2013 Sixth International Conference on Developments in eSystems Engineering最新文献

筛选
英文 中文
Intrinsic Plagiarism Detection Using Latent Semantic Indexing and Stylometry 基于潜在语义索引和文体学的内在抄袭检测
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.34
Muna Alsallal, R. Iqbal, S. Amin, Anne E. James
{"title":"Intrinsic Plagiarism Detection Using Latent Semantic Indexing and Stylometry","authors":"Muna Alsallal, R. Iqbal, S. Amin, Anne E. James","doi":"10.1109/DeSE.2013.34","DOIUrl":"https://doi.org/10.1109/DeSE.2013.34","url":null,"abstract":"Plagiarism is growing increasingly for the last few years due to the rapid proliferation of information through the World Wide Web (WWW). In this paper, we present an integrated approach based on Latent Semantic Indexing (LSI) and Stylometry technique for intrinsic plagiarism detection. LSI is used for the term document matrix of dataset, whereas, stylometry is used for intrinsic approximation of human writing style. We have conducted a series of experiments to investigate the efficiency of dimensionality reduction (DR) parameter as the core for LSI technique in order to gain insights into its effects using a small corpus. Following that, we carried out comparative evaluation of our approach by using the LSI and Stylometry separately, and then applying them together. Our results show that the performance of the proposed approach was improved when an integrated approach consisting of LSI and stylometry was applied.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Advanced 3D Simulation Technology for eRobotics: Techniques, Trends, and Chances 机器人先进的3D模拟技术:技术,趋势和机会
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.35
M. Schluse, Christian Schlette, R. Waspe, J. Roßmann
{"title":"Advanced 3D Simulation Technology for eRobotics: Techniques, Trends, and Chances","authors":"M. Schluse, Christian Schlette, R. Waspe, J. Roßmann","doi":"10.1109/DeSE.2013.35","DOIUrl":"https://doi.org/10.1109/DeSE.2013.35","url":null,"abstract":"The use of simulation technology is well known in the field of engineering. On a daily basis, engineers use e.g. block oriented simulation systems to develop controllers or FEM analysis methods to test and verify component layouts. By contrast, the use of 3D simulation technology based on kinematics, rigid body or sensor simulation so far seems to be limited to only a few specific application areas like robotics. But especially \"3D\" simulation technology has the potential to evolve from a support tool to a core engineering technology acting as a new focal point in engineering processes. It is now the goal of eRobotics to introduce a continuous and systematic computer support into the entire lifecycle of complex systems. This \"computer support\" will be provided by 3D simulation technology which requires the development of new architectures for 3D simulation frameworks, setting new benchmarks in performance, flexibility, modularity, integration capabilities and realism. These frameworks will also close the gap between virtual and real worlds, allowing for smooth bidirectional transitions between them. This paper introduces the basic concepts of eRobotics, summarizes new requirements on 3D simulation technology and introduces a new reference implementation which meets the formulated requirements.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122972152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Securing Customer Email Communication in E-Commerce 保障电子商务中客户的电子邮件沟通
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.59
A. Ojamaa, Uku-Rasmus Lind
{"title":"Securing Customer Email Communication in E-Commerce","authors":"A. Ojamaa, Uku-Rasmus Lind","doi":"10.1109/DeSE.2013.59","DOIUrl":"https://doi.org/10.1109/DeSE.2013.59","url":null,"abstract":"A solution is proposed for making emails sent by eSystems, such as online stores, to their customers more secure. The goal is to protect customers' privacy and to mitigate the possibility of different attacks, e.g., phishing. An overview of existing email related security standards and technologies is given and the suitability of these solutions for securing customer email communication is analyzed. The approach proposed in this paper is based on public key cryptography and OpenPGP. It combines already well established standards in a novel way to achieve a higher level of email security in e-commerce setting. A proof-of-concept implementation of the proposed solution is also presented. The implementation will be made available as an add-on module for an open source e-commerce platform Zen Cart. The authors make an argument for encouraging online stores to integrate security features such as described in this paper to protect their customers from online fraud.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129098489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated E-System for Pollution and Climate Change Monitoring in the Framework of the Romanian Atmospheric Research 3D Observatory - RADO 罗马尼亚大气研究三维天文台- RADO框架下的污染和气候变化监测综合电子系统
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.39
L. Belegante, F. Toanca, J. Vasilescu, D. Nicolae, A. Nemuc
