2010 International Conference on Information Society最新文献

筛选
英文 中文
Reversible secret image sharing scheme with enhanced stego image visual quality 增强隐写图像视觉质量的可逆秘密图像共享方案
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018815
G. Ulutaş, M. Ulutaş, V. Nabiyev
{"title":"Reversible secret image sharing scheme with enhanced stego image visual quality","authors":"G. Ulutaş, M. Ulutaş, V. Nabiyev","doi":"10.1109/I-SOCIETY16502.2010.6018815","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018815","url":null,"abstract":"Secret Image Sharing is a technique to share a secret image among n participants using Shamir's secret sharing scheme. Secret image is revealed if any k of the n shares is processed according to the scheme. Research reported in the literature is focused on improving known issues of the method. Reconstruction without distortion, reducing the size expansion of the share images, improving stego image quality and enhancing authentication ability of the method are some of the issues. Recovering cover images after the revealing procedure is an important issue. In 2009, Wu et al. proposed a technique based on Reversible Steganography to solve this problem. A location map is used to recover cover images, which needs extra information. The proposed method outlined in this paper does not need any information except shares to recover cover images. In addition, visual quality of the shares or the Peak Signal to Noise Ratio (PSNR) values of stego images are improved which is used to demonstrate the effectiveness of the method. Experimental results indicate a 3 dB PSNR improvement on the average compared to Wu et al.'s method.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information management for flood prevention service work 防洪服务工作信息化管理
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018793
Bin Li, Jiping Liu, Rong Zhao, Lijian Sun, Lihong Shi
{"title":"Information management for flood prevention service work","authors":"Bin Li, Jiping Liu, Rong Zhao, Lijian Sun, Lihong Shi","doi":"10.1109/I-SOCIETY16502.2010.6018793","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018793","url":null,"abstract":"It is of great significance for flood prevention service work due to relating to people's life and property safety in our country. With the concerted cooperation and effort between government sector and Chinese Academy of Surveying and Mapping, great information techniques have been adopted widely and a new type of network platform based on GIS and RS has been developed successfully. Based on this new platform, coordinated work among multi flood prevention departments has been completed by taking the method of telematic service. Correlative information of flood prevention, such as weather, hydrology, remote sensing and disaster and so on can be automatically loaded and integrated in the platform. And the new platform can run ceaselessly under the round-the-clock condition. Ultimately, aided decision-making for flood prevention can be afford to the leaders of government sector and it is convenient for the latter to take effective measures to reduce the losses aroused by different kinds of flood disasters.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116806130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology of e-Learning security e-Learning安全本体
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018837
G. Akmayeva, C. Shoniregun
{"title":"Ontology of e-Learning security","authors":"G. Akmayeva, C. Shoniregun","doi":"10.1109/I-SOCIETY16502.2010.6018837","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018837","url":null,"abstract":"The ubiquitous nature of e-Learning applications in dealing with huge and diverse population of users creates the gap for errors and malicious attacks. The ability to quickly estimate security risks is particularly crucial for automated assessment of e-learning. What type of measures is taken to keep the privacy and integrity of the information stored? And whether there are mechanisms that can prevent cheating when performing online examinations? In most cases, the e-Learning applications are designed and implemented to combine distinct services into a coherent whole in order to fulfil sophisticated tasks that cannot be fulfilled by a single service. Therefore, an awareness of threats and their countermeasures are essential, as e-Learning does not operate in a vacuum. This paper focuses on the ontology of E-Learning security.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improvement of the dynamic ID-based remote user authentication scheme 基于动态id的远程用户认证方案的改进
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018817
R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala
{"title":"Improvement of the dynamic ID-based remote user authentication scheme","authors":"R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala","doi":"10.1109/I-SOCIETY16502.2010.6018817","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018817","url":null,"abstract":"Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is secure. In this paper, we show that Das, Saxena and Gulati's scheme is vulnerable to insider, masquerade, and server spoofing attacks. Moreover, it fails to provide mutual authentication. In order to remedy these drawbacks, this paper proposes a secure dynamic ID-based remote user authentication scheme using smart cards. The performance evaluation and security analysis show that our proposal is feasible in terms of computational cost, storage capacity, and the scheme can resist several attacks.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120833243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Infrastructure for studying decision — Making processes 用于研究决策过程的基础设施
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018761
M. Levy, N. Pliskin
{"title":"Infrastructure for studying decision — Making processes","authors":"M. Levy, N. Pliskin","doi":"10.1109/I-SOCIETY16502.2010.6018761","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018761","url":null,"abstract":"As the business environment becomes complex, high-quality decision-making processes are critical for organizations. Business simulation games can support learning as well as research of decision-making processes from both human and technological aspects. This research-in-progress paper aims at developing advanced knowledge management (KM) systems and studying their usability and performance within a simulation-game environment.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Which is better for inflation forecasting? Neural networks or data mining 哪一种预测通胀更好?神经网络或数据挖掘
