2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

筛选
英文 中文
The semantic analysis method and algorithms of open tests answers on “cyber-2” pattern in the knowledge revival and evaluation systems 知识复兴与评价系统中“cyber-2”模式开放测试答案的语义分析方法与算法
Zurab Munjishvili, T. Munjishvili
{"title":"The semantic analysis method and algorithms of open tests answers on “cyber-2” pattern in the knowledge revival and evaluation systems","authors":"Zurab Munjishvili, T. Munjishvili","doi":"10.1109/INTELCIS.2015.7397195","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397195","url":null,"abstract":"Is given the identification and assessment of knowledge in the computer systems in scientific terms it is one of the interesting and in practical terms, the topical - The open type tests processing value. In the open-type tests the semantic analysis method and algorithms are written in natural language. Are introduces a semantic analyzer results. Semantic Analyzer represents by the author, designed to identify knowledge and one of the functional unit evaluation system of “cyber2”. The findings and recommendations are also given. In the programming package there are considered diagnosis, different kinds of help. Attention is paid on security problems. Program is written on VB.NET 2010, as a server is used SQL Server 2008 on the platform of Windows Server 2008.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80010650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Primitive printed Arabic Optical Character Recognition using statistical features 使用统计特征的原始印刷阿拉伯光学字符识别
Mohamed Dahi, N. Semary, M. Hadhoud
{"title":"Primitive printed Arabic Optical Character Recognition using statistical features","authors":"Mohamed Dahi, N. Semary, M. Hadhoud","doi":"10.1109/INTELCIS.2015.7397278","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397278","url":null,"abstract":"Due to the several forms of different Arabic font types, Arabic character recognition is still a challenge. Most literature works consider only one font per text what results in low recognition accuracy. This paper tends to enhance the accuracy of AOCR (Arabic Optical Character Recognition) by considering an automatic Optical Font Recognition (OFR) stage before going ahead with the traditional OCR stages. This has been achieved using SIFT (Scale Invariant Feature Transform) descriptors. First, a comparative study of four most recent algorithms of primitive OCR has been performed to evaluate the different features and classifiers utilized in their systems. Accordingly, a combining of statistical features have been proposed as well as selecting Random Forest Tree classifier for classification stage. The combination of the features are used to train the classifiers. As a result, each recognized text font is directed to a specific classifier tree. The proposed system was tested on a generated Primitive Arabic Characters Noise Free dataset (PAC-NF) containing 30000 samples. Experimental results achieved a promising character recognition accuracy of 99.8-100%.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88595271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of DNA-based Advanced Encryption Standard (AES) 基于dna的高级加密标准AES的设计
M. Sabry, M. Hashem, T. Nazmy, M. E. Khalifa
{"title":"Design of DNA-based Advanced Encryption Standard (AES)","authors":"M. Sabry, M. Hashem, T. Nazmy, M. E. Khalifa","doi":"10.1109/INTELCIS.2015.7397250","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397250","url":null,"abstract":"DNA cryptography is a new promising direction in cryptography research that emerged with the progress in DNA computing field. Traditional cryptographic systems have long legacy and are built on a strong mathematical and theoretical basis. So, an important perception needs to be developed that the DNA cryptography is not to negate the tradition, but to create a bridge between existing and new technology. The power of DNA computing will strengthen the existing security systems by opening up a new possibility of a hybrid cryptographic system. In our work, we are presenting the DNA-based design and implementation to “Advanced Encryption Standard” [AES]. We built our algorithm with all its specifications (data, algorithms operations and used functions) on DNA basis instead of bits. This aims at proving the possibility of building such a complex system on DNA basis in a way of making it a suitable candidate for implementation in biological environment or on DNA computers. Our algorithm kept the same security strength and robustness of the standard algorithm.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83723536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A preprocessing method for printed Tamil documents: Skew correction and textual classification 泰米尔语打印文档的预处理方法:偏斜校正和文本分类
M. Ramanan, A. Ramanan, E. Charles
{"title":"A preprocessing method for printed Tamil documents: Skew correction and textual classification","authors":"M. Ramanan, A. Ramanan, E. Charles","doi":"10.1109/INTELCIS.2015.7397266","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397266","url":null,"abstract":"An Optical character recognition (OCR) consists of the phases: preprocessing and segmentation, feature extraction, classification and post-processing. This paper focuses on preprocessing and segmentation tasks which plays a major role in the subsequent processes of an OCR. The objective of preprocessing and segmentation is to improve the quality of the input image. In addition this phase removes unnecessary portions of the input image that would otherwise complicate the subsequent steps of OCR and reduce the overall recognition rate. Preprocessing and segmentation step consists many sub processes namely, image binarisation, noise removal, skew detection and correction, page segmentation, text or non-text classification, line segmentation, word segmentation and character segmentation. This paper proposes a new method to calculate the skew angle for skew correction. In addition this paper proposes a more accurate method to segment the input image as blocks and classify the blocks as text or non-text. The skew angle is calculated on the scanned document using Wiener filter, smearing technique and Radon transform. Document image is segmented into blocks using run length smearing algorithm and connected component analysis. Features such as basic, density and HOG are extracted from each block for text and non-text classification. The proposed methods are tested on 54 documents. The testing results show a recognition rate of 96.30% for skew detection and correction whereas the recognition rate is 99.18% for text or non-text classification with binary SVMs using RBF kernel.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83115959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrated trusted protection technologies for industrial control systems 工业控制系统集成可靠保护技术
Jing-pei Wang, Liu Jie, Shengming Yang, Li Dan
{"title":"Integrated trusted protection technologies for industrial control systems","authors":"Jing-pei Wang, Liu Jie, Shengming Yang, Li Dan","doi":"10.1109/INTELCIS.2015.7397254","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397254","url":null,"abstract":"Security vulnerabilities in industrial control systems (ICS) and its open interconnected trends lead to security risks escalating. The existed security protection technologies, with poor applicability, are hard to meet the special need of information security for ICS. In this paper, trusted protection theories and technologies for ICS were studied and an integrated trusted protection model was proposed. The proposed method protected data and system security of ICS from aspects of trusted computing platform, trusted data protection mechanism and trust management network. The trusted protection technologies were deployed on each of the three network layers of ICS according to differentiated resource and security requirements of each layer. Analysis and simulation results indicate the effectiveness and superiority of the proposed method. The establishing of trusted protection model assists realizing the systematic security protection for heterogeneous industrial control systems.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90462971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Epidemiological modeling of network worm infections and countermeasures 网络蠕虫感染的流行病学建模与对策
K. Shahzad, Steve Woodhead
{"title":"Epidemiological modeling of network worm infections and countermeasures","authors":"K. Shahzad, Steve Woodhead","doi":"10.1109/INTELCIS.2015.7397288","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397288","url":null,"abstract":"Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed and the continuous discovery of wormable vulnerabilities. Mathematical models for worm propagation can help us to understand the epidemiology of worm outbreaks and to devise effective defense mechanisms. In this paper, we report the epidemiological modeling and analysis of worm propagation and a distributed worm detection and prevention countermeasure. The work is based on the Slammer and Witty worm characteristics and employs the widely used Susceptible-Infected biological model. The epidemiological modeling shows that the SI model can be used to represent the virulence of random scanning worms and to quantify the effectiveness of worm countermeasures.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81918426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ArSL keyboard for android android的ArSL键盘
M. El-Gayyar, Amira Ibrahim, Ahmed Sallam
{"title":"The ArSL keyboard for android","authors":"M. El-Gayyar, Amira Ibrahim, Ahmed Sallam","doi":"10.1109/INTELCIS.2015.7397264","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397264","url":null,"abstract":"Despite the efforts of many organizations and governments, deaf people still forming a closed community isolated from the public society. The only way to communicate in a deaf community is the use of Sign Language. In fact, for deaf individuals, Sign Language is the main communication barrier with hearing people; either one side needs to learn the language of the other or they have to depend on a third-party interpreter. With technological advances, there have been many attempts to build a feasible bridge to connect deaf communities with the public. However, most of the developed techniques are complex and need special and expensive equipment which is not affordable for deaf people, especially in Arabic countries where deaf represents a significant proportion of the population mostly of medium and poor classes. Fortunately, mobile devices reached all hands recently creating a good opportunity to build a simple viable solution. Thus, we have developed an Android mobile application to support the Arabic Sign Language. Inspired by Chinese keyboards, we have embedded the language signs as a font to build a user-friendly keyboard. It helps a deaf person to construct Arabic Sign Language sentences and to ask the application to convert them into standard Arabic text or speech. Moreover, the application works the other way around and translates from standard Arabic to Arabic Sign Language forming a simple mechanism for seamless communications between hearing and deaf people. Finally, we have tested our solution with a number of volunteers from deaf and hearing communities and the results were promising.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81392221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparing ontology-based and Item response theory in computer adaptive test 基于本体理论与项目反应理论在计算机自适应测试中的比较
E. Khater, A. Hegazy, M. E. Shehab
{"title":"Comparing ontology-based and Item response theory in computer adaptive test","authors":"E. Khater, A. Hegazy, M. E. Shehab","doi":"10.1109/INTELCIS.2015.7397220","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397220","url":null,"abstract":"Adaptive e-learning is concerning about students' skills and preferences. A few researches concerning about adaptive examination systems. Ontologies can be used in e-learning systems to organize and describe knowledge and to support content management. Combining ontology with CAT systems helps to control the exam content regarding content semantics. This paper propose an ontology based adaptive Comparing system's results with IRT results -The CAT major model- provide an exact information about how far the system is reliable regarding the IRT.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83877123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized cooperative trajectory planning for multiple UAVs in dynamic and uncertain environments 动态不确定环境下多无人机分散协同轨迹规划
Yu Zhang, Jingzhao Yang, S. Chen, J. Chen
{"title":"Decentralized cooperative trajectory planning for multiple UAVs in dynamic and uncertain environments","authors":"Yu Zhang, Jingzhao Yang, S. Chen, J. Chen","doi":"10.1109/INTELCIS.2015.7397248","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397248","url":null,"abstract":"This paper studies the problem of planning collision-free dynamically feasible trajectories for a team of autonomous unmanned aerial vehicles (UAVs) in real-time, where the UAVs try to fly through a complex 3-D environment to reach their specified destinations. First, the cooperative trajectory planning problem is mathematically formulated as a decentralized receding horizon optimal control problem (DRH-OCP). Second, a decentralized coordination strategy for multi-vehicle real-time trajectory planning is designed by effectively combining the benefits of inverse dynamics optimization method and receding horizon optimal control technique. This coordination strategy mainly features that each vehicle only solves a sub-problem for its own plan and vehicles in the team make plans in parallel. Finally, simulation results show the feasibility of the proposed planning strategies.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89422772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MOOCs in universities: Intelligent model for delivering online learning content 大学mooc:提供在线学习内容的智能模式
G. Sammour, A. Al-Zoubi, A. Gladun, K. Khala, Jeanne Schreurs
{"title":"MOOCs in universities: Intelligent model for delivering online learning content","authors":"G. Sammour, A. Al-Zoubi, A. Gladun, K. Khala, Jeanne Schreurs","doi":"10.1109/INTELCIS.2015.7397216","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397216","url":null,"abstract":"A massive open online course (MOOC) is a model for delivering learning content online to any person who wants to take a course, with no conditions on attendance. Unlike traditional courses, MOOCs require additional skills, provided by videographers, instructional designers, IT specialists and platform specialists. Over the past few years several Universities facilitated partnership with MOOCs providers and are building MOOC courses, to serve as e-learning versions of their courses. Despite all the advantages offered by the MOOC courses, the current statistics show that only a very limited number of registered learners are completing the course. And the vast majority are stopping learning at an early stage. The main reason can be found in the lack of motivation of the students to pass the exams to become a certificate, because universities do not accept the certificates for credits. The aim of this paper is to study the readiness of students to take MOOC courses on one hand and the acceptance of MOOC courses in Universities. A study is conducted on two Universities, Hasselt University, Belgium and Princess Sumaya University for Technology, Jordan. The results of the study are promising, as they suggest that such virtual study programs are accepted in both Universities. However, professors in both Universities elucidate concerns on accepting the equivalence of the MOOC courses to their own courses.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79395708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信