{"title":"Integrated E-System for Pollution and Climate Change Monitoring in the Framework of the Romanian Atmospheric Research 3D Observatory - RADO","authors":"L. Belegante, F. Toanca, J. Vasilescu, D. Nicolae, A. Nemuc","doi":"10.1109/DeSE.2013.39","DOIUrl":"https://doi.org/10.1109/DeSE.2013.39","url":null,"abstract":"The paper presents an overview on the implementation of integrated automated systems for pollution and climate change monitoring in the framework of RADO. RADO's mission is to improve modeling of physical, chemical, and biological processes, to assess the effects of climate change, and to quantify and reduce uncertainties in evaluating the hydrological cycle and its influence on natural resources. For this purpose, the integrated automated e-system, collecting data from different environmental monitoring instruments was developed.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131062056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Normal Strength Concrete from Crushed Al-Ma'mora Stones Al-Ma'mora碎石正强混凝土的研制
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.61
Yaseen T. Khaleel, O. H. Jasim
{"title":"Development of Normal Strength Concrete from Crushed Al-Ma'mora Stones","authors":"Yaseen T. Khaleel, O. H. Jasim","doi":"10.1109/DeSE.2013.61","DOIUrl":"https://doi.org/10.1109/DeSE.2013.61","url":null,"abstract":"One of sustainable concrete engineering criteria deals with founded new alternative materials can be used in concrete mixes or structures. The objective of this study is to develop normal strength concrete using local crushed Al-Ma'mora stones and to evaluate the effect of a new coarse aggregate on mechanical and physical properties of produced concrete, also compared with normal (conventional coarse aggregate) concrete mix. In general, a new concrete mix shows higher than strength of normal concrete due to low porosity, particularly, when crushed coarse aggregate is used. However, the compressive strengths of new concrete mix using Al-Ma'mora and conventional (reference) aggregates are improved by 20%, due to texture modification. Also, the flexural strength of this concrete was higher than the reference concrete by 51.7%, and the splitting strength Almaamora stone concrete was higher than the reference concrete by 42.4%.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131753078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the Impact of Web-Based Technology on Learning Styles in Education 评估网络技术对教育学习方式的影响
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.68
M. Alghamdi, D. Lamb, D. Al-Jumeily, A. Hussain
{"title":"Assessing the Impact of Web-Based Technology on Learning Styles in Education","authors":"M. Alghamdi, D. Lamb, D. Al-Jumeily, A. Hussain","doi":"10.1109/DeSE.2013.68","DOIUrl":"https://doi.org/10.1109/DeSE.2013.68","url":null,"abstract":"Educational software is gaining ground as, not simply a distribution mechanism for learning materials but an adaptive media platform to respond to student needs. However, there is much work to be done with regard to differentiating between student ability and recognizing learning weaknesses and strengths. Web and mobile technology provides an opportunity to use this pervasive platform to gain great insight into student learning processes, and deliver information to students in many forms via a rich delivery platform. In this paper, we posit an approach to integrate learning styles and assessment for learning into adaptive e-learning hypermedia. This proposed system differentiates itself from other tutoring support systems as it will continually monitor and assess students' performance and guide them in their learning through interactive feedback and adaptive curriculum delivery as well as teaching them according to their preferred learning styles.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116368630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PSO Based Indoor RFID Network Planning 基于粒子群算法的室内RFID网络规划
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.11
F. Al-Naima, Raoof T. Hussein
{"title":"PSO Based Indoor RFID Network Planning","authors":"F. Al-Naima, Raoof T. Hussein","doi":"10.1109/DeSE.2013.11","DOIUrl":"https://doi.org/10.1109/DeSE.2013.11","url":null,"abstract":"Network planning in general is an important concept due to its effect on cost, coverage, efficiency and other important factors. Radio Frequency Identification (RFID) network, which consists of a number of readers, tags, and antennas is considered in the simulation test. The cost of the RFID network depends mainly on the number of the readers used in the design. It follows that the number and positions of the readers play an important role in the planning of the network. This paper presents two methods for planning the indoor RFID network by adopting one algorithm of intelligent optimization, which is called Particle Swarm Optimization (PSO). These two methods are referred to as static planning and dynamic planning. The results show that the algorithm successfully covered the area with a minimum number of readers. The simulation results of the second method give a better solution than the first one.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114475900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Medical Diagnosis: Are Artificial Intelligence Systems Able to Diagnose the Underlying Causes of Specific Headaches? 医学诊断:人工智能系统能够诊断特定头痛的潜在原因吗?
