{"title":"Interactive systems for sign language learning","authors":"I. Krak, I. Kryvonos, W. Wójcik","doi":"10.1109/ICAICT.2012.6398523","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398523","url":null,"abstract":"In the article the problems of communication of deaf people uses sign language are consider. An analysis of sign language information transfer which includes human hands, body, fingers movements, change of mimicry and emotions on human face is brought. Conception is developed and new information technology is proposed for sign language modeling on the base of human spatial model. For the transmission of movements of the real human-informant of sign language on a spatial model technology of motion capture is used. For dactyl alphabet modeling technology that uses a three-dimensional model of a hand based on a informational-parametric model has been developed. Efficiency of the developed information technology is shown on realization of Ukrainian sign language. The proposed approach is carried by universal character and can be used for the modeling of other sign languages.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133849116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature based iris recognition system functioning on extraction of 2D features","authors":"A. Agrawal, G. Bindra, P. Sharma","doi":"10.1109/ICAICT.2012.6398476","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398476","url":null,"abstract":"In this paper a novel and simple iris feature extraction technique is proposed for iris recognition of high performance. We use one dimensional circular ring to represent iris features. The reduced and significant features afterward are extracted by Sobel Operator and 1-D wavelet transform. To improve the accuracy, this paper combines uses Euclidean Distance for classification.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Zhu, Jian Dong, Jian Huang, Songsong Pang, Bowen Du
{"title":"The bus arrival time service based on dynamic traffic information","authors":"T. Zhu, Jian Dong, Jian Huang, Songsong Pang, Bowen Du","doi":"10.1109/ICAICT.2012.6398482","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398482","url":null,"abstract":"The bus arri val time (BAT) service is a key service to improve public transport attractiveness by providing use rs with real-time bus arrival information which can help them to arrange their bus travel schedule intelligently. Thus the technique of real-time bus arrival prediction has become a research hotspot in the community of Intelligent Transport Systems (ITS) nowadays. In this paper, a novel model on bus arrival time prediction is proposed. The model proposes a complete set of programs to solve BAT prediction for large-scale real-time traffic information calculating. It adopts an effective algorithm judging bus's driving direction real-timely. BAT is calculated based on dynamic traffic information and visual prediction is a way to complement when GPS information is not arrived as expected. Experimental results indicate that the model has considerable efficiency in accuracy (over 85.1%) and computational speed (max 5000 GPS records per second).","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132571302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realization of direct series of discussions in the face of conflicting set of production rules","authors":"R. Samkharadze, D. Chikovani, L. Gachechiladze","doi":"10.1109/ICAICT.2012.6398468","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398468","url":null,"abstract":"The article considers the algorithm of operation of interpreter of expert system in the face of conflicting set of production rules. Algorithms of solution of conflicts among the production rules are developed in the process of making logical conclusions by the example of management of normal daily modes of power system.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132264478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving the Quadratic Assignment Problem with the modified hybrid PSO algorithm","authors":"A. Mamaghani, M. Meybodi","doi":"10.1109/ICAICT.2012.6398534","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398534","url":null,"abstract":"In this paper a particle swarm optimization algorithm is presented to solve the Quadratic Assignment Problem, which is a NP-Complete problem and is one of the most interesting and challenging combinatorial optimization problems in existence. A heuristic rule, the Smallest Position Value (SPV) rule, is developed to enable the Continuous particle swarm optimization algorithm to be applied to the sequencing problems. So, we use SPV to the QAP problem, which is a discrete problem. A simple but very efficient Hill Climbing method is embedded in the particle swarm optimization algorithm. We test our hybrid algorithm on some of the benchmark instances of QAPLIB, a well-known library of QAP instances. This algorithm is compared with some strategies to solve the problem. The computational results show that the modified hybrid Particle Swarm algorithm is able to find the optimal and best-known solutions on instances of widely used benchmarks from the QAPLIB. In most of instances, the proposed method outperforms other approaches. Experimental results illustrate the effectiveness of proposed approach on the quadratic assignment problem.