2019 8th International Conference on Information and Communication Technologies (ICICT)最新文献

筛选
英文 中文
Blockchain based Secure Crypto-currency system with Quantum Key Distribution Protocol 基于量子密钥分发协议的区块链安全加密货币系统
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/ICICT47744.2019.9001979
M. Azhar, Muhammad Burhan Khan, A. Khan
{"title":"Blockchain based Secure Crypto-currency system with Quantum Key Distribution Protocol","authors":"M. Azhar, Muhammad Burhan Khan, A. Khan","doi":"10.1109/ICICT47744.2019.9001979","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001979","url":null,"abstract":"A block chain is referred to as a growing list of records which are linked using cryptography. It is simple and open ledger that records all the transactions in block structures. These block structures are bound with each other by using Quantum Cryptographic protocols. The block chain is democratic system in which concerned parties get access by using a key to perform transaction. The well-known type of Quantum Cryptography protocol is Quantum Key Distribution (QKD). With the help of QKD our Crypto-currency system is secured when passage in between transmitting end and receiving end shouldn't be intrude by third party. Secrecy of the system depends upon different factors like efficient and optimized key rate, secure carrier of modulating signal. In this work the transparency and immunity of block chain based crypto-currency system is analyzed with simulation of six state QKD Protocol. The generation of key rate is observed to ensure the path for production of better crypto-currency system. A Mathematical model is used to obtain the desire constraints so that linear relationship can be achieved. At application level this study contributes to the implementation of crypto-currency system through six state QKD protocol.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Role of Social Media Marketing Activities in Creating University Brand Image and Reputation: The Mediating Role of Customer Value Co-creation Behavior 社会媒体营销活动对大学品牌形象和声誉的塑造:顾客价值共同创造行为的中介作用
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/ICICT47744.2019.9001927
M. Fiaz, Amir Ikram, Arooj Basma, Zainab Tariq, S. Jafri, Wafa Khurram
{"title":"Role of Social Media Marketing Activities in Creating University Brand Image and Reputation: The Mediating Role of Customer Value Co-creation Behavior","authors":"M. Fiaz, Amir Ikram, Arooj Basma, Zainab Tariq, S. Jafri, Wafa Khurram","doi":"10.1109/ICICT47744.2019.9001927","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001927","url":null,"abstract":"The purpose of the study is to investigate the impact of social media marketing activities on the university brand image and reputation. The mediating effect of the customer value co-creation behavior between the social media marketing activities and brand image of university is also considered. This is cross-sectional study based on time horizon and analysis of the study is conducted with the help of PLS-SEM mode. Data was gathered from 205 students belonging to four reputed public sector universities of the Punjab province, i.e. University of Punjab (PU), University of Engineering and Technology (UET) and Government College University (GCU Lahore). The findings suggest that marketing activities play a significant role in creating university brand reputation, as well as student value co-creation behavior plays mediating role in creating brand image.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment 云计算和物联网环境下数据加密技术综合文献综述
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/ICICT47744.2019.9001945
Muhammad Huzaifa Mehmood, M. Shahid, A. Jamil, Rehan Ashraf, Toqeer Mahmood, Aatif Mehmood
{"title":"A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment","authors":"Muhammad Huzaifa Mehmood, M. Shahid, A. Jamil, Rehan Ashraf, Toqeer Mahmood, Aatif Mehmood","doi":"10.1109/ICICT47744.2019.9001945","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001945","url":null,"abstract":"The internet of thing (IoT) is a network of interconnected physical devices, computer-based system, home-based application, automobiles and other things that are assigned with the unique IP address and devices may have the capability to share the data or information over networks without having any human to machine or human to human interaction. IoT devices generate a large volume of data is named Big data. Therefore, the concept of cloud computing was introduced to overcome storages issues on device. Cloud Computing is the latest emerging field which involves data processing and data storage to access remotely. However, the data on the internet is a risk. The IoT devices are generally small that consume less power and require less computational speed. As we know, the data encryption technique such as advanced encryption standard (AES), data encryption standard (DES) and triple advanced encryption standard (3DES) are complex algorithms. Therefore, these traditional encryption algorithms are not feasible for IoT devices. The issue mentioned above can be resolved by designing a lightweight encryption method to secure data transmission and communication in the IoT environment. The main objective of this research is to conduct a survey related to encryption techniques in cloud and IoT. This study summarize the encryption techniques, issues and variants, used for cloud and IoT. Furthermore, this study also presents the comparison of computational complexity of these techniques.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132743072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
