2016 12th International Conference on Innovations in Information Technology (IIT)最新文献

筛选
英文 中文
Architectural design of a cloud-based reCAPTCHA service 基于云的reCAPTCHA服务的架构设计
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880041
H. Abubaker, K. Salah, H. Al-Muhairi, A. Bentiba
{"title":"Architectural design of a cloud-based reCAPTCHA service","authors":"H. Abubaker, K. Salah, H. Al-Muhairi, A. Bentiba","doi":"10.1109/INNOVATIONS.2016.7880041","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880041","url":null,"abstract":"reCAPTCHA is a security measure that guards web applications against automated abuse by presenting a random auto-generated challenge to users to solve. These challenges have to be devised to be hard to be solved by computers, yet easy for humans. In this paper, we present an architectural design for a cloud-based reCAPTCHA service and discuss key design issues. These issues include the extraction of individual word images from the scanned pages, optical character recognition (OCR) initial words classification, handling multiple users at the cloud-based service side, and usability and readability. We also show how our design addresses these issues at the implementation phase. It is worth noting that our reCAPTCHA service is designed for the Arabic language, but the underlying proposed architecture and design principles can be applied to any other language.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Revolutionizing the healthcare of the future through nanomedicine: Opportunities and challenges 通过纳米医学革新未来的医疗保健:机遇与挑战
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880025
Hadeel Elayan, R. Shubair, Nawaf I. Almoosa
{"title":"Revolutionizing the healthcare of the future through nanomedicine: Opportunities and challenges","authors":"Hadeel Elayan, R. Shubair, Nawaf I. Almoosa","doi":"10.1109/INNOVATIONS.2016.7880025","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880025","url":null,"abstract":"Nanotechnology refers to the design, production and application of structures, devices or systems at the incredibly small scale of atoms and molecules-the \"nanoscale\". As a result, this technology has the potential to remarkably affect the development of the healthcare sector by revolutionizing both the diagnostic and therapeutic approach of diseases. In this paper, current advances in modern medicine are presented and discussed. Drug delivery, gene delivery, immune system support and health monitoring are demonstrated as few examples of the many applications that uses nanotechnology in disease diagnosis. In addition, the technology of bionanosensors is presented to highlight their ability to sense the biochemical and biophysical signals associated with diseases at the molecular or cellular levels. Further, nanoparticles are demonstrated as essential building blocks of nanotechnology in which various types of materials are presented and characterized. Finally, the challenges and future trends associated with this developing technology are illustrated.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Overview of ICT in the advancement of electric vehicle penetration: Overview of vehicle grid communication system and charging infrastructure and a case study of economic and environmental benefits of electric vehicles in Nebraska 信息通信技术在推进电动汽车普及中的概述:内布拉斯加州汽车电网通信系统和充电基础设施概述以及电动汽车的经济和环境效益案例研究
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880031
Alan Alahmad, A. Rayyan, Fares Al Juheshi, H. Sharif, M. Alahmad, K. Shuaib, Mohammad Abdul-Hafez, N. A. Aljuhaishi
{"title":"Overview of ICT in the advancement of electric vehicle penetration: Overview of vehicle grid communication system and charging infrastructure and a case study of economic and environmental benefits of electric vehicles in Nebraska","authors":"Alan Alahmad, A. Rayyan, Fares Al Juheshi, H. Sharif, M. Alahmad, K. Shuaib, Mohammad Abdul-Hafez, N. A. Aljuhaishi","doi":"10.1109/INNOVATIONS.2016.7880031","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880031","url":null,"abstract":"Information and communication technology (ICT) plays a key role in our society, making management and planning easier across sectors. ICT can also help users during times of transition to promote a newer technology in an industry, such as transportation, and aid in GHG reductions by its enabling technologies. Battery electric vehicles (BEV) emit less CO2 than conventional vehicles, offering a way to lower fuel emissions. The sales of BEVs have shown a strong growth trend in the U.S., but continued use depends on effective ICT based enabling technologies to link BEVs with its environment to provide information such as real-time battery charge levels, location of nearest charging infrastructure, route options to optimize battery performance and energy price in a given area within the BEVs vehicle grid communication (VGC) infrastructure. In an effort to build BEV charging infrastructure aided by ICT enabling technologies to promote and deploy BEV, a case study is presented in which 24 BEVs and 35 Chargepoint charging stations are deployed across communities in Nebraska. Data analysis is used to gain insight into charging times, user charging habits, economic and environmental saving, information that can be used by ICT enabling technologies to optimize the user experience, smart grid operation and wide spread adoption of BEVs.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132413961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Authentication enhancement techniques for BAC in 2G E-passport 2G电子护照中BAC认证增强技术
