2014 6th International Conference on Computer Science and Information Technology (CSIT)最新文献

筛选
英文 中文
Tracking power photovoltaic system with a fuzzy logic control strategy 基于模糊逻辑控制策略的光伏发电系统跟踪
M. Khireddine, M. Makhloufi, Y. Abdessemed, A. Boutarfa
{"title":"Tracking power photovoltaic system with a fuzzy logic control strategy","authors":"M. Khireddine, M. Makhloufi, Y. Abdessemed, A. Boutarfa","doi":"10.1109/CSIT.2014.6805977","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805977","url":null,"abstract":"Photovoltaic generation is the technique which uses photovoltaic cell to convert solar energy to electric energy. Nowadays, PV generation is developing increasingly fast as a renewable energy source. However, the disadvantage is that PV generation is intermittent for depending on weather conditions. This paper proposes an intelligent control method for the maximum power point tracking (MPPT) of a photovoltaic system under variable temperature and solar radiation conditions. This method uses a fuzzy logic controller applied to a DC-DC boost converter device. A photovoltaic system including a solar panel, a DC-DC converter, a Fuzzy MPP tracker and a resistive load is modeled and simulated. Finally performance comparison between fuzzy logic controller and Perturb and Observe method has been carried out which has shown the effectiveness of fuzzy logic controller to draw much energy and fast response against change in working conditions.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129000365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Offline handwritten signature verification system using a supervised neural network approach 离线手写签名验证系统采用监督神经网络方法
Mujahed Jarad, Nijad A. Al-Najdawi, Sara Tedmori
{"title":"Offline handwritten signature verification system using a supervised neural network approach","authors":"Mujahed Jarad, Nijad A. Al-Najdawi, Sara Tedmori","doi":"10.1109/CSIT.2014.6805999","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805999","url":null,"abstract":"Signatures are imperative biometric attributes of humans that have long been used for authorization purposes. Most organizations primarily focus on the visual appearance of the signature for verification purposes. Many documents, such as forms, contracts, bank cheques, and credit card transactions require the signing of a signature. Therefore, it is of upmost importance to be able to recognize signatures accurately, effortlessly, and in a timely manner. In this work, an artificial neural network based on the well-known Back-propagation algorithm is used for recognition and verification. To test the performance of the system, the False Reject Rate, the False Accept Rate, and the Equal Error Rate (EER) are calculated. The system was tested with 400 test signature samples, which include genuine and forged signatures of twenty individuals. The aim of this work is to limit the computer singularity in deciding whether the signature is forged or not, and to allow the signature verification personnel to participate in the deciding process through adding a label which indicates the amount of similarity between the signature which we want to recognize and the original signature. This approach allows judging the signature accuracy, and achieving more effective results.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114170135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Using weaving models in metamodel and model co-evolution approach 在元模型和模型协同进化方法中使用编织模型
F. Anguel, A. Amirat, N. Bounour
{"title":"Using weaving models in metamodel and model co-evolution approach","authors":"F. Anguel, A. Amirat, N. Bounour","doi":"10.1109/CSIT.2014.6805992","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805992","url":null,"abstract":"In Model-Driven Engineering, analogously to any software artifact, metamodels are equally prone to evolution. When a metamodel undergoes modifications, all the related artifacts must be accordingly adapted in order to remain valid. Manual co-evolution of models after these metamodel changes is error-prone. In this setting, this paper introduces a semi-automatic process for the co-evolution of models after metamodel evolution. The process is divided in four main stages: at the differencing stage, the changes to the metamodel are detected. After that these changes are linked with the original model elements and represented in a weaving model which serves to generate a transformation used in the last stage in order to obtain the evolved model. Contributions of this paper include the automatic co-evolution of breaking and resolvable changes and the assistance to the model developer in the co-evolution of breaking and un-resolvable changes.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128822923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A survey of Internet security risk over social networks 一项针对社交网络的互联网安全风险调查
Nour E. Oweis, S. Owais, Mohammad A. Alrababa, MohammadAtiah Alansari, Waseem G. Oweis
{"title":"A survey of Internet security risk over social networks","authors":"Nour E. Oweis, S. Owais, Mohammad A. Alrababa, MohammadAtiah Alansari, Waseem G. Oweis","doi":"10.1109/CSIT.2014.6805970","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805970","url":null,"abstract":"The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on the human elements. We raised the problems of social networks in the transformation of societies to another affected by the global economy. The social networking integration needs to strengthen social ties that lead to the existence of these problems. For this we focused on the Internet security risks over the social networks. And study on Risk Management, and then look at resolving various problems that occur from the use of social networks.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122490743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic registration of user drawn graphical passwords 自动注册用户绘制图形密码
S. Jebriel, R. Poet
{"title":"Automatic registration of user drawn graphical passwords","authors":"S. Jebriel, R. Poet","doi":"10.1109/CSIT.2014.6805997","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805997","url":null,"abstract":"This paper reports on a recognition based graphical authentication system where the users provide their pass images as simple drawings. Previous such systems have relied on a human administrator to register the images with the system, which limits their scale. We have replaced the administrator with software that both guides the user through the registration process and then automatically corrects any errors in the image files submitted to the system. We also investigate two ways of implementing these systems, by drawing on paper and scanning in the images, and using a computer paint program to create the images. We conducted a user study with 40 effective users. Our software was able to correct all the errors made by the users, extracting usable images in all cases. We also found that our users strongly preferred using the paint system to the system that required the use of a scanner. This research has implications for authentication with mobile phones, where the camera can replace the scanner and finger drawing apps replace the paint program..","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Exploring the guessability of hand drawn images based on cultural characteristics 探索基于文化特征的手绘图像的可猜测性
S. Jebriel, R. Poet
{"title":"Exploring the guessability of hand drawn images based on cultural characteristics","authors":"S. Jebriel, R. Poet","doi":"10.1109/CSIT.2014.6805971","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805971","url":null,"abstract":"The aim of this research is to examine whether or not an attacker could guess hand drawn images chosen as graphical password by others, based on knowledge of some cultural information like where they are come from or their religion or even their hopes and aims. Also, the aim was therefore to ascertain at what level the cross-cultural influences might affect our choice and use of drawn images as password. The investigation made a comparison between Western (Scottish), Arab (Libyans) and Africans (Nigerians) as the comparison between regions which had been well investigated by previous researchers had tended to focus on Western and Eastern subjects. To conclude, it can be accepted that culture significantly affected drawings depending on some human factors such as gender, etc. Moreover, one clear result of this work is that it is apparently highly possible to guess other people's pass images if they contain cultural characteristics, especially religious marks, otherwise it is much more difficult to guess them, and also this depends on many factors. Finally, this paper outlines some rules and guidelines of drawing a strong secret graphical password.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127011013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Welcome massages 欢迎按摩
M. Judeh
{"title":"Welcome massages","authors":"M. Judeh","doi":"10.1109/csit.2014.6805967","DOIUrl":"https://doi.org/10.1109/csit.2014.6805967","url":null,"abstract":"Welcome Message from the President of Applied Science University - Prof. Mahfuz Judeh","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116170521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信