2012 6th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Particle Swarm Intelligence as a new heuristic for the optimization of distributed database queries 粒子群智能是分布式数据库查询优化的一种新的启发式算法
T. Dokeroglu, U. Tosun, A. Cosar
{"title":"Particle Swarm Intelligence as a new heuristic for the optimization of distributed database queries","authors":"T. Dokeroglu, U. Tosun, A. Cosar","doi":"10.1109/ICAICT.2012.6398467","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398467","url":null,"abstract":"Particle Swarm Optimization (PSO) is a member of the nature inspired algorithms. Its ability to solve many complex search problems efficiently and accurately has made it an interesting research area. In this study, we model Distributed Database Query Optimization problem as a Bare Bones PSO and develop a set of canonical and hybrid PSO algorithms. To the best of our knowledge, this is the first time that Bare Bones PSO is being used for solving this problem. We explore and evaluate the capabilities of PSO against Iterative Dynamic Programming, and a Genetic Algorithm. We experimentally show that PSO algorithms are able to find near-optimal solutions efficiently.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127532840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Direct robust Non-Negative Matrix Factorization and its application on image processing 直接鲁棒非负矩阵分解及其在图像处理中的应用
Bin Shen, Z. Datbayev, O. Makhambetov
{"title":"Direct robust Non-Negative Matrix Factorization and its application on image processing","authors":"Bin Shen, Z. Datbayev, O. Makhambetov","doi":"10.1109/ICAICT.2012.6398485","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398485","url":null,"abstract":"In real applications of image processing, we frequently face outliers, which cannot be simply treated as Gaussian noise. Nonnegative Matrix Factorization (NMF) is a popular method in image processing for its good performance and elegant theoretical interpretation, however, traditional NMF is not robust enough to outliers. To robustify NMF algorithm, here we present Direct Robust Nonnegative Matrix Factorization (DRNMF) for image denoising based on the assumptions that the ground truth data is of low rank and the outliers are sparse. This method explictly models the outliers in the data, and the sparsity of the outliers is controlled by L0 norm. The experiments show that DRNMF can accurately localize the outliers, and outperforms traditional NMF in image denoising.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"82 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128162822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designing an active band-pass filter with tunable transversal element at 4-GHz using 0.2µm GaAs technology 采用0.2µm GaAs技术设计一个4 ghz可调谐横向元件的有源带通滤波器
S. Soleimany, M. Salehifar, H. Karbalaee
{"title":"Designing an active band-pass filter with tunable transversal element at 4-GHz using 0.2µm GaAs technology","authors":"S. Soleimany, M. Salehifar, H. Karbalaee","doi":"10.1109/ICAICT.2012.6398492","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398492","url":null,"abstract":"Nowadays, 4-GHz band-pass filters become important for several fields of applications such as Bluetooth, wireless LAN (WLAN), RFIDs, and etc. The growing requests for ultra integration of small mobile communication leads the designs to more wireless applications (wireless network, mobile, and etc). A transceiver system needs to design a filter that properly provides its requirements. The filter reported in this paper uses lumped elements to achieve a basic band-pass filter response. Active transversal elements are used to sharpen the band-pass characteristics, and to overcome the losses of MMIC lumped elements. In addition, the combination of lumped and transversal elements provide much better performance compare to a filter made of lumped elements alone, and much smaller than a filter made of transversal elements alone. A GaAs MMIC active band-pass filter structure is proposed for operation in the S-band applications and GaAs MMICs applications for wireless personal communication are described. This filter centered at 4-GHz and has 30 dB rejections at 0.7-GHz apart from pass-band edges. These sharpened edges were caused by a tuned amplifier.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132953917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
I did not know its prohibited - Academic dishonesty in online courses 我不知道这是被禁止的——在线课程中的学术不诚实
Y. Eshet, Y. Peled, K. Grinautski
{"title":"I did not know its prohibited - Academic dishonesty in online courses","authors":"Y. Eshet, Y. Peled, K. Grinautski","doi":"10.1109/ICAICT.2012.6398533","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398533","url":null,"abstract":"There is a disagreement among researchers in regard to academic dishonesty in online as compared to traditional learning settings. Based on this, the aim of the current study was to investigate the connection between academic dishonesty in the virtual versus face-to face teaching/learning settings in relation to students' learning motivation, while examining the phenomenon from a cross-cultural perspective. The sample consisted of 1,574 participants - 803 from USA and 771 from Israel. The results showed that there are significant differences in students' likelihood to engage in academic dishonesty based on the type of course, such that students in face-to-face courses are more likely to engage in acts of academic dishonesty than their counterparts in online courses. In addition, it was found that students' propensity to engage in academic dishonesty is explained by motivational orientation, type of course, and age. The findings were consistent across student groups in both countries. The phenomenon can be explained by the fact that more intrinsically motivated students self-select online as opposed to traditional classroom courses, and because online instruction facilitates increasing levels of intrinsic motivation.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133317107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An empirical study of tracking strategies of e-commerce websites 电子商务网站跟踪策略的实证研究
W. Treesinthuros
{"title":"An empirical study of tracking strategies of e-commerce websites","authors":"W. Treesinthuros","doi":"10.1109/ICAICT.2012.6398508","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398508","url":null,"abstract":"This research looks into the factors affecting the tracking strategies of e-commerce websites. Each of these factors is analyzed into a deeper view with every factor being sought to reveal its relevance to the topic of study. The factors that have been taken into consideration as having affected the tracking strategies of e-commerce websites include: conversion rate, cost per visitor, order conversion rate, buyer conversion rate, product conversion rate and shopping cart abandonment rate. The research further looks at what other authors have researched and concluded about the factors examined as having an effect on tracking strategies of e-commerce websites. The research elaborates how these factors have influenced website tracking strategies according to different authors, researchers and corporations. Data analyzed in the research was collected using the Likert scale and was analyzed using the AMOS analysis method. All measures were based on items in existing instruments and literature. The researcher used 5 point Likert-Scales where 1 represents “strongly disagree” and 5, “strongly agree.” The method is confirmed empirically using confirmatory factor analysis. The research ends with a conclusive summary of the finding of the research on the empirical study of tracking strategies of e-commerce websites.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131869263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cut-off time calculation for user session identification by reference length 根据引用长度计算用户会话标识的截止时间
