2014 6th International Conference on Computer Science and Information Technology (CSIT)最新文献

筛选
英文 中文
Development of a robotic arm for dangerous object disposal 危险物体处理机械臂的研制
A. Oke, Adeolu Afolabi
{"title":"Development of a robotic arm for dangerous object disposal","authors":"A. Oke, Adeolu Afolabi","doi":"10.1109/CSIT.2014.6805994","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805994","url":null,"abstract":"The Boko Haram insurgency in Nigeria has become a menace and threat to the security of lives and property most especially in the Northern part of the country. The use of Bombs and dangerous unsuspected objects is the weapon employed to carry out this deadly act. The number of lives lost as well as personnel who sustain injuries while discharging their duties is now on the increase as a result of lack of initial assessment of a dreadful scene or an object suspected to be harmful. Though preventive and counter attacking measures, such as use of protective vest have been employed to reduce the risk experienced; these however do not guarantee safety which can run into huge cost to restore in terms of infrastructures and properties. Hence this paper proposes the development of a robotic arm for dangerous object disposal. A three-degree of freedom robotic arm was developed using a microcontroller programmed with (MPLAB) integrated development environment software, interfaced to a camera that transmits the video by way of monitoring the scene on a television set. The system is activated by a remote control thereby providing a line of defense to human lives and preventing loss of proven and tested personnel.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"92 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125695848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Genetic Hash Algorithm 遗传哈希算法
L. N. Eddeen, Eman M. Saleh, Doaa Saadah
{"title":"Genetic Hash Algorithm","authors":"L. N. Eddeen, Eman M. Saleh, Doaa Saadah","doi":"10.1109/CSIT.2014.6805974","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805974","url":null,"abstract":"Security is becoming a major concern in computing. New techniques are evolving every day; one of these techniques is Hash Visualization. Hash Visualization uses complex random generated images for security, these images can be used to hide data (watermarking). This proposed new technique improves hash visualization by using genetic algorithms. Genetic algorithms are a search optimization technique that is based on the evolution of living creatures. The proposed technique uses genetic algorithms to improve hash visualization. The used genetic algorithm was away faster than traditional previous ones, and it improved hash visualization by evolving the tree that was used to generate the images, in order to obtain a better and larger tree that will generate images with higher security. The security was satisfied by calculating the fitness value for each chromosome based on a specifically designed algorithm.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DBN - Based learning for Arabic handwritten digit recognition using DCT features 基于DBN的阿拉伯语手写数字识别的DCT特征学习
J. AlKhateeb, Marwan Alseid
{"title":"DBN - Based learning for Arabic handwritten digit recognition using DCT features","authors":"J. AlKhateeb, Marwan Alseid","doi":"10.1109/CSIT.2014.6806004","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6806004","url":null,"abstract":"In this paper multi-class classification system of handwritten Arabic digits using Dynamic Bayesian Network (DBN) is proposed, in which technical details are presented in terms of three stages, i.e. pre-processing, feature extraction and classification. Firstly, digits are pre-processed and normalized in size. Then, features are extracted from each normalized digit, where a set of new features for handwritten digit is proposed based on the discrete cosine transform (DCT) coefficients approach. Finally, these features are then utilized to train a DBN for classification. The proposed system has been successfully tested on Arabic handwritten digit database (ADBase) which is composed of 70,000 digits written by 700 different writers, and the results were promising and very encouraging.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134049755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Users-groups matching in an annotation system: Ontological and URL relevance measures 注释系统中的用户组匹配:本体论和URL相关性度量
D. Avola, Paolo Bottoni, Amjad Hawash
{"title":"Users-groups matching in an annotation system: Ontological and URL relevance measures","authors":"D. Avola, Paolo Bottoni, Amjad Hawash","doi":"10.1109/CSIT.2014.6805986","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805986","url":null,"abstract":"The MADCOWannotation system supports a notion of group, facilitating focused annotations with respect to a domain. We argue that the use of an ontology to represent knowledge about the domain allows posting more refined annotations to a group, while the use of ontology concepts as tags facilitates the formulation of semantically significant queries for retrieving annotations on specific topics. Services for promoting participation to groups of potentially interested users can also leverage the adoption of domain ontologies, by matching tags users freely employed in their annotations to terms proper to some domain ontology. To this end, we propose a combination of existing relevance measures for matching users to domains.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cryptanalysis of password authentication system 密码认证系统的密码分析
S. Aboud, M. Al-Fayoumi
{"title":"Cryptanalysis of password authentication system","authors":"S. Aboud, M. Al-Fayoumi","doi":"10.1109/CSIT.2014.6805972","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805972","url":null,"abstract":"The password authentication systems have been increasing in recent years. Therefore authors have been concentrated these days on introducing more password authentication systems. Thus, in 2011, Lee et al., presented an enhanced system to resolve the vulnerabilities of selected system. But, we notice that Lee et al., system is still weak to server attack and stolen smart card attack. Also, a password change protocol of the system is neither suitable to users nor low efficient. There is no handy data can be gained from the values kept in smart cards. Therefore, a stolen smart card attack can be blocked. To prevent server attack, we suggest transferring a user authentication operation from servers to a registration centre, which can guarantee every server, has another private key.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ArabChat: An Arabic Conversational Agent ArabChat:阿拉伯语会话代理
Mohammad Hijjawi, Z. Bandar, Keeley A. Crockett, D. Mclean
