2013 Sixth International Conference on Developments in eSystems Engineering最新文献

筛选
英文 中文
CG&A with Eye Tracking for Cognitive Behavior Analysis and Psychoanalysis 眼动追踪在认知行为分析和精神分析中的应用
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.32
Sharmila Subrahmaniam
{"title":"CG&A with Eye Tracking for Cognitive Behavior Analysis and Psychoanalysis","authors":"Sharmila Subrahmaniam","doi":"10.1109/DeSE.2013.32","DOIUrl":"https://doi.org/10.1109/DeSE.2013.32","url":null,"abstract":"Eye tracking is a technique used to track and measure the movement of human eyes and their gaze. Eye tracking technology has broad spectrum of uses ranging from product usability study through evaluating design effectiveness of mission critical defense systems. Currently eye tracking technology is used in the field of psychology to study and diagnose developmental psychology issues like Autism Spectrum Disorders (ASD). Though used in the study of cognitive patterns in media and consumer psychology, the technology is not yet explored enough for therapeutic use to adults, use in - mental health screenings, psychotherapy, and cognitive behavior modifications. This paper fuses concepts of computer graphics, animation, eye tracking with those of human psychological conditions, to make eye tracking technology not just as a diagnostic instrument but also as a therapeutic means for treating/alleviating depression, anxiety, post-traumatic stress disorder and autism. Eye tracking mechanisms usually have hardware front-end like large TFT monitors for playing some visual media(stimuli), devices emitting infra-red or near infra-red non-collimated light, sensors capturing corneal reflection, strategically placed, software in the back-end for - processing data from sensors and back tracing the points of gaze, eye movements, using corneal reflection geometry. Computer Graphics and Animation has a rich use in visual media displayed by eye tracking systems and in visual data representations resulting from eye tracking analysis. Since eye tracking, gets us unobtrusively close to seeing what others see, many objective inferences from viewer responses could be gathered. Such data is of great significance to cognitive behavior analysis and psychoanalysis. Eye tracking mediums conventionally deliver pre-defined videos targeted for specific expected set of user responses. This paper attempts exploring the existence and design possibilities of delivering psychologically interactive CG&A media, which change in real-time according to the psychometrics, psychology inferred from viewer gazing and evaluations tailored to the associated contexts. The paper would outline a high level design of an eye tracking system based on its research outcomes, for the purpose of psychometrics, cognitive behavioral analysis and psychotherapy, propose a minimal configuration of hardware and software for academic use, research and practical field applications.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Perception and Adoption of Mobile Internet Service Quality in Iraq 伊拉克移动互联网服务质量感知与采用
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.38
M. Knahl, Rawand Sulayman Mahmood
{"title":"Perception and Adoption of Mobile Internet Service Quality in Iraq","authors":"M. Knahl, Rawand Sulayman Mahmood","doi":"10.1109/DeSE.2013.38","DOIUrl":"https://doi.org/10.1109/DeSE.2013.38","url":null,"abstract":"This paper presents a survey and analysis on the Mobile Internet Service Quality in Iraq from a technical, marketing and financial perspective. Iraq has experienced a rapid growth in the adoption of Mobile Internet Services and the operators face challenges to attract and retain customers. The consumers in the northern Iraq cities have a high awareness of the existence and quality of Mobile Internet Service and are prepared to adopt state of the art Mobile Internet Services. There are potential markets for mobile operators to explore their services and to offer a high level of quality.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132505369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solution Space Optimization for RSA Attack RSA攻击的解空间优化
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.51
N. Albassam, M. Nasereddin
{"title":"Solution Space Optimization for RSA Attack","authors":"N. Albassam, M. Nasereddin","doi":"10.1109/DeSE.2013.51","DOIUrl":"https://doi.org/10.1109/DeSE.2013.51","url":null,"abstract":"The RSA security cryptosystem is very popular and is used by many internet protocols including SSH, SSL and TLS. The security of the RSA cryptosystem is highly dependent on the factorization speed of the modulus n into its composite primary numbers p and q. In this paper, an algorithm is presented to improve the factorization speed. The algorithm is based on reducing the size of the solution space for both p and q by analyzing the most two significant digits of n and dividing the solution space into multiple spaces. The repeating frequency of the most significant digit for p and q is then calculated. A statistically optimized search is then conducted to find the values of p and q. To test the algorithm, several simulation scenarios are explored. The proposed algorithm is compared with brute force attack. Results show that there is significant reduction in the primary numbers tested before solution is found. Based on the results, it is recommended that this algorithm be used when the brute force is the optimum choice, due to its simplicity.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advances in eRobotics: An Overview of Principles and Applications for Space, Industry, and Environmental Monitoring 机器人技术进展:空间、工业和环境监测原理与应用综述