[Copyright notice] (版权)
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/icict47744.2019.9001926
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icict47744.2019.9001926","DOIUrl":"https://doi.org/10.1109/icict47744.2019.9001926","url":null,"abstract":"","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115958482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Trash Bin (ITB) with Trash Collection Efficiency Optimization using IoT Sensing 利用物联网传感优化垃圾收集效率的智能垃圾桶
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/ICICT47744.2019.9001982
H. Sohail, Saif Ullah, Asim Khan, Omar Bin Samin, Maryam Omar
{"title":"Intelligent Trash Bin (ITB) with Trash Collection Efficiency Optimization using IoT Sensing","authors":"H. Sohail, Saif Ullah, Asim Khan, Omar Bin Samin, Maryam Omar","doi":"10.1109/ICICT47744.2019.9001982","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001982","url":null,"abstract":"As population increases rapidly with the passage of time due to which waste production is also increasing which badly effects the environment. All wastes cannot be decomposed and may produce bad smell and methane gas, increasing land and water pollution. Hence serious waste management is required. Concerned authorities face numerous problems while collecting waste like continuous checking of trash bins status (empty or full) to remove all waste at appropriate time. Existing manual systems of waste management are more costly and require more human resources This research proposes a solution for the sustainability of waste management. The system is divided into two parts: 1) Intelligent Trash Bin (ITB) and 2) Efficiency optimization for trash Collection. ITB is an IoT based automated trash bin which sends notification autonomously to the concerned authority, when it gets filled or fire is detected in it. Android application is used to receive notification from server and waste collector gets navigation targeted ITB's location. The Efficiency optimization for trash Collection is achieved as System checks status of every trash bin within 500 meters radius of vehicle to optimize waste collection efficiency.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116627184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
HPC as a Service: A naïve model HPC即服务:naïve模型
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/ICICT47744.2019.9001912
H. Imran, Saad Wazir, Ahmed Jamal Ikram, A. Ikram, H. Ullah, Maryam Ehsan
{"title":"HPC as a Service: A naïve model","authors":"H. Imran, Saad Wazir, Ahmed Jamal Ikram, A. Ikram, H. Ullah, Maryam Ehsan","doi":"10.1109/ICICT47744.2019.9001912","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001912","url":null,"abstract":"Applications like Big Data, Machine Learning, Deep Learning and even other Engineering and Scientific research requires a lot of computing power; making High-Performance Computing (HPC) an important field. But access to Supercomputers is out of range from the majority. Nowadays Supercomputers are actually clusters of computers usually made-up of commodity hardware. Such clusters are called Beowulf Clusters. The history of which goes back to 1994 when NASA built a Supercomputer by creating a cluster of commodity hardware. In recent times a lot of effort has been done in making HPC Clusters of even single board computers (SBCs). Although the creation of clusters of commodity hardware is possible but is a cumbersome task. Moreover, the maintenance of such systems is also difficult and requires special expertise and time. The concept of cloud is to provide on-demand resources that can be services, platform or even infrastructure and this is done by sharing a big resource pool. Cloud computing has resolved problems like maintenance of hardware and requirement of having expertise in networking etc. An effort is made of bringing concepts from cloud computing to HPC in order to get benefits of cloud. The main target is to create a system which can develop a capability of providing computing power as a service which to further be referred to as Supercomputer as a service. A prototype was made using Raspberry Pi (RPi) 3B and 3B+ Single Board Computers. The reason for using RPi boards was increasing popularity of ARM processors in the field of HPC","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How Workaholic Employees thrive in the Employee Involvement climate 工作狂如何在员工参与氛围中茁壮成长
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/ICICT47744.2019.9001910