{"title":"ArabChat: An Arabic Conversational Agent","authors":"Mohammad Hijjawi, Z. Bandar, Keeley A. Crockett, D. Mclean","doi":"10.1109/CSIT.2014.6806005","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6806005","url":null,"abstract":"This paper details the development of a novel and practical Conversational Agent for the Arabic language called ArabChat. A conversational Agent is a computer program that attempts to simulate conversations between machine and human. In this paper, the term `conversation' or `utterance' refers to real-time chat exchange between machine and human. The proposed framework for developing the Arabic Conversational Agent (ArabChat) is based on Pattern Matching approach to handle users' conversations. The Pattern Matching approach is based on the matching process between a user's utterance and pre-scripted patterns that represents different topics organized through novel scripting structure. A real experiment has been done in Applied Science University in Jordan as an information point advisor for their native Arabic students to evaluate the ArabChat.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124978071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Aggregation function using Homomorphic encryption in participating sensing application 基于同态加密的聚合函数参与传感应用
Noman Saleem, S. Alrabaee, F. Khasawneh, M. Khasawneh
{"title":"Aggregation function using Homomorphic encryption in participating sensing application","authors":"Noman Saleem, S. Alrabaee, F. Khasawneh, M. Khasawneh","doi":"10.1109/CSIT.2014.6805996","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805996","url":null,"abstract":"Participatory Sensing Application is new emerging computing paradigm that uses the data collected by the participants via mobile devices and active sensors. It gives an opportunity with the help of increasing number of mobile users to share information acquired by their sensor equipped devices. However, security and privacy are the major concerns in the success of these applications. While several security implementation techniques have discussed by the research community, one of them is Homomorphic encryption that allows aggregating encrypted values and the result would be same as unencrypted data. In this paper, we simulate the aggregation function using homomorphic encryption in participating sensing application.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"503 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Delayed rate monotonic with semi-partitioned technique adapted to multiprocessors 延迟速率单调与半分割技术适用于多处理机
Saeed Senobary, Mahmoud Naghibzadeh
{"title":"Delayed rate monotonic with semi-partitioned technique adapted to multiprocessors","authors":"Saeed Senobary, Mahmoud Naghibzadeh","doi":"10.1109/CSIT.2014.6805983","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805983","url":null,"abstract":"This paper presents a semi-partitioned scheduling algorithm for periodic tasks on multiprocessor platforms. The scheduling policy used within each processor is based on delayed rate monotonic algorithm. Delayed rate monotonic is a modified version of rate monotonic algorithm, which can achieve higher processor utilization than rate monotonic. First, it is formally proved that any task which is feasible under rate monotonic is feasible under delayed rate monotonic, as well. Then, based on delayed rate monotonic, a new scheduling algorithm called adapted delayed rate monotonic (ADRM) is designed for multiprocessor systems. ADRM is composed of delayed rate monotonic algorithm and a semi-partitioned technique. Semi-partitioned is a new approach for allocating tasks on multiprocessor platforms. According to the simulation results, ADRM is safer against possible overload than rate monotonic algorithm. Then, a procedure is proposed to achieve processor utilization under ADRM algorithm more than the rate monotonic algorithm.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents 使用通用安全模板构建信息安全事件教训的实证研究
Ying He, Chris W. Johnson, K. Renaud, Yu Lu, S. Jebriel
{"title":"An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents","authors":"Ying He, Chris W. Johnson, K. Renaud, Yu Lu, S. Jebriel","doi":"10.1109/CSIT.2014.6805998","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805998","url":null,"abstract":"The number of security incidents is still increasing. The re-occurrence of past breaches shows that lessons have not been effectively learned across different organisations. This illustrates important weaknesses within information security management systems (ISMS). The sharing of recommendations between public and private organisations has, arguably, not been given enough attention across academic and industry. Many questions remain, for example, about appropriate levels of detail and abstraction that enable different organisations to learn from incidents that occur in other companies within the same or different industries. The Generic Security Template has been proposed, aiming to provide a unified way to share the lessons learned from real world security incidents. In particular, it adapts the graphical Goal Structuring Notation (GSN), to present lessons learned in a structured manner by mapping them to the security requirements of the ISMS. In this paper, we have shown how a Generic Security Template can be used to structure graphical overviews of specific incidents. We have also shown the template can be instantiated to communicate the findings from an investigation into the US VA data breach. Moreover, this paper has empirically evaluated this approach to the creation of a Generic Security Template; this provides users with an overview of the lessons derived from security incidents at a level of abstraction that can help to implement recommendations in future contexts that are different from those in which an attack originally took place.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A centralized approach for resolving physical interference between robots using nearest first swarm method 一种用最邻近先群法集中解决机器人间物理干扰的方法
Punit Mittal, C. Tripathi, Aditya Kumar
{"title":"A centralized approach for resolving physical interference between robots using nearest first swarm method","authors":"Punit Mittal, C. Tripathi, Aditya Kumar","doi":"10.1109/CSIT.2014.6805988","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805988","url":null,"abstract":"Task allocation, where tasks must be executed before deadline, is one of the major research area in multi-robot system. For efficient task allocation, physical interference between robots must be taken into account i.e. when two or more robots are assigned the same task at the same time. Nearest first swarm (NFS), one of the simplest Swarm robot task allocation strategy, is used to analyze the influence of interference in multi-robot system. This paper proposes a new approach for resolving interference in accordance with the assigned priority to robots in a multi-robot task allocation system(MRTA). Major factors that are considered for defining priority among the robots are remaining energy of the robot, task completed by individuals robot and distance to the object. A default priority is used to resolve interference when two or more homogeneous robots look for same the task. Results show that the proposed technique of interference resolution helps in improving system performance by 17 %. A foraging mission has been taken as a ground to verify the result of our method.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121674672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信