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.40
J. Roßmann
{"title":"Advances in eRobotics: An Overview of Principles and Applications for Space, Industry, and Environmental Monitoring","authors":"J. Roßmann","doi":"10.1109/DeSE.2013.40","DOIUrl":"https://doi.org/10.1109/DeSE.2013.40","url":null,"abstract":"Robotic applications are complex, require hardware prototypes and thus are usually a costly endeavor. The research field of eRobotics has been established recently in order to help to cope with the inherent complexity, facilitate the development and significantly cut down the cost of advanced robotics and mechatronics development. The objective is to effectively use electronic media - hence the \"e\" at the beginning of the term - to achieve the best possible advancements in the development of the robots respective fields of use. The aim of developments in eRobotics is to provide a comprehensive software environment to address the robotics-related issues for the next generation robotic applications.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approach for Blind Source Separation 一种新的盲源分离方法
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.44
Md. Shiblee, B. Chandra
{"title":"Novel Approach for Blind Source Separation","authors":"Md. Shiblee, B. Chandra","doi":"10.1109/DeSE.2013.44","DOIUrl":"https://doi.org/10.1109/DeSE.2013.44","url":null,"abstract":"An attempt has been made to use efficient Neuron model for blind source separation. Generalized Harmonic Mean Neuron (GHMN) has been used as the neuron model. GHMN model is based on generalized harmonic mean of the inputs applied on it. Information-maximization approach has been used for training the neuron model. In this paper, it has been demonstrated how efficiently the GHMN model can be used for blind source separation. It has been shown on a generated mixture of finger prints and a real life mixture of finger prints (for blind source separation) that the new neuron model performs far superior as compared to the conventional neuron model.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116268320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wavelet-Neural Classification of Sleep EEG under Stressful Condition 应激条件下睡眠脑电图的小波神经分类
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.25
P. K. Upadhyay, R. K. Sinha
{"title":"Wavelet-Neural Classification of Sleep EEG under Stressful Condition","authors":"P. K. Upadhyay, R. K. Sinha","doi":"10.1109/DeSE.2013.25","DOIUrl":"https://doi.org/10.1109/DeSE.2013.25","url":null,"abstract":"Alterations in transients during awake, slow wave sleep (SWS), and rapid eye movement (REM) sleep stages due to an exposure to high environmental heat have been studied using continuous wavelet transform (CWT) method and artificial neural network (ANN). After two hours long EEG (Electroencephalogram) recordings from healthy rats, EEG data representing three sleep states was visually selected and further subdivided into 2 seconds long epoch. After extracting features in terms of wavelet coefficients for all the epochs multilayer perceptron neural network (MLPNN) has been trained to detect changes in the vigilance states of the subjects exposed to environmental heat stress. It reveals that, the classifications of wavelet coefficients of EEG signals in acute as well as chronic heat conditions along with the control data show the overall accuracy of 94.5% in SWS, 91.75% in REM sleep and 91.75% in AWAKE state.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122557150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mobile Multimedia Application Inspired by a Spaced Repetition Algorithm for Assistance with Speech and Language Therapy 一个由间隔重复算法启发的移动多媒体应用程序,用于帮助语音和语言治疗
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DESE.2013.71
David Folksman, P. Fergus, D. Al-Jumeily, C. Carter
{"title":"A Mobile Multimedia Application Inspired by a Spaced Repetition Algorithm for Assistance with Speech and Language Therapy","authors":"David Folksman, P. Fergus, D. Al-Jumeily, C. Carter","doi":"10.1109/DESE.2013.71","DOIUrl":"https://doi.org/10.1109/DESE.2013.71","url":null,"abstract":"The field of Speech and Language Therapy has seen great success utilising a number of paper based systems to help young children experiencing difficulty in language acquisition and understanding language. These systems employ card and paper based illustrations which are combined to create scenarios for children in order to expose them to new vocabulary in context. While this success has encouraged the use of such a system for a long time, problems have been identified that need addressing. In this context, systems are desired to complement the structured therapy session, in order to aid the Speech and Language Professional (SLP). In response to this, a plethora of mobile apps have flooded the market. The majority of these apps attempt to mirror current paper based methods. In this paper, a prototype web application that aims to provide a novel solution to language learning in Speech and Language Therapy is presented. The system applies a learning algorithm derived from Spaced Repetition research, with a view to aid language retention, augmenting the memorisation process.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123453213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust and Fragile Watermarking Scheme Based on DCT and Hash Function for Color Satellite Images 基于DCT和哈希函数的彩色卫星图像鲁棒脆弱水印方案