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.72
Anthony Farrugia, D. Al-Jumeily, M. Al-Jumaily, A. Hussain, D. Lamb
{"title":"Medical Diagnosis: Are Artificial Intelligence Systems Able to Diagnose the Underlying Causes of Specific Headaches?","authors":"Anthony Farrugia, D. Al-Jumeily, M. Al-Jumaily, A. Hussain, D. Lamb","doi":"10.1109/DeSE.2013.72","DOIUrl":"https://doi.org/10.1109/DeSE.2013.72","url":null,"abstract":"Artificial intelligence is the capability of computing machines to perform at par with humans in some cognitive tasks. Since its conception in the 1940s, AI has ambitiously evolved to naturally and comfortably immerse in extraordinary and multidisciplinary fields including computer science, education, engineering and medicine. This survey aims to provide and highlight the importance of AI work in the field of medical informatics and biomedicine. We have reviewed latest AI research in this immense field of medical science with special attention given to medical diagnosis. Various intelligent computing tools from rule-based expert systems and fuzzy logic to neural networks and genetic algorithms used in medical diagnosis were considered. We have explored hydrocephalus, a medical condition causing headaches. We also analysed a prototype of what is known as NeuroDiary Web application that is currently being tested as a software mobile application for collecting data of patients with hydrocephalus. We finally propose the development of an expert mobile application system to assist clinicians in the diagnosis, analysis and treatment of hydrocephalus.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
User-Specific Fusion Using One-Class Classification for Multimodal Biometric Systems: Boundary Methods 多模态生物识别系统中使用一类分类的用户特定融合:边界方法
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.56
Q. D. Tran, P. Liatsis
{"title":"User-Specific Fusion Using One-Class Classification for Multimodal Biometric Systems: Boundary Methods","authors":"Q. D. Tran, P. Liatsis","doi":"10.1109/DeSE.2013.56","DOIUrl":"https://doi.org/10.1109/DeSE.2013.56","url":null,"abstract":"It has been previously shown that the matching performance of a multimodal biometric system can be improved by using user-specific fusion. The objective of this approach is to address the fact that some users are difficult to recognize using some biometric traits, while these traits are highly discriminant for others. Conventional two-class classification methods, when used to design user-specific fusion, often suffer from the problem of limited availability of training data, especially, those of genuine users. In this paper, we propose a user-specific fusion approach, making use of one-class classifiers, known as boundary methods, to avoid the aforementioned problem of the two-class classification approach. We also show that such an approach outperforms others, including the Sum of Scores, the standard SVM, and the one-class SVM, in experiments carried out on the BioSecure DS2 database.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127074299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Outlier Preprocessing in Wireless Sensor Networks: A Two-Layered Ellipse Approach 无线传感器网络中的离群点预处理:一种双层椭圆方法
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DESE.2013.22
Ibrahim Khamis, Z. Aung
{"title":"Outlier Preprocessing in Wireless Sensor Networks: A Two-Layered Ellipse Approach","authors":"Ibrahim Khamis, Z. Aung","doi":"10.1109/DESE.2013.22","DOIUrl":"https://doi.org/10.1109/DESE.2013.22","url":null,"abstract":"Sensor nodes in wireless sensor networks have limited energy resources and this hinders the dissemination of the gathered data to a central location. This stimulated our research to make use of the limited computational capabilities of these sensor nodes to build a normal model of the data gathered. Hence by having the normal model, anomalies can then be detected and forwarded to a central location. This process is done locally in the sensor nodes and hence reduces the power consumption used in transmitting all the data. Our algorithm is an enhanced version of the Data Capture Anomalies Detection Algorithm, which is used to compute a local model of the normal data in wireless sensor networks. In this paper the Data Capture Anomalies Detection is used to partition the data and then send all the data to a central server for data classification, building on the Data Capture Anomalies Detection method and in order to classify the partitioned data, our algorithm Two-Layered Data Capture Anomalies Detection sends anomalies (2%) as well as roughly (2% or 4%) of normal data for further data processing and classification purposes. Experimental results on synthetic data show that Two-Layered Data Capture Anomalies Detection is able to provide promising results.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124360841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信