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880040
Nermeen M. Abdal-Ghafour, Ayman A. Abdel-Hamid, M. Nasr, S. Khamis
{"title":"Authentication enhancement techniques for BAC in 2G E-passport","authors":"Nermeen M. Abdal-Ghafour, Ayman A. Abdel-Hamid, M. Nasr, S. Khamis","doi":"10.1109/INNOVATIONS.2016.7880040","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880040","url":null,"abstract":"Electronic passport is one of the hottest research fields nowadays due to reported different attacks against various countries. Several attacks such as brute force attack, guessing machine readable zone's information are performed on Basic Access Control Protocol (BAC) due to its low entropy. This paper presents two proposed authentication enhancement techniques for seed key of BAC. The first proposed enhancement technique depends on a password provided by the citizen as input to the inspection system at the border during the verification process. The second proposed enhancement technique depends on extracting minutiae features from a scanned citizen's fingerprint to increase strength of seed key. Performance evaluation experiments for proposed enhancement techniques are conducted using MATLAB proving that the proposed techniques enhance authentication procedures of BAC and increase entropy of seed key with minimum additional delay. A facial recognition database and fingerprint recognition database are tested proving the strength of proposed techniques against cracking.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Social desirability bias in software piracy research: Evidence from pilot studies 软件盗版研究中的社会期望偏差:来自试点研究的证据
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880052
M. Gergely, V. Rao
{"title":"Social desirability bias in software piracy research: Evidence from pilot studies","authors":"M. Gergely, V. Rao","doi":"10.1109/INNOVATIONS.2016.7880052","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880052","url":null,"abstract":"Social desirability bias (SDB) is the under-or over-reporting of behaviors by a respondent in order to appear more acceptable, or gain the approval of others. The presence of SDB in studies of software piracy behavior has been suspected for long. However, few studies have explicitly addressed this issue in detail. In the current article, results from a set of pilot studies are reported. These pilot studies compare software piracy behavior in experimental studies to responses of intentions to pirate in paper-based scenarios, under equivalent conditions. The comparisons provide valuable preliminary insights into the understanding of SDB in software piracy, and suggest the need to account for SDB research in software piracy studies.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Challenges and opportunities for underwater sensor networks 水下传感器网络的挑战与机遇
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880021
A. Sheikh, Emad A. Felemban, Muhamad Felemban, Saad B. Qaisar
{"title":"Challenges and opportunities for underwater sensor networks","authors":"A. Sheikh, Emad A. Felemban, Muhamad Felemban, Saad B. Qaisar","doi":"10.1109/INNOVATIONS.2016.7880021","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880021","url":null,"abstract":"Wireless sensor networks (WSN) are distributed event-based systems comprising of tiny nodes capable of sensing the environmental phenomena with a limited battery, low pro­cessing power and short-range radio for communication. Most of the applications of sensor network are concerned with sensing scalar sensor such as temperature, pressure, humidity, or location of objects that can be conveyed through low-bandwidth and delay-tolerant data streams. More than a decade's research has matured communication protocols, sensor technology, bandwidth, energy efficiency and lifetime of traditional WSNs. The recent interest in underwater wireless sensor networks (UWSN) has resulted in various technological advances in the domain as well however, these advances have faced many challenges that are not seen in traditional WSNs. This paper discusses the technical challenges and available technologies that can be used to establish an underwater sensor network solution for applications such as monitoring of coral reefs.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Watermarking for protected fingerprint authentication 用于受保护指纹认证的水印
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880039
Naima Bousnina, S. Ghouzali, M. Lafkih, Ohoud Nafea, M. Mikram, Wadood Abdul, D. Aboutajdine
