2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology最新文献

筛选
英文 中文
A Study on Radio Interference Estimation Method for Wireless Relay Network Link Scheduling 无线中继网络链路调度中无线电干扰估计方法研究
Y. Taniguchi
{"title":"A Study on Radio Interference Estimation Method for Wireless Relay Network Link Scheduling","authors":"Y. Taniguchi","doi":"10.1109/ICAIET.2014.55","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.55","url":null,"abstract":"In time division multiple access (TDMA) based wireless networks, graph coloring based link scheduling mechanisms are often considered to assign time slots to links. A graph coloring based link scheduling mechanism requires a radio interference estimation method to make a conflict graph from a wireless network topology, and the protocol method is usually used among radio interference estimation methods. In this paper, we propose a radio interference estimation method for wireless relay networks, where the network topology is a tree. Through simulation experiments, we show that the accuracy of radio interference estimation with our proposed method is improved compared to that with the protocol method.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Present & Future Paradigms of Cyber Crime & Security Majors - Growth & Rising Trends 网络犯罪与安全专业的现状与未来——增长与上升趋势
Vinit Kumar Gunjan, Amit Kumar, A. A. Rao
{"title":"Present & Future Paradigms of Cyber Crime & Security Majors - Growth & Rising Trends","authors":"Vinit Kumar Gunjan, Amit Kumar, A. A. Rao","doi":"10.1109/ICAIET.2014.24","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.24","url":null,"abstract":"Cybercrime is all about the crimes involved with the environment where ever a network is involved and the steps implemented to control or overcome this cyber-security. The work culture of all the sectors are moving towards digitalization and cloud based systems in order to increase the work efficiency with more accuracy, In addition to this a majority of individuals are fond of using social networking sites and email servers in many ways directly or indirectly. Cybercrime is a type of crime where technical expertise is required not only to crack it but in order to make a user secure or to apply any preventive majors. In this paper we have described about the basics of this dreadful crime, recent research & development in the field of cyber security, the types of crimes and a small survey with an IT company. Our aim with this research is to check the awareness level of cybercrime and security majors and to suggest necessary steps which can really be helpful in making the cyber environment secure, robust and trustworthy.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Microsourcing Job Provider Maturity Model 微外包工作提供者成熟度模型
Norjansalika Janom, Normazalila Abu Bakar, N. Arshad, S. S. Salleh, Syaripah Ruzaini Syed Aris, N. Mastuki
{"title":"Microsourcing Job Provider Maturity Model","authors":"Norjansalika Janom, Normazalila Abu Bakar, N. Arshad, S. S. Salleh, Syaripah Ruzaini Syed Aris, N. Mastuki","doi":"10.1109/ICAIET.2014.45","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.45","url":null,"abstract":"Microsourcing is an emerging outsourcing practice by organization to an undefined (and generally large) network of people in a form of an open call. It is considered as a new entrepreneurial evolution in digital economy value creation. Because of the challenges and competition faces by organization nowadays, organization approved the need to provide services with higher added value and less cost. One way to achieve that is using microsourcing to accomplish tedious tasks at faster rate. However in Malaysia, the concept is fairly new and still in a formative stage. Due to that, organization's awareness, interest and willingness to participate in microsourcing initiatives need to be investigated and evaluated. This research is aim to produce the multiperspectives micro sourcing maturity integration model that able to assess the maturity level of organization to participate in microsourcing initiative. In this study, the characteristics of viable microsourcing maturity model and the significance factors contributing to implementation success have been identified. The analysis and results can be used as a road map to prepare an action plan for a successful microsourcing implementation in Malaysia.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crowdsourcing: The Trend of Prior Studies 众包:前人研究的趋势
Zazaleena Zakariah, Norjansalika Janom, N. Arshad, S. S. Salleh, Syaripah Ruzaini Syed Aris
{"title":"Crowdsourcing: The Trend of Prior Studies","authors":"Zazaleena Zakariah, Norjansalika Janom, N. Arshad, S. S. Salleh, Syaripah Ruzaini Syed Aris","doi":"10.1109/ICAIET.2014.30","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.30","url":null,"abstract":"Crowdsourcing is view as major changes in current economy as it has revolutionary effects on organizations. Unlike previous outsourcing trends that practices closed inter-organizational relationships subject to the long-term legal contract, these new crowdsourcing practices take place in an open and virtual context, characterized with small and short-term deals. Crowdsourcing has been recognized as new industry that able to uplift the economy and bring significant benefits to business and people in general. Although the phenomenon of crowdsourcing is fairly new and still in a formative stage, the indications and predictions are optimistic. Under the recent Malaysian government initiatives called Digital Malaysia, various crowdsourcing efforts and programs have been introduced. This paper reports on the review of prior studies pertaining crowdsourcing from a general view.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122266149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Orphan Defects: Chance Finding? 孤儿缺陷:偶然发现?
