2012 6th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Interactive systems for sign language learning 手语学习互动系统
I. Krak, I. Kryvonos, W. Wójcik
{"title":"Interactive systems for sign language learning","authors":"I. Krak, I. Kryvonos, W. Wójcik","doi":"10.1109/ICAICT.2012.6398523","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398523","url":null,"abstract":"In the article the problems of communication of deaf people uses sign language are consider. An analysis of sign language information transfer which includes human hands, body, fingers movements, change of mimicry and emotions on human face is brought. Conception is developed and new information technology is proposed for sign language modeling on the base of human spatial model. For the transmission of movements of the real human-informant of sign language on a spatial model technology of motion capture is used. For dactyl alphabet modeling technology that uses a three-dimensional model of a hand based on a informational-parametric model has been developed. Efficiency of the developed information technology is shown on realization of Ukrainian sign language. The proposed approach is carried by universal character and can be used for the modeling of other sign languages.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133849116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Feature based iris recognition system functioning on extraction of 2D features 基于二维特征提取的虹膜识别系统
A. Agrawal, G. Bindra, P. Sharma
{"title":"Feature based iris recognition system functioning on extraction of 2D features","authors":"A. Agrawal, G. Bindra, P. Sharma","doi":"10.1109/ICAICT.2012.6398476","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398476","url":null,"abstract":"In this paper a novel and simple iris feature extraction technique is proposed for iris recognition of high performance. We use one dimensional circular ring to represent iris features. The reduced and significant features afterward are extracted by Sobel Operator and 1-D wavelet transform. To improve the accuracy, this paper combines uses Euclidean Distance for classification.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The bus arrival time service based on dynamic traffic information 基于动态交通信息的公交车到达时间服务
T. Zhu, Jian Dong, Jian Huang, Songsong Pang, Bowen Du
{"title":"The bus arrival time service based on dynamic traffic information","authors":"T. Zhu, Jian Dong, Jian Huang, Songsong Pang, Bowen Du","doi":"10.1109/ICAICT.2012.6398482","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398482","url":null,"abstract":"The bus arri val time (BAT) service is a key service to improve public transport attractiveness by providing use rs with real-time bus arrival information which can help them to arrange their bus travel schedule intelligently. Thus the technique of real-time bus arrival prediction has become a research hotspot in the community of Intelligent Transport Systems (ITS) nowadays. In this paper, a novel model on bus arrival time prediction is proposed. The model proposes a complete set of programs to solve BAT prediction for large-scale real-time traffic information calculating. It adopts an effective algorithm judging bus's driving direction real-timely. BAT is calculated based on dynamic traffic information and visual prediction is a way to complement when GPS information is not arrived as expected. Experimental results indicate that the model has considerable efficiency in accuracy (over 85.1%) and computational speed (max 5000 GPS records per second).","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132571302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Realization of direct series of discussions in the face of conflicting set of production rules 实现直接的系列讨论,面对冲突的一套生产规则
R. Samkharadze, D. Chikovani, L. Gachechiladze
{"title":"Realization of direct series of discussions in the face of conflicting set of production rules","authors":"R. Samkharadze, D. Chikovani, L. Gachechiladze","doi":"10.1109/ICAICT.2012.6398468","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398468","url":null,"abstract":"The article considers the algorithm of operation of interpreter of expert system in the face of conflicting set of production rules. Algorithms of solution of conflicts among the production rules are developed in the process of making logical conclusions by the example of management of normal daily modes of power system.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132264478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving the Quadratic Assignment Problem with the modified hybrid PSO algorithm 用改进的混合粒子群算法求解二次分配问题
A. Mamaghani, M. Meybodi
{"title":"Solving the Quadratic Assignment Problem with the modified hybrid PSO algorithm","authors":"A. Mamaghani, M. Meybodi","doi":"10.1109/ICAICT.2012.6398534","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398534","url":null,"abstract":"In this paper a particle swarm optimization algorithm is presented to solve the Quadratic Assignment Problem, which is a NP-Complete problem and is one of the most interesting and challenging combinatorial optimization problems in existence. A heuristic rule, the Smallest Position Value (SPV) rule, is developed to enable the Continuous particle swarm optimization algorithm to be applied to the sequencing problems. So, we use SPV to the QAP problem, which is a discrete problem. A simple but very efficient Hill Climbing method is embedded in the particle swarm optimization algorithm. We test our hybrid algorithm on some of the benchmark instances of QAPLIB, a well-known library of QAP instances. This algorithm is compared with some strategies to solve the problem. The computational results show that the modified hybrid Particle Swarm algorithm is able to find the optimal and best-known solutions on instances of widely used benchmarks from the QAPLIB. In most of instances, the proposed method outperforms other approaches. Experimental results illustrate the effectiveness of proposed approach on the quadratic assignment problem.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122141782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Computational study of the conformational flexibility of the amphibian tachykinin neuropeptides 两栖动物速激素神经肽构象柔韧性的计算研究
