{"title":"Intrinsic Plagiarism Detection Using Latent Semantic Indexing and Stylometry","authors":"Muna Alsallal, R. Iqbal, S. Amin, Anne E. James","doi":"10.1109/DeSE.2013.34","DOIUrl":"https://doi.org/10.1109/DeSE.2013.34","url":null,"abstract":"Plagiarism is growing increasingly for the last few years due to the rapid proliferation of information through the World Wide Web (WWW). In this paper, we present an integrated approach based on Latent Semantic Indexing (LSI) and Stylometry technique for intrinsic plagiarism detection. LSI is used for the term document matrix of dataset, whereas, stylometry is used for intrinsic approximation of human writing style. We have conducted a series of experiments to investigate the efficiency of dimensionality reduction (DR) parameter as the core for LSI technique in order to gain insights into its effects using a small corpus. Following that, we carried out comparative evaluation of our approach by using the LSI and Stylometry separately, and then applying them together. Our results show that the performance of the proposed approach was improved when an integrated approach consisting of LSI and stylometry was applied.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Schluse, Christian Schlette, R. Waspe, J. Roßmann
{"title":"Advanced 3D Simulation Technology for eRobotics: Techniques, Trends, and Chances","authors":"M. Schluse, Christian Schlette, R. Waspe, J. Roßmann","doi":"10.1109/DeSE.2013.35","DOIUrl":"https://doi.org/10.1109/DeSE.2013.35","url":null,"abstract":"The use of simulation technology is well known in the field of engineering. On a daily basis, engineers use e.g. block oriented simulation systems to develop controllers or FEM analysis methods to test and verify component layouts. By contrast, the use of 3D simulation technology based on kinematics, rigid body or sensor simulation so far seems to be limited to only a few specific application areas like robotics. But especially \"3D\" simulation technology has the potential to evolve from a support tool to a core engineering technology acting as a new focal point in engineering processes. It is now the goal of eRobotics to introduce a continuous and systematic computer support into the entire lifecycle of complex systems. This \"computer support\" will be provided by 3D simulation technology which requires the development of new architectures for 3D simulation frameworks, setting new benchmarks in performance, flexibility, modularity, integration capabilities and realism. These frameworks will also close the gap between virtual and real worlds, allowing for smooth bidirectional transitions between them. This paper introduces the basic concepts of eRobotics, summarizes new requirements on 3D simulation technology and introduces a new reference implementation which meets the formulated requirements.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122972152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Customer Email Communication in E-Commerce","authors":"A. Ojamaa, Uku-Rasmus Lind","doi":"10.1109/DeSE.2013.59","DOIUrl":"https://doi.org/10.1109/DeSE.2013.59","url":null,"abstract":"A solution is proposed for making emails sent by eSystems, such as online stores, to their customers more secure. The goal is to protect customers' privacy and to mitigate the possibility of different attacks, e.g., phishing. An overview of existing email related security standards and technologies is given and the suitability of these solutions for securing customer email communication is analyzed. The approach proposed in this paper is based on public key cryptography and OpenPGP. It combines already well established standards in a novel way to achieve a higher level of email security in e-commerce setting. A proof-of-concept implementation of the proposed solution is also presented. The implementation will be made available as an add-on module for an open source e-commerce platform Zen Cart. The authors make an argument for encouraging online stores to integrate security features such as described in this paper to protect their customers from online fraud.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129098489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Belegante, F. Toanca, J. Vasilescu, D. Nicolae, A. Nemuc
{"title":"Integrated E-System for Pollution and Climate Change Monitoring in the Framework of the Romanian Atmospheric Research 3D Observatory - RADO","authors":"L. Belegante, F. Toanca, J. Vasilescu, D. Nicolae, A. Nemuc","doi":"10.1109/DeSE.2013.39","DOIUrl":"https://doi.org/10.1109/DeSE.2013.39","url":null,"abstract":"The paper presents an overview on the implementation of integrated automated systems for pollution and climate change monitoring in the framework of RADO. RADO's mission is to improve modeling of physical, chemical, and biological processes, to assess the effects of climate change, and to quantify and reduce uncertainties in evaluating the hydrological cycle and its influence on natural resources. For this purpose, the integrated automated e-system, collecting data from different environmental monitoring instruments was developed.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131062056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Normal Strength Concrete from Crushed Al-Ma'mora Stones","authors":"Yaseen T. Khaleel, O. H. Jasim","doi":"10.1109/DeSE.2013.61","DOIUrl":"https://doi.org/10.1109/DeSE.2013.61","url":null,"abstract":"One of sustainable concrete engineering criteria deals with founded new alternative materials can be used in concrete mixes or structures. The objective of this study is to develop normal strength concrete using local crushed Al-Ma'mora stones and to evaluate the effect of a new coarse aggregate on mechanical and physical properties of produced concrete, also compared with normal (conventional coarse aggregate) concrete mix. In general, a new concrete mix shows higher than strength of normal concrete due to low porosity, particularly, when crushed coarse aggregate is used. However, the compressive strengths of new concrete mix using Al-Ma'mora and conventional (reference) aggregates are improved by 20%, due to texture modification. Also, the flexural strength of this concrete was higher than the reference concrete by 51.7%, and the splitting strength Almaamora stone concrete was higher than the reference concrete by 42.4%.