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018807
P. E. Somaratna, Shiromi Arunatilaka, Lalith Premarathna
{"title":"Which is better for inflation forecasting? Neural networks or data mining","authors":"P. E. Somaratna, Shiromi Arunatilaka, Lalith Premarathna","doi":"10.1109/I-SOCIETY16502.2010.6018807","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018807","url":null,"abstract":"In present context, Information Technology (IT) is used in every field whether it is Business, Social Service or Entertainment. However, application of IT in economic field is very limited. Stability and healthiness of a country's economy directly connects with the accuracy of forecasted Inflation rate. With the recession raised at end of year 2008, world communities pay much attention on inflation and put huge efforts to predict it accurately. Neural networking and data mining are two IT techniques that are commonly used in forecasting and hidden pattern recognition. We have applied both of these techniques to the theoretically sound data set with the intention of identifying most appropriate IT forecasting technique for forecasting the inflation rate. Since forecasted inflation rate directly link with country's monetary policy, accuracy of predictions is very significant. Further continuity of government as well as the economy depends on these decisions. Through this study we were able to identify appropriate characteristics of neural networks and Data mining techniques in case of forecasting inflation rate with high accuracy.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132507448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Maturity model for process of academic management 学术管理过程的成熟度模型
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018745
Daniel Fernando Antonucci e Silva, R. B. Cabral
{"title":"Maturity model for process of academic management","authors":"Daniel Fernando Antonucci e Silva, R. B. Cabral","doi":"10.1109/I-SOCIETY16502.2010.6018745","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018745","url":null,"abstract":"The segment of education in Brazil, especially in higher education, has undergone major changes. The search for professionalization, for cost reduction and process standardization has led many institutions to associate through partnerships or acquisitions. On the other hand, maturity models have been used very successfully in several areas of knowledge especially in software development, as an approach for quality models. This paper presents a methodology for assessing the maturity of academic process management in private institutions of higher education that, initially, aims the Brazilian market, but its idea can be applied to a global maturity model of academic process management.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
E-learning reflecting individual learning styles 反映个人学习风格的电子学习
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018799
P. Poulova, M. Černá, S. Ivana
{"title":"E-learning reflecting individual learning styles","authors":"P. Poulova, M. Černá, S. Ivana","doi":"10.1109/I-SOCIETY16502.2010.6018799","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018799","url":null,"abstract":"The efforts towards increasing the number of educated people should be prioritized in every society. Due to this influence university education has changed substantially but numerous problems still exist. Plenty of teachers implement into the instructional process self-study methods supported by information and communication technologies (ICT). Having undergone the initial period which was affected by suspicion, material and technical problems, the time of a new stage came to deal with didactic aspects of ICT implementation into the educational process.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124917405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SocialCompanion: Connecting virtual and physical social networks SocialCompanion:连接虚拟和实体社交网络
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018748
Claudia Becker, P. Rothenpieler, S. Fischer
{"title":"SocialCompanion: Connecting virtual and physical social networks","authors":"Claudia Becker, P. Rothenpieler, S. Fischer","doi":"10.1109/I-SOCIETY16502.2010.6018748","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018748","url":null,"abstract":"In this paper we present SocialCompanion, an approach for connecting virtual and physical social networks. Social-Companion is a learning system which adapts to the users needs and interests using contextual information about the user and his environment. SocialCompanion is work-in-progress and will be providing innovative user-centric and user-assisting services. Currently, we are implementing a prototype for real-life experiments.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125073564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The small business web presence: Extending the reach of the website 小企业网站存在:扩大网站的覆盖范围
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018813
Stephen Burgess
{"title":"The small business web presence: Extending the reach of the website","authors":"Stephen Burgess","doi":"10.1109/I-SOCIETY16502.2010.6018813","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018813","url":null,"abstract":"It has been known for some time that small businesses have had access to third party websites to extend their web presence. However, little is known about the extent to which they use them and how the usage may differ across various types of small businesses. This paper addresses this by examining the third party website use of 50 Australian small businesses that have used the services of 139 third party websites. There are differences that can be attributed to different business categories. The majority of third party websites used were directory services, with more complex portal websites being used by the accommodation, café and restaurant; retail and personal services business categories. Most businesses used directories that were free to use or were free for basic listings with a fee for extended listings. However, some 30% of the third party website usage did involve some fee.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121239130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信