{"title":"Watermarking for protected fingerprint authentication","authors":"Naima Bousnina, S. Ghouzali, M. Lafkih, Ohoud Nafea, M. Mikram, Wadood Abdul, D. Aboutajdine","doi":"10.1109/INNOVATIONS.2016.7880039","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880039","url":null,"abstract":"This paper presents a spatial biometric watermarking scheme for multimodal authentication system. This method embeds the face features (watermark) into the fingerprint image (cover) via a generated secret key to locate the pixels to be watermarked while preserving the fingerprint minutia points. The face features are extracted using Orthogonal Locality Preserving Projections technique. The proposed scheme has the advantage that in addition to fingerprint matching, the recovered watermark during the decoding can be used to establish the authenticity of the fingerprint and the user. The experimental results obtained using the ORL face database and FVC2002 DB2 fingerprint database have showed that the fingerprint-face based multimodal authentication system has good performance accuracy.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130725848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lightweight encryption algorithm in wireless body area network for e-health monitoring 面向电子健康监测的无线体域网络轻量级加密算法
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880042
Azza Zayed Alshamsi, E. Barka, M. Serhani
{"title":"Lightweight encryption algorithm in wireless body area network for e-health monitoring","authors":"Azza Zayed Alshamsi, E. Barka, M. Serhani","doi":"10.1109/INNOVATIONS.2016.7880042","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880042","url":null,"abstract":"There is an increase in the diseases of the circulatory system in United Arab Emirates, which makes it the first leading cause of death. Therefore, there is a high demand for a continuous care that can be achieved by adopting an emerging technology of e-Health monitoring systems using Wireless Body Area Network (WBAN) that can collect patient's data. Since patient's data is private that makes securing the WBAN is essential. In this paper there is a proposed design architecture to secure data transmission from WBAN sensor to mobile in e-Health monitoring system by encrypting the vital signs of a patient using Lightweight Encryption Algorithm (LEA).","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Review of personalized language learning systems 个性化语言学习系统的回顾
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880051
Heba M. Ismail, S. Harous, B. Belkhouche
{"title":"Review of personalized language learning systems","authors":"Heba M. Ismail, S. Harous, B. Belkhouche","doi":"10.1109/INNOVATIONS.2016.7880051","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880051","url":null,"abstract":"This study reviews published scientific literature on personalized language learning systems. The focus is threefold: 1) present a review and categorization framework that can be used to analyze and classify personalized language learning systems, 2) analyze recent work in personalized language learning systems and organize them under the proposed framework, 3) identify current trends, challenges and open research questions in the field. Our review led us to propose a review and classification scheme with two dimensions each with a few sub-elements: language learning dimension and technical dimension. The reviewed articles indicate that recent language personalization systems increasingly introduce Artificial Intelligence and focus on cognitive-based personalization. Findings also suggest that language personalization systems may improve by incorporating more complex adaptive learner's model and more complex contextual language learning tasks.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Identifying roles of fishing ports using multi-source data aggregation 使用多源数据聚合识别渔港角色
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880043
W. W. Hsu, Hao-Hsun Wang, Min-Ruey You, Minjaro Lu, Hsin-Yu Tsai
{"title":"Identifying roles of fishing ports using multi-source data aggregation","authors":"W. W. Hsu, Hao-Hsun Wang, Min-Ruey You, Minjaro Lu, Hsin-Yu Tsai","doi":"10.1109/INNOVATIONS.2016.7880043","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880043","url":null,"abstract":"Managing and maintaining fishing ports is crucial for fishing activities. With the lack of budget and labor force, some fishing ports face the brink of being shut down. A first choice for demolishing would be fishing ports with low utilization, but this does not mean the port is totally useless. When severe weather condition, i.e., typhoons, is in the proximity of the coastal line, offshore fishing vessels will return to dock in ports for safety. When major ports are fully docked, some of the minor ports or less active ports will be chosen as the haven. These ports are seldom used and lowly utilized, but should still be maintained for safety issues as they serve as a sanctuary for extreme weather conditions. This research uses big data aggregation approach to identify haven ports by processing fishing vessel states using collected voy­age data recorder (VDR) records and correlates this information with the typhoon information data source.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信