2013 9th International Conference on Innovations in Information Technology (IIT)最新文献

筛选
英文 中文
Supporting environmental awareness using mobile clients 利用移动客户端支持环保意识
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544398
Azza Al Houqani, H. Hildmann, S. Nicolas, F. Saffre
{"title":"Supporting environmental awareness using mobile clients","authors":"Azza Al Houqani, H. Hildmann, S. Nicolas, F. Saffre","doi":"10.1109/INNOVATIONS.2013.6544398","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544398","url":null,"abstract":"We present an android application for mobile clients, which is designed to raise awareness for - and support the reduction of - the individual consumption of natural resources like water and electricity. The presented implementation is interfacing with existing services offered by the utility provides in the emirate of Abu Dhabi and provides a number of functionalities. Climate change and the detrimental effect it has on life everywhere on the planet is receiving increasing attention. There is an urgent need to raise awareness for a number of environmental issues. The ambitious sustainability targets set forth in the Abu Dhabi 2030 vision clearly acknowledges the relevance of preserving our environment. This paper presents a functioning and feasible contribution to this effort.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information technology and the smart grid - A pathway to conserve energy in buildings 信息技术和智能电网——建筑节能的途径
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544394
M. Alahmad, Yuye Peng, E. Sordiashie, L. El Chaar, N. Aljuhaishi, H. Sharif
{"title":"Information technology and the smart grid - A pathway to conserve energy in buildings","authors":"M. Alahmad, Yuye Peng, E. Sordiashie, L. El Chaar, N. Aljuhaishi, H. Sharif","doi":"10.1109/INNOVATIONS.2013.6544394","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544394","url":null,"abstract":"Through combining Information and Communication Technologies (ICT), advanced instrumentation, system intelligence, and information on the end user, the smart grid will increase building energy efficiency and conservation. Demand Side Management (DSM) programs serve as an aid in energy conservation and management strategies as well as in the collection of real-time consumption information data. Specifically, as proposed in this paper, real-time, fine-grain consumption data at the point of use in buildings can be used by building energy managers, utilities, and the end user for planning, load forecasting, and feedback for providing information that may lead to end user behavior change. This paper focuses on the development of node-level very short time load forecasting (NL-VSTLF), and specifically on a framework for the utilization of real-time data at the point of use for advancing research in the area of building-very short term load forecasting. This proposed framework will be the foundation for variable one minute to hourly and daily load forecasting using an aggregate of all active nodes in real-time.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identity management framework for cloud networking infrastructure 用于云网络基础设施的身份管理框架
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544386
R. Dhungana, A. Mohammad, A. Sharma, I. Schoen
{"title":"Identity management framework for cloud networking infrastructure","authors":"R. Dhungana, A. Mohammad, A. Sharma, I. Schoen","doi":"10.1109/INNOVATIONS.2013.6544386","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544386","url":null,"abstract":"The Cloud Networking(CloNe) infrastructure provisions elastic, secure, and on-demand virtualized network resources to the end user. It incorporates the Network-as-a-Service(NaaS) provisioning model, which enhances network-level scalability, throughput, and performance. In this paper, we extend the CloNe architecture by designing, deploying, and integrating an identity management framework, customized for the CloNe infrastructure. The identity management framework proposed in this paper, is based on the User Managed Access(UMA) protocol. The framework supports authentication, authorization, and identity management of entities in the CloNe infrastructure. Furthermore it enables federated identity management and management of access control policies across different infrastructure providers.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An empirical study on the robustness of a fragile watermark for relational databases 关系型数据库脆弱水印鲁棒性的实证研究
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544423
I. Kamel, Waheeb Yaqub, K. Kamel