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131753078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the Impact of Web-Based Technology on Learning Styles in Education","authors":"M. Alghamdi, D. Lamb, D. Al-Jumeily, A. Hussain","doi":"10.1109/DeSE.2013.68","DOIUrl":"https://doi.org/10.1109/DeSE.2013.68","url":null,"abstract":"Educational software is gaining ground as, not simply a distribution mechanism for learning materials but an adaptive media platform to respond to student needs. However, there is much work to be done with regard to differentiating between student ability and recognizing learning weaknesses and strengths. Web and mobile technology provides an opportunity to use this pervasive platform to gain great insight into student learning processes, and deliver information to students in many forms via a rich delivery platform. In this paper, we posit an approach to integrate learning styles and assessment for learning into adaptive e-learning hypermedia. This proposed system differentiates itself from other tutoring support systems as it will continually monitor and assess students' performance and guide them in their learning through interactive feedback and adaptive curriculum delivery as well as teaching them according to their preferred learning styles.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116368630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PSO Based Indoor RFID Network Planning","authors":"F. Al-Naima, Raoof T. Hussein","doi":"10.1109/DeSE.2013.11","DOIUrl":"https://doi.org/10.1109/DeSE.2013.11","url":null,"abstract":"Network planning in general is an important concept due to its effect on cost, coverage, efficiency and other important factors. Radio Frequency Identification (RFID) network, which consists of a number of readers, tags, and antennas is considered in the simulation test. The cost of the RFID network depends mainly on the number of the readers used in the design. It follows that the number and positions of the readers play an important role in the planning of the network. This paper presents two methods for planning the indoor RFID network by adopting one algorithm of intelligent optimization, which is called Particle Swarm Optimization (PSO). These two methods are referred to as static planning and dynamic planning. The results show that the algorithm successfully covered the area with a minimum number of readers. The simulation results of the second method give a better solution than the first one.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114475900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anthony Farrugia, D. Al-Jumeily, M. Al-Jumaily, A. Hussain, D. Lamb
{"title":"Medical Diagnosis: Are Artificial Intelligence Systems Able to Diagnose the Underlying Causes of Specific Headaches?","authors":"Anthony Farrugia, D. Al-Jumeily, M. Al-Jumaily, A. Hussain, D. Lamb","doi":"10.1109/DeSE.2013.72","DOIUrl":"https://doi.org/10.1109/DeSE.2013.72","url":null,"abstract":"Artificial intelligence is the capability of computing machines to perform at par with humans in some cognitive tasks. Since its conception in the 1940s, AI has ambitiously evolved to naturally and comfortably immerse in extraordinary and multidisciplinary fields including computer science, education, engineering and medicine. This survey aims to provide and highlight the importance of AI work in the field of medical informatics and biomedicine. We have reviewed latest AI research in this immense field of medical science with special attention given to medical diagnosis. Various intelligent computing tools from rule-based expert systems and fuzzy logic to neural networks and genetic algorithms used in medical diagnosis were considered. We have explored hydrocephalus, a medical condition causing headaches. We also analysed a prototype of what is known as NeuroDiary Web application that is currently being tested as a software mobile application for collecting data of patients with hydrocephalus. We finally propose the development of an expert mobile application system to assist clinicians in the diagnosis, analysis and treatment of hydrocephalus.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-Specific Fusion Using One-Class Classification for Multimodal Biometric Systems: Boundary Methods","authors":"Q. D. Tran, P. Liatsis","doi":"10.1109/DeSE.2013.56","DOIUrl":"https://doi.org/10.1109/DeSE.2013.56","url":null,"abstract":"It has been previously shown that the matching performance of a multimodal biometric system can be improved by using user-specific fusion. The objective of this approach is to address the fact that some users are difficult to recognize using some biometric traits, while these traits are highly discriminant for others. Conventional two-class classification methods, when used to design user-specific fusion, often suffer from the problem of limited availability of training data, especially, those of genuine users. In this paper, we propose a user-specific fusion approach, making use of one-class classifiers, known as boundary methods, to avoid the aforementioned problem of the two-class classification approach. We also show that such an approach outperforms others, including the Sum of Scores, the standard SVM, and the one-class SVM, in experiments carried out on the BioSecure DS2 database.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127074299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outlier Preprocessing in Wireless Sensor Networks: A Two-Layered Ellipse Approach","authors":"Ibrahim Khamis, Z. Aung","doi":"10.1109/DESE.2013.22","DOIUrl":"https://doi.org/10.1109/DESE.2013.22","url":null,"abstract":"Sensor nodes in wireless sensor networks have limited energy resources and this hinders the dissemination of the gathered data to a central location. This stimulated our research to make use of the limited computational capabilities of these sensor nodes to build a normal model of the data gathered. Hence by having the normal model, anomalies can then be detected and forwarded to a central location. This process is done locally in the sensor nodes and hence reduces the power consumption used in transmitting all the data. Our algorithm is an enhanced version of the Data Capture Anomalies Detection Algorithm, which is used to compute a local model of the normal data in wireless sensor networks. In this paper the Data Capture Anomalies Detection is used to partition the data and then send all the data to a central server for data classification, building on the Data Capture Anomalies Detection method and in order to classify the partitioned data, our algorithm Two-Layered Data Capture Anomalies Detection sends anomalies (2%) as well as roughly (2% or 4%) of normal data for further data processing and classification purposes. Experimental results on synthetic data show that Two-Layered Data Capture Anomalies Detection is able to provide promising results.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124360841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}