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122141782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational study of the conformational flexibility of the amphibian tachykinin neuropeptides","authors":"G. Agaeva","doi":"10.1109/ICAICT.2012.6398530","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398530","url":null,"abstract":"The conformational flexibility of some amphibian tachykinin neuropeptides have been investigated by computer modeling with molecular dynamics method in the different conditions. At the first stage the conformational changes of these peptides were studied in vacuum, but in the second stage they were surrounded by water molecules with the periodic boundary conditions. All molecules were observed in vacuum and in water with large flexibility of the N-terminal parts of its aminoacid sequences. It is shown that C-terminal backbone parts of these molecules save a alpha-helix conformation, but their side chains may exist in more than one orientations in all conditions.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124834406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"With attackers wearing many hats, prevent your “Identity Theft”","authors":"G. Bindra, D. Shrivastava, R. Seth","doi":"10.1109/ICAICT.2012.6398499","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398499","url":null,"abstract":"An Identity Is Stolen Every 3 Seconds!! Spoofing is a huge issue for most Internet users - in fact, Identity Theft victimized 10.1 Million Americans last year. In this modern digital world, it is very simple to fool the system and pretend to be anyone. With the identity theft getting simpler day-by-day, make sure you are not being digitally spoofed. These days, it doesn't require a computer genius to intrude your privacy or impersonate the victim. And despite various laws, individuals and businesses are still feeling the negative effects of spam alike. The attacker could use your email to send emails to your contacts/anyone or use your caller ID number to call and eventually talk to people. This paper is an attempt to make the readers aware of the various types of spoofing that exists and also how not to fall in prey to them. It is an examination of the various spoofing techniques used by the attackers and their motives. This work intends to increase the awareness and understanding of the Identity Thefts that are and related frauds throughout the world. A few control measures at the users' level are also suggested. This conceptual paper is definitely expected to contribute to future research on similar and related topics as spin off from this study.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud security tactics: Virtualization and the VMM","authors":"P. Kalagiakos, M. Bora","doi":"10.1109/ICAICT.2012.6398491","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398491","url":null,"abstract":"Cloud Computing is acclaimed to be the new paradigm that will reform organizations and pave the way to new and better business practices. Its abundant features captivated the interest of many individuals and organizations, either as customers or providers. The market, emboldened by optimistic reports regarding the future of cloud computing, demands further innovative services and features. The migration to cloud computing, however, is deterred by the issue of security. Especially, in virtual environments, security is a major concern, as multi-tenancy may facilitate cyber attacks at a massive scale. The subversion of a system implicates multiple customers, augmenting the potential impact. Thus, researchers have concentrated their efforts in designing architectures and techniques that will endorse security in virtualized environments of the cloud. In this paper, we present the latest proposed techniques which aim to enhance security and revolve directly or indirectly around the most important component of the virtual environment, the Virtual Machine Monitor.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126444794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determination of QoS metrics in wireless sensor networks by using queuing theory","authors":"A. Rustamov","doi":"10.1109/ICAICT.2012.6398493","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398493","url":null,"abstract":"Traffic classes in multimedia WSNs are required high bandwidth and reliable transfer through the network because of large amount of data size. However, some applications of WSNs are required high quality. In this scenario, main purpose in designing of the sensor networks and nodes becomes how to conserve energy and prolong network life. In order to increase quality of services (QoS), a measurement of probability of blocking of the arrival packets were suggested by using queuing theory. Probability of blocking gives us clear picture how system specification should be chosen so that blocking state would be minimized.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"117 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the method of sustainable use of soils by regulation of purchase orders for agricultural products","authors":"E. Svetlana, P. Adalat, S. Elkhan","doi":"10.1109/ICAICT.2012.6398536","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398536","url":null,"abstract":"One of the ways to achieve of stability of soil usage is the alternation of crops. In present paper the opportunity of regulation of alternation cultivation of crops is considered as the orders for purchase of the crops.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}