M. Shahzad, Dong Jun, Qandeel Hassan, Rabbia Zafar
{"title":"How Workaholic Employees thrive in the Employee Involvement climate","authors":"M. Shahzad, Dong Jun, Qandeel Hassan, Rabbia Zafar","doi":"10.1109/ICICT47744.2019.9001910","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001910","url":null,"abstract":"Thriving at the workplace is a positive mental regime in which persons feel “a sense of vitality and learning”. This research is an effort to examine the process implicating the relation between workaholism and thriving at the workplace. By applying a mediation method, it verified the mediating outcome of employee involvement climate on the relation among workaholism and thriving at the workplace. Using PROCESS macro by Hayes on a sample of 202 employees from a private organizational sector such as banking. The observed results have been carved out by survey questionnaire via convenience sampling method. Findings show full mediation among all the relationships. The study describes the findings and provides different understandings on the worker's thriving at the workspace.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session VI
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/icict47744.2019.9001964
Connor Kerns, R. Vasa
{"title":"Session VI","authors":"Connor Kerns, R. Vasa","doi":"10.1109/icict47744.2019.9001964","DOIUrl":"https://doi.org/10.1109/icict47744.2019.9001964","url":null,"abstract":"Course Materials The purpose of these materials is to help provide an introduction to the Summer Institute session on modifying methods and treatments to address heterogeneity in Autism Spectrum Disorder (ASD). The materials were designed to prepare trainees who are unfamiliar with this research with the general background to get the most educational benefit from the session. Toward this objective, we have prepared the following: (1) learning objectives for this session; (2) some key terms and concepts; (3) a selection of recommended resources. These materials could be considered “prerequisites” in preparing for this session.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Illumination of Arbitrary Rooms Using Genetic Algorithm 基于遗传算法的任意房间最优照明
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/ICICT47744.2019.9001992
Aiman Khan, Syed Sami Murtaza, S. S. Raza
{"title":"Optimal Illumination of Arbitrary Rooms Using Genetic Algorithm","authors":"Aiman Khan, Syed Sami Murtaza, S. S. Raza","doi":"10.1109/ICICT47744.2019.9001992","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001992","url":null,"abstract":"Illuminating rooms is something that is taken as for granted. This paper presents an evolutionary method for solving this problem. The paper aims to find a minimalist arrangement of lamps in user-defined or random rooms such that they are optimally lit. Genetic algorithm is used to explore exponential search space of lamps placement and find those that suit the given criteria. Blender is used as a 3-D tool for this experiment. Results show promising arrangements of lamps that can be used in situations that require an emitter of signals in an obstruction filled environment.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Signal Detection of Linear Actuators based on Intelligent Remnant Filter 基于智能残差滤波的线性执行器故障信号检测
2019 8th International Conference on Information and Communication Technologies (ICICT) Pub Date : 2019-11-01 DOI: 10.1109/ICICT47744.2019.9001965
Naveed Riaz, S. O. Gilani, Syed Irtiza Ali Shah, Emad-udin, F. Rehman
{"title":"Fault Signal Detection of Linear Actuators based on Intelligent Remnant Filter","authors":"Naveed Riaz, S. O. Gilani, Syed Irtiza Ali Shah, Emad-udin, F. Rehman","doi":"10.1109/ICICT47744.2019.9001965","DOIUrl":"https://doi.org/10.1109/ICICT47744.2019.9001965","url":null,"abstract":"Linear servo electro-mechanical actuators are very commonly found in a variety of critical dynamic systems including various aerospace applications and hazardous robotic applications. These actuators are specifically designed on the basis of required operating functional parameters. The performance of servo electromechanical actuators significantly affects the performance of overall dynamic system. This paper works to improve the reliability of linear servo electromechanical actuators through analytical redundancy for critical applications. A fault diagnostic algorithm is designed based on dynamic mathematical model and a remnant filter is implemented to detect signal errors. The remnant filter generates residual signal proportional to the error induced. Fault detection thresholds are set and decision logic is established to compare residual signal with the lower and upper pre-defined threshold constants. This designed diagnostic filter is tested experimentally on a fault diagnostic testing setup and results of designed model have been validated.","PeriodicalId":351104,"journal":{"name":"2019 8th International Conference on Information and Communication Technologies (ICICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信