J. Kapusta, M. Munk, Martin Drlík
{"title":"Cut-off time calculation for user session identification by reference length","authors":"J. Kapusta, M. Munk, Martin Drlík","doi":"10.1109/ICAICT.2012.6398500","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398500","url":null,"abstract":"One of the methods of web log mining is also discovering patterns of behavior of web site visitors. Based on the found users' behavior patterns that are represented by sequence rules, it is possible to modify and improve web site of the organization. Data for the analysis are gained from the web server log file. These anonymous data represent the problem of unique identification of the web site visitor. The paper deals with less commonly used navigation-driven methods of user session identification. These methods assume that the user goes over several navigation pages during her/his visit until she/he finds the content page with required information. The content page is a page where the user spends considerably more time in comparison with navigation pages. The content page is considered to be the end of the session. Searching of the next content page using navigation pages constitutes a new user session. The division of pages into content and navigation pages is based on the calculation of cut-off time C. The verification of exponential distribution of variable that represents the time which user spent on the particular page is coessential. We prepared an experiment with data gained from log file of university web server. We tried to verify, if the time spent on web pages has exponential distribution and we estimated the value of cut-off time. The found results confirm our assumptions that the navigation oriented methods could be used to proper user session identification.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
SaPM: Switch-aware process mapping model for parallel computing 并行计算的开关感知进程映射模型
Yufei Lin, Yuhua Tang, Xinhai Xu
{"title":"SaPM: Switch-aware process mapping model for parallel computing","authors":"Yufei Lin, Yuhua Tang, Xinhai Xu","doi":"10.1109/ICAICT.2012.6398498","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398498","url":null,"abstract":"The problem of assigning processes of a parallel program to processors of a parallel system, namely process mapping problem, has major impact on the resulting performance. The previous works only concern about the computation and communication cost, while ignoring the process switching cost. For a large-scale and communication-intensive application, more than one process may be placed onto a same processor. When the application is running, it will take long time to switch the processes. In this paper, we propose and introduce SwitchCAL, a method to calculate the process switching cost inside a processor, into the process mapping problem. Then we propose a switch-aware process mapping model - SaPM, and integrate the SaPM model with existing process mapping algorithm to obtain optimized process mapping scheme. The experiments show that our approach has high effectiveness.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrated analytical information resource management system 综合分析信息资源管理系统
G. Ghlonti
{"title":"Integrated analytical information resource management system","authors":"G. Ghlonti","doi":"10.1109/ICAICT.2012.6398478","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398478","url":null,"abstract":"The paper is considered to the problems of development of analytical information resource management systems. The authors present a service-oriented architecture solution that provides data collection and aggregation at the points where information emerges. The user is provided by a set of functional complexes, allowing to build the applications covering the entire lifecycle of analytical information resource from the planning data collection to the stages of data processing.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132646594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedded solution for road condition monitoring using vehicular sensor networks 使用车载传感器网络进行路况监测的嵌入式解决方案
A. Mednis, Atis Elsts, L. Selavo
{"title":"Embedded solution for road condition monitoring using vehicular sensor networks","authors":"A. Mednis, Atis Elsts, L. Selavo","doi":"10.1109/ICAICT.2012.6398502","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398502","url":null,"abstract":"The advantages of vehicular sensor networks over common wireless sensor networks include the possibility to cover wide measurement area using relatively small number of sensor nodes as well as not so strong limitations according device dimensions, weight and power consumption. These attractive features are reason for expansion of vehicular sensor networks for various environmental monitoring tasks - from defects of road surface to air quality in urban areas. The contribution of this paper is a customized embedded device dedicated for monitoring of road surface using microphone and accelerometer sensors as well as collection of meteorogical data for creation of detailed road meteorology maps. Selected hardware and software aspects are discussed and the implementation of previously developed method for road surface monitoring using accelerometer data is presented.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114180489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Automation of business-processes of an Election System 选举系统业务流程的自动化
G. Surguladze, E. Turkia, N. Topuria, G. Basiladze
{"title":"Automation of business-processes of an Election System","authors":"G. Surguladze, E. Turkia, N. Topuria, G. Basiladze","doi":"10.1109/ICAICT.2012.6398509","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398509","url":null,"abstract":"In the thesis we consider a critical analysis of foreign and Georgian existing election systems and is described the new, conception of development of support IT infrastructure of an Electronic Election System, proposed by us. We process the bpmn diagrams of business processes of a traditional and electronic election system. Is analyzed their strengths and weaknesses. We offer the conceptual model of databases of an electronic election system, projected in ORM instrument. Is worked out IT supported client-server and service oriented architecture for a system.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"644 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123287291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信