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.53
Sultan Al-Shehhi, Mohammed Al-Muhairi, Dalia Abuoeida, Hussain Al-Ahmed, N. Werghi, A. Kunhu
{"title":"Robust and Fragile Watermarking Scheme Based on DCT and Hash Function for Color Satellite Images","authors":"Sultan Al-Shehhi, Mohammed Al-Muhairi, Dalia Abuoeida, Hussain Al-Ahmed, N. Werghi, A. Kunhu","doi":"10.1109/DeSE.2013.53","DOIUrl":"https://doi.org/10.1109/DeSE.2013.53","url":null,"abstract":"This paper presents a watermarking algorithm to embed robust watermark and fragile authentication data into color satellite images. The aim of this watermarking algorithm is to protect the copyright and image originality. This algorithm doesn't require the original image in the extraction process and it is a blind algorithm. The algorithm contains two watermarks, one for the copyright and another one for the image authenticity. The first watermark is embedded in the frequency domain using the discrete cosine transform while the second watermark is embedded in the spatial domain which consists of hash functions using MD5 and Hex formats. The fragile watermark is inserted in one row of each one of the RGB channels. The distortion caused by the embedding is assessed using peak signal to noise ratio (PSNR) and similarity structure index measure (SSIM). Robustness against different types of attacks have been assessed using Stirmark and by introducing small modifications to the satellite images. The robust watermarking scheme survived many attacks such as JPEG compression and filtering. The fragile watermark is very sensitive and any small modification to the image can be detected. It was found that embedding in the green channel offers better performance compared to red and blue channels. In addition the embedding in the Y channel offers better robustness against attacks.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Technology Acceptance Model for a User-Centred Culturally-Aware E-Health Design 以用户为中心的文化意识电子健康设计的技术接受模型
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.30
A. H. Mohamed, H. Tawfik, L. Norton, D. Al-Jumeily
{"title":"A Technology Acceptance Model for a User-Centred Culturally-Aware E-Health Design","authors":"A. H. Mohamed, H. Tawfik, L. Norton, D. Al-Jumeily","doi":"10.1109/DeSE.2013.30","DOIUrl":"https://doi.org/10.1109/DeSE.2013.30","url":null,"abstract":"This study builds on previous research, where a technology acceptance model for electronic health (e-HTAM) was investigated, developed and evaluated. The e-HTAM questionnaire originally used showed some weakness in terms of its overall reliability, which highlighted the need for a second phase of study to address the shortfalls reported by the first model. The second phase of the study was conducted after the questionnaire used in the initial phase was modified. The results suggested that when creating e-Health websites or services, the principle of how e-Health websites and services should be designed and delivered, and under which cultural setting they will be used, should be taken into consideration from the initial design stage.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115200502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RFID Speed Monitoring System RFID速度监控系统
2013 Sixth International Conference on Developments in eSystems Engineering Pub Date : 2013-12-16 DOI: 10.1109/DeSE.2013.65
A. Al-Gindy, A. Tawfik, Laila Sakhi, Hibaq Mohamad, M. Mustafa
{"title":"RFID Speed Monitoring System","authors":"A. Al-Gindy, A. Tawfik, Laila Sakhi, Hibaq Mohamad, M. Mustafa","doi":"10.1109/DeSE.2013.65","DOIUrl":"https://doi.org/10.1109/DeSE.2013.65","url":null,"abstract":"The increasing number of speeding related car accidents call for stricter measures to be taken. Radio Frequency Identification (RFID) presents the best ability to identify objects in a certain range. A system was created to approximate the speed of a vehicle travelling between two RFID readers. RFID readers will be placed at known, predetermined distances from each other. The passing vehicle carrying an RFID tag will broadcast its unique number to the reader which will log the exact time this vehicle has passed. By measuring the time the vehicle needed to pass two consecutive readers, the average speed can be calculated. Mean value theorem says that the vehicle's speed must be at some point equal to the average speed calculated. Speeding ticket can be issued immediately if the calculated speed exceeds the speed limit. This technique provides advantages such as, low cost, easy integration, and accurate speed measurement.","PeriodicalId":248716,"journal":{"name":"2013 Sixth International Conference on Developments in eSystems Engineering","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127252506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信