{"title":"An empirical study on the robustness of a fragile watermark for relational databases","authors":"I. Kamel, Waheeb Yaqub, K. Kamel","doi":"10.1109/INNOVATIONS.2013.6544423","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544423","url":null,"abstract":"Databases most often contain critical information. Unauthorized changes to databases can have serious consequences and may result in significant losses for the organization. This paper presents a viable solution for protecting the integrity of the data stored in relational databases using fragile watermarking. Prior techniques introduce distortions to the watermarked values and thus cannot be applied to all attributes. Our technique protects relational tables by reordering tuples relative to each other according to a secrete value (watermark). This paper introduces empirical study on the effect of data distribution and other data measures like the mean and standard deviation on the attack detection rates. A study on the cost, in terms of the execution time, of the proposed watermark insertion and data verification algorithms is also presented.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Portable wireless biomedical temperature monitoring system: Architecture and implementation 便携式无线生物医学温度监测系统:架构与实现
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544400
B. Mohammad, H. Elgabra, R. Ashour, H. Saleh
{"title":"Portable wireless biomedical temperature monitoring system: Architecture and implementation","authors":"B. Mohammad, H. Elgabra, R. Ashour, H. Saleh","doi":"10.1109/INNOVATIONS.2013.6544400","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544400","url":null,"abstract":"This paper demonstrates the design and implementation of a portable embedded system targeting continuous temperature monitoring with wireless interface capability. Our main motive is to provide a solution for monitoring babies', disable or elderly population body temperature and initiate immediate alarm in case of hazardous cases. Such cases include overheating (fever), under heating, and a high temperature change over a predefined time period. The advantage of the system is its effectiveness as preventive measure against febrile seizures or any other fever condition. The system is extended for interfacing with other devices such as cell phones to enable remote monitoring; an android application to showcase the concept was developed. The system architecture consist of temperature sensors, LCD screen, Bluetooth interface, memory, a sound buzzer all controlled by a single microcontroller core. Even though the system is concentrated on temperature monitoring but the architecture can be expanded to monitor other vital signs like pulse rate, Oxygen saturation or any other interested parameter.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115238689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Protein-protein Interaction Prediction using Arabic semantic analysis 利用阿拉伯语语义分析预测蛋白质-蛋白质相互作用
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544426
Nazar Zaki, A. A. Dhaheri, Kalthoom A Alawar, Saad Harous
{"title":"Protein-protein Interaction Prediction using Arabic semantic analysis","authors":"Nazar Zaki, A. A. Dhaheri, Kalthoom A Alawar, Saad Harous","doi":"10.1109/INNOVATIONS.2013.6544426","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544426","url":null,"abstract":"Scientists are still far from unraveling the molecular mechanisms of most relevant diseases such as cancer and diabetes. A better understanding of protein interactions could provide a clue about the molecular mechanism of the processes leading to such diseases. Novel methodologies to understand diseases through their primary protein interactions are highly desired. In this paper we propose a simple method to predict protein-protein interaction based on Arabic semantic analysis model. The Arabic semantic model is an effective feature extraction method based on natural language processing. Two protein sequences may interact if they contain similar or related Arabic words. The semantic meaning will most likely provide us with a clue on how or why two proteins interact. To evaluate the ability of the proposed method to distinguish between “interacted” and “non-interacted” proteins pairs, we applied it on a dataset of 200 protein pairs from the available yeast saccharomyces cerevisiae protein interaction. The proposed method managed to get 100% sensitivity, 0.84% sensitivity and 92% overall accuracy. The method also showed moderate improvement over the existing well-known methods for PPI prediction such as PPI-PS and PIPE.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124811158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attitude towards Robot Assisted Surgery: UAE context 对机器人辅助手术的态度:阿联酋背景
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544414
M. Zineddine, N. Arafa
