1109/ICICT.2013.6732785","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732785","url":null,"abstract":"Drones are autonomous aircrafts employed in conditions where manned flight is perilous. Drone-based attacks are made in Northern Pakistan with the intention of eliminating terrorists (in the context of US-led war of terror). In June 2004, the first drone strike killed one militant and four civilians; since then hundreds of attacks have killed thousands of people including accidental deaths of innocent children and women. To gauge the impact of future drone attacks, we apply time series forecasting on drone attack data to predict the frequency of different types of future attacks. On a reliable drone attack data set, we use IBM SPSS tool to learn four predictive models: 1) number of drone attacks, 2) number of militant casualties, 3) number of civilian casualties, and 4) number of injuries. Over our actual dataset, the prediction accuracy is maximized when we allow SPSS to automatically select the forecasting algorithm, as compared to a manual selection and configuration. We use automated selection to predict our four types of data for the six months, July 2013 till December 2013.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Predictive activation for localization using minimal data-fusion in MANETs 基于最小数据融合的预测激活定位
2013 5th International Conference on Information and Communication Technologies Pub Date : 2013-12-01 DOI: 10.1109/ICICT.2013.6732778
T. Saeed, S. Khan, U. Tariq, Z. Khan
{"title":"Predictive activation for localization using minimal data-fusion in MANETs","authors":"T. Saeed, S. Khan, U. Tariq, Z. Khan","doi":"10.1109/ICICT.2013.6732778","DOIUrl":"https://doi.org/10.1109/ICICT.2013.6732778","url":null,"abstract":"We propose a unique localization algorithm for MANETs: the mobile infrastructure-less networks with support of static underlying wireless sensor network nodes. The algorithm has been designed with two stages for localizing the MANET. The first stage is the naive activation stage which acts as the bootstrap for the prediction stage. The predictive minimal energy consumption algorithm incorporates the information from the measured TOA (Time Of Arrival) to locate the mobile nodes. The experimental results and comparative analysis show that our system provides accurate localization of linearly moving MANET's using low power consumption of the underlying wireless sensor networks.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"129 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130031275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信