G. Agaeva
{"title":"Computational study of the conformational flexibility of the amphibian tachykinin neuropeptides","authors":"G. Agaeva","doi":"10.1109/ICAICT.2012.6398530","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398530","url":null,"abstract":"The conformational flexibility of some amphibian tachykinin neuropeptides have been investigated by computer modeling with molecular dynamics method in the different conditions. At the first stage the conformational changes of these peptides were studied in vacuum, but in the second stage they were surrounded by water molecules with the periodic boundary conditions. All molecules were observed in vacuum and in water with large flexibility of the N-terminal parts of its aminoacid sequences. It is shown that C-terminal backbone parts of these molecules save a alpha-helix conformation, but their side chains may exist in more than one orientations in all conditions.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124834406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
With attackers wearing many hats, prevent your “Identity Theft” 攻击者身兼数职,防止“身份盗窃”
G. Bindra, D. Shrivastava, R. Seth
{"title":"With attackers wearing many hats, prevent your “Identity Theft”","authors":"G. Bindra, D. Shrivastava, R. Seth","doi":"10.1109/ICAICT.2012.6398499","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398499","url":null,"abstract":"An Identity Is Stolen Every 3 Seconds!! Spoofing is a huge issue for most Internet users - in fact, Identity Theft victimized 10.1 Million Americans last year. In this modern digital world, it is very simple to fool the system and pretend to be anyone. With the identity theft getting simpler day-by-day, make sure you are not being digitally spoofed. These days, it doesn't require a computer genius to intrude your privacy or impersonate the victim. And despite various laws, individuals and businesses are still feeling the negative effects of spam alike. The attacker could use your email to send emails to your contacts/anyone or use your caller ID number to call and eventually talk to people. This paper is an attempt to make the readers aware of the various types of spoofing that exists and also how not to fall in prey to them. It is an examination of the various spoofing techniques used by the attackers and their motives. This work intends to increase the awareness and understanding of the Identity Thefts that are and related frauds throughout the world. A few control measures at the users' level are also suggested. This conceptual paper is definitely expected to contribute to future research on similar and related topics as spin off from this study.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cloud security tactics: Virtualization and the VMM 云安全策略:虚拟化和VMM
P. Kalagiakos, M. Bora
{"title":"Cloud security tactics: Virtualization and the VMM","authors":"P. Kalagiakos, M. Bora","doi":"10.1109/ICAICT.2012.6398491","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398491","url":null,"abstract":"Cloud Computing is acclaimed to be the new paradigm that will reform organizations and pave the way to new and better business practices. Its abundant features captivated the interest of many individuals and organizations, either as customers or providers. The market, emboldened by optimistic reports regarding the future of cloud computing, demands further innovative services and features. The migration to cloud computing, however, is deterred by the issue of security. Especially, in virtual environments, security is a major concern, as multi-tenancy may facilitate cyber attacks at a massive scale. The subversion of a system implicates multiple customers, augmenting the potential impact. Thus, researchers have concentrated their efforts in designing architectures and techniques that will endorse security in virtualized environments of the cloud. In this paper, we present the latest proposed techniques which aim to enhance security and revolve directly or indirectly around the most important component of the virtual environment, the Virtual Machine Monitor.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126444794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Determination of QoS metrics in wireless sensor networks by using queuing theory 基于排队论的无线传感器网络QoS指标的确定
A. Rustamov
{"title":"Determination of QoS metrics in wireless sensor networks by using queuing theory","authors":"A. Rustamov","doi":"10.1109/ICAICT.2012.6398493","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398493","url":null,"abstract":"Traffic classes in multimedia WSNs are required high bandwidth and reliable transfer through the network because of large amount of data size. However, some applications of WSNs are required high quality. In this scenario, main purpose in designing of the sensor networks and nodes becomes how to conserve energy and prolong network life. In order to increase quality of services (QoS), a measurement of probability of blocking of the arrival packets were suggested by using queuing theory. Probability of blocking gives us clear picture how system specification should be chosen so that blocking state would be minimized.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"117 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the method of sustainable use of soils by regulation of purchase orders for agricultural products 农产品采购订单调控土壤可持续利用方法研究
E. Svetlana, P. Adalat, S. Elkhan
{"title":"On the method of sustainable use of soils by regulation of purchase orders for agricultural products","authors":"E. Svetlana, P. Adalat, S. Elkhan","doi":"10.1109/ICAICT.2012.6398536","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398536","url":null,"abstract":"One of the ways to achieve of stability of soil usage is the alternation of crops. In present paper the opportunity of regulation of alternation cultivation of crops is considered as the orders for purchase of the crops.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信