D. S. S. Prasad, S. Kanakadandi
{"title":"Orphan Defects: Chance Finding?","authors":"D. S. S. Prasad, S. Kanakadandi","doi":"10.1109/ICAIET.2014.22","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.22","url":null,"abstract":"At least 5% and at most 25% defects escape the rigorous to routine testing practices of various software products. Defects imply various holes in the test suite creation as well as selection. We implemented hybrid distance based algorithms to derive defect to test case mapping that yielded two metrics - Test Coverage Metric and Test Sufficiency Metric. In addition to these two metrics, we stumbled upon a set of defects that are not mapped to any test cases which were named as 'orphan defects (OD)'. Finding orphan defects contrasts the testing team's belief that they have created a comprehensive test suite with total coverage, we have coined the term 'chance finding' to empaahsize that it is serendipitous finding while analyzing various defects, both internal and custoemr reported. These defects have been further analyzed for any associated features and presented to the user for validation and adding required test cases. Upon using this procedure, one of the industry partners has brought down the orphan defects by about 90% over three patch releases and test coverage and sufficiency have been improved considerably.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126657239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Tracking Using Particle Filter for Parking Management System 基于粒子滤波的停车管理系统车辆跟踪
K. Teo, R. Chin, N. K. Rao, F. Wong, W. L. Khong
{"title":"Vehicle Tracking Using Particle Filter for Parking Management System","authors":"K. Teo, R. Chin, N. K. Rao, F. Wong, W. L. Khong","doi":"10.1109/ICAIET.2014.40","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.40","url":null,"abstract":"Increment of on-road vehicles has urged public venues to provide visitors with a larger area of parking space. As the parking area grew larger for example in a hyper mall, a well-organized parking management system is necessary to assist drivers in locating parking position. Besides, it can also help the management team to monitor vehicle flow in the parking lot. Vehicle tracking plays an important role to the parking management system, as accurate tracking result will lead to a more efficient management system. Among commercially available sensors, video sensor has been commonly deployed in the parking area due to its ability in obtaining a wide range of vehicle information. However, images captured using video sensors are limited under situations where vehicles are undergoing occlusion and maneuvering incidents. This will cause tracking error therefore affecting the performance of the parking management system. Particle filter has been proven as one of the promising techniques to track vehicle under disturbances. Therefore, particle filter is proposed to track vehicle under occlusion and maneuvering incidents in this study. Experimental results show that the particle filter is able to track a target vehicle under different disturbances.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Design and Compilation of a Facial Spoof Database on Various Textures 基于不同纹理的人脸欺骗数据库的设计与编译
S. Parveen, S. M. S. Ahmad, M. Hanafi, W. Adnan
{"title":"The Design and Compilation of a Facial Spoof Database on Various Textures","authors":"S. Parveen, S. M. S. Ahmad, M. Hanafi, W. Adnan","doi":"10.1109/ICAIET.2014.38","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.38","url":null,"abstract":"Face biometrics plays an important role in various authentication applications. However, one of the main design challenges for an accurate face biometrics is detecting spoof artificial artifacts. The development of robust anti-spoofing algorithm requires for rigorous system training and testing on facial database that includes various possible spoof specimen which reflects different variations of spoofing attacks. Currently, the databases which are used to test face anti-spoofing algorithms are limited in terms of texture variations. Therefore, in this paper, our focus is to introduce a face spoofing database which is compiled from various types of spoofing textures. Our database was collected from 30 different subjects and fake faces were recaptured on various forms which include four different types of paper-based textures and three different digital display devices. All images were collected using a high precision camera device. This database would provide a more realistic and challenging platform for facial anti-spoofing research.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utilization of Genetic Algorithm for Optimal EEG Channel Selection in Brain-Computer Interface Application 遗传算法在脑机接口中的应用
I. H. Hasan, A. Ramli, S. A. Ahmad
{"title":"Utilization of Genetic Algorithm for Optimal EEG Channel Selection in Brain-Computer Interface Application","authors":"I. H. Hasan, A. Ramli, S. A. Ahmad","doi":"10.1109/ICAIET.2014.25","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.25","url":null,"abstract":"Brain-Computer Interface (BCI) research has provoked an enormous interest among researchers from different fields since it is an important element in assistive technology. The most popular approach is a non-invasive method, using Electroencephalogram (EEG) analysis which acquires signals from 32 to 64 electrodes' recordings and translate them to a movement using various computing algorithm which can be used in wheelchair navigation, or control robot movements. However, it will be time consuming and an exhausting experience if the single command translation from large number of electrodes is used. The aim of this project is to develop an algorithm that can choose optimal four electrodes for signal recording, and convert one thought into multiple commands with the chosen electrodes. Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. After 30 GA runs, the optimal four sets of electrodes are chosen based on their coefficient of determination or r2 values, where higher values contributes to higher repetition rates. Using signals from the chosen four electrodes, a success rate of 75-80% is received.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131791041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信