{"title":"Attitude towards Robot Assisted Surgery: UAE context","authors":"M. Zineddine, N. Arafa","doi":"10.1109/INNOVATIONS.2013.6544414","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544414","url":null,"abstract":"Information and communication technology (ICT) has become a core part of every business. Industries form all areas have been taking advantage of ICT. Healthcare sector is no exception. Robots have been playing a pivotal role in assisting surgeons in many types of surgeries in the recent years. Robotic assisted surgery led to the possibility of remote procedures by surgeons on remote patients. This study investigates the perception of patients towards the use of Robots in surgery locally and remotely. A survey method was adopted in this research. Data reveals that the majority of respondents from a random sample (140 participants) believe that the use of robots during surgeries is neither safe and controllable, nor beneficial. The acceptance of the use of this surgical technology in all cases is still questionable within this research sample.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120991220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A path generation algorithm for mobile sinks in wireless sensor networks 无线传感器网络中移动sink的路径生成算法
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544412
E. Taqieddin, O. Banimelhem, I. Shatnawi
{"title":"A path generation algorithm for mobile sinks in wireless sensor networks","authors":"E. Taqieddin, O. Banimelhem, I. Shatnawi","doi":"10.1109/INNOVATIONS.2013.6544412","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544412","url":null,"abstract":"With the energy constraints present in wireless sensor networks, it is essential to find energy-efficient approaches that would result in enhanced network lifetime. One approach is to exploit the sink mobility, by moving it randomly or through a predefined path, to the vicinity of the sensor nodes. By doing so, the communication distance will be reduced, leading to a reduction in the consumed transmission energy. In this paper, a path generation algorithm based on the Principal Component Analysis is presented. The main goal is to find a fixed path for a single mobile sink with the minimum average distance to the sensor nodes. Simulation results indicate that this approach leads to extended network lifetime and results in an increased average energy per live node.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Developing visual haptic application for learning Jawi handwriting skills 开发用于学习java书写技巧的视觉触觉应用程序
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544410
M. M. Amin, Halimah Badioze Zaman, A. Ahmad
{"title":"Developing visual haptic application for learning Jawi handwriting skills","authors":"M. M. Amin, Halimah Badioze Zaman, A. Ahmad","doi":"10.1109/INNOVATIONS.2013.6544410","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544410","url":null,"abstract":"The visual haptic approach is considered as a very promising potential to aid primary school pupils in teaching and learning method of Jawi handwriting skills. An effort to help pupils in learning Jawi handwriting skills has prompted this study. This paper explores the related literatures and previous studies on visual haptic in handwriting. It also summarizes the findings of the preliminary study on the current approach of teaching and learning of Jawi handwriting skills, and the potential of the visual haptic approach in the Malaysian educational setting. This paper also discusses two main phases involved in this study, which are the development and the usability testing of Visual Haptic Jawi (HV-Jawi). The proposed conceptual framework hopefully can be a guide in developing a visual haptic application such as HV-Jawi.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123935358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi watermarking algorithm based on DCT and hash functions for color satellite images 基于DCT和哈希函数的彩色卫星图像多重水印算法
2013 9th International Conference on Innovations in Information Technology (IIT) Pub Date : 2013-03-17 DOI: 10.1109/INNOVATIONS.2013.6544389
A. Kunhu, H. Al-Ahmad
{"title":"Multi watermarking algorithm based on DCT and hash functions for color satellite images","authors":"A. Kunhu, H. Al-Ahmad","doi":"10.1109/INNOVATIONS.2013.6544389","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544389","url":null,"abstract":"This paper deals with a multi watermarking algorithm which embeds robust ownership watermark and fragile authentication information into satellite images to protect the copyright ownership and integrity of the images. This new watermarking technique is totally blind and does not require the original satellite image for the extraction process of the embedded information. The robust watermark is embedded first in the discrete cosine transform (DCT) and the second hash authentication code is embedded in the spatial domain. The new technique offers high peak signal to noise ratio (PSNR) and similarity structure index measure (SSIM) values. The technique was successfully tested on a variety of satellite images. The fragile watermark is sensitive to any slight tampering and can locate the area of the editing. The robust watermark survived many intentional and non